computing Crossword Puzzles
92 Computing 2017-04-26
Across
- A data type which represents ordered values
- Something that allows a random number to be selected
- What it is called when a computer is executing a programme
- A type of diagram that shows a process made by a computer
- A value that can change depending on the conditions or the information given to the programme
- A whole number
- Allows data to be entered into a python programme
Down
- A simplified language used in programme design
- A piece of code that allows something to be repeated a certain number of times
- A decision the programme can make - if something turns out to be true, the programme will carry out the next function
- The part of the computer that gives out information according to the input
- A piece of code that allows something to be endlessly repeated
- A sequence of characters in programming
13 Clues: A whole number • A sequence of characters in programming • A data type which represents ordered values • A simplified language used in programme design • Allows data to be entered into a python programme • Something that allows a random number to be selected • A type of diagram that shows a process made by a computer • ...
Computing Keywords 2014-11-10
Across
- an electronic device that receives and stores data and information .
- a collection of items to data produce information.
- data is made of a sequence 10 this means of .
- step by step instructions to solve a problem .
- this is a thing made for a particular porpoise.
- data that goes into a computer.
Down
- information that comes out of a computer.
- this is a set of data objects stored in a certain place.
- a location connected to the internet
- something tour program needs to remember that might change.
- a set od information/data put into a graph.
- facts and pieces of Information collected together
- find and fix mistakes in a computer program .
13 Clues: data that goes into a computer. • a location connected to the internet • information that comes out of a computer. • a set od information/data put into a graph. • data is made of a sequence 10 this means of . • find and fix mistakes in a computer program . • step by step instructions to solve a problem . • this is a thing made for a particular porpoise. • ...
Cloud Computing 2023-04-05
Across
- a cloud computing fabric controller used in openstack
- Virtualized servers and storage accessible over the internet
- Platform for developing, testing, and deploying applications in the cloud
- The library support system for virtualizing X86 processor to run windows under Linux
- a virtual machine manager/monitor
- Protocol used to access cloud storage services
- Software as a Service
Down
- dividing the resources of a computer into multiple execution environments
- It converts windows system calls running on X86 PC to Solaris system calls
- OpenStack Dashboard
- an array of servers that houses the subscribed application
- Platform as a Service
- Infrastructure as a Service
13 Clues: OpenStack Dashboard • Platform as a Service • Software as a Service • Infrastructure as a Service • a virtual machine manager/monitor • Protocol used to access cloud storage services • a cloud computing fabric controller used in openstack • an array of servers that houses the subscribed application • Virtualized servers and storage accessible over the internet • ...
Josh's crossword 2014-03-06
Across
- address-address of the computer
- browser
- on the computer
- system-collection of software
- service provider
- vast computer network
- computing-internet based computing connected to servers
- devices
- port-universal serial bus
- storage
- permanent storage
- sound
- programs used to direct the operation of the computer
- drive-a disk drive containing a hard disk
Down
- key component in a computer system motherboard-board that contains the basic circuitry of a computer
- public
- code-a system of repeating letters
- resource locator
- small primary display sheet
- firmware
- or passages
- short term memory
- name system
- by a computer as a unit
- value
- used information
- parts of a computer
- that serves
28 Clues: value • sound • public • browser • devices • storage • firmware • or passages • name system • that serves • on the computer • resource locator • service provider • used information • short term memory • permanent storage • parts of a computer • vast computer network • by a computer as a unit • port-universal serial bus • small primary display sheet • system-collection of software • address-address of the computer • ...
IT Crossword HW 2023-10-15
Across
- means 16
- an electronic device
- a sequence of 1s and 0s
- a single character
- where data is permanently kept on your computer
- 1 trillion bytes
- the value of each digit in a number
- two is the base of the binary numeral system
- numeric codes for the computer
- a running program in a computer
- 1 billion bytes
Down
- also known as decimal
- base-10 number system
- 1 million bytes
- a basic algorithm
- means information
- in which data is stored, processed and transmitted
- information that is encoded for storage in a computing file
- the most basic unit of information in computing
- an error when a program receives a number, value or variable
- 1 thousand bytes
- American Standard Code for Information Interchange
- changing something to another
- a display unit of information like an alphabetic letter
- a basic unit of information in computer storage
25 Clues: means 16 • 1 million bytes • 1 billion bytes • 1 thousand bytes • 1 trillion bytes • a basic algorithm • means information • a single character • an electronic device • also known as decimal • base-10 number system • a sequence of 1s and 0s • changing something to another • numeric codes for the computer • a running program in a computer • the value of each digit in a number • ...
Technology 2024-07-19
Across
- Programs and operating information used by computers
- Reality Technology that overlays digital information on the real world
- Intelligence Technology that simulates human intelligence
- A wearable device that connects to smartphones
- An unmanned aerial vehicle
- Electronic devices worn on the body
- A device that modulates and demodulates signals for internet connectivity
- The branch of technology dealing with robots
- A decentralized digital ledger for recording transactions
Down
- Reality Technology creating immersive computer-generated environments
- A set of rules or steps for solving problems
- The use of biological processes in technology
- An organized collection of data
- Wireless networking technology
- Global Positioning System used for navigation
- A display screen that responds to touch
- A global network connecting millions of computers
- The process of encoding information for security
- A mobile phone with advanced features
- Computing The delivery of computing services over the internet
20 Clues: An unmanned aerial vehicle • Wireless networking technology • An organized collection of data • Electronic devices worn on the body • A mobile phone with advanced features • A display screen that responds to touch • A set of rules or steps for solving problems • The branch of technology dealing with robots • The use of biological processes in technology • ...
Networks and the Internet Vocabulary 2024-12-09
Across
- a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
- a group of computing devices and programs working together for a common purpose
- a group of interconnected computing devices capable of sending or receiving data.
- Address The unique number assigned to each device on the Internet
- A type of computer that forwards data across a network
- the system responsible for translating domain names like example.com into IP addresses
Down
- An agreed-upon set of rules that specify the behavior of some system
- the protocol used for transmitting web pages over the Internet
- a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- a system of linked pages, programs, and files
- A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all
- differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
- Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
16 Clues: a system of linked pages, programs, and files • A type of computer that forwards data across a network • the protocol used for transmitting web pages over the Internet • Address The unique number assigned to each device on the Internet • An agreed-upon set of rules that specify the behavior of some system • ...
Les matières scolaires 2023-10-05
vocabulary unit 5 2024-10-15
12 Clues: Teatro • Deberes • Horario • Derecho • Historia • Biologia • Marketing • Geografia • Ciudadania • Informaica • ponersealmismonivel • politicayrelacionesinternacionales
week1 2024-02-18
Across
- Term for Secure data transmission.
- Possessing skills to compete globally.
- Reveal a phrase related to global competitive skills.
- Phrase associated with personal integrity
- communication What skill allows you to collaborate effectively with people from.
Down
- Find a common programming language.
- Integrity and dignity demonstration.
- Technology used for storing and retrieving data.
- Field of computing employment.
- Development What sector is known for employing a large portion in BSIT graduates.
- workforce BSIT Programs emphasize skills relevant to the.
- Involvement in community development or nation building.
- technology This degree prepares you for careers.
- Concept linked with community development.
- Find a term associated with computing employment.
15 Clues: Field of computing employment. • Term for Secure data transmission. • Find a common programming language. • Integrity and dignity demonstration. • Possessing skills to compete globally. • Phrase associated with personal integrity • Concept linked with community development. • Technology used for storing and retrieving data. • ...
Technology 2024-11-27
computer class 2012-10-04
Across
- internet service provides
- system the collection of software
- board upon which other boards thatcontain the basic circuitry of a computer or of a computer component can be mounted
- device Electronic or electromechanical equipment connected to acomputer and used to transfer data out of the computer inthe form of text
- a unit of digital computing
- address a numerical label assigned to each device
- read only memory
- device
- electrical,devices,comprising,acomputersystem,CPU,diskdrives keyboard screen
- Uniform Resource locator
Down
- a software application for retrieving
- of or pertaining to a peripheral
- a peripheral device that accepts data and feedsit into a computer
- computer program that services computers
- a way of representing text
- the programs used to direct the operation of a computer
- computer small enough to fit conveniently in anindividual workspace
- central processing unit
- a selection automatically used by a computer program
- random access memory
20 Clues: device • read only memory • random access memory • central processing unit • Uniform Resource locator • internet service provides • a way of representing text • a unit of digital computing • of or pertaining to a peripheral • system the collection of software • a software application for retrieving • computer program that services computers • ...
Form 2 Cross Word Puzzle 2024-11-18
Across
- These are software and online resources that aid people to perform tasks
- A key principle of cloud computing that allows user to increase and decrease the number of resources they require as their business changes in size
- A cloud computing model which provided software over the internet on a subscription basis
Down
- A type of technology which allows users to access virtual instances of computing resources such as storage
- Cloud computing model which provides computing resources, storage and networking resource over the internet on a pay as you go basis
- A large cluster of remote servers and data centers that deliver computing resources via the internet
- Specialized computers that provide data and resources to client computers of a network.
7 Clues: These are software and online resources that aid people to perform tasks • Specialized computers that provide data and resources to client computers of a network. • A cloud computing model which provided software over the internet on a subscription basis • A large cluster of remote servers and data centers that deliver computing resources via the internet • ...
Unit 2 computing. 2018-01-15
Across
- this is non-volatile and keeps information on the computer
- this is volatile and allows the computer to read and write data quickly
- a hexadecimal is made up off this amount of bases
- this is short for intergrated development environment
- this converts a data type
- this is when code loops until a condition is met
- this means you can read and write in the document as well as change the data.
- this is the electrical component that is contained in the cpu and consists of on and off
- this represents characters from languages all around the world.
- this is a way of error checking and pointing out errors in code
- this is the diamond box that is also used for conditions
- this is any objec that is capable of being manipulated
- this translates entire source of code all in one go into machine code
- this is what you must close an algorithm with
Down
- this is the high level programming language that we use
- this is a oval box in an algorithm that is used also for stop
- this is when you sometimes only want some lines of code to be run if a condition is met otherwise you want the computer to ignore these lines and jump over them
- this is a read only file.
- this means the breaking down of a problem into smaller, more manageable parts meaning it’s easier to solve
- this is a whole number
- this is when the computer will run your code in order, one line at a time from the top to bottom of your program
- any type of this displays a 1 if it is on and a o if it is off
- there are 2 types of these lossy and lossless
- this translates and executes source code
- shortened version of American standard code for information interchange
- translates assembly language code to machine code
- this is the process of removing unnecessary details so that only the main, important points remain
- how many bits are in a binary number
- how many programming language generations are there
- this is a rectangle box in an algorithm that is also used for calculations
30 Clues: this is a whole number • this is a read only file. • this converts a data type • how many bits are in a binary number • this translates and executes source code • there are 2 types of these lossy and lossless • this is what you must close an algorithm with • this is when code loops until a condition is met • a hexadecimal is made up off this amount of bases • ...
Computing Literacy - Spreadsheets 2013-07-08
Across
- Type of text data.
- Usually the Title or Heading that is under the main Heading or Title in a spreadsheet.
- Like traditional card sets where different types of information are stored on each card and this part allows you to quickly identify the type of information the card gives you access to, the ribbon in Word/Excel has these to quickly show you which toolbar you are using.
- Press and release the right mouse button.
- Usually the head of a column, etc in a spreadsheet. Sometimes called Titles when referring to the name of the company, or the Title of a spreadsheet which is placed at the top of a spreadsheet.
- A document that contains a list of steps and dates, with reference to resources required, outling how the project will be carried out to meet the deadline and brief.
- Time, money, materials, expertise, tools are all examples.
- Another name for a graph in a spreadsheet. Pie and bar are types of these.
- A set of toolbars, represented by graphical icons and groupped into tabs by functionality. Often placed along the top of the screen, in a software application such as Word or Excel.
- Press and release the left mouse button.
- Type data without pressing Enter.
Down
- Make something stand out from the rest. This is often done by formatting the text or numbers to Bold. Sometimes, a line above and/or below a set of values is also used (especially with totals).
- Type of numeric data.
- Where a column and a row meet in a spreadsheet
- Total obtained by adding a group of numbers together.
- The main person or group of people you are working for, or with, on a project.
- Sets of graphical icons that are related to each other are displayed together. Part of a tab in the ribbon shown at the top or Word or Excel.
- A set of important tasks with due dates, that shows how well your project is moving forward to the deadline.
- An option that can be selected (displaying a tick, or dot in a circle) or deselected (no tick, or no dot in a circle).
- Often called a chart in a spreadsheet.
- Labels in a chart which identify data in the chart (such as what the columns represent). Usually appears on the right hand side of the chart by default.
- They are entries that are made to calculate something, and start with = in the box. For example: = SUM( ) adds the values in cells together.
- Information (text, numbers, labels, etc0.
- Typing the text and then pressing this key on the keyboard will do the same as clicking the highlighted button in a dialog box.
- Abbreviation for Goods and Services Text which is added at 15% to everything's cost price in NZ.
- Why you are doing something
- The name of a spreadsheet program produced by Microsoft
- Instructions from the client/stakeholder detailing what they want and the specifications for the document.
28 Clues: Type of text data. • Type of numeric data. • Why you are doing something • Type data without pressing Enter. • Often called a chart in a spreadsheet. • Press and release the left mouse button. • Press and release the right mouse button. • Information (text, numbers, labels, etc0. • Where a column and a row meet in a spreadsheet • ...
Cloud Computing Architecture 2014-01-12
Across
- rule
- running solely one application
- synonym for program
- multiple existence
- electronic letters
- Floating in the sky
- administers the whole system
- #Neuland
- customer
- prerequisite to use the medium
- the system side
- serves the networks needs
Down
- secure copy of all data
- touchable server
- the complete system
- UI
- I'm not a program!
- 0101 + 0110 = 1011
- float of data
- maximum amount of storage
- untouchable server
- maximum connectivity
- HDD,SSD,SD etc.
- the side the user sees
24 Clues: UI • rule • #Neuland • customer • float of data • HDD,SSD,SD etc. • the system side • touchable server • I'm not a program! • 0101 + 0110 = 1011 • untouchable server • multiple existence • electronic letters • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • maximum amount of storage • serves the networks needs • ...
Cloud Computing Architecture 2014-01-12
Across
- administers the whole system
- running solely one application
- multiple existence
- I'm not a program!
- touchable server
- #Neuland
- synonym for program
- float of data
- prerequisite to use the medium
- customer
Down
- electronic letters
- maximum connectivity
- the complete system
- serves the networks needs
- secure copy of all data
- UI
- untouchable server
- 0101 + 0110 = 1011
- HDD,SSD,SD etc.
- the system side
- the side the user sees
- maximum amount of storage
- Floating in the sky
- rule
24 Clues: UI • rule • #Neuland • customer • float of data • HDD,SSD,SD etc. • the system side • touchable server • electronic letters • multiple existence • I'm not a program! • untouchable server • 0101 + 0110 = 1011 • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • serves the networks needs • maximum amount of storage • ...
Security in computing 2015-02-19
Across
- a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port
- the fault detection – waiting for a system to fail
- The science of deducing the plaintext from a ciphertext, without knowledge of the key
- The process of writing the malicious code for a particular machine or a particular application is called ---- malicious code
- protocol analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network
- malicious code detected based on the behavior
- a virus that attaches itself to a file and replicates when the infected program is executed
- A computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating
- The process of anticipating the faults and handling them to minimize disruption and maximize the safety
- These are the programs that leak the information
- the fault detection – construct a system that reacts to a failure
Down
- A cryptosystem is a system for encrypting and decrypting data
- is an unforgeable token that gives the possessor certain rights to an object
- – keeps a copy of everything pressed
- The assurance that the communicating entity is the one that it claims to be
- (secure shell) is a pair of protocols defined for Unix
- systems reveal information that could facilitate an attack
- in this Attack- Malicious program exists between two programs
- each program operates as if other routines in the system were malicious or incorrect
- door is an undocumented entry point to a module which has occurred because of the developer
- Provides protection against denial by one of the entities involved in a communication
- defines a single choke point that keeps unauthorized users out of the protected network
- this is a cipher which encrypts a digital data stream one bit or one byte at a time
- The virus that gets lodged in main memory as part of a resident system program and the virus may infect every program that executes
- The study of cryptography and cryptanalysis
- This attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination
26 Clues: – keeps a copy of everything pressed • The study of cryptography and cryptanalysis • malicious code detected based on the behavior • These are the programs that leak the information • the fault detection – waiting for a system to fail • (secure shell) is a pair of protocols defined for Unix • systems reveal information that could facilitate an attack • ...
History of Computing 2020-10-01
Across
- apps for the book lovers
- software for windows 10 to satisfy entertainment purposes
- owner of Universal Studios from 1990 to 1995
- Software to carry out everyday computing tasks
- computer brand
- popular apps to communicate with others
- Watch popular web series
- app for fast and secure web browsing
- Android
- A must have program for Windows 10 to update outdated drivers
- software to unleash windows maximum performance
Down
- host virtual meetings
- Computer brand
- Android
- Iphone
- program to make windows run faster
- app to manage multiple accounts easily
- Playstion
- play all sorts of files without installing any third-party codecs makes it a favorite all over the globe
- A must-have software to protect your computer from virus and malware attack
- app to recover lost files
- software for Windows 10 to keep online identity secure
22 Clues: Iphone • Android • Android • Playstion • Computer brand • computer brand • host virtual meetings • apps for the book lovers • Watch popular web series • app to recover lost files • program to make windows run faster • app for fast and secure web browsing • app to manage multiple accounts easily • popular apps to communicate with others • owner of Universal Studios from 1990 to 1995 • ...
Dependable Computing 2 2024-04-01
Across
- necessary assurance that an issue will be solved.
- a single defective line of_ is more than enough to cause a catastrophic failure.
- implementation created from mechanical specification.
- software built by creating multiple variations of transformations from abstract specifications.
- _methods target processing efficiency.
- active examination of a system to locate faults.
- thorough evaluation of a systems specifications and faults.
- due to human error, humans are_
- expressed as bits in memory and patterns in hardware
- methods that are not derived from a technical structure or background.
- real-time software that runs itself.
- fault caused by the time of use/overuse that causes degradation
- routine procedures that upkeep and upgrade systems and machinery.
Down
- begins with requirements then specifications and lastly, implementation
- one representation of software is the executable, correct refinement of another.
- anything done without precision.
- formal verification that displays an implied specification implementation.
- always include an_else clause in a case statement.
- hypothesized cause of error.
- no single definition of any natural language.
20 Clues: hypothesized cause of error. • due to human error, humans are_ • anything done without precision. • real-time software that runs itself. • _methods target processing efficiency. • no single definition of any natural language. • active examination of a system to locate faults. • necessary assurance that an issue will be solved. • ...
Computing word bank 2023-08-28
Across
- kokoonpano
- laitteisto
- what is an "app" a shortened version of
- for example a computer, smartphone, server
- palvelin
- do the math
- kopioida
- downloading the latest version of a software
- tehtävä
- sulauttaa
- for example Chrome or Firefox
- tallentaa, varastoida
Down
- varmuuskopio, varmuuskopioida
- CPU
- luoda
- 01101110 01101111
- liittää
- palomuuri
- protects your personal data from cyber attacks
- portti
- used to type
- kieltää
22 Clues: CPU • luoda • portti • liittää • tehtävä • kieltää • palvelin • kopioida • palomuuri • sulauttaa • kokoonpano • laitteisto • do the math • used to type • 01101110 01101111 • tallentaa, varastoida • varmuuskopio, varmuuskopioida • for example Chrome or Firefox • what is an "app" a shortened version of • for example a computer, smartphone, server • downloading the latest version of a software • ...
Glossary Words - Computing 2025-02-13
Across
- A copy of important files in case something goes wrong
- A small picture on a screen that you click to open an app or file
- A device with keys that you press to type words, numbers, and commands on a computer
- A group of computers linked together so they can share information
- Making words or pictures stand out by changing their colour or background
- Putting copied text or pictures into a document or app
- Someone who sees bullying happen online but does not do anything to stop it
- A list of choices you can pick from on a computer screen
- A message, picture, or video shared on the internet, which can sometimes be used to hurt or embarrass someone
- Making something bigger or smaller on a screen
Down
- How clear and sharp a picture looks on a screen.
- A box on a computer screen where you can see and use apps or files
- A special place where a computer keeps things it might need again quickly
- The main screen on a computer where you see icons and files
- A set of colours you can choose from in a design or drawing program
- Turning a computer on and getting it ready to use
- The style of letters and numbers on a screen or in a document
- Moving text or pictures up, down, or sideways on a screen
- A mistake in a computer program that makes it not work properly
- A person who helps or encourages online bullying, even if they are not the main bully
- A small device you move with your hand to control the pointer on a screen
21 Clues: Making something bigger or smaller on a screen • How clear and sharp a picture looks on a screen. • Turning a computer on and getting it ready to use • A copy of important files in case something goes wrong • Putting copied text or pictures into a document or app • A list of choices you can pick from on a computer screen • ...
VCE Computing Glossary 2025-11-18
Across
- Protecting systems and data from threats.
- English-like statements representing algorithms.
- Graphical representations of complex data or information that provide an overview of a topic
- A process used when developing solutions to identify and fix errors
- Making a copy of data for recovery in case of loss.
- Planning tasks timelines and milestones for projects.
- Testing carried out by developers in a controlled environment during development.
- Testing by end-users under real conditions after development.
- Moving old data to long-term storage.
- Encoding data to prevent unauthorized access.
Down
- Data collected by researchers directly from sources using methods such as surveys, interviews and observations
- Data Data collected by someone else for a different purpose.
- Generating and evaluating innovative ideas for solutions.
- Data Data collected first-hand by the researcher.
- Checking data for accuracy and consistency after entry.
- Consideration of how users perceive and respond when interacting with a digital system
- Common standards for consistency in solutions.
- Describes the overall accuracy, authenticity, correctness, reasonableness, relevance and timeliness of data
- Issues that arise that challenge moral standards, principles or expectations
- Checking data for reasonableness and completeness before processing.
20 Clues: Moving old data to long-term storage. • Protecting systems and data from threats. • Encoding data to prevent unauthorized access. • Common standards for consistency in solutions. • English-like statements representing algorithms. • Data Data collected first-hand by the researcher. • Making a copy of data for recovery in case of loss. • ...
Year 7 Computing 2025-11-24
Across
- A program used to browse the internet
- A program used for making word documents.
- A scam where fake emails trick you into giving personal details.
- Keeping your personal information safe online.
- A program used for making visual presentations.
- Pieces of code you snap together in Scratch.
- Harmful software that can damage your computer or steal data.
- A single page in a PowerPoint presentation.
- A single box in an Excel spreadsheet.
- A calculation in Excel using symbols like + or -.
- A game used for learning and building virtual worlds.
- A type of password that is hard to guess.
Down
- Copying or sharing software illegally.
- An effect when moving from one slide to another.
- A law that protects creators’ work.
- A word you type to find information online.
- A secret word or phrase used to access accounts.
- A grid used for numbers and data in Excel.
- The trail of information you leave online.
- A program used to perform calculations and make graphs.
- Permission to use software legally.
- Changing the look of text in Word.
22 Clues: Changing the look of text in Word. • A law that protects creators’ work. • Permission to use software legally. • A program used to browse the internet • A single box in an Excel spreadsheet. • Copying or sharing software illegally. • A program used for making word documents. • A type of password that is hard to guess. • A grid used for numbers and data in Excel. • ...
FOC - Unit 5 - Intro 2024-11-04
Across
- A type of computer that forwards data across a network
- An agreed-upon set of rules that specify the behavior of some system
- a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- the system responsible for translating domain names like example.com into IP addresses
- a system of linked pages, programs, and files
- the protocol used for transmitting web pages over the Internet
Down
- differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
- a group of computing devices and programs working together for a common purpose
- Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
- A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all
- The unique number assigned to each device on the Internet
- a group of interconnected computing devices capable of sending or receiving data.
- a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
16 Clues: a system of linked pages, programs, and files • A type of computer that forwards data across a network • The unique number assigned to each device on the Internet • the protocol used for transmitting web pages over the Internet • An agreed-upon set of rules that specify the behavior of some system • ...
Abigail Barrera-Crossword-7th period 2016-10-24
Across
- productivity systems
- refers to a computer that can do a number of tasks
- network of computers that share files, etc.
- programs that affect computers negatively
- mobile phone that can do more than call
- broadband internet that can reach 15 mbps
- connection point for devices in one network
- software solely supported by advertisements
Down
- storing and accessing data over the internet
- anything that deals with computing technology
- using good behavior when using technology
- receives and analyzes packets, sends to networks
- people trying to steal personal information
- portable computer
- separate hard drive to different portions
- programs that manage the computer itself
- anything that can harm a computer system
- unnecessary advertising by emails etc.
- connects computers, printers, etc.
- peripheral device that connects to high speed internet
20 Clues: portable computer • productivity systems • connects computers, printers, etc. • unnecessary advertising by emails etc. • mobile phone that can do more than call • programs that manage the computer itself • anything that can harm a computer system • using good behavior when using technology • separate hard drive to different portions • ...
Barkmans Crossword 2024-01-04
Across
- - How computers are wirelessly connected
- Firewall - protects your computer from viruses
- Compression Tool - shrinks the size of files
- device - what shows the user info
- computing - using less energy to compute
- - etiquette of the internet
- Extortionist - stop hacking in exchange currency
- Vision Syndrome - computer affected eyesight
- - an integrated interface within devices
- device - how you enter info
- - what gives your device info
Down
- - business online
- Device Convergence - technology that needs less computers
- Web Design - the resolution matches the screen
- - unaware of a virus
- System - made of 1s and 0s
- - your position whilst computing
- - accessing a device illegally
- - how clear the screen is
- social network - users alike can engage together
- - organized data
- - stores info on you computer
- Aggregation - a compilations of information
- Defragmenter - organizer of data on a disk
- Protector - protects electronics against power surges
25 Clues: - organized data • - business online • - unaware of a virus • - how clear the screen is • System - made of 1s and 0s • - etiquette of the internet • device - how you enter info • - stores info on you computer • - what gives your device info • - accessing a device illegally • - your position whilst computing • device - what shows the user info • ...
CSP - Unit 2 - 2024-25 2025-01-27
Across
- The maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- A system of linked pages, programs, and files.
- A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all.
- Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
- A computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
- A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created
- A group of computing devices and programs working together for a common purpose
- The series of connections between computing devices on a network starting with a sender and ending with a receiver.
- A type of computer that forwards data across a network
- A machine that can run a program, including computers, tablets, servers, routers, and smart sensors
Down
- The protocol used for transmitting web pages over the Internet
- An agreed-upon set of rules that specify the behavior of some system
- The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network.
- A group of interconnected computing devices capable of sending or receiving data.
- Address The unique number assigned to each device on the Internet.
- A protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- Differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
- The system responsible for translating domain names like example.com into IP addresses
18 Clues: A system of linked pages, programs, and files. • A type of computer that forwards data across a network • The protocol used for transmitting web pages over the Internet • Address The unique number assigned to each device on the Internet. • An agreed-upon set of rules that specify the behavior of some system • ...
BE(IT) 2017-09-12
Across
- One type of projection in GIS
- How many types of deployment models are used in cloud?
- Which cloud computing features allows for server consolidation resulting in increased asset utilisation and decreased data centre energy needs?
- Which service is provided by Google for online storage?
- In which category of SaaS services does customer relationship management (CRM) software fall?
Down
- "cloud" in cloud computing represents what?
- What is the term for restriction users so that they can only access the feature they are assigned
- Google docs is a type of_______computing
- Amazon Web services is which type of cloud computing distribution
- Which Amazon cloud product recently experienced a massive outage
10 Clues: One type of projection in GIS • Google docs is a type of_______computing • "cloud" in cloud computing represents what? • How many types of deployment models are used in cloud? • Which service is provided by Google for online storage? • Which Amazon cloud product recently experienced a massive outage • ...
DM 2013-08-19
Across
- Computing giant which acquired Washington Post recently
- Sixth step in the KDD process*
- Sampling technique which ensures samples from all classes
- Small scale Data warehouse*
- Coefficient used for correlation analysis
- Data which contains discrepancies
- Cabinet minister for IT*
- Technique to handle noisy data
- Data object that does not follow the general behaviour of the data
- Attributes which cannot be ordered
- An association rule with multiple occurrences of some predicates
Down
- Highest honour awarded in the Computing field
- An Interestingness measure
- Property which states that All non-empty subsets of a frequent itemset must also be frequent
- The cuboid with lowest level of summarization
- Collection of stars
- Scaling an attribute within a specified range
- Database with time-related attributes
- Compression where only an approximation of the data can be reconstructed
- Measure introduced by Shannon
20 Clues: Collection of stars • Cabinet minister for IT* • An Interestingness measure • Small scale Data warehouse* • Measure introduced by Shannon • Sixth step in the KDD process* • Technique to handle noisy data • Data which contains discrepancies • Attributes which cannot be ordered • Database with time-related attributes • Coefficient used for correlation analysis • ...
CompSci Unit 2 Online 2025-10-01
Across
- A system of linked pages, programs, and files
- A group of interconnected computing devices capable of sending or receiving data
- differing access to computing devices and the Internet based on socioeconomic, geographic, or demographic characteristics
- the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
- a protocol for computers to request and share the pages that make up the world wide web on the Internet
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- A type of computer that forwards data across a network
- A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered
Down
- can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
- A protocol for sending packets quickly with minimal error-checking and no resending of dropped packets
- The unique number assigned to each device on the Internet
- a chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
- a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- an agreed upon set of rules that specify the behavior of some system
- data added to packets to help route through the network and reasemble the original message
- the system responsible for translating domain names into IP addresses
- a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- information passed through the internet in packets
- the capacity for the system to change in size and scale to meet new demands
- A group of computing devices and programs working together for a common purpose
21 Clues: A system of linked pages, programs, and files • information passed through the internet in packets • A type of computer that forwards data across a network • The unique number assigned to each device on the Internet • an agreed upon set of rules that specify the behavior of some system • the system responsible for translating domain names into IP addresses • ...
german subjects 2025-02-05
15 Clues: DT • Art • Drama • Maths • French • German • Science • History • Spanish • Computing • Chemistry • Geography • My favourite subject is • my favourite subjects are • I like/ don’t like learning
Fundamentals of Computing 2021-12-10
Across
- also known as an OS
- to be saved onto a computer
- and input device that enters data with letters, numbers, symbols, and special function keys
- the most widely used operating system for personal computers
- output device that produces audio from your computer
- popular search engine
- set of instructions executed by a computer
- the physical parts of a computer and related devices
Down
- input device that produces a digital image
- device that receives signals from a computer then displays it on the screen
- data that is entered into the computer system through an input or storage device
- program or instructions that give directions to the computer
- software program that stores an organized collection of data on a computer
- device that produces text and graphics onto paper
- malicious computer virus designed to damage a computer
- known as the Central Proccessing Unit
- the results of the operation of any system
- device used to store files off computer, plugs into USB port
- a circut board that contains all of the computer system's main components
- a device that transfers data between computer networks
20 Clues: also known as an OS • popular search engine • to be saved onto a computer • known as the Central Proccessing Unit • input device that produces a digital image • the results of the operation of any system • set of instructions executed by a computer • device that produces text and graphics onto paper • output device that produces audio from your computer • ...
Intermediate 2 Computing 2012-09-12
Across
- Input, output, Backing storage, processor and_____. What is the missing part?
- Apart from the mantissa what is the other unit used in floating point representation.
- A common input device.
- Displays the information.
- A portable computer.
- Non-printable characters.
- 1024 Megabytes.
- What is the name for each memory location in a computer’s memory can hold a single unit of storage.
- Preforms all the calculations and logic functions.
- 23.5 is what kind of a number
- Pictures are saved as this.
Down
- Disk and tape drives are what kind of storage.
- Used to measure the number of pixels on a screen display or printout.
- What is each memory location identified as.
- What is clock speed measured in?
- Numbers, letters, punctuation marks, symbols and control characters are called what?
- The flow of data between the main memory and processor.
- A common output device.
- What your screen is made up of.
- Loses its contents when the power is switched off.
20 Clues: 1024 Megabytes. • A portable computer. • A common input device. • A common output device. • Displays the information. • Non-printable characters. • Pictures are saved as this. • 23.5 is what kind of a number • What your screen is made up of. • What is clock speed measured in? • What is each memory location identified as. • Disk and tape drives are what kind of storage. • ...
National 5 Computing 2019-11-28
Across
- A data structure with a list of values, unlike a variable
- Stage of the development process, before implementation
- A basic conditional statement
- The term that covers presence checks, range, length and restricted choice
- Data is scrambled so that only the intended recipient can read it
- Companies that use your personal data must make sure it is ______
- When two strings are joined together
- A vector image is made up of objects with _______
- AND, OR and NOT are this kind of operator
Down
- The number of bits in standard ASCII
- One of the conditional loops
- Type of requirement that says what a database must have tables or queries to do
- One of the pre-defined functions
- Blank space at the start of a line of code, makes it easier to read
- Type of SQL statement used to add new values to a database
- Filters traffic from a network and can block unwanted connections
- Component that moves things between memory and the processor
- Floating point numbers have a _____ and an exponent
- Something that is passed into a function, e.g. Round(3.14)
- Type of error that doesn't show an error message - the code still runs
20 Clues: One of the conditional loops • A basic conditional statement • One of the pre-defined functions • The number of bits in standard ASCII • When two strings are joined together • AND, OR and NOT are this kind of operator • A vector image is made up of objects with _______ • Floating point numbers have a _____ and an exponent • ...
fundamentals of computing 2023-09-01
20 Clues: area • fonts • looks • values • colors • simple • one hue • next to • content • hobbies • opposite • grey hue • pictures • white hue • intensity • black hue • audience customers • commonly used audience • budget, values,attitudes • age, gender, race, religion
fundamentals of computing 2023-09-01
20 Clues: area • fonts • looks • values • colors • simple • one hue • next to • content • hobbies • opposite • grey hue • pictures • white hue • intensity • black hue • audience customers • commonly used audience • budget, values,attitudes • age, gender, race, religion
Founders of Computing 2024-08-29
Across
- Developed FORTRAN, the first widely used programming language.
- Co-developed a software company with Paul Allen, known as Microsoft.
- Credited for creating the slide rule, the mechanical calculator before the digital calculator.
- Credited for designing and developing the first digital computer that can solve linear equations.
- Invented the first mechanical calculator for his father who was a mathematician.
- Credited with the invention of the first general-purpose electronic computer (ENIAC).
- Developed the magnetic core memory which became standard in early computers.
- Invented a way for instant communication, the telegraph.
- Developed Macintosh 128K, a commercially successful personal computer.
Down
- Credited for the invention of the Analytical Engine.
- Designed the computer that broke the Enigma code during World War II.
- Credited for writing the first computer algorithm, and known as the first programmer.
- Invented the Harvard Mark I computer, one of the first electro-mechanical computers.
- Credited for the term "debugging".
- Invented the punch card system for census data.
- Credited with the prediction that the number of transistors per device will double every two years. This prediction is now named after him.
- Credited for the invention of true or false statements in programming.
- Credited with the invention of the integrated circuit.
- Developed SNDMSG, the first email program.
- Developed the Mathematical Analyzer, Numerical Integrator, and Computer(MANIAC), designed to solve complex math problems.
20 Clues: Credited for the term "debugging". • Developed SNDMSG, the first email program. • Invented the punch card system for census data. • Credited for the invention of the Analytical Engine. • Credited with the invention of the integrated circuit. • Invented a way for instant communication, the telegraph. • Developed FORTRAN, the first widely used programming language. • ...
ICT vocabulury 2013-09-03
Across
- Keep safe or rescue
- A movable indicator on a computer screen identifying the point that will be affected by input from the user
- address: In computing, a Uniform Resource Locator
- wireless local area network
- world wide web
- engine: A program for the retrieval of data, files, or documents from a database or network, esp. the Internet
- Observe and check the progress or quality of (something) over a period of time; keep under systematic review.
- An international computer network providing e-mail and information from computers in educational institutions, government agencies
- The working surface of a desk
- (not the movie ): A manifestation of a deity in bodily form on earth.
Down
- Uniform resource locator
- Captcha is a type of challenge-response test used in computing to ensure
- Send the same message indiscriminately to on the Internet
- A person who looks casually through publications or Web sites or at things for sale
- Record the address of for quick access by a user: "be sure to bookmark eVote
- Web site on which an individual or group of users record opinions, information, etc. on a regular basis.
- information communication technology
- media: Social media are media for social interaction, using highly accessible and scalable publishing techniques
- phone: A smartphone is a mobile phone that offers more advanced computing ability
- as: The term computer file management refers to the manipulation of documents and data in files on a computer
20 Clues: world wide web • Keep safe or rescue • Uniform resource locator • wireless local area network • The working surface of a desk • information communication technology • address: In computing, a Uniform Resource Locator • Send the same message indiscriminately to on the Internet • (not the movie ): A manifestation of a deity in bodily form on earth. • ...
Crossword 2024-08-29
Across
- is considered the father of modern computer science and a central figure in artificial intelligence (AI)
- French mathematician, physicist, inventor, philosopher, and Catholic writer
- The owner of microsoft
- best known for his first machine, the IBM Automatic Sequence Controlled Calculator
- His greatest achievement was the world's first programmable computer
- best known for inventing logarithms, a method of calculation that made it easier to work with large numbers
- the father of modern machine data processing
- is considered the world's first computer programmer and a pioneer in mathematics and computing
- best known as the co-founder, with Bill Gates, of Microsoft Corporation,
- As the co-founder of Apple Computers and the former chairman of Pixar Animation Studios
- best known known for his work in the early development of computers
- developed an electric telegraph
- pioneered computing technology and authored a principle that propelled the digital revolution
Down
- invented the integrated circuit in 1958
- helped establish modern symbolic logic
- best known for her trailblazing contributions to computer programming, software development, and the design and implementation of programming languages
- is best known for his contributions to the early history of computing
- best known for the invention of FORTRAN and for the BNF notation for describing the syntax of a programming language
- responsible for the design and construction of Whirlwind I, one of the first high speed computers
- widely known for inventing network electronic mail
20 Clues: The owner of microsoft • developed an electric telegraph • helped establish modern symbolic logic • invented the integrated circuit in 1958 • the father of modern machine data processing • widely known for inventing network electronic mail • best known known for his work in the early development of computers • ...
APCS Key Terms (By: Makaila Johnson) 2021-05-24
Across
- data about data
- pairs a public key for encryption and a private key for decryption.
- the process of encoding data to prevent unauthorized access.
- the delay between a user's action and a web application's response to that action
- The practice of obtaining input or information from a large number of people via the Internet.
- a network of servers that track the IP addresses of different domain names like “example.com”
- A prediction made that computing power will double every 1.5 - 2 years.
- an alphabetic shift.
- the process of decoding the data.
- a technique that attempts to trick a user into providing personal information.
- Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).
Down
- program interfaces (APIs), specifications for how the procedures in a library behave and can be used.
- an application of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
- involves one key for both encryption and decryption.
- a malicious attempt to disrupt the normal traffic of a targeted server service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
- manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation.
- the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
- Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
- True or false values
- refers to differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
- the delivery of computing services—including servers storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- an agreed upon set of rules that specify the behavior of a system
22 Clues: data about data • True or false values • an alphabetic shift. • the process of decoding the data. • involves one key for both encryption and decryption. • the process of encoding data to prevent unauthorized access. • an agreed upon set of rules that specify the behavior of a system • pairs a public key for encryption and a private key for decryption. • ...
CS Principles Review - 2022 2022-04-22
Across
- A mistake in an algorithm or program that causes it to behave unexpectedly or return the _____ value.
- A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.(_____ Computing)
- symmetric ____ion: A technique for ____ing data where the same key is used to both _____ and de___ data.(One Word)
- The maximum amount of data that can be sent in a fixed period of time over a network connection
- some people use this to catch fish others use it as an attack where a user is tricked into revealing private information, often via a deceptive email.
- The iteration over the items in a list. A full _____ iterates over every item, while a partial _____ iterates over a subset of the items.
- UDP is a lightweight data transport _____ with minimal error checking.
- a rogue access point is a wireless access point that provides an attacker with _______ access to the traffic going over the network.
- a small round food with chocolate chips. Also a small amount of text that tracks information about a user visiting a website.
- Personally identifiable information is Information about an individual that can be used to uniquely _____ them.
- An example of this 3 letter acronym is two-step verification
- A computational model which uses multiple devices to run different parts of a program.(______ Computing)
Down
- An algorithm that iterates through each item in a list until it finds the target value.(____ Search)
- A physical device that can run a program(____ Device)
- A sequence of 8 bits.
- Crowdsourcing for science!(______ Science)
- A data transport protocol that includes mechanisms for reliably transmitting packets to a destination.(Hint: An Acronym)
- A group of interconnected computing devices capable of sending or receiving data.(Computer ______)
- A virus is a type of computer ______ that can make copies of itself
- A library is a collection of ______ that are useful in creating programs
- lossy means to compress _____ in a way that discards some data and makes it impossible to recover the original.
21 Clues: A sequence of 8 bits. • Crowdsourcing for science!(______ Science) • A physical device that can run a program(____ Device) • An example of this 3 letter acronym is two-step verification • A virus is a type of computer ______ that can make copies of itself • UDP is a lightweight data transport _____ with minimal error checking. • ...
IT crossword Puzzle 2024-11-14
Across
- - The software programmed into read-only memory of a device.
- Key - A unique identifier used to authenticate requests associated with an API project.
- - A device that directs internet traffic between networks.
- - Software that displays advertising on a user's computer.
- - A unit of digital information equal to approximately one billion bytes.
- Twin - A virtual representation of a physical object or system.
- Data - Large and complex data sets that require advanced analysis techniques.
- - A software licensing model where access is provided on a subscription basis.
- Design - The process of designing user-friendly digital interfaces.
- - The practice of optimizing websites to rank higher in search engine results.
- Web - Part of the internet not indexed by search engines and accessible only with special software.
- (Secure Sockets Layer) - A standard security technology for establishing an encrypted link between a server and a client.
- Services - Services provided over the internet, such as storage and software applications.
- - A wearable computing device in the form of a wristwatch.
- - The process of converting data into a secure format.
Down
- - Software designed to harm or exploit computer systems.
- - The measurement and analysis of unique physical or behavioral characteristics.
- Tech - Devices that can be worn on the body and often connect to other digital devices.
- Media - Platforms used for social interaction and content sharing.
- - A collaborative platform allowing users to create, edit, and link web pages.
- 6 - The latest generation of Wi-Fi technology.
- Internet - An experimental form of internet using quantum computing technology.
- Analytics - The process of examining datasets to draw conclusions about the information they contain.
- Computing - Computing done at or near the source of the data instead of relying on a central data-processing warehouse.
- - A challenge-response test to determine if the user is human.
- - A wireless technology standard for exchanging data over short distances.
- - The process of transmitting or receiving data over the internet as a continuous flow.
- - A type of non-volatile storage device that stores persistent data.
- - A secure, decentralized, and distributed digital ledger.
- Computing - A model for delivering computing resources over the internet.
30 Clues: 6 - The latest generation of Wi-Fi technology. • - The process of converting data into a secure format. • - Software designed to harm or exploit computer systems. • - A device that directs internet traffic between networks. • - Software that displays advertising on a user's computer. • - A secure, decentralized, and distributed digital ledger. • ...
Cloud Quest: Chapter 3 - Cloud Crossword 2022-06-30
Across
- An organised collection of data
- The ability of a system to adapt to changing workload requirements
- Software that acts as a bridge between an operating system or database and applications
- A Cloud financial management practice that promotes shared responsibility for an organization’s cloud computing infrastructure and costs
- Cloud Service Provider by Amazon
Down
- Cloud Service Provider by Microsoft
- A virtualisation instance in which the kernel of an operating system allows for multiple isolated user-space instances
- A set of practices that combines software development and IT operations
- Acronym for Cloud Service Provider
- A model of cloud computing in which the Cloud Service Provider hosts virtualised computing resources
10 Clues: An organised collection of data • Cloud Service Provider by Amazon • Acronym for Cloud Service Provider • Cloud Service Provider by Microsoft • The ability of a system to adapt to changing workload requirements • A set of practices that combines software development and IT operations • ...
seri24 2024-06-20
Across
- LA lawman
- Fashion biopic
- Stephen King
- Fantasy quest
- Karate comeback
- Teen shapeshifters
- Design competition
- Strip club drama
Down
- Mystical keys
- FBI profilers
- Quantum computing
- Tech startup
- Supernatural horror
- Family in space
- Skateboarding women
- Austen adaptation
- Paranormal duo
- Mysterious leader
- PI in Portland
- Disappeared people
20 Clues: LA lawman • Tech startup • Stephen King • Mystical keys • FBI profilers • Fantasy quest • Fashion biopic • Paranormal duo • PI in Portland • Family in space • Karate comeback • Strip club drama • Quantum computing • Austen adaptation • Mysterious leader • Teen shapeshifters • Design competition • Disappeared people • Supernatural horror • Skateboarding women
Team 1 2023-12-10
Across
- Who is the father of computer virology?
- What is the first transistorized digital computer?
- Who invented the first computer compiler?
- Who built the first programmable digital computer?
- Who invented the first floppy disk?
- Who invented the first monolithic integrated circuit?
- Who was the first to incorporate Boolean algebra in a computing machine?
Down
- Who discovered the first computer bug?
- Who is the world's first programmer?
- What is the first counting machine?
- What is the first low-level programming language?
- Who invented universal computing machine?
- Who invented binary arithmetic?
13 Clues: Who invented binary arithmetic? • What is the first counting machine? • Who invented the first floppy disk? • Who is the world's first programmer? • Who discovered the first computer bug? • Who is the father of computer virology? • Who invented the first computer compiler? • Who invented universal computing machine? • What is the first low-level programming language? • ...
Artificial Intelligence (AI) 2025-07-11
Across
- – tizim
- – tadqiqot
- – sun'iy
- – ma'lumot
- learning – chuqur o‘rganish
- – simulyatsiya
- – o‘rganish
- – axloq
- – sun'iy intellekt
- – avtomatlashtirish
- – robot
- – qaror
- – mashina
- – robototexnika
- – virtual
- – innovatsiya
Down
- – xatolik, tarafkashlik
- – kelajak
- – aqlli
- – algoritm
- – muhandislik
- – bashorat
- – raqamli
- – texnologiya
- – kodlash
- – intellekt
- – neyron
- – hisoblash
- – dasturiy ta'minot
29 Clues: – tizim • – aqlli • – axloq • – robot • – qaror • – sun'iy • – neyron • – kelajak • – raqamli • – kodlash • – mashina • – virtual • – tadqiqot • – algoritm • – ma'lumot • – bashorat • – o‘rganish • – intellekt • – hisoblash • – muhandislik • – texnologiya • – innovatsiya • – simulyatsiya • – robototexnika • – sun'iy intellekt • – avtomatlashtirish • – dasturiy ta'minot • – xatolik, tarafkashlik • learning – chuqur o‘rganish
Cloud Computing - Unit I 2025-07-02
Across
- Amazon’s cloud service platform
- Payment model used in cloud services ("pay as you ___")
- Technology that allows multiple virtual machines on one server
- A traditional IT setup hosted in the organization’s facility
- Cloud characteristic: ability to quickly adapt resources
- The company that uses cloud services
- Delivery of computing services over the internet
Down
- One risk of cloud computing involving data protection
- Popular containerization tool
- Company that provides cloud services
- Scaling that involves adding more machines
- Another term for IT components such as servers, storage, etc.
12 Clues: Popular containerization tool • Amazon’s cloud service platform • The company that uses cloud services • Company that provides cloud services • Scaling that involves adding more machines • Delivery of computing services over the internet • One risk of cloud computing involving data protection • Payment model used in cloud services ("pay as you ___") • ...
kemu 2012-10-08
14 Clues: art • drama • maths • number • science • history • language • computing • geography • literature • home economics • physical education • Chinese (for the Chinese) • English (for the Chninese)
EJ u struci- Module 3-vocabulary revision 2025-04-06
27 Clues: utor • krhak • ploča • imenik • kazeta • prazan • promjer • otporno • gustoća • pohrana • zauzeti • zadržati • slijedni • premašiti • izdržljiv • prethodno • osigurati • samostalno • dodijeljen • vrtjeti se • računalstvo • učinkovitost • ploča, ploha • željezovi oksidi • pronaći, obnoviti • obložen, presvučen • raznovrstan, svestran
Cloud Computing 2016-06-21
Across
- A set of routine definitions, protocols, and tools for building software and applications
- Benefit of Cloud Computing - Scale up/down as computing needs increase and as demands decrease
- Combination of public cloud services and on-premises private cloud – with orchestration and automation between the two
- The most widely used form of cloud computing
- Computer software that has an intermediary function between the various applications of a computer and its operating system
- In 2006, this company provided the 1st public cloud service
Down
- A Cloud Component which is a device end users use to interact with Cloud like Mobile, thick, thin
- The category of cloud service that permits subscribers to have remote access to application development
- Software architecture in which a single instance of software runs on a server and serves multiple tenants
- The cloud deployment method that is operated for a single organization
- An open-source software framework for storing data and running applications on clusters of commodity hardware
- The category of cloud services that refers to the outsourcing of hardware
12 Clues: The most widely used form of cloud computing • In 2006, this company provided the 1st public cloud service • The cloud deployment method that is operated for a single organization • The category of cloud services that refers to the outsourcing of hardware • A set of routine definitions, protocols, and tools for building software and applications • ...
computing crossword 2019-03-01
Across
- Address numbers used to identify a specific device
- a set of rules governing the format of data sent over the Internet or other network.
- rate/collisions The measurement of the effectiveness of a communications channel.
- Name Server where domain names are translated into IP addresses
- wires having a protective casing and used for transmitting electricity
- Optic flexible fibres with a glass core through which light signals can be sent with very little loss of strength.
- a range of frequencies within a given band, in particular that used for transmitting a signal.
Down
- a facility allowing devices to connect to the Internet or communicate with one another wirelessly within a particular area.
- The packets carry the data in the protocols that the Internet uses
- a system for connecting a number of computer systems to form a local area network
- rate the resending of packets which have been either damaged or lost
- the delay before a transfer of data begins following an instruction for its transfer.
12 Clues: Address numbers used to identify a specific device • Name Server where domain names are translated into IP addresses • The packets carry the data in the protocols that the Internet uses • rate the resending of packets which have been either damaged or lost • wires having a protective casing and used for transmitting electricity • ...
Cloud computing 2023-12-10
Across
- a set of numbers, amounts, etc., used to measure or compare the level of something
- the basic systems and services, such as transport and power supplies
- the conditions that you live or work in and the way that they influence how you feel or how effectively you can work
- a thing made by combining two different elements
- when needed or asked for
- you get things for yourself rather than being served by another person
- when several different cloud customers are accessing the same computing resources
Down
- the ability to change or be changed easily according to the situation
- is that quality allowing system behavior to be varied by a small amount of user input.
- a basic, indispensable, or necessary element
- hardware and software applications that are hosted on-site
- placement or arrangement in position for a particular use or purpose
12 Clues: when needed or asked for • a basic, indispensable, or necessary element • a thing made by combining two different elements • hardware and software applications that are hosted on-site • the basic systems and services, such as transport and power supplies • placement or arrangement in position for a particular use or purpose • ...
Technological progress 2025-03-11
Across
- protecting digital systems from cyber threats
- maintaining progress without depleting resources
- achieving maximum productivity with minimal waste
- Reality overlaying digital content onto the real world
- manipulating matter on an atomic or molecular scale
- the fifth generation of mobile network technology
Down
- Intelligence machines that mimic human intelligence
- a significant new idea, method, or product
- Computing computing based on quantum-mechanical principles
- a major and sudden advancement or discovery
- using machines to perform tasks without human assistance
- using living organisms for technological advancements
12 Clues: a significant new idea, method, or product • a major and sudden advancement or discovery • protecting digital systems from cyber threats • maintaining progress without depleting resources • achieving maximum productivity with minimal waste • the fifth generation of mobile network technology • Intelligence machines that mimic human intelligence • ...
APCSP 2023-10-10
Across
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- A way of representing information using only two options.
- a protocol for sending data across the Internet that assigns unique numbers to each connected device
- the series of connections between computing devices on a network starting with a sender and ending with a receiver.
- a group of computing devices and programs working together for a common purpose
- An agreed-upon set of rules that specify the behavior of some system
- a group of interconnected computing devices capable of sending or receiving data.
Down
- The unique number assigned to each device on the Internet.
- A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples
- Data with values that change continuously, or smoothly, over time.
- 8 bits
- A type of computer that forwards data across a network
12 Clues: 8 bits • A type of computer that forwards data across a network • A way of representing information using only two options. • The unique number assigned to each device on the Internet. • Data with values that change continuously, or smoothly, over time. • An agreed-upon set of rules that specify the behavior of some system • ...
QUIZ 1 2025-12-01
Across
- an electronic device for storing and processing data,typically in binary form, according to instructionsgiven to it in a variable program.
- was a small, lightweight, and affordable laptop designed primarily for basic computing tasks like web browsing, email, and word processing.
- A desktop computer where the monitor and CPU are integrated into a single unit.
- Medium-sized, used by small businessES
- a Large, high-performance systems for bulk data processing.
- Extremely powerful, used for complex calculations.
Down
- A non-portable computer designed for stationary use, consisting of a separate monitor, CPU, keyboard, and mouse.
- is a handheld personal computer that combines mobile phone capabilities with advanced computing features.
- A touchscreen-based handheld device with mobile OS (e.g., Android, iOS).
- Small, affordable (e.g., desktops, laptops, tablets).
- A portable computer with a built-in screen, keyboard, touchpad, and battery.
- Is a portable, pocket-sized device designed for computing tasks on the go.
12 Clues: Medium-sized, used by small businessES • Extremely powerful, used for complex calculations. • Small, affordable (e.g., desktops, laptops, tablets). • a Large, high-performance systems for bulk data processing. • A touchscreen-based handheld device with mobile OS (e.g., Android, iOS). • Is a portable, pocket-sized device designed for computing tasks on the go. • ...
Cloud Computing 2018-01-30
Across
- / Cloud providers typically use a "___-as-you-go" model, which can lead to unexpected operating expenses
- / The availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of _____ virtualization, service-oriented architecture, and autonomic and utility computing has led to growth in cloud computing
- / Cloud Computing relies on __________ of resources to achieve coherence and economy of scale, similar to a utility
- / What does the "P" in PAAS stand for?
- / Third-party clouds enable organisations to focus on their core businesses instead of expending resources on computer _____ and maintenance
Down
- / Which cloud is cloud infrastructure operated solely for a single organisation?
- / The capability of rapid ________ in clouds, to scale rapidly outward and inward commensurate with demand.
- / Cloud computing shares characteristics with _____ computers which are powerful computers used mainly by large organisations for critical applications typically bulk data processing
- / Which cloud is a composition of two or more clouds?
- / ______, security and confidentiality are some of the reasons why companies choose a private cloud instead of a public one.
10 Clues: / What does the "P" in PAAS stand for? • / Which cloud is a composition of two or more clouds? • / Which cloud is cloud infrastructure operated solely for a single organisation? • / Cloud providers typically use a "___-as-you-go" model, which can lead to unexpected operating expenses • ...
teachers 2013-10-15
18 Clues: chef • ginger • blonde • scared • excusme • climber • annoying • eats alot • best of all • tutor teacher • ermmm not bad • six feet four • scary teacher • mr scemelikofski • good at computing • wears nice cloths • best head of year • best science teacher
Computing - Key knowledge 2017-11-14
Across
- you can do this to files to keep them for a long period of time or until you delete them
- you can do this to a file to share them with another application or someone else
- these can happen to anyone and you should always double check emails you receive or be careful of what links you click on too
- people on the internet should always be classed as this unless you have met them in person
- Graphics and drawings can be produced by these programs in a manner that allows the drawings to be rescaled with no quality loss
- these can create security problems (e.g. using the same password for everything)
- you can do this to files to get them from another source
- this software allow us to manipulate data and perform mathematical functions on this data
- you can share documents on these using examples like google drive, icloud or onedrive
Down
- applications a files can vary in this
- these protect your files or information
- these struggle to communicate with each other especially if they are created by different developers
- this is one of the most important aspects of computing, it connects machines and collects information and expertise from billions of users from around the world
- these are used to find information about you and your search habits. Cookies use these to be able to advertise specifically for you
- you should always do this when you have finished on a program or device
- these connect you to the web, allowing to explore information from the internet on any device
- these applications allow you to draft documents
- a popular form of high speed and low cost communication
- different applications have different versions of these usually with a . before them
19 Clues: applications a files can vary in this • these protect your files or information • these applications allow you to draft documents • a popular form of high speed and low cost communication • you can do this to files to get them from another source • you should always do this when you have finished on a program or device • ...
safe computing assignment 2025-08-06
Across
- Attack traffic to take servers down
- scrambles data for protection
- network of infected computers
- manipulating into confidential info
- hides malware
- records keynotes
- hides IP
- identity check
- stealing data from emails
Down
- watches and sends information to others
- malware disguised as program
- fix for volnurability
- attack targeting vulnerabilities of software
- blocks unauthorized access
- knowledge about cyber threats
- hacking to find flaws
- providing identity
- tries everything to gain access
- locks data until paid for
19 Clues: hides IP • hides malware • identity check • records keynotes • providing identity • fix for volnurability • hacking to find flaws • locks data until paid for • stealing data from emails • blocks unauthorized access • malware disguised as program • scrambles data for protection • network of infected computers • knowledge about cyber threats • tries everything to gain access • ...
Introduction to Computing 2024-09-24
Across
- used to input textual data in a computer
- the main processor of a computer
- the main memory of a computer
- the only code understood by a computer
- data is lost when there is not presence of electricity
- the results given out by a computer
- the main software that coordinates all activities in a computer a
- all the programs that make the computer work
- a unit of storage
Down
- a portable storage device
- used to input pictures in a computer
- a single 1 or 0
- used to display data or results
- used to output sound
- used to drag item on screen
- disc a secondary storage device
- a list of instructions
- small picture seen on screen
- physical units of a computer that can be touched
19 Clues: a single 1 or 0 • a unit of storage • used to output sound • a list of instructions • a portable storage device • used to drag item on screen • small picture seen on screen • the main memory of a computer • used to display data or results • disc a secondary storage device • the main processor of a computer • the results given out by a computer • used to input pictures in a computer • ...
High Performance Computing 2024-07-08
Across
- A parallel computing performance metric where the speedup of a system is measured when the workload is increased, but the problem size remains constant.
- The process of integrating smaller functions directly into the body of their callers to reduce function call overhead.
- Variability in a system's performance due to operating system activities, which can affect the timing and efficiency of parallel programs.
- A high-speed storage area within the CPU used to hold small amounts of data or instructions temporarily.
- The primary component of a computer that performs most of the processing inside a computer.
- The architecture where instructions to be executed by the computer are stored in memory.
- A standardized and portable message-passing system designed to function on a wide variety of parallel computers.
- A common measure of a computer's processing speed, often represented by the number of instructions a CPU can execute per second.
- The time taken by a system to respond to a given input or task.Throughput, clue:The amount of work a computer system can handle in a given period, often measured in transactions per second.
- A type of computer architecture where multiple processors share a common memory space and can communicate directly.
Down
- The practice of specifying how data should be treated in a parallel region to ensure proper execution and avoid conflicts.
- A situation in parallel computing where different processors complete their tasks at different times, leading to inefficiencies.
- The phenomenon where multiple processors unnecessarily contend for the same cache line, even though they are accessing different data.
- The allocation and deallocation of memory during program execution, as opposed to static memory allocation.
- A popular API used for shared memory parallel programming in C, C++, and Fortran, which simplifies writing multi-threaded applications.
- A benchmarking tool used to evaluate the performance of a computer's CPU by running a variety of tests and algorithms.
- A benchmark used to measure a system's floating-point computing power, often used in high-performance computing.
- A temporary storage area that holds data and instructions currently being used by the processor.
- The concept ensuring that all processors in a shared-memory system have a consistent view of memory, preventing conflicts.
19 Clues: The architecture where instructions to be executed by the computer are stored in memory. • The primary component of a computer that performs most of the processing inside a computer. • A temporary storage area that holds data and instructions currently being used by the processor. • ...
COMPUTING CONNAN YANN 2016-05-31
Across
- Taiwaneese brand
- It's what you need to use internet
- The most used operating system
- Creator of IT
- Social network with short messages
- Creator of Apple
- Creator of Facebook
- Manipulate illegally another computer
- American brand
Down
- Japanese brand
- Where you can have bilions friends
- It's what you stock on computer
- Creator of Microsoft
- The fact to code
- Biggest search engine
- Used to share information to other computers
- Program
- Equipment for selecting on the screen
- Equipment for typing something
- Version of Linux
20 Clues: Program • Creator of IT • Japanese brand • American brand • Taiwaneese brand • The fact to code • Creator of Apple • Version of Linux • Creator of Facebook • Creator of Microsoft • Biggest search engine • The most used operating system • Equipment for typing something • It's what you stock on computer • Where you can have bilions friends • It's what you need to use internet • ...
Cloud Computing Architecture 2013-12-16
Across
- / customer
- server / untouchable server
- / maximum amount of storage
- / prerequisite to use the medium
- / maximum connectivity
- server / running solely one application
- device / HDD,SSD,SD etc.
- / secure copy of all data
- / multiple existence
- end / the side the user sees
- server / touchable server
- server / administers the whole system
- interface / UI
Down
- / float of data
- / electronic letters
- / synonym for program
- / #Neuland
- end / the system side
- / serves the networks needs
- processing / 0101 + 0110 = 1011
- / rule
- computing system / the complete system
22 Clues: / rule • / customer • / #Neuland • interface / UI • / float of data • / electronic letters • / multiple existence • / synonym for program • end / the system side • / maximum connectivity • device / HDD,SSD,SD etc. • / secure copy of all data • server / touchable server • server / untouchable server • / maximum amount of storage • / serves the networks needs • end / the side the user sees • ...
Cloud Computing Architecture 2014-01-12
Across
- electronic letters
- serves the networks needs
- I'm not a program!
- the system side
- HDD,SSD,SD etc.
- touchable server
- maximum connectivity
- running solely one application
- float of data
- prerequisite to use the medium
- customer
- the side the user sees
- Floating in the sky
Down
- untouchable server
- the complete system
- multiple existence
- secure copy of all data
- 0101 + 0110 = 1011
- #Neuland
- administers the whole system
- UI
- synonym for program
- maximum amount of storage
- rule
24 Clues: UI • rule • #Neuland • customer • float of data • the system side • HDD,SSD,SD etc. • touchable server • untouchable server • multiple existence • electronic letters • 0101 + 0110 = 1011 • I'm not a program! • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • serves the networks needs • maximum amount of storage • ...
Fundamentals of Computing 2023-12-07
Across
- The smallest unit of data in a computer
- A type of software that performs a specific task
- The physical location of a website or resource on the internet
- The physical components of a computer system
- The main circuit board in a computer
- The brain of a computer
- The protocol used for sending and receiving emails
- A device that allows information to be entered into a computer
- A network of computers that are connected and can communicate with each other
- A series of instructions that a computer can execute
Down
- The process of a computer starting up
- A program that replicates itself and spreads to other computers
- A small piece of code that performs a specific task
- The process of finding and fixing errors in a program
- A storage device that uses spinning disks to store data
- A code that is used to access a computer or network
- A device used to input data into a computer
- A type of memory that is volatile and loses its content when power is turned off
- A type of software that protects a computer from malicious software
- The shortcut key to undo an action in many applications
- A type of software that allows users to browse the internet
21 Clues: The brain of a computer • The main circuit board in a computer • The process of a computer starting up • The smallest unit of data in a computer • A device used to input data into a computer • The physical components of a computer system • A type of software that performs a specific task • The protocol used for sending and receiving emails • ...
Dependable Computing 1 2024-03-16
Across
- likely problems systems are likely to have.
- subsystems of other subsystems and its components.
- when there is a error inaccurate notification.
- expected loss
- systems must always be active.
- a procedure for achieving dependability.
- secret or private information that only a select few have access to.
- lack of error notification when their is one.
- an event that was not supposed to occur.
- the solution a system must implement to solve an issue.
Down
- Tests to achieve dependability.
- what the system is supposed to do when it works correctly.
- backup plan or system.
- separation between the system and its environment.
- systems that cause negligible or no harm.
- The likelihood that a system will work properly in a specified operating environment time t.
- Consequences that appear to be negligible but are not.
- products and information of value need protection.
- an erroneous state
- ethical system alterations.
20 Clues: expected loss • an erroneous state • backup plan or system. • ethical system alterations. • systems must always be active. • Tests to achieve dependability. • a procedure for achieving dependability. • an event that was not supposed to occur. • systems that cause negligible or no harm. • likely problems systems are likely to have. • lack of error notification when their is one. • ...
fundamentals of computing 2023-09-01
20 Clues: area • fonts • looks • values • colors • simple • one hue • next to • content • hobbies • opposite • grey hue • pictures • white hue • intensity • black hue • audience customers • commonly used audience • budget, values,attitudes • age, gender, race, religion
fundamentals of computing 2023-09-01
20 Clues: area • fonts • looks • values • colors • simple • one hue • next to • content • hobbies • opposite • grey hue • pictures • white hue • intensity • black hue • audience customers • commonly used audience • budget, values,attitudes • age, gender, race, religion
fundamentals of computing 2023-09-01
20 Clues: area • fonts • looks • values • colors • simple • one hue • next to • content • hobbies • opposite • grey hue • pictures • white hue • intensity • black hue • audience customers • commonly used audience • budget, values,attitudes • age, gender, race, religion
Impacts of Computing 2025-04-04
Across
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making
- a wireless access point that gives unauthorized access to secure networks is known as this.
- a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
- ____________ key encryption pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message. The foundation of all secure messaging on the open internet.
- publicly available data shared by governments, organizations, and others
- involves one key for both encryption and decryption.
- Any piece of work that can be done without requiring a human's attention
- a process that reverses encryption, taking a secret message and reproducing the original plain text.
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- a method of raising funds for projects and initiatives, like their "Hour of Code," through the collective efforts of individuals, organizations, and companies, often via platforms like Indiegogo
Down
- the practice of obtaining input or information from a large number of people via the Internet.
- groups elderly, rural, developing countries and demographics potentially by race or gender like ethnic minorities or women
- the gaps between those who have access to technology and the internet and those who don't.
- extremely large and diverse collections of structured, unstructured, and semi-structured data that continues to grow exponentially over time
- the use or operation of computers.
- bias (algorithmic bias) systematic and repeatable errors in a computer system that create "unfair" outcomes, such as "privileging" one category over another in ways different from the intended function of the algorithm
- the process of hiding or coding information so that only the person a message was intended for can read it
- software intended to damage a computing system or to take partial control over its operation
- how computers recognize patterns and make decisions without being explicitly programmed; a type of AI
- code that is publicly accessible for anyone to view, modify, and distribute, fostering collaboration and transparency
- the generic term for a technique (or algorithm) that performs encryption
- a cipher technique for encryption that shifts the alphabet by some number of characters
- When you attempt to decode a secret message without knowing all the specifics of the cipher, you are _______________ the encryption.
- bias data that does not accurately reflect the full population or phenomenon being studied
- a process of encoding messages to keep them secret, so only "authorized" parties can read it.
- a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
- protecting a computing system against infection by __________ the software for malware
27 Clues: the use or operation of computers. • involves one key for both encryption and decryption. • publicly available data shared by governments, organizations, and others • the generic term for a technique (or algorithm) that performs encryption • Any piece of work that can be done without requiring a human's attention • ...
Emerging Technologies Vocabulary 2025-02-13
Across
- Artificial Intelligence
- a computing environment that allows users to access computing power from any device anywhere at any time
- a blog that features audio recording instead of written text
- the use of virtual reality technology
- the activity or practice of posting short videos to or maintaining a vlog
- a combination of engineering science and technology that creates machines called robots
Down
- the practice of protecting digital assets from cyberattacks
- a tiny device that detect and measure physical chemical biological or environmental changes at the nanoscale
- a classroom technology that allows teachers to ask questions and get students answers in real time
- branch of technology that deals with dimensions and tolerances of less than 100 nanometers
- a network of physical objects that can connect and share data with other devices and systems
11 Clues: Artificial Intelligence • the use of virtual reality technology • the practice of protecting digital assets from cyberattacks • a blog that features audio recording instead of written text • the activity or practice of posting short videos to or maintaining a vlog • a combination of engineering science and technology that creates machines called robots • ...
Lindsay Uba & Aubrey Lindeman 2024-01-09
Across
- __ number of bits
- A way of representing numbers using 1 and 0
- Facts and patterns extracted from data
- An action that triggers a certain part of code
- A group of computing devices and programs working together for a common purpose
- Data sent to a computer for processing
Down
- Relationship between two groups of data
- An explanation of code that does not effect how it runs
- Data sent from a processor to a computer
- A computer that forwards data
- A unique number assigned to a computing device
- The process of fixing problems in your code
- Words in code in quotations
- data about data
- Named group of programming instructions
15 Clues: data about data • __ number of bits • Words in code in quotations • A computer that forwards data • Facts and patterns extracted from data • Data sent to a computer for processing • Relationship between two groups of data • Named group of programming instructions • Data sent from a processor to a computer • A way of representing numbers using 1 and 0 • ...
Computer Types 2025-09-02
Across
- Industrial giant, legacy core for enterprise-scale tasks
- Lightweight terminal, reliant on remote computing power
- Touchscreen slate, sleek and gesture-driven
- Unified screen and system, clutter-free and complete
- Hidden processor, tucked inside appliances and devices
- Compact traveler, light on weight and purpose
- Shape-shifting machine, part tablet, part laptop
- Stationary powerhouse, built for permanence and performance
- Speed-drenched titan, crunching numbers at cosmic scale
Down
- Future-bound thinker, computing with entangled logic
- Game-focused system, optimized for play and immersion
- Precision-built rig for creators, coders, and engineers
- Cloud-centric device, streamlined for web and simplicity
- Small-scale desktop, compact yet capable
- Backbone machine, quietly powering networks and data flow
- Foldable companion, portable yet potent in its shell
- Slimline performer, balancing elegance and efficiency
17 Clues: Small-scale desktop, compact yet capable • Touchscreen slate, sleek and gesture-driven • Compact traveler, light on weight and purpose • Shape-shifting machine, part tablet, part laptop • Future-bound thinker, computing with entangled logic • Unified screen and system, clutter-free and complete • Foldable companion, portable yet potent in its shell • ...
computing phrases 2018-05-07
Across
- the act or process of looking carefully in order to find something
- secret word that you use to log in a site
- to put a computer program onto a computer so that the computer can use it.
- a word or image in an electronic document or on a website that you can click on to take you to another part of the document.
Down
- information stored on a computer as one unit with one name.
- a radio programme that is stored in a digital form that you can download from the internet and play it.
- to copy or move programs or information to another computer system, especially to the internet.
- an occasion when someone passes something on a social media website.
- a small computer program that you can download onto a mobile phone.
- to copy programs or information to a computer, usually over the Internet
- a computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally.
- to remove data, documents, programs, etc.
12 Clues: secret word that you use to log in a site • to remove data, documents, programs, etc. • information stored on a computer as one unit with one name. • the act or process of looking carefully in order to find something • a small computer program that you can download onto a mobile phone. • an occasion when someone passes something on a social media website. • ...
Cloud Computing 2024-02-16
Across
- Lightweight, portable, and scalable application packaging.
- Environment for developing and running applications.
- Ability to handle increased workload.
- Creating virtual versions of resources.
- Organized collection of data.
- Connecting and transferring data between devices.
Down
- Hardware providing resources.
- Automatically performing tasks.
- Protecting against unauthorized access.
- Processing and executing tasks.
- Services over the internet.
- Saving and managing data.
12 Clues: Saving and managing data. • Services over the internet. • Hardware providing resources. • Organized collection of data. • Automatically performing tasks. • Processing and executing tasks. • Ability to handle increased workload. • Protecting against unauthorized access. • Creating virtual versions of resources. • Connecting and transferring data between devices. • ...
Computing Crossword 2025-04-07
Across
- used to move the cursor on the screen
- personal information like a name or address
- a small portable computer
- a secret word used to keep accounts safe
- the physical parts of a computer
- sending rude or threatening messages online
Down
- a handheld device that can access the internet
- the programs and operating systems on a computer
- a popular search engine
- used to type letters and numbers
- a common way to connect to the internet
- the brain of a computer
12 Clues: a popular search engine • the brain of a computer • a small portable computer • used to type letters and numbers • the physical parts of a computer • used to move the cursor on the screen • a common way to connect to the internet • a secret word used to keep accounts safe • personal information like a name or address • sending rude or threatening messages online • ...
computing crossword 2025-12-16
Across
- to enhance change or recolour a photo
- a standard encoding system that assigns a unique numeric value to every character
- consisting of 8 bits (binary digits), used to represent a single character (like a letter, number, or symbol)
- a named collection of digital data (like text, images, programs, videos)
- the smallest unit of data in computing, represented as a 1 or 0
- vibrations that travel through the air and can be recorded in waves
Down
- American Standard Code for Information Interchange
- a tiny square or dot that represents a single point of color
- the standard base-10 number system we use daily
- a mathematical concept representing quantity, used for counting, measuring, and labeling
- a single symbol used to represent numbers
- a base-2 number system using only 0s and 1s that computers use
12 Clues: to enhance change or recolour a photo • a single symbol used to represent numbers • the standard base-10 number system we use daily • American Standard Code for Information Interchange • a tiny square or dot that represents a single point of color • a base-2 number system using only 0s and 1s that computers use • ...
crossword3BE_CSE 2017-09-12
Across
- _______ provides virtual machines, virtual storage, virtual infrastructure, and other
- them into one, executable program.
- ______ is a general-purpose, developmental, modeling language
- than one leftmost derivation or parse tree
- the field of software engineering, that is intended to provide a standard way to visualize the
- (INSERT, UPDATE, DELETE).
- _________ computing refers to applications and services that run on a distributed
- by Nvidia
- Google doc is example of______
- instance of a class diagram______
Down
- an ________ grammar is a context-free grammar for which there exists a string that can have
- What is result of lexical analyzer
- Event diagram is also know as ______ diagram.
- of a system
- assets
- a _____ is a computer program that takes one or more object files generated by a compiler and
- using virtualized resources.
- ____ is a parallel computing platform and application programming interface (API) model
- _____ is characterized by a large number of short on-line
19 Clues: assets • by Nvidia • of a system • (INSERT, UPDATE, DELETE). • using virtualized resources. • Google doc is example of______ • instance of a class diagram______ • What is result of lexical analyzer • them into one, executable program. • than one leftmost derivation or parse tree • Event diagram is also know as ______ diagram. • ...
SCHOOL SUBJECTS 2024-05-24
gab2022hotelx01 2022-10-27
13 Clues: ___ payment • ___ industry • ___ agencies • business ___ • ___ check-in • ___ room key • ___ computing • room cleaning • large meetings • online room ___ • ___ intelligence • presidential ___ • contactless technology
Buzzword Bingo: The Business & Tech Crossword 2025-02-06
Across
- Not the best player, but the cheapest product that works.
- What separates disruptors from followers?
- Not the browser, but the computing frontier.
- Sounds complex, because it is.
- Secure, decentralized, and sometimes misunderstood.
- Fancy way to say "we work together."
- When monoliths get a personality split.
- Not just for athletes, but for developers too.
- The universal handshake between software.
Down
- Being Responsible till the end
- Where your data goes when it leaves your laptop.
- When Plan A flops and you pretend Plan B was always the goal.
- The magical bridge between coding and deployment.
- The future of computing, but still mind-bending.
- When you have zero funding but maximum ambition.Scale What happens after your servers melt from too many users.
- AI Spectre
- What every marketing team prays for.
- Pay monthly, own nothing, but keep using it.
- One codebase, two platforms—because efficiency matters.
19 Clues: AI Spectre • Being Responsible till the end • Sounds complex, because it is. • What every marketing team prays for. • Fancy way to say "we work together." • When monoliths get a personality split. • What separates disruptors from followers? • The universal handshake between software. • Not the browser, but the computing frontier. • ...
IEEE CS Git Informed 2025-10-27
Across
- Computation type where multiple processes run simultaneously.
- Iterative and incremental approach to development.
- Pioneer recognized as the father of computer science.
- A fundamental unit of work in a database system.
- Integrated circuit that contains the core of a computer.
- Fundamental structure of a computer system's components.
Down
- Step-by-step procedure for solving a problem.
- Formal documents defining hardware and protocol rules.
- Prefix describing the security field protecting networks.
- The primary focus area of the Computer Society.
- Chip designed for a specific application only.
- Computing resources delivered over the internet.
- The academic field central to the IEEECS mission.
- Peer-reviewed academic publication of the society.
14 Clues: Step-by-step procedure for solving a problem. • Chip designed for a specific application only. • The primary focus area of the Computer Society. • A fundamental unit of work in a database system. • Computing resources delivered over the internet. • The academic field central to the IEEECS mission. • Iterative and incremental approach to development. • ...
Cloud Computing - Crossword 2021-06-09
Across
- Rackspace Cloud is an example of ______ (4)
- A cloud concept related to the pooling and sharing of resources (14)
- Cloud Security _________ name of the organization helping to foster security standards for cloud computing (8)
- One of the two fundamental components of a cloud computing system(8)
Down
- The first 'S' in SaaS (8)
- A very popular distributed algorithm (9)
- A cloud platform by Amazon (3)
- A cloud computing video game service(6)
8 Clues: The first 'S' in SaaS (8) • A cloud platform by Amazon (3) • A cloud computing video game service(6) • A very popular distributed algorithm (9) • Rackspace Cloud is an example of ______ (4) • A cloud concept related to the pooling and sharing of resources (14) • One of the two fundamental components of a cloud computing system(8) • ...
AI TECHNOLOGY AND SOCIETY 2024-03-06
The bigger picture 2025-01-22
Across
- Having or producing energy that comes from atoms breaking up.
- The country which is the world's largest producer or rare earth metals.
- Tsunami early system use .... networks to detect and issue timely warnings.
- NASA is analysing .... data and measuring sea surface temperatures to learn more about how any sea levels are rising.
- Making something dirty or polluted.
- ... Materials-resources that cannot be replaced naturally; only a certain amount exists.
- ...computing refers to the efficient use of resources in computing, with a minimal carbon footprint.
Down
- The amount of carbon dioxide an individual or organisation produces as a result of the energy they consume.
- A substance that can conduct electricity under some conditions but not others, making it a good medium for the control of electrical current.
- Is any form of discarded electronic equipment, including computing technology.
- Concerned with what is morally right or wrong
- Havcomputer/printer printer in .... mode when not in use reduce the energy consumption.
- Being affected by something harmful because you are in the same place as it.
- A metal used in the manufacture of circuit boards and cable sheathing.
- Information from .... also being used to track in wild life conservation,
15 Clues: Making something dirty or polluted. • Concerned with what is morally right or wrong • Having or producing energy that comes from atoms breaking up. • A metal used in the manufacture of circuit boards and cable sheathing. • The country which is the world's largest producer or rare earth metals. • ...
Hardware-Kayleigh 2019-01-10
Across
- Display screen
- Central processing unit is the brain of the computer.
- Main circuit board of a micro computer
- Personal computers that normally uses windows
- A device that feeds data into the computer
- Physical components of the computer like a monitor
- A computer made b Apple
- Portable storage device that attaches to a USB port
- A device that controls the movement of the pointer on screen
Down
- Internal storage in the computer
- Silicon chip that contains a CPU
- Display screens,loudspeakers and printers
- Typewriter like keys that allow you to enter data into the computer.
- It combines computing and networking features.
- Magnetic disk where you can store computing data
15 Clues: Display screen • A computer made b Apple • Internal storage in the computer • Silicon chip that contains a CPU • Main circuit board of a micro computer • Display screens,loudspeakers and printers • A device that feeds data into the computer • Personal computers that normally uses windows • It combines computing and networking features. • ...
OS Unit1 2019-02-14
Across
- Concentric circles on the surface of the disk
- Controlling the access to system resources
- Active Entity
- Alternate name for Batch system
- Signal from a device
- Programmatic way in which a computer program requests a service from the kernel of the OS
- Biggest Non-Volatile storage media in the system
Down
- Systems having two or more processors sharing common bus, peripherals and memory
- Alternate name for time sharing systems
- Processes exchanging of information
- Copies information to a faster storage device
- System Software which manages the computer resources
- Mode in which the instructions are executed with access to computing resource
- Basic Computing resources
- Unix System Call that creates process
15 Clues: Active Entity • Signal from a device • Basic Computing resources • Alternate name for Batch system • Processes exchanging of information • Unix System Call that creates process • Alternate name for time sharing systems • Controlling the access to system resources • Copies information to a faster storage device • Concentric circles on the surface of the disk • ...
Computer Science 2023-02-02
Across
- Software used for a spreadsheet
- An application developed by microsoft that was made by bill gates
- physical components that make up a computer system
- sequence of steps taken to solve a problem
- An electronic device
- a application used for typing documents
- a panel of keys that operate a computer
- an electronic visual display for computers
Down
- Is the study of computers, computing, programing, and computation with computer systems
- To update a document that has always been saved as
- Operation of a computer
- A presentation you can use for school or businesses
- the programs that help the computer run
- a printed version on paper
- device used to permanently restore and receive information
15 Clues: An electronic device • Operation of a computer • a printed version on paper • Software used for a spreadsheet • the programs that help the computer run • a application used for typing documents • a panel of keys that operate a computer • sequence of steps taken to solve a problem • an electronic visual display for computers • ...
DCIC Newsletter Q2 2023-02-10
Across
- computing, process of providing IT services over the internet
- defines an elements styling effects
- ledger system to process and track transactions and assets
- acr. software enabling users to manage and create/delete/update digital content
- user's experience with an application across digital touchpoints
- storing recurring assets
- the next internet
Down
- increasing automation through AI, ML, or RPA
- prioritization framework to quantify economic value of project timeline
- acr. technology for mobile device communication
- management framework combining two popular agile methodologies
- computing, exploiting a specific mechanical phenomena
- acr. network of physical objects using the internet
- individual components of a document or webpage
- acr. combines software design, dev., ops, & analytics to mitigate business risks
15 Clues: the next internet • storing recurring assets • defines an elements styling effects • increasing automation through AI, ML, or RPA • individual components of a document or webpage • acr. technology for mobile device communication • acr. network of physical objects using the internet • computing, exploiting a specific mechanical phenomena • ...
Computing words 2015-01-09
Across
- Another way of representing binary, a way of representing negative numbers (4-10)
- Include System software, Utility software and Application software (4-2-9)
- A basic method for detecting if an odd number of bits has been switched by accident (6)
- Interface which includes small pictures or graphics (3)
- Sends the actual data to or from CPUs to actual devices (7)
- Temporarily holds data whilst a new instruction is fetched (6)
Down
- A way of showing how the finished product might look (11)
- Non-volatile storage that is not under the direct control of CPU (9-7)
- Three versions, first is alpha (7)
- Base 8 numbers (5)
- International version of ASCII (7)
- Descended from from punch cards and corresponds to 6 bit binary coded decimal (6)
12 Clues: Base 8 numbers (5) • Three versions, first is alpha (7) • International version of ASCII (7) • Interface which includes small pictures or graphics (3) • A way of showing how the finished product might look (11) • Sends the actual data to or from CPUs to actual devices (7) • Temporarily holds data whilst a new instruction is fetched (6) • ...
computing device 2017-06-30
Across
- delete files from your computer.
- & Pharming Phishing is sending fake emails to you to
- They come in 3 types : virus, worm and Trojan horse
- get so much unnecessary advertisement
- without the user's permission
Down
- horse It carries the virus inside it
- is junk mail that clogs your inbox which is when
- It slows down your computer
- is software that is installed on a someone's computing
- by eaves dropped by eaves dropping
- your personal information like: bank codes.
- Eaves Dropping Connecting public Wi-Fi someone can get your
12 Clues: It slows down your computer • without the user's permission • delete files from your computer. • by eaves dropped by eaves dropping • horse It carries the virus inside it • get so much unnecessary advertisement • your personal information like: bank codes. • is junk mail that clogs your inbox which is when • They come in 3 types : virus, worm and Trojan horse • ...
Cloud Computing 2024-02-16
Across
- Lightweight, portable, and scalable application packaging.
- Environment for developing and running applications.
- Ability to handle increased workload.
- Creating virtual versions of resources.
- Organized collection of data.
- Connecting and transferring data between devices.
Down
- Hardware providing resources.
- Automatically performing tasks.
- Protecting against unauthorized access.
- Processing and executing tasks.
- Services over the internet.
- Saving and managing data.
12 Clues: Saving and managing data. • Services over the internet. • Hardware providing resources. • Organized collection of data. • Automatically performing tasks. • Processing and executing tasks. • Ability to handle increased workload. • Protecting against unauthorized access. • Creating virtual versions of resources. • Connecting and transferring data between devices. • ...
Cloud Computing 2024-02-16
Across
- Lightweight, portable, and scalable application packaging.
- Environment for developing and running applications.
- Ability to handle increased workload.
- Creating virtual versions of resources.
- Organized collection of data.
- Connecting and transferring data between devices.
Down
- Hardware providing resources.
- Automatically performing tasks.
- Protecting against unauthorized access.
- Processing and executing tasks.
- Services over the internet.
- Saving and managing data.
12 Clues: Saving and managing data. • Services over the internet. • Hardware providing resources. • Organized collection of data. • Automatically performing tasks. • Processing and executing tasks. • Ability to handle increased workload. • Protecting against unauthorized access. • Creating virtual versions of resources. • Connecting and transferring data between devices. • ...
Cloud Computing 2024-02-16
Across
- Lightweight, portable, and scalable application packaging.
- Environment for developing and running applications.
- Ability to handle increased workload.
- Creating virtual versions of resources.
- Organized collection of data.
- Connecting and transferring data between devices.
Down
- Hardware providing resources.
- Automatically performing tasks.
- Protecting against unauthorized access.
- Processing and executing tasks.
- Services over the internet.
- Saving and managing data.
12 Clues: Saving and managing data. • Services over the internet. • Hardware providing resources. • Organized collection of data. • Automatically performing tasks. • Processing and executing tasks. • Ability to handle increased workload. • Protecting against unauthorized access. • Creating virtual versions of resources. • Connecting and transferring data between devices. • ...
Cloud Computing 2024-02-16
Across
- Lightweight, portable, and scalable application packaging.
- Environment for developing and running applications.
- Ability to handle increased workload.
- Creating virtual versions of resources.
- Organized collection of data.
- Connecting and transferring data between devices.
Down
- Hardware providing resources.
- Automatically performing tasks.
- Protecting against unauthorized access.
- Processing and executing tasks.
- Services over the internet.
- Saving and managing data.
12 Clues: Saving and managing data. • Services over the internet. • Hardware providing resources. • Organized collection of data. • Automatically performing tasks. • Processing and executing tasks. • Ability to handle increased workload. • Protecting against unauthorized access. • Creating virtual versions of resources. • Connecting and transferring data between devices. • ...
computing crossword 2025-12-16
Across
- what is the name of the computers number system
- how does computes sample sound
- Height above sea level or ground level
- what is the name of are number system
- size How much computer storage space a sound file takes up
Down
- Information stored as a series of 1s and 0s by a computer
- The size or strength of a sound wave, determining how loud the sound is
- how many colours are in one pixel
- How much computer storage space a sound file takes up
- quality How clear and accurate a recorded sound is compared to the original
- A continuous signal or data that varies smoothly over time
- what does American Standard Code for Information Interchange
12 Clues: how does computes sample sound • how many colours are in one pixel • what is the name of are number system • Height above sea level or ground level • what is the name of the computers number system • How much computer storage space a sound file takes up • Information stored as a series of 1s and 0s by a computer • ...
AI in Analytics 2024-03-12
Across
- Ethical consideration in AI development and deployment: ________ (9)
- Initiative leveraging data for social good: Data for ________ (4)
- Energy sources like solar and wind: ________ energy (9)
- Fundamental unit of classical computing: ________ (4)
Down
- Role empowering individuals to critically evaluate information: Data ________ (7)
- Approach enabling predictive maintenance in renewable energy: Data ________ (7)
- Computing paradigm bringing computational power closer to where it's needed: ________ computing (4)
- Quantum bits capable of existing in multiple states: ________ (6)
8 Clues: Fundamental unit of classical computing: ________ (4) • Energy sources like solar and wind: ________ energy (9) • Quantum bits capable of existing in multiple states: ________ (6) • Initiative leveraging data for social good: Data for ________ (4) • Ethical consideration in AI development and deployment: ________ (9) • ...
Staff Subjects - Do you know? 2024-04-25
16 Clues: - Mr Kaye • - Mr Cook • - Mr Nixon • - Mr Allan • - Mrs Clark • - Miss Hill • - Mr Conchie • - Mrs Barson • - Mrs Gibbons • - Mrs Donlevy • - Mrs Bennett • - Mr Parkinson • - Mrs Whitehead • - Mr A Williams • - Mr McGuinness • - Mrs Gillespie
Emerging and Future Technology 2024-08-22
Across
- - a website or Web 2.0 application that uses content from more than one source to create a new service.
- - a decentralized and distributed network that is used to record transactions across connected devices as blocks of data that cannot be altered after being recorded.
- -computing - pushes processing and data to the near edge of the network, which enables timely collection, processing, and analysis of data.
- - also known as Personal Response Systems. A device used by an audience to respond to an instructor's presentation delivered through wireless devices.
- Service Providers – provide access to software or services for free.
- -(on demand) computing - the provision of IT services on demand. Users pay for computing or storage resources on an as-needed basis, like the way one pays for utilities.
- - a field of science whose goal is to control individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies.
- - a blog that includes video.
- Applications - collaborative and interactive tools that are strictly web-based and are typically free to the user.
Down
- - blogs or weblogs that are enriched by audio files.
- -Simple Syndication (RSS) - a lightweight XML format designed for sharing headlines and other web content.
- - a small computer on a single metal-oxide-semiconductor integrated circuit chip.
- -Computing - the possibility of computers being embedded into almost everything and potentially able to communicate.
- - a set of technologies, such as high definition audio, video, and other interactive elements that enable people to feel or appear as if they were present in a location which they are not physically in.
14 Clues: - a blog that includes video. • - blogs or weblogs that are enriched by audio files. • Service Providers – provide access to software or services for free. • - a small computer on a single metal-oxide-semiconductor integrated circuit chip. • - a website or Web 2.0 application that uses content from more than one source to create a new service. • ...
