computing Crossword Puzzles
Chapter3_Internet Crime 2017-08-03
Across
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- Type of attacker that Promote political ideology.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
Down
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of programming code is attached to a file, so that when the infected file is opened, the code executes
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
23 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
Chapter3_Internet Crime 2017-08-03
Across
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
Down
- They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- Type of attacker that Promote political ideology.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
23 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people. • ...
Chapter3_Internet Crime 2017-08-03
Across
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- Type of attacker that Promote political ideology.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
Down
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
22 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
Chapter3_Internet Crime 2017-08-03
Across
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- Type of attacker that Promote political ideology.
Down
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
22 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
+ICT Crossword 2021-12-03
Across
- a computer or computer program which manages access to a centralized resource or service in a network the programs and other operating information used by a computer.
- a device or substance for absorbing excessive or unwanted heat.
- any of various devices (including sensors) used to enter information and instructions into a computer for storage or processing and to deliver the processed data to a human operator
- A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects.
- a hardware component that supplies power to an electrical device.
- a circuit board that can be inserted in a computer to give extra facilities or memory.
- the part of a computer that houses the primary devices that perform operations and produce results for complex calculations.
- processes commands to a computer program in the form of lines of text.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals
- A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network.
- the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.
- facts and statistics collected together for reference or analysis.
- a person who uses or operates something, especially a computer or other machine.
- high-performance computers with large amounts of memory and processors that process billions of simple calculations and transactions in real time.
- the retention of retrievable data on a computer or other electronic system; memory.
Down
- Network topology describes the physical and logical relationship of nodes in a network, the schematic arrangement of the links and nodes.
- a group of letters occurring after a period in a file name, indicating the format of the file.
- the machines, wiring, and other physical components of a computer or other electronic system.
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- model describes seven layers that computer systems use to communicate over a network.
- input device is a piece of equipment used to provide data and control signals to an information processing system, such as a computer or information appliance.
- the part of a computer that houses the primary devices that perform operations and produce results for complex calculations.
- a response to the problem of inefficient usability in early, text-based command-line interfaces for the average user.
- a particularly powerful mainframe computer.
- a small computer that contains a microprocessor as its central processor.
- the part of a computer in which operations are controlled and executed.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit. Also called hard disk drive.
- extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
- software manipulating or extracting data from a stored file.
- or tablet PC, is a portable computer that uses a touchscreen as its primary input device.
31 Clues: a particularly powerful mainframe computer. • software manipulating or extracting data from a stored file. • a device or substance for absorbing excessive or unwanted heat. • a hardware component that supplies power to an electrical device. • facts and statistics collected together for reference or analysis. • ...
March Review Crossword 2025-03-11
Across
- a process that makes the data uniform without changing its meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word).
- <, >, <=, >=, ==, != indicate a Boolean expression
- a command or instruction. Sometimes also referred to as a code statement.
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- a data type that is either true or false
- a group of computing devices and programs working together for a common purpose
- the protocol used for transmitting web pages over the Internet
- the value passed to the parameter
- a collection of program statements. Programs run (or “execute”) one command at a time.
- A way of representing information using only two options
- A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.
- a combination of operators and values that evaluates to a single value
- choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table
- 8 bits
- data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- NOT, AND, and OR, which evaluate to a Boolean value
- used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression
- Data that changes discretely through a finite set of possible values
- occurs when the ending condition will never evaluate to true
- a variable in a function definition. Used as a placeholder for values that will be passed through the function
- a group of interconnected computing devices capable of sending or receiving data.
Down
- the system responsible for translating domain names like example.com into IP addresses
- a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- a named reference to a value that can be used repeatedly throughout a program
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
- any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- an ordered sequence of characters
- A way of representing information using ten options
- the process of accessing each item in a list one at a time
- a system of linked pages, programs, and files
- Data with values that change continuously, or smoothly, over time. Some examples of analog data include music, colors of a painting, or position of a sprinter during a race.
- program statements run in order, from top to bottom
- allows a program to change the value represented by a variable
- some program statements run when triggered by an event, like a mouse click or a key press
- A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1
- a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
36 Clues: 8 bits • an ordered sequence of characters • the value passed to the parameter • a data type that is either true or false • a system of linked pages, programs, and files • <, >, <=, >=, ==, != indicate a Boolean expression • A way of representing information using ten options • program statements run in order, from top to bottom • ...
CAT cross word 2024-10-09
Across
- Software that is available for use at no cost but may have restrictions on usage or distribution
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- Address A unique identifier assigned to each device connected to a network that uses the Internet Protocol for communication.
- Computing The delivery of computing services, such as storage, processing, and software, over the internet (the cloud) to offer flexible resources and economies of scale.
- The use of digital communication tools (like social media, messaging apps, or online forums) to harass, threaten, embarrass, or target another person. Cyberbullying can include spreading rumours, sending harmful messages, impersonation, or sharing private information without consent.
- A technology that allows electronic devices to connect to a wireless local area network (WLAN) using radio waves.
- A cyber attack that redirects users from legitimate websites to fraudulent ones to steal sensitive information
- A standard for connecting peripherals to a computer, allowing for data transfer and power supply, available in various versions (e.g., USB 2.0, USB 3.0) with different speeds and capabilities.
- Processing Unit, the primary component of a computer that performs most of the processing tasks.
- A cyber attack that uses disguised emails or messages to trick users into revealing confidential information, such as passwords or credit card numbers.
- (Fiber to the Home) A type of broadband network architecture where optical fibre is installed directly from the central provider's office to individual homes or buildings, providing high-speed internet access
- A data storage device that uses flash memory to store data, providing faster access than traditional hard drives.
- A network device that connects multiple devices within a local area network (LAN) and uses MAC addresses to forward data only to its intended destination, reducing network collisions
- Wide Area Network, a network that covers a broad geographical area, connecting multiple smaller networks (LANs).
Down
- Cable A cable made of thin strands of glass or plastic that transmits data as light signals, offering high-speed data transmission with minimal signal loss
- Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
- Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
- Central Processing Unit, the primary component of a computer that performs most of the processing tasks
- Malicious software designed to harm or exploit any programmable device or network.
- Local Area Network, a network that connects computers within a small geographical area, like a home, school, or office.
- Server A server that provides database services to other computers or applications, handling queries, storage, and data management.
- Computing Device A device built and optimized to perform a single task or a limited range of tasks, such as a GPS navigator, a digital camera, or a gaming console.
- A type of twisted pair cable used in Ethernet networks, without additional shielding, typically less expensive and more flexible than STP.
- A wireless network that connects devices within a limited area, like a home or office, using Wi-Fi technology.
- Graphics Processing Unit, a specialized processor designed to accelerate graphics rendering and image processing
- Engineering The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.
26 Clues: Malicious software designed to harm or exploit any programmable device or network. • Software that is available for use at no cost but may have restrictions on usage or distribution • Processing Unit, the primary component of a computer that performs most of the processing tasks. • ...
TREASURE HUNT - PRELIMS 2024-02-03
Across
- In the coding sphere, a mind so bright, Languages crafted with sheer delight. Not a snake, but a creator's claim, Who am I, in the coding game?
- I see what's around, but not with eyes, Images I understand, no need for ties. Identifying objects, my clear decision, What am I?
- In the digital expanse, I come alive, No body, no soul, yet conversations thrive. With algorithms sharp and responses keen, I'm a virtual companion, not easily seen. What am I?
- I'm the magic touch for data's grace, Turning raw facts to a model's ace. I tweak and tune for predictions so fine, In data's realm, I make patterns shine. What am I?
- In the world of AI, I play and I teach, Learning by doing, a lesson in reach. Reward and trial, my method's revealing, What am I, in the AI realm, appealing?
- In silicon veins, my knowledge flows, Mechanical limbs where my prowess shows. Not flesh and blood, but algorithms I weave, in the realm of automation, what do I perceive?
- I'm a challenge for machines, a puzzle so sly, To prove that they're human, they must pass me by. What am I?
- I'm words and phrases, a computer's understanding, Helping machines talk, it's truly outstanding. Three words to reveal, in this processing game, What am I, making language not the same?
Down
- I'm a digital record, linked and secure, Not a document, but you can be sure. Decentralized, transparent, my strength is profound, In the world of crypto, I can always be found. What am I?
- In the language of thoughts, I wield my might, Grasping emotions, hidden from sight. A whisper in words, a linguistic trance, What am I, decoding life's nuanced dance?
- Bytes and info in a massive flow, I analyze, organize, and I grow. In the digital realm, I wield much might, What am I called?
- I'm not in your regular computing frame, With qubits dancing, it's not the same. In states of one and zero, I'll soar, A computing future to explore. What could I be?
- In logic's embrace, I weave a scheme, Sequences of steps, like a coded dream. I solve puzzles with rules profound, What am I, in the computing ground?
- I'm a system of connections, complex but neat ,Layers of nodes, patterns I repeat. I learn from data, it's my guiding force, In the world of AI, I stay on course. What am I?
- I forecast the future with data in my grasp, Patterns and trends, in them I clasp. What am I, with insights so wise? In the world of data, I analyze. What am I?
- In the coding land, I'm quite merry, A handy tool, just like a library. With tensors, I help AI grow, Guess who I am in the tech show?
16 Clues: I'm a challenge for machines, a puzzle so sly, To prove that they're human, they must pass me by. What am I? • Bytes and info in a massive flow, I analyze, organize, and I grow. In the digital realm, I wield much might, What am I called? • ...
History of Computing and Programming Languages 2021-02-11
Across
- A-0 System was the first compiler system created for the ___________ computer.
- A logical programming language created in 1972 with three key notes in programming in this language include creating facts, queries, and rules
- He created the Difference Machine and Analytical Engine
- Considered as the father of modern computer science as he was the first to imagine artificial intelligence
- A programming language designed for engineering purposes by Konrad Zuse-It was the first high-level (non-von Neumann) programming language to be designed for a computer
- The code name of the smartphone operating system that was released in 2016.
- A language that was used as a stepping stone for Android's development
- The first programmable electronic general-purpose digital computer used to calculate artillery firing tables for the United States Army
- A general-purpose and high-level language that was created to serve as a teaching tool for undergraduates
- Developed by Yukihiro Matsumoto; generally used for web development and used by companies such as Twitter and Hulu.
- The EU law on data protection and privacy.
- A supercomputer created by IBM
- Apple's premiere and recommended programming language to use in making iOS applications.
- First compiled programming language.
- Developed by Larry Wall; utilized for text-editing and scripting.
- She is the world's first computer programmer as she created a machine algorithm which influenced most advances in programming language design
- Developed by Jean Ichbiah; high level programming language used for traffic control.
- Programming languages which makes the foundation of many software which includes web applications.
- A programming language meant for managing data in a database
Down
- A well known programming language that directly compiles to a machine’s native code. This language was created to maximize efficiency in creating code with far high sophistication while still maintaining the C language efficiency
- A miniature device that is meant as a storage base
- Most popular legacy language among the federal governments.
- First ever influential high-level language
- A programming language initially meant to describe or discuss another language and was developed in 1973 by Robin Milner
- The credit card size single board computer used for education purposes.
- A United States organization that faced a massive intrusion in 2015 due to technology obsolescence.
- The company that launched the first 1 Terabyte SD Card.
- Developed by Guido Van Rossum; general purpose programming utilized by Google, Yahoo, etc.
- Created in 2008 to enable different devices to directly connect to one another without needing internet connection
- Released in 1999 and was created as a programming langauge meant for novice programmers that plan on making games
- A notable feature in the C programming language meant to store the address of another variable to save memory space and achieve faster execution time
- One of the legacy languages developed by IBM during the year 1960.
- A high-level and procedural language essentially used in business computing
- Developed by Haskel Brooks Curry; used for solving mathematical problems and complicated calculations.
- IBM Servers that specifically made use of the Report Program Generator programming language to work.
35 Clues: A supercomputer created by IBM • First compiled programming language. • First ever influential high-level language • The EU law on data protection and privacy. • A miniature device that is meant as a storage base • He created the Difference Machine and Analytical Engine • The company that launched the first 1 Terabyte SD Card. • ...
Intro Computers/Computing Part 1 Activity 2015-09-28
Across
- The best practice to generate document outlines is through the use of _______.
- the doctrine that brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.
- Visits sites on the internet, discovering web pages and building an index to the webs content based on keywords.
- Using neutral rather than subjective, boastful, or exaggerated language in a good web page is _______ _______.
- Communication in which both the sender and receiver are active at the same time
- A person who falsifies data to pretend to be someone else
- Downloading media (films, shows, games, music etc.) or software off websites for free where it is actually on sale.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM.
- Looks up user submitted keywords in the index and reports back which web pages the crawler has found containing those words.
- The codes or tags that browsers use to create web pages
- A related group of networked computers
- Networks that are not geographically close that make up the internet.
Down
- A good web page with about half the word count as the control condition is ________ ______.
- a unique address given to each computer connected to the internet
- Translates the hierarchical, human-readable names into the four number IP address
- A file of data on a local hard drive. When downloaded data are temporarily stored on the user's local disk or on a local network disk, it speeds up retrieval the next time the user wants that same data (Web page, graphic, etc.) from the Internet or other remote source.
- a suffix to the name of a computer file applied to indicate the encoding of its contents or usage
- What does DOM stand for?
- Networks that are geographically close that make up the internet.
- A system of interlinked hypertext documents accessed via the internet
21 Clues: What does DOM stand for? • A related group of networked computers • The codes or tags that browsers use to create web pages • A person who falsifies data to pretend to be someone else • a unique address given to each computer connected to the internet • Networks that are geographically close that make up the internet. • ...
Crossword Interact with computing technology MEM16008 2022-07-04
Across
- The device for inputting letters, words and numbers into your computer
- Design and drawing application of the AutoDesk family
- A written communication sent electronically
- The data that is entered into or received by a computer
- The practice of setting up the computer and the workspace to fit the user’s height, size and computer working behaviours in order to minimise physical stress on the user.
- CAD application for 3D mechanical design (or someone who devises some new process or machine)
- The information entered into or produced by a computer
- The presentation application of the Microsoft family
- The output or product of using Word
- The output or product of using Outlook
- A confidential code used as a security measure that a user uses to get into their computer
- (2 words) The start-up procedure the user uses to get access to the operating system or application
- (3 words) The set of written instructions that describes the step-by-step process that must be taken to properly perform a routine activity
Down
- (4 words) The meaning of the acronym WHS which is the legislation that determines safe work practices for computer users
- The output or product of using Excel
- The set of options presented to help the user find information or execute a function (or a range of food offerings in a restaurant)
- The email application of the Microsoft family
- The visual output device on a computer
- The output or product of using PowerPoint
- The digital data that the computer produces or sends
- (2 words) The meaning of the acronym CAD
- The spreadsheet calculation application of the Microsoft family
- The output or product of using AutoCAD
- Control device on a computer (or a small rodent)
- (2 words) The technology for storing operating systems, software programs and other files into your computer
- The word processing application of the Microsoft family
- A type of malicious software, or malware, that spreads between computers and causes damage to data and software (or an infection passed between humans)
- (2 words) The sign-off procedure the user uses to close down the operating system or application
28 Clues: The output or product of using Word • The output or product of using Excel • The visual output device on a computer • The output or product of using AutoCAD • The output or product of using Outlook • (2 words) The meaning of the acronym CAD • The output or product of using PowerPoint • A written communication sent electronically • ...
History of Computing and Programming Languages 2023-02-19
Across
- Programming languages used in old systems and some maybe older than our parents.
- Computing tool invented by the Chinese around the 2400 BC.
- The first computer programmer.
- A programming language designed to teach programming techniques.
- Name of the developer of no. 8.
- Last Name of the developer of C#.
- Latest programming language developed by Google.
- The programming language used for Mac and IOS development.
- Company that created C#.
- A very popular legacy language for business systems.
- A computational model which is considered to be able to compute everything computable.
- First esoteric programming language
- These languages gained prominence on the 1950s.
- Surname of the creator C and UNIX.
Down
- Developer of the first real programming language.
- Most popular search engine.
- First programming language for quantum computers.
- 1980-1990:"Rise of _ Languages".
- Name of the first mouse created.
- The word used for the Chicken programming language.
- Paved the way for the internet.
- First mechanical computer.
- The first colored screen which is developed by Sharp.
- Founder of Amazon.
- A popular language developed by Jetbrains and is used for Android development.
- A programming language for database management.
- First name of the creator of the ADA programming language.
- A chatbot developed by OpenAI.
- A scripting language developed for the Java language.
- The operating system developed by Linus Torvalds.
30 Clues: Founder of Amazon. • Company that created C#. • First mechanical computer. • Most popular search engine. • The first computer programmer. • A chatbot developed by OpenAI. • Name of the developer of no. 8. • Paved the way for the internet. • 1980-1990:"Rise of _ Languages". • Name of the first mouse created. • Last Name of the developer of C#. • Surname of the creator C and UNIX. • ...
Vocabulary 2: Computer Basics & Troubleshooting 2025-02-12
Across
- A type of computer memory that stores data temporarily while a computer is running.
- A component of the Windows operating system (OS) that helps administrators and end users monitor, manage and troubleshoot tasks.
- A distributed computing model that brings computation and data storage closer to the sources of data.
- A type of online gaming that runs video games on remote servers and streams the game's output (video, sound, etc) directly to a user's device, or more colloquially, playing a game remotely from a cloud.
- a substance that has specific electrical properties that enable it to serve as a foundation for computers and other electronic devices
- Computer memory that can permanently store data and applications within it.
- Primary memory has limited storage capacity, and it is volatile.
Down
- Refers to the regular updating of software or operating systems to integrate new features, address security vulnerabilities, fix bugs, and improve overall performance.
- The component of a computer system that performs the system's basic operations (such as processing data), that exchanges data with the system's memory or peripherals, and that manages the system's other components.
- An emergent field of cutting-edge computer science harnessing the unique qualities of quantum mechanics to solve problems beyond the ability of even the most powerful classical computers.
- Is software that provides low-level control of computing device hardware. (directly installed onto a piece of hardware during manufacturing)
- to discover or reveal something through detailed examination
12 Clues: to discover or reveal something through detailed examination • Primary memory has limited storage capacity, and it is volatile. • Computer memory that can permanently store data and applications within it. • A type of computer memory that stores data temporarily while a computer is running. • ...
Disruptive Technology 2025-08-09
Across
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- security enhancement that requires users to provide more than one form of identification to access an account or system
- a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- the process of identifying and assessing potential security weaknesses in systems, software, and networks
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
14 Clues: the process of identifying and assessing potential security weaknesses in systems, software, and networks • Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • ...
Cloud Computing 2016-07-27
Across
- Werden die Daten unverschlüsselt übertragen, können diese im Falle eines Angriffs Dritter leicht eingesehen werden.
- Durch die Verlagerung der Unternehmenssoftware und -daten in die Cloud ist es Mitarbeitern eines Unternehmens möglich, überall auf der Welt auf die Daten zuzugreifen.
Down
- Viele Unternehmen akzeptieren CloudComputing nicht, da sie ihre Daten an einen fremden IT-Anbieter übergeben müssen.
- Einer der kritischsten Punkte besteht in der Befürchtung der Unternehmen, dass ihre Daten nicht sicher genug abgelegt werden.
- Mithilfe von Cloud-Computing sparen Unternehmen Investitionskosten – z. B. für hardware IT-Infrastrukturen und Software – ein.
5 Clues: Werden die Daten unverschlüsselt übertragen, können diese im Falle eines Angriffs Dritter leicht eingesehen werden. • Viele Unternehmen akzeptieren CloudComputing nicht, da sie ihre Daten an einen fremden IT-Anbieter übergeben müssen. • ...
Crossword computing 2025-10-10
computer wordsBandwidth Compacity of an electrical pathway Blog Write and post an entry in a weblog Cache Cookie Cpu Firewall Hardware Intranet Internet Isp Phishing Pixel Software Url Usb 2018-04-05
Across
- provide access to an internet
- the storage of data locally for easy access
- a large web made up of a bunch of smaller webs
- the computing part of the computer
- a series of instructions that perform a particular task
- the capacity of an electronic pathway can carry
- the address that defines the route to a file
Down
- used to track users preferences
- all the stuff such as wires printers etc.
- a way to keep bad people out of your website
- a website that serves employes only
- a scam to steal valuable information
- the fundamental displaying element on a computer screen
- writing a post on a weblog
- a very popular way to connect things to devices
15 Clues: writing a post on a weblog • provide access to an internet • used to track users preferences • the computing part of the computer • a website that serves employes only • a scam to steal valuable information • all the stuff such as wires printers etc. • the storage of data locally for easy access • a way to keep bad people out of your website • ...
Into to Steam 2023-10-24
Across
- A person who presents a radio or television transmission
- A person who take photographs
- The systematic study of the world through observation and experimentation
- The use of imagination or original ideas
- The application of scientific knowledge for practical purposes
- The part of science concerned with designing and building structures
- How many STEAM classrooms are run
Down
- A person who treats mental conditions
- The study of calculations and numbers
- Works created by human skill and imagination
- An important and fun event that promoted STEAM learning
- A person who develops mobile applications for one or more devices
- Designer A person who combines text and pictures in magazines
- A person who designs and builds structures
- Computing or program instructions
15 Clues: A person who take photographs • Computing or program instructions • How many STEAM classrooms are run • A person who treats mental conditions • The study of calculations and numbers • The use of imagination or original ideas • A person who designs and builds structures • Works created by human skill and imagination • An important and fun event that promoted STEAM learning • ...
Crossword II 2024-10-13
Across
- A unit of digital information in computing
- A software application for organizing data in rows and columns
- A program that translates code into machine language
- A common type of wired LAN connection
- A server that forwards requests to other servers
- A programming language for web development
- A formal gathering for discussion or decision-making
Down
- A symbol or container for storing data in programming
- Data stored on a client by a web browser
- A period of interaction between user and server
- A style sheet language used for describing web design
- The standard language for creating web pages
- A device that produces paper copies of digital documents
- The process of encoding information for security
- A small partitioned workspace in an office
15 Clues: A common type of wired LAN connection • Data stored on a client by a web browser • A unit of digital information in computing • A programming language for web development • A small partitioned workspace in an office • The standard language for creating web pages • A period of interaction between user and server • The process of encoding information for security • ...
C/G vocabulary 2025-02-13
Across
- – To confirm something as true or official.
- – A substance found in plant cell walls, used in making paper and textiles.
- – The process of computing or determining something mathematically.
- – To separate or release from something.
- – Relating to the sky or outer space.
- – To feel or express great joy.
Down
- – The act of coming together from different directions.
- – A small rodent often kept as a pet.
- – To search for and collect something with effort.
- – Dependent on certain conditions or circumstances.
- – To publicly declare something as wrong or evil.
- – To require or compel someone to do something.
- – A unit of digital storage equal to 1,024 megabytes.
- – To jump or fall suddenly into something.
- – To persuade someone gently to do something.
15 Clues: – To feel or express great joy. • – A small rodent often kept as a pet. • – Relating to the sky or outer space. • – To separate or release from something. • – To jump or fall suddenly into something. • – To confirm something as true or official. • – To persuade someone gently to do something. • – To require or compel someone to do something. • ...
computer science 2025-09-12
Across
- : Number system using only 0s and 1s
- Address : A unique number assigned to devices on a network
- : The process of converting data into a secret code
- Drive : Long-term storage device for files and programs
- : A set of rules for communication between computers
- : The smallest unit of data in computing
- : The brain of the computer that processes instructions
- : Temporary memory used by the computer to run programs
- : A group of computers connected to share resources
- : Storing and accessing data over the internet instead of local storage
Down
- : A security system that controls network traffic
- System : Software that manages hardware and software resources
- : Main circuit board that connects computer components
- : A group of 8 bits
- : High-speed memory close to the CPU
15 Clues: : A group of 8 bits • : Number system using only 0s and 1s • : High-speed memory close to the CPU • : The smallest unit of data in computing • : A security system that controls network traffic • : The process of converting data into a secret code • : A group of computers connected to share resources • : A set of rules for communication between computers • ...
Disruptive Technology 2025-08-09
Across
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- security enhancement that requires users to provide more than one form of identification to access an account or system
- a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- the process of identifying and assessing potential security weaknesses in systems, software, and networks
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
14 Clues: the process of identifying and assessing potential security weaknesses in systems, software, and networks • Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • ...
Computing Keywords 3 2021-02-17
Across
- the time it takes for a read/write head to locate the area on the disk where the data to be read is stored
- start up
- a base-16 number system that uses the numbers 0-9 and the letters A-F
Down
- the introductory or main page of a website
- isolate a suspected virus in a protected area of storage where it cannot harm other files
- using the internet to send text, images or multimedia in order to upset someone
- a system (hardware and software) that protects a computer network from being used or looked at
7 Clues: start up • the introductory or main page of a website • a base-16 number system that uses the numbers 0-9 and the letters A-F • using the internet to send text, images or multimedia in order to upset someone • isolate a suspected virus in a protected area of storage where it cannot harm other files • ...
Computing key words 2019-06-17
Across
- The processes of removing unnecessary detail from a problem.
- Allows a decision to be made based on a condition being true.
- Is used to store information to be referenced.
- A set of instructions that can be reused.
Down
- A mistake in the order of characters or words in a program.
- Looping through steps until a condition is met.
- The order in which steps are followed.
7 Clues: The order in which steps are followed. • A set of instructions that can be reused. • Is used to store information to be referenced. • Looping through steps until a condition is met. • A mistake in the order of characters or words in a program. • The processes of removing unnecessary detail from a problem. • ...
Fundamentals of computing 2024-09-13
Across
- A software program designed to help users perform specific tasks
- A program or application used to input data into a computer system
- The term for the main part of the computer that performs tasks and calculations
- A central component of a computer that performs calculations and executes instructions
Down
- The process of entering data into a computer
- The overall design of a computer system, including hardware and software
- The physical components of a computer system
- Data that is processed and organized to be meaningful and useful
8 Clues: The process of entering data into a computer • The physical components of a computer system • A software program designed to help users perform specific tasks • Data that is processed and organized to be meaningful and useful • A program or application used to input data into a computer system • ...
computing fun quiz 2022-07-18
7 Clues: could store 256 characters • amount of colors available • Does arithmetic operations. • Visual format to display a code. • name given to black and white image • Frequently used data and instructions. • Holds where data needs to be sent to or received from.
Computing Python Crossword 2017-03-28
Across
- A high level computer programming language.
- The decision in the programme that decides when the programme will move based on the results of an event.
- Sequence of instructions for a computer.
- The graphic cursor that draws the shapes.
Down
- A single pass through a set of instructions.
- A set of rules, which are set to define the combination of symbols.
- One of the three basic logic structures in Python.
7 Clues: Sequence of instructions for a computer. • The graphic cursor that draws the shapes. • A high level computer programming language. • A single pass through a set of instructions. • One of the three basic logic structures in Python. • A set of rules, which are set to define the combination of symbols. • ...
computing so far 2025-12-16
Quantum Computing Fundamentals by IndiQ 2020-09-23
Across
- Do you want my arbitrary state? I can teleport it to you, but the quantum police will arrest me if I attempt to copy it, per the No _______Theorem.
- You may be a big red dog. But you are also X, Y, Z, H, S…
- I ask Qiskit for entanglement and Qiskit replies: qcirc.h(0), qcirc.cx(0, 1).
- In my hand I hold three qubits. In other words, I hold _______ basis states.
- Oh, U3(pi/2, 0, pi), what is your good name?
- Forward or backward it matters hardly. I am a matrix, I am _______.
- You are the 0 to my 1, 90 degrees separated in our Hilbert space. But in the _______ representation our separation is twice as big.
Down
- Should I apply a CNOT from me to you, my own phase will be altered too. It suffers a _______.
- Do what you will but remember your probabilities must add up to one. Your state must be _______. (sp: American English)
- Pfft, my name is not Bell! Though, like him, I hold as many 0’s as I do 1’s. He only holds two of each; I more. I am the _______ state.
- A greeting, a hello. Moreover, the _______ function tells me what you may do next.
- Some say “bra-ket”, others “the notation of _______.”
- There’s a letter that a snake hisses. Apply a dagger to it and voila! You reduce your phase by _______ degrees.
- Three can behave as one. Namely, X.
14 Clues: Three can behave as one. Namely, X. • Oh, U3(pi/2, 0, pi), what is your good name? • Some say “bra-ket”, others “the notation of _______.” • You may be a big red dog. But you are also X, Y, Z, H, S… • Forward or backward it matters hardly. I am a matrix, I am _______. • In my hand I hold three qubits. In other words, I hold _______ basis states. • ...
Elevate your potential 2024-09-30
Across
- Board game and West End Show (5)
- Panorama perhaps, for small weight (9)
- The answer might be dissolved in a liquid (8)
- broadcast the fitness of Jumbo perhaps (13)
- Watch for fingers with no hands (7)
- Slim down the agreement (8)
- Something to ask mystic meg (6)
- Not out - at home learnt to shuffle (8)
- Hear a West End Show, host of Dstl information (5)
- Pb (4)
Down
- Sounds like a lift in New York perhaps, without the alternative (7)
- A twister called Monty (6)
- Song by Gloria Gaynor "I will ..." finished early with proficiency (13)
- Cryptography organisation rings the bell (6)
- I fancy Bertie is concealing a kind of crime (5)
- Might be found in bad attitudes (3)
- Something new, a work of fiction maybe (5)
- Computing for waste recycling (8)
- A difference that can be shocking (9)
19 Clues: Pb (4) • A twister called Monty (6) • Slim down the agreement (8) • Something to ask mystic meg (6) • Board game and West End Show (5) • Computing for waste recycling (8) • Might be found in bad attitudes (3) • Watch for fingers with no hands (7) • A difference that can be shocking (9) • Panorama perhaps, for small weight (9) • Not out - at home learnt to shuffle (8) • ...
Technology Vocabulary 2019-05-20
Across
- Central Process Unit or the computing part of the computer
- To store data locally in order to speed up subsequent retrievals
- Computer people may use the term for capability and time
- An in house website that serves employees only
- Instructions for the computer
- To write and post and entry in a weblog
- Scam to steal valuable information
- Uniform Resource Locator
Down
- A small text file (up to 4KB) created by a website that is stored in the users computer
- Machinery and Equipment
- The primary method for keeping a computer secure from intruders
- A large network made up of smaller networks
- Image Signal Processor
- The fundamental display element of an electronic screen or bit mapped image
- Universal Serial Bus
15 Clues: Universal Serial Bus • Image Signal Processor • Machinery and Equipment • Uniform Resource Locator • Instructions for the computer • Scam to steal valuable information • To write and post and entry in a weblog • A large network made up of smaller networks • An in house website that serves employees only • Computer people may use the term for capability and time • ...
Intro to Crypto - Vocab 2019-02-05
Across
- a process used to analyse the reoccurrence of symbols or letters in a ciphertext
- the process of trying to crack a code
- the number specific to individual encryption processes
- symbols used in ancient Egypt
- a method used to disguise a message
- a cipher where letters are moved forwards or backwards
- a system using 0s and 1s used in computing
- people paid to try crack into their own company's computer systems
- a number that
Down
- a message before encryption
- The art of writing & solving codes
- a cipher where letters are replaced with other letters or symbols
- the process of changing a plaintext into a ciphertext
- the process of changing a ciphertext into a plaintext with a key
- a message after encryption
15 Clues: a number that • a message after encryption • a message before encryption • symbols used in ancient Egypt • The art of writing & solving codes • a method used to disguise a message • the process of trying to crack a code • a system using 0s and 1s used in computing • the process of changing a plaintext into a ciphertext • the number specific to individual encryption processes • ...
tek class 2018-04-04
Across
- The computing part of the computer
- The primary method for keeping a computer secure from intruders
- it is a scam to steal valuable information such as credit card and social security numbers
- not enough staff or time
- The address that defines the route to a file on an Internet server
- Instructions for the computer
- Machinery and equipment
Down
- a circle that is good to eat
- The fundamental display element of an electronic screen
- An organization that provides access to the Internet
- An inhouse website that serves employees only
- To write and post an entry in a Web
- a large network made up of smaller networks
- The most widely used hardware interface for attaching peripherals to a computer
- To store data
15 Clues: To store data • Machinery and equipment • not enough staff or time • a circle that is good to eat • Instructions for the computer • The computing part of the computer • To write and post an entry in a Web • a large network made up of smaller networks • An inhouse website that serves employees only • An organization that provides access to the Internet • ...
CompTIA Cloud+ 2025-01-06
Across
- Cloud model providing virtualized computing resources.
- Distributes traffic evenly across servers.
- Architecture for sharing cloud resources across users.
- A copy of data used to restore the original.
- System’s ability to grow with increased demand.
- Ability to scale resources up or down dynamically.
Down
- Software delivery model where apps are hosted online.
- Cloud model delivering development tools over the internet.
- Measures to protect cloud data and infrastructure.
- Automates workflows and tasks in a cloud environment.
- Strategies for restoring IT operations after a failure.
- Software that runs and manages virtual machines.
- Technology to create virtual versions of hardware or software.
- Network of remote servers for storing and managing data.
- Meeting regulatory or legal standards in the cloud.
15 Clues: Distributes traffic evenly across servers. • A copy of data used to restore the original. • System’s ability to grow with increased demand. • Software that runs and manages virtual machines. • Measures to protect cloud data and infrastructure. • Ability to scale resources up or down dynamically. • Meeting regulatory or legal standards in the cloud. • ...
Space Wearables 2021-10-27
Across
- person employed to look after technical equipment or do practical work in a laboratory.
- the branch of science concerned with the chemical and physicochemical processes and substances that occur within living organisms.
- any goal-oriented activity requiring, benefiting from, or creating computing machinery.
- the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
Down
- the use of technology that stimulates the senses of touch and motion, especially to reproduce in remote operation or computer simulation the sensations that would be felt by a user interacting directly with physical objects.
- the return to the input of a part of the output of a machine, system, or process (as for producing changes in an electronic circuit that improve performance or in an automatic control device that provide self-corrective action)
- subfield of robotics dealing with constructing robots from highly compliant materials, similar to those found in living organisms.
- a measurable substance in an organism whose presence is indicative of some phenomenon such as disease, infection, or environmental exposure.
- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- a device which detects or measures a physical property and records, indicates, or otherwise responds to it.
10 Clues: person employed to look after technical equipment or do practical work in a laboratory. • any goal-oriented activity requiring, benefiting from, or creating computing machinery. • a device which detects or measures a physical property and records, indicates, or otherwise responds to it. • ...
CSA Terms 2022-01-13
Across
- A cybersecurity control framework for cloud computing, used as a tool for the systematic assessment of a cloud implementation
- A credential and training program that fills the gap in the market for technical education for cloud IT auditing
- A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
- A cloud service model that provides resource pools of virtualized infrastructure, such as compute, network, or storage pools
- A program designed to help customers assess and select a CSP through a three-step program of self-assessment, third-party audit, and continuous monitoring
Down
- A certificate that is widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
- A tool that offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
- Union's agency dedicated to achieving a high common level of cybersecurity across Europe
- An on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies
- A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
10 Clues: Union's agency dedicated to achieving a high common level of cybersecurity across Europe • A credential and training program that fills the gap in the market for technical education for cloud IT auditing • A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet • ...
Business Maze 2024-08-21
Across
- It is a software and fabless company founded in California which designs and supplies graphics processing units (GPUs), application programming interfaces (APIs) for data science and high-performance computing, as well as system on a chip units (SoCs) for the mobile computing and automotive market
- An investment made by a firm or individual in one country into business interests located in another country
- A global expansion strategy followed by companies like McDonald's where the company allows another party to use its trademark and business model in exchange for a fee
- The formal process through which a business decides how it will allocate its capital to achieve long-term goals
- A labour market characterized by short-term contracts or freelance work rather than permanent jobs
Down
- A business strategy where companies adjust their products or services to fit local markets
- Bretten Woods Twins
- The process of moving production or services to another country to reduce costs
- Announced merger with Reliance Retail, this Group of Companies is an Indian retail and fashion sectors, operating supermarket chains Big Bazaar and Food Bazaar, lifestyle stores Brand Factory and Central, integrated foods and FMCG manufacturing sectors.
- A type of organization structure where employees report to multiple managers, typically both a functional manager and a project manager
10 Clues: Bretten Woods Twins • The process of moving production or services to another country to reduce costs • A business strategy where companies adjust their products or services to fit local markets • A labour market characterized by short-term contracts or freelance work rather than permanent jobs • ...
Basic IT 2021-01-14
Across
- A set of steps to diagnose and fix a computer.
- Nonvolatile memory
- hardware that transmits and receives data on a local area network
- program that manages the computer hardware and other software applications
- Used for smaller companies to store information
- Designed to meet the computing needs of an individual.
- Father of the Computer
- working or volatile memory
- process of converting information into digital data
Down
- Allows short-distance digital data communications
- Used for its processing power to complete complex tasks.
- system of counting with only two states
- Used to simultaneously process data for hundreds or thousands of users
- the backbone for the computer
- multipurpose device that accepts input, processes data, stores data, and produces output
15 Clues: Nonvolatile memory • Father of the Computer • working or volatile memory • the backbone for the computer • system of counting with only two states • A set of steps to diagnose and fix a computer. • Used for smaller companies to store information • Allows short-distance digital data communications • process of converting information into digital data • ...
Computer words 2017-12-08
Across
- The computing part of the computer.
- An organization that provides access to the Internet.
- Not enough _______ to get the job done
- Machinery and equipment
- The address that defines the route to a file
- Instructions for the computer.
- The fundamental display element of an electronic screen
Down
- a scam to steal valuable information
- The primary method for keeping a computer secure from intruders.
- An in house website that serves employees only
- a large network made up of smaller networks.
- A website that is usually ran by a small group
- Reserved areas of memory in every computer
- The most widely used hardware interface for attaching peripherals to a computer.
- A small text file (up to 4KB)
15 Clues: Machinery and equipment • A small text file (up to 4KB) • Instructions for the computer. • The computing part of the computer. • a scam to steal valuable information • Not enough _______ to get the job done • Reserved areas of memory in every computer • a large network made up of smaller networks. • The address that defines the route to a file • ...
computer wordsBandwidth Compacity of an electrical pathway Blog Write and post an entry in a weblog Cache Cookie Cpu Firewall Hardware Intranet Internet Isp Phishing Pixel Software Url Usb 2018-04-05
Across
- the computing part of the computer
- a way to keep bad people out of your website
- a scam to steal valuable information
- a website that serves employes only
- writing a post on a weblog
- all the stuff such as wires printers etc.
- a large web made up of a bunch of smaller webs
Down
- the fundamental displaying element on a computer screen
- the capacity of an electronic pathway can carry
- provide access to an internet
- a series of instructions that perform a particular task
- a very popular way to connect things to devices
- used to track users preferences
- the storage of data locally for easy access
- the address that defines the route to a file
15 Clues: writing a post on a weblog • provide access to an internet • used to track users preferences • the computing part of the computer • a website that serves employes only • a scam to steal valuable information • all the stuff such as wires printers etc. • the storage of data locally for easy access • a way to keep bad people out of your website • ...
computer wordsBandwidth Compacity of an electrical pathway Blog Write and post an entry in a weblog Cache Cookie Cpu Firewall Hardware Intranet Internet Isp Phishing Pixel Software Url Usb 2018-04-05
Across
- a very popular way to connect things to devices
- the fundamental displaying element on a computer screen
- the computing part of the computer
- a series of instructions that perform a particular task
- a website that serves employes only
- a scam to steal valuable information
- writing a post on a weblog
Down
- provide access to an internet
- the address that defines the route to a file
- a large web made up of a bunch of smaller webs
- used to track users preferences
- the capacity of an electronic pathway can carry
- all the stuff such as wires printers etc.
- a way to keep bad people out of your website
- the storage of data locally for easy access
15 Clues: writing a post on a weblog • provide access to an internet • used to track users preferences • the computing part of the computer • a website that serves employes only • a scam to steal valuable information • all the stuff such as wires printers etc. • the storage of data locally for easy access • the address that defines the route to a file • ...
Intro to Crypto - Vocab 2019-02-05
Across
- the number specific to individual encryption processes
- the process of trying to crack a code
- a cipher where letters are moved forwards or backwards
- a cipher where letters are replaced with other letters or symbols
- the process of changing a ciphertext into a plaintext with a key
- a method used to disguise a message
- a number that
Down
- a process used to analyse the reoccurrence of symbols or letters in a ciphertext
- symbols used in ancient Egypt
- the process of changing a plaintext into a ciphertext
- a system using 0s and 1s used in computing
- The art of writing & solving codes
- people paid to try crack into their own company's computer systems
- a message before encryption
- a message after encryption
15 Clues: a number that • a message after encryption • a message before encryption • symbols used in ancient Egypt • The art of writing & solving codes • a method used to disguise a message • the process of trying to crack a code • a system using 0s and 1s used in computing • the process of changing a plaintext into a ciphertext • the number specific to individual encryption processes • ...
Friday Game v1.1 2023-06-23
Across
- Remote server storage and computing.
- A powerful computer that provides resources to other computers on a network.
- Domain Name System - translates domain names to IP addresses.
- A security measure that requires two different forms of identification.
- Identity and access management service for Microsoft 365.
- A directory service used in Windows environments.
- Common wired networking technology.
Down
- Microsoft's cloud-based productivity suite.
- A unique numerical label assigned to each device connected to a computer network.
- Microsoft's email server and collaboration platform.
- A network security device that monitors and controls incoming and outgoing network traffic.
- Wireless Local Area Network.
- Dynamic Host Configuration Protocol - assigns IP addresses automatically
- Secure connection over a public network.
- Device that forwards data packets between computer networks
15 Clues: Wireless Local Area Network. • Common wired networking technology. • Remote server storage and computing. • Secure connection over a public network. • Microsoft's cloud-based productivity suite. • A directory service used in Windows environments. • Microsoft's email server and collaboration platform. • Identity and access management service for Microsoft 365. • ...
Crosswords 2023-07-27
Across
- AWS service that converts text into lifelike speech.
- Cloud-based integrated development environment (IDE) by AWS.
- AWS service for auditing and tracking account activity.
- Monitoring service that provides insights into AWS resources' performance.
- Fully managed graph database service offered by AWS.
- Simple Queue Service, a message queueing service provided by AWS.
Down
- AWS service for infrastructure as code.
- Elastic Compute Cloud, provides resizable compute capacity in AWS.
- AWS content delivery network (CDN) service for faster content delivery.
- Fully managed NoSQL database service by AWS.
- Fully managed data warehousing service in AWS.
- Container orchestration platform for managing containerized applications.
- Platform for containerizing applications.
- AWS service for serverless computing
- AWS service for authentication, authorization, and user management.
15 Clues: AWS service for serverless computing • AWS service for infrastructure as code. • Platform for containerizing applications. • Fully managed NoSQL database service by AWS. • Fully managed data warehousing service in AWS. • AWS service that converts text into lifelike speech. • Fully managed graph database service offered by AWS. • ...
15 X 2024-01-02
Across
- Accelerating the clock speed of a CPU to boost computer performance
- Someone who breaches computer security
- Distinct alphanumeric identifier given to every network-connected device
- user interface
- Service that allows users to reach a networked computer by name instead of IP address
- virtual machine
Down
- Computer system's information storage container
- When smaller parts of a big file are scattered around the disk
- domain name
- Program or device that monitors and records keystrokes
- user instructions provided to software or a machine to carry out a particular task
- File format for still or moving image
- Pointing tool for repositioning objects on a screen in any direction
- Actual remote computing equipment linked to the network
- Metal part of a cooling system
15 Clues: domain name • user interface • virtual machine • Metal part of a cooling system • File format for still or moving image • Someone who breaches computer security • Computer system's information storage container • Program or device that monitors and records keystrokes • Actual remote computing equipment linked to the network • ...
Meet the Middle School Teachers and Staff #2 2022-08-29
Across
- One of the ESOL paras that will work with you in your core classes is Mrs. __________.
- The physical education teacher is Mrs. _______.
- One of the ESOL paras that will work with you in your core classes is Mrs. __________.
- The art teacher in Room 220 is Mr. __________.
- The creative computing teacher in Room 117 is Mr. _______.
Down
- The school nurse is Mrs. ___________.
- The STEM teacher in Room 117 is Mr. _________.
- The 6th grade guidance counselor is Mrs. _________.
- The library teacher is Mr. _________.
- One of the ESOL paras that will work with you in your core classes is Mrs. __________.
- The music teacher in Room 231 is Mrs. _________.
11 Clues: The school nurse is Mrs. ___________. • The library teacher is Mr. _________. • The STEM teacher in Room 117 is Mr. _________. • The art teacher in Room 220 is Mr. __________. • The physical education teacher is Mrs. _______. • The music teacher in Room 231 is Mrs. _________. • The 6th grade guidance counselor is Mrs. _________. • ...
crack it 2023-09-18
Across
- A programming technique for finding solutions to complex problems.
- Digital or virtual currency that uses cryptography for security and operates independently of a central authority.
- computing paradigm involving probability and randomness.
- A method in cryptography to ensure data integrity.
- field of study involving massive datasets and patterns.
- A network security protocol to protect data in transit.
Down
- A decentralized digital ledger.
- A branch of AI simulating human-like conversation
- A network of interconnected smart devices.
9 Clues: A decentralized digital ledger. • A network of interconnected smart devices. • A branch of AI simulating human-like conversation • A method in cryptography to ensure data integrity. • field of study involving massive datasets and patterns. • A network security protocol to protect data in transit. • computing paradigm involving probability and randomness. • ...
Shravan 2023-05-12
Across
- the second brightest star in the hunter's constellation
- who has the biggest pimple in our solar system
- the first name of the star closest to us
- where physicists and MCU go when they can't explain something
Down
- Albert-Nathan bridge
- they call him mister Fahrenheit
- the village in your favourite game where you cannot enter as you are
- the two faced moon of Saturn
- these codes are the building blocks of all computing
9 Clues: Albert-Nathan bridge • the two faced moon of Saturn • they call him mister Fahrenheit • the first name of the star closest to us • who has the biggest pimple in our solar system • these codes are the building blocks of all computing • the second brightest star in the hunter's constellation • where physicists and MCU go when they can't explain something • ...
2025 2024-10-31
Across
- - remote healthcare through technology.
- Workspaces - virtual reality spaces for remote work.
- - technology behind cryptocurrencies and secure data records.
- Twin - a virtual model representing physical objects, used in industries.
Down
- - identification through biological markers, like fingerprints or facial recognition.
- - energy sources like solar and wind as they become more central.
- Ethics - guidelines for the ethical use of artificial intelligence.
- - relating to advancements in quantum computing.
- Network - advanced wireless technology with high-speed connectivity.
9 Clues: - remote healthcare through technology. • - relating to advancements in quantum computing. • Workspaces - virtual reality spaces for remote work. • - technology behind cryptocurrencies and secure data records. • - energy sources like solar and wind as they become more central. • Ethics - guidelines for the ethical use of artificial intelligence. • ...
Virtualization and Cloud computing 2021-12-08
Across
- Services provided and released rapidly, Rapid ______
- single computer to hosts multiple OS
- Measured and ________ service
- Infrastructure as a _________
Down
- Popular cloud provider service, Jeff Bezos
- Brain of virtualization, Type 1 and 2
- enables users with specific needs to run VMs on their local computer.
- Machine software used to run another OS on a computer
- Wireless access to data stored here at any time
- Dedicated _________
10 Clues: Dedicated _________ • Measured and ________ service • Infrastructure as a _________ • single computer to hosts multiple OS • Brain of virtualization, Type 1 and 2 • Popular cloud provider service, Jeff Bezos • Wireless access to data stored here at any time • Services provided and released rapidly, Rapid ______ • Machine software used to run another OS on a computer • ...
Virtualization and Cloud Computing 2018-07-26
Across
- encapsulates the hard disk into a single file for use by the operating system
- software that manages computer hardware and software resources
- the use of various services, such as software development platforms, servers, storage and software, over the internet
- allows an organization to configure their data center so that it can off-load certain cloud services to a public cloud server during busy times
Down
- creation of a virtual resource such as a server, desktop, operating system, file, storage or network
- a system for storing computer data in more than one place so that it can be used by any computer connected to the system
- hosted by the company that provides private cloud service using VMs and application maintained in their own data centers
- an emulated computer environment that runs on a physical computer
- configured to offer services to anyone connected to the Internet with a valid account
- allows you to create an environment for each virtual machine
10 Clues: allows you to create an environment for each virtual machine • software that manages computer hardware and software resources • an emulated computer environment that runs on a physical computer • encapsulates the hard disk into a single file for use by the operating system • configured to offer services to anyone connected to the Internet with a valid account • ...
KEY TERMS IN COMPUTING AND NETWORKING 2025-01-03
Across
- Random Access Memory, a type of volatile computer memory used to store data and instructions temporarily while they are being processed by the CPU.
- The maximum rate of data transfer across a network, often measured in bits per second (bps), indicating the amount of data that can be transmitted in a given period.
- A unit of digital information consisting of 8 bits, often used to represent a character of data in a computer.
- A set of rules and conventions that define how data is transmitted and received over a network, ensuring compatibility and proper communication between devices.
- A data structure in computing where elements are added at the back and removed from the front, following a first-in, first-out (FIFO) order.
- A data structure in computing where elements are added and removed in a last-in, first-out (LIFO) order.
Down
- A structured collection of data that is stored and managed electronically, allowing for easy access, manipulation, and retrieval of information.
- A small, high-speed storage area that stores frequently accessed data to speed up retrieval and reduce access times to slower memory or storage.
- The smallest unit of digital information, representing a binary value of either 0 or 1.
- A system of interconnected computers or devices that can communicate and share resources such as data, files, and hardware.
10 Clues: The smallest unit of digital information, representing a binary value of either 0 or 1. • A data structure in computing where elements are added and removed in a last-in, first-out (LIFO) order. • A unit of digital information consisting of 8 bits, often used to represent a character of data in a computer. • ...
IT ACTIVITY 2024-09-25
Across
- Refers to designing websites to adapt to a user's device. The goal is for a website to retain its optimal usability and appearance regardless of the device it's displayed on.
- The term usability describes how usable software is in relation to its intended purpose.
- Instead of typing a coding language, you drag and drop jigsaw-like pieces together to build things using tools like Scratch or Thunkable.
- Is the use of an application program or device to imitate the behavior of another program or device.
Down
- Is the process of creating software applications that run on a mobile device.
- Is a method of web and software development that uses graphics and images, rather than purely text, to build out computing logic.
- It is the point of contact between humans and computers.
- Is a software that allows smartphones, tablets and other devices to run applications and programs.
- Is a computer program written to respond to actions generated by a user or system. In a computing context, an Event is any identifiable occurrence that has significance for system hardware or software.
- A bug is an unexpected problem with software or hardware. Typical problems are often the result of external interference with the program's performance that was not anticipated by the developer.
10 Clues: It is the point of contact between humans and computers. • Is the process of creating software applications that run on a mobile device. • The term usability describes how usable software is in relation to its intended purpose. • Is a software that allows smartphones, tablets and other devices to run applications and programs. • ...
Azure 900 2021-10-19
5 Clues: azure serverless computing • for optimizing azure resources • for monitoring the azure resources • service interactive chat experience • used for bidirectional communication in azure iot
TLE 8 2025-06-17
5 Clues: app for short • able modern computing. • physical parts of computer • computer programs used to operate compute • device that stores, retrieves, and processes data.
Ethics and Safety measures in computing 2021-10-20
Across
- transforming data into an unreadable code.
- right relating to new inventions
- security system that prevents unauthorized people on internet.
- Harassing a person deliberately via intrnet.
- brand name, logos, distinctive designs.
- and anybody.
- legal right granted by law.
- intends to harm or damage reputation of any
- impression about a person's activities on internet
Down
- Programs used to check user's keystrokes
- crimical practice of breaching online using voice over.(VoIP)
- most common breaches through internet
- practice of sending bulk mails till server gets full
- Distroy the mental health of a child
- Online discussion site
- malicious technique of tricking web users.
- act of copying.
- The maximum amount of data transmitted via
- crime ware application that performs automated tasks for cyber criminals.
19 Clues: and anybody. • act of copying. • Online discussion site • legal right granted by law. • right relating to new inventions • Distroy the mental health of a child • most common breaches through internet • brand name, logos, distinctive designs. • Programs used to check user's keystrokes • transforming data into an unreadable code. • malicious technique of tricking web users. • ...
The Internet 2022-02-24
Across
- A type of picture saved without a background
- I can click on this to go to another Webpage
- What the C stands for in FOC
- The language used to write websites
- A worldwide collection of information and resources
- Using more than one of photo, sound, video, etc.
- The < and > used to create webpages
- A program that lets you view websites
Down
- This is used for most of the text you read on a webpage
- Includes Instagram, TikTok, Facebook
- The most common picture type on the Internet
- Most websites on the Internet end in these three letter
- An image used in a webpage
- A page that can be seen on the Internet
- Another name for the biggest text on a webpage
- An abbreviation for World Wide Web
16 Clues: An image used in a webpage • What the C stands for in FOC • An abbreviation for World Wide Web • The language used to write websites • The < and > used to create webpages • Includes Instagram, TikTok, Facebook • A program that lets you view websites • A page that can be seen on the Internet • A type of picture saved without a background • ...
cse sigma 2025-11-06
Across
- Software that manages computer hardware and applications.
- A collection of related web pages under one domain.
- Markup language used to create web pages.
- Temporary memory used by the CPU while processing.
- Running multiple processes at the same time.
- Field that enables computers to think and learn like humans.
Down
- The smallest unit of data in computing.
- Symbol used to write comments in code.
- Device used to connect a computer to the internet.
- A small area network used within a building or campus.
- Global network connecting millions of computers.
- Data structure that works on Last-In-First-Out principle.
- Popular programming language used for Android development.
- Malicious software that replicates itself and spreads.
- Process of finding and fixing code errors.
- The brain of the computer that performs calculations.
16 Clues: Symbol used to write comments in code. • The smallest unit of data in computing. • Markup language used to create web pages. • Process of finding and fixing code errors. • Running multiple processes at the same time. • Global network connecting millions of computers. • Device used to connect a computer to the internet. • ...
assignment 2 2022-09-15
5 Clues: digital calculator • very first computing device • 1890,drherman hollerish introuced this • in 1642,blaise pascal invented this first • was a cardboard multiplication calculator
Networks 2023-09-19
Across
- Used to repeat and boost network traffic
- A computer network that spans the entire floor of a building
- Directs data packets to their destination
- collection of connected computers and devices
- used to authenticate a user account on a network of device
- Dumb switch on a computer network
- Wireless communication mode that covers a short distance
- Computer network that extends across continents
- The way to verify users on a computing devices and computer networks
- Malicious program
Down
- Type of software used to combat malicious code
- Used by service providers to store data of clients
- Short distance wireless communication method
- A controlled private network that allows access to authorised set of users
- used to connect two sections of a computer network
- Private computer network used by business
- Wireless local are network
- Hardware used to connect computer to a computer network
- The largest wide area network
- Internet storage provided by storage service providers
20 Clues: Malicious program • Wireless local are network • The largest wide area network • Dumb switch on a computer network • Used to repeat and boost network traffic • Directs data packets to their destination • Private computer network used by business • Short distance wireless communication method • collection of connected computers and devices • ...
RU ITEC4111 Unwrapping the Gift 1 2024-10-21
Across
- – Independence or self-governance.
- Intelligence – Machine simulation of human intelligence.
- – The process of introducing new ideas or methods.
- Data – Large datasets analyzed to reveal patterns and trends.
- – Portable electronic devices for communication.
- cars – Vehicles capable of navigating with minimal human input.
- – The right to be free from public attention.
- – Use of machines to perform tasks without human intervention.
- – Monitoring behavior and activities for data collection.
Down
- – Information used for analysis and reference.
- – The application of scientific knowledge for practical purposes.
- – Funding projects by raising small amounts of money from a large group of people, typically online.
- Media – Online platforms for social networking and content sharing.
- – Refers to vehicles that operate without a human driver.
- – The process of exchanging information.
- – A global system of interconnected computers.
- – Moral principles governing behavior.
- – A mobile device with advanced computing capability.
- – Programs that run on a computer.
- – The virtual world of computers and the internet.
20 Clues: – Independence or self-governance. • – Programs that run on a computer. • – Moral principles governing behavior. • – The process of exchanging information. • – The right to be free from public attention. • – Information used for analysis and reference. • – A global system of interconnected computers. • – Portable electronic devices for communication. • ...
computing key words 2019-06-17
Across
- allows a decision to be made based on a condition being true
- are used to store information to be be referenced and manipulated in a computer program
- a law or set of laws
Down
- programs that cause a nuisance or damage to devices
- an order in which steps are followed
- hate towards someone online
- when an unauthorised person accesses a network on someone elses device
7 Clues: a law or set of laws • hate towards someone online • an order in which steps are followed • programs that cause a nuisance or damage to devices • allows a decision to be made based on a condition being true • when an unauthorised person accesses a network on someone elses device • ...
computing yr 7 2024-07-02
7 Clues: I contain only 0s and 1s • you use me to tap things • if it run out then the device dies • a set of step by step instructions • has all the connections of all components • the original number system also known as base 10 • connects everything to each other by carrying electricity
Computing revision crossword 2023-04-17
Across
- one condition has to be true and the other has to be false for the output to be true
- one condition has to be true for the output to be true
- if both values are false, the output is true
- all conditions have to be true for the output to be false
Down
- if both values are the same, the output is true
- all conditions have to be true for the output to be true
- opposite of
7 Clues: opposite of • if both values are false, the output is true • if both values are the same, the output is true • one condition has to be true for the output to be true • all conditions have to be true for the output to be true • all conditions have to be true for the output to be false • ...
Cloud Computing : Features 2025-01-16
Across
- ________ allows users to upload or access data from anywhere
- _______model tracks usage in real-time and adjusts billing accordingly
- ______the storage capabilities of the cloud for all time
- __________prevent unauthorized access
Down
- _____allows the cloud provider to share computing resources among multiple customers
- ________because the major cost is a one-time investment
- _______ easy due to updates and monitoring are handled by the service provider
7 Clues: __________prevent unauthorized access • ________because the major cost is a one-time investment • ______the storage capabilities of the cloud for all time • ________ allows users to upload or access data from anywhere • _______model tracks usage in real-time and adjusts billing accordingly • ...
Exact inference in BN 2025-11-03
Across
- Observed variable values used during inference.
- Situation where one event does not affect another.
- Table storing conditional probabilities in BN (Abbreviation).
- Method used to compute joint distributions in BN (single word form).
- Combined probability distribution over multiple variables.
- The variable for which we want a probability answer.
- The variable for which the probability is sought (single word form).
- Directed connection between nodes in BN.
- Posterior probability distribution for a variable.
Down
- Exact inference becomes difficult due to this in large networks.
- A function mapping variable assignments to probabilities.
- The process of computing probabilities in a Bayesian network.
- Probability given that another event has occurred.
- Probability of a single variable independent of others.
- Represents a variable in BN.
- Type of network that represents probabilistic relationships.
- Numerical value expressing uncertainty.
- Structure of Bayesian network (Abbreviation for Directed Acyclic Graph).
- Algorithm that removes variables to compute probabilities.
19 Clues: Represents a variable in BN. • Numerical value expressing uncertainty. • Directed connection between nodes in BN. • Observed variable values used during inference. • Situation where one event does not affect another. • Probability given that another event has occurred. • Posterior probability distribution for a variable. • ...
Digital Literacy Terms 2024-06-19
Across
- The address for a webpage
- Video, sound
- A service allowing roaming access to the internet.s
- A collection of files accessed through a web address.
- A global network of computers.
- The programs that run a set of instructions on a computing device.
- An application used to access and view websites.
- Software that manages the computer's basic functions like running applications and controlling peripherals
Down
- The programs that do the jobs you have for the computer
- A group of two or more digital devices connected to share information
- Printer, camera, headphones, game controller
- Keyboard, mouse, touchscreen
- A place-based, wireless access point to the internet.
- Hard drive, USB drive
- CPU, GPU, motherboard, RAM
- The machines, wiring, and other physical components of a computer or other electronic system.
16 Clues: Video, sound • Hard drive, USB drive • The address for a webpage • CPU, GPU, motherboard, RAM • Keyboard, mouse, touchscreen • A global network of computers. • Printer, camera, headphones, game controller • An application used to access and view websites. • A service allowing roaming access to the internet.s • A collection of files accessed through a web address. • ...
Digital Literacy Term 2024-06-19
Across
- The address for a webpage
- Video, sound
- A service allowing roaming access to the internet.s
- A collection of files accessed through a web address.
- A global network of computers.
- The programs that run a set of instructions on a computing device.
- An application used to access and view websites.
- Software that manages the computer's basic functions like running applications and controlling peripherals
Down
- The programs that do the jobs you have for the computer
- A group of two or more digital devices connected to share information
- Printer, camera, headphones, game controller
- Keyboard, mouse, touchscreen
- A place-based, wireless access point to the internet.
- Hard drive, USB drive
- CPU, GPU, motherboard, RAM
- The machines, wiring, and other physical components of a computer or other electronic system.
16 Clues: Video, sound • Hard drive, USB drive • The address for a webpage • CPU, GPU, motherboard, RAM • Keyboard, mouse, touchscreen • A global network of computers. • Printer, camera, headphones, game controller • An application used to access and view websites. • A service allowing roaming access to the internet.s • A collection of files accessed through a web address. • ...
VCE Applied Computing U2 Chapter 6 2023-10-23
Across
- A type of requirement which is directly related to what the solution doesw
- Something which is essential to the solution
- Accepted moral standards
- Comments on your Gantt chart to explain the changes made
- Restrictions on a project
- A series of questions given to a participant to answer and gain information
- The process of determing whether a solution has met its requirements
- Gives the owner of a work the right to control how it's used
- A type of requirement which is related to what users might like a solution to have
Down
- Design tool used to illustrate features of a particular section of a solution
- How fast and cost effective a solution can meet its needs
- How well a solution meets its needs
- A technique to generate ideas
- A completed solution with full functionality
- The process of making sure a solution is working as expected
- A way to solve a problem
- A type of chart which schedules the development of a project
- The process of inspecting data to check that it is reasonable
- A body of laws
19 Clues: A body of laws • Accepted moral standards • A way to solve a problem • Restrictions on a project • A technique to generate ideas • How well a solution meets its needs • Something which is essential to the solution • A completed solution with full functionality • Comments on your Gantt chart to explain the changes made • ...
CSP review puzzle 2024-04-29
Across
- a byte contains ___ bits
- When some countries have less access to tech. This is known as the digital _____
- a ___ error will break before it runs
- public key encryption uses ___ keys to encrypt and decrypt
- analog data changes ____ over time
- an online attack that reveals private info often through emails
- ___ computing requires multiple computers
Down
- This is a problem type that involves finding the best solution
- a 2^N algorithm runs in ____ time
- giving others rights to your work (2 words)
- ___ search goes through a list until it finds the target
- In lossy compression data is ____ lost
- a ____ solution may not be the most optimal
- PII is information that can be used to ___ identify users
- ___ is usually measured in bits per second
- IP and TCP are both examples of _____
16 Clues: a byte contains ___ bits • a 2^N algorithm runs in ____ time • analog data changes ____ over time • a ___ error will break before it runs • IP and TCP are both examples of _____ • In lossy compression data is ____ lost • ___ computing requires multiple computers • ___ is usually measured in bits per second • giving others rights to your work (2 words) • ...
Cloud Computing 2021-10-12
5 Clues: a place to collect and share data • software that can be run on server • means of delivering value to customers • providing computing power for many customers • connecting customers to customers and services
Computing crossword 2016-02-14
Cloud Computing 2024-09-05
Advanced Educational Technology 2024-09-07
Across
- IoT^refers to the tools and systems used outside of the home
- Appliances^Refrigerators, ovens, and washing machines that can be controlled remotely
- a fleet of scooters or e-bikes deployed to cities or campuses for battery status, location, or tampering, to offer improved mobility for your constituents
- beds^Monitor beds at home or in hospital for movement, wetting, and similar, and give patients a way to call for help or control the bed, to provide a better patient experience and gather valuable health-related information to improve treatments
- monitoring^Monitor water levels, pressure, turbidity, Ph, salinity, ORP, flow, etc., to prevent overflows, track drinking water supply, and monitor the waste water network and treatment operations. This helps reduce cost and lowers business risk
- many connected devices on a shared network results in slow internet speeds
- surgery^Perform surgery on a patient even though they are not physically in the same location as the doctor, to increase availability of surgical services. This helps lower cost and increase revenue.
- monitoring^Monitor oil and gas storage tanks to improve efficiency and cost effectiveness over manual checks
- the need to perform mundane tasks like turning the thermostat on and off or locking doors increases efficiency and quality of life
Down
- Cars^Vehicles with internet connectivity for navigation, diagnostics, and entertainment
- IoT^is the system of interconnected devices in the industrial sector
- makes it easier to manage energy consumption and water usage without human oversight or error
- Ashton^coined the term Internet of Things
- of things^ network of devices, vehicles, appliances and other physical objects that are embedded with sensors, software and network connectivity
- IoT^refers to personal and wearable devices that connect to the internet. These devices are often referred to as smart devices
- architect^design and create IoT solutions to solve business problems
- vehicles^Self-driving cars and other connected vehicles rely on the internet to share real-time information
- engineer^ develop and manage IoT hardware, software, platforms, and systems
- Technology^Fitness trackers like Fitbit and smartwatches like Apple Watch
- computing^is a computing framework. It aims to conserve resources and speed up response time by moving computational resources like data storage closer to the data source
- operations^Equip facility managers with connected devices to improve worker efficiency
21 Clues: Ashton^coined the term Internet of Things • IoT^refers to the tools and systems used outside of the home • IoT^is the system of interconnected devices in the industrial sector • architect^design and create IoT solutions to solve business problems • Technology^Fitness trackers like Fitbit and smartwatches like Apple Watch • ...
Cross Your Way to AWS 2023-02-23
Across
- A serverless compute engine for containers that allows you to run containers without managing the underlying infrastructure.
- A web service that provides object storage through a web interface.
- A web service that provides resizable compute capacity in the cloud.
- A web service that provides a message queuing service that enables decoupling and scalability of microservices and distributed systems.
- A virtual network that lets you launch AWS resources in a logically isolated virtual network that you define.
- A low-cost, long-term storage service for data archiving and backup that is designed to provide high durability and security.
- A platform for building real-time data streaming applications and processing large amounts of data from a variety of sources.
- A content delivery network that speeds up the distribution of your static and dynamic web content, such as HTML, CSS, JavaScript, and images.
- A fully managed NoSQL database service that provides low-latency, high-performance access to data at any scale.
- A web service that provides managed database solutions for popular relational database engines like MySQL, PostgreSQL, and Oracle.
- A cloud computing platform that provides various services for computing, storage, databases, and more.
Down
- A platform-as-a-service that makes it easy to deploy, run, and scale web applications and services using popular programming languages and web frameworks.
- A serverless compute service that lets you run your code in response to events and automatically manages the compute resources needed to run that code.
- A fully managed data warehouse service that provides fast query performance and scalability for large-scale data analytics.
- A managed service that simplifies the deployment, management, and scaling of containerized applications using Kubernetes.
- A monitoring service that allows you to collect, view, and analyze metrics, logs, and events from AWS resources and applications.
- A web service that helps you securely control access to AWS resources for your users.
- A service that allows you to define and manage infrastructure as code, allowing you to provision and manage AWS resources in a repeatable and automated way.
- A web service that allows you to send notifications from the cloud to various distributed endpoints or devices.
19 Clues: A web service that provides object storage through a web interface. • A web service that provides resizable compute capacity in the cloud. • A web service that helps you securely control access to AWS resources for your users. • A cloud computing platform that provides various services for computing, storage, databases, and more. • ...
QUANTUM F****** COMPUTING 2023-03-28
7 Clues: Scary • Sub-atomic level • One of the basic sciences • Container with a lot of cables • Connected with a wide-known mathematical constant • The process of making someone feel good using hands • Temporary data,which is not entangled with the answer
Computing Keywords 4 2021-02-19
Across
- malicious code that cyber criminals launch to try to damage other people’s computers
- - anyone using a computer
- a secret code to protect your data and can keep others from accessing your computer
- many computers connected like a web
Down
- a program you use Firefox, Chrome or Edge will see the internet
- a picture or an image
- copy something from another computer or the internet, and save it on your computer
7 Clues: a picture or an image • - anyone using a computer • many computers connected like a web • a program you use Firefox, Chrome or Edge will see the internet • copy something from another computer or the internet, and save it on your computer • a secret code to protect your data and can keep others from accessing your computer • ...
Computing Crossword Puzzle 2021-04-08
Across
- The primary component of a computer that processes instructions
- The main printed circuit board in general-purpose computers and other expandable systems
- A group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources
Down
- A string of characters usually used to confirm a user's identity
- A global computer network providing a variety of information and communication facilities
- A type of non-volatile memory used in computers and other electronic devices
- The super-fast and temporary data storage space that a computer needs to access
7 Clues: The primary component of a computer that processes instructions • A string of characters usually used to confirm a user's identity • A type of non-volatile memory used in computers and other electronic devices • The super-fast and temporary data storage space that a computer needs to access • ...
Computing Careers Group Members Name: 2022-05-06
Across
- __________________ create systems to protect information networks and websites from cyber attacks and other security breaches.
- __________________ is considered to be one of the most widely recognized forces affecting work and how it is changing.
- As a ____________________ you are responsible for creating new programs for an organization.
- _________________ are responsible for designing, developing, and testing computer components, such as circuit boards, routers, and memory devices.
- They develop and improve the data resources used to store and retrieve critical information.
- Individuals who watch over a team of programmers and analysts to complete projects.
Down
- ______________ analyze a company's technology needs and oversee the implementation of appropriate data systems.
- _________________assess an organization's computer systems and recommend changes to hardware and software to improve the company.
- which team installs new software, troubleshoots, and repairs software problems
- Which department in an organisation is responsible for the hardware software and network of computers in a company
- __________________design, implement, and maintain networking and data communication systems.
- ____________________ invent technology that solves complex problems in fields like science, medicine, and business.
- They need to be fluent in the computer languages that are used to write the code for programs.
- Communication Skills and broad knowledge of technology and computer systems help computer science individuals excel in this role.
- Who creates Websites
15 Clues: Who creates Websites • which team installs new software, troubleshoots, and repairs software problems • Individuals who watch over a team of programmers and analysts to complete projects. • __________________design, implement, and maintain networking and data communication systems. • ...
CC and S cross word (TE IT 2018-19) 2019-04-09
5 Clues: example of saas • open source cloud platform • network security application • name for network in open stack • Example of device used in mobile cloud computing
COMPUTER HISTORY - Early history Assignment #2 2022-09-16
5 Clues: digital calculator. • first computing device. • Card- 1890, Dr.Herman Hollerith introduced • In 1642, Blaise Pascal invented this first • Rods-was a cardboard multiplication calculator.
COMPUTER HISTORY - Early history Assignment #2 2022-09-16
5 Clues: digital calculator. • first computing device. • Card- 1890, Dr.Herman Hollerith introduced • In 1642, Blaise Pascal invented this first • Rods-was a cardboard multiplication calculator.
Engineering 2022-04-13
Across
- Design and build tunnels and bridges
- Makes planes and space crafts
- Makes advances in technology for health
- Maintain design of software systems
Down
- Design electrical wires and electrical poles
- is the study of computers and computing as well as their theoretical and practical applications
- Use principles of math and science to design mechanical products
- design, construction, and use of machines to perform tasks done traditionally by human beings.
8 Clues: Makes planes and space crafts • Maintain design of software systems • Design and build tunnels and bridges • Makes advances in technology for health • Design electrical wires and electrical poles • Use principles of math and science to design mechanical products • design, construction, and use of machines to perform tasks done traditionally by human beings. • ...
buisness and marketing 2022-12-13
Across
- A firewall is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
- a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
- a dishonest scheme; a fraud.
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
- an individual's name, signature, address, phone number or date of birth. sensitive information. credit information. employee record information.
- appearing suddenly: such as. computing: appearing suddenly on a screen over another window or display. a pop-up window. a pop-up ad.
6 Clues: a dishonest scheme; a fraud. • a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. • appearing suddenly: such as. computing: appearing suddenly on a screen over another window or display. a pop-up window. a pop-up ad. • ...
Cloud Computing Crossword 1 2021-12-21
Across
- Platform As A Service
- ...Analytics, Microsoft service that brings together data integration, enterprise data warehousing, and big data analytics.
- data management structure
- Group ..., a mechanism to apply settings to users and computers consistently and automatically
- Microsoft analytics and data visualization platform
- Microsot suite of troubleshooting tools
Down
- Microsoft main scripting language for system administration
- Microsoft public cloud
- network upload channel
- highly available configuration of multiple servers
10 Clues: Platform As A Service • Microsoft public cloud • network upload channel • data management structure • Microsot suite of troubleshooting tools • highly available configuration of multiple servers • Microsoft analytics and data visualization platform • Microsoft main scripting language for system administration • ...
Virtualization and Cloud Computing 2018-07-26
Across
- allows you to create an environment for each virtual machine
- a system for storing computer data in more than one place so that it can be used by any computer connected to the system
- an emulated computer environment that runs on a physical computer
- software that manages computer hardware and software resources
- the use of various services, such as software development platforms, servers, storage and software, over the internet
Down
- hosted by the company that provides private cloud service using VMs and application maintained in their own data centers
- configured to offer services to anyone connected to the Internet with a valid account
- creation of a virtual resource such as a server, desktop, operating system, file, storage or network
- allows an organization to configure their data center so that it can off-load certain cloud services to a public cloud server during busy times
- encapsulates the hard disk into a single file for use by the operating system
10 Clues: allows you to create an environment for each virtual machine • software that manages computer hardware and software resources • an emulated computer environment that runs on a physical computer • encapsulates the hard disk into a single file for use by the operating system • configured to offer services to anyone connected to the Internet with a valid account • ...
7 white computing Mackenzie 2016-02-09
Across
- Is equaled to one billion flops
- Correct fragmented files on your hard drive
- The latest software version from a company which isn't necessarily stable
- Data type used to store large amounts of character data
- To advertise something on an app
- Not doing anything to annoy or frustrate other people
Down
- A tv show, movie, website and software that have information and is entertaining at the same time
- A software designed to damage unwanted actions on a computer system
- A game that is entertains but also educates
- Limits the data that can pass through it and protects a network server from damage and unauthorised users
10 Clues: Is equaled to one billion flops • To advertise something on an app • Correct fragmented files on your hard drive • A game that is entertains but also educates • Not doing anything to annoy or frustrate other people • Data type used to store large amounts of character data • A software designed to damage unwanted actions on a computer system • ...
Crossword Puzzle - Mobile Computing 2024-02-27
Across
- BSC comes under which category?
- In general, a mobile computing environment can also be considered as the type of __________ environment.
- Universally adopted shape of cell?
- What does WSP stand for?
Down
- MDM stands for?
- __________is required to transmit the digital information using a certain frequency by translating it into an analog signal?
- Which layer of the WAP stack does WSP belong to?
- A 4G communication supports the data rates of ________.
- Which layer of the WAP stack does WTP operate at?
- The slow and fast hopping is used in?
10 Clues: MDM stands for? • What does WSP stand for? • BSC comes under which category? • Universally adopted shape of cell? • The slow and fast hopping is used in? • Which layer of the WAP stack does WSP belong to? • Which layer of the WAP stack does WTP operate at? • A 4G communication supports the data rates of ________. • ...
Chapter 12 2014-12-31
Across
- Computing using online resources, applications, and storage
- Learning environments customized to the individual
- Presenting content in game format
- Software that is available to modify and improve upon its content
- Instruction offered when the learner needs it
- Issuing computer commands via hands or arm movement
- Adding GPS coordinated
- Computer imposed additions to reality
- One of the 4Cs, this type of thinking, is needed in the 21st century
- Technology that can be operated by multiple people using touch and gestures
Down
- Working with others; one of the 4 Cs
- Software stored in the cloud and used as needed
- Digital representations of achievements
- This type of dimensional printer can create real objects
- Digital paper that is flexible and renewable
- Collecting large amounts of data about learners to extrapolate conclusions
- Very large online courses open to all
17 Clues: Adding GPS coordinated • Presenting content in game format • Working with others; one of the 4 Cs • Computer imposed additions to reality • Very large online courses open to all • Digital representations of achievements • Digital paper that is flexible and renewable • Instruction offered when the learner needs it • Software stored in the cloud and used as needed • ...
Defining Computer Terms 2021-09-29
Across
- Take out a lot of battery life when starting. Not as efficient as SSD.
- Local Area Network.
- Small parts that made Motherboard, CPU, RAM, Hard Drives.
- Taking or copying someone else’s work
- Universal Serial bus. Cable or connector.
- Wide Area Network
- Can be legally assigned to copy someone else’s work.
- Central processing unit. Runs the computer program.
- Random Access Memory. Can store data.
- It protects your computer from unknown access.
Down
- Act of taking over the device or accounts without the owner knowing.
- Takes out suspicious access from other devices.
- Solid-State Drive. Doesn't take out as much battery life than HHD.
- Where you store files.
- Any devices that help computing.
- Good use of copyright materials. Won't break any laws with copyright.
- Sending same messages again and again to a lot of people.
17 Clues: Wide Area Network • Local Area Network. • Where you store files. • Any devices that help computing. • Taking or copying someone else’s work • Random Access Memory. Can store data. • Universal Serial bus. Cable or connector. • It protects your computer from unknown access. • Takes out suspicious access from other devices. • Central processing unit. Runs the computer program. • ...
ICT 2021-12-09
Across
- A computer that provides data to other computers.
- the physical parts of a computer and related devices.
- An ultra high-performance computer made for high-volume, processor-intensive computing
Down
- A programmable machine
- A computer designed for individual use
- A programming language designed for the visual arts community
- The information processed or stored by a computer
- Any external device that provides input and output for the computer.
8 Clues: A programmable machine • A computer designed for individual use • A computer that provides data to other computers. • The information processed or stored by a computer • the physical parts of a computer and related devices. • A programming language designed for the visual arts community • Any external device that provides input and output for the computer. • ...
Emerging Technologies 2025-01-14
Across
- Smart automation tools used in manufacturing.
- The use of solar and wind energy is an example of ______ technology
- Fifth-generation wireless communication technology.
- Technology that uses quantum mechanics for computation
- The combination of virtual reality and augmented reality is known as ______ Reality.
Down
- The process of using biological resources to create new materials or products.
- A decentralized digital ledger system for cryptocurrencies
- Gene-editing technology like CRISPR-Cas9.
8 Clues: Gene-editing technology like CRISPR-Cas9. • Smart automation tools used in manufacturing. • Fifth-generation wireless communication technology. • Technology that uses quantum mechanics for computation • A decentralized digital ledger system for cryptocurrencies • The use of solar and wind energy is an example of ______ technology • ...
Quize 2025-09-29
Across
- : Which device display information generated by computing device
- : Which physical device store permanent and temporary data
- : Arithmetical operations performed on ..... .
Down
- : Which passive heat exchanger that cools down electronic components like CPU and GPU
- : Full form of NIC
- : Which memory storage is temporary that makes information immediately accessible
- The HDD replaced by ...... .
- : Which device store information during boot sequence and it store permanent data also
8 Clues: : Full form of NIC • The HDD replaced by ...... . • : Arithmetical operations performed on ..... . • : Which physical device store permanent and temporary data • : Which device display information generated by computing device • : Which passive heat exchanger that cools down electronic components like CPU and GPU • ...
Advanced Educational Technology 2024-09-07
Across
- Cars^Vehicles with internet connectivity for navigation, diagnostics, and entertainment
- the need to perform mundane tasks like turning the thermostat on and off or locking doors increases efficiency and quality of life
- vehicles^Self-driving cars and other connected vehicles rely on the internet to share real-time information
- Ashton^coined the term Internet of Things
- the system of interconnected devices in the industrial sector
- monitoring^Monitor water levels, pressure, turbidity, Ph, salinity, ORP, flow, etc., to prevent overflows, track drinking water supply, and monitor the waste water network and treatment operations. This helps reduce cost and lowers business risk
- beds^Monitor beds at home or in hospital for movement, wetting, and similar, and give patients a way to call for help or control the bed, to provide a better patient experience and gather valuable health-related information to improve treatments
- engineer^ develop and manage IoT hardware, software, platforms, and systems
- architect^design and create IoT solutions to solve business problems
- to personal and wearable devices that connect to the internet. These devices are often referred to as smart devices
- surgery^Perform surgery on a patient even though they are not physically in the same location as the doctor, to increase availability of surgical services. This helps lower cost and increase revenue.
Down
- makes it easier to manage energy consumption and water usage without human oversight or error
- to the tools and systems used outside of the home
- a fleet of scooters or e-bikes deployed to cities or campuses for battery status, location, or tampering, to offer improved mobility for your constituents
- many connected devices on a shared network results in slow internet speeds
- Appliances^Refrigerators, ovens, and washing machines that can be controlled remotely
- Technology^Fitness trackers like Fitbit and smartwatches like Apple Watch
- of things^ network of devices, vehicles, appliances and other physical objects that are embedded with sensors, software and network connectivity
- monitoring^Monitor oil and gas storage tanks to improve efficiency and cost effectiveness over manual checks
- computing^is a computing framework. It aims to conserve resources and speed up response time by moving computational resources like data storage closer to the data source
- operations^Equip facility managers with connected devices to improve worker efficiency
21 Clues: Ashton^coined the term Internet of Things • to the tools and systems used outside of the home • the system of interconnected devices in the industrial sector • architect^design and create IoT solutions to solve business problems • Technology^Fitness trackers like Fitbit and smartwatches like Apple Watch • ...
BTEC DIT C3 - various 2 2024-02-01
Across
- Poisonous metal found on motherboards and other circuit boards
- The words from a video / audio clip in written form
- Digital _________ : the difference between those who have and don’t have access to technology, and includes:
- A protected group type
Down
- Precious metal found in computing components
- Treating certain categories of people differently
- Old electronic devices
7 Clues: Old electronic devices • A protected group type • Precious metal found in computing components • Treating certain categories of people differently • The words from a video / audio clip in written form • Poisonous metal found on motherboards and other circuit boards • ...
Advanced Educational Technology 2024-09-07
Across
- IoT^refers to the tools and systems used outside of the home
- Appliances^Refrigerators, ovens, and washing machines that can be controlled remotely
- a fleet of scooters or e-bikes deployed to cities or campuses for battery status, location, or tampering, to offer improved mobility for your constituents
- beds^Monitor beds at home or in hospital for movement, wetting, and similar, and give patients a way to call for help or control the bed, to provide a better patient experience and gather valuable health-related information to improve treatments
- monitoring^Monitor water levels, pressure, turbidity, Ph, salinity, ORP, flow, etc., to prevent overflows, track drinking water supply, and monitor the waste water network and treatment operations. This helps reduce cost and lowers business risk
- many connected devices on a shared network results in slow internet speeds
- surgery^Perform surgery on a patient even though they are not physically in the same location as the doctor, to increase availability of surgical services. This helps lower cost and increase revenue.
- monitoring^Monitor oil and gas storage tanks to improve efficiency and cost effectiveness over manual checks
- the need to perform mundane tasks like turning the thermostat on and off or locking doors increases efficiency and quality of life
Down
- Cars^Vehicles with internet connectivity for navigation, diagnostics, and entertainment
- IoT^is the system of interconnected devices in the industrial sector
- makes it easier to manage energy consumption and water usage without human oversight or error
- Ashton^coined the term Internet of Things
- of things^ network of devices, vehicles, appliances and other physical objects that are embedded with sensors, software and network connectivity
- IoT^refers to personal and wearable devices that connect to the internet. These devices are often referred to as smart devices
- architect^design and create IoT solutions to solve business problems
- vehicles^Self-driving cars and other connected vehicles rely on the internet to share real-time information
- engineer^ develop and manage IoT hardware, software, platforms, and systems
- Technology^Fitness trackers like Fitbit and smartwatches like Apple Watch
- computing^is a computing framework. It aims to conserve resources and speed up response time by moving computational resources like data storage closer to the data source
- operations^Equip facility managers with connected devices to improve worker efficiency
21 Clues: Ashton^coined the term Internet of Things • IoT^refers to the tools and systems used outside of the home • IoT^is the system of interconnected devices in the industrial sector • architect^design and create IoT solutions to solve business problems • Technology^Fitness trackers like Fitbit and smartwatches like Apple Watch • ...
ULANGAN HARIAN BAB 1 2024-08-20
Across
- BERBAGAI PERANGKAT FISIK TERHUBUNG KE INTERNET DAN SALING BERKOMUNIKASI (SINGKATAN)
- SALAH SATU MANFAAT CLOUD COMPUTING (INDONESIA)
- SISTEM YANG MEMUNGKINKAN MESIN ATAU KOMPUTER BERPIKIR, BELAJAR,DAN MELAKUKAN TUGAS SEPERTI MANUSIA (INDONESIA)
- DALAM JARINGAN (INGGRIS)
- SALAH SATU DARI JENIS-JENIS KOMPUTASI AWAN (SINGKATAN)
Down
- METODE PENGIRIMAN DAN PENERIMAN LAYANAN MELALUI INTERNET (INGGRIS)
- SEKUMPULAN DATA YANG MEMILIKI VOLUME ATAU UKURAN YANG SANGAT BESAR DAN KOMPLEKS (INGGRIS))
- SOFTWARE AS A SERVICE (SINGKATAN)
8 Clues: DALAM JARINGAN (INGGRIS) • SOFTWARE AS A SERVICE (SINGKATAN) • SALAH SATU MANFAAT CLOUD COMPUTING (INDONESIA) • SALAH SATU DARI JENIS-JENIS KOMPUTASI AWAN (SINGKATAN) • METODE PENGIRIMAN DAN PENERIMAN LAYANAN MELALUI INTERNET (INGGRIS) • BERBAGAI PERANGKAT FISIK TERHUBUNG KE INTERNET DAN SALING BERKOMUNIKASI (SINGKATAN) • ...
Tech-crossword 2025-02-06
6 Clues: A portable computing device • A company known for its search engine • The system for connecting devices globally • The action of turning off or restarting a device • The process of transferring data over the internet • A device for communication and information processing
Culture Corner 8 2024-05-18
Across
- a device or set of equipment used for a specific purpose
- communication without the need for physical wires
- to set up or create something, like a business or organization
- the use of computers and technology to process information
- to send or pass along information or signals
- a series of thoughts, images, or emotions occurring during sleep
- including many specifics or small details
- a visual representation or picture
Down
- a machine or tool that is used to perform a household task
- a slender, flexible strand or rod of metal
- a powered rail vehicle used for pulling trains
- a thin piece of cord or fiber
- something that causes wonder or astonishment
- a system of tracks on which trains travel
- a period of ten years
- a unit of measurement equal to 5,280 feet
- correctly or precisely
17 Clues: a period of ten years • correctly or precisely • a thin piece of cord or fiber • a visual representation or picture • a system of tracks on which trains travel • including many specifics or small details • a unit of measurement equal to 5,280 feet • a slender, flexible strand or rod of metal • something that causes wonder or astonishment • ...
AI-image generation 2022-11-22
Across
- intending or intended to do harm
- AI stands for ... inteligence
- the spreading of something more widely
- a device capable of converting signals into a different form, for example from digital to analog
Down
- the process of using computer technology to complete a given goal-oriented task
- making an image sharper, increasing resolution
- API stands for application programming ...
7 Clues: AI stands for ... inteligence • intending or intended to do harm • the spreading of something more widely • API stands for application programming ... • making an image sharper, increasing resolution • the process of using computer technology to complete a given goal-oriented task • ...
