Computers & IT Crossword Puzzles
Object Oriented Programming
inheritance : which feature of oop indicates code reusability?, message passing : the feature by which one object can interact with another object is …
Input Devices
microphone : input device used to record audio, keyboard : input device used to type, touchpad : input device on a laptop, touchscreen : used in mcdonalds to …
Computer Hardware
mouse: hand-held pointing device that detects two-dimensional motion relative to a surface, keyboard: peripheral input device modeled after the …
Computer Fundamentals Review
external hardware : commonly referred to as peripherals, microchip : has electronic circuits on it and can hold large amounts of information, cloud storage : …
Basic Structures of Computers
system calls :to access the service of operating system,interface is provided by, interrupt :request signal from an i/o device for service by the processor, …
Cyber Security Month
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , links: don’t click on these …
Microsoft
pioneer: a person who develops or be the first to use or apply, microsoft : this company's mission statement is to empower every person and every …
Phishing
articles : where to find additional information on the different types of (phishing), call for help : sense danger?, logos : familiar ___ are often faked by …
Java Programming
two dimensional : also known as tables or matrices, graph : non-linear data structure consisting of nodes and edges, inheritance : objects can acquire the …
DATABASE MANAGEMENT SYSTEM
singletier : client server db resides on same location, heterogenous db : different sites can have different schema, erdiagram : blueprint of db, raid 3 : bit …
Digital Literacy
new tab : open another page in the browser, font : another name for text, double click : open a folder or file, email : electronic mail, word : document …
Cyber Forensics Quiz
arp: is how network devices associate mac addresses with ip addresses, stealware: is software that modifies affiliate tracking codes by replacing their …
Cybersecurity Awareness Week
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , vulnerability: a flaw or …
Data Structures: Review In Java Programming
repetition: also known as looping structures, binary: tree whose elements have at most two children, arrays: ordered collection of data items with the same …
Internet eSafety
esafety : the government website where you can report illegal online activity., cyber bullying : the use of electronic communication to bully a person, …















