computer Crossword Puzzles
Cruciverba Umberto 2017-03-29
25 Clues: fifa • figa • obey • cacca • umbat • negro • ebreo • cazzo • bomber • kahoot • fradei • pokemon • ballarin • juventus • calcetto • computer • hermione • destrobel • compleanno • giocattoli • callofduty • escape room • fibra ottica • rustytrombone • Game of thrones
German 2014-02-19
25 Clues: pen • map • flag • wall • glue • desk • door • book • paper • ruler • board • table • light • eraser • marker • pencil • computer • scissors • notebook • school bag • dictionary • wastebasket • board eraser • colored pencil • pencil sharpener
School And Education by Camilla Zanotti 2014-02-24
27 Clues: ARTE • PENNA • MAPPA • ZAINO • LIBRO • PORTA • SEDIA • BANCO • MATITA • TAVOLO • STORIA • FISICA • SCIENZE • CHIMICA • INGLESE • LAVAGNA • ITALIANO • COMPUTER • RIGHELLO • ECONOMIA • FINESTRA • BIOLOGIA • SPAGNOLO • GEOGRAFIA • TECNOLOGIA • MATEMATICA • CALCOLATRICE
ACTIVIDAD EXAMEN 2021-09-12
Across
- Way to save data of the same type or class
- Person who interacts with the computer
- Recordable compact disc
- Error in the sistem
- A word/image that lets you click and navigate
- Amount of room available on a storage device
- Unit of memory
- Personal computer
- Programs exist for the Computer to provide service.
- Storing information on series of ones and zeros
Down
- Used when entering data on the computer
- Rewritable compact disc
- Electrical and mechanical devices that are used to process the data.
- Redundant array independet disks
- Help manipulate objects and select menu options
- Magnetic type data storage medium
- The standart format for encoding sound files
- Program that let you look at the internet pages
- Serial advanced technology attachment
- Change a file back to its original form
20 Clues: Unit of memory • Personal computer • Error in the sistem • Rewritable compact disc • Recordable compact disc • Redundant array independet disks • Magnetic type data storage medium • Serial advanced technology attachment • Person who interacts with the computer • Used when entering data on the computer • Change a file back to its original form • ...
unit 1 vocabulary 2021-10-19
Across
- brainstorm
- identify the problem
- thinking work that computers do
- the information computers get from users
- review and re-examine
- thing that allows you to connect to things online
- sensor that recognizes things like finger prints
- sensor that locates your surroundings
- test to see what works
- processing that puts similar things together
- saving information
- a machine that works with information
Down
- define, prepare, try, reflect
- a computer adds up what you tell it to
- something might happen and computer knows how to deal with it
- sensor that records your voice
- input that helps with your device taking in things
- the information computers give to users
- a sensor that takes photos of things
- input, output, storage, processing
- a computer reflects on different models
21 Clues: brainstorm • saving information • identify the problem • review and re-examine • test to see what works • define, prepare, try, reflect • sensor that records your voice • thinking work that computers do • input, output, storage, processing • a sensor that takes photos of things • sensor that locates your surroundings • a machine that works with information • ...
Tech Fun 2023-02-10
Across
- what are the eight digits of information called
- another word for screen
- receves sound waves and sends it into a computer for processing
- the part that makes the computer work
- 1,000 bytes
- produce what the computer needs to give out
- a cats prey
- computers dont use calculators they use?
- major cpu manufactor
- the switches inside microprocessors
- opposite of ram
- an electronic device for storing and processing data
Down
- detects light and send signals through the optic lens to the visual and CPU
- one of the three input devices
- opposite of a fatherboard
- made to propel tiny droplets of ink onto paper
- the computers skin
- floppy discs are an example of?
- used for connection, communication, and power supply between computers
- the holding area of files
20 Clues: 1,000 bytes • a cats prey • opposite of ram • the computers skin • major cpu manufactor • another word for screen • opposite of a fatherboard • the holding area of files • one of the three input devices • floppy discs are an example of? • the switches inside microprocessors • the part that makes the computer work • computers dont use calculators they use? • ...
IT Crossword 2024-05-30
Across
- Short-term computer memory. (3 letters)
- Tiny dot on a screen. (5 letters)
- Harmful computer program. (5 letters)
- Brain of the computer. (3 letters)
- Connects devices together. (5 letters)
- Clickable web address. (4 letters)
- Digital post/letters. (5 letters)
- Windows or macOS, for example. (2 letters)
- Keeps your internet browsing private and secure. (3 letters)
- Clicks and scrolls. (5 letters)
- Wireless internet. (4 letters)
Down
- Software on your phone or computer. (3 letters)
- Storage device, often portable. (4 letters)
- Microsoft’s spreadsheet software. (5 letters)
- You look at it all day at work. (6 letters)
- You connect computers via one. (7 letters)
- Used to access websites. (7 letters)
- Username and password action. (5 letters)
- Adobe's Common file format for documents. (3 letters)
- Plug for flash drives. (3 letters)
20 Clues: Wireless internet. (4 letters) • Clicks and scrolls. (5 letters) • Tiny dot on a screen. (5 letters) • Digital post/letters. (5 letters) • Brain of the computer. (3 letters) • Clickable web address. (4 letters) • Plug for flash drives. (3 letters) • Used to access websites. (7 letters) • Harmful computer program. (5 letters) • Connects devices together. (5 letters) • ...
technology 2024-06-10
Across
- Device used to input data into a computer
- Universal Serial Bus.
- Unit of electrical resistance
- Cable A type of cable used in networking
- Connector for video output
- Device to display visual output
- Pathways for electrical current to travel
- Temporary storage used by computers
- The flow of electric charge through a conductor
Down
- Wires used to connect electronic devices
- Storage medium that uses magnetic disks
- Hand coverings for protection
- Devices that store and provide electrical energy
- High-speed external storage device
- Physical components of a computer system
- The process of powering a device through a USB port
- Effect Phenomenon where rechargeable batteries lose capacity
- A device used to enter information into a computer
- Device for taking photographs or recording video
- Central processing unit of a computer
20 Clues: Universal Serial Bus. • Connector for video output • Hand coverings for protection • Unit of electrical resistance • Device to display visual output • High-speed external storage device • Temporary storage used by computers • Central processing unit of a computer • Storage medium that uses magnetic disks • Wires used to connect electronic devices • ...
Using a Computer 2025-11-24
Across
- The program that helps you find your files
- The line of icons at the bottom of the screen
- The area of a screen displaying each program
- A computer program
- The folder that houses deleted files
- A place on the computer where files are kept
- The icon that represents your mouse
Down
- The software that runs the computer
- A digital object on a computer
- The home menu for everything in a computer
- The image used to represent a computer file or program
- The home page of a computer
12 Clues: A computer program • The home page of a computer • A digital object on a computer • The software that runs the computer • The icon that represents your mouse • The folder that houses deleted files • The program that helps you find your files • The home menu for everything in a computer • The area of a screen displaying each program • ...
Cybersecurity Crossword 2020-09-13
Across
- Pretending to be somebody else online.
- A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
- A type of attack that uses trial and error over and over to guess a password until it is correct.
- Small files that are saved on your computer that store information that help websites track your visits
- A virus that can replicate without the user doing anything such as opening a program.
- Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
- Stealing another person's information to use for criminal activity.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands money if the victim wants his or her files back.
- The amount of data that can pass through a network or part of a network per second.
- Computer programs that can block, detect, and remove viruses and other malware.
- Creating a web address that purposely fools people into thinking it is another person or company's website.
- The process of making extra copies of computer files that can be used to restore files that are lost or damaged.
- Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Down
- The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
- Two or more interconnected devices that can exchange data.
- A "good guy" hacker; one who hacks to help find vulnerabilities to make a system more secure.
- Software designed to block malware from entering protected networks.
- The use of something in a way different from what it was intended for in order to solve a problem.
- A general name for software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
- A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
- Malware that records every key struck on a keyboard and sends that information to an attacker.
- A way of shutting down or slowing down a website by overwhelming it with a flood of traffic from a team of computers.
- Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
- A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
25 Clues: Pretending to be somebody else online. • Two or more interconnected devices that can exchange data. • Stealing another person's information to use for criminal activity. • Software designed to block malware from entering protected networks. • Computer programs that can block, detect, and remove viruses and other malware. • ...
AP CSP Terms 2024-10-14
Across
- a data compression technique in which no data are lost.
- repetition of a process or set of instructions in a loop.
- provides a general way to access a collection of data.
- Data or signals that are sent into a computer for processing.
- The order in which instructions are executed in a program.
- block of code that dictates the flow of control in a program, such as loops or conditionals.
- conditional statement in programming that executes certain code if a specified condition is true, and another set of code if it is false.
- most basic unit of data in computing, representing a binary value of 0 or 1.
- A set of electronic circuits on a small chip of semiconductor material, used in nearly all electronic equipment.
- gate that outputs the opposite (inverts) of the input; if the input is true, the output is false, and vice versa.
- system of interconnected computers and devices that can share data and resources.
- Data or signals that are produced by a computer after processing input.
- The main circuit board in a computer, connecting all components, including the CPU, memory, and storage.
- A small piece of semiconductor material used in a computer to perform various functions, also called a microchip or integrated circuit.
- gate that outputs true if at least one of the inputs is true.
- Information processed or stored by a computer.
- The physical components of a computer system, like the motherboard, CPU, and RAM.
Down
- a data compression technique in which some amount of data is lost
- control structure in programming where a decision is made to select different paths of execution based on conditions.
- computer memory that is used to store data and machine code currently being used.
- An informal term for error in computer hardware or software -- the term was coined by Grace Hoppe
- A data structure that stores an ordered collection of elements, typically in square brackets in programming.
- 8 bits
- network of computers connected together to share information and resources.
- The process of removing errors from computer hardware or software
- A named storage location in a program that holds a value which can change during the execution of the program.
- data type that represents two values: true or false.
- computer designed to perform a specific task or set of tasks.
- set of instructions written in a programming language to perform a specific task.
- The main part of a computer responsible for interpreting and executing most of the commands from the computer's hardware and software.
- A position number or key used to reference elements in a list or array.
- base-10 numbering system that uses ten digits (0–9) to represent numbers.
- programs and other operating information used by a computer.
- data stored in a variable, for example number, string, boolean, or list.
- A sequence of characters used to represent text in programming.
- system of interlinked hypertext documents and resources accessed via the internet.
36 Clues: 8 bits • Information processed or stored by a computer. • data type that represents two values: true or false. • provides a general way to access a collection of data. • a data compression technique in which no data are lost. • repetition of a process or set of instructions in a loop. • The order in which instructions are executed in a program. • ...
Intermediate 2 Computing -- Computing Systems 2012-09-11
Across
- the part of the processor that temporarily stores data and program instructions.
- The CPU has an internal clock (sometimes called the system clock) which times and sequences all the operations taking place inside the computer. What unit is the clock speed measured in?
- storage Hard drives, Floppy disk drives, Zip disk drives are all types of? (7:7)
- all the keys on the keyboard(7:3)
- When a user opens a word processing package and starts entering text. Where are they stored?
- what is often called the brain of the computer
- address Each memory location is identified by its? (6:7)
- May contain bootstrap instructions
- 8 bits
- a control character
Down
- Locations Main memory is organised into units of equal size called? (6:9)
- type of computer used by utility companies
- The resolution of a screen is measured in (3:3:4)
- input device
- Calculation are done by this part of the computer
- A digital camera has a built-in computer system. Name this type of computer
- a touchpad is an input device used mainly by which type of compter
17 Clues: 8 bits • input device • a control character • all the keys on the keyboard(7:3) • May contain bootstrap instructions • type of computer used by utility companies • what is often called the brain of the computer • The resolution of a screen is measured in (3:3:4) • Calculation are done by this part of the computer • address Each memory location is identified by its? (6:7) • ...
Cybercrime crossword 2021-07-08
Across
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - legally institutionalized rights to own and control goods.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - proof of identity is an essential component to identify intruder.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - tools used to dismantle the hardware for seizure.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - terrorist activity that targets computer networks and information systems for attack.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - these can be used to store copies of files from the computer for use in his investigation.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
Down
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - the right to be left alone; freedom from observation and interference from others.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
RODRIGUEZ, ANGELA B. CYBERCRIME INVESTIGATION 2021-07-17
Across
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - terrorist activity that targets computer networks and information systems for attack.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
Down
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - legally institutionalized rights to own and control goods.
- - proof of identity is an essential component to identify intruder.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - tools used to dismantle the hardware for seizure.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - the right to be left alone; freedom from observation and interference from others.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- - these can be used to store copies of files from the computer for use in his investigation.
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
CYBERCRIME 2021-07-17
Across
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- - proof of identity is an essential component to identify intruder.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- - terrorist activity that targets computer networks and information systems for attack.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - the right to be left alone; freedom from observation and interference from others.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - legally institutionalized rights to own and control goods.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
Down
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- - these can be used to store copies of files from the computer for use in his investigation.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - tools used to dismantle the hardware for seizure.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
Web Links 2013-09-23
Across
- A rigid nonremovable magnetic disk with a large data storage capacity
- sequence of instructions that a computer can interpret and execute
- The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals
- Software Computer programs that allow documents to be typed, revised, formatted and printed quickly and efficiently
- Computer programs (e.g. Excel, Lotus) that have efficient and accurate methods of working with numbers
- electronic or electromechanical equipment connected to a computer and used to transfer data out of the computer in the form of text, images, sounds, or other media
- Software program used to create sequences of words and pictures that tell a story or help support a speech or public presentation of information
- commerce conducted electronically (as on the internet)
- device that can be used to insert data into a computer or other computational device
Down
- A machine that processes something
- The act or an instance of remembering, recollection
- A widely used information system on the Internet that provides facilities for documents to be connected to other documents by hypertext
- a device that allows users to transport digital images, documents or music files to and from computers and other devices
- A a set of computer programs that controls the creation, maintenance, and the use of a database
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- digital recording (as of a movie) on an optical disk that can be played on a computer or a television set
- is a digital optical disc data storage format
- Facts provided or learned about something or someone
18 Clues: A machine that processes something • is a digital optical disc data storage format • The act or an instance of remembering, recollection • Facts provided or learned about something or someone • commerce conducted electronically (as on the internet) • sequence of instructions that a computer can interpret and execute • ...
Coding- Intro. 2016-03-27
Across
- Allows for user to repeat commands without having to type them over and over again.
- Is a set of rules guidelines is used to write the computer programs that we use every day.
- Commands that tell the computer program to do something. If it to do something then it need to do something else. It is similar to cause and effect.
- One or more commands or algorithm(s) designed to be carried out by a computer.
- A list of steps to finish a task. A set of instructions can be perform with or without a computer.
- An instruction for the computer. Many commands put together make up algorithms and computer programing.
- The study of the principles and use of computers.
- Take out a piece of code that is faulty and does not work properly.
Down
- The visual programing language used in code.org online learning system for 5-k students.
- A coding system using the binary digits 0 and 1 to represent a letter ,digit or other character in a computer or other electronic device.
- Involves breaking down a complex program of system into smaller parts that are more manageable and easier to understand.
- Is similar to if then statement but instead of then the program would run an else statement.
- Statements that only run under certain conditions or situations.
- Is a type of procedure or routine that is done to make programing easier. Is a shortcut for coding.
- Contains some known or unknown quantity of information referred to as a value.
- Is a technique managing complexity of computer system.
- Focuses on the recognition of patterns and regularities in data.
- The white area on the right side of code. Org where you drag and and drop commands to build you program.
18 Clues: The study of the principles and use of computers. • Is a technique managing complexity of computer system. • Statements that only run under certain conditions or situations. • Focuses on the recognition of patterns and regularities in data. • Take out a piece of code that is faulty and does not work properly. • ...
Artificial Intelligence 2020-12-14
Across
- A technique designed for solving a problem more quickly when classic methods are too slow
- A question-answering computer system capable of answering questions posed in natural language
- A hypothetical agent that possesses intelligence far surpassing that of the brightest and most gifted human minds
- A logic programming language associated with artificial intelligence and computational linguistics
- A collection of data or computer instructions that tell the computer how to work
- The discovery, interpretation, and communication of meaningful patterns in data
- An approach in the fields of cognitive science, that hopes to explain mental phenomena using artificial neural networks
Down
- The stage of a genetic algorithm in which individual genomes are chosen from a population for later breeding
- A genetic operator used to maintain genetic diversity from one generation of a population of genetic algorithm chromosomes to the next
- An unambiguous specification of how to solve a class of problems
- A basic unit of a data structure, such as a linked list or tree data structure
- A computer program that plays the board game go
- An interdisciplinary branch of science and engineering that includes mechanical engineering, electronic engineering, information engineering, computer science, and others
- The process by which computer systems manage their own operation without human intervention
- A computer program or an artificial intelligence which conducts a conversation via auditory or textual methods
- A genetic operator used to combine the genetic information of two parents to generate new offspring
- In logic, quantification specifies the quantity of specimens in the domain of discourse that satisfy an open formula
- The plotting, by a computer application, of the shortest route between two points
18 Clues: A computer program that plays the board game go • An unambiguous specification of how to solve a class of problems • A basic unit of a data structure, such as a linked list or tree data structure • The discovery, interpretation, and communication of meaningful patterns in data • A collection of data or computer instructions that tell the computer how to work • ...
Computer terms- Braiden himburg 2023-12-04
Across
- two digits used to represent information using electricity; ones and zeros
- the brain of the computer that controls all other parts and carries out commands
- series of commands
- short-term memory, it temporarily stores the data until it is needed
- a storage medium that is used to store memory permanently and cannot be changed (holds programs and boot up information)
- an electronic device that has the ability to store, retrieve, and process data
- where your software, documents, and other files are stored
- any hardware receives data from a computer (printer, monitor, speaker, headphones)
Down
- any hardware that sends data to a computer (mouse, keyboard, touch screen, webcam, microphone)OutputDevices any hardware receives data from a computer (printer, monitor, speaker, headphones)
- a tool you use to access the internet (Google Chrome, Safari, Internet Explorer, Edge, Firefox)
- any part of the computer that you can physically touch; the parts that make up the computer
- manages the computer's memory and processes and its software and hardware (Windows, MacOS, Linux, iOS, Android)
- lets you use your mouse to click icons, buttons, and menus displayed on the screen
- software that allows you to perform a specific task
- any set of instructions or commands that tell a computer what to do
- the computer's main circuit board that holds the CPU, memory, connectors, cards, and connections to your computer's ports.
16 Clues: series of commands • software that allows you to perform a specific task • where your software, documents, and other files are stored • any set of instructions or commands that tell a computer what to do • short-term memory, it temporarily stores the data until it is needed • two digits used to represent information using electricity; ones and zeros • ...
Bit and Bytes- Computing Basics 2025-08-29
Across
- Device – Hardware that allows a user to enter data into a computer (examples: keyboard, mouse, microphone).
- (Central Processing Unit) – Known as the "brain" of the computer; processes instructions and performs calculations.
- Software (Apps) – Programs designed for end-users to perform tasks (examples: Word, Excel, Photoshop, games).
- Drive – Long-term storage device for files, applications, and the operating system.
- Tools (Dev Tools) – Software that helps programmers build, test, and debug applications (examples: Visual Studio, Unity, Eclipse).
- – The physical parts of a computer system (can be touched).
- System (Fan/Heatsink) – Keeps the CPU and other parts from overheating.
- Interface Card (NIC) – Hardware that allows computers to connect to a network.
- (Random Access Memory) – Temporary memory that stores data the computer is actively using; erased when the computer is turned off.
Down
- Device – Hardware that receives data from a computer and presents it to the user (examples: monitor, printer, speakers).
- – The programs and instructions that tell the hardware what to do.
- System (OS) – System software that manages hardware, software, and provides a user interface (examples: Windows, macOS, Linux).
- – The main circuit board that connects and allows communication between all components.
- Supply (PSU) – Provides electrical power to the computer.
- (Solid State Drive) – A faster type of storage device that has no moving parts.
- – Any external device connected to the computer (examples: printer, external hard drive, webcam).
16 Clues: Supply (PSU) – Provides electrical power to the computer. • – The physical parts of a computer system (can be touched). • – The programs and instructions that tell the hardware what to do. • System (Fan/Heatsink) – Keeps the CPU and other parts from overheating. • Interface Card (NIC) – Hardware that allows computers to connect to a network. • ...
4. Computer Systems 2024-06-18
Across
- Measured in Hertz, the _____ is the frequency at which the internal _____ generates pulses. The higher the _____rate, the faster the computer may work. The “_____” is the electronic unit that synchronises related components by generating pulses at a constant rate.
- Simple another term used to refer to Random Access Memory (RAM) which is: Volatile (data lost when power is off) Read and write. Purpose: temporary store of currently executing instructions and their data. E.g. applications and the operating system in use.
- Non-volatile (data retained when power is off) Read only. Purpose: stores instructions for starting the computer called the bootstrap.
- Any program, routine or procedures (together with their associated documentation) that can be run on a computer system.
- logical operator used within a program. ___ works by returning FALSE if the input is TRUE, and returning TRUE if the input is FALSE.
- Memory in the processor providing fast access to frequently used instructions and data.
- Often known as a Central Processing Unit (CPU), it is the main part of the computer, consisting of the registers, ALU and control unit.
- Decodes instructions. Sends signals to control how data moves around the CPU.
- Remote servers that store data that can be accessed over the internet. Advantages: Access anytime, anywhere from any device. Automatic backup. Collaborate on files easily."
- Measured in Hertz, is the frequency at which the internal _____ generates pulses. The higher the _____ rate, the faster the computer may work. The “_____” is the electronic unit that synchronises related components by generating pulses at a constant rate.
- General term covering all computer programs.
- Hard disk drive. Use: operating system and applications. High capacity. Medium data access speed. Low portability (except for portable drives). Reliable but not durable. Medium cost.
- A systems program that performs some specific task in the operation of the computer, for example file backup, virus checking or a compression program.
- Volatile (data lost when power is off) Read and write. Purpose: temporary store of currently executing instructions and their data. E.g. applications and the operating system in use.
- Any hardware device that deals with accepting data from a computer.
- A computer which has been built to solve a very specific program and is not easily changed. For example the operating system placed inside a washing machine, microwave or set of traffic lights.
- A notation used in Boolean algebra for defining the output of a logic gate or logic circuit for all possible combinations of inputs.
- Specialised software that communicates with the hardware of a computer to allow other programs to run.
Down
- Performs calculations e.g. x = 2 + 3 and logical comparisons e.g. IF x > 3 in the CPU.
- A part of a multi-core processor. A multi-core processor is a single component with two or more independent actual CPUs, which are the units responsibly for the fetch-decode-execute cycle.
- All physical parts of a computer system and its related devices both internal or external .E.g. Motherboards, hard drives, RAM as well as monitors, keyboards, mice and printers.
- The main part of the computer, consisting of the registers, ALU and control unit.
- A logical operator used within a program. ___ works by returning FALSE if the input is TRUE, and returning TRUE if the input is FALSE.
- The complete process of retrieving an instruction from store, decoding it and carrying it out. Also known as the instruction cycle.
- a diagrammatic form using a set of standard symbols representing the various Logic Gates
- A logical operator used within a program. ___ works by only returning TRUE if both values being compared are TRUE.
- Memory cards & solid state hard drive (SSD). Use: digital cameras and smartphones. Medium capacity. High portability. Reliable and durable. No moving parts. Fast data access speed. High cost.
- Permanent storage of instructions and data not in use by the processor. Stores the operating system, applications and data not in use. Read/write and non-volatile.
- Traditional computer architecture that forms the basis of most digital computer systems. Instructions are fetched, decoded and executed one at a time.
- manages the computer. Usually supplied with the computer. Most common operating systems are Windows, Linux, Unix, MacOS, iOS.
- CD/R, CD/RW, DVD/R, DVD/RW Use: music, films and archive files. Low capacity. Slow access speed. High portability. Prone to scratches. Low cost.
- Simple another term used to refer to Random Access Memory (RAM) which is: Volatile (data lost when power is off) Read and write. Purpose: temporary store of currently executing instructions and their data. E.g. applications and the operating system in use.
- A communication system that transfers data between components inside a computer.
33 Clues: General term covering all computer programs. • Any hardware device that deals with accepting data from a computer. • Decodes instructions. Sends signals to control how data moves around the CPU. • A communication system that transfers data between components inside a computer. • The main part of the computer, consisting of the registers, ALU and control unit. • ...
dakota boulay virus 2019-11-06
Across
- software intended to cause damage to a system.
- messages sent electronically
- attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- computer worm that appeared in the summer of 2001 and attacked computers running Microsoft's Internet Information Services (IIS) web server.
- bug problem that causes a computer to crash
- facts and statistics collected together for reference or analysis.
- replicates itself in order to spread to other computers
Down
- virus that over loaded every file.
- type of virus named after a greek myth.
- an unwanted computer software installed on your computer.
- a program setup to protect the computer
- a computer virus that modifies the computer system.
- a set of things working together as parts of a mechanism or an interconnecting network.
- Attacks multiple systems that usually infected with the trojan virus.
14 Clues: messages sent electronically • virus that over loaded every file. • type of virus named after a greek myth. • a program setup to protect the computer • bug problem that causes a computer to crash • software intended to cause damage to a system. • a computer virus that modifies the computer system. • replicates itself in order to spread to other computers • ...
CNC is cool 2018-03-19
Across
- the use of specially designed computers to improve manufacturing
- the basic material from which a product is made
- the use of largely automatic equipment in a system of manufacturing
- is the transition to new manufacturing processes
- a coordinate system that specifies each point uniquely
- a computer converts the design produced by computer aided design
Down
- a thought process connecting preconscious and conscious
- the interdisciplinary field of materials science
- the manufacturing approach of using computers to control the whole production process
- the use of computer systems to aid in the creation of a design
- the quality of being three dimensional
- the condition of being protected from or unlikely to cause danger, risk or injury
- an unconscious thought process that arises from the pleasure principle
- the production of goods within an economy
14 Clues: the quality of being three dimensional • the production of goods within an economy • the basic material from which a product is made • the interdisciplinary field of materials science • is the transition to new manufacturing processes • a coordinate system that specifies each point uniquely • a thought process connecting preconscious and conscious • ...
Computer Systems 2013-10-24
Across
- device – Used to transfer data out of a computer eg.Speakers
- - the exclusive and assignable legal right, given to the originator for a fixed number of years, to print, publish, perform, film, or record literary, artistic, or musical material.
- - a group or system of interconnected people or things.
- - the programs and other operating information used by a computer.
- – Where data is stored e.g. Computer
Down
- - a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- – A structured set of data held in a computer
- - the machines, wiring, and other physical components of a computer or other electronic system.
- - Brains of the computer
- - Internal storage areas in the computer
- - a panel of keys that operate a computer or typewriter.
- - random access memory
12 Clues: - random access memory • - Brains of the computer • – Where data is stored e.g. Computer • - Internal storage areas in the computer • – A structured set of data held in a computer • - a group or system of interconnected people or things. • - a panel of keys that operate a computer or typewriter. • device – Used to transfer data out of a computer eg.Speakers • ...
Cruciverba Umberto 2017-03-29
25 Clues: fifa • figa • obey • umbat • cacca • cazzo • negro • ebreo • fradei • kahoot • bomber • pokemon • juventus • ballarin • hermione • computer • calcetto • destrobel • callofduty • giocattoli • compleanno • escape room • fibra ottica • rustytrombone • Game of thrones
Spanish ch 6 vocab 2021-04-12
20 Clues: save • love • send • lower • delete • to call • to chat • computer • the desk • to print • the icon • the code • to assign • the screen • the mobile • the message • to turn off • the printer • to download • the computer
In der Schule 2021-09-30
30 Clues: pen • pen • book • test • door • desk • note • paper • class • class • grade • photo • thing • window • places • lesson • eraser • result • pencil • problem • homework • backpack • calendar • question • notebook • computer • textbook • textbook • calculator • wastepaper
klassenzimmer - cecilie 2023-11-01
27 Clues: bog • dør • stol • reol • bord • tavle • jakke • papir • lampe • hæfte • kridt • blyant • vindue • globus • lineal • plante • gardin • lærebord • computer • penalhus • landkort • klassebog • fyldepind • skoletaske • vinkelmåler • hviskelædder • klasseværelse
PVCC Oggetti in Aula / Objects in the Classroom 2024-06-26
28 Clues: Map • Pen • Map • Door • Desk • Book • Globe • Ruler • Texta • Paper • Table • Shelf • Chair • Clock • Pencil • Window • Eraser • Computer • Backpack • Notebook • Sharpener • Classroom • Projector • Calculator • BlackBoard • Pencil Case • Rubbish Bin • Bianca Whiteboard
2B Vocab List 2024-12-11
22 Clues: door • flag • desk • here • there • clock • where • table • chair • behind • poster • window • next to • backpack • keyboard • on top of • trash can • underneath • in front of • (computer) mouse • pencil sharpener • (computer) screen
CYBERCRIME 2021-07-17
Across
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - tools used to dismantle the hardware for seizure.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
- - terrorist activity that targets computer networks and information systems for attack.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - these can be used to store copies of files from the computer for use in his investigation.
- - legally institutionalized rights to own and control goods.
Down
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - the right to be left alone; freedom from observation and interference from others.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - proof of identity is an essential component to identify intruder.
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
Cybercrime crossword 2021-07-08
Across
- - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - legally institutionalized rights to own and control goods.
- - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- - proof of identity is an essential component to identify intruder.
- - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- - tools used to dismantle the hardware for seizure.
- - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
- - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- - terrorist activity that targets computer networks and information systems for attack.
- - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- - refers to the transmission of information through ICT media, including voice, video and other forms of data.
- - remember that often, latent prints can be taken from disks or other storage media or hardware.
- - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
- - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- - pieces of computer code that can infect computer system causing disruptions to their normal operation.
- - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- - refers to the modification or change, in form or substance, of an existing computer data or program.
- - these can be used to store copies of files from the computer for use in his investigation.
- - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
Down
- - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
- - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
- – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
- - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
- - the right to be left alone; freedom from observation and interference from others.
- - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
- - Intentional alteration or reckless interference with the functioning of a computer or computer network.
- - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
- - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- - refers to a computer or a computer network, the electronic medium in which online communication takes place
- - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
- - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- - the act of copying digital material posted online into the storage medium on one’s computer.
- - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- - the interactional space or environment created by linking computers together into a communication net5work.
- - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
49 Clues: - tools used to dismantle the hardware for seizure. • - legally institutionalized rights to own and control goods. • - proof of identity is an essential component to identify intruder. • - the right to be left alone; freedom from observation and interference from others. • ...
Begriffe: Computer Grundlagen 2020-05-22
Across
- Abkürzung für Virtual Private Network
- ein Speicherplatz
- Oberbegriff von folgenden Systemen: Microsoft Windows, Linux, Android, Apple iOS, Max OS
- forscht den Computer und das Nutzerverhalten aus
- = Programme
- Sicherheitskopien
- schädliche Programme
- Herunterladen von Daten aus dem Internet
- der Computerstart
- Abkürzung für Wide Area Network, (Netzwerk von Computern)
- ein … soll aus Klein- und Großbuchstaben bestehen, Ziffern und Sonderzeichen enthalten, mindestens 8 Zeichen lang sein,...
- schädliche, unerwünschte Programme
- Abkürzung für End User License Agreement (Endbenutzerlizenz)
Down
- dient zum Digitalisieren von Dokumenten wie Bilder oder Texte
- System, welches die Verwendung des Computer ermöglicht
- Computer, Maus, Tastatur, …
- die zentrale Recheneinheit (= Central Processing Unit)
- schütz Computer vor unerwünschten Zugriffen über das Netzwerk
- Programme wie z.B. Word, Excel, Spiele, Browser,...
- Gegenteil von Anmelden
- umspannt die ganze Welt und ist das größte Computernetzwerk
- Abkürzung für Local Area Network
- eine Malware, ein spezieller Virus
- Hauptspeicher, Arbeitsspeicher
24 Clues: = Programme • ein Speicherplatz • Sicherheitskopien • der Computerstart • schädliche Programme • Gegenteil von Anmelden • Computer, Maus, Tastatur, … • Hauptspeicher, Arbeitsspeicher • Abkürzung für Local Area Network • eine Malware, ein spezieller Virus • schädliche, unerwünschte Programme • Abkürzung für Virtual Private Network • Herunterladen von Daten aus dem Internet • ...
Hardware 2014-03-17
Across
- een randapparaat dat zowel voor invoer als voor uitvoer zorgt
- Alle tastbare (fysieke) onderdelen van de computer
- centrale computer in een netwerk , voor bijv. bestanden op te slaan
- Enkellaags: 25 GB, dubbellaags: 50 GB
- teskt ingeven
- bewegen met pijltje
- randapparaat wordt vanuit pc gestuurd.
- toren in het engels
- Ook wel werkgeheugen genoemd
Down
- kan je in je portefeuille steken
- zeer krachtige & stabiele computers voor bijv. banken
- Brein van de PC en zorgt voor alle rekenwerk.
- Het meest zichtbare onderdeel van de computer
- steek je in je GSM
- Digital Versatile Disc
- compact disc read-only memory
- Wordt door computerfanaten soms ‘gemod’.
- verbind alle onderdelen met elkaar
- steek je in een fototoestel
- gegevens aanleveren aan pc
- Voorziet computer van stroom
21 Clues: teskt ingeven • steek je in je GSM • bewegen met pijltje • toren in het engels • Digital Versatile Disc • gegevens aanleveren aan pc • steek je in een fototoestel • Voorziet computer van stroom • Ook wel werkgeheugen genoemd • compact disc read-only memory • kan je in je portefeuille steken • verbind alle onderdelen met elkaar • Enkellaags: 25 GB, dubbellaags: 50 GB • ...
Informatik 2016-06-29
Across
- Altes Schreibgerät für die Wandtafel
- Anzeigegerät für Computer
- Schädliches Programm
- Elektronische Post (ohne Bindestrich)
- Eingabegerät für Buchstaben und Zahlen
- MS-Office-Programm für Zahlentabellen
- Bekannter Browser
- Hauptsächliche Darstellung in Excel
- Gerät um Inhalte auf Papier zu bringen
- MS-Office-Programm, um Texte zu verfassen
- Oberbegriff für Schäden anrichtende Software
- Person, die unerlaubt in Computersysteme eindringt
Down
- Person, die Unterricht erteilt
- Sehr bekannte Internet-Suchmaschine
- Ein Lernort unter vielen
- Eingabegerät für das schnelle Anklicken am Bildschirm
- Anderer Begriff für Programm
- Hilfsmittel in Excel, um nur bestimmte Wörter oder Zahlen anzuzeigen
- Gerät zum Einlesen von Papierdokumenten
- Tragbarer Computer zum aufklappen
- Computer auf Hochdeutsch
- Elektronisches Tagebuch auf einer Webseite
- Bekannter Browser
- Drahtloses Computer-Netzwerk
- Programm für das Lerntagebuch und für E-Mails
- Gerät, um den Bildschirminhalt an eine Wand zu projizieren
26 Clues: Bekannter Browser • Bekannter Browser • Schädliches Programm • Ein Lernort unter vielen • Computer auf Hochdeutsch • Anzeigegerät für Computer • Anderer Begriff für Programm • Drahtloses Computer-Netzwerk • Person, die Unterricht erteilt • Tragbarer Computer zum aufklappen • Sehr bekannte Internet-Suchmaschine • Hauptsächliche Darstellung in Excel • ...
Storage Devices 2021-09-12
Across
- Person who interacts with the computer
- Electrical and mechanical devices that are used to process the data.
- Recordable compact disc
- Program that let you look at the internet pages
- Redundant array independet disks
- Magnetic type data storage medium
- Serial advanced technology attachment
- Unit of memory
- Change a file back to its original form
- Personal computer
Down
- Programs exist for the Computer to provide service.
- Rewritable compact disc
- The standart format for encoding sound files
- Used when entering data on the computer
- Way to save data of the same type or class
- Storing information on series of ones and zeros
- Error in the sistem
- A word/image that lets you click and navigate
- Help manipulate objects and select menu options
- Amount of room available on a storage device
20 Clues: Unit of memory • Personal computer • Error in the sistem • Rewritable compact disc • Recordable compact disc • Redundant array independet disks • Magnetic type data storage medium • Serial advanced technology attachment • Person who interacts with the computer • Used when entering data on the computer • Change a file back to its original form • ...
CIS 178 Participation 3 Security 2023-07-17
Across
- computers or devices infected with malicious software
- collects and transmits sensitive information
- form of bullying that occurs online
- spreads from one computer to another
- virtual private network, secure online service
- "advertising-supported software" designed to display unwanted advertisements
- malicious software
- intrudes on a device remotely
- protecting digital assets
- development/use of computer systems/networks to store information.
- tricks users into clicking a disguised link
Down
- application designed to monitor network traffic
- disguises itself as a legitimate program or software
- uses bait to lure unsuspecting victims
- uses fingerprints, facial recognition, etc. to log into a device
- encrypts user's files or locks computer until a ransom is paid
- media manipulation, alter images/video for fake perception
- actions aimed to infiltrate computer networks.
- method of scrambling data for authorized users
- fake, disguised, bogus
20 Clues: malicious software • fake, disguised, bogus • protecting digital assets • intrudes on a device remotely • form of bullying that occurs online • spreads from one computer to another • uses bait to lure unsuspecting victims • tricks users into clicking a disguised link • collects and transmits sensitive information • virtual private network, secure online service • ...
Tech 2023-11-02
Across
- a way to view files
- a bar at the top of a computer that allows to have multiple tabs
- a set of papers or set of papers holding information
- an extended vertion
- an open page
- an easy way to do something: get somewhere faster
- used when the page is too long needs to scroll
- a storage space or container
- presenting somthing to an audience
Down
- a command to the computer that DoubleClickat to do
- alters the action of a different key when pressed
- data arranged in columns and rows
- the screen displayed while the computer is booting
- indicates where the mouse pointer is
- contains a list of menus in a program
- clicking twice quickly
- a stationary computer
- stores data
- clicking and holding while you _______ it around
- copy or backup a document
20 Clues: stores data • an open page • a way to view files • an extended vertion • a stationary computer • clicking twice quickly • copy or backup a document • a storage space or container • data arranged in columns and rows • presenting somthing to an audience • indicates where the mouse pointer is • contains a list of menus in a program • used when the page is too long needs to scroll • ...
Tech 2023-11-02
Across
- a way to view files
- a bar at the top of a computer that allows to have multiple tabs
- a set of papers or set of papers holding information
- an extended vertion
- an open page
- an easy way to do something: get somewhere faster
- used when the page is too long needs to scroll
- a storage space or container
- presenting somthing to an audience
Down
- a command to the computer that DoubleClickat to do
- alters the action of a different key when pressed
- data arranged in columns and rows
- the screen displayed while the computer is booting
- indicates where the mouse pointer is
- contains a list of menus in a program
- clicking twice quickly
- a stationary computer
- stores data
- clicking and holding while you _______ it around
- copy or backup a document
20 Clues: stores data • an open page • a way to view files • an extended vertion • a stationary computer • clicking twice quickly • copy or backup a document • a storage space or container • data arranged in columns and rows • presenting somthing to an audience • indicates where the mouse pointer is • contains a list of menus in a program • used when the page is too long needs to scroll • ...
spelling list 29 2024-04-12
Across
- why don't you ________ the article to your drive
- I don't want to ______ class but a big storm is on its way
- she is _____ and always wants to know what is going on
- parents siblings children
- strange mystical wondering
- controls the major actions on a computer
- your _______ must change or you'll run yourself into the ground
- an old fashioned printing thingy
- used to control where the cursor goes
- Excel ______
- device or program alowing you to interact with your computer
Down
- my friends and I are going to the _______ to play some games
- online shopping
- the ______ moved across the screen
- used to send data between two devices
- small book used for writing
- tells the computer what to do
- different things/types
- something to make an integrated curcuit
- a portable computer
- auto correct
21 Clues: auto correct • Excel ______ • online shopping • a portable computer • different things/types • parents siblings children • strange mystical wondering • small book used for writing • tells the computer what to do • an old fashioned printing thingy • the ______ moved across the screen • used to send data between two devices • used to control where the cursor goes • ...
Chapter 6 vocab 2021-04-09
20 Clues: icon • file • code • mouse • folder • to save • printer • to ring • message • to send • to call • computer • to print • to assign • mouse pad • to turn on • cell phone • to turn off • to download • computer screen
Cruciverba Umberto 2017-03-29
25 Clues: fifa • figa • obey • cacca • cazzo • umbat • negro • ebreo • kahoot • fradei • bomber • pokemon • computer • calcetto • juventus • ballarin • hermione • destrobel • callofduty • compleanno • giocattoli • escape room • fibra ottica • rustytrombone • Game of thrones
Cruciverba Umberto 2017-03-29
25 Clues: fifa • figa • obey • cacca • umbat • negro • ebreo • cazzo • bomber • kahoot • fradei • pokemon • ballarin • juventus • calcetto • computer • hermione • destrobel • compleanno • giocattoli • callofduty • escape room • fibra ottica • rustytrombone • Game of thrones
School And Education by Camilla Zanotti 2014-02-24
27 Clues: ARTE • PENNA • MAPPA • LIBRO • ZAINO • BANCO • PORTA • SEDIA • TAVOLO • MATITA • FISICA • STORIA • SCIENZE • LAVAGNA • CHIMICA • INGLESE • BIOLOGIA • FINESTRA • SPAGNOLO • ECONOMIA • COMPUTER • RIGHELLO • ITALIANO • GEOGRAFIA • TECNOLOGIA • MATEMATICA • CALCOLATRICE
alphabetical engineers 2023-11-29
Across
- shoveldisign
- newwaystoinvest
- newwaytochargephone
- particleaccelerator
- grass
- extractingoil/gas
- combiningmetal
- AC
- medicaldevicestoboeing
- safer/healthier
- crutches
- mobileapps
- buildxraymachines
- underwaterequipment
- railvehicles
Down
- robots
- quantumcomputers
- industrialprocess
- plansfroconstructionprojects
- conservationonnaturalresources
- cagesforanimals
- trafficsign
- satellites
- phones/computer
- batteries
- insulation
26 Clues: AC • grass • robots • crutches • batteries • satellites • mobileapps • insulation • trafficsign • shoveldisign • railvehicles • combiningmetal • newwaystoinvest • cagesforanimals • safer/healthier • phones/computer • quantumcomputers • industrialprocess • extractingoil/gas • buildxraymachines • newwaytochargephone • particleaccelerator • underwaterequipment • medicaldevicestoboeing • plansfroconstructionprojects • ...
alphabetical engineers 2023-11-29
Across
- shoveldisign
- newwaystoinvest
- newwaytochargephone
- particleaccelerator
- grass
- extractingoil/gas
- combiningmetal
- AC
- medicaldevicestoboeing
- safer/healthier
- crutches
- mobileapps
- buildxraymachines
- underwaterequipment
- railvehicles
Down
- robots
- quantumcomputers
- industrialprocess
- plansfroconstructionprojects
- conservationonnaturalresources
- cagesforanimals
- trafficsign
- satellites
- phones/computer
- batteries
- insulation
26 Clues: AC • grass • robots • crutches • batteries • satellites • mobileapps • insulation • trafficsign • shoveldisign • railvehicles • combiningmetal • newwaystoinvest • cagesforanimals • safer/healthier • phones/computer • quantumcomputers • industrialprocess • extractingoil/gas • buildxraymachines • newwaytochargephone • particleaccelerator • underwaterequipment • medicaldevicestoboeing • plansfroconstructionprojects • ...
page 23 word work 2022-05-12
27 Clues: able • sussy • cable • rifle • apple • pizza • table • bugle • title • candle • jungle • handle • paddle • middle • muscle • single • little • cradle • battle • giggle • bridle • bottle • settle • sample • simple • tremble • computer
Cruciverba Umberto 2017-03-29
25 Clues: fifa • figa • obey • cacca • umbat • negro • ebreo • cazzo • bomber • kahoot • fradei • pokemon • ballarin • juventus • calcetto • computer • hermione • destrobel • compleanno • giocattoli • callofduty • escape room • fibra ottica • rustytrombone • Game of thrones
alphabetical engineers 2023-11-29
Across
- shoveldisign
- newwaystoinvest
- newwaytochargephone
- particleaccelerator
- grass
- extractingoil/gas
- combiningmetal
- AC
- medicaldevicestoboeing
- safer/healthier
- crutches
- mobileapps
- buildxraymachines
- underwaterequipment
- railvehicles
Down
- robots
- quantumcomputers
- industrialprocess
- plansfroconstructionprojects
- conservationonnaturalresources
- cagesforanimals
- trafficsign
- satellites
- phones/computer
- batteries
- insulation
26 Clues: AC • grass • robots • crutches • batteries • satellites • mobileapps • insulation • trafficsign • shoveldisign • railvehicles • combiningmetal • newwaystoinvest • cagesforanimals • safer/healthier • phones/computer • quantumcomputers • industrialprocess • extractingoil/gas • buildxraymachines • newwaytochargephone • particleaccelerator • underwaterequipment • medicaldevicestoboeing • plansfroconstructionprojects • ...
alphabetical engineers 2023-11-29
Across
- shoveldisign
- newwaystoinvest
- newwaytochargephone
- particleaccelerator
- grass
- extractingoil/gas
- combiningmetal
- AC
- medicaldevicestoboeing
- safer/healthier
- crutches
- mobileapps
- buildxraymachines
- underwaterequipment
- railvehicles
Down
- robots
- quantumcomputers
- industrialprocess
- plansfroconstructionprojects
- conservationonnaturalresources
- cagesforanimals
- trafficsign
- satellites
- phones/computer
- batteries
- insulation
26 Clues: AC • grass • robots • crutches • batteries • satellites • mobileapps • insulation • trafficsign • shoveldisign • railvehicles • combiningmetal • newwaystoinvest • cagesforanimals • safer/healthier • phones/computer • quantumcomputers • industrialprocess • extractingoil/gas • buildxraymachines • newwaytochargephone • particleaccelerator • underwaterequipment • medicaldevicestoboeing • plansfroconstructionprojects • ...
alphabetical engineers 2023-11-29
Across
- shoveldisign
- newwaystoinvest
- newwaytochargephone
- particleaccelerator
- grass
- extractingoil/gas
- combiningmetal
- AC
- medicaldevicestoboeing
- safer/healthier
- crutches
- mobileapps
- buildxraymachines
- underwaterequipment
- railvehicles
Down
- robots
- quantumcomputers
- industrialprocess
- plansfroconstructionprojects
- conservationonnaturalresources
- cagesforanimals
- trafficsign
- satellites
- phones/computer
- batteries
- insulation
26 Clues: AC • grass • robots • crutches • batteries • satellites • mobileapps • insulation • trafficsign • shoveldisign • railvehicles • combiningmetal • newwaystoinvest • cagesforanimals • safer/healthier • phones/computer • quantumcomputers • industrialprocess • extractingoil/gas • buildxraymachines • newwaytochargephone • particleaccelerator • underwaterequipment • medicaldevicestoboeing • plansfroconstructionprojects • ...
Crossword 2025-11-27
Across
- kaapeli
- web pimeä verkko
- window selainikkuna
- liite
- mining tiedonlouhinta
- sovitin
- välimuisti
- vanhanaikainen
- computer-literate tietokonetaitoinen
- yhteys
- drivepilvitallennuspalvelu
- data, tieto
Down
- käyttäjäidentiteetin varmistaminen
- identification biometrinen tunnistautuminen
- tietokoneisiin perehtynyt
- mainosohjelmisto
- sovellus
- laite
- pääsy
- intelligence tekoäly
- kehittynyt
- eväste
22 Clues: liite • laite • pääsy • eväste • yhteys • kaapeli • sovitin • sovellus • välimuisti • kehittynyt • data, tieto • vanhanaikainen • mainosohjelmisto • web pimeä verkko • window selainikkuna • intelligence tekoäly • mining tiedonlouhinta • tietokoneisiin perehtynyt • drivepilvitallennuspalvelu • käyttäjäidentiteetin varmistaminen • computer-literate tietokonetaitoinen • identification biometrinen tunnistautuminen
coding 2016-02-08
Across
- Information keeped in a computer
- Using word or symbols to tell teachlolgy how to work
- Event that leads to the next ordered action
- or Audio or video components
- Using codes to create a function
- Form of computation
- An error with a cumputer program
- Character that represents an action
- Fixing or bypassing bugs
Down
- A resource that allows you to communicate with teachers
- Breaking or system into parts that are easier to conceive
- Having a cumputer do a task
- a new and faster way to communicate
- Progam that allows you to code
- Information going in a computer
- procedure that allows a computer to solve a problem
- computer system with a dedicated function
- Progams to function
- Equipment used to communicate
- continually repeated until a certain condition is reached
20 Clues: Form of computation • Progams to function • Fixing or bypassing bugs • Having a cumputer do a task • or Audio or video components • Equipment used to communicate • Progam that allows you to code • Information going in a computer • Information keeped in a computer • Using codes to create a function • An error with a cumputer program • a new and faster way to communicate • ...
IT-Grundlagenwissen Hard- und Software 2018-10-24
Across
- können anscheinend nur Frauen oder PC-Betriebssysteme
- Grundlegend notwendige Software für einen Computer
- Bezeichnung für alle Arten von PC-Zusatzgeräten
- schnelle Festplatten, die wie USB-Speichersticks funktionieren
- Das Gehirn eines PCs
- flüchtiger Speicher und sehr schnell
- Millisekunden bezeichnet den ... Teil einer Sekunde
- Die Hauptplatine in einem Computer
- Typische RAM-Größen bewegen sich im ....-Bereich
- Nicht Adam-Prinzip, sondern ....-Prinzip
Down
- alles, was man an einem Computer anfassen kann
- Bezeichnung für parallel ablaufende Programmteile
- kleinste Maßeinheit für Speicher
- Leistungsangabe bei Speichern aller Art(RAM, Festplatte,...)
- Ein Cache ist ein sog. ....-Speicher
- eine milliardstel Sekunde
- AMD und Intel sind die größten Hersteller von...
- Nicht so lecker wie aus Kartoffeln, aber "Lebensgrundlage" für Computer
- Der RAM-Speicher ist schneller als die ...
- jedes Zusatzgerät an einem PC benötigt diese kleine Software
20 Clues: Das Gehirn eines PCs • eine milliardstel Sekunde • kleinste Maßeinheit für Speicher • Die Hauptplatine in einem Computer • Ein Cache ist ein sog. ....-Speicher • flüchtiger Speicher und sehr schnell • Nicht Adam-Prinzip, sondern ....-Prinzip • Der RAM-Speicher ist schneller als die ... • alles, was man an einem Computer anfassen kann • ...
The Meepen' Good Crossword By, Kian and Daniel 2013-08-27
Across
- Focuses on design control and optimization
- Deals with computer process
- Designs and manages projects
- Designs videos and all the things that move.
- Has plans for future cars
- They study behavior
- All your houses electric is from these people
- Looks at products and approves it
- Operation of mechanics
- Ties into Aerospace
Down
- They fix hydroelectric power stations
- Develops computer systems throughout the region
- Uses tech to harvest
- helps construction people
- They say what types of buildings go where
- Evacuates land for buildings
- Gathers food and water for tests
- Deals with the job industry
- Designs components for your computer
- manages telephone lines
- Tests water
- Fixes nuclear power plants
- builds planes and fly them
- Designs structures and builds them
- Works with doctors
- is a security site for computers
26 Clues: Tests water • Works with doctors • They study behavior • Ties into Aerospace • Uses tech to harvest • Operation of mechanics • manages telephone lines • helps construction people • Has plans for future cars • Fixes nuclear power plants • builds planes and fly them • Deals with computer process • Deals with the job industry • Evacuates land for buildings • Designs and manages projects • ...
hardware 2014-03-17
Across
- randapparaat voor zowel invoer als uitvoer
- toestel dat tekst ingeeft
- toestel dat pijltje kan bewegen en dingen kan aanklikken
- Apparaat waar je gegevens permanent op bewaard.
- de snelheid van processer
- Verbindt alle onderdelen met elkaar , zodat ze kunnen samenwerken.
- Digital versatile disc
- Voorziet de computer van stroom
- Brein van de PC en zorgt voor alle rekenwerk.
Down
- In je computer kan je altijd een betere of extra geluidskaart, netwerkkaart, … bijsteken.
- blu-ray disk
- Ook wel werkgeheugen genoemd. Berekeningen worden tijdelijk in dit geheugen opgeslagen
- een centrale computer in een netwerk
- Solid State Drive
- voorganger van de USB stick
- Compact disc read only memory
- het engelse woord voor toetsenbord
- alle tastbare fysieke delen die je kan vastnemen
- een zeer krachtige en stabiele computer
- randapparaat voor te kopieren en afdrukken
20 Clues: blu-ray disk • Solid State Drive • Digital versatile disc • toestel dat tekst ingeeft • de snelheid van processer • voorganger van de USB stick • Compact disc read only memory • Voorziet de computer van stroom • het engelse woord voor toetsenbord • een centrale computer in een netwerk • een zeer krachtige en stabiele computer • randapparaat voor zowel invoer als uitvoer • ...
Sara Franzini 2019-05-29
Across
- sono le informazioni contenute nel computer
- hardware per inserire dati input
- scaricare dati da un sito sul dispositivo
- indice
- l' introduzione di dati da un sistema periferico in un sistema centrale
- ci permette di avere riferimenti metrici rispetto ai margini del documento.
- serve per creare cruciverba
- motore di ricerca
- comandi
- dispositivo per dare dati al computer
Down
- serve ad organizzare in maniera logica i contenuti
- foglio di calcolo che serve per inserire dati e per creare tabelle
- parte fisica del computer
- serve per ingrandire e rimpicciolire il testo
- pagina nera che permette di utilizzare il computer senza l’interfaccia grafica
- dispositivo che fornisce dati output
- schema o procedimento sistematico di calcolo
- foglio per creare testi e immagini
- codice di protezione di dati personali
- strumento di ricerca
- pausa
- in linea
22 Clues: pausa • indice • comandi • in linea • motore di ricerca • strumento di ricerca • parte fisica del computer • serve per creare cruciverba • hardware per inserire dati input • foglio per creare testi e immagini • dispositivo che fornisce dati output • dispositivo per dare dati al computer • codice di protezione di dati personali • scaricare dati da un sito sul dispositivo • ...
11. 80’ Must Have technology Products 2025-02-22
Across
- transmits documents through the telephone line.
- plastic cases housing ROM chips where games are encoded.
- Compact disk
- Video recorder device put on shoulder.
- An instant photo-delivering camera.
- ...... computer a calculator-like computer.
- A TV pocket that you carry around with you.
- A TV that you can move easily between home compartments.
- Removable storage media used to store data on computer.
- Small wireless telecommunication devices.
Down
- Apple ....... a computer released in 1984.
- A must-have portable cassette player.
- Electric ....... device that makes typing easier.
- TV program recorder.
- Large music players carried on the shoulder.
- Small tapes that allowed people to listen to music
- A sound system.
- Casio ..... a calculator watch.
- ..... players allow people to films at home.
- Turn on and off devices with a clap of your hands.
20 Clues: Compact disk • A sound system. • TV program recorder. • Casio ..... a calculator watch. • An instant photo-delivering camera. • A must-have portable cassette player. • Video recorder device put on shoulder. • Small wireless telecommunication devices. • Apple ....... a computer released in 1984. • ...... computer a calculator-like computer. • ...
test1 2025-09-04
Across
- Process of finding and fixing errors in code
- A portable computer
- Founder of Microsoft
- Popular programming language named after a comedy group
- Temporary memory in a computer
- The first step in the software development cycle
- Collection of interconnected computers
- The number system computers use internally
- Device used to display output visually
- A step-by-step procedure to solve a problem
Down
- The brain of the computer
- Organized collection of data
- Language used to create web pages
- Software that manages computer hardware and software resources
- Internet-based storage and computing
- Programming language also known for coffee
- A type of memory that is non-volatile
- Security system that controls network traffic
- Device that forwards data packets in a network
- Process of converting information into a specific format
20 Clues: A portable computer • Founder of Microsoft • The brain of the computer • Organized collection of data • Temporary memory in a computer • Language used to create web pages • Internet-based storage and computing • A type of memory that is non-volatile • Collection of interconnected computers • Device used to display output visually • Programming language also known for coffee • ...
TECHNOLOGY VOCABULARY 2021-06-16
Across
- a facial expression represented by a sequence of characters
- having an output that is proportional to the input
- a programmer who breaks into computer systems
- a security system preventing access to a computer or network
- fix a computer program piecemeal until it works
- set up for a particular purpose
- an online journal where people post about their experiences
- a listing of the computer files stored in memory
Down
- transfer out of a database or document
- software that is provided without charge
- a specific size and style of type within a type family
- page the opening page of a web site
- a list of questions that are frequently asked (about a given topic) along with their answers
- a set sequence of steps, part of larger computer program
- any small compartment
- the symbolic arrangement of data in a computer program
- a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
17 Clues: any small compartment • set up for a particular purpose • page the opening page of a web site • transfer out of a database or document • software that is provided without charge • a programmer who breaks into computer systems • fix a computer program piecemeal until it works • a listing of the computer files stored in memory • ...
dfg 2019-02-11
Across
- A tracking feature of Internet browsers that shows all the recent websites visited
- To send information from your computer to another computer
- A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory
- A hostile, strongly worded message that may contain obscene language
- Willful and repeated harm inflicted through the medium of electronic text
- A form of malicious code that displays unsolicited advertising on your computer
- In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
- The name a user selects to be identified on a computer, on a network, or in an online gaming forum
- A secret word or number that must be used to gain access to an online service
- “Live” time; the actual time during which something takes place
- Rules or manners for interacting courteously with others online
- A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
- Cell phone, computer and other mobile device users—often teens and ‘tweens’—create and exchange provocative messages and nude, sexual images of themselves using their cell phone’s built-in digital camera and text messaging capabilities
- A method of sending short messages (also called SMS) between mobile phones and other computer-enabled devices
Down
- A piece of information about your visit to a website that some websites record automatically on your computer
- A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
- Any Internet-related illegal activity
- computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace
- To copy a file from one computer system to another via the Internet
- A diary or personal journal kept on a website
- Online communities, also known as social networks, where people share information about themselves, music files, photos, etc
- Refers to virtual sexual encounters between two or more persons
- Methods individuals use to track, lure, or harass another person online
- stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
- Software that attempts to block malicious programs from harming your computer
- A program, or set of instructions, that runs on a computer
- To upload information to the Web
- A location online that allows multiple users to communicate electronically with each other in real time
- Any unsolicited e-mail, or junk mail
- A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the program
30 Clues: To upload information to the Web • Any unsolicited e-mail, or junk mail • Any Internet-related illegal activity • A diary or personal journal kept on a website • To send information from your computer to another computer • A program, or set of instructions, that runs on a computer • Refers to virtual sexual encounters between two or more persons • ...
XI/I TKJ 245 2024-09-09
Across
- ... is a worker in a field of technology who is proficient in the relevant skill and technique, with a relatively practical understanding of the theoretical principles
- ... is an author of computer source code
- ... is a systematic approach to problem-solving
- ... is a place or fix (equipment or machinery) in position ready for use
- using a system of radio signals rather than wires to connect computers, mobile phones, etc to each other
- a ... is a group of interacting or interrelated elements that act according to a set of rules to form a unified whole
- ... is a collection of web pages and related content accessible through a web browser
- a ... is defined as the connection of at least two computer systems, either by a cable or a wireless connection
- ... is a collection of devices connected together in one physical location, such as a building, office, or home
Down
- a ... is a machine that can store and process information
- ... is an input device that is moved across the desk surface by the user so as to interact with the computer
- a customer or someone who receives services
- an ... is a software program created to carry out specific tasks or provide particular services to users
- refers to the physical components of a computer or device. It includes parts like the screen, circuit boards, ICs, and other electronics
- an ... is someone who helps an organization accomplish its goals efficiently
- ... system is software that controls a computer's core functions
- ... is a set of instructions, written in computer code, that tells a computer how to behave or how to perform a specific task
- a ... is a specialized computer or software system that provides services, data, or resources to other computers over a network
18 Clues: ... is an author of computer source code • a customer or someone who receives services • ... is a systematic approach to problem-solving • a ... is a machine that can store and process information • ... system is software that controls a computer's core functions • ... is a place or fix (equipment or machinery) in position ready for use • ...
Module Review 2018-02-07
Across
- Voice Over Internet Protocol
- onscreen arrow that moves when you move your mouse
- sharpness of picture
- connect you to internet
- individuals who lure people into unethical relationships and habbits
- physical parts of computer
- Carries out information
- measures taken to protect computer
- Collection of network
- speaking to your computer to perform various tasks
- units that pictures are made up of
- displays name of document
Down
- can corrupt files and damage computer
- Local area network
- for editing tables
- Web log
- keeping files safe from unauthorized viewing
- internet service provider
- Microsoft's spreadsheet program
- input device used to guide pointer
- instant messaging in real time
- Audio file format that is not commonly compressed
- Graphic user interface
- displays information about document
- stealing of information or your personal device
25 Clues: Web log • Local area network • for editing tables • sharpness of picture • Collection of network • Graphic user interface • connect you to internet • Carries out information • internet service provider • displays name of document • physical parts of computer • Voice Over Internet Protocol • instant messaging in real time • Microsoft's spreadsheet program • ...
computers 2015-02-10
Across
- to revise or correct
- something you press
- a secret word or expression
- a programmable electronic devise to accept data
- a vast computer network linking to smaller computer network
- a system for sending a message from one person to another
- a website on witch suscribers can post videos
- a slight sharp sound
- a dicese on a computer
- a picture or symbol that appears on a monitor
Down
- a transmit
- a palm sized button operated devise that is use to select things
- to transfer etc. to smaller computers
- any netlike contributes of filaments ,lines, or passages
- to append as someone signature with the like sign
- to go or to look through
- computer that can access to data
- a set of keys arranged in tiers
- a folder reliving emails and texts
- a website
20 Clues: a website • a transmit • something you press • to revise or correct • a slight sharp sound • a dicese on a computer • to go or to look through • a secret word or expression • a set of keys arranged in tiers • computer that can access to data • a folder reliving emails and texts • to transfer etc. to smaller computers • a website on witch suscribers can post videos • ...
Tools and Parts of Computer 2023-12-13
Across
- screen
- temporary memory
- the brain of a computer
- allows you to use CDs, DVDs, and Blu-ray discs
- light source
- protect static sensitive components from electrostatic discharge
- programmable device for processing, storing, and displaying information
- to clear dust
- where to connect cables/connectors to computers
- used for slotted screws
Down
- used to strip wires
- controls the movement of the cursor
- the physical parts of a computer
- measuring instrument that can measure multiple electrical properties
- computer system case
- stabilizes the mains power supply voltage to a load
- a device used to carry out a particular function
- retrieve parts from locations that are too small for your hand to fit
- circuit board inside computers that stores electrical components and helps them communicate
- a non-volatile storage drive
20 Clues: screen • light source • to clear dust • temporary memory • used to strip wires • computer system case • the brain of a computer • used for slotted screws • a non-volatile storage drive • the physical parts of a computer • controls the movement of the cursor • allows you to use CDs, DVDs, and Blu-ray discs • where to connect cables/connectors to computers • ...
Franciscos Work 2023-03-23
Across
- Someone who never fails
- What you use to speak
- The machine that operates all the computer
- Device that lets you see things connected to it
- Someone who know how to talks
- Know how to resolve problems and think
- Devices that you use to hear stuff your computer or device makes
- What you use to watch tv programs
- The named king of sports
Down
- If i like something i am ____ about it
- What you use to connect something
- ____ solver and critical thinkers
- Someone that can work by itself
- What you use to write in the computer
- How i get in the classroom when i like something
- ______ Catholics
- What you use to control the clicks
- I play as a goalkeeper and practice____
- What helps you to write
- A portable computer
20 Clues: ______ Catholics • A portable computer • What you use to speak • Someone who never fails • What helps you to write • The named king of sports • Someone who know how to talks • Someone that can work by itself • What you use to connect something • ____ solver and critical thinkers • What you use to watch tv programs • What you use to control the clicks • ...
spelling list 29 2024-04-12
Across
- why don't you ________ the article to your drive
- I don't want to ______ class but a big storm is on its way
- she is _____ and always wants to know what is going on
- parents siblings children
- strange mystical wondering
- controls the major actions on a computer
- your _______ must change or you'll run yourself into the ground
- an old fashioned printing thingy
- used to control where the cursor goes
- Excel ______
- device or program alowing you to interact with your computer
Down
- my friends and I are going to the _______ to play some games
- online shopping
- the ______ moved across the screen
- used to send data between two devices
- small book used for writing
- tells the computer what to do
- different things/types
- something to make an integrated curcuit
- a portable computer
- auto correct
21 Clues: auto correct • Excel ______ • online shopping • a portable computer • different things/types • parents siblings children • strange mystical wondering • small book used for writing • tells the computer what to do • an old fashioned printing thingy • the ______ moved across the screen • used to send data between two devices • used to control where the cursor goes • ...
Notable People in CS history 2023-08-29
Across
- Created Moore's law
- Invented random-access, coincident-current magnetic storage
- Co-Founded Microsoft with Bill Gates
- Co-founded apple with Steve Wozniak
- Considered the first computer programmer, wrote the first algorithm for a machine
- Invented the mechanical calculator
- Invented the first compiler, A-0
- Invented Fortran, or Formula Translator
- Designed his own microcomputer, eventually to become the Apple 1
- Invented the Slide Rule
- Created the world's first programmable computer
- Created the concept of a digital programmable computer
Down
- Invented Boolean Algebra
- Created the first email program on ARPANET
- Developed the first modern computers, widely viewed as the father of modern computer science
- Founded Microsoft
- Invented the Harvard Mark II, also known as the Aiken Relay Calculator
- Developed morse code
- Invented the first integrated circuit
- Created Napier's bones
20 Clues: Founded Microsoft • Created Moore's law • Developed morse code • Created Napier's bones • Invented the Slide Rule • Invented Boolean Algebra • Invented the first compiler, A-0 • Invented the mechanical calculator • Co-founded apple with Steve Wozniak • Co-Founded Microsoft with Bill Gates • Invented the first integrated circuit • Invented Fortran, or Formula Translator • ...
Ferrari_StoriaCalcolatore 2025-10-03
Across
- prima macchina meccanica in grado di eseguire calcoli
- chi usa principalmente la calcolatrice?
- lo è la calcolatrice negli anni 90
- Inventò un calcolatore meccanico
- evoluzione della Pascalina
- primo computer elettronico
- macchina in grado di eseguire calcoli matematici
- lo è la prima calcolatrice
- anno in cui è stato introdotto l'abaco
- anni in cui sono nate le prime calcolatrici elettronica
- anno in cui è stato inventato il primo computer portatile
- primo calcolatore autonomo
Down
- macchina da calcolo elettronica con più funzioni
- unità minima di informazione binaria
- prima macchina da calcolo
- primo strumento di calcolo
- invenzione primo computer elettronico
- lo è una calcolatrice negli anni 80
- primo computer portatile
- nel 1673 inventò una macchina capace di fare le moltiplicazioni
20 Clues: primo computer portatile • prima macchina da calcolo • primo strumento di calcolo • evoluzione della Pascalina • primo computer elettronico • lo è la prima calcolatrice • primo calcolatore autonomo • Inventò un calcolatore meccanico • lo è la calcolatrice negli anni 90 • lo è una calcolatrice negli anni 80 • unità minima di informazione binaria • ...
IT 2025-12-02
Across
- Tool used to secure data by converting it to code
- Extracting useful patterns from large datasets
- Software that manages computer hardware
- The visual part of software users interact with
- Rules for data communication over networks
- Checking a system for malicious software
- Online space to save and access files
- A software-based emulation of a computer
- Machines simulating human intelligence
Down
- Keeping servers running smoothly and securely
- Organizing and handling structured data
- Find and fix errors in software
- A set of rules for writing computer code
- Algorithms that learn from data automatically
- Protecting computers and networks from attacks
- New version of a program to improve it
- Measures to protect systems from digital threats
- Blocks unauthorized access to a network
- Copy of data saved for recovery purposes
- Write instructions for a computer program
20 Clues: Find and fix errors in software • Online space to save and access files • New version of a program to improve it • Machines simulating human intelligence • Organizing and handling structured data • Software that manages computer hardware • Blocks unauthorized access to a network • A set of rules for writing computer code • Checking a system for malicious software • ...
Ict 2021-10-29
Across
- The process of connecting to the internet account is
- Which is a fast main memory and slow peripheral memory handled by system software?
- What is the main folder on a storage device called?
- Which term identifies a specific computer on the web and the main page of the entire site?
- Generally to copy data from a remote computer/ internet to a local computer is called
- A device or system not directly connected to the CPU is
- A program that is used to view websites is called a
- Which is the most popular medium for direct-access secondary storage of a computer?
- Servers are computers that provide resources to other computers connected to a
- not a type of broadband internet connection?
- A terminal having local processing capability is
- Which parts of the computer were is used for calculating and comparing?
- What is the term for unsolicited Email?
- Most sophisticated type of data communications test equipment is
- The process of putting data into a storage location is called
- The fastest type of memory
- A program used to detect overall system malfunction is
- billionth of a second?
- Which of the following is the second largest measurement of RAM?
- a search engine?
- An adder in which the bits of the operands are added one after another is
- Rules for exchanging data between computers are called
Down
- The process of communicating with a file from a terminal is
- Programs stored in ROM are called as
- An online discussion group that allows direct live communication is known as
- folder contains copies of messages that you have started but are not yet ready to send.
- responseunit A device that transmits messages in verbal form is
- RAM is also called as
- Most of the errors blamed on computers are actually due to
- Simple network management protocol (SNMP) is implemented with a daughter board in the
- applies to communication between separate computer systems?
- File specification books are created primarily for the use of
- The report card and merit list forms the
- For the purpose of defining data needs, a responsibility area is
- The method of internet access that requires a phone line, but offers faster access speeds than dial-up is the
- Generally to send data from a local computer to a remote computer/internet is called
- The main memory of computer is also called as
- terminal Which type of terminal is entirely dependent for all its capabilities in the computer system to which it is connected?
- A term relating to sending data to a satellite is
- Coded entries which are used to gain access to a computer system are called
- has the shortest access times.
- A computer derives its basic strength from
- The latest expensive OCR units can read
- Which of the following cannot be a part of an E-mail address?
44 Clues: a search engine? • RAM is also called as • billionth of a second? • The fastest type of memory • has the shortest access times. • Programs stored in ROM are called as • What is the term for unsolicited Email? • The latest expensive OCR units can read • The report card and merit list forms the • A computer derives its basic strength from • ...
Cyber 2019-02-11
Across
- Cell phone, computer and other mobile device users—often teens and ‘tweens’—create and exchange provocative messages and nude, sexual images of themselves using their cell phone’s built-in digital camera and text messaging capabilities
- A method of sending short messages (also called SMS) between mobile phones and other computer-enabled devices
- Any unsolicited e-mail, or junk mail
- A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the program
- A hostile, strongly worded message that may contain obscene language
- Any Internet-related illegal activity
- Methods individuals use to track, lure, or harass another person online
- In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
- A diary or personal journal kept on a website
- To send information from your computer to another computer
- Online communities, also known as social networks, where people share information about themselves, music files, photos, etc
- stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
- A tracking feature of Internet browsers that shows all the recent websites visited
- A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
- The name a user selects to be identified on a computer, on a network, or in an online gaming forum
Down
- To upload information to the Web
- A program, or set of instructions, that runs on a computer
- A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
- To copy a file from one computer system to another via the Internet
- A location online that allows multiple users to communicate electronically with each other in real time
- A form of malicious code that displays unsolicited advertising on your computer
- “Live” time; the actual time during which something takes place
- computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace
- Willful and repeated harm inflicted through the medium of electronic text
- Refers to virtual sexual encounters between two or more persons
- Rules or manners for interacting courteously with others online
- A piece of information about your visit to a website that some websites record automatically on your computer
- Software that attempts to block malicious programs from harming your computer
- A secret word or number that must be used to gain access to an online service
- A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory
30 Clues: To upload information to the Web • Any unsolicited e-mail, or junk mail • Any Internet-related illegal activity • A diary or personal journal kept on a website • A program, or set of instructions, that runs on a computer • To send information from your computer to another computer • “Live” time; the actual time during which something takes place • ...
Crossword Bitmoji 8th Grade 2023-01-30
Across
- To create a PDF of a site, right click on the page (or ctrl + P) to ______, change the destination to "Save as PDF" and click the blue save button.(Computer Bitmoji: Google Classroom Tips and tools, Crossword activity PDF)
- What do you click to review the tasks needed to complete the creative projects?(Creative Bitmoji: review the page)
- What do you click to review the creative projects "how to's, & Helpful Tips"(Creative Bitmoji: review the page)
- The video mentioned that 25% of teenagers reported that they have experienced repeated ______via their cell phone or on the internet. (Computer Bitmoji: Digital Citizenship video)
- The quick keys ctrl + v allow you to ____.(Computer Bitmoji: Quick Keys, look for the keys mentioned)
- After typing the correct term into the crossword, and clicking a new definition/question, you get a _____checkmark next to the definition/question(Computer Bitmoji: Google Classroom Tips and tools, Crossword activity PDF)
- Loud and red let them go ahead, quiet & ____ they need help from you.(Child Development Bitmoji: Lecture Slides, Emergencies, Choking, Review page)
- Place ___dishes next to the sink until you are ready to wash. (Kitchen Bitmoji: Take a look around the kitchen, Click character to explor cabinets G-J, click on the sink, review the page )
- What kind of income is for money available to spend on goods and services that are not essential?(Finance Bitmoji: 8th Grade pig bank, Vocabulary icon)
- An image of a floppy disk to represent the ___. Most programs ___ automatically, but if you ever see this icon, you should always ____ as you go!(Computer Bitmoji: What's that icon?)
Down
- Make sure to always use a measuring _____ to gather an ingredient, and never use your fingers. (Kitchen Bitmoji: Take a look around the kitchen, Click character to explor cabinets G-J, open cabinet I, review the page )
- What three keys allow you to take a partial screenshot on a chromebook? Ctrl + Shift + Show all________ (Computer Bitmoji: Quick Keys, look for the icon in the right key box)
- Someone who acts safely, responsibly, and respectfully online.(Computer Bitmoji: 7th Grade Folder, Computer Vocab)
- What occurs when body temperature produces or absorbs more heat than it can dissipate. (Child Development Bitmoji: Vocabulary)
- Tilt head forward for ____.(Child Development Bitmoji: Lecture Slides, Emergencies, Basic First Aid, Review page)
- What does the E stand for in PIES (Child Development Bitmoji: Vocabulary)
- You can use the quick keys ctrl + c, or _____click to copy text/images.(Computer Bitmoji: What's that icon? Read about copy icon)
- Normally in the shape of a star and right of the address bar (URL bar), which allows you to save the URL for quick access to sites you might use most. (Computer Bitmoji: What's that icon? Read about the different icons)
- An easy-to-remember address for calling a web page (like www.code.org).(Computer Bitmoji: 7th Grade Folder, Computer Vocab)
- In case of a fire, you can use baking _____, or a pan lid to smother flames. (Kitchen Bitmoji: Take a look around the kitchen, Click character to explor cabinets G-J, open cabinet I, read "did you know" )
20 Clues: What does the E stand for in PIES (Child Development Bitmoji: Vocabulary) • The quick keys ctrl + v allow you to ____.(Computer Bitmoji: Quick Keys, look for the keys mentioned) • What do you click to review the creative projects "how to's, & Helpful Tips"(Creative Bitmoji: review the page) • ...
Ch.12 Computers and Technology in Healthcare 2025-02-18
Across
- used when the patient cannot exercise
- computerized version of a patient’s medical information that may include statistical data
- where information is entered into
- a slightly radioactive substance is injected into the patient and detected by the PET scanner
- allow for rapid dispensing of medications, prescriptions sent electronically
- using 3D imaging models, individuals who make prosthetics, or artificial parts, can custom design prosthetics
- within the database, each collection of related information
- computerized interpretation system that produces visual pictures on a computer monitor and a printout of the electrical activity of a patient’s heart
- uses high energy particles to decrease the size of tumors and treat cancer
- the process of sending messages from one computer to another
- protective programs that limit the ability of other computers to access a computer
- an organized collection of information
- can control the launch of a rocket from outer space
- uses special software to perform high-speed math calculations
- educational computer programming, it is designed for individual use
- online teaching and learning environment that uses computers and the internet to allow teachers to present information and activities
- surgical procedure in which a surgeon uses preoperative and intraoperative images to guide or direct the surgery
Down
- a computer that can sit on a desktop with a large computer mainframe
- body scanning method uses nuclear magnetic resonance instead of X-ray radiation
- used for patients who cannot exercise, a medication that stimulates the effect of exercise
- uses technology to direct ultrahigh-frequency sound waves through the chest wall and into the heart
- a handheld tablet, smartphot, or personal digital assistant
- programs that contain instructions to alter the operation of computer programs, erase or scramble data on the computer, or allow access to information to the computer
- light beams that can be focus precisely
- government funded thing that allows all health care agencies to readily transfer patient electronic health records between agencies in a national network
- uses high-frequency sound waves that bounce back as an echo when they hit different tissues and organs in the body
- a small amount of radioactive substance such as thallium is given intravenously, a special camera is used to identify the rays emitted from the substance during exercise
- a basic understanding of how a computer works and the applications used in your field or profession
- introduces in 1972, permits physicians to see clear, cross-sectional views of both bone and body tissues
- secure online websites that are established by a physician
- an ECG run while patient is exercising
- involves the use of video, audio, and computer systems to provide medical or health care services
- applied in science used to promote an individual’s safety and well-being adapting to the environment and using techniques to prevent injuries
- millions of computers throughout the world
- a surge protector and a battery backup
- computers can be linked together
- a robot is a mechanical device that is controlled by a computer
- a group or related records is combined
38 Clues: computers can be linked together • where information is entered into • used when the patient cannot exercise • an ECG run while patient is exercising • a surge protector and a battery backup • an organized collection of information • a group or related records is combined • light beams that can be focus precisely • millions of computers throughout the world • ...
Novatian 2022-09-22
Across
- of Online Sources giving credit to resources that were used to provide you with information.
- A network that connects technology throughout the world.
- stand and comfortably have good posture in a work environment
- is like normal literacy. It is the ability to read and write online,
- part of a computer in which operations are controlled and executed.
- The output device which shows information in picture form.
- a collection of devices connect with each other
- The technology inside of a computer.
- Someone who develops the skills to effectively use internet.
- is the time of an event that a computer records,
- a thing to store storage for a computer or a phone.
- a device that connects things to your computer
- linked devices that can exchange data
- a program that searches for and identifies items in a database
Down
- a box of data
- cloud computing model that stores data on the Internet through a cloud
- facility allowing computers, smartphones, or other devices to connect to the interne
- a very important addition to it is very similar to the typewriter
- type of memory that makes the device work faster
- computer that stays stationery and is not a laptop.
- electronic that is programmed to complete tasks
- physical components of a system.
- It is an internal or external device that connects to a compute
- usually a large program that is quite powerful and manages the software on the computer.
- network which is designed to block unauthorized access
- small files that send website servers to the browsers.
- an address for web pages so people can access the page more easily
27 Clues: a box of data • physical components of a system. • The technology inside of a computer. • linked devices that can exchange data • a device that connects things to your computer • electronic that is programmed to complete tasks • a collection of devices connect with each other • type of memory that makes the device work faster • ...
Vocab #1 and #2 2022-10-24
Across
- A name paired with a piece of information. (integer, character, string, boolean)
- Data or programs used to operated computers and execute specific tasks.
- the process of looking for and correcting errors in code.
- the region of a program where a name, such as variable, is valid.
- enables a computer to retain data, either temporarily or permanently.
- any information processed by and sent out from a computer or other electronic device.
- a repetitive action or command typically created when programming loops. (How many times a loop repeats).
- How a computer thinks. It's "mental processes." Includes decomposition, pattern matching, and abstraction.
- Name for a person who writes computer programs.
- The specific order in which instructions are performed in an algorithm.
- A programmer readable explanation or note within code. Usually indicated by a hashtag.
Down
- breaking a problem down into smaller pieces in order to make it more manageable.
- a sequence of instructions that is continually repeated until a certain condition is reached.
- Not a programming language, but an informal way of writing a program. "Fake code."
- The machines, wiring, and other physical components of a computer.
- A field of study in which people use the power of computers to solve big problems.
- data that is entered into or received by a computer.
- taking away all but the relevant data about an object or piece of code in order to reduce complexity and increases efficiency.
- an electronic device for storing and processing data.
- The act of setting a certain key or keys on the keyboard to perform a function when being pressed.
- A software application programmers use for software development.
- a list of steps or instructions used to solve a problem.
22 Clues: Name for a person who writes computer programs. • data that is entered into or received by a computer. • an electronic device for storing and processing data. • a list of steps or instructions used to solve a problem. • the process of looking for and correcting errors in code. • A software application programmers use for software development. • ...
vocab 1 2020-01-23
Across
- INSTRUCTIONS THAT GIVE DIRECT OPERATION OF A COMPUTER SYSTEM AND MAKES USERS PERFORM DIFFERENT TASKS.
- KEEPS THE THINGS THAT U NEED OR WANT TO KEEP
- A PAPER OR PLASTIC copy something that you can feel
- SYSTEM IT IS LIKE MULTIPLE computers
- letters numbers and special characters
- USING A COMPUTER TO CONVERT DATA INTO USEFUL INFO. PROCESSING CYCLE DURING THIS CYCLE DATA IS PUT SOMEWHERE.
- FAST POWERFUL i’s SUPER
- you CAN NOT HOLD IT BUT CAN SEE IT
- MOUSE KEYBOARD WEBCAM AND MORE things like input
- sound voice music
- facts and statistics collected together for reference or analysis
- HOLDS DATA and information.
- TAKE OR SEND INFO OUT TO LIKE A STORAGE.
- THAT IS PROCESSED INTO SOMETHING ELSE
- A LARGER SMARTPHONE
- FIT BIT apple watch and more
Down
- IPHONE 11 AND THINGS LET you GET ON THE INTERNET
- is a hardwUL COMPUTER that other computers connect to online.
- moving pictures and images
- IS A POWERFHUNDREDS AND THOUSANDS OF NETWORK COMPUTERS.
- IS A SINGLE COMPUTER AND IS HIGH WORKING IT IS ADVANCED.
- LIKE your PHONE
- CHIPS THAT ARE FOR TEMP STORAGE.
- are device that converts data into a format suitable for a transmission medium so that it can be transmitted from one computer to another.
- SYSTEM ONE USER AT A TIME LIKE A pc
- A MODEM THAT CAN TRANSMITTED INTO COMMUNICATION.
- WHEN A COMPUTER'S ELECTRICAL CIRCUITS THAT CREATE INFO.
- pictures
- THE ADD ONS TO THE COMPUTER
- your PHONES TABLETS
- ALL THE PHYSICAL COMPONENTS THAT MAKE UP THE COMPUTER SYSTEM
- PUTTING IN DATA
32 Clues: pictures • LIKE your PHONE • PUTTING IN DATA • sound voice music • your PHONES TABLETS • A LARGER SMARTPHONE • FAST POWERFUL i’s SUPER • moving pictures and images • THE ADD ONS TO THE COMPUTER • HOLDS DATA and information. • FIT BIT apple watch and more • CHIPS THAT ARE FOR TEMP STORAGE. • you CAN NOT HOLD IT BUT CAN SEE IT • SYSTEM ONE USER AT A TIME LIKE A pc • ...
Programming terms 2023-05-16
Across
- To find and fix errors in a computer program or app
- A name that contains a value to be used in your program.
- To write down or draw the detailed plan for creating a solution to a problem.
- A program that listens to any input from the user while the program is running and reacts to that input.
- The instructions used in a computer program.
- Working with others to reach a goal
- A set of instructions given to a computer in a language that it can understand.
- The person who writes the code in pair/trio programming.
- The person who marks off the tasks on the check off sheet as they are done.
- The person who reads the directions on the direction sheet and makes sure no directions are missed.
Down
- When two or three people work together to create a computer program.
- Process A step by step way to solve problems.
- A story told with moving illustrations or drawings.
- An error in the computer program or app
- The order in which things happen.
- A grid made up of vertical lines and horizontal lines
- The smallest element, or dot, of a digital display. An electronic screen is made of thousands of pixels that form a grid.
- How a problem is solved.
- The person who in charge of keeping the group on task and watching the time to make sure your tasks are finished when they should be.
- Doing the same action over and over again
- Set of steps to solve a problem
- A trigger that the computer recognizes and causes it to do some action. ("When...")
- A block of code that can be used again and again to perform some actions
- To check if a computer program is working properly.
24 Clues: How a problem is solved. • Set of steps to solve a problem • The order in which things happen. • Working with others to reach a goal • An error in the computer program or app • Doing the same action over and over again • The instructions used in a computer program. • Process A step by step way to solve problems. • To find and fix errors in a computer program or app • ...
Crossword puzzle 2023-09-06
Across
- a vertical bar on the right side of the window
- area on a computer display screen.
- an electronic copy or hard copy of reference material for a product.
- Key: a modifier key which, when pressed in conjunction with another key, performs a special operation
- the access point for programs displayed on the desktop, even if the program is minimized
- to move up and down.
- is a computer display area that represents the kinds of objects found on top of a physical desk
- is an icon that points to a program or data file.
- to load an operating system (OS) into the computer's main memory or RAM.
- a piece of software that enhances or “extends” the capabilities of a programming language or other applications.
- container for a computer system.
Down
- a small graphical representation of a program or file.
- is a computer program that can capture, display and manipulate data arranged in rows and columns.
- the act of pressing a computer mouse button once without moving the mouse.
- a set of options presented to the user of a computer application to help them find information
- point to an object on the screen, hold down the left mouse button while moving the mouse (and the object) to a new location on the screen then release the mouse button.
- A folder holds one or more files,
- visible and moving pointer that the user controls with a mouse
- the act of pressing a computer mouse button twice quickly without moving the mouse.
- to copy the document or record the images
- a software package used to display information in the form of a slide show.
21 Clues: to move up and down. • container for a computer system. • A folder holds one or more files, • area on a computer display screen. • to copy the document or record the images • a vertical bar on the right side of the window • is an icon that points to a program or data file. • a small graphical representation of a program or file. • ...
oceana 2025-09-09
Across
- an application for accessing websites.
- a computer and networking device that forwards data packets between computer networks
- a mobile device that combines traditional mobile technology
- a device that a lot of people use now
- the responsible, respectful and safe way use of technology in daily life
- device used for observing, checking, or keeping a continuous record
- development of computer systems able to perform tasks that normally require a human intelligence
- a clam like shape with a flat panel screen on the top part of the inside
- a mouse, keyboard, or printer
- a software program or a system designed to help users find information
- an electro-mechanical data storage device that stores and retrieves digital data
Down
- a computing device designed to fit on top of a typical office desk.
- the brain of a computer, a primary component responsible for executing instruction
- reference to a book or paper
- the practice of pretending on social media to be someone different
- a form of social engineering and a scam
- a combined device for modulation for example, between the digital data of a computer
- radio waves to provide wireless high-speed Internet access.
- a type of artificial intelligence that produces new content
- the ability to responsibly use digital technologies
- a computer program that simulates human conversation with an end user
- a global network or an embedded network such as modern cars.
- gather together your data and store information logins
- refers to servers that are accessed over the Internet, and the software and databases
- an increasingly valuable complement to digital signing practices, enabling
25 Clues: reference to a book or paper • a mouse, keyboard, or printer • a device that a lot of people use now • an application for accessing websites. • a form of social engineering and a scam • the ability to responsibly use digital technologies • gather together your data and store information logins • a mobile device that combines traditional mobile technology • ...
CODING 2016-02-09
Across
- A program that runs on a system against the owner’s or user’s wishes
- Used to provide the temporary storage of information function.
- A collection of data into a permanent storage structure stored on the hard drive.
- A term used to describe junk and unsolicited e-mail.
- the quantities, characters, or symbols on which operations are performed by a computer,
- It is a worldwide system of computer networks
- a symbol or function denoting an operation (e.g., ×, +).
- an error in a computer program or system.
Down
- A wireless method of sending information
- It is a program that displays the files and data on internet
- a place where power or information leaves a system.
- A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
- A binary unit of data storage with only 2 digits 0 and 1.
- a system of symbols and rules for writing programs or algorithms
- either or both of two stated possibilities
- identify and remove errors from
- Another Computer term for “Starting a Computer”
17 Clues: identify and remove errors from • A wireless method of sending information • an error in a computer program or system. • either or both of two stated possibilities • It is a worldwide system of computer networks • Another Computer term for “Starting a Computer” • a place where power or information leaves a system. • A term used to describe junk and unsolicited e-mail. • ...
Stem 2024-02-15
13 Clues: frame • Hybrid • internet • work place • good computer • small computer • a computer chip • soulfully done better • engineering and building • looking at it and examining thing • measuring the formula to something • Science Technology Engineering Math • Looking close at something and seeing what it is about
NETWORKING PARTS 2019-02-28
Across
- to search for information about (someone or something) on the Internet using the search engine
- what does USB means.
- a group or system of interconnected people or things.
- a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).
- a panel of keys that operate a computer or typewriter.
- a small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions.
- includes the physical, tangible parts or components of a computer, such as the cabinet, central processing unit, monitor, etc.
- is any hardware device that sends data to a computer.
- the cretor of the company google.
Down
- a computer that is optimized for high multimedia performance.
- is the significant of HDMI
- it means RJ
- is a file storage and synchronization service developed.
- a computer network that spans a relatively small area.
- a type of connector commonly used for Ethernet networking.
- a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
16 Clues: it means RJ • what does USB means. • is the significant of HDMI • the cretor of the company google. • a group or system of interconnected people or things. • is any hardware device that sends data to a computer. • a computer network that spans a relatively small area. • a panel of keys that operate a computer or typewriter. • ...
Computers 2023-07-11
Across
- A collection of web pages that are linked together and share a common domain name.
- A program used for accessing and viewing websites on the internet.
- A screen used for displaying images from a computer.
- A program that can damage or destroy files on a computer.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A device that is used to move the cursor on a computer screen.
- A machine that prints text or images onto paper.
Down
- A set of keys on a computer that are used for typing.
- A small device used for storing and transferring data between computers.
- Programs and other operating information used by a computer.
- A global network of computers that allows people to communicate and share information.
- A program that protects a computer from unauthorized access over the internet.
- Software designed to harm or exploit any electronic device, network, or service.
- A device that can scan documents or images and convert them into digital files.
- An electronic machine that can store and process data.
- A way of sending messages electronically over the internet.
16 Clues: A machine that prints text or images onto paper. • A screen used for displaying images from a computer. • A set of keys on a computer that are used for typing. • An electronic machine that can store and process data. • A program that can damage or destroy files on a computer. • A way of sending messages electronically over the internet. • ...
c 2016-02-09
Across
- (Nest): to put something in a computer program or page on the internet
- processing program instructions in multiple divided processers
- a programming instruction that directs the computer to another part of the program based on the results of a compare.
- a sequence of instructions that is repeated until a certain condition is met
- control structure; instructions executed one after another.
- entering information into a machine or system
- the process of locating and fixing a bug
Down
- a character that represents an action.
- a program language to communicate instructions to a computer
- facts or figures, or information that's stored in or used by a computer.
- factoring, is breaking a complex problem or system into parts that are easier to conceive, understand, program, and maintain.
- communication of results from a computer to readable form.
- a set of instructions that a computer can understand.
- an error in a computer program
14 Clues: an error in a computer program • a character that represents an action. • the process of locating and fixing a bug • entering information into a machine or system • a set of instructions that a computer can understand. • communication of results from a computer to readable form. • control structure; instructions executed one after another. • ...
Computer Systems 2013-10-24
Across
- - a group or system of interconnected people or things.
- - the exclusive and assignable legal right, given to the originator for a fixed number of years, to print, publish, perform, film, or record literary, artistic, or musical material
- - the programs and other operating information used by a computer.
- – A structured set of data held in a computer
- - Internal storage areas in the computer
Down
- device – Used to transfer data out of a computer eg.Speakers
- - the machines, wiring, and other physical components of a computer or other electronic system.
- - a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- - Brains of the computer
- - random access memory
- - a panel of keys that operate a computer or typewriter.
- – Where data is stored e.g. Computer
12 Clues: - random access memory • - Brains of the computer • – Where data is stored e.g. Computer • - Internal storage areas in the computer • – A structured set of data held in a computer • - a group or system of interconnected people or things. • - a panel of keys that operate a computer or typewriter. • device – Used to transfer data out of a computer eg.Speakers • ...
Gender/Plural Noun forms 2020-10-19
23 Clues: pen • flag • book • doors • rulers • clocks • chairs • folders • pencils • windows • backpack • notebook • trashcan • computer • classroom • calculators • dictionaries • student desk • teacher desks • 3 ring binders • sheets of paper • computer screen • pencil sharpener
alphabetical engineers 2023-11-29
Across
- shoveldisign
- newwaystoinvest
- newwaytochargephone
- particleaccelerator
- grass
- extractingoil/gas
- combiningmetal
- AC
- medicaldevicestoboeing
- safer/healthier
- crutches
- mobileapps
- buildxraymachines
- underwaterequipment
- railvehicles
Down
- robots
- quantumcomputers
- industrialprocess
- plansfroconstructionprojects
- conservationonnaturalresources
- cagesforanimals
- trafficsign
- satellites
- phones/computer
- batteries
- insulation
26 Clues: AC • grass • robots • crutches • batteries • satellites • mobileapps • insulation • trafficsign • shoveldisign • railvehicles • combiningmetal • newwaystoinvest • cagesforanimals • safer/healthier • phones/computer • quantumcomputers • industrialprocess • extractingoil/gas • buildxraymachines • newwaytochargephone • particleaccelerator • underwaterequipment • medicaldevicestoboeing • plansfroconstructionprojects • ...
DIYA CYBER SAFETY CROSSWORD 2016-05-25
Across
- A bad thing on the computer
- security - Its help to stop online crimes
- - They help you to get virus off
- - A website you text on
- app- A website you can send messages and chat on
- - You can't share it with anyone
- - Part of your computer saves all your datas
- - A device you watch on
- - Website which give you information
Down
- A popular web site
- - They help on the internet
- - They hlep you on the computer
- - A device which knows everything
- - Instructios to set your computer
- - A device you can chat on
- - something that loads things quickly
- - A website you can send pictures on
- - They can be rude to you on the internet
- -A website which you can chat on
- -They pop up on your screen
20 Clues: A popular web site • - A website you text on • - A device you watch on • - A device you can chat on • - They help on the internet • -They pop up on your screen • A bad thing on the computer • - They hlep you on the computer • - They help you to get virus off • - You can't share it with anyone • - A device which knows everything • -A website which you can chat on • ...
Application terms 2023-09-06
Across
- a link that points to a computer program.
- moved to another location
- a resource for recording data on a computer storage device
- a pictogram or ideogram displayed
- pressing a button two times
- program that represents information on a grid
- pressing button once
- a computer file containing information
- a set of options
Down
- to load an operating system
- a software package used to display information
- a moving pointer that is controlled by a mouse
- at the bottom of the desktop
- a separate viewing area on a computer
- area that represents apps that can be used
- a storage space
- one of the combination keys
- contains an encoded sequence of instructions
- to copy or record a image or document
- bar a long thin bar to go up or down
20 Clues: a storage space • a set of options • pressing button once • moved to another location • to load an operating system • one of the combination keys • pressing a button two times • at the bottom of the desktop • a pictogram or ideogram displayed • bar a long thin bar to go up or down • a separate viewing area on a computer • to copy or record a image or document • ...
Notable People Crossword 2024-08-29
Across
- Invented the first digital computer (ABC)
- 1949 built the first machine that plays chess
- HP
- Started Apple computer
- Discovered the first computer "bug"
- Invented the first widely used programming language
- Helped create BASIC
- The first electronic computer was created in 1950
- Designed and built the Apple II
Down
- Invented the "mouse"
- In 1971 invented the email
- In 1945 contributed a new understanding of organization and build to add to computers
- 1961 invented the sliderule
- Credited for being the world's first programmer
- Invented a special communication code
- 300BC binary number system
- In 1951 created what we would now refer to as RAM
- Son of an organ maker, and worked in the textile industry. Used a loom as his way of programming
- In 1958 created the integrated circuit
- Invented the first Analytical Engine
20 Clues: HP • Helped create BASIC • Invented the "mouse" • Started Apple computer • In 1971 invented the email • 300BC binary number system • 1961 invented the sliderule • Designed and built the Apple II • Discovered the first computer "bug" • Invented the first Analytical Engine • Invented a special communication code • In 1958 created the integrated circuit • ...
wesson 2023-11-02
Across
- a way to view files
- a bar at the top of a computer that allows to have multiple tabs
- a set of papers or set of papers holding information
- an extended vertion
- an open page
- an easy way to do something: get somewhere faster
- used when the page is too long needs to scroll
- a storage space or container
- presenting somthing to an audience
Down
- a command to the computer that DoubleClickat to do
- alters the action of a different key when pressed
- data arranged in columns and rows
- the screen displayed while the computer is booting
- indicates where the mouse pointer is
- contains a list of menus in a program
- clicking twice quickly
- a stationary computer
- stores data
- clicking and holding while you _______ it around
- copy or backup a document
20 Clues: stores data • an open page • a way to view files • an extended vertion • a stationary computer • clicking twice quickly • copy or backup a document • a storage space or container • data arranged in columns and rows • presenting somthing to an audience • indicates where the mouse pointer is • contains a list of menus in a program • used when the page is too long needs to scroll • ...
Comp Apps 1 2016-05-20
Across
- Academic Report Margins
- Software that runs all parts of a Computer
- Temporary Memory of a Computer System
- Gross Words a Minute
- Made up of Columns and Rows, creating cells
- 1 or 0 Data Type
- Type of Document with Date & Closing starting at Center Point of Doc
- Physical Components of the Computer System
- & Character is called a ______.
- ASDF JKL;
- Standard Keyboard Arrangement
Down
- Record of what happened at a Meeting
- Text that is below the line of text slightly
- 1 Million Bytes of Data
- Fingers should be ______ when typing correctly.
- Type of Document with no indenting
- Meeting Planned Process, presented before
- Interoffice Document
- 1st Page of Academic Report
- Input & Output Device with Possible Touch
- Spacing in an Academic Report
- Words a Minute
- Brains of the Computer System
23 Clues: ASDF JKL; • Words a Minute • 1 or 0 Data Type • Gross Words a Minute • Interoffice Document • Academic Report Margins • 1 Million Bytes of Data • 1st Page of Academic Report • Spacing in an Academic Report • Brains of the Computer System • Standard Keyboard Arrangement • & Character is called a ______. • Type of Document with no indenting • Record of what happened at a Meeting • ...
c 2016-02-09
Across
- a set of instructions that a computer can understand.
- a programming instruction that directs the computer to another part of the program based on the results of a compare.
- a program language to communicate instructions to a computer
- the process of locating and fixing a bug
- (Nest): to put something in a computer program or page on the internet
- factoring, is breaking a complex problem or system into parts that are easier to conceive, understand, program, and maintain.
Down
- entering information into a machine or system
- a character that represents an action.
- communication of results from a computer to readable form.
- a sequence of instructions that is repeated until a certain condition is met
- processing program instructions in multiple divided processers
- facts or figures, or information that's stored in or used by a computer.
- control structure; instructions executed one after another.
- an error in a computer program
14 Clues: an error in a computer program • a character that represents an action. • the process of locating and fixing a bug • entering information into a machine or system • a set of instructions that a computer can understand. • communication of results from a computer to readable form. • control structure; instructions executed one after another. • ...
Fundamentals of Computing 2024-11-03
Across
- A microchip that processes a computer program's data and instructions.
- Clickable icons and menus that made computers very user friendly.
- A number system based on 10 numbers.
- The main memory of a computer that stores programs being processed by the CPU.
- The site for the British codebreaking operation during World War II.
- A 3-step cycle that the CPU uses to process data/instructions stored in RAM.
- Computer software (a program) that performs a specific function.
Down
- The part of the CPU that stores data currently being processed.
- Hardware used to permanently stored data used by a computer.
- The part of the CPU that performs calculations and comparisons of data.
- Hardware used to send data into a computer.
- The number of FDE cycles completed each second.
- The part of the CPU that controls the flow of data around a computer.
- Hardware used to send data out of a computer.
14 Clues: A number system based on 10 numbers. • Hardware used to send data into a computer. • Hardware used to send data out of a computer. • The number of FDE cycles completed each second. • Hardware used to permanently stored data used by a computer. • The part of the CPU that stores data currently being processed. • ...
Digital Tech 2020-10-07
Across
- Hollerith - an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting
- Census - is a principal agency of the U.S. Federal Statistical System, responsible for producing data about the American people and economy
- - a set of related measures or activities with a particular long-term aim
- - the amount of something produced by a person, machine, or industry
- Lovelace - an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine
- browse - is a software application for accessing information on the World Wide Web. When a user requests a web page from a particular website, retrieves the necessary content from a web server and then displays the page on the user's device
- - is a calculating tool that was in use in the ancient Near East, Europe, China, and Russia, centuries before the adoption of the written Arabic numeral system. The exact origin of the abacus is still unknown
- - an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity
- - hit (someone) hard
- Babbage - A mathematician, philosopher, inventor and mechanical engineer, Babbage originated the concept of a digital programmable computer
- system - the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals
- - a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- memory - is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code
Down
- - a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- - main processor or just processor, is the electronic circuitry within a computer that executes instructions that make up a computer program
- - what is put in, taken in, or operated on by any process
- - a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
- - the programs and other operating information used by a computer
- - the use or operation of computers
- - is an American multinational technology company headquartered in Armonk, New York. It was founded in 1911 in Endicott, New York, as the Computing-Tabulating-Recording Company
- - is a networking device that forwards data packets between computer networks
- Wozniak - is an American electronics engineer, programmer, philanthropist, and technology entrepreneur
- Turing - an English mathematician, computer scientist, logician, cryptanalyst, philosopher, and theoretical biologist
- - an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- memory - a usually small computer memory that contains special-purpose information (such as a program) which cannot be altered — compare ram
- - A top-level Internet domain used by associations and non-profit organizations mostly in the U.S. and Canada
- - tools, machinery, and other durable equipment
- science - the study of the principles and use of computers
28 Clues: - hit (someone) hard • - the use or operation of computers • - tools, machinery, and other durable equipment • - what is put in, taken in, or operated on by any process • science - the study of the principles and use of computers • - the programs and other operating information used by a computer • - the amount of something produced by a person, machine, or industry • ...
tech terms 2023-04-27
Across
- malicious software such as viruses that interfere with normal compute function
- A packet of data sent from a web server to a browser
- A computer receiving data over the internet
- changes analog data to digital data
- The gulf between those who have ready access to computers and the internet, and those who do not
- the web address of a webpage
- A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- traffics and sends data packets through network
- a electromechanical storage device
- A million bytes
- A portable document format that displays text or images
- A local wired internet connection
- A worldwide system of computer networks
- a computer programming language consisting of binary or hexadecimals
- Paste
- Any information related to an identifiable person
- Google and Bing
- Chrome and Safari
- A form of computer memory that can be read and changed in any order, typically used to store working data and machine code
- a network security device that monitors and filters incoming and outgoing network traffic
- A computer or computer program which manages access to a centralized resource or service in a network
- is the difference between hardware and software?
- can backup information to a hard drive or a cloud service
- Software that is distributed with its source code, making it available for use, modification, and distribution with its original rights
Down
- A work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc
- Fully powering off a computer and powering it back on
- A software that acts as the base of the computer for all other applications used
- keyboard and mouse
- Monitor and printer
- Turns domain names into IP addresses, which allow browsers to get to websites and other internet resources
- is the physical piece of equipment such as the ram, hard drive while software is programs we use such as google chrome and operating systems like windows
- unit of data that is 8 binary digits long
- Copy
- The process of converting information or data into a code, especially to prevent unauthorized access
- the brains of the computer
- The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors
- two examples of browsers
- A regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style
- The coding language used for web pages
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- A type of non-volatile memory used in computers and other electronic devices
- The world wide web
43 Clues: Copy • Print • Paste • A million bytes • Google and Bing • Chrome and Safari • keyboard and mouse • The world wide web • Monitor and printer • two examples of browsers • the brains of the computer • the web address of a webpage • A local wired internet connection • a electromechanical storage device • changes analog data to digital data • The coding language used for web pages • ...
c 2016-02-09
Across
- processing program instructions in multiple divided processers
- an error in a computer program
- entering information into a machine or system
- a programming instruction that directs the computer to another part of the program based on the results of a compare.
- (Nest): to put something in a computer program or page on the internet
- communication of results from a computer to readable form.
- facts or figures, or information that's stored in or used by a computer.
Down
- factoring, is breaking a complex problem or system into parts that are easier to conceive, understand, program, and maintain.
- a set of instructions that a computer can understand.
- a sequence of instructions that is repeated until a certain condition is met
- control structure; instructions executed one after another.
- the process of locating and fixing a bug
- a program language to communicate instructions to a computer
- a character that represents an action.
14 Clues: an error in a computer program • a character that represents an action. • the process of locating and fixing a bug • entering information into a machine or system • a set of instructions that a computer can understand. • communication of results from a computer to readable form. • control structure; instructions executed one after another. • ...
Parts of a computer 2017-06-30
Across
- The working computer screen.
- Reader Used to scan items to tell you information about it. (7,6)
- Used to record sounds.
- A device that digitalises images and documents into data in the device.
- The physical components/parts (e.g. Mouse) for the computer.
- You can type with this.
- You can use this to copy the image in real life.
Down
- A hardware device that connects to the computer, and plays sound.
- A device that produces data
- The main circuit board of your computer that everything else plugs into
- The programs and applications used by the computer, for example one can be Google.
- Are mainly used to print cheques- the bank code, cheque number and customer account number are printed with the special ink
- Printer A type of computer that prints with beams of lasers. (5,7)
- A computer that controls access to a network
14 Clues: Used to record sounds. • You can type with this. • A device that produces data • The working computer screen. • A computer that controls access to a network • You can use this to copy the image in real life. • The physical components/parts (e.g. Mouse) for the computer. • A hardware device that connects to the computer, and plays sound. • ...
6th Grade Computer Terms 2023-09-29
Across
- Anytime you push a key or move the mouse, you're sending instructions to this.
- Programs like Word or PowerPoint that do different things.
- Protects your computer so it doesn't get a virus.
- Lets you explore the internet.
- Tells the hardware what to do and how to do it.
- You use this to type.
Down
- Takes the text and pictures on your screen and prints them onto paper.
- Lets you hear different sounds created by the computer.
- Without this, you can't see what's on the computer!
- The metal or plastic box that holds the 'brains' of the computer.
- Moving this moves the cursor on the screen.
- A type of computer that is portable.
- The most important program that runs on the computer. It lets the hardware and software work together.
- Stores all the documents you have saved on the computer.
14 Clues: You use this to type. • Lets you explore the internet. • A type of computer that is portable. • Moving this moves the cursor on the screen. • Tells the hardware what to do and how to do it. • Protects your computer so it doesn't get a virus. • Without this, you can't see what's on the computer! • Lets you hear different sounds created by the computer. • ...
