My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

DIT VOC. List #1 and 2

Name: ___________________________ Per. ___Date: ___________________________________
Across
A device that integrates a cell phone with the features of a PC, such as the ability to store information, receive email, and install programs.
A single-user computer that comes in many forms, such as a desktop model, a portable, laptop/notebook, or a handheld computer.
A mobile general-purpose computer contained in a single panel. Its distinguishing characteristic is the use of a touch screen as the input device.
Using the Internet to trick people into giving personal or sensitive data.
Someone who enjoys examining computer programs to see how they work, often seeking undocumented features or weaknesses in security.
A huge network that links together millions of computers and networks around the world.
Down
The largest, most powerful type of computer; generally used in scientific, engineering, and military fields, including space programs and weather forecasting.
Someone who uses electronic communications such as email to harm, threaten, or harass a person, group, or organization.
The use of the Internet or private networks to break state or federal laws.
A common means of authentication in which a person must enter an account name and private word or phrase.
Converting data into a form that cannot be interpreted without decrypting it.
A computer dedicated to a user or a group of users usually connected to a terminal or network.
A device or computer connected to a multi-user computer such as a minicomputer or mainframe computer.
A midsize, multi-user computer; more powerful than a workstation or personal computer but less powerful than a mainframe computer.
Words, numbers, symbols, images, sounds, and anything else that can be communicated and understood.
Illegally redirecting a website's traffic to a bogus website. Once at the illegal site, site visitors often become victims of identity theft.