Computers & IT Crossword Puzzles
Just EXCEL
macro : excel automation, addrow : shift + spacebar, addcolumn : ctrl + spacebar, edit : f2 enters this mode, printpreview : ctrl + f2 shows this, selectall : …
Cyber Safety
password : a secret word you use to keep your account safe., share : what you shouldn’t do with personal information online., kind : the way you should act …
Digital Innovations
googol : 10 to the 100 power, hyperlink : connecting between files or object, autobiography : talking about oneself, paste : ctrl-v, underline : ctrl-u, …
Memory & Storage
ram : memory in which the locations can be accessed directly in any order, rom :memory that can be read from, but not written to., secondary : types of …
Network Topic
star-topology : each device with its own cable connecting to the hub/switch, router : responsible for moving data from one network to another, topology : this …
Cyberbullying
spam : unsolicited electronic mail sent from someone you do not know., blog : interactive web journal or diary, the contents of which are viewable to everyone …
Input Devices
microphone : input device used to record audio, keyboard : input device used to type, touchpad : input device on a laptop, touchscreen : used in mcdonalds to …
Computer Hardware
mouse: hand-held pointing device that detects two-dimensional motion relative to a surface, keyboard: peripheral input device modeled after the …
Computer Fundamentals Review
external hardware : commonly referred to as peripherals, microchip : has electronic circuits on it and can hold large amounts of information, cloud storage : …
Basic Structures of Computers
system calls :to access the service of operating system,interface is provided by, interrupt :request signal from an i/o device for service by the processor, …
Cyber Security Month
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , links: don’t click on these …
Phishing
articles : where to find additional information on the different types of (phishing), call for help : sense danger?, logos : familiar ___ are often faked by …
Java Programming
two dimensional : also known as tables or matrices, graph : non-linear data structure consisting of nodes and edges, inheritance : objects can acquire the …
Cyber Forensics Quiz
arp: is how network devices associate mac addresses with ip addresses, stealware: is software that modifies affiliate tracking codes by replacing their …
Cybersecurity Awareness Week
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , vulnerability: a flaw or …















