computer Crossword Puzzles
Per. 2 Cyber Security Words and Terms Puzzle Maker 2022-09-12
Across
- Software that can only be run for a limited amount of time before it expires.
- official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- A simple form of code for software that can be written in word editors.
- A language used to create and control the content on a website.
- Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- An alternative way to access software or hardware.
- A test that distinguishes between robots and humans using a website.
- An error, flaw, failure, or fault in a computer program or system.
- Text that can be read by the human eye, like google results for how to make eggs.
- A cyber attacker who uses software and social engineering methods to steal data and information.
Down
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
- Program that automatically execute tasks as ordered by the creator of the program.
- A secret word or phrase that is used to access a computer system or service.
- typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, can corrupt data or expand throughout a network and damage systems across a company.
- The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
- The programs and other operating systems used by a computer.
- The method of obtaining user information through fraudulent communications targeted directly at people
- A form of malicious software that disguises itself as a harmless computer program.
22 Clues: An alternative way to access software or hardware. • The programs and other operating systems used by a computer. • A language used to create and control the content on a website. • An error, flaw, failure, or fault in a computer program or system. • A test that distinguishes between robots and humans using a website. • ...
Operating Systems & Networks 2023-09-13
Across
- Each connection on a hub.
- OS that originated in 1969 at Bell Labs. It was and still is regarded as the most powerful, versatile and flexible OS in the computer world.
- A computer network within a small geographical area such as a home, school or computer lab
- Simple and inexpensive network that typically connects fewer than 10 computers, each called a peer.(3 words)
- Network application that facilitates the transfer of files from one computer to another e.g. from a client to a server. (3 words)
- The operating system is a type of _________software which controls all of the computer’s resources (e.g. memory, hardware) and ensures that all parts of a computer system work together smoothly and efficiently.
- Software that programmers from around the world work to voluntarily develop. (2 words)
- Each Computer or Device on the network-has a unique network address.
- A Networking device that divides up the network into different segments to manage the amount of traffic.
- Network that provides highly efficient ways to connect 10 or more computers for exchange of large amounts of information: ______ server network.
- Operating system written by a graduate student at Helsinki University in Finland. An "open source" project.
Down
- A user interface to a computer’s operating system in which the user responds to a text prompt by typing in a command. (3 words)
- Software that helps people on a network to coordinate and manage business/educational projects. I.e. Google Docs, Slides etc.
- A graphical user ___________ typically consists of a desktop, icons, windows, pull-down menus, buttons, scroll bars etc.
- Single-user, single-tasking computer operating system that uses a command line interface.
- Networking devices that are used to connect multiple devices directly to the network using cables.
- Used for computers on a network to communicate on the network. It is capable of fast and constant connections.
- When uses need to physically carry information from one computer to another using external storage devices
- A group of two or more devices that can communicate.
- Apple iPhone system software
- Commercial software that can be bought, leased or licensed from its vendor/developer. Access to its source code is not provided
21 Clues: Each connection on a hub. • Apple iPhone system software • A group of two or more devices that can communicate. • Each Computer or Device on the network-has a unique network address. • Software that programmers from around the world work to voluntarily develop. (2 words) • Single-user, single-tasking computer operating system that uses a command line interface. • ...
technology 2023-10-11
Across
- Small mobile computing consumer device designed to be worn and that often communicate with a mobile device or printer. See also wearable
- Number system that has just two unique digits, 0 and 1, called bits.
- Square-shaped graphic that corresponds to a web address or other information. Short for quick response code.
- An application that helps businesses of all sizes record and report their financial transactions.
- An electronic image file format by Adobe Systems that mirrors the appearance of an original document. Short for Portable Document Format.
- A personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table. Also called a desktop computer.
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer. See also CPU
- Program designed to make users more productive and/or assist them with personal tasks.
- The amount of time it takes a storage device (1) to locate an item on a storage medium or (2) to deliver an item from memory to the processor.
- A mobile device on which you can store, organize, and play or view digital media.
- A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
Down
- Programs designed to make users more productive and/or assist them with personal tasks.
- A mobile device that allows users to take pictures and store the photographed images digitally.
- A working model of the proposed system’s essential functionality.
- Continuous (wave form) signals.
- An electronic device, operating under the control of instructions stored in its own memory, that can accept data (input), process the data according to specified rules, produce information (output), and store the information for future use.
- A collection of related records stored on a storage medium such as a hard drive or on cloud storage; often simply called a file private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
- A series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them. See also program
- Unique address of a webpage. See also URL
- application of human intelligence to computers.
20 Clues: Continuous (wave form) signals. • Unique address of a webpage. See also URL • application of human intelligence to computers. • A working model of the proposed system’s essential functionality. • Number system that has just two unique digits, 0 and 1, called bits. • A mobile device on which you can store, organize, and play or view digital media. • ...
Cybersecurity Words 2020-11-18
Across
- a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
- An observable occurrence or sign that an attacker may be preparing to cause an incident.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- set of instructions to help IT staff detect, respond to, and recover from network security incidents.
- a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
- a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
- ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
- strategy used to make sure users do not send critical information outside of a corporate network.
- an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
- integrated collection of security measures to prevent unauthorized access to a networked computer system
- a cyberattack on a server, service, website, or network floods it with Internet traffic.
- identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
- the unauthorized movement of information being spread throughout the internet.
- Authentication via group
- a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
- used to detect malware.
- a system that allows web hosts to distinguish between human and automated access to websites.
- Someone or Something that authenticates
- a standalone malware computer program that replicates itself in order to spread to other computers.
- science concerned with data communication and storage in secure and usually secret form.
- related to cloud computing, in which it can hold information and photos.
- to successfully escape from an area under enemy control.
- Source code that is free to copy and modify.
- an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
- Hacker who violates computer security for personal gain or malice.
- is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
- The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
- a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
- an evaluation of events that can adversely affect operations and/or specific assets
- a type of monitoring software designed to record keystrokes made by a user.
- Source code that is not available
- the psychological manipulation of people into performing actions or divulging confidential information.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- software that displays unwanted advertisements on your computer.
- the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- code that takes advantage of a vulnerability of flaw.
- a set of changes to a computer program or its supporting data designed to update, fix, or improve it
- an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
- List of people under suspicion, disfavor, etc.
- internet protocol address, which identifies the number associated with a specific computer or network.
- an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
- are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
- any malware which misleads users of its true intent.
- A thing that supports another thing
- Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
- an attack on the internet that is used to steal usernames and passwords from the network.
- a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
- a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
- keeping data safe
- process of collecting and searching through a database to discover information.
- a computer network that provides online privacy by creating an encrypted connection on the Internet.
- it ensures a person’s identity matches with who they are.
- a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
- a person who operates the command and control of botnets for remote process execution.
- when data is coded a certain way to disallow others from seeing that information.
- a collection of internet-connected devices infected by malware that allow hackers to control them.
- offensive security professionals who are experts in attacking systems and breaking into defenses.
- a type of malware that is often disguised as legitimate software.
- unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
- identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
- the methods that adversaries use to breach or infiltrate your network.
- Number generated from a string of text
- malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- to convert information into cipher
- short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.
65 Clues: keeping data safe • used to detect malware. • Authentication via group • Source code that is not available • to convert information into cipher • A thing that supports another thing • Number generated from a string of text • Someone or Something that authenticates • Source code that is free to copy and modify. • List of people under suspicion, disfavor, etc. • ...
Computer equipment and phones 2021-10-22
Across
- It connects a piece of electrical equipment to the main supply of electricity.
- A part of a computer or a television on which pictures or words are shown.
- A small computer that is easy to carry, usually without a keyboard.
- It is used to carry electricity.
- You use it to charge your phone.
- You connect it to a computer to copy and store information.
Down
- You move it to select and move items on the computer screen.
- A machine for printing text on paper.
- A mobile phone that can be used as a small computer and connects to the internet.
- The set of letters that you touch to write on a smartphone, computer ...
- It produces sound.
- A small computer that can work with a battery and be easily carried.
12 Clues: It produces sound. • It is used to carry electricity. • You use it to charge your phone. • A machine for printing text on paper. • You connect it to a computer to copy and store information. • You move it to select and move items on the computer screen. • A small computer that is easy to carry, usually without a keyboard. • ...
TECHNOLOGY 2019-11-06
Across
- real-time, synchronous, text-based communication via computer
- code made up of numbers seperated by three dots that identifies a particular computer on the internet
- is a plug-and-play interface that allows a computer to communicate with peripheral and other devices
- what is a network security system used to stop unauthorised access
- device that feeds data into a computer
- process of converting data into a secret code for transmission over a public network
- small program that can be downloaded which allows users to enhance their browser
- a computer program sent to gather information from your computer
Down
- usually consists of eight bits
- what is it called if people are nasty to you online
- type of text and styles
- copy from one computer system to another, typically over the internet
12 Clues: type of text and styles • usually consists of eight bits • device that feeds data into a computer • what is it called if people are nasty to you online • real-time, synchronous, text-based communication via computer • a computer program sent to gather information from your computer • what is a network security system used to stop unauthorised access • ...
computer class 2022-09-06
Across
- the computer screen with out
- the printer ink went out
- the mouse on my computer broke
- i the car & a ram thing came to my mind
- The component of a computer system that controls the interpretation and execution of instructions
Down
- my hardriver broke inside of my computer
- the keyboard letter are mess up
- the scanner at food lion was down last night
- a system of interactive visual components for computer software.
- a printed circuit board containing the principal components of a computer or other device
- my phone speaker have water in it
- electrical device that supplies electric power to an electrical load
12 Clues: the printer ink went out • the computer screen with out • the mouse on my computer broke • the keyboard letter are mess up • my phone speaker have water in it • i the car & a ram thing came to my mind • my hardriver broke inside of my computer • the scanner at food lion was down last night • a system of interactive visual components for computer software. • ...
Technology 2025-11-13
Across
- a small computer you can carry with you
- the part of a computer or TV where you see things
- you watch shows, movies, and news on this
- you move this with your hand to control the cursor
- a flat computer you can touch the screen to use
- these play sounds or music loudly
- you use this to type on a computer
Down
- you put these on your ears to listen to music
- this makes paper copies of your computer files
- a machine that helps you work, play or study
- phone you use this to call or text people everywhere
- you use this to take photos
12 Clues: you use this to take photos • these play sounds or music loudly • you use this to type on a computer • a small computer you can carry with you • you watch shows, movies, and news on this • a machine that helps you work, play or study • you put these on your ears to listen to music • this makes paper copies of your computer files • ...
Computer Vocabulary Terms 2014-08-26
Across
- punctuation mark basically a period.
- a place where, or a device through which, energy or information enters a system.
- an electronic device designed to accept data and perform prescribed mathematical and logical operations at high speed and display of these operations.
- computers a computer designed for use by one person at a time.
- a group or system of interconnected people or things.
- copy printed version on a paper of data held in a computer.
- brain of the computer.
- the act or process of orientating.
- unit a component of a computers central processing unit (CPU) that directs operation of the processor.
- line a location in a document where a visible digital signature can be inserted.
- a panel of keys that operate a computer or a typewriter
- is syntax to a computer programming language for defining data structures.
- containing structure or a layer.
- a long thin piece of metal on a scale or a dial that moves to indicate a figure or position.
- indicator that is used to show the position on a computer monitor
Down
- a fount.
- the amount of something produced by a person, machine, or industry.
- particular way of dealing with or considering something.
- looking for errors or omissions.
- skill or ability in a certain field.
- arrange or put into a format.
- symbol that indicates the position on a CRT or other type of display.
- a printed heading on stationary stating a persons or organizations name and address.
- the retention of retrievable data on a computer or other electronic system or memory.
- changing its contours or adding ornamental features.
- wrap a feature that automatically moves a word that is too long to fit on a line to the beginning of the next line.
- Photography. Any device for exposing an image on film , a sensitized plate by tracing light along a series of many closely spaced parallel lines.
- a drawing or sketch restricted to line without shading or modeling of form.
- selecting and preparing written, visual, audible and film media used to convey information.
- a key or command that toggles between two modes such as the caps lock key.
30 Clues: a fount. • brain of the computer. • arrange or put into a format. • looking for errors or omissions. • containing structure or a layer. • the act or process of orientating. • punctuation mark basically a period. • skill or ability in a certain field. • changing its contours or adding ornamental features. • a group or system of interconnected people or things. • ...
30 Computer Vocab Terms 2014-08-22
Across
- / the original draft of a diplomatic document.
- page / a page at the beginning of a book giving its title.
- Wrap / a feature that automatically moves a word that is too long to fit on a line to the beginning of the next line.
- Checker / a computer program that checks the spelling of words in text.
- / the action of showing something to be right or reasonable.
- / a note or record made for future use.
- Notation / a special notation at the end of a letter that indicates copies of the letter were sent to the person's listed.
- Business Letter / is written from an individual to a company or organization.
- / the study of people's efficiency in their working environment.
- / facts and statistics collected together for reference or analysis.
- Address / It provides the recipient to determine how to respond to the sender of the message if needed.
- / is short for Gross Words A Minute.
Down
- Software / is a set of one or more programs designed to carry out operations for a specific application.
- / the programs and other operating information used by a computer.
- Printer / a printer, linked to a computer, producing good-quality printed material.
- / To enter information into a computer.
- keyboard / with the letters q, w, e, r, t, and y.
- Spacing / the type of spacing where you would manually press the enter key four times.
- / the determination of the relative position of something or someone.
- Checker / it is a program, or part of a program, that attempts to verify written text for grammatical correctness.
- Processing / the production, storage, and manipulation of text on a computer or word processor.
- Letter / is usually a letter from one company to another.
- / a printed heading on stationery stating a person's or organization's name and address.
- Report / short reports that are prepared without binders or covers.
- / arrange or put into a format.
- / an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed.
- Software / is computer software designed to operate and control the computer hardware.
- Spacing / is the vertical distance between lines of text.
- technician / Serves customers by installing and servicing systems and products.
- copy / a printed version on paper of data held in a computer.
30 Clues: / arrange or put into a format. • / is short for Gross Words A Minute. • / To enter information into a computer. • / a note or record made for future use. • / the original draft of a diplomatic document. • keyboard / with the letters q, w, e, r, t, and y. • Letter / is usually a letter from one company to another. • ...
Tecnologie Informatiche 2018-11-28
Across
- Nel foglio di calcolo è preceduta dall'uguale (7)
- Sistema di numerazione legato alla tecnologia del funzionamento dei computer (7)
- Topo informatico (5)
- Programma per navigare in Internet che inoltra la richiesta di un documento alla rete e ne consente la visualizzazione una volta arrivato (7)
- La macchina di Turing fu ideata da Alan Turing per decrittare quale altra macchina...(6)
- Schermo (7)
- Insieme di computer interconnessi (4)
- Registrare dati su un CD/DVD (12)
- Serve per stampare un documento (9)
- Dispositivo per l'acquisizione di immagini e testo (7)
- Personal Computer (2)
- Programma in grado di cancellare o rovinare i file di un PC (5)
- Siti internet che forniscono agli utenti della rete dei punti d'incontro virtuale per scambiarsi messaggi, chattare, condividere foto e video, ecc. (2 parole, 13)
- Nome della chiavetta USB (8)
- Viene memorizzato su un supporto di memoria (4)
- Megabyte scritto con due lettere (2)
- Parte logica del PC (8)
- Persone che utilizzano i programmi (6)
- Una sequenza di 8 bit (4)
- Tasto che viene utilizzato assieme a C per copiare, assieme a X per tagliare e assieme a V per incollare (4)
- Simbolo di identificazione di un programma (5)
- Lavagna multimediale interattiva (3)
Down
- Tastiera e mouse sono dispositivi di ...(5)
- Dispositivo mobile che molte persone tengono in tasca (10)
- Insieme delle componenti fisiche del PC (8)
- Famoso motore di ricerca (6)
- Piccola telecamera del computer (6)
- Persona in grado di scrivere programmi per il computer (13)
- Foglio elettronico in inglese (11)
- Operazione per passare da un numero decimale a un numero binario (9)
- Periferica di input per inserire manualmente i dati (8)
- E' più grande del gigabyte (8)
- Contenitore preposto ad accogliere la maggior parte dei componenti di un computer (4)
- 1024 byte ne formano uno (8)
- Computer portatile di dimensioni ridotte (6)
- Scrivania del computer (7)
- Posta elettronica (5)
- Programma di elaborazione di testi e videoscrittura del software LibreOffice (6)
- Si scrive sempre prima dell'estensione (5)
- La più piccola unità di misura informatica (3)
- Programma di foglio elettronico del software LibreOffice (4)
- Compact Disc (2)
42 Clues: Schermo (7) • Compact Disc (2) • Topo informatico (5) • Personal Computer (2) • Posta elettronica (5) • Parte logica del PC (8) • Una sequenza di 8 bit (4) • Scrivania del computer (7) • Famoso motore di ricerca (6) • 1024 byte ne formano uno (8) • Nome della chiavetta USB (8) • E' più grande del gigabyte (8) • Registrare dati su un CD/DVD (12) • Foglio elettronico in inglese (11) • ...
Techno2 2024-07-14
Across
- Computing - The use of quantum-mechanical phenomena such as superposition and entanglement to perform computation.
- - A software application that runs automated tasks.
- Reality - The use of computer technology to create a simulated environment.
- Language Processing - The ability of a computer program to understand human language as it is spoken.
- - The branch of technology that deals with the design, construction, operation, and application of robots.
- Intelligence - The simulation of human intelligence by machines.
- Vehicles - Vehicles that are capable of sensing their environment and moving safely with little or no human input.
- Mining - The practice of examining large databases to generate new information.
- Learning - A subset of AI that involves the development of algorithms that allow computers to learn from and make predictions based on data.
- - The fifth generation of mobile network technology.
- Network - A computer system modeled on the human brain and nervous system.
- Analytics - The use of statistics and modeling techniques to predict future outcomes based on historical data.
- Science - An interdisciplinary field that uses scientific methods, processes, and algorithms to extract knowledge from data.
- Vision - A field of AI that trains computers to interpret and understand the visual world.
- Reality - Technology that overlays digital information on the real world.
- Home - A home equipped with lighting, heating, and electronic devices that can be controlled remotely by smartphone or computer.
Down
- - A system of recording information in a way that makes it difficult to change or hack.
- Technology - Technology that uses AI and machine learning to provide advanced services.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - The use of technology to perform tasks without human intervention.
- - Measures taken to protect a computer or computer system against unauthorized access or attack.
- - The process of converting information or data into a code to prevent unauthorized access.
- Technology - Electronic devices that are worn on the body as accessories or implants.
- Computing - The delivery of computing services over the internet.
- Data - Extremely large data sets that may be analyzed computationally.
- Computing - A distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
- of Things (IoT) - A network of physical objects embedded with sensors and software.
- Address - A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- - A computer program designed to simulate conversation with human users.
- Learning - A subset of machine learning involving neural networks with many layers.
30 Clues: - A software application that runs automated tasks. • - The fifth generation of mobile network technology. • Intelligence - The simulation of human intelligence by machines. • Computing - The delivery of computing services over the internet. • - The use of technology to perform tasks without human intervention. • ...
Cybersecurity crossword 2022-05-18
Across
- company security policy that allows for employees’ personal devices to be used in business.
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
- malware that functions by spying on user activity without their knowledge.
- technology that allows access to files/services through the internet from anywhere in the world.
- acronym that stands for distributed denial of service – a form of cyber attack.
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
- udio or video clip that has been edited and manipulated to seem real or believable
- internet version of a home address for your computer
- hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- defensive technology designed to keep the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
- umbrella term that describes all forms of malicious software
- tool that allows the user to remain anonymous while using the internet
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
- malware that allows cybercriminals to remotely control your computer.
- technique used to manipulate and deceive people to gain sensitive and private information
- form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
- group of computers, printers and devices that are interconnected and governed as a whole
- set of programs that tell a computer to perform a task
- Breaches the network to gain sensitive information with the owner’s consent
- this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- technique used by hackers to obtain sensitive information.
- piece of malware that can replicate itself in order to spread the infection to other connected computers
25 Clues: internet version of a home address for your computer • set of programs that tell a computer to perform a task • defensive technology designed to keep the bad guys out • technique used by hackers to obtain sensitive information. • umbrella term that describes all forms of malicious software • malware that allows cybercriminals to remotely control your computer. • ...
Vocab Review - Weeks 1-7 | 2025 2025-02-21
Across
- The central ‘processing’ unit of a computer.
- Another word for tiny bits of data that flow through the Internet till they get to their destination.
- You save a document on Google Drive, you save it to here. (It’s not really ‘fluffy.’)
- It means ‘to be concealed’ and is a feature on a web browser to avoid being tracked.
- To create a ‘grid’ in a Google document, you click on ‘INSERT’ and select this option.
- The college dropout took a class which gave him the idea of a computer company. What unusual class was this?
- The internal storage device in a computer.
- Thomas Edison’s ‘Voice Tube’ was called this.
- What the Internet was called when it was part of the Defense Department Advanced Research project.
- What the station master taught Thomas Edison after he saved his son’s life.
- In addition to the mouse, Doug Engelbart demonstrated this new way to link documents.
- Data about a person that might include a retina scan or facial geometry. Definitely PII!
- First name of the inventor of the World Wide Web
Down
- Any external device that provides input and output for the computer.
- A first working model of an invention meant to demonstrate. It’s not perfect.
- Last name of the cofounder of Apple computers.
- When there is a two-way flow of information between devices, you call this experience this. (See Engelbart handout.)
- The keyboard command for searching a word on a website, or any document.
- The tiny rectangle of hardware that ‘knows’ which circuits to use, and does math calculations.
- A person who operated a mainframe. She was called this!
- A competitor to AMD that manufactures microprocessors.
- One of Steve Jobs’ investments had more to do with movies than hardware.
- The part of the Web often not accessible to us because they are password protected.
- The main circuit board inside a computer on which is the CPU, Hard Drive, and RAM.
- What the earliest computer was called before we called it a computer. It filled a room!
- The second word of RAM
- Information that could specifically identify you: Three letters.
- What kind of software would be Linux or Windows? Not Application software, it’s_________ software.
28 Clues: The second word of RAM • The internal storage device in a computer. • The central ‘processing’ unit of a computer. • Thomas Edison’s ‘Voice Tube’ was called this. • Last name of the cofounder of Apple computers. • First name of the inventor of the World Wide Web • A competitor to AMD that manufactures microprocessors. • ...
Final activity #1 2024-11-21
Across
- is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
- An action or event that has the potential to compromise and/or violate
- The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- is a state of well-being of information and infrastructures.
- An individual who breaks into computer systems to steal, change, or destroy information.
- may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
- ensuring that the information/data can be accessed only by those authorized
- ensuring that the information is accessible to authorized persons when required without delay
- It is the Characteristics of the culture of computers, information, technology and virtual reality
- A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
Down
- the identification and assurance of the origin of information.
- Unauthorized access of or interference with computer systems, servers, or other information and communication systems
- is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
- An act or instance of using or closely imitating the language and thoughts of another author without authorization
- Any action derived from intelligent threats to violate the security of the
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
- ensuring that the information is accurate, complete, reliable, and is in its original form.
- A defined method of breaching the security of an IT system through vulnerability.
20 Clues: is a state of well-being of information and infrastructures. • the identification and assurance of the origin of information. • An action or event that has the potential to compromise and/or violate • Any action derived from intelligent threats to violate the security of the • ensuring that the information/data can be accessed only by those authorized • ...
magnani termini 2022-01-12
Across
- Marchio che indica la protezione dei diritti d’autore.
- Area di lavoro visualizzata sullo schermo e dedicata a un’applicazione.
- È il singolo punto luminoso del monitor.
- Memoria interna al processore, ad altissima velocità di accesso.
- Programma che può provocare danni temporanei o permanenti in un computer.
- Immissione, ingresso, indica i dati di ingresso in un programma.
- Posta elettronica, ossia messaggi inviati tramite computer collegati a Internet.
- Tipo di sistema operativo a interfaccia grafica.
- Computer portatili dalle prestazioni simili a quelle dei personal computer.
- sistema di numerazione in cui si utilizzano due soli numeri 0 e 1.
- tavolo di lavoro sul quale sono posti degli oggetti da richiamare con il mouse.
- Parti di una pagina web inserite in cornici e indipendenti l’una dall’altra.
- Dizionario dei sinonimi e contrari.
- Memoria di sola lettura utilizzata per istruzioni che non debbono essere cambiate.
- programma in grado di individuare un virus e di bloccarlo.
- supporto per la memorizzazione dei dati.
- È la scheda principale dove sono collegati tutti i componenti hardware del computer.
Down
- Collegamento tra un documento e un altro.
- contiene file e altre cartelle.
- Processo di estrazione dei dati da un database secondo certi criteri.
- Insieme dei dispositivi elettronici e meccanici del computer.
- Sono i collegamenti utilizzati per connettere periferiche dotate di questo tipo di interfaccia.
- insieme di 8 bit.
- Singolo documento di lavoro individuato da un nome.
- Codice segreto per accedere a risorse e informazioni riservate.
- Operazione che permette di caricare o scaricare dalla rete un file sul proprio computer che permette di caricare o scaricare dalla rete un file sul proprio computer.
- programma che permette l’accesso a internet e delle pagine web.
- Sigla utilizzata per indicare i possibili problemi legati all’anno 2000, pericolo di blocco dei sistemi informatici che utilizzano di due sole cifre per indicare l’anno.
- cifra binaria.
- profilo di un utente.
- Insieme completo di caratteri con lo stesso stile.
- Unità di memoria di massa di dimensioni superiori a quelle del floppy disk.
- Prospetto stampato che contiene i dati estratti da un database.
- È la principale unità di memorizzazione dei dati.
- Disegno di dimensioni ridotte che richiama la funzione ad essa associata.
35 Clues: cifra binaria. • insieme di 8 bit. • profilo di un utente. • contiene file e altre cartelle. • Dizionario dei sinonimi e contrari. • È il singolo punto luminoso del monitor. • supporto per la memorizzazione dei dati. • Collegamento tra un documento e un altro. • Tipo di sistema operativo a interfaccia grafica. • È la principale unità di memorizzazione dei dati. • ...
Office Essentials Concepts and Skills Vocab Crossword - Noah Gregory 2016-08-25
Across
- unique combination of letters or numbers that identifies a specific user to Windows.
- preforms specific action such as saving a file or obtaining help.
- enables you to view areas that cannot currently be seen on the screen.
- enable you to view areas that cannot currently be seen on the screen.
- the location of files that have been deleted
- control center in
- pressing on or more keys on the keyboard to perform a task.
- newest version of Microsoft Windows, which is a popular and widely used operating system.
- enables you to sign in to your user account and make the computer available for use.
- used to access apps, files, folders, and settings.
- allows you to access programs, folders, and files on the computer or mobile device and contains commands that allow you to start programs, store and search for documents, customize the computer or mobile device, and sign out of a user account or shut down the computer or mobile device.
- enlarge the window so that it fills the entire screen.
- named location on a storage medium that usually contains related documents.
Down
- a motion you make on a touch screen with the tip of one or more fingers or your hand.
- presents information about the document, the progress of the current tasks, and the status of certain commands and keys.
- list of related items, including folders, programs, and commands.
- private combination of letters, numbers, and special characters associated with the user name that allows access to a user’s account resources.
- screen when you first turn on the computer displaying time and date.
- portion of a document on the screen.
- identifies to Windows the resources, such as apps and storage locations, a user can access when working with a computer.
- named unit of storage
- horizontal or vertical bar that appears when the contents of a page may not be visible completely on the screen.
- set of programs that coordinate all the activities among computer or mobile device hardware.
- cloud storage service that provides storage and other services, such as Office Online, to computer users.
- consists of programs designed to make users more productive and/or assist them with personal tasks, such as word processing or browsing the web.
25 Clues: control center in • named unit of storage • portion of a document on the screen. • the location of files that have been deleted • used to access apps, files, folders, and settings. • enlarge the window so that it fills the entire screen. • pressing on or more keys on the keyboard to perform a task. • list of related items, including folders, programs, and commands. • ...
Internet & Security 2011-12-09
Across
- feature in internet explorer that lets you view websites without the browser storing data about your browsing session.
- to create a website that lloks exactly like another legitimate site on the web, but steals the information people enter.
- feature in the internet explorer that helps prevent websites or third-party developers from collecting information about the sites you visit.
- an illict activity used by hackers to trick computer users into revealing personal or financial through email massage or website.
- software that track a computer user's internet usage and sends this data back to the company or person that created it, usually without the computer user's permission or knowlegde.
- a feature in internet explorer 8 that hepls detect phishing websites.
- a descriptive word or phrase you enter to obtain a list of results that include that word or phrase.
- the steps a computer owner takes to prevent unauthorized use of or damage to the computer.
Down
- stores and organizes the link to the webpage that you want to revisit often.
- software that searches executable files for the sequences of characters that may cause harm and disinfects the files by erasing or disabling those commands.
- a software that lets you open and display website.
- window that opens on your screen as you visit websites, generally to advertise products you may or may not want.
- a string of at least eight characters of upper and lowercase letters and numbers.
- verifies the indentity of a person or indicates the security of a website.
- allows you to open more than one webpage at a time in a browser window.
- to break into a DNS server and redirect any attempts to access a particular website to a spoofed site.
- hardware or software that prevents other computers on the internet from accessing a computer or prevents a program on a computer from accessing the internet.
- a special website that searches the internet for websites based on words or phrases that you enter.
- a harmful program thyat intructs a computer to perform destructive activities, such as erasing a disk drive.
- a broad term that describes and program that is intended to cause harm or convey information to others withoutthe owner's permission.
20 Clues: a software that lets you open and display website. • a feature in internet explorer 8 that hepls detect phishing websites. • allows you to open more than one webpage at a time in a browser window. • verifies the indentity of a person or indicates the security of a website. • stores and organizes the link to the webpage that you want to revisit often. • ...
Chapter 1 Vocabulary 3 2015-02-23
Across
- A document that explains how to properly handle substances such as chemical solvents.
- The main board in the computer where the CPU, ROM chips, DIMMs, RIMMs, and interface cards are plugged into.
- A device used to measure various attributes of an electrical circuit-- most common measurements are voltage, current, and resistance.
- The program in system BIOS that can change the values in CMOS RAM.
- Measure of potential difference in an electrical circuit.
- A type of card that is a circuit board inserted into a slot on the motherboard to enhance the capability of the computer.
- The component where almost all processing of data and instructions takes place.
- A version of the ATX form factor that addresses some new technologies.
- A component in a computer or device that can be replaced without sending the computer or device back to the manufacturer.
- A self-diagnostic program used to perform a simple test of the CPU, RAM, and various I/O devices.
- A type of port designed to make installation and configuration of I/O devices easy, providing room for as many as 127 daisy-chained devices.
- A measure of electrical current.
Down
- The standard unit of measurement for electrical resistance.
- Memory used by the video controller.
- A set of specifications on the size, shape, and configuration of a computer hardware component.
- The other term for BIOS setup.
- Loose cables or cords in a traffic area where people can trip over them.
- A power connector with 15 pins that provides power to SATA drives.
- An older IDE cabling method that uses a 40-pin flat or round data cable or an 80-conductor cable and a 40-pin IDE connector.
- A test card installed in a slot on the motherboard that is used to help discover and report computer errors and conflicts that occur when a computer is first turned on and before OS is launched.
- The unit of electricity used to measure power.
- Firmware that can control much of a computer's input/output functions.
- BIOS that is responsible for controlling the computer when it is first turned on. It gives control over to the OS, once loaded.
23 Clues: The other term for BIOS setup. • A measure of electrical current. • Memory used by the video controller. • The unit of electricity used to measure power. • Measure of potential difference in an electrical circuit. • The standard unit of measurement for electrical resistance. • The program in system BIOS that can change the values in CMOS RAM. • ...
Computer Users health & safety 2022-08-30
Across
- The build-up of dust can (and surely does) impact your computer's performance for two main reasons: it causes the components of your computer to retain heat and it makes it more difficult for the internal fans to dissipate heat from the system, thereby decreasing the efficiency of the entire system.
- ...... a roughly be defined as the study of people in their working environment.
- This could be transferred by flash drives or CDs/DVDs from one computer to another and it has the potential of destroying your devices.
- is damage to the fingers and wrists due to repeated movements over a long period of time e.g. keying letters into keyboard.
- Do not put ...... objects into your computer system.
- ...... and tear of parts and circuitry is over time computers will wear down, simply because they are partial mechanical
- ......is an urgent, unexpected, and usually dangerous situation that poses an immediate risk to health, life, property, or environment and requires immediate action.
- Prolonged exposure to high ...... corrodes the components inside your computer, similar to the way damp air on a rainy day rusts metal left outdoors.
Down
- Pain that extends to the forearm to the hand, along with numbness and tingling in the thumb fingers.
- Also known as voltage fluctuation is a change in the power supply or voltage to electric appliances. Frequent power fluctuation can hamper the performance of electric appliances and reduce the life of appliances
- when the temperatures outside are extremely hot, it can shorten the lifespan of hardware inside your computer this is known as ......
- also called a directory, is a space used to store files, other folders, and shortcuts on a computer.
- Repetition, Lack of rest, and …. are the key factors of RSI .
- Computers are not always built perfectly, in which case the malfunction is the responsibility of the manufacturer ……… caused by them.
- Do not install or install computer software without a ........ permission.
- You should not change these without a teacher’s permission.
- Main used now for data storage. It should be ejected carefully from computers or you can corrupt your data.
- ...... are statements that say what a person is and isn't allowed to do. Following these prevents disorder.
- Creatures/pests not wanted in your computer or working environment.
- If you spill, they may cause short circuits or electric shocks inside the computers.
20 Clues: Do not put ...... objects into your computer system. • You should not change these without a teacher’s permission. • Repetition, Lack of rest, and …. are the key factors of RSI . • Creatures/pests not wanted in your computer or working environment. • Do not install or install computer software without a ........ permission. • ...
vocabulary crossword 2020-08-18
Across
- an act of selecting an option on an electronic interface by pressing a button or touching a screen.
- To copy the document, record or image being worked on to a storage medium. If the file has already been created on the hard disk, saving updates the file by writing the data currently in memory .
- is the process of replacing a product with a newer version of the same product.
- is so-called because it exists as a physical object.
- as to closely and quickly look at something, to use an electronic device to copy an image or text into a digital file, or to analyze verse into metrical verse.
- is a command that allows you to insert data from the clipboard into an application.
- resource for recording data discretely in a computer storage device.
- data is being sent from your computer to the Internet.
- is used to describe placing an object within another object.
- is to remove power from a computer's main.
- Is a pictogram or ideogram displayed on a computer screen in order to help the user navigate a computer system.
- is any information that is move from one location to another through some communication method.
- It temporarily stores files and folders before they are permanently deleted, allows you to delete items individually or restore them to their original location.
- refers to letting something go.
Down
- an act of selecting an option on an electronic interface by pressing a button or touching a screen.
- is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.
- is a collection of instructions that can be executed by a computer to perform a specific task.
- Describes the action of selecting an object or section of text and moving it, usually to drop in an alternate area.
- is new, improved, or fixed software, which replaces older versions of the same software.
- cease (or cause something to cease) business or operation.
- produce a paper copy of information stored on a computer.
- is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.
- is a file created by a software application.
- The storage area for information and applications.
- to mean "set up" or "put in place.
- the act of making the program ready for execution.
26 Clues: refers to letting something go. • to mean "set up" or "put in place. • is to remove power from a computer's main. • is a file created by a software application. • The storage area for information and applications. • the act of making the program ready for execution. • is so-called because it exists as a physical object. • ...
SeongHyeon Park_cross puzzle 2024-09-06
Across
- Firmware that initializes and tests hardware components during the computer's boot process.
- is a digital circuit used to perform arithmetic and logic operations
- A family of networking technologies used for local area networks
- is the primary component of a computer that acts as its “control center
- A storage device that uses spinning disks and magnetic storage to store data.
- A type of memory card used for storage in various devices.
- A standard for connecting peripheral devices to a computer and for data transfer.
- A small computer
- A video display interface used to connect a computer to a monitor.
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- Memory used to store data that is actively being used or processed by the computer.
- is an external storage array that supports only flash media for persistent storage
Down
- A hardware component that allows a computer to connect to a network.
- A processor designed for rendering graphics and performing parallel processing tasks.
- an interface for transferring data between a computer's central circuit board and storage devices
- is a standard interface used to connect storage devices, like hard disk drives, to computers
- is a type of flat panel display which uses liquid crystals in its primary form of operation
- A type of non-volatile memory used primarily in firmware and software that is not meant to be modified frequently.that, normally, can only be read, not written to.
- A standard for transmitting high-definition video and audio from a device to a display.
- A circuitry within a computer's processor that directs operations
- A user interface where interaction is done through text characters
- A storage device that uses flash memory to provide faster data access speeds compared to traditional hard drives.
- is a small and relatively inexpensive computer with a central processing unit (CPU) made up of a microprocessor
- A file system used by Windows operating systems that supports large volumes and files, as well as security features.
- A display standard and interface used to connect monitors to a computer, typically providing analog video output.
- that initializes and tests hardware components during the computer's boot process.
- A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units.
27 Clues: A small computer • A type of memory card used for storage in various devices. • A family of networking technologies used for local area networks • A circuitry within a computer's processor that directs operations • A user interface where interaction is done through text characters • A video display interface used to connect a computer to a monitor. • ...
CYBERCRIME INVESTIGATION 2021-07-19
Across
- refers to a set of instructions executed by the computer to achieve intended results.
- the interactional space or environment created by linking computers together into a communication network.
- the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- means any card, plate, code, account number, electronic serial number, personal identification number, or other telecommunications service, equipment, or instrumental identifier, or other means of account access that can be used to obtain money, good, services, or any other thing of value or to initiate a transfer of funds
- the system of hardware,software, facilities and service components that support the delivery of business systems and digital-enabled processes.
- a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.
- It is when an individual or entity who has knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f) of the Act, intentionally or by omission conceals the fact of such security breach.
- an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
- refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic document.
- refers to the transmission of information through ICT media, including voice, video and other forms of data.
- t is when an individual or entity with malice or in bad faith, discloses unwarranted or false information relative to any personal information or sensitive personal information obtained by him or her
- refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established
- any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175, Cyber Crime Prevention Act of 2012, DICT National Cyber Security 2022, and R.A. 10173, Data Privacy Act of 2012.
- refers to a secret code which secures and defends sensitive information that cross over public channels into a form decipherable only with a matching electronic key.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- is acquired and integrated to deliver and support the business outcomes, and the service objectives of cybercrime prevention and privacy protected data collection, retention, transmission, utilization, presentation, sharing, repurposing, and disposal.
- is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- represents the definitive view of the of privacy rights, privacy principles and security measuresin the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- is preservation of confidentiality, integrity and availability of
Down
- The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
- The access to the whole or any part of a computer system without right.
- refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
- The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
- refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.
- physical security is most sensitive component, as prevention from cybercrime. Computer network should be protected from access of unauthorized persons.
- those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
- means transferring, or otherwise disposing of, to another, or obtaining control of, with intent to transfer or dispose of.
- refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- is about single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security.
- refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- It is when personal information is made accessible due to negligence and without being authorized by any existing law.
- refers to a person who is intended by the originator to receive the electronic data message or electronic document.
- malicious software programs which are infiltrated into computers disguised as benign applications or data.
- refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
- the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error,accidents, harm or any other event in the Cyberspace which could be considered non-desirable.
- The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
- surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- terrorist activity that targets computer networks and information systems for attack.
- the act of copying digital material posted online into the storage medium on one’s computer.
- The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same,
- refers to a computer or a computer network, the electronic medium in which online communication takes place.
- is the condition of being protected
- the right to be left alone; freedom from observation and interference from others.
50 Clues: is the condition of being protected • is preservation of confidentiality, integrity and availability of • The access to the whole or any part of a computer system without right. • the right to be left alone; freedom from observation and interference from others. • refers to a set of instructions executed by the computer to achieve intended results. • ...
KB4 Technology 2021-04-19
Across
- something you use to go on the internet or send an email
- something you use to call or message someone
- a short film or recording that you can watch, for example, on YouTube
- something you use to take photos
- it is rectangular and similar to a large mobile phone or a small computer
Down
- the part of the computer that you look at
- something you use to click on the computer - you touch it with your hand
- something you press to turn the computer on
- something you use to listen to music
- a disc you use to watch films or record information
- a letter or message you send to someone on the internet
- a small computer that you can carry with you
- an electronic book
13 Clues: an electronic book • something you use to take photos • something you use to listen to music • the part of the computer that you look at • something you press to turn the computer on • something you use to call or message someone • a small computer that you can carry with you • a disc you use to watch films or record information • ...
adad 2022-03-16
Across
- the name given to a user on a computer or computer network
- central processing unit of the computer
- software utility designed to protect your computer or network against computer viruses
- a software program to present and explore content on the World Wide Web.
- Hypertext Markup Language
- electronic mail; system of sending messages through the internet
- random access memory [it goes away when one switches off]
Down
- free Internet browser officially released by Google on 2008
- fixed, magnetic disc inside a PC for (permanent) storing of data
- the alphanumeric keys or buttons used to input data [QWERTY = 1st 6 keys]
- Uniform Resource Locator
- a program dedicated to a specific task [eg: word processing, graphics etc]
- the programs, routines etc for a computer, not the hardware
13 Clues: Uniform Resource Locator • Hypertext Markup Language • central processing unit of the computer • random access memory [it goes away when one switches off] • the name given to a user on a computer or computer network • free Internet browser officially released by Google on 2008 • the programs, routines etc for a computer, not the hardware • ...
Cybersecurity - malware 2022-01-31
Across
- The Computer ____ Act makes it an offence to impair the operation of a computer
- Do this to movies or games from illegal websites to catch a become infected from a computer virus
- Gaining unauthorised access to a computer system
- Attacker demands that a ransom be paid before they decrypt files and unlock the computer
- A large collection of malware-infected devices
- Self-replicating software
Down
- May be disguised as a game which then gives an attacker access via a backdoor
- Malicious software
- Distributed Denial of Service attack
- Monitors and gathers information on a person and how they use their computer
- Replicates themselves and spread through the network and use the system's resources
- Displays malicious adverts or pop-ups
- Records every keystroke made by a user
13 Clues: Malicious software • Self-replicating software • Distributed Denial of Service attack • Displays malicious adverts or pop-ups • Records every keystroke made by a user • A large collection of malware-infected devices • Gaining unauthorised access to a computer system • Monitors and gathers information on a person and how they use their computer • ...
Autonomy Of Computer 2017-09-25
Across
- Old plug for printer or scanner
- Transfers life into the computer
- Old version for connecting the computer to the screen slower than USB
- A chip that performs system check when the computer is booting up
Down
- The main circuit of the computer that makes it run
- The place where the graphic card is stored
- Otherwise known as the central processor, the brains of the computer
- A fast storage unit that stores temporary data
- Alternative to computer speakers or for better sound quality
- It’s a connecter that let’s a larger amount of data be transferred not for charging
- Old plug for mice and keyboard
- Slots that let surrounding devices communicate with the processor faster
- A connector that lets data be transferred through can also be used for charging
13 Clues: Old plug for mice and keyboard • Old plug for printer or scanner • Transfers life into the computer • The place where the graphic card is stored • A fast storage unit that stores temporary data • The main circuit of the computer that makes it run • Alternative to computer speakers or for better sound quality • ...
My computer anatomy - Theshani 2017-09-22
Across
- performs basic input and output operations of a computer system.
- activates when you turn on the computer
- supplies power to a computer through multicolored wires.
- transfers images to the computer
- slots that communicate with the processor and add devices such as modem
- used to connect, mice, keyboards, modems and printers.
- holds many crucial components, including the central processing unit (CPU), memory and connectors for input and output devices.
Down
- used to transfer data into and out of the computer.
- provides better sound quality
- used to connect and transfer data to older printers and scanners.
- port that transfers data extremely fast (400mbps)
- port that is used to connect to keyboards and mice
- memory or information storage inside a computer that is used to store programs and data.
13 Clues: provides better sound quality • transfers images to the computer • activates when you turn on the computer • port that transfers data extremely fast (400mbps) • port that is used to connect to keyboards and mice • used to transfer data into and out of the computer. • used to connect, mice, keyboards, modems and printers. • ...
Security risks and precautions 2023-08-28
Across
- A person seeking to gain unauthorised access to a computer system or network.
- A security system which monitors outgoing and incoming network traffic.
- Text which has been encrypted.
- cipher An old method of encryption.
- Changing cipher text back to plain text.
- A number or code which is used to encrypt or decrypt data.
- A type of computer program which self-replicates and causes damage to a computer system.
Down
- A type of computer program which disguises itself as a harmless file.
- A term used to describe harmful software.
- Text which has not yet been encrypted.
- A computer program which self-replicates and spreads across a computer network.
- A method of protecting data by changing it into a code so unauthorised users cannot read it.
- Changing plain text to cipher text.
13 Clues: Text which has been encrypted. • cipher An old method of encryption. • Changing plain text to cipher text. • Text which has not yet been encrypted. • Changing cipher text back to plain text. • A term used to describe harmful software. • A number or code which is used to encrypt or decrypt data. • A type of computer program which disguises itself as a harmless file. • ...
Science and Technology 2022-04-13
Across
- _______ and you select the
- _______.You type in words on
- _______ can be used for sending and receiving emails and for word processing (writing reports, letters, etc). You can also use the
- _______ . A laptop is a small computer that you can carry around with you and
- _______ to play the computer games. You log in/on with your
- ________ . Information is displayed on the
Down
- _______ (small pictures or symbols) using a mouse.
- _______ and print out documents on a
- _______ is a very small, flat computer that you work by touching the screen.
- _______ . A computer you used at home or work is a PC or
- _______ and
- _______ (=information) is stored in
- _______ on the hard disk or on a flash drive and CD-ROM. The programmes that are used to operate the computer are called
13 Clues: _______ and • _______ and you select the • _______.You type in words on • _______ (=information) is stored in • _______ and print out documents on a • ________ . Information is displayed on the • _______ (small pictures or symbols) using a mouse. • _______ . A computer you used at home or work is a PC or • _______ to play the computer games. You log in/on with your • ...
Input/Output Devices 2022-09-21
Across
- device that allows you to watch this super presentation
- we can see anythink bcs of this device
- Device where we plug in all devices
- you plug in to hear what your computer wanna tell you
Down
- this word can mean two devices that you plug in to computer
- type of device that send data to computer
- allows you to not use computer mouse
- we can hear your beautiful voice bcs of that device
- type of device that receives the data from computer
- allows you to connect the computer to the device without a cable
- allows you to know your location
11 Clues: allows you to know your location • Device where we plug in all devices • allows you to not use computer mouse • we can see anythink bcs of this device • type of device that send data to computer • we can hear your beautiful voice bcs of that device • type of device that receives the data from computer • you plug in to hear what your computer wanna tell you • ...
Computer History 2023-10-03
Across
- the first large-scale computer to allow use of vacuum tubes for computing
- Who created the vacuum tube to be used in computers?
- given credit for the first computer
- created the first computer program
- How did Herman Hollerith's machine work?
- Which computer programmer is given credit for the term computer "bug"?
Down
- What does ENIAC stand for?
- electronically controlled mechanical switches
- What was the first computer bug?
- a digital mechanical calculator
- What does IBM stand for?
11 Clues: What does IBM stand for? • What does ENIAC stand for? • a digital mechanical calculator • What was the first computer bug? • created the first computer program • given credit for the first computer • How did Herman Hollerith's machine work? • electronically controlled mechanical switches • Who created the vacuum tube to be used in computers? • ...
TECHNOLOGY VOCABULARY 2021-07-07
Across
- a unit of measurement of information
- a program used to view HTML documents
- transfer a file or program to a smaller computer
- RAM memory that is set aside as a specialized buffer storage
- crime committed using a computer and the internet
- adjusting the parts of something in relation to each other
Down
- a security system preventing access to a computer or network
- a part of RAM used for temporary storage of data
- a facial expression represented by a sequence of characters
- an online journal where people post about their experiences
- having an output that is proportional to the input
- fix a computer program piecemeal until it works
- a fault or defect in a computer program, system, or machine
- any small compartment
14 Clues: any small compartment • a unit of measurement of information • a program used to view HTML documents • fix a computer program piecemeal until it works • a part of RAM used for temporary storage of data • transfer a file or program to a smaller computer • crime committed using a computer and the internet • having an output that is proportional to the input • ...
Introduction to Autodesk Inventor 2024-01-07
Across
- A technical process in which engineering or design-related personnel use computer systems and software to draft architecture or objects
- Introduced in 1982
- Computer Aided Manufacturing
- A fundamental aspect that focuses on the creation, representation, and manipulation of digital models.
- The usage of CAD systems were primarily used in the _______ industry
- CAD
- Founded Autodesk, Inc.
- Is the core of simultaneous engineering
Down
- An integrated ______ that contains all the functions of a central processing unit of a computer
- An integrated package of mechanical CAE software tools
- A method of designing and developing products simultaneously
- The use of computer-based software to aid in design processes
- Introduced in 1999
- Massachusetts Institute of Technology
- A computerized method for predicting how a product reacts to real-world forces
- Computer Aided Drafting
16 Clues: CAD • Introduced in 1982 • Introduced in 1999 • Founded Autodesk, Inc. • Computer Aided Drafting • Computer Aided Manufacturing • Massachusetts Institute of Technology • Is the core of simultaneous engineering • An integrated package of mechanical CAE software tools • A method of designing and developing products simultaneously • ...
Science and Technology 2022-04-13
Across
- _______ and you select the
- _______.You type in words on
- _______ can be used for sending and receiving emails and for word processing (writing reports, letters, etc). You can also use the
- _______ . A laptop is a small computer that you can carry around with you and
- _______ to play the computer games. You log in/on with your
- ________ . Information is displayed on the
Down
- _______ (small pictures or symbols) using a mouse.
- _______ and print out documents on a
- _______ is a very small, flat computer that you work by touching the screen.
- _______ . A computer you used at home or work is a PC or
- _______ and
- _______ (=information) is stored in
- _______ on the hard disk or on a flash drive and CD-ROM. The programmes that are used to operate the computer are called
13 Clues: _______ and • _______ and you select the • _______.You type in words on • _______ (=information) is stored in • _______ and print out documents on a • ________ . Information is displayed on the • _______ (small pictures or symbols) using a mouse. • _______ . A computer you used at home or work is a PC or • _______ to play the computer games. You log in/on with your • ...
Computer Crime 2022-11-28
Across
- a computer software that is used to hack a computer by making the program look as something good
- when someone sends a suspicious email so you fall into a scam
- People who hack a system with bad intentions
- a computer program that copies itself and workds by itself
- a security measure used to protect personal information
- Someone who hacks a system with good intentions
- a program that is designed to damage a computer and it spreads by copying and attaching itself to a program or file
Down
- a harmful software
- program that searchs and eliminates viruses
- undesired emails or messages that are sent to numerous people
- programs or instruction of a computer
- To harras or harm someone through a compuuter
- the physical parts of a computer
13 Clues: a harmful software • the physical parts of a computer • programs or instruction of a computer • program that searchs and eliminates viruses • People who hack a system with bad intentions • To harras or harm someone through a compuuter • Someone who hacks a system with good intentions • a security measure used to protect personal information • ...
Computer Crime 2022-11-28
Across
- A harmful software.
- People who hack a system with bad intentions.
- undesired emails or messages that are sent to numerous people.
- A computer program that copies itself and workds by itself.
- Program that searchs and eliminates viruses.
- A computer software that is used to hack a computer by making the program look as something good.
- Programs or instruction of a computer.
Down
- A security measure used to protect personal information.
- Someone who hacks a system with good intentions.
- A program that is designed to damage a computer and it spreads by copying and attaching itself to a program or file.
- To harras or harm someone through a compuuter.
- When someone sends a suspicious email so you fall into a scam.
- The physical parts of a computer.
13 Clues: A harmful software. • The physical parts of a computer. • Programs or instruction of a computer. • Program that searchs and eliminates viruses. • People who hack a system with bad intentions. • To harras or harm someone through a compuuter. • Someone who hacks a system with good intentions. • A security measure used to protect personal information. • ...
steam 2024-10-01
Across
- A set of instructions that a computer executes to achieve a particular objective.
- Something put into a system, such as resources, information, or signals, in order to achieve a result.
- A flaw in a computer program that causes the program to produce an incorrect result or behavior.
- An ordered set of instructions that are used to carry out a task.
- A simulator that imitates a program or events.
- To identify bugs or errors in computer hardware or programs and fix them.
- A diagram that represents an algorithm, work flow, or process, and uses geometric symbols connected by arrows to show the direction of the flow of action.
- Scientists who apply their knowledge of computation to creating solutions using a computer system.
- Repeating process steps to continuously improve a work product.
- A small computer on a single integrated circuit containing a processor, memory, and programmable inputs and outputs.
Down
- A drag-and-drop programming environment where code blocks snap together to form a program.
- The science of creating solutions and solving problems using the help of a computer. Some of the areas of focus include software engineering, programming, data analysis, algorithms, graphics, and animation.
- A program that translates instructions or code into a language that can be read and understood by a computer.
- The process of solving problems using a series of steps.
- (LED) A semiconductor diode that emits light when conducting current.
- A method to analyze and record information about a program's execution.
- Something unexpected that happens while a program is running.
17 Clues: A simulator that imitates a program or events. • The process of solving problems using a series of steps. • Something unexpected that happens while a program is running. • Repeating process steps to continuously improve a work product. • An ordered set of instructions that are used to carry out a task. • ...
National Cybersecurity Month 2022-09-16
Across
- SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
- A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
- AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
- A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
- A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
- COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
- THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
- MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
- A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
- USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
- EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING
11 Clues: SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING • A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM • COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER • MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK • ...
Parts of a Computer by Aden Baruch 2019-02-07
Across
- The computers short term memory
- fan A fan that cools down the computer to make sure it doesn’t overheat
- Creates sound from the computer
- A display screen used to provide visual output from a computer
- A circuit in the computer that controls everything
Down
- Used to scroll around a computer
- Used to type words on a computer
- card A printed circuit board controlling output to a display screen
- pad Something you put your mouse on to not ruin the surface it’s on
- An interface between the computer and other computers or peripheral devices
- drive A storage device
11 Clues: drive A storage device • The computers short term memory • Creates sound from the computer • Used to scroll around a computer • Used to type words on a computer • A circuit in the computer that controls everything • A display screen used to provide visual output from a computer • card A printed circuit board controlling output to a display screen • ...
Review MID TEST ICT P1 2024-09-18
Across
- A computer is called a . . .
- All Buttons on Keyboard are called ___________________________________.
- CPU stands for . . .
- Machines help us to save . . .
Down
- A computer runs on . . .
- We can solve . . . on a computer.
- Machines are made by . . .
- CPU is the . . . of a computer.
- A computer works very . . .
- The Mouse is always kept on a . . .
- Machines make our work be . . .
11 Clues: CPU stands for . . . • A computer runs on . . . • Machines are made by . . . • A computer works very . . . • A computer is called a . . . • Machines help us to save . . . • CPU is the . . . of a computer. • Machines make our work be . . . • We can solve . . . on a computer. • The Mouse is always kept on a . . . • ...
Technical stuff 2013-11-22
Across
- the device used to scroll and click on a computer is called what?
- the screen is also refered to as the?
- Who invented apple?
- the device used to type words on a computer is called what?
- who founded the microsoft company?
- who uses the IOS system on thier products?
Down
- you cant have a computer without a...
- the main part of a computer is always what?
- this crossword is for Mr.____?
- what part of the computer protects the internal parts of the computer?
- in terms of computers, what is the abbreviation for computer processing unit?
11 Clues: Who invented apple? • this crossword is for Mr.____? • who founded the microsoft company? • you cant have a computer without a... • the screen is also refered to as the? • who uses the IOS system on thier products? • the main part of a computer is always what? • the device used to type words on a computer is called what? • ...
Computer Parts 2021-09-15
Across
- A device that allows you to input letters, numbers symbols into a computer
- Allows users to print items on paper
- Memory or information storage for the computer
- A small computer contained on an integrated circuit
Down
- A video screen used for display
- A small disc that stores computer data or music
- A special circuit that controls what is shown on the computer
- Memory that keeps it's content even when the computer is off
- A device that moves the cursor and select functions
- A data storage device for the computer
- Used to allow users to perform specific actions
11 Clues: A video screen used for display • Allows users to print items on paper • A data storage device for the computer • Memory or information storage for the computer • A small disc that stores computer data or music • Used to allow users to perform specific actions • A device that moves the cursor and select functions • A small computer contained on an integrated circuit • ...
Computer Parts 2021-09-15
Across
- Memory that keeps it's content even when the computer is off
- A small computer contained on an integrated circuit
- Used to allow users to perform specific actions
- A device that allows you to input letters, numbers symbols into a computer
- A special circuit that controls what is shown on the computer
Down
- A data storage device for the computer
- Allows users to print items on paper
- A video screen used for display
- A small disc that stores computer data or music
- Memory or information storage for the computer
- A device that moves the cursor and select functions
11 Clues: A video screen used for display • Allows users to print items on paper • A data storage device for the computer • Memory or information storage for the computer • Used to allow users to perform specific actions • A small disc that stores computer data or music • A small computer contained on an integrated circuit • A device that moves the cursor and select functions • ...
computer puzzle 2025-05-27
Across
- using the language and thoughts of other persons as ones original work
- acknowleding the original writer and the source it is taken
- the computer that communicate with each other
- multiple mismatch copies stored in different computers
- criminal activities done by the use of computer or internet to harm someone
- metropolitan area network
Down
- sending bulk of mail to destroy the server
- computer program that disrupts the normal functioning of the computer
- duplication of data at multiple places
- the highly technical people who secretly break into computer to steal information
- the main cable is the backbone of this network
- computer network restricted to an organization
12 Clues: metropolitan area network • duplication of data at multiple places • sending bulk of mail to destroy the server • the computer that communicate with each other • the main cable is the backbone of this network • computer network restricted to an organization • multiple mismatch copies stored in different computers • ...
Dov'è l'AI? 2026-01-08
Across
- Gas prodotto indirettamente quando si usa energia elettrica.
- Strumento come computer o telefono usato dallo studente.
- Insieme di cavi, antenne e router che trasportano i dati.
- Sistema per abbassare la temperatura dei server.
- Componente del computer molto potente che consuma molta energia.
- Sistema informatico che risponde alle domande usando calcoli matematici.
- Rete che permette alle domande e alle risposte di viaggiare.
Down
- Effetto prodotto dai computer quando lavorano molto.
- Computer molto potenti che elaborano le richieste degli utenti.
- Ciò che serve per far funzionare computer e reti.
- Grandi edifici pieni di computer dove lavorano le intelligenze artificiali.
- Risorsa usata per raffreddare i server nei data center.
12 Clues: Sistema per abbassare la temperatura dei server. • Ciò che serve per far funzionare computer e reti. • Effetto prodotto dai computer quando lavorano molto. • Risorsa usata per raffreddare i server nei data center. • Strumento come computer o telefono usato dallo studente. • Insieme di cavi, antenne e router che trasportano i dati. • ...
Computer equipment and phones 2021-10-22
Across
- It connects a piece of electrical equipment to the main supply of electricity.
- A part of a computer or a television on which pictures or words are shown.
- A small computer that is easy to carry, usually without a keyboard.
- It is used to carry electricity.
- You use it to charge your phone.
- You connect it to a computer to copy and store information.
Down
- You move it to select and move items on the computer screen.
- A machine for printing text on paper.
- A mobile phone that can be used as a small computer and connects to the internet.
- The set of letters that you touch to write on a smartphone, computer ...
- It produces sound.
- A small computer that can work with a battery and be easily carried.
12 Clues: It produces sound. • It is used to carry electricity. • You use it to charge your phone. • A machine for printing text on paper. • You connect it to a computer to copy and store information. • You move it to select and move items on the computer screen. • A small computer that is easy to carry, usually without a keyboard. • ...
computer systems crossword 2016-06-21
Across
- is used to describe physical parts of computer monitors, keyboards etc.
- is the amount of something produced by a machine
- is an electronic data storage
- a device on which information can be saved
- is a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer
Down
- is a set of instructions to follow in order to run for all computers
- is a 3D printing, also known as additive manufacturing
- (Central Processing Unit) is the core of every Personal Computer
- is the process of entering data into a computer system
- is the part of the computer which processes or deals with the data
- is a machine which responds to instructions to computer a task
- is a magnetic storage device for digital data.
12 Clues: is an electronic data storage • a device on which information can be saved • is a magnetic storage device for digital data. • is the amount of something produced by a machine • is a 3D printing, also known as additive manufacturing • is the process of entering data into a computer system • is a machine which responds to instructions to computer a task • ...
J3 TECHNOLOGY 2025-05-07
Across
- These play music or sounds loudly so everyone can hear.
- A small computer you can carry and use anywhere.
- A small tool you move with your hand to click on things on the computer.
- The part of a computer or TV you look at.
- You use this to type letters and numbers on a computer.
- A device you use to work, play games, or go online.
Down
- You wear these on your ears to listen to music quietly.
- flat computer with a touchscreen, like a big phone.
- A phone you can carry with you to call, text, or go online.
- A device that puts words or pictures from the computer onto paper, it can make photocopies.
- A device that takes pictures or videos.
- A device that shows movies, shows, and news.
12 Clues: A device that takes pictures or videos. • The part of a computer or TV you look at. • A device that shows movies, shows, and news. • A small computer you can carry and use anywhere. • flat computer with a touchscreen, like a big phone. • A device you use to work, play games, or go online. • You wear these on your ears to listen to music quietly. • ...
Computers 2015-02-13
Across
- to have a short conversation with someone on a computer using either text or voice.
- to ensure the words you enter into a computer are correct.
- to write data to a disk drive so it is not lost.
- to turn a computer off and then on because there is a problem.
- to turn on a computer and load the operating system.
Down
- to make a copy of all files on a computer for security.
- to copy information from the internet from the internet to a computer.
- to photograph a paper document so it can be used electronically.
- to speak to another person using computers, using voice or video.
- to look at different websites on the internet.
- a Computer stops working because there is a problem.
- to search for information on the internet.
12 Clues: to search for information on the internet. • to look at different websites on the internet. • to write data to a disk drive so it is not lost. • a Computer stops working because there is a problem. • to turn on a computer and load the operating system. • to make a copy of all files on a computer for security. • ...
Computer equipment and phones 2021-10-22
Across
- It connects a piece of electrical equipment to the main supply of electricity.
- A part of a computer or a television on which pictures or words are shown.
- A small computer that is easy to carry, usually without a keyboard.
- It is used to carry electricity.
- You use it to charge your phone.
- You connect it to a computer to copy and store information.
Down
- You move it to select and move items on the computer screen.
- A machine for printing text on paper.
- A mobile phone that can be used as a small computer and connects to the internet.
- The set of letters that you touch to write on a smartphone, computer ...
- It produces sound.
- A small computer that can work with a battery and be easily carried.
12 Clues: It produces sound. • It is used to carry electricity. • You use it to charge your phone. • A machine for printing text on paper. • You connect it to a computer to copy and store information. • You move it to select and move items on the computer screen. • A small computer that is easy to carry, usually without a keyboard. • ...
Computer Terminology 2021-11-19
Across
- Conducts electricity.
- The brain of the computer
- A device which can be slotted into a computer to allow the use of audio components for multimedia applications.
- A program used to start the computer when you turn it on
- electronic storage that comes build in the device
- super-fast and temporary data storage space that a computer needs
Down
- A connector for a device that sends or receives several bits of data simultaneously by using more than one wire.
- A small processor
- This component oversees converting electricity into low voltage DC power.
- super-fast and temporary data storage space that a computer needs
- The standard plug to attach peripheral devices to a computer.
- A circuit board inside the computer
- A connector by which a device that sends data one bit at a time may be connected to a computer.
13 Clues: A small processor • Conducts electricity. • The brain of the computer • A circuit board inside the computer • electronic storage that comes build in the device • A program used to start the computer when you turn it on • The standard plug to attach peripheral devices to a computer. • super-fast and temporary data storage space that a computer needs • ...
Motherboard 2025-02-19
Across
- a collection of electronic components on a motherboard that manages the flow of data between the CPU, GPU, RAM, storage, and peripherals
- Where do things like headphones get plugged in?
- What is used to connect storage devices to your computer?
- Main circuit board of the computer. Has on it the CPU, memory boards, device boards, power plugs, etc.
- The box that converts power into the computer.
Down
- Allows you to connect expansion cards to your computer.
- This part needs to start before you can operate the computer.
- Connects external devices to the computer.
- The outlet that allows you to exchange data with an external device.
- Main memory. Volatile memory that is erased when power is turned off.
- Generates pixels that creates images.
- The brain of the computer.
12 Clues: The brain of the computer. • Generates pixels that creates images. • Connects external devices to the computer. • The box that converts power into the computer. • Where do things like headphones get plugged in? • Allows you to connect expansion cards to your computer. • What is used to connect storage devices to your computer? • ...
Computer Terms by Connor Barton 2015-01-28
Across
- to move a cursor on a computer screen.
- system the software that supports a computer's basic functions.
- disk drive read-only memory in Technology Expand. storage.
- the machines, wiring, and other physical components of a computer or other electronic system.
- maintain regular surveillance over.
- the programs and other operating information used by a computer.
- sound, especially when recorded, transmitted, or reproduced.
- a thin sheet metal enclosure the mother board.
Down
- supply gives power to the computer
- video Disk Drive An optical storage medium with improved capacity
- main circut
- a panel of keys that operate a computer or typewriter.
- disk drive is a hardware device that reads data storage information.
- disk drive is the mechanism that controls the positioning
14 Clues: main circut • supply gives power to the computer • maintain regular surveillance over. • to move a cursor on a computer screen. • a thin sheet metal enclosure the mother board. • a panel of keys that operate a computer or typewriter. • disk drive is the mechanism that controls the positioning • disk drive read-only memory in Technology Expand. storage. • ...
Anatomy Of A Computer Crossword 2022-09-19
Across
- Supplies image to graphic organizer
- Brain of the computer
- improves sound quality
- Houses most computer components
- Supports functions on processor
- connects personal computers,audio, video
Down
- Converts system with power
- connects mouse and keyboard to computer
- sends information to peripheral device
- stores data relating to open programs
- store files on usb for later use
- socket connects to a serial interface
- starts a computer system,after shut off
13 Clues: Brain of the computer • improves sound quality • Converts system with power • Houses most computer components • Supports functions on processor • store files on usb for later use • Supplies image to graphic organizer • stores data relating to open programs • socket connects to a serial interface • sends information to peripheral device • connects mouse and keyboard to computer • ...
Computer Terminology 2012-12-15
Across
- Random Access Memory - the volatile or working memory of the computer
- Card/graphics card- A plug-in optional circuit card for an IBM PC
- Central processing unit- processor
- adjacent bits, usually eight, processed by a computer as a unit
- Storage of program-mes and data
- a device or unit that operates separately from the CPU but is connected to it
- Card- an ultra small flash memory card designed to provide high-capacity memory in a small size
- A bit or binary digit is the basic unit of information in computing and telecommunications
Down
- Drive- the mechanism that handles the reading, writing, and storage of data on the hard disk
- light-reflecting surface on which motion pictures, slides may be projected
- the ability of a Computer or film image to reproduce fine detail graphics
- smallest element of an image that can be individually processed in a video display system
- Read Only Memory- computer memory in which data is permanently stored
- high speed memory that improve computer perform
14 Clues: Storage of program-mes and data • Central processing unit- processor • high speed memory that improve computer perform • adjacent bits, usually eight, processed by a computer as a unit • Card/graphics card- A plug-in optional circuit card for an IBM PC • Random Access Memory - the volatile or working memory of the computer • ...
Computer science 2013-10-09
Across
- short version of Central Processing unit
- an input device that can go in your ears
- a name for the ones and zeros
- a disk that can hold a film is called a..
- a longer version for GB
- read only memory
- main output on a computer
Down
- attached to CPU
- first word of R.A.M
- an out put that plays music out loud
- the memory used when RAM is full
- Volitile
- a word that begins with O and is about DVDs
- microphones are an..
14 Clues: Volitile • attached to CPU • read only memory • first word of R.A.M • microphones are an.. • a longer version for GB • main output on a computer • a name for the ones and zeros • the memory used when RAM is full • an out put that plays music out loud • short version of Central Processing unit • an input device that can go in your ears • a disk that can hold a film is called a.. • ...
Computer Terminology 2017-09-18
Across
- 1's and 0's
- Software is a collection of code that gets transferred into your computer adding more things you could do with it
- Permanent memory
- OS
- Info transcribed through the internet
- Fast temporary memory
- The dots on a screen
- Anything that can be recognized by us or the machine
Down
- Info transcribed through the internet
- Universal Serial Bus
- CPU
- power supply unit
- Hardware is a physical device that you insert or add onto your computer
- Examples of this are mouses, keyboards, and speakers
- Adds info to computer
15 Clues: OS • CPU • 1's and 0's • Permanent memory • power supply unit • Universal Serial Bus • The dots on a screen • Adds info to computer • Fast temporary memory • Info transcribed through the internet • Info transcribed through the internet • Examples of this are mouses, keyboards, and speakers • Anything that can be recognized by us or the machine • ...
Computer Components 2020-09-20
Across
- A device designed to draw heat away from the CPU, keeping it stable and running efficiently.
- The brains of the computer where most of the calculations/instructions take place.
- A processor specialised for display functions; renders images, animations and video for the computer's screen.
- Used to pull cool air into and push hot air out of a computer.
- A computer disk drive that reads and writes data from optical disks (e.g. DVDs) using a laser.
- A card that is installed in a computer (on the motherboard) so that it can be connected to a network (and the Internet!)
- the part of the computer where data is stored permanently.
Down
- used in high-end computers, reaching much lower temperatures and cooling more efficiently.
- A hardware component that distributes power to the computer's components.
- Contains all of the computer’s internal components.
- A device that attaches to a component to keep it from overheating. This absorbs heat and dissipates it into the air.
- A storage device used in place of a hard disk because of its smaller size, greater durability and much greater speed.
- The main circuit board in a computer, which all of the other circuits and components connect to.
- Used by the CPU to store data that is currently being used by the computer. It does not store any information permanently.
14 Clues: Contains all of the computer’s internal components. • the part of the computer where data is stored permanently. • Used to pull cool air into and push hot air out of a computer. • A hardware component that distributes power to the computer's components. • The brains of the computer where most of the calculations/instructions take place. • ...
Computer Terms 2018-12-14
Across
- Hard-Disk-Drive (short).
- Portable Hard-drive (another word for Portable).
- Main peripheral device for writing.
- Electricity supply (another word for Electricity).
- Main component for computers.
- A Box that enables Internet connection.
Down
- Solid-State-Drive (short).
- Main Hardware for Computing processes.
- Secondary peripheral device for general purposes.
- The most used Operating System for PCs.
- Technical term for Programs.
- Computer components.
- Another form of Computer.
- Random Access Memory (short).
14 Clues: Computer components. • Hard-Disk-Drive (short). • Another form of Computer. • Solid-State-Drive (short). • Technical term for Programs. • Main component for computers. • Random Access Memory (short). • Main peripheral device for writing. • Main Hardware for Computing processes. • The most used Operating System for PCs. • A Box that enables Internet connection. • ...
Computer Science 2019-03-07
Across
- the amount of time a message takes to traverse a system
- the number of bit errors per unit time
- a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
- a group of two or more computer systems linked together
- the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.
- a collection of data that can be used by computers which need to communicate with each other,
- one or more wires covered in a plastic covering that allows for the transmission of power or data between devices
- a computer program or device that provides a service to another computer program and its user, also known as the client
Down
- is the standard way to connect computers on a network over a wired connection
- a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves
- the amount of data that can be sent from one point to another in a certain period of time
- an Internet service that translates domain names into IP addresses.
- a set of rules or procedures for transmitting data between electronic devices, such as computers
- a device that forwards data packets along networks
14 Clues: the number of bit errors per unit time • a device that forwards data packets along networks • the amount of time a message takes to traverse a system • a group of two or more computer systems linked together • an Internet service that translates domain names into IP addresses. • is the standard way to connect computers on a network over a wired connection • ...
computer crossword 2023-02-13
Across
- brain of the computer
- to help the motherboard with sound
- It also lets the
- commonly used for storage
- much slower than new USB
- powers the mice
- connects many different peripherals
Down
- connects printers and scanners
- communicate with the PC’s peripherals
- houses your graphics card
- holds most of the computers parts
- stores data for the computer
- funnels power through the cables
- lets you add sound cards
14 Clues: powers the mice • It also lets the • brain of the computer • much slower than new USB • lets you add sound cards • houses your graphics card • commonly used for storage • stores data for the computer • connects printers and scanners • funnels power through the cables • holds most of the computers parts • to help the motherboard with sound • connects many different peripherals • ...
Computer science 2023-03-30
Computer Vocabulary 2022-03-02
Across
- a website that allows anyone to revise content
- a way of communicating wirelessly
- a self-contained program
- What You See Is What You Get
- uniform resource locater
- scrambles information
Down
- prevents unauthorized access
- a particular sort of lettering
- used to measure computer processing speed
- a small image or picture that is a symbol
- an area that has an available wireless signal
- a defect or fault in a program
- converts paper documents to electronic documents
- universal serial bus
14 Clues: universal serial bus • scrambles information • a self-contained program • uniform resource locater • prevents unauthorized access • What You See Is What You Get • a particular sort of lettering • a defect or fault in a program • a way of communicating wirelessly • used to measure computer processing speed • a small image or picture that is a symbol • ...
Computer Vocabulary 2023-10-30
Across
- To store a file on a computer.
- To move the contents of a window up or down or left to right using the mouse or trackpad.
- To change the size of an object on the screen.
- To exit a program or document.
- To remove an object from a computer.
- To enter text into a computer using a keyboard.
- To access a file that has been saved on a computer.
Down
- To enlarge a window to fill the entire screen.
- To remove the selection from an object on the screen.
- To press a button on a mouse or touchscreen.
- To choose an object on the screen.
- To change the location of an object on the screen.
- To search for the definition of a word or phrase.
- To reduce a window to a small icon on the taskbar.
14 Clues: To store a file on a computer. • To exit a program or document. • To choose an object on the screen. • To remove an object from a computer. • To press a button on a mouse or touchscreen. • To enlarge a window to fill the entire screen. • To change the size of an object on the screen. • To enter text into a computer using a keyboard. • ...
computer words 2025-05-13
Across
- A way to write a the logic of a computer program in plain english
- a data type found in computer programming that consists of alphanumeric characters
- The state of something with regard to its appearance
- control flow statement used in programming to execute a block of code repeatedly, a specific number of times
- The action or fact of carefully choosing someone
- It is a concise description of am issue that needs to be addressed.
Down
- A particular order in which related things to follow each other.
- An explanation or annotation added to your source code explain the purpose of the program
- a simple series of words or numerals
- the arrangement of words and phrases to create well formed sentences in a language
- The repetioin of a process
- A flow chart is a picture of the spearate steps of a process in sequential order
- A tool used by programmers to manually execute an algorithm ,step by step
- To not consistent or having a fixed pattern
14 Clues: The repetioin of a process • a simple series of words or numerals • To not consistent or having a fixed pattern • The action or fact of carefully choosing someone • The state of something with regard to its appearance • A particular order in which related things to follow each other. • A way to write a the logic of a computer program in plain english • ...
COMPUTER LANGUAGES 2025-06-14
Across
- Which translator works line-by-line?
- What is the language understood by a computer?
- What language is made of 0s and 1s?
- What converts high-level language to machine language?
- Which programming language is widely used in schools?
- What is the low-level language that uses symbols?
- What is the full form of GUI-based language?
- What is the first programming language taught in many schools?
Down
- What is the person who writes programs called?
- Which language is famous for its use in artificial intelligence?
- Which language is used for web designing?
- What is used to write software?
- What type of language is Python?
- Which language was developed by Microsoft?
- Which language is closest to human language?
15 Clues: What is used to write software? • What type of language is Python? • What language is made of 0s and 1s? • Which translator works line-by-line? • Which language is used for web designing? • Which language was developed by Microsoft? • Which language is closest to human language? • What is the full form of GUI-based language? • ...
Computer Languages 2025-05-30
Across
- convert high level language to low level language
- low level language
- First Generation Language
- third generation langauge
- Numbers in computer Language
- fifth generation language
Down
- The Process of Writing Program in computer language
- consists of binary number
- fourth level language
- Spider's House
- One
- program written in high level language
- set of rules governing the formation of statement in Programing language
- Zero
14 Clues: One • Zero • Spider's House • low level language • fourth level language • consists of binary number • First Generation Language • third generation langauge • fifth generation language • Numbers in computer Language • program written in high level language • convert high level language to low level language • The Process of Writing Program in computer language • ...
Computer Network 2025-09-16
Across
- of dividing large IP packets into smaller pieces. (FRAGMENT)
- of virtual circuit, a connectionless model. (DATAGRAM)
- routing protocol that uses areas. (OSPF)
- of breaking messages into smaller units for transmission. (PACKETIZING)
- method for delivering data to multiple receivers. (MULTICAST)
- gateway protocol for inter-domain routing. (BGP)
- multiple networks together. (INTERNETWORKING)
- network service model. (VC)
- protocol of the internet for addressing and routing. (IP)
- used for error reporting and diagnostics. (ICMP)
Down
- by the network to applications, defines performance and guarantees. (SERVICE)
- path forwarding multicast routing protocol. (DVMRP)
- to evaluate the “cost” of a route in routing algorithms. (METRICS)
- that assigns IP addresses dynamically. (DHCP)
- internet protocol with larger address space. (IPV6)
- vector routing protocol used in small networks. (RIP)
- used to map IP to MAC addresses. (ARP)
17 Clues: network service model. (VC) • used to map IP to MAC addresses. (ARP) • routing protocol that uses areas. (OSPF) • that assigns IP addresses dynamically. (DHCP) • multiple networks together. (INTERNETWORKING) • gateway protocol for inter-domain routing. (BGP) • used for error reporting and diagnostics. (ICMP) • path forwarding multicast routing protocol. (DVMRP) • ...
Computer terms 2021-02-25
Across
- namable unit of data storage, a single sequence of bytes.
- is a piece of computer software or hardware that restricts the data that is allowed to flow through
- is an indication of how quickly data travels along with a connection.
- to switch a computer off and on again.
- a program that you can use to look at and navigate between pages on the world wide web.
- unsolicited mail messages sent out in bulk and generally commercial in nature.
- a collection of computers that are connected
Down
- a graphical representation used to organize a collection of files
- a screen in a software program that permits the user to view several programs at once.
- an essential wiring that connects computers all around the world.
- checks the strings of letters and numbers that have to be typed in on some web pages before something can be saved.
- is a piece of software that can be a copy of itself and which attaches itself to some other program in order to survive and replicate.
- any device that holds computer data.
- was originally coined in the days when computers by converting numbers into sounds.
14 Clues: any device that holds computer data. • to switch a computer off and on again. • a collection of computers that are connected • namable unit of data storage, a single sequence of bytes. • a graphical representation used to organize a collection of files • an essential wiring that connects computers all around the world. • ...
il computer 2020-11-12
Across
- collegamento seriale ad alta velocità
- numero di pixel in orizzontale e in verticale nei quali l'immagine è suddivisa
- uscita
- dati in entrata
- tutto ciò che è pesante
- Digital Visual Interface
- elaborazione
Down
- Video Graphics Array
- tutto ciò che è leggero
- periferica con la coda
- la rete mondiale
- dispositivo portatile per telefonare e installare applicazioni
- disco di archiviazione dati
- porta che trasferisce contemporaneamente il segnale video e il segnale audio
14 Clues: uscita • elaborazione • dati in entrata • la rete mondiale • Video Graphics Array • periferica con la coda • tutto ciò che è leggero • tutto ciò che è pesante • Digital Visual Interface • disco di archiviazione dati • collegamento seriale ad alta velocità • dispositivo portatile per telefonare e installare applicazioni • ...
Computer history 2020-11-19
Across
- coined debugging
- computer for code-breaking
- first calculating device
- first programmer
- encryption device
- invented colossus
- developed a machine that helped break Enigma code
Down
- input device
- company started by Larry Page and Sergey Brin
- storage device
- Engine designed by charles babbage
- the first calculator or adding machine
- electronic device
- output device
14 Clues: input device • output device • storage device • coined debugging • first programmer • electronic device • encryption device • invented colossus • first calculating device • computer for code-breaking • Engine designed by charles babbage • the first calculator or adding machine • company started by Larry Page and Sergey Brin • developed a machine that helped break Enigma code
Computer Hardware 2021-08-21
Across
- core of computer
- laptop component is commonly found in the laptop lid
- the traditional magnetic disk devices
- place on the head
- gives application a place to store and access on short term basis
- connect with VGA/HDMI/Display Port
Down
- sound amplifier
- printed circuit board(PCB)
- qwerty123456!@#$%^
- mount and contain all the actual components inside a computer
- smile !!
- to drop the temperature
- to accelerate the rendering rate
- DPI control
14 Clues: smile !! • DPI control • sound amplifier • core of computer • place on the head • qwerty123456!@#$%^ • to drop the temperature • printed circuit board(PCB) • to accelerate the rendering rate • connect with VGA/HDMI/Display Port • the traditional magnetic disk devices • laptop component is commonly found in the laptop lid • mount and contain all the actual components inside a computer • ...
computer crossword 2022-02-22
Across
- Basic Input/Output System
- the processor.
- if you have an old printer you might need to plug it into a ________
- houses your graphics card
- ___ slots let peripherals communicate quickly
- Motherboards often have integrated _____ chips.
- much slower than new USB
Down
- houses most of the storage
- current ______ ports transfer data as fast as 400Mbps
- is the brain of the PC
- Although some newer mice and keyboards include USB cables, most require ____ ports
- funnels power through the multicolored
- you can plug most input devises in here such as a mouse
- the CPU stores temporary information here
14 Clues: the processor. • is the brain of the PC • much slower than new USB • Basic Input/Output System • houses your graphics card • houses most of the storage • funnels power through the multicolored • the CPU stores temporary information here • ___ slots let peripherals communicate quickly • Motherboards often have integrated _____ chips. • ...
computer viruses 2018-04-11
Across
- phones labtops gps
- involving science or industry
- unwanted computer software installed on your
- a virus where you are tricked into opening a love letter into your computer
- a type of virus named after a greek myth
- wearable technology
- gives off wifi
Down
- when someone tries to make a machine or network unavailable
- an email when someone attempts fraud
- a method of exchanging messages
- developed for use on a particular platform or device
- using or based on cleantech
- part of a computer system
- a virus that replicates itself
14 Clues: gives off wifi • phones labtops gps • wearable technology • part of a computer system • using or based on cleantech • involving science or industry • a virus that replicates itself • a method of exchanging messages • an email when someone attempts fraud • a type of virus named after a greek myth • unwanted computer software installed on your • ...
Computer Terminology 2018-09-14
Across
- a set of computer instructions in firmware which control input and output operations.
- a connector for a device that sends or receives several bits
- random-access memory
- a Power supply unit
- portable storage
- permanent software programmed into a read-only memory.
- An accelerated graphics port
Down
- small processor
- a connector by which a device that sends data one bit at a time
- a printed circuit board
- a type of port used by older computers
- (Central processing unit) / processor
- The Peripheral Component Interconnect
- memory read at high speed but not capable of being changed by program instructions.
14 Clues: small processor • portable storage • a Power supply unit • random-access memory • a printed circuit board • An accelerated graphics port • (Central processing unit) / processor • The Peripheral Component Interconnect • a type of port used by older computers • permanent software programmed into a read-only memory. • a connector for a device that sends or receives several bits • ...
Computer Terminology 2018-09-14
Across
- computers and their peripherals
- it carries out instructions
- a printed circuit board
- and output operations
- in firmware that control in
- port a serial communication interface
- use to connects to computers
Down
- of engineered products and systems
- a part of the computer that supplies power
- card audio components for multimedia applications
- port found on computers for connecting peripherals
- conducts electricity
- attaching devices to a computer
- video games or 3D video games
14 Clues: conducts electricity • and output operations • a printed circuit board • it carries out instructions • in firmware that control in • use to connects to computers • video games or 3D video games • computers and their peripherals • attaching devices to a computer • of engineered products and systems • port a serial communication interface • a part of the computer that supplies power • ...
Computer Science 2016-02-24
Across
- The sender and the receiver are active at different times
- An action that is used to gain unauthorized action and is illegal
- Web tool that creates slideshows with music, video, and photos
- Networks that are not geographically close
- Used to view webpages
- Code that can be detrimental to software
- The legal right to someones'work
Down
- This cache is usually used for international countries to view website
- Composed of files and tags is used to view via web browsers
- This task deals with keeping a website updated and running
- Networks that are geographically close
- The sender and the receiver are active
- editor Program that is used to edit text files
- Tags/codes that help make a webpage
14 Clues: Used to view webpages • The legal right to someones'work • Tags/codes that help make a webpage • Networks that are geographically close • The sender and the receiver are active • Code that can be detrimental to software • Networks that are not geographically close • editor Program that is used to edit text files • The sender and the receiver are active at different times • ...
computer hardware 2013-09-18
Across
- 1 trillion bytes
- 1000000 bytes
- the main circuit board of a micro computer.
- a silicon chip that contains a CPU
- a small electronic device made out of a semiconductor material
- controls all flow of information
- 1000 trillion bytes
Down
- 1 billion bytes
- processes all math equations
- is one unit of memory
- holds information in the computer while its on
- computer memory on which data has been prerecorded
- 1000 bytes
- a special high speed storage mechanism
14 Clues: 1000 bytes • 1000000 bytes • 1 billion bytes • 1 trillion bytes • 1000 trillion bytes • is one unit of memory • processes all math equations • controls all flow of information • a silicon chip that contains a CPU • a special high speed storage mechanism • the main circuit board of a micro computer. • holds information in the computer while its on • ...
coding/computer 2016-02-11
Across
- somewhere you go to type
- a web browser we use
- some you get that damages computes
- a browser we don't use
- somewhere you go to see post
- where everything is to find
Down
- glitches you get
- somewhere you go to type with others
- somewhere you learn to code
- where all thing are passed by that you send to people
- another browser we use but less
- where memory is stored
- something you use so you don't do it 10 times
- were you learn to code more
14 Clues: glitches you get • a web browser we use • where memory is stored • a browser we don't use • somewhere you go to type • somewhere you learn to code • where everything is to find • were you learn to code more • somewhere you go to see post • another browser we use but less • some you get that damages computes • somewhere you go to type with others • ...
Computer Networks 2024-04-18
Across
- internet to keep working as it grows.
- maximum amount of data that can be sent over time
- process of finding a path from a sender to receiver
- interconnected computing system that is capable of sending or receiving data.
- ability of a system to work around problems.
- storing information over the internet
Down
- companies who sell access to the internet
- small chunk of any kind of data
- unique number assigned to a device on a network
- computer network that uses open protocols for communication
- inclusion of back-up elements in case one part fails.
- computer that passes information from one network to another
- physical object that can run a program
- sequence of directly connected computing devices that connect a sender to a receiver.
14 Clues: small chunk of any kind of data • internet to keep working as it grows. • storing information over the internet • physical object that can run a program • companies who sell access to the internet • ability of a system to work around problems. • unique number assigned to a device on a network • maximum amount of data that can be sent over time • ...
Computer hardware 2022-04-27
Across
- high-speed computer data-transfer interface that was used to connect personal computers to audio and video devices.
- A hardware interface used to connect a mouse or keyboard to a computer
- supply's power to all PC components
- can change the information
- connects all the hardware to the processer
- an interface that allows a PC to transmit or receive data one bit at a time.
- brain of the computer
- the program a computer's microprocessor uses to start the computer system after it is powered on
Down
- built-in slot that allows attachment of input devices
- there's a bunch of these in a CPU
- transmits or receives data down multiple bundled cables to a peripheral device such as a printer.
- input and output audio signals
- can't change the information
- stores and transfers data or power
14 Clues: brain of the computer • can change the information • can't change the information • input and output audio signals • there's a bunch of these in a CPU • stores and transfers data or power • supply's power to all PC components • connects all the hardware to the processer • built-in slot that allows attachment of input devices • ...
computer hardware 2023-08-09
Across
- Graphics Processing Unit Device responsible for rendering images and videos.
- Keyboard Peripheral used to input text and commands into the computer.
- Camera Component that converts visual information into data the computer can process.
- Sound Card Component that provides audio processing capabilities.
- Central Processing Unit The "brain" of the computer that performs calculations and executes instructions.
- Network Interface Card Device used to connect to the internet and other devices in a network.
- Mouse Peripheral used to move the cursor and interact with the computer.
- Hard Disk Drive Type of storage device that uses spinning disks.
- Fan Cooling system component that dissipates heat from the CPU.
Down
- Optical Drive Device used to read and write data from optical discs.
- Random Access Memory Short-term memory where active programs and data are stored.
- Power Supply Unit Converts electricity from the wall outlet into a form usable by computer components.
- Motherboard Main circuit board that connects all hardware components.
- Solid State Drive Newer storage device that uses flash memory for faster read/write speeds.
14 Clues: Fan Cooling system component that dissipates heat from the CPU. • Hard Disk Drive Type of storage device that uses spinning disks. • Sound Card Component that provides audio processing capabilities. • Optical Drive Device used to read and write data from optical discs. • Motherboard Main circuit board that connects all hardware components. • ...
Computer Networking 2022-11-16
Across
- the first attempt to create an integrated network in the 1970's
- IP addresses are used for _______ identification
- data that is broken down into parts
- a component in the URL that is the main part of the URL
- a type of switch that has a dedicated connection between 2 endpoints
- determines how data is to be transmitted
Down
- name for information sent across the internet
- this is the logical address used to connect to the internet
- a global connection of networks
- A primary reason why networking exists
- MAC is used for _____ identification
- this address is hardcoded into the computer
- this is the address that connects to the WWW
- acronym for "transmission control protocol"
14 Clues: a global connection of networks • data that is broken down into parts • MAC is used for _____ identification • A primary reason why networking exists • determines how data is to be transmitted • this address is hardcoded into the computer • acronym for "transmission control protocol" • this is the address that connects to the WWW • ...
computer network 2022-05-10
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Computer Language 2025-06-06
Across
- intuctions given to computers
- one of the most advance programming language
- has base 16
- a language understood by computers
- statement used to write something in python
- used to write codes for wide range apps
- used for taking inputs in python
Down
- contains only 0,1
- has base 8
- has base as 10
- lines of words understood by computers
- free easy programing language
- used for giving conditions in python
- used for making wesites
14 Clues: has base 8 • has base 16 • has base as 10 • contains only 0,1 • used for making wesites • intuctions given to computers • free easy programing language • used for taking inputs in python • a language understood by computers • used for giving conditions in python • lines of words understood by computers • used to write codes for wide range apps • ...
Computer language 2025-05-27
Across
- : A language used to style HTML content
- : A language used to make websites interactive
- : A programming language developed by Google
- : A superset of JavaScript with static typing
- : A language used for managing databases
- : An extension of C with object-oriented features
- : A programming language known for its simplicity
Down
- : A widely-used object-oriented programming language
- : A language developed by Apple for iOS and macOS apps
- : A block-based programming language for kids
- : The standard markup language for web pages
- : A modern programming language used for Android development
- : A server-side scripting language for web development
- : A dynamic programming language used in web development
14 Clues: : A language used to style HTML content • : A language used for managing databases • : The standard markup language for web pages • : A programming language developed by Google • : A block-based programming language for kids • : A superset of JavaScript with static typing • : A language used to make websites interactive • ...
Computer language 2025-05-19
Across
- Number consist 16 digits and has base 16
- Numbers system is understood by the Computer system
- numbers numbers system consist of 16 digits
- numbers number system contain s 0 and 1
- Leibniz. credited with the invention of the moderni Binary number system
- Number system number system consist of 8 digits
- most digit is called the mist significant digit
- What digit represents letters A-F in the Hexadecimal number system
Down
- A number system is the numbers of digits used in it
- numbers number system that contains 0 to 9
- India's greatest mathematician and astronomer
- By Which number we have to divide to convert decimal Number to Binary number
- addition techniques used to add binary numbers
- Arithmetic. processing may involve various kinds of arithmetic operations
- Which number system base is 10
- In Which equivalent is stored the data after its converted
- most digit is called the last significant digits
17 Clues: Which number system base is 10 • numbers number system contain s 0 and 1 • Number consist 16 digits and has base 16 • numbers number system that contains 0 to 9 • numbers numbers system consist of 16 digits • India's greatest mathematician and astronomer • addition techniques used to add binary numbers • Number system number system consist of 8 digits • ...
Computer Hardware 2025-09-15
Across
- system Manages the memory of every app
- Digital information Collects data to manipulate and transform.
- a set of specific instructions for the computer
- devices Allow your computer to display information
- Runss the computer
- The things you are able to see and touch
- time purchase no automatic renewals or ongoing fees.
- Installation The installation process is tied to the specific computer's operating system
Down
- application Programs that run on the computer that helps perform tasks
- Language Human readable way to write computer instructions
- Source Anyone can access
- Licenses Document Provides legally binding guiidelines.
- Information Binary numbers like 1 and 0.
- owned by individual or a group
- Memory long term data
15 Clues: Runss the computer • Source Anyone can access • Memory long term data • owned by individual or a group • The things you are able to see and touch • system Manages the memory of every app • Information Binary numbers like 1 and 0. • a set of specific instructions for the computer • devices Allow your computer to display information • ...
Computer Networks 2026-02-09
Across
- A network topology where all computers share one main cable
- Data transmission where data is sent in large blocks at regular intervals
- Data flows in both directions but only one at a time
- A public location that provides Wi-Fi access
- A type of network that uses physical cables
- A network topology where all computers are connected to a central device
- Data flows in both directions at the same time
- A network that covers a small area such as a school or home
Down
- A type of network that uses radio waves instead of cables
- Data transmission where data is sent one character at a time
- Data flows in one direction only
- A network topology where computers are connected in a circular loop
- A wireless local area network
- The central device in a star network
14 Clues: A wireless local area network • Data flows in one direction only • The central device in a star network • A type of network that uses physical cables • A public location that provides Wi-Fi access • Data flows in both directions at the same time • Data flows in both directions but only one at a time • A type of network that uses radio waves instead of cables • ...
computer parts 2025-10-21
Across
- connects a device to a network
- data transfer
- stores information on flash memory chips
- fetches, decodes, and executes instructions from software
- saving file icon
Down
- computer audio
- computer's heart
- in 1956 this weighed over a ton
- main circuit board
- used for crypto mining
- dissipates heat
- computer's short-term memory
- transmit multiple signals simultaneously
- interchangeable cards
14 Clues: data transfer • computer audio • dissipates heat • computer's heart • saving file icon • main circuit board • interchangeable cards • used for crypto mining • computer's short-term memory • connects a device to a network • in 1956 this weighed over a ton • transmit multiple signals simultaneously • stores information on flash memory chips • ...
Computer Terms 2025-10-29
Across
- Made up of buttons that reference letters, numbers, and symbols.
- a popular way for digital devices to connect to the Internet or to each other without wires. It uses radio waves to send information over short distances.
- a hardware device that allows a computer to generate sound.
- the working area of the computer screen. Icons and files may be placed here to access programs.
- an external hardware output device that prints copies of documents from a computer to a piece of paper.
- a name that was chosen for identification to log into a program.
- the side of your mouse you click to do most of your work
Down
- the screen of your computer, where you view the desktop, applications, or computer programs
- the side of your mouse you click to access a special menu or features
- a portable computer. The top half is the display, and the bottom half is a keyboard and trackpad.
- a word, phrase, or string of characters that a user keeps secret and uses to log into a program.
- a pointer that shows your position on a computer screen, and is used to make a selection.
- This takes an image, drawing, or body of text on a hard copy, or piece of paper and copies it into a digital file that can be viewed on a computer.
- Device that controls the cursor to select text, icons, files, or folders.
14 Clues: the side of your mouse you click to do most of your work • a hardware device that allows a computer to generate sound. • Made up of buttons that reference letters, numbers, and symbols. • a name that was chosen for identification to log into a program. • the side of your mouse you click to access a special menu or features • ...
Computer Components 2025-11-26
Across
- A fast storage device that uses flash memory instead of spinning disks.
- Keeps the computer components from overheating.
- Provides electrical power to all parts of the computer.
- Allows the computer to connect to a network or the internet.
- The primary storage device that uses spinning disks to store data permanently.
- An input device used to move a pointer and select items on the screen.
- An input device used to type text and commands.
Down
- An output device that displays visual information to the user.
- The main circuit board that connects all components of the computer.
- The main processor that performs calculations and executes instructions.
- Temporary memory used by the computer to store data for running programs.
- An output device that produces a hard copy of digital documents.
- A component that handles graphics and video processing.
- Reads and/or writes data to CDs, DVDs, or Blu-ray discs.
14 Clues: Keeps the computer components from overheating. • An input device used to type text and commands. • Provides electrical power to all parts of the computer. • A component that handles graphics and video processing. • Reads and/or writes data to CDs, DVDs, or Blu-ray discs. • Allows the computer to connect to a network or the internet. • ...
ICT Terms & Concepts 2021-09-13
Across
- Term associated with data stored on servers
- Manners online
- A harmful program
- A storage device
- A study of how to make the work environment comfortable
- To change the appearance of a document
- Copying someone else's work and using it as your own
- The act of doing something over and over again
Down
- Intimidating or threatening someone online
- How I can protect my files and data on my devices
- To receive data from the computer
- The fastest computer
- The position in which someone holds their body when sitting or standing
- Computer _____ Syndrome (CVS)
- Someone who gains illegal access to your computer
- An example of a popular search engine
- Allows me to quickly move from one document to the next on the internet
17 Clues: Manners online • A storage device • A harmful program • The fastest computer • Computer _____ Syndrome (CVS) • To receive data from the computer • An example of a popular search engine • To change the appearance of a document • Intimidating or threatening someone online • Term associated with data stored on servers • The act of doing something over and over again • ...
Pl 2014-11-27
Across
- A box that you use to get the internet.
- When you erase something.
- When you click on a link and a website appears for example.
- A shortcut for cut.
- Something where you can save your file, out from your computer.
- A problem like when your computer stop, crash.
- Looking for something.
- When you put something on your computer’s memory.
- A shortcut to search something.
- Something with a screen and a keyboard.
- Make something disappear.
Down
- The thing that open itself when you go in internet.
- A free software which anybody can add it.
- Put a computer file on paper.
- Something that enable you to listen to CDs.
- Make a picture with a pencil or crayon.
- Give a level up to something.
17 Clues: A shortcut for cut. • Looking for something. • When you erase something. • Make something disappear. • Put a computer file on paper. • Give a level up to something. • A shortcut to search something. • A box that you use to get the internet. • Make a picture with a pencil or crayon. • Something with a screen and a keyboard. • A free software which anybody can add it. • ...
Placier_Rochette_Crossword_Computer_Definition 2014-11-27
Across
- The thing that open itself when you go in internet.
- When you click on a link and a website appears for example.
- Make something disappear.
- When you erase something.
- When you put something on your computer’s memory.
- : Something with a screen and a keyboard.
- Put a computer file on paper.
- Something that enable you to listen to CDs.
- Something where you can save your file, out from your computer.
- A shortcut to search something.
- A box that you use to get the internet.
- A problem like when your computer stop, crash.
Down
- Give a level up to something.
- A free software which anybody can add it.
- A shortcut for cut.
- Looking for something.
- Make a picture with a pencil or crayon.
17 Clues: A shortcut for cut. • Looking for something. • Make something disappear. • When you erase something. • Give a level up to something. • Put a computer file on paper. • A shortcut to search something. • A box that you use to get the internet. • Make a picture with a pencil or crayon. • A free software which anybody can add it. • : Something with a screen and a keyboard. • ...
kruiswoordraadsel informatica 2018-11-13
Across
- Draadloos internet
- learning Computers leren denken zoals wij; computersysteem
- Dit voorwerp werd door verschillende personen tegelijk uitgevonden. Britten, Duitsers als Amerikanen
- Wanneer is wifi uitgevonden?
- intelligentie ander woord voor kunstmatige intelligentie
- '80 In welke jaren waren er 200 computers verbonden met het internet?
- Wat verovert onze wereld?
- De naam van de slimme computer van Google
- Het eerste woord dat effectief verzonden werd
Down
- Wanneer is het eerste woord verzonden via internet?
- Vul aan: elke radiozender heeft zijn eigen ...
- Naam van een slimme computer die de Amerikanen hebben uitgevonden.
- in Het eerste woord dat men wilde verzenden via wifi
- of things Verbinden van apparaten om gegevens te kunnen uitwisselen
- Een radio maakt gebruik van (electromagnetisch spectrum)
- Afkorting van het vorige antwoord.
- Afkorting van personal computer
17 Clues: Draadloos internet • Wat verovert onze wereld? • Wanneer is wifi uitgevonden? • Afkorting van personal computer • Afkorting van het vorige antwoord. • De naam van de slimme computer van Google • Het eerste woord dat effectief verzonden werd • Vul aan: elke radiozender heeft zijn eigen ... • Wanneer is het eerste woord verzonden via internet? • ...
ICT Terms & Concepts 2021-09-13
Across
- A harmful program
- An example of a popular search engine
- To receive data from the computer
- How I can protect my files and data on my devices
- Computer _____ Syndrome (CVS)
- The fastest computer
- Allows me to quickly move from one document to the next on the internet
- A study of how to make the work environment comfortable
- Copying someone else's work and using it as your own
Down
- Term associated with data stored on servers
- The position in which someone holds their body when sitting or standing
- A storage device
- The act of doing something over and over again
- Manners online
- Intimidating or threatening someone online
- Someone who gains illegal access to your computer
- To change the appearance of a document
17 Clues: Manners online • A storage device • A harmful program • The fastest computer • Computer _____ Syndrome (CVS) • To receive data from the computer • An example of a popular search engine • To change the appearance of a document • Intimidating or threatening someone online • Term associated with data stored on servers • The act of doing something over and over again • ...
INPUT/OUTPUT/PROCESS 2021-04-14
Across
- INPUT DEVICE TO SELECT OBJECTS ON COMPUTER.
- COMPUTER WORKS ON _____ CYCLE.
- DEVICES THAT ARE USED TO GIVE INSTRUCTIONS TO THE COMPUTER ARE CALLED ________ DEVICES.
- THE RESULT THAT WE GET FROM THE COMPUTER.
- AN INPUT DEVICE THAT IS USED TO TYPE NUMBERS AND ALPHABETS.
- AN INPUT DEVICE THAT IS USED TO SEND IMAGES TO A COMPUTER.
Down
- A BLACK BLINKING LINE OF THE SCREEN IS _________.
- ________ IS AN INPUT DEVICE THAT CAPTURE A PHOTOGRAPH.
- THE OUTPUT WE GET ON THE PAPER IS CALLED _________.
- OUTPUT DEVICE THAT IS ALSO KNOWN AS VDU.
- OUTPUT DEVICE THAT IS USED TO GET OUTPUT ON THE PAPER.
- THE INSTRUCTION THAT WE GIVE TO THE COMPUTER.
12 Clues: COMPUTER WORKS ON _____ CYCLE. • OUTPUT DEVICE THAT IS ALSO KNOWN AS VDU. • THE RESULT THAT WE GET FROM THE COMPUTER. • INPUT DEVICE TO SELECT OBJECTS ON COMPUTER. • THE INSTRUCTION THAT WE GIVE TO THE COMPUTER. • A BLACK BLINKING LINE OF THE SCREEN IS _________. • THE OUTPUT WE GET ON THE PAPER IS CALLED _________. • ...
German 2015-11-05
17 Clues: Cord,Kablo • Bulky,Ağır • Device,Alet • Access,Erişim • Chalk,Tebeşir • Channel,Kanal • Antenna,Anten • Change,Değişim • Connected,Bağlı • Broadcast,Yayın • ColorTV,RenkliTV • Comfortable,Rahat • Consumption,Tüketim • Computer,Bilgisayar • Blackboard,KaraTahta • BlackWhite,SiyahBeyaz • Communication,İletişim
