Computers & IT Crossword Puzzles
Software Threats
computer threats: is a potential negative action, hackers: a person who uses computers to gain unauthorized access to data., cyber: ______ criminals are person …
Internet eSafety
esafety : the government website where you can report illegal online activity., cyber bullying : the use of electronic communication to bully a person, …
Data Compression
lossy : a type of compression that permanently removes data, lossless : a type of compression that removes data temporarily , uncompressed : does not undergo …
Cyber Forensics Quiz
arp: is how network devices associate mac addresses with ip addresses, stealware: is software that modifies affiliate tracking codes by replacing their …
Network & Distributed Systems
router: a device used to find the best path to any destination address, isp: an organisation that provides consumers and businesses internet access, ethernet: a …
Maintaining a Database
split form : in access, a form split into two panes; the upper pane lets you display the fields of one record in any arrangement and the lower pane maintains a …
Emoticons
culture : many means of emoji are related to american __________., intonation : the way we say something can be understand from our __________., computer : you …
Basic Structures of Computers
system calls :to access the service of operating system,interface is provided by, interrupt :request signal from an i/o device for service by the processor, …
Data Communication & Network
data communication : a process in which two or more computers or devices transfer data, instructions and information. , man: is a regional computer or …
Data Structures: Review In Java Programming
repetition: also known as looping structures, binary: tree whose elements have at most two children, arrays: ordered collection of data items with the same …
Fingerprints
formaldehyde: stops further decomposition and hardens skin, patent: visible fingerprints, sweat: we leave fingerprints as a result of...., latent: invisible …
Internet Saftey
username : an identification used by a person used by a person on the internet, website : a location connected to the internet that has more pages to the …
Displays and Printers
fluorescent: the letter f in ccfl., dynamicrange: the difference between the lightest and darkest colour., resistive: a type of touchscreen which works even if …
Copmputer Viruses
computer virus : what is a type of software that is designed to replicate itself and spread to other computers?, antivirus : what type of software is used to …
PC Parts
bios: loads the os and parts/drivers, operatingsystem : a user interface, port : allows you to connect external devices to a machine, case : like an xray for …
Broadcast and Debugging
loop : a block of code that is repeated until a certain condition is met., debugging : the process of identifying and fixing errors in a program., repeat : a …
Digital Innovations
googol : 10 to the 100 power, hyperlink : connecting between files or object, autobiography : talking about oneself, paste : ctrl-v, underline : ctrl-u, …
Information Security Week
firewall : hardware or software solution that is used to filter network traffic, virus : a small program designed to cause damage to your computer by gaining …
Chinese Social Media
quanmin k ge : an app to post yourself singing., bilibili : an app to watch all kinds of videos., dianping : use this to find good places in your area., …
Programming and Computational Thinking
algorithm : a sequence of logical instructions for carrying out a task. in computing, algorithms are needed to design computer programs., syntax : the set of …