Computers & IT Crossword Puzzles
Internet Safety
symbols: a password should include numbers, uppercase letters, lowercase letters and ?, secure: what the 's' stands for in https, digitalfootprint: a trail of …
PowerPoint Vocabulary
format : appearance, level : a position within a structure, style : indicates how the characters are formatted, font : typeface, bulleted list : list of …
Data Structures
array: mutable and static. allocates contiguous memory for storing data., list: mutable and dynamic. can either be contiguous or will use a reference table., …
Object Oriented Programming
inheritance : which feature of oop indicates code reusability?, message passing : the feature by which one object can interact with another object is …
Microsoft Excel
column: appears vertically in a spreadsheet, default: setting that a computer program assumes you will use, paste: placing copied data, operand: items on either …
Computer Parts and Peripherals
touchscreen: interact with screen., video card: graphics card., processor: receives input and provides the output., ram: stored information., data: facts and …
Word Processing
indent : when the first line of text is set farther from the margin, printer : a machine for putting text or images onto paper, redo : to repeat or do again, …
Communications and Networks
wifi: simply an internet connection that’s shared with multiple devices in a home or business via a wireless router., lan: using routers, it can connect to …
Cybersecurity Awareness Week
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , vulnerability: a flaw or …
Introduction to MS Office
folder : a named location, excel : spreadsheet app that deals with data, slide : the basic unit of a powerpoint presentation, spreadsheet : also known as a …
Data Communication & Network
data communication : a process in which two or more computers or devices transfer data, instructions and information. , man: is a regional computer or …
Information Security Week
firewall : hardware or software solution that is used to filter network traffic, virus : a small program designed to cause damage to your computer by gaining …
Software Threats
computer threats: is a potential negative action, hackers: a person who uses computers to gain unauthorized access to data., cyber: ______ criminals are person …
Forensic Fingerprint
ridges: narrow, raised patterns on a person's fingertip, unique: being the only one of its type, fingerprints: a mark made by the tip of a human's finger on an …
Network Hardware and Type of Network
switch : device which handles messages more intelligently by knowing the address of the different devices on the network and only sends the message to the …
Electronic Mail
organize: the process of arranging email messages in a logical or systematic way, tone: the attitude or style of writing used in an email message, subject: a …
Basic Structures of Computers
system calls :to access the service of operating system,interface is provided by, interrupt :request signal from an i/o device for service by the processor, …
Copmputer Viruses
computer virus : what is a type of software that is designed to replicate itself and spread to other computers?, antivirus : what type of software is used to …
Just EXCEL
macro : excel automation, addrow : shift + spacebar, addcolumn : ctrl + spacebar, edit : f2 enters this mode, printpreview : ctrl + f2 shows this, selectall : …
Internet Browser
internet: a global network of connected computers and servers that allows the exchange of information., browser: a computer program used to access and view …
Phishing
articles : where to find additional information on the different types of (phishing), call for help : sense danger?, logos : familiar ___ are often faked by …