computing Crossword Puzzles
Discovering Computer 2019-02-05
Across
- It is a personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table.
- It stores information in both a vertical and horizontal direction.
- the programs and other operating information used by a computer
- Case that contains the electronic components of the computer that are used to process data.
- It is the number of horizontal and vertical pixels in a display.
- It is any data and instructions entered into the memory of a computer.
- It produces text and graphics on a physical medium.
- It is a thin lighter-weight mobile computer that has a touch screen.
- It involves reducing the electricity consumed and environmental waste generated when using a computer.
- It is a computer application in society that uses scientific method.
- It is a disadvantage of using computer that affects the well-being of a person.
- It is a light sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.
Down
- it is also called earphones, that rest inside the ear canal.
- It is an input device that contains keys, users press to enter data and instructions into a computer.
- physical parts of a computer
- It is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneosly.
- It is a pointing device that fits under the palm of your hand comfortably.
- It is data that has been processed into a useful form.
- It is a computing device small enough to hold in your hand.
- It records and retrieves items to and from storage media.
- It controls access to the hardware, software, and other resources on a network.
- It can connect up to 127 different peripheral devices together with a single connector.
- It is the fastest, most powerful computer
- It is a self-service banking terminal that connects to a host computer through a network.
- It is an advantage of using computer that makes the work faster to be done.
25 Clues: physical parts of a computer • It is the fastest, most powerful computer • It produces text and graphics on a physical medium. • It is data that has been processed into a useful form. • It records and retrieves items to and from storage media. • It is a computing device small enough to hold in your hand. • it is also called earphones, that rest inside the ear canal. • ...
Chases Crossword. 2020-11-22
Across
- An instance of suddenly breaking away or off.
- relating to the origination of movement in conscious mental activity.
- the supposed ability to discover facts about an event or person by touching inanimate objects associated with them.
- an instrument designed for visual examination of the eardrum and the passage of the outer ear, typically having a light and a set of lenses.
- optical device for producing and observing a spectrum of light or radiation from any source, consisting essentially of a slit through which the radiation passes, a collimating lens, and an Amici prism.
- false cavity for animals
- instrument which can be introduced into the body to give a view of its internal parts.
- style of handwriting
- a form of psychotherapy in which patients act out events from their past.
- a room set apart for writing, especially one in a monastery where manuscripts were copied.
- An optical instrument designed to make distant objects appear nearer, containing an arrangement of lenses, or of curved mirrors and lenses, by which rays of light are collected and focused and the resulting image magnified.
Down
- false pregnancy.
- To destroy or subvert the honesty or integrity of, as by offering bribes
- the sacred writings of Christianity contained in the Bible.
- a person who falsely or mistakenly claims to be a scientist.
- having a psychological origin or cause rather than a physical one.
- an instrument with a fluorescent screen used for viewing X-ray images without taking and developing X-ray photographs.
- a condition characterized by the absence of empathy and the blunting of other affective states. Callousness, detachment and a lack of empathy enable
- optical instrument used for viewing very small objects, such as mineral samples or animal or plant cells, typically magnified several hundred times.
- A false, deceptive, or irregular form.
- To break through the gums in developing.
- To break the continuity
- (not comparable) (computing) That can be extended or automated through scripting.
- A break in friendly relations.
24 Clues: false pregnancy. • style of handwriting • To break the continuity • false cavity for animals • A break in friendly relations. • A false, deceptive, or irregular form. • To break through the gums in developing. • An instance of suddenly breaking away or off. • the sacred writings of Christianity contained in the Bible. • ...
Computer Science 2020-11-25
Across
- A phase in SDLC where feasibility study is conducted.
- The numbering system used in IPV6
- The text version of an IP address
- Provides high speed Internet connections through the fiber optic cable via a modem from central office to premises.
- As the number of users and devices being connected to the Internet increased, more addresses are required
- Provides high speed Internet connections using a dish shaped antenna on a building (house or business) to communicate with a tower location via radio signals.
- The correct or acceptable way of using the internet
- the generic top level domain for government agencies.
- A controlled, private network allowing third-party partners to gain information, typically about a specific company or institution, and do so without granting access to an organization's entire network
- the method that the Internet uses to store domain names and their corresponding IP addresses.
Down
- A private network contained within an enterprise that is used to securely share company information and computing resources among employees.
- A network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building.
- A type of network architecture that provides a centralized storage area for programs, data, and information.
- Generates object code, hence required more memory
- inexpensive network that typically connects fewer than 10 computers where each computer (peer) has equal sharing of hardware (such as printer), data, or information with other computer on network.
- Syafiq downloaded Harry Potter movies from the internet and then made DVD copies to sell them to his friends.
- A pathway(cables or waves) that carries the information from sender to receiver in a network.
- Provides high speed Internet connections through the cable television line via a cable modem.
- Provides high speed Internet connections using radio signals to computers and devices with built in Wi-Fi capability or a wireless modem.
- A coding scheme that is capable to represent almost all of the world's current language.
- a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions and individuals.
- A coding scheme that primarily used in IBM mainframe and high end server
22 Clues: The numbering system used in IPV6 • The text version of an IP address • Generates object code, hence required more memory • The correct or acceptable way of using the internet • A phase in SDLC where feasibility study is conducted. • the generic top level domain for government agencies. • A coding scheme that primarily used in IBM mainframe and high end server • ...
Ethical& Professional Issues 2020-12-19
Across
- ____________and ethical behavior in the workplace can benefit your career and improve your working environment
- In special aspects of professional ethics, we
- Individual is exposed to an innovation’s existence and gains some understanding of how it functions
- to follow good professional standards and _____________
- Allow electronic device to perform in multiple function
- Bring to social change when it is offered in context, with appropriate training, and with the intent of empowering the user
- Creation of information tailored to your preferences
- Seek reinforcement of an innovation-decision already made, or reverse the decision
- A professional has a responsibility to act _________.
- We are all users of technology. It is how we appropriate it that presents an impact either in good ways which is _______ impact.
- There are 3 area of implication which is positive implications, negative implication and ____________ implication
- _______ is a group of people (generally children born after 1980) that have grown up with easy access to digital information and communication technologies.
- What the member of IEEE do about bribery?
Down
- ACM member is expected to__________ understanding of computing and its consequence Public
- Some ethical issues are ________.
- “The ends justify the means”. That the quotes for ________ ethical views.
- Attitude or opinion of the innovation based upon perceived characteristics of the innovation
- Professional ethics includes ___________ with and responsibilities toward customers, clients, co-workers, employees, employers, others who use one’s products and services, and others whom they affect.
- In ethical views, _______ is emphasizes duty and absolute rules.
- We are all users of technology. It is how we appropriate it that presents an impact either in bad ways which is _______ impact.
- Many professions have a code of ______ that professionals are expected to abide.
- One of Ethical Behaviors Expected of the Computer Professional is ________ property right
- In ethical views, _______ is derived from the nature of humanity.
- One examples of professionalism and ethical behavior in the workplace is?
- Trading off the power and shift toward convenience
- ICT is advancing and ubiquitous
- In Guidelines and Professional Responsibilities, it require a convincing case of what?
27 Clues: ICT is advancing and ubiquitous • Some ethical issues are ________. • What the member of IEEE do about bribery? • In special aspects of professional ethics, we • Trading off the power and shift toward convenience • Creation of information tailored to your preferences • A professional has a responsibility to act _________. • ...
calculus 2023-01-23
Across
- function - A function f defined on some set X with real or complex values
- value - the non-negative value of x without regard to its sign
- rule - named after Gottfried Wilhelm Leibniz, generalizes the product rule
- rule - A formula used to find the derivatives of products of two or more functions
- minimum - the lowest value a function attains
- sum - a certain kind of approximation of an integral by a finite sum. It is named after nineteenth century German mathematician Bernhard Riemann
- - finds the area under a curve
- rule - a formula for computing the derivative of the composition of two or more functions
- - the mathematical study of continuous change
- velocity - The velocity of an object in motion at a specific point in time
- series - An infinite series whose terms alternate between positive and negative
- - a differentiable function F whose derivative is equal to the original function f
- integration - another method for integration by parts
Down
- rule - A formula for finding the derivative of a function that is the ratio of two functions
- function - A function of one real variable whose derivative exists at each point in its domain
- - If a function is not continuous at a point in its domain, one says that it has a _______ there
- value theorem - States that if a real-valued function f is continuous on the closed interval [a,b], then f must attain a maximum and a minimum, each at least once
- maximum - the highest value a function attains
- method - a numerical method to solve first order first degree differential equation with a given initial value
- - the counterpart to the chain rule for differentiation
- rule - rule used to take the derivatives of functions
- integral - the limit of a definite integral as an endpoint of the interval(s) of integration
- - equation which describes the slope of any function at a point
- point - point of a differentiable function of a real or complex variable is any value in its domain where its derivative is 0
- rule - uses derivatives to help evaluate limits involving indeterminate forms
- - The name for a function which is being integrated
- rate of change - The derivative of a function of a single variable at a chosen input value, when it exists, is the slope of the tangent line to the graph of the function at that point.
27 Clues: - finds the area under a curve • minimum - the lowest value a function attains • maximum - the highest value a function attains • - the mathematical study of continuous change • - The name for a function which is being integrated • rule - rule used to take the derivatives of functions • integration - another method for integration by parts • ...
Engineering Carrers 2023-02-21
Across
- Designer, use art and engineering to design products like bikes and computers to look cool
- study past eruptions to help determine the likelihood of a new eruption
- studies the composition, structure and processes of the Earth to learn about its past, present and future
- Scientist, help city planners develop and construct buildings and utilities that protect natural resources and use land in an efficient and good way
- studies water systems in the Earth's crust
- Surveyor, make precise measurements of the shape, contour and location of land
- study ocean plants, temperature, currents and tides, microbes and animals
- Engineer, designs solutions for environmental problems
- Scientist, use chemistry to redesign materials like metals, ceramics and rubber to help make life better
Down
- Scientist, carries out experiments to develop treatments for diseases
- use scientific techniques to identify toxins and assess the potential risks and harmful effects
- Engineer, studies sound and noise vibration
- Chemist, works in food production of plants and studies the ingredient lists in foods
- + Development Engineer, develop new products, redesign existing products and perform research and testing on product ideas
- + Mechanical Engineering, is involved in the design, construction, operation and use of industrial, agricultural and medical robots
- provide care for patients including administering medications, maintaining records and communicating with doctors
- Control Scientist, prepare and [test samples of a manufacturing process to determine if the substance meets the standards or requirements of the project
- Scientist, analyzes science data to solve problems and figure out how to make scientific data to understand
- Management, manage waste disposal, collection and recycling facilities
- manage public and private forested lands for business, recreational and conservation purposes
- Planner, make city plans for utilities
- Scientist, develops new products or solves computing problems
- Engineer, help increase the percentage of correctly made semiconductors
- Software Engineer, use Java programming language to create software for video games, phones and washing machines
- study animals and their interactions within their ecosystems and the impacts humans have on wildlife
- System Engineer, manage operations of a wind turbine farm, analyze efficiency of hydroelectric power systems or help produce innovative fuel-cell technology
26 Clues: Planner, make city plans for utilities • studies water systems in the Earth's crust • Engineer, studies sound and noise vibration • Engineer, designs solutions for environmental problems • Scientist, develops new products or solves computing problems • Scientist, carries out experiments to develop treatments for diseases • ...
Pt.2 of Network Vocabulary 2023-03-30
Across
- is a process of moving data packets from source to destination
- is a digital representation of anything in any form
- Processing Unit is a class of logic machines that execute computer programs
- is where you transmit a message to a single computer on a network
- Tolerance is an ability of a system to continue perform his functions when one or more of its components has failed
- a set of rules that controls connection, communication, and data transfer between two computing endpoints
- is an application or a device that performs services for connected client
- a device for connecting multiple twisted pair or fiber optic Ethernet devices together, making them act as a single network segment
- a set of communications protocols that implement the protocol stack on which the Internet runs
- Voice over Internet Protocol optimized for the transmission of Voice through the Internet
- is a unique address that certain electronic devices such as computers use in order to communicate with each other on a computer network
- Media Access Control address, also known as hardware address is a unique identifier attached to Network Interface Cards
- is a network protocol used in Internet and LAN connections
Down
- a layered, abstract description for communications and computer network protocol design
- is where you simultaneously transmit a message to a group of computers on a network
- is a device that retransmits a signal at a higher level or power
- Wide Area Network is a computer network that covers a broad area
- is a worldwide, public series of interconnected computer networks that transmit data using Internet Protocol
- Operating System is the software that manages the resources of a computer
- communications network tunnel through another network, dedicated for a specific network
- a device that controls data packets forwarding between different networks
- is an internetworking device used to help conserve the bandwidth on the network
- is a private computer network that uses Internet Protocol to securely share part of an organization's information or operations with its employees
- Local Area Network is a computer network covering a small geographic area
- Operating System is the software that manages the resources of a computer
- is a device that connects network segments
26 Clues: is a device that connects network segments • is a digital representation of anything in any form • is a network protocol used in Internet and LAN connections • is a process of moving data packets from source to destination • is a device that retransmits a signal at a higher level or power • Wide Area Network is a computer network that covers a broad area • ...
careers in technology 2023-05-05
Across
- description includes the entire process of defining requirements, visualizing and creating graphics including illustrations, logos, layouts and photos.
- quickly diagnose and solve computer issues for others
- Communicating with clients about layout and design. Creating a wide range of graphics and layouts for product illustrations, company logos, and websites with software such as photoshop. Reviewing final layouts and suggesting improvements when necessary.
- writes specifications for programs, application, and other software
- sets up databases to track company's information and maintains those operations
- allows multiple operating systems to simultaneously share a processor's resources in a safe and efficient way
- makes recommendations to organizations for the best systems to use
Down
- They're responsible for ensuring the efficiency of their company's network hardware and computer systems.
- provides assistance to others with setting up, running, or fixing technical systems
- specialize in technologically and scientifically advanced products. They use their technical skills to explain the benefits of their products or services to potential customers and to show how their products or services are better than their competitors'
- known as business technology analyst, is an information technology professional who specializes in analyzing, designing and implementing information systems
- responsible for protecting the computer networks of a company, organization, and government agency
- is the person in charge of data security for a company
- analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
- experts in establishing cloud-computing solutions for a company
- responsible for creating websites
- create games that users play on desktop computers, mobile platforms, or consoles.
- someone who makes value out of data. Such a person proactively fetches information from various sources and analyzes it for better understanding about how the business performs, and builds AI tools that automate certain processes within the company.
- writes, rewrites, maintains, and tests the software essential to key computer functions
- coordinates technology-related matters, planed upgrades of existing software or hardware, and negotiates with service provider
20 Clues: responsible for creating websites • quickly diagnose and solve computer issues for others • is the person in charge of data security for a company • experts in establishing cloud-computing solutions for a company • makes recommendations to organizations for the best systems to use • writes specifications for programs, application, and other software • ...
Information Technology 2023-05-24
Across
- a person who exploits computer hardware and software for their own purposes
- to modify or arrange something so that it works in a certain way
- to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
- a personal website maintained by an individual
- a computer virus that copies its code over and destroys the files of the original data
- a set of rules that must be followed for the sake of security
- a filter that prevents harmful software from entering a network
- a small application that is embedded in a webpage
- to make copies
- to make sure that it is legitimate
- a piece of code that is used to fix a flaw in a computer program
- any type of media used on a webpage, including images and videos
- the proces of stealing another person’s information and using it for personal gain
- how users communicate with a computer
- the use of the internet for software and other resources
- a collection of icons or pictures that have been organized in a file or page
Down
- changing computer to your needs
- a measurement of how quickly a computer works
- device that converts mechanical information into electronic signals
- the company that produces Macs and other computing products
- a software that keeps a computer safe from threats such as computer viruses and cyber crimes
- tricking people into giving information through email
- to work at a location away from a main office by using technology
- a word or phrase that makes a computer perform an operation
- a person who uses computers and the internet to commit crimes
- a filter that prevents harmful softaware from leaving a network
- a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
- using a legitimate-looking website to trick people
- a program that restricts access on a network
- an action that results in the loss of another person’s property
30 Clues: to make copies • changing computer to your needs • to make sure that it is legitimate • how users communicate with a computer • a program that restricts access on a network • a measurement of how quickly a computer works • a personal website maintained by an individual • a small application that is embedded in a webpage • using a legitimate-looking website to trick people • ...
30 Computer Vocab Terms 2014-08-22
Across
- Address / It provides the recipient with a means to determine how to respond to the sender of the message if needed.
- / an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed.
- Report / short reports that are prepared without binders or covers.
- Checker / in computing terms, is a program, or part of a program, that attempts to verify written text for grammatical correctness.
- / a note or record made for future use.
- Wrap / a feature that automatically moves a word that is too long to fit on a line to the beginning of the next line.
- / the action of showing something to be right or reasonable.
- / a printed heading on stationery stating a person's or organization's name and address.
- / the programs and other operating information used by a computer.
- / arrange or put into a format.
- Business Letter / is written from an individual to a company or organization.
- Checker / a computer program that checks the spelling of words in text.
- copy / a printed version on paper of data held in a computer.
Down
- Software / is computer software designed to operate and control the computer hardware.
- / the study of people's efficiency in their working environment.
- Notation / a special notation at the end of a letter that indicates copies of the letter were sent to the person's listed.
- Spacing / is the vertical distance between lines of text.
- / facts and statistics collected together for reference or analysis.
- / To enter information into a computer.
- Processing / the production, storage, and manipulation of text on a computer.
- Spacing / the type of spacing where you would manually press the enter key four times.
- Software / is a set of one or more programs designed to carry out operations for a specific application.
- technician / Serves customers by installing and servicing systems and products.
- keyboard / with the letters q, w, e, r, t, and y.
- page / a page at the beginning of a book giving its title.
- / the original draft of a diplomatic document.
- Letter / is usually a letter from one company to another.
- GWAM is short for Gross Words A Minute.
- Printer / printer linked to a computer, producing good-quality printed material.
29 Clues: / arrange or put into a format. • / To enter information into a computer. • / a note or record made for future use. • GWAM is short for Gross Words A Minute. • / the original draft of a diplomatic document. • keyboard / with the letters q, w, e, r, t, and y. • Spacing / is the vertical distance between lines of text. • ...
Computer Pioneers and Computer Terms Crossword Puzzle 2015-06-04
Across
- co-inventor of computer language basic.
- provided a formalisation of Algorithm and Computation
- one of the inventors of BASIC
- the standard markup language used to create web pages
- he created the idea of universal network
- reads and writes data on a hard disk
- has two unique digits from number system
- invented first general purpose electronic digital computer.
- a thin plate where electronic components are
- cofounder of mosaic, first widely used web-browser
- a electronic device made of semiconductor material
- A silicon chip that contains a CPU.
- a physical point in a raster image
- a small portable device that stores information
- an optical disk that stores large data
- program that enables computer to transmit data
- built the first program-controlled computing machines
- Helped define several widely used technologies
- a program that translates source code into object code
- takes advantage of the computers graphic capabilities
- computer on network that manages network resources.
- created first home video game console
- where most calculations take place
Down
- a binary term equal to 8 bits.
- founded Atari, inc
- a group of 2 or more computer systems linked together
- Created the first personal computers.
- Created first american electronic computer.
- family of general purpose, high level programming languages.
- invented the first commercially successful personal computer.
- A device that amplifies a signal
- a popular model of computer made by Apple.
- invented the world wide web
- Created first electronic digital computer
- Invented the Transistor
- one of the inventors of the microprosessor
- created the first graphical computer game OXO
- inventor of printed circuit board
- Invented First commercial ICs and commercialized them.
- code the trademark for a type of matrix barcode.
- Storage where a companys data is stored and accessible from multiple connected sources.
- devoped color pc monitor and gigahertz chip
- the generic term for all types if names and addresses that refers to objects on the web.
- the network that became the basis of the internet
44 Clues: founded Atari, inc • Invented the Transistor • invented the world wide web • one of the inventors of BASIC • a binary term equal to 8 bits. • A device that amplifies a signal • inventor of printed circuit board • a physical point in a raster image • where most calculations take place • A silicon chip that contains a CPU. • reads and writes data on a hard disk • ...
Computer Management and safe-guarding our data 2016-04-15
Across
- Name one Madware threat (5)
- A software that is specifically designed to install itself without the users knowledge to negativity affect or ‘harm ’a computer system (7)
- A collection of programs that are designed to infiltrate a computer and gain the highest levels of privileges(administrator rights) to take control of the infected computer (7)
- A form of malware that exploits weakness in an application or operating system in order to spread. (4)
- Checking for the correctness of data Data… (10)
- Checking for accuracy of data Data… (10)
- Creating a backup image of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure Disk… (7)
- Hardware or software that monitors the traffic between a computer and the interne t, to safeguard against beaches in security (7)
- Name one category of threats to data (11)
- Backup schedule whereby backups are made only of new files and files that have changed since the last backup. Resulting in greater backup efficiency (11)
- Morden computing makes it easy to ‘crack’ passwords. There is a simple way of scrambling data or text into a new format using a set of rules, name it (9)
Down
- This is a form of malware. It can cause relatively minor, annoying problems such as redirecting you to websites you don’t intend going to. (7)
- Name another word for ‘fishing for information’ (8)
- A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry Defensive… (11)
- A form of malware disguised as a useful program, but in reality designed to do harm (6)
- This acts as a barrier between your computer and the internet (9)
- Security based on measurement and identification of unique physical characteristics of a person (17)
- The quality of computer is often summarised by the ‘Garbage In, Garbage Out’. Fill in the acronym for this principle (4)
- Uninterruptible Power Supply (3)
- Redundant Array of Inexpensive/ Independent Disks (4)
20 Clues: Name one Madware threat (5) • Uninterruptible Power Supply (3) • Checking for accuracy of data Data… (10) • Name one category of threats to data (11) • Checking for the correctness of data Data… (10) • Name another word for ‘fishing for information’ (8) • Redundant Array of Inexpensive/ Independent Disks (4) • ...
Get to Know the CAS Tutors - Fall 2017 2017-09-27
Across
- Calvin's favorite animal is the ______ Bear.
- Rodney knows how to play this instrument.
- Jordan studied and can speak this language.
- This tutor can't stand slow walkers.
- If Iciar could close her eyes and be anywhere on earth when they opened, she'd would love to see the sun rising in the middle of ________.
- Laura shares the same birthday as Mark Mothersbaugh, a member of Devo and the writer of this 90's Nickelodeon tv show.
- Ashley's favorite movie is Love and ___________.
- Marie has always wanted to learn how to play the __________.
- ______ would like to run a company one day.
- If ___________ could receive any one item for free, he'd like a Yeti SC5 Mountain Bike.
- _______ wants to be a professional sleeper.
- Michael says that this is his favorite book genre.
- This tutor has always wanted to learn how to do magic tricks.
- This tutor won Best _______ '07.
- This tutor's noteworthy accomplishment is to be the first person out of the spelling bee.
- This tutor was in a news segment in Japan.
- Deanna's favorite food is _____ cakes.
Down
- Darnell's favorite food is ________.
- _______ has presented on nanotoxicology research at the Morehouse School of Medicine Research symposium.
- Austin's favorite animal is a ___________.
- Carolina can speak Spanish and _________.
- This tutor won the "Best student in 8th grade" award.
- This tutor presented at the Association of Computing Machinery Conference in Gatlinburg, TN.
- Better clean up your car before you give __________ a ride anywhere. Her biggest pet peeve is for things to be out of place.
- Born in New York, _____________ was raised in Venezuela.
- Nia has always wanted to know how to _____ a motorcycle.
- __________ wants to be an epidemiologist when she grows up.
- This tutor is quite musical; writing & recording his own songs.
- This tutor was the commencement speaker for their graduating class.
- Manny has always wanted to learn how to ___________ with a squirrel suit.
- Michele has a poorly made birthday video with this friendly dinosaur.
- ________'s biggest pet peeve is when people touch her things without asking.
32 Clues: This tutor won Best _______ '07. • Darnell's favorite food is ________. • This tutor can't stand slow walkers. • Deanna's favorite food is _____ cakes. • Carolina can speak Spanish and _________. • Rodney knows how to play this instrument. • Austin's favorite animal is a ___________. • This tutor was in a news segment in Japan. • ...
About PCs 2017-11-22
Across
- a collection of numbers represented as bytes
- a hardware device that keeps the overall computer or a computer device cool
- a software utility or hardware device that acts as a filter for data entering or leaving a network or computer
- a computer case which arranges the internal components vertically
- drive a non-volatile memory hardware device that permanently stores and retrieves data on a computer
- the hole into which a card is placed
- a component that allocates power and allows communication to the CPU, RAM, and all other computer hardware components
- a hole or connection found on the front or back of a computer
- a term used to describe a computer chassis
- a software program to present and explore content on the World Wide Web.
- a group of files that enable one or more hardware devices to communicate with the computer's operating system
- a tool designed to remove the protective covering (jacket) off of a cable to expose the inner wires
- a component that handles all instructions it receives from hardware and software running on the computer
- a mobile computing device designed to be held in one or two hands
Down
- any hardware capable of holding information either temporarily or permanently
- a term used to describe all data communications on a computer or computer network at a given point
- a special type of file on your computer's file system
- the total maximum transfer rate of a network cable or device
- to transmit it to many receivers
- an output device that displays video images and text
- a tool used to insert and remove a screw from a hole
- a single button on the keyboard
- a hardware device designed to receive, analyze and move incoming packets to another network
- any physical component of a computer system
- the ability to operate a device without any wires
- a segment of data sent from one computer or device to another over a network
- the most basic networking device that connects multiple computers or other network devices together
27 Clues: a single button on the keyboard • to transmit it to many receivers • the hole into which a card is placed • a term used to describe a computer chassis • any physical component of a computer system • a collection of numbers represented as bytes • the ability to operate a device without any wires • an output device that displays video images and text • ...
Herramientas 2018-10-23
Across
- Computational process to discover patterns in large important data sets.
- reference to that which is related or belongs to the hours.
- linguistic science that studies the meaning of words and expressions.
- configuration of the elements that make up a whole.
- the physical and functional connection established between two devices, devices or systems.
- have their origin in the investigation of the mathematical logic.
- This word in its etymology comes from the transitive and pronominal verb declare.
- Work that has been entrusted to a person and must be done in a given time
- applies to arrive at a conclusion based on existing evidence.
- screen that allows observing the parameters of a patient connected to a medical device.
- set of techniques or methods to solve a problem.
- act or effect of knowing. It is the ability of man to understand by means of reason.
- set of elements related to each other
Down
- apparatus created to take advantage of, regulate or direct the action of a force.
- Faculty of the mind that allows to learn, understand, reason, make decisions and form a certain idea of reality.
- formal science that studies the structure or forms of human thought
- governs, directs, commands or administers with authority to someone and also in a country, community or department.
- Technological system based on engineering and computing, which provides an optimization of production processes through automatic regulation.
- process that is used to devise and order the actions that will be carried out in the framework of a project
- depends on one or more conditions or requiriments
- Process method in which the user can create a file where to list the commands that the operating system must execute sequentially.
- set or chain of phenomena, associated with the human being or nature
- person Who is very skilled or has great experience in a job or activity.
- the faculty of the brain to retain and remember events of the past.
- dexterity that a person has to exercise certain activity.
25 Clues: set of elements related to each other • set of techniques or methods to solve a problem. • depends on one or more conditions or requiriments • configuration of the elements that make up a whole. • dexterity that a person has to exercise certain activity. • reference to that which is related or belongs to the hours. • ...
Tia's crossword 2018-11-02
Across
- Multiplying the number on the outside of the parenthesis by the values on the inside
- Branch that writes the laws
- Terms that have the same variable and the same exact exponent
- The main character
- Moral
- Fusion Hydrogen and Helium fusing
- On the periodic table of elements this represents "He"
- A measure of how bright a star would be if the star were at a standard distance
- An equation stating two things are equal
- Number before the variable
- 6 trillion miles, the distance light travels in one year
- First 10 amendments
- Space and all the matter in it
- he,she,it
- Character Against the main one
- Most intense part
- Giant Third stage of a medium mass star
- Document that stated America's independence from England
- Symbols that represent unknown values
- The distance between the crest of one wave to the next
- On the periodic table of elements this represents the letter "H"
- Earth's satellite
- First section of the Declaration
- Variation y=kx
Down
- Spherical bodies like Earth, Mars, or Jupiter
- Light you can see
- Equation with more than one step
- Force that pulls objects towards each other
- Consists of sum and or products of numbers and variables
- seperates legislative, executive, and judicial
- The answer
- A cloud of interstellar dust
- The result of a multiplication problem
- Branch that puts laws into effect
- Passes through the origin
- To approve
- The process of computing numbers
- Exposition, Rising action, Climax,Falling action, resolution
- Collection of stars, dust, and gas bound together by gravity
- supported new government
- Follows a linking verb and it renames or identifies the subject
- Introduction of a story
- Receives the action of the verb
- The leader of the continental army
- answers the question to whom? For whom? Or to what? For what?
- The sun is this
- Giving hints for future events
- Ax+By=C
- The actual brightness of the star
- Another word for verb
- An instrument that collects and focuses light
- Branch that enforces the laws
52 Clues: Moral • Ax+By=C • he,she,it • The answer • To approve • Variation y=kx • The sun is this • Light you can see • Most intense part • Earth's satellite • The main character • First 10 amendments • Another word for verb • Introduction of a story • supported new government • Passes through the origin • Number before the variable • Branch that writes the laws • A cloud of interstellar dust • ...
Computer Terms 2023-09-06
Across
- a visible and moving pointer that the user controls with a mouse, touchpad or similar input device such as a trackball
- This suffix is added to the end of a file name, indicating its format
- a set of options presented to the user of a computer application to help them find information or execute a function
- load an operating system (OS) into the computer's main memory or RAM.
- a link that points to a computer program.
- an electronic copy or hard copy of reference material for a product
- an image on the computer screen that represents an application, a capability, or some other
- press a computer mouse button twice in quick succession to select a file, program, or function
- the access point for programs displayed on the desktop, even if the program is minimized.
- a modifier key which, when pressed in conjunction with another key, performs a special operation
- a computer program that can capture, display and manipulate data arranged in rows and columns.
Down
- pressing the left (or sometimes right) mouse button to highlight it, and while keeping the button depressed, moving the selected item across the screen.
- a software program that helps create a slideshow that addresses a topic.
- a separate viewing area on a computer display screen in a system that allows multiple viewing areas as part of a graphical user interface
- To copy the document, record, or image being worked on to a storage medium
- the act of pressing a computer mouse button once without moving the mouse.
- interaction technique or widget in which continuous text, pictures, or any other content can be scrolled in a predetermined direction (up, down, left, or right) on a computer display, window, or viewport so that all of the content can be viewed
- he virtual location for applications, documents, data or other sub-folders
- a resource for recording data on a computer storage device
- a personal computing device designed to fit on top of a typical office desk
20 Clues: a link that points to a computer program. • a resource for recording data on a computer storage device • an electronic copy or hard copy of reference material for a product • This suffix is added to the end of a file name, indicating its format • load an operating system (OS) into the computer's main memory or RAM. • ...
RU ITEC411 - Intellectual Property 2023-10-16
Across
- A digital storage and computing environment accessed via the internet, offering scalable resources and services.
- Company that acquires and licenses patents for legal action, often criticized for hindering innovation.
- a legal case, _____ v. Arriba Soft, dealing with copyright infringement and the display of thumbnail images in search engine results.
- a legal case, _____ v. Google, involving trademark infringement and the use of a trademark as a search keyword.
- Legal protection for a unique name, symbol, or design used to identify and distinguish goods or services.
- A creation based on, inspired by, or derived from an existing work, which may require permission.
- Content in electronic format, such as text, images, audio, and video, distributed and accessed through digital technology.
- Non-volatile storage in computers and devices that contains data or programs, typically inaccessible for modification by users.
- passed in 1790. Initially covered books, maps, and charts for 14 years. Later expanded to include photography, sound recordings, and movies. Unauthorized copy defined in 1909 as visually readable form.
- Registering, trafficking, or using a domain name confusingly similar to a trademark with bad faith intent.
- Confidential business information providing an economic advantage, protected by law and not publicly disclosed
- A licensing system allowing creators to specify the permissions for their works, such as sharing, modifying, and commercial use.
Down
- Works not protected by intellectual property rights, free for use by anyone for any purpose.
- Approach ensuring open source software remains open by requiring derived works to follow the same terms.
- Legal rights protecting creations of the mind, including patents, copyrights, trademarks, and trade secrets.
- Violation of intellectual property rights, such as copyright or patent, without the owner's permission.
- Technology restricting the use and distribution of digital content to prevent piracy.
- Contract defining how software can be used, often requiring user acceptance.
- Compensation paid to copyright holders for the use of their work, typically in music, books, and art.
- Legal doctrine permitting limited use of copyrighted material without permission for purposes like criticism or education.
20 Clues: Contract defining how software can be used, often requiring user acceptance. • Technology restricting the use and distribution of digital content to prevent piracy. • Works not protected by intellectual property rights, free for use by anyone for any purpose. • A creation based on, inspired by, or derived from an existing work, which may require permission. • ...
All Vocab 1 Terms 2023-09-21
Across
- a clickable area at the top of a window that shows another page or area
- sends the cursor to the beginning of the next line or executes a command or operation
- a computer file containing information input by a computer user and usually created with an application
- a worldwide system of computer networks
- highlighting text or picking an object
- a collection of Web pages (files) coded in HTML that are linked to each other and to pages on other sites
- a list of choices that appears on a computer screen when a person clicks on the menu's title
- information that has been translated into a form that is efficient for movement or processing
- a Windows command line command that enables a user to start a separate window in Windows
- is a unique identifier used to locate a resource on the Internet
- the position indicator on a computer display screen where a user can enter text
- the indication that a particular block of text or object(s) have been selected with the mouse or keyboard
- a set of options presented to the user of a computer application to help them find information
Down
- a display unit of information equivalent to one alphabetic letter or symbol
- a computer program that can capture, display and manipulate data arranged in rows and columns
- a resource for recording data on a computer storage device
- a separate viewing area on a computer display screen in a system that allows multiple viewing areas as part of a graphical user interface
- interconnected computing devices that can exchange data and share resources with each other
- a collection of words or letters that are understandable by the reader
- a hypertext document on the World Wide Web
- to modify (a computer file) by, for example, deleting, inserting, moving, or copying text
- the act of moving text from right to left or up and down on a screen in order to view text that cannot be contained within a single display image
- a sequence or set of instructions in a programming language for a computer to execute
- a clickable area at the top of a window that shows another page or area
24 Clues: highlighting text or picking an object • a worldwide system of computer networks • a hypertext document on the World Wide Web • a resource for recording data on a computer storage device • is a unique identifier used to locate a resource on the Internet • a collection of words or letters that are understandable by the reader • ...
COMPUTER TERMINOLOGY 2024-04-04
Across
- The speed at which a modem transfers data.
- computer systems and algorithms that perform tasks, process data, and create content that would normally require human intelligence.
- A data path that transfers information within a computer or between computers.
- A domain is the location of a given website.
- The practice of protecting computer and network systems, data, and other digital assets from misuse, damage, disruption, and unauthorized access.
- The standard practices used to upload, download, and manage files between computer networks.
- Equals a billion bytes
Down
- A method of storing data across remote servers instead of on a local computer.
- A program that allows you to look at web sites.
- A location in cyberspace
- An organized collection of structured information, or data, typically stored electronically in a computer system
- A deliberate attempt to compromise data and resources or disrupt systems, networks, and devices, usually for personal or financial gain.
- A special place for chatting about a certain subject.
- Information that has been formatted so that it can be understood by computer.
- A firewall is a security device that monitors network traffic and prevents unauthorized access.
- Unreasonably criticizing someone in cyberspace
- A storage location that gathers temporary data to help websites load faster.
- The smallest unit of information that can be sent among computers. A 0 or a 1.
- This is an acronym for graphics interchange format, which is an animated image file.
- Getting information from the Internet to your computer. It will be stored on your computer for retrieval whenever you want.
- When your email cannot get to where you tried to send it, it bounces back to your computer.
- The process of converting data into a coded or unreadable form to protect it from unauthorized access or interception.
- A number system that uses ones and zeros to create a language that helps computers execute commands.
- A unit of information – (equal to eight bits) represents a letter or a number.
24 Clues: Equals a billion bytes • A location in cyberspace • The speed at which a modem transfers data. • A domain is the location of a given website. • Unreasonably criticizing someone in cyberspace • A program that allows you to look at web sites. • A special place for chatting about a certain subject. • ...
Cybersecurity Awareness Month Crossword 2023-09-27
Across
- A process or measure used to verify a user's identity.
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
- Software that compromises the operation of a system by performing an unauthorized function or process.
- Converting Data into a form that cannot be easily understood by unauthorized people.
- A flaw or weakness in an information system that could be exploited.
- A string of characters used to authenticate an identity.
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- A mechanism for creating a secure connection between a computing device and a computer network
- A type of malware that denies a user's access to a system or data until a sum of money is paid.
- A collection of computers compromised by malicious code and controlled across a network.
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
Down
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
- The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- Software designed to block malware from entering protected networks.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- Part of the Internet that isn't indexed by search engines.
- An unauthorized user who attempts to or gains access to an information system.
- an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Computer programs that can block, detect, and remove viruses and other malware.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- A cybersecurity risk that originates from within an organization.
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- Unsolicited emails sent to many addresses.
24 Clues: Unsolicited emails sent to many addresses. • A process or measure used to verify a user's identity. • A string of characters used to authenticate an identity. • Part of the Internet that isn't indexed by search engines. • A cybersecurity risk that originates from within an organization. • Software designed to block malware from entering protected networks. • ...
LT 7 CROSSWORD PUZZLE 2024-04-07
Across
- Secure encoding of information.
- , System managing customer relationships.
- Framework for decision-making and accountability.
- Framework for analyzing industry competitiveness.
- Delivery of computing services over the internet.
- Process of setting long-term goals and determining actions to achieve them.
- Interface allowing interaction between software applications.
- Legal protection for inventions.
- Collaboration between development and operations teams.
- Hardware, software, and networking components supporting IT services.
- Visual system for managing work.
- Assessment of strengths, weaknesses, opportunities, and threats.
- Process of creating software applications.
- Step-by-step procedure for solving problems.
- Protection of digital systems from threats.
- Rules governing internal affairs of an organization.
- Examination of data to derive insights.
- Individual or group with interest in a project or organization.
- Identification and mitigation of potential threats.
- Integrated software managing business processes.
- Declaration of organization's purpose and goals.
- Processes ensuring product quality.
- Launching software for use.
- Dividing a market into distinct groups based on characteristics.
Down
- Management of changes to software code.
- Structured collection of data.
- Plan describing how a business generates revenue.
- Adoption of digital technologies to transform business processes.
- Unique strengths that differentiate a business from competitors.
- Sequence of activities adding value to a product or service.
- Framework for IT decision-making and accountability.
- Design and structure of IT systems.
- Adherence to laws and regulations.
- Individual responsible for ensuring regulatory compliance.
- User-facing part of a software application.
- Server-side of a software application.
- Creations of the mind, such as inventions or artistic works.
- Iterative and incremental agile framework.
- Design of user interfaces for optimal user experience.
- Description of software feature from user's perspective.
- Symbol or sign representing a brand.
- Governing body overseeing company operations.
- Plan aligning IT with business objectives.
- Flexible approach to project management.
- Analysis of business data for decision-making.
- Relating to a company or corporation.
- Series of steps to achieve a business objective.
- Principles guiding agile software development.
- Owner of shares in a corporation.
49 Clues: Launching software for use. • Structured collection of data. • Secure encoding of information. • Legal protection for inventions. • Visual system for managing work. • Owner of shares in a corporation. • Adherence to laws and regulations. • Design and structure of IT systems. • Processes ensuring product quality. • Symbol or sign representing a brand. • ...
Computer Components 2025-03-28
Across
- An input device that allows you to type letters, numbers, and symbols into your computer or other electronic device.
- Drive A physical data storage device that stores digital information.
- Allows devices to communicate with each other without cables or wires.
- Cache A chip-based computer component that makes retrieving data from the computer's memory more efficient.
- The primary component of a computer that acts as its “control center.”
- Drive A semiconductor-based storage device, which typically uses NAND flash memory to save persistent data.
- Devices An external device that connects to a computer to expand its capabilities.
- A device that prints documents and images onto paper or other materials.
- A small mobile manual device that controls movement of the cursor and selection of functions on a computer display.
- (Random Access Memory) Random access memory (RAM) is the hardware in a computing device that provides temporary storage for the operating system (OS), software programs and any other data in current use so they're quickly available to the device's processor.
Down
- Memory) A type of computer memory that can only be read from, not written to.
- A device that allows computers, smartphones, tablets, and other devices to connect to the internet.
- A piece of output gear that connects to a computer to produce sound, and as a result, we can listen to the sound like an outcome.
- An electronic device with a screen used for display (as of television pictures or computer information)
- A device that connects two or more packet-switched networks or subnetworks.
- The main printed circuit board (PCB) in a computer
- A device that allows you to digitize physical documents, images, or even objects, and convert them into a digital format that can be viewed, edited, and stored on a computer.
- Processing Unit) A specialized processor originally designed to accelerate graphics rendering.
- memory A long-life and non-volatile storage chip that is widely used in embedded systems.
- Supply Unit A hardware device that converts AC electricity into DC electricity and then distributes it to the rest of the computer.
20 Clues: The main printed circuit board (PCB) in a computer • Allows devices to communicate with each other without cables or wires. • The primary component of a computer that acts as its “control center.” • Drive A physical data storage device that stores digital information. • A device that prints documents and images onto paper or other materials. • ...
Avi's Inferno 2024-12-30
Across
- Quantum equivalent to a bit
- Tower of _____, object of mathematical interest and child's toy
- Two mobius strips, glued together and cut in half, will give you a pair of these
- Extremely fast hedgehog
- A vital part of particle theory's Higgs Field that took 50 years to find.
- The computing era that we're currently in
- Shape that blips into existence in 4D, then its line (EG: Square, Cube, 4D Cube...) is gone.
- Avogrado's number
- Minervalternative
- Yoshi's Island song with a primary Saxaboom.
- ______ City, theme that Toothless dances to.
- My Smash Ultimate Main
- The Legend Of _____, Nintendo Game
- Florian's theory, or a breakfast food.
- Voldemort's Middle Name
- A player of this said "No Cap" (dad you can and should stop saying that every single time someone brings up gen alpha slang)
- Texting Shorthand for be right back
- With 15 Down, but from the Kirby universe.
Down
- Godzilla movie with a 99/98 on Rotten Tomatoes
- Local parody singer of Suavemente, Peaches, and Last Christmas.
- In the cypher of Sir Arthur Conan Doyle's Adventure of the Dancing Men, the end of a sentence is indicated by what?
- The smallest distance and time are named after him.
- The hound of the Baskervilles was painted with this to make it look ghostly.
- VOE!
- _____ E, famously hard piano music.
- Oogie Boogie voice actor
- The interface of the thing I used to make this.
- Evil, deceptive, blue colored wizard of Dragon Ball
- "Fusion... Meow!"
- Power Comma?
- This Pokemon is shown in a popular meme, where it walks to the theme of Accumula town.
- Cockney rhyming slang for house
- Video Game language in Book of Codes
- Freaky-Face Prince
- Gen Alpha slang associated with charisma, synonymous with aura.
- Kirby goes after Daroach for stealing this.
- Lord of the Rings Character also known as Strider.
- ______'s Mansion/Lemon Ice
- The best amendment, according to a MAGA.
39 Clues: VOE! • Power Comma? • "Fusion... Meow!" • Avogrado's number • Minervalternative • Freaky-Face Prince • My Smash Ultimate Main • Extremely fast hedgehog • Voldemort's Middle Name • Oogie Boogie voice actor • ______'s Mansion/Lemon Ice • Quantum equivalent to a bit • Cockney rhyming slang for house • The Legend Of _____, Nintendo Game • _____ E, famously hard piano music. • ...
Comp Sci 10 Cross Word Puzzle 2025-11-04
Across
- gets the instructions
- the smallest unit of data in computing, a binary digit that can have one of two values: 0 or 1
- a semiconductor device that functions as a switch or amplifier for electronic signals and power
- a small, high-speed memory location directly within a computer's CPU used to temporarily store data for immediate processing
- a high-speed temporary storage area that saves frequently accessed data to make future requests faster
- a hardware component that creates and outputs images to a computer monitor
- plastic sometimes metal covering that protects the components of the computer
- a component of a computer's central processing unit (CPU) that directs and coordinates the operation of all other components by interpreting and executing instructions
- a computer component that uses a laser to read data from or write data to optical discs like CDs, DVDs, and Blu-ray discs
Down
- the main printed circuit board in a computer that connects and allows communication between all essential components, such as the CPU, memory, and storage drives
- interprets it
- a small, non-volatile memory chip on a computer's motherboard that contains firmware
- - a unit of digital information, most commonly consisting of eight bits
- a hardware device used to store digital data, such as operating systems, applications, and user files like documents, photos, and music (Long term memory)
- northbridge is a chip in the chipset that connects to the CPU while Southbridge is a chip that does not directly connect to the CPU
- a passive heat exchanger made of thermally conductive material, like aluminum or copper, that draws heat away from components like the CPU or GPU and dissipates it into the air
- A fundamental digital circuit within a computer's CPU that performs arithmetic and logical operations on binary numbers.
- a system using only two digits, 0 and 1, to represent all data and instructions
- the brain of a computer that executes instructions, processes data, and controls the device's operations
- the short-term, high-speed memory in a computer that stores data for active programs and processes, allowing the processor to access information quickly.
20 Clues: interprets it • gets the instructions • - a unit of digital information, most commonly consisting of eight bits • a hardware component that creates and outputs images to a computer monitor • plastic sometimes metal covering that protects the components of the computer • a system using only two digits, 0 and 1, to represent all data and instructions • ...
Coding Project 2025-05-16
Across
- An output device that controls precise position or speed.
- The results of the operation of a system. Example - a computer output could be information or signals produced or delivered.
- Repeating process steps to continuously improve a work product.
- Two people working together to create a computer program. One person, called the driver, writes the code and explains the logic, while the other person, called the navigator, reviews it and gives feedback.
- A type of motor or servo that is responsible for moving or controlling a mechanism or components.
- Any type of calculation that follows a well-defined process like an algorithm.
- A placeholder in a device’s memory that stores a value a program is using.
- A chip that processes information and data from input and delivers information or data as an output.
- Data represented as either yes/no or true/false.
- A block of code that is triggered when a certain event happens.
Down
- A numerical amount defined in an algebraic equation.
- Data that ranges on a continuous scale.
- A method of transferring data by breaking it into small chunks called packets.
- A sequence of characters (letters, numerals, symbols, and punctuation marks).
- The period when a program is running. Runtime begins when a program is opened (or executed) and ends when the program is closed.I
- The network of physical devices, vehicles, buildings, and other items that enable these objects to collect and exchange data.
- An antenna used to create a personal area network that uses low energy to power Bluetooth wireless technology.
- An instrument used for determining direction.
- An instrument used to measure acceleration.
- A device that responds to a physical stimulus (as heat, light, sound, pressure, magnetism, or a particular motion) and transmits a resulting impulse (as for measurement or operating a control).
- A small image used to express an idea or emotion in digital communication.
- A type of data in computing that a logical expression evaluates to. The only possible values for Boolean are True and False.
22 Clues: Data that ranges on a continuous scale. • An instrument used to measure acceleration. • An instrument used for determining direction. • Data represented as either yes/no or true/false. • A numerical amount defined in an algebraic equation. • An output device that controls precise position or speed. • Repeating process steps to continuously improve a work product. • ...
Industrial Engineering Timeline 2025-08-03
Across
- In 1997, popularized Business Process Reengineering.
- In 1924, created statistical process control charts, founding modern quality control.
- In 1832, wrote On the Economy of Machinery and Manufactures, analyzing efficiency in production.
- In 1890, created the Gantt chart for planning and controlling projects.
- In 1856, developed the Bessemer process for mass steel production.
- In 2008, advanced digital twin concepts.
- In 1881, advocated integrating engineering knowledge with management for efficiency.
- In 2000, applied machine learning to manufacturing.
- In 1799, pioneered interchangeable parts in musket manufacturing.
- In 1886, conducted time studies, laying the foundation for Scientific Management.
- In 1980, co-created Six Sigma methodology.
- In 2004, advocated IoT applications in industry.
- In 1865, standardized screw threads, improving manufacturing compatibility.
- In 2020, advanced computer vision for quality inspection.
- In 1936, introduced computational theory, paving the way for automation.
- In 1957, developed FORTRAN for engineering applications.
- In 1986, introduced the Theory of Constraints in The Goal.
- In 1970, developed SMED and Poka-Yoke.
Down
- In 1984, applied marketing principles to industrial process efficiency.
- In 1979, popularized the 'zero defects' philosophy.
- In 2011, championed the "Industry 4.0" initiative.
- In 2010, co-founded Siri and advanced AI-driven automation systems.
- In 1951, published the Quality Control Handbook.
- In 1965, proposed Moore’s Law, predicting exponential computing growth.
- In 2015, scaled automated manufacturing at Tesla gigafactories.
- In 1994, wrote The Toyota Way based on Toyota's practices.
- In 1898, innovated motion study in bricklaying, reducing motions and improving productivity.
- In 2017, promoted AI adoption in supply chains.
- In 1901, applied psychology and ergonomics to work design, improving human efficiency.
- In 1776, introduced the concept of division of labor in The Wealth of Nations.
- In 1943, developed the simplex algorithm for linear programming.
- In 1990, co-authored The Machine That Changed the World.
- In 1950, introduced statistical quality control to Japan.
- In 1913, introduced the moving assembly line for automobile production, drastically reducing build time.
- In 1960, created the Toyota Production System, the basis for lean manufacturing.
35 Clues: In 1970, developed SMED and Poka-Yoke. • In 2008, advanced digital twin concepts. • In 1980, co-created Six Sigma methodology. • In 2017, promoted AI adoption in supply chains. • In 1951, published the Quality Control Handbook. • In 2004, advocated IoT applications in industry. • In 2011, championed the "Industry 4.0" initiative. • ...
Operating System 2017-05-14
Across
- The _____ register specifies the size of the range
- With _____ loading, a routine is not loaded until it is called
- A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
- _____ objects include files, programs, and semaphores
- _____ programs are associated with the operating system but are not necessarily part of the kernel
- The terms _____ and cracker are for those attempting to breach security
- The _____ register holds the smallest legal physical memory address
- A _____ kernel does not allow a process running in kernel mode to be preempted
- An ____ file is a series of code sections that the loader can bring into memory and execute
- A _____ program manages the execution of user programs to prevent errors and improper use of the computer
- Is a complete round of communication
- One measure of work is the number of processes that are completed per time unit
- A protection _____ specifies the resources that the process may access
- The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
- A ____ crash normally cannot be repaired; the entire disk must be replaced
- Access to a page marked invalid causes a ____ fault
- The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
- Nonvolatile memory that is used like a hard drive
- Communication links are controlled by special communication _____
- Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
- _____ parallelism involves distributing not data but tasks across multiple computing cores
- The _____'s algorithm less efficient than the resource-allocation graph scheme
- To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
- We say that a system is _____ if its resources are used and accessed as intended under all circumstances
- A _____ can occur only if four necessary conditions hold simultaneously in the system
- The interpreter used for systems with multiple command interpreters to choose from
- Specifies a set of functions that are available to an application programmer
Down
- Creates and runs virtual machines by providing an interface that is identical to the host
- One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
- The potential for a security violation, such as the discovery of a vulnerability
- A program in execution
- The advantages of distributed systems have resulted in an industry-wide trend toward _____
- _____ objects include the CPU, memory segments, printers, disks, and tape drives
- Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
- The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
- A ____ file is a sequence of characters organized into lines
- Contains information about the file, including ownership, permissions, and location of the file contents
- ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
- _____ paging is commonly used in virtual memory systems
- The user’s view of the computer varies according to the _____ being used
- Each ____ process is provided with a virtual copy of the host
- A _____ kernel allows a process to be preempted while it is running in kernel mode.
- Protecting critical regions through the use of locks
- The underlying hardware system that runs the virtual machines
- based on the Berkeley Fast File System
- memory that is dynamically allocated during process run time
- A connection point that devices use to communicate with the machine
- CPU _____ vary in number and type, depending on the computer architecture
- _____ memory involves the separation of logical memory as perceived by users from physical memory
- The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
- One program running at all times on the computer
- A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
- _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
53 Clues: A program in execution • Is a complete round of communication • based on the Berkeley Fast File System • One program running at all times on the computer • Nonvolatile memory that is used like a hard drive • The _____ register specifies the size of the range • Access to a page marked invalid causes a ____ fault • Protecting critical regions through the use of locks • ...
Crossword for PMs 2015-02-17
Across
- – (in project management) the amount of effort applied to produce a deliverable or to accomplish a task (a terminal element).
- - (in project management) activities that need to be accomplished within a defined period of time.
- - a social arrangement which pursues collective goals, which controls its own performance, and which has a boundary separating it from its environment.
- - an iterative incremental process of software development commonly used with agile software development
- - the value of money that has been used up to produce something, and hence is not available for use anymore. In business, it may be one of acquisition, in which it is counted as case the amount of money expended to acquire something.
- - the sequence of project network activities which add up to the longest overall duration. This determines the shortest time possible to complete the project. Any delay of an activity on the critical path directly impacts the planned project completion date
- - the amount of time that a task in a project network can be delayed without causing a delay to subsequent tasks and or the project completion date.
- - a recently evolved computing terminology or metaphor based on utility and consumption of computing resources. it involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. It can be classified as public, private or hybrid.
- -the number of calendar periods it takes from the time the execution of element starts to the moment it is completed.
- - an uncertain event or condition that, if it occurs, has a positive or negative effect on a project’s objectives
- - in a project network a link amongst a project's terminal elements.
- - entities within or without an organization which sponsor a project or, have an interest or a gain upon a successful completion of a project.
- - a personal or organizational desired end-point in some sort of assumed development, many people endeavor to reach it within a finite time by setting deadlines
- - (in project management)the processes of making accurate estimates using the appropriate techniques.
- - the sum total of all of project’s products and their requirements or features.
- - a list of all planned expenses and revenues
- - a Project Management Method developed by the Swiss Government, based on the German V-Modell. The first domain of application was software projects.
Down
- - all what is required to carry out a project's tasks; they can be people, equipment, facilities, funding, or anything else capable of definition (usually other than labour) required for the completion of a project activity.
- - the complete set of tasks, techniques, tools applied during project execution
- – the name of the first meeting with the project team and the client of the project.
- - a type of bar chart that illustrates a project schedule. It illustrates the start and finish dates of the terminal elements and summary elements of a project.
- - a graphical representation of a chronological sequence of events, also referred to as a chronology. It can also mean a schedule of activities, such as a timetable.
- - a shortcat for a tool that defines a project and groups the project’s discrete work elements in a way that helps organize and define the total work scope of the project.
- - in project management consists of a list of a project's terminal elements with intended start and finish dates.
- - an ongoing collection of activities, with an inputs, outputs and the energy required to transform inputs to outputs.
- – this kind of reserve is the cost or time reserve that is used to manage identified risks or “known-unknown” (known=identified, unknown=risks).It is not a random reserve, it is an estimated reserve based on various risk management techniques, such as Expected Monetary Value (EMV) and the Decision Tree Method.
- - a temporary endeavor undertaken to create a unique product, service, or result
- - documents approved by a recognized body, that provide, for common and repeated use, rules, guidelines, or characteristics for products, processes, or services with which compliance is not mandatory.
- - in this aproach the project is seen as a series of relatively small tasks conceived and executed to conclusion as the situation demands in an adaptive manner, rather than as a completely pre-planned process.
- - A contractually required work product, produced and delivered to a required state. It may be a document, hardware, software or other tangible product.
- - the international standard for project management developed by the Project Management Institute PMI.
- - a shortcut for the method of planning and managing projects that puts more emphasis on the resources required to execute project tasks.
32 Clues: - a list of all planned expenses and revenues • - in a project network a link amongst a project's terminal elements. • - the complete set of tasks, techniques, tools applied during project execution • - a temporary endeavor undertaken to create a unique product, service, or result • ...
Tech crossword 2022-02-28
Across
- the application of typical elements of game playing to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
- Data: extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
- A wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless IoT networks.
- content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
- Optimization: Work, including a paving operation, that is done on a highway or the shoulder of a highway and moves along at speeds of less than 30 kilometres per hour.
- fusion: The process of combining sensor data or data derived from disparate sources
- a company or form of technology that causes radical change in an existing industry or market by means of innovation.
- A massive open online course (MOOC) is a model for delivering learning content online to any person who wants to take a course, with no limit on attendance.
- a person who introduces new methods, ideas, or products.
- the ratio of the useful work performed by a machine or in a process to the total energy expended or heat taken in.
- Computing: Quantum computing is a type of computation that harnesses the collective properties of quantum states, such as superposition, interference, and entanglement, to perform calculations.
- 360: 360-degree videos, also known as surround video, or immersive videos or spherical videos, are video recordings where a view in every direction is recorded at the same time, shot using an omnidirectional camera or a collection of cameras.
- or Light Detection and Ranging: uses lasers to measure the elevation of features.
- Leader: A thought leader, or influencer, is someone who, based on their expertise and perspective in an industry, offers unique guidance, inspires innovation and influences others.
- the formation of ideas or concepts.
- is King: The quote “content is king” is very often used in conjunction with content marketing and SEO. It implies that unique, high-quality, interesting and relevant content contributes significantly to the success of companies on the Internet.
- Fatigue: The feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine.
- a term used to reflect the intertwining relationships between advertising and entertainment.
Down
- Solar Systems They are designed for the power needs of mid- to large-size homes. Off-grid solar systems operate from the stored energy in a battery bank.
- Relating to or involving an image, video, piece of information, etc., that is circulated rapidly and widely from one internet user to another.
- A hypothetical point in time at which technological growth becomes uncontrollable and irreversibly Second-Screen: Provides an enhanced viewing experience for content on another device, like the projector connected to our IPads in class.
- Audio: High-resolution audio is a term for audio files with greater than 44.1 kHz sample rate or higher than -bit audio bit depth.
- or Radio detection and ranging: a detection system that uses radio waves to determine the distance (ranging), angle, or velocity of objects.
- A performance indicator or key performance indicator is a type of performance measurement
- Things that are based on actual results rather than forecasts.
- Jacking is a term used to describe the application of a force with the aim of pushing or lifting an object.
- is a pricing strategy by which a basic product or service is provided free of charge, but money is charged for additional features, services, or virtual or physical goods that expand the functionality of the free version of the software.
- Someone who would like to start a business and thinks and talks about doing so, but never gets started.
- possessing a collection of technology and tech-related skills that act as a platform on which efficiencies are built.
- Networks: A network or circuit of biological neurons, or in a modern sense, an artificial neural network, composed of artificial neurons or nodes.
- Upcycling, also known as creative reuse, is the process of transforming by-products, waste materials, useless, or unwanted products into new materials or products perceived to be of greater quality, such as artistic value or environmental value
- The correct or acceptable way of communicating on the internet.
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
33 Clues: the formation of ideas or concepts. • a person who introduces new methods, ideas, or products. • Things that are based on actual results rather than forecasts. • The correct or acceptable way of communicating on the internet. • or Light Detection and Ranging: uses lasers to measure the elevation of features. • ...
FitAVocab.hp 2013-05-15
Across
- Formal induction into office
- Internet Service Provider
- Stores all documents
- The main circuit board of the computer
- Light Emitting Diode
- Wireless Fidelity
- A laser operated disc drive
- Service Set Identifier
- National Cyber Security Alliance
- Pointing device that navigates the screen
- Who, When, Why
- Information security applied to computers and networks
- Programs used to direct the operation of a computer
- To insert something into a machine
- A program that lets your program be online
- Data transmission in which a single wire can carry several channels at one time
- Drive A high-capacity storage device containing a read-write mechanism plus hard drives main storage
- A computer program that manages access to a centralized resource of service in a network
- An oath someone takes before entering an office by election
- Is an interent server that holds photos,music, and videos
- EX: "Just Do It"
- A device that makes a transmission of data
- EX: Camera
Down
- EX: Keyboard
- Connection from telephone switching station
- A device for observing(screen)
- Computer networking, broadcasting, using radio signals instead of wires
- Type of port to connect a mouse or keyboard to a PC
- EX: Angry Birds
- How you behave online
- Search Gives you information from the top hits from the best search engines, not just one
- Mechanical equipment necessary for an activity
- The collection of software that directs a computers operation
- A mouse that uses a ball
- A portable wireless computing device that is small enough to be used while held in the hand
- A slot that allows you add more plug ins
- A port that allows you to hardwire on internet connection
- Virtual reality
- A mouse that uses a laser
- Being careful and responsible using the web
- Engine Program that allows you to search the internet
- Computer memory that holds data (Random Access Memory)
- A piece of written,printed, or electronic matter that provides information
- To give credit
- Liquid Crystal Display
- Processes information (Central Processing Unit)
46 Clues: EX: Camera • EX: Keyboard • Who, When, Why • To give credit • EX: Angry Birds • Virtual reality • EX: "Just Do It" • Wireless Fidelity • Stores all documents • Light Emitting Diode • How you behave online • Service Set Identifier • Liquid Crystal Display • A mouse that uses a ball • Internet Service Provider • A mouse that uses a laser • A laser operated disc drive • Formal induction into office • ...
Security Quiz 2013-07-09
Across
- With cloud computing they talk about this notorious number of threats
- one of the first antivirus programs, released in 1987
- this hat color is used when referring to professional hackers recruited specifically to find security gaps.
- This famous code was broken or "hacked" during the second world war
- The first convicted computer criminals, called the 414's got the name from their hometown in
- To use a program, site or system disguised as something else to acquire data
- The company behind the largest cyber-attack in history
- Silvertail plugin for real-time cyber detection
- ECAT stands for Enterprise Compromise ... Tool)
- A tactic used in ancient Greece to deceive a defense (one word)
- ... engineering is the human way to breach a company's information security.
- a non-profit organization working for the security within the cloud
- Alan ... invented this test to measure machines ability to be mistaken for a human being.
- A DOS-Attack is a Denial-of- ... what?
- last name of the founder for the laws of robotics, ensuring our security from acts of A.I.
Down
- a security system that controls the incoming and outgoing network traffic
- A part of the attack used when RSA was hacked in 2011
- a small simple program used to monitor a computers keystrokes
- this symbolical relative used complete surveillance in the book 1984
- SecurID runs on this Operative System
- the practice of secure communication
- This solution can Pull a complete live memory dump from a suspect machine
- The physical "key" that RSA use to create an authentication code
- RSA BSAFE provides security products for this IT-division
- The A in RSA
- programmers that find and work with weaknesses in computer systems
- this annoying verification on the web is used to make sure that you are human by twisting a word.
- a term to describe a flaw or fault in a computer program or system
- the organizational executive responsible for IT security.
29 Clues: The A in RSA • the practice of secure communication • SecurID runs on this Operative System • A DOS-Attack is a Denial-of- ... what? • Silvertail plugin for real-time cyber detection • ECAT stands for Enterprise Compromise ... Tool) • A part of the attack used when RSA was hacked in 2011 • one of the first antivirus programs, released in 1987 • ...
FIT_Vocab.yourinitials 2013-05-16
Across
- the overal appearance of a document, image, text.
- plugged in to extend the computer's capability
- it stands for set service identifier it is public name of a wireless
- the small amount of data
- something you enter into the computer like a keyboard
- i allows a device to exchange data wirelessly over a computer network it
- your short term memory
- for wireless fidelity
- computer and you access it anywhere
- to load and initialize the operating system on a computer
- it delivers information to the computer and saves it for you
- a search to get you to other websites such as google
- cable
- is a readable file that is used to describe an electronic copy or
- 1,024 bytes
- 1,024 kilobytes
- computer system's setup: the way in which the software and
- protection of any published work (literature, music, art, and drama)
- a pamphlet or flyer that publicly shows what your business does
- a socket on a computer or network device for plugging in an
- the port where you insert your flash drive
Down
- it means all your files are stores on the internet servers instead of an
- it is the primary printed circuit board
- a device that is easily transportable
- a location in a computer system where additional facilities can
- Comcast and Xfinity
- the computing part of the computer made up of the control unit ALU
- giving credits to a website after you use its information
- it is when you are using radio signals instead of wire for
- is a family of technologies that provides internet access
- a hardware input device that navigates the screen
- a blank document
- how you behave online and act
- a page with all your accomplishments, schools, and more
- a connector used for keyboards and mice to a PC compatible computer
- where you enter headphones or speakers
- components of a computer system are arranged and interconnected
- copy of reference material for a product
- 8 bits
39 Clues: cable • 8 bits • 1,024 bytes • 1,024 kilobytes • a blank document • Comcast and Xfinity • for wireless fidelity • your short term memory • the small amount of data • how you behave online and act • computer and you access it anywhere • a device that is easily transportable • where you enter headphones or speakers • it is the primary printed circuit board • ...
Computer pioneers and terms 2015-05-27
Across
- responsible for creating the first one-gigahertz computer processor chip.
- inventor of the transistor
- Invented the World Wide Web (WWW) and Created the first website
- designed to hold electronic circuits
- Conceived and built the first integrated circuit.
- is an optical disc which contains audio or software data whose memory is read only
- was an early computer hobbyist group in Silicon Valley
- is a package containing many circuits, pathways, transistors, and other electronic components
- was an American electrical engineer and computer pioneer
- Coined the term personal computer.
- founding fathers of the video game industry. Atari's home version of the game Pongwas a huge success
- Inventor of the first digital computer
- Developed the Z1, Z3, and Z4 the first programmable computer
- hardware device that enables a computer to send and receive information over telephone lines
- handling all instructions it receives from hardware and software running on the computer.
- It allows the use of icons or other visual indicators to interact with electronic devices.
- Developed the Turing Machine in 1936. Developed the Turing Test
- leading the development of the Brown box and Magnavox Odyssey
Down
- helped define and develop several widely used technologies
- is an instanceof a computer program that accepts and responds to requests made by another program
- planted the seeds of computing in the digital age.
- Its a data storage device.
- created the first graphical computer game OXO
- invented the printed circuit board.
- Founded software company Opsware
- handling all instructions it receives from hardware and software running on the computer.
- co-developed the BASICprogramming language during 1963 to 1964,
- designed the first American Electronic computer
- One of the inventors of the microprocessor.
- The process of creating an executable program from code
- co-developing the BASIC programming language in 1964 12.
- is an external bus standard that supports data transfer rates of 12 Mbps
- is made up of semi-conductors and is a component used to control the amount of current
- numeric values are represented by different combinations of 0 and 1
34 Clues: inventor of the transistor • Its a data storage device. • Founded software company Opsware • Coined the term personal computer. • invented the printed circuit board. • designed to hold electronic circuits • Inventor of the first digital computer • One of the inventors of the microprocessor. • created the first graphical computer game OXO • ...
Computer Management and safe-guarding our data 2016-04-15
Across
- Name another word for ‘fishing for information’ (8)
- Name one Madware threat (5)
- Backup schedule whereby backups are made only of new files and files that have changed since the last backup. Resulting in greater backup efficiency (11)
- This is a form of malware. It can cause relatively minor, annoying problems such as redirecting you to websites you don’t intend going to. (7)
- Checking for the correctness of data Data… (10)
- Security based on measurement and identification of unique physical characteristics of a person (17)
- Uninterruptible Power Supply (3)
- This acts as a barrier between your computer and the internet (9)
- Creating a backup image of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure Disk… (7)
Down
- A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry Defensive… (11)
- The quality of computer is often summarised by the ‘Garbage In, Garbage Out’. Fill in the acronym for this principle (4)
- Name one category of threats to data (11)
- Hardware or software that monitors the traffic between a computer and the interne t, to safeguard against beaches in security (7)
- A form of malware disguised as a useful program, but in reality designed to do harm (6)
- Checking for accuracy of data Data… (10)
- A software that is specifically designed to install itself without the users knowledge to negativity affect or ‘harm ’a computer system (7)
- Redundant Array of Inexpensive/ Independent Disks (4)
- Morden computing makes it easy to ‘crack’ passwords. There is a simple way of scrambling data or text into a new format using a set of rules, name it (9)
- A form of malware that exploits weakness in an application or operating system in order to spread. (4)
- A collection of programs that are designed to infiltrate a computer and gain the highest levels of privileges(administrator rights) to take control of the infected computer (7)
20 Clues: Name one Madware threat (5) • Uninterruptible Power Supply (3) • Checking for accuracy of data Data… (10) • Name one category of threats to data (11) • Checking for the correctness of data Data… (10) • Name another word for ‘fishing for information’ (8) • Redundant Array of Inexpensive/ Independent Disks (4) • ...
Fatty Leg-Ella 2021-02-09
Across
- again
- starting
- Where Olemaun's school was.
- to join or come together as partners, friends, or companions
- I like to sleep
- - a text written in code or a coded signal
- having no stain or blemish
- - able to endered
- to make out the meaning of despite lack of clearness
- to make out the meaning of despite lack of clearness <decipher sloppy handwriting >
- - slowly tickle or seep out of something
- to look at and understand words
- an opening into the ground
- to bring shame to
- I am really dark and gloomy
- an act or method of computing
- An Ocean near northern parts of Canada
- a bird that is black and kind of small
- - a sailing ship with two or more masts
- Celebrated on July 1st and now called Canada Day.
- a sailing ship with 2 or more masts
- or stay somewhere
- - a precious stone consisting of a blueish
- light yellowish-brown cloth often used for military uniforms
- to collect things
- - a bunch of mathematics dealing with the
- born in, belonging to, or characteristic of a place or country other than the one under consideration <foreign language > <foreign customs >
Down
- a durable cloth woven with diagonal ridges
- a thin strong nearly transparent paper of very lightweight
- a place where many people eat together
- - extremely large
- to speak or utter with involuntary stops and much repeating
- to hold something
- to turn up or over
- to make or grow longer
- to yell in a high pitched voice
- someone who rules over something
- not talking
- an act showing scorn and disrespect
- not from there
- having no mercy
- A bird that is seen near Northwest Territories.
- A territory in Northwest of Canada
- - run hurried
- a quilt filled with eiderdown
- endless time
- to make a long loud mournful sound like that of a dog
- Winter boots made by indigenous people.
- market where they would trade furs and sell essential products.
- tearful
- of numbers
- - make a harsh raucous
- variety of beryl.
- something gone
- something to wear on your legs and under your shoes
55 Clues: again • tearful • starting • of numbers • not talking • endless time • - run hurried • not from there • something gone • I like to sleep • having no mercy • - extremely large • to hold something • - able to endered • to bring shame to • or stay somewhere • variety of beryl. • to collect things • to turn up or over • to make or grow longer • - make a harsh raucous • having no stain or blemish • ...
Computer Crossword Puzzel 2017-06-22
Across
- move along a flat surface and can move the on-screen cursor to different items on the screen.
- tools, machinery, and other durable equipment.
- is a way to organize computer files.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- is popular among computer scientists and is used in a wide variety of situations.
- copy (data) from one computer system to another, typically over the Internet.
- an electronic device for storing and processing data.
- a panel of keys that operate a computer or typewriter.
- a global computer network providing a variety of information and communication facilities,
- A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk.
- irrelevant or inappropriate messages sent on the Internet to a large number of recipients
Down
- an object on a computer that stores data, information, settings, or commands
- is the abbreviation for central processing unit. Sometimes referred to simply as the central processor.
- a computer or computer program that manages access to a centralized resource or service in a network.
- the working surface of a desk.
- Memory enables a computer to store, at least temporarily, data and programs.
- is a system designed to prevent unauthorized access to or from a private network.
- System system software that manages computer hardware and software resources and provides common services for computer programs.
- flash drive small enough to carry on a key ring, that can be used with any computer that has a USB port.
- with reference to a computer system) boot or be booted again.
- In computing, a crash (or system crash) occurs when a computer program, such as a software application or an operating system, stops
- is an image that represents an application, a capability, or some other concept or specific entity with meaning for the user.
23 Clues: the working surface of a desk. • is a way to organize computer files. • tools, machinery, and other durable equipment. • an electronic device for storing and processing data. • a panel of keys that operate a computer or typewriter. • with reference to a computer system) boot or be booted again. • ...
Computer Fundamentals and Applications 2018-08-25
Across
- it gathers, organizes and manipulates data and carries out instructions
- the information part of an information system
- tubes/ used by first computer systems for circuitry and magnetic drums for memory
- the rules, descriptions and instructions for how things are done in computer-based information systems
- brought thousands of integrated circuits were built onto a single silicon chip
- System/ a system which allowes a device to run many different applications at one time with a central program that monitores the memory
- Circuit/ a small electronic device made out of a semiconductor material
- one of the most important element of computer-based information system that involves more than one piece of hardware to connect and function
- an electronic computer which was built for the military in 1943
- Intelligence/ a system where fifth-generation computers are based on which can develop devices in responding to natural language
- the first general-purpose digital computer developed in 1946
- a mutinational technology company that introduced Macintosh computer with its icon driven interface in 1984
Down
- generation computing devices based on artificial intelligence
- the most obvious part of a computer-based information system including servers, routers, monitors, printers and storage devices
- siliconchips where miniaturized transistors were placed on
- Babbage/ the english mathematics professor who designed the Analytical Engine where the basic framework of the computers of today are based on
- the first computer which was built for commercial use in 1951
- allow computers to become smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors
- system/ an organized system for the collection, organization, storage and communication of information
- Computer/ one of the third-fourth generation computers which was introduced by IBM for home and office use
- a device that can be instructed to carry out sequences of arithmetic or logicaloperations automatically
- the most important part of a computer-based information system who design and operate the software, input the data, build the hardware and keep it running
- language/ the lowest-level programming language understood by computers to perform operations
- machine language which allowes programmers to specify instructions in words
24 Clues: the information part of an information system • siliconchips where miniaturized transistors were placed on • the first general-purpose digital computer developed in 1946 • generation computing devices based on artificial intelligence • the first computer which was built for commercial use in 1951 • an electronic computer which was built for the military in 1943 • ...
Computer Fundamentals and Applications 2018-08-25
Across
- a device that can be instructed to carry out sequences of arithmetic or logicaloperations automatically
- it gathers, organizes and manipulates data and carries out instructions
- machine language which allowes programmers to specify instructions in words
- brought thousands of integrated circuits were built onto a single silicon chip
- one of the third-fourth generation computers which was introduced by IBM for home and office use
- allow computers to become smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors
- the first computer which was built for commercial use in 1951
- a system which allowes a device to run many different applications at one time with a central program that monitores the memory
- an organized system for the collection, organization, storage and communication of information
- generation computing devices based on artificial intelligence
- the lowest-level programming language understood by computers to perform operations
- a small electronic device made out of a semiconductor material
Down
- the most obvious part of a computer-based information system including servers, routers, monitors, printers and storage devices
- one of the most important element of computer-based information system that involves more than one piece of hardware to connect and function
- a system where fifth-generation computers are based on which can develop devices in responding to natural language
- siliconchips where miniaturized transistors were placed on
- the most important part of a computer-based information system who design and operate the software, input the data, build the hardware and keep it running
- an electronic computer which was built for the military in 1943
- the first general-purpose digital computer developed in 1946
- the english mathematics professor who designed the Analytical Engine where the basic framework of the computers of today are based on
- the information part of an information system
- used by first computer systems for circuitry and magnetic drums for memory
- the rules, descriptions and instructions for how things are done in computer-based information systems
- a mutinational technology company that introduced Macintosh computer with its icon driven interface in 1984
24 Clues: the information part of an information system • siliconchips where miniaturized transistors were placed on • the first general-purpose digital computer developed in 1946 • the first computer which was built for commercial use in 1951 • generation computing devices based on artificial intelligence • a small electronic device made out of a semiconductor material • ...
Computer Fundamentals and Applications 2018-08-25
Across
- the information part of an information system
- one of the third-fourth generation computers which was introduced by IBM for home and office use
- a mutinational technology company that introduced Macintosh computer with its icon driven interface in 1984
- an organized system for the collection, organization, storage and communication of information
- a system which allowes a device to run many different applications at one time with a central program that monitores the memory
- used by first computer systems for circuitry and magnetic drums for memory
- allow computers to become smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors
- it gathers, organizes and manipulates data and carries out instructions
- machine language which allowes programmers to specify instructions in words
- a device that can be instructed to carry out sequences of arithmetic or logicaloperations automatically
- the most obvious part of a computer-based information system including servers, routers, monitors, printers and storage devices
- the first general-purpose digital computer developed in 1946
Down
- a small electronic device made out of a semiconductor material
- the rules, descriptions and instructions for how things are done in computer-based information systems
- a system where fifth-generation computers are based on which can develop devices in responding to natural language
- the most important part of a computer-based information system who design and operate the software, input the data, build the hardware and keep it running
- the lowest-level programming language understood by computers to perform operations
- one of the most important element of computer-based information system that involves more than one piece of hardware to connect and function
- an electronic computer which was built for the military in 1943
- siliconchips where miniaturized transistors were placed on
- brought thousands of integrated circuits were built onto a single silicon chip
- the english mathematics professor who designed the Analytical Engine where the basic framework of the computers of today are based on
- generation computing devices based on artificial intelligence
- the first computer which was built for commercial use in 1951
- generation of computer which hallmark was the development of integrated circuit
25 Clues: the information part of an information system • siliconchips where miniaturized transistors were placed on • the first general-purpose digital computer developed in 1946 • generation computing devices based on artificial intelligence • the first computer which was built for commercial use in 1951 • a small electronic device made out of a semiconductor material • ...
About PCs 2017-11-22
Across
- the most basic networking device that connects multiple computers or other network devices together
- a mobile computing device designed to be held in one or two hands
- a term used to describe all data communications on a computer or computer network at a given point
- a group of files that enable one or more hardware devices to communicate with the computer's operating system
- the hole into which a card is placed
- a single button on the keyboard
- a segment of data sent from one computer or device to another over a network
- any hardware capable of holding information either temporarily or permanently
- a component that handles all instructions it receives from hardware and software running on the computer
- the total maximum transfer rate of a network cable or device
- a tool used to insert and remove a screw from a hole
- a term used to describe a computer chassis
- to transmit it to many receivers
- a special type of file on your computer's file system
- a hardware device designed to receive, analyze and move incoming packets to another network
Down
- a collection of numbers represented as bytes
- drive a non-volatile memory hardware device that permanently stores and retrieves data on a computer
- a tool designed to remove the protective covering (jacket) off of a cable to expose the inner wires
- a hardware device that keeps the overall computer or a computer device cool
- a software program to present and explore content on the World Wide Web.
- a computer case which arranges the internal components vertically
- the ability to operate a device without any wires
- any physical component of a computer system
- a component that allocates power and allows communication to the CPU, RAM, and all other computer hardware components
- a software utility or hardware device that acts as a filter for data entering or leaving a network or computer
- a hole or connection found on the front or back of a computer
- an output device that displays video images and text
27 Clues: a single button on the keyboard • to transmit it to many receivers • the hole into which a card is placed • a term used to describe a computer chassis • any physical component of a computer system • a collection of numbers represented as bytes • the ability to operate a device without any wires • a tool used to insert and remove a screw from a hole • ...
finals 2017-11-20
Across
- A mathematical preliminary that is used for averaging rates or ratios.
- A synthetic benchmark that focuses on string manipulation and integer operations.
- A concept in parallel computing where memory access time is approximately the same for each processor.
- A Flynn’s taxonomy that is a non-parallel computer.
- It is a software capability that enables a program to work with multiple threads at the same time.
- A mathematical preliminary that gives many ways to rate the overall performance of system and performance of its constituent components.
- A superscalar limitation that cannot execute instruction after a conditional branch in parallel with instruction before a branch
- It is an alternative architecture that allows several instructions to be executed at the same time but in different pipeline stages.
- It is the process of breaking the code into small chunks and timing each of these chunks to determine which of them consume the most time.
Down
- It is the distributing work among tasks so that all tasks are kept busy all of the time.
- A parallel architecture concept that permits multiple independent threads to execute simultaneously on the same core.
- It is the amount of time required to coordinate parallel tasks.
- It is the science of making objective assessments of the performance of one of system over another.
- An execution policy where instructions are issued in the exact order that would correspond to sequential execution; results are written in the same order.
- It is a solution to the dependency problem of superscalar where new register are allocated to values.
- It is a parallel architecture memory that is also called as loosely-coupled multiprocessor system.
- A data dependency that exists when the output of one instruction is required as an input to a subsequent instruction.
- It is the simultaneous use of multiple compute resources to solve a computation problem.
- It is a step in designing parallel algorithms wherein it group tasks into larger tasks.
- It is any computer with several processors.
20 Clues: It is any computer with several processors. • A Flynn’s taxonomy that is a non-parallel computer. • It is the amount of time required to coordinate parallel tasks. • A mathematical preliminary that is used for averaging rates or ratios. • A synthetic benchmark that focuses on string manipulation and integer operations. • ...
fe_cpe131-1p_seta 2016-08-09
Across
- A synthetic benchmark that focuses on string manipulation and integer operations.
- A parallel architecture concept that permits multiple independent threads to execute simultaneously on the same core.
- A mathematical preliminary that gives many ways to rate the overall performance of system and performance of its constituent components.
- It is the science of making objective assessments of the performance of one of system over another.
- A superscalar limitation that cannot execute instruction after a conditional branch in parallel with instruction before a branch
- A mathematical preliminary that is used for averaging rates or ratios.
- A data dependency that exists when the output of one instruction is required as an input to a subsequent instruction.
- It is the process of breaking the code into small chunks and timing each of these chunks to determine which of them consume the most time.
- It is a solution to the dependency problem of superscalar where new register are allocated to values.
Down
- It is an alternative architecture that allows several instructions to be executed at the same time but in different pipeline stages.
- An execution policy where instructions are issued in the exact order that would correspond to sequential execution; results are written in the same order.
- A concept in parallel computing where memory access time is approximately the same for each processor.
- A Flynn’s taxonomy that is a non-parallel computer.
- It is the amount of time required to coordinate parallel tasks.
- It is the simultaneous use of multiple compute resources to solve a computation problem.
- It is a software capability that enables a program to work with multiple threads at the same time.
- It is the distributing work among tasks so that all tasks are kept busy all of the time.
- It is a parallel architecture memory that is also called as loosely-coupled multiprocessor system.
- It is a step in designing parallel algorithms wherein it group tasks into larger tasks.
- It is any computer with several processors.
20 Clues: It is any computer with several processors. • A Flynn’s taxonomy that is a non-parallel computer. • It is the amount of time required to coordinate parallel tasks. • A mathematical preliminary that is used for averaging rates or ratios. • A synthetic benchmark that focuses on string manipulation and integer operations. • ...
fe_cpe131-1p_setb 2016-08-09
Across
- A parallel architecture concept that permits multiple independent threads to execute simultaneously on the same core.
- It is an alternative architecture that allows several instructions to be executed at the same time but in different pipeline stages.
- It is the distributing work among tasks so that all tasks are kept busy all of the time.
- It is the simultaneous use of multiple compute resources to solve a computation problem.
- An execution policy where instructions are issued in the exact order that would correspond to sequential execution; results are written in the same order.
- It is the science of making objective assessments of the performance of one of system over another.
- A concept in parallel computing where memory access time is approximately the same for each processor.
Down
- It is the process of breaking the code into small chunks and timing each of these chunks to determine which of them consume the most time.
- It is a parallel architecture memory that is also called as loosely-coupled multiprocessor system.
- A Flynn’s taxonomy that is a non-parallel computer.
- A mathematical preliminary that gives many ways to rate the overall performance of system and performance of its constituent components.
- A superscalar limitation that cannot execute instruction after a conditional branch in parallel with instruction before a branch
- It is the amount of time required to coordinate parallel tasks.
- It is any computer with several processors.
- A mathematical preliminary that is used for averaging rates or ratios.
- It is a solution to the dependency problem of superscalar where new register are allocated to values.
- It is a software capability that enables a program to work with multiple threads at the same time.
- A data dependency that exists when the output of one instruction is required as an input to a subsequent instruction.
- It is a step in designing parallel algorithms wherein it group tasks into larger tasks.
- A synthetic benchmark that focuses on string manipulation and integer operations.
20 Clues: It is any computer with several processors. • A Flynn’s taxonomy that is a non-parallel computer. • It is the amount of time required to coordinate parallel tasks. • A mathematical preliminary that is used for averaging rates or ratios. • A synthetic benchmark that focuses on string manipulation and integer operations. • ...
Discovering Computer 2019-02-05
Across
- It is a personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table.
- It stores information in both a vertical and horizontal direction.
- the programs and other operating information used by a computer
- Case that contains the electronic components of the computer that are used to process data.
- It is the number of horizontal and vertical pixels in a display.
- It is any data and instructions entered into the memory of a computer.
- It produces text and graphics on a physical medium.
- It is a thin lighter-weight mobile computer that has a touch screen.
- It involves reducing the electricity consumed and environmental waste generated when using a computer.
- It is a computer application in society that uses scientific method.
- It is a disadvantage of using computer that affects the well-being of a person.
- It is a light sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.
Down
- it is also called earphones, that rest inside the ear canal.
- It is an input device that contains keys, users press to enter data and instructions into a computer.
- physical parts of a computer
- It is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneosly.
- It is a pointing device that fits under the palm of your hand comfortably.
- It is data that has been processed into a useful form.
- It is a computing device small enough to hold in your hand.
- It records and retrieves items to and from storage media.
- It controls access to the hardware, software, and other resources on a network.
- It can connect up to 127 different peripheral devices together with a single connector.
- It is the fastest, most powerful computer
- It is a self-service banking terminal that connects to a host computer through a network.
- It is an advantage of using computer that makes the work faster to be done.
25 Clues: physical parts of a computer • It is the fastest, most powerful computer • It produces text and graphics on a physical medium. • It is data that has been processed into a useful form. • It records and retrieves items to and from storage media. • It is a computing device small enough to hold in your hand. • it is also called earphones, that rest inside the ear canal. • ...
Crash Course Computer Science Part 2 2018-11-13
Across
- they can run many programs at what
- operating systems, or OS's for short are just what
- they had to write code as what often just by reading manuals, and hope ti worked when shared
- not only did they have to worry about writing their program, but also how to interface with each and every model of printer and all devices connected to a computer what are called
- the most influential of early what operating systems was Multics or multiplexed information and computing service release in 1916
- in the late 50's computers had gotten so fast what waiting for slow mechanical things, like printers and punch card readers
- Dennis Ritchie one of the what working on Multics, once said one of the obvious things that went wrong with Multics as a commercial success was just that it was sort of over engineered in a sense
- this ability enable by the operating system is called
- this was clearly terrible, so to make it easier for programmers, operating systems stepped in as what between software programs and hardware peripherals
- this is also really useful in protecting against malicious software like what
Down
- they knew it was going to be wicked fast, so the needed a way to what use of the expensive machine
- features like this meant Multics was really what for its time
- instead of being given one program at a time computers could be given what
- they wanted to what the OS into two parts
- there was no downtime while someone scurried around and office to find the next program to run. this is what
- while computers go faster, they also got what
- first released in 1981 it became the what OS for early home c computers, even though it lacked multitasking and protected memory
- more specifically they provided a software abstraction through API's called what
- developers didn't want mischievous users what data they shouldn't use
- to hide this complexity operating systems what memory locations complicated features like this meant Multics was really what for its time
20 Clues: they can run many programs at what • they wanted to what the OS into two parts • while computers go faster, they also got what • operating systems, or OS's for short are just what • this ability enable by the operating system is called • features like this meant Multics was really what for its time • ...
Calculus Conundrum 2021-05-13
Across
- final result after solving a differential equation using the initial condition
- process of differentiating when two functions are being multiplied
- type of series that can be thought of as a polynomial with infinite terms
- coordinate system centered at the pole with units (r, theta)
- the instantaneous rate of change at a point on a function
- a graphical representation of a differential equation with slope lines at each coordinate point
- distance along a curve of a function
- an equation that defines the relationship between a function and its derivatives
- the process of finding the derivative of a function
- a test to prove convergence or divergence of a series by computing the limit as n approaches infinity of the absolute value of [ a(n+1) / a(n) ]
- type of problem where all variables are dependent on time
- inverse derivative, its derivative is equal to the original function
Down
- the numerical tool for approximating values for solutions of ordinary differential equations with a given initial solution
- numerical value with both magnitude and direction
- process of differentiating when one function is inside another
- error calculation method that uses the next term of a Taylor polynomial
- method of simplifying a limit by differentiating the numerator and denominator of the limit
- the value f(x) gets closer to as x approaches a certain value
- the branch of mathematics that deals with the finding and properties of derivatives and integrals of functions by methods originally based on the summation of infinitesimal differences
- the rate of change of position of a particle
- a quantity that is limitless or impossible to calculate
- term applied to a Taylor series that is centered at x=0
- set of equations that include more than one independent variable (usually x and t)
- differentiation technique that allows you to find the derivative of y with respect to x
- process of differentiating when a function is being divided by another
- the direction at which a function opens, the second derivative
- the most common method of evaluating and integral with a complex integrand
- a straight line that intersects a function exactly one time
28 Clues: distance along a curve of a function • the rate of change of position of a particle • numerical value with both magnitude and direction • the process of finding the derivative of a function • a quantity that is limitless or impossible to calculate • term applied to a Taylor series that is centered at x=0 • the instantaneous rate of change at a point on a function • ...
5.02 & 5.03 Key Terms 2024-05-16
Across
- Files included with emails.
- a software program on the Internet that allows you to search documents and files for keywords and return files that match.
- Store your contacts, which makes it easy to correspond and share contact information with others.
- Monitor, printer, speakers; any piece of computer hardware equipment which converts information into human readable form.
- Components are connected to the main circuit board of the computer.
- Consists of hardware (physical parts of the computer) and software (programs and data used with physical computer).
- Contains billions of transistors; responsible for the fundamental computing within the system, and directly or indirectly controls all the other components.
- enable users to enter and store written work into many types of documents.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system, or destroying data.
- A collection of websites or web pages stored in web servers and connected to local computers through the internet.
- software used to create a sequence of text and graphics, and often audio and video, to accompany a speech or public presentation.
- file made of rows and columns that help sort, organize, and arrange data efficiently, and calculate numerical data.
Down
- Programs that people use to get their work done
- A computer system that is part of a larger machine and which controls how that machine operates.
- Used to identify it and link to a web page.
- Responsible for starting up application programs, running them, and managing resources that they need.
- Designed to create databases, and to store, manage, search, and extract the information contained within them.
- A particular computer will have a particular type of processor.
- Consisits of two or more computers connected so that they can exchange data and programs.
- Keyboards, mouse, scanners, cameras, joysticks, and microphones; a piece of equipment used to provide data and control signals to an information processing information.
- Help you email multiple people at once.
- Software programs that allow you to view webpages, such as Internet Explorer, Safari, Firefox, or Google Chrome.
22 Clues: Files included with emails. • Help you email multiple people at once. • Used to identify it and link to a web page. • Programs that people use to get their work done • A particular computer will have a particular type of processor. • Components are connected to the main circuit board of the computer. • ...
Unit 1 Crossword 2024-08-06
Across
- Related to the ocean or other large body of water.
- A giant hotel on the ocean. Takes you from one destination to another.
- To like one thing more than another.
- Fulfilling; giving or providing satisfaction.
- Feeling deep happiness, satisfaction or taking pleasure in the achievements of oneself or another.
- The study of matter, its constituent parts, natter, and how it moves through space and time; as well as energy and force
- A scientist who studies life.
- Someone who is responsible for serving passengers on an aircraft. They also play an important role in passenger safety.
- The class was very__________ all the teacher did was talk!
- Digital applications that perform different tasks. Can be put on a computing device.
- Items needed to carry out different tasks.
- Far away or removed from another place. A desert island might be described this way.
- The cardinal direction that is opposite "east".
- If your mind likes to make new things, you are _________.
- obstacles or hardships that get in your way.
- Describes something as being taught a particular skill.
Down
- An occupation or string of occupations taken on during a large part of someone’s life that offer opportunities to progress within the same field.
- Different of varied from other things.
- A person who is skilled at coming up with new concepts and ideas.
- A person who is trained to go outer space and do various tasks.
- Having or showing the ability to something in the future.
- The opposite of close.
- You might find the lost city of Atlantis here.
- The person who operates the controls of an airplane.
- My family and I ate at a great restaurant last week. I ________ that you try it too.
- Giving someone an idea to change what they do.
- To go from one place to another.
- A person who carries out academic or scientific research.
- Someone who is paid to keep track of financial records and taxes.
- A type of ship that can submerge itself in water and travel below the surface.
30 Clues: The opposite of close. • A scientist who studies life. • To go from one place to another. • To like one thing more than another. • Different of varied from other things. • Items needed to carry out different tasks. • obstacles or hardships that get in your way. • Fulfilling; giving or providing satisfaction. • You might find the lost city of Atlantis here. • ...
Unit 1 Vocab 2024-08-07
Across
- Related to the ocean or other large body of water.
- A giant hotel on the ocean. Takes you from one destination to another.
- To like one thing more than another.
- Fulfilling; giving or providing satisfaction.
- Feeling deep happiness, satisfaction or taking pleasure in the achievements of oneself or another.
- The study of matter, its constituent parts, natter, and how it moves through space and time; as well as energy and force
- A scientist who studies life.
- Someone who is responsible for serving passengers on an aircraft. They also play an important role in passenger safety.
- The class was very__________ all the teacher did was talk!
- Digital applications that perform different tasks. Can be put on a computing device.
- Items needed to carry out different tasks.
- Far away or removed from another place. A desert island might be described this way.
- The cardinal direction that is opposite "east".
- If your mind likes to make new things, you are _________.
- obstacles or hardships that get in your way.
- Describes something as being taught a particular skill.
Down
- An occupation or string of occupations taken on during a large part of someone’s life that offer opportunities to progress within the same field.
- Different of varied from other things.
- A person who is skilled at coming up with new concepts and ideas.
- A person who is trained to go outer space and do various tasks.
- Having or showing the ability to something in the future.
- The opposite of close.
- You might find the lost city of Atlantis here.
- The person who operates the controls of an airplane.
- My family and I ate at a great restaurant last week. I ________ that you try it too.
- Giving someone an idea to change what they do.
- To go from one place to another.
- A person who carries out academic or scientific research.
- Someone who is paid to keep track of financial records and taxes.
- A type of ship that can submerge itself in water and travel below the surface.
30 Clues: The opposite of close. • A scientist who studies life. • To go from one place to another. • To like one thing more than another. • Different of varied from other things. • Items needed to carry out different tasks. • obstacles or hardships that get in your way. • Fulfilling; giving or providing satisfaction. • You might find the lost city of Atlantis here. • ...
Computer Terms 2023-04-03
Across
- A scam attempt to trick users into voluntarily giving up sensitive information, with some kind of bait.
- A computer and storage that hosts data for other devices to access and use.
- Storage or applications accessed over an internet connection (ex. Google Drive)
- consists of several aluminum platters, each of which requires a read/write head for each side.
- CDs, DVDs, and Blu-ray discs are a storage medium that uses lasers for both reading and writing information.
- The method uses to connect and communicate between devices.
- A program that infects a computer, replicates, and inserts malicious code.
- A device that sends data in to the PC/
- A short range wireless connection between peer devices (phone-headphones)
- A wireless internet connection used in homes and offices.
- The top manufacturer of desktop Graphics Processors
- a flash device with a storage capacity similar to a small hard drive.(abbr.)
- An optical disc originally designed to store audio
- Wireless Local Area Network
- Networking device that forwards data packets to destinations on other networks.
Down
- The standard wired network connection, uses RJ45 connectors.
- Refers to how RAM can access any data in the same amount of time.
- Small, portable storage device that plugs into USB ports.
- This holds all the other components together, tower or chassis
- The backbone of the computer, all components communicate through this. (abbr.)
- The operating system used on most desktops.
- Digital Versatile Disc, designed to store video and audio, as well as computer data.
- Adapter card dedicated to image/video processing.
- Name or identifier of a WiFi network
- The top manufacturer of desktop CPUs
- A collection of networks that allows the public to communicate with their computing devices.
- The display used for a desktop PC
- The cable that connects drives (HDD, SSD, Optical) to the MOBO.
- A device that requests data from a server.
- An optical disc that can store 25GB or more of data, uses a blue-violet laser.
- A device that sends information out to the user.
31 Clues: Wireless Local Area Network • The display used for a desktop PC • Name or identifier of a WiFi network • The top manufacturer of desktop CPUs • A device that sends data in to the PC/ • A device that requests data from a server. • The operating system used on most desktops. • A device that sends information out to the user. • ...
28.Famous Inventors 2023-08-12
Across
- Father of modern computing.
- Invented a wearable fetal monitor.
- Co-founded Apple.
- Developed the mobile phone.
- Isolated radium and polonium.
- Designed the life raft.
- Invented the lightning rod.
- Invented a low-cost sanitary napkin machine.
- Launched the first hot-air balloon.
- Discovered several chemical elements.
- Formulated the theory of relativity.
- Co-founded Apple and popularized computers.
- Pioneered radioactivity research.
- Invented a foldable baby stroller.
- Co-invented the transistor.
- Pioneered controlled powered flight.
- Introduced movable type printing.
- Explored black holes and cosmology.
- Developed the slide projector.
- Invented the World Wide Web.
- Patented the Bessemer process for steel-making.
- Pioneered wireless telegraphy.
- Invented a process to preserve food in glass containers.
- Described medical treatments.
- Built the world's first programmable computer.
- Invented achromatic lenses for telescopes.
- Developed the first high-level programming language.
- Invented the portable cathode-ray oscilloscope.
- Created life-size dinosaur sculptures.
- Created the television.
Down
- Invented the world's first typewriter.
- Invented a collapsible bottle.
- Invented the Bose noise-canceling headphones.
- Created a steam-powered vehicle in the 17th century.
- Designed innovative sculptures and buildings.
- Designed the guillotine.
- Developed the airplane.
- Introduced the concept of blood transfusion.
- Invented the Bowie knife.
- Discovered penicillin.
- Designed luxury automobiles.
- Improved the telescope.
- Laid the foundation for modern aviation.
- Co-invented the integrated circuit.
- Created cornflakes.
- Designed the first practical helicopter.
- Developed the polymerase chain reaction (PCR).
- Developed a folding wheelchair.
- Developed pasteurization for food safety.
- Contributed to DNA research.
- Invented the phonograph.
- Created the telephone.
- Created the baby pacifier.
- Pioneered statistical hypothesis testing.
- Created an automated flour mill.
- Co-founded Microsoft.
- Invented the "Mercitron" euthanasia machine.
- Developed the first commercially successful portable vacuum cleaner.
- Conceptualized flying machines.
- Revolutionized assembly-line manufacturing.
- Proposed the theory of evolution.
- Invented the mechanical calculator.
- Developed the first nuclear reactor.
- Invented the telegraph.
- Revolutionized electrical power.
65 Clues: Co-founded Apple. • Created cornflakes. • Co-founded Microsoft. • Discovered penicillin. • Created the telephone. • Developed the airplane. • Designed the life raft. • Improved the telescope. • Invented the telegraph. • Created the television. • Designed the guillotine. • Invented the phonograph. • Invented the Bowie knife. • Created the baby pacifier. • Father of modern computing. • ...
Cybersecurity Awareness Month 2023-08-24
Across
- A type of malware that denies a user's access to a system or data until a sum of money is paid
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data
- Unsolicited emails sent to many addresses
- Computer programs that can block, detect, and remove viruses and other malware
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information
- A collection of computers compromised by malicious code and controlled across a network
- A string of characters used to authenticate an identity
- A mechanism for creating a secure connection between a computing device and a computer network
- Software the compromises the operation of a system by performing an unauthorized function or process
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from a trusted source
- the ability of individuals to understand and exercise control over how information about themselves may be used by others
- A cybersecurity risk that originates from within an organization
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- An unauthorized user who attempts to or gains access to an information system
Down
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's device
- Extra copies of computer files that can be used to restore files that are lost or damaged
- Software designed to black malware from entering protected networks
- Software that is secretly installed into an information system without the knowledge of the system user or owner
- A process or measure used to verify a user's identity
- Faking the sending address of a transmission to gain illegal entry into a secure system
- A flaw or weakness in an information system that could be exploited
- Converting data into a form that cannot be easily understood by unauthorized people
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
- Part of the internet that isn't indexed by search engines
24 Clues: Unsolicited emails sent to many addresses • A process or measure used to verify a user's identity • A string of characters used to authenticate an identity • Part of the internet that isn't indexed by search engines • A cybersecurity risk that originates from within an organization • Software designed to black malware from entering protected networks • ...
UAS.TUGAS REPA APRILIA AUDIT & TATA KELOLA SI 2021-11-12
Across
- Specifying data collection procedures and validation and editing criteria merupakan tanggung jawab DA pada fungsi.... Data
- komputer yang tidak digunakan, pengelolaan kendali akses jaringan, pengawasan akses terhadap sistem informasI pengelolaan password, keamanan akses fisik adalah security …
- Framework pada it service management yang praktis untuk melakukan identifkasi, planning , delivering dan support layanan it
- Siklus implementasi cobit 5 terdapat .............. fase
- Mengatur kewenangan user dalam mengakses informasi, Mengontrol tata cara akses terhadap informasi dan sumber daya yang
- IT Service Continuity management termasuk dalam proses…
- Alat penguasaan IT yang membantu dalam pemahaman dan memanage resiko, manfaat serta evaluasi yang berhubungan
- Akses user yang tidak terkendali
- Alam Teknik analisis bisnis pengaruh saat ini dan potensial dari tekanan politik …
- Yang termasuk sumber daya ti
- Adalah termasuk langkah audit dari segi pelaporan …
- , dan Melakukan pengendalian mobile computing ataupun tele-networking
- Mengidentifkasi kesalahan pengkodean yaitu … melakukan review atas kode
- Adalah termasuk planning ruang lingkup audit manajemen audit ...
- Dibawah ini adalah sasaran audit
- Kebijakan keamanan untuk pembelian perangkat keras, pengelolaan standar kendali akses, pengelolaan akses pengguna,
- Setiap pengguna berhak mengakses dan menggunakan data yang sama termasuk dalam bagian
- …
- Berikut salah satu elemen tujuan audit …
- Menentukan bagaimana hardware di pelihara dengan urutan operasiyang baik, merupakan penjelasan dari?
- Audit program digunakkan sebgaai dasar untuk …
Down
- Risiko yang ada dalam proses suatu organisasi dan yang sepenuhnya berada di tangan organisasi untuk memitigasi.... Risks
- Data harus otentik, akurat, dan lengkap merupakan penjelasan dari tujuan data management yaitu?
- Service validation and testing adalah proses …
- Memberikan laporan kepada manajemen, merupakan ..... quality assurance
- IT disebut …
- Cobit versi 2 pada tahun 1998 yang menekankan pada tahap …
- Financial Management termasuk dalam proses service
- Oleh siapakah Program Testing dijalankan …
- Yang masuk kedalam kerangka kerja audit manajemen …
- Informasi tidak terkendali dan dapat hilang, Pengelolaan akses tidak terlaksana dengan baik, Persyaratan bisnis untuk kendali
- menjadi terhambat …
- Pihak ketiga yang melakukan proses pengolahan data atau pengembangan sistem yang melibatkan data perusahaan adalah
- Berikut tahapan yang perlu dievaluasi dari pengembangan SI adalah …
- bisnis disebut framework
- Termasuk jenis-jenis ancaman
- Adalah termasuk hubungan ekonomisasi, efsiensi dan efektivitas
37 Clues: … • IT disebut … • menjadi terhambat … • bisnis disebut framework • Yang termasuk sumber daya ti • Termasuk jenis-jenis ancaman • Akses user yang tidak terkendali • Dibawah ini adalah sasaran audit • Berikut salah satu elemen tujuan audit … • Oleh siapakah Program Testing dijalankan … • Service validation and testing adalah proses … • Audit program digunakkan sebgaai dasar untuk … • ...
technology 2025-01-13
Across
- Referring to communication or technology that uses radio waves instead of cables for connectivity.
- A network of remote servers hosted on the internet to store, manage, and process data.
- A device that stores energy and provides power to electronic devices.
- Something created by human ingenuity rather than occurring naturally, often referring to AI in technology.
- The process of transferring data from the internet to a local device.
- A software program designed to perform a specific function directly for the user.
- A networking device that forwards data packets between computer networks.
- The maximum amount of data that can be transmitted over an internet connection in a given amount of time.
- An electronic device that processes data according to a set of instructions.
- A flying robot that can be remotely controlled or fly autonomously using software-controlled flight plans.
- A handheld device that combines mobile phone capabilities with a wide range of features such as internet access, apps, and cameras.
- A camera that connects to a computer and allows for video input, often used in video conferencing.
- Malicious software designed to harm or exploit systems. Examples include viruses, ransomware, and spyware.
Down
- A wearable computing device in the form of a wristwatch with functionality similar to a smartphone.
- The process of keeping a device, system, or software functioning effectively through regular care.
- A wireless technology standard used for exchanging data between devices over short distances.
- A device used to cool and dehumidify indoor air.
- A set of rules or processes followed in calculations or problem-solving, often by a computer.
- A portable personal computer with a screen and keyboard.
- A device that projects an image or video onto a surface, such as a screen or wall.
- Improvements or fixes provided for software, often to enhance security or functionality.
- A device that converts sound into electrical signals for recording or transmission.
- A household appliance used to wash clothes automatically.
- A system of interconnected devices or systems that share resources and communicate with each other.
- A device worn over or in the ears to listen to audio privately.
25 Clues: A device used to cool and dehumidify indoor air. • A portable personal computer with a screen and keyboard. • A household appliance used to wash clothes automatically. • A device worn over or in the ears to listen to audio privately. • A device that stores energy and provides power to electronic devices. • ...
11 Digital Security 2025-02-20
Across
- A hidden way to bypass security measures
- The trail of data left by online activity
- A large-scale attack using multiple compromised devices to disrupt a service
- A tool that encrypts internet traffic and hides the user’s IP address
- A program that spreads by inserting copies of itself into other files
- Harassment or bullying that occurs online
- Configurations that specify which network traffic is allowed or blocked
- Any illegal act involving the use of a computer or related devices
- A tool that stores and generates secure passwords
- A process of verifying the identity of a user or device
- A legal doctrine allowing limited use of copyrighted material
- A cyberattack targeting computer networks
- Software used to detect and remove malware
- A self-replicating program that spreads through networks
- An attack that overloads a server to make it unavailable
- Manipulating people into revealing confidential information
Down
- Unauthorized access to a computer system or network
- A group of compromised computers controlled by a hacker
- An event that could cause loss or damage to computer hardware, software, or data
- A plan to restore data and systems after a failure
- How a person presents themselves online
- A potential security risk due to lack of encryption
- The process of converting data into a code to prevent unauthorized access
- An update that fixes security vulnerabilities in software
- A backup power device that provides electricity during an outage
- A licensing system that allows content sharing with conditions
- A type of malware disguised as a legitimate program
- The rules of conduct for interacting online
- Malicious software designed to harm or exploit any computing device
- A device that protects electronics from power surges
- A technique used to trick users into revealing personal information
- An authentication method that requires two forms of verification
- A type of malware that locks files and demands payment to unlock them
- Software that secretly collects user information without consent
- A security system that controls incoming and outgoing network traffic
35 Clues: How a person presents themselves online • A hidden way to bypass security measures • The trail of data left by online activity • Harassment or bullying that occurs online • A cyberattack targeting computer networks • Software used to detect and remove malware • The rules of conduct for interacting online • A tool that stores and generates secure passwords • ...
2023 Cybersecurity Awareness Month 2023-10-06
Across
- A process or measure used to verify a user's identity.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- Unsolicited emails sent to many addresses.
- Converting data into a form that cannot be easily understood by unauthorized people.
- A mechanism for creating a secure connection between a computing device and a computer network.
- A cybersecurity risk that originates from within an organization.
- The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- Software designed to block malware from entering protected networks.
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
- An unauthorized user who attempts to or gains access to an information system.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- A collection of computers compromised by malicious code and controlled across a network.
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
Down
- Software that compromises the operation of a system by performing an unauthorized function or process.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- Part of the internet that isn't indexed by search engines.
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- Computer programs that can block, detect, and remove viruses and other malware.
- A flaw or weakness in an information system that could be exploited.
- A type of malware that denies a user's access to a system or data until a sum of money is paid
22 Clues: Unsolicited emails sent to many addresses. • A process or measure used to verify a user's identity. • Part of the internet that isn't indexed by search engines. • A cybersecurity risk that originates from within an organization. • A flaw or weakness in an information system that could be exploited. • ...
Geografiya 2023-10-22
Across
- software that detects and removes viruses from a computer
- step-by-step instructions to solve a particular problem
- a type of network that communicates over a small geographical area, such as a single building
- a wireless technology that allows data transmission using radio waves
- software that detects and removes spyware from a computer
- a computer that offers a service to other devices on a network, such as file-sharing services and printer-sharing services
- carrying out an operation on data, e.g. querying a database or doing a calculation using data in a spreadsheet
- the programs or set of instructions that tell a computer what to do to complete a task; aspects of a device you cannot touch
- a network device that forwards data from one device to another
- a collection of computing devices connected to each other, either wired or wirelessly
- connected to the internet
- the software that users access to carry out tasks
- what happens when something interrupts the transmission of a signal; this could be a physical obstruction such as a wall, or other radio waves
Down
- raw facts and figures
- enables devices to connect to a network using Wi-Fi
- a simulation that superimposes digital images on the user's real- world environment and allows the user to interact with those images
- not allowed
- software or hardware that prevents unauthorised access to a network
- the instructions that tell a computer system how to complete a task
- a measure of the maximum number of bits that can be transmitted over a network or cable in a specified amount of time
- an application that uses rows and columns to organise data and carry out calculations using that data
- a popular type of copper cable used to transmit data between devices
- a type of network that communicates over a large geographical area, such as across a city or country.
- the collective name for all types of attacks on a computer or computer network
- the physical parts of a computer that you can touch and see, e.g. the processor, storage devices, input devices, output devices
25 Clues: not allowed • raw facts and figures • connected to the internet • the software that users access to carry out tasks • enables devices to connect to a network using Wi-Fi • step-by-step instructions to solve a particular problem • software that detects and removes viruses from a computer • software that detects and removes spyware from a computer • ...
IT xword 2023-12-26
Across
- Copy of files to prevent data loss.
- Information about other data.
- Temporary storage area to speed up data retrieval.
- Open-source operating system.
- Method of reasoning used in computers.
- Device connected to a computer but not part of the core computer architecture.
- Image capture of a computer screen.
- Markup language for creating web pages.
- Output of a hash function.
- Random Access Memory.
- Object-oriented programming language.
- Process of converting information into a code to prevent unauthorized access.
- Security barrier that monitors and controls incoming/outgoing network traffic.
- Programming language for web development.
- Two-dimensional barcode.
- Unit of digital information storage.
- High-speed data transfer interface.
- Portable computing device.
- Set of rules for building software applications.
- Self-replicating program designed to damage or disrupt a system.
- Storage and processing of data over the internet.
- Identification based on biological features.
- Unique hardware identifier for network communication.
- Unauthorized access to computer systems.
- Virtual Private Network.
- Series of instructions executed by a computer.
- Structured Query Language.
Down
- Organized collection of data.
- Logic that deals with true or false conditions.
- Software designed to harm or exploit.
- Step-by-step procedure or formula for solving a problem.
- Internet Service Provider.
- Large, powerful computer used for complex calculations.
- Cascading Style Sheets.
- Centralized computer providing services to other computers.
- Core component of an operating system.
- Connection point on a computer for external devices.
- Software for managing and organizing data.
- System of interconnected computers.
- Server-side scripting language.
- Global network of interconnected computers.
- Small piece of data stored on the user's computer by the web browser.
- Text-based interface for interacting with a computer.
- Logical operators such as AND, OR, NOT.
- Device that forwards data packets between computer networks.
- Identify and fix errors in computer programs.
- Point where two systems meet and interact.
- Unique address on the internet.
- Connectivity without the need for physical cables.
- Unwanted email or messages.
50 Clues: Random Access Memory. • Cascading Style Sheets. • Two-dimensional barcode. • Virtual Private Network. • Internet Service Provider. • Output of a hash function. • Portable computing device. • Structured Query Language. • Unwanted email or messages. • Organized collection of data. • Information about other data. • Open-source operating system. • Server-side scripting language. • ...
Celebration Day! 2024-10-03
Across
- The quality of being outstanding or extremely good
- Help given to resolve issues or problems
- Microsoft’s cloud computing service
- Achieving maximum productivity with minimum wasted effort
- A multinational technology company
- A means of solving a problem or dealing with a situation
- A strong feeling of support or allegiance
- A person who purchases goods or services
- To recognize the full worth of something
- A joyful occasion for special festivities
- Relationships or links between people
- The ability to adapt to changes easily
- The practice of ensuring that all individuals feel welcome
- A long-established custom or belief passed down
- Done at the right time, especially for service
- The introduction of new ideas or methods
- Something given in recognition of service
- A collaboration platform by Microsoft
- A relationship with customers or team members
- The practice of being or tendency to be positive
- Recognition and enjoyment of the good qualities of someone or something
- Existing or occurring on computers or the internet
- Education to improve skills in a specific area
- Involvement and participation in a service
- The act of exchanging information
- To acknowledge a significant event with festivities
Down
- Support that inspires confidence
- Acknowledgment of an achievement or service
- A Microsoft software suite for productivity
- The execution of a task or function
- Information about reactions to a product or service
- Openness and clarity in communication
- The last day of the traditional work week, often used for events
- Cooperative effort by a group to achieve a goal
- Working together to achieve a common goal
- The way in which two or more people are connected
- The act of solving a problem or dispute
- Assistance provided to customers
- Efforts to connect with customers and understand their needs
- The quality of being respectful and considerate
- The feeling of contentment from a service
- The ability to assess and initiate things independently
- New plans or strategies to achieve a goal
43 Clues: Support that inspires confidence • Assistance provided to customers • The act of exchanging information • A multinational technology company • The execution of a task or function • Microsoft’s cloud computing service • Openness and clarity in communication • Relationships or links between people • A collaboration platform by Microsoft • The ability to adapt to changes easily • ...
IT Sphere 2024-11-02
Across
- The standard markup language used to create and design web pages and applications.
- A set of commands written in a programming or scripting language that automates tasks or adds functionality to a software application.
- A structured collection of data that can be easily accessed, managed, and updated, typically stored in a computer system.
- The merging of different technologies or concepts into a single, cohesive, and efficient system (e.g., IT and telecommunications).
- The set of rules governing the format of data sent over the internet or local network.
- A branch of computer science dealing with the simulation of intelligent behavior in computers, enabling them to learn and make decisions.
- The process of identifying and removing errors or bugs from software and hardware to improve functionality.
- The process of converting data into a coded format to prevent unauthorized access, securing sensitive information.
- A collection of programs and applications that instruct a computer on how to perform tasks.
- The software that manages computer hardware and software resources, providing services for computer programs.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- In IT, often refers to a computer or system that processes data and performs tasks based on instructions.
- Measures and protocols used to protect data and information systems from unauthorized access, attacks, or damage.
- A set of rules and tools that allows different software applications to communicate with each other.
- A unit of digital information that consists of eight bits, commonly used to measure the size of data.
- A computer or system that provides data, resources, or services to other computers, known as clients, over a network.
- A technology that allows data storage and computing resources over the internet, providing scalable resources as needed.
- Information that is processed or stored by a computer, often used for analysis and decision-making.
- A collection of interconnected devices that communicate with one another, often used to share resources and information.
- A set of rules or conventions for data exchange between devices in a network, ensuring proper communication.
20 Clues: The standard markup language used to create and design web pages and applications. • The set of rules governing the format of data sent over the internet or local network. • A collection of programs and applications that instruct a computer on how to perform tasks. • ...
Crossword of Science Ascend 6! 2024-11-02
Across
- Space telescope providing deep-space images (6 letters).
- Chemical reaction involving the loss of electrons (9 letters).
- Planet known for its prominent ring system (6 letters).
- Satellite orbit type matching Earth’s rotation (12 letters).
- Step-by-step procedure in AI and computing (9 letters).
- Upper layer of Earth's atmosphere with high temperatures (11 letters).
- Explosive death of a star (9 letters).
- Pertaining to the Sun (5 letters).
- Pertaining to vibrations within Earth's crust, used in remote sensing (7 letters).
- Group of atoms bonded together (8 letters).
- Artificial body placed in orbit for communication or observation (9 letters).
- Rate of increase or decrease in a quantity, used in AI training (8 letters).
- Celestial body with a nucleus of ice and dust (5 letters).
- Fourth planet from the Sun, known as the Red Planet (4 letters).
- Famous comet seen from Earth every 76 years (6 letters).
- Remote sensing technology using radio waves (5 letters).
- Constant used in chemistry for mole calculation (8 letters).
- Bright celestial object at the center of a galaxy (6 letters).
- Collection of stars, dust, and gas bound together by gravity (6 letters).
Down
- Light wave orientation property studied in astrophysics (12 letters).
- Process by which plants produce energy from sunlight (13 letters).
- Chemical element used in spacecraft propulsion (5 letters).
- Radioactive element used in nuclear power (7 letters).
- Most abundant gas in Earth's atmosphere (8 letters).
- Optical device in satellites for capturing images (6 letters).
- Process where an atom or molecule gains or loses electrons (10 letters).
- Part of "Machine Learning," a core concept in AI (7 letters).
- Force of attraction between masses (7 letters).
- Instrument to observe distant objects in space (9 letters).
- Study of interaction between matter and electromagnetic radiation (12 letters).
- Galaxy closest to the Milky Way (8 letters).
- Closest planet to the Sun (7 letters).
- Potent greenhouse gas contributing to global warming (7 letters).
- Framework for deep learning (5 letters).
34 Clues: Pertaining to the Sun (5 letters). • Explosive death of a star (9 letters). • Closest planet to the Sun (7 letters). • Framework for deep learning (5 letters). • Group of atoms bonded together (8 letters). • Galaxy closest to the Milky Way (8 letters). • Force of attraction between masses (7 letters). • Most abundant gas in Earth's atmosphere (8 letters). • ...
APCSP Baddies Crossword 1 2025-05-08
Across
- Error that results when the number of bits is not enough to hold the number, like a car's odometer "rolling over"
- A network of independent but connected devices all over the world
- Data about data, like a camera storing the location, date/time, shutter speed, etc. for a digital photo
- The idea that some communities or populations have less access to computing than others
- Standards of communication that define how data is formatted, transmitted and routed over the internet
- The collection of interlinked website documents that you can view with a web browser like Wikipedia
- using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer
- Compressing data in a way that preserves all data away allows full recovery of the original
- Error that results when the number of bits is not enough to represent the actual number, like 3 digits to represent pi as 3.14
- Finding an approximate solution and not an exact solution to a complex problem like traveling salesman problem
- Requires the list to be sorted in order and then cutting the list in half
Down
- Asking lots of users online to help with something, like funding a project
- A boolean condition to determine which of two algorithmic paths are taken like if-then, else
- Using a looping control structure, like while, for, for each, repeat, repeat-until
- Scientific Research using public participation many of whom may or may not be scientists like collecting images of butterflies
- An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts
- Ability to work around problems, even if one connection fails there are still other paths to connect
- Compressing data in a way that loses some data away and makes it almost impossible to recover the original
- A kind of malware that tries to spread itself over the network to other computers
- Code flows line by line, one after another, like a recipe
- A computer hosting data for others to access
21 Clues: A computer hosting data for others to access • Code flows line by line, one after another, like a recipe • A network of independent but connected devices all over the world • Requires the list to be sorted in order and then cutting the list in half • Asking lots of users online to help with something, like funding a project • ...
UNIT 5: AI TOOLS AND TECHNOLOGIES 2025-04-25
Across
- An __________ is a software tool used to do a specific task.
- An open-source deep learning framework developed by Google for numerical computation.
- A core Python library for numerical operations, crucial in scientific computing and AI.
- AI helps improve online __________ engines like Google.
- AI can look at an __________ and recognize what’s in it.
- We __________ AI by giving it examples to study.
- We write __________ to give instructions to computers.
- Short for Natural Language Processing, a field of AI that deals with human language understanding.
- AI needs to __________ from data to get better.
- A __________ is a job or activity AI can do for you.
- Google's conversational AI model and part of their AI platform.
- A Python library used for data manipulation and analysis, often in AI workflows.
- A __________ is a small program that can do tasks automatically.
- We use AI __________ like apps and websites to make work easier.
- A data visualization library in Python used for creating static, interactive, and animated plots.
Down
- Machines learn from __________, which is just information.
- An open-source machine learning library developed by Facebook, used for deep learning.
- AI chatbots often read and write __________ to talk with users.
- An AI tool that helps generate written content for marketing and communication.
- AI can understand human __________ using speech recognition.
- A Python-based data visualization library built on top of Matplotlib, used for statistical plotting.
- An interactive chatbot developed by OpenAI that generates human-like text responses.
- Patterns or directions that indicate where AI is evolving.
- The __________ is where we store and run AI tools on the internet.
- __________ – Technology that makes machines smart like humans(SHORT FORM).
- A __________ is a machine that can move and work, sometimes using AI.
- The systematic computational analysis of data, often powered by AI.
- A real-time computer vision library used for image processing and computer vision tasks.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- An interactive coding notebook used for data science, combining live code, text, and visualizations.
30 Clues: AI needs to __________ from data to get better. • We __________ AI by giving it examples to study. • A __________ is a job or activity AI can do for you. • We write __________ to give instructions to computers. • AI helps improve online __________ engines like Google. • AI can look at an __________ and recognize what’s in it. • ...
Ivan crossword 6B 2024-03-20
Across
- it is a person who has a lot of status in a group of people and is the favorite in that group
- It is a person who is watchful or protective of attention, caution, concern, prudence, or regard usually towards an action or situation
- it is a person who reserves of the world because of fear and doesn’t like to socialize
- it is a person who can be easily damaged, emotionally or physically
- it is a thing which is an action or use that results in the unnecessary loss of something valuable
- it is a thing which is obligatory and you have to follow that rule
- it is a person who helps other people with their traumas and psychological problems
- it is a person who doesn’t have a fear of talking to new people
- it is a person who is thankful for the good in his life
- it is a person who likes that all have the same opportunities as he.
- It is a person who is generous, helpful, and thinks of other people's feelings
Down
- it is a thing which is used in computers so they are locked and it is composed of letters and numbers
- it is a person who is your partner in school and has a specific name
- it is a thing which is a standards-based sequence of planned experiences where students practice and achieve proficiency in content and applied learning skills
- it is a thing which is a personal computing device designed to fit on top of an office desk
- it is a thing which an input device used to enter characters and functions into the computer system by pressing buttons, or keys
- it is a person who studies objects in the sky, including planets, galaxies, black holes, and stars
- it is a time when species evolved and changed characteristics over generations
- it is a thing which is the quality or state of being able
- it is a thing which is the force of attraction by which terrestrial bodies tend to fall toward the center of the earth
20 Clues: it is a person who is thankful for the good in his life • it is a thing which is the quality or state of being able • it is a person who doesn’t have a fear of talking to new people • it is a thing which is obligatory and you have to follow that rule • it is a person who can be easily damaged, emotionally or physically • ...
Data Science 2025-05-20
Across
- A type of model that uses past values to forecast future values
- A data point that is significantly different from the others
- A technique to map large data to a fixed-size index
- A measure of the linear relationship between two variables
- A resampling technique to estimate statistical variability
- A multi-dimensional array used in deep learning
- A function used to introduce non-linearity in a neural network
- A technique to enable linear algorithms to operate in non-linear spaces
- The process of finding the best parameters for a model
- A group of similar data points
- A mathematical function describing the probability of different values
- A statistical model to predict continuous outcomes
- A basic computing unit in a neural network
- A measure of uncertainty or randomness in a probability distribution
- A variable that influences both the dependent variable and independent variable, causing a spurious association.
Down
- A representation of categorical data in a dense vector space
- A characteristic or attribute of a dataset used in modeling
- A phenomenon where a model is too complex and fits the training data too well
- A systematic error or distortion in a model or algorithm
- The process of selecting a subset of data from a larger population
- The process of evaluating a model's performance on unseen data
- A measure of the rate of change of a function with respect to its inputs
- A technique to scale data to a common range
- A mathematical system that undergoes transitions between states according to probabilistic rules
- A combination of multiple models to improve performance
- A statement or assumption tested using data and statistical methods
- The process of selecting and transforming raw data into suitable features for modeling
- An ensemble learning method using multiple decision trees
- A technique to prevent overfitting by adding a penalty term to the loss function
- A function used to transform data into a higher-dimensional space
- A dimensionality reduction technique using orthogonal components
31 Clues: A group of similar data points • A basic computing unit in a neural network • A technique to scale data to a common range • A multi-dimensional array used in deep learning • A statistical model to predict continuous outcomes • A technique to map large data to a fixed-size index • The process of finding the best parameters for a model • ...
Lesson 1 Introduction 2025-08-15
Across
- What is a hyperlink that, when clicked, sends a Website visitor to a page or resource that does not exist on the server?
- A(n) _____________ administrator is an individual who is responsible for the maintenance and security of an organization's database resources and data.
- A(n) ____________ administrator is an individual who manages and maintains network servers.
- What is the de facto standard for search engine sites?
- A Web ___________ developer primarily develops server-side Web applications.
- An individual who installs, modifies, and repairs personal computer (PC) hardware components is called an PC repair _______________.
- A mobile application ____________ is an individual who develops Websites and/or applications for mobile devices.
- An individual who determines the visibility of Websites across multiple clients and search engines is called an _______ analyst.
- A(n) _____________ analyst is an individual who examines an organization's security requirements and determines the necessary infrastructure.
- A(n) _______ _______ technician diagnoses and resolves users' technical hardware and software problems.
Down
- _________ (computers) typically do not have phone service, but are capable of high-speed Internet connections.
- What is the management and processing of information using computers and computer networks?
- __________ is the practice of copying data from one source, such as a database, to another.
- A(n) Website __________ is responsible for the organization and appearance of a website.
- An individual who creates the overview plan of a Website's development is a Web ________.
- What term is used that describes the ability for a system to function well when its workload is increased or hardware is added to meet user's need?
- What is the study of how a particular knowledge domain, or system, is organized?
- Request for Comment is a document published by the IETF that details information about standardized Internet _________ and those in various development stages.
- An individual who manages and maintains a network infrastructure is called a network __________.
- A(n) Website __________ analyzes Website statistics to determine the site's effectiveness.
- What is the premier social networking site on the Web?
- ________ computing is software and platform services that are hosted by a remote data center and provided to organizations over the Internet.
22 Clues: What is the premier social networking site on the Web? • What is the de facto standard for search engine sites? • A Web ___________ developer primarily develops server-side Web applications. • What is the study of how a particular knowledge domain, or system, is organized? • ...
COMPUTER CROSSWORD(DIGTAL LITERCY UNIT) 2022-10-14
Across
- a quick web browser that is free to use.
- unit of measurement which is technically one cycle per second, is used to measure clock speed.
- an operating system
- A keyboard shortcut that opens a new tab in a browser.
- software that secretly gathers personal information about you.
- an popular app teens use to chat with their friends
- An app that teachers use as an online classroom.
- TUNES a multimedia software app that prodcasts music and adio
- is to write text documents and editing them directly on your web browser.
- google web browser where you store your docs
- A circuit board that can connect to the important components of a computer.
- a gigabyte of message storage that is offered to users as part of a free Web-based email service.
- A central processing unit in a computer
- the data is kept in short-term memory until the CPU requires it.
- computing is the on-demand availability of computer system resources, particularly data storage and processing power, without the user directly controlling them.
Down
- A keyboard shortcut that allows you to go to the next tab in your browser.
- an action which Multiple users can access the same file data thanks to filing sharing.
- a solid-state storage system that stores data persistently using integrated circuit assemblies
- an input device that loads data into your computer, including letters, words, and numbers.
- (MB) is a data measuring unit used to describe media storage or digital computers.
- a piece of computer software that executes a particular task for the user, that you can download or install.
- someone takes to gain unauthorized access to a device.
- connector transmits power or data between devices or positions for your wifi.
- a non-volatile memory type found in computers and other electronics (clue starts with an R)
- A computer component that Stores data that is needed to start up a computer.
- a computer component that uses information from the CPU and applications to arrange images upon that display on the monitor.
- an input device that users use to point to a place on the display screen
27 Clues: an operating system • A central processing unit in a computer • a quick web browser that is free to use. • google web browser where you store your docs • An app that teachers use as an online classroom. • an popular app teens use to chat with their friends • A keyboard shortcut that opens a new tab in a browser. • someone takes to gain unauthorized access to a device. • ...
Computer Programming 1-6 2022-02-15
Across
- function that writes text on the canvas
- command used to mix colors (Red, Green, Blue)
- data sets that are too large and complex for traditional data processing applications
- symbol that defines a math operation
- gives the remainder of integers which have been divided
- tests if both conditions are true
- setting a starting value for a variable
- the computer sends information to the user
- Central Processing Unit
- long term memory
- represent a real world situation using a computer
- they physical machine
- module used to create random numbers in programs
- precise set of rules for how to solve a problem
- numeric data stored in a computing device
- the symbols used to compare values in true/false tests
- the container that holds the graphics created by a program
- information sent to a function
- tests if at least one condition is true
- pulls in code to add functions to your code
- collection of commands given a name
- keywords used to join test conditions in if-statements
- a function that creates a frame to hold a graphic drawing
Down
- takes the opposite
- special characters marked with the /
- the user send information to the computer
- instructions that a computer follows
- run experiments using computer models
- translates codes to machine language
- returns a set of numbers
- Memory short term memory
- function that draws a circle on the screen
- functin that draws a polygon on the canvas
- collection of code and functions that perform similar tasks
- programs that run on hardware
- function that draws a line on the canvas
- command that loops until a condition is false
- used to let the program choose between true/false options
- command that tests a true/false condition
- data and information in the real world
- command displays text and numbers on the screen
- a variable used to add up a list of numbers
- storing a value in a variable
- command to repeat code
44 Clues: long term memory • takes the opposite • they physical machine • command to repeat code • Central Processing Unit • returns a set of numbers • Memory short term memory • programs that run on hardware • storing a value in a variable • information sent to a function • tests if both conditions are true • collection of commands given a name • special characters marked with the / • ...
Mobile Device Crossword Puzzle 2022-04-27
Across
- The acronym for this is MAPI.
- A _____________ is where devices connect using WiFi to share a cellular data connection.
- These combine the functions of a watch and some functions of mobile devices.
- These are designed to clip onto clothing or be worn on the wrist and are used for tracking a person's daily activity and body metrics as they work toward their fitness goals.
- A _______ cable is used to connect a mobile device to an electrical outlet charger or to connect to another device in order to charge and/or transfer data.
- There are two different kinds of these.
- This wireless technology allows data exchange over a short distance between two _________-enabled devices or connect to other _________-enabled peripheral devices, such as speakers or headphones.
- The acronym for this is IMEI.
- If a mobile device is ________ enabled, it can be used to control other ________ controlled devices remotely, such as a TV, set top box, or audio equipment.
- one example of these is the Amazon Kindle.
Down
- ________________ or vendor-specific ports can be found on some mobile devices.
- The acronym for this is GSM.
- _______________ are clothing or accessories that have miniature computing devices. Smart watches, fitness monitors, and smart headsets are some examples.
- ___ enables mobile devices to establish radio communications with other devices by placing the devices closer together or by touching them together.
- The _____________________ is used to connect Apple devices to host computers and other peripherals such as USB battery chargers, monitors, and cameras.
- _____________ cards were designed for use in portable devices such as cameras, MP3 players, and laptops.
- A ___ receiver in the phone uses satellites to determine the geographic location of the device.
- A ____ cable is and port can be plugged in either direction.
- This uses your cellular phone as a modem for another device, such as a tablet or laptop. The connection is made over a USB cable or Bluetooth.
- A _______ is a small card that contains information used to authenticate a device to mobile telephone and data providers.
- This setting turns off all cellular, as well as Wi-Fi and Bluetooth radios.
21 Clues: The acronym for this is GSM. • The acronym for this is MAPI. • The acronym for this is IMEI. • There are two different kinds of these. • one example of these is the Amazon Kindle. • A ____ cable is and port can be plugged in either direction. • This setting turns off all cellular, as well as Wi-Fi and Bluetooth radios. • ...
Crossword lesson 11 2022-04-07
Across
- - virtual location for applications, documents, data
- - a computer program designed to carry out a specific task other than one relating to the operation of the computer itself
- - to interact with the folder to access its contents with the mouse or other input device
- - the ability to execute the streams that flow from the main memory to an output device like a screen
- - the utility software that is used to restore the data on a disk and/or to repair its file system
- - programs that are serving the purpose to let the system function
- - the ability of a file to be altered so it will need smaller disk space to be stored
- - the ability to carry out separate tasks at the same time
- - to be a vessel for a file or information
- - to become visible
- - to interact with the system or the information therein
Down
- - to repair the damaged files by returning their functionality
- - the ability to execute the stream flowing from an input device like a keyboard to the main memory
- - to increase the grade of computing power
- - the devices from which the computer system is composed
- - to spread the code to another system or module
- - app that is used to put files in a container so they would need less space to be stored
- - a computer memory address that contains another address (as of desired data)
- - software is designed to work for people who experience disabilities, such as visual, hearing, motor, or cognitive impairments, and who may access software using an assistive device
- - to make changes in a code or computer system
- - the list of human-readable instructions that a programmer writes—often in a word processing program—when he is developing a program
- - the apps that are used to increase the functionality of a computer software
- - when the system is easy to use and comfortable to interact with by the consumer
- - to become invisible
- - the link to the file or application made in a draphic format
25 Clues: - to become visible • - to become invisible • - to increase the grade of computing power • - to be a vessel for a file or information • - to make changes in a code or computer system • - to spread the code to another system or module • - virtual location for applications, documents, data • - the devices from which the computer system is composed • ...
software lvl 3 2022-12-23
Across
- an open-source operating system modelled on UNIX.
- a free web-based email service that provides users with 15 GB of storage for messages and the ability to search for specific messages.
- a Web browser that provides some advantages over other browsers from Mozilla or Microsoft.
- software that provides the low-level control for a device's specific hardware.
- an operating system used for mobile devices manufactured by Apple Inc.
- a free open-source Web browser created by the American software company Mozilla Corporation.
- a software company that combines open source Linux operating system components with related programs into a distribution package that customers can order.
- a free easy-to-use, multi-track audio editor and recorder for Windows, macOS, GNU/Linux and other operating systems.
- a data compression, archiving, and encryption tool for Windows.
- a discontinued mobile operating system (OS) and computing platform designed for smartphones.
Down
- a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.
- was launched in 1996 and is one of the most popular open-source image editing software present in the market right now.
- a basic word processor available in every version of Microsoft's operating systems since Windows 95.
- is the computer operating system (OS) for Apple desktops and laptops.
- a multiuser, multitasking operating system (OS) designed for flexibility and adaptability.
- is a web browser developed by the North American company Apple for its macOS(used by MAC computers) and iOS (used by iPhone, iPod and iPad) operating systems.
- a desktop operating system developed by Microsoft.
- is the computer operating system that Sun Microsystems provides for its family of Scalable Processor Architecture-based processors as well as for Intel-based processors.
- is a specific class of computer software that provides the low-level control for a device's specific hardware.
- is the speedy, simple and secure operating system that powers every Chromebook.
20 Clues: an open-source operating system modelled on UNIX. • a desktop operating system developed by Microsoft. • a data compression, archiving, and encryption tool for Windows. • is the computer operating system (OS) for Apple desktops and laptops. • an operating system used for mobile devices manufactured by Apple Inc. • ...
session 3 2023-01-25
Across
- n. [uncountable] the scientific study of the physical structure of humans, animals or plants
- adj.. (often disapproving) tending to follow what is done or considered acceptable by society in general; normal and ordinary, and perhaps not very interesting
- v. [intransitive, transitive] to move slowly from side to side; to move something in this way
- n. an arm or a leg; a similar part of an animal, such as a wing
- v. undergo something to experience something, especially a change or something unpleasant
- adj. having a definite limit or fixed size
- v. capture somebody/something to catch a person or an animal and keep them as a prisoner or shut them in a space that they cannot escape from
- adj. [only before noun] used to emphasize that you are referring to one individual person, thing or type of thing and not others
- n. [uncountable] (formal) (of sound) the quality of being resonant
- n. a person who has had an arm or a leg amputated
Down
- n. the act of cutting off somebody's arm, leg, finger or toe in a medical operation
- adj. behaving like a magnet; that can be attracted by a magnet
- n. [countable, uncountable] a movement that you make with your hands, your head or your face to show a particular meaning
- v. to leave a person or place very quickly, especially because you are afraid of possible danger
- adj. well known for being bad or evil
- n. (British English also power point) (North American English also outlet, receptacle) a device in a wall that you put a plug into in order to connect electrical equipment to the power supply of a building
- adj. made or produced to copy something natural; not real
- n. (computing) the way a computer program presents information to a user or receives information from a user, in particular the layout of the screen and the menus
- n. a fixed idea or image that many people have of a particular type of person or thing, but which is often not true in reality and may cause hurt and offence
- adj. so bad or difficult that you cannot tolerate it; completely unacceptable
20 Clues: adj. well known for being bad or evil • adj. having a definite limit or fixed size • n. a person who has had an arm or a leg amputated • adj. made or produced to copy something natural; not real • adj. behaving like a magnet; that can be attracted by a magnet • n. an arm or a leg; a similar part of an animal, such as a wing • ...
id21 e strodans 2022-06-13
Across
- ko dators izmanto lai to varetu indentificet interneta
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- a software-defined number associated to a network protocol that receives or transmits communication for a specific service.
- vienā tīklā izmantojamo IP adrešu translēšana IP adresēs
- what sends internet trough a cable
- savstarpēji saslēgtu datortīklu vispasaules sistēma, kas pārsūta datus.
- komandrinda, kas ir automatiski ieladeta uz OS/2, eComStation, ArcaOS, Microsoft Windows un ReactOS. (command prompt)
- kas automatiski iedod ip adresi (kads protokols)
- Datņu pārsūtīšanas protokols
- Wide Area Network
- an established set of rules that determine how data is transmitted between different devices in the same network.
- the biggest size of IP addresses.
- Metropolitan Area Network
Down
- virtual local area network
- describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
- the smallest data unit
- a computer program or device that provides a service to another computer program and its user
- kas savieno divus tiklus?
- Local Area Network
- in what are computers connected in
- a unit of frequency equal to one billion hertz. It is commonly used to measure computer processing speed
- the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
- communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.
- a communications protocol that is primarily used to establish low-latency and loss-tolerating connections between applications on the internet
- the smallest size of IP addresses.
- Domēnu nosaukumu sistēma
- Saderīgās ierīces var izveidot savienojumu, izmantojot bezvadu piekļuves punktu
- allows Ethernet cables to transmit data and power simultaneously using a single network cable.
- Personal Area Network
- a unique physical address assigned to each network adapter in a computer, or mobile device.
30 Clues: Wide Area Network • Local Area Network • Personal Area Network • the smallest data unit • Domēnu nosaukumu sistēma • kas savieno divus tiklus? • Metropolitan Area Network • virtual local area network • Datņu pārsūtīšanas protokols • the biggest size of IP addresses. • in what are computers connected in • what sends internet trough a cable • the smallest size of IP addresses. • ...
Unit 4 & 5 Review 2023-02-27
Across
- automatically handles the deployment details of capacity provisioning, load balancing, automatic scaling, and application health monitoring of an application.
- A collection of datasets organized as records and columns in tables. In a relational database system, relationships are defined between the database tables.
- A web service that makes it easy to deploy, operate, and scale an in-memory cache in the cloud.
- A relational database engine compatible with MySQL and PostgreSQL, built for the cloud, combining the performance and availability of traditional enterprise databases with the simplicity and cost-effectiveness of open-source databases.
- This service gives developers and businesses an easy way to create a collection of related AWS resources and provision them in an orderly and predictable fashion.
- The AWS nonrelational database service. Data is stored in key-value pairs.
- A computing method that lets users efficiently and selectively extract and query data to analyze it from different points of view.
- a high-speed data storage layer that stores a subset of data, typically transient in nature, so that future requests for that data are served up faster than is possible by accessing the data’s primary storage location.
- Volatile, temporary memory storage.
Down
- automatically distributes incoming application traffic across multiple targets, such as Amazon Elastic Compute Cloud (Amazon EC2) instances, containers, IP addresses, and AWS Lambda functions.
- A category of data processing that is focused on transaction-oriented tasks.
- lets developers create and manage relational databases in the cloud.
- A collection of AWS resources that you can manage as a single unit.
- The AWS data-warehousing service that can store massive amounts of data in a way that makes it fast to query for business intelligence (BI) purposes.
- Also called a "NoSQL" or "Not only SQL" database. Each entry is stored in a key-value pair in which each key is attached to values. Each entry can have a different number of values attached to a key.
- An open-source relational database management system.
16 Clues: Volatile, temporary memory storage. • An open-source relational database management system. • A collection of AWS resources that you can manage as a single unit. • lets developers create and manage relational databases in the cloud. • The AWS nonrelational database service. Data is stored in key-value pairs. • ...
Jorge Mares vocab 2 2017-03-03
Across
- computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
- (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
- bits per second is a common measure of data speed for computer.
- was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model.
- for Joint Photographic Experts Group, and pronounced jay-peg. JPEG is a lossy compression technique for color images.
- is the most effective way to achieve data security.
- method is used to connect computers in a company or home network.
- known as Web browser. A client software program that runs against a Web server
Down
- unit of memory or data equal to 1,024 (210) bytes.
- Name System) The Internet's system for converting alphabetic names into numeric IP addresses.
- 3D printer is a computer-aided manufacturing (CAM) device that creates three-dimensional objects.
- hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.
- spreadsheet cell is analogous to a field in database management systems.
- page - Computer Definition. Also known as page and Web page. A document that serves as a starting point on a Web site.
- is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web.
- a computer network or data network is a telecommunications network which allows nodes to share resources.
- word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- scanner is an input device that scans documents and images, which can be imported into a computer.
18 Clues: unit of memory or data equal to 1,024 (210) bytes. • is the most effective way to achieve data security. • bits per second is a common measure of data speed for computer. • method is used to connect computers in a company or home network. • spreadsheet cell is analogous to a field in database management systems. • ...
Cyber Hackers & Security 2023-06-01
Across
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
- A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
- Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
- Software designed to detect and destroy computer viruses
- Interconnected computing devices that can exchange data and share resources with each other
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
- It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
- Creation of a false identity by a cybercriminal with the intention of defrauding a victim
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- Software that automatically displays or downloads advertising material (often unwanted) when a user is online
- Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
- Baiting a trap for hackers
- The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th
16 Clues: Baiting a trap for hackers • Software designed to detect and destroy computer viruses • Creation of a false identity by a cybercriminal with the intention of defrauding a victim • Interconnected computing devices that can exchange data and share resources with each other • ...
Cyber Hackers & Cybersecurity 2023-06-01
Across
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
- A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
- Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
- Software designed to detect and destroy computer viruses
- Interconnected computing devices that can exchange data and share resources with each other
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
- It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
- Creation of a false identity by a cybercriminal with the intention of defrauding a victim
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- Software that automatically displays or downloads advertising material (often unwanted) when a user is online
- Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
- Baiting a trap for hackers
- The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th
16 Clues: Baiting a trap for hackers • Software designed to detect and destroy computer viruses • Creation of a false identity by a cybercriminal with the intention of defrauding a victim • Interconnected computing devices that can exchange data and share resources with each other • ...
Kinkelars Class 2023-10-30
Across
- is a mode of computer data storage in which digital data is stored on servers in off-site locations
- uses internet-based social media platforms to connect with friends, family, or peers.
- is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network
- defines and links data on the Web (or within an enterprise) by developing languages to express rich, self-describing interrelations of data in a form that machines can process.
- It creates a Wi-Fi network that can be shared by multiple devices within about 10 meters of the hotspot
Down
- a software application developed specifically for use on small, wireless computing devices, such as smartphones and tablets, rather than desktop or laptop computers
- a message sent via the internet that appears on the recipient's screen as soon as it is transmitted.
- a computer network that links devices within a building or group of adjacent buildings.
- a mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, internet access, and an operating system capable of running downloaded applications.
- a string of words that must be used to gain access to a computer system or service.
- a regularly updated website or web page, typically one run by an individual or small group
- an arrangement of intersecting horizontal and vertical lines.
- works by converting voice calls, faxes and other information into digital signals
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- the process of sorting through large data sets to identify patterns and relationships that can help solve business problems through data analysis
- the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer
16 Clues: an arrangement of intersecting horizontal and vertical lines. • works by converting voice calls, faxes and other information into digital signals • a string of words that must be used to gain access to a computer system or service. • uses internet-based social media platforms to connect with friends, family, or peers. • ...
west ham 2016-11-30
Across
- error In computer science, a syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language. For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected.
- A number which is not a FRACTOIN
- type a particular kind of data item, as defined by the values it can take, the programming language used, or the operations that can be performed on it.
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- not consistent or having a fixed pattern; liable to change
- loop In computer science a for-loop (or simply for loop) is a control flow statement for specifying iteration, which allows code to be executed repeatedly.
- variable In computer programming, a global variable is a variable with global scope, meaning that it is visible (hence accessible) throughout the program, unless shadowed. The set of all global variables is known as the global environment or global state.
- loop In most computer programming languages, a while loop is a control flow statement that allows code to be executed repeatedly based on a given Boolean condition. The while loop can be thought of as a repeating if statement.
Down
- material consisting of threads of cotton, hemp, or other material twisted together to form a thin length.
- Link (things) together in a chain or series
- identify and remove errors from (computer hardware or software).
- denoting a system of algebraic notation used to represent logical propositions by means of the binary digits 0 (false) and 1 (true), especially in computing and electronics.
- rest or move on or near the surface of a liquid without sinking.
13 Clues: A number which is not a FRACTOIN • Link (things) together in a chain or series • not consistent or having a fixed pattern; liable to change • identify and remove errors from (computer hardware or software). • rest or move on or near the surface of a liquid without sinking. • ...
U11 - Mod 1 Key Terms 2024-09-10
Across
- (6,7) refers to teenagers or inexperienced threat actors running existing scripts, tools, and exploits, to cause harm, but typically not for profit.
- (10,2,6) are signs that a potential cybersecurity attack is in progress.
- are threat actors who are motivated to make money using any means necessary. While sometimes they work independently, they are more often financed and sponsored by criminal organizations.
- A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
- (acronym) provides virtual computing resources such as hardware, software, servers, storage, and other infrastructure components. An organization will buy access to them.
Down
- (6,6) is a path by which a threat actor can gain access to a server, host, or network.
- (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
- (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
- a term that refers to grey hat hackers who rally and protest against different political and social ideas.
- (acronym) It allows an organization to develop, run and manage its applications on the service's hardware using its tools.
- (acronym) provides organizations with software (stored in the cloud) that is centrally hosted and accessed by users via a web browser, app, or other software.
- (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
- (acronym) Threat actors use echo packets (pings) to discover subnets and hosts on a protected network, to generate DoS flood attacks, and to alter host routing tables.
13 Clues: (10,2,6) are signs that a potential cybersecurity attack is in progress. • (6,6) is a path by which a threat actor can gain access to a server, host, or network. • a term that refers to grey hat hackers who rally and protest against different political and social ideas. • ...
207 2017-05-13
Across
- “The one program running at all times on the computer” is the _______.
- Failure of an application can generate _________ file capturing memory of the process
- is nonvolatile memory that is used like a hard drive
- is periodic sampling of instruction pointer to look for statistical trends
- Disks __________ provide the bulk of secondary storage for modern computer systems.
- is logical extension in which CPU switches jobs so frequently that users can interact with each job while it is running, creating interactive computing. Also called as multitasking
- ____________ can be avoided if we number all resources, and require that processes request resources only in strictly increasing (or decreasing) order.
- A bus is a set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires.
- ____________ write, the data are stored in the cache, and control returns to the caller.
- __________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered. Thus, the calling routine must wait for the data to reach the disk drive before it can proceed.
- Secondary storage extension of main memory that provides large ___________ storage capacity
- First Come First Serve
- A _______ is a region of fastmemorythat holds copies of data.
- ________ file system (VFS)
- OS generate ____________ containing error information
- Unix File _____ (UFS)
- A ____________ is a collection of electronics that can operate a port, a bus, or a device.
- Controls and coordinates use of hardware among various applications and users
- only large storage media that the CPU can access directly.
- provides basic computing resources CPU, memory, I/O devices
- Application ___________ Interface (API)
- "Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it."
- type of multiprocessing wherein each processor is assigned a specific task.
- Operating system failure can generate _________ file containing kernel memory
- a job that is finding and fixing errors, or bugs
- Any entity containing a file system is generally known as a ________.
Down
- _____________ allocation solves all problems of contiguous allocation. With this kind of allocation, each file is a linked list of disk blocks; the disk blocks may be scattered anywhere on the disk
- File _______ Block (FCB)
- _____________ allocation requires that each file occupy a set of contiguous blocks on the disk.
- copying information into faster storage system; main memory can be viewed as a cache for secondary storage
- type of multiprocessing wherein each processor performs all tasks
- illustrates timeline of processes
- defense of the system against internal and external attacks
- Each set of operations for performing a specific task is a __________.
- OS natively compiled for CPU, running guest OSes also natively compile
- a “loop back” file system that allows one file system to be accessed in place of another one.
- A ________ is a buffer that holds output for a device, such as a printer, that cannot accept interleaved data streams.
- any mechanism for controlling access of processes or users to resources defined by the OS
- A ________ is a memory area that stores data being transferred between two devices or between a device and an application
- A _________ or exception is a software-generated interrupt caused either by an error or a user request
- People, machines, other computers
- ________ allocation solves this problem by bringing all the pointers together into one location: the index block.
- The simplest method of implementing a directory is to use a ________ of file names with pointers to the data blocks.
- request to the OS to allow user to wait for I/O completion.
- We can take a resource from one process and give it to other. This will resolve the deadlock situation, but sometimes, it does causes problems.
- Device controller informs CPU that it has finished its operation by causing an ________.
- (Resource Allocation Sequence) The process will place a request to the OS to grant one of the instances of a particular resource to the process.
- ___________ file directory (MFD)
- program obtains information concerning the specific configuration of the hardware system
- r allows direct command entry, sometimes implemented in kernel, sometimes by systems program
50 Clues: Unix File _____ (UFS) • First Come First Serve • File _______ Block (FCB) • ________ file system (VFS) • ___________ file directory (MFD) • illustrates timeline of processes • People, machines, other computers • Application ___________ Interface (API) • a job that is finding and fixing errors, or bugs • is nonvolatile memory that is used like a hard drive • ...
Operating System 2017-05-14
Across
- The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
- A ____ file is a sequence of characters organized into lines
- A connection point that devices use to communicate with the machine
- The _____ register specifies the size of the range
- _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
- The advantages of distributed systems have resulted in an industry-wide trend toward _____
- _____ objects include the CPU, memory segments, printers, disks, and tape drives
- _____ objects include files, programs, and semaphores
- Contains information about the file, including ownership, permissions, and location of the file contents
- We say that a system is _____ if its resources are used and accessed as intended under all circumstances
- One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
- The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
- _____ paging is commonly used in virtual memory systems
- A _____ kernel allows a process to be preempted while it is running in kernel mode.
- One measure of work is the number of processes that are completed per time unit
- The interpreter used for systems with multiple command interpreters to choose from
- An ____ file is a series of code sections that the loader can bring into memory and execute
- CPU _____ vary in number and type, depending on the computer architecture
- Protecting critical regions through the use of locks
- With _____ loading, a routine is not loaded until it is called
- The _____ register holds the smallest legal physical memory address
- One program running at all times on the computer
- Is a complete round of communication
- Nonvolatile memory that is used like a hard drive
- Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
- To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
- The _____'s algorithm less efficient than the resource-allocation graph scheme
Down
- Access to a page marked invalid causes a ____ fault
- A _____ program manages the execution of user programs to prevent errors and improper use of the computer
- The underlying hardware system that runs the virtual machines
- memory that is dynamically allocated during process run time
- Each ____ process is provided with a virtual copy of the host
- The terms _____ and cracker are for those attempting to breach security
- Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
- A protection _____ specifies the resources that the process may access
- The potential for a security violation, such as the discovery of a vulnerability
- A _____ kernel does not allow a process running in kernel mode to be preempted
- The user’s view of the computer varies according to the _____ being used
- A program in execution
- A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
- Specifies a set of functions that are available to an application programmer
- The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
- Communication links are controlled by special communication _____
- ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
- The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
- A _____ can occur only if four necessary conditions hold simultaneously in the system
- _____ memory involves the separation of logical memory as perceived by users from physical memory
- _____ parallelism involves distributing not data but tasks across multiple computing cores
- based on the Berkeley Fast File System
- _____ programs are associated with the operating system but are not necessarily part of the kernel
- A ____ crash normally cannot be repaired; the entire disk must be replaced
- A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
- Creates and runs virtual machines by providing an interface that is identical to the host
53 Clues: A program in execution • Is a complete round of communication • based on the Berkeley Fast File System • One program running at all times on the computer • Nonvolatile memory that is used like a hard drive • The _____ register specifies the size of the range • Access to a page marked invalid causes a ____ fault • Protecting critical regions through the use of locks • ...
Operating System 2017-05-14
Across
- The underlying hardware system that runs the virtual machines
- A _____ can occur only if four necessary conditions hold simultaneously in the system
- Creates and runs virtual machines by providing an interface that is identical to the host
- A connection point that devices use to communicate with the machine
- ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
- The terms _____ and cracker are for those attempting to breach security
- _____ programs are associated with the operating system but are not necessarily part of the kernel
- The advantages of distributed systems have resulted in an industry-wide trend toward _____
- A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
- The user’s view of the computer varies according to the _____ being used
- One program running at all times on the computer
- The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
- memory that is dynamically allocated during process run time
- A _____ kernel allows a process to be preempted while it is running in kernel mode.
- Contains information about the file, including ownership, permissions, and location of the file contents
- One measure of work is the number of processes that are completed per time unit
- _____ parallelism involves distributing not data but tasks across multiple computing cores
- One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
- An ____ file is a series of code sections that the loader can bring into memory and execute
- _____ paging is commonly used in virtual memory systems
- The _____ register holds the smallest legal physical memory address
- Nonvolatile memory that is used like a hard drive
- _____ objects include files, programs, and semaphores
- With _____ loading, a routine is not loaded until it is called
- Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
- Access to a page marked invalid causes a ____ fault
- _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
Down
- The interpreter used for systems with multiple command interpreters to choose from
- To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
- The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
- A _____ program manages the execution of user programs to prevent errors and improper use of the computer
- The _____ register specifies the size of the range
- based on the Berkeley Fast File System
- A ____ crash normally cannot be repaired; the entire disk must be replaced
- A _____ kernel does not allow a process running in kernel mode to be preempted
- The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
- A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
- A ____ file is a sequence of characters organized into lines
- Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
- A program in execution
- We say that a system is _____ if its resources are used and accessed as intended under all circumstances
- Specifies a set of functions that are available to an application programmer
- CPU _____ vary in number and type, depending on the computer architecture
- _____ memory involves the separation of logical memory as perceived by users from physical memory
- Communication links are controlled by special communication _____
- The _____'s algorithm less efficient than the resource-allocation graph scheme
- Is a complete round of communication
- _____ objects include the CPU, memory segments, printers, disks, and tape drives
- Protecting critical regions through the use of locks
- The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
- The potential for a security violation, such as the discovery of a vulnerability
- A protection _____ specifies the resources that the process may access
- Each ____ process is provided with a virtual copy of the host
53 Clues: A program in execution • Is a complete round of communication • based on the Berkeley Fast File System • One program running at all times on the computer • Nonvolatile memory that is used like a hard drive • The _____ register specifies the size of the range • Access to a page marked invalid causes a ____ fault • Protecting critical regions through the use of locks • ...
Information Technologies 2023-09-05
Across
- software written to solve problems such as payroll processing, financial analysis or creation of contracts. Usually this type of software is purchased, however there are free open-source versions.
- Rather than needing to buy application software and host it on a corporate computer systems which entail high up-front costs, SAAS is a lease and pay as you payment option. The key difference is the software resides at the software vendor’s data center which can be problematic for certain contexts (such as hospitals). SAAS has helped many small businesses reduce their start-up costs and complexity.
- a principal that computers double in speed ever 18 to 24 months
- a roadmap created by an organization to describe its current processes, and goals, and focuses on ensuring the data, apps, and technology infrastructure support business operations and strategy
- glass ‘wire’ tubes (made from melted beach sand) that were installed in the walls of homes and businesses, by the side of roads and underground (and under oceans) for super fast data transmission.
- software that can read an image such as a pdf and turn it into a document that can be edited.
- the brain of the computer that accepts programmed instructions, data to control tasks and perform calculations
- the measurement of actual data transmission spped
- older information system including hardware, operating system, and application software which remains in use because it still works.
- language a programming language that builds objects such as a button, input box, or chart and gives them attributes and capabilities (such as printing, displaying data or validating data entry) or that leverages programming objects built by others. The idea is that the code is organized when it is embedded in the objects.
- copper wires that were installed in the walls of homes and businesses used for higher speed cable TV and cable modems
- A group of interconnected computing devices tht can share resources and communicate data using standard (rather than proprietary meaning company owned) protocols. Inside a building another name is local area network which use Ethernet wired technology or WIFI
- the copper wires of old telephone networks which were installed in the walls of homes and businesses. It was an engineering feat to use these wires for DSL (highspeed) data transmission
Down
- an in-home or business computing device that connects to the fiber optics or cable coaxial cable modem and creates a WIFI network used to connect devices to the Internet.
- a data storage, processing and transmitting technology embedded into labels that is used to track the location and movement of assets such as pallets of inventory.
- software used to write computer programs which are instructions to process data. Popular examples are Python, C#, C++, and Visual Basic.
- written instructions that control computer data processing and hardware. The software controls the hardware and tells it what to do such as calculating payroll using different business rules to implement different tax structures.
- the maximum BPS that a network channel can transmit. Slang usage is a meaure of the capacity of a person or department to get work done.
- software that controls and connects the different parts of the computer such as disk storage, RAM, the keyboard, screen and the CPU to the application software.
- the data transmission protocol invented by Americans and UK engineers that created the Internet
- as opposed to disk drives, and solid state memory which are used for permanent storage, RAM computer chips are used to temporarily store and manipulate data. Data is copied from permanent storage into RAM for ‘in-memory’ processing such as calculation of metrics.
- a computer generated bot that uses AI to support your information needs, for example to choose the best flight to Florida.
- software modules (such as a print driver) that are created by programmers and can be freely used by other programmers to build new application software.
- voice over internet protocol a technology that enables telephone calls over the internet rather than private networks managed by telephone companies.
- rather than rely of copper or glass ‘wires’ WIFI uses radio waves emitted from a system of cellular towers.
- an electronic device that can be programmed to accept data input, store it, manipulate it and output data.
- transmission the ability to transmit data without wires either long distances (5G networks) or short distances (bluetooth).
27 Clues: the measurement of actual data transmission spped • a principal that computers double in speed ever 18 to 24 months • software that can read an image such as a pdf and turn it into a document that can be edited. • the data transmission protocol invented by Americans and UK engineers that created the Internet • ...
chapter 10 2015-04-06
Across
- / ________ verification is a data entry input control that involves summing the first four digits of a customer number to calculate the value of the fifth digit, then comparing the calculated number to the number entered during data entry.(2words)
- / This control ensures that the correct and most current files are being updated. (2words)
- / When a computer system's files are automatically duplicated on a second data storage system as they are changed, the process is referred to as ___________mirroring(2words)
- /________ copies all changes made since the last full backup. (2words)
- / A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a____________(2words)
- / The maximum amount of time between backups is determined by a company's __________ objective.(2words)
- / Sequentially prenumbered forms and turnaround documents are an example of a(n) ______control.
Down
- / Prompting is a control that helps ensure transactions data are ___________
- / The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is a _________check
- / Modest Expectations Investment Services (MEIS) allows customers to manage their investments over the Internet. If customers attempt to sell more shares of a stock than they have in their account, an error message is displayed. This is an example of a______test
- / Cancellation and storage of documents means documents are defaced and ___________
- / A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a _________(2words)
- / A payroll clerk accidently entered an employee's hours worked for the week as 380 instead of 38. The data entry control that would best prevent this error would be a ________(2words)
- / Error logs and review are an example of ______controls. (2words)
- / Parity checks are an example of a(n) ________control.(2words)
- / A copy of a database, master file, or software that will be retained indefinitely as a historical record is known as a(n)__________
16 Clues: / Parity checks are an example of a(n) ________control.(2words) • / Error logs and review are an example of ______controls. (2words) • /________ copies all changes made since the last full backup. (2words) • / Prompting is a control that helps ensure transactions data are ___________ • ...
Data, Algorithms, Cybersecurity, and Global Impacts 2025-04-25
Across
- An asymmetric encryption system where a different key is used for encryption and decryption.
- Information about an individual that identifies, links, relates, or describes them.
- Decision problem for which an algorithm can be written to produce a correct output for all inputs.
- An algorithm that searches a sorted list for a value by repeatedly splitting the list in half until the value is found or all elements have been eliminated.
- A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer.
- Finite set of instructions that accomplish a specific task.
- Data about data.
- Problem with the goal of finding the "best" solution among many.
- Computer programs that can block, detect, and remove virus and other malware.
- A broad term for datasets so large or complex that traditional data processing applications are inadequate.
- A scheme in which the key to encrypt data is different from the key to decrypt.
- A technique for encrypting data where the same key is used to both encrypt and decrypt data.
- A method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
- The time used to complete a task sequentially divided by the time to complete a task in parallel.
- Copyrighted software that is given for free by the author or copyright owner.
- An algorithm that iterates through each item in a list until it finds the target value or all elements have been checked.
- A model in which programs are run by multiple devices.
- A process that reverses encryption, taking a secret message and reproducing the original plain text.
- A model in which programs run in order, one command at a time.
- The act of attempting to decode a secret message without knowing all the specifics of the cipher.
- A technique that attempts to trick a user into providing personal information.
- An application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
- In a worst case scenario, the number of steps of an algorithm has a exponential or factorial efficiency.
- A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
Down
- General description of a task that can (or cannot) be solved with an algorithm.
- Data that does not accurately reflect the full population or phenomenon being studied.
- A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
- Application of each step of an algorithm in the order in which the code statements are given.
- A measure of how many steps are needed to complete an algorithm.
- Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
- Software intended to damage a computing system or to take partial control over its operation.
- In a worst case scenario, the number of steps of an algorithm has a polynomial efficiency or lower (constant, linear, square, cube, etc.)
- An innovation that includes a computer or program code as an integral part of its functionality. Examples: self-driving car, picture editing software, e-commerce
- Problem with a yes/no answer.
- A process of encoding messages to keep them secret, so only "authorized" parties can read it.
- Data that can be freely used, re-used and redistributed by anyone.
- A model in which programs are broken into small pieces, some of which are run simultaneously.
- Choosing a smaller subset of a data set to use for analysis, for example by eliminating/keeping only certain rows in a table.
- Scientific research conducted in whole or part by distributed individuals (not always scientists) who contribute relevant data to research using their own computing devices.
- A relationship between two pieces of data.
- The practice of obtaining input or information from a large number of people via the Internet.
- Occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions due to its design or use.
- Process that makes the data uniform without changing its meaning.
- A malicious program that can copy itself and gain access to a computer in an unauthorized way.
44 Clues: Data about data. • Problem with a yes/no answer. • A relationship between two pieces of data. • A model in which programs are run by multiple devices. • Finite set of instructions that accomplish a specific task. • A model in which programs run in order, one command at a time. • A measure of how many steps are needed to complete an algorithm. • ...
U11 - Mod 17 Key Terms 2024-11-14
Across
- (8) as a Service allows users to access application software and databases. Cloud providers manage the infrastructure while users store data on the cloud provider’s servers.
- (14) as a Service provides virtualized computing resources over the Internet. The provider hosts the hardware, software, servers, and storage components, and the user pays for
- (4,2) a hypervisor where an application running on the host machine is used tocreate virtual machines that consist entirely of software and contain no hardware components.
- hides original data with random characters or data.
- replaces sensitive data with realistic fictional data.
- (4,number) a hypervisor where the guest operating system runs directly on a hardware platform, under the control of the host system.
- (8) as a Service lets an organization remotely access the development tools and services used to deliver such applications, on a subscription basis.
- (acronym) provide a repository of useful code to make application development faster and cheaper.
Down
- (7,5) Also called an internal, corporate, or enterprise cloud, a private cloud is hosted on a private platform.This offers an organization more control over its data, but it may be more expensive than other cloud services due to infrastructure, maintenance, and administration costs.
- Cloud (6,5) combines the private and public cloud by offering control of organizational data, which is still hosted in a public cloud.
- is the science of making and breaking secret codes.
- (9,5) can measure the consistency of data in a file, picture, or record to ensure that it
- (6,5) is hosted by a service provider at an offsite facility. Users pay a monthly or yearly usage fee to access the cloud. This option costs the organization less for infrastructure, maintenance, and administration — however, the organization has less control over its data.
- threat (7,6) This occurs when an employee, contractor, or business partner maliciously or unintentionally compromise the cloud service.
- is the process of scrambling data so that unauthorized people cannot easily read it.
- not been corrupted.
16 Clues: not been corrupted. • is the science of making and breaking secret codes. • hides original data with random characters or data. • replaces sensitive data with realistic fictional data. • is the process of scrambling data so that unauthorized people cannot easily read it. • (9,5) can measure the consistency of data in a file, picture, or record to ensure that it • ...
Anatomy Of A Computer - Arushan Thayalan 2023-09-12
Across
- A host controller, such as a personal computer (PC) or smartphone, can communicate with devices through a standard interface called a Universal Serial Bus (USB).
- A power supply unit (PSU) is a piece of hardware that distributes DC electricity to the rest of the computer after converting AC current into it.
- A high-speed bus that is industry-standard and present in almost all desktop PCs is called PCI. You can install a wide range of expansion cards, such as graphics or video cards, in PCI slots. audio players.
- The main printed circuit board in a computer is called the motherboard. All components and external peripherals connect to a computer's motherboard, which serves as its main communications hub.
- The central element of a computer, or CPU, serves as its "control center." The CPU, sometimes known as the "central" or "main" processor, is an advanced set of electronic components that manages the device's software and runs the system.
- High-speed visual output is accomplished using a point-to-point channel called an Accelerated Graphics Port (AGP).
- A serial port is an interface for serial communication in which data is sent or received sequentially, one bit at a time.
Down
- A computer component responsible for generating and recording audio.
- A connector for a device that can simultaneously send and receive several bits of data over multiple wires.
- RAM, a frequently used computing abbreviation, stands for random access memory.
- When a computer is turned on, the CPU runs a program called BIOS to launch the computer system.
- A connection tool used largely for attaching peripherals to a computer is called FireWire, which is also known as IEEE 1394.
- PS/2 known as the keyboard or mouse port. It is employed to link a keyboard or mouse to an IBM compatible computer.
13 Clues: A computer component responsible for generating and recording audio. • RAM, a frequently used computing abbreviation, stands for random access memory. • When a computer is turned on, the CPU runs a program called BIOS to launch the computer system. • A connector for a device that can simultaneously send and receive several bits of data over multiple wires. • ...
Computing devices 2017-06-26
computing revision 2024-01-10
Cloud Computing 2025-10-28
Advanced Cyber - Cyber Defense 2023-09-26
Across
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
- this is meant to shut down a machine or network, making it inaccessible to its intended users.
- An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.
- an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner.
- a cyber attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors.
- a reward offered to a person who identifies an error or vulnerability in a computer program or system.
Down
- a newly established web site that encourages hacking in order to learn and protect against it.
- a large-scale cyber attack carried out by malware-infected devices which are controlled remotely.
- the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- the process or action of proving or showing something to be true, genuine, or valid.
- a person who uses computers to gain unauthorized access to data.
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation
16 Clues: a person who uses computers to gain unauthorized access to data. • the process or action of proving or showing something to be true, genuine, or valid. • a newly established web site that encourages hacking in order to learn and protect against it. • this is meant to shut down a machine or network, making it inaccessible to its intended users. • ...
GE Digital vocalulary quizz 2016-01-18
Across
- Tools and processes that enable the rapid, profitable Monetizationof Predix Services and Predix-Powered apps
- Network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
- Hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise
- Asset Predictive Maintenance
- Software layer responsible for communicating with industrial asset and Predix Cloud & running local applications, like edge analytics. [2 words separated by an hyphen]
- cloud-based PaaS (platform as a service) is claimed to enable industrial-scale analytics for asset performance management (APM) and operations optimization by providing a standard way to connect machines, data, and people.
- Collection of algorithms and models that model an equipment and give continuous insight [2 words separated by an hyphen]
Down
- Open source cloud platform as a service (PaaS) which is the foundation of Predix[2 words separated by an hyphen]
- software architecture style in which complex applications are composed of small, independent processes communicating with each other using language-agnostic APIs [2 words separated by an hyphen]
- GE, its Customers and Partners
- Information continuum through the life-cycle of a products (from Digital Blueprint all the way to the maintenance – with everything that is between) [2 words separated by an hyphen]
- Set of practices, tools and policies that lead to improved quality and Automated Delivery (AD)
- Category of cloud computing services that provides a platform allowing customers to develop, run, and manage web applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
13 Clues: Asset Predictive Maintenance • GE, its Customers and Partners • Set of practices, tools and policies that lead to improved quality and Automated Delivery (AD) • Tools and processes that enable the rapid, profitable Monetizationof Predix Services and Predix-Powered apps • ...
Lessons 197 & 198 2023-05-05
Across
- stretched or pulled tight; not slack; (especially of muscles or nerves) tense; not relaxed; (of writing, music, etc.) concise and controlled
- (of regulations, requirements, or conditions) strict, precise, and exacting
- 1) not being what it purports to be; false or fake; 2) (of a line of reasoning) apparently but not actually valid
- forming or following in a logical order or sequence; (computing) performed or used in sequence
- 1) (noun) the preliminary assessment of patients or casualties in order to determine the urgency of their need for treatment and the nature of treatment required; (verb) conduct a preliminary assessment of (patients or casualties) in order to determine the urgency of their need for treatment and the nature of treatment required; 2) the process of determining the most important people or things from amongst a large number that require attention; assignment of priority levels to tasks or individuals to determine the most effective order in which to deal with them
- 1) severe or bare in appearance or outline; 2) complete; sheer
- (noun) a false, absurd, or distorted representation of something; (verb) represent in a false or distorted way
Down
- 1) superficially plausible, but actually wrong; spurious 2) misleading in appearance, especially misleadingly attractive
- equivalent in seriousness to; virtually the same as
- excite pleasurably; touch (a body part) lightly so as to excite the surface nerves and cause uneasiness, laughter, or spasmodic movements
- a violent windy storm; a violent commotion or disturbance
- (verb) reject with disdain or contempt; (noun) an act of rejecting with contempt
- (adj.) tending to induce drowsiness or sleep; (noun) a drug or other agent that induces sleep
13 Clues: equivalent in seriousness to; virtually the same as • a violent windy storm; a violent commotion or disturbance • 1) severe or bare in appearance or outline; 2) complete; sheer • (of regulations, requirements, or conditions) strict, precise, and exacting • (verb) reject with disdain or contempt; (noun) an act of rejecting with contempt • ...
Cloud Computing 2021-06-21
2 Clues: is the main reason of using a private cloud solution? • Which of the following groups is typically responsible for managing Infrastructure as a Service (IaaS)?
TSC 4.0 - What terms do you know? 2018-07-09
Across
- A supply chain for customers who are unpredictable and expect speed
- TSC 4.0, digitization powered by _______________ is driving end-to-end efficiency for industrial environment.
- We optimize end-to-end efficiency and asset reliability while providing visibility to customer.
- Flexible A supply chain that will be deployed in crises environments where speed and innovation are a premium
- A supply chain for customers who are price sensitive and who want efficiency and reliability
- Digital Procure to Pay. This digital accelerator accelerates procurement and suppliers efficiency.
- A supply chain for customers who value reliability and trustworthiness
Down
- End to end digital planning and control. With this digital accelerator, End-to-End Planning will expand to improve synchronization of Demand & Supply
- An enabler for TSC 4.0, empowered _____ drive the digital transformation with “competencies of the future”
- A supply chain for customers who typically have big projects with longer time horizons
- measures taken to protect against criminal or unauthorized access or use of electronic data and protect our EcoStruxure assets.
- We optimize resources, by developing a circular supply chain, in clean and safe facilities, powered by renewable energy.
- or Internet of Things - a network of physical devices embedded with computing devices connected to the internet, enabling them to send and receive data.
- Metrics The Golden_____ are Customer Satisfaction, Cost Efficiency and Cash Efficiency.
- Center of Digital Innovation. This digital accelerator will drive idea generation and experimentation
- Smart Distribution Center and Digital Delivery to Service. This digital accelerator focuses on Transportation and Customer Delivery Experience. Digitization here will improve customer experiences with more efficient and sustainable logistics.
- We provide our customers what they value while leveraging scale and efficiency.
- Smart Factory. This digital accelerator uses connected products, edge control, and apps, analytics and services to optimize end to end efficiency and asset reliability. We integrate innovative technologies, IT solutions and data analytics into our manufacturing operations.
- ___for customer and planet. This digital accelerator focuses on improving end to end quality while operating a sustainable supply chain.
19 Clues: A supply chain for customers who are unpredictable and expect speed • A supply chain for customers who value reliability and trustworthiness • We provide our customers what they value while leveraging scale and efficiency. • A supply chain for customers who typically have big projects with longer time horizons • ...
TSC 4.0 - What terms do you know? 2018-07-09
Across
- A supply chain for customers who are unpredictable and expect speed
- An enabler for TSC 4.0, empowered _____ drive the digital transformation with “competencies of the future”
- End to end digital planning and control. With this digital accelerator, End-to-End Planning will expand to improve synchronization of Demand & Supply
- A supply chain for customers who value reliability and trustworthiness
- Smart Factory. This digital accelerator uses connected products, edge control, and apps, analytics and services to optimize end to end efficiency and asset reliability. We integrate innovative technologies, IT solutions and data analytics into our manufacturing operations.
- Center of Digital Innovation. This digital accelerator will drive idea generation and experimentation
- Smart Distribution Center and Digital Delivery to Service. This digital accelerator focuses on Transportation and Customer Delivery Experience. Digitization here will improve customer experiences with more efficient and sustainable logistics.
- We optimize end-to-end efficiency and asset reliability while providing visibility to customer.
- TSC 4.0, digitization powered by _______________ is driving end-to-end efficiency for industrial environment.
- The Golden_____ are Customer Satisfaction, Cost Efficiency and Cash Efficiency.
Down
- A supply chain that will be deployed in crises environments where speed and innovation are a premium
- We provide our customers what they value while leveraging scale and efficiency.
- A supply chain for customers who are price sensitive and who want efficiency and reliability
- We optimize resources, by developing a circular supply chain, in clean and safe facilities, powered by renewable energy.
- measures taken to protect against criminal or unauthorized access or use of electronic data and protect our EcoStruxure assets.
- ___for customer and planet. This digital accelerator focuses on improving end to end quality while operating a sustainable supply chain.
- Digital Procure to Pay. This digital accelerator accelerates procurement and suppliers efficiency.
- A supply chain for customers who typically have big projects with longer time horizons
- or Internet of Things - a network of physical devices embedded with computing devices connected to the internet, enabling them to send and receive data.
19 Clues: A supply chain for customers who are unpredictable and expect speed • A supply chain for customers who value reliability and trustworthiness • We provide our customers what they value while leveraging scale and efficiency. • The Golden_____ are Customer Satisfaction, Cost Efficiency and Cash Efficiency. • ...
TSC 4.0 - What terms do you know? 2018-07-09
Across
- A supply chain for customers who are unpredictable and expect speed
- Metrics The Golden_____ are Customer Satisfaction, Cost Efficiency and Cash Efficiency.
- An enabler for TSC 4.0, empowered _____ drive the digital transformation with “competencies of the future”
- or Internet of Things - a network of physical devices embedded with computing devices connected to the internet, enabling them to send and receive data.
- Smart Factory. This digital accelerator uses connected products, edge control, and apps, analytics and services to optimize end to end efficiency and asset reliability. We integrate innovative technologies, IT solutions and data analytics into our manufacturing operations.
- measures taken to protect against criminal or unauthorized access or use of electronic data and protect our EcoStruxure assets.
- TSC 4.0, digitization powered by _______________ is driving end-to-end efficiency for industrial environment.
- Digital Procure to Pay. This digital accelerator accelerates procurement and suppliers efficiency.
- We optimize resources, by developing a circular supply chain, in clean and safe facilities, powered by renewable energy.
- Smart Distribution Center and Digital Delivery to Service. This digital accelerator focuses on Transportation and Customer Delivery Experience. Digitization here will improve customer experiences with more efficient and sustainable logistics.
- We optimize end-to-end efficiency and asset reliability while providing visibility to customer.
Down
- Center of Digital Innovation. This digital accelerator will drive idea generation and experimentation
- A supply chain for customers who typically have big projects with longer time horizons
- A supply chain for customers who value reliability and trustworthiness
- Flexible A supply chain that will be deployed in crises environments where speed and innovation are a premium
- We provide our customers what they value while leveraging scale and efficiency.
- End to end digital planning and control. With this digital accelerator, End-to-End Planning will expand to improve synchronization of Demand & Supply
- A supply chain for customers who are price sensitive and who want efficiency and reliability
- ___for customer and planet. This digital accelerator focuses on improving end to end quality while operating a sustainable supply chain.
19 Clues: A supply chain for customers who are unpredictable and expect speed • A supply chain for customers who value reliability and trustworthiness • We provide our customers what they value while leveraging scale and efficiency. • A supply chain for customers who typically have big projects with longer time horizons • ...
technology vocabulary 2014-02-10
Across
- A computer simulation is a simulation , run on a single computer, or a network of computers, to reproduce behavior of a system
- Render or rendering may refer to: In computing: Artistic rendering , creating, shading and texturing of an image
- is a concise description of the issues that need to be addressed by a problem solving team
- Computer aided design is the use of computer systems to assist in the or computer-aided drafting ,which includes the
- Companion was a 19th-century illustrated periodical published in Boston , Massachusetts
- is a group or individual creativity technique by which efforts are Osborn claimed that brainstorming was more effective
- Technical drawing, also known as drafting or draughting, is the act and discipline In representing complex, three dimensional objects
- is a written document for a design project developed in concert by a person representing the business
- Mechanical systems drawing is a type of technical drawing that shows information about heating, ventilating
Down
- is a means of representing a ...The term orthographic is also sometimes reserved
- refer to Ideation the process of creating new ideas. Suicidal ideation , a common medical term for thoughts
- made available by griddle manufacturers, outline the design and performance characteristics of their respective
- is the automation of machine tool s that are operated by Most NC today is computer numerical control
- is an early sample, model or release of a product built to test a concept or process or to act as a thing to be replicated
- The engineering design process is the formulation of a plan to help an engineer build a product with a specified performance goal
- Drawing and other visual arts : Sketch, a drawing or other composition that is not intended as a finished work
- is a group of techniques used to quickly fabricate a scale model of a physical part or assembly using three-dimensional .
- a drawing, at relatively large scale, of a part of a building, machine,etc., with dimensions or other information for use in construction.
- design process: The engineering design process is the formulation of a plan to help an engineer build a product with a specified performance goal.
19 Clues: is a means of representing a ...The term orthographic is also sometimes reserved • Companion was a 19th-century illustrated periodical published in Boston , Massachusetts • is a concise description of the issues that need to be addressed by a problem solving team • ...
