computing Crossword Puzzles
Computer System 2023-09-23
Across
- ________ causes increased time to start a parallel program.
- weather and climate modelling is an example of ____ parallelism.
- _________ limitation makes the sequential portion not parallelized.
- competition of shared resources such as CPU time or memory which leads to variation in task execution
- The RAM model is used to analyze the ________ complexity of the algorithm
- Web server handling multiple client request is an example of ____ parallelism.
- unpredictable performance due to race conditions in multi-threaded applications causes __ issues
- effective load balancing mechanism rely on ________ to monitor workloads and redistribute tasks as needed.
- Jitter cause due to variations in packet delivery times in network.
- ________parallelism is balance between fine-grained and coarse grained parallelism.
- ______ model analyses the sequential execution of an algorithm
- If an algorithm has a time complexity of O(log2n), it is classified as ___ time complexity
- __________ is the ratio of the execution time of the best sequential algorithm to the execution time of the parallel algorithm using a specific number of processors.
Down
- _________ occurs when the work is unevenly distributed across processing units in a parallel computing.
- _____ is the worst case scenario used to analyse the complexity of the algorithm.
- The fluctuations in the response time or latency in the execution of tasks is due to ______
- ___________ quantifies the performance improvement gained by adding more processing units to a parallel computation.
- _____ smaller unit of work in parallelism
- functional parallelism is also known as _________ parallelism
- high priority task using the CPU time over a low priority task
- Structural Engineering Simulations are done in data parallelism using ______.
- In time complexity analysis, “n” typically represents: the ______ of input elements.
- _________ parallelism is where same instruction is applied to multiple data elements simultaneously.
- ________ model analyses the parallel execution of an algorithm
- Efficiency of above 100% in parallel systems is attributed due to _______
- Which of the PRAM models has most relaxed constraints on memory access and synchronization
- Access to shared resources causing slow performance and increased resource contention is called___
27 Clues: _____ smaller unit of work in parallelism • ________ causes increased time to start a parallel program. • functional parallelism is also known as _________ parallelism • high priority task using the CPU time over a low priority task • ________ model analyses the parallel execution of an algorithm • ______ model analyses the sequential execution of an algorithm • ...
UntitledAidan 2023-09-15
Across
- An output device that displays information in pictorial or textual form
- A search engine is a web-based tool that enables users to locate information on the World Wide Web.
- A set of instructions, data or programs used to operate computers and execute specific tasks
- A peripheral device that enables a user to input text into a computer or any other electronic machinery
- A device that allows videos and images to be online.
- A network security system that monitors and controls incoming and outgoing network traffic
- A global computer network providing a variety of information and communication facilities
- A device that forwards data packets to the appropriate parts of a computer network
- A deceptive activity in which a person creates a fictional persona of a fake identity
- When someone uses the internet in a safe and legal way
- A program that, after being initially loaded into the computer by a boot program, and manages all of the other application programs in a computer
- To give credit for the original source of information, an idea, or way of articulating an idea
- A sequence of characters or encoded information identifying when a certain event occurred
Down
- A structured set of data held in a computer
- Small blocks of data created by a web server
- Any product that will store, retrieve, manipulate, transmit or receive information electronically in a digital form
- A common computing acronym that stands for random-access memory
- A security system that requires two separate, distinct forms of identification in order to access something
- An auxiliary hardware device used to transfer information into and out of a computer
- A computer network that links devices within a building or group of adjacent buildings
- A social engineering attack used to steal somebody's personal information
- A computer suitable for use at an ordinary desk
22 Clues: A structured set of data held in a computer • Small blocks of data created by a web server • A computer suitable for use at an ordinary desk • A device that allows videos and images to be online. • When someone uses the internet in a safe and legal way • A common computing acronym that stands for random-access memory • ...
IT Profession 2023-10-02
Across
- Who collects, processes, and analyzes data to provide insights and support decisionmaking?
- Who combines software development and IT operations to improve the software delivery process?
- Who specializes in securing computer networks and data against cyber threats?
- Who focuses on creating userfriendly and visually appealing interfaces for software and websites?
- Who manages and maintains an organization's computer systems and networks?
- Who evaluates software for defects and ensures it meets quality standards?
- Who develops algorithms and models for artificial intelligence and machine learning applications?
- Who analyzes business processes and designs IT systems to improve efficiency and productivity?
- Who specializes in the design, implementation, and management of cloud computing solutions?
- Who protects computer systems and data from security breaches and cyberattacks?
- Who leads and coordinates IT projects, ensuring they are completed on time and within budget?
- Who creates applications specifically for mobile devices, such as smartphones and tablets?
- Who oversees the storage, organization, and security of databases?
- Who writes and tests code to create software applications and systems?
- Who educates individuals or employees on using IT systems and software effectively?
Down
- Who analyzes and interprets complex data to extract valuable insights and make datadriven decisions?
- Who implements and manages integrated software systems for business processes?
- Who designs, implements, and manages computer networks for data communication?
- Who assesses an organization's IT systems and practices to ensure compliance and security?
- Who designs, develops, and tests software solutions for specific purposes?
- Who provides technical assistance and support to endusers and resolves ITrelated issues?
- Who identifies business needs and uses technology to find solutions to business problems?
- Developer Who works on blockchain technology to create secure and decentralized applications?
- Who designs and creates websites, web applications, and user interfaces?
- Who offers expert advice and solutions to organizations for their ITrelated challenges?
25 Clues: Who oversees the storage, organization, and security of databases? • Who writes and tests code to create software applications and systems? • Who designs and creates websites, web applications, and user interfaces? • Who designs, develops, and tests software solutions for specific purposes? • ...
Vocab 12/14 2024-12-14
Across
- Predictions that the technology would revolutionize computing proved ___, as all the bugs had not been worked out.
- His behavior was so ___ that even his closest friends found it difficult to be around him.
- A spark in the dry grass quickly turned into a raging ___, consuming the forest in minutes.
- Frustrated with the draft of her essay, she ripped the page from her notebook and tore it ___.
- The scientist was an ___ figure in her field, often consulted for her groundbreaking research.
- As the consequences of her choices became clear, she began to ___ on how things could have turned out differently.
- After multiple violations, the council decided to ___ her membership in the organization.
- After his ___, the exile moved from country to country, unable to settle down in a new home.
Down
- This ancient document is not the original but an accurate ___, copied by hand centuries ago.
- She looked up at the night sky, marveling at the ___ stars twinkling above.
- The sun’s rays were so intense that they began to ___ the plant’s delicate leaves.
- The clock’s ___ swung back and forth, marking the passage of time with a steady rhythm.
- He offered a heartfelt apology and promised to ___ her for the damage he had caused.
- The fish began to ___ violently, making it difficult to hold on to the line.
- The explorers ventured into the ___ cave, shivering from the cold and damp air.
- His ___ expression made it clear that he wasn’t interested in talking to anyone.
- As she read him a bedtime story, the steady ___ of her voice lulled him to sleep..
- Before moving to a new home, they had to ___ the old shed, piece by piece.
- They descended into the ___, where the air grew colder and the walls seemed to close in around them.
- The smell was so ___ that everyone in the room recoiled in disgust.
20 Clues: The smell was so ___ that everyone in the room recoiled in disgust. • Before moving to a new home, they had to ___ the old shed, piece by piece. • She looked up at the night sky, marveling at the ___ stars twinkling above. • The fish began to ___ violently, making it difficult to hold on to the line. • ...
BUSN101 MOD2 OPNS MGMT & IT 2025-01-21
Across
- - The resilience and reliability of technology systems, crucial for business continuity.
- - Processed data that is meaningful and useful in decision-making.
- - The department or function involved in managing employees and addressing issues like IT training and staffing.
- - A private network accessible only within an organization.
- - A network that spans a large geographic area, often used for business operations.
- - The process of examining data sets to draw conclusions about the information they contain.
- - A private network that shares part of an organization’s information with external parties.
- - A system of maintaining standards in manufactured products by testing a sample of the output.
- - A method of inventory management that reduces storage costs by delivering materials as they are needed in production.
- - Measures taken to protect digital systems and information from unauthorized access or attacks.
- - A visual timeline for managing and tracking project progress.
- - The next-generation wireless technology that supports faster data transmission and enhanced connectivity.
Down
- - A production strategy that combines mass production's efficiency with customization's flexibility.
- - A computer-aided tool used for designing products and improving productivity.
- - A high-speed data transmission method that enabled advancements like Web 2.0 and 3.0.
- - The management of systems or processes that create goods and services, evolved from traditional production practices.
- - A manufacturing approach focused on minimizing waste while maximizing productivity.
- - A network connecting computers within a limited area, like a building.
- - The right of individuals to control access to their personal information, a concern in information technology.
- - The evolution of the internet characterized by more intelligent and connected applications.
- - A project management tool used to schedule, organize, and coordinate tasks.
- - A network that provides secure remote access through encrypted connections.
- - Technology involving programmable machines that perform tasks traditionally carried out by humans.
- - The process of producing goods using machinery and labor, often discussed in the context of improving U.S. competitiveness.
- - A technology that allows data storage and computing services over the internet.
25 Clues: - A private network accessible only within an organization. • - A visual timeline for managing and tracking project progress. • - Processed data that is meaningful and useful in decision-making. • - A network connecting computers within a limited area, like a building. • - A project management tool used to schedule, organize, and coordinate tasks. • ...
ISCC Chapter 3 2025-01-22
Across
- A record used to restore databases when damaged
- Data that describes other data
- The smallest unit of data accessible by a user
- Refers to programs and users sharing data in a database
- A record of database activities and changes
- A database accessed through web interfaces
- A request for information retrieval from a database
- A system supporting a small group of users, such as a department
- An item containing data and actions that process the data
- A unique identifier for each record in a database
- The technique to extract useful insights from raw data
- Another name for metadata in DBMS
- A tree-like structure database model
- The action of recovering a database from damage
- Information systems model that allows many-to-many relationships
- Procedures to ensure data is current and accurate
- The act of creating duplicate copies of a database
- A process comparing data to rules for accuracy
- A type of database allowing storage of various types of data and actions
Down
- The language used to manage, update, and retrieve data
- A person responsible for database maintenance and security
- Computing resources shared over the internet
- A collection of related records in a database
- Massively large data sets beyond the capacity of conventional systems
- A group of related fields within a file
- Rules defining how databases organize data
- The process of analyzing massive data sets for patterns
- The storage location for a web database
- A model describing data structures using entities and relationships
- The process of adding, changing, or deleting records
- A process ensuring data meets specific rules before storage
- A command used to query or modify a database
- Duplication of data in separate locations
- A structured collection of data stored electronically
34 Clues: Data that describes other data • Another name for metadata in DBMS • A tree-like structure database model • A group of related fields within a file • The storage location for a web database • Duplication of data in separate locations • A database accessed through web interfaces • Rules defining how databases organize data • A record of database activities and changes • ...
Computer Science Module 1 2024-11-04
Across
- a wireless networking technology that allows computers and other devices to communicate over a wireless signal.
- Network a group of computers connected with each other so that various devices can interact with each other through a network.
- Language zeros and ones; code arranged in ways that the computer can read, understand, act upon.
- Area Network (LAN) a group of computers connected to each other in a small area such as a building, office.
- the activities practiced by individuals, organizations, and nations, in order to gain unauthorized access to computer and technology dependent systems.
- the process of hiding readable information in a format that can't be read.
- a device that uses information or data, and carries out instructions. It takes input from input devices, runs code, and produces output through output devices.
- The amount of data that can be transmitted within a fixed time period.
- Central processing unit that calculates information.
- Structures Do certain things based on a true or false, yes or no decision.
- Area Network (WAN) a network that extends over a large geographical area such as states or countries.
- memory is temporarily stored; Also known as random access memory.
Down
- Device or software that blocks unwanted Internet traffic while allowing legitimate traffic.
- global network of computers that use protocols and data packets to exchange information.
- a basic unit of communication over a digital network.
- Stores information.
- protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- Converts physical input to binary information.
- of Commands The right commands in the right order.
- Model a layered abstract description for communications and computer network protocol design.
- Structures List of instructions to do more than once.
- a process through which digital data is saved within a data storage device by means of computing technology.
- Converts information to physical output.
- a high-speed electronic network that carries more than one type of communication (as Internet and cable television signals).
24 Clues: Stores information. • Converts information to physical output. • Converts physical input to binary information. • of Commands The right commands in the right order. • Central processing unit that calculates information. • a basic unit of communication over a digital network. • Structures List of instructions to do more than once. • ...
Internet Scavenger Hunt - Tech Edition 2024-09-19
Across
- : Small files stored on your computer that keep track of your activity on websites (7 letters)
- : A method for determining whether a machine can exhibit human-like intelligence (6 letters for the first word, 4 for the second)
- : Technology primarily used in cryptocurrencies like Bitcoin (10 letters)
- : Technology that allows data storage and access over the internet (5 letters for the first word, 9 for the second)
- : Advanced computing technology that uses quantum mechanics (7 letters for the first word, 9 letters for the second)
- : A branch of artificial intelligence where machines learn from data (7 letters for the first word, 8 for the second)
- : Co-founder of Apple Inc. (5 letters for the first name, 4 for the last name)
- : A type of cyberattack where scammers try to steal personal information (8 letters)
- : Wireless technology used to connect devices to the internet (5 letters)
Down
- : Software that manages hardware and software resources on a computer (2 words, 8 & 6 letters)
- : Language used to create web pages (4 letters)
- : A system like Google or Bing that helps people find information online (6 letters for the first word, 6 for the second)
- : Female computer scientist who developed the first compiler for a computer programming language (5 letters for the first name, 6 for the last name)
- : First person to write an algorithm intended for a machine, often credited as the first computer programmer (3 letters for the first name, 8 for the last name)
- : Service that helps protect your online privacy by encrypting your internet connection (3 letters)
- : A common type of computer connection used to connect peripherals (3 letters)
- : A unique string of numbers used to identify devices on a network (9 letters)
- : Abbreviation for a technology that enables machines to perform tasks that normally require human intelligence (2 letters)
- : Abbreviation for a network of devices that are connected and share data (3 letters)
- : Electronic communication method first invented in 1971 (5 letters)
20 Clues: : Language used to create web pages (4 letters) • : Electronic communication method first invented in 1971 (5 letters) • : Technology primarily used in cryptocurrencies like Bitcoin (10 letters) • : Wireless technology used to connect devices to the internet (5 letters) • : A common type of computer connection used to connect peripherals (3 letters) • ...
Limbach Gruppe 2025-01-28
Across
- Entzündungsmarker im Blut.
- Trennung von Probenbestandteilen durch Rotation.
- KI-Tools, die Ärzten bei der Interpretation von Testergebnissen helfen.
- Vernetzungslösung für den sicheren Datenaustausch zwischen Systemen.
- Test auf Blutgerinnsel.
- Proteine der Immunabwehr, häufig untersucht.
- Flüssigkeit nach Blutgerinnung, genutzt für viele Laboranalysen.
- KI-basierte Assistenz zur Unterstützung von Labor- und Kundenservices.
- Blutentnahmeröhrchen für Hämatologie.
- Sicherstellung der Genauigkeit von Tests.
- Digitale Lösung zur papierlosen Laboranforderung von der Arztpraxis ins Labor.
- Flüssiger Bestandteil des Blutes ohne Zellen.
- Präzisionsgerät zum Dosieren von Flüssigkeiten.
- Data Verarbeitung großer Datenmengen, z. B. Patientendaten oder Genomdaten.
- Häufig untersuchtes Material für verschiedene Tests.
- Material für Darm- und Mikrobiomanalysen.
- Fernüberwachung und -diagnose von Patienten durch digitale Technologien.
- Grundlage für KI-Modelle, die medizinische Daten analysieren.
- Ungetrenntes Blut, häufige Basisprobe.
- Blut aus der Fingerkuppe, z. B. für Glucosemessungen.
Down
- Vernetzung von Laborinformationssystemen für einen nahtlosen Datenaustausch.
- App-basierte Lösung für den mobilen Abruf von Laborbefunden.
- Biomarker zur Diagnose von Herzinfarkten.
- Normbereich für Laboruntersuchungen.
- Learning Teilgebiet der KI, das aus Daten lernt, um Vorhersagen zu treffen.
- Glasgefäß für Experimente.
- Marker für die Nierenfunktion.
- Blutzuckermessung.
- Marker für Leberfunktion.
- Gerät zur Vergrößerung kleiner Strukturen.
- Protein, das Sauerstoff im Blut transportiert.
- Materialentnahme von Schleimhäuten.
- Automatisierte Auswertung von Laborproben.
- Speichereisen im Körper.
- Einsatz von Maschinen und Software zur Optimierung von Laborprozessen.
- Digitale Zusammenstellung der Antiinfektiv-Leitlinien, nutzbar für Einsender.
- Auswertung von Laborergebnissen durch digitale Systeme.
- Portal Plattform für den digitalen Austausch zwischen Labor und Kunden.
- Kundenbeziehungsmanagement, optimiert für Laborprozesse.
- Auswurfprobe für Atemwegsanalysen.
- Gehirn- und Rückenmarksflüssigkeit.
- Computing Speicherung und Analyse medizinischer Daten auf entfernten Servern.
- Biokatalysatoren für chemische Reaktionen.
- Messbare Substanzen, die auf biologische Prozesse hinweisen.
- Verwendung digitaler Technologien für Gesundheitsdienste.
- „Schlechtes“ Cholesterin, wichtig für Herz-Kreislauf-Risiken.
- Hormon zur Überprüfung der Schilddrüsenfunktion.
47 Clues: Blutzuckermessung. • Test auf Blutgerinnsel. • Speichereisen im Körper. • Marker für Leberfunktion. • Entzündungsmarker im Blut. • Glasgefäß für Experimente. • Marker für die Nierenfunktion. • Auswurfprobe für Atemwegsanalysen. • Materialentnahme von Schleimhäuten. • Gehirn- und Rückenmarksflüssigkeit. • Normbereich für Laboruntersuchungen. • Blutentnahmeröhrchen für Hämatologie. • ...
ENGLİSH B1+ 2025-02-19
Across
- back When a teacher returns graded work or assignments to students.
- an exam To take an exam again after failing it or if a student was unable to attend the original exam.
- The study of the science and practice of diagnosing, treating, and preventing illnesses and injuries.
- A schedule that outlines when classes, exams, or events will take place.
- Tasks, projects, or written assignments completed by students as part of their academic studies.
- The study and use of computers, software, and systems to solve problems or perform tasks.
- The study of the legal system, rules, and regulations that govern society.
- The income generated by a business, organization, or government, often from sales or services.
- up To review or complete missed work or lessons, especially after being absent.
- progress To improve or move forward in a particular area of study or skill.
- The study of written works, including novels, poetry, drama, and other forms of artistic expression.
- The study of fundamental questions regarding existence, knowledge, ethics, and reasoning.
- an exam When a student does not achieve the required marks or pass the exam.
- The study of rights, duties, and responsibilities of individuals within a society or nation.
Down
- A formal evaluation of a student's knowledge or skills, often through a test or exam.
- A task given to students to complete, usually involving research or writing on a particular topic.
- The application of scientific principles to design and build systems, structures, and machines.
- Activities that are outside of the standard academic curriculum, such as sports, clubs, or arts.
- The process of gathering, analyzing, and interpreting information to gain new insights on a particular subject.
- An educational trip or outing organized for students to learn outside the classroom.
- A written piece of work that discusses a particular topic in detail, usually assigned in courses.
- To assess or judge the quality or effectiveness of something, such as an assignment or performance.
- in To submit an assignment, project, or paper to a teacher or instructor.
23 Clues: back When a teacher returns graded work or assignments to students. • A schedule that outlines when classes, exams, or events will take place. • in To submit an assignment, project, or paper to a teacher or instructor. • The study of the legal system, rules, and regulations that govern society. • ...
FITDVocab.HB 2013-05-15
Across
- Reference to a book, paper, author, magazine, etc.
- A plug-in device
- a picture representing a company
- physical components of computer wiring
- .RTF
- a mouse with a rolling ball in the bottom
- ISP
- LED
- A portable,handheld, wireless computing device.
- GB 1,073,741,824 bytes
- A ceremonial induction into office
- Your computer's short term memory
- a pre-formated document
- Who is it? Why are they contacting me? What do they want?
- (apps) programs on a computer
- USB
- Protection of information on the internet
- SSID; a 32 digit code
- A handsfree communicating device
- A device that sends information out of the computer Ex.Headphones, Printer
- 8 bits
Down
- LCD
- A search tool that uses results from multiple search engines
- A online, zoomable presentation website
- An affirmation taken by a person before understanding the duties of an office
- a phrase representing a
- Internet and online world
- a program for the retrieval of data ex: Bing, Yahoo, Google
- NCSA
- KB;1,024 bytes
- The ability to work with another program or hardware device
- a space used to plug mice and keyboards into PCs
- The way you behave online
- to start up a computer
- Wireless local area network; WIFI
- VDU
- MB; 1,048,576 bytes
- The main circuit center usually located in the modem
- used to connect your computer to another computer, a local network, or a cable modem
- the arrangement of a document
- A brief summary of achievements and previous and current occupations that you use to apply to a job
- rules and behavior to keep you safe online
- A device that sends information into the computer Ex. Keyboard, Mouse
- a file extension used for Microsoft Word 97-03
45 Clues: LCD • ISP • LED • VDU • USB • NCSA • .RTF • .PDF • 8 bits • KB;1,024 bytes • A plug-in device • MB; 1,048,576 bytes • SSID; a 32 digit code • GB 1,073,741,824 bytes • to start up a computer • a phrase representing a • a pre-formated document • Internet and online world • The way you behave online • (apps) programs on a computer • the arrangement of a document • a picture representing a company • ...
Artificial Inteligence 2020-12-16
Across
- Programing language used in AI and named after an animal
- Finity sequence of well-defined instructions to solve a specific, abstract problem
- A class of algorithms for pattern analysis
- Capacity of a computer system to interpret complex speech
- Phenomenon that consists in the random combination of characteristics from ancestors in descendants
- Computing system inspired by neuron connections
- Adaptations to the environment's conditions over time
- The computer learns as it goes through data
- A direct communication pathway between an enhanced or wired brain and an external device.
- Capacity to solve problems
- Decision support tool that uses a tree-like model of decisions and their possible consequences
Down
- A vehicle that can operate on open roads without user input
- Automatic discovery of regularities in data through the use of computer algorithms
- A stochastic model describing a sequence of possible events in which the probability of each event depends only on the state attained in the previous event
- A test of a machine's ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human.
- Acquiring knowledge. Can be supervised, unsupervised of something in between
- Use of computer hardware specially made to perform some functions more efficiently
- The study of mathematical models of strategic interaction between rational decision-makers
- Kind of computation that use of quantum-mechanical phenomena such as superposition and entanglement to perform computation
- An algorithm that, even for the same input, can exhibit different behaviours on different runs
- Abbreviation for science fiction
- Subtype of leaning by repeating a task many times
- Programing language where programs are expressed in terms of relations and execution occurs by running queries over these relations
- Part of a broader family of machine learning methods based on learning data representations, as opposed to task-specific algorithms
24 Clues: Capacity to solve problems • Abbreviation for science fiction • A class of algorithms for pattern analysis • The computer learns as it goes through data • Computing system inspired by neuron connections • Subtype of leaning by repeating a task many times • Adaptations to the environment's conditions over time • Programing language used in AI and named after an animal • ...
Leadership in Organizations 2020-12-11
Across
- The ability to influence people to work willingly and enthusiastically towards achieving the goals of an organization
- This leader has the ability to see beyond the present, visualize the future and instill in others a brighter future
- This leader has the potential to change the organization's mission, culture, strategy and structure as well as to promote innovation in technology and products
- Personal characteristics of individuals are referred to as _________________
- ________________ Contingency leadership model contends that a manager's leadership style is flexible
- Razor Blade is able to influence workers because of his excellent computing skills. He is known for recovering lost computer files. Blade possesses ___________ power
- Leadership is characterized by people, power, values and ______________
- The type of power one possesses when he/she is able to mete out severe punishment
- _________________ Contingency leadership model contends that a manager's leadership style is fixed
- People-oriented behaviour is synonymous to the _______________ leadership style
Down
- Autocratic/Task-oriented, Democratic/People-oriented as well as the Laissez-faire leadership styles are COLLECTIVELY referred to as _______________ leadership styles.
- These theories focused on studying the behaviours of leaders to determine whether these behaviours had any impact on leadership
- The _____________ leader possesses a captivative personality that is able to influence others
- April Daye is the factory Manager at Greyson Sugars and therefore has a great deal of influence on factory workers. Daye possesses _____________ power
- The ability to see things as they can be and not as they are now
- These theories focused on studying various situations to determine whether these situations had any impact on leadership
- The type of power resulting from a unique personality
- Task-oriented behaviour is synonymous to the ________________ leadership style
- This is the motivational force providing the leader with the ability to influence others
- Precious Rose has a great deal of influence and is known for giving formal rewards to employees who display exemplary customer service skills. Rose possesses ____________ power.
20 Clues: The type of power resulting from a unique personality • The ability to see things as they can be and not as they are now • Leadership is characterized by people, power, values and ______________ • Personal characteristics of individuals are referred to as _________________ • Task-oriented behaviour is synonymous to the ________________ leadership style • ...
A Day in the Life of a Middle School Computer Student 2019-04-20
Across
- Input device used for commands and navigation
- "Brain of the computer"
- Refers to day-to-day temperature and precipitation activity
- Physical parts of a computer
- Playing video and sound in real time
- Software that has been written to detect, isolate, and destroy viruses
- A room, typically in a school, in which a class of students is taught
- A web address
- Consists of information
- First line of defense
- Electronic mail
- The receiving of an academic degree or diploma
- Information or data retrieved or received from a computer
Down
- A computer that is portable and suitable for use while traveling
- Retrieving something from the internet and storing it on a disk drive
- A program that contains instructions for a computer
- A program that allows users to view web pages and online information
- Using material another person has created and claims it as your own
- Any word, phrase, or picture that, when clicked, take the user to another location
- A process that leads from an original formulation of a computing problem to executable computer programs
- An extended period of leisure and recreation, especially one spent away from home or in traveling
- Input device with an arrangement of letters, etc.
- Small circuit board that controls processing within a computer
- A game played by two teams of eleven players with a round ball that may not be touched with the hands or arms during play except by the goalkeepers
- Applications are also known as _____.
- An unauthorized user able to access and misuse information
- A malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive
- Output device that displays text and graphics on a screen
- Refers to the method used to enter or transmit your message to a computer
29 Clues: A web address • Electronic mail • First line of defense • "Brain of the computer" • Consists of information • Physical parts of a computer • Playing video and sound in real time • Applications are also known as _____. • Input device used for commands and navigation • The receiving of an academic degree or diploma • Input device with an arrangement of letters, etc. • ...
Software Testing 2017-10-07
Across
- guide for developing system requirements specifications.
- computing, software testers and software engineers can use an ________ as a mechanism for determining whether a test has passed or failed.
- synonymous with smoke tests
- is a formal technique that involves formal or informal technical reviews of any artifact by identifying any error or gap
- testing is also called glass testing
- is the process of testing changes to computer programs to make sure that the older programming still works with the new changes
- It occurs after unit testing and before validation testing
- It is a systematic process to determine how the actual testing process is conducted within an organization or a team
- ____________is an approach to combine top down testing with bottom up testing
- also known as “Build Verification Testing”
Down
- _____ test is the second phase of software testing in which a sampling of the intended audience tries the product out.
- involves identifying, isolating, and fixing the problems/bugs.
- _____________ oracle that uses statistical characteristics
- is a technique to test the application with having a limited knowledge of the internal workings of an application
- testing is one of the most common software testing strategy used in software development
- standard for the format of documents used in different stages of software testing
- The purpose of this test is to evaluate the system's compliance with the specified requirements.
- It is a type of White Box Testing which is mainly used for Unit Testing
- ________ is an approach to integrated testing where the lowest level components are tested first, then used to facilitate the testing of higher level components
- software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation
20 Clues: synonymous with smoke tests • testing is also called glass testing • also known as “Build Verification Testing” • guide for developing system requirements specifications. • _____________ oracle that uses statistical characteristics • It occurs after unit testing and before validation testing • involves identifying, isolating, and fixing the problems/bugs. • ...
Grade 9 Introduction to IT Revision 2024-05-20
Across
- Software designed to help the user perform specific tasks
- organized data
- Display screen for a computer
- Input device used for typing
- Raw unprocessed facts
- Software that is modified to meet specific user requirements
- Handheld device used to draw or select objects directly on a screen
- Software that manages computer hardware and software resources
- Device that scans barcodes for product information
- Suite of applications designed to work together seamlessly
- Pointing device used to interact with a computer
- The physical components of a computer system
- Entering data into the computer
- The act of manipulating data by a computer
- Type of system designed for specific control functions within a larger system
- instructions that tell the computer what to do and how to do it
Down
- Software designed to help analyze, configure, optimize, or maintain a computer
- Device used to read characters printed with magnetic ink, often used in banking
- Large, powerful computer often used by corporations for bulk data processing
- Device that converts different types of documents, such as scanned paper documents or PDFs, into editable and searchable data
- Software designed to perform a specific task or set of tasks
- Device used to detect marks made on paper, such as standardized tests
- The fastest, most powerful type of computer used for complex calculations
- Software designed to provide a platform for other software
- Information produced by a computer
- Pre-made software available to the general public
- Device that produces hard copies from a computer
- Device that converts physical documents into digital format
- Software developed specifically for a user or organization
- Portable computing device like a smartphone or tablet
- Software designed to perform a broad range of tasks
- Where data is saved for future use
- Personal computer designed for regular use at a single location
33 Clues: organized data • Raw unprocessed facts • Input device used for typing • Display screen for a computer • Entering data into the computer • Information produced by a computer • Where data is saved for future use • The act of manipulating data by a computer • The physical components of a computer system • Device that produces hard copies from a computer • ...
Day to Day Electronics 2023-09-19
Across
- A device to measure a circuit's resistance
- It quantifies your physical activity and health metrics.
- what electronic device is employed to draw intricate, detailed diagrams or charts?
- "Self-balancing two-wheeled transport".
- An intelligent appliance that keeps your groceries fresh.
- What portable storage device is often used to transfer files between computers?
- This handheld gadget transforms your voice into digital data for communication.
- This kitchen appliance utilizes microwaves to cook or reheat food.
- This portable communication device is often a pocket-sized computer with advanced capabilities.
- A multifunctional appliance that blends, chops, and mixes with precision.
- An essential kitchen appliance for brewing a morning pick-me-up.
- It uses lasers and mirrors to produce high-quality prints of digital documents.
- A device used to capture memories and moments with precision.
- It stores and keeps your favorite frozen treats ice-cold.
- Your TV might connect to this for streaming
- A sleek, pocket-sized device that stores your entire music library.
Down
- This gadget transforms your TV into a smart, internet-connected hub.
- A smart tool for teaching in classrooms
- A wireless, in-ear accessory that provides immersive audio experiences.
- Its wireless amd connects your device
- what electronic gaming system connects to your TV to play video games?
- Short-range wireless technology
- This device captures the world in 360 degrees for immersive experiences.
- It converts sound into electrical signals
- This versatile device has keys, a touchpad, and a screen for input and interaction.
- Displays text and images on a screen
- An autonomous flying machine with a camera
- A mobile computing device designed for productivity, often with detachable keyboards.
- It scans documents and photos
- An advanced tool for capturing and editing high-quality video content.
- It's not a phone, but it's smarter than a watch.
31 Clues: It scans documents and photos • Short-range wireless technology • Displays text and images on a screen • Its wireless amd connects your device • A smart tool for teaching in classrooms • "Self-balancing two-wheeled transport". • It converts sound into electrical signals • A device to measure a circuit's resistance • An autonomous flying machine with a camera • ...
Vocabulary 2024-05-08
Across
- Each of the movements that the magnetizer makes with his hands, either at a distance, or by lightly touching the body of the person he wants to subject to his influence.
- Subjecting something to re-examination in order to correct, amend, or repair it
- deliver
- One who works or researches in computer science. Applied to a person, also used as a noun.
- a West Germanic language originating from Anglo-Frisian dialects brought to Britannia
- Set of disciplines and exercises aimed at achieving the development and perfection of the body.
- To be taught at universities or other educational institutions. Also used as an intransitive
- To make, form something by giving it the shape, standard and outline it should have.
- All the literary productions of a nation, an era or a genre.
- to grab or take something or someone. Also used as a pronominal
Down
- career focused on the study of corporations
- Set of knowledge obtained through observation and reasoning, systematically structured and from which general principles and laws with predictive and experimentally verifiable capacity are deduced.
- Science or study of the mind and behavior in people or animals.
- Science that deals with the description of the Earth.
- Retaking or acquiring what was previously owned.
- Manifestation of human activity through which the real is interpreted or the imagined is captured with plastic, linguistic or sonorous resources.
- is one of the so-called Fine Arts, i.e., an artistic genre, which consists of achieving aesthetic effects through the manipulation of vocal or instrumental sounds.
- In a situation of postponement or suspension
- Narration and exposition of past events worthy of memory, whether public or private.
- the science that studies the relationships between quantities, magnitudes and properties of quantities, magnitudes and properties
- A play or movie in which tense actions and situations and conflicting passions prevail.
21 Clues: deliver • career focused on the study of corporations • In a situation of postponement or suspension • Retaking or acquiring what was previously owned. • Science that deals with the description of the Earth. • All the literary productions of a nation, an era or a genre. • Science or study of the mind and behavior in people or animals. • ...
CS Principles Review 2023-04-26
Across
- Type of compression Images use
- A type of search algorithm that searches a sorted list for a value by repeatedly splitting the list in half.
- Data about data, like descriptive information about a file or a row in a database.
- A type of search by going through the entire list until the desired value is found
- Uses different keys for encrypting versus decrypting data.
- Error that results when the number of bits is not enough to represent the number (like a car’s odometer “rolling over”).
- A mistake in typed code that violates the rules of the programming language. Typically, code with syntax errors will not run.
- A library of procedures and a description of how to call each procedure.
- A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.
- Can increase the data's usefulness by making it easier to organize, filter, and structure
- The participation of volunteers from the public in a scientific research project
Down
- The idea that some communities or populations have less access to computing than others
- **Wikipedia uses ___ to write their articles
- A sequence of 8 bits.
- the same key is used to both encrypt and decrypt data.
- A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.
- Compressing data in a way that discards some data and makes it impossible to recover the original.
- A recipe is a type of this algorithm
- Error that results when the number of bits is not enough to represent the number with full precision
- Compressing data in a way that preserves all data away and allows full recovery of the original.
- A binary digit, either 0 or 1.
- Values that change smoothly, rather than in discrete intervals, over time. For example, the pitch and volume of a live concert. Learn more in From analog to digital data.
- The process of scrambling data to prevent unauthorized access.
- A shortcut valuing getting a plausible solution, even though it might not be the best solution
24 Clues: A sequence of 8 bits. • Type of compression Images use • A binary digit, either 0 or 1. • A recipe is a type of this algorithm • **Wikipedia uses ___ to write their articles • the same key is used to both encrypt and decrypt data. • Uses different keys for encrypting versus decrypting data. • The process of scrambling data to prevent unauthorized access. • ...
Spelling words puzzle 2022-02-17
Across
- to be exact, near or approaching a certain state, condition, goal, or standard.
- to achieve or reach a goal
- to fasten, join, or attach
- to come together; assemble, especially in large numbers
- to recompense for something
- supplied with or containing explanatory notes, textual comments
- an act, process, or method of computing; calculation
- easily seen or noticed; readily visible or observable
- to act in accordance or harmony; comply
- to estimate the monetary value of; determine the worth of; assess
- not predictable; not to be foreseen or foretold
- to bring together into a single or unified whole; unite; combine
Down
- to set apart for a particular purpose; assign or allot
- easily seen or noticed; readily visible or observable
- preceding and leading up to the main part, matter, or business; introductory; preparatory
- a person who is frequently in the company of, associates with, or accompanies another
- to stay attached; stick fast; cleave; cling
- to affirm again; reassert
- not in a direct course or path; deviating from a straight line; roundabout
- not necessary or essential; needless; unessential
- not voluntary; independent of one's will; not by one's own choice
- to settle or decide in advance
- to choose or take as one's own; make one's own by selection or assent
- the act of combining parts or elements to form a whole
- to establish the truth, accuracy, validity, or genuineness of; corroborate; verify
- a collection of various kinds of things; a mixed collection
- to exist together or at the same time
- any member of a class of words found in many languages that are used before nouns, pronouns, or other substantives to form phrases functioning as modifiers of verbs, nouns, or adjectives, and that typically express a spatial, temporal, or other relationship, as in, on, by, to, since
- to wok together or with someone
29 Clues: to affirm again; reassert • to achieve or reach a goal • to fasten, join, or attach • to recompense for something • to settle or decide in advance • to wok together or with someone • to exist together or at the same time • to act in accordance or harmony; comply • to stay attached; stick fast; cleave; cling • not predictable; not to be foreseen or foretold • ...
Vocabulary Journal 2025-03-10
Across
- An ordered set of instructions that are used to carry out a task.
- A set of instructions that a computer executes to achieve a particular objective.
- Trace A method to analyze and record information about a program's execution.
- Programming A drag-and-drop programming environment where code blocks snap together to form a program.
- To carry out or put into effect.
- To identify bugs or errors in computer hardware or programs and fix them.
- A program that translates instructions or code into a language that can be read and understood by a computer.
- A diagram that represents an algorithm, work flow, or process, and uses geometric symbols connected by arrows to show the direction of the flow of action.
- Computing Building interactive physical systems using software and hardware that can sense and respond to the analog world.
- Repeating process steps to continuously improve a work product.
- A flaw in a computer program that causes the program to produce an incorrect result or behavior.
- A small computer on a single integrated circuit containing a processor, memory, and programmable inputs and outputs.
- Something put into a system, such as resources, information, or signals, in order to achieve a result.
- A simulator that imitates a program or events.
Down
- An interruption or break in a signal or transmission from one device to another.
- Thinking The process of solving problems using a series of steps.
- Scientists Scientists who apply their knowledge of computation to creating solutions using a computer system.
- Technology A standard, short-range wireless connection for electronic devices.
- To break a problem down into smaller pieces.
- Something unexpected that happens while a program is running.
- Science The science of creating solutions and solving problems using the help of a computer. Some of the areas of focus include software engineering, programming, data analysis, algorithms, graphics, and animation.
- Statements A command that performs different actions depending on whether a condition is true or false.
- Light-emitting diodes
23 Clues: Light-emitting diodes • To carry out or put into effect. • To break a problem down into smaller pieces. • A simulator that imitates a program or events. • Something unexpected that happens while a program is running. • Repeating process steps to continuously improve a work product. • Thinking The process of solving problems using a series of steps. • ...
Quiztopia 2025-03-13
Across
- Type of logic gate that outputs true only when both inputs are true.
- A network analysis technique that transforms time-domain signals into frequency-domain signals.
- A bridge used to measure unknown resistance with the help of three known resistances.
- A high-impedance state in digital electronics that represents an electrically disconnected node, often used in bus systems.
- A type of semiconductor that can conduct electricity under certain conditions, often used in solar cells.
- An algorithm used to find the shortest path in a graph with positive weights, named after a Dutch computer scientist.
- A type of oscillator circuit used in RF applications, utilizing an LC circuit to determine frequency.
- The phenomenon where a system naturally oscillates at a particular frequency.
- Smallest unit of data in a computer.
Down
- A material that displays both magnetic and superconducting properties, commonly investigated for use in quantum computing.
- A specialized type of photodiode that is sensitive to specific wavelengths, used in applications like light detection.
- The phenomenon in which a current-carrying conductor generates a magnetic field around itself.
- A semiconductor device that allows current to flow in one direction only.
- A complex quantum phenomenon where an electron behaves like a wave and particle, used in designing certain types of transistors.
- A type of high-frequency oscillator circuit used in microwave applications, where the frequency is determined by the resonance of an LC circuit.
- A three-terminal device used for amplification and switching.
- A type of polymorphism where a subclass overrides a method in the parent class.
- Which algorithm is used to detect cycles in a directed graph using depth-first search (DFS)?
- A divide-and-conquer algorithm that sorts an array by partitioning it into smaller subarrays.
- A data structure used to implement a hierarchical relationship between elements.
20 Clues: Smallest unit of data in a computer. • A three-terminal device used for amplification and switching. • Type of logic gate that outputs true only when both inputs are true. • A semiconductor device that allows current to flow in one direction only. • The phenomenon where a system naturally oscillates at a particular frequency. • ...
CSP - Data and Sheet 2024-01-08
Across
- type of chart to show the difference between the data points for one or more categories.
- A Microsoft program used to calculate numbers (Data)
- write a formula to multiply the values in cell A1 and B1 in sheets
- Allow quickly apply the content for one cell to another cell?
- 3 letters appended to a text file
- type of chart to look at trends or data over a time period.
- type of file that uses commas to separate data
- what is missing in this function: average(c2:c10)
- value returned for this formula: =(82-32)/5+8*2
- Entities that allow you to create online personas. They collect info about you.
- Most popular open source database program (mentioned in Khan Academy)
- You apply this to a sheet to make it look professional
- type of chart to show data as "slices of pie"
- function used to add/summarize numbers in a range
- in sheets columns are?
Down
- You score a 70. based on this formula: =if(a1>70,"pass","fail) did you pass or fail?
- Function used to calculate how many sales are over $20 from a series
- in sheets rows are?
- symbol all formulas begin with?
- Limit the type of data that can be entered into a cell
- Data is collected and stored in what kind of computing devices
- counts all cells in a range that has values, both numbers and letters.
- A google program used to calculate numbers (Data)
- intersection of a row and a column is called
- A group of cells is called
- You create this on sheets to visualize your data
- Combination of numbers and symbols used to express a calculation. Always begins with an = sign
- formula gets the smallest value of a range of cells
- Which Excel function is used to find the highest value in a range
- function to create conditional logic
30 Clues: in sheets rows are? • in sheets columns are? • A group of cells is called • symbol all formulas begin with? • 3 letters appended to a text file • function to create conditional logic • intersection of a row and a column is called • type of chart to show data as "slices of pie" • type of file that uses commas to separate data • value returned for this formula: =(82-32)/5+8*2 • ...
FINAL 2023-12-10
Across
- World Wide Web.
- Device used to perform work and make tasks easier.
- Process in which a digital model is turned into a tangible, solid, three-dimensional object.
- Tool used to split.
- Simulation of human intelligence in machines.
- Free, easy-to-use app for 3D design, electronics, and coding.
- Two plus two.
- HyperText Markup Language.
- Technological process for telling a computer which tasks to perform in order to solve problems.
- Industry that designs and manufactures aircraft, rockets, spacecraft, and missiles.
- Flat surface that is angled or tilted.
- Creation or production with the help of equipment, labor, machines, tools and processing or formuation.
- High School.
- Source of electric power for powering electrical devices.
Down
- Assists the Pilot in Command maintaining situational awareness.
- Application program that provides a way to look at and interact with all the information on the World Wide Web.
- Fabrication process that joins materials, by using high heat to melt the parts together.
- Most basic unit of information in computing and digital communications.
- Use of largely automatic equipment in a system of manufacturing or other production process.
- Pathways in Technology Early College High School.
- Person who is ultimately responsible for operation and safety during flight.
- Rope or chain wrapped around a wheel to lift heavy objects.
- Application of science and math to solve problems.
- Procedure used for solving a problem or performing a computation.
- Unit of digital information that most commonly consists of eight bits.
- Space
- Document connected to the World Wide Web and viewable by anyone connected to the internet who has a web browser.
- Device that performs a simple task in a complicated way using a chain reaction of simple machines.
- Sum of classroom digits.
- Describes a numbering scheme in which there are only two possible values for each digit.
- Programmable machine that can complete a task.
31 Clues: Space • High School. • Two plus two. • World Wide Web. • Tool used to split. • Sum of classroom digits. • HyperText Markup Language. • Flat surface that is angled or tilted. • Simulation of human intelligence in machines. • Programmable machine that can complete a task. • Pathways in Technology Early College High School. • Device used to perform work and make tasks easier. • ...
Introduction to Artificial Intelligence 2025-05-11
Across
- An aspirational form of AI that aims for human-level intelligence across various tasks. (2 words)
- The broader societal changes driven by the AI revolution.
- Generative AI is known for its ability to produce original outputs in text, music, and art.
- The use of AI to perform tasks without human intervention.
- A core technology in AI, allowing systems to improve from experience. (2 words)
- The most common type of AI today, designed for specific tasks. (2 words)
- The ability of machines to interpret data, learn, and achieve specific goals. (2 words)
- The study of what is right and wrong, especially important in AI development.
- The raw material used to train most AI systems, now more available than ever.
- An example of a generative AI model known for realistic text generation.
Down
- A hypothetical form of AI that surpasses human intelligence in all aspects. (2 words)
- Realistic but fake videos or images created by AI, often used for deception.
- A major concern as AI systems become more autonomous, raising questions about human oversight.
- The conference in 1956 where the term "artificial intelligence" was first coined.
- A risk where AI systems reflect and amplify societal prejudices. (2 words)
- A period of slow progress in AI research due to limited computing power and data. (2 words)
- A major ethical concern involving the protection of personal information. (2 words)
- A type of AI that can create new text, images, music, or videos. (2 words)
- A term used to describe systems that can make decisions without human control.
- The current AI movement, often compared to the Industrial _______.
- A popular voice assistant that uses narrow AI to respond to user commands.
- The obligation to consider the consequences of AI decisions.
- One of the key abilities of an intelligent system – to learn and _______.
23 Clues: The broader societal changes driven by the AI revolution. • The use of AI to perform tasks without human intervention. • The obligation to consider the consequences of AI decisions. • The current AI movement, often compared to the Industrial _______. • The most common type of AI today, designed for specific tasks. (2 words) • ...
Trivium 7 Vocabulary 2025-04-09
Across
- having to do with skin
- organized collection of information
- latin word for good
- measure
- a joke exploiting the different possible meanings of a word or the fact that there are words which sound alike but have different meanings.
- he final part of a story where the central conflict or problem is resolved, and loose ends are tied up, bringing the narrative to a conclusion
- interconnected computing devices that can exchange data and share resources with each other
- an act of speaking one's thoughts aloud when by oneself or regardless of any hearers, especially by a character in a play.
- multiple colors
- information loaded into a computer
- color
- category of literature, often involving conflict or emotions
- device that measures altitude
- a genre of fiction characterized by dark settings, supernatural elements, mystery, and terror.
- a widely held but fixed and oversimplified image or idea of a particular type of person or thing.
- words around a word or circumstances around a situation
- a literary work that contains ridiculous plots, exaggerated characters, and over-the-top situations for comedic effect
- a comparison of 2 or more objects
Down
- a thick skinned animal
- the presentation of something as being smaller, worse, or less important than it actually is.
- a person's thoughts and conscious reactions to events, perceived as a continuous flow.
- comedy based on deliberately clumsy actions and humorously embarrassing events.
- works by itself
- well meaning/ kind
- another latin word for good
- characterize a person or thing
- the practice of taking someone else's work or ideas and passing them off as one's own.
- physical parts of a computer
- the use of humor, irony, exaggeration, or ridicule to expose and criticize people's stupidity or vices
- ability to feel like another
- a realistic representation of everyday experience in a movie, play, or book.
- word or phrase that means the opposite
- greek prefix meaning self
- unexpected good luck
34 Clues: color • measure • works by itself • multiple colors • well meaning/ kind • latin word for good • unexpected good luck • a thick skinned animal • having to do with skin • greek prefix meaning self • another latin word for good • physical parts of a computer • ability to feel like another • device that measures altitude • characterize a person or thing • a comparison of 2 or more objects • ...
KN - G8U10 - VOCAB - P3 - 240413 - EV 2024-04-13
Across
- (np) A brief written message sent or received electronically, usually via mobile phone or other electronic device.
- (adj) Pertaining to or characteristic of a documentary, which is a non-fictional film or television program that presents factual information or depicts real events, people, or situations.
- (v) To shut or fasten something, such as a door, lid, or container.
- (adj) Located or placed directly across from something else; facing or confronting each other.
- (adv) In a manner that is even, without any abrupt changes or interruptions; without difficulty or hindrance.
- (np) An online platform or community where individuals can connect, communicate, and share content with others who share similar interests or affiliations.
- (n) A hard, usually paved, surface, especially a sidewalk or footpath.
- (np) A message conveyed verbally or vocally, typically recorded and transmitted electronically.
- (phr.v) To have a similar appearance to someone or something; to resemble.
- (n) A mobile phone that has advanced computing capabilities and connectivity features, typically including internet access, touchscreen interface, and various applications.
Down
- (adj) Characterized by a fast or rapid rate of movement, operation, or data transmission.
- (n) A person who possesses or holds legal title to something; one who has the right to control, use, or dispose of something.
- (n) A remark or expression of opinion or observation, often in response to something.
- (np) The link or access point that allows a device to connect to the internet.
- (v) To move forward by turning over and over on an axis.
- (v) To respond or answer someone, especially in return to a message or communication.
- (prep) By way of; through a particular medium or channel.
- (n) A person connected by blood or marriage; a family member.
- (v) To cease to be visible; to vanish from sight or existence.
- (n) A public display of works of art, items of interest, or products, typically held in a gallery, museum, or other venue.
20 Clues: (v) To move forward by turning over and over on an axis. • (prep) By way of; through a particular medium or channel. • (n) A person connected by blood or marriage; a family member. • (v) To cease to be visible; to vanish from sight or existence. • (v) To shut or fasten something, such as a door, lid, or container. • ...
IT Word Power 2022-03-14
Across
- a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource
- a computer software package that performs a specific function directly for an end user
- Information Superhighway
- the overall design of a computing system and the logical and physical interrelationships between its components
- Founded Microsoft
- a method design teams use to generate ideas to solve clearly defined design problems.
- an organized collection of structured information, or data, typically stored electronically in a computer system
- any item, either in the physical or virtual world
- Half of a byte
- a term used to describe closing all software programs in preparation to turn off a computer's power
- a specific procedure for solving a well-defined computational problem.
Down
- the ability of an algorithm or program to run more than one task at a time
- the process by which information is encoded into electrical signals for transmission over a medium.
- a number, figure, symbol, or indicator that is smaller than the normal line of type and is set slightly below it
- the page typically encountered first on a website that usually contains links to the other pages of the site
- a measure of how easily an application can be transferred from one computer environment to another
- To detect software failures so that defects may be discovered and corrected
- a small segment of a larger message
- 2 raised to the 50th power of bytes
- software development process in a linear sequential flow.
- a coding error in a computer program.
- An established set of rules that determine how data is transmitted
- a small graphical representation of a program or file
- a process that transforms encrypted information into its original format.
- a measure of the degree to which the elements of the module are functionally related
25 Clues: Half of a byte • Founded Microsoft • Information Superhighway • a small segment of a larger message • 2 raised to the 50th power of bytes • a coding error in a computer program. • any item, either in the physical or virtual world • a small graphical representation of a program or file • software development process in a linear sequential flow. • ...
Digital Security, Ethics, and Privacy 2022-11-07
Across
- A set of instructions in a program that allows users to bypass security controls
- The process of sharing computing resources among computers and devices on a network
- A type of attack that overloads a resource, thus making it unavailable to legitimate users
- A ratio that measures how much power enters a computer facility compared to how much power is used
- All data is backed up whenever a change is made
- A unique hardware identifier for your device
- Protects individuals against the wrongful disclosure of their health information
- The discovery, collection, and analysis of evidence found on a computer or network
- The phase of disaster recovery that includes the evacuation plan
- A normal looking yet fraudulent Wi-Fi network
- A program that copies itself repeatedly and spreads throughout the network without human help
- An animal loving hacker who might deface the website of a local meat packing plant
- Technique used by attackers to make their traffic look legitimate to the victim device
- A common infringement of copyright
Down
- The process of ensuring that the person requesting access to a computer or network is not an imposter
- Online or Internet-based illegal acts
- Attacks that attempt to trick the victim into giving information to the attacker
- The movement to ensure that all users have access to devices, data, and infrastructure
- The record of everything you do online
- A private secure path across a public network
- The process of restricting access to certain material
- A part of the web that is accessed using special software, providing anonymity to its users
- A private combination of words associated with a username
- Any event or action that could cause loss or damage
- A type of authentication that combines multiple types of authentication to provide more secure access
25 Clues: A common infringement of copyright • Online or Internet-based illegal acts • The record of everything you do online • A unique hardware identifier for your device • A private secure path across a public network • A normal looking yet fraudulent Wi-Fi network • All data is backed up whenever a change is made • Any event or action that could cause loss or damage • ...
Technology Crossword Puzzle 2022-02-10
Across
- Approach to problem solving that views problems as part of a wider, dynamic system.
- A problem either with hardware or with operating system software causing the system to break.
- A set of things working together as parts of a mechanism or interconnecting network.
- An imaginary (or real) line that marks the limits of an area.
- A system that has no means for comparing the output with input for control purposes.
- Constant change, activity, or progress.
- Relating to the natural world and the impact of human activity on its condition.
- The physical world and everything in it.
- Devices putting data and information into the computer.
- Relating to sight.
- Life, lives, living.
- A person's thought process for how something works.
- Relating to society.
- Working or produced by machines or machinery.
Down
- Arrangement of resources that transforms inputs into outputs that satisfy the customer's needs.
- An arrangement of items that are either above, below, or the same as one another.
- Process of linking together different computing systems and software.
- System that relies on feedback to achieve desired goal.
- Heat.
- The use of electric currents to control, communicate, and process information.
- Consisting of many different and connected parts.
- The action, process, or result of arranging or being arranged.
- Any product that comes from a plant, animal, or of earth.
- Sensory information that arises as a result of movement.
- A form of energy resulting from the existence of charged particles such as electrons or protons.
- A substance that is capable of flowing and that changes its shape when acted upon.
- Relating to or using technology.
- Relating to part of the structure of an item.
- Sending the information from the computer.
- A self-contained system within a larger system.
30 Clues: Heat. • Relating to sight. • Life, lives, living. • Relating to society. • Relating to or using technology. • Constant change, activity, or progress. • The physical world and everything in it. • Sending the information from the computer. • Relating to part of the structure of an item. • Working or produced by machines or machinery. • ...
Technology Crossword Puzzle 2022-02-10
Across
- Approach to problem solving that views problems as part of a wider, dynamic system.
- A problem either with hardware or with operating system software causing the system to break.
- A set of things working together as parts of a mechanism or interconnecting network.
- An imaginary (or real) line that marks the limits of an area.
- A system that has no means for comparing the output with input for control purposes.
- Constant change, activity, or progress.
- Relating to the natural world and the impact of human activity on its condition.
- The physical world and everything in it.
- Devices putting data and information into the computer.
- Relating to sight.
- Life, lives, living.
- A person's thought process for how something works.
- Relating to society.
- Working or produced by machines or machinery.
Down
- Arrangement of resources that transforms inputs into outputs that satisfy the customer's needs.
- An arrangement of items that are either above, below, or the same as one another.
- Process of linking together different computing systems and software.
- System that relies on feedback to achieve desired goal.
- Heat.
- The use of electric currents to control, communicate, and process information.
- Consisting of many different and connected parts.
- The action, process, or result of arranging or being arranged.
- Any product that comes from a plant, animal, or of earth.
- Sensory information that arises as a result of movement.
- A form of energy resulting from the existence of charged particles such as electrons or protons.
- A substance that is capable of flowing and that changes its shape when acted upon.
- Relating to or using technology.
- Relating to part of the structure of an item.
- Sending the information from the computer.
- A self-contained system within a larger system.
30 Clues: Heat. • Relating to sight. • Life, lives, living. • Relating to society. • Relating to or using technology. • Constant change, activity, or progress. • The physical world and everything in it. • Sending the information from the computer. • Relating to part of the structure of an item. • Working or produced by machines or machinery. • ...
ADSI-NICOLE DANIELA RODRIGUEZ 2022-05-05
Across
- It is used to indicate that what is said next is contradictory to what was said before, but this does not prevent the first.
- method is a systems approach to the analysis and design of information systems.
- A roadmap is a document that contains the instructions and incidents of a project
- Set of operations that are carried out to direct and manage a business or a company.
- The ability of people to form ideas and representations of reality in their minds, relating them to each other.
- is someone who carries out a project oriented to the search for knowledge and the clarification of facts and relationships.
- What is normal, convenient, obligatory or necessary.
- Extension of land that surrounds a place, especially a population.
Down
- Set of instruments that are used to carry out a specific trade or job.
- To make someone or something secure or firm
- What is after finishing a project, a goal or something started
- Occupation, activity or work that is carried out to obtain a profit, especially that which consists of carrying out commercial operations, buying and selling merchandise or services.
- Norm or model that serves as a guide to do something
- It is a method that facilitates the development of information systems.
- Software development refers to a set of computing activities devoted to the process of creating, designing, deploying, and supporting software. The software itself is the set of instructions or programs that tell a computer what to do.
- An increase in the amount, size, intensity, or importance of something.
- It is an information analysis and monitoring tool for decision making and the timely application of preventive and corrective actions in the different areas.
- It is used to store and exchange contact data of people or companies.
- Very soon, right away.
- it is a programming paradigm that uses objects to create applications. It is based on three fundamental pillars: inheritance, polymorphism, encapsulation.
20 Clues: Very soon, right away. • To make someone or something secure or firm • Norm or model that serves as a guide to do something • What is normal, convenient, obligatory or necessary. • What is after finishing a project, a goal or something started • Extension of land that surrounds a place, especially a population. • ...
tradeboterns 2022 2022-06-29
Across
- 2010 crash losing 600 pts in 20 min
- why do markets exist? (2)
- failed bc wasn't plural
- the only thing to watch
- dave's risky investment in bats
- welcome goodie (1)
- dave's favorite game (3)
- got rain checked by many
- brogrammer
- has a car insta
- buy
- out for a tooth ache
- grob's acclaimed email sbjct.
- dave's favorite game (2)
- 34 on ACT
- welcome goodie (2)
- what researchers do all day
- midday competition; lunch task (2)
- what work is to dave
- "so, here's what we do next!"
- worst notebook
- schd. a coffee date
- "futures are essentially buying SPY in the future"
- distributed database for python dataframes
- time to ponder
- welcome goodie (3)
- a fundamental library for scientific computing in Python
- "make the _____!"
- dragged to an insta takeover
- ten mile walk = first date
- passed in 1997
- lunch task (1)
Down
- bikes 60 miles for "fun"; 8 other sibs
- dave's fav books
- caffeine junkie
- flowchart lynching game
- second tradebot outing
- drawing game
- tradebot's fav. cs lang.
- sell
- an offer to buy at the ask, ex.
- a hardware circuit that a user can program to carry out logical operations abbr.
- "so, what do we do next?"
- what we are making this summer
- what dave did to bear stearns ceo
- wears golden gooses
- big dog mom, abhors pasta
- what is money?
- emma's dad
- dave's favorite game (1)
- poker night loc.
- what dave can't pronounce
- exchange (sports theme)
- futures king
- dave's first investment in tradebot
- first covidtern; 9 other sibs
- worked at mathnasium
- why do markets exist? (1)
- asks many questions
- floor 6
- first tradebot outing
- always out of pocket
- lunch task (3)
63 Clues: buy • sell • floor 6 • 34 on ACT • brogrammer • emma's dad • drawing game • futures king • what is money? • worst notebook • time to ponder • lunch task (3) • passed in 1997 • lunch task (1) • caffeine junkie • has a car insta • dave's fav books • poker night loc. • "make the _____!" • welcome goodie (1) • welcome goodie (2) • welcome goodie (3) • wears golden gooses • schd. a coffee date • asks many questions • ...
IST Chapter 1 to 6 part 2 2025-09-11
Across
- – Device that converts physical documents into digital form.
- – Integrated circuits on the motherboard managing data flow.
- – Grouping of computing resources in virtualization.
- – The part of the CPU that performs arithmetic and logical operations.
- – Network layout where each device is interconnected with others.
- – Small, high-speed memory located inside or close to the CPU.
- – A markup language used to structure and transport data.
- – Network layout where devices are connected in a circular path.
- – Device that collects real-world data for input into a system.
- – Protocol that automatically assigns IP addresses to devices.
- – Physical enclosure protecting computer components.
- – Saved state of a virtual machine at a specific point in time.
- – International body that standardizes technology practices.
- – Network layout where devices connect to a central hub.
- – Interface that allows software applications to communicate.
- – Protocol used to send email across networks.
- – Stage where data is fed into the computer system.
- – Hardware added to improve or extend system capabilities.
- – Shared communication pathway for transferring data inside a computer.
Down
- – A set of rules governing communication between devices.
- – Output device that produces hard copies of documents.
- – Defines the arrangement of nodes and connections in a network.
- – Backup power device that prevents data loss during outages.
- – A structured data format using commas to separate values.
- – Standard language for creating and structuring web pages.
- – Output device that provides audio feedback.
- – Device that prevents overheating in a computer system.
- – System that translates domain names into IP addresses.
- – A device that converts digital signals into physical actions.
- – Stage where processed information is presented to the user.
- – Primary visual output device for displaying results.
- – Mechanism for applications to request services from the OS.
- – Organization responsible for setting networking and electronics standards.
- – United Nations agency overseeing global telecommunication standards.
- – CPU component that directs operations and manages instructions.
35 Clues: – Output device that provides audio feedback. • – Protocol used to send email across networks. • – Stage where data is fed into the computer system. • – Grouping of computing resources in virtualization. • – Physical enclosure protecting computer components. • – Primary visual output device for displaying results. • ...
AI vs. Artist 2025-09-25
Across
- A three-dimensional piece of art created by shaping or molding materials like stone, metal, or clay.
- Something that can be touched or physically felt.
- The process of trying out new ideas or methods to see what works or produces different results.
- The process of writing instructions that a computer can follow to perform specific tasks or functions.
- The reason or drive behind doing something, often related to goals or desires.
- The quality of being new, unique, and not copied from someone else.
- The art of creating visual content, often for advertising, branding, or communication, using tools like computers.
- The rate at which work is completed or results are achieved, often related to efficiency.
- The ability to come up with new ideas, think outside the box, and produce original work.
- A skill or art form that requires careful work and expertise, often related to creating something by hand.
Down
- The process of making something seem less important, valuable, or worthy.
- Changing the way something is presented or packaged, often to make it seem new or different.
- The act of creating something new or improving on existing ideas, often in a way that has a significant impact.
- A strong feeling, such as happiness, sadness, or anger, that influences how a person thinks or behaves.
- The act of copying or pretending to be someone or something else.
- An artist who creates images to accompany text, such as in books, magazines, or websites.
- A set of instructions or rules for solving a problem or completing a task, often used in computing.
- The ability to have an effect on the way someone thinks or acts.
- Technology that allows machines to perform tasks that normally require human intelligence, like thinking or learning.
- A series of actions or steps taken to achieve a particular result.
20 Clues: Something that can be touched or physically felt. • The ability to have an effect on the way someone thinks or acts. • The act of copying or pretending to be someone or something else. • A series of actions or steps taken to achieve a particular result. • The quality of being new, unique, and not copied from someone else. • ...
Floral Careers 2025-11-30
Across
- Preserve flowers and plants through proper care, hydration, temperature control, and handling.
- Create display arrangements showing retail florists how to use products.
- Creates naturalistic plant environments inside zoo exhibits and cares for plantings around animal habitats.
- Responsible for all stages and elements of production for a single crop or group of crops.
- Works in education, research, curation, and maintenance of plant collections in gardens and arboretums.
- Uses seeds, cuttings, tissue culture, and other methods to produce young plants.
- Inspect flowers arriving from farms for quality and condition.
- Combines genetics and plant selection to develop new plant varieties.
- Manage international floral shipments and understand customs and agricultural inspection procedures.
- Receives shipments, locates products, and prepares orders for packaging and shipment.
- Delivers floral arrangements directly to customers; may also dispatch drivers and route deliveries.
Down
- Design, purchase, market, and manage floral operations inside grocery stores.
- Sells plant, seed, fertilizer, chemical, and equipment products to growers and retailers.
- A third-party agent who transfers floral orders to local florists for fulfillment.
- Manages product sales, develops sales projections, and trains salespeople.
- Locates and secures high-quality floral products at competitive prices.
- Delivers floral products to wholesalers and retailers; may work for a grower or independently.
- Purchases and sells floral-related goods grown or made in other countries.
- Sells product lines to wholesale or retail clients and builds customer relationships.
- Develops economical and effective ways to grow, handle, and market crops; employed by government, universities, and private industry.
- Prepare flowers in boxes or containers for shipment, including air freight.
- Creates floral designs for everyday arrangements, funerals, weddings, and special events; assists customers and merchandises the shop.
- SPECIALIST Uses telecommunications, automated systems, and computing in highly automated floral growing operations.
- Maintains and designs outdoor landscapes for private and public properties, including parks and golf courses.
- Teaches floral design at high schools, colleges, or vocational programs.
25 Clues: Inspect flowers arriving from farms for quality and condition. • Combines genetics and plant selection to develop new plant varieties. • Locates and secures high-quality floral products at competitive prices. • Create display arrangements showing retail florists how to use products. • Teaches floral design at high schools, colleges, or vocational programs. • ...
Operating System 2017-05-14
Across
- Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
- Specifies a set of functions that are
- Contains information about the file, including ownership, permissions, and location of the file contents
- The _____ register holds the smallest legal physical memory address
- A connection point that devices use to communicate with the machine
- Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
- A _____ kernel allows a process to be preempted while it is running in kernel mode.
- The potential for a security violation, such as the discovery of a vulnerability
- A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
- A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
- A _____ can occur only if four necessary conditions hold simultaneously in the system
- to an application programmer
- The terms _____ and cracker are for those attempting to breach security
- Creates and runs virtual machines by providing an interface that is identical to the host
- To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
- The underlying hardware system that runs the virtual machines
- A _____ kernel does not allow a process running in kernel mode to be preempted
- CPU _____ vary in number and type, depending on the computer architecture
- _____ parallelism involves distributing not data but tasks across multiple computing cores
- The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
- One measure of work is the number of processes that are completed per time unit
- One program running at all times on the computer
- Protecting critical regions through the use of locks
- _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
- _____ objects include files, programs, and semaphores
- A _____ program manages the execution of user programs to prevent errors and improper use of the computer
- One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
Down
- With _____ loading, a routine is not loaded until it is called
- The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
- We say that a system is _____ if its resources are used and accessed as intended under all circumstances
- Each ____ process is provided with a virtual copy of the host
- A ____ file is a sequence of characters organized into lines
- An ____ file is a series of code sections that the loader can bring into memory and execute
- _____ objects include the CPU, memory segments, printers, disks, and tape drives
- based on the Berkeley Fast File System
- Access to a page marked invalid causes a ____ fault
- Is a complete round of communication
- The _____'s algorithm less efficient than the resource-allocation graph scheme
- _____ memory involves the separation of logical memory as perceived by users from physical memory
- The advantages of distributed systems have resulted in an industry-wide trend toward _____
- memory that is dynamically allocated during process run time
- A program in execution
- part of the kernel
- A ____ crash normally cannot be repaired; the entire disk must be replaced
- Nonvolatile memory that is used like a hard drive
- Communication links are controlled by special communication _____
- _____ paging is commonly used in virtual memory systems
- The _____ register specifies the size of the range
- A protection _____ specifies the resources that the process may access
- The interpreter used for systems with multiple command interpreters to choose from
- The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
- ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
- _____ programs are associated with the operating system but are not
53 Clues: part of the kernel • A program in execution • to an application programmer • Is a complete round of communication • Specifies a set of functions that are • based on the Berkeley Fast File System • One program running at all times on the computer • Nonvolatile memory that is used like a hard drive • The _____ register specifies the size of the range • ...
PM crossword 2015-02-16
Across
- - the value of money that has been used up to produce something, and hence is not available for use anymore. In business, it may be one of acquisition, in which it is counted as case the amount of money expended to acquire something.
- - an uncertain event or condition that, if it occurs, has a positive or negative effect on a project’s objectives
- - the sum total of all of project’s products and their requirements or features.
- - a list of all planned expenses and revenues
- - (in project management) activities that need to be accomplished within a defined period of time.
- - the amount of time that a task in a project network can be delayed without causing a delay to subsequent tasks and or the project completion date.
- - a graphical representation of a chronological sequence of events, also referred to as a chronology. It can also mean a schedule of activities, such as a timetable.
- - documents approved by a recognized body, that provide, for common and repeated use, rules, guidelines, or characteristics for products, processes, or services with which compliance is not mandatory.
- - a contractually required work product, produced and delivered to a required state. It may be a document, hardware, software or other tangible product.
- - in this aproach the project is seen as a series of relatively small tasks conceived and executed to conclusion as the situation demands in an adaptive manner, rather than as a completely pre-planned process.
- - a social arrangement which pursues collective goals, which controls its own performance, and which has a boundary separating it from its environment.
- - in a project network a link amongst a project's terminal elements.
- - an ongoing collection of activities, with an inputs, outputs and the energy required to transform inputs to outputs.
- – the name of the first meeting with the project team and the client of the project.
- - a type of bar chart that illustrates a project schedule. It illustrates the start and finish dates of the terminal elements and summary elements of a project.
Down
- - the international standard for project management developed by the Project Management Institute PMI.
- – (in project management) the amount of effort applied to produce a deliverable or to accomplish a task (a terminal element).
- - in project management consists of a list of a project's terminal elements with intended start and finish dates.
- - a shortcut for the method of planning and managing projects that puts more emphasis on the resources required to execute project tasks.
- - all what is required to carry out a project's tasks; they can be people, equipment, facilities, funding, or anything else capable of definition (usually other than labour) required for the completion of a project activity.
- - a shortcat for a tool that defines a project and groups the project’s discrete work elements in a way that helps organize and define the total work scope of the project.
- - an iterative incremental process of software development commonly used with agile software development
- - a recently evolved computing terminology or metaphor based on utility and consumption of computing resources. it involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. It can be classified as public, private or hybrid.
- – this kind of reserve is the cost or time reserve that is used to manage identified risks or “known-unknown” (known=identified, unknown=risks).It is not a random reserve, it is an estimated reserve based on various risk management techniques, such as Expected Monetary Value (EMV) and the Decision Tree Method.
- - entities within or without an organization which sponsor a project or, have an interest or a gain upon a successful completion of a project.
- -(in project management)the processes of making accurate estimates using the appropriate techniques.
- - a temporary endeavor undertaken to create a unique product, service, or result
- - the number of calendar periods it takes from the time the execution of element starts to the moment it is completed.
- - a personal or organizational desired end-point in some sort of assumed development, many people endeavor to reach it within a finite time by setting deadlines
29 Clues: - a list of all planned expenses and revenues • - in a project network a link amongst a project's terminal elements. • - the sum total of all of project’s products and their requirements or features. • - a temporary endeavor undertaken to create a unique product, service, or result • ...
KGC 2015-02-16
Across
- - the international standard for project management developed by the Project Management Institute PMI.
- -the number of calendar periods it takes from the time the execution of element starts to the moment it is completed.
- - a shortcut for the method of planning and managing projects that puts more emphasis on the resources required to execute project tasks.
- - (in project management)the processes of making accurate estimates using the appropriate techniques.
- - documents approved by a recognized body, that provide, for common and repeated use, rules, guidelines, or characteristics for products, processes, or services with which compliance is not mandatory.
- - the complete set of tasks, techniques, tools applied during project execution
- – the name of the first meeting with the project team and the client of the project.
- - a list of all planned expenses and revenues
- – this kind of reserve is the cost or time reserve that is used to manage identified risks or “known-unknown” (known=identified, unknown=risks).It is not a random reserve, it is an estimated reserve based on various risk management techniques, such as Expected Monetary Value (EMV) and the Decision Tree Method.
- - in a project network a link amongst a project's terminal elements.
- - all what is required to carry out a project's tasks; they can be people, equipment, facilities, funding, or anything else capable of definition (usually other than labour) required for the completion of a project activity.
- - the amount of time that a task in a project network can be delayed without causing a delay to subsequent tasks and or the project completion date.
- - a recently evolved computing terminology or metaphor based on utility and consumption of computing resources. it involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. It can be classified as public, private or hybrid.
- - a shortcat for a tool that defines a project and groups the project’s discrete work elements in a way that helps organize and define the total work scope of the project.
- - an iterative incremental process of software development commonly used with agile software development
Down
- - an ongoing collection of activities, with an inputs, outputs and the energy required to transform inputs to outputs.
- - a graphical representation of a chronological sequence of events, also referred to as a chronology. It can also mean a schedule of activities, such as a timetable.
- - A contractually required work product, produced and delivered to a required state. It may be a document, hardware, software or other tangible product.
- - (in project management) activities that need to be accomplished within a defined period of time.
- - the sum total of all of project’s products and their requirements or features.
- - a personal or organizational desired end-point in some sort of assumed development, many people endeavor to reach it within a finite time by setting deadlines
- - entities within or without an organization which sponsor a project or, have an interest or a gain upon a successful completion of a project.
- - a temporary endeavor undertaken to create a unique product, service, or result
- - a social arrangement which pursues collective goals, which controls its own performance, and which has a boundary separating it from its environment.
- - in this aproach the project is seen as a series of relatively small tasks conceived and executed to conclusion as the situation demands in an adaptive manner, rather than as a completely pre-planned process.
- - a type of bar chart that illustrates a project schedule. It illustrates the start and finish dates of the terminal elements and summary elements of a project.
- - the value of money that has been used up to produce something, and hence is not available for use anymore. In business, it may be one of acquisition, in which it is counted as case the amount of money expended to acquire something.
- - in project management consists of a list of a project's terminal elements with intended start and finish dates.
- - an uncertain event or condition that, if it occurs, has a positive or negative effect on a project’s objectives
- – (in project management) the amount of effort applied to produce a deliverable or to accomplish a task (a terminal element).
30 Clues: - a list of all planned expenses and revenues • - in a project network a link amongst a project's terminal elements. • - the complete set of tasks, techniques, tools applied during project execution • - the sum total of all of project’s products and their requirements or features. • ...
Chapter 16: Technologies and Tools: In an Era of Big Data and the "Cloud" 2017-04-03
Across
- The use of telecommunications technology to remotely diagnose and treat inmates
- Which state prison requires all visitors scan their fingerprints before entering?
- A process whereby a solid object, including guns and other weapons, can be made from a digital model, as layers of material are laid down in different shapes
- If the police are looking for a suspect or wishing to put on a sort of community alert, they can easily send a message to their community followers via ________ _________, blogs, and twitter
- The use of a network of remote servers hosted on the internet to store, manage, and process data
- Problems of ________, space and time have always plague the courts
- A device worn by both inmates and correctional officers for tracking purposes
Down
- First state to initiate a ballistic database allowing investigators to match shell casings with a national database in order to solve crimes
- Abbreviation for policy whereby employees can bring their personal mobile devices to work and use them to access privileged agency information
- Where incoming documents are scanned and processed
- _________ __________ services can also be provided to prisoners via mobile devices
- Connecticut launched this policy in schools, allowing easier connection with the police when 911 calls are not feasible
- Applying tremendous computing power to massive and often highly complex sets of information
- A study of RFID devices by the ____________ corporation underscored the need for staff to be trained in the many uses of these devices
- Branch of technology which involves the design, construction, and function of robots
- One of the six (6) states selected by the FAA to develop test sites for drones
16 Clues: Where incoming documents are scanned and processed • Problems of ________, space and time have always plague the courts • A device worn by both inmates and correctional officers for tracking purposes • One of the six (6) states selected by the FAA to develop test sites for drones • The use of telecommunications technology to remotely diagnose and treat inmates • ...
test 2025-02-11
Across
- revising, reorganizing, and rebuilding part of a system so it is of higher quality
- a computer software program that executes on a computing device to carry out a specific function or set of related functions
- those system development activities that enable a person to describe in detail how the resulting information system will actually be implemented
- a set of comprehensive guidelines for carrying out all of the activities of each core process of the SDLC
- a framework that identifies all the activities required to research, build, deploy, and often maintain an information system
- a term used to describe adaptive projects because they are chaotic yet ordered
- a planned undertaking that has a beginning and an end and produces some end result
Down
- a collection of guidelines that specify a method for how to carry out a development activity or task
- those system development activities that enable a person to understand and specify what the new system should accomplish
- a prioritized list of user requirements used to choose work to be done in a Scrum project
- a time-controlled mini-project that implements a specific portion of a system
- an SDLC approach that assumes the phases can be completed sequentially with no overlap
- a set of interrelated components that collect, process, store, and provide as output the information needed to complete business tasks
- a guiding philosophy and set of guidelines for developing information systems in an unknown rapidly changing environment
- a software application that assists developers in creating models or other components required for a project
- related groups of development activities, such as initiation, planning, analysis, design, implementation, deployment, and support
16 Clues: a time-controlled mini-project that implements a specific portion of a system • a term used to describe adaptive projects because they are chaotic yet ordered • revising, reorganizing, and rebuilding part of a system so it is of higher quality • a planned undertaking that has a beginning and an end and produces some end result • ...
Bus. Partner B2, p39 Vocabulary Review 2023-11-27
Across
- 'In the ___' refers to having software or space for storing information on the Internet, rather than on your own computer.
- Contacting customers at the wrong time of day can be an i___ which will not result in a sale.
- P___ technology analyses past behaviour to predict possible future behaviour.
- In computing, a ___ refers to a piece of software designed to do a particular task. It can also be a piece of equipment, or a device, or a skill for doing your job.
- Data ___ uses a computer to examine large amounts of data, for example about customers and collect information that is not easily seen.
- Even businesses that are seen as market d___ today could be out of date in a short period of time.
- a digital ___: someone who is not very good at using digital equipment (computers, mobile phones etc.) because they have only recently started using them
- He runs a business that specialises in the a___ of consumer data.
- a digital ___: someone who uses digital technology to perform their work duties from different places
- The data collected through your smartphone regarding your everyday movements, gives a better v___ of who you are as a person.
Down
- If your advertisements target the right kind of people for your product, you will get a much higher c___ rate.
- In marketing, DMP stands for Digital Marketing ___.
- A data ___ is the act of copying information from one computer to another.
- ___ in digital marketing is the number of sales generated in relation to the number of visits to a website.
- We will create a program that is p___ for your company's needs.
- It's a start-up with many i___ products.
- a digital ___: someone who is very good at using digital equipment (computers, mobile phones etc.) because they have used them since they were young
17 Clues: It's a start-up with many i___ products. • In marketing, DMP stands for Digital Marketing ___. • We will create a program that is p___ for your company's needs. • He runs a business that specialises in the a___ of consumer data. • A data ___ is the act of copying information from one computer to another. • ...
Online Safety 2023-11-13
Across
- – Malicious code embedded in a data or program file, spread from one device to another by opening an executable file. A virus is spread by human action.
- – Criminal acts using computers, networks and/or the Internet
- – Software that has advertisements embedded into the program
- – Software that detects and removes spyware from a computer
- – Malware that locks a computer system or encrypts computer files until a “ransom” fee is paid
- – Electronic junk mail
Down
- Forensics – Investigation and analysis techniques that gather and preserve data from a computing device
- Theft – All types of crime in which someone obtains and uses another person’s personal data in a way that involves fraud or deception, typically for economic gain
- – Hardware or software that blocks unauthorized communications to or from your computer; helps prevent hackers from accessing your computer
- – Person who uses the Internet to access personal or business computers without permission
- – A variation of phishing using SMS (short message service) to send misleading text messages
- – Short for “malicious software;” includes viruses and spyware that steal personal information, send spam and commit fraud
- – Email sent that misrepresents the sender as legitimate and with the intent of having the recipient reveal private information that can be used for identity theft
- – A subclass of virus that can travel without being attached to a program or data file and without human action; a worm can replicate itself thousands of times
- – Malware that appears to be a legitimate program, but when activated often causes loss or theft of computer data
- logger or keylogger – Software that can record every keystroke you make on your computer. Used to record and capture data input. (Keyloggers are often used by employers to ensure computer use is work-related)
16 Clues: – Electronic junk mail • – Software that detects and removes spyware from a computer • – Software that has advertisements embedded into the program • – Criminal acts using computers, networks and/or the Internet • – Person who uses the Internet to access personal or business computers without permission • ...
REVIEW COMPUTER NETWORK KEY WORDS 2024-08-13
Across
- IP Address is an IP address that is automatically assigned to each connection, or node, of a network like your
- Network Protocols is a formal standards and policies made up of rules, procedures, and formats and defines communication between two or more devices over a network.
- Network is a collection of computers, servers, network devices, peripherals, or other devices connected to allow the sharing of data.
- Switch is a networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
- is any physical device within a network or other tools that can send, receive, or forward information. A personal computer is the most common node.
- Server. It is called static because it does not change.
- desktop PC, or wireless tablet. This automatic assignment of IP Address is a accomplished by what is called a DHCP Server.
- IP Address is an IP address that was manually configured for a device instead of one that was assigned by a
Down
- Connection is a computer network that uses wireless data connections between network nodes.
- Connection is a computer network that requires a physical wire to be pulled to the desired location of the network jack.
- IP Address is a numerical label assigned to each device connected to a computer network that uses the internet protocol
- Server is assigns IP addresses to client computers which are often used in networks to reduce
- is a networking device that forwards data packets between computer networks.
- is a unit of digital information in computing and telecommunications that consists of eight bits.
- communication.
- efforts.
16 Clues: efforts. • communication. • Server. It is called static because it does not change. • is a networking device that forwards data packets between computer networks. • Connection is a computer network that uses wireless data connections between network nodes. • is a unit of digital information in computing and telecommunications that consists of eight bits. • ...
1.3 Digital Communication 2024-01-23
Across
- the office email client
- An operating system for mobile devices. Common mobile operating systems include Android and iOS.
- Similar to a telephone call, but with live video feed. Video calls send data over the Internet and use VoIP (Voice over Internet Protocol).
- Short Message Service (SMS). The technical name for texting on cell phones. Service that provides quick exchange of short messages that is provided through a cellular carrier instead of the Internet.
- A person who purposely starts fights on the Internet to sow discord and cause distress.
- A file that is sent along with an email.
Down
- A service where one user can type a message and another user immediately receives it. Also called chat.
- A website where people can discuss various topics by posting messages. Typically, each conversation topic is a top-level post, and discussions happen as replies to the original post.
- stands for blind carbon copy. People added to this field receive the email, but their addresses are hidden from other recipients.
- A program designed to run on a mobile device with a touch-screen interface. Mobile apps are typically downloaded through an app store.
- Authentication
- A message sent from a computer user to one or more recipients.
- Card Subscriber Identity Module. A small chip that gives a mobile phone a unique customer ID, phone number, and authentication codes.
- Screen A display screen on a computing device that can process user input through touch.
- Rules for being safe, courteous, and polite on the Internet.
- stands for carbon copy. Add people to this field who should be kept in the loop, but aren't necessarily expected to
16 Clues: Authentication • the office email client • A file that is sent along with an email. • Rules for being safe, courteous, and polite on the Internet. • A message sent from a computer user to one or more recipients. • A person who purposely starts fights on the Internet to sow discord and cause distress. • ...
Unit 3 Princ. IT Crossword 2022-10-04
Across
- a pointing device that uses a small rubber-tipped stick, usually right in the middle of the G, H, and B keys on the keyboard.
- a collection of computers and other devices connected together somehow to share resources.
- allows the computer to talk to the servers and request resources from them
- It is a laptop-only peripheral that is basically an extension of the motherboard of a laptop.
- Anchors your device to a physical structure, making it nearly impossible for someone to walk off with it.
- The most common computer input device for entering text with buttons labeled with the characters they represent.
- an expansion card that allows the PC to talk on a network.
- a device that has a pad of touch-sensitive material.
- the network of devices that are able to communicate with each other and exchange data, and it’s one of the hottest topics in computing today.
- offer networks the capability of centralizing the control of resources and security, thereby reducing administrative difficulties. They can be used to distribute processes for balancing the load on computers and can thus increase speed and performance. They can also compartmentalize files for improved reliability.
Down
- A type of display unit that uses capacitive or resistive touch as an input mechanism without requiring separate input methods.
- assigned to provide one or more network services and local access for a user.
- an exposed ball that functions much like an inverted mouse.
- A computer that users use to access resources, most often a client computer on a network. Usually a desktop or laptop computer.
- assigned to provide specific applications or services for the network and nothing else.
- example of a dedicated server. It is dedicated to the task of serving up web pages and nothing else.
16 Clues: a device that has a pad of touch-sensitive material. • an expansion card that allows the PC to talk on a network. • an exposed ball that functions much like an inverted mouse. • allows the computer to talk to the servers and request resources from them • assigned to provide one or more network services and local access for a user. • ...
RU ITEC411 Social, Legal, and Ethical Issues for Computing Technology - CH9 2025-11-25
Across
- Being open and honest about system capabilities and limitations
- Tracking system access and employee activities for security
- Ethics Relationships and responsibilities toward customers, clients, coworkers, and others affected by one's work
- data Sensitive individual information requiring protection from unauthorized access or disclosure
- Authentication credential that controls system access
- Legal responsibility for damages caused by one's work
- Quality assurance process often shortened under schedule pressure
- of ethics Written guidelines that remind professionals that ethical behavior is essential to their job
- Specialized knowledge that clients depend on professionals to provide
- Established procedures for handling data or performing tasks
Down
- Unfair preference that affects professional judgment
- Converting data into protected format to prevent unauthorized access
- Initial problem-solving phase identifying all affected parties and options
- Results or effects that follow from professional decisions
- Professional duty to keep client information private and secure
- Being at risk of harm due to system weaknesses or flaws
- Agreement given with full knowledge of risks and implications
- phase Stage of ethical decision-making where responsibilities, rights, and impacts are identified and evaluated
- Adherence to moral principles and professional standards
- Any person or organization affected by a professional decision or system
20 Clues: Unfair preference that affects professional judgment • Authentication credential that controls system access • Legal responsibility for damages caused by one's work • Being at risk of harm due to system weaknesses or flaws • Adherence to moral principles and professional standards • Results or effects that follow from professional decisions • ...
binary Base-2 computing system 2022-08-28
Threats in Computing 2024-12-06
Across
- A shoulder surfer watches as someone enters their PIN, then steals the card and withdraws money using the stolen PIN
Down
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging
- blagging is more targeted than a standard phishing attempt and usually targets a specific individual or organisation, whereas normal phishing can be sent to hundreds of people
3 Clues: A shoulder surfer watches as someone enters their PIN, then steals the card and withdraws money using the stolen PIN • the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging • ...
Computer Languages 2025-06-14
Across
- language is this?
- the 1970s, this language was created at Bell Labs by Dennis Ritchie and became the foundation for modern operating systems, including UNIX. It’s known for its "C" syntax and paved the way for many modern programming languages.
- are the languages you need to identify (in order of appearance):
- 3:
- The Evolution of Programming Languages
Down
- language is this?
- language is often referred to as the "first high-level language." It was created in the 1950s and was used primarily for scientific and engineering calculations. It was named after an influential mathematician.
- 2:
- in the 1960s, this language’s primary goal was to enable "structured programming." It has a famous "if-then-else" syntax and inspired many later programming languages, especially in business computing.
- you're a time traveler who wants to visit various periods of programming language development. Your goal is to visit these key programming languages in chronological order, based on their first appearance, but there's a twist! I’ll give you a set of clues about each language, and your task is to determine which language is being described.
- 1:
11 Clues: 2: • 3: • 1: • language is this? • language is this? • The Evolution of Programming Languages • are the languages you need to identify (in order of appearance): • in the 1960s, this language’s primary goal was to enable "structured programming." It has a famous "if-then-else" syntax and inspired many later programming languages, especially in business computing. • ...
Coding Key Words 2025-02-24
Across
- A logical operator is a symbol or word used to connect two or more expressions such that the value of the compound expression produced depends only on that of the original expressions and on the meaning of the operator. Common logical operators include AND, OR, and NOT.
- a programming paradigm in which the flow of the program is determined by external events.
- app, a software application developed specifically for use on small, wireless computing devices, such as smartphones
- criteria, the specific, measurable, and realistic requirements that a project, product, or service must meet to be considered successful
- ,An event handler is a program function that is executed by the application or operating system when an event is executed on th
Down
- he process of assigning a code to something for classification or identification. "the forms are checked and returned to the census officer for coding"
- indicates whether the prices or values in a condition are fixed or. whether they have been changed and, if so, in what way.
- statemen, ecutes a statement if a specified condition is truthy
8 Clues: statemen, ecutes a statement if a specified condition is truthy • a programming paradigm in which the flow of the program is determined by external events. • app, a software application developed specifically for use on small, wireless computing devices, such as smartphones • ...
debesų kompiuterija 2025-10-17
Across
- saugojimas reiškia, kad failai saugomi serveriuose internete, o ne jūsų kompiuterio kietajame diske. Vietinis saugojimas - tai failų laikymas jūsų įrenginyje (kompiuteryje, telefone).
- - tai galingas kompiuteris, kuris teikia paslaugas kitiems kompiuteriams per tinklą. Debesų kompiuterijoje serveriai saugomi specialiuose duomenų centruose ir aptarnauja tūkstančius vartotojų
- Drive yra debesų saugojimo paslauga. Tai reiškia, kad jūsų failai saugomi ne jūsų kompiuteryje, o serveriuose internete. Kiti pavyzdžiai: iCloud, Dropbox, OneDrive.
- reiškia Software as a Service (Programinė įranga kaip paslauga). Tai reiškia, kad programas naudojate per internetą, o ne įdiegiate jas į savo kompiuterį. Pavyzdžiai: Gmail, Google Docs, Canva.
Down
- debesų kompiuterijos privalumas - prieinamumas iš bet kur. Jei turite interneto ryšį, galite pasiekti savo duomenis ir programas iš namų, mokyklos ar bet kur kitur. Tai vadinama mobilumu.
- kompiuterija (Cloud Computing) - tai kompiuterinių išteklių ir paslaugų teikimas per internetą. Vietoj to, kad turėtumėte savo serverius ar programas kompiuteryje, naudojate juos per internetą iš specialių duomenų centrų.
- Word, įdiegtas jūsų kompiuteryje, NĖRA debesų paslauga - tai vietinė programinė įranga. Tuo tarpu Netflix, Spotify ir YouTube yra debesų paslaugos, nes veikia per internetą.
- saugojime failai saugomi serveriuose - tai galingi kompiuteriai specialiuose duomenų centruose. Jūsų failai yra privatūs ir saugūs, prieinami tik jums (arba tiems, su kuriais pasidalijate).
- kaip vadinasi vieta kurioja yra saugoma
- yra SaaS pavyzdys. Jūs naudojate el. pašto programą per naršyklę, nereikia nieko įdiegti. Visi jūsų laiškai saugomi Google serveriuose, o ne jūsų kompiuteryje.
10 Clues: kaip vadinasi vieta kurioja yra saugoma • yra SaaS pavyzdys. Jūs naudojate el. pašto programą per naršyklę, nereikia nieko įdiegti. Visi jūsų laiškai saugomi Google serveriuose, o ne jūsų kompiuteryje. • ...
network 2025-05-06
Across
- is defined as the connection of at least two computer systems, either by a cable or a wireless connection.
- is a multi-port repeater. it connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations.
- is a short form of Modulator/Demodulator. It is a hardware component/device that can connect computers and other devices such as routers and switches to the internet.
Down
- is a multiport bridge with a buffer and a design that can boost its efficiency(a large number of ports implies less traffic) and performance. A switch is a data link layer device.
- is a term used to refer to any computing devices such as computers that send and receive network packets across the network.
- A router[a] is a computer and networking device that forwards data packets between computer networks,
6 Clues: A router[a] is a computer and networking device that forwards data packets between computer networks, • is defined as the connection of at least two computer systems, either by a cable or a wireless connection. • is a term used to refer to any computing devices such as computers that send and receive network packets across the network. • ...
Open doors 2015-02-16
Across
- - a list of all planned expenses and revenues
- -the number of calendar periods it takes from the time the execution of element starts to the moment it is completed.
- - in project management consists of a list of a project's terminal elements with intended start and finish dates.
- - entities within or without an organization which sponsor a project or, have an interest or a gain upon a successful completion of a project.
- - an uncertain event or condition that, if it occurs, has a positive or negative effect on a project’s objectives
- - the amount of time that a task in a project network can be delayed without causing a delay to subsequent tasks and or the project completion date.
- - all what is required to carry out a project's tasks; they can be people, equipment, facilities, funding, or anything else capable of definition (usually other than labour) required for the completion of a project activity.
- - in this aproach the project is seen as a series of relatively small tasks conceived and executed to conclusion as the situation demands in an adaptive manner, rather than as a completely pre-planned process.
- - a recently evolved computing terminology or metaphor based on utility and consumption of computing resources. it involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. It can be classified as public, private or hybrid.
- – this kind of reserve is the cost or time reserve that is used to manage identified risks or “known-unknown” (known=identified, unknown=risks).It is not a random reserve, it is an estimated reserve based on various risk management techniques, such as Expected Monetary Value (EMV) and the Decision Tree Method.
- - the international standard for project management developed by the Project Management Institute PMI.
Down
- - a graphical representation of a chronological sequence of events, also referred to as a chronology. It can also mean a schedule of activities, such as a timetable.
- - the value of money that has been used up to produce something, and hence is not available for use anymore. In business, it may be one of acquisition, in which it is counted as case the amount of money expended to acquire something.
- - a shortcat for a tool that defines a project and groups the project’s discrete work elements in a way that helps organize and define the total work scope of the project.
- - an ongoing collection of activities, with an inputs, outputs and the energy required to transform inputs to outputs.
- – (in project management) the amount of effort applied to produce a deliverable or to accomplish a task (a terminal element).
- - an iterative incremental process of software development commonly used with agile software development
- - A contractually required work product, produced and delivered to a required state. It may be a document, hardware, software or other tangible product.
- - (in project management)the processes of making accurate estimates using the appropriate techniques.
- - documents approved by a recognized body, that provide, for common and repeated use, rules, guidelines, or characteristics for products, processes, or services with which compliance is not mandatory.
- - a social arrangement which pursues collective goals, which controls its own performance, and which has a boundary separating it from its environment.
- – the name of the first meeting with the project team and the client of the project.
- - the sum total of all of project’s products and their requirements or features.
- - in a project network a link amongst a project's terminal elements.
- - a temporary endeavor undertaken to create a unique product, service, or result
- - a personal or organizational desired end-point in some sort of assumed development, many people endeavor to reach it within a finite time by setting deadlines
- - (in project management) activities that need to be accomplished within a defined period of time.
- - a type of bar chart that illustrates a project schedule. It illustrates the start and finish dates of the terminal elements and summary elements of a project.
- - a shortcut for the method of planning and managing projects that puts more emphasis on the resources required to execute project tasks.
29 Clues: - a list of all planned expenses and revenues • - in a project network a link amongst a project's terminal elements. • - the sum total of all of project’s products and their requirements or features. • - a temporary endeavor undertaken to create a unique product, service, or result • ...
Open doors 2015-02-16
Across
- - a list of all planned expenses and revenues
- -the number of calendar periods it takes from the time the execution of element starts to the moment it is completed.
- - in project management consists of a list of a project's terminal elements with intended start and finish dates.
- - entities within or without an organization which sponsor a project or, have an interest or a gain upon a successful completion of a project.
- - an uncertain event or condition that, if it occurs, has a positive or negative effect on a project’s objectives
- - the amount of time that a task in a project network can be delayed without causing a delay to subsequent tasks and or the project completion date.
- - all what is required to carry out a project's tasks; they can be people, equipment, facilities, funding, or anything else capable of definition (usually other than labour) required for the completion of a project activity.
- - in this aproach the project is seen as a series of relatively small tasks conceived and executed to conclusion as the situation demands in an adaptive manner, rather than as a completely pre-planned process.
- - a recently evolved computing terminology or metaphor based on utility and consumption of computing resources. it involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. It can be classified as public, private or hybrid.
- – this kind of reserve is the cost or time reserve that is used to manage identified risks or “known-unknown” (known=identified, unknown=risks).It is not a random reserve, it is an estimated reserve based on various risk management techniques, such as Expected Monetary Value (EMV) and the Decision Tree Method.
- - the international standard for project management developed by the Project Management Institute PMI.
Down
- - a graphical representation of a chronological sequence of events, also referred to as a chronology. It can also mean a schedule of activities, such as a timetable.
- - the value of money that has been used up to produce something, and hence is not available for use anymore. In business, it may be one of acquisition, in which it is counted as case the amount of money expended to acquire something.
- - a shortcat for a tool that defines a project and groups the project’s discrete work elements in a way that helps organize and define the total work scope of the project.
- - an ongoing collection of activities, with an inputs, outputs and the energy required to transform inputs to outputs.
- – (in project management) the amount of effort applied to produce a deliverable or to accomplish a task (a terminal element).
- - an iterative incremental process of software development commonly used with agile software development
- - A contractually required work product, produced and delivered to a required state. It may be a document, hardware, software or other tangible product.
- - (in project management)the processes of making accurate estimates using the appropriate techniques.
- - documents approved by a recognized body, that provide, for common and repeated use, rules, guidelines, or characteristics for products, processes, or services with which compliance is not mandatory.
- - a social arrangement which pursues collective goals, which controls its own performance, and which has a boundary separating it from its environment.
- – the name of the first meeting with the project team and the client of the project.
- - the sum total of all of project’s products and their requirements or features.
- - in a project network a link amongst a project's terminal elements.
- - a temporary endeavor undertaken to create a unique product, service, or result
- - a personal or organizational desired end-point in some sort of assumed development, many people endeavor to reach it within a finite time by setting deadlines
- - (in project management) activities that need to be accomplished within a defined period of time.
- - a type of bar chart that illustrates a project schedule. It illustrates the start and finish dates of the terminal elements and summary elements of a project.
- - a shortcut for the method of planning and managing projects that puts more emphasis on the resources required to execute project tasks.
29 Clues: - a list of all planned expenses and revenues • - in a project network a link amongst a project's terminal elements. • - the sum total of all of project’s products and their requirements or features. • - a temporary endeavor undertaken to create a unique product, service, or result • ...
Operating System 2017-04-16
Across
- copying information into faster storage system.
- Acts as an intermediary between the user of a computer and the computer hardware (Acronym).
- If both send and receive are blocking, it is considered as _________.
- The state of a process or a thread where it is waiting for a particular event that will not occur.
- is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another.
- A program loaded into memory and executing is called a _______.
- A Common bootstrap loader which allows selection of kernel from multiple disks, versions, kernel options.
- It is logical extension in which CPU switches jobs so frequently that users can interact with each job while it is running, creating interactive computing.
- client-side proxy for the actual procedure on the server
- A type of process in memory, running, but not on the display, and with limits.
- Thread benefits that may allow continued execution if part of process is blocked, especially important for user interfaces
- The one program running at all times on the computer.
- An operating system operation where processes may exchange information, on the same computer or between computers over a network.
- It is used when source CPU type different from target type.
- Message passing that is considered synchronous.
- A software-generated interrupt caused either by an error or a user request.
- represent files, programs, actions, etc.
- Any mechanism for controlling access of processes or users to resources defined by the OS.
- Disk surface is logically divided into ______.
- A temporary volatile data storage(acronym).
- is periodic sampling of instruction pointer to look for statistical trends.
- If processes don’t fit in memory, _________ moves them in and out to run.
- program obtains information concerning the specific configuration of the hardware system.
- A communication mechanism provided by scheduler activations from the kernel to the upcall handler in the thread library.
- People,machines, other computers.
Down
- It is stored within the computer hardware in read-only memory (ROM) or electrically erasable programmable read-only memory (EEPROM).
- Another type of an interrupt system where the computer already knows from what device the interrupt comes from.
- It is a signal from a device attached to a computer or from a program within the computer that requires the operating system to stop and figure out what to do next.
- containing temporary data.
- OS natively compiled for CPU, running guest OSes also natively compiled.
- defense of the system against internal and external attacks.
- Acts as a conduit allowing two processes to communicate.
- To keep track of which users use how much and what kinds of computer resources.
- If no parent waiting (did not invoke wait()) process is a ______.
- implies a system can perform more than one task simultaneously
- A part of resource allocation sequence where processes place a request to the OS to grant one of the instances of a particular resource to the process.
- A way of handling a deadlock where we take a resource from one process and give it to other.
- is defined as an endpoint for communication.
- A memory-management scheme that supports user view of memory as it divides the computer's primary memory into segments or sections.
- a number included at start of message packet to differentiate network services on a host.
- A process state where instructions are being executed.
- A variant of deadlock in which two or more processes continuously change their state in response to changes in the other process(es) without doing any useful work.
- containing memory dynamically allocated during run time.
- A memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory.
- This refers to finding and fixing errors, or bugs.
- block of available memory.
- Provide web access to internal systems.
- The smallest unit of processing that can be performed in an OS. It is a single sequence stream within in a process.
- are used in UNIX systems to notify a process that a particular event has occurred.
- This provides basic computing resources.
50 Clues: containing temporary data. • block of available memory. • People,machines, other computers. • Provide web access to internal systems. • represent files, programs, actions, etc. • This provides basic computing resources. • A temporary volatile data storage(acronym). • is defined as an endpoint for communication. • Disk surface is logically divided into ______. • ...
Code Words 2016-02-10
Across
- is a precise sequence of instructions for successfully carrying out a task. It will be written in everyday language but the steps might be capable of translation into a programming language. There might be a number of workable algorithms for a task but not all will be as efficient as the others.
- Decomposition in computer science, also known as factoring, is breaking a complex problem or system into parts that are easier to conceive, understand, program, and maintain.
- is an accurate representation of a real life activity. We use simulations when something is either too dangerous or too expensive to do for real.
- In computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached. Typically, a certain process is done, such as getting an item of data and changing it, and then some condition is checked such as whether a counter has reached a prescribed number.
- it can take a variety of forms, from commands you enter from the keyboard to data from another computer or device. A device that feeds data into a computer, such as a keyboard or mouse, is called an input device. (v.) The act of entering data into a computer.
- One of the three basic logic structures in computer programming. The other two logic structures are selection and loop. In a sequence structure, an action, or event, leads to the next ordered action in a predetermined order.
- is a computer’s way of evaluating something and saying that if it has a particular attribute it will do one thing, otherwise it’ll do something else.
- Data is defined as facts or figures, or information that's stored in or used by a computer. An example of data is information collected for a research paper. An example of data is an email.
- A programming language is a formal constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behavior of a machine or to express algorithms.
- Conceal a miniature microphone in (a room or telephone) in order to monitor or record someone's conversations.
Down
- it has been employed for many years, mainly in high-performance computing
- is a subset of a program that does a particular thing. It can be called up by the main program at any time to save having to type it out again and again
- In computer science, conditional statements, conditional expressions and conditional constructs are features of a programming language, which perform different computations or actions depending on whether a programmer-specified Boolean condition evaluates to true or false.
- is what data becomes after they are organised. It might be reported in words or a chart of some sort.
- can mean either print some output (words, numbers or images) on a screen or on paper through a printer. Nowadays it is even possible to print in 3D
- In computers, debugging is the process of locating and fixing or bypassing bugs (errors) in computer program code or the engineering of a hardware device. To debug a program or hardware device is to start with a problem, isolate the source of the problem, and then fix it.
- A computer operator is the person responsible for monitoring and controlling computer systems especially mainframe computer systems in a company or organization.
- A computer program is a collection of instructions that performs a specific task when executed by a computer. A computer requires programs to function, and typically executes the program's instructions in a central processing unit.
- An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. Embedded systems control many devices in common use today.
- An output device is any piece of computer hardware equipment used to communicate the results of data processing carried out by an information processing system (such as a computer) which converts the electronically generated information into human-readable form.
20 Clues: it has been employed for many years, mainly in high-performance computing • is what data becomes after they are organised. It might be reported in words or a chart of some sort. • Conceal a miniature microphone in (a room or telephone) in order to monitor or record someone's conversations. • ...
Computer Professions and Cyber crimes 2022-03-28
Across
- - a technique of tricking a user into clicking on something different from what the user perceives. (deprecated attack)
- - A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers, mobile phones, laptops, etc.
- - is a type of malware that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- - is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user.
- - is gaining unauthorized access to a computer system via another user's legitimate connection.
- - is an effort to gather information about a computer or its users for the purpose of gaining unauthorized access later.
- gap (networking) - It is a network security measure used on one or more computers to ensure the physical isolation of a secure computer network from unsecured networks, such as the public Internet or an unsecured local area network.
- - attack in which a person or a program successfully identifies as another by falsifying a data.
- (computing) - is a method of bypassing normal authentication procedures, usually through a network connection such as the Internet.
- - is the theft of money from the card to your card, account, account in the payment system, as well as the purchase of goods using someone else's credit card. Most often, carders use cash withdrawals, the purchase of branded clothing or electronics.
- – it refers to any video in which faces have been either swapped or digitally altered, with the help of AI.
- - is the area of development that refers to the server-side development. It focuses on databases, scripting, and website architecture.
- - is the area of development that refers to the client-side development. It is the development of the graphical user interface of a website.
- (horse) - is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it.
Down
- - Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
- - when a person builds an online relationship with a young person and tricks or pressures him/ her into doing a sexual act.
- request forgery (CSRF) - a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts. (also deprecated)
- slicing - attack in which cyber-criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size.
- - A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
- - type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web.
- - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies.
- - is a cyberattack in which spam emails, or other forms of communication, are sent en masse, with the intention of tricking recipients into doing something that undermines their security or the security of the organization they work for.
- - is a set of computer programs, usually malicious, designed to provide access to a computer or an area of its software that is otherwise prohibited.
- (denial of service attack) - is a cyberattack in which a criminal wants to make a computer or network resource inaccessible to users by disrupting the services of a host connected to the network. Denial of service is usually achieved by filling a resource with redundant requests to overload systems and prevent legitimate requests from being executed.
- - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
- - an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks.
27 Clues: - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies. • - is gaining unauthorized access to a computer system via another user's legitimate connection. • - attack in which a person or a program successfully identifies as another by falsifying a data. • ...
test BJC Unit 4 review 2022-02-18
Across
- A _________ is a small chunk of any kind of data (text, numbers, lists, etc.) and metadata (information about the data) that is passed through the Internet as a data stream.
- ____________ software is a kind of malware that records every key pressed by a user.
- ___________ is the process of encoding data to prevent unauthorized access.
- A binary sequence (also called a __________ ) is a string of ones and zeros.
- The __________ is a computer network that uses open protocols to standardize communication.
- ____________ (Transmission Control Protocol) lets your computer pretend it has a reliable connection to the other computer.
- switching means that the Internet sends short bursts of information, not long continuous strings.
- __________ key encryption uses a pair of keys: a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it.
- _________ science is scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
- ______________ is the general term for using the Internet to get a lot of people to help solve a problem. (Citizen science is a type of crowdsourcing.)
- A computing __________ can be physical (such as a self-driving car), non-physical software (such as picture editing software), or conceptual (such as the idea of e-commerce), but regardless of the form, they must include a program as an integral part of their function.
- IP (Internet _________ ) lets your computer pretend it has a direct connection to another computer. The routers at every connection point on the Internet run IP, which transmits packets from one IP address to another.
- ________________ notation uses powers of ten to represent very large or very small values. Floating point is the same idea but with powers of two.
- A ______ is a computer that passes information from one network to another.
- ____________ (secure sockets layer/transport layer security) is the standard used for cryptographically secured information transfer on the Internet.
Down
- ISPs (Internet Service________ ) are the companies who sell Internet access to homes and institutions.
- ___________ authorities are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications.
- A _____ is eight bits.
- A ______ is a single unit of data that can only have one of two values. We usually represent the two values as 0 (off) and 1 (on).
- ____________ is the process of decoding the data.
- __________ or anti-malware software is software designed to scan your files and Internet transmissions looking for malware.
- The word is an abbreviation for binary digit.
- ___________ is the maximum amount of data that can be sent in a fixed amount of time (for digital data, it is measured in bits per second).
- The World Wide _____ is a system of linked pages, programs, and files that uses the Internet.
- __________ is a common security attack in which the victim is tricked into giving up personal information or downloading malware.
- _________ is software that was designed to harm or take partial control over your computer.
- _________________ Compression algorithms (such as PNG) are reversible (there is no loss in quality); you can reconstruct the original data.
- A ________ (Distributed Denial of Service) attack uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service.
- ____________ ciphers are examples of symmetric encryption because they use the same key for both encryption and decryption.
- The digital ________ refers to unequal access to computers and the Internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors. The digital divide affects both individuals within a country and countries themselves.
- Storing data in the _________ means storing it somewhere on the Internet, but you don't know where. The cloud service provider (Google, Dropbox, Amazon, Snap!, etc.) manages the actual storage location.
- A ___________ is a security system that controls the kinds of connections that can be made between a computer or network and the outside world.
- _______________ Compression algorithms are not fully reversible; you can reconstruct only an approximation of the original data.
33 Clues: A _____ is eight bits. • The word is an abbreviation for binary digit. • ____________ is the process of decoding the data. • ___________ is the process of encoding data to prevent unauthorized access. • A ______ is a computer that passes information from one network to another. • A binary sequence (also called a __________ ) is a string of ones and zeros. • ...
Computer Terms 2013-01-04
Across
- a collection of similar data organized in file system for easy access. Instead of storing information in a file cabinet or a folder, you can store it digitally.
- file is a collection of data stored in one unit
- a short rangedradiontechogoly or wire less device that simply small enough to fit in someone ear.
- connector for a computer that can send and receive by a data
- short for web browser that is locate and retrieve
- a portable touch screen computer.
- instructions used perform a specific task with a computer
- small removable externally accessible circuit board
- any letter, number, space and punctuation are called what?
- small computer that literally fits in the palm of your hand.
- system unit refers to the computer itself but does not include the monitor.
- the web address you type in search bar on the internet to get to a website.
- a type of software for computer that give the user a display of a worksheet for financial plan, budgets, etc. it displays a group of cells that makes up a graph of rows and columns.
- computer memory that can be accessed randomly
- computer storage device any type of hardware that stores data.
- small compact portable computer
- the most import program that run a computer and take input from the thing such as keyboard.
- computing practice of regularly used computer data on multiple servers that can accessed through the internet.
- data storage device to transfer and carry data
- Google,yahoo, lycos, infoseek are what?
- compact disc re-writable it can be rewritable like a CD burner.
- mobile that offers more advanced computing ability.
- flexible plastic disk coated with magnetic material and covered by protective jacket used for storing data
- removable data storage medium that can be used with personal computer.
- save information on your computer or on drive from internet
- personal computer mostly used for regular use and a single location mainly its put on top of desks.
- computer data is information processed or stored by a computer
- pointing device that is used to move and select thing
- an electronic communication network that connects computer networks and organization computer facilities and around the world.
Down
- program used to direct the operation of a computer
- round plate on which data can be encoded.
- type of connection pcs that is used for mice and game controller
- operating system produced by Microsoft
- pictorial computer output produced on display screen, plotter, or printer.
- a public area with an available wireless signal for internet access.
- used to prevent find and remove malware
- copy files to a second media
- tablet computer that has touch screen and developed by apple
- file that connected to an email or other sites.
- button that turn your computer on is called what?
- A computer program that puts another program into a form acceptable to the computer.
- main circuit board of your computer is also known as the main board or logic board.
- to copy data from a temporary area to more permanent device
- describe disk space, or data storage space and system memory.
- a type of lettering you use on word document to type or read with.
- computer viruses are small programs or scripts that can be negatively health of computer.
- the equipment in side of a computer that creates the images on the computer screen.
- initial page of sight on the world web.
- widely used information system on the internet that provide facilities for the document.
- server that provides access to many source from separate location.
- small piece of data sent from a website and stored in user's web browser
- let you read book, play game and get on internet
- what stand for thin film transistor that used the screen and display pixels.
53 Clues: copy files to a second media • small compact portable computer • a portable touch screen computer. • operating system produced by Microsoft • used to prevent find and remove malware • initial page of sight on the world web. • Google,yahoo, lycos, infoseek are what? • round plate on which data can be encoded. • computer memory that can be accessed randomly • ...
Operating System 2017-04-16
Across
- client-side proxy for the actual procedure on the server
- a number included at start of message packet to differentiate network services on a host.
- The state of a process or a thread where it is waiting for a particular event that will not occur.
- Provide web access to internal systems.
- containing temporary data.
- This provides basic computing resources.
- A software-generated interrupt caused either by an error or a user request.
- defense of the system against internal and external attacks.
- The one program running at all times on the computer.
- If both send and receive are blocking, it is considered as _________.
- A variant of deadlock in which two or more processes continuously change their state in response to changes in the other process(es) without doing any useful work.
- containing memory dynamically allocated during run time.
- To keep track of which users use how much and what kinds of computer resources.
- A part of resource allocation sequence where processes place a request to the OS to grant one of the instances of a particular resource to the process.
- Acts as a conduit allowing two processes to communicate.
- is periodic sampling of instruction pointer to look for statistical trends.
- OS natively compiled for CPU, running guest OSes also natively compiled.
- This refers to finding and fixing errors, or bugs.
- If no parent waiting (did not invoke wait()) process is a ______.
- Message passing that is considered synchronous.
- It is logical extension in which CPU switches jobs so frequently that users can interact with each job while it is running, creating interactive computing.
- Acts as an intermediary between the user of a computer and the computer hardware (Acronym).
- Any mechanism for controlling access of processes or users to resources defined by the OS.
- Another type of an interrupt system where the computer already knows from what device the interrupt comes from.
- A memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory.
Down
- are used in UNIX systems to notify a process that a particular event has occurred.
- A program loaded into memory and executing is called a _______.
- It is used when source CPU type different from target type.
- It is stored within the computer hardware in read-only memory (ROM) or electrically erasable programmable read-only memory (EEPROM).
- represent files, programs, actions, etc.
- If processes don’t fit in memory, _________ moves them in and out to run.
- The smallest unit of processing that can be performed in an OS. It is a single sequence stream within in a process.
- block of available memory.
- A way of handling a deadlock where we take a resource from one process and give it to other.
- A memory-management scheme that supports user view of memory as it divides the computer's primary memory into segments or sections.
- An operating system operation where processes may exchange information, on the same computer or between computers over a network.
- implies a system can perform more than one task simultaneously
- Thread benefits that may allow continued execution if part of process is blocked, especially important for user interfaces
- is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another.
- A communication mechanism provided by scheduler activations from the kernel to the upcall handler in the thread library.
- program obtains information concerning the specific configuration of the hardware system.
- A process state where instructions are being executed.
- People,machines, other computers.
- A temporary volatile data storage(acronym).
- A Common bootstrap loader which allows selection of kernel from multiple disks, versions, kernel options.
- is defined as an endpoint for communication.
- A type of process in memory, running, but not on the display, and with limits.
- It is a signal from a device attached to a computer or from a program within the computer that requires the operating system to stop and figure out what to do next.
- copying information into faster storage system.
- Disk surface is logically divided into ______.
50 Clues: containing temporary data. • block of available memory. • People,machines, other computers. • Provide web access to internal systems. • represent files, programs, actions, etc. • This provides basic computing resources. • A temporary volatile data storage(acronym). • is defined as an endpoint for communication. • Disk surface is logically divided into ______. • ...
Emerging Technology Vocabulary 2025-02-10
Across
- a lightweight XML format designed for sharing headlines and other web content
- blogs or weblogs that are enriched by audio files
- pushes processing and data to the near edge of the network, which enables timely collection, processing, and analysis of data
- a blog that includes video.
- also known as Personal Response Systems. A device used by an audience to respond to an instructor's presentation delivered through wireless devices.
- collaborative and interactive tools that are strictly web-based and are typically free to the user.
- a small computer on a single metal-oxide-semiconductor integrated circuit chip.
Down
- a field of science whose goal is to control individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies.
- the possibility of computers being embedded into almost everything and potentially able to communicate.
- a set of technologies, such as high definition audio, video, and other interactive elements that enable people to feel or appear as if they were present in a location which they are not physically in.
- the provision of IT services on demand. Users pay for computing or storage resources on an as-needed basis, like the way one pays for utilities.
- provide access to software or services for free
- a website or Web 2.0 application that uses content from more than one source to create a new service.
- a decentralized and distributed network that is used to record transactions across connected devices as blocks of data that cannot be altered after being recorded
14 Clues: a blog that includes video. • provide access to software or services for free • blogs or weblogs that are enriched by audio files • a lightweight XML format designed for sharing headlines and other web content • a small computer on a single metal-oxide-semiconductor integrated circuit chip. • ...
emerging technology 2025-02-12
Across
- - the provision of IT services on demand. Users pay for computing or storage resources on an as-needed basis, like the way one pays for utilities.
- - also known as Personal Response Systems. A device used by an audience to respond to an instructor's presentation delivered through wireless devices.
- - a decentralized and distributed network that is used to record transactions across connected devices as blocks of data that cannot be altered after being recorded.
- - a small computer on a single metal-oxide-semiconductor integrated circuit chip.
- - pushes processing and data to the near edge of the network, which enables timely collection, processing, and analysis of data.
- - a blog that includes video.
- - a lightweight XML format designed for sharing headlines and other web content.
- – provide access to software or services for free.
Down
- - blogs or weblogs that are enriched by audio files.
- - the possibility of computers being embedded into almost everything and potentially able to communicate.
- - a set of technologies, such as high definition audio, video, and other interactive elements that enable people to feel or appear as if they were present in a location which they are not physically in.
- - collaborative and interactive tools that are strictly web-based and are typically free to the user.
- - a field of science whose goal is to control individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies.
- - a website or Web 2.0 application that uses content from more than one source to create a new service.
14 Clues: - a blog that includes video. • – provide access to software or services for free. • - blogs or weblogs that are enriched by audio files. • - a lightweight XML format designed for sharing headlines and other web content. • - a small computer on a single metal-oxide-semiconductor integrated circuit chip. • ...
Forging For Answers 2017-08-18
Across
- Outer portions of a vehicle (excluding the chassis) including, fiberglass, metal, etc. that form the outer shell of the vehicle.
- An anti-friction device that is located between two moving parts of an automobile that helps to minimize wear and friction.
- Mechanical device in manual transmission vehicles that disengages the power transmission from the drive shaft and allows the driver to switch gears.
- The springs, shocks and related parts between the wheels and the frame of the vehicle that support the frame and help to reduce shock and vibration from the road.
- The process where quality engineers or representatives review the policies and procedures of the automotive company to ensure they meet industry requirements and are maintaining records as required to remain certified in the industry.
- the twisting force that passes through the drive train of an automobile initiating motion.
Down
- A hollow, cylindrical, metal sleeve that helps to prevent abrasion for metal parts and works as a guide within the automobile for valve rods and other critical components.
- The combination of mechanical, computing and electronics when designing and developing a new vehicle.
- A method used to control inventory in automotive manufacturing factories that was developed by the Japanese and provides just in time inventory control.
- Structural components found within the body of the vehicle.
10 Clues: Structural components found within the body of the vehicle. • the twisting force that passes through the drive train of an automobile initiating motion. • The combination of mechanical, computing and electronics when designing and developing a new vehicle. • ...
Technologies for Teaching and Learning 2022-08-24
Across
- is a personal computer used by students and teachers in teaching and learning the lesson.
- it allows users to store files, synchronize files across devices, and share files.
- is the abbreviation for. Universal Serial Bus: a standard for connection sockets on computers and other electronic equipment.
- is an output device that projects an image onto a large surface, such as a white screen or wall.
- is a small hardware input device that controls the movement of the cursor on the computer screen and allows users to move and select files.
- is a mobile computing device that has a flat, rectangular form like that of a magazine or pad of paper, that is usually controlled by means of a touch screen.
- is a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium or over a loudspeaker.
Down
- is a free online tool from Google which allows users to create forms, surveys, and quizzes as well as to collaboratively edit and share the forms with other people
- is a video sharing service where users can watch, like, share, comment and upload their own videos.
- is a popular word-processing program by microsoft that is used mainly for creating documents, such as brochures, letters, learning activities, quizzes, tests, and students' homework assignments.
10 Clues: it allows users to store files, synchronize files across devices, and share files. • is a personal computer used by students and teachers in teaching and learning the lesson. • is an output device that projects an image onto a large surface, such as a white screen or wall. • ...
Technologies for Teaching and Learning 2022-08-24
Across
- is a personal computer used by students and teachers in teaching and learning the lesson.
- it allows users to store files, synchronize files across devices, and share files.
- is the abbreviation for. Universal Serial Bus: a standard for connection sockets on computers and other electronic equipment.
- is an output device that projects an image onto a large surface, such as a white screen or wall.
- is a small hardware input device that controls the movement of the cursor on the computer screen and allows users to move and select files.
- is a mobile computing device that has a flat, rectangular form like that of a magazine or pad of paper, that is usually controlled by means of a touch screen.
- is a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium or over a loudspeaker.
Down
- is a free online tool from Google which allows users to create forms, surveys, and quizzes as well as to collaboratively edit and share the forms with other people
- is a video sharing service where users can watch, like, share, comment and upload their own videos.
- is a popular word-processing program by microsoft that is used mainly for creating documents, such as brochures, letters, learning activities, quizzes, tests, and students' homework assignments.
10 Clues: it allows users to store files, synchronize files across devices, and share files. • is a personal computer used by students and teachers in teaching and learning the lesson. • is an output device that projects an image onto a large surface, such as a white screen or wall. • ...
Technologies for Teaching and Learning 2022-08-24
Across
- is a personal computer used by students and teachers in teaching and learning the lesson.
- it allows users to store files, synchronize files across devices, and share files.
- is the abbreviation for. Universal Serial Bus: a standard for connection sockets on computers and other electronic equipment.
- is an output device that projects an image onto a large surface, such as a white screen or wall.
- is a small hardware input device that controls the movement of the cursor on the computer screen and allows users to move and select files.
- is a mobile computing device that has a flat, rectangular form like that of a magazine or pad of paper, that is usually controlled by means of a touch screen.
- is a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium or over a loudspeaker.
Down
- is a free online tool from Google which allows users to create forms, surveys, and quizzes as well as to collaboratively edit and share the forms with other people
- is a video sharing service where users can watch, like, share, comment and upload their own videos.
- is a popular word-processing program by microsoft that is used mainly for creating documents, such as brochures, letters, learning activities, quizzes, tests, and students' homework assignments.
10 Clues: it allows users to store files, synchronize files across devices, and share files. • is a personal computer used by students and teachers in teaching and learning the lesson. • is an output device that projects an image onto a large surface, such as a white screen or wall. • ...
champ lexical 2024-09-22
Across
- l'ensemble des techniques permettant la conception et la réalisation de machines automatiques ou de robots.
- fait référence à de vastes ensembles de données complexes et massives qui dépassent la capacité des méthodes conventionnelles de traitement et de gestion de données.
- elles utilisent un système décentralisé pour enregistrer les transactions et émettre de nouvelles unités.
- désigne l'ensemble des nouvelles technologies dont l'objectif est d'améliorer l'accessibilité ou le fonctionnement des activités financières.
- représente une avancée majeure dans le domaine de la fabrication et de l'industrie, caractérisée par l'intégration de technologies numériques dans les processus de production.
- Ensemble des théories et des techniques développant des programmes informatiques complexes capables de simule certains traits de l'intelligence humaine
Down
- fait référence à la fourniture de services informatiques sur Internet, notamment le stockage, les bases de données, les logiciels et l'analytique.
- une base de données qui contient l'historique de tous les échanges effectués entre ses utilisateurs depuis sa création, sécurisée et distribuée
- fait référence à un réseau de dispositifs physiques (objets, véhicules, appareils, équipements, etc.) interconnectés et capables de collecter et d'échanger des données via Internet.
- Ensemble de réseaux mondiaux interconnectés qui permet à des ordinateurs et à des serveurs de communiquer efficacement au moyen d'un protocole de communication commun (IP).
10 Clues: elles utilisent un système décentralisé pour enregistrer les transactions et émettre de nouvelles unités. • l'ensemble des techniques permettant la conception et la réalisation de machines automatiques ou de robots. • ...
Genesis's Crossword Puzzle 2016-08-31
Across
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- A person who uses computers to gain unauthorized access to data.
- A general purpose computer programming language designed to produce programs that will run on any computer system.
- printing A process for making a physical object from a three-dimensional digital model, typically by laying down many successive thin layers of a material.
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- a networking device that forwards data packets between computer networks.
- a device for examining, reading, or monitoring something, in particular.
Down
- is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.
- using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- A unit of information equal to one billion (109) or, strictly, 230 bits.
- an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet.
- Bits per second
- As a measure of computer memory or storage, a kilobyte (KB or Kbyte*) is approximately a thousand bytes
- A telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
14 Clues: Bits per second • A person who uses computers to gain unauthorized access to data. • A unit of information equal to one billion (109) or, strictly, 230 bits. • a device for examining, reading, or monitoring something, in particular. • a networking device that forwards data packets between computer networks. • ...
Chapter 04: Part 04 2017-05-02
Across
- You have received an email that is directing you to a phony website that looks like the website for your mortgage company. What kind of message is this?
- You have created a specific named location on your hard disk to hold some songs you have purchased. What is the term for this location?
- Some what developers render their software useless if no payment is received after the trial period expires.
- While a computer is running, the operating system remains in what?
- A major advantage of using word processing software is that users easily can what they have written.
- Presentation software allows users to apply special what to the transition between slides.
- You have heard that it is possible to improve your computer's performance by storing all related files for a particular program together. What is the term for this?
- A program has been placed on your smartphone without your knowledge and it is collecting personal information about you. What kind of application is this
Down
- With web apps, you always access the latest what of the software.
- You are using a tool on your computer to organize a variety of files in folders. What is the term for this kind of tool?
- To use applications, a computer must be running a what system.
- Software developers typically cannot incorporate what in applications they intend to sell.
- A feature, called what, allows users to type words in a paragraph continually without pressing the ENTER key at the end of each line.
- Many users opt for electronic distribution of documents because it contributes to what computing.
14 Clues: To use applications, a computer must be running a what system. • With web apps, you always access the latest what of the software. • While a computer is running, the operating system remains in what? • Presentation software allows users to apply special what to the transition between slides. • ...
IT_Rokko 2023-12-04
Across
- - A step-by-step procedure or formula for solving a problem or accomplishing a task in computing.
- - The process of identifying and fixing errors, bugs, or defects in software code.Interface - The point of interaction between a user and a computer system, often involving a graphical user interface (GUI) or command-line interface.
- - The practice of protecting systems, networks, and programs from digital attacks, theft, or damage.
- - A set of rules defining how data is transmitted over a network, ensuring standardized communication between devices.
- - A set of interconnected computers or devices that share resources and information through various communication channels.
- - Instructions written in a programming language that a computer can interpret and execute to perform specific tasks.
- - A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- - An organized collection of data stored electronically, typically in tables, allowing for efficient retrieval and manipulation.
- - The process of converting information into a code to prevent unauthorized access, providing data security.
- (Application Programming Interface) - A set of rules and tools that allows different software applications to communicate with each other
- - Programs and applications that run on a computer, providing functionality and enabling specific tasks to be performed.
- - Physical components of a computer system, such as the central processing unit (CPU), memory, and storage devices.
- - A computer or system that manages network resources and provides services to other computers (clients) in the network.
- - Refers to remote servers accessed over the internet to store, manage, and process data, instead of using a local server or computer.
14 Clues: - A step-by-step procedure or formula for solving a problem or accomplishing a task in computing. • - The practice of protecting systems, networks, and programs from digital attacks, theft, or damage. • - The process of converting information into a code to prevent unauthorized access, providing data security. • ...
Week A30 Math Vocab 2017-05-22
Across
- the base of a system of numeration
- The digital root of a number is the single digit that results from the continuous summation of the digits of the number and the numbers resulting from each summation
- In mathematics, two things are called distinct if they are not equal
- Equation: Parametric equations are a set of equations that express a set of quantities as explicit functions of a number of independent variables, known as "parameters
- A -analog, also called a -extension or -generalization, is a mathematical expression parameterized by a quantity that generalizes a known expression and reduces to the known expression in the limit
- The octal numeral system, or oct for short, is the base-8 number system, and uses the digits 0 to 7
Down
- A matrix is a rectangular array of numbers or other mathematical objects for which operations such as addition and multiplication are defined
- In mathematics and computing, hexadecimal (also base 16, or hex) is a positional numeral system with a radix, or base, of 16
- Set: the set of all the solutions of an equation or condition
- a binary number is a number expressed in the binary numeral system or base-2 numeral system which represents numeric values using two different symbols: typically 0 (zero) and 1 (one)
10 Clues: the base of a system of numeration • Set: the set of all the solutions of an equation or condition • In mathematics, two things are called distinct if they are not equal • The octal numeral system, or oct for short, is the base-8 number system, and uses the digits 0 to 7 • ...
vocabulary crossword puzzle 2021-01-20
Across
- sometimes abbreviated as DL, D/L, or DLing, download is a term used to describe copying data from one computer to another, either over a network or modem
- was initially developed to aid in the progress of computing technology by linking academic computer centers
- referred to as a link and web link, a hyperlink is an icon, graphic, or text that links to ]=another file or object
- term address bar refers to the text field in a web browser that identifies the user's location on the web and allows them to access different websites
Down
- used to describe text that is written using the protocol of a particular language by a computer programmer
- Virus a computer virus is a malicious program, script, macro, or code designed to damage, steal personal information, modify data, send e-mail, display messages, or a combination of these actions.
- Engine a search engine is a software system that is designed to carry out web searches, which means to search the World Wide Web in a systematic way for particular information specified in a textual web search query.
- Browser programer to present and explore content on the world wide web
- is a form of URI and standardized naming convention for addressing documents accessible over the Internet and Intranet.
- Bar
10 Clues: Bar • Browser programer to present and explore content on the world wide web • used to describe text that is written using the protocol of a particular language by a computer programmer • referred to as a link and web link, a hyperlink is an icon, graphic, or text that links to ]=another file or object • ...
Platforms Crossword 2019-09-20
Across
- A widely used algorithm in network routing protocols, most notably IS-IS (Intermediate System to Intermediate System) and Open Shortest Path First (OSPF)
- A condition where a computer's virtual memory resources are overused, leading to a constant state of paging and page faults, inhibiting application-level processing
- A problem encountered in concurrent computing where a process is perpetually denied necessary resources to process its work.
Down
- A commonly used method of securely exchanging cryptographic keys over a public channel
- Address A unique identifier of each host and is associated with the NIC
- A variable or abstract data type used to control access to a common resource by multiple processes in a concurrent system such as a multitasking operating system.
- An endpoint of a two-way communication link between two programs running on the network.
- An algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit.
- A self-balancing tree data structure that maintains sorted data and allows searches, sequential access, insertions, and deletions in logarithmic time. This data structure is commonly used to maintain indexes in MySql
- A data structure in a Unix-style file system that describes a file-system object such as a file or a directory
10 Clues: Address A unique identifier of each host and is associated with the NIC • A commonly used method of securely exchanging cryptographic keys over a public channel • An endpoint of a two-way communication link between two programs running on the network. • ...
Types of Taxes 2024-02-22
Across
- An insurance product offered to people. An individual is paid a fixed sum of money each year, typically for the rest of their life. It can be used as a retirement strategy to get steady streams of money.
- Daily allowance, usually for travel, entertainment, employee compensation, or miscellaneous out of pocket expenses incurred while conducting a business transaction.
- An amount of money paid to persons to meet their expenses. It also refers to deductions made when computing income taxes to attain the taxable income
- This means the organisation established by the Treaty establishing The Common Market for Eastern and Southern Africa, 1994.
- This is the movement of goods imported from a foreign place through the territory of one or more of the Partner States, to a foreign destination.
Down
- .........duty is a tax levied on legal instruments such as cheques, receipts, military commissions, marriage licenses, land transactions and shares.
- A legal methodology used to lower the amount of tax liability.
- It is an exercise we conduct to obtain the value of your property, assets usually for purposes of calculating tax due.
- An examination of a tax return by tax authorities at the taxpayer's place of business.
9 Clues: A legal methodology used to lower the amount of tax liability. • An examination of a tax return by tax authorities at the taxpayer's place of business. • It is an exercise we conduct to obtain the value of your property, assets usually for purposes of calculating tax due. • ...
Internet of Things (IoT) 2025-03-23
Across
- is the systematic and pervasive use of automated processes, mathematical and statistical tools, data analysis, and advanced computer technology such AI and machine learning to provide information and insight.
- it means using technology to automate or remotely control various household functions. For example, the operation of lighting, heating, or entertainment devices.
- It is a phrase used to mean a massive volume of both structured and unstructured data that is so large it is difficult to process using traditional database and software techniques.
- it is the process of safeguarding important information from corruption, compromise, or loss.
- also called green computing, it is the study and use of computer resources in an efficient way. It tarts with manufacturers producing environmentally friendly products and extends to proper recycling habits.
Down
- is short for Internet Protocol and is an identifier for a computer or device on a TCP/IP network.
- It refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
- Reality: Abbreviated as AR, it is a type of virtual reality that aims to duplicate the world's environment in a computer.
- Any machine or component that attaches to a computer.
9 Clues: Any machine or component that attaches to a computer. • it is the process of safeguarding important information from corruption, compromise, or loss. • is short for Internet Protocol and is an identifier for a computer or device on a TCP/IP network. • ...
Computing Practice Tutorial Worksheet #3 2024-09-16
5 Clues: A person who builds websites • The language computers understand • Someone who analyzes data for a living • A job that involves protecting information • An important attribute for catching mistakes
U01 F Moral and ethical issues 2024-01-03
Across
- the initialization of the primary piece of legislation covering occupational health and safety in Great Britain. It sets out the general duties which: employers have towards employees and members of the public employees have to themselves and to each other certain self-employed have towards themselves and others
- (10,5,6) represents a group of conditions associated with the overuse of computer.
- focuses on how a disabled person accesses or benefits from a site, system or application, it is an important part of the designing your site and should be considered throughout the development process.
- thus describes the rules of conduct for respectful and appropriate communication on the internet.
Down
- (8,3) an act of parliament passed in 2010 legally protects people from discrimination in the workplace and in wider society
- (5,6) are factors that define how an individual may act and behave when using computing technology.
- (8,6,3) This 1990 Act was created to deal with the issue of accessing or modifying data without permission.
- (9,7,3,7,3) This 1988 Act protects the intellectual property of individuals and requires that permission of the owner of the intellectual property is sought before any use of it is made.
8 Clues: (10,5,6) represents a group of conditions associated with the overuse of computer. • thus describes the rules of conduct for respectful and appropriate communication on the internet. • (5,6) are factors that define how an individual may act and behave when using computing technology. • ...
Internet of Things (IoT) 2025-03-23
Across
- It refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
- Address: is short for Internet Protocol and is an identifier for a computer or device on a TCP/IP network.
- IT: also called green computing, it is the study and use of computer resources in an efficient way. It tarts with manufacturers producing environmentally friendly products and extends to proper recycling habits.
- Automation: it means using technology to automate or remotely control various household functions. For example, the operation of lighting, heating, or entertainment devices.
- Protection: it is the process of safeguarding important information from corruption, compromise, or loss.
Down
- Any machine or component that attaches to a computer.
- Data: It is a phrase used to mean a massive volume of both structured and unstructured data that is so large it is difficult to process using traditional database and software techniques.
- Reality: Abbreviated as AR, it is a type of virtual reality that aims to duplicate the world's environment in a computer.
- analytics: is the systematic and pervasive use of automated processes, mathematical and statistical tools, data analysis, and advanced computer technology such AI and machine learning to provide information and insight.
9 Clues: Any machine or component that attaches to a computer. • Protection: it is the process of safeguarding important information from corruption, compromise, or loss. • Address: is short for Internet Protocol and is an identifier for a computer or device on a TCP/IP network. • ...
Cloud Computing Assignmen 2022-03-30
Computing Key Words 2024-01-13
History of Computing Project - Steve Jobs | Review Activity 2022-12-07
Across
- The type of cancer Jobs was diagnosed with
- Apple's original company name
- Apple's portable MP3 player
- Apple's personal computer released in 1984
- The animation studio Jobs became CEO for
Down
- Apple's music-playing computer program
- Cofounded Apple with Jobs
- The original Apple computer
- Where Jobs worked at before Apple
- Apple's innovative device released in 2007
10 Clues: Cofounded Apple with Jobs • The original Apple computer • Apple's portable MP3 player • Apple's original company name • Where Jobs worked at before Apple • Apple's music-playing computer program • The animation studio Jobs became CEO for • The type of cancer Jobs was diagnosed with • Apple's innovative device released in 2007 • Apple's personal computer released in 1984
China’s Cloud Computing Firms Raise Concern for U.S. 2023-06-23
Across
- a sum of money granted by the state or a public body to help an industry or business keep the price of a commodity or service low
- communication over a distance by cable, telegraph, telephone, or broadcasting.
- something enormous, especially a large and powerful organization.
Down
- of considerable importance, size, or worth.
- the basic physical and organizational structures and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise.
- a person who makes statements on behalf of a group or individual
- global city and one of the world's leading centres for culture, diplomacy, politics, finance, business and economics, education, research, language in China
- the process or activity of running a business, organization, etc
- an organization or country engaged in commercial or economic competition with others
- a biological community of interacting organisms and their physical environment.
10 Clues: of considerable importance, size, or worth. • a person who makes statements on behalf of a group or individual • the process or activity of running a business, organization, etc • something enormous, especially a large and powerful organization. • communication over a distance by cable, telegraph, telephone, or broadcasting. • ...
China’s Cloud Computing Firms Raise Concern for U.S. 2023-06-23
Across
- a sum of money granted by the state or a public body to help an industry or business keep the price of a commodity or service low
- communication over a distance by cable, telegraph, telephone, or broadcasting.
- something enormous, especially a large and powerful organization.
Down
- of considerable importance, size, or worth.
- the basic physical and organizational structures and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise.
- a person who makes statements on behalf of a group or individual
- global city and one of the world's leading centres for culture, diplomacy, politics, finance, business and economics, education, research, language in China
- the process or activity of running a business, organization, etc
- an organization or country engaged in commercial or economic competition with others
- a biological community of interacting organisms and their physical environment.
10 Clues: of considerable importance, size, or worth. • a person who makes statements on behalf of a group or individual • the process or activity of running a business, organization, etc • something enormous, especially a large and powerful organization. • communication over a distance by cable, telegraph, telephone, or broadcasting. • ...
EHR Chapter 10 2022-02-16
Across
- patient ________ - A method of accessing portions of one’s own health information from the care provider’s or hospital’s electronic health record.
- ______ computing - The housing of data in a cloud environment, which is a commercially maintained site on the Internet.
- (hyphenated)or AI - The use of computer systems that are able to perform tasks that had typically required the use of human intelligence.
- Data exchange via high radio frequency.
- ________-_____Medicine or EBM - Diagnostic and treatment protocols that are based on proven research and documented best practices.
- Telephone that allows Internet browsing, audio, video, and camera functionality.
- Health information ________(HIM) -A profession that encompasses services in planning, collecting, aggregating, analyzing, and disseminating individual patient and aggregate clinical data
- Health Information _______ (HIE)- The movement or sharing of information between healthcare entities in a secure manner and in keeping with nationally recognized standards.
Down
- The use of technology to remotely monitor a patient’s vital signs and perform tests such as an EKG or to forward radiologic images.
- Associated with preventive care, telehealth is the use of audiovisual equipment through which the patient and the care provider or healthcare professional can connect remotely.
- A distributed database that is stored on multiple computers that may or may not be in the same location.
- (acronym)Personal digital assistant -A mobile device that is small enough to fit in one’s hand yet allows access to local area networks
- (acronym)Local area network-A network linking computers and related devices that are physically close to one another such as within a building.
- Interpretation of data being received in encrypted (scrambled) form.
14 Clues: Data exchange via high radio frequency. • Interpretation of data being received in encrypted (scrambled) form. • Telephone that allows Internet browsing, audio, video, and camera functionality. • A distributed database that is stored on multiple computers that may or may not be in the same location. • ...
Emerging Technology Vocab Crossword 2025-02-12
Across
- the provision of IT services on demand. Users pay for computing or storage resources on an as-needed basis, like the way one pays for utilities.
- provide access to software or services for free.
- also known as Personal Response Systems. A device used by an audience to respond to an instructor's presentation delivered through wireless devices.
- a lightweight XML format designed for sharing headlines and other web content.
- collaborative and interactive tools that are strictly web-based and are typically free to the user.
Down
- pushes processing and data to the near edge of the network, which enables timely collection, processing, and analysis of data.
- a small computer on a single metal-oxide-semiconductor integrated circuit chip.
- the possibility of computers being embedded into almost everything and potentially able to communicate.
- a blog that includes video.
- blogs or weblogs that are enriched by audio files.
- a decentralized and distributed network that is used to record transactions across connected devices as blocks of data that cannot be altered after being recorded.
- a set of technologies, such as high definition audio, video, and other interactive elements that enable people to feel or appear as if they were present in a location which they are not physically in.
- a website or Web 2.0 application that uses content from more than one source to create a new service.
- a field of science whose goal is to control individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies.
14 Clues: a blog that includes video. • provide access to software or services for free. • blogs or weblogs that are enriched by audio files. • a lightweight XML format designed for sharing headlines and other web content. • a small computer on a single metal-oxide-semiconductor integrated circuit chip. • ...
networking (designed by - X, the awesome!) 2016-01-03
Across
- a device that forwards packets between nodes based on the packet's destination node address (either hardware or protocol), typically with a buffer time longer than a repeater but shorter than the transmission time of the packet.
- Route where packets never reach their destination, but simply cycle repeatedly through a constant series of network nodes.
- An error condition that occurs when a process stores data in a location that it 1) has not properly allocated for that purpose or 2) has been allocated by another process.
- what comes out of the head/hair of Xiaoyu when she's designing this crossword.
Down
- precise clocking. Such signals have the same frequency, with individual characters encapsulated in control bits (called start bits and stop bits) that designate the beginning and end of each character.
- A group of memory locations set aside for temporary storage of data, especially frequently-used data or data needing high speed retrieval by the CPU.
- A method of formatting data by removing characters at the end of the data that do not conform to the format desired.
- 1. The arrangement of computing devices in a network. 2. A term describing such an arrangement.
- A minor adjustment
- The end point of a broadband network. All stations transmit toward the headend; the headend then transmits toward the destination station.
10 Clues: A minor adjustment • what comes out of the head/hair of Xiaoyu when she's designing this crossword. • 1. The arrangement of computing devices in a network. 2. A term describing such an arrangement. • A method of formatting data by removing characters at the end of the data that do not conform to the format desired. • ...
Round 2 : Hard 2024-10-20
Across
- Known for being the world's first central bank, it has guided Sweden’s economy for centuries, focusing on inflation control and financial resilience
- A cognitive bias where individuals prefer things to remain the same rather than change, often resisting new options even when they may offer better outcomes.
- Derived from the Latin "caput," meaning "head," historically used to signify resources that can generate further resources
- Promised as a breakthrough in affordable transportation, this compact innovation aimed to transform access to personal mobility but faced market hurdles-
Down
- A technology pioneer and philanthropist known for revolutionizing personal computing and later shifting focus to global health and education
- Once a titan of investment banking, its dramatic collapse epitomized the recklessness of the financial sector, precipitating a global economic downturn
- The apex authority in India that regulates food safety and hygiene by setting standards for food production and distribution.
- Window The fallacy that economic activity from repairing damage offsets the initial loss, overlooking the opportunity costs and net decline in wealth.
- A fallacy where selective evidence is presented to support a claim, often ignoring contrary data that could provide a fuller picture of a situation. It may remind you of a fruit.
- A gripping series exploring India’s massive stamp paper fraud, revealing the collusion of powerful figures in a web of deceit and manipulation
10 Clues: Derived from the Latin "caput," meaning "head," historically used to signify resources that can generate further resources • The apex authority in India that regulates food safety and hygiene by setting standards for food production and distribution. • ...
CAO CROSSWORD PUZZLE - EVOLUTION OF COMPUTING created by : group 11 2021-11-14
Across
- BONES which type of rods used for multiplication
- Indicate the first generation of computers
- The first computer of first generation
- Indicate the third generation of computers
- The first program controlled machine
- A handheld pointing device used for computers and laptops
- This is a computer operating program that helps the user interact with different things, created Microsoft, 1980s
Down
- Indicate the second generation of computers
- The first commercial computer
- Fourth generation used this technology
- A thing that allows the user to interact with the electronic
- First calculating machine
- A loom that uses punch cards
- This is is an integrated circuit that contains all the functions of a central processing unit of a computer
- The first calculator to be produced in any quantity
15 Clues: First calculating machine • A loom that uses punch cards • The first commercial computer • The first program controlled machine • Fourth generation used this technology • The first computer of first generation • Indicate the first generation of computers • Indicate the third generation of computers • Indicate the second generation of computers • ...
OPERATING SYSTEMS 2021-08-24
Across
- An element of a GUI which has various purposes. It typically shows which programs or applications are running on the device, as well as provide links or shortcuts to other programs or places, such as a start menu, notification area, and clock.
- A means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines)
- A family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others
- an interface that displays icons and symbols on desktop
- A set of computer software and specifications developed by Sun Microsystems that provides a system for developing application software and deploying it in a cross-platform computing environment
- Working on 2 or more application software
- A computer program that provides a user interface to manage files and folders
Down
- Your course professor
- _____ system interface between user and programs and the computer
- A computer operating system (OS) assembled under the model of free and open-source software development and distribution
- A replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date or to improve its characteristics
- A user interface for access to an operating system's services
- _________ programs are application programs that complete specialized tasks for computer management
- An operating system designed by Google that is based on the Linux kernel and uses the Google Chrome web browser as its principal user interface
14 Clues: Your course professor • Working on 2 or more application software • an interface that displays icons and symbols on desktop • A user interface for access to an operating system's services • _____ system interface between user and programs and the computer • A computer program that provides a user interface to manage files and folders • ...
Eviva 2025-02-12
Across
- _________ Concepts - Current examples, references and exercises allow students to be successful in understanding today’s role of Computer Information Technology.
- Intro To _____ Technology - This class offers basic technological communications concepts, designed to help you improve your ability to read technical material.
- AI Business Essentials: _______ - Learn how to use today’s revolutionary new technology to be more productive in the workplace.
- __________ Fundamentals - This eBook course provides you with the tools, techniques, and understanding you need to define and achieve your financial goals.
- _______ Contact Classes - Improve how you communicate with people and prepare to do your best on some of the Verizon secondary tests
Down
- Starting a ________ - This eBook course covers the fundamentals of business management with emphasis on how to manage, grow, and harvest one – the full business cycle.
- Touch ______ - This self-paced course leads users step-by-step to fluent error-free typing using all ten fingers.
- ________ and Saving - Teaching you the basic knowledge and skills necessary to manage your personal finances.
- ______ To The Home Technology - This course provides up-to-date information about a service known as FIOS which delivers voice, internet, and video services.
- MS ________ 2013 Basics - In this basics course, we’ll show you everything you need to know to start harnessing the power of the most powerful document creation tool on the planet.
10 Clues: ________ and Saving - Teaching you the basic knowledge and skills necessary to manage your personal finances. • Touch ______ - This self-paced course leads users step-by-step to fluent error-free typing using all ten fingers. • AI Business Essentials: _______ - Learn how to use today’s revolutionary new technology to be more productive in the workplace. • ...
Crossword Puzzle - ICT 2022-10-18
Across
- A group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.
- A set of rules for solving a problem in a finite number of steps.
- Ponsel besutan Tesla yang didesain oleh Senior Software Engineer terkemuka di Amerika Serikat Martin Hajek.
- Institut riset swasta yang berfokus pada perkembangan sains dan teknologi dan berlokasi di Cambridge, Amerika Serikat. Kampus ini berdiri pada tahun 1861 sebagai respon atas kemajuan teknologi dan industri di Amerika Serikat pada saat itu.
- GUI (pronounced gooey) stands for ______ User Interface.
Down
- A group of connected pages on the World Wide Web containing information on a particular subject.
- Cikal bakal perdagangan elektronik atau lebih sering disebut “e-commerce” yang didirikan pada tahun 1994 oleh Jeff Bezos.
- Perusahaan e-Commerce yang berdiri sejak tahun 1999 dan didirikan oleh seorang pebisnis berkebangsaan Tiongkok.
- A unique digital identifier that cannot be copied, substituted, or subdivided, that is recorded in a blockchain, and that is used to certify authenticity and ownership.
- A program that enters a computer usually without the knowledge of the operator. Some of these programs are mild and only cause messages to appear on the screen, but others are destructive and can wipe out the computer's memory or cause more severe damage.
10 Clues: GUI (pronounced gooey) stands for ______ User Interface. • A set of rules for solving a problem in a finite number of steps. • A group of connected pages on the World Wide Web containing information on a particular subject. • Ponsel besutan Tesla yang didesain oleh Senior Software Engineer terkemuka di Amerika Serikat Martin Hajek. • ...
Ai 2022-06-13
Across
- are the artificial agents acting in the real-world environment.
- is the ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans because they require human intelligence and discernment.
Down
- is an approach to computing based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic on which the modern
- is a computer program that uses artificial intelligence (AI) technologies to simulate the judgment and behavior of a human or an organization that has expert knowledge and experience in a particular field.
- a professor emeritus of computer science at Stanford, the man who coined the term "artificial intelligence
- a branch of artificial intelligence (AI) and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy.
- is a type of machine learning and artificial intelligence (AI) that imitates the way humans gain certain types of knowledge.
7 Clues: are the artificial agents acting in the real-world environment. • a professor emeritus of computer science at Stanford, the man who coined the term "artificial intelligence • is a type of machine learning and artificial intelligence (AI) that imitates the way humans gain certain types of knowledge. • ...
PC configuration 2023-12-06
Across
- The outer housing of a computer system, protecting its internal components and providing a physical structure.
- A device that enables computers to transmit data over communication lines, typically used for internet connectivity by converting digital signals to analog for transmission and vice versa.
- A key on a keyboard used for cursor movement or data input, often utilized to navigate between selectable items.
- In the context of a mouse, it refers to the sharp end of the pointer on the screen, indicating the position for interaction or selection.
- Capable of bending easily without breaking; adaptable or versatile in approach or use.
- A person or thing that comes after or takes the place of another; one who follows, especially in a position or title.
- Characterized by speed or quickness, suggesting a swift and accelerated pace.
Down
- The sequence in which one thing follows another, often used to describe the order or arrangement of events or objects.
- The quality of having a clear and well-defined visual or conceptual edge; often used in the context of image clarity or focus.
- The main circuit board in a computer that houses the central processing unit (CPU), memory, connectors for other hardware, and allows these components to communicate with each other.
- Having no legal or binding force; invalid. In computing, often used to denote a lack of value or absence of data.
11 Clues: Characterized by speed or quickness, suggesting a swift and accelerated pace. • Capable of bending easily without breaking; adaptable or versatile in approach or use. • The outer housing of a computer system, protecting its internal components and providing a physical structure. • ...
Quantum Mechanics Crossword Puzzle By Joy 2023-04-20
Across
- A mathematical entity that provides a probability distribution for the outcomes of each possible measurement on a system.
- A rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
- :An experiment cuts to the heart of the weirdness of quantum mechanics and displays characteristics of both classically defined waves and particles. Basically, waves that pass through two narrow, parallel slits will form an interference pattern on a screen.
- A particle that used quantum mechanics to describe the physical properties of nature.
- In the 1910s, physicist Niels Bohr tried to describe its internal structure using quantum mechanics.
- A phenomenon when subatomic particles interact with and influence themselves.
- A mathematical description of the quantum state of an isolated quantum system.
- The collection of theories that existed before the advent of quantum mechanics.
- The basic unit of information in a quantum computer.
- A counterintuitive phenomenon that explains how two subatomic particles can be intimately linked to each other even if separated by billions of light-years of space.
Down
- A quantum mechanical phenomenon in which an object such as an electron or atom passes through a potential energy barrier.
- A fundamental feature of quantum mechanics that usually cannot predict with certainty what will happen.
- A hypothetical gauge boson of a quantum theory of gravitation.
- An abstraction and generalization of the Hilbert space formulation of quantum mechanics due to von Neumann.
- is defined as an operator on the wave function in quantum mechanics.
- A method of encryption that uses the naturally occurring properties of quantum mechanics to secure and transmit data in a way that cannot be hacked.
- model: A model which no longer really works with our understanding of the quantum realm.
- Quantum mechanics suggests everything is made of it or packets of energy.
- An interpretation of Quantum Mechanics that asserts that the wave function is objectively real and that there is no wave function collapse.
19 Clues: The basic unit of information in a quantum computer. • A hypothetical gauge boson of a quantum theory of gravitation. • is defined as an operator on the wave function in quantum mechanics. • Quantum mechanics suggests everything is made of it or packets of energy. • A phenomenon when subatomic particles interact with and influence themselves. • ...
tech 2023-06-07
Across
- It is the most important processor in a given computer. Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output(I/O)operations.
- In computing, a bitmap is a mapping from some domain to bits.
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information
- a method of representing data in a visual
- The Graphics Interchange Format is a bitmap image format
- a form of computer memory that can be read and changed in any order, typically used to store working data and machine code
- High-Definition Multimedia Interface is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio
- A binary code represents text, computer processor instructions.
- is a digital multimedia container format most commonly used to store video and audio, but it can also be used to store other data such as subtitles and still imagesPDF
- a hardware or software that shares data so the future requests for that data can be served faster
- a mobile operating system primarily developed by google
- A method of transmitting and receiving messages using electronics
Down
- It is the protection of computer systems and networks from attack by malicious actors
- In the pursuit of knowledge, data is a collection of discrete values that convey information
- is a commonly used method of lossy compression for digital images
- a multinational technology company and second largest mobile phone manufacturer
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- a coding format for digital audio developed largely by the Fraunhofer Society in Germany
19 Clues: a method of representing data in a visual • a mobile operating system primarily developed by google • The Graphics Interchange Format is a bitmap image format • In computing, a bitmap is a mapping from some domain to bits. • A binary code represents text, computer processor instructions. • is a commonly used method of lossy compression for digital images • ...
Computer parts 2024-03-12
Across
- The component of a computer system that controls the interpretation and execution of instructions
- computer expansion card that generates a feed of graphics output to a display device such as a monitor
- any fan inside, or attached to, a computer case used for active cooling
- small device that a computer user pushes across a desk surface in order to point to a place on a display screen
- a device that converts sound waves into an electrical signal
- an electronic device with a screen used for display (as of television pictures or computer information)
- non-volatile computer storage device containing magnetic disks or platters rotating at high speeds
- a device which can be slotted into a computer to allow the use of audio components for multimedia applications.
- a video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
- a machine for printing text or pictures onto paper, especially one linked to a computer.
- a panel of keys that operate a computer
- a hardware component that enables a device, such as a computer or a smartphone, to connect to a wireless network
Down
- a mechanism used to connect peripheral devices to computers
- a device for examining, reading, or monitoring something.
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- an electrical device that supplies electric power to an electrical load.
- network adapters designed to support wired Ethernet connections
- Random access memory (RAM) is the hardware in a computing device that provides temporary storage for the operating system
- (read-only memory) is a non-volatile memory type. This means it receives data and permanently writes it on a chip, and it lasts even after you turn off your computer
19 Clues: a panel of keys that operate a computer • a device for examining, reading, or monitoring something. • a mechanism used to connect peripheral devices to computers • a device that converts sound waves into an electrical signal • network adapters designed to support wired Ethernet connections • any fan inside, or attached to, a computer case used for active cooling • ...
Chapter 3 2023-11-16
Across
- A small computer that combines a display and keyboard and is designed to be easily carried.
- A popular type of computer system that can be equipped with peripheral devices such as a monitor, keyboard, mouse, and speakers.
Down
- Device Small computing devices such as tablets and smart phones that are much more portable than desktops and laptops.
3 Clues: A small computer that combines a display and keyboard and is designed to be easily carried. • Device Small computing devices such as tablets and smart phones that are much more portable than desktops and laptops. • A popular type of computer system that can be equipped with peripheral devices such as a monitor, keyboard, mouse, and speakers.
Chapter 03: Computers and Mobile Devices Part 3 2016-11-21
Across
- your local supermarket there is a kiosk that allows you to rent your favorite movie on DVD. What is this called?
- which of the following items in your pocket uses NFC technology?
- you go to your local town utility in order to pay your gas bill,what would you use?
- you keep hearing a colleague of yours use a term and you are unfamiliar with it. Ultimately, however, you realize that it is a synonym for the term port. What is it?
- recent phots you captured are low in quality. What is one of the first things to check?
Down
- you are storing a new worksheet online for members of your project tean to be able to share access to it. What kind of computing is this?
- you see a kiosk in the lobby of your local hospictal. What is it?
- you have a collection of all the photos, videos, and audio you have captured from your new hephew. What is the name for this collection?
- you are looking for a general-purpose port to connect two devices together. Which of the following is your best bet?
- your bluetooth headset is waiting for another bluetooth device to locate its signal. What is this mode known as?
- You experienced a power increase that lasted for less than one thousandth of a second, what is the ter for this?
11 Clues: which of the following items in your pocket uses NFC technology? • you see a kiosk in the lobby of your local hospictal. What is it? • you go to your local town utility in order to pay your gas bill,what would you use? • recent phots you captured are low in quality. What is one of the first things to check? • ...
