computing Crossword Puzzles
INFORMATIKA 2025-08-06
Across
- Revolusi industri pertama kali dimulai dengan penemuan ini
- Teknologi yang memungkinkan perangkat saling terhubung melalui internet
- Tempat penyimpanan digital untuk menyimpan dan mengakses data
- Tahapan perkembangan industri yang sekarang disebut revolusi 4.0
Down
- Sistem komputasi yang memungkinkan akses sumber daya lewat internet
- Penyimpanan data secara online melalui jaringan internet
- Cloud yang digunakan secara pribadi oleh satu organisasi
- Singkatan dari Artificial Intelligence
- Teknologi yang meniru kecerdasan manusia dalam komputer
- Kumpulan informasi atau fakta dalam bentuk digital
10 Clues: Singkatan dari Artificial Intelligence • Kumpulan informasi atau fakta dalam bentuk digital • Teknologi yang meniru kecerdasan manusia dalam komputer • Penyimpanan data secara online melalui jaringan internet • Cloud yang digunakan secara pribadi oleh satu organisasi • Revolusi industri pertama kali dimulai dengan penemuan ini • ...
Puzzle 2024-07-03
Across
- Is a software application used to access, retrieve, and view information on the internet
- are step-by-step procedures or formulas for solving problems or performing tasks. They are used in computing to process data, perform calculations, and automate reasoning.
- Programming Is the process of designing, writing, testing, and maintaining the source code of computer programs
- In a computing context often refers to the initiation or start of a program, application, or website. It can also mean the release of a new software product or service to the public.
Down
- Engineering Is a disciplined approach to designing, developing, maintaining, testing, and evaluating software systems
- Is the act of exploiting vulnerabilities in computer systems or networks to gain unauthorized access
6 Clues: Is a software application used to access, retrieve, and view information on the internet • Is the act of exploiting vulnerabilities in computer systems or networks to gain unauthorized access • Programming Is the process of designing, writing, testing, and maintaining the source code of computer programs • ...
Technical Crossword 2022-04-05
Across
- a type of mutable datatype in python
- pictorial representation of an algorithm
- an Ampersand before the name of a variable denotes __ in c language
- 0 and 1 language
- the longest word that can be typed on one row of keys
Down
- short form for WiFi is wireless....
- a set of rules for the structure of sentence in a language
- Computing models that stores data on the internet
- Another name for computer programs
- .gif is an extension of which file
10 Clues: 0 and 1 language • Another name for computer programs • .gif is an extension of which file • short form for WiFi is wireless.... • a type of mutable datatype in python • pictorial representation of an algorithm • Computing models that stores data on the internet • the longest word that can be typed on one row of keys • ...
18.1 Vocab 2017-04-28
Across
- sale figures to regional managers
- teller machine or their own computer
- software for designing product with a computer
- transmission of information over communication lines
- a real situation using a computer
Down
- using computing,electronics,and telecommunication to process and distribute information
- an artificial three dimensional visual world crated by computers
- small portable computer designed to be used while is it on the body
- the computer recreates places and actions
- an arrangement that allows employees to work at home while communicating with the workplace
10 Clues: sale figures to regional managers • a real situation using a computer • teller machine or their own computer • the computer recreates places and actions • software for designing product with a computer • transmission of information over communication lines • an artificial three dimensional visual world crated by computers • ...
Vocabulary Unit 1 & 2 2019-09-10
Across
- Oh, it's raining, can I borrow your __?
- The books are on the ____.
- On weekends I go to the ___ with my family
- I only have a few 20 pesos bills and a photograph in my ____.
- Do you come to school by bus or by ____.
Down
- I'm in a new school and I have many new ___.
- My ____ has everything I need for school today.
- My grandfather reads the ___ every morning.
- We need our ____ for computing class.
- Ask your ___ if you have questions.
10 Clues: The books are on the ____. • Ask your ___ if you have questions. • We need our ____ for computing class. • Oh, it's raining, can I borrow your __? • Do you come to school by bus or by ____. • On weekends I go to the ___ with my family • My grandfather reads the ___ every morning. • I'm in a new school and I have many new ___. • ...
mobiles 2013-09-20
Across
- numbers, math
- you can get it free in mcdonalds
- the quality of being at hand when needed
- something with more than 1 function
- an open wireless technology standard for exchanging data over short distances
Down
- the amount of storage something can hold
- Skill in performing tasks, esp. with the hands
- words, verbal analysis
- a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone
- The ability to move or be moved freely and easily
10 Clues: numbers, math • words, verbal analysis • you can get it free in mcdonalds • something with more than 1 function • the amount of storage something can hold • the quality of being at hand when needed • Skill in performing tasks, esp. with the hands • The ability to move or be moved freely and easily • ...
Chapter 18.1 Key Terms Created By: Ashley Gallo 2014-04-29
Across
- Independently
- The transmission of information over communications lines
- An arrangement that allows employees to work at home while communicating with the workplace
- A small portable computer designed to be used while its worn on the body
- Software for designing products with a computer
Down
- An artificial, three-dimensional visual world created by a computer
- Computing, electronics, and telecommunications to process and distribute information in digital and other forms
- To send forward
- To see a short vision of something
- Model of a simulation
10 Clues: Independently • To send forward • Model of a simulation • To see a short vision of something • Software for designing products with a computer • The transmission of information over communications lines • An artificial, three-dimensional visual world created by a computer • A small portable computer designed to be used while its worn on the body • ...
Coding 2024-03-07
Across
- a single direction
- a set of step by step directions used to solve a problem
- a value that can change
- looking for items that repeat when problem solving
- breaking a problem down into smaller pieces
- a mistake in the code
Down
- focusing on only the things you need to solve a problem
- a list of steps that must happen in a specific order
- used in coding when a step repeats itself
- writing directions for the computing device to use to complete a task
10 Clues: a single direction • a mistake in the code • a value that can change • used in coding when a step repeats itself • breaking a problem down into smaller pieces • looking for items that repeat when problem solving • a list of steps that must happen in a specific order • focusing on only the things you need to solve a problem • ...
Module 9: Virtualization & Cloud Computing 2025-03-06
Across
- Similar to SaaS, also known as "hosted platform"
- Cloud services delivered by a third-party provider
- Allows company to use storage or entire virtual servers
- In common cloud computing problems, threats to integrity
Down
- Usually offered as a subscription based on # of users, also known as "hosted application"
- Networking model in which data, apps,& processing power are managed by servers on Internet
- Common PaaS for Ajax
- Virtual Machine running in a hypervisor
- When troubleshooting, what first step should you do to the problem?
- Microsoft cloud service
10 Clues: Common PaaS for Ajax • Microsoft cloud service • Virtual Machine running in a hypervisor • Similar to SaaS, also known as "hosted platform" • Cloud services delivered by a third-party provider • Allows company to use storage or entire virtual servers • In common cloud computing problems, threats to integrity • ...
ICT CROSSWORDS 2025-03-21
Across
- SOMETHING YOUR ALLOWED TO DO
- SOFTWARE THAT IS FREE TO USE,EDIT AND DISTRIBUTE
- USING SOMEONE ELSE'S WORK AND SAYING THAT IS IT IS YOURS
- ACKNOWLEDGE THE OWNER OF CONTENT THAT YOU USE IN YOUR WORK
- ILLEAGLY COPYING AND DISTRIBUTION OF ORIGINAL MEDIA
Down
- THE CONTENT THAT YOU DONT NEED TO PAY FOR
- SOMETHING YOUR NOT ALLOWED TO DO
- COMPUTING REMOTE STORAGE OF FILES,DOCUMENTS AND APPLICATION
- AVAILABLE FOR ANYONE TO USE
- PROVIDES INTERNET CONNECTION TO YOUR HOME
10 Clues: AVAILABLE FOR ANYONE TO USE • SOMETHING YOUR ALLOWED TO DO • SOMETHING YOUR NOT ALLOWED TO DO • THE CONTENT THAT YOU DONT NEED TO PAY FOR • PROVIDES INTERNET CONNECTION TO YOUR HOME • SOFTWARE THAT IS FREE TO USE,EDIT AND DISTRIBUTE • ILLEAGLY COPYING AND DISTRIBUTION OF ORIGINAL MEDIA • USING SOMEONE ELSE'S WORK AND SAYING THAT IS IT IS YOURS • ...
isp 2025-05-28
Across
- Step-by-step procedure for solving a problem
- Security system that controls incoming and outgoing network traffic
- Small piece of data stored by a website on a user's browser
- Process of finding and fixing errors in code
Down
- Translates source code into executable code
- Process of converting data into a secure format
- Error or flaw in a computer program
- Software designed to harm or exploit systems
- Amount of data that can be transmitted in a given time
- Internet-based computing and storage
10 Clues: Error or flaw in a computer program • Internet-based computing and storage • Translates source code into executable code • Software designed to harm or exploit systems • Step-by-step procedure for solving a problem • Process of finding and fixing errors in code • Process of converting data into a secure format • Amount of data that can be transmitted in a given time • ...
Understanding Operator Precedence 2025-11-23
Across
- – Operators such as AND and OR, evaluated later in the precedence chain.
- – The rule that decides which operator is evaluated first.
- – An operator with higher precedence than addition.
- – The process of computing expressions based on precedence rules.
- – Highest-precedence operators like ++ and --.
Down
- – Shares the same precedence level as multiplication.
- – An arithmetic operator evaluated after multiplication and division.
- – Determines the direction of evaluation (left-to-right or right-to-left).
- – Used to override default operator precedence.
- – Operators used to compare values, evaluated after arithmetic operators.
10 Clues: – Highest-precedence operators like ++ and --. • – Used to override default operator precedence. • – An operator with higher precedence than addition. • – Shares the same precedence level as multiplication. • – The rule that decides which operator is evaluated first. • – The process of computing expressions based on precedence rules. • ...
digital rights crossword 2025-11-24
Across
- something that should be kept hidden
- someone who has committed a crime
- a cellular device with advanced computing skills
- The action of protecting or the state of being protected
- human rights that apply to the online world
- websites or apps that allow you to create and share
Down
- The state of being protected in a situation
- False or inaccurate information
- searching information on someone or something
- a way to convince someone into sending personal or financial information
10 Clues: False or inaccurate information • someone who has committed a crime • something that should be kept hidden • The state of being protected in a situation • human rights that apply to the online world • searching information on someone or something • a cellular device with advanced computing skills • websites or apps that allow you to create and share • ...
CIS Puzzle 2025-11-18
Across
- Service model that provides runtime environments without managing servers.
- Technology enabling multiple operating systems on a single physical machine.
- Virtualized computing resources delivered over the internet
- Enterprise-grade backup and recovery solution for disaster resilience.
- Virtualized network function replacing traditional hardware appliances.
Down
- Popular cloud provider offering AWS, Azure, and GCP alternatives.
- Network security model based on "never trust, always verify."
- Common protocol for transferring files over a network.
- Technique for distributing traffic across multiple servers for reliability.
- Technology that creates secure tunnels over public networks.
10 Clues: Common protocol for transferring files over a network. • Virtualized computing resources delivered over the internet • Technology that creates secure tunnels over public networks. • Network security model based on "never trust, always verify." • Popular cloud provider offering AWS, Azure, and GCP alternatives. • ...
MIDTERM 2022-09-14
Across
- He created the Analytical Engine
- Another name for Supercomputers
- AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
- It is an example of a highly automated consumer product.
- FORTRAN is an acronym for ______.
- Type of computer is designed to meet the computing needs of an individual
- LANGUAGE A low-level programming language that the computer can read and interpret that is made up of a group of binary digits
- The purchasing of a domain name online with the intent to profit, deceive, harm reputation, and prevent others from registering the same, if such a domain name is available.
- He built the first electro-mechanical computer.
- A database that houses information.
- A magnetically coated cylinder that can be used to store data and programs
- A device invented around 1860 by Antonio Meucci.
- This is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
- Fastest type of computer
- The unauthorized introduction or transmission of viruses, as well as the deliberate or careless alteration, destruction, deletion, or degradation of computer data, an electronic document, or an electronic data communication.
- Largest type of computer
- The world's first commercially successful word processor
Down
- Detects malfunctions and identifies the causes of failure
- Uses a system of cores—small rings of magnetic material—to store data
- Used to track the system’s operation and identify unsafe conditions
- It is a specialized branch of automation in which the automated machine possesses certain anthropomorphic, or human-like, characteristics.
- Penalty for Illegal Access.
- An electrical component with switch and amplifier functions. In radios, televisions, computers, and other devices, it is used to regulate the flow of power
- This type of computer typically sits on a desk and runs on power from an electrical wall outlet
- The unauthorized use of any portion or the entire computer system
- First computer program
- This was invented by the Heinrich Hertz in 1888.
- He invented the floppy disk
- IBM's first personal computer
- They are large and expensive computers capable of simultaneously processing data for hundreds or thousands of users.
- The willful modification or careless obstruction or interference with the operation of a computer or computer network through the input, transmission, destruction, deletion, degradation, alteration, or suppression of computer data or programs, electronic documents, or electronic data messages, including the introduction or transmission of viruses.
- The first computerized spreadsheet program
- A physical object used in computers to store data, information, and programs
- A modern desktop in which the computer circuitry is incorporated into the display device
- This was designed to meet the computing needs of an individual
- The origin of the global communications network
- The purposeful use of a computer system to engage in, maintain, control, or operate any lewd display of sexual organs or sexual behavior, whether directly or indirectly, in exchange for a favor or reward.
- They monitor cybercrime cases being bandied by participating law enforcement and prosecution agencies.
- An electronic component that is part of an integrated circuit that houses the CPU
- A piece of electronics that regulates the movement of electrons in a vacuum
40 Clues: First computer program • Fastest type of computer • Largest type of computer • Penalty for Illegal Access. • He invented the floppy disk • IBM's first personal computer • Another name for Supercomputers • He created the Analytical Engine • FORTRAN is an acronym for ______. • A database that houses information. • The first computerized spreadsheet program • ...
MIDTERM 2022-09-14
Across
- First computer program
- This type of computer typically sits on a desk and runs on power from an electrical wall outlet
- A physical object used in computers to store data, information, and programs
- It is an example of a highly automated consumer product.
- The first computerized spreadsheet program
- IBM's first personal computer
- An electrical component with switch and amplifier functions. In radios, televisions, computers, and other devices, it is used to regulate the flow of power
- This is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
- Largest type of computer
- Detects malfunctions and identifies the causes of failure
- Used to track the system’s operation and identify unsafe conditions
- Another name for Supercomputers
- Uses a system of cores—small rings of magnetic material—to store data
- This was invented by the Heinrich Hertz in 1888.
- AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
- It is a specialized branch of automation in which the automated machine possesses certain anthropomorphic, or human-like, characteristics.
- They monitor cybercrime cases being bandied by participating law enforcement and prosecution agencies.
- They are large and expensive computers capable of simultaneously processing data for hundreds or thousands of users.
- Type of computer is designed to meet the computing needs of an individual
- The purchasing of a domain name online with the intent to profit, deceive, harm reputation, and prevent others from registering the same, if such a domain name is available.
- FORTRAN is an acronym for ______.
- The unauthorized introduction or transmission of viruses, as well as the deliberate or careless alteration, destruction, deletion, or degradation of computer data, an electronic document, or an electronic data communication.
Down
- Penalty for Illegal Access.
- He built the first electro-mechanical computer.
- A modern desktop in which the computer circuitry is incorporated into the display device
- A piece of electronics that regulates the movement of electrons in a vacuum
- The purposeful use of a computer system to engage in, maintain, control, or operate any lewd display of sexual organs or sexual behavior, whether directly or indirectly, in exchange for a favor or reward.
- A low-level programming language that the computer can read and interpret that is made up of a group of binary digits
- This was designed to meet the computing needs of an individual
- A device invented around 1860 by Antonio Meucci.
- A database that houses information.
- The unauthorized use of any portion or the entire computer system
- The willful modification or careless obstruction or interference with the operation of a computer or computer network through the input, transmission, destruction, deletion, degradation, alteration, or suppression of computer data or programs, electronic documents, or electronic data messages, including the introduction or transmission of viruses.
- Fastest type of computer
- The origin of the global communications network
- A magnetically coated cylinder that can be used to store data and programs
- He invented the floppy disk
- An electronic component that is part of an integrated circuit
- He created the Analytical Engine
- The world's first commercially successful word processor
40 Clues: First computer program • Fastest type of computer • Largest type of computer • Penalty for Illegal Access. • He invented the floppy disk • IBM's first personal computer • Another name for Supercomputers • He created the Analytical Engine • FORTRAN is an acronym for ______. • A database that houses information. • The first computerized spreadsheet program • ...
MIDTERM 2022-09-14
Across
- First computer program
- This type of computer typically sits on a desk and runs on power from an electrical wall outlet
- A physical object used in computers to store data, information, and programs
- It is an example of a highly automated consumer product.
- The first computerized spreadsheet program
- IBM's first personal computer
- An electrical component with switch and amplifier functions. In radios, televisions, computers, and other devices, it is used to regulate the flow of power
- This is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
- Largest type of computer
- Detects malfunctions and identifies the causes of failure
- Used to track the system’s operation and identify unsafe conditions
- Another name for Supercomputers
- Uses a system of cores—small rings of magnetic material—to store data
- This was invented by the Heinrich Hertz in 1888.
- AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
- It is a specialized branch of automation in which the automated machine possesses certain anthropomorphic, or human-like, characteristics.
- They monitor cybercrime cases being bandied by participating law enforcement and prosecution agencies.
- They are large and expensive computers capable of simultaneously processing data for hundreds or thousands of users.
- Type of computer is designed to meet the computing needs of an individual
- The purchasing of a domain name online with the intent to profit, deceive, harm reputation, and prevent others from registering the same, if such a domain name is available.
- FORTRAN is an acronym for ______.
- The unauthorized introduction or transmission of viruses, as well as the deliberate or careless alteration, destruction, deletion, or degradation of computer data, an electronic document, or an electronic data communication.
Down
- Penalty for Illegal Access.
- He built the first electro-mechanical computer.
- A modern desktop in which the computer circuitry is incorporated into the display device
- A piece of electronics that regulates the movement of electrons in a vacuum
- The purposeful use of a computer system to engage in, maintain, control, or operate any lewd display of sexual organs or sexual behavior, whether directly or indirectly, in exchange for a favor or reward.
- A low-level programming language that the computer can read and interpret that is made up of a group of binary digits
- This was designed to meet the computing needs of an individual
- A device invented around 1860 by Antonio Meucci.
- A database that houses information.
- The unauthorized use of any portion or the entire computer system
- The willful modification or careless obstruction or interference with the operation of a computer or computer network through the input, transmission, destruction, deletion, degradation, alteration, or suppression of computer data or programs, electronic documents, or electronic data messages, including the introduction or transmission of viruses.
- Fastest type of computer
- The origin of the global communications network
- A magnetically coated cylinder that can be used to store data and programs
- He invented the floppy disk
- An electronic component that is part of an integrated circuit
- He created the Analytical Engine
- The world's first commercially successful word processor
40 Clues: First computer program • Fastest type of computer • Largest type of computer • Penalty for Illegal Access. • He invented the floppy disk • IBM's first personal computer • Another name for Supercomputers • He created the Analytical Engine • FORTRAN is an acronym for ______. • A database that houses information. • The first computerized spreadsheet program • ...
Chapter3_Internet Crime 2017-08-03
Across
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of prpgramming code is attached to a file, so that when the infected file is opened, the code executes
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
Down
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- Type of attacker that Promote political ideology.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
23 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
Mobile Computing - Dimas - 19110092 2021-03-30
Across
- Asosiasi Penyelenggara Jasa Internet
- konsep LAN yang mengadopsi teknologi internet, yang diperkenalkan pada akhir tahun 1995.
- jaringan komunikasi terproteksi
- Garis penghubung antar simpul
- Jaringan yang selalu terhubung ke seluruh dunia
Down
- Sebelum internet
- Japan UNIX Network
- keseluruhan sarana untuk menyediakan barang-barang yang diperlukan bagi kelangsungan dan kenyamanan hidup manusia.
- jaringan komputer yang menyambungkan komputer dalam area terbatas
- sebuah protokol Internet yang berjalan di dalam lapisan aplikasi yang merupakan standar untuk pengiriman berkas (file) komputer antar mesin-mesin dalam sebuah Antarjaringan.
10 Clues: Sebelum internet • Japan UNIX Network • Garis penghubung antar simpul • jaringan komunikasi terproteksi • Asosiasi Penyelenggara Jasa Internet • Jaringan yang selalu terhubung ke seluruh dunia • jaringan komputer yang menyambungkan komputer dalam area terbatas • konsep LAN yang mengadopsi teknologi internet, yang diperkenalkan pada akhir tahun 1995. • ...
computing Solutions elementary 7A 2023-06-29
Across
- it records moving pictures and sound
- you need it if have a low power on your phone
- you need it to save the information from your computer
- a device that connects two or more packet-switched networks.
- a device with a part to cover each ear through which you can listen
Down
- a small, flat computer that is controlled by touching the screen
- you need them to listen to music on your computer
- a computer that is small enough to be carried around easily
- a computer screen
- A panel of buttons used for typing
10 Clues: a computer screen • A panel of buttons used for typing • it records moving pictures and sound • you need it if have a low power on your phone • you need them to listen to music on your computer • you need it to save the information from your computer • a computer that is small enough to be carried around easily • ...
Cloud Computing Crossword 3 2022-05-25
Across
- A set of rules and policies for granting access to users based on roles.
- A human-readable data-serialization language.
- The most well-known social media network for professionals
- ...Transfer Protocol, the main protocol for managing Web application traffic.
- One of the most prominent online course platforms.
Down
- The act of transmitting video over an IP network in real time.
- ...learning, a modern method of combining both synchronous and asynchronous training in e-learning.
- A modern application layer protocol which streamlines messaging between clients and back-end services.
- ...framework, an open-source ORM framework for .NET applications, which enables developers to work with data using objects of domain specific classes without focusing on the underlying database tables and columns where this data is stored.
- ...server, a system on a network used to access and manage devices in a separate security zone.
10 Clues: A human-readable data-serialization language. • One of the most prominent online course platforms. • The most well-known social media network for professionals • The act of transmitting video over an IP network in real time. • A set of rules and policies for granting access to users based on roles. • ...
christmas mixed with computing 2025-12-16
Across
- computer off
- the height of where Santa fly's
- zoom in
Down
- How many colours would there be in this bitmap image? single binary digit is called
- how Santa counts his reindeer
- how Santa sorters your letters digitally
- captured by a microphone
- computer on
- what a photo of Santa is made up by
- a single binary digit
10 Clues: zoom in • computer on • computer off • a single binary digit • captured by a microphone • how Santa counts his reindeer • the height of where Santa fly's • what a photo of Santa is made up by • how Santa sorters your letters digitally • How many colours would there be in this bitmap image? single binary digit is called
Sam computer vocabulary 2014-02-10
Across
- A collection of information, usually including a username and the current date and time, stored on the local computer of a person using the World Wide Web, used chiefly by websites to identify users who have previously registered or visited the site.
- A memory device in which information can be accessed in any order.
- uniform resource locator; a standardized address of a location on the internet, esp on the World Wide Web
- A sequence of adjacent bits, usually eight, operated on as a unit by a computer
- computing the representation of each one of a set of numbers, letters, etc, as a unique sequence of bits, as in ASCII
- Is the brain of the computer
- the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
- A computer that processes requests for HTML and other documents that are components of web pages.
- internet service provider, a business providing its customers with connection to the internet and other related services
- a personal computer small enough to fit conveniently in an individual workspace
- An interconnected system of networks that connects computers around the world via the TCP/IP protocol.
- the programs and other operating information used by a computer.
- Is physical components that make up a computer system.
- Universal Serial Bus is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.
- The set of routines stored in read-only memory that enable a computer to start the operating system and to communicate with the various devices in the system, such as disk drives, keyboard, monitor, printer, and communications ports.
Down
- a model of computer use in which services stored on the internet are provided to users on a temporary basis
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit. Also called hard disk drive.
- The numerical sequence that serves as an identifier for an Internet server.
- This term is used to describe a preset value for some option in a computer program.
- A program that accesses and displays files and other data available on the Internet and other networks.
- connect as or operate with a network.
- intellectual property, esp computer source code, that is made freely available to the general public by its creators
- A fast storage buffer in the central processing unit of a computer. Also called cache memory.
- Memory hardware that allows fast access to permanently stored data but prevents addition to or modification of the data.
- of, relating to, or situated on the edge or periphery of something.
- A computer or program that can download files for manipulation, run applications, or request application-based services from a file server.
- computing domain name system
- In computing, booting is the initial set of operations that a computer system performs after electrical power to the CPU is switched on or when the computer is reset. ...
29 Clues: Is the brain of the computer • computing domain name system • connect as or operate with a network. • Is physical components that make up a computer system. • the programs and other operating information used by a computer. • A memory device in which information can be accessed in any order. • of, relating to, or situated on the edge or periphery of something. • ...
Introduction to parallel computing 2021-04-01
Across
- coordination of parallel tasks in real-time
- run in multiple CPUs
- the capacity to be changed in size or scale
- do multiple things at the same time
- a program or set of instructions
Down
- ratio of computation to communication
- is one of the factors that contribute to scalability
- to test the performance of a parallel program
- store program and data instructions
- run in single CPU
10 Clues: run in single CPU • run in multiple CPUs • a program or set of instructions • store program and data instructions • do multiple things at the same time • ratio of computation to communication • coordination of parallel tasks in real-time • the capacity to be changed in size or scale • to test the performance of a parallel program • ...
Virtualization and Cloud Computing 2018-07-26
Across
- allows an organization to configure their data center so that it can off-load certain cloud services to a public cloud server during busy times
- encapsulates the hard disk into a single file for use by the operating system
- allows you to create an environment for each virtual machine
- hosted by the company that provides private cloud service using VMs and application maintained in their own data centers
- software that manages computer hardware and software resources
- a system for storing computer data in more than one place so that it can be used by any computer connected to the system
Down
- configured to offer services to anyone connected to the Internet with a valid account
- creation of a virtual resource such as a server, desktop, operating system, file, storage or network
- the use of various services, such as software development platforms, servers, storage and software, over the internet
- an emulated computer environment that runs on a physical computer
10 Clues: allows you to create an environment for each virtual machine • software that manages computer hardware and software resources • an emulated computer environment that runs on a physical computer • encapsulates the hard disk into a single file for use by the operating system • configured to offer services to anyone connected to the Internet with a valid account • ...
Key Concepts Cloud Computing 2024-05-03
Across
- Accessing resources as needed, not upfront.
- Ability to adjust resources on-demand.
- Measures to protect data and applications in the cloud.
- Potentially lower costs compared to traditional IT.
Down
- Tools and processes to manage cloud resources.
- Infrastructure spread across multiple locations for redundancy.
- High uptime and resiliency of cloud services.
- Ability to provision and manage resources without IT intervention.
- Creating virtual machines for applications.
- Flexibility to adapt to changing needs.
10 Clues: Ability to adjust resources on-demand. • Flexibility to adapt to changing needs. • Accessing resources as needed, not upfront. • Creating virtual machines for applications. • High uptime and resiliency of cloud services. • Tools and processes to manage cloud resources. • Potentially lower costs compared to traditional IT. • ...
Unit G: Computing Systems 2025-02-03
Across
- The information computers get from users, devices, or other computers
- The information computers give to users, devices, or other computers
- The thinking work computers do to turn input into output
- Software that manages manages computer hardware (the mouse, the keyboard) and software, and that provides common services for computer programs
- Data storage that is firm, or hardwired, and cannot be easily altered or reprogrammed
- The physical parts of the computer which you can touch
Down
- Application software that helps users produce things, like documents, databases, presentations, spreadsheet reports, video, etc.
- The set of instructions for the computer to run a particular task or boot up
- The act of saving information for later use or manipulation
- Computer memory that can be accessed randomly at any time, allowing quick access and manipulation
10 Clues: The physical parts of the computer which you can touch • The thinking work computers do to turn input into output • The act of saving information for later use or manipulation • The information computers give to users, devices, or other computers • The information computers get from users, devices, or other computers • ...
Bryce tech- crossword 2017-06-13
Across
- reader a mobile device that is used primarily for reading e-books.
- a computer designed to be in a stationary location, where all components fit on or under a table.
- is the practical use of human knowledge to extend human abilities and to satisfy human wants and needs.
- a thin, lightweight mobile computer that has a touchscreen.
- Technology Relates to the moving of people or products in cars, ships, airplanes, trains, or other vehicles. Can be a product, a system, device, or material
- camera a device that allows you to take photos and store the photographed images digitally.
- Technology Relating to items being made or processed, typically in a factory. The technology used to produce a product. Tools, equipment, processes.
- an internet-capable phone that contains different apps and communicates wirelessly with other devices.
Down
- console a mobile computing device designed for single player or multi-player video games.
- Technology This type of technology deals with houses, bridges, skyscrapers, or structures. Materials, equipment, tools, and processes
- device any hardware component that allows you to enter data and instructions into a computer or mobile device.
- The technology of using, adapting, and altering organisms and biological processes. May be a technology or process that RELATES to or interacts with organisms
- contains keys you press to enter data and instructions into a computer or mobile device.
- a computer dedicated to providing one or more services to other computers or devices on a network.
- Technology Devices or processes that relate to the communication of ideas or information.
- media player a mobile device on which you can store, organize, and play or view digital media.
- a collection of computers and devices connected together, often wirelessly.
- device a computing device small enough to hold in your hand with screens between 3 and 5 inches.
- a thin, lightweight mobile computer with a screen in its lid and a keyboard in its base.
- and Power Technology Process, components and systems related to energy, electricity, and/or power that make things run.
20 Clues: a thin, lightweight mobile computer that has a touchscreen. • reader a mobile device that is used primarily for reading e-books. • a collection of computers and devices connected together, often wirelessly. • contains keys you press to enter data and instructions into a computer or mobile device. • ...
IT Quiz 2024-01-09
Across
- Information that is stored and processed by computers.
- The physical components of a computer system.
- The practice of protecting systems, networks, and programs from digital attacks.
- Verifying the identity of a user, system, or application.
- A software application used to access information on the World Wide Web.
- The address used to access resources on the World Wide Web.
- The process of converting information into a code to secure it from unauthorized access.
- Computing The delivery of computing services over the internet, such as storage and processing power.
- The address used to access resources on the World Wide Web.
- A step-by-step procedure for solving a problem or accomplishing a task.
- Software designed to harm or exploit computer systems.
- A software update designed to fix security vulnerabilities.
- Learning A subset of AI that enables systems to learn and improve from experience.
- A security system that monitors and controls incoming and outgoing network traffic.
- A computer or system that manages network resources and provides services to other computers.
- A network that connects computers within a limited area, such as a home, office, or campus.
Down
- A number system that uses only two digits, 0 and 1.
- A fraudulent attempt to obtain sensitive information, often through deceptive emails.
- A device that detects and measures physical stimuli, often used by AI systems.
- A computer program designed to simulate conversation with human users.
- A global network connecting millions of private, public, academic, business, and government networks.
- The smallest unit of digital information.
- A machine designed to carry out tasks autonomously or with minimal human intervention.
- An authentication method using two different factors, like a password and a security code.
- The process of designing and building an executable computer program.
- The standard markup language for creating web pages.
- Criminal activities carried out using the internet.
- Vision AI's capability to interpret and make decisions based on visual data.
- A structured collection of data that is stored and organized for easy retrieval.
- Programs and applications that run on a computer.
- Malicious software that can replicate itself and spread to other computers.
31 Clues: The smallest unit of digital information. • The physical components of a computer system. • Programs and applications that run on a computer. • A number system that uses only two digits, 0 and 1. • Criminal activities carried out using the internet. • The standard markup language for creating web pages. • Information that is stored and processed by computers. • ...
uuuu 2023-03-01
Across
- An authoritative decision or determination made by someone in a position of power or authority.
- To seize or take hold of something or someone.
- To make known or disclose something previously unknown or secret.
- Spaces in the uppermost part of a house, often used for storage or as living quarters.
- A small tool or application that performs a specific function, typically on a website or mobile device.
- Regrettably, sadly, or unluckily.
- An agreement reached by two or more parties by making concessions or adjustments to their demands or positions.
- To set free or allow to go.
- An outburst of anger or frustration, often characterized by shouting, crying, or other disruptive behavior.
- Causing severe damage or complete destruction.
- In a literal or strict sense, without exaggeration or metaphorical embellishment.
- The use of computers or computing technology.
- To speak very softly or quietly, typically to avoid being overheard.
- Shaking or trembling rapidly, often due to fear or excitement.
- Relating to or involving something.
- To break up or dissolve a group or organization.
Down
- Made less severe or intense; moderated or restrained.
- To hold responsible or accountable for a fault or mistake.
- Official permission or authorization to do something.
- A claim or assertion that someone has done something illegal or wrong, typically without proof or evidence.
- Intense anger or fury.
- A statement or theory put forward as a premise to be maintained or proved.
- A large group or mass of something, typically insects or people, moving together.
- Captivated or fascinated by someone or something.
- On or after a particular time or event; immediately after.
- A work of fiction, typically of extended length and containing a complex plot and characters.
- Partially conscious or aware.
- A task or piece of work assigned to someone to be completed, typically as part of a course of study or a job.
- Facts or information that support or prove something.
- Important or meaningful in some way; having a noticeable or major effect.
- Seemingly, according to what is known or understood.
31 Clues: Intense anger or fury. • To set free or allow to go. • Partially conscious or aware. • Regrettably, sadly, or unluckily. • Relating to or involving something. • The use of computers or computing technology. • To seize or take hold of something or someone. • Causing severe damage or complete destruction. • To break up or dissolve a group or organization. • ...
Operating System_Utilies Programs 2021-10-31
Across
- create a backup for hard drive
- collection of programs that handle technical tasks
- saves any open document and running programs apps to RAM
- recognizes and correct problems
- small program that tells the OS how to communicate with specific device
- multitasking UNIX-based operating system
Down
- specialized programs designed to make computing easier
- portion of a storage medium functioning as additional RAM
- saves any open document and running programs or apps to internal hard drive
- identifies and eliminates non essential files
10 Clues: create a backup for hard drive • recognizes and correct problems • multitasking UNIX-based operating system • identifies and eliminates non essential files • collection of programs that handle technical tasks • specialized programs designed to make computing easier • saves any open document and running programs apps to RAM • ...
Vocab UDL 25 by Amber Torres 2023-02-10
Across
- a computer data storage devices (hard drive)
- any computing device that is part of a computer
- a camera changes smoothly from a long to a close up
- an output device that displays info in a picture or text
- a group of binary digits or bits
- a command or key that erases text
- arranging
Down
- type of miniature electronic device that contains functions of a computer
- combine text,audio,graphics that let user navigate
- an act of saving to a storage location
10 Clues: arranging • a group of binary digits or bits • a command or key that erases text • an act of saving to a storage location • a computer data storage devices (hard drive) • any computing device that is part of a computer • combine text,audio,graphics that let user navigate • a camera changes smoothly from a long to a close up • ...
Computer Network Puzzle 2023-02-07
Across
- two or more devices connected together to communicate
- A message sent from one device to another
- serves a connection between several devices
- A computer network that uses wireless data
Down
- An official set of rules that must be followed
- it provides communication between multiple of devices
- The data transfer between one device to another.
- a basic unit of data that's grouped together and transferred over a computer network
- a set of physical or network devices
- a global computing service that allows you to search things up
10 Clues: a set of physical or network devices • A message sent from one device to another • A computer network that uses wireless data • serves a connection between several devices • An official set of rules that must be followed • The data transfer between one device to another. • it provides communication between multiple of devices • ...
Briefing: Managerial Accounting Costs 2023-02-22
Across
- Monitoring the profitability of products
- Also known as product costs or inventoriable costs
- Can be avoided or eliminated by doing or not doing a particular activity
- Are the costs of items that were purchased in past
- are also known as order getting or order filling costs
Down
- computing variances between estimated and actual costs
- Can be easily associated and traced to a particular product, process, department, etc
- are non manufacturing/non product costs
- Preparing internal reports for management
- Estimating Operating costs
10 Clues: Estimating Operating costs • are non manufacturing/non product costs • Monitoring the profitability of products • Preparing internal reports for management • Also known as product costs or inventoriable costs • Are the costs of items that were purchased in past • computing variances between estimated and actual costs • ...
Chapter 18.1 Key Terms Created by: Julia Stout 2013-04-23
Across
- the transmission of information over communtication lines
- seeing something
- an arrangement that allows employees to work at home while communicating with the workplace by phone, fax, or modem
Down
- software for designing products with a computer
- uses computing, electronics, and telecommunications to process and distribute information in digital and other forms
- to communicate
- small portable computer designed to be used while it is worn on the body
- artificial, three-dimensional visual worl created by a computer
- starting on its own
- to create a likeness
10 Clues: to communicate • seeing something • starting on its own • to create a likeness • software for designing products with a computer • the transmission of information over communtication lines • artificial, three-dimensional visual worl created by a computer • small portable computer designed to be used while it is worn on the body • ...
Chp. 18.1 key terms created by: Dustin Ruddick 2014-04-29
Across
- 3-d world created by a computer
- runs on it own doesnt need to be controlled
- small portable computer designed to be used while its worn on the body
- software used to design products on a computer
- send out to transfer
Down
- something you can see
- transmission of info over communication lines
- using computing, electronics and telecommunications to process and distribute information in digital form
- arrangement that allows employees to work at home while communicating with the workplace
- play out real event in set conditions
10 Clues: send out to transfer • something you can see • 3-d world created by a computer • play out real event in set conditions • runs on it own doesnt need to be controlled • transmission of info over communication lines • software used to design products on a computer • small portable computer designed to be used while its worn on the body • ...
Chapter 18.1 Key Terms Created by Christy Stevens 2015-04-30
Across
- the transmission of information over communication lines
- to process something
- to happen by itself
- an artificial, 3d visual world created by a computer
- software for designing products with a computer
Down
- an arrangement that allows employees to work at home while communicating with the workplace
- seen with the eyes
- uses computing, electronics, and telecommunications to process and distribute information in digital and other forms
- a small portable computer designed to be used while it is worn on the body
- to recreate
10 Clues: to recreate • seen with the eyes • to happen by itself • to process something • software for designing products with a computer • an artificial, 3d visual world created by a computer • the transmission of information over communication lines • a small portable computer designed to be used while it is worn on the body • ...
18.1 Key and Academic terms Created by Edgardo Torres 2017-05-03
Across
- an artificial, three- dimensional visual world created by a computer
- working by itself
- computing, electronics, and telecommunications to process and distribute information in digital and other forms
- relating to see
Down
- software for designing products with a computer
- an arrangement that allows employees to work at home while communing with the workplace by phone, fax, or modem
- a small portable computer designed to be used while it is worn on the body
- to pass out
- pretend to have
- the transmission of information over communication lines
10 Clues: to pass out • pretend to have • relating to see • working by itself • software for designing products with a computer • the transmission of information over communication lines • an artificial, three- dimensional visual world created by a computer • a small portable computer designed to be used while it is worn on the body • ...
Blockchain 2018-02-27
Across
- / An element unique to every block.
- / A secured network prevents fraud and _____ _______.
- / A miner with at least ____ ____% of computing power can control the blockchain.
- / A database that is distributed, shared and encrypted.
- / A _____ blockchain is free for all to join.
Down
- / A written code integrated into a blockchain to facilitate a transaction.
- / A _____ ledger is used to keep records of ownership of property.
- / A type of cryptocurrency.
- / A state of disguised identity.
- / Consensus mechanism to solve a mathematical puzzle using computational power.
10 Clues: / A type of cryptocurrency. • / A state of disguised identity. • / An element unique to every block. • / A _____ blockchain is free for all to join. • / A secured network prevents fraud and _____ _______. • / A database that is distributed, shared and encrypted. • / A _____ ledger is used to keep records of ownership of property. • ...
GPU Crossword 2025-04-21
Across
- Using more than one Graphics Processing Unit together.
- Accessing nearby memory to reduce data access time.
- Computations performed within a single computing node.
- Systems where multiple CPUs share workload collaboratively.
Down
- Code executed one task at a time — traditional execution model.
- A set of rules and logic steps to solve computational problems.
- Organizing and analysing information inputs effectively.
- Collections of structured information used for computation.
- Data pipelines that allow concurrent task management on GPUs.
- Simultaneous computation of many tasks — a key GPU feature.
10 Clues: Accessing nearby memory to reduce data access time. • Using more than one Graphics Processing Unit together. • Computations performed within a single computing node. • Organizing and analysing information inputs effectively. • Collections of structured information used for computation. • Simultaneous computation of many tasks — a key GPU feature. • ...
KDP Crossword Puzzle Book 2025-09-30
Across
- To intersect or extend across.
- Amazon's Kindle Direct Publishing platform.
- The blank space surrounding the content on a page.
- A written or printed work consisting of pages bound together.
- A game, toy, or problem designed to test ingenuity.
Down
- A framework of spaced bars that are parallel to or cross each other.
- A high-level, interpreted programming language.
- A single distinct meaningful element of speech or writing.
- A large e-commerce and cloud computing company.
- An area of a document that extends beyond the trim edge.
10 Clues: To intersect or extend across. • Amazon's Kindle Direct Publishing platform. • A high-level, interpreted programming language. • A large e-commerce and cloud computing company. • The blank space surrounding the content on a page. • A game, toy, or problem designed to test ingenuity. • An area of a document that extends beyond the trim edge. • ...
Keren and Zach - August 10 2013 2013-07-25
Across
- Zach finds this sport most enjoyable to watch. (Hint) Especially in Seattle.
- Zach's first car.
- Keren studied abroad in which country.
- Zach will be pursuing a dual Masters degrees in Humanities Computing and ______ Sciences.
- Keren and Zach attended which high school?
- Zach was present at the 2010 __________ riots.
- Keren aspires to be a ___________.
- Keren's favourite flower.
- Zach and Keren love to eat this food at least once a week.
- Keren and Zach are moving to which city?
Down
- Keren danced in the 2010 Olympic ___________.
- Zachary's middle name.
- Keren and Zach have been living where for the last two years?
- Keren majored in what university subject?
- The country Keren was born in.
- Zach studied English and ________ at university.
- Keren and Zach's favourite date.
- Keren and Zach enjoy watching which TV show?
18 Clues: Zach's first car. • Zachary's middle name. • Keren's favourite flower. • The country Keren was born in. • Keren and Zach's favourite date. • Keren aspires to be a ___________. • Keren studied abroad in which country. • Keren and Zach are moving to which city? • Keren majored in what university subject? • Keren and Zach attended which high school? • ...
Intelligence studio Fun 2025-01-31
Across
- Python-based framework for orchestrating workflows
- Programming language used in PySpark
- Component in Spark that optimizes query execution plans
- Default cluster manager for Spark
- Newer Airflow feature that allows event-driven DAGs
- Spark engine that processes structured data
- Process of executing a task in Airflow
- Directed structure that defines tasks and dependencies in Airflow
- File format optimized for big data processing in Spark
- Component responsible for scheduling tasks in Airflow
Down
- Distributed computing framework that Spark is often compared to
- Process of breaking jobs into smaller execution tasks in Spark
- Fast and general-purpose computation engine in Spark
- Default executor in Airflow for running tasks sequentially
- User interface used to monitor DAGs in Airflow
- Database backend that stores Airflow metadata
- Spark API for running SQL queries
- Fundamental data structure in Spark
18 Clues: Default cluster manager for Spark • Spark API for running SQL queries • Fundamental data structure in Spark • Programming language used in PySpark • Process of executing a task in Airflow • Spark engine that processes structured data • Database backend that stores Airflow metadata • User interface used to monitor DAGs in Airflow • ...
Chapter 18.1 Key Terms Created by: Skylar Maupin 2013-04-25
Across
- uses computing, electronics, and telecommunications to process and distribute information.
- reality an artificial three dimensional visula world created by a computer.
- a small pordable computer desgined to be used while worn on the body.
- to act or reincarnate a day and time
- transmission of information over communication lines.
Down
- software use to design product with a computer.
- happens without anybodys use.
- an object used for learning
- allows employees to work at home while communicating with those at the work place
- to pass from one to another
10 Clues: an object used for learning • to pass from one to another • happens without anybodys use. • to act or reincarnate a day and time • software use to design product with a computer. • transmission of information over communication lines. • a small pordable computer desgined to be used while worn on the body. • ...
Chapter 18.1 Key Terms Created by: Samantha Honey 2014-04-29
Across
- sales figures to regional manger.
- something that is told to do something and it does it right away.
- is a software for designing products with a computer.
- something artificial the three dimensional
- an arrangement that allows employees to work at home.
Down
- is a small portable computer designed to be used while it is worn on your body.
- use computing, electronics and telecommunication.
- world created by a computer
- is the transmission of information over communication lines
- a real situation using computers
10 Clues: world created by a computer • a real situation using computers • sales figures to regional manger. • something artificial the three dimensional • use computing, electronics and telecommunication. • is a software for designing products with a computer. • an arrangement that allows employees to work at home. • is the transmission of information over communication lines • ...
18.1 Key and Academic terms by Delaney 2016-04-28
Across
- software for designing products with a computer
- produce a computer model of
- working by itself
- transmission of information over communication lines
Down
- uses computing, electronics and telecommunications to process information to digital and other forms
- small portable computer designed to be worn on the body
- artificial three dimensional visual world created by a computer
- arrangement that allows employees to work at home while communicating with the workplace by phone
- sight of
- caused something to pass on from one place to another
10 Clues: sight of • working by itself • produce a computer model of • software for designing products with a computer • transmission of information over communication lines • caused something to pass on from one place to another • small portable computer designed to be worn on the body • artificial three dimensional visual world created by a computer • ...
Traveling Salesman Problem 2019-11-28
Across
- In the nearest _________, it is always taking the shortest route
- _______ a graph to represent the data from matrix
- cycle must start and end in the ______ vertex
- TSP is attributed to sir ______ Hamilton
- Computing for least time by _____ the numbers assigned to the edge
- similar to ________ algorithm except it must be a cycle
Down
- in the brute-force method we must list down all possible ______ cycle
- "always choose the _______ route"
- Determine the least time ___________
- TSP is about _______ the shortest hamilonian cycle
10 Clues: "always choose the _______ route" • Determine the least time ___________ • TSP is attributed to sir ______ Hamilton • cycle must start and end in the ______ vertex • _______ a graph to represent the data from matrix • TSP is about _______ the shortest hamilonian cycle • similar to ________ algorithm except it must be a cycle • ...
18.1 Key and Academic terms Created by Edgardo Torres 2017-05-03
Across
- relating to see
- the transmission of information over communication lines
- computing, electronics, and telecommunications to process and distribute information in digital and other forms
- an arrangement that allows employees to work at home while communing with the workplace by phone, fax, or modem
Down
- an artificial, three- dimensional visual world created by a computer
- working by itself
- pretend to have
- a small portable computer designed to be used while it is worn on the body
- software for designing products with a computer
- to pass out
10 Clues: to pass out • relating to see • pretend to have • working by itself • software for designing products with a computer • the transmission of information over communication lines • an artificial, three- dimensional visual world created by a computer • a small portable computer designed to be used while it is worn on the body • ...
18.1 Key and Academic Terms Created by: Dory Villatoro 2019-04-29
Across
- A small portable computer designed to be used while it is worn on the body.
- Uses computing, electronics, and telecommunications to process and distribute information in digital and other forms.
- An artificial, three-dimensional visual world created by a computer.
Down
- Soft-ware for designing products with a computer.
- An arrangement that allows employees to work at home while communicating with the workplace by phone, fax, or modern.
- Imitate
- The transmission of information over communication lines.
- seeing
- Instant
- Send
10 Clues: Send • seeing • Imitate • Instant • Soft-ware for designing products with a computer. • The transmission of information over communication lines. • An artificial, three-dimensional visual world created by a computer. • A small portable computer designed to be used while it is worn on the body. • ...
18.1 key and academic terms created by Jailyn Aynes 2019-04-24
Across
- small portable computer designed to be used while it is worn on the body
- world created by a computer
- software for designing products with a computer
- sales figures to regional managers
Down
- uses computing, electronics and telecommunications to process and distribute information in digital and other forms
- an arrangement that allows the employees to work at home while communicating with the workplace by phone fax or modern
- the transmission of information over communication lines
- artificial, three dimension
- teller machine
- real situation using a computer
10 Clues: teller machine • world created by a computer • artificial, three dimension • real situation using a computer • sales figures to regional managers • software for designing products with a computer • the transmission of information over communication lines • small portable computer designed to be used while it is worn on the body • ...
Chapter 9 2017-07-24
Across
- Media that is capable of carrying multiple transmissions simultaneously
- Mining An analysis tool referred to as drilling down into data
- Database Most common type of database used today
- A Remote Access Technology
- Application designed to support decisions
Down
- Cable Transits data over longer distances than traditional twisted pair can
- Computing Software and storage are provided an Internet service and accesses through a Web browser
- Private networks
- Connect the LAN to a WAN or the Internet
- Operates within a building or sometimes across several buildings
10 Clues: Private networks • A Remote Access Technology • Connect the LAN to a WAN or the Internet • Application designed to support decisions • Database Most common type of database used today • Mining An analysis tool referred to as drilling down into data • Operates within a building or sometimes across several buildings • ...
Technology crossword 2017-12-08
Across
- The computing part of the computer
- provides a way for the website to recognize you and keep track of your preferences.
- An organization that provides access to the Internet.
- Machinery and equipment
- transmission capacity of an electronic pathway
Down
- To store data locally in order to speed up subsequent retrievals.
- An inhouse website that serves employees only
- A scam to steal valuable information
- The primary method for keeping a computer secure from intruders.
- a website that contains text entries
10 Clues: Machinery and equipment • The computing part of the computer • A scam to steal valuable information • a website that contains text entries • An inhouse website that serves employees only • transmission capacity of an electronic pathway • An organization that provides access to the Internet. • The primary method for keeping a computer secure from intruders. • ...
18.1 Key and academic key terms Created By:Sierra Dunn 2016-05-05
Across
- uses computing, electronics and telecommunications to process and distribute
- small portable computer designed to be used while it is worn on the body
- capable of being seen; visible
- transmission of information over communication lines
- arrangement taht allows employees to work at home
Down
- to give or assume the appearance or effect of
- software for designing products with a computer
- done by machine; mechanical
- to send or convey from one person or place to another
- an artificial,three dimensional visual word created by a computer
10 Clues: done by machine; mechanical • capable of being seen; visible • to give or assume the appearance or effect of • software for designing products with a computer • arrangement taht allows employees to work at home • transmission of information over communication lines • to send or convey from one person or place to another • ...
IT crossword 2023-09-16
Across
- something you don't give out
- you should be ready to do this when you come into class
- the name of this class
- one thing you should make sure is always secure
- what you should be when someone is talking
Down
- one thing you shouldn't use when making a password
- people you shouldn't share private info with
- what you should do when you are being bullied online
- something that should always be done on time
- something you can use to make your connection stronger and more secure
10 Clues: the name of this class • something you don't give out • what you should be when someone is talking • people you shouldn't share private info with • something that should always be done on time • one thing you should make sure is always secure • one thing you shouldn't use when making a password • what you should do when you are being bullied online • ...
Reactive Routing Protocols 2023-03-06
Across
- The R in RREP stands for
- In How many phases died dsr works?
- The _____ process is used to discover a route in AODV.
- The ________ protocol is an improvement on AODV.
- ________ is a metric used to evaluate the quality of a route.
Down
- Which has less routing overhead
- Which of the following is NOT a reactive routing protocol in mobile computing?
- Source Routing DSR stands for _____ protocol
- The ________ protocol is a popular example of a reactive routing protocol.
- The R in RREQ stands for
10 Clues: The R in RREP stands for • The R in RREQ stands for • Which has less routing overhead • In How many phases died dsr works? • Source Routing DSR stands for _____ protocol • The ________ protocol is an improvement on AODV. • The _____ process is used to discover a route in AODV. • ________ is a metric used to evaluate the quality of a route. • ...
Operating System- Utilities Programs 2021-11-01
Across
- control how enter data and instruction and how information displayed on screen
- file organized in tracks and sector
- saves any open document and running programs or apps to internal hard drive
Down
- recognizes and correct problems
- multitasking UNIX-based operating system
- collection of programs that handle technical tasks
- saves any open document and running programs apps to RAM
- small program that tells the OS how to communicate with specific device
- specialized programs designed to make computing easier
- identifies and eliminates non essential files
10 Clues: recognizes and correct problems • file organized in tracks and sector • multitasking UNIX-based operating system • identifies and eliminates non essential files • collection of programs that handle technical tasks • specialized programs designed to make computing easier • saves any open document and running programs apps to RAM • ...
Operating System_Utilies Programs 2021-10-31
Across
- create a backup for hard drive
- collection of programs that handle technical tasks
- saves any open document and running programs apps to RAM
- recognizes and correct problems
- small program that tells the OS how to communicate with specific device
- multitasking UNIX-based operating system
Down
- specialized programs designed to make computing easier
- portion of a storage medium functioning as additional RAM
- saves any open document and running programs or apps to internal hard drive
- identifies and eliminates non essential files
10 Clues: create a backup for hard drive • recognizes and correct problems • multitasking UNIX-based operating system • identifies and eliminates non essential files • collection of programs that handle technical tasks • specialized programs designed to make computing easier • saves any open document and running programs apps to RAM • ...
Tech Puzzle 2025-02-28
Across
- raw facts and figures processed for information
- malicious software designed to harm or exploit systems
- a small unit of a digital image or display
- smallest unit of data in computing
Down
- device that directs data traffic between networks
- organized collections of data
- point in a network where data can be created, stored, or transmitted
- a hardware or software component that stores data for faster access
- connecting everyday devices to the internet for data sharing
- error or flaw in a software program
10 Clues: organized collections of data • smallest unit of data in computing • error or flaw in a software program • a small unit of a digital image or display • raw facts and figures processed for information • device that directs data traffic between networks • malicious software designed to harm or exploit systems • connecting everyday devices to the internet for data sharing • ...
Tech Vocab 2022-09-06
Across
- a public freestanding booth used to display information
- uses artificial intelligence to process languages and translate them
- stores data on a chip instead of magnetic stripe
- a practices that involves reducing electricity consumption and environmental waste
- computing use of technology to meet the needs of a large business
- a computer that functions as a component of a product
- simulated environments
Down
- technology used to create a virtual intelligent being used to assist in task
- Connects all technology
- technology software that audibly transcribes what is on screen
10 Clues: simulated environments • Connects all technology • stores data on a chip instead of magnetic stripe • a computer that functions as a component of a product • a public freestanding booth used to display information • technology software that audibly transcribes what is on screen • computing use of technology to meet the needs of a large business • ...
Jio DID 2023-08-16
Across
- Jio’s popular service for watching TV shows and movies online
- The famous search platform that invested in Jio
- The month Jio made its grand entry into the Indian telecom scene
- The Jio color
- The parent company that launched Jio
- The broadband home service
- Jio’s object tracker for when you lose any item
- The tech company that partnered with Jio for cloud computing
Down
- A service that lets you stream music both online and offline
- The health service app
- This meta platform invested in Jio
- The revolutionary service that lets you make calls over the internet
- Jio’s online shopping app
- Through this phone, Reliance Jio aims to eliminate 2G technology in India
14 Clues: The Jio color • The health service app • Jio’s online shopping app • The broadband home service • This meta platform invested in Jio • The parent company that launched Jio • The famous search platform that invested in Jio • Jio’s object tracker for when you lose any item • A service that lets you stream music both online and offline • ...
CISCO Intro Vocab 2024-09-28
Across
- how old or new a computer or computer product may be
- not attached to a cable
- limitation on the system
- notification that data has been received
- computer's central communications center
- attached to a cable
- A cable or plug that splits one connection into multiple connections
Down
- an entrance of a computer into which a device can connect.
- an identifiable part of a larger program or construction
- a set of rules for transmitting data
- short-term computer memory where information is collected
- interconnected computing devices that can exchange data
- the ability of a system to understand the function quickly
- the capacity at which a network can transmit data
14 Clues: attached to a cable • not attached to a cable • limitation on the system • a set of rules for transmitting data • notification that data has been received • computer's central communications center • the capacity at which a network can transmit data • how old or new a computer or computer product may be • interconnected computing devices that can exchange data • ...
content.ai.ms.chapt1 2022-03-18
Across
- Data About Data
- Computing & Storage on remote
- what type of capability is perceiving objects?
- A common form of offline identifiable communication among people
Down
- Ten raised to 18 bytes
- A set of step-by-step instructions that direct a computer to solve a problem
- The type of processor for ultra large data sets
- System used for medical diagnostics and medicine recommendations
8 Clues: Data About Data • Ten raised to 18 bytes • Computing & Storage on remote • what type of capability is perceiving objects? • The type of processor for ultra large data sets • System used for medical diagnostics and medicine recommendations • A common form of offline identifiable communication among people • ...
ICT 2024-09-06
Across
- - "A set of commands for a computer to perform certain actions."
- – “A global network for exchanging information between computers.”
- - "Popular operation system"
- – “A device for controlling the pointer on a computer screen.”
Down
- – “A device for entering text and commands into a computer.”
- – “The main computing element of a computer.”
- - "Used to store a tempory information"
- - "Object that contains information in computer"
8 Clues: - "Popular operation system" • - "Used to store a tempory information" • – “The main computing element of a computer.” • - "Object that contains information in computer" • – “A device for entering text and commands into a computer.” • – “A device for controlling the pointer on a computer screen.” • - "A set of commands for a computer to perform certain actions." • ...
Vocab Crossword 2023-01-20
Across
- _______ computing is a computing infrastructure in which resources, such as storage and applications, are hosted in a distributed fashion by a third party over the Internet.
- An OS that is an open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds.
- _____Bar is a File Explorer component that is located below the ribbon and displays the address of an object.
- A text file that is created by a website and placed on a computer's hard drive to store information that is used to identify users as well as to prepare customized web pages for them.
- A complete computer system that is small, compact, lightweight, and portable.
- A laptop computer that comes pre-installed with the Chrome OS.
- ___________ computer is a computer that has the monitor and the computing components all built into one physical device.
- _____ storage is any storage media that is directly attached to the computer that uses it.
- Any message containing incorrect or misleading information that is disseminated to multiple users through unofficial channels.
- a computer.
- An object that stores information on a computer.
- Specialized software that is stored on a hardware device's read-only memory (ROM) whether or not the device is powered.
- _________ technology are tools that are designed to ensure that people with disabilities are able to use software applications.
- A ventilation component that cools the internal components of a computer.
- The personal computer component that acts as the backbone for the entire computer system. Also referred to as a system board.
- The smallest unit of information in a computer system.
- The process of converting data into a form that is not easily recognized or understood by anyone who is not authorized to access the data.
- A digital display standard that aims to replace the DVI and VGA standards.
- Specialized software that controls a device attached
- A container object that can store your files in an organized manner. Often referred to as a folder.
- A user who excels at programming or managing and configuring computer systems, and has the skills to gain access to computer systems through unauthorized or unapproved means.
Down
- A wireless technology that facilitates short- range wireless communication between devices.
- CPUs mounted in a single chip, working in parallel.
- _____ reader A device used to read electronic books, or eBooks.
- (central processing unit) A computer chip where most of the computing calculations take place. Also referred to as the microprocessor or processor.
- ______ mode is a mobile device setting that you can use to quickly disconnect the mobile device from Wi-Fi and cellular connections, as well as disable the ability to send and receive calls, email, and text messages.
- ______ processor is a central processing unit (CPU) that has two or more
- A set of networking technologies and media access methods specified for LANs.
- ______ player is a handheld device that enables you to play digitally recorded audio, video, and combination audio/video files.
- A unit of computer storage equal to approximately one character.
- Malicious code that enters the computer system
- _____ drive is a solid state storage device that typically connects to a USB port on your computer.
- ______ pane is a File Explorer component that displays a list of files and subfolders within a folder.
- The use of assistive technology to make computers available and easier to use.
- A container object that can store your files in an organized manner. Also referred to as a directory
- ____ app is a compact software program that is developed to perform a predefined function on a smartphone or a handheld mobile device such as a mobile phone, tablet, or feature phone.
- ____ force attack is a password attack in which the attacker uses password cracking software to attempt every possible alphanumeric password combination.
- ______ applications are software programs that are sold together as a set or suite, or that are sold with an operating system or with a new computer.
- (cathode ray tube) A type of display device that uses electron beams within a vacuum tube to create images on a fluorescent screen.
- _____backup is a type of information protection scheme that enables you to store copies of critical files and folders on another medium for safekeeping.
40 Clues: a computer. • Malicious code that enters the computer system • An object that stores information on a computer. • CPUs mounted in a single chip, working in parallel. • Specialized software that controls a device attached • The smallest unit of information in a computer system. • A laptop computer that comes pre-installed with the Chrome OS. • ...
APCSP Review 2 2025-05-07
Across
- form of program documentation written into the program to be read by people and which do not affect how a program runs
- Data with values that change continuously, or smoothly, over time. Some examples of analog data include music, colors of a painting, or position of a sprinter during a race.
- 8 bits
- data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
- A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.
- A type of computer that forwards data across a network
- the steps or phases used to create a piece of software. Typical phases include investigating, designing, prototyping, and testing.
- the inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- An agreed-upon set of rules that specify the behavior of some system
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
- A way of representing information using only two options
- A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.
- a system of linked pages, programs, and files
- a collection of program statements. Programs run (or “execute”) one command at a time.
- any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- Error from attempting to represent a number that is too precise. The value is rounded.
- Error from attempting to represent a number that is too large
- differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
- a collaborative programming style in which two programmers switch between the roles of writing code and tracking or planning high level progress
- a group of computing devices and programs working together for a common purpose
Down
- a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- A process for reducing the number of bits needed to represent something without losing any information. This process is reversible.
- the protocol used for transmitting web pages over the Internet
- Finding and fixing problems in an algorithm or program
- the system responsible for translating domain names like example.com into IP addresses
- A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created
- A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all
- a protocol for sending data across the Internet that assigns unique numbers to each connected device
- a written description of how a command or piece of code works or was developed
- program statements run in order, from top to bottom
- a group of interconnected computing devices capable of sending or receiving data.
- some program statements run when triggered by an event, like a mouse click or a key press
- A work or invention that is the result of creativity, such as a piece of writing or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.
- A way of representing information using ten options
- Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
- a command or instruction. Sometimes also referred to as a code statement.
- Data that changes discretely through a finite set of possible values
- The unique number assigned to each device on the Internet
- A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1
41 Clues: 8 bits • a system of linked pages, programs, and files • program statements run in order, from top to bottom • A way of representing information using ten options • Finding and fixing problems in an algorithm or program • A type of computer that forwards data across a network • A way of representing information using only two options • ...
Vocab Quiz 2023-01-20
Across
- An OS that is an open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds.
- A unit of computer storage equal to approximately one character.
- (central processing unit) A computer chip where most of the computing calculations take place. Also referred to as the microprocessor or processor.
- Specialized software that is stored on a hardware device's read-only memory (ROM) whether or not the device is powered.
- A ventilation component that cools the internal components of a computer.
- _____ drive is a solid state storage device that typically connects to a USB port on your computer.
- ______ mode is a mobile device setting that you can use to quickly disconnect the mobile device from Wi-Fi and cellular connections, as well as disable the ability to send and receive calls, email, and text messages.
- ______ applications are software programs that are sold together as a set or suite, or that are sold with an operating system or with a new computer.
- (cathode ray tube) A type of display device that uses electron beams within a vacuum tube to create images on a fluorescent screen.
- Specialized software that controls a device attached
- A set of networking technologies and media access methods specified for LANs.
- ___________ computer is a computer that has the monitor and the computing components all built into one physical device.
- An object that stores information on a computer.
- The personal computer component that acts as the backbone for the entire computer system. Also referred to as a system board.
- A text file that is created by a website and placed on a computer's hard drive to store information that is used to identify users as well as to prepare customized web pages for them.
- The process of converting data into a form that is not easily recognized or understood by anyone who is not authorized to access the data.
- _____ storage is any storage media that is directly attached to the computer that uses it.
- The smallest unit of information in a computer system.
- Any message containing incorrect or misleading information that is disseminated to multiple users through unofficial channels.
- ______ player is a handheld device that enables you to play digitally recorded audio, video, and combination audio/video files.
- A container object that can store your files in an organized manner. Also referred to as a directory
Down
- _______ computing is a computing infrastructure in which resources, such as storage and applications, are hosted in a distributed fashion by a third party over the Internet.
- ______ pane is a File Explorer component that displays a list of files and subfolders within a folder.
- Malicious code that enters the computer system
- A digital display standard that aims to replace the DVI and VGA standards.
- ____ force attack is a password attack in which the attacker uses password cracking software to attempt every possible alphanumeric password combination.
- _____Bar is a File Explorer component that is located below the ribbon and displays the address of an object.
- A user who excels at programming or managing and configuring computer systems, and has the skills to gain access to computer systems through unauthorized or unapproved means.
- A container object that can store your files in an organized manner. Often referred to as a folder.
- CPUs mounted in a single chip, working in parallel.
- A complete computer system that is small, compact, lightweight, and portable.
- A laptop computer that comes pre-installed with the Chrome OS.
- ______ processor is a central processing unit (CPU) that has two or more
- ____ app is a compact software program that is developed to perform a predefined function on a smartphone or a handheld mobile device such as a mobile phone, tablet, or feature phone.
- _____ reader A device used to read electronic books, or eBooks.
- A wireless technology that facilitates short- range wireless communication between devices.
- The use of assistive technology to make computers available and easier to use.
- _____backup is a type of information protection scheme that enables you to store copies of critical files and folders on another medium for safekeeping.
- a computer.
- _________ technology are tools that are designed to ensure that people with disabilities are able to use software applications.
40 Clues: a computer. • Malicious code that enters the computer system • An object that stores information on a computer. • CPUs mounted in a single chip, working in parallel. • Specialized software that controls a device attached • The smallest unit of information in a computer system. • A laptop computer that comes pre-installed with the Chrome OS. • ...
School Subjects 2022-07-21
Software Terms 2023-12-18
CS Principles Review 2023-04-26
Across
- A run time for an algorithm that doesn't increase faster than a polynomial function of the input size
- Gold medalist for 2017 website development for skills canada
- A mistake in typed code that violates the rules of the programming language. Typically, code with syntax errors will not run.
- WEbsite made by jeff bezos
- Error that results when the number of bits is not enough to represent the number (like a car’s odometer “rolling over”)
- A technique that helps an algorithm find a good solution in a hard problem (like always walking toward the north star when you are stuck in a forest).
- Compressing data in a way that discards some data and makes it impossible to recover the original.
- The protocol that determines how to address nodes on the network (with IP addresses) and how to route data from one node to a destination node (using routers).
- Values that change smoothly, rather than in discrete intervals, over time. For example, the pitch and volume of a live concert.
- The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
Down
- face book bman
- dude who got divorced by melinda gates
- A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.
- A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
- The process of scrambling data to prevent unauthorized access.
- A physical device that can run a program, such as a computer, smart phone, or smart sensor.
- error: A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.
- A small amount of text that tracks information about a user visiting a website.
- Somthing the comp sci does not bring me
- A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.
20 Clues: face book bman • WEbsite made by jeff bezos • dude who got divorced by melinda gates • Somthing the comp sci does not bring me • Gold medalist for 2017 website development for skills canada • The process of scrambling data to prevent unauthorized access. • A small amount of text that tracks information about a user visiting a website. • ...
CLB Lesson 6: Classifying and Evaluating Computers 2017-10-18
Across
- A desktop computer that houses the processing components in the same case that holds the monitor.
- Mobile computing device you use to download and read electronic versions of printed books, magazines, and newspapers.
- Type of server used by small businesses to share files and programs among employees.
- A card installed on the motherboard that connects a server to a network on the Internet.
- Mobile device that can store digital media such as songs, videos, and photos on a small hard drive.
- Type of computer that is powerful; designed for intensive data processing for hundreds or thousands of users at the same time.
- Tablet computer that uses a hybrid design that includes a swivel screen or removable keyboard.
- Type of server used by large corporations to provide employees access to special software used to run the company's business.
- Same as laptop computer.
- Type of computer that is lightweight and mobile that includes the system components, keyboard, pointing device, and display screen in a single unit.
Down
- Same as netbook computer.
- The ability to increase processing capacity to handle additional data.
- A very powerful computer distinguished by its processing capacity and speed of calculation.
- Type of display screens used by e-book readers; they consume less power.
- Type of computer where the processor is built into a household appliance or other device.
- Computing device that can perform input, processing, output, and storage activities on its own and is designed to be used by one persona at a time.
- A case containing the system unit that stands vertically on the floor.
- Mobile device designed for a single video game player for use at one time.
- Type of computer that is similar to a laptop, but is smaller and lighter with less power and storage capacity.
- Type of server that handles the exchange of information across the Internet.
- A type of computer that on or next to a desk, designed to be stationary, runs on power from a wall outlet.
21 Clues: Same as laptop computer. • Same as netbook computer. • The ability to increase processing capacity to handle additional data. • A case containing the system unit that stands vertically on the floor. • Type of display screens used by e-book readers; they consume less power. • Mobile device designed for a single video game player for use at one time. • ...
IOT 2024-02-14
Across
- Which technology is used for building real-time data pipelines and stream processing applications?
- Which protocol is used for secure remote configuration and management of network devices?
- Which type of machine learning involves an agent learning to make decisions by interacting with an environment?
- Name the open-source distributed processing system designed for handling large-scale data processing tasks.
- Name the concept of processing data closer to its point of origin to reduce latency.
- What is the term for a network architecture designed to handle massive volumes of data and traffic?
- What is the name of the protocol used for managing configuration data on network devices?
- What term describes the process of analyzing data to find patterns, trends, and insights?
- What is the term for a network architecture designed to handle massive volumes of data and traffic?
- What centralized service is used for maintaining configuration information, naming, providing distributed synchronization, and providing group services?
- Which programming language is commonly used for implementing machine learning algorithms?
- What term describes data that lacks a fixed structure and may not adhere to a specific data model?
- Name the high-level language used for modeling configuration and state data in network management.
- What open-source stream processing framework is designed for high-throughput, low-latency, and exactly-once stream processing?
Down
- Which cloud computing service offers a serverless computing platform for running code without provisioning or managing servers?
- What process involves selecting and transforming variables or features in a dataset to improve model performance?
- What type of analytics focuses on analyzing data as it is generated or streamed in real-time?
- What is the term for a type of learning where the algorithm learns from data without human intervention or labeled data?
- What type of analytics focuses on analyzing data as it is generated or streamed in real-time?
- Which NoSQL database is known for its document-oriented data model?
- What term refers to the process of cleaning and transforming raw data before analysis?
- What technology is used for parallel processing of large datasets in the Hadoop ecosystem?
- Name the method of organizing similar data points into groups
- Which machine learning library is known for its dynamic computational graph and neural network capabilities?
- Name the framework used for building scalable and maintainable web applications in the Python programming language.
25 Clues: Name the method of organizing similar data points into groups • Which NoSQL database is known for its document-oriented data model? • Name the concept of processing data closer to its point of origin to reduce latency. • What term refers to the process of cleaning and transforming raw data before analysis? • ...
Introduction to Cyber Security Crossword Puzzle 2023-09-09
Across
- When an intruder takes over a victims information by tricking them in any way they find necessary
- A form of malware that can infect a computer, and hurt it and the information stored on said computer
- A secondary form of verification in order to log into certain accounts across the internet
- A way of keeping your identity safe on the internet by tricking intruders into thinking you are someone, or live somewhere you do not
- The cause of all the hurt caused to the victim once an intruder has invaded the victims device
- The protection used to prevent intruders from stealing, corrupting, or damaging any data/computing device
- A form of protecting certain information by making it into unreadable text that is only readable by having the right authorization
- The way a device keeps itself up to date with the latest and most secure version of itself
- A connection between two or more devices across the virtual world
Down
- A type of malware where the intruder corrupts a victims date, and requires payment before returning said data to the victim
- A form of tricking a victim into believing that they are someone they are not via an email
- The incident of an intruder gaining unauthorized access to certain information
- A way of notifying companies, organizations, or others that you were recently attacked virtually
- When an intruder tries to attack ones device via many different methods
- A form of keeping certain information hidden behind a certain string of words
- Creating a copy of certain data on a separate device or on the same computer in order to keep it in case of said data becoming corrupted in the future
- Being able to access certain devices by being completely away from said device
- When an intruder tries to disguise themselves as a trusted source to trick a victim to allowing them into there device
- A device used to send packets to a certain network on the internet
- Information that has been translated into a certain form that is easily readable by computing devices
20 Clues: A connection between two or more devices across the virtual world • A device used to send packets to a certain network on the internet • When an intruder tries to attack ones device via many different methods • A form of keeping certain information hidden behind a certain string of words • ...
Computer Vocabulary 2014-02-10
Scientific Enigma 2023-06-12
Across
- Study of interactions between electromagnetic fields and living organisms
- Study of changes in gene expression without changes in DNA sequence
- Planet outside our solar system
- Rock fragment trapped within another type of rock
- HALO Spherical region of sparse stars surrounding a galaxy
- Regular arrangement of points or atoms in a crystal structure
- Loss of quantum coherence in a system
- QUANTUM COMPUTING Quantum computing based on topological properties of particles
- Study of the motion of air and other gases
- Process of combining atomic nuclei to release energy
- EQUATION Relativistic wave equation describing spin-0 particles
- Hypothetical particle that travels faster than light
- CHEMISTRY Study of carbon-based compounds
- ENTANGLEMENT Correlation between quantum particles that transcends space and time
- TIME DILATION Slowing of time due to velocity or gravitational effects
- DOUBLE-SLIT EXPERIMENT Demonstration of wave-particle duality in light and matter
- Subatomic particles composed of three quarks
- GRAVITY Theoretical framework unifying gravity with quantum mechanics
Down
- DER WAALS FORCES Weak intermolecular forces between molecules
- ANOMALY Unexplained deviations in the trajectories of Pioneer spacecraft
- Fundamental concept in physics with two distinct but equivalent descriptions
- Brain's ability to reorganize and form new neural connections
- Hypothetical computation beyond the limits of Turing machines
- STREAM High-speed air current in the atmosphere
- RADIATION Radiation emitted by black holes due to quantum effects
- FORCES Forces within a molecule holding its atoms together
- Technique using the interference of waves for precise measurements
- Phenomenon of zero electrical resistance in certain materials
- Study of prehistoric life through fossils
- PARADOXES Philosophical puzzles on motion and infinity
- Point of infinite density in a black hole or the Big Bang
- OSCILLATION Phenomenon of neutrinos changing flavor as they travel
- UNIFIED THEORY Hypothetical theory unifying fundamental forces
- State that persists for a long time before decaying
- Complex geometric pattern that repeats at different scales
- FIELD THEORY Theoretical framework combining general relativity and quantum mechanics
- Study of life in the universe
- MICROWAVE BACKGROUND Faint radiation left over from the Big Bang
- Study of the origin and evolution of the universe
- Hypothetical shortcut through spacetime
40 Clues: Study of life in the universe • Planet outside our solar system • Loss of quantum coherence in a system • Hypothetical shortcut through spacetime • Study of prehistoric life through fossils • CHEMISTRY Study of carbon-based compounds • Study of the motion of air and other gases • Subatomic particles composed of three quarks • ...
Sankalani Puzzle- 2024-09-13
Across
- is a app or device that is intended to attracted people to use it more frequently than they should.
- is an input device that allows you to type letters, numbers, and symbols into your computer or other electronic device.
- a device that in mounted or plugged into your computer
- Technology you can connect to a network near you
- is a hardware component that holds all your digital information you implant in the drive
- is the Internet—more specifically, it's all of the things you can access remotely over the Internet.
- An electronic device for storing or processing data, according to coded instructions.
- is a piece of hardware that connects to your computer or device so that you may view what is on the device.
- is a digital record of the date and time when an event occurred, usually represented in a human-readable format.
- ______ includes the physical parts of a computer.
- a security measure
Down
- is a cyberattack it uses emails,text,calls or website to get personal info
- is a personal computing device that is is made to be put on a office desk.
- helps different devices connect to the internet and connect other devices to it
- is agreeing and having the ability to use technology appropriately and responsibly
- Engine is a software program that helps people find the information they are looking for online using keywords or phrases.
- is a low-cost alternative to traditional laptops from Google,
- system that links multiple computing devices receive and share information
- is an industry standard for short-distance digital data communications.
- is a device that filters through things going in and out of the computer
- A quotation from or reference from a book, paper, or an author
- is a device that connects an electronic to the internet.
- acts as a buffer/holding space for information the computer might need to process later.
- a video camera that captures recordings or take images and to connect to other computers .
- the process of luring someone into a relationship by means of a fictional online persona.
25 Clues: a security measure • Technology you can connect to a network near you • ______ includes the physical parts of a computer. • a device that in mounted or plugged into your computer • is a device that connects an electronic to the internet. • is a low-cost alternative to traditional laptops from Google, • A quotation from or reference from a book, paper, or an author • ...
CAT Grd12 Term 2 Crossword 2025-04-08
Across
- The stage where the system is put into operation.
- The gap between those with and without access to technology.
- A link between tables based on related columns.
- Converts digital signals to analogue for transmission over phone lines.
- A structured way to ask questions about data in a database.
- Wide area network.
- A row in a database table.
- A visual representation of the flow of data in a system.
- A computer that hosts websites.
- Ensures accuracy and consistency of data in a database.
- Gathering information from users about their needs.
- A pre-designed output format for displaying data.
- A device that connects multiple networks.
- Abbreviation for Artificial Intelligence.
- Technology related to portable computing devices.
- Used to style the appearance of web pages.
- Software designed for specific user tasks (e.g., word processing).
- The set of rules governing communication over a network (e.g., TCP/IP).
- Protecting information from unauthorized access or modification.
- The language used to structure web pages.
Down
- A column in a database table representing a specific attribute.
- A programming language used to manage and manipulate relational databases.
- The set of rules for transferring files on the internet.
- A plan to recover IT infrastructure after a disruptive event.
- A network of physical objects embedded with sensors and software.
- A collection of related tables.
- The main software that manages computer hardware and software resources.
- A program used to view web pages.
- The address of a resource on the internet.
- Exclusive rights to original works, like software code.
- The right to control one's personal information.
- A unique identifier for each record in a database table.
- A process of organizing data to reduce redundancy and improve integrity.
- Security measures to protect a network from unauthorized access.
- Unsolicited electronic messages.
- Assessing the practicality and viability of a new system.
- Fixing errors and improving a system after implementation.
- The first stage of the SDLC, involving problem definition.
- Delivering computing services over the internet.
- A local area network.
40 Clues: Wide area network. • A local area network. • A row in a database table. • A collection of related tables. • A computer that hosts websites. • Unsolicited electronic messages. • A program used to view web pages. • A device that connects multiple networks. • Abbreviation for Artificial Intelligence. • The language used to structure web pages. • ...
computing devices 2017-06-30
Across
- It slows down your computer It doesn’t delete anything
- harmfull to the computer in three types of ways
- going through/into a system without permission and allowance
- junk mail usually from companies that are trying to get you to by their products
Down
- the worst type of virus that is named after a Greek myth
5 Clues: harmfull to the computer in three types of ways • It slows down your computer It doesn’t delete anything • the worst type of virus that is named after a Greek myth • going through/into a system without permission and allowance • junk mail usually from companies that are trying to get you to by their products
Computing 8] 2016-03-16
cloud computing 2025-04-25
CLOUD COMPUTING 2025-08-05
Business Terms 2016-02-09
Across
- how much you sell your product for
- For an example electricity,Stock and Rent
- For example Advertising,Computing and Maintenance
- Non re-curing costs that you only pay when you set up a business
- when you exchange your unit for cash
- Fixed costs + variable costs
Down
- Expenses related to the production of your product
- are costs that change according to output
- The money that comes into the business from the sales of your products
- the action of spending money
- is a cost that doesn't change according to output
- Anything a business spends money on is a...
- Total Revenue - Total cost
- when your business does not meet the break even point
14 Clues: Total Revenue - Total cost • the action of spending money • Fixed costs + variable costs • how much you sell your product for • when you exchange your unit for cash • are costs that change according to output • For an example electricity,Stock and Rent • Anything a business spends money on is a... • is a cost that doesn't change according to output • ...
History of the Computer 2025-09-11
Across
- - Worlds first computer programmer
- - Created the concept of the Analytical Engine
- - Earliest computing device
Down
- - The inventor of the first mechanical calculator performing addition and subtraction
- - Invention that made computers smaller and more efficient
- - First supercomputer
- - Manufactured in 1958, by Jack St. CLair Kilby of Texas Instruments (The first of its kind)
7 Clues: - First supercomputer • - Earliest computing device • - Worlds first computer programmer • - Created the concept of the Analytical Engine • - Invention that made computers smaller and more efficient • - The inventor of the first mechanical calculator performing addition and subtraction • ...
Operating System 2017-05-09
Across
- people, machines, other computers.
- LINKING system libraries and program code combined by the loader into the binary program image.
- points to the segment table’s location in memory.
- initials of application programming interface.
- containing memory dynamically allocated during run time.
- is defined as an endpoint for communication.
- the page computing scheme wherein the page faults depends on the page allocation's future.
- I/O interface that a device is ready to be read or otherwise handled but does not indicate which device.
- a type of storage that is the extension of main memory that provides large nonvolatile storage capacity.
- ESCALATION allows user to change to effective ID with more rights.
- indicates number of segments used by a program.
- initials of thread local storage.
- Instructions are being executed.
- are two or more processes are waiting indefinitely for an event that can be caused by only one of the waiting processes.
- defense of the system against internal and external attacks.
- The process is waiting for some event to occur.
- are systems growing in use and importance.
- RECEIVE the receiver is blocked until a message is available.
- indicates size of the page table.
- same process may always be picked as victim, include number of rollback in cost factor.
- I/O device has been received and also identifies the device that sent the request.
- copying information into faster storage system; main memory can be viewed as a cache for secondary storage.
- return to some safe state, restart process for that state.
- only read the data set; they do not perform any updates.
- a program in execution.
- initials of Microsoft interface definition language
- QUEUE set of all processes in the system.
Down
- PROGRAMS provide a convenient environment for program development and execution.
- Containing temporary data. Function parameters, return addresses, local variables.
- scheduling and synchronization info, kernel-mode stack, pointer to TEB, in kernel space.
- controls and coordinates use of hardware among various applications and users.
- is a type of address that refers to the addresses generated by the CPU.
- SECTION containing global variables.
- contains the starting physical address where the segments reside in memory.
- MEMORY only large storage media that the CPU can access directly.
- includes pointer to process to which thread belongs and to KTHREAD, in kernel space.
- are programs that define the ways in which the system resources are used to solve the computing problems of the users.
- is a type of address that is loaded into the memory-address register of the memory.
- supports more than one task making progress.
- specifies the length of the segment.
- it replaces the page that has been referenced the longest of time.
- implies a system can perform more than one task simultaneously.
- this is a type of memory that involves the separation of logical memory as perceived by users from physical memory.
- The process has finished execution.
- the page computing scheme where the new one replaces the old one in the list.
- can both read and write.
- QUEUE set of processes waiting for an I/O device.
- thread id, user-mode stack, thread-local storage, in user space.
- initials of dynamic link libraries.
- The process is being created.
- QUEUE set of all processes residing in main memory, ready and waiting to execute.
- points to the page table.
52 Clues: a program in execution. • can both read and write. • points to the page table. • The process is being created. • Instructions are being executed. • initials of thread local storage. • indicates size of the page table. • people, machines, other computers. • The process has finished execution. • initials of dynamic link libraries. • SECTION containing global variables. • ...
CS207 2017-04-16
Across
- the process is waiting for some event to occur
- then last item place onto a stack is the first one removed
- used when the target source CPU type is different than the target CPU type
- flow of control within a process
- memory are that stores data being moved between two devices
- a process must be holding at least one resourcea and waiting to acquire additional resources that are currently being held by other processes
- consists of all the processes in the system
- the process releases the source
- writes to the end of its space and then continues at the beginning, overwriting older values as it goes
- two or more processes read and write to a shared section of memory
- address seen by the memory unit
- logical extension of multiprogramming
- process is being created
- list of processes waiting for a particular I/O device
- a cloud run by a company for it's own use
- define the ways in which resouces are used to solve computing problems
- at least one resource must be in a nonsharable mode; that is, only one process must be holding at least one resource and waiting to acquire additional resources that are currently being held by other processes
- instructions are being executed
- address generated by the CPU
- permits the physical address space of a process to be non-contiguous
- region of fast memory that holds copies data
- the sending process is blocked until the message is received by the receiving process or the mailbox
- system must be configured
- software-generated interrupt
Down
- threads at process startup are placed into a pool where they sit and wait for work
- items are removed from a queue in the order in which they were inserted
- allows the execution of a process that is not completely in memory
- accumulating usage stats.
- situation where two or more processes are waiting indefinitely for an event that can be caused only by one of the waiting processes
- programs that duplicate the functionality of one system on another system
- a cloud available via the internet to anyone willing to pay for the services
- program that manages a computer's hardware
- the process can operate on the source
- the process is waiting to be assigned to a processor
- the process has finished execution
- indicates the address of the next instruction to be executed for this process
- processes residing in the main memory are raedy and waiting to execute are kept here
- physical memory broken into fixed-sized blocks
- receiver retrieves either a valid message or a null
- a cloud that includes both public and private components
- the process requests the resource
- resources cannot be preempted
- uses text commands and a method for entering them
- the sending process sends the message and resumes operation
- manages execution of user programs to prevent errors and improper use of computer
- technology that allows operating systems
- receiver blocks until a message is available
- type of computing that delivers the computing storage and apps. as a service across a network
- specifies a set of functions that are available to an app. programmer
- locates the kernel, loads it into main memory, and starts its execution
50 Clues: process is being created • accumulating usage stats. • system must be configured • address generated by the CPU • software-generated interrupt • resources cannot be preempted • the process releases the source • address seen by the memory unit • instructions are being executed • flow of control within a process • the process requests the resource • ...
Computer Science Vocab. 4/2 2024-04-03
Across
- allows users to interact with visual components with clicks and swipes
- when software can be run on hardware without any problems
- created by a word processing software program
- type of software that allows people to organize data in columns and rows
- type of software used to create media for digital and print formats
- written instructions in a language that computers can understand
- the instructions written in programming code that tell the computer what to do
- a very large and powerful computer used for intensive computing tasks
- the number system that uses 16 symbols to represent a value
- the language of computers that uses the two binary digits of 0 and 1
- the use of telecommunications technologies for medical services
- words that are written
- a document with a preset format so that it does not have to be recreated each time
- a portable personal computer with a screen and keyboard
- a program designed for a specific task
- a device that allows the computer user to move and click on images on the monitor
- a virtual wallet that allows people to make purchases without using physical cards
- an application or software that can create documents you type
- a stereo that can play the computer user sounds and recordings
- a flying robot
- a space at the top of a document
- the process of starting up a computing device
Down
- a unit of memory data composed of eight bits
- any hardware device that sends data to a computer to allow you to interact with it
- a device that allows for the computer user to input text to the computer
- an application or software that can create the documents you type
- a screen that shows the computer user text and graphics
- type of software that allows users to visually deliver information to a group
- a portable personal computer with a touchscreen
- a space at the bottom of a document
- any other part of the computer that is not the system unit
- the electronic and mechanical parts of a computer device
- everything to do with computing and how people interact with technology
- where a row and column of a spreadsheet intersect
- hardware that receives data from a computer and puts it into human-readable form
- a method of sending digital messages from one computer device to another
- an option that sends your response only to the person who sent the email
- a camera that can be activated by the computer user to take pictures or videos
- the style of written characters or style of handwriting
- an option used to include additional recipients on an email
- a personal computer designed to be used on an office desk
- sends your response to the person who sent the email along with everyone else
- the electronic circuitry that executes all the instructions it receives
- a set of instructions that can be executed by a computer
- instructions for controlling a hardware component
- an option that sends an email including all information to additional people
- a series of slides that accompanies a spoken presentation
- a system or device that stores information for immediate use such as RAM
- a process of performing the instructions specified in a computer program
49 Clues: a flying robot • words that are written • a space at the top of a document • a space at the bottom of a document • a program designed for a specific task • a unit of memory data composed of eight bits • created by a word processing software program • the process of starting up a computing device • a portable personal computer with a touchscreen • ...
COMPUTER HISTORY - early history Assignment #2 2022-09-15
5 Clues: calculator • very fires computing davices. • 1890, Dr.Herman Hollerith introduced this • in 1642, Blaise pascal invented this first • was a cardboard multiplication calculater.
Internet Keywords 2013-04-23
Across
- The second generation of the www
- Converting data into codes so it cannot be understood by unauthorised people
- Protects your computer from computer hackers
- Sharing computing resources
- A device that fowards data packets across networks
- Software on computers used to browse webpages
- Provides access to the internet for a monthly fee
Down
- Global network of computers
- The collection of webpages
- Allows calls to be made over the internet
- A unique series of numbers that identifies each computer
- Someone who accesses your computer without permission from you
- Small software spread through email attachments and online downloads that can delete or corrupt files on your computer
- Messaging over the internet
14 Clues: The collection of webpages • Global network of computers • Sharing computing resources • Messaging over the internet • The second generation of the www • Allows calls to be made over the internet • Protects your computer from computer hackers • Software on computers used to browse webpages • Provides access to the internet for a monthly fee • ...
Automation 2019-06-10
Across
- A Machine Learning technique for detection
- Wipro equivalent of myWizard
- IPsoft is the world leader in Enterprise AI and the home to _______
- Analytics driven automated testing
- Automation of various areas of the SDLC
- Simulate human thought processes in a computerized model of computing
- Google’s self-driving automated robotic car
Down
- Basic automation of Reduce Manual Steps with quick and simple UI integration and process orchestration
- Conversational Artificial Intelligence tool
- Accenture automated ticket handling operator solution for SAP
- The virtual assistant developed by Amazon
- IBMs Answer to Automation
- Pioneer and market leader in robotic process automation to eliminate low-return, high-risk, manual data entry and processing work
- Accenture Platform for Intelligent Automation
14 Clues: IBMs Answer to Automation • Wipro equivalent of myWizard • Analytics driven automated testing • Automation of various areas of the SDLC • The virtual assistant developed by Amazon • A Machine Learning technique for detection • Conversational Artificial Intelligence tool • Google’s self-driving automated robotic car • Accenture Platform for Intelligent Automation • ...
Getting to know my teacher 2025-06-17
Across
- I support the a football team with a cockerel as their logo.
- My favourite subject involves a keyboard.
- My favourite genre of music also makes drink cans.
- My favourite story as a child involved a magic child.
- My favourite colour is also a fruit.
- My dogs name is another way to describe someone who is a bit messy.
- My favourite animal can become a bit grizzly.
Down
- My favourite Disney film involves an elephant.
- My favourite season gets very colourful.
- My favourite food is Italian.
- My favourite films involve battles in space.
- My favourite food chain involves five people.
- My favourite childhood TV character is a cleaning tool.
- My favourite drink originates from Ethiopa.
14 Clues: My favourite food is Italian. • My favourite colour is also a fruit. • My favourite season gets very colourful. • My favourite subject involves a keyboard. • My favourite drink originates from Ethiopa. • My favourite films involve battles in space. • My favourite food chain involves five people. • My favourite animal can become a bit grizzly. • ...
IGUpdate-Aug2024 2024-09-05
Across
- Enables field devices, RTUs, to talk with EMS and ADMS.
- Number of Viper reclosers installed as of this update.
- V2G (Vehicle-to-Grid) demonstration application
- One of three Electric Avenue locations upgraded with new chargers.
Down
- Enterprise Distribution Energy Management System
- TOU
- Grid edge computing meter being deployed in SGTB this fall.
7 Clues: TOU • V2G (Vehicle-to-Grid) demonstration application • Enterprise Distribution Energy Management System • Number of Viper reclosers installed as of this update. • Enables field devices, RTUs, to talk with EMS and ADMS. • Grid edge computing meter being deployed in SGTB this fall. • One of three Electric Avenue locations upgraded with new chargers.
2ws3e 2025-04-01
Across
- Device that cleanses and makes water safe to drink
- I used to vent smoke or fumes from cooking
- A mobile computing device that fits on your lap
- Device often found in bathrooms or kitchens
Down
- A device that browse the web on the go.
- known for spinning cycles to clean fabrics
- Kitchen appliance for cleaning plates and utensils
- It keeps things cool and fresh
8 Clues: It keeps things cool and fresh • A device that browse the web on the go. • known for spinning cycles to clean fabrics • I used to vent smoke or fumes from cooking • Device often found in bathrooms or kitchens • A mobile computing device that fits on your lap • Kitchen appliance for cleaning plates and utensils • Device that cleanses and makes water safe to drink
Technology Vocabulary 2019-05-20
Across
- Universal Serial Bus
- The primary method for keeping a computer secure from intruders
- An in house website that serves employees only
- Instructions for the computer
- Scam to steal valuable information
- To write and post and entry in a weblog
Down
- Central Process Unit or the computing part of the computer
- Computer people may use the term for capability and time
- A small text file (up to 4KB) created by a website that is stored in the users computer
- Machinery and Equipment
- Uniform Resource Locator
- A large network made up of smaller networks
- Image Signal Processor
- To store data locally in order to speed up subsequent retrievals
- The fundamental display element of an electronic screen or bit mapped image
15 Clues: Universal Serial Bus • Image Signal Processor • Machinery and Equipment • Uniform Resource Locator • Instructions for the computer • Scam to steal valuable information • To write and post and entry in a weblog • A large network made up of smaller networks • An in house website that serves employees only • Computer people may use the term for capability and time • ...
DTIN- Final Crossword Part 2 2024-03-21
Across
- Type of digital currency that uses cryptography
- Methodology promoting continuous iteration of development
- Style of education through electronic and online media
- Network of physical objects connected to the internet
- Field involving analysis of raw data to draw conclusions
- Platforms for social interaction and content sharing
- Term for currency available only in digital form
- Large and complex data sets that are difficult to process
- Delivery of computing services over the internet
Down
- Decentralized ledger technology behind cryptocurrencies
- Simulated experience that can be similar to or different from the real world
- Protection of internet-connected systems from cyber threats
- Mobile phone with advanced features and connectivity
- Record of one's internet usage and online activities
- AI subset involving algorithms that learn over time
15 Clues: Type of digital currency that uses cryptography • Term for currency available only in digital form • Delivery of computing services over the internet • AI subset involving algorithms that learn over time • Mobile phone with advanced features and connectivity • Record of one's internet usage and online activities • Platforms for social interaction and content sharing • ...
The Quantum Grid 2025-04-16
Across
- The foundational word that precedes computing in this domain
- Intrinsic angular momentum of quantum particles
- A sphere used to visualize qubit states
- A gate that creates equal superposition of states
- An operation performed on qubits
- Algorithm famous for factoring large numbers
- A principle where a particle exists in multiple states at once
- Process that collapses a quantum state into a definite value
- Constant named after a physicist; defines quantum scale
Down
- A quantum link where qubit states are dependent on each other
- The loss of quantum behavior due to interaction with the environment
- Quantum method of transferring states without moving particles
- Algorithm used for searching unsorted databases faster
- The basic unit of quantum information
- External disturbance that affects quantum accuracy
15 Clues: An operation performed on qubits • The basic unit of quantum information • A sphere used to visualize qubit states • Algorithm famous for factoring large numbers • Intrinsic angular momentum of quantum particles • A gate that creates equal superposition of states • External disturbance that affects quantum accuracy • ...
Computer Languages 2025-06-09
Across
- Used for mathematical computing and algorithm
- Used for building web, mobile, and server apps, developed by Google
- Primarily used for web development and server-side scripting
- Used for automating tasks in operating
- Used for web development, server-side scripting, and mobile apps
- Developed by Apple, used for iOS and macOS
- Developed by Google, known for its simplicity, concurrency, and performance
Down
- Used for database management and query languages
- Known for its elegance and ease of use
- A general-purpose language with a large community
- A superset of JavaScript that adds static typing
- Known for its performance and low-level programming capabilities
- Widely used in system administration and text processing
- Versatile for multiple tasks
- Used for building scalable, concurrent, and distributed applications
15 Clues: Versatile for multiple tasks • Known for its elegance and ease of use • Used for automating tasks in operating • Developed by Apple, used for iOS and macOS • Used for mathematical computing and algorithm • Used for database management and query languages • A superset of JavaScript that adds static typing • A general-purpose language with a large community • ...
AMD Crossword 2025-11-26
Across
- AMD's chiplet-based design approach (7 letters)
- The intentional character at the end of AMD's tagline (10 letters)
- AMD's older slogan: "The future is _____" (6 letters)
- AMD's architecture named after a martial art philosophy (3 letters)
- AMD's data center accelerator brand (8 letters)
- AMD's high-end desktop processor line for enthusiasts (12 letters)
- AMD's graphics card brand (6 letters)
Down
- AMD develops computer _____ (10 letters)
- City where AMD is headquartered (9 letters)
- Company AMD acquired in 2022 for adaptive computing (6 letters)
- Type of device that uses AMD chips: Gaming _____ (7 letters)
- AMD's AI mascot introduced in 2024 (7 letters)
- Year AMD was founded: Nineteen sixty-_____ (4 letters)
- AMD's server processor brand (4 letters)
- AMD's processor brand for consumers (5 letters)
15 Clues: AMD's graphics card brand (6 letters) • AMD develops computer _____ (10 letters) • AMD's server processor brand (4 letters) • City where AMD is headquartered (9 letters) • AMD's AI mascot introduced in 2024 (7 letters) • AMD's chiplet-based design approach (7 letters) • AMD's data center accelerator brand (8 letters) • AMD's processor brand for consumers (5 letters) • ...
Bui15p1 Activity 1-3 Puzzle 2020-10-07
Across
- A single binary digit representing a 0 (zero) or a 1.
- A desktop computer is often referred to as a(n) _______________.
- It describes the physical components of a computer system.
- A device similar to a pen used on devices with touchscreens and offers more precision than a fingertip.
- The most powerful computers used for large-scale data processing.
- An input device is used to enter _________ into the computer system.
- A hybrid device combining the features of a smartphone and a tablet.
- ______________ keyboards have the keys arranged so that users can locate them more quickly and easily and is shaped to make prolonged use more comfortable.
- ____________ printer is used to charge sections of a rotating drum which is then used to print using toner powder, achieving a combination of speed with high print quality.
- It consists of a number of interrelated components including hardware and software that work together with the aim of converting data into information.
- A portable computing device normally equipped with a touch screen and/or a stylus.
- ____________ memory is used to improve performance by anticipating the data and instructions that will be needed by the processor.
- A temporary means of storing data awaiting processing, instructions used to process data or control the computer system, and data or information that has been processed.
- The name given to the use of mobile devices to support medical services.
- The term used to describe green ICT, energy efficient computing or sustainable computing.
- A variation on optical character recognition which involves detecting and recognizing simple marks made on a document.
- Part of the CPU that fetches instructions from software that has been loaded into memory, decodes them and then executes them.
- It is used as volatile, working memory by a computer, holding instructions and data that are waiting to be processed.
Down
- A device that measures the intensity of a light beam reflected from the printed bar code to identify the digits making up the unique identification number.
- A method of acquiring and storing data automatically with little or no human intervention.
- A solid state drive.
- A unit of information (in bytes) represented as one followed by 15 zeros
- Part of the CPU that carries out arithmetic calculations.
- It involves using software that attempts to recognise individual characters normally from printed documents.
- _____________ can be defined as a series of detailed instructions that control the operation of computer system.
- The contents of __________ memory are lost when the power to the device is switched off
- A system which has been superseded by new technologies or business practices in an organization but yet difficult or impossible to replace is referred to as _________ system.
- A type of ROM that retains its contents until they are changed using a special device known as a burner (abbrev).
- A thin and light portable computer with long battery life and solid state storage devices (SSDs).
- Class of computers that are widely used and generally provide the best price to performance ratio of all types of computer.
- Allows the user to control the operation of a computer program or item of computer hardware using a pointing device, such as a mouse, by selecting options from icons and menu options.
- A technology now allow users to make and receive free or low-cost telephone calls via the Internet.
32 Clues: A solid state drive. • A single binary digit representing a 0 (zero) or a 1. • Part of the CPU that carries out arithmetic calculations. • It describes the physical components of a computer system. • A desktop computer is often referred to as a(n) _______________. • The most powerful computers used for large-scale data processing. • ...
Intro to Crypto - Vocab 2019-02-05
Across
- a system using 0s and 1s used in computing
- symbols used in ancient Egypt
- a message after encryption
- the process of changing a plaintext into a ciphertext
- people paid to try crack into their own company's computer systems
- a process used to analyse the reoccurrence of symbols or letters in a ciphertext
- the number specific to individual encryption processes
- a cipher where letters are moved forwards or backwards
Down
- a cipher where letters are replaced with other letters or symbols
- a number that
- the process of changing a ciphertext into a plaintext with a key
- the process of trying to crack a code
- a message before encryption
- The art of writing & solving codes
- a method used to disguise a message
15 Clues: a number that • a message after encryption • a message before encryption • symbols used in ancient Egypt • The art of writing & solving codes • a method used to disguise a message • the process of trying to crack a code • a system using 0s and 1s used in computing • the process of changing a plaintext into a ciphertext • the number specific to individual encryption processes • ...
The Quantum Grid 2025-04-16
Across
- A quantum link where qubit states are dependent on each other
- A sphere used to visualize qubit states
- Quantum method of transferring states without moving particles
- External disturbance that affects quantum accuracy
- The basic unit of quantum information
- A gate that creates equal superposition of states
- Intrinsic angular momentum of quantum particles
Down
- Process that collapses a quantum state into a definite value
- A principle where a particle exists in multiple states at once
- Algorithm used for searching unsorted databases faster
- Constant named after a physicist; defines quantum scale
- An operation performed on qubits
- Algorithm famous for factoring large numbers
- The foundational word that precedes computing in this domain
- The loss of quantum behavior due to interaction with the environment
15 Clues: An operation performed on qubits • The basic unit of quantum information • A sphere used to visualize qubit states • Algorithm famous for factoring large numbers • Intrinsic angular momentum of quantum particles • A gate that creates equal superposition of states • External disturbance that affects quantum accuracy • ...
The Quantum Grid 2025-04-16
Across
- The foundational word that precedes computing in this domain
- Intrinsic angular momentum of quantum particles
- A sphere used to visualize qubit states
- A gate that creates equal superposition of states
- An operation performed on qubits
- Algorithm famous for factoring large numbers
- A principle where a particle exists in multiple states at once
- Process that collapses a quantum state into a definite value
- Constant named after a physicist; defines quantum scale
Down
- A quantum link where qubit states are dependent on each other
- The loss of quantum behavior due to interaction with the environment
- Quantum method of transferring states without moving particles
- Algorithm used for searching unsorted databases faster
- The basic unit of quantum information
- External disturbance that affects quantum accuracy
15 Clues: An operation performed on qubits • The basic unit of quantum information • A sphere used to visualize qubit states • Algorithm famous for factoring large numbers • Intrinsic angular momentum of quantum particles • A gate that creates equal superposition of states • External disturbance that affects quantum accuracy • ...
