computing Crossword Puzzles
Computing systems 2022-10-20
ADSI Cristian Gomez 2022-02-17
Across
- a method of mathematical expression which uses only two symbols : typically "0"(zero) and "1"(one).
- is a collection of instructions that tell a computer how to work. this is in contrast to hardware
- is any goal-oriented activity requiring, benefiting from, or creating computing machinery
- is a style sheet language used for describing the presentation of a document written in a markup language such as HTML
- and individual facts, statistics, or items of information, often numeric.
- basic particle of electricity
Down
- is a branch of physics and electrical engineering that deals whit the emissions, behaviour and effects of electrons using electronic devices
- is a digital electronic machine that can be programmed to carry out sequences of arithmetic or logical operations
- is a sequence of instructions in a programming language that a computer can execute or interpret
- is a group of interacting or interrelated elements that act according to a set of rules to form a unified whole.
10 Clues: basic particle of electricity • and individual facts, statistics, or items of information, often numeric. • is any goal-oriented activity requiring, benefiting from, or creating computing machinery • is a sequence of instructions in a programming language that a computer can execute or interpret • ...
TLE Crossword Puzzle 2024-08-17
Across
- A small and inexpensive laptop designed primarily as a means of accessing the Internet.
- A device that uses continuous physical quantities to solve problems.
- A computer system, a combination of a computer processor, computer memory, and input/output peripheral devices that has a dedicated function within a larger mechanical or electronic system.
Down
- Small computing devices that are worn under, with, or on top of clothing.
- A type of computer with a high level of performance as compared to a general-purpose computer.
- A mobile device that combines the functionality of a traditional mobile phone with advanced computing capabilities
- Computers used primarily by large organizations for critical applications
- This is a combination of analog and digital computers.
- A programmable electronic device that processes numbers and words accurately and at enormous speed.
- A computer that provides information to other computers called "clients" on computer network.
10 Clues: This is a combination of analog and digital computers. • A device that uses continuous physical quantities to solve problems. • Small computing devices that are worn under, with, or on top of clothing. • Computers used primarily by large organizations for critical applications • ...
Good Technology 2020-04-14
5 Clues: for computing • just for calling • for calling but also for computing • the other name of computer but able to put it in your lap • a system what like it is have a heart but it is his CPU and motherboard
Smart Machine 2023-06-19
5 Clues: looks like a mini tablet • device which you can wear on your body • can be easily carried in your hand or bag • computing device kept on a desk or a table. • computing device that can be easily carried everywhere
NM Crossword 2024-09-13
Across
- The service model that provides virtualized computing resources over the internet
- A popular open-source platform for container orchestration
- A service model offering software applications over the internet
Down
- The process of distributing computing resources dynamically
- Virtualization technology developed by VMware
5 Clues: Virtualization technology developed by VMware • A popular open-source platform for container orchestration • The process of distributing computing resources dynamically • A service model offering software applications over the internet • The service model that provides virtualized computing resources over the internet
TC pret NC Stanislavs Kirvels 2015-04-02
Across
- Kas NC ir?
- kadai OS saimei bija izgudrots NC?
- Ar kadu versiju NC saka zaudet savu popularitati?
- TC izgudrotaja vards?
- Pirmais NC nosaukums?
- Kada NC versija izspieda savus konkurentus ?
Down
- Firma kur NC nomira?
- kada korporacija pieprasija izmainit nosaukumu uz TC?
- Kura ir vecaka NC vai TC ?
- Peter Norton Computing bija pirma vai otra NC kompanija?
- NC izgudrotaja vards?
- agrak Total vieta bija
12 Clues: Kas NC ir? • Firma kur NC nomira? • NC izgudrotaja vards? • TC izgudrotaja vards? • Pirmais NC nosaukums? • agrak Total vieta bija • Kura ir vecaka NC vai TC ? • kadai OS saimei bija izgudrots NC? • Kada NC versija izspieda savus konkurentus ? • Ar kadu versiju NC saka zaudet savu popularitati? • kada korporacija pieprasija izmainit nosaukumu uz TC? • ...
Technology in our lives 2024-12-21
Across
- – The practice of meeting current needs without harming future generations or the environment.
- – The use of machines or technology to perform tasks without human assistance.
- Computing – A type of computing that uses quantum mechanics to perform complex calculations much faster than traditional computers.
- – The practice of protecting computers, networks, and data from unauthorized access or attacks.
- – The science of building and using materials or devices at the nanoscale (extremely small sizes).
Down
- Intelligence – A branch of computer science that enables machines to perform tasks that typically require human intelligence, such as problem-solving and learning.
- – The process of creating new ideas, methods, or products that bring improvement or solve problems.
- Reality (AR) – A technology that overlays digital information or images on the real-world environment.
- – The ability to connect devices or systems to each other for communication and data exchange.
- Learning – A field of AI where computers learn from data and improve their performance without being explicitly programmed.
10 Clues: – The use of machines or technology to perform tasks without human assistance. • – The practice of meeting current needs without harming future generations or the environment. • – The ability to connect devices or systems to each other for communication and data exchange. • ...
The Internet Vocab Terms 2023-08-31
Across
- The unique number assigned to each device on the Internet.
- The latency of a system is the time it takes for a bit to travel from sender to receiver. Fiber optic cables have low latency.
- The common name used to help you find a resource on the internet
- The series of connections between computing devices on a network starting with a sender and ending with a receiver.
Down
- Used to translate domain names into IP addresses.
- The amount of data (in bits) that can be sent in a fixed amount of time.
- A group of interconnected computing devices capable of sending or receiving data.
- A protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- The maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- An agreed-upon set of rules that specify the behavior of some system
- A type of computer that forwards data across a network
11 Clues: Used to translate domain names into IP addresses. • A type of computer that forwards data across a network • The unique number assigned to each device on the Internet. • The common name used to help you find a resource on the internet • An agreed-upon set of rules that specify the behavior of some system • ...
Virtual Private Networks (VPN's) 2020-09-29
8 Clues: Safe • Distant, far away • encoding a message • A dedicated passageway • Exists and can be touched • The equipment used in computing • There is a logic gate named this • Underlying Framework of the system
Keywords 2022-05-12
Across
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- computing model that stores data on the Internet through a cloud computing provider who manages and operates data storage as a service
- electronic devices used to store data
Down
- a computer or computer program which manages access to a centralized resource or service in a network.
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- Domain Name System
- copy (data) from one computer system to another, typically over the internet.
- a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative mouldings
- a computer network security system that restricts internet traffic in, out, or within a private network.
9 Clues: Domain Name System • electronic devices used to store data • copy (data) from one computer system to another, typically over the internet. • a computer or computer program which manages access to a centralized resource or service in a network. • a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative mouldings • ...
Digital Citizenship Vocabulary 2024-10-24
Across
- Expert at programming who uses their skills to illegally access a computing device or online accounts
- When someone's identity or name is not known
- Image or personality that is presented to others
- Emails sent from fake accounts that try to trick someone into giving out their personal information including passwords or credit card numbers
- A secret combination of letters, numbers, and symbols used to verify a user on a computer system
- Program that is able to copy itself when it is run and cause harm to a computing device. This is a type of malware.
Down
- Program that restricts access to a computer by infecting it and demanding money be paid to the creator to remove it
- The act of behaving properly while using technology
- Online area where you enter information about yourself
- Software installed on a computer without permission from the computer's owner
10 Clues: When someone's identity or name is not known • Image or personality that is presented to others • The act of behaving properly while using technology • Online area where you enter information about yourself • Software installed on a computer without permission from the computer's owner • ...
COMPUTER SCIENCE 2025-01-07
Across
- Step-by-step procedure for solving a problem or performing a task, often used in programming.
- The process of writing instructions for a computer to follow, typically using a programming language.
- An organized collection of data, typically stored and accessed electronically.
- The process of identifying and fixing errors or bugs in a computer program.
- A computer or system that provides resources, services, or data to other computers (clients) over a network.
Down
- Protocol A set of rules and conventions for communication between network devices.
- Learning A branch of artificial intelligence where algorithms improve through experience or data, enabling systems to make decisions without explicit programming.
- Computing The delivery of computing services such as storage, processing, and software over the internet (the cloud).
- Code The human-readable instructions written in a programming language that define the functionality of a program.
- (Application Programming Interface) A set of protocols and tools for building software and applications, enabling different programs to communicate.
10 Clues: The process of identifying and fixing errors or bugs in a computer program. • An organized collection of data, typically stored and accessed electronically. • Protocol A set of rules and conventions for communication between network devices. • Step-by-step procedure for solving a problem or performing a task, often used in programming. • ...
Check your Voc! 2022-11-26
Across
- Computing circuit board
- To connect to an electrical power source
- Great warmth, when it's very hot
- The different parts of a computer
- That can be removed
- Distant
- The main memory of a computer
- capacity The amount of place for storing data
- To make colder
- Part of knife that cuts
Down
- The wheel driving a belt
- You can fold it in two
- Drive or push forward
- Undulation, oscillation
- The round-shaped window of a washing machine
- Electronic device that detects something
- Action of turning on an axis
- Grass-cutting machine
- Part of the washing machine, also a music instrument
19 Clues: Distant • To make colder • That can be removed • Drive or push forward • Grass-cutting machine • You can fold it in two • Computing circuit board • Undulation, oscillation • Part of knife that cuts • The wheel driving a belt • Action of turning on an axis • The main memory of a computer • Great warmth, when it's very hot • The different parts of a computer • ...
BTS CG New Techs Crossword 2024-11-04
Across
- being durable, eco friendly and a good economic asset
- meeting with a webcam
- make something better
- unbreakable data system
- what you finally make
- destroying jobs but creating others
- a company that offers you a service
- the most powerful computers
- the state giving money for projects
Down
- all the steps from product to consumer
- a robot or program thinking like a human
- follow
- replacing humans with robots
- sending a product to someone
- what you leave behind on the web
- calculating
- people keep buying your brand
- instagram,X,Facebook...
- a place where you store your products
19 Clues: follow • calculating • meeting with a webcam • make something better • what you finally make • unbreakable data system • instagram,X,Facebook... • the most powerful computers • replacing humans with robots • sending a product to someone • people keep buying your brand • what you leave behind on the web • destroying jobs but creating others • a company that offers you a service • ...
bisteck 2024-12-16
Across
- Spanish word lacking a direct English translation
- Perpetually sleepy ursine
- Coffee made with love
- "Uji Matcha _______ Burnt Cheesecake"
- It's with you for hydration
- Highest capital city in the world
- Scientific computing toolkit
- Donkey Kong's small friend, allegedly
- One of three composers musically quoted in "Classico"
Down
- Protein in a famous Jewish/Bolivian dinner
- Weapon of self-inflicted psychological warfare
- Gym in Idaho Falls, ID
- One of three composers musically quoted in "Classico"
- Line connecting San Francisco and the East Bay
- Famously pale reptile
- Beloved fish friend and pet
- One of three composers musically quoted in "Classico"
- Spot for many a hot first date
- There are multiple suspended above the driveway
- Chaufa hotspot
- "_______ Special", signature dish with mandoo
21 Clues: Chaufa hotspot • Coffee made with love • Famously pale reptile • Gym in Idaho Falls, ID • Perpetually sleepy ursine • It's with you for hydration • Beloved fish friend and pet • Scientific computing toolkit • Spot for many a hot first date • Highest capital city in the world • "Uji Matcha _______ Burnt Cheesecake" • Donkey Kong's small friend, allegedly • ...
VMWare Knowledge Check 2022-01-18
Across
- enables hybrid and edge computing applications to be built across locations
- number of VMWare products
- the process of creating a virtual representation of something
- VMware's server virtualization
- this architecture uses one application per server
- tool used for storage virtualization
- ________ and Opex are reduced by using virtualization
- ______ availability
Down
- integration system’s management plug-in to VMware vCenter. (OMIVV)
- mitigates risk
- Device Management Tool
- tool used for desktop and app provisioning
- A VM is a Virtual _________
- the whole virtualized server
- acronym for Hyperconverged Infrastructure
- allows multiple host servers to pool resources
- _______ end to end security
- VMWare turnkey appliance
- VSphere's hypervisor
19 Clues: mitigates risk • ______ availability • VSphere's hypervisor • Device Management Tool • VMWare turnkey appliance • number of VMWare products • A VM is a Virtual _________ • _______ end to end security • the whole virtualized server • VMware's server virtualization • tool used for storage virtualization • acronym for Hyperconverged Infrastructure • ...
Cross words 2021-07-18
Across
- mostly a part of mail
- Part of Cloud computing
- Block chain technology
- Methodology to improve work
- A fraud practice to send email
- Legacy of fresco family
- Home for servers
- Collection of data
- A way of working in Corporate world
- occurrence of unusual event
- used by computers to solve problems
Down
- Part of network Security
- Method covert data into more secure frm
- An ecosystem to solve real life problem
- Type of malware attack
- Activity which is frequent done by Team
- smart way of reducing manual tasks
- Known for all unauthorized activities
- Counter attack to unauthorized use of sys
19 Clues: Home for servers • Collection of data • mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Methodology to improve work • occurrence of unusual event • A fraud practice to send email • smart way of reducing manual tasks • A way of working in Corporate world • ...
Cloud Computing Concepts 2021-09-10
Across
- Cloud security threat
- Risk Management Processes
- Saas,Paas,Iaas
- is a general term for the delivery of hosted services over the Internet.
Down
- AAA security architecture
- also known as VMM
- is a high-performance computer used for large-scale computing purposes
- means creating a virtual version of a device or resource.
- Second risk Management Processes
- Types include horizontal and vertical.
10 Clues: Saas,Paas,Iaas • also known as VMM • Cloud security threat • AAA security architecture • Risk Management Processes • Second risk Management Processes • Types include horizontal and vertical. • means creating a virtual version of a device or resource. • is a high-performance computer used for large-scale computing purposes • ...
Cloud computing (SaaS) 2019-04-22
Across
- What is one of the most notable SaaS service? ( is a social media website)
- SaaS is referred as software-on-demand and is similar to _______ rather than buying it.
- Cloud ________ is one of the SaaS provider in Malaysia
- SaaS application are usually provided on a ____________ model
- SaaS is a basically an ________ software for end users.
- SaaS is hosted by _______ or service provider.
Down
- One of the weaknesses of SaaS is ________, which can break down an entire network of users without proper planning
- SaaS uses the _____ to deliver aplication that are managed by third-party vendor
- On which OSI model layer does SaaS reside on?
- The benefit of SaaS is to ______ the cost of software ownership.
10 Clues: On which OSI model layer does SaaS reside on? • SaaS is hosted by _______ or service provider. • Cloud ________ is one of the SaaS provider in Malaysia • SaaS is a basically an ________ software for end users. • SaaS application are usually provided on a ____________ model • The benefit of SaaS is to ______ the cost of software ownership. • ...
Cloud computing (SaaS) 2019-04-22
Across
- The benefit of SaaS is to ______ the cost of software ownership.
- What is one of the most notable SaaS service? ( is a social media website)
- ________ Cloud is one of the SaaS provider in Malaysia
- SaaS is hosted by _______ or service provider.
- On which OSI model layer does SaaS reside on?
- SaaS is referred as software-on-demand and we can ______ the software and NOT buying it.
Down
- SaaS application are usually provided on a ____________ model
- SaaS uses the _____ to deliver aplication that are managed by third-party vendor
- SaaS is a basically an ________ software for end users.
- One of the weaknesses of SaaS is ________, which can break down an entire network of users without proper planning
10 Clues: On which OSI model layer does SaaS reside on? • SaaS is hosted by _______ or service provider. • ________ Cloud is one of the SaaS provider in Malaysia • SaaS is a basically an ________ software for end users. • SaaS application are usually provided on a ____________ model • The benefit of SaaS is to ______ the cost of software ownership. • ...
Tilahune Cloud Computing 2025-03-07
Across
- is a networking model in which data, applications, and processing power are managed by servers on the Internet
- is one of the three main categories of cloud computing:
- The phrase________ means the resource resides on another server or network than the one using the resource.
- physical machine running a hypervisor
Down
- Cloud services delivered by a third-party provider
- is also called “hosted platform” and is similar to SaaS, but customer develops applications with the service provider’s tool and infrastructure
- is also called “hosted infrastructure”, it allows a company to use storage or entire virtual servers
- virtual machine running in a hypervisor
- is one of Major cloud services types
- is also called “hosted applications” or “on-demand applications
10 Clues: is one of Major cloud services types • physical machine running a hypervisor • virtual machine running in a hypervisor • Cloud services delivered by a third-party provider • is one of the three main categories of cloud computing: • is also called “hosted applications” or “on-demand applications • ...
RISC PNQ Annual Bash 2024-01-05
8 Clues: Amazon's initial name • Amazon's grocery division • No of leadership principles • First product sold by Amazon • Amazon's European Headquarters • Amazon's cloud computing service • An audiobook subsidiary of Amazon • Something, Amazon shares it name with
MIS Crosswords 2025-02-07
Across
- In the Otis Case Study, it was a key unit responsible for order fulfillment, supply chain coordination, and customer service.
- Zara relied on this system to record transactions, but it ran on DOS, an outdated operating system.
- The risk of dependency on a single cloud provider for regulatory data services.
- The logistics model Otis moved towards, ensuring components arrived at job sites only when needed.
- As IT becomes ubiquitous, this becomes a major business concern.
Down
- Unlike competitors, Zara controlled its manufacturing and distribution, reducing lead times.
- The modern form of IT infrastructure where businesses rent computing power instead of owning it.
- The principle that IT systems become more valuable as more users join them.
- Ensuring adherence to regulatory standards, a significant challenge in cloud adoption for financial institutions.
- A role responsible for managing data quality and governance at the business line level.
10 Clues: As IT becomes ubiquitous, this becomes a major business concern. • The principle that IT systems become more valuable as more users join them. • The risk of dependency on a single cloud provider for regulatory data services. • A role responsible for managing data quality and governance at the business line level. • ...
CDC Crossword 2024-06-27
Across
- A service model offering software applications over the internet
- Virtualization technology developed by VMware
- The process of distributing computing resources dynamically
Down
- The service model that provides virtualized computing resources over the internet
- A popular open-source platform for container orchestration
5 Clues: Virtualization technology developed by VMware • A popular open-source platform for container orchestration • The process of distributing computing resources dynamically • A service model offering software applications over the internet • The service model that provides virtualized computing resources over the internet
TRIGONOMETRY 2015-06-27
Across
- credited with compiling the first trigonometric table, is known as "the father of trigonometry".
- the reciprocal of the ratio sin A
- the technique used in astronomy to measure the distance to nearby stars, in geography to measure distances between landmarks, and in satellite navigation systems.
- The law can be used to compute the remaining sides of a triangle when two angles and a side are known
Down
- arriving from Greek trigōnon, "triangle" and metron, "measure" ,a branch of mathematics that studies relationships involving lengths and angles of triangles.
- The law of cosines is useful for computing the third side of a triangle when two sides and their enclosed angle are known, and in computing the angles of a triangle if all three sides are known
- the reciprocal of the ratio cos A
- side opposite to the 90 degree angle in a right triangle;
- equations that hold true for any value
- the reciprocals of the ratio tan A.
10 Clues: the reciprocal of the ratio cos A • the reciprocal of the ratio sin A • the reciprocals of the ratio tan A. • equations that hold true for any value • side opposite to the 90 degree angle in a right triangle; • credited with compiling the first trigonometric table, is known as "the father of trigonometry". • ...
Technologhy 2024-06-03
Across
- This small handheld device is used to point, click, and scroll on a computer screen.
- A machine capable of carrying out a complex series of actions automatically, especially one programmable by a computer.
- A device that converts electrical signals into sound, commonly used to listen to music or audio from a computer.
- An input device with keys used to enter data and commands into a computer.
- A mobile device that combines cellular and computing functions in one unit.
Down
- A portable computing device with a touch screen, larger than a smartphone but smaller than a laptop.
- A programmable machine that performs logical operations and processes data.
- A device that produces a hard copy of documents stored in electronic form, usually on paper.
- A small, portable device used to store and transfer data from one computer to another.
- The part of a computer or device that displays visual output from the computer.
10 Clues: An input device with keys used to enter data and commands into a computer. • A programmable machine that performs logical operations and processes data. • A mobile device that combines cellular and computing functions in one unit. • The part of a computer or device that displays visual output from the computer. • ...
Famous American Brands 2023-08-19
Across
- This company develops software, operating systems, cloud computing, online advertising, and hardware for personal computers and mobile devices.
- This company produces personal computers, smartphones, tablets, software, and other consumer electronics and services.
Down
- This company offers e-commerce, cloud computing, online advertising, digital streaming, artificial intelligence, and consumer electronics.
- This company provides search engine, online advertising, cloud computing, artificial intelligence, and consumer electronics services and products.
- This company manufactures and launches reusable rockets and spacecraft for commercial spaceflight and interplanetary exploration.
5 Clues: This company produces personal computers, smartphones, tablets, software, and other consumer electronics and services. • This company manufactures and launches reusable rockets and spacecraft for commercial spaceflight and interplanetary exploration. • ...
CS Principles Review 2022-04-22
Across
- The sequential execution of ___ in an algorithm or code in a program.
- The maximum amount of data that can be sent in a fixed period of time over a network connection, measured in bits per second.
- Scalability is the ability of a system to ___ in scale to meet new demands.
- A physical device that can run a program.
- An attack where a user is tricked into revealing private information, usually through the form of deceptive emails.
- Arrays start at the index ___ on the AP Computer Principles exam.
- The protocol that determines how to address nodes on the network (using IP addresses).
- A group of interconnected computing devices capable of sending or receiving data.
Down
- A computational model which uses multiple devices to run different parts of a program.
- A boolean condition to determine which of two paths are taken in an algorithm or program (e.g. if statement).
- A technique that helps find a good solution in a difficult problem.
- The idea that some communities have less access to technology than others.
- Parallel computing is a computational model which splits up tasks, some of which can be executed ___.
- The technique to scramble data to prevent unauthorized access.
- An ___ problem is one that is so logically difficult, that we are not ever able to create an algorithm to find the best answer.
- A type of computer malware that can make copies of itself.
16 Clues: A physical device that can run a program. • A type of computer malware that can make copies of itself. • The technique to scramble data to prevent unauthorized access. • Arrays start at the index ___ on the AP Computer Principles exam. • A technique that helps find a good solution in a difficult problem. • ...
TechWord Challenge 4 2024-03-22
Across
- A set of rules or instructions designed to solve a specific problem or perform a particular task, especially by a computer.
- A software tool that translates code written in a high-level programming language into machine-readable code.
- A set of rules governing communication between devices or systems in a network.
- The world's largest educational and scientific computing society, advancing computing as a science and a profession
Down
- The process of finding and fixing errors or defects in software code.
- A number system based on two symbols, typically 0 and 1, used by computers to represent data and perform operations.
- A pre-built structure or platform used as a basis for developing software applications.
- A visual way of interacting with computers using graphical icons, buttons, and menus.
- The standard markup language used to create and design web pages and applications.
- A set of protocols, tools, and definitions that allows different software applications to communicate with each other.
- A hardware or software component that stores data to serve future requests more quickly.
11 Clues: The process of finding and fixing errors or defects in software code. • A set of rules governing communication between devices or systems in a network. • The standard markup language used to create and design web pages and applications. • A visual way of interacting with computers using graphical icons, buttons, and menus. • ...
WiT Week 5 Crossword Puzzle 2023-08-31
Across
- A computer system that consists of multiple software components that are on multiple computers but run together as a single system
- a popular programming language
- A formal document from the Internet Engineering Task Force (IETF) that covers many aspects of computer networking
- A popular set of on-demand cloud computing platforms that comprises of over 200 products
- The first alien you encounter on the Source Academy spaceship
- Cloud computing platform run by Microsoft
- An invention that helped tabulate census data more efficiently, and was a success in the 1890 US Consensus
- Someone who is confident and not frightened to say what they want or believe
Down
- Meeting our needs without compromising the ability of future generations to meet their needs
- A network protocol used for delivering audio and video e.g. voice over IP, audio over IP
- A documentation repository and learning resource for web developers started by Mozilla
- An open source container orchestration platform which helps automate manual processes involved in deploying, managing, and scaling containerized applications
- A concept invented by Dutch computer scientist Edsger Dijkstra that is used as a type of synchronization primitive
- The team at the opposite end of the spectrum of a red team in capture the flags
- A computer programming book that also goes by the abbreviation 'CLRS'
- A piece of writing that often accompanies a resume
16 Clues: a popular programming language • Cloud computing platform run by Microsoft • A piece of writing that often accompanies a resume • The first alien you encounter on the Source Academy spaceship • A computer programming book that also goes by the abbreviation 'CLRS' • Someone who is confident and not frightened to say what they want or believe • ...
company name 2024-09-26
Across
- "Luxury car brand headquartered in Stuttgart, Germany, known for its sports cars and SUVs." (6 letters)
- "This Japanese automotive manufacturer, known for its 'Zoom-Zoom' slogan, began as a cork company in 1920."
- "India's largest oil and gas company, headquartered in New Delhi, with operations across 35 countries." (3 letters)
- "American electric vehicle and clean energy company founded in 2003, known for its charismatic CEO." (6 letters)
- "This South Korean conglomerate, founded in 1938, leads in electronics, construction, and shipbuilding." (7 letters)
- "Major Indian airline, founded in 2005, known for its budget-friendly operations." (5 letters)
- "Multinational technology company known for its search engine and cloud computing services, founded in 1998." (6 letters)
Down
- "The world's largest social media company, rebranded in 2021 to focus on virtual reality and the metaverse." (4 letters)
- "The world's leading coffeehouse chain" (9 letters)
- "A major American e-commerce and cloud computing giant, started as an online bookstore in 1994." (6 letters)
- "Luxury fashion brand, famous for its monogram canvas, founded in France in 1854." (11 letters)
- "India's largest private-sector steel manufacturer, (6 letters)
12 Clues: "The world's leading coffeehouse chain" (9 letters) • "India's largest private-sector steel manufacturer, (6 letters) • "Major Indian airline, founded in 2005, known for its budget-friendly operations." (5 letters) • "Luxury fashion brand, famous for its monogram canvas, founded in France in 1854." (11 letters) • ...
Unit CC - LO1 Characteristics and terms check 2023-10-06
Across
- (10) Ability for a cloud service to be widely accessible
- (10) Services able to be rapidly scaled, up or down, to match demand • can be automatic • provision and de-provision of resources
- (5-7) Sharing resources, e.g. servers • data kept separate (isolated)
- (5,8) Automatically overflowing from private cloud to public cloud when resources are fully used
Down
- (8,7) resources used for multiple consumers • ‘multi-tenancy’ model
- (2,6,4,7) User able to get computing capabilities automatically • no human interaction from the service provider
- (5,9) Allows for cloud computing to be much faster to implement than traditional in-house models
- (10) Accounting method to charge for the amount of resources used (hardware, software, etc.)
- (10) Cloud automation is used to simplify the set up and running of resources
- (3,2,3,4) Charges based on usage • hours, weeks, etc • application/user (software) • memory consumed, features, storage capacity, etc.
- (5) Where shared compute and storage resources are accessed as a service (usually online), instead of hosted locally on physical services.
11 Clues: (10) Ability for a cloud service to be widely accessible • (8,7) resources used for multiple consumers • ‘multi-tenancy’ model • (5-7) Sharing resources, e.g. servers • data kept separate (isolated) • (10) Cloud automation is used to simplify the set up and running of resources • ...
Turing machine crossword puzzle 2023-02-09
python 2023-03-27
7 Clues: examine • the process • an occupation • a set of web pages • operation of computers • information use by a computer • facts a statistics collected together
Basic Concepts of Computing 2019-12-16
Across
- Software used to control and maintain your computer.
- Software used to do productive work and accomplish specific tasks.
- Users must pay a license fee to use the the software. No source code is provided.
- Software made available with a license that allows you to access and modify the source code, but not sell the software.
- The way of getting both data and instructions into a computer.
- Physical components and devices, the parts of a computer you can touch.
Down
- Raw, Unprocessed facts.
- The programs - sets of instructions - that tells the computer/device what to do.
- A way of allowing the computer to show the results of the processing it has done.
- Software distributed freely, but only for a limited time or limited functionality. You do not receive the source code.
- Input, Processing and Output model
- The result of processing data into meaningful facts.
- Software which is distributed freely. You do not receive the source code. There is no limitation on the time or functionality.
- The programming code used to develop a specific application.
- A multi-purpose electronic tool that can receive data (input), process the data and output results.
15 Clues: Raw, Unprocessed facts. • Input, Processing and Output model • Software used to control and maintain your computer. • The result of processing data into meaningful facts. • The programming code used to develop a specific application. • The way of getting both data and instructions into a computer. • Software used to do productive work and accomplish specific tasks. • ...
Computing 7I3 Georgie Lally 2019-02-11
Across
- To name of the keyboard system we use
- To scan things
- A reference to information a reader can follow
- To type things
- A combination of letters, numbers and symbols to protect information
- When someone is trying to access your information
- The information that goes into a computer
- The information technology hardware
Down
- To see what you are doing
- To have a paper copy
- A programme used to produce presentation
- Used to click icons
- A programme used for spreadsheets
- You look out of them
- The information that comes out of a computer
15 Clues: To scan things • To type things • Used to click icons • To have a paper copy • You look out of them • To see what you are doing • A programme used for spreadsheets • The information technology hardware • To name of the keyboard system we use • A programme used to produce presentation • The information that goes into a computer • The information that comes out of a computer • ...
History of Computing, Faith 2019-11-19
Across
- First Female Programmer
- Invented the Analytical Engine (Difference Engine)
- Invented the Punched Card
- Marked the transition from the First to the Second-Generation computer.
- This company was formed by Steven Jobs and Stephen Wozniak
- Third and Fourth Generation computers are built with this chip as logic
- Invented the World Wide Web
Down
- Created the Pascaline
- Developed by the Chinese
- Used fingercounting
- He copied Jacquard’s methods of processing punched cards for Unit Record Processing
- Coined the term debugging
- Used knots in rope, notches in wood, drawings on the cavewall, and collected seashells and pebbles to help track time.
- Completed with IBM the electrical calculating machine, the Mark 1.
- Created by John Eckert and John Mauchly
15 Clues: Used fingercounting • Created the Pascaline • First Female Programmer • Developed by the Chinese • Coined the term debugging • Invented the Punched Card • Invented the World Wide Web • Created by John Eckert and John Mauchly • Invented the Analytical Engine (Difference Engine) • This company was formed by Steven Jobs and Stephen Wozniak • ...
History of Computing, Alexandra 2019-11-19
Across
- they had multiplication tables, but could not go farther than five times tables
- coined the term debugging
- built with intergraded circuit chips as logic
- using fingers to count
- is a rectangle frame with fixed rods containing moveable wooden beads
- invented pascals gears
- invented the mark 1
- kept count by making notches in wood, knots in rope, or by collecting shells and stones
Down
- these people invented the abacus
- would have been the first computer but, it was never built because it was ahead of its time
- a machine which combined electromechanics with punched cards for input
- invented the punchcard
- a machine with a series of interlocking gears and discs
- worked together to create the ENIAC
- first female programmer
15 Clues: invented the mark 1 • invented the punchcard • using fingers to count • invented pascals gears • first female programmer • coined the term debugging • these people invented the abacus • worked together to create the ENIAC • built with intergraded circuit chips as logic • a machine with a series of interlocking gears and discs • ...
CHAPTER 4 - COMPUTING COMPONENTS 2025-08-17
Across
- The main circuit board of a computer.
- A type of non-volatile memory that can be erased electronically and rewritten.
- Allows devices inside and outside the system unit to communicate.
- Converts wall outlet AC power into DC power.
- The electronic component that stores instructions waiting to be executed.
- A single chip with two or more processing cores.
- The component of the processor that directs and coordinates most of the operations.
- Performs arithmetic, comparison, and logical operations.
- The basic unit of data that represents 0 or 1.
- The process of obtaining a program instruction or data item from memory.
Down
- Temporary memory that speeds processing by storing frequently used instructions.
- A card that enhances functions of a computer and provides connections to peripherals.
- The process of carrying out the commands in a machine cycle.
- Eight bits grouped together as a unit.
- slot A socket on a motherboard that can hold an adapter card.
15 Clues: The main circuit board of a computer. • Eight bits grouped together as a unit. • Converts wall outlet AC power into DC power. • The basic unit of data that represents 0 or 1. • A single chip with two or more processing cores. • Performs arithmetic, comparison, and logical operations. • The process of carrying out the commands in a machine cycle. • ...
Cloud Computing Basics 2025-01-18
Across
- Cloud service model where users rent software applications via the internet (3 letters)
- A key benefit of cloud computing that means the system can scale up or down based on demand (9 letters)
- A key element of cloud security, used to ensure only authorized users can access services (6 letters)
- This is often used for cloud storage and is known for its reliability (4 letters)
Down
- A type of cloud service where users can rent virtual machines (3 letters)
- A platform that allows you to rent computing resources over the internet (5 letters)
- The act of storing data on remote servers rather than local devices (7 letters)
- A network architecture used to deliver services to customers via the internet (7 letters)
- A company known for its cloud infrastructure services (6 letters)
9 Clues: A company known for its cloud infrastructure services (6 letters) • A type of cloud service where users can rent virtual machines (3 letters) • The act of storing data on remote servers rather than local devices (7 letters) • This is often used for cloud storage and is known for its reliability (4 letters) • ...
Learning Unit 1 Puzzle 2024-02-20
Across
- Adhering to privacy laws and regulations (e.g., GDPR, HIPAA) is crucial to avoid legal consequences and financial penalties.
- also known as green IT or sustainable computing, is an approach to designing, manufacturing, using, and disposing of computing devices and systems in an environmentally responsible manner.
- is a critical aspect of data management, encompassing the protection of personal and sensitive information from unauthorized access, use, or disclosure. In today's digital age, where vast amounts of data are collected and processed, maintaining information privacy is paramount. Here, we'll discuss the importance of information privacy and methods for improving it
- Collect only the necessary data for specific purposes to reduce the risk associated with potential data breaches.
- Provides creators exclusive rights to their original works of authorship, such as literature, music, and art, for a limited duration.
- By optimizing energy usage and employing energy-efficient technologies, green computing helps conserve energy resources and reduces the environmental impact of IT operations.
- refers to creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce. Protecting intellectual property is crucial for fostering innovation, creativity, and fair competition. The principles of intellectual property revolve around providing legal rights to creators and inventors while balancing the interests of the public. The major types of intellectual property include patents, copyrights, trademarks, and trade secrets.
Down
- refers to the gap between those who have access to modern information and communication technology (ICT) and those who do not.
- Encourages innovation by providing inventors with the incentive to invest time and resources in developing new technologies
- Protecting individuals' privacy builds trust with customers, clients, and stakeholders, enhancing the organization's reputation.
- are susceptible to interception and surveillance, raising concerns about unauthorized access to sensitive information
- involves the creation, distribution, and consumption of content in digital formats, such as e-books, online articles, and digital magazines.
- communication channels can help individuals bypass surveillance and censorship attempts
13 Clues: communication channels can help individuals bypass surveillance and censorship attempts • Collect only the necessary data for specific purposes to reduce the risk associated with potential data breaches. • are susceptible to interception and surveillance, raising concerns about unauthorized access to sensitive information • ...
Cisco Technology Overview 2020-07-31
Across
- Software Defined Network Competitor?
- Open-source software that supports large data sets?
- What is Layer 3?
- IoT company Cisco acquired in 2016?
- Is related to Containers?
- Visibility across everything in data center?
- Open source software deployed as an (IaaS)?
- What is Layer 7?
Down
- What is Layer 2?
- Data management and optimization services?
- Cloud + IoT is what networking/computing?
- What is Layer 1?
- Who did Cisco acquire in 1993?
- What is Layer 6?
- What is Layer 5?
- Essential to all of Cisco's Technologies?
- What is Layer 4?
- One of Cisco's IoT Portfolio areas?
- Collaboration company Cisco acquired in 2007?
19 Clues: What is Layer 2? • What is Layer 1? • What is Layer 6? • What is Layer 3? • What is Layer 5? • What is Layer 4? • What is Layer 7? • Is related to Containers? • Who did Cisco acquire in 1993? • IoT company Cisco acquired in 2016? • One of Cisco's IoT Portfolio areas? • Software Defined Network Competitor? • Cloud + IoT is what networking/computing? • ...
Cross words 2021-07-18
Across
- Part of Cloud computing
- Occurrence of unusual event
- A way of working in Corporate world
- Methodology to improve work
- Type of malware attack
- Counter attack to unauthorized use of systems
- Block chain technology
- Legacy of fresco family
- Used by computers to solve problems
Down
- Collection of data
- Home for servers
- A fraud practice to send email
- Mostly a part of mail
- Method to covert data into more secure form
- An ecosystem to solve real life problem
- Known for all unauthorized activities
- Activity which is frequent done by our Team
- Part of network Security
- Smart way of reducing manual tasks
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Occurrence of unusual event • Methodology to improve work • A fraud practice to send email • Smart way of reducing manual tasks • A way of working in Corporate world • ...
Cross words1 2021-07-18
Across
- Part of Cloud computing
- Occurrence of unusual event
- A way of working in Corporate world
- Methodology to improve work
- Type of malware attack
- Counter attack to unauthorized use of system
- Block chain technology
- Legacy of fresco family
- Used by computers to solve problems
Down
- Collection of data
- Home for servers
- A fraud practice to send email
- Mostly a part of mail
- Method to covert data into more secure form
- An ecosystem to solve real life problem
- Known for all unauthorized activities
- Activity which is frequent done by our Team
- Part of network Security
- Smart way of reducing manual tasks
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Part of Cloud computing • Legacy of fresco family • Part of network Security • Occurrence of unusual event • Methodology to improve work • A fraud practice to send email • Smart way of reducing manual tasks • A way of working in Corporate world • ...
Cross words22 2021-07-18
Across
- Used by computers to solve problems
- Type of malware attack
- Home for servers
- Method to covert data into more secure form
- Collection of data
- Part of Cloud computing
- Known for all unauthorized activities
- An ecosystem to solve real life problem
- A fraud practice to send email
- Mostly a part of mail
Down
- Occurrence of unusual event
- A way of reducing manual tasks
- A way of working in Corporate world
- Activity which is frequent done by our Team
- Part of network Security
- Block chain technology
- Methodology to improve work
- Legacy of fresco family
- Counter attack to unauthorized use of system
19 Clues: Home for servers • Collection of data • Mostly a part of mail • Type of malware attack • Block chain technology • Legacy of fresco family • Part of Cloud computing • Part of network Security • Occurrence of unusual event • Methodology to improve work • A way of reducing manual tasks • A fraud practice to send email • Used by computers to solve problems • ...
Private and public spaces 2025-02-11
Across
- - Malicious software collecting data.
- - The state of being unidentified.
- - Using body traits for identification.
- - A set of rules used in computing.
- - A person or company selling data.
- - Security cameras used for surveillance.
- - Unauthorized release of information.
- - Gaining unauthorized access to data.
- - Securing data by coding it.
- - The right to control personal information.
- - Identifying someone based on features.
- - Control over information sharing.
Down
- - Someone who exposes secrets.
- - Classifying people based on behavior.
- - A system of total surveillance.
- - Monitoring of individuals or groups.
- - Following a person’s online actions.
- - Tracking a person’s location.
- - Power to restrict or influence actions.
19 Clues: - Securing data by coding it. • - Someone who exposes secrets. • - Tracking a person’s location. • - A system of total surveillance. • - The state of being unidentified. • - A set of rules used in computing. • - A person or company selling data. • - Control over information sharing. • - Malicious software collecting data. • - Monitoring of individuals or groups. • ...
Klaus Computing Architecture 2015-11-25
Across
- That guy who is running around in a restaurant
- Things you have on your Hard Drive
- You need to do this with your Devices so you dont have to much of them
- Someone offers you his deed
- that guy who gets called DAU by the Heinemann
Down
- If you want to have something online You need to do this
- Hardware
- The amount of space you need to save things
- You need to be . . . to the internet
- Always in the sky
10 Clues: Hardware • Always in the sky • Someone offers you his deed • Things you have on your Hard Drive • You need to be . . . to the internet • The amount of space you need to save things • that guy who gets called DAU by the Heinemann • That guy who is running around in a restaurant • If you want to have something online You need to do this • ...
Klaus Computing Architecture 2015-11-25
Across
- The amount of space you need to save things
- Hardware
- If you want to have something online You need to do this
- You need to be . . . to the internet
- Things you have on your Hard Drive
Down
- You need to do this with your Devices so you dont have to much of them
- That guy who is running around in a restaurant
- Someone offers you his deed
- Always in the sky
- that guy who gets called DAU by the Heinemann
10 Clues: Hardware • Always in the sky • Someone offers you his deed • Things you have on your Hard Drive • You need to be . . . to the internet • The amount of space you need to save things • that guy who gets called DAU by the Heinemann • That guy who is running around in a restaurant • If you want to have something online You need to do this • ...
Klaus Computing Architecture 2015-11-25
Across
- that guy who gets called DAU by the Heinemann
- Someone offers you his deed
- You need to do this with your Devices so you dont have to much of them
- Always in the sky
Down
- That guy who is running around in a restaurant
- Hardware
- If you want to have something online You need to do this
- Things you have on your Hard Drive
- The amount of space you need to save things
- You need to be . . . to the internet
10 Clues: Hardware • Always in the sky • Someone offers you his deed • Things you have on your Hard Drive • You need to be . . . to the internet • The amount of space you need to save things • that guy who gets called DAU by the Heinemann • That guy who is running around in a restaurant • If you want to have something online You need to do this • ...
Computing 2nd unit 2023-02-08
Across
- Spreads and infects files that it meets.
- Record what you look online.
- A fake website that looks like the official website.
- Messages that usually make physical threats to the victim.
- The computer is not able to open the file like a protections of the anti-virus.
Down
- Someone who uses the internet to commit crime.
- Buying online on internet shops.
- A criminal breaks into a computer system, usually steal files or personal information.
- Circulate rumours (untrue stories and opinions) about the target.
- Detects and quarantines files that contain malware.
10 Clues: Record what you look online. • Buying online on internet shops. • Spreads and infects files that it meets. • Someone who uses the internet to commit crime. • Detects and quarantines files that contain malware. • A fake website that looks like the official website. • Messages that usually make physical threats to the victim. • ...
COMPUTING KEY TERMS 2017-03-16
10 Clues: Turtle • HTML Python • a type of error • a set of instructions is a • a common name for a glitch • it choses between operations • first command in a turtle code • an example of this is if or else • how a programme carries out its code • the look of something sometimes used when playing a game
What is Computing? 2022-05-16
Across
- device that presents data from the computer
- created in 1946, first general purpose computer
- physical components of a computer
- device or person that makes calculations
- device hardware component to enter data
Down
- created in 1950, considered first modern computer
- programs that can be run on a computer
- piece of computer equipment to store info
- considered the first computer in history
- law that stated number of transistors will double
10 Clues: physical components of a computer • programs that can be run on a computer • device hardware component to enter data • considered the first computer in history • device or person that makes calculations • piece of computer equipment to store info • device that presents data from the computer • created in 1946, first general purpose computer • ...
Shana Cloud Computing 2025-03-07
Across
- Users of cloud computing ___ for what they use rather than for the equipment and software needed to provide the resource.
- Connects the VNic's to a network.
- Also called hosted platform and I similar to Saas, but customer develops applications with the service providers tool and infrastructure.
- Also called hosted infrastructure it allows a company to use storage or entire virtual servers
- Is a networking model in which data, applications and processing power are managed by servers on the internet
- When cloud services are delivered by a third-party provider.
Down
- When a company delivers cloud services to their employees through the use of virtualization technologies
- VNics or ___logically defined network interface associated with a VM
- Also called hosted applications or on demand applications.
- The Phrase _____means the resource resides on another server or network than the one using the resource.
10 Clues: Connects the VNic's to a network. • Also called hosted applications or on demand applications. • When cloud services are delivered by a third-party provider. • VNics or ___logically defined network interface associated with a VM • Also called hosted infrastructure it allows a company to use storage or entire virtual servers • ...
Area of Computer Ethics 2022-11-23
Across
- ……………… is any word, name, symbol, or device used to identify the source or origin of products or services and to distinguish those products or services from others.
- ……………… providing access to the information may not be the creator of the information.
- Codes of ………………… is written guideline that helps determine whether a specific computer action is ethical or unethical
- ……………… is an exclusive right granted for an invention
- Information ……………… is information that is error free
- Information Privacy: refers to the ………… of individuals and companies to deny or restrict the collection, use and dissemination of information about them.
Down
- Intellectual Property (IP) : refers to unique and ……………… works such as ideas, inventions, art, writing, processes, company, product, names and logo.
- To reduce the …………… impact of computing user can go for green computing.
- Green …………: Designing energy-efficient computers, servers, printers, projectors and other digital devices.
- Inaccurate information can lead to ………… decisions.
- ……………… is an exclusive rights given to authors, artists and other creators of original work to duplicate, publish and sell their materials.
- Green Computer is involves reducing the electricity and environmental waste while using a ………………….
12 Clues: Inaccurate information can lead to ………… decisions. • Information ……………… is information that is error free • ……………… is an exclusive right granted for an invention • To reduce the …………… impact of computing user can go for green computing. • ……………… providing access to the information may not be the creator of the information. • ...
Chapter 6 Vocab 2022-03-08
Across
- An instant message delivered via SMS, usually to a mobile device such as a smartphone
- Real-time text-based communication using computing devices.
- A site that enables visitors to answer questions posed by other visitors
- A community of people brought together by common interest in a particular product.
- A specific company or site that hosts a social media community.
Down
- Digital communication systems that empower individual users to participate by sharing content and responding to others.
- Aside or service in which users contribute most or all of the content.
- A measure of how well a company engages its online stakeholders.
- Software that uses a reader's reported location to customize content.
- A computing device that the user can wear, such as a watch, wristband, or eyeglasses.
- Providing free information that is valuable to consumers and builds ties with current and potential customers.
- The process of collecting and presenting information on a particular topic in a way that makes it convenient for target readers.
12 Clues: Real-time text-based communication using computing devices. • A specific company or site that hosts a social media community. • A measure of how well a company engages its online stakeholders. • Software that uses a reader's reported location to customize content. • Aside or service in which users contribute most or all of the content. • ...
MC UNIT 1 2017-12-28
Across
- The other name for IEEE 802.11
- A MAC Random Access Scheme
- The Bluetooth network
- Implementation layer of MAC in OSI Model
- First generation standard
Down
- Enhanced GSM
- A property of code in Multiple Access
- A mobile technology with data speed of 9.6Kbps
- A characteristic of Mobile Computing
- Signal used to confirm ready to receive
10 Clues: Enhanced GSM • The Bluetooth network • First generation standard • A MAC Random Access Scheme • The other name for IEEE 802.11 • A characteristic of Mobile Computing • A property of code in Multiple Access • Signal used to confirm ready to receive • Implementation layer of MAC in OSI Model • A mobile technology with data speed of 9.6Kbps
Crossword 2025-04-05
Across
- Movement ignited by the exposure of Harvey Weinstein’s abuse
- "Boosters" for your height
- Adaptation, assimilation
- Boycotted American multinational automotive
- Collective of journalists or printed publications
Down
- Computing at particle scale
- Latin word for "liberty"
- - Hero, Relating to ancient legends
- Name of *The Immortal Nature* artist
- Authority of a state to govern itself
10 Clues: Latin word for "liberty" • Adaptation, assimilation • "Boosters" for your height • Computing at particle scale • - Hero, Relating to ancient legends • Name of *The Immortal Nature* artist • Authority of a state to govern itself • Boycotted American multinational automotive • Collective of journalists or printed publications • ...
Famous Inventors 2025-04-28
Across
- Father of Indian Nuclear Program
- Edison Inventor of light bulbs
- Father of Indian Space Program
- Berners Lee Inventor of World Wide Web
- Father of Computing
Down
- Franklin Inventor of bifocal glasses
- Aviation Pioneers
- Discovered Raman Effect
- Galilei Father of Modern Astronomy
- Kalam Developed India's Missile & Nuclear Weapons Program
10 Clues: Aviation Pioneers • Father of Computing • Discovered Raman Effect • Edison Inventor of light bulbs • Father of Indian Space Program • Father of Indian Nuclear Program • Galilei Father of Modern Astronomy • Franklin Inventor of bifocal glasses • Berners Lee Inventor of World Wide Web • Kalam Developed India's Missile & Nuclear Weapons Program
Crossword on De-Fi(Decentralised Finance) 2025-08-27
Across
- Penalty for misbehaving validators
- Offline crypto storage
- Holding digital assets securely
- Security breach in a DeFi protocol
- Ability of blockchains to work together
- Measure of computing power in mining
Down
- Data structure used in blockchain verification
- Mining Earning tokens by providing liquidity
- Recorded directly on the blockchain
- Profit from price differences across markets
10 Clues: Offline crypto storage • Holding digital assets securely • Penalty for misbehaving validators • Security breach in a DeFi protocol • Recorded directly on the blockchain • Measure of computing power in mining • Ability of blockchains to work together • Mining Earning tokens by providing liquidity • Profit from price differences across markets • ...
nahdir 2015-03-10
Across
- a picture image or other re
- keys a key on the keyboard or a microcomputer that gives special commonds to thecomputer
- information
- pointing device
- a programmable electronic device designed to accept data
- bin trash computing
Down
- a digital audio or video file or recording
- junk mail
- the rules of etiquette
- software that displays advertisements
10 Clues: junk mail • information • pointing device • bin trash computing • the rules of etiquette • a picture image or other re • software that displays advertisements • a digital audio or video file or recording • a programmable electronic device designed to accept data • keys a key on the keyboard or a microcomputer that gives special commonds to thecomputer
INGLESE 2020-06-09
10 Clues: tra in inglese • persona gentile • il vestiario lungo • un porcellino piccolo • informatica in inglese • si mettono quando c'è il sole • il piano più basso della casa • come si chiama lo sport sulla neve • ha la bandiera di colore nero rosso giallo • come si dice lo sport in cui si fanno le ruote.....
software 2024-11-18
Across
- aplikasi layanan konferensi video berbasiskan cloud computing
- aplikasi antivirus
- untuk menelusuri dan membuka web
- aplikasi untuk menggambar
- aplikasi untuk membantu kita dalam mengolah kata
Down
- aplikasi untuk membuat presentasi
- aplikasi untuk komunikasi
- aplikasi untuk membuat laporan, menghitung, menganalisis, dan mempresentasikan data
- aplikasi untuk membuat, membuka, dan menyimpan file
- aplikasi untuk mendengarkan musik
10 Clues: aplikasi antivirus • aplikasi untuk komunikasi • aplikasi untuk menggambar • untuk menelusuri dan membuka web • aplikasi untuk membuat presentasi • aplikasi untuk mendengarkan musik • aplikasi untuk membantu kita dalam mengolah kata • aplikasi untuk membuat, membuka, dan menyimpan file • aplikasi layanan konferensi video berbasiskan cloud computing • ...
Crossword on De-Fi(Decentralised Finance) 2025-08-27
Across
- Penalty for misbehaving validators
- Offline crypto storage
- Holding digital assets securely
- Security breach in a DeFi protocol
- Ability of blockchains to work together
- Measure of computing power in mining
Down
- Data structure used in blockchain verification
- Mining Earning tokens by providing liquidity
- Recorded directly on the blockchain
- Profit from price differences across markets
10 Clues: Offline crypto storage • Holding digital assets securely • Penalty for misbehaving validators • Security breach in a DeFi protocol • Recorded directly on the blockchain • Measure of computing power in mining • Ability of blockchains to work together • Mining Earning tokens by providing liquidity • Profit from price differences across markets • ...
Crossword on De-Fi(Decentralised Finance) 2025-08-27
Across
- Security breach in a DeFi protocol
- Measure of computing power in mining
- Mining Earning tokens by providing liquidity
- Ability of blockchains to work together
- Data structure used in blockchain verification
Down
- Recorded directly on the blockchain
- Offline crypto storage
- Profit from price differences across markets
- Holding digital assets securely
- Penalty for misbehaving validators
10 Clues: Offline crypto storage • Holding digital assets securely • Security breach in a DeFi protocol • Penalty for misbehaving validators • Recorded directly on the blockchain • Measure of computing power in mining • Ability of blockchains to work together • Profit from price differences across markets • Mining Earning tokens by providing liquidity • ...
DVD 2019-02-01
Across
- for DVD Recordable, a recordable DVD format similar to CD-R. A
- for backup.
- any device that holds large amounts of
- together tapes drives, cdr's cdrw's
- the disc
- of printer
Down
- computer.
- fax and networking features.
- r can only record data once and then the data becomes permanent
- phone that combines computing,
- disk that you can store computer data
11 Clues: the disc • computer. • of printer • for backup. • fax and networking features. • phone that combines computing, • together tapes drives, cdr's cdrw's • disk that you can store computer data • any device that holds large amounts of • for DVD Recordable, a recordable DVD format similar to CD-R. A • r can only record data once and then the data becomes permanent
unit 3 revision 2024-01-10
Across
- sth that must be done
- to die by being submerged under water
- boat that rescues people in danger at sea
- an assigned job
- do sth without shaking or falling
- the use and study of computers
- to take an exam again
Down
- to officially join a course
- boring
- happy
- the amount of money that sb gets for their work
- paying too much attention to detail
- land across the edge of the sea
- a person who works and gets paid for their job
14 Clues: happy • boring • an assigned job • sth that must be done • to take an exam again • to officially join a course • the use and study of computers • land across the edge of the sea • do sth without shaking or falling • paying too much attention to detail • to die by being submerged under water • boat that rescues people in danger at sea • a person who works and gets paid for their job • ...
Unit 2 vocabulary 2023-09-01
Across
- A path is a string of characters used to uniquely identify a location in a directory structure.
- a process that enables an operating system to respond to a failure in hardware or software
- the inclusion of extra components which are not strictly necessary to functioning, in case of failure in other components.
- a general-purpose machine that executes instructions for any data processing purpose.
- a device that forwards data packets to the appropriate parts of a computer network.
- a set of rules governing the format of data sent over the internet or other network.
Down
- contains information about the protocols a specific computer uses to create and send packets.
- a range of frequencies within a given band, in particular that used for transmitting a signal.
- interconnected computing devices that can exchange data and share resources with each other.
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- a small segment of a larger message.
- a communications standard that enables application programs and computing devices to exchange messages over a network
- a system of rules about the correct way to act in formal situations.
13 Clues: a small segment of a larger message. • a system of rules about the correct way to act in formal situations. • a device that forwards data packets to the appropriate parts of a computer network. • a set of rules governing the format of data sent over the internet or other network. • ...
18.1 keay and academic terms created by: Widman Miguel 2019-04-26
Across
- design (CAD) is soft were for design
- a real situation using a computer
- technology (IT) uses computing and electronics
- is an arrangement that allows employees
- reality is an artificial
Down
- is the transmission of information
- teller machine
- sales figures to original
- computer is a small portable
- world created by a computer
10 Clues: teller machine • reality is an artificial • sales figures to original • world created by a computer • computer is a small portable • a real situation using a computer • is the transmission of information • design (CAD) is soft were for design • is an arrangement that allows employees • technology (IT) uses computing and electronics
Big Data Technologies 2023-06-22
Across
- data arranged in rows and columns
- framework for big data computing
- represents big data as data flows
- programming model for processing large datasets
- executes file system namespace operations
Down
- non-tabular databases
- acts as backup node
- distributed, fault-tolerant data warehouse system
- distributed storage
9 Clues: acts as backup node • distributed storage • non-tabular databases • framework for big data computing • data arranged in rows and columns • represents big data as data flows • executes file system namespace operations • programming model for processing large datasets • distributed, fault-tolerant data warehouse system
Crossword IT puzzle 2025-07-04
Across
- Pre-built software platform for development
- Software that browses the internet
- System that stores and organizes data
- Programming language named after a snake
- Copying files to prevent data loss
- Instructions written for a computer
- Process of finding and fixing software errors
Down
- Person who writes computer programs
- Collection of related web pages
- Process of checking software for errors
- Popular programming language by Oracle
- Step-by-step problem-solving procedure
- Error in a computer program
- Computing services delivered over the internet
14 Clues: Error in a computer program • Collection of related web pages • Software that browses the internet • Copying files to prevent data loss • Person who writes computer programs • Instructions written for a computer • System that stores and organizes data • Popular programming language by Oracle • Step-by-step problem-solving procedure • Process of checking software for errors • ...
Crossword Puzzle 2025-02-26
Across
- A software testing technique where code is executed without knowing its internal structure.
- A technique used to hide data within an image or audio file for security purposes.
- A distributed computing framework used for processing large datasets across multiple machines.
- A virtual machine manager that allows multiple operating systems to run on a single hardware system.
Down
- The fundamental concept in quantum computing that allows qubits to exist in multiple states simultaneously.
- What is the name of the data unit that comes immediately before a yottabyte in the hierarchy of digital storage?
- A Google-developed deep learning framework widely used for AI applications.
- A type of memory that is non-volatile and retains data even when power is lost.
8 Clues: A Google-developed deep learning framework widely used for AI applications. • A type of memory that is non-volatile and retains data even when power is lost. • A technique used to hide data within an image or audio file for security purposes. • A software testing technique where code is executed without knowing its internal structure. • ...
Jade Mitchell 2020-08-24
Across
- someone who posts a provocative message
- a computer compromised by a hacker
- a slang term for printed form
- a device shaped like a pen
- tricking users into visiting a fake site
- a fast internet connection
- collaborative robots
Down
- the main circuit board in a computer system
- small computing devices
- social media application Twitter
10 Clues: collaborative robots • small computing devices • a device shaped like a pen • a fast internet connection • a slang term for printed form • social media application Twitter • a computer compromised by a hacker • someone who posts a provocative message • tricking users into visiting a fake site • the main circuit board in a computer system
Characteristics of Cloud Computing 2022-01-20
Across
- - 4 words(resources available when end user requires them)
- - 3 words(abstraction of resource location)
- - 2 words(resource can be added or taken away from an end user on demand)
- - 3 words(software allowing resources to be allocated on current demand)
- - 2 words(pay for what you use)
Down
- - 4 words(reduce cost, economies of scale)
- - 1 word(Physical resources are provisioned virtually, accessible from anywhere / anytime)
- - 1 word(technical knowledge of maintenance not burden on user)
- - 1 word(multiple users access the same resources at the same time)
- - 2 words(Shared resources)
- - 2 words(add new nodes without reconfiguration)
- - 3 words(available on a range of devices)
- - 2 words(removes the need for heavy investment)
- - 2 words(large storage capacity)
14 Clues: - 2 words(Shared resources) • - 2 words(pay for what you use) • - 2 words(large storage capacity) • - 4 words(reduce cost, economies of scale) • - 3 words(available on a range of devices) • - 3 words(abstraction of resource location) • - 2 words(add new nodes without reconfiguration) • - 2 words(removes the need for heavy investment) • ...
VIC'S BRIDAL CROSSWORD 2023-04-20
Across
- Their favourite genre of music
- Vic's birth month
- City where Vic and Jon first met
- The sport they would play together
- Where Vic moved to start her first job after school
Down
- Vic's undergraduate degree
- Vic's favourite food
- City they live in now
- Company where Vic worked after graduation
- Where Vic and Jon got engaged
- Vic's favourite baseball team
- The type of car that they drive
12 Clues: Vic's birth month • Vic's favourite food • City they live in now • Vic's undergraduate degree • Where Vic and Jon got engaged • Vic's favourite baseball team • Their favourite genre of music • The type of car that they drive • City where Vic and Jon first met • The sport they would play together • Company where Vic worked after graduation • ...
fatty legs alexis 2020-10-18
Across
- an act or method of computing
- an act showing scorn and disrespect
- to turn up or over
- to make out the meaning of despite lack of clearness
- to make or grow longer
- endless time
Down
- having no stain or blemish
- to bring shame to
- to join or come together as partners, friends, or companions
- having no mercy
- again
- to speak or utter with involuntary stops and much repeating
12 Clues: again • endless time • having no mercy • to bring shame to • to turn up or over • to make or grow longer • having no stain or blemish • an act or method of computing • an act showing scorn and disrespect • to make out the meaning of despite lack of clearness • to speak or utter with involuntary stops and much repeating • to join or come together as partners, friends, or companions
MC UNIT 1 2017-12-28
Across
- Implementation layer of MAC in OSI Model
- The Bluetooth network
- Signal used to confirm ready to receive
- A property of code in Multiple Access
- A mobile technology with data speed of 9.6Kbps
Down
- A characteristic of Mobile Computing
- Enhanced GSM
- The other name for IEEE 802.11
- First generation standard
- A MAC Random Access Scheme
10 Clues: Enhanced GSM • The Bluetooth network • First generation standard • A MAC Random Access Scheme • The other name for IEEE 802.11 • A characteristic of Mobile Computing • A property of code in Multiple Access • Signal used to confirm ready to receive • Implementation layer of MAC in OSI Model • A mobile technology with data speed of 9.6Kbps
INFKRG 2021-10-19
Across
- System used to administer health, welfare
- Azure's cloud ETL service
- Implementation partner for the new OCM
- KERMIT
- moving from one source to another
Down
- P in PaaS
- Microsoft suite of app for BI,reporting
- Microsoft's Cloud Computing Service
- Model which combines of Private and Public Cloud
- Never share this on email
10 Clues: KERMIT • P in PaaS • Azure's cloud ETL service • Never share this on email • moving from one source to another • Microsoft's Cloud Computing Service • Implementation partner for the new OCM • Microsoft suite of app for BI,reporting • System used to administer health, welfare • Model which combines of Private and Public Cloud
PUZZLE - MCA SET 5 2025-04-28
Across
- — User interaction period with server.
- Structure — Organized data storage.
- — Rules for data communication.
- — First In, First Out data structure.
Down
- Table — Data structure with key-value pairs.
- — Data interchange format
- List — Series of connected data elements.
- — Last In, First Out data structure.
- Server — Remote computing server.
- Hosting — Making websites accessible online.
10 Clues: — Data interchange format • — Rules for data communication. • Server — Remote computing server. • Structure — Organized data storage. • — Last In, First Out data structure. • — First In, First Out data structure. • — User interaction period with server. • List — Series of connected data elements. • Table — Data structure with key-value pairs. • ...
EdTech Jargon Crossword Puzzle 2022-09-07
Across
- a technical standard for e-learning products
- students bring personal devices to improve engagement
- on-demand learning
- a learner with multiple certifications and/or degrees
- distributed computing
- assigning one device per student
Down
- increase learning engagement with badges
- accessibility standards
- combines classroom with online learning
- learning by doing
- an online classroom where professors and students interact
- an online course with video lectures and student community
12 Clues: learning by doing • on-demand learning • distributed computing • accessibility standards • assigning one device per student • combines classroom with online learning • increase learning engagement with badges • a technical standard for e-learning products • students bring personal devices to improve engagement • a learner with multiple certifications and/or degrees • ...
Sublist 5 2016-10-26
Across
- to alter slightly to make something better
- for example, a star, kiwi or arrow
- point of view
- you can consult with people in order to avoid this
- opposite of hide
- created from sun, wind or water
Down
- the first version of a piece of writing
- basic
- describes a lack of change
- general well-being
- used of computing and of society
11 Clues: basic • point of view • opposite of hide • general well-being • describes a lack of change • created from sun, wind or water • used of computing and of society • for example, a star, kiwi or arrow • the first version of a piece of writing • to alter slightly to make something better • you can consult with people in order to avoid this
Advanced Tech Terms 2025-09-07
Across
- Electronic tool or instrument
- Device that manages internet traffic
- Main computing chip inside a computer
- Information processed by computers
- Storage and services accessed over the internet
- Security system blocking unauthorized access
- Unit of digital information (eight bits)
Down
- Programs and instructions used by computers
- Existing in computer simulation
- Group of connected computers and devices
- Physical parts of a computer
11 Clues: Physical parts of a computer • Electronic tool or instrument • Existing in computer simulation • Information processed by computers • Device that manages internet traffic • Main computing chip inside a computer • Group of connected computers and devices • Unit of digital information (eight bits) • Programs and instructions used by computers • ...
Cloud Computing Concepts 2021-09-10
Across
- Cloud security threat
- AAA security architecture
- is a general term for the delivery of hosted services over the Internet.
- is a high-performance computer used for large-scale computing purposes
- Types include horizontal and vertical.
Down
- Risk Management Processes
- Second risk Management Processes
- means creating a virtual version of a device or
- also known as VMM
- Saas,Paas,Iaas
10 Clues: Saas,Paas,Iaas • also known as VMM • Cloud security threat • Risk Management Processes • AAA security architecture • Second risk Management Processes • Types include horizontal and vertical. • means creating a virtual version of a device or • is a high-performance computer used for large-scale computing purposes • ...
Embedded Computing #2 2018-10-03
Across
- a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
- a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
- Frequency: the frequency range used in radio, extending from around twenty thousand times per second to around three hundred billion times per second.
- a protocol for communication among devices used for home automation.
- a place where power or information leaves a system.
Down
- a device or location where data goes to.
- an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios.
- a device or location where data comes from.
- a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group aimed at novel applications in the healthcare, fitness, beacons, security, and home entertainment industries.
- a place where, or a device through which, energy or information enters a system.
10 Clues: a device or location where data goes to. • a device or location where data comes from. • a place where power or information leaves a system. • a protocol for communication among devices used for home automation. • a place where, or a device through which, energy or information enters a system. • ...
Computing Section 5.3 2012-12-03
Across
- / There are 16 .... in a colour depth of 4 bits.
- / Only storing black and white
- / The amount of pixels in an image.
- / Cretaed when pixels are mapped using binary codes
- / What does VDU stand for?
- / When there are a lot of bits to differentiate colours, which system is usually used?
- / Which size pixel gives a better image (Smaller or bigger)?
Down
- / A building block of a picture used to build up an image
- / The number of bits sued to represent the colour of a single pixel.
- / What mimics colours found in the real world.
10 Clues: / What does VDU stand for? • / Only storing black and white • / The amount of pixels in an image. • / What mimics colours found in the real world. • / There are 16 .... in a colour depth of 4 bits. • / Cretaed when pixels are mapped using binary codes • / A building block of a picture used to build up an image • ...
MOBILE PERVASIVE COMPUTING 2015-08-24
Across
- defines the current location of the MN from an IP point o view
- a node only tries to discover a route to a destination.
- a space between interference range
- a collection of BT devices which are synchronized to same hopping sequence.
- MANET is a-----------------------network
Down
- moving between access points
- to find a path between source and destination to forward a packet
- mechanism of taking a packet and putting it into data part of a new packet
- is used to avoid the looping concept.
- all base station are connected with ------------------switching centre
10 Clues: moving between access points • a space between interference range • is used to avoid the looping concept. • MANET is a-----------------------network • a node only tries to discover a route to a destination. • defines the current location of the MN from an IP point o view • to find a path between source and destination to forward a packet • ...
SOPHIE'S COMPUTING PUZZLE 2022-10-21
Across
- what your computer is on when you are editing something
- It helps connect to devices
- a piece of computer equipment on which information can be stored.
- Exchanges the information like wireless Wi-Fi
Down
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- a piece of computer equipment such as a keyboard which enables you to put information into a computer
- A part of a computer in which operations are controlled and executed.
- a type of computer program that is designed to run a computer's hardware and application programs.
- a computer software package that performs a specific function directly for an end user or, in some cases, for another application.
- It stores files that are open like RAM
10 Clues: It helps connect to devices • It stores files that are open like RAM • Exchanges the information like wireless Wi-Fi • what your computer is on when you are editing something • a piece of computer equipment on which information can be stored. • A part of a computer in which operations are controlled and executed. • ...
Cloud Computing Crossword 2025-03-06
Across
- What is a Networking model in which data, application and resources are managed by servers.
- What does SaaS mean?
- What is a NIC?
- This is Virtual machine running in a hyper visor
- What does PaaS mean?
Down
- What kind of company is Microsoft Azure?
- What does IaaS mean?
- This is a common type of networking mode.
- What is VM?
- This is the Physical machine running hypervisor
10 Clues: What is VM? • What is a NIC? • What does IaaS mean? • What does SaaS mean? • What does PaaS mean? • What kind of company is Microsoft Azure? • This is a common type of networking mode. • This is the Physical machine running hypervisor • This is Virtual machine running in a hyper visor • ...
Network keywords ~ Computing 2025-10-10
Across
- a fake email
- a service of the internet that contains web pages
- a global network or networks
- messages that are sent between a browser and a website
- a set of rules on how to communicate
- standard mark up language that is used to create web pages
Down
- the person who created the world wide web
- a series of web pages
- the process of converting a message into code that can't be read easily
- a message that is split
10 Clues: a fake email • a series of web pages • a message that is split • a global network or networks • a set of rules on how to communicate • the person who created the world wide web • a service of the internet that contains web pages • messages that are sent between a browser and a website • standard mark up language that is used to create web pages • ...
! ! Happy Birthday ! ! 2019-03-04
Across
- Opposite of Homan
- Rumoured to roam around Richmond Park
- Best puzzle in the newspaper
- Red haired boi
- Best degree at Imperial
- Life saving liquid
- Absorbent squishy cuboid
- A game of naval warfare
- Best Game of Thrones character
- Opposite of Feesh
- An animal and a computer part
- Most romantic way to meet someone
Down
- Easily lost items
- Worst degree at Imperial
- Infinite green vegetables
- Between your head and your body
- Easiest puzzle in the newspaper
- Best way to cook an egg
- Twice the cube root of 1331
- They hold eggs with their feet
- Recommended to be eaten at least once per week
21 Clues: Red haired boi • Opposite of Homan • Easily lost items • Opposite of Feesh • Life saving liquid • Best way to cook an egg • Best degree at Imperial • A game of naval warfare • Worst degree at Imperial • Absorbent squishy cuboid • Infinite green vegetables • Twice the cube root of 1331 • Best puzzle in the newspaper • An animal and a computer part • They hold eggs with their feet • ...
bitefight chinoiserie 2020-01-16
Across
- Couleur de la chance
- Marque de voiture Chinoise
- Signe en 2024
- Signes représentant 12 animaux
- on la voit de la lune
- Signe en 2016
- Thé chinois en galette
- Calendrier chinois (2 mots)
- Capitale de la Chine
- Saison à l'honneur
- célèbre bière chinoise
- Bruce
Down
- vin de riz sucré fermenté
- Signe en 2017
- Entreprise chinoise leader dans l’informatique/ Computing
- le "Amazone" chinois
- Les chinois les allument
- icône vivante du kung fu chinois
- Forme de l'État
- Le Nouvel an en est une..
- Les chinois les écrivent sur du papier
- Signe astrologique lié au Nouvel An
- Signe en 2018
23 Clues: Bruce • Signe en 2017 • Signe en 2024 • Signe en 2018 • Signe en 2016 • Forme de l'État • Saison à l'honneur • Couleur de la chance • le "Amazone" chinois • Capitale de la Chine • on la voit de la lune • Thé chinois en galette • célèbre bière chinoise • Les chinois les allument • vin de riz sucré fermenté • Le Nouvel an en est une.. • Marque de voiture Chinoise • Calendrier chinois (2 mots) • ...
BF Nouvel an chinois 2019-12-31
Across
- on la voit de la lune
- Marque de voiture Chinoise
- icône vivante du kung fu chinois
- Les chinois les écrivent sur du papier
- Bruce
- Signes représentant 12 animaux
- Saison à l'honneur
- Forme de l'État
- Le Nouvel an en est une..
- Signe en 2016
- Animal maléfique légendaire
- vin de riz sucré fermenté
Down
- Couleur de la chance
- Thé chinois en galette
- Entreprise chinoise leader dans l’informatique/ Computing
- Signe en 2017
- Calendrier chinois (2 mots)
- Signe en 2018
- Capitale de la Chine
- Les chinois les allument
- Signe astrologique lié au Nouvel An
- célèbre bière chinoise
- le "Amazone" chinois
- Signe en 2024
24 Clues: Bruce • Signe en 2017 • Signe en 2018 • Signe en 2024 • Signe en 2016 • Forme de l'État • Saison à l'honneur • Couleur de la chance • Capitale de la Chine • le "Amazone" chinois • on la voit de la lune • Thé chinois en galette • célèbre bière chinoise • Les chinois les allument • Le Nouvel an en est une.. • vin de riz sucré fermenté • Marque de voiture Chinoise • Calendrier chinois (2 mots) • ...
Puzzle #17 2023-07-31
Across
- Rotary-wing aircraft
- Timekeeping device
- Woody perennial plant with branches and leaves
- Guitar player
- Elevated area of land
- Center of our solar system
- Earth's atmospheric space
- Portable computing device
- Fleeting
- Musical piece
- Educator
- Change or variation
- Pollinating insect
- Black and white bear
Down
- Dry, arid region with little precipitation
- Rustic and pastoral
- Dense, woody area with diverse flora and fauna
- Viola player
- Maritime navigation aid
- Extended period of dry weather
- Sweet cacao confectionery
- Italian dish
- Words of a song
- Player of the viola
- Small non-flowering plant
- Speed at which music is played
- River crossing
- Healthcare worker
- African mammal
29 Clues: Fleeting • Educator • Viola player • Italian dish • Guitar player • Musical piece • River crossing • African mammal • Words of a song • Healthcare worker • Timekeeping device • Pollinating insect • Rustic and pastoral • Player of the viola • Change or variation • Rotary-wing aircraft • Black and white bear • Elevated area of land • Maritime navigation aid • Sweet cacao confectionery • ...
Cyber Sec 2024-03-16
Across
- displays advertisements
- malware transmits private info
- someone who attempts to gain unauthorized access
- may be used to gain access to computer
- using electronic means to bully
- process of identifying someones's identity
- collection of compromised computers
- encrypted parts of internet not found by search engines
- basic access control mechanism
- social engineering attack
Down
- program run from the network
- hackers using computing power to generate cryptocurrency
- high speed transmission system
- any type of harmful software
- software to detect/prevent malware
- helps screen out hackers
- coverts info to secret form
- release of secure info
- challenge respond test to verify real human
- secure online service
20 Clues: secure online service • release of secure info • displays advertisements • helps screen out hackers • social engineering attack • coverts info to secret form • program run from the network • any type of harmful software • malware transmits private info • high speed transmission system • basic access control mechanism • using electronic means to bully • ...
Today's Crossword 2024-06-16
Across
- Better to be loved or feared?
- German going ___
- "What did I do wrong?"
- "I am not a crook"
- City in "When the Levee Breaks"
- I love opera
- To hug
- Mr. Schaal
- There are 2.15 cattle per person in this state
- Prepare fire-resistant clothing
- The only president to serve two nonconsecutive terms
- Who shot first?
Down
- ___ Computing (Not 1's and 0's)
- White-water difficulty, ___ struggle
- Put a cow in and out to make a ___ bigger
- Trust-Buster
- Mi comida favorita is
- They only won one!
- Where today's real newspaper is
- "Message: I care"
- And if not now, when?
- "The late great Hannibal Lecter"
22 Clues: To hug • Mr. Schaal • Trust-Buster • I love opera • Who shot first? • German going ___ • "Message: I care" • They only won one! • "I am not a crook" • Mi comida favorita is • And if not now, when? • "What did I do wrong?" • Better to be loved or feared? • ___ Computing (Not 1's and 0's) • Where today's real newspaper is • City in "When the Levee Breaks" • Prepare fire-resistant clothing • ...
Programming 2024-10-16
Across
- - Invented Python
- - Lovelace worked on an early computing machine called the ________ Engine
- - Short for "software engineer"
- - Created C++
- - Developed mission-critical software for the Apollo missions
- - Another name for a person who writes code
- - Created the first compiler
Down
- - First computer programmer
- - Language invented by James Gosling
- - The term for a computer’s set of instructions
- - A language made for building big systems like operating systems
- - He created Java
- - Developed mission-critical software for space
13 Clues: - Created C++ • - Invented Python • - He created Java • - First computer programmer • - Created the first compiler • - Short for "software engineer" • - Language invented by James Gosling • - Another name for a person who writes code • - The term for a computer’s set of instructions • - Developed mission-critical software for space • ...
Higher Computing Science (Prelim Revision) 2019-12-01
Across
- Data ____, listed as IN and OUT in a table or on a structure diagram
- If a database meets all its functional requirements, it is said to be fit for _____
- Floating point numbers can be described in terms of range and _______
- Three types of errors: logic, syntax and _______
- Debugging technique, working through the program in your head or on paper
- Development methodology where the client is closely involved at all stages
- Type of software test plan, ensures it as tested as fully as possible
- The term used for MIN, MAX, AVG, SUM and COUNT functions in SQL
- Tracks the value of a variable when debugging, and stops if it reaches a certain value
- Small area of fast memory on or next to the processor
Down
- Small text files stored by the browser that might contain login data or browsing habits
- Two arrays with the same number of elements, containing related information
- Database key using two foreign keys to make a unique value
- SQL statement used to add a new record to a database
- A factor affecting performance, measured in Hz or GHz
- Programs are evaluated for efficiency, fitness for purpose, usability and this. It makes the program easier to edit and make changes long-term.
- Scope of a variable that can be used throughout the program
- The second step of the fetch-execute cycle: activates the ______ ______
- Character encoding system that uses 16 bits
- Type of encryption key that is used to encrypt the data
20 Clues: Character encoding system that uses 16 bits • Three types of errors: logic, syntax and _______ • SQL statement used to add a new record to a database • A factor affecting performance, measured in Hz or GHz • Small area of fast memory on or next to the processor • Type of encryption key that is used to encrypt the data • ...
Historical Developments on Computing/PL's 2021-02-17
Across
- Language designed for businessmen.
- A machine that has memory that initially consisted of 512 36-bit words of liquid mercury delay row, and its input and output was generated by paper tape.
- a programming language that focuses on preserving the runtime behavior of javascript.
- The legacy code was originally written for ___
- Age, It is considered as a major historical event in programming languages and where the Internet emerged.
- A programming language developed in 2014 for Apple operating systems.
- A legacy language by IBM developed for AS400 servers.
- An open source programming language developed by Google in 2009.
- A legacy system which caused IT issues such as payment processing glitches, and blocked account access.
- Began with the Lisp programming language and ideas about artificial intelligence
- It is a minimalistic dialect of the Lisp family of programming languages which consists of a small standard core with several tools for language extension.
- He designed and developed a class based object oriented programming language.
- A characteristic of a ‘legacy code’ is that the code is no longer being ___ by the original developer.
- A high level programming language used for database programming and network programming.
- The Javascript programming language standard released in 1997.
Down
- Pascal The industrial version of Oberon.
- You cannot use ___ tests to find bugs in ‘legacy code’.
- First compiled programming language.
- A functional programming language that is used on mathematical evaluations and was developed by Dr. Mark Tarver in 2005.
- One of the first higher-level languages.
- The world's first full high-level language was designed in the 1940s by German programming pioneer Konrad Zuse the developer of the first computer relay.
- A technological device trend in the decade of 2010.
- A machine capable of simulating common computers.
- Developed in the 1970s by IBM researchers Raymond Boyce and Donald Chamberlin.
- First language to combine seamlessly imperative effects with the lambda calculus.
- A credit card sized single board computer to promote science education.
- It is considered to be one of the core technologies for the world wide web.
- Domain specific programming language that uses quantum algorithms
- It is widely recognized as the spark that ignited the microcomputer revolution.
- A miniature device used as a storage space and was released and invented by M-Systems in 1999.
- first electronic, general-purpose digital computer that can be programmable.
31 Clues: Language designed for businessmen. • First compiled programming language. • Pascal The industrial version of Oberon. • One of the first higher-level languages. • The legacy code was originally written for ___ • A machine capable of simulating common computers. • A technological device trend in the decade of 2010. • A legacy language by IBM developed for AS400 servers. • ...
ICT Computing Essentials Lesson 2 2022-02-03
Across
- Enables user to transfer digital picture files to a computer
- Stores all the software and data that is not being used currently by the CPU
- Temporary memory
- The main storage device of the computer
- Brain of the computer
- Enables user to control movements on the screen when playing video games
- Enables user to verify a person's identity by copying, saving and matching digital images of a fingerprint
- Enables a user to transfer digital picture files to a computer
- Enables user to click, highlight and drag graphical representations (icons) of resources on a computer
- Plugged directly into the motherboard's expansion slots
Down
- Displays text or graphics processed by the computer by projecting content onto a large screen or wall
- Tower where the different components of your desktop computer are housed
- Displays the text or graphics processed by the computer
- Determines the global position (that is, the location) of the device
- A small, portable storage device that is inserted into small input/output devices
- Enables a user to scan and read information from printed barcodes
- Enables user to transfer audio (sounds, music) to a computer as digital files
- Places digital content (such as text or images) on paper by printing it with ink, producing a "hard copy"
- A small, portable storage device that connects to a computer
- Flat, round portable storage devices that require specialized optical drives to read and save (write) data
- Circuit board inside computer
- Enables user to input text and numbers into a computer
- Plays audio files processed by a computer
- A digital pen that enables users to write directly on a touch screen
- Cools the CPU
- Houses all of the system unit's internal components
26 Clues: Cools the CPU • Temporary memory • Brain of the computer • Circuit board inside computer • The main storage device of the computer • Plays audio files processed by a computer • Houses all of the system unit's internal components • Enables user to input text and numbers into a computer • Displays the text or graphics processed by the computer • ...
Mobile Apps and Computing Jargon 2024-02-20
Across
- The file format used on Apples OS.
- The hardware and its associated operating system.
- The programs and other operating information used by a computer.
- The process of adapting software for the purpose of being released onto a new platform.
- A mobile operating system made by Apple.
- The pre-released version of an app which is tested by those outwidth the development team.
- The type of people your product is being designed for described by quantifiable characteristics.
- The external and internal physical devices and equipment used to enable a computer to function.
- The aspects of the software that the user can directly access (e.g. the user interface).
- Encompasses all aspects of the user' interaction with the product and describes how satisfied they are.
- The systematic process of intensely auditing, monitoring & evaluating an app to ensure it meets requirements & functionality.
- Software which is released by the developers to the public freely to be used, studied and changed.
Down
- The aspect of the computer which the user interacts with directly.
- A mobile operating system maintained by Google.
- A form of development when the developers intend for the application to be available on multiple platforms.
- The pre-released version of an app which is tested by those who developed it.
- An unexpected or unintended problem with software/hardware.
- The low-level software required to support a computers basic function.
- A piece of software that preforms a specific function for the user.
- Made during initial design and development, skeletal diagrams of a design used to depict functions and GUI.
- The aspects of the software that the user cannot directly access (e.g. server and remote storage).
- Software designed to manage changes in the development of software.
- A form of development when the developers intend for the application to be available on one specific platform.
- Hardware or software which allows a computer system to behave like a different computer system.
- The file format used on Googles OS.
25 Clues: The file format used on Apples OS. • The file format used on Googles OS. • A mobile operating system made by Apple. • A mobile operating system maintained by Google. • The hardware and its associated operating system. • An unexpected or unintended problem with software/hardware. • The programs and other operating information used by a computer. • ...
