computing Crossword Puzzles
Hardware and Software Maintenance 2023-10-22
Across
- Make (something) more modern or up to date.
- Address identifying number assigned to every device connected to the internet.
- Software It is a product designed to be easily moved from one computing environment to another.
- Network It is a collection of devices connected together in one physical location
- Network security device that monitors and filters incoming and outgoing network traffic
- It is a set of files that tells a piece of hardware how to function by communicating with a computer's operating system.
Down
- It is a type of software program created to protect information technology (IT) systems and individual computers
- A computer program with a graphical user interface for displaying and navigating between web pages.
- It is the jack or receptacle for some other peripheral device to plug into.
- Restoring lost data accidentally deleted, corrupted or made inaccessible.
- Card generates the video signal sent to a computer display.
11 Clues: Make (something) more modern or up to date. • Card generates the video signal sent to a computer display. • Restoring lost data accidentally deleted, corrupted or made inaccessible. • It is the jack or receptacle for some other peripheral device to plug into. • Address identifying number assigned to every device connected to the internet. • ...
Artificial Lexicon 2023-12-02
Across
- The field of study that enables computers to interpret visual information from the world.
- The delivery of computing services, including storage and processing power, over the internet.
- The interdisciplinary field that uses scientific methods, processes, and algorithms to extract insights from data.
- A machine learning approach where the algorithm is trained on labeled data.
- A computer system modeled after the human brain, used for tasks like image recognition.
- An AI program designed to simulate conversation with human users.
Down
- Extremely large and complex datasets that traditional data processing applications can't handle.
- The interdisciplinary field that involves the design, construction, operation, and use of robots.
- A subset of machine learning that involves neural networks with many layers.
- An open-source machine learning library developed by Google.
- A set of rules or steps followed to solve a problem or perform a task in AI.
11 Clues: An open-source machine learning library developed by Google. • An AI program designed to simulate conversation with human users. • A machine learning approach where the algorithm is trained on labeled data. • A subset of machine learning that involves neural networks with many layers. • ...
Test 2022-07-25
Across
- Make sure ______ are changed at predefined intervals
- Do plan for a complete _____ before the start of the deployment activity
- one of the different cloud computing models
- person who has accumulated great knowledge in a particular field
- meeting to get approval for your change
- Don’t use ______ statements inside the same SQL for update/delete
Down
- For all high priority incidents ___ to be done and action items from ___ should be communicated to all stakeholders
- A solution that reduces or eliminates the impact or probability of an incident or problem for which a full resolution is not yet available
- refers to a particular time period in the development procedure after which strictness and severity is observed in the rules required for making changes to the source code
- Is referred to an event that leads to disturbances and disruptions in an IT service
- process to be activated in case of emergencies
11 Clues: meeting to get approval for your change • one of the different cloud computing models • process to be activated in case of emergencies • Make sure ______ are changed at predefined intervals • Don’t use ______ statements inside the same SQL for update/delete • person who has accumulated great knowledge in a particular field • ...
IOT TERMS 2024-03-14
Across
- It is a low-power, low-data rate wireless network used mainly in home and industrial settings.
- Low power, wide area devices used in conjunction with mobile devices interfacing with IoT networks.
- A device used by utility companies to collect information about energy consumption
- a long-range for small data packets with low power consumption.
- An organization focused on driving the network and computing infrastructure needs of automotive big data.
- A data link layer (DLL) sublayer transmits data packets to and from a network interface card
Down
- A computer system designed for long-distance data transmissions
- a location-based service in which GPS or RFID is used to create a virtual geographic boundary
- a weak signal sent over a wide frequency and is employed mostly as a localizing signal and distance measurement.
- A measurement of how well a network supports IT connectivity
- It is an evolved second generation cellular network protocol
11 Clues: A measurement of how well a network supports IT connectivity • It is an evolved second generation cellular network protocol • A computer system designed for long-distance data transmissions • a long-range for small data packets with low power consumption. • A device used by utility companies to collect information about energy consumption • ...
CyberSecurity 2024-03-09
Across
- pairs a public key for encryption and a private key for decryption
- software intended to damage a computing system or to take partial control over its operation
- a malicious program that can copy itself and gain access to a computer in an unauthorized way
- encryption involves one key for both encryption and decryption
- a technique that attempts to trick a user into providing personal information
- infomration about an individual that identifies, links, relates or describes them
Down
- a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- the process of decoding data
- the process of encoding data to prevent unauthorized access
- a wireless access point that give unauthorized access to to secure networks
11 Clues: the process of decoding data • the process of encoding data to prevent unauthorized access • encryption involves one key for both encryption and decryption • pairs a public key for encryption and a private key for decryption • a wireless access point that give unauthorized access to to secure networks • ...
AI crosswords 2024-03-15
Across
- AI algorithm that uses deep learning techniques and large data sets to understand, summarize, generate and predict new content
- simple test of determining whether a machine can demonstrate human intelligence
- programs that detect specific patterns using a collection of data sets
- category of machine learning that uses labeled datasets to train algorithms to predict outcomes and recognise patterns
- a process or set of rules to be followed in problem-solving operations, especially by a computer
- Together with Allen Newell, developed the Logic Theorist, considered the first AI program
Down
- the act of calculating something (word derived from computer)
- category of machine learning that receives unlabeled data and discovers patterns and insights without any explicit guidance or instruction
- technologies that reduce human intervention in processes
- machine learning training method based on rewarding desired behaviors and punishing undesired ones
- a computer program designed to simulate conversation with human users
11 Clues: technologies that reduce human intervention in processes • the act of calculating something (word derived from computer) • a computer program designed to simulate conversation with human users • programs that detect specific patterns using a collection of data sets • simple test of determining whether a machine can demonstrate human intelligence • ...
Barclays Townhall 2024-08-15
Across
- This program helps banks prevent money laundering and other financial crimes
- The first name of the technology used to create immutable digital ledgers crucial in cryptocurrencies
- A cloud computing service provided by Microsoft used by many enterprises including Barclays
- A popular methodology in software development focused on continuous improvement and iterative progress
Down
- An iconic tower in Canary Wharf where Barclays has its corporate headquarters
- Barclays' initiative that helps clients manage their environmental impact and transition to a low-carbon economy
- This three-letter acronym refers to technology-driven financial services transforming the banking industry
- An industry-leading platform for financial market analytics used by traders and analysts at Barclays
- A framework used to store manage and analyze large datasets. (Hint: Common in banking data solutions)
- A major data analytics platform essential for processing large-scale data in banking
- A strategic data initiative within Barclays aimed at enhancing customer experience and insight
11 Clues: This program helps banks prevent money laundering and other financial crimes • An iconic tower in Canary Wharf where Barclays has its corporate headquarters • A major data analytics platform essential for processing large-scale data in banking • A cloud computing service provided by Microsoft used by many enterprises including Barclays • ...
Neologisms 2022-09-19
Across
- send the same message indiscriminately to a large number of internet users.
- Someone who posts too much personal information online
- A person who is driven by the fear of missing out.
- A person who takes information and images from other people and use them to create a new identity for themselves.
- A headline designed to make readers want to click on a hyperlink
Down
- A heterosexual man who dedicates a great deal of time and money to his appearance.
- The explanation of something by a man to a woman in a condescending way that assumes she has no knowledge about the topic.
- The opposite of trendy. Stylish in middle school and high school but no longer in style.
- A person who is inexperienced in a particular activity, especially computing or the use of the internet.
- An overly sensitive or easily offended person.
- To calm down or relax, used when someone is starting to get uptight about something
11 Clues: An overly sensitive or easily offended person. • A person who is driven by the fear of missing out. • Someone who posts too much personal information online • A headline designed to make readers want to click on a hyperlink • send the same message indiscriminately to a large number of internet users. • ...
SPS Teacher Crossword 2025-11-25
Across
- I nearly fell off the treadmill because I was distracted by all of the beautiful views (Geography)
- Now you are ragebaiting me by saying I'm a ragebaiter (Philosophy)
- This will separate the wheat from the chaff (Classics)
- What do you hope to achieve from this subject (Maths)
- I can assure you there is no funny business in my coffee cup (MFL)
Down
- Let's all revise some Dale Charman (Computing)
- Oh no did I do the [6-7 gesture]? I am so sorry this is entirely my fault I did not mean that, can we move past that and focus on the task for 6-7 minutes? (History)
- It's almost like he's trying to harvest the sexual energy of a hosse (English)
- Fac iterum and fac ministeris (Engineering)
- One of these days I am going to be seriously investigated (Chemistry)
- I have an auntie, her name is Antie Differentiation (Maths)
11 Clues: Fac iterum and fac ministeris (Engineering) • Let's all revise some Dale Charman (Computing) • What do you hope to achieve from this subject (Maths) • This will separate the wheat from the chaff (Classics) • I have an auntie, her name is Antie Differentiation (Maths) • Now you are ragebaiting me by saying I'm a ragebaiter (Philosophy) • ...
Cloud Monitoring Tools 2022-05-12
Networking and the Internet 2022-06-27
Across
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- The process of transferring data between two or more digital devices
- Facts and statistics collected together for refences or analysis.
- A global computer network consisting of multiple interconnected networks.
- The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
- The ability of computers and the Internet to consistently perform to the expectations of their designed function.
- The speed and resource usage involved in collecting, manipulating, and analyzing data.
- The preservation of accuracy and consistency of a data set over the course of its analysis.
- A numerical label assigned to each computing device on a network.
- A series of interconnected computers and devices that share resources and exchange data with each other.
- The rate at which data is communicated from the Internet to a computer and vice versa.
11 Clues: A numerical label assigned to each computing device on a network. • Facts and statistics collected together for refences or analysis. • The process of transferring data between two or more digital devices • A global computer network consisting of multiple interconnected networks. • ...
Networking protocols Kennert, Mattias 2020-10-14
Across
- The highest OS Protocol layer.
- is the process of "stealing" bits from the HOST part of an IP address in order to divide the larger network into smaller sub-networks called subnets.
- protocol specifies how routers communicate with each other to distribute information that enables them to select routes between any two nodes on a computer network.
- In networking, a ... is a standardized set of rules for formatting and processing data.
- an Hyprid protocol
- Protocol the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
Down
- is the process of selecting a path for traffic in a network or between or across multiple networks.
- is a logical subdivision of an IP network.
- characteristics or information, usually numerical, that are collected through observation.
- is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- The lowes OS Protocol layer.
- In software engineering, ... is the process of adapting software for the purpose of achieving some form of execution in a computing environment
- is a piece of computer hardware or software (computer program) that provides functionality for other programs or devices.
13 Clues: an Hyprid protocol • The lowes OS Protocol layer. • The highest OS Protocol layer. • is a logical subdivision of an IP network. • In networking, a ... is a standardized set of rules for formatting and processing data. • characteristics or information, usually numerical, that are collected through observation. • ...
Bigdata 2020-12-20
Across
- collection of data that is huge in volume, yet growing exponentially with time
- an example of unstructured data
- refers to heterogeneous sources and the nature of data
- world’s largest Hadoop cluster
- data represented in an XML file
Down
- data is distributed over several machines and replicated to ensure their durability to failure and high availability to parallel application.
- represented every files and directory which is used in the namespace
- helps you to manage the state of an HDFS node and allows you to interacts with the blocks
- open source software framework used to develop data processing applications which are executed in a distributed computing environment.
- The data is increasing at a very fast rate. It is estimated that the volume of data will double in every 2 years.
- The amount of data which we deal with is of very large size of Peta bytes.
11 Clues: world’s largest Hadoop cluster • an example of unstructured data • data represented in an XML file • refers to heterogeneous sources and the nature of data • represented every files and directory which is used in the namespace • The amount of data which we deal with is of very large size of Peta bytes. • ...
crossword 1 2023-01-21
Across
- A port city in Liguria on an arm of the Ligurian Sea; a major seaport and year-round resort
- (of a voice) making a breathing sound while speaking
- A vague idea in which some confidence is placed
- The condition of being amphidiploid
- (computing) computer hardware that holds and spins a magnetic or optical disk and reads and writes information on it
- Genus of ladybugs, including H. convergens (Hippodamia)
Down
- Weedy trailing mat-forming herb with bright yellow flowers cultivated for its edible mildly acid leaves eaten raw or cooked especially in Indian and Greek and Middle Eastern cuisine; cosmopolitan
- A religious movement by Arab Shiite Muslims in 17th century Iraq that is opposed to the Usuli
- (nautical) a long wooden slat with holes for cords that holds up an awning
- Annual weedy grass used for hay
- Not imagined even in a dream
11 Clues: Not imagined even in a dream • Annual weedy grass used for hay • The condition of being amphidiploid • A vague idea in which some confidence is placed • (of a voice) making a breathing sound while speaking • Genus of ladybugs, including H. convergens (Hippodamia) • (nautical) a long wooden slat with holes for cords that holds up an awning • ...
Mainframe computers and Supercomputers 2024-09-27
Across
- its the main thing in computer to see things
- drive component that stores all of your digital content
- a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations (computation)
- a complex set of electronic circuitry that runs the machine's operating system and apps.
- most needy thing to type on computer
- used to shield the remainder of the internal components, such as the motherboard, RAM, hard drive, cooling fans, and other expansion cards, from external effects
Down
- it prints out your works
- circuit board inside general-purpose computing systems, including personal computers, smart televisions, smart monitors, and other similar devices, which supports communication between different electrical components and houses components such as the CPU, memory, etc
- controls your screen
- supply an electrical device that offers electric power to an electrical load such as laptop computer, server, or other electronic devices.
- helps handle graphics-related work like graphics, effects, and videos
11 Clues: controls your screen • it prints out your works • most needy thing to type on computer • its the main thing in computer to see things • drive component that stores all of your digital content • helps handle graphics-related work like graphics, effects, and videos • a complex set of electronic circuitry that runs the machine's operating system and apps. • ...
Bigdata 2020-12-20
Across
- open source software framework used to develop data processing applications which are executed in a distributed computing environment.
- collection of data that is huge in volume, yet growing exponentially with time
- helps you to manage the state of an HDFS node and allows you to interacts with the blocks
- world’s largest Hadoop cluster
- data represented in an XML file
- The data is increasing at a very fast rate. It is estimated that the volume of data will double in every 2 years.
Down
- The amount of data which we deal with is of very large size of Peta bytes.
- represented every files and directory which is used in the namespace
- refers to heterogeneous sources and the nature of data
- data is distributed over several machines and replicated to ensure their durability to failure and high availability to parallel application.
- an example of unstructured data
11 Clues: world’s largest Hadoop cluster • data represented in an XML file • an example of unstructured data • refers to heterogeneous sources and the nature of data • represented every files and directory which is used in the namespace • The amount of data which we deal with is of very large size of Peta bytes. • ...
Technologies of the future 2025-06-02
Across
- is a type of vehicle which can function both as a road vehicle and as an aircraft.
- a device that uses either a system of wires along which electrical signals are sent or a system
- is a digital storage medium. It looks very similar to its older sibling, the CD. The important difference between them is the recording density.
- is airplane
- a machine controlled by a computer that is used to perform jobs automatically
- a machine that makes coffee
Down
- is a multi-OS SSD and HDD monitoring and analysis software.
- is a device that consists of a lightproof chamber with an aperture fitted with a lens
- a piece of kitchen equipment that uses electricity to preserve food at a cold temperature
- is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data.
- is a mobile phone with advanced computing capabilities.
11 Clues: is airplane • a machine that makes coffee • is a mobile phone with advanced computing capabilities. • is a multi-OS SSD and HDD monitoring and analysis software. • a machine controlled by a computer that is used to perform jobs automatically • is a type of vehicle which can function both as a road vehicle and as an aircraft. • ...
Networking and the Internet 2022-06-27
Across
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- The process of transferring data between two or more digital devices
- Facts and statistics collected together for reference or analysis.
- A global computer network consisting of multiple interconnected networks.
- The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
- The ability of computers and the Internet to consistently perform to the expectations of their designed function.
- The speed and resource usage involved in collecting, manipulating, and analyzing data.
- The preservation of accuracy and consistency of a data set over the course of its analysis.
- A numerical label assigned to each computing device on a network.
- A series of interconnected computers and devices that share resources and exchange data with each other.
- The rate at which data is communicated from the Internet to a computer and vice versa.
11 Clues: A numerical label assigned to each computing device on a network. • Facts and statistics collected together for reference or analysis. • The process of transferring data between two or more digital devices • A global computer network consisting of multiple interconnected networks. • ...
привіт, моє ім'я - kacper 2019-01-09
Across
- Disk a magnetic disk on which you can store computer data.
- Storage Devices Grouping together tapes drives cdr's, cdrw's,
- The main circuit board of a microcomputer
- to attach peripherals.
- Printer A type of printer that works by spraying
- A phone that combines computing,telephone/fax, and networking features.
- ink at a sheet of paper. Magnetizedplates in the ink's path direct the ink onto the paper in the desired shapes.
- A device that controls the movement of the
Down
- Printer A type of printer that utilizes a laser beam toproduce an image on a drum.
- for backup.CPU The Central Processing Unit is the BRAIN of
- Another term for display screen
- or pointer on a display screen.
- MemoryInternal storage areas in the computer.MicroprocessorA silicon chip that contains a CPU
- Universal Service Bus; a type of port on the
- any device that holds large amounts of
- a he set of typewriter-like keys that enablesyou to enter data into a computer.
- Internal storage areas in the computer.
- computer. Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
- Devices A device that feeds data into a computer, such as a keyboard or mouse.
19 Clues: to attach peripherals. • Another term for display screen • or pointer on a display screen. • any device that holds large amounts of • Internal storage areas in the computer. • The main circuit board of a microcomputer • A device that controls the movement of the • Universal Service Bus; a type of port on the • Printer A type of printer that works by spraying • ...
Funds of Tech: Review 1 2024-05-01
Across
- Physical part of the computer that connects it to a network
- RJ45 cable used to physically connect devices to networks
- Connects to a computer and is able to broadcast video over the Internet
- High-speed integrated circuits used to store computer, user, and program data for processing
- Integrated circuit that processes instructions from the OS, apps, and other software programs
- Used to enter data into a computer
- Universal Serial Bus standard that specifies cables, communication, protocols and power requirements for connections between computers and other devices
- Converts audible sound into audio files and data
- Creates audible sound from audio files and data
- Converts paper docs and images into electronic data that can be stored on a computer
- Programs, procedures, instructions, and data that controls how a computer operates
Down
- Displays a computer's visual component
- Physical cable that "supplies" power to computing devices
- Communicates with a computer and converts data into physical images, graphics, and text
- Main software program that facilitates interaction between the user, the computer, and other applications
- Used to move the cursor to interact with various user interface elements
- Processes user input via touch, typically found on a mobile device
- Uses magnetic disks to store electronic data
- The physical components of a computer system
19 Clues: Used to enter data into a computer • Displays a computer's visual component • Uses magnetic disks to store electronic data • The physical components of a computer system • Creates audible sound from audio files and data • Converts audible sound into audio files and data • Physical cable that "supplies" power to computing devices • ...
Clemson Engineering, Computing and Applied Sciences 2022-01-10
Across
- Designs circuits and electronics as the foundation of information systems
- Designs & builds bridges and other infrastructure
- Creates biofuel from used oil from the cafeteria
- Designs processes to create, purify, and transport chemicals
- Gathers and interprets data about the Earth
- Designs the engine of the car to operate efficiently
Down
- Designs drinking water treatment plants
- Designs the screen protector on your phone to heal itself
- Creates prosthetics to improve human life
- Integrates training in computer science and electronics engineering
- Designs and improves assembly lines
11 Clues: Designs and improves assembly lines • Designs drinking water treatment plants • Creates prosthetics to improve human life • Gathers and interprets data about the Earth • Creates biofuel from used oil from the cafeteria • Designs & builds bridges and other infrastructure • Designs the engine of the car to operate efficiently • ...
Allstate India Technology Conclave Crossword 2016-05-22
Across
- is NQ2 re-write to support responsive design capabilities and provide Anytime Anywhere Online Quoting experience to customers
- is the practice of operations and development engineers participating together in the entire service life cycle
- Owns the prioritized list of what needs to be produced in Product Backlog
- helping agencies build relationships
- Towing service of disabled vehicle to repair facility of choice
- Allstate India Knowledge management portal
- Spark is a fast, general purpose CLUSTER COMPUTING system
- Vehicle Service Contract is a product
- is a Project Management flavor of Agile methodology
- Beacon Notifications for Allstate Master Mobile App
- is a software development methodology which is intended to improve software quality and responsiveness to changing customer requirements
Down
- represents a new way to think, do, act and deliver
- Monthly theme based technology and Innovation newsletter
- Two people working together at one computer on one programming task
- Allstate Innovation Engine
- Hadoop ecosystem
- is a development practice where you build software in such a way that the software can be released to production at any time in an automated way
- is an application development environment that allows developers to build cloud-based applications
- is the smallest set of features that you want to deliver to your customer that demonstrates actual business value
19 Clues: Hadoop ecosystem • Allstate Innovation Engine • helping agencies build relationships • Vehicle Service Contract is a product • Allstate India Knowledge management portal • represents a new way to think, do, act and deliver • is a Project Management flavor of Agile methodology • Beacon Notifications for Allstate Master Mobile App • ...
Find some words and definitions related to software and programming. 2021-09-16
Across
- A risk which can potentially harm computer systems and organization.
- Software or firmware that prevents unauthorized access to a network.
Down
- An action taken by some antivirus scanners on a file infected with malware or a virus.
- The action of saving information for later use.
- A type of malicious software or malware that is installed on a computing device without the end user's knowledge.
5 Clues: The action of saving information for later use. • A risk which can potentially harm computer systems and organization. • Software or firmware that prevents unauthorized access to a network. • An action taken by some antivirus scanners on a file infected with malware or a virus. • ...
Introduction to Traditional & Digital Art 2018-09-29
Across
- art art created or modified on a computer by a computing process
- of Design Govern how to effectively combine the elements of art to compose a pleasing work of art.
- the creation of aesthetic objects, environments, or experiences that can be shared with others
Down
- Artwork Created with out the use of computer technology.
- of art Deal with the individual features needed to compose artwork.
5 Clues: Artwork Created with out the use of computer technology. • art art created or modified on a computer by a computing process • of art Deal with the individual features needed to compose artwork. • the creation of aesthetic objects, environments, or experiences that can be shared with others • ...
1 2025-09-09
Across
- Describes devices like TVs and watches that have computing abilities and can connect to the internet.
- A major concern regarding the protection of data collected by IoT devices.
Down
- Raw information collected by IoT devices before it is processed.
- These are used to capture information like temperature, light, or motion from the environment.
- A device, like a motor or switch, that carries out a physical action.
5 Clues: Raw information collected by IoT devices before it is processed. • A device, like a motor or switch, that carries out a physical action. • A major concern regarding the protection of data collected by IoT devices. • These are used to capture information like temperature, light, or motion from the environment. • ...
Team 2 Crossword 2021-01-21
Across
- One of the biggest cloud providers
- virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed
- One of the key component of OpenStack
- Which is used to implement clusters in cloud computing platform
Down
- The country that lead the world in building and deploying 5G technology.
- is a globally distributed network of servers that serve content from locations closest to the users
- an implementation of the RAN in a more open and flexible architecture which virtualizes network functions in software platforms based on general purpose processors
7 Clues: One of the biggest cloud providers • One of the key component of OpenStack • Which is used to implement clusters in cloud computing platform • The country that lead the world in building and deploying 5G technology. • is a globally distributed network of servers that serve content from locations closest to the users • ...
KMS 2022-05-26
Across
- The function that deals with all the money the company has
- name the person who spoke about "What's in it for you?" in the breakfast meeting
- Stage one of a sales pitch
- This solution uses a combination of communication methods in which brands can reach their desired audiences.
Down
- This industry industry is comprised of companies that design, manufacture, or distribute electronic devices such as computers, computer-related equipment, computer services and software, scientific instruments, and electronic components and products.
- A technique that mimics functioning of a human brain
- A tool that provides servers, storage, networking, remote computing, email, mobile development, and security.
7 Clues: Stage one of a sales pitch • A technique that mimics functioning of a human brain • The function that deals with all the money the company has • name the person who spoke about "What's in it for you?" in the breakfast meeting • This solution uses a combination of communication methods in which brands can reach their desired audiences. • ...
Celebrating Influential Women in the World 2025-03-15
Across
- Rowling The British author of the Harry Potter series. (J.K. Rowling)
- Yousafzai This Pakistani activist fights for girls’ education and won a Nobel Peace Prize.
- Parks She was a civil rights activist who refused to give up her bus seat in 1955.
- Jemison She was the first Black woman to travel to space.
Down
- Harris She was the first female Vice President of the United States.
- Curie She was the first woman to win a Nobel Prize and made groundbreaking discoveries in radioactivity.
- Lovelace She was a pioneering computer scientist and is known as the "mother of computing."
7 Clues: Jemison She was the first Black woman to travel to space. • Harris She was the first female Vice President of the United States. • Rowling The British author of the Harry Potter series. (J.K. Rowling) • Parks She was a civil rights activist who refused to give up her bus seat in 1955. • ...
Puzzle 2016-01-28
Across
- a calamitous event, especially one occurring suddenly and causing great loss of life, damage.
- existing in someone or something as a permanent and inseparable element, quality, or attribute; inhering
- /to assemble or marshal (armed forces, military reserves, or civilian persons of military age) into readiness for active service.
- the basic, underlying framework or features of a system or organization enterprise computing infrastructures.
- /of, relating to, or characteristic of an icon.
Down
- to give power or authority to
- / the action of a lever, a rigid bar that pivots about one point and that is used to move an object at a second point by a force applied at a third.
- pertaining to, existing in, or consisting of the atmosphere.
- unable to be avoided, evaded, or escaped; certain; necessary
- springing back; rebounding.
10 Clues: springing back; rebounding. • to give power or authority to • /of, relating to, or characteristic of an icon. • pertaining to, existing in, or consisting of the atmosphere. • unable to be avoided, evaded, or escaped; certain; necessary • a calamitous event, especially one occurring suddenly and causing great loss of life, damage. • ...
Food Preservation 2022-12-04
Across
- a complex starch derived from plant
- a board category of all monosaccharides and disaccharide: the simplest carbohydrate
- substances with ph below 7 that can break down to release hydrogen ions.
- a system that connects two or more computing devices for transmitting and sharing information.
- viscoelastic substances capable of modifying the textures and consistency of Batters, Doughs and Coatings
- a small sweet blue-black edible berry which grows in clusters on North American shrubs related to the bilberry.
- an oval fruit that has a thick, yellow skin and sour juice
Down
- an aromatic variety of citrus. As the name implies, the tree produces highly bitter and tart fruits.
- stone fruits, which means their seeds are encased in a hard shell or pit.
- a layered structure indicating what kind of programs can or should be built and how they would interrelate.
10 Clues: a complex starch derived from plant • an oval fruit that has a thick, yellow skin and sour juice • substances with ph below 7 that can break down to release hydrogen ions. • stone fruits, which means their seeds are encased in a hard shell or pit. • a board category of all monosaccharides and disaccharide: the simplest carbohydrate • ...
Layanan komputasi cloud yang menyediakan mesin virtual skala besar di Google Cloud Platform (GCP) 2023-05-24
Across
- Layanan Google Cloud Platform yang memungkinkan Anda menjalankan aplikasi secara skalabel dan tanpa server
- Layanan penyimpanan file dan objek di GCP yang memungkinkan Anda menyimpan dan mengakses data dari mana saja
- Layanan komputasi cloud yang menyediakan mesin virtual skala besar di Google Cloud Platform (GCP)
- Layanan basis data yang dikembangkan oleh Google untuk manajemen data relasional di GCP
- Layanan analisis data yang memungkinkan Anda melakukan kueri dan analisis data besar secara cepat di GCP (
Down
- Konsep dalam cloud computing yang memungkinkan sumber daya komputasi dan penyimpanan ditingkatkan atau dikurangi sesuai kebutuhan
- Layanan Google Cloud Platform yang menyediakan lingkungan terkelola untuk menjalankan kontainer
- Layanan GCP yang menyediakan alat dan infrastruktur untuk mengembangkan, menguji, dan menerapkan aplikasi
- Konsep komputasi yang memungkinkan akses terhadap sumber daya komputasi melalui jaringan interne
- Layanan manajemen identitas dan akses yang digunakan untuk mengendalikan akses ke sumber daya di GCP
10 Clues: Layanan basis data yang dikembangkan oleh Google untuk manajemen data relasional di GCP • Layanan Google Cloud Platform yang menyediakan lingkungan terkelola untuk menjalankan kontainer • Konsep komputasi yang memungkinkan akses terhadap sumber daya komputasi melalui jaringan interne • ...
Scientific and Technological Innovations 2025-04-14
Across
- ethics : The branch of philosophy that studies moral issues related to artificial intelligence and its applications.
- energy : Energy derived from natural sources that are replenished constantly, such as solar or wind power.
- : The practice of protecting systems, networks, and data from digital attacks.
- materials : Substances that change their properties in response to external conditions like temperature or pressure.
- : The science of manipulating matter on an atomic or molecular scale.
Down
- : A decentralized digital ledger technology used for securely recording transactions.
- : A form of 3D printing that uses living cells to create tissues and potentially organs.
- reality : A simulated experience that can be similar to or completely different from the real world.
- : The branch of technology concerned with the design, construction, and operation of robots.
- computing : A revolutionary technology that uses quantum mechanics to process information at incredible speeds.
10 Clues: : The science of manipulating matter on an atomic or molecular scale. • : The practice of protecting systems, networks, and data from digital attacks. • : A decentralized digital ledger technology used for securely recording transactions. • : A form of 3D printing that uses living cells to create tissues and potentially organs. • ...
puzzles 2016-01-28
Across
- to give power or authority to
- a calamitous event, especially one occurring suddenly and causing great loss of life, damage.
- pertaining to, existing in, or consisting of the atmosphere.
- / the action of a lever, a rigid bar that pivots about one point and that is used to move an object at a second point by a force applied at a third.
- /of, relating to, or characteristic of an icon.
Down
- unable to be avoided, evaded, or escaped; certain; necessary
- springing back; rebounding.
- /to assemble or marshal (armed forces, military reserves, or civilian persons of military age) into readiness for active service.
- existing in someone or something as a permanent and inseparable element, quality, or attribute; inhering
- the basic, underlying framework or features of a system or organization enterprise computing infrastructures.
10 Clues: springing back; rebounding. • to give power or authority to • /of, relating to, or characteristic of an icon. • unable to be avoided, evaded, or escaped; certain; necessary • pertaining to, existing in, or consisting of the atmosphere. • a calamitous event, especially one occurring suddenly and causing great loss of life, damage. • ...
THE RATH OF DERRION SMITH 2013-05-13
Across
- SINGLE NUMBER THAT DESCRIBES ALL THE NUMBER IN A SET USUALLY THE AVERAGE IS THE MEAN BUT SOMETIMES IT IS THE MEDIAN OR THE MODE.
- STEP-BY-STEP METHOD FOR COMPUTING.
- ANGLES /AN ANGLES WITH A MEASURE LESS THAN 90.
- to.<A AND <B ARE ADJACENT ANGLES <A AND <C ARE NOT ADJACENT ANGLES.
- MEASURE IN SQUARE UNITS OF THE INTERIOR REGION OF A 2-DIMENSIONAL FIGURE OR THE SURFACE OF A 3-DIMENSIONAL FIGURE.
- angles/some of the pairs of angles formed when a line crosstwo other lines.
Down
- NUMERALS/THE DIGITS USED IN OUR BASE TEN NUMBER SYSTEM/ 0 I 2 3 4 5 6 7 8 9
- variables to express general ruies about number.number relationships and poerations.
- NUMBER BEING ADDED.
- TWO RAYS THAT SHARE AN ENDPOINT.
10 Clues: NUMBER BEING ADDED. • TWO RAYS THAT SHARE AN ENDPOINT. • STEP-BY-STEP METHOD FOR COMPUTING. • ANGLES /AN ANGLES WITH A MEASURE LESS THAN 90. • to.<A AND <B ARE ADJACENT ANGLES <A AND <C ARE NOT ADJACENT ANGLES. • NUMERALS/THE DIGITS USED IN OUR BASE TEN NUMBER SYSTEM/ 0 I 2 3 4 5 6 7 8 9 • angles/some of the pairs of angles formed when a line crosstwo other lines. • ...
Barbara Ritchie 2014-03-21
Across
- the main circuit board of a personal computer
- client terminal that looks like a desktop but has limited capabilities and components
- process of initiating contact between two Bluetooth devices and allowing them to communicate with each other
- metal or plastic frame that houses the system unit on a desktop
- the number of horizontal and vertical pixels in a display device
Down
- the practice of sharing or pooling computing resources, such as serves and storage devices
- device component you connect to a computer or mobile device to expand its capabilities
- term used to refer to a device that combines the features of a smartphone with a tablet
- UPS power supply that switches to battery power when a problem occurs in the power line
- electronic component that interprets and carries out the basic instructions that operate a computer
10 Clues: the main circuit board of a personal computer • metal or plastic frame that houses the system unit on a desktop • the number of horizontal and vertical pixels in a display device • client terminal that looks like a desktop but has limited capabilities and components • device component you connect to a computer or mobile device to expand its capabilities • ...
Sam ortega 2014-03-30
Across
- metal or plastic frame that houses the system unit on a desktop
- the number of horizontal and vertical pixels in a display device
- process of initiating contact between two Bluetooth devices and allowing them to communicate with each other
- the main circuit board of a personal computer
- electronic component that interprets and carries out the basic instructions that operate a computer
- client terminal that looks like a desktop but has limited capabilities and components
Down
- the practice of sharing or pooling computing resources, such as servers and storage devices
- UPS power supply that switches to battery power when a problem occurs in the power line
- term used to refer to a device that combines the features of a smartphone with a tablet
- device component you connect to a computer or mobile device to expand its capabilities
10 Clues: the main circuit board of a personal computer • metal or plastic frame that houses the system unit on a desktop • the number of horizontal and vertical pixels in a display device • client terminal that looks like a desktop but has limited capabilities and components • device component you connect to a computer or mobile device to expand its capabilities • ...
Crossword 2024-05-06
Across
- A technique used to authenticate users by confirming their identities through biometric data. (10 letters)
- A programming paradigm based on the concept of objects. (14 letters)
- A fundamental component of a computer system that performs arithmetic and logical operations. (3 letters)
- A method of organizing and storing data in a way that allows for efficient retrieval. (8 letters)
- A type of attack that involves tricking a user into revealing confidential information. (8 letters)
- A protocol used for transferring files over a network. (3 letters)
Down
- A widely used programming language known for its simplicity and versatility. (6 letters)
- A type of malware that encrypts files and demands payment for their release. (10 letters)
- A type of software that simulates a physical computing environment. (14 letters)
- A programming language commonly used for web development. (10 letters)
10 Clues: A protocol used for transferring files over a network. (3 letters) • A programming paradigm based on the concept of objects. (14 letters) • A programming language commonly used for web development. (10 letters) • A type of software that simulates a physical computing environment. (14 letters) • ...
8.2 Technology in the Work Place 2023-02-02
Across
- - using someone's words, or ideas as one's own without attribution or credit.
- - exclusive right to copy, license, sell, or distribute material.
- - website where an individual posts topic and opinions
Down
- - use of e-mail and copies of real, credible websites to trick people into providing personal, financial, and other data.
- - online posting of information about a person with the intent to cause that person harm or pain.
- - system of sending messages from a device to another over an electronic network.
- - breaching security measures to access a computer or network system.
- - mobile telephone that has computing capability and internet connectivity.
- - grant made by the US government that gives a person or company the right to be the sole producer of a product for a period of time.
- - blog posting with a limited number of characters.
10 Clues: - blog posting with a limited number of characters. • - website where an individual posts topic and opinions • - exclusive right to copy, license, sell, or distribute material. • - breaching security measures to access a computer or network system. • - mobile telephone that has computing capability and internet connectivity. • ...
Emerging & Future Technologies 2023-06-09
Across
- An immersive technology that simulates a three-dimensional environment and allows users to interact with virtual objects or scenes
- A technology that enables autonomous driving
- A virtual reality headset developed by Facebook
- A field of computing that utilizes principles of quantum mechanics to perform complex calculations exponentially faster than classical computers
- A technology that enables seamless wireless communication between devices
Down
- A technology that mimics human intelligence
- A technology that enables the creation of virtual objects in the real world
- Digital or virtual form of currency that uses cryptography for secure transactions and operates independently of a central bank
- The interdisciplinary field involving the design, construction, and programming of machines that can perform tasks autonomously or with human guidance
- Devices or accessories that can be worn on the body and often connect to smartphones or computers for various functions
10 Clues: A technology that mimics human intelligence • A technology that enables autonomous driving • A virtual reality headset developed by Facebook • A technology that enables seamless wireless communication between devices • A technology that enables the creation of virtual objects in the real world • ...
PENGURUSAN RAHSIA RASMI 2023-07-13
Across
- Singkatan Bagi Pegawai Keselamatan Jabatan Yang Bertanggungjawab Melaksanakan Arahan-Arahan Keselamatan Kerajaan Dengan Mendapatkan Nasihat Pejabat CGSO.
- Penghantaran Maklumat Rahsia Rasmi Melalui Peralatan Komunikasi Hendaklah Dibuat Melalui Kaedah __________.
- Arahan __________ Perlu Dipatuhi Penjawat Awam.
- Tempat Penyimpanan Rahsia Rasmi Yang Paling Selamat Disimpan Bagi “Rahsia Besar”.
- __________ Data Merupakan Satu Elemen Penting Yang Digunakan Semasa Proses Pelupusan Maklumat Di Dalam Sistem Pengkomputeran Awan (Cloud Computing).
Down
- Kulit Fail Berwarna Merah Jambu Dengan Berpalang Merah Di Sebelah Luar Kulit Hadapan Dan Belakang.
- Rahsia Rasmi Dikelaskan Kepada Peringkat Keselamatan Rahsia Besar, Rahsia, Sulit Dan __________.
- Orang Atau Pihak Yang Memberi Kuasa Untuk Mengelaskannya Sebagai Rahsia Besar, Rahsia, Sulit dan Terhad.
- Singkatan Bagi Sesuatu Jawatan Yang Melibatkan Pemegangnya Sentiasa Melihat Atau Mengurus Perkara Atau Maklumat Bahan Rahsia Besar Atau Rahsia.
- Fail Berwarna Hijau Mengandungi Dokumen Rasmi, Maklumat Rasmi Dan Bahan Rasmi Yang Dikelaskan Sebagai __________.
10 Clues: Arahan __________ Perlu Dipatuhi Penjawat Awam. • Tempat Penyimpanan Rahsia Rasmi Yang Paling Selamat Disimpan Bagi “Rahsia Besar”. • Rahsia Rasmi Dikelaskan Kepada Peringkat Keselamatan Rahsia Besar, Rahsia, Sulit Dan __________. • Kulit Fail Berwarna Merah Jambu Dengan Berpalang Merah Di Sebelah Luar Kulit Hadapan Dan Belakang. • ...
dp 2024-11-22
Across
- The consistency guarantee provided by Delta Lake to ensure reliable data pipelines
- which computing of Azure SQL Database’s feature that automatically scales resources based on workload demands
- The Azure feature that provides encryption for data in transit and at rest is.
- The type of storage system that separates compute and storage layers for scalability
- The data format designed for fast serialization and compact storage, commonly used in Kafka
Down
- The db service in Azure that provides globally distributed, multi-model NoSQL and SQL database support is
- what is the language used in Azure Data Explorer for querying log and telemetry data
- The offering in Azure designed to simplify the process of building, deploying, and managing modern data warehouses
- The type of database optimized for read-heavy workloads in analytical systems is
- The storage service in Azure that is optimized for unstructured data.
10 Clues: The storage service in Azure that is optimized for unstructured data. • The Azure feature that provides encryption for data in transit and at rest is. • The type of database optimized for read-heavy workloads in analytical systems is • The consistency guarantee provided by Delta Lake to ensure reliable data pipelines • ...
GRID-GENIUS 8 2024-11-27
Across
- The process of converting an object into a format that can be easily stored or transmitted.
- An object-oriented concept where one interface can represent multiple underlying forms.
- The arrangement of elements in a network, including how they are connected and interact.
- A programming technique where a function calls itself to solve a problem.
- A problem-solving method that uses practical approaches for faster solutions, often with trade-offs in accuracy.
Down
- A decentralized, distributed ledger technology used to record transactions securely.
- A situation in computing where two or more processes are unable to proceed due to mutual resource contention
- A process used to map data to a fixed-size value, typically for fast lookups in databases.
- A synchronization primitive used to manage access to a resource in multithreading.
- A theoretical model of computation that defines what can be computed algorithmically.
10 Clues: A programming technique where a function calls itself to solve a problem. • A synchronization primitive used to manage access to a resource in multithreading. • A decentralized, distributed ledger technology used to record transactions securely. • A theoretical model of computation that defines what can be computed algorithmically. • ...
Cyber Security Puzzle 2025-06-30
Across
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- Attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources.
- An unauthorized user who attempts to or gains access to an information system.
- Software designed to block malware from entering protected networks.
- A mechanism for creating a secure connection between a computing device and a computer network.
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
Down
- A string of characters used to authenticate and identity.
- A flaw or weakness in an information system that could be exploited.
- part of internet that is not indexed by search engines.
- A computer program that can block, detect and remove viruses and other malware.
10 Clues: part of internet that is not indexed by search engines. • A string of characters used to authenticate and identity. • A flaw or weakness in an information system that could be exploited. • Software designed to block malware from entering protected networks. • An unauthorized user who attempts to or gains access to an information system. • ...
Computer Basics 4 2025-08-18
Across
- Read-Only Memory (ROM) holds programs or data, even when the power is turned off.
- A form of intellectual property protection provided by law.
- The moral principles that govern your personal or business behavior.
- A semiconductor device used to amplify or switch electronic signals.
- A way of identifying a valid user for a system.
Down
- The first purely electronic, digital computer which could be reprogrammed to handle a wide array of tasks.
- An integrated circuit that contains all the functions of a computer's central processing unit (CPU).
- The act of bypassing security measures to break into computing systems illegally.
- The software that you work with as a computer user such as spreadsheets, word processors, email clients and video games.
- A right granted to an inventor that prevents others from making, selling or using the invention for a period of time.
10 Clues: A way of identifying a valid user for a system. • A form of intellectual property protection provided by law. • The moral principles that govern your personal or business behavior. • A semiconductor device used to amplify or switch electronic signals. • Read-Only Memory (ROM) holds programs or data, even when the power is turned off. • ...
AR/VR 2022-01-21
Across
- wearing computing device in the form of computerized eyeglasses.
- what can be recorded using a normal light source?
Down
- a term for illusion of immersion by projecting stereo images on the walls and floors of a room.
- a type of VR environment in which subjects are visually isolated from the real environment.
- The game launched augmented reality (AR) into the spotlight in recent years
5 Clues: what can be recorded using a normal light source? • wearing computing device in the form of computerized eyeglasses. • The game launched augmented reality (AR) into the spotlight in recent years • a type of VR environment in which subjects are visually isolated from the real environment. • ...
QUIZ 8 2023-11-21
Across
- Essential document for a Project for Scope, Resources, Milestones etc at the time of initiation
- it is a possibility of something dangerous or unpleasant happening; it is always identified before and during any new engagement
- A risk with a negative impact on the project / a person or thing likely to cause damage or danger
Down
- Popular cloud computing platform
- Must not miss to raise it if there is scope creep in a Project
- A meeting that's held at the end of an iteration / looking back on or dealing with past events or situations
- A type of bar chart that illustrates a project schedule
7 Clues: Popular cloud computing platform • A type of bar chart that illustrates a project schedule • Must not miss to raise it if there is scope creep in a Project • Essential document for a Project for Scope, Resources, Milestones etc at the time of initiation • A risk with a negative impact on the project / a person or thing likely to cause damage or danger • ...
Cloud Security (Easy) 2023-06-01
Across
- The set of policies, technologies, and practices designed to protect cloud infrastructure and data.
- A security method that requires users to provide multiple forms of identification to access cloud resources.
- A company that offers cloud computing services and infrastructure to businesses and individuals.
- Strategies and technologies implemented to prevent the unauthorized loss or leakage of sensitive data in cloud environments.
Down
- The process of converting data into a secure code to prevent unauthorized access or disclosure.
- The framework and processes for managing user identities and controlling their access to cloud resources.
- A secure network connection that allows users to access cloud resources over the internet.
7 Clues: A secure network connection that allows users to access cloud resources over the internet. • The process of converting data into a secure code to prevent unauthorized access or disclosure. • A company that offers cloud computing services and infrastructure to businesses and individuals. • ...
Chapter 18.1 Key Terms Created By: Ashley Stahl 2013-04-23
Across
- Reality- is an artifical, three dimensional visual world created by a computer.
- is the transmission of information over communication lines.
Down
- is an arrangement that allows employees to work at home while communicating with the workplace by phone, fax, or modem.
- Technology(IT)- uses computing, electronics, and telecommunications to process and distribute information in digital and other forms.
- Computer- is a small pportable computer designed to be used while it is worn on the body.
- Aided Design(CAD)- is software for designing products with a computer.
6 Clues: is the transmission of information over communication lines. • Aided Design(CAD)- is software for designing products with a computer. • Reality- is an artifical, three dimensional visual world created by a computer. • Computer- is a small pportable computer designed to be used while it is worn on the body. • ...
HR TechGurus 2020-11-24
Across
- This helps Cloud-based applications to take advantage of autoscaling
- This application of Microsoft has reached 115 million daily active users
- This helps connect users with MS partners independent software vendors offering their solutions and services
Down
- smartphone face and voice recognition is an example of
- Azure uses this technology to repeats it on massive scale in Microsoft data centre across the world
- This computing environment combines a public cloud and a private cloud by allowing data and applications to be shared between them
6 Clues: smartphone face and voice recognition is an example of • This helps Cloud-based applications to take advantage of autoscaling • This application of Microsoft has reached 115 million daily active users • Azure uses this technology to repeats it on massive scale in Microsoft data centre across the world • ...
Unscramble the Prize: Round 2 2021-02-23
Across
- A python library released by google for fast numerical computing
- A generalized name for a clueless or new developer
Down
- A defensive technology designed to keep the bad guys out.
- It breaks the problem into smaller pieces to make it easy for programme to convert it into a actual program
- A bug that, when an attempt to fix, introduces two new bugs
- It is a common type of file compression . It is useful for backing up files and reducing the size of data transferred over the internet.
6 Clues: A generalized name for a clueless or new developer • A defensive technology designed to keep the bad guys out. • A bug that, when an attempt to fix, introduces two new bugs • A python library released by google for fast numerical computing • It breaks the problem into smaller pieces to make it easy for programme to convert it into a actual program • ...
Memory and storage crossword 2022-11-09
Across
- Solid state drives, SD cards, and USB drives are all examples of _______ storage.
- Storage devices which store programs and files whilst the computer is switched-off are known as _________ storage devices.
- RAM and ROM are both examples of this type of storage.
- CDs, DVDs, and Blu-ray Disks are all examples of ___________ storage.
Down
- Hard disk drives, floppy disks, and tape are all examples of ___________ storage.
- RAM is an example of ____________ storage, as data is lost when the computing device is switched-off.
6 Clues: RAM and ROM are both examples of this type of storage. • CDs, DVDs, and Blu-ray Disks are all examples of ___________ storage. • Hard disk drives, floppy disks, and tape are all examples of ___________ storage. • Solid state drives, SD cards, and USB drives are all examples of _______ storage. • ...
Computer Hardware 2019-10-27
Across
- a small rodent that typically has a pointed snout, relatively large ears and eyes, and a long tail.
- a panel of keys that operate a computer or typewriter
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity
Down
- the main printed circuit board (PCB) in a computer.
- the cabinet that contains the computer's power supply, motherboard, memory, disk drives and other peripheral control units
- the hardware in a computing device where the operating system
6 Clues: the main printed circuit board (PCB) in a computer. • a panel of keys that operate a computer or typewriter • the hardware in a computing device where the operating system • a small rodent that typically has a pointed snout, relatively large ears and eyes, and a long tail. • ...
Storage virtualization 2018-05-02
Across
- __________ cloud is one where the cloud has been organized to serve a common function or purpose.
- Security methods such as private encryption, VLANs and firewalls comes under __________ subject area.
- The ________ cloud infrastructure is operated for the exclusive use of an organization.
- _______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.
- A ________ Level Agreement (SLA) is the contract for performance negotiated between you and a service provider.
- How many types of security boundary values exist in Cloud Cube model.
Down
- ________ is surely an impediment to established businesses starting new enterprises.
- Cloud computing is a _______ system and it is necessarily unidirectional in nature.
- When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model.
- How many types of service model are mainly present in Cloud ?
10 Clues: How many types of service model are mainly present in Cloud ? • How many types of security boundary values exist in Cloud Cube model. • Cloud computing is a _______ system and it is necessarily unidirectional in nature. • ________ is surely an impediment to established businesses starting new enterprises. • ...
COMPUTER SCIENCE 01 2022-07-06
Across
- A computer program that transforms computer code written in one programming language (the source language) into another programming language (the target language).
- An unambiguous specification of how to solve a class of problems
- A piece of computer hardware or software that accesses a service made available by a server.
- A basic unit of information used in computing and digital communications
- is a computer program that runs as a background process, rather than being under the direct control of an interactive user.
- The maximum rate of data transfer across a given path.
Down
- a language construct that specifies properties of an identifier
- the practice and study of techniques for secure communication in the presence of third parties called adversaries.
- The procedures implemented in starting up a computer or computer appliance until it can be used.
- The study of abstract machines
10 Clues: The study of abstract machines • The maximum rate of data transfer across a given path. • a language construct that specifies properties of an identifier • An unambiguous specification of how to solve a class of problems • A basic unit of information used in computing and digital communications • ...
Technology 2023-04-26
Across
- A set of rules or instructions used by a computer program to solve a problem or perform a task.
- Large sets of data that can be analyzed to reveal patterns, trends, and associations.
- The process of creating a virtual version of a computer system or application.
- The process of encoding data to protect its confidentiality and integrity.
- A project management methodology that emphasizes flexibility, collaboration, and iterative development
Down
- The application of artificial intelligence algorithms to enable computers to learn and improve from experience.
- The delivery of computing services over the internet, including storage, servers, and software.
- A security system that monitors and controls incoming and outgoing network traffic.
- An abbreviation for "Application Programming Interface," which allows software applications to communicate with each other.
- A decentralized and secure database that maintains a continuously growing list of records or transactions.
10 Clues: The process of encoding data to protect its confidentiality and integrity. • The process of creating a virtual version of a computer system or application. • A security system that monitors and controls incoming and outgoing network traffic. • Large sets of data that can be analyzed to reveal patterns, trends, and associations. • ...
Food Preservation 2022-12-04
Across
- is a complex starch derived from plant
- is a board category of all monosaccharides and disaccharides: the simplest carbohydrate
- substances with ph below 7 that can break down to release hydrogen ions.
- a system that connects two or more computing devices for transmitting and sharing information.
- viscoelastic substances capable of modifying the textures and consistency of Batters, Doughs and Coatings
- a small sweet blue-black edible berry that grows in clusters on North American shrubs related to the bilberry.
- an oval fruit that has a thick, yellow skin and sour juice
Down
- an aromatic variety of citrus. As the name implies, the tree produces highly bitter and tart fruits.
- stone fruits, which means their seeds are encased in a hard shell or pit.
- a layered structure indicating what kind of programs can or should be built and how they would interrelate.
10 Clues: is a complex starch derived from plant • an oval fruit that has a thick, yellow skin and sour juice • substances with ph below 7 that can break down to release hydrogen ions. • stone fruits, which means their seeds are encased in a hard shell or pit. • is a board category of all monosaccharides and disaccharides: the simplest carbohydrate • ...
Word Hike 2023-10-08
Across
- An error or flaw in a program that causes it to behave unexpectedly.
- The process of converting information into a code to protect it from unauthorized access.
- Mathematical operations such as addition, subtraction, multiplication, and division.
- A sequence of characters, used to represent text or data in code.
Down
- A category that defines the kind of data a variable can hold, such as integers, text, or floating-point numbers.
- The delivery of computing services, such as storage, processing, and networking, over the internet.
- The result or data produced by a program, typically displayed to the user.
- A programming construct that repeats a set of instructions until a specific condition is met
- A computer or software program that provides services to other computers or clients over a network.
- An instance of a class in object-oriented programming.
10 Clues: An instance of a class in object-oriented programming. • A sequence of characters, used to represent text or data in code. • An error or flaw in a program that causes it to behave unexpectedly. • The result or data produced by a program, typically displayed to the user. • Mathematical operations such as addition, subtraction, multiplication, and division. • ...
CEA201-4 2025-11-04
Across
- The opposite of RISC, this processor design includes a large and complex set of instructions.
- What architecture stores both data and instructions in the same memory?
- The main component that executes instructions and performs arithmetic and logic operations in a computer.
- Abbreviation for the set of instructions visible to the programmer that defines how software communicates with hardware.
Down
- The shared communication pathway that connects CPU, memory, and I/O devices.
- What type of computing provides infrastructure, platforms, and software as services over the internet?
- What popular RISC-based architecture is widely used in mobile and embedded devices?
- What part of the CPU performs arithmetic and logical operations?
- What type of processor design uses a small set of simple instructions executed very quickly?
- What small, fast memory stores copies of frequently accessed data to improve performance?
10 Clues: What part of the CPU performs arithmetic and logical operations? • What architecture stores both data and instructions in the same memory? • The shared communication pathway that connects CPU, memory, and I/O devices. • What popular RISC-based architecture is widely used in mobile and embedded devices? • ...
Scavenger hunt dos 2022-04-27
4 Clues: who's called the father of computing? • you can store stuff on it, do backups, and whatever • physical parts of the computer are in one word called a... • how do you call a computer inside a computer that thinks he's an independent computer?
Surprise Quiz 4 2022-06-15
Across
- computing Data backup and storage of data are main benefits of ___.
- The process of adding transactional details to the present digital/public ledger is called ___.
- A 3D model is made by hundreds or thousands of layers .
- clouds are used to keep the strategic operations and other reasons secure.
Down
- 3D printing is ____ manufacturing is a process of making three dimensional solid objects from a digital file.
5 Clues: A 3D model is made by hundreds or thousands of layers . • computing Data backup and storage of data are main benefits of ___. • clouds are used to keep the strategic operations and other reasons secure. • The process of adding transactional details to the present digital/public ledger is called ___. • ...
Graphics 2023-07-02
computer network puzzle 2023-02-07
Across
- interconnected computing devices that can exchange data and share resources with each other.
- a set of physical or network devices that are essential
Down
- used to connect one network device to other network devices or to connect two or more computers
- an established set of rules that determine how data is transmitted between different devices in the same network.
- receives and sends data on computer networks.
- a physical layer networking device which is used to connect multiple devices in a network.
- messages distributed by electronic means from one computer user to one or more recipients via a network.
7 Clues: receives and sends data on computer networks. • a set of physical or network devices that are essential • a physical layer networking device which is used to connect multiple devices in a network. • interconnected computing devices that can exchange data and share resources with each other. • ...
Crown - Reading Pass Intro - Unit 6 Cloud Computing 2018-10-05
Across
- Change something (verb) (s)
- Benefit; good point (a)
- In short; basically (i,a,n)
- Tens of years (d)
- Opens; reveals; frees (u)
- Lots of; many (s,o)
- Not anymore; eg: Fred ___ _______ lives in London (n,L)
- Keep in memory (s)
- Expensive (c)
- Things you use to do a job; eg: Screwdrivers or pieces of software (t)
Down
- Electronic instrument; eg: A tablet (d)
- Separate people (i)
- Sorting and analyzing information (d,p)
- Connected to; unable to get away from (t,t)
- One at a time; one after another (o,b,o)
- Private; not for work (p)
- On the Internet; eg: I bought this tennis racket _______ (o)
- Small jobs (t)
18 Clues: Expensive (c) • Small jobs (t) • Tens of years (d) • Keep in memory (s) • Separate people (i) • Lots of; many (s,o) • Benefit; good point (a) • Private; not for work (p) • Opens; reveals; frees (u) • Change something (verb) (s) • In short; basically (i,a,n) • Electronic instrument; eg: A tablet (d) • Sorting and analyzing information (d,p) • One at a time; one after another (o,b,o) • ...
Topic 4 : Operating System 2021-11-02
Across
- _____ used to integrates the desktop OS with its mobile OS.
- Chrome OS is a ____ operating system designed to work primarily with web apps.
- ______ systems typically provide a means to establish Internet connection.
- The operating system on mobile devices and many consumer electronics is called a ____ operating system.
- Identifies and eliminates nonessential files can be one of the functions of?
- ______ developed by Microsoft, is a proprietary mobile operating system that runs on some applications.
- A ____ controls how you enter data and instruction and how information is displayed on the screen.
Down
- The goal of the Operating system is to ______ the work.
- ________ are specialized programs designed to make computing error.
- Windows, macOS, UNIX, Linux, and Chrome OS are in the category of ____.
- Operating system is resource ______ which allocates memory resources.
- _____ mode saves any open documents and running programs/apps to an internal hard drive before removing power from the computer/device.
- Android is an ______, Linux-based mobile operating system designed by Google for smartphones and tablets.
- ____ is a multitasking operating system developed in the early 1970s.
14 Clues: The goal of the Operating system is to ______ the work. • _____ used to integrates the desktop OS with its mobile OS. • ________ are specialized programs designed to make computing error. • Operating system is resource ______ which allocates memory resources. • ____ is a multitasking operating system developed in the early 1970s. • ...
VOCABULARY 11 2012-11-14
Across
- refers to software that is developed, tested, or improved through public collaboration and distributed with the idea that the must be shared with others
- These tell the computer what mathematical operation to perform…(+, -, *, /)
- Personal digital assistant is a term for any small mobile hand-held device that provides computing and information
- These display information…(monitor or printer)
- unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user
- Places the contents of the clipboard onto a document
Down
- Small dots that make up bitmap graphics
- An organized list of items that could be included in a report
- Special graphics fill that includes lines or other shapes
- manages all the other programs in a computer. The other programs are called applications.
- Displays the margins and paper edges
- Graphic tools that change the order of objects in the stack…(baring to front or send to back)
- Measurement used to define the line thickness of a graphic object
- to steal and pass off (the ideas or words of another) as one's own
14 Clues: Displays the margins and paper edges • Small dots that make up bitmap graphics • These display information…(monitor or printer) • Places the contents of the clipboard onto a document • Special graphics fill that includes lines or other shapes • An organized list of items that could be included in a report • ...
Budding Analytics - Quiz 2017-09-21
Across
- _________ is an open-source software framework used for distributed storage and processing of dataset of big data
- GE's IOT platform for the collection and analysis of data from industrial machines
- Genpact's AI-based platform for digital transformation
- _____ is a cloud computing model that delivers applications over the Internet
- __________is intelligence exhibited by machines
- ____ is a process automation technology based software robots or artificial intelligence (AI) worker
- _______ is one of the programming language used for Web scrapping
- ______is the network of physical items embedded with electronics, software, sensors and network connectivity which enable these objects to collect and exchange data
Down
- _________ enables the creation of mobile solutions for enterprise customers
- ________ modelling is a process that uses data mining and probability to forecast outcomes
- _______________ empowers computers with the ability to learn, without being explicitly programmed
- ____________ team has set itself apart in terms of driving digitization on the floor and adopting various digital technologies in their processes/ creating POCs resulting in customer delight.
- _______________ is interdisciplinary field about scientific methods, processes, and systems to extract knowledge or insights
- one of the Data Visualisation application
14 Clues: one of the Data Visualisation application • __________is intelligence exhibited by machines • Genpact's AI-based platform for digital transformation • _______ is one of the programming language used for Web scrapping • _________ enables the creation of mobile solutions for enterprise customers • ...
GRM 2019-12-11
Across
- A powerful data visualization tool that is heavily used across PwC
- The PwC value that asks everyone to make the effort to understand every individual
- Happy new year in Gaelic
- Name of the Global Chairman of PwC
- Unconscious biases that can narrow your vision and potentially influence your behaviors.
- The Network financing entity which was established to provide funding and other financial products to PwC firms
- Set of cloud computing, productivity and collaboration tools, software and products developed by Google
Down
- Where you go for approval from the PwC Business Trust for new websites and apps, and other new assets
- Preference or prejudice for or against something
- Name of the monthly newsletter that comes from the Brand team
- System of music and sound that can help us express PwC’s unique personality
- A meditation and relaxation phone app
- This entity is the owner of the PwC name, logo and related trademarks (collectively the name)
- The GRM team that identifies, assesses, and prepares for any dangers, hazards, and other potentials for disaster—both physical and figurative—that may interfere with the organization's operations and objectives
14 Clues: Happy new year in Gaelic • Name of the Global Chairman of PwC • A meditation and relaxation phone app • Preference or prejudice for or against something • Name of the monthly newsletter that comes from the Brand team • A powerful data visualization tool that is heavily used across PwC • System of music and sound that can help us express PwC’s unique personality • ...
study guide 2013-05-30
Across
- _____is 8 bits
- files digitize audio waveform information at a user specified sampling rate and can be played on any windows computer that supports sound
- clicking the _______ button in internet explore loads the same web pagethat appears in the browser window again
- after going to each hyperlink you can click the ____ button on your web browser to return the results page
- when you create a new message in ____ the insertion point is positioned in the To feild
Down
- a web browers _____ bar shows the name of the open web page
- you can use the _______ to enter the URLs directly into the navigator
- graphics files in the ______ domain do not present a copyright violation
- In computing ___ is a file extension for word processing documents
- on most computers the filename extension of an HTML document is html and ___
10 Clues: _____is 8 bits • a web browers _____ bar shows the name of the open web page • In computing ___ is a file extension for word processing documents • you can use the _______ to enter the URLs directly into the navigator • graphics files in the ______ domain do not present a copyright violation • ...
Fundamentals of Computer Systems 2014-09-18
Across
- Perfect representation of an entire CD, DVD, or BD. The entire contents of a disc can be precisely duplicated in a single file.
- Legal control over access to and use of data stored in computers.
- A legal right created by the law of a country, that grants the creator of an original work exclusive rights to its use and distribution.
- This is when technology is consistent.
- When something is deleted it ends up in the...
Down
- A network of social interactions and personal relationships.
- A computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
- The Computer Misuse Act is designed to protect computer users against wilful attacks and theft of information.
- Systems that provide some combination of interoperability, portability, and open software standards.
- The state of being free from public attention.
10 Clues: This is when technology is consistent. • The state of being free from public attention. • When something is deleted it ends up in the... • A network of social interactions and personal relationships. • Legal control over access to and use of data stored in computers. • ...
Technology 2024-01-21
Across
- (n) a small portable computer that accepts input directly on to its screen rather than via a keyboard or mouse.
- (n) to provide memory and storage for electronic devices.
- (v) (of a computer, computing system, or software) fail suddenly.
- (v) load (software) into a computer.
- (n) a container consisting of one or more cells, in which chemical energy is converted into electricity and used as a source of power.
Down
- (n) a small external flash drive that can be used with any computer that has a USB port.
- (n) a device for recording visual images in the form of photographs, film, or video signals.
- (v) go through the procedures to begin using a computer, database, or system.
- (n) navigation dependent on information received from satellites.
- (n) a portable computer that is small enough to use on one's lap.
10 Clues: (v) load (software) into a computer. • (n) to provide memory and storage for electronic devices. • (n) navigation dependent on information received from satellites. • (v) (of a computer, computing system, or software) fail suddenly. • (n) a portable computer that is small enough to use on one's lap. • ...
Informātika 2024-01-22
Across
- autentifikācija: Drošības sistēma, kas izmanto cilvēka fiziskās īpašības, piemēram, pirkstu nospiedumus vai sejas atpazīšanu, lai apstiprinātu identitāti.
- Computing: Datu uzglabāšana un apstrāde tiešsaistē, izmantojot attālinātus serverus, kas pieejami internetā.
- Konkurējošs videospēļu spēlēšanas veids, kurā tiek rīkotas sacensības un turnīri ar profesionāliem spēlētājiem.
- Drošības sistēma, kas aizsargā datoru vai tīklu, bloķējot nelegālu piekļuvi vai kaitīgu programmatūru.
Down
- Datorizēts vai simulēts vides elements, kas pēc iespējas reālistiski atdarina reālu pasauli.
- un baits: Pamata informācijas vienības datoros; bits ir nulles vai vieninieka vērtība, bet baits ir astoņi biti.
- Procesa, kurā cilvēks raksta datorvalodas kodu, lai radītu programmu vai lietotni.
- realitāte (AR): Tehnoloģija, kas papildina reālo pasauli ar datora ģenerētām informācijas vai objektu pārklāšanu.
- Pamata būvētājviela programmēšanai, sērija no solītiem vai norādēm, kas veic konkrētu uzdevumu vai apraksta procesu.
- Sasaiste starp lietotāju un datoru, nodrošinot veidu, kā lietotājs mijiedarbojas ar datorprogrammām vai ierīcēm.
10 Clues: Procesa, kurā cilvēks raksta datorvalodas kodu, lai radītu programmu vai lietotni. • Datorizēts vai simulēts vides elements, kas pēc iespējas reālistiski atdarina reālu pasauli. • Drošības sistēma, kas aizsargā datoru vai tīklu, bloķējot nelegālu piekļuvi vai kaitīgu programmatūru. • ...
Technology Advancements of the 1960s 2024-01-14
Across
- Breakthrough technology in computing, allowing the execution of multiple tasks simultaneously.
- The first human spaceflight by Yuri Gagarin in 1961 marked a milestone in this space program.
- This space agency was established in 1961 and played a key role in space exploration.
- Advanced navigation system developed by the U.S. Department of Defense in the 1960s.
Down
- The first successful deployment of this communication satellite system occurred in 1965.
- The invention of this technology in the 1960s paved the way for the development of the Internet.
- Landmark computer programming language developed in the early 1960s.
- First successful demonstration of this computer input device, crucial for graphic design.
- Developed in the 1960s, this early form of the computer mouse used wheels and rollers.
- The first successful demonstration of this type of computer mouse occurred in the 1960s.
10 Clues: Landmark computer programming language developed in the early 1960s. • Advanced navigation system developed by the U.S. Department of Defense in the 1960s. • This space agency was established in 1961 and played a key role in space exploration. • Developed in the 1960s, this early form of the computer mouse used wheels and rollers. • ...
Tema informatica 2 2024-05-15
Across
- Provine de la expresia: „Yet Another Hierarchical Officious Oracle".
- O retea imensa raspandita pe suprafata unui oras.
- Un browser web multiplataforma creat și dezvoltat de Microsoft .
- Retea fara fir daca sunt utilizate undele radio drept mediu fizic.
- Sinonim cu navigator web.
Down
- Home Phoneline Networking Alliance.
- Browser web realizat de firma Apple pentru sistemul său de operare Mac OS X, dar și pentru MS Windows.
- O corporație multinațională americană și o companie de tehnologie care se concentrează pe publicitate online, tehnologia motoarelor de căutare, cloud computing, software de calculator, calcul cuantic, comerț electronic, electronice de consum și inteligență artificială (IA).
- Un program care furnizează servicii altor aplicații (numite aplicații client), aflate pe același calculator sau pe calculatoare diferite.
- O reteaua locala de calculatoare si reprezinta un ansamblu de mijloace de transmisiune si de sisteme de calcul folosite pentru transportarea si prelucrarea informatiilor.
10 Clues: Sinonim cu navigator web. • Home Phoneline Networking Alliance. • O retea imensa raspandita pe suprafata unui oras. • Un browser web multiplataforma creat și dezvoltat de Microsoft . • Retea fara fir daca sunt utilizate undele radio drept mediu fizic. • Provine de la expresia: „Yet Another Hierarchical Officious Oracle". • ...
Scientific and Technological Innovations 2025-04-14
Across
- ethics : The branch of philosophy that studies moral issues related to artificial intelligence and its applications.
- energy : Energy derived from natural sources that are replenished constantly, such as solar or wind power.
- : The practice of protecting systems, networks, and data from digital attacks.
- materials : Substances that change their properties in response to external conditions like temperature or pressure.
- : The science of manipulating matter on an atomic or molecular scale.
Down
- : A decentralized digital ledger technology used for securely recording transactions.
- : A form of 3D printing that uses living cells to create tissues and potentially organs.
- reality : A simulated experience that can be similar to or completely different from the real world.
- : The branch of technology concerned with the design, construction, and operation of robots.
- computing : A revolutionary technology that uses quantum mechanics to process information at incredible speeds.
10 Clues: : The science of manipulating matter on an atomic or molecular scale. • : The practice of protecting systems, networks, and data from digital attacks. • : A decentralized digital ledger technology used for securely recording transactions. • : A form of 3D printing that uses living cells to create tissues and potentially organs. • ...
Computing CPU, MEMORY and more 2015-05-07
Across
- What does the U stand for in CPU
- the code that gives letters and symbols a value A=65
- 6F is an example of this
- the name given to the only language that computers understand
Down
- the type of memory that is on a CD or DVD
- What is the value of a single 1 or 0
- What type of memory would you expect to find in a mobile phone
- what is 8 bits
8 Clues: what is 8 bits • 6F is an example of this • What does the U stand for in CPU • What is the value of a single 1 or 0 • the type of memory that is on a CD or DVD • the code that gives letters and symbols a value A=65 • the name given to the only language that computers understand • What type of memory would you expect to find in a mobile phone
Defining Information Technology - Jargon List 2013-12-30
Across
- An aid for remembering something in which a pattern of letters is used; e.g., using the letters HOMES to remember the names of the Great Lakes.
- content that is created by visitors to a site.
- The programs that instruct computers in the steps needed to implement applications.
- A process to recognize the common idea in two or more situations; to express an idea, concept, or process that applies to many situations.
- A precise, systematic method for producing a specific result.
- ________________ attuned: The ability to apply what we know about a device or system to simplify its use or repair.
- A world that doesn't exist, but which we experience.
Down
- The oldest form of information technology.
- Junk mail
- In its most general form it includes hardware, software, and "the experience."
- An organized collection of data.
- Content that is produced for commercial purposes which is entirely controlled by the originating organization or person.
- Parables and fables are examples.
- It is easy to enhance or embellish this type of information which is an extremely accurate approximation of reality.
14 Clues: Junk mail • An organized collection of data. • Parables and fables are examples. • The oldest form of information technology. • content that is created by visitors to a site. • A world that doesn't exist, but which we experience. • A precise, systematic method for producing a specific result. • ...
Brecklyn and Aanika 2024-01-09
Across
- Data that is being sent from a program to a device can come in many different forms such as tactile interaction, audio, visuals, or text
- Ten options used in representing information
- Data sent to a computer to have processing be done by a program. It can come in many different forms like tactile interaction, audio, visuals, or text
- An individual value in a list that is assigned a unique index
- Two options used in representing information
- A combination of operators along with values that makes a single value
- Multiple connections between computing devices on a network that starts with a sender ad ends with a receiver
Down
- Collection facts and patterns taking from data
- Data about data
- A named group of programming instructions. Also referred to as a “procedure”.
- Large amount of data sent over a network. Bigger messages get divided into packets that can arrive at the destination in or out of order
- A value being passed to the parameter
- Procedures that can be used in making new programs
- Elements in an ordered collection
14 Clues: Data about data • Elements in an ordered collection • A value being passed to the parameter • Ten options used in representing information • Two options used in representing information • Collection facts and patterns taking from data • Procedures that can be used in making new programs • An individual value in a list that is assigned a unique index • ...
Lewis's Hardware Crossword 2019-01-10
Across
- used to keep work on your computer.
- memory stick
- a rigid non-removable magnetic disk with a large data storage capacity.
- A phone that combines computing,telephone/fax, and networking features and you can play games on it
- and remembers things on you computer.
- (pronounced ramm) is an acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes.
- thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- rigid non-removable magnetic disk with a large data storage capacity.
Down
- to get around quicker.
- formal request to be considered for a position or to be allowed to do or have something, submitted to an authority, institution, or organization.
- television receiver used in a studio to select or verify the picture being broadcast from a particular camera.
- rigid non-removable magnetic disk with a large data storage capacity.
- programs and other operating information used by a computer.
- and paste:something to copy a phrase onto something else.
- round object to put something on a screen.
15 Clues: memory stick • to get around quicker. • used to keep work on your computer. • and remembers things on you computer. • round object to put something on a screen. • and paste:something to copy a phrase onto something else. • programs and other operating information used by a computer. • rigid non-removable magnetic disk with a large data storage capacity. • ...
Jennier's Hardware crossword 2019-01-10
Across
- -The Central Processing Unit is the BRAIN of the computer. Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place
- -Another term for display screen.
- -A device that controls the movement of the cursor or pointer on a display screen.
- -The main circuit board of a microcomputer.
- -A silicon chip that contains a CPU.
Down
- -A device that can read text or illustrations printed on paper and translate the information into a form the computer can use.
- -A device that feeds data into a computer, such as a keyboard or mouse.
- -A type of printer that utilizes a laser beam to produce an image on a drum.
- -Internal storage areas in the computer.
- -The set of typewriter-like keys that enables you to enter data into a computer.
- -Universal Service Bus; a type of port on the computer to attach peripherals.
- -A phone that combines computing,telephone/fax, and networking features
- -magnetic disk on which you can store computer data.
- -A device that controls the movement of the cursor or pointer on a display screen.
- -An expansion board that enables a computer to manipulate and output sounds.
15 Clues: -Another term for display screen. • -A silicon chip that contains a CPU. • -Internal storage areas in the computer. • -The main circuit board of a microcomputer. • -magnetic disk on which you can store computer data. • -A device that feeds data into a computer, such as a keyboard or mouse. • -A phone that combines computing,telephone/fax, and networking features • ...
Digital Technology 2 2022-12-16
Across
- the type of file that has been created or svaed by an application
- free cloud storage servuce that is intergrated with the company's other services and systems
- the practice of expanding the number of ones business and or social contacts by making connections through individuals.
- includes computer networks that are connected over the internet for server redundancy or cluster computing purpoes
- internet fraud in the form of emails or pop up messages to lure users into providing information
Down
- the use of email and text to harass and threaten a person.
- a computer file like an image, video or document which can be included in and email or shared
- something in a computer that helps organize files and documents
- free web based aplication in which documents and spreadsheets can be created and edited
- online journals which create interaction from readers.
- a conrainer in a computer used for storing information.
- the applied science of equipment design.
- precautions used to protect your computer and network as well as your transmitted data.
- website that allows users to add and update content on the site using their own web browser.
14 Clues: the applied science of equipment design. • online journals which create interaction from readers. • a conrainer in a computer used for storing information. • the use of email and text to harass and threaten a person. • something in a computer that helps organize files and documents • the type of file that has been created or svaed by an application • ...
The E-Commerce Puzzle 2025-05-07
Across
- computing Using Internet service to store, data, and run software, instead of local computers
- economy A job market with short term or freelance work instead of full-time Jobs
- chain Process of making plus delivering products
- A unique code that helps businesses identify and attract each product
- the products/materials a business keeps in stock to sell customers
- channel Path a product takes from the seller to the buyer
Down
- rate Percentage of website, visitors who make a purchase or complete a desired action
- per click Online advertising model where businesses pay when people click on their ad
- Technology that shows exact location used in delivery tracking for E-commerce
- in time A strategy where companies get supplies only when needed reducing storage costs
- The part of a website or app that users interact with
- Steps taken to help a website appear higher in search engine results
- A wireless system that uses tags to track products and inventory
- How easy and enjoyable and effective a website or app is for users
14 Clues: chain Process of making plus delivering products • The part of a website or app that users interact with • channel Path a product takes from the seller to the buyer • A wireless system that uses tags to track products and inventory • the products/materials a business keeps in stock to sell customers • ...
Fundamentals of Computer Systems 2014-09-18
Across
- Perfect representation of an entire CD, DVD, or BD. The entire contents of a disc can be precisely duplicated in a single file.
- Legal control over access to and use of data stored in computers.
- A legal right created by the law of a country, that grants the creator of an original work exclusive rights to its use and distribution.
- This is when technology is consistent.
- When something is deleted it ends up in the...
Down
- A network of social interactions and personal relationships.
- A computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
- The Computer Misuse Act is designed to protect computer users against wilful attacks and theft of information.
- Systems that provide some combination of interoperability, portability, and open software standards.
- The state of being free from public attention.
10 Clues: This is when technology is consistent. • The state of being free from public attention. • When something is deleted it ends up in the... • A network of social interactions and personal relationships. • Legal control over access to and use of data stored in computers. • ...
Test out chapter 1 2023-04-12
Across
- act of hacking, or breaking into a computer system, for politically or socially motivated purposes.
- principles that govern a person's behavior or the conducting of an activity.
- the study and practice of environmentally sustainable computing or IT
- theory and development of computer systems able to perform tasks that normally require human intelligence,
- dark and bad side of the web
- the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information.
Down
- using the internet where you work, during working hours, for activities that are not related to work.
- creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
- the study of computation, automation, and information
- a combination of software, hardware, and telecommunication networks to collect useful data, especially in an organization.
10 Clues: dark and bad side of the web • the study of computation, automation, and information • the study and practice of environmentally sustainable computing or IT • principles that govern a person's behavior or the conducting of an activity. • act of hacking, or breaking into a computer system, for politically or socially motivated purposes. • ...
Nnn 2025-02-05
Across
- – A handheld device that combines a mobile phone with internet access and apps.
- – A system of interconnected computers or devices that share resources and information.
- – A device in space used for communication, navigation, and weather monitoring.
- – The process of converting information into a secure code to prevent unauthorized access.
- – A wireless technology that allows devices to connect to the internet without cables.
Down
- – A global network that connects millions of computers for communication and information exchange.
- – A tiny electronic component used in computers and digital devices to process information.
- – A device that transmits moving images and sound, commonly used for entertainment and news.
- – The act of transmitting information, such as radio or television signals, to a large audience.
- – A step-by-step set of rules or instructions for solving a problem, often used in computing.
10 Clues: – A handheld device that combines a mobile phone with internet access and apps. • – A device in space used for communication, navigation, and weather monitoring. • – A wireless technology that allows devices to connect to the internet without cables. • – A system of interconnected computers or devices that share resources and information. • ...
Nnn 2025-02-05
Across
- – A handheld device that combines a mobile phone with internet access and apps.
- – A system of interconnected computers or devices that share resources and information.
- – A device in space used for communication, navigation, and weather monitoring.
- – The process of converting information into a secure code to prevent unauthorized access.
- – A wireless technology that allows devices to connect to the internet without cables.
Down
- – A global network that connects millions of computers for communication and information exchange.
- – A tiny electronic component used in computers and digital devices to process information.
- – A device that transmits moving images and sound, commonly used for entertainment and news.
- – The act of transmitting information, such as radio or television signals, to a large audience.
- – A step-by-step set of rules or instructions for solving a problem, often used in computing.
10 Clues: – A handheld device that combines a mobile phone with internet access and apps. • – A device in space used for communication, navigation, and weather monitoring. • – A wireless technology that allows devices to connect to the internet without cables. • – A system of interconnected computers or devices that share resources and information. • ...
Introduction to Human Resource Management- Topics 1-5 2022-10-04
Across
- people are referred by an external party for a job, interview or position
- practice of having another company provide services
- moving operations from a country where a company is headquartered to a country with lower pay rates and increased availability of necessary skills
- fundamental principles of what is right and wrong
- procedure is informed by concerns of all group members and stakeholders affected by the decision
Down
- applying different standards and treatment to different groups of employees
- process of ensuring employees' activities and outputs match the organization's goals
- employees who take assignments in other countries
- type of harassment, when harassment is a condition of employment. Job benefits and pay increase are made continent on the provision of sexual favors
- process of computing exact ratio between specific business factors and number of employees needed in order to predict future HR demand.
10 Clues: employees who take assignments in other countries • fundamental principles of what is right and wrong • practice of having another company provide services • people are referred by an external party for a job, interview or position • applying different standards and treatment to different groups of employees • ...
QUIZ P1 2025-09-11
Across
- It is a measure of how quickly work is done.
- A strong grasp of _________ concepts is essential for innovation and problem-solving in computing, automation, and various engineering disciplines.
- It is the 'pressure' that drives current.
- It is the physical quantity measured in candela (cd).
- Common voltage standards for microcontrollers include 5V and 3.3V. The device used to safely bridge mismatched voltage levels is called a ________.
Down
- This basic property determines how much current will pass through a component when a certain voltage is applied across it.
- It is the unit of charge.
- It measures how effectively a system converts input power into useful output, minimizing losses.
- The International System of Units (SI) is built upon _________ defining base units, which are the foundation of all measurements.
- This is the temperature unit most widely used in the Philippines.
10 Clues: It is the unit of charge. • It is the 'pressure' that drives current. • It is a measure of how quickly work is done. • It is the physical quantity measured in candela (cd). • This is the temperature unit most widely used in the Philippines. • It measures how effectively a system converts input power into useful output, minimizing losses. • ...
TEL Newsletter - December Fun Zone Crossword 2025-12-15
Across
- IBM’s global learning and engagement event that “took South Africa by storm” in 2025.
- IBM Cloud Pak for Data, highlighted for AI-driven analytics and hybrid cloud enablement.
- The organization at the center of delivery, adoption, innovation, and client impact in 2025.
- IBM’s flagship AI platform featured across challenges, orchestration, BI, and client success stories.
- Expert Labs’ partner-driven approach, showcased through sales win stories and collaboration.
- IBM’s asset management suite behind major wins like Volkswagen South Africa and SOCAR Türkiye.
Down
- Next-generation computing spotlighted through IBM Quantum System Two and IBM–AMD collaboration.
- The Expert Labs team that advanced to Phase 2 of the 2025 IBMer watsonx Challenge.
- A key 2025 focus outlining how Expert Labs uses AI securely, legally, and ethically.
- IBM’s GRC solution awarded a Stevie Silver after a successful Türkiye delivery.
10 Clues: IBM’s GRC solution awarded a Stevie Silver after a successful Türkiye delivery. • The Expert Labs team that advanced to Phase 2 of the 2025 IBMer watsonx Challenge. • A key 2025 focus outlining how Expert Labs uses AI securely, legally, and ethically. • IBM’s global learning and engagement event that “took South Africa by storm” in 2025. • ...
Computer science 2024-04-17
Across
- A processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- The process of identifying someone's or something's identity
- The large system of connected computers around the world that allows people to share information and communicate with each other
- An Internet Protocol that allocates numbers to router servers, or anything connected to the Internet
Down
- A piece of audio or video that has been altered and changed to make it seem authentic or credible
- The delivery of computing servers, storage, databases, networking, software, analytics, and intelligence
- A network of computers used to carry out cyberattacks on other systems
- A means to support network communication using radio waves rather than cables
8 Clues: The process of identifying someone's or something's identity • A network of computers used to carry out cyberattacks on other systems • A means to support network communication using radio waves rather than cables • A piece of audio or video that has been altered and changed to make it seem authentic or credible • ...
virus Juliana Ray 2018-11-19
Across
- a virus that floods the network
- messages distributed by electronic means from one computer user to one or more recipients via a network
- software that allows people to make "telephone calls" over the Internet; the person sending the call can see the person receiving the call.
- (computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
- a type of virus after a greek myth
- the programs and other operating information used by a computer.
- To bring to life
- Messaging Online communication that allows two or more participants to communicate in real time.
- Spoofing
Down
- Bomb A computer program or part of a program that lies dormant until it is triggered by a specific logical event.
- A technique intruders use to make their network or internet transmission appear legitimat
- an unwanted computer
- A software program designed to infiltrate or damage a computer system without the user's informed consent.
- Software A program that finds and removes viruses from a computer.
- a virus that replicates itself
- technique intruders use to make their network or internet transmission appear legitimate.
- A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
17 Clues: Spoofing • To bring to life • an unwanted computer • a virus that replicates itself • a virus that floods the network • a type of virus after a greek myth • the programs and other operating information used by a computer. • Software A program that finds and removes viruses from a computer. • ...
Information Technology 2013-05-07
Across
- is software for designing products with a computer.
- is an arrangement that allows employees to work at home while communicating with the workplace by phone, fax, or modern.
- technology uses computing, electrtonics, and telecommunications to process and distribute information in digital and other forms.
Down
- computer is a small portable computer desgined to be used while it is worn on the body.
- is the transmission of information over communication lines.
- reality is an artificial, three-dimensional visual world created by a computer.
6 Clues: is software for designing products with a computer. • is the transmission of information over communication lines. • reality is an artificial, three-dimensional visual world created by a computer. • computer is a small portable computer desgined to be used while it is worn on the body. • ...
8.4 keywords 2023-05-11
Across
- a computer program written to respond to actions generated by a user or system.
- the process of breaking down a problem into a number of smaller problems that can more easily be addressed.
- a software application developed specifically for use on small, wireless computing devices, such as smartphones and tablets, rather than desktop or laptop computers.
- writing multilingual programs on Unix-like computer operating systems.
Down
- Coding tells a machine which actions to perform and how to complete tasks.
- the process of breaking down a problem into a number of smaller problems that can more easily be addressed.
- data that is entered into or received by a computer.
7 Clues: data that is entered into or received by a computer. • writing multilingual programs on Unix-like computer operating systems. • Coding tells a machine which actions to perform and how to complete tasks. • a computer program written to respond to actions generated by a user or system. • ...
Gavin Koel and Kassidy Sarno 2024-01-09
Across
- A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples
- an ordered sequence of characters
- form of program documentation written into the program to be read by people and which do not affect how a program runs
- a collection of program statements
- A chunk of data sent over a network
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- 8 bits
- A type of computer that forwards data across a network
Down
- the inputs and outputs that allow a user to interact with a piece of software
- compression A process for reducing the number of bits needed to represent something without losing any information
- A way of representing information using ten options
- associated with an action and supplies input data to a program
- Finding and fixing problems in an algorithm or program
- a named reference to a value that can be used repeatedly throughout a program
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
- A way of representing information using only two options
16 Clues: 8 bits • an ordered sequence of characters • a collection of program statements • A chunk of data sent over a network • A way of representing information using ten options • Finding and fixing problems in an algorithm or program • A type of computer that forwards data across a network • A way of representing information using only two options • ...
EUROPEAN WEEK OF LANGUAGES TREASURE HUNT 2019-11-23
Across
- What is the name of Miss Fearon's favourite European city?
- What is the name of Mrs Burton's favourite Spanish dish?
- According to the blue poster in A Block, which language has between 60 and 100 words for rain?
- What was the name of the restaurant that Ms Cartwright ate at in Paris? (2, 5, 4)
- Which European country has Mr Hatton visited the most?
- What is the name of Mr Scott's favourite Spanish dish?
- According to the poster near Mrs Cohen's office, what is the Russian word for someone who asks lots of questions?
- What is Mrs Baldry's favourite kind of French cheese?
- Which European city, mentioned on the signpost in reception, is the greatest distance from Quarrydale Academy (2553km)?
Down
- What is the name of Mrs Pearce’s favourite French dish?
- According to the poster near Computing, what is the fastest spoken language ?
- Where did Mr Walker celebrate his honeymoon?
- According to the poster near B14, learning another language cultivates greater cultural ____________(8 letters)
- When Mr Cooper spoke to a Spanish waitress in Spain, which language did he accidentally use?
- Ms. Peneranda can speak three languages; French, English and ?
- Which country has Mr Danylevych visited 25 times?
16 Clues: Where did Mr Walker celebrate his honeymoon? • Which country has Mr Danylevych visited 25 times? • What is Mrs Baldry's favourite kind of French cheese? • Which European country has Mr Hatton visited the most? • What is the name of Mr Scott's favourite Spanish dish? • What is the name of Mrs Pearce’s favourite French dish? • ...
Cryptography and Hash Function 2023-02-24
Across
- The name of the message returned by hash function
- Unencrypted information
- To refuse to accept something or someone as true, good, or reasonable
- Someone listening to a private conversation without them knowing
- A way to guarantee that the sender of a message cannot later deny having sent the message
- Protecting the information from disclosure to unauthorized parties
- Not able to be understood
Down
- Improbable to happen
- An event that happens when different data inputs generate the same hash value
- A procedure that for a given input value it must always generate the same output
- The process of determining whether someone who it declares itself to be
- An effect/property where if an input is changed slightly (for example, flipping a single bit), the output changes significantly
- It is not realistic to reconstruct the input given the output without spending great amounts of computing time (property).
- The version of hash function that ensures the integrity, authentication and autenticity.
- The name of the function that can be used to map data of arbitrary size to data of fixed size.
- Protecting information from being modified by unauthorized parties
16 Clues: Improbable to happen • Unencrypted information • Not able to be understood • The name of the message returned by hash function • Someone listening to a private conversation without them knowing • Protecting the information from disclosure to unauthorized parties • Protecting information from being modified by unauthorized parties • ...
guess me 2023-06-23
Across
- A fundamental unit of digital information, typically represented as a string of 8 bits.
- The process of finding errors and fixing them in a program.
- A circuit component that stores electrical energy.
- A device used to control or measure the pressure in a system.
- A device that converts electrical energy to mechanical energy.
- A type of force that acts on an object to make it move along a curved path.
- A simple machine consisting of a rigid bar that pivots on a fixed point.
Down
- A surveying instrument used to measure horizontal and vertical angles.
- The current flowing into a node, i.e. a junction in a circuit is be equal to the current flowing out of it. Who gave this law?
- A device that converts digital signals into analog signals.
- A type of bridge that consists of a horizontal beam supported by two or more vertical supports.
- A type of electrical connection where multiple components are connected to a common point.
- A device used to input data into a computer.
- The basic unit of information in computing.
- A way of representing data using only two digits (0 or 1).
- The most common programming language for web development.
16 Clues: The basic unit of information in computing. • A device used to input data into a computer. • A circuit component that stores electrical energy. • The most common programming language for web development. • A way of representing data using only two digits (0 or 1). • The process of finding errors and fixing them in a program. • ...
computing 8y1 carl hiley 2022-03-29
6 Clues: the truth value • a sequence of characters • hold value and cannot be changed • an element or feature ,or factor that is liable to vary or change • a general term for taking each item of something, one after another. • statements are also known as Decision control statements or branching statements
Human Resource Planning- Chapter 5 2023-08-12
Across
- attempts to determine supply and demand for various types of human resources to predict areas within the organization where there will be labor shortage or surplus
- the act of increasing one's rank or status in a company
Down
- practice that involves company hiring a third party to perform tasks and services for a company
- determining future HR demand by computing an exact ratio between the specific business factor and number of employees needed
- planned elimination of personnel designed to improve organization effectiveness
- reduction in one's rank or status
6 Clues: reduction in one's rank or status • the act of increasing one's rank or status in a company • planned elimination of personnel designed to improve organization effectiveness • practice that involves company hiring a third party to perform tasks and services for a company • ...
Robotics Vocabulary Crossword 2022-02-08
Across
- Microcontroller and physical computing platform / Microcontrolador y plataforma de computación física
- pause; controls the speed of your code / pausa controla el rapidez de su circuito
- ______Write turns a device on or off /____Write enciende o apaga un dispositivo
- Begin with // or /* / empieza con // o /*
- measure of current in a circuit / medida del corriente de un circuito
- need one of these after each line of code
Down
- Kind of circuit with a single path for electricity / Tipo de circuito en que hay un solo sendero de electricidad
- measure of power in a circuit / medida del poder del circuito
- connect this side of your circuit to GND / connecta esta lado de tu circuito a GND
- to avoid burning out components in your circuit / para evitar quemar componentes de su circuito
- Pulse Width Modulation / Modulación de Anchura del Pulso
- Light Emitting Diode / diode emisor de luz
- ___'s Law tells us about circuits / este Ley nos ensena sobre circuitos
- _____Write has a range of values between 0-255 /_____Write un rango de valores entre 0-255
14 Clues: Begin with // or /* / empieza con // o /* • need one of these after each line of code • Light Emitting Diode / diode emisor de luz • Pulse Width Modulation / Modulación de Anchura del Pulso • measure of power in a circuit / medida del poder del circuito • measure of current in a circuit / medida del corriente de un circuito • ...
representation 2019-07-11
Across
- rate-the number of bits per second that can be transmitted along a digital network.
- binary digit, or bit, is the smallest unit of data in computing.
- common term for decimal
- used to reduce the size of one or more files.
- perceived value in something
- is the number of pixels (individual points of colour)
Down
- representation in which each item corresponds to one or more bits of information
- to, using, or denoting a system of numerical notation that has 2 rather than 10 as a base.
- range of grey shades from white to black, as used in a monochrome display or printout
- a type of graphical representation using lines to construct the outlines of objects
- unit of graphic resolution equivalent to one million
- minute area of illumination on a display screen, one of many from which an image is composed
- depth-the number of bits used to indicate the colour of a single pixel,
- representation of the eternal form of a person or thing in art
14 Clues: common term for decimal • perceived value in something • used to reduce the size of one or more files. • unit of graphic resolution equivalent to one million • is the number of pixels (individual points of colour) • representation of the eternal form of a person or thing in art • binary digit, or bit, is the smallest unit of data in computing. • ...
