computing Crossword Puzzles
technology vocabulary 2014-02-10
Across
- A computer simulation is a simulation , run on a single computer, or a network of computers, to reproduce behavior of a system
- Render or rendering may refer to: In computing: Artistic rendering , creating, shading and texturing of an image
- is a concise description of the issues that need to be addressed by a problem solving team
- Computer aided design is the use of computer systems to assist in the or computer-aided drafting ,which includes the
- Companion was a 19th-century illustrated periodical published in Boston , Massachusetts
- is a group or individual creativity technique by which efforts are Osborn claimed that brainstorming was more effective
- Technical drawing, also known as drafting or draughting, is the act and discipline In representing complex, three dimensional objects
- is a written document for a design project developed in concert by a person representing the business
- Mechanical systems drawing is a type of technical drawing that shows information about heating, ventilating
Down
- is a means of representing a ...The term orthographic is also sometimes reserved
- refer to Ideation the process of creating new ideas. Suicidal ideation , a common medical term for thoughts
- made available by griddle manufacturers, outline the design and performance characteristics of their respective
- is the automation of machine tool s that are operated by Most NC today is computer numerical control
- is an early sample, model or release of a product built to test a concept or process or to act as a thing to be replicated
- The engineering design process is the formulation of a plan to help an engineer build a product with a specified performance goal
- Drawing and other visual arts : Sketch, a drawing or other composition that is not intended as a finished work
- is a group of techniques used to quickly fabricate a scale model of a physical part or assembly using three-dimensional .
- a drawing, at relatively large scale, of a part of a building, machine,etc., with dimensions or other information for use in construction.
- design process: The engineering design process is the formulation of a plan to help an engineer build a product with a specified performance goal.
19 Clues: is a means of representing a ...The term orthographic is also sometimes reserved • Companion was a 19th-century illustrated periodical published in Boston , Massachusetts • is a concise description of the issues that need to be addressed by a problem solving team • ...
Ch 5 Ice Cream and Crime: Computing Correlation Coefficients 2013-12-10
Across
- Correlation that is reflected best by a straight line.
- Another name for a categorical variable.
- Another name for a correlation between two variables.
- A type of coefficient that represents the relationship between two variables.
Down
- A positive correlation is a ____ correlation.
- Coefficient of _____ is the percentage of variance in one variable that is accounted for by the variance in the other variable.
- Another name for an indirect correlation.
- A visual representation of a correlation.
- A variable that can assume any value along some underlying continuum.
- The absolute value of the coefficient reflects what about the correlation.
10 Clues: Another name for a categorical variable. • Another name for an indirect correlation. • A visual representation of a correlation. • A positive correlation is a ____ correlation. • Another name for a correlation between two variables. • Correlation that is reflected best by a straight line. • A variable that can assume any value along some underlying continuum. • ...
ICT outcomes 2016-10-27
Across
- / The global address of documents and other resources on the World Wide Web.
- / Group of World Wide Web pages that are hyperlinked to each other.
- / The point of interconnection between a computer and a private or public network.
- / A dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
- / The interaction and the exchange of information between users with the same interests.
- / The distribution of a computing resource to many users via multiprogramming or multitasking.
- / It is an audio or a video that is downloaded over the internet.
- / It is an activity that consists on talking to other people in a chat room in real time.
- / A way of telecommunication where you can send messages to other users, through the network.
Down
- / A device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination.
- / Programs that are executed with minimum human interaction.
- / A network security system designed to prevent unauthorized access to or from a private network.
- / A worldwide system of computer networks in which users at any one computer can, if they have permission, get information from any other computer, search for information, and sometimes talk directly to users at other computers.
- / It is a discussion in the Usenet where people can submit their own opinion about a specific subject.
- / It is a model for delivering learning content online to any person who wants to take a course.
- / The special set of rules that end points in a telecommunication connection use when they communicate. They specify interactions between the communicating entities.
- / It is a social networking designed for business, where you can share information and helps you to contact professionals.
- / A live online presentation where people can give their opinions or ask things while the video is running.
- / It is like an online journal where the creator writes about his personal experiences, opinions, etc.
19 Clues: / Programs that are executed with minimum human interaction. • / It is an audio or a video that is downloaded over the internet. • / Group of World Wide Web pages that are hyperlinked to each other. • / The global address of documents and other resources on the World Wide Web. • / The point of interconnection between a computer and a private or public network. • ...
Digital economy 2024-03-04
Across
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- any process that a business organization conducts over a computer-mediated network
- extremely large data sets that may be analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.
- commercial transactions conducted electronically on the internet.
- the simulation of human intelligence processes by machines, especially computer systems.
- of things describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
- a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
- the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
- means of sending or receiving information, such as phone lines or computers
Down
- online business that facilitate commercial interactions between at least two different groups—with one typically being suppliers and the other consumers
- the application of Information and Communication Technologies (ICTs) to government functions and procedures with the purpose of increasing efficiency, transparency and citizen participation.
- a completed agreement between a buyer and a seller to exchange goods, services, or financial assets in return for money.
- the use of digital technologies to change a business model and provide new revenue and value-producing opportunities
- he technology of sending signals and messages over long distances using electronic equipment
- consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications
- the use of electronic information and communications technologies to provide and support health care when distance separates the participants.
- the action or process of innovating.
- a distributed ledger with growing lists of records (blocks) that are securely linked together via cryptographic hashes
- delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
19 Clues: the action or process of innovating. • commercial transactions conducted electronically on the internet. • means of sending or receiving information, such as phone lines or computers • any process that a business organization conducts over a computer-mediated network • the simulation of human intelligence processes by machines, especially computer systems. • ...
Social Engineering 2023-03-01
Across
- a Regulation in EU law on data protection and privacy in the EU and the European Economic Area.
- This is the capture of confidential data by observation of a target, while passwords or PIN numbers are being input into a computing device, such as a tablet, ATM machine or door entry system.
- A collection of techniques that use human vulnerabilities to manipulate people into performing actions or divulging sensitive information.
- A way for a user to authenticate by using two or more separate forms of identification.
- A phishing attack targeted at a specific person or group.
- An algorithm on a computer system bypasses security controls
- The creation of a website domain that is made to look like a bona fide website.
- The act of following someone into a secured area, usually by exploiting someone’s courtesy of “holding the door”.
- Unsolicited emails that are sent out in bulk.
- a string of characters that allows access to a computer system or service.
- Occurs when the login credentials for webmail, domain access, VPN access, etc. are collected via a compromised web browser, application, malware or DNS server.
Down
- A social engineering scam in which confidential information (such as credit card information) is extracted from a target over the telephone for financial gain.
- A social engineering technique in which the attacker masquerades as a legitimate website or communication in order to acquire sensitive information, such as passwords or credit card information.
- Process whereby the attacker examines the contents of waste bins, skips or recycling bins for the purpose of obtaining confidential information, such as invoices, email printouts or company memos.
- Malware that attempts to extort money from a user or organisation by taking control of the victim’s machine, files or documents.
- Used to send information from your computer to a third party without your consent.
- A form of social engineering in which an attacker lures a victim with a false promise that appeals to greed or curiosity, such as a USB attack
- Any event where confidential data is viewed, transmitted, stolen or used by an unauthorised individual.
- An umbrella term used to describe any malicious software.
19 Clues: Unsolicited emails that are sent out in bulk. • A phishing attack targeted at a specific person or group. • An umbrella term used to describe any malicious software. • An algorithm on a computer system bypasses security controls • a string of characters that allows access to a computer system or service. • ...
TSC 4.0 - What terms do you know? 2018-07-09
Across
- A supply chain for customers who are price sensitive and who want efficiency and reliability
- A supply chain for customers who value reliability and trustworthiness
- ___for customer and planet. This digital accelerator focuses on improving end to end quality while operating a sustainable supply chain.
- We optimize end-to-end efficiency and asset reliability while providing visibility to customer.
- We optimize resources, by developing a circular supply chain, in clean and safe facilities, powered by renewable energy.
- Digital Procure to Pay. This digital accelerator accelerates procurement and suppliers efficiency.
- Flexible A supply chain that will be deployed in crises environments where speed and innovation are a premium
- A supply chain for customers who are unpredictable and expect speed
- We provide our customers what they value while leveraging scale and efficiency.
Down
- Center of Digital Innovation. This digital accelerator will drive idea generation and experimentation
- measures taken to protect against criminal or unauthorized access or use of electronic data and protect our EcoStruxure assets.
- TSC 4.0, digitization powered by _______________ is driving end-to-end efficiency for industrial environment.
- or Internet of Things - a network of physical devices embedded with computing devices connected to the internet, enabling them to send and receive data.
- A supply chain for customers who typically have big projects with longer time horizons
- End to end digital planning and control. With this digital accelerator, End-to-End Planning will expand to improve synchronization of Demand & Supply
- An enabler for TSC 4.0, empowered _____ drive the digital transformation with “competencies of the future”
- Smart Factory. This digital accelerator uses connected products, edge control, and apps, analytics and services to optimize end to end efficiency and asset reliability. We integrate innovative technologies, IT solutions and data analytics into our manufacturing operations.
- Smart Distribution Center and Digital Delivery to Service. This digital accelerator focuses on Transportation and Customer Delivery Experience. Digitization here will improve customer experiences with more efficient and sustainable logistics.
- Metrics The Golden_____ are Customer Satisfaction, Cost Efficiency and Cash Efficiency.
19 Clues: A supply chain for customers who are unpredictable and expect speed • A supply chain for customers who value reliability and trustworthiness • We provide our customers what they value while leveraging scale and efficiency. • A supply chain for customers who typically have big projects with longer time horizons • ...
Crossword puzzle 2024-09-26
Across
- a visual representation of something.
- a set of instructions, data or programs used to operate computers and execute specific tasks.
- a hand-held pointing device that detects two-dimensional motion relative to a surface.
- an electronic communications network that connects computer networks and organizational computer facilities around the world.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- is a collection of files accessed through a web address, covering a particular theme or subject, and managed by a particular person or organization.
- is a device that connects two or more packet-switched networks or subnetworks.
- Any digital moving picture, which includes a computer file in video formats such as MP4, MOV, M4V, AVI, DivX or FLV.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- a group of interconnected nodes or computing devices that exchange data and resources with each other.
Down
- data that has been processed, organized, and interpreted to add meaning and value.
- a piece of equipment used to provide data and control signals to an information processing system.
- is a communication method that uses electronic devices to deliver messages across computer networks.
- refers to software that requires no paid licenses to use the application, no fees or donations, no restrictions on how many times you can download or open the program, and no expiration date.
- a piece of hardware that is used to output data that has been previously entered into a computer or similar processing device
- is a website designed to make it easy for users to create entries in chronological order.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- the field of technology concerned with recording, processing, storing and delivering audible sound using electricity.
- input device used to enter characters and functions into the computer system by pressing buttons, or keys.
- information that has been translated into a form that is efficient for movement or processing.
20 Clues: a visual representation of something. • is a device that connects two or more packet-switched networks or subnetworks. • data that has been processed, organized, and interpreted to add meaning and value. • a hand-held pointing device that detects two-dimensional motion relative to a surface. • ...
Crossword puzzle 2024-09-26
Across
- data that has been processed, organized, and interpreted to add meaning and value.
- a group of interconnected nodes or computing devices that exchange data and resources with each other.
- a piece of hardware that is used to output data that has been previously entered into a computer or similar processing device
- is a communication method that uses electronic devices to deliver messages across computer networks.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- information that has been translated into a form that is efficient for movement or processing.
- a set of instructions, data or programs used to operate computers and execute specific tasks.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- Any digital moving picture, which includes a computer file in video formats such as MP4, MOV, M4V, AVI, DivX or FLV.
- is a website designed to make it easy for users to create entries in chronological order.
Down
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- is a device that connects two or more packet-switched networks or subnetworks.
- an electronic communications network that connects computer networks and organizational computer facilities around the world.
- refers to software that requires no paid licenses to use the application, no fees or donations, no restrictions on how many times you can download or open the program, and no expiration date.
- a piece of equipment used to provide data and control signals to an information processing system.
- is a collection of files accessed through a web address, covering a particular theme or subject, and managed by a particular person or organization.
- input device used to enter characters and functions into the computer system by pressing buttons, or keys.
- a hand-held pointing device that detects two-dimensional motion relative to a surface.
- a visual representation of something.
- the field of technology concerned with recording, processing, storing and delivering audible sound using electricity.
20 Clues: a visual representation of something. • is a device that connects two or more packet-switched networks or subnetworks. • data that has been processed, organized, and interpreted to add meaning and value. • a hand-held pointing device that detects two-dimensional motion relative to a surface. • ...
Impacts of Technology on Society 2022-06-09
Across
- a point in time where advancements occur so quickly to the point where only AI can perceive these advancements.
- rewards that keep people attached to a media platform such as Facebook likes or Snapchat streaks
- an example of national security being prioritized over privacy is when the U.S. government wanted to prevent more attacks like 9-11 by ______ emails, texts and social media
- "Very recently, a man was arrested and has been tried against his “international _________ campaign.” He pleaded guilty to 63 charges of identity fraud, defamation and criminal harassment in a case that involved 38 people across Canada, the U.S. and U.K.."
- During the 1998 U.S. embassy bombings, a suspect sent ______ emails under various names such as "Norman", "Abdus Sabbur" to "associates of al qaeda"
- "differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics."
- An example of hacking is a software called ________ that is used to record key strokes on a computer.
- breaking into a computer system
- Napster is a _________ system that allows individuals to find each other and send music files
Down
- An identity that is unknown to other internet users
- when media only shares content that is relatively tied to your beliefs and attitudes.
- "a software that performs poorly when it comes to dealing with different groups based on stereotypes and profiling"
- An example of a group that store the websites visited by each of their customers
- psychologically exploit ones insecurities to groom
- “A lot of people are saying this is showing that AI is prejudiced. No. This is showing we’re prejudiced and that AI is _______ it.”
- Facebook changing its name to meta after the it was threatened to get taken down, this is an example of _____
- False stories from social media
- A process utilized by a media platform like Facebook in order to advertise insights based on what data you have provided this service with
- "the action or practice of preventing someone holding views regarded as unacceptable or offensive from contributing to a forum or debate, especially by blocking them on a particular website”
19 Clues: False stories from social media • breaking into a computer system • psychologically exploit ones insecurities to groom • An identity that is unknown to other internet users • An example of a group that store the websites visited by each of their customers • when media only shares content that is relatively tied to your beliefs and attitudes. • ...
The World of AI 2017-11-07
Across
- Chinese American computer scientist that founded the Google Brain Deep Learning Project, and is famous for his research on AI and Big Data.
- A computer program that conducts conversations with human users by simulating how humans would behave as a conversational partner.
- ...vision is the science that studies how machines can be made for gaining high-level understanding from digital images or videos.
- A specific set of instructions, contained within a computer program, which determine how that program analyses and uses data to complete its specified task (target function).
- First computer program to defeat a professional human Go player.
- ...learning is a subset of AI and Machine learning in which Neural networks are “layered”, combined with plenty of computing power, and given a large measure of training data to create extremely powerful learning models capable of processing data in new and exciting ways in a number of areas, e.g. advancing the field of computer vision.
Down
- ...neural network is a class of artificial neural networks applied to analyze visual imagery.
- ...neural network is a class of artificial neural networks applicable to tasks such as unsegmented, connected handwriting recognition or speech recognition.
- ...learning is sub-genre of AI in which computer programs and algorithms can be designed to “learn” how to complete a specified task, with increasing efficiency and effectiveness as it develops. Such programs can use past performance data to predict and improve future performance.
- Abbreviation for Advanced Driver Assistance Systems.
10 Clues: Abbreviation for Advanced Driver Assistance Systems. • First computer program to defeat a professional human Go player. • ...neural network is a class of artificial neural networks applied to analyze visual imagery. • A computer program that conducts conversations with human users by simulating how humans would behave as a conversational partner. • ...
Cloud Computing 2021-06-21
2 Clues: is the main reason of using a private cloud solution? • administrators Which of the following groups is typically responsible for managing Infrastructure as a Service (IaaS)?
CSP REVIEW PUZZLE 2025-05-02
Across
- Information about an individual that can be used to uniquely identify them (directly or indirectly)
- Algorithms with ____ complexity run in an unreasonable amount of time
- The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items
- Data about data, like descriptive information about a file or a row in a database.
- ___ computing is a computational model which splits a program into multiple tasks, some of which can be executed simultaneously
- Error that results when the number of bits is not enough to represent the number with full precision
- ___ Access point is a wireless access point that gives unauthorized access to secure networks
Down
- A ___ is an approach to a problem that produces a solution that is not guaranteed to be optimal but may be used when techniques that are guaranteed to always find an optimal solution are impractical such as when the problem is too complex.
- The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
- Example of ___ data are pitch and volume of music, temperature, and the amount of light in the room
- The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met
- ___ authentication is a method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession)
- ___ key is the encryption and decryption use the same key (function, formula, etc) but in opposite directions. Easy to hack.
- The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items.
- Compressing data in a way that discards some data and makes it impossible to recover the original
- protocal that provides a mechanism to detect corrupt data in packets
16 Clues: protocal that provides a mechanism to detect corrupt data in packets • Algorithms with ____ complexity run in an unreasonable amount of time • Data about data, like descriptive information about a file or a row in a database. • ___ Access point is a wireless access point that gives unauthorized access to secure networks • ...
Cognitive - Concepts you should now be aware of from research 2024-04-26
Across
- As new data is introduced, cognitive systems must be able to "make changes" on the fly, making real-time adjustments as needed.
- Cognitive systems must be able to achieve human-computer interaction (HCI). This means they are able to offer and receive information from humans and other areas of technology, such as the cloud or hardware devices.
- Cognitive systems must be able to recognize when a problem is unsolvable and seek the answers necessary to solve it.
- (10,6,8) ANN - is a framework modeled after the human brain. This framework consists of inputs, outputs, and hidden layers
- (4,8) DL - is an approach to machine learning that falls under artificial intelligence (AI), which is most commonly used to label vast and complex data through ANN.
Down
- (7,8,10) NLP - As its goal is to work side by side with and learn from human intelligence, cognitive systems must be able to understand human speech and written text.
- (7,8) ML - uses neural networks, a computer system modeled after how the human brain processes information. It is an algorithm designed to recognize patterns, calculate the probability of a certain outcome occurring, and “learn” through error and successes using a feedback loop.
- (9,9) is a branch of artificial intelligence developed to think like and work alongside humans.
- Since cognitive computing is mimicking human behavior, it must also be able to understand context. It can use sensor data, unstructured, and structured data to achieve this.
9 Clues: (9,9) is a branch of artificial intelligence developed to think like and work alongside humans. • Cognitive systems must be able to recognize when a problem is unsolvable and seek the answers necessary to solve it. • (10,6,8) ANN - is a framework modeled after the human brain. This framework consists of inputs, outputs, and hidden layers • ...
Introduction to Engineering 2024-03-26
Across
- document the final results using formal outcome documentation
- pick the best solution(s) and prototype
- A type of engineering that uses engineering and business principles to oversee the entire construction process including estimating/budgeting, contract law, construction methods and materials, scheduling, safety, and effective communication
- type of engineering that applies engineering principles to living organisms and systems, whether those include plants, animals, humans, or the environment
- type of engineering that works on the design, installation, and maintenace of the infrastructure systems we use every day and/or in large-scale surveying and coastal subsidence projects
- a type of engineering that uses math, physics, materials science, and engineering principles to design, analyze, manufacture, and maintain machines
Down
- a type of engineering that uses the principles of engineering, biology, chemistry, and soil science to address challenges such as waste disposal, recycling, pollution control, and public health
- a type of engineering that helps find and produce the natural gas and oil resources that make everyday life possible; involved in finding, producing, and maxmizing oil and natural gas products
- a type of engineering where you learn the math and theory behind modern-day computing, develop and hone your programming skills, and then use computers to solve problems in almost any industry
- research the problem and come up with multiple solutions
- a type of engineering that combines several fields of science (chemistry, physics, and biology) with engineering design principles to create new chemical and biochemical processes-usually in the form of chemical reactions or separations
- a type of engineering that designs products and systems that use electricity to run the modern world
- evaluate the prototye(s) and redesign as needed
- A type of engineering that applies the principles of engineering design to create or improve any type of system
- identify the problem and constraints
15 Clues: identify the problem and constraints • pick the best solution(s) and prototype • evaluate the prototye(s) and redesign as needed • research the problem and come up with multiple solutions • document the final results using formal outcome documentation • a type of engineering that designs products and systems that use electricity to run the modern world • ...
Cognitive - Concepts you should now be aware of from research 2024-04-26
Across
- As new data is introduced, cognitive systems must be able to "make changes" on the fly, making real-time adjustments as needed.
- Cognitive systems must be able to achieve human-computer interaction (HCI). This means they are able to offer and receive information from humans and other areas of technology, such as the cloud or hardware devices.
- Cognitive systems must be able to recognize when a problem is unsolvable and seek the answers necessary to solve it.
- (10,6,8) ANN - is a framework modeled after the human brain. This framework consists of inputs, outputs, and hidden layers
- (4,8) DL - is an approach to machine learning that falls under artificial intelligence (AI), which is most commonly used to label vast and complex data through ANN.
Down
- (7,8,10) NLP - As its goal is to work side by side with and learn from human intelligence, cognitive systems must be able to understand human speech and written text.
- (7,8) ML - uses neural networks, a computer system modeled after how the human brain processes information. It is an algorithm designed to recognize patterns, calculate the probability of a certain outcome occurring, and “learn” through error and successes using a feedback loop.
- (9,9) is a branch of artificial intelligence developed to think like and work alongside humans.
- Since cognitive computing is mimicking human behavior, it must also be able to understand context. It can use sensor data, unstructured, and structured data to achieve this.
9 Clues: (9,9) is a branch of artificial intelligence developed to think like and work alongside humans. • Cognitive systems must be able to recognize when a problem is unsolvable and seek the answers necessary to solve it. • (10,6,8) ANN - is a framework modeled after the human brain. This framework consists of inputs, outputs, and hidden layers • ...
Cybersecurity Crossword 2023-12-01
2 Clues: A collection of computers compromised by malicious code and controlled across a network • A mechanism for creating a secure connection between a computing device and a computer network
Ch 5 Ice Cream and Crime: Computing Correlation Coefficients 2013-12-10
Across
- Coefficient of _____ is the percentage of variance in one variable that is accounted for by the variance in the other variable.
- Correlation that is reflected best by a straight line.
- Another name for a correlation between two variables.
Down
- A visual representation of a correlation.
- A variable that can assume any value along some underlying continuum.
- The absolute value of the coefficient reflects what about the correlation.
- A type of coefficient that represents the relationship between two variables.
- Another name for a categorical variable.
- A positive correlation is a ____ correlation.
- Another name for an indirect correlation.
10 Clues: Another name for a categorical variable. • A visual representation of a correlation. • Another name for an indirect correlation. • A positive correlation is a ____ correlation. • Another name for a correlation between two variables. • Correlation that is reflected best by a straight line. • A variable that can assume any value along some underlying continuum. • ...
Electronic Devices 2023-06-20
Across
- A slim, touchscreen device that works like a smaller computer, perfect for reading, drawing, playing games, or watching videos on the go.
- A handheld, often curved pointing device that controls the cursor on a computer screen, enabling you to interact with icons, buttons, and text, making navigation and selection easier.
- A portable, handheld gadget that combines the features of a phone and a computer, allowing you to stay connected, take photos, and access apps.
- A pair of small, lightweight audio devices that fit directly into your ears, providing a private listening experience for music, podcasts, movies, or phone calls while on the go.
- A small, box-like device that catches sound signals and plays music, news, or talk shows, keeping you informed and entertained.
Down
- A pair of cushioned speakers that fit over your ears, enabling you to listen to music, movies, or games privately without disturbing others.
- A portable, foldable computer that combines the functions of a desktop PC and a tablet, great for school, work, or travel.
- A large, flat screen that displays images, videos, and programs, offering entertainment such as movies, shows, and sports for the whole family.
- A light, compact device for capturing special moments and memories through photographs or videos.
- A slim, rectangular typing tool with various keys representing letters, numbers, and symbols, allowing you to input text and commands into a computer or other electronic device.
- A versatile computing machine with a monitor, keyboard, and mouse, commonly used for doing assignments, browsing the internet, playing games, and watching videos.
11 Clues: A light, compact device for capturing special moments and memories through photographs or videos. • A portable, foldable computer that combines the functions of a desktop PC and a tablet, great for school, work, or travel. • A small, box-like device that catches sound signals and plays music, news, or talk shows, keeping you informed and entertained. • ...
Industry Terminology 2024-01-11
Across
- helps monitor and improve the quality of performance of the contact center.
- refers to any technology involving the development, application, and deployment of telecommunication services for the purpose of electronic transmission of voice, fax, or data, between distant parties.
- term for monitoring, forecasting, and planning for contact center staffing needs.
- technology in which large amounts of data are used to create algorithms that get smarter over time.
- a group of technologies that work to deliver voice and other multimedia sessions over IP networks, most commonly the internet.
- manages all of a company's relationships and interactions with their customers and prospects, including documents, key contacts, quotes, etc.
- allow inbound calls to be directed to a set of employees and ring all phones at the same time.
- the time between the moment your voice is transmitted, and the moment it reaches its destination.
- the combination of local, long-distance, and international carriers that make up the worldwide telephone network.
- the hardware and software that comprise a traditional business telephone system.
Down
- software that integrates voice communications systems with computers for contact center and office automation applications.
- automatic voice system that customers interact with when they call a business. Some customer questions can be resolved via this system without the need to speak to a live person.
- determines how a customer's call is routed through the system, and which customer service agent is best suited to handle the call.
- a method of directly dialing a phone number without routing calls through an attendant or an automated attendant console. “D.I.D.” is a common term for someone's personal phone number.
- used to connect different softwares together in an integration.
- the invisible "line" a customer is waiting in before they get to an agent.
- an application for making telephone calls over the internet using a computing device, rather than a traditional telephone handset.
- an integrated and usually automated communications system that coordinates all telephone and electronic contacts between an organization and the public.
18 Clues: used to connect different softwares together in an integration. • the invisible "line" a customer is waiting in before they get to an agent. • helps monitor and improve the quality of performance of the contact center. • the hardware and software that comprise a traditional business telephone system. • ...
App 2025-02-18
Across
- statement A command that performs different actions depending on whether a condition is true or false.
- The writing of compound words by starting each word with a capital letter. Procedures and variables are named using camelCase, but the first word in the name is not capitalized.
- logic A form of mathematics in which an expression is reduced to either True or False.
- The attempt to find and fix errors in computer hardware or programs.
- science The science of creating artifacts and solving problems using the help of a computer. Areas of focus include software engineering, programming, data analysis, algorithms, graphics, and animation.
- scientists Scientists who apply their knowledge of computation to creating solutions using a computer system.
- handler A block of code that is triggered when a certain event happens.
- A set of instructions that a computer executes to achieve a particular objective.
- An action or occurrence that happens during runtime that will trigger a response or behavior by the software. Examples of events include user-initiated events, such as clicking a button, or external events, such as the device receiving an SMS text message.
- approach An approach to programming where the programmer adds and tests code in small chunks at a time to make sure it behaves the way they want it to, before adding more code.
Down
- Graphic object that may be moved on-screen or otherwise manipulated.
- application (or app) A type of software application designed to run on a mobile device, such as a smartphone or tablet computer.
- user A representative consumer for whom a hardware or software product is designed.
- An ordered set of instructions that are used to carry out a task.
- A diagram that represents an algorithm, workflow, or process, and uses geometric symbols connected by arrows to show the direction of the flow of action.
- A flaw in a computer program that causes the program to produce an incorrect result or behavior.
- interface (UI) The visual part of a computer app or operating system, through which an end user interacts with the computing device or software.
- programming Two people working together to create a computer program. One person, called the driver, writes the code and explains the logic, while the other person, called the navigator, reviews it and gives feedback.
- An incorrect result produced by a computer program.
- layer The layer of an app that the user sees and interacts with.
20 Clues: An incorrect result produced by a computer program. • layer The layer of an app that the user sees and interacts with. • An ordered set of instructions that are used to carry out a task. • Graphic object that may be moved on-screen or otherwise manipulated. • The attempt to find and fix errors in computer hardware or programs. • ...
Chapter 04: Part 04 2017-04-11
Across
- A major advantage of using word processing software is that users easily can change what they have what
- With a computerized what, the computer stores the data in an electronic format on a storage medium such as a hard disk.
- Word processing software includes a spelling what, which reviews the spelling of individual words, sections of a document, or the entire document
- To use what, a computer must be running an operating system.
- Presentation software allows users to apply special what to the transition between slides
- Note taking software can store notes in a what form.
- You have created a specific named location on your hard disk to hold some songs you have purchased. What is the term for this location?
- While a computer is running, the operating system remains in what
- what developers typically cannot incorporate freeware in applications they intend to sell
- With what, you always access the latest version of the software.
Down
- Most personal what software includes financial planning features, such as analyzing home and personal loans, preparing income taxes, and managing retirement savings
- You have received an email that is directing you to a phony website that looks like the website for your mortgage company. What kind of message is this?
- You have heard that it is possible to improve your computer's performance by storing all related files for a particular program together. What is the term for this?
- Using tax preparation software, who can file their state and federal tax returns online, in a process called e-filing.
- Many of the more secure personal finance apps have dual passwords that involve typing a string of what and also validating a picture
- A program has been placed on your smartphone without your knowledge and it is collecting personal information about you. What kind of application is this?
- Many users opt for electronic distribution of what because it contributes to green computing
- A feature, called what, allows users to type words in a paragraph continually without pressing the ENTER key at the end of each line
18 Clues: Note taking software can store notes in a what form. • To use what, a computer must be running an operating system. • With what, you always access the latest version of the software. • While a computer is running, the operating system remains in what • Presentation software allows users to apply special what to the transition between slides • ...
Industry Terminology Crossword 2024-01-11
Across
- manages all of a company's relationships and interactions with their customers and prospects, including documents, key contacts, quotes, etc.
- software that integrates voice communications systems with computers for contact center and office automation applications.
- determines how a customer's call is routed through the system, and which customer service agent is best suited to handle the call.
- technology in which large amounts of data are used to create algorithms that get smarter over time.
- the invisible "line" a customer is waiting in before they get to an agent.
- the combination of local, long-distance, and international carriers that make up the worldwide telephone network.
- refers to any technology involving the development, application, and deployment of telecommunication services for the purpose of electronic transmission of voice, fax, or data, between distant parties.
- automatic voice system that customers interact with when they call a business. Some customer questions can be resolved via this system without the need to speak to a live person.
- a group of technologies that work to deliver voice and other multimedia sessions over IP networks, most commonly the internet.
Down
- term for monitoring, forecasting, and planning for contact center staffing needs.
- an application for making telephone calls over the internet using a computing device, rather than a traditional telephone handset.
- an integrated and usually automated communications system that coordinates all telephone and electronic contacts between an organization and the public.
- a method of directly dialing a phone number without routing calls through an attendant or an automated attendant console. “D.I.D.” is a common term for someone's personal phone number.
- the time between the moment your voice is transmitted, and the moment it reaches its destination.
- helps monitor and improve the quality of performance of the contact center.
- the hardware and software that comprise a traditional business telephone system.
- allow inbound calls to be directed to a set of employees and ring all phones at the same time.
- used to connect different softwares together in an integration.
18 Clues: used to connect different softwares together in an integration. • the invisible "line" a customer is waiting in before they get to an agent. • helps monitor and improve the quality of performance of the contact center. • the hardware and software that comprise a traditional business telephone system. • ...
Artificial Intelligence-Assisted Automatic Raman-Activated CellSorting (AI-RACS) System for Mining Specific FunctionalMicroorganisms in the Microbiome 2024-11-12
Across
- relating to small-scale fluid manipulation; synonyms: microscale fluidics, microfluidic chip, microfluidic experiment
- intelligence the simulation of human intelligence in machines; synonyms: AI, machine learning, cognitive computing
- capture the use of a material that easily transmits electric force; synonyms: electrostatic capture, electrokinetic capture, electrophoretic capture
- a community of microorganisms; synonyms: microflora, microbe population, microbiota
- tweezers a device that uses a laser beam to trap and manipulate small objects, including cells; synonyms: laser tweezers, laser traps, optical traps
- printing a technique used to deposit individual cells with precision; synonyms: cell printing, single-cell deposition, cell patterning
- the process of growing microorganisms under controlled conditions; synonyms: growing, farming, breeding
- the complete set of messenger RNA molecules expressed by a genome or cell; synonyms: mRNA library, expression profile, gene expression
- the physical characteristics of an organism; synonyms: trait, physical trait, characteristicGenotype the genetic makeup of an individual; synonyms: genetic makeup, DNA profile, genetic constitution
- networks a system of biochemical reactions within cells; synonyms: metabolic pathways, biochemical networks, metabolic systems
- cell sorting a technique used to distinguish cells by their chemical composition; synonyms: RACS, cell sorting, single-cell sorting
Down
- a cell that exists as a solitary unit rather than a part of a larger organism; synonyms: individual cell, isolated cell, singular cell
- a process that is capable of handling large amounts of data or material quickly; synonyms: high-volume, rapid, efficient
- community a group of microorganisms that live in the same environment; synonyms: microbiota, microflora, microbial colony
- analysis analyzing the functions of a system or organism; synonyms: functional study, performance analysis, system analysis
- a living organism that is too small to be seen with the naked eye; synonyms: microbe, microbe species, microbe community
- situ conditions a term used to describe a state in which the conditions being studied are as similar as possible to their natural state; synonyms: near-native conditions, natural conditions, close-to-environment conditions
- microbes microorganisms that can tolerate aluminum in soil or water; synonyms: aluminum-resistant microbes, aluminum-adapted microbes, aluminum-tolerant bacteria
- samples a sample taken from the natural environment for research or analysis; synonyms: environmental specimen, nature sample, ecological sample
19 Clues: a community of microorganisms; synonyms: microflora, microbe population, microbiota • the process of growing microorganisms under controlled conditions; synonyms: growing, farming, breeding • relating to small-scale fluid manipulation; synonyms: microscale fluidics, microfluidic chip, microfluidic experiment • ...
Computer Applications 2021-09-28
2 Clues: A vast network that connects computers all over the world • A vocabulary and set of grammatical rules form instructing a computer or computing device to perform specific tasks
Tecnologias tradicionais e novas tecnologias que impactam nas Empresas 2021-04-02
Across
- consiste na análise de uma grande quantidade de dados, online e offline, por computadores, gerando informações necessárias aos negócios e auxiliando no desenvolvimento de ações.
- Permite mapeamentos de áreas com precisão, eficiência e economia. Além de gerar economia ao substituir ultraleves e helicópteros para realizar a tarefa.
- Faz parte da antiga tecnologia, foram usados por muito tempo e muitas pessoas tiveram, inclusive, a oportunidade de acompanhar a sua evolução. Se você teve a oportunidade de utilizar esses dispositivos, sabe bem o que era ter que utilizar 20 para instalar um jogo, colocando um após o outro quando solicitado.
- Nada substituirá tão cedo o feeling humano para o negócio,porém, em poucos anos, podem ser as nossas gestoras operacionais.
Down
- Significa cadeia de blocos, teve início no setor financeiro e é relacionado diretamente aos bitcoins.
- Entre os principais tipos utilizados, estão o boleto bancário, as transferências eletrônicas de valores, o cartão de débito e o cartão de crédito.
- É um dispositivo de memória constituído por memória flash, está entre novas e antigas tecnologias, capaz de fazer a gravação de dados com uma ligação USB tipo A.
- Cloud computing é fundamental para o armazenamento de dados. Esqueça as velhas gavetas e armários que juntavam poeira com uma infinidade de pastas, deixe seus arquivos na internet para acessá-los a qualquer hora e lugar.
8 Clues: Significa cadeia de blocos, teve início no setor financeiro e é relacionado diretamente aos bitcoins. • Nada substituirá tão cedo o feeling humano para o negócio,porém, em poucos anos, podem ser as nossas gestoras operacionais. • ...
Employability skills 2025-02-14
Across
- The ability to relate to others, resolve conflict, negotiate and cooperate with others.
- The ability to analyse situations and issues, reason logically, come to logical conclusions and put together logical arguments.
- The ability to properly manage your work time and priorities, and coordinate tasks for yourself and others.
Down
- The ability to express yourself clearly and accurately, both verbally and in writing. Communication skills also include the ability to listen, to understand what is being said as well as what has been written, to respond appropriately and to follow instructions.
- The ability to analyse problems, make decisions and take the actions necessary to solve the problems.
- The ability to use technology as a tool to help find information, manage information, and store information in a database. These skills also include the ability to effectively use the Internet, e-mail, and computer software applications. Most jobs in contemporary society require you to be computer literate.
- The ability to take decisions to get things done, instead of always waiting for someone to tell you what to do.
- The ability to work well with people who are different from you, and being able to play your role as a member of the team, putting the achievement of the mission and goals of the workplace first.
8 Clues: The ability to relate to others, resolve conflict, negotiate and cooperate with others. • The ability to analyse problems, make decisions and take the actions necessary to solve the problems. • The ability to properly manage your work time and priorities, and coordinate tasks for yourself and others. • ...
Impacts of Technology on Society 2022-06-09
Across
- psychologically exploit ones insecurities to groom
- breaking into a computer system
- Facebook changing its name to meta after the it was threatened to get taken down, this is an example of _____
- "a software that performs poorly when it comes to dealing with different groups based on stereotypes and profiling"
- “A lot of people are saying this is showing that AI is prejudiced. No. This is showing we’re prejudiced and that AI is _______ it.”
- False stories from social media
- "differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics."
- an example of national security being prioritized over privacy is when the U.S. government wanted to prevent more attacks like 9-11 by ______ emails, texts and social media
- During the 1998 U.S. embassy bombings, a suspect sent ______ emails under various names such as "Norman", "Abdus Sabbur" to "associates of al qaeda"
Down
- "Very recently, a man was arrested and has been tried against his “international _________ campaign.” He pleaded guilty to 63 charges of identity fraud, defamation and criminal harassment in a case that involved 38 people across Canada, the U.S. and U.K.."
- rewards that keep people attached to a media platform such as Facebook likes or Snapchat streaks
- Napster is a _________ system that allows individuals to find each other and send music files
- An example of hacking is a software called ________ that is used to record key strokes on a computer.
- "the action or practice of preventing someone holding views regarded as unacceptable or offensive from contributing to a forum or debate, especially by blocking them on a particular website”
- a point in time where advancements occur so quickly to the point where only AI can perceive these advancements.
- when media only shares content that is relatively tied to your beliefs and attitudes.
- A process utilized by a media platform like Facebook in order to advertise insights based on what data you have provided this service with
- An identity that is unknown to other internet users
18 Clues: breaking into a computer system • False stories from social media • psychologically exploit ones insecurities to groom • An identity that is unknown to other internet users • when media only shares content that is relatively tied to your beliefs and attitudes. • Napster is a _________ system that allows individuals to find each other and send music files • ...
GE Digital vocalulary quizz 2016-01-18
Across
- Open source cloud platform as a service (PaaS) which is the foundation of Predix [2 words separated by an hyphen]
- Asset Predictive Maintenance
- Set of practices, tools and policies that lead to improved quality and Automated app Delivery (AD)
- Category of cloud computing services that provides a platform allowing customers to develop, run, and manage web applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
- Network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
- Software layer responsible for communicating with industrial asset and Predix Cloud & running local applications, like edge analytics. [2 words separated by an hyphen]
Down
- Tools and processes that enable the rapid, profitable Monetization of Predix Services and Predix-Powered apps by GE, its Customers and Partners
- Hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise
- Information continuum connecting apps through the life-cycle of a GE product (from NPI all the way to the maintenance – with everything that is between) [2 words separated by an hyphen]
- Software architecture style in which complex applications are composed of small, independent processes communicating with each other using language-agnostic APIs [2 words separated by an hyphen]
- Cloud-based PaaS (platform as a service) launched by GE to enable industrial-scale analytics for asset performance management (APM) and operations optimization by providing a standard way to connect machines, data, and people.
- Collection of algorithms and models that model an equipment and give continuous insight [2 words separated by an hyphen]
12 Clues: Asset Predictive Maintenance • Set of practices, tools and policies that lead to improved quality and Automated app Delivery (AD) • Open source cloud platform as a service (PaaS) which is the foundation of Predix [2 words separated by an hyphen] • ...
Learning Unit 2 2022-03-10
Across
- runs when the user launches an infected program or boots from an infected disk or USB drive. Keep a low profile because they need to spread widely without being detected
- Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts.
- The use of authentic-looking emails, often purporting to be from a bank or government agency, to trick you into responding with sensitive personal data.
- Someone who uses the Internet to illegally break into computers.
- The illegal placement of unauthorized charges on your telephone bill for unrequested services or calls not made.
- A network of computers — maybe one of the machines is yours — that scammers have infected with hidden software to secretly send spam.
Down
- is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
- The capturing of information from the magnetic stripe on your ATM and credit card by use of portable "skimmer" devices that are secretly installed on card-reading machines.
- is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.
- is a type of malicious software -- or malware -- that is installed on a computing device.
- Short for "voice phishing," it's the use of recorded messages to telephones — usually claiming to be from a bank — with the goal of tricking you into revealing personal or account information for identity theft.
- Named for the SMS (short message service) technology used to send text messages, it means phishing attempts made on cellphones.
12 Clues: Someone who uses the Internet to illegally break into computers. • is a type of malicious software -- or malware -- that is installed on a computing device. • The illegal placement of unauthorized charges on your telephone bill for unrequested services or calls not made. • ...
Tech Words-Mitchel Giggey 2019-11-06
Across
- /the programs and other operating information used by a computer.
- /is any malware which misleads users of its true intent.
- /In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Down
- /the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- /a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
- /comprises of malicious code that is distributed in email messages, and this code can be activated when a user opens an email attachment, clicks on a link in an email message, or interacts in a totally different way with the infected email message.
- / type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected"
7 Clues: /is any malware which misleads users of its true intent. • /the programs and other operating information used by a computer. • /the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. • ...
Parts of a computing - Simrin 2017-06-30
Homework - Computing Create a Crossword 2024-04-24
4 Clues: A network that connects computers in a limited space • When 2 or more computers are connected to share resources • the practice of distributing or providing access to digital media • an external device that connects to a computer to expand its capabilities.
IBM Habba 2015-03-23
Across
- This IBM brand includes infrastructure as a service, software as a service and platform as a service offered through public, private and hybrid cloud delivery models.
- It is a cloud platform as a service, supports several programming languages and services as well as integrated DevOps to build, run, deploy and manage applications on the cloud.
Down
- It is an IBM cloud start-up acquisition and a software product, which is primarily delivered as a cloud-based service. It is an open source non-relational, distributed database service of the same name that requires zero-configuration.
- The IBM acquisition that happened in 2013. This acquisition enabled strengthening IBM’s leadership position in cloud computing and help speed business adoption of public and private cloud solutions.
4 Clues: This IBM brand includes infrastructure as a service, software as a service and platform as a service offered through public, private and hybrid cloud delivery models. • It is a cloud platform as a service, supports several programming languages and services as well as integrated DevOps to build, run, deploy and manage applications on the cloud. • ...
Word Processing Terminology 2013-11-19
Across
- processing the process of making changes or corrections in a document
- the white spaces on the edges of a page of text
- the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket.
- politician, humanist scholar, and writer who refused to comply with the Act of Supremacy, by which English subjects were enjoined to recognize Henry VIII's authority over the pope, and was imprisoned in the Tower of London and beheaded for treason. His political essay Utopia (1516) speculates about life under an ideal government. More was canonized in 1935.
- bar a horizontal bar, typically at the bottom of the screen or window, showing information about a document being edited or a program running.
- bar a horizontal bar at the top of a window, bearing the name of the program and typically the name of the currently active document.
- bar a horizontal bar, typically located at the top of the screen below the title bar, containing drop-down menus.
Down
- a person exercising government or dominion.
- page A leaf or one side of a leaf, as of a book, letter, newspaper, or manuscript: tore a page from the book.
- spacing indicate spaces of line and text
- the text created using a word processing/application
- bar In a graphical user interface, on a computer monitor, a toolbar is a GUI widget on which on-screen buttons, icons, menus, or other input or output elements are placed. An earlier term used was "ribbon". ...
- deciding, before you print a final copy,how the documenet should look on paper
- bar In computing, a taskbar is a bar displayed on a full edge of a GUI desktop that is used to launch and monitor running applications. ...
14 Clues: spacing indicate spaces of line and text • a person exercising government or dominion. • the white spaces on the edges of a page of text • the text created using a word processing/application • processing the process of making changes or corrections in a document • deciding, before you print a final copy,how the documenet should look on paper • ...
Vocab Lesson #1 Anthony Fuentes 2017-03-02
Across
- Undo is a command included in most software programs. It is typically located at the top of the Edit menu and has the standard shortcut
- box a small area on screen, in which the user is prompted to provide information or select commands.
- space In computer science, whitespace is any character or series of characters that represent horizontal or vertical space in typography.
- Definition of: tab (1) (TABlet) See tablet computer. (2) To move the cursor on a display screen or the print head on a printer to a specified column (the tab stop).
- view After you click the File tab, you can see the Microsoft Office Backstage view.
- complete a software function that gives users the option of completing words or forms by a shorthand method on the basis of what has been typed before.
- keys In a web browser, an access key or accesskey allows a computer user to immediately jump to a specific part of a web page via the keyboard.
- tips Keytip. In Microsoft Office 2007 and 2010 applications, like Word, Excel, PowerPoint, and Outlook, a keytip is a keyboard shortcut to use a function on a ribbon, also called a ribbon control.
Down
- In computing and telecommunications, a menu or menubar is graphical control element.
- word wrap Computer Definition. A word processing feature that moves words to the next line automatically as you type based on the current right margin setting.
- point In graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen.
- beam a girder that has the shape of an I when viewed in section.
- The term template, when used in the context of word processing software, refers to a sample document that has already some details in place; those can be adapted
- a number of people or things that are located close together or are considered or classed together.
14 Clues: beam a girder that has the shape of an I when viewed in section. • view After you click the File tab, you can see the Microsoft Office Backstage view. • In computing and telecommunications, a menu or menubar is graphical control element. • a number of people or things that are located close together or are considered or classed together. • ...
jordyn 2025-09-09
Across
- A global system of interconnected networks that links up worldwide devices. It is a system of hardware and infrastructure, like cables and routers, that allows devices around the world to exchange data and information.
- a drive that helps with electro-mechanical data storage device that stores and retrieves digital data
- a quotation from or reference to a book, paper, or author,
- the practice of pretending to be someone else.
- is an application for accessing websites.
- a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage
- a form of social engineering and a scam where attackers on or installing malware such as viruses, worms, adware, or ransomware.
Down
- the ability to responsibly use technologies,and the internet to find,, use, share, and create i google
- software program or a system designed to help users find information stored on the internet or within a specific database. it work by indexing and cataloging content from various sources and then providing users with a list of relevant results based on their search queries.
- security device that is a barrier between an internal network and an untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from unauthorized access and intruders.
- is something that combines traditional mobile technology with more advanced computing abilities. something that typically allows users to access a wide range of information with its touch screen.
- small text files that gather together your data and store various types of information logins and user settings their purpose is to identify and remember your information.
- the responsible, respectful and safe, use of technology in daily life, along with online safety, and privacy,
14 Clues: is an application for accessing websites. • the practice of pretending to be someone else. • a quotation from or reference to a book, paper, or author, • a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage • a drive that helps with electro-mechanical data storage device that stores and retrieves digital data • ...
ADSI ANGIE CRUZ 2022-05-05
Across
- he backup is an English word that in the field of technology and information, is a backup or backup process.
- is an interpreted programming language, dialect of the ECMAScript standard. It is defined as object-oriented, prototype-based, imperative, weakly typed, and dynamic.
- Programa o conjunto de programas informáticos que realizan un trabajo específico, diseñado para el beneficio del usuario final.
- is a vehicle entertainment, navigation and communications system developed by Magneti Marelli, a company owned by the Fiat Group.
- is a word from English that can be translated into Spanish as 'key word'. In this sense, it is synonymous with password or key.
- is a way of working, organizing, or doing something which follows a fixed plan or set of rules.
- The term Update is used precisely for the Spanish word for Update,
Down
- is a programming language and computing platform that was first commercialized in 1995 by Sun Microsystems.
- is an open source relational database management system (RDBMS) backed by Oracle and based on Structured Query Language (SQL).
- It is the element that creates bookmark buttons. The HTML <button> tag represents a clickable button-type element that can be used on forms or anywhere on the page that needs a standard, simple-to-apply button.
- is the name of a family of software distributions for PCs, servers, embedded systems, and formerly smartphones developed and sold by Microsoft and available
- Una base de datos se encarga no solo de almacenar datos, sino también de conectarlos entre sí en una unidad lógica.
- is a programming language designed to develop applications for the web and create web pages, favoring the connection between servers and the user interface.
- is a term that refers to a small piece of information sent by a website
- The software can be modified to suit the particular needs of the end user.
- A website, portal or cybersite is a collection of web pages related and common to an internet domain or subdomain on the World Wide Web within the Internet.
- keep safe or rescue from harm or danger.
17 Clues: keep safe or rescue from harm or danger. • The term Update is used precisely for the Spanish word for Update, • is a term that refers to a small piece of information sent by a website • The software can be modified to suit the particular needs of the end user. • is a way of working, organizing, or doing something which follows a fixed plan or set of rules. • ...
Database Essentials Crossword (Belyaev 8K92) 2022-05-31
Across
- An SQL table that is defined through a set of application-specific C functions that conform to a particular interface specification, allowing a non-database data source (e.g., a device, etc.) to be accessed as if it were a conventional SQL table
- The encoding of data so that it cannot be understood by a human reader
- A separate structure that allows fast access to a table's rows based on the data values of the columns used in the index
- A representation of the structure of a database. It may be graphical or textual
- The implementation method (frequently using semaphores) by which concurrently executing multiple computer threads or processes can safely access and update shared data
- A column or columns on which an index is constructed to allow rapid and/or sorted access to a table's row
- A data representation offered as a more compact but still humanly readable alternative to XML
Down
- The ability to copy the changes each transaction made to the database from the master database to one or more slave databases so that exact copies of the master database are always available on the slaves
- A network portal through which two computing processes can communicate
- A software-development tool that translates high-level language programs into the machine-language instructions that a particular processor can understand and execute
- A set of logically related database modifications that is written to the database as a unit
- A method for safely protecting objects from being changed by two or more users (processes/threads) at the same time.
- A single, sequential execution of a computer program or program segment.
- An indexing method that provides for a fast retrieval (usually in only one additional disk access) of the row that has a matching column value.
- The container for a set of common software API functions
- A collection of closely related columns
- Occurs when a lock request has waited longer than the prescribed wait time for the request to be granted
17 Clues: A collection of closely related columns • The container for a set of common software API functions • A network portal through which two computing processes can communicate • The encoding of data so that it cannot be understood by a human reader • A single, sequential execution of a computer program or program segment. • ...
Crossword Puzzle_ Reverse Engineering_Christian_Douglas 2025-05-02
Across
- A self-contained system within a larger system.
- Term used to talk about beauty or art and people's appreciation of beautiful things.
- In science, computing, and engineering, a black box is a device, system, or object which can be viewed in terms of it inputs and outputs, without any knowledge of its internal workings.
- 1. A relationship of one set (called the domain) to another set (called the range) that assigns to each element of the domain exactly one element of the range. 2. The action or actions that an item is designed to perform.
- Turning around an axis or center point.
- The process of taking something apart and analyzing its workings in detail.
- (noun) The result of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics. The process of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics.
- A group of parts that are connected and form one unit.
Down
- A variable by which an object can move.
- Understanding a system by examining the connections between the parts that compose the entirety of the system.
- A product that already exists that does not need to be custom designed and produced.
- A functional analysis is a step in the reverse engineering process which identifies the necessary activities or actions of components and subsystems to turn available inputs—such as materials and energy—into desired output. A functional analysis is conducted through careful observation of the object's sequential operation before it is disassembled.
- Motion in which all particles of a body move with the same velocity along parallel paths.
- A group of interacting, interrelated, or interdependent elements or parts that function together as a whole to accomplish a goal. Change happens if you add or remove a part.
14 Clues: A variable by which an object can move. • Turning around an axis or center point. • A self-contained system within a larger system. • A group of parts that are connected and form one unit. • The process of taking something apart and analyzing its workings in detail. • Term used to talk about beauty or art and people's appreciation of beautiful things. • ...
HTML- WEBPAGE VOCABULARY 2018-10-02
Across
- A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data
- tag A keyword or term assigned to a piece of information (such as an Internet bookmark, digital image, database record, or computer file).
- A well-defined procedure that allows a computer to solve a prob
- A combination of typeface and other qualities, such as size, pitch, and spacing.
- Data or commands entered by the keyboard of the computer
- Process of designing and building an executable computer program for accomplishing a specific computing task
- The other two logic structures are selection and loop. In a sequence structure, an action, or event, leads to the next ordered action in a predetermined order
- A sequence of instruction s that is continually repeated until a certain condition is reached.
Down
- Routine process of locating and removing computer program bugs, errors or abnormalities
- Page Makes up the World Wide Web. These documents are written in HTML
- Expressions and conditional constructs are features of a programming language, which perform different computations or actions depending on whether a programmer-specified Boolean condition evaluates to true or false.
- Referring to Hyper Text Markup Language, see our HTML element definition for further information.
- A human readable sequence of character s and the words they form that can be encoded into computer-readable formats such as ASCII
- Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape.
- Engine A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.
- Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.
- system or set of principles underlying the arrangements of elements in a computer or electronic device so as to perform a specified task.
17 Clues: Data or commands entered by the keyboard of the computer • A well-defined procedure that allows a computer to solve a prob • Page Makes up the World Wide Web. These documents are written in HTML • A combination of typeface and other qualities, such as size, pitch, and spacing. • ...
buisness and marketing 2022-12-13
Across
- appearing suddenly: such as. computing: appearing suddenly on a screen over another window or display. a pop-up window. a pop-up ad.
- A firewall is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
Down
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
3 Clues: appearing suddenly: such as. computing: appearing suddenly on a screen over another window or display. a pop-up window. a pop-up ad. • A firewall is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules. • ...
Hardware 2019-02-01
Across
- or pointer on a display screen.
- (not on Macs) that the computer
- device that controls the movement of the
- Printer-A type of printer that works by spraying
- Central Processing Unit is the BRAIN of
- Service Bus; a type of port on the
- ink at a sheet of paper. Magnetized
- is OK, the BIOS loads the operating system into the computer's memory and finishes the boot-up process.
- term for display screen
- per second.
- device that can read text or illustrations
- Computers; Computers that normally use windows.
- and locates all your devices. If
- pre-installed on Windows-based
- expansion board that enables a computer to manipulate and output sounds.
- One MHz represents one million
- before the operating system is loaded.
- in the desired shapes.
- screens, loudspeakers, and printers.
- small, easy to use, portable storage device
- for "Basic Input/Output System." A
- and networking features.
- an application.
- is a permanent part of the computer.
- Disk-A magnetic disk on which you can store
- for backup.
Down
- on paper and translate the information into a form the computer can use.
- to enter data into a computer.
- i.e., the memory and microprocessor.
- in the ink's path direct the ink onto the
- Printer- A type of printer that utilizes a laser beam to
- Storage Devices-Grouping together tapes drives, cdr's, cdrw's,
- Card
- devices-A device that feeds data into a computer, such as a keyboard or mouse.
- to attach peripherals.
- storage areas in the computer.
- an image on a drum.
- memory used to store frequently
- as the monitor and system unit.
- attaches to the USB port.
- Only Memory; Memory that stores data
- silicon chip that contains a CPU.
- stores data and instructions.
- Phone-A phone that combines computing,
- data so that is can be quickly retrieved
- Device
- Access Memory; Memory that
- Thousand MegaHertz processor.
- -Short for DVD+Recordable, a recordable DVD format similar to CD-R. A DVD+R can only record data once and then the data becomes permanent on the disc.
- Drive
- to start up. The CPU accesses the BIOS
- The set of typewriter-like keys that enables
- BIOS then checks all your hardware
- computer made by Apple.
54 Clues: Card • Drive • Device • per second. • for backup. • an application. • an image on a drum. • to attach peripherals. • in the desired shapes. • term for display screen • computer made by Apple. • and networking features. • attaches to the USB port. • Access Memory; Memory that • stores data and instructions. • Thousand MegaHertz processor. • to enter data into a computer. • ...
CH1 Vocab Part A 2016-08-22
Across
- physical equipment directly involved in performing an industrial, technological, or military function.
- the part of a computer in which data or program instructions can be stored
- facts provided or learned about something or someone
- the ability of one device to show from different medias instead of using separate devices
- an item that can be worn
- type of media that are encoded in a machine readable form
- a motion of the limbs or body made too express or help express thought or to emphasize speech.
- handheld electronic device for using digital media such as audio and video files
- facts and statistics collected and used together for reference or analysis
- a computer system specially made for playing video games by connecting it to a television or other display for video and sound.
- a device on which information can be stored
- a portable computer small enough to use on a lap
- device on which memory is stored on
- type device that puts out output out of a computer
- a machine for printing text or pictures onto paper
Down
- a network of remote servers hosted on the internet and used to store, manage, and process data in place of local servers or personal computers
- a device that computes, especially a programmable electronic machine that performs high-speed mathematical or logical operations or that assembles, stores, correlates, or otherwise processes information.
- a portable computing device such as a smartphone
- a small portable device that accepts input directly onto its screen rather than via a keyboard or mouse.
- an electronic system that can store messages from telephone callers.
- a handheld device on which electronic books, newspapers, magazines, etc., can be read
- having current understanding and knowledge of computers, mobile devices, the web, and related technologies.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- a phone that performs many of the functions of a computer, typically having a touchscreen interface, internet access, and an operating system capable of running downloaded applications.
- a computer and tablet combined
- a computer that manages access to a centralized resource or service in a network.
- type device that provides input to a computer
27 Clues: an item that can be worn • a computer and tablet combined • device on which memory is stored on • a device on which information can be stored • type device that provides input to a computer • a portable computing device such as a smartphone • a portable computer small enough to use on a lap • type device that puts out output out of a computer • ...
Personal Finance Vocabulary Crossword 2016-08-28
Across
- state law that sets maximum interest rates that may be charged for consumer loans
- involves providing a service for which you will pay later
- a business that gathers, stores, and sells credit information to other businesses
- interest rate that banks offer to their best business customer
- an organization that makes high risk consumer loans
- loans in which the interest rate does not change over the life of the loan
- the percentage of interest you pay on a loan.
- checking several places to be sure you are getting the best prices for equal quality
- treating someone differently based on prejudice rather than individual merit
- a person or business that loans money to others
- the amount borrowed p, or the unpaid portion of the amount borrowed, on which the borrowed pays interest
- a person or company hired to collect an overdue balance on an account
- loans in which the interest rates goes up or down with inflation
- a legal business that makes high interest loans based on the value of personal possessions
- predetermined amount that can be borrowed on demand with no collateral
- a consumer's credit history issued by a bureau to a business
- an accredited person who borrows money from others, and must be prepaid later
- a code that protects your account name, number, and other information
Down
- remaining credit available to you on current accounts
- tells potential creditors the likelihood that you will repay debt as agreed
- buying something without thinking about it and making a conscious decision
- the total dollar amount of all interest and fees you pay for use of credit
- the measure of creditworthiness based on an analysis of your credit and financial history
- the cost of credit expressed as a yearly percentage
- unlicensed lenders that charge illegally high interest rates
- the use of someone's money, borrowed now with an agreement to pay it back later
- the financial ability to repay a loan repay a loan with present income
- interest computed only on the account borrowed or saved without computing
- a person who agrees to pay the loan if the borrower falls to
- a complete record of your borrowing and repayment performance
30 Clues: the percentage of interest you pay on a loan. • a person or business that loans money to others • the cost of credit expressed as a yearly percentage • an organization that makes high risk consumer loans • remaining credit available to you on current accounts • involves providing a service for which you will pay later • ...
Computer Science 2020-11-16
Across
- A basic unit of information in computing and digital communications
- It's an electronic device used to make holes
- It is intelligence demonstrated by machines
- A service that makes website accessible via the World Wide Web
- It's an organized collection of data
- A computer expert with advanced technical knowledge
- Physical parts of a computer
- A computer program that converses in natural language
- A hand-held pointing device that detects two-dimensional motion relative to a surface
- User who has all permissions on the system
- It's a system software that manages computer hardware, software resources, and provides common services for computer programs
- It's firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs
- It's the process of improving the quality and quantity of website traffic to a website or a web page from search engines
- A program that transforms source code into object code
- It is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks and wide area networks
- A method of exchanging messages between people using electronic devices
- A software application that provides comprehensive facilities to computer programmers for software development
- It's the global system of interconnected computer networks
Down
- A peripheral device which makes a persistent representation of graphics or text, usually on paper
- An object that has been intentionally placed into orbit
- A system used for reporting and data analysis, and is considered a core component of business intelligence
- A communication endpoint in computer networking
- An end-point in a communication across a network or the Internet
- A computer program used to prevent, detect, and remove malware
- It's a spreadsheet developed by Microsoft,It features calculation, graphing tools, pivot tables, and a macro programming language
- A small, portable personal computer
- A common means for unrelated objects to communicate with each other
- It's cause a malfunction in a computer program
- You can have light with it
- A piece of computer hardware or software that provides functionality for other programs or devices
- It is a domain-specific language used in programming and designed for managing data held in a relational database management system
- A set of instructions that describes how to perform a specific task to a computer
32 Clues: You can have light with it • Physical parts of a computer • A small, portable personal computer • It's an organized collection of data • User who has all permissions on the system • It is intelligence demonstrated by machines • It's an electronic device used to make holes • It's cause a malfunction in a computer program • A communication endpoint in computer networking • ...
Ethical& Professional Issues 2020-12-19
Across
- In Guidelines and Professional Responsibilities, it require a convincing case of what?
- “The ends justify the means”. That the quotes for ________ ethical views.
- We are all users of technology. It is how we appropriate it that presents an impact either in bad ways which is _______ impact.
- There are 3 area of implication which is positive implications, negative implication and ____________ implication
- Many professions have a code of ______ that professionals are expected to abide.
- We are all users of technology. It is how we appropriate it that presents an impact either in good ways which is _______ impact.
- Negative rights, also known as _______ is the right to act without coercive interference.
- Bring to social change when it is offered in context, with appropriate training, and with the intent of empowering the user
- One of Ethical Behaviors Expected of the Computer Professional is ________ property right
- Creation of information tailored to your preferences
- In ethical views, _______ is emphasizes duty and absolute rules.
- In special aspects of professional ethics, we
Down
- ACM member is expected to__________ understanding of computing and its consequence Public
- What the member of IEEE do about bribery?
- Trading off the power and shift toward convenience
- Allow electronic device to perform in multiple function
- _______ is a group of people (generally children born after 1980) that have grown up with easy access to digital information and communication technologies.
- Attitude or opinion of the innovation based upon perceived characteristics of the innovation
- Professional ethics includes ___________ with and responsibilities toward customers, clients, co-workers, employees, employers, others who use one’s products and services, and others whom they affect.
- Seek reinforcement of an innovation-decision already made, or reverse the decision
- Some ethical issues are ________.
- ________ is a tendency to lean in a certain direction, either in favor of or against a particular thing.
- Individual is exposed to an innovation’s existence and gains some understanding of how it functions
- to follow good professional standards and _____________
- One examples of professionalism and ethical behavior in the workplace is?
- A professional has a responsibility to act _________.
- ICT is advancing and ubiquitous
- ____________and ethical behavior in the workplace can benefit your career and improve your working environment
- In ethical views, _______ is derived from the nature of humanity.
29 Clues: ICT is advancing and ubiquitous • Some ethical issues are ________. • What the member of IEEE do about bribery? • In special aspects of professional ethics, we • Trading off the power and shift toward convenience • Creation of information tailored to your preferences • A professional has a responsibility to act _________. • ...
Vocabulary Crossword 2022-05-02
Across
- An algorithm can select between two alternative paths based on some condition.
- The smallest unit of data in a computer. A bit has a single binary value, either 0 or 1.
- a numbering scheme in which there are only two possible values for each digit: 0 and 1.
- Add an element to the end of a list.
- Repetition of a process.
- The capacity for the system to change in size and scale to meet new demands.
- A small chunk of any kind of data: text, numbers, lists, etc.
- A high-level textual algorithm written in informative text that mimics a programming language but cannot be executed by a computer.
- Identifies a values unique position on a list. In SNAP and on the AP CSP exam the first item on the list is stored at index 1.
- A combination of operators and values that evaluates to a single value.
- A data type for variables and conditions that evaluates to either true or false.
Down
- A simple diagram with symbols showing the flow of a process. Used as a design tool.
- A geometric shape where all sides are of an equal length and all angles have equivalent values.
- A unit of data that is eight binary digits long. Often used to represent a character such as a letter, number, or space.
- A type of list or data structure that stores a collection of data.
- The series of connections between computing devices on a network starting with a sender and ending with a receiver.
- A line of executable code.
- To identify and remove errors from a computer program or code.
- A data type is used to represent text that is often enclosed by quotation marks.
- Add an element to a list at a certain index.
- An agreed-upon set of rules that specify the behavior of some system.
- The action of doing something over and over again.
- Formal arguments are values that are passed into a procedure as input. They allow for the same procedure to be called but to produce different outcomes for different inputs.
- One data point that is stored in a list. It is a single part of a larger group.
24 Clues: Repetition of a process. • A line of executable code. • Add an element to the end of a list. • Add an element to a list at a certain index. • The action of doing something over and over again. • A small chunk of any kind of data: text, numbers, lists, etc. • To identify and remove errors from a computer program or code. • ...
ICS20 Heyab 2022-10-25
Across
- A documentations system allows you to access your documents from anywhere.
- A thing where peripherals are plugged into for use.
- Something that enables radio wave connections between devices
- A cloud-based storage service that allows users to store and access files online for free.
- It receives data and permanently writes it on a chip, and it lasts even after your computer is turned off.
- Ctrl + X. A command the allows you to cut
- A computer's short-term memory, where the data that the processor is currently using is stored.
- A device that can be plugged into a computer to allow audio components to be used in multimedia applications.
- type of storage device used in computers. This non-volatile storage media stores persistent data on solid-state flash memory
- Ctrl + V. A command that allows you to paste.
- A subscription streaming service in the United States that allows you to watch shows and movies.
- A free and open-source web browser developed by Mozilla.
- A device that allows a user to enter text into a computer or other electronic machinery
Down
- A type of display adapter or video card found in most computing devices that allows data to be displayed with high clarity, colour, definition, and overall appearance.
- Components and external peripherals link at the backbone communication point.
- enables you to be utilised in circumstances where wifi is not an option.
- A small device that a computer user moves across a desk surface to point to a location on a display screen and select one or more actions to be performed from that location.
- Either an Ethernet cable or WiFi can be used to connect to it.
- An output device that displays information in the form of a picture or text
- Ctrl + C. A command that allows you to copy and paste
- PROCESSING UNIT The computer's processing power
- An output hardware device that connects to a computer to generate sound.
- The hardware component that houses your whole digital archive
- Apple's primary operating system for Mac computers
- Microsoft primary operating system for their computers.
- A video-sharing service that allows users to watch, like, share, comment on, and upload their own videos
26 Clues: Ctrl + X. A command the allows you to cut • Ctrl + V. A command that allows you to paste. • PROCESSING UNIT The computer's processing power • Apple's primary operating system for Mac computers • A thing where peripherals are plugged into for use. • Ctrl + C. A command that allows you to copy and paste • ...
Makaia Smith: Midterm Study Guide (FMD 258) 2018-10-09
Across
- A company sends identical catalogs under two different covers at close time intervals to different customers.
- Firms owned, controlled, and operated by a group of users for their own benefit.
- Areas in catalogs that receive the most attention from readers.
- A small store that sells stylish clothing, jewelry, or other luxury goods.
- A store that sells a wide assortment of merchandise, in which consumers may buy large, wholesale, quantities of.
- The process of a business increasing production of goods/services at the same part of the supply chain.
- Two (or more) brands join for the purpose of reaching customers more effectively and increasing sales for both parties.
- Measures changes in the cost of living due to inflation; CPI.
- A parent company selling one of its businesses to another company.
- A brick-and-mortar where goods are sold directly from the manufacturer at a discount.
- Product, Price, Place, Promotion, and People.
- An increase in income causes a bigger percentage increase in demand; income elasticity.
Down
- The amount of money a family has available for purchases after taxes.
- A combination of psychographics and demographic information that segments the population into groups or types.
- The creation of an independent company through the sale or distribution of new shares of an existing business/division of a parent company.
- A good that is actually passed off to be a legitimate good when it is not.
- A retailer adds goods/services that may be unrelated to each other and to the firm's original business.
- The perception a customer has of a company or product in relation to others.
- The computing process of discovering patterns in a large set.
- An increase in income causes a fall in demand; income elasticity.
- The process of gathering and analyzing information from a variety of internal and external sources for the purpose of reducing risk before special business plans are executed.
- Social/Professional associations with which a person identifies and to which he or she looks when forming opinions.
- The ability of goods or service to satisfy one or more needs.
- The duration of time between a customer's receipt of a catalog and the actual sale.
- A mix of a magazine and a catalog.
25 Clues: A mix of a magazine and a catalog. • Product, Price, Place, Promotion, and People. • The computing process of discovering patterns in a large set. • Measures changes in the cost of living due to inflation; CPI. • The ability of goods or service to satisfy one or more needs. • Areas in catalogs that receive the most attention from readers. • ...
Danica's puzzle 2023-11-27
Across
- A computer that is suitable for use while travelling.
- type of online fraud where a cyber criminal designs a fake
- the hardware in a computing device where the operating system
- a place where u can store pictures and files and other things and u can loge into the cloud from anywhere and see all your stuff
- text files with small pieces of data like a username and password that are used to identify your computer as you use a network.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- is a common interface that enables communication between devices and a host controller such as a personal computer
- a electronic device with a screen which puts out pixels
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
- System It manages the computer's memory and processes
- video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
- It brings you to a certain website or page, the address.
Down
- performs many of the same functions as a computer,typically having a touch screen, internet access, and a operating system capable of running download applications.
- a peripheral device that enables a user to input text into a computer or any other electronic machinery.
- information that is easy to access which can include management, updating computer databases usually collect aggreations of data, records.
- a generic term used to refer to applications, scripts and programs that run on a device.
- global network of billions of computers and other electronic devices
- a personal computer designed to be used on a desk or table the opposite of portable computers like laptops or tablets
- web-centric laptops that run Google's Chrome operating system
- an application for accessing websites and the Internet.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- a wireless connection that connects you to the internet through radio waves
23 Clues: A computer that is suitable for use while travelling. • System It manages the computer's memory and processes • a electronic device with a screen which puts out pixels • an application for accessing websites and the Internet. • It brings you to a certain website or page, the address. • type of online fraud where a cyber criminal designs a fake • ...
DTIN - Digital Security 2024-07-04
Across
- - Software that automatically displays or downloads advertising material when a user is online.
- - A secret or undocumented way of gaining access to a program, online service, or an entire computer system.
- - A standalone malware computer program that replicates itself to spread to other computers.
- - Describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain.
- - A method of trying to gather personal information using deceptive e-mails and websites.
- - The process of converting information or data into a code to prevent unauthorized access.
- - The act of disguising a communication from an unknown source as being from a known, trusted source.
- - A person who uses computers to gain unauthorized access to data.
- - Malware that locks or encrypts data until a ransom is paid.
- - A network of private computers infected with malicious software and controlled as a group.
- - A type of surveillance technology used to record keystrokes.
- - Software designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- - Statistical analysis of people's unique physical and behavioral characteristics.
- - Distributed Denial of Service, a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable.
- - Software that enables a user to obtain covert information about another's computer activities.
- - Data sent from a website and stored on a user's computer by the user's web browser.
- - A security process by which a list of permitted entities is created and defined as acceptable.
- - Criminal activities carried out by means of computers or the internet.
- - A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- - Virtual Private Network, extends a private network across a public network, enabling users to send and receive data as if their computing devices were directly connected to the private network.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A type of malware that is often disguised as legitimate software.
- - A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
- - Software designed to detect and destroy computer viruses.
- - Secure Sockets Layer, the standard security technology for establishing an encrypted link between a web server and a browser.
25 Clues: - Software designed to detect and destroy computer viruses. • - Malware that locks or encrypts data until a ransom is paid. • - A type of surveillance technology used to record keystrokes. • - A person who uses computers to gain unauthorized access to data. • - A type of malware that is often disguised as legitimate software. • ...
Faculty Time Mass Trivia 2024-04-20
Across
- What is more useful when it is broken?
- Where creativity meets calculation, and innovation constructs tomorrow
- Singaporean slang for afraid to lose
- Which actor played the character Tony Stark, also known as Iron Man, in the Marvel Cinematic Universe?
- What is the name of the Studio Ghibli film that won the Academy Award for Best Animated Feature in 2003?
- What color are Mickey Mouse's shoes?
- It has keys but no locks. It has space but no room. You can enter but can’t go inside. What am I?
- Where justice is the language and precedent is the past’s echo, where minds are sharp and words are weapons. This court is now in session!
- Which actor played Jack in the movie "Titanic"?
- atgtryes
- Singaporean slang for tired / fed up
- Which K-drama features a love story between a North Korean soldier and a South Korean heiress?
- The other half, the ones studying the ‘whys’
- Where bytes meets brilliance
- The frontier of new discoveries where we explore the secrets of existence, from the tiniest particles to the vast expanses of space
- #bestcampuslife
- When is Star Wars day?
- Where is the only place where today comes before yesterday?
- Who is the villain in Phineas and Ferb?
- What is the name of the fictional continent where most of the action takes place in "Game of Thrones"?
Down
- What is the name of the group formed by Harry Styles, Liam Payne, Louis Tomlinson, Niall Horan, and Zayn Malik?
- Who is the youngest member of BTS?
- The last book of the Harry Potter series is Harry Potter and the ____
- What is the name of the fictional city where Batman operates?
- Who is the creator of the "Star Wars" franchise?
- In Spongebob Squarepants, who is Mr Krab’s nemesis?
- What has hands but cannot clap?
- What is the name of the fictional town in the TV series "Stranger Things"?
- Half of one, where creativity reigns
- Singaporean slang for placing tissue packets on tables
- rnveomneint
- Which actor plays Aquaman?
- Where we break open the classroom!
- “Let’s get down to ___” Where strategy meets swagger, ideas turn into profit and ambition into action
34 Clues: atgtryes • rnveomneint • #bestcampuslife • When is Star Wars day? • Which actor plays Aquaman? • Where bytes meets brilliance • What has hands but cannot clap? • Who is the youngest member of BTS? • Where we break open the classroom! • Singaporean slang for afraid to lose • What color are Mickey Mouse's shoes? • Half of one, where creativity reigns • ...
Technology Advance 2024-07-14
Across
- - A set of rules governing the exchange or transmission of data between devices.
- - A step-by-step procedure for solving a problem.
- - A hardware or software component that stores data so future requests for that data can be served faster.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - The process of converting information or data into a code to prevent unauthorized access.
- - The programs and other operating information used by a computer.
- - A small segment of data sent over a network.
- - Internet of Things, a network of physical objects embedded with sensors and software.
- System - Software that manages computer hardware and software resources.
- - The amount of data that can be transmitted over a network in a given amount of time.
- - Finding and fixing errors in software code.
- - Measures taken to protect a computer or computer system against unauthorized access or attack.
- - Uniform Resource Locator, the address of a web page.
- - A device that modulates and demodulates signals for data transmission.
Down
- - Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- - Unsolicited messages sent over the internet, typically to many users.
- - A group of binary digits or bits (usually eight) operated on as a unit.
- - Information processed or stored by a computer.
- - The delay before a transfer of data begins following an instruction for its transfer.
- - Hypertext Markup Language, the standard markup language for documents designed to be displayed in a web browser.
- - A programming language commonly used in web development.
- - A type of malicious software that, when executed, replicates itself by modifying other computer programs.
- - A method of trying to gather personal information using deceptive emails and websites.
- - The smallest unit of data in computing.
- - Approximately one billion bytes.
- Address - A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- - A software application used to access and view websites.
- - Permanent software programmed into a read-only memory.
- - A computer or computer program that manages access to a centralized resource or service in a network.
- - Random Access Memory, a type of computer memory that can be accessed randomly.
30 Clues: - Approximately one billion bytes. • - The smallest unit of data in computing. • - Finding and fixing errors in software code. • - A small segment of data sent over a network. • - Information processed or stored by a computer. • - A step-by-step procedure for solving a problem. • - Uniform Resource Locator, the address of a web page. • ...
Technology Advance 2024-07-14
Across
- - A set of rules governing the exchange or transmission of data between devices.
- - A step-by-step procedure for solving a problem.
- - A hardware or software component that stores data so future requests for that data can be served faster.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - The process of converting information or data into a code to prevent unauthorized access.
- - The programs and other operating information used by a computer.
- - A small segment of data sent over a network.
- - Internet of Things, a network of physical objects embedded with sensors and software.
- System - Software that manages computer hardware and software resources.
- - The amount of data that can be transmitted over a network in a given amount of time.
- - Finding and fixing errors in software code.
- - Measures taken to protect a computer or computer system against unauthorized access or attack.
- - Uniform Resource Locator, the address of a web page.
- - A device that modulates and demodulates signals for data transmission.
Down
- - Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- - Unsolicited messages sent over the internet, typically to many users.
- - A group of binary digits or bits (usually eight) operated on as a unit.
- - Information processed or stored by a computer.
- - The delay before a transfer of data begins following an instruction for its transfer.
- - Hypertext Markup Language, the standard markup language for documents designed to be displayed in a web browser.
- - A programming language commonly used in web development.
- - A type of malicious software that, when executed, replicates itself by modifying other computer programs.
- - A method of trying to gather personal information using deceptive emails and websites.
- - The smallest unit of data in computing.
- - Approximately one billion bytes.
- Address - A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- - A software application used to access and view websites.
- - Permanent software programmed into a read-only memory.
- - A computer or computer program that manages access to a centralized resource or service in a network.
- - Random Access Memory, a type of computer memory that can be accessed randomly.
30 Clues: - Approximately one billion bytes. • - The smallest unit of data in computing. • - Finding and fixing errors in software code. • - A small segment of data sent over a network. • - Information processed or stored by a computer. • - A step-by-step procedure for solving a problem. • - Uniform Resource Locator, the address of a web page. • ...
Lesson 17 2025-02-11
Across
- Software installed to a web browser to handle multimedia objects embedded in web pages. Use of most plug-in types is now deprecated.
- Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.
- Malware that hijacks computer resources to create cryptocurrency.
- Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
- Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).
- Software that records information about a PC and its users, often installed without the user's consent.
- Microsoft's file-level encryption feature available for use on NTFS.
- Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.
- Class of malware that modifies system files, often at the kernel level, to conceal its presence.
- Browser mode in which all session data and cache is discarded and tracking protection features are enabled by default.
- Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.
- Computing environment that is isolated from a host system to guarantee that the environment runs in a controlled, secure fashion. Communication links between the sandbox and the host are usually completely prohibited so that malware or faulty software can be analyzed in isolation and without risk to the host.
Down
- Malicious software or hardware that can record user keystrokes.
- Windows mechanisms for automatic actions to occur when a peripheral storage device is attached.
- Add-on that uses the browser API to implement new functionality.
- Security mechanism that locks the desktop after a period of inactivity and requires user to authenticate to resume.
- Consequence of malware infection where DNS and/or search results are corrupted to redirect requests from legitimate site hosts to spoofed sites or ads.
- Type of malware that replicates between processes in system memory and can spread over client/server network connections.
- The process of isolating a file, computer system, or computer network to prevent the spread of a virus or another cybersecurity incident.
- Mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.
20 Clues: Malicious software or hardware that can record user keystrokes. • Add-on that uses the browser API to implement new functionality. • Malware that hijacks computer resources to create cryptocurrency. • Microsoft's file-level encryption feature available for use on NTFS. • ...
genre 2024-11-07
Across
- ‘Rasode Mein Kaun Tha?’ – when you’re trying to figure out the hidden culprit behind your system crash.
- The one who can calculate the universe but can’t figure out human feelings.
- The 48 hours event where you push last-minute code, praying the Git gods accept your changes without a merge conflict.
- The wall against threats, like 'Bheem ki shakti', but in the digital world of tech.
- The essential ingredient in every Housefull movie
- A concept that unlocks multiple versions of reality, or in coding terms, different testing environments—each with its own quirks.
- The misunderstood extra-terrestrial character from movie __ . ‘Yeh wrong number hai!’(Bonus)
- The game you’ve waited so long for, you’ve probably grown a beard and mastered driving just to keep up.
- “With great power comes great responsibility”
- What you experience when you step into the matrix. 'Reality ko chhodo, _________ka maza lo’.
- A mysterious figure that appears and disappears, just like an intermittent software glitch.
Down
- The kind of computing that even Elon Musk would call 'Mushkil hai, par ho sakta hai’.
- She hides behind a forgotten identity, a curse that whispers in the halls of the palace(Bonus).
- The one who memorizes the code without understanding it, and still proudly declares, 'All is well', only for the compiler to disagree.(Bonus)
- A rare, virtually indestructible metal used in Black Panther’s suit and Captain America's shield, hailing from the hidden nation of Wakanda.
- “The kind of person who would say ‘Mujhe kuch toh gadbad lagti hai Daya!’ when spotting a bug in the code.”
- The one who always has a response.
- The king of Atlantis who can communicate with sea creatures and control the ocean. He’s known for his trident and his underwater kingdom. *
- The language where even numbers need to make up their mind: you're either on or off, no in-between.
- The force that makes wires bend or break, just like pressure before IA.
- The ultimate detective work in coding, like picking clues to solve a mystery, as intense as ‘Kuch toh gadbad hai daya!’
- Like a spider’s home, but with fewer bugs and more ads trying to sell you things you don’t need.
22 Clues: The one who always has a response. • “With great power comes great responsibility” • The essential ingredient in every Housefull movie • The force that makes wires bend or break, just like pressure before IA. • The one who can calculate the universe but can’t figure out human feelings. • ...
Unit 5 - Crossword 2025-04-29
Across
- Which Python library is most used for scientific computing?
- Which type of AI can explain its decisions to humans?
- Which type of learning uses labeled datasets?
- Which AI tool helps in generating marketing content and blogs?
- Which AI trend combines physics with computation for future speed?
- Which library can you use for drawing bar charts and line plots?
- Which library is used for building and training deep neural networks in TensorFlow?
- Which AI trend focuses on privacy by keeping data on-device?
- Which AI assistant was previously known as Bard?
- Which Python library is built on top of Matplotlib for statistical plots?
- What is the graphical interface used for data dashboards by Google?
- Which Python library is used for data analysis and manipulation?
- Which of the following is NOT used for machine learning?
- Matplotlib is written in which programming language?
- Which term refers to machines doing tasks that normally require human intelligence?
- Which term defines learning from reward and punishment?
- Which AWS service provides facial recognition?
- Which AI model is developed by OpenAI for natural language processing?
- Which of the following is used to detect objects in real-time videos?
- Which AWS tool is used to build chatbots?
Down
- What term refers to AI that can process text, image, and code together?
- Which platform allows you to deploy ML models in the cloud? ]
- Which AI model architecture powers GPT, BERT, and Gemini?
- Which of these is used to visualize decision trees or clusters?
- Which library would you choose for image classification tasks?
- Which AWS service extracts insights from unstructured text
- Which AI framework is known for dynamic computation graphs?
- Which tool by OpenAI converts speech to text?
- Which AI field studies machines learning without supervision?
- Which term is used for AI that performs specific, limited tasks?
- Who develops PyTorch?
- Which AWS service converts text to speech?
- Which Google platform provides insights into website traffic using AI?
- Which company provides the Azure AI platform
- Which tool is used to generate code snippets and assist in software development using AI?
- Which AI platform by Google helps manage ML workflows?
- Which Python library is not directly related to AI/ML?
- TensorFlow is developed by
38 Clues: Who develops PyTorch? • TensorFlow is developed by • Which AWS tool is used to build chatbots? • Which AWS service converts text to speech? • Which company provides the Azure AI platform • Which type of learning uses labeled datasets? • Which tool by OpenAI converts speech to text? • Which AWS service provides facial recognition? • ...
25127 2025-10-29
Across
- Analyzes past data to understand what has happened in a business
- A subset of AI that enables systems to learn and improve automatically from experience
- Suggests actions or decisions based on data insights
- The process of discovering patterns and relationships in large datasets using statistical and computational techniques
- The overall management of data availability usability integrity and security
- Moral principles that govern how data is collected shared and used
- Grouping a set of objects so that objects in the same group are more similar to each other than to those in other groups
- Analyzing data points collected or recorded at specific time intervals
- A measurable value that shows how effectively an organization is achieving key objectives
- The process of extracting transforming and loading data into a data warehouse
- The right of individuals to control how their personal data is collected and used
- A visual interface showing key performance indicators and metrics
- A model inspired by the human brain used for complex pattern recognition and prediction
- The simulation of human intelligence in machines that can think learn and make decisions
- Uses historical data to make predictions about future events
- An ensemble learning method that builds multiple decision trees and combines their results
- A statistical method used to test assumptions or claims about a population parameter
Down
- The practice of using data and statistical methods to analyze business performance and gain insights
- A data point that differs significantly from other observations
- Delivery of computing services like storage servers databases and analytics over the internet
- The degree to which data is accurate complete and reliable
- Representation of data in graphical or pictorial form for easier understanding
- A central repository where integrated data from multiple sources is stored for analysis and reporting
- A statistical technique to determine the relationship between dependent and independent variables
- A data mining technique used to categorize data into predefined classes
- A model used for classification or regression that splits data based on certain conditions
- A programming language used to manage and query relational databases
- Extremely large datasets that can be analyzed to reveal patterns trends and associations
- The process of detecting and correcting errors or inconsistencies in data
- A measure of the strength and direction of a relationship between two variables
30 Clues: Suggests actions or decisions based on data insights • The degree to which data is accurate complete and reliable • Uses historical data to make predictions about future events • A data point that differs significantly from other observations • Analyzes past data to understand what has happened in a business • ...
4 Greg 2016-01-20
Across
- – a set of rules, each computer follows when they communicate
- – software extension that adds extra features to a program
- – an error in a software program
- – a process in which a function calls itself
- – a multimedia technology developed by Apple
- file – a type of script which contains a list of commands
- – a program made for multiple operating system
- – a device connected to a network
- – a small program that automates common tasks
- – computer programs
- – the repetition of a function or process in a computer program
- – free, open source, Unix-like operating system
- – how many pixels a monitor can display
- - a set of characters of the same design
- – a hardware device which is used to network some computers together
- code – lines of text program consists of
- – a list of things should be done
- – a role of people in the computing process
- – any letter, number, space, etc.
- – an interactive computer program created as a learning tool
- – a kind of files that contains useful information about the program
- – a digital representation of an analog signal
- – a person who posts offensive off-topic comments online
- – it is used to network multiple computers together
Down
- – a top level of a file system
- – a section of memory where copied information is stored
- – a response time of the server
- – a chip inside a computer which connects CPU and other parts
- – processing multiple tasks at one time
- – an amount of data can be sent through a network
- – a program or script for email server that automatically
- – a program which translate a human-readable code to computer language
- – a programming language
- – a port on hardware device which allows it to connect to another device
- Green Blue) – three kinds of light that can mix to any color
- file – a file that consists of records of events made by program.
- – a standard keyboard
- – text that links to other information
- – it carries data to smaller lines of network
- – a program that records what keys were pressed
- to emails
- – a Java program which is put in a Web page
- – a data structure that contains a group of elements
- – a list of commands that can be executed by a certain program
44 Clues: to emails • – computer programs • – a standard keyboard • – a programming language • – a top level of a file system • – a response time of the server • – an error in a software program • – a device connected to a network • – a list of things should be done • – any letter, number, space, etc. • – text that links to other information • – processing multiple tasks at one time • ...
Classification, Natural Selection and Biodiversity 2016-02-03
Across
- the kingdom that sunflowers are in
- natural section for both extremes of variation within a phenotype
- a type of adaptation
- the kingdom that yeast and mushrooms are in
- a form of speciation when there is no gene flow between the separated populations
- the production of offspring as a result of reproduction between two organisms from different species
- one species rapidly evolves into many different ones
- the form and structure of an organism
- software and computing tools needed to organise and analyse raw biological data
- the relative number of species in an area
- all or part of the genome of an organism is worked out
- the science of describing, classifying and naming living organisms
- conservation of and within the natural habitat and ecosystem
- a species that is only found in one place
- provided by the natural environment to local people
- classification category below domain
- a group of similar organisms that can interbreed to produce fertile offspring
- there is a difference in the appearance of males and females in a species
- organisms that make their own food by photosynthesis or chemosynthesis
- non-coding areas of DNA are analysed to identify patterns
- organisms that cannot make their own food
- an adaptation involving the form or structure of an organism
Down
- survival of the fittest
- the variety of living organisms and their genetic differences
- a form of speciation when there can be some gene flow between populations
- the kingdom that mammals are in
- an area with an unusually high biodiversity
- ancient bacteria
- the number of different species in an area
- leads to speciation
- an organism that lives inside the cells or body of another
- evolution of dark coloured organisms in a habitat made darker by pollution
- the role of an organism within a habitat
- a type of isolation when a physical barrier separates populations
- bacteria that can survive in extreme conditions
- the formation of new species
- natural selection for one extreme of the phenotype
- conservation outside the natural habitat
- the prokaryotic kingdom in the 5 kingdom system
- the highest classification category
40 Clues: ancient bacteria • leads to speciation • a type of adaptation • survival of the fittest • the formation of new species • the kingdom that mammals are in • the kingdom that sunflowers are in • the highest classification category • classification category below domain • the form and structure of an organism • the role of an organism within a habitat • ...
8th Grade 2018-11-25
Across
- application for accessing information on the World Wide Web.
- the second generation of the world wide web, where it moved static HTML pages to a more interactive and dynamic web experience.
- title or brief explanation appended to an article, illustration, cartoon, or poster.
- information about a particular person that exists on the Internet as a result of their online activity.
- use of works protected by copyright law without permission.
- a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
- correct or acceptable way of communicating on the Internet.
- receive data from a remote system, typically a server, such as a web server, an FTP server, an email server, or other similar systems.
- programming/is the craft of writing useful, maintainable, and extensible source code which can be interpreted or compiled by a computing system to perform a meaningful task.
- storage and synchronization service developed by Google.
- images or frames in a single file and is described by its own graphic control extension. The frames are presented in a specific order in order to convey animation.
- icon or figure representing a particular person in video games, Internet forums, etc.
- lossless format for image files that supports both animated and static images.
- software that supports a computer's basic functions. (iOS, Windows)
Down
- exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- of data at a steady high-speed rate sufficient to support such applications as high-definition television.
- is the theory, experimentation, and engineering that form the basis for the design and use of computers.
- and saving your files and being able to find them easily.
- customary code of polite behavior in society or among members of a particular profession or group.
- technology ethically and responsibly.
- send data to a remote system such as a server or another client so that the remote system can store a copy.
- along with an email message.
- page at a website.
- format for compressing image files.
24 Clues: page at a website. • along with an email message. • format for compressing image files. • technology ethically and responsibly. • storage and synchronization service developed by Google. • and saving your files and being able to find them easily. • use of works protected by copyright law without permission. • correct or acceptable way of communicating on the Internet. • ...
Computer Vocab 2013-09-26
Across
- Card / An expansion card which generates a feed of output images to a display.
- / A type of malware that, when executed, replicates by inserting copies of itself.
- / The number of distinct pixels in each dimension that can be displayed.
- System / A collection of software that manages computer hardware resources and provides common services for computer programs.
- computer / Portable personal computer.
- Up / The initial set of operations that a computer system performs.
- Address / A numerical label assigned to each device.
- / The main printed circuit board found in computers.
- / An operating system designed primarily for touchscreen mobile devices such as smartphones.
- / A type of user interface that allows users to interact with electronic devices through graphical icons.
- / A telecommunications network that allows computers to exchange data.
- / A computer system used primarily to provide one or more network services.
- / The quantities, characters, or symbols on which operations are performed by a computer.
- / A list of options or commands presented to an operator by a computer.
Down
- / A device that modulates an analog carrier signal to encode digital information.
- Device / Any piece of computer hardware equipment used to communicate the results of data processing carried out by an information processing system.
- computer / Personal computer in a form intended for regular use at a single location.
- / A pictogram displayed on a computer screen in order to help a user navigate a computer system.
- / Any physical mechanism that prevents modification or erasure of valuable data on a device.
- / A specific character string that constitutes a reference to a resource also known as a web address.
- / A physical point in a raster image.
- Code / Represents text or computer processor instructions using the binary number systems.
- / An organized collection of data.
- / A computer network that interconnects computers in a limited area such as a home.
- / Large and powerful data processing systems.
- Search / Search engine queries.
- Engines / A software system that is designed to search for information on the World Wide Web.
- / A unit of digital information in computing and telecommunications.
- / Any data entered into a computer or data processing system.
- / A network that covers a broad area.
- / A form of computer data storage.
- / The hardware within a computer that carries out the instructions of a computer program.
32 Clues: Search / Search engine queries. • / An organized collection of data. • / A form of computer data storage. • / A physical point in a raster image. • / A network that covers a broad area. • computer / Portable personal computer. • / Large and powerful data processing systems. • Address / A numerical label assigned to each device. • ...
Computer Vocab! 2014-02-24
Across
- A computer or computer program that manages access to a centralized resource or service in a network.
- Is a small piece of data sent from a website and stored in user’s web browser while the user is browsing the website.
- Same type stored in a hidden or inaccessible place.
- That contain the basic circuitry of a computer or of a computer component can be mounted.
- A group or system of interconnected people or things.
- A peripheral device
- The key component of a computer system,which contains the circuitry necessary to interpret and execute program instructions.
- A presented opinion adopted by a computer program or other mechanism when no alternative is specified by the user or programmer.
- Denoting software for which the original source code is made freely available and may be redistributed and modified.
- A computer network consisting of a worldwide network of computer networks that use the TC/IP.
- A desktop computer or workstation that is capable of obtaining information and applications from a server.
- A group of binary digits or bits operated on as a unit.
- Providers provides services such as internet access.
Down
- The mechanical equipment necessary for conducting an activity,usually distinguished from the theory and design that make the activity possible.
- In computing booting is the initial set of operations that a computer system performs after electrical power to the CPU is switched on or when the computer is reset.
- The Practice of using a network of remote servers hosted on the internet to store manage, and process data rather than a local server or personal computer
- A coding system using the binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic devices.
- The programs and other operating information used by a computer.
- a disk drive contains a hard disk.
- A program with a graphical user interface for displaying HTML files, used to navigate the world wide web.
- system The software that supports a computer’s basic functions such as scheduling tasks, executing applications and controlling peripherals.
- The working surface of a desk
- address Unique string of numbers separated by periods that identifies each computer using the internet protocol to communicate over a network.
23 Clues: A peripheral device • The working surface of a desk • a disk drive contains a hard disk. • Same type stored in a hidden or inaccessible place. • Providers provides services such as internet access. • A group or system of interconnected people or things. • A group of binary digits or bits operated on as a unit. • ...
Exam 2 Review 2016-03-16
Across
- a grouping of storage devices, such as hard disk arrays, that form a subnet so that the storage is available to any server on the main network (acronym)
- ____ routes are routes set up by the network administrator and specify fixed paths between two routers.
- A device that sends out and picks up radio waves and is used by access points and wireless NICs.
- Which type of network are you running if your computer is a member of a workgroup? (three words normally hyphenated)
- An area with public wireless access is called a ____,which is simply a location that provides a public access point to users.
- The ____ file permission category in UNIX/Linux systems typically entails all permissions and is designated by the letter u.
- Disk space that is used for virtual memory in Windows (two words)
- A(n) ____ print server is a boxlike device that has a NIC (or WNIC) and one, two, or more ports for connecting printers, such as USB or parallel ports.
- ____ communications are continuous bursts of data controlled by a clock signal that starts each burst.
- Permissions are set up by using the ____ command in UNIX/Linux.
Down
- Virtual memory that resided on a hard disk and is configured when Linux is installed (two words)
- Typically refers to a software or hardware interface that enables two different types of networked systems or software to communicate
- The physical topology when a hub is used to connect network nodes
- Mac OS X is built upon what other operating system, allowing you to use commands such as du and finger from a terminal window?
- What type of notice is sent when a station wants to disconnect from another station?
- A cable ____ communicates using upstream and downstream frequencies (channels) that are already allocated by a cable service.
- Which Linux command enables you to display memory usage and monitor virtual memory usage?
- To ensure that you can boot to a DVD/CD-ROM drive, you may first need to configure which of the following? (acronym)
- In UNIX/Linux, a mapped drive is called a ____ volume.
- A ____ centralizes control of network resources into a logical grouping of user accounts, computers, printers, and network devices.
- _____ computing involves providing a host of scalable Web-based applications and services over the Internet or a private network.
21 Clues: In UNIX/Linux, a mapped drive is called a ____ volume. • Permissions are set up by using the ____ command in UNIX/Linux. • The physical topology when a hub is used to connect network nodes • Disk space that is used for virtual memory in Windows (two words) • What type of notice is sent when a station wants to disconnect from another station? • ...
Brayan Alexander Pinilla Moreno 2022-05-05
Across
- A computer system whose mission is to act as an intermediary between one system and another over the Internet.
- This is a numbering system in which numbers are represented using only two digits: zero and one.
- Action and effect of developing or being developed.
- A type of malicious code whose main characteristic is that it is copied from one system to another over the Internet.
- Development staff are the workers in charge of developing a project.
- A sequence of codes ready to be executed.
- The Roadmap, known in Spanish as a road map, works as a schedule for project planning.
- Malicious code camouflaged inside another apparently useful and harmless program.
- The best known type of malicious code.
- A menu at the top or bottom that shows certain functions indicates that it is a side menu in which various tools are grouped.
- The waterfall model is a project management method, in which the project is divided into different sequential phases, where the team can move to the next phase only when the previous one has been completed.
- A network system that controls which machines and services can be accessed within a network, It can be a specialized system or an installed program.
- In computing, a developer is responsible for the application or website to work correctly, to be safe, to withstand the passage of time, to be easily modifiable and adaptable.
Down
- A spreadsheet is a computer application software that is based on a system of vertical and horizontal cells that form rows and columns with each other.
- Information that, sent by an Internet server to the browser, is subsequently returned on each new connection.
- A computer attack that, without affecting the information contained in a system, renders it unable to provide service. Denial of service can be achieved by saturation or blocking of machines.
- Encryption of data using various mathematical techniques to ensure confidentiality in transmission.
- It is an outline or framework that provides a basic structure for developing a project with specific objectives.
- A set of letters, numbers and symbols, or even phrases, used to authenticate users on a computer system.
- Any program with an annoying, malicious or illegal intent. They are generally designed to run without user intervention.
20 Clues: The best known type of malicious code. • A sequence of codes ready to be executed. • Action and effect of developing or being developed. • Development staff are the workers in charge of developing a project. • Malicious code camouflaged inside another apparently useful and harmless program. • ...
hey 2022-07-27
Across
- Occurs in a system that involves a magnetic field ans a common property of ferromagnetic substance.
- It is a digital logic gate that gives a true (1 or HIGH) output when the number of true inputs is odd.
- The standard unit of capacitance (C) in the International System of Units (SI).
- A device for disconnecting a circuit.
- It is the primary language of computing systems
- A device that converts an oscillating two-directional alternating current (AC) into a single-directional direct current (DC)
- It is used for voltage regulation, as reference elements, surge suppressors, and in switching applications and clipper circuits.
- Another name for wire.
- A Serbian-American[5][6][7] inventor, electrical engineer, mechanical engineer, and futurist best known for his contributions to the design of the modern alternating current (AC)
- It allows us to store the signal or the waveform in the digital format, and in the digital memory also it allows us to do the digital signal processing techniques over that signal.
- A popular brand of insulation tester.
- It occurs in an electric circuit at a particular frequency when the impedances or admittances of circuit elements cancel each other
- A device which produces electrical energy.
Down
- A fusible metal alloy with low melting point used to create a permanent bond between metal workpieces or circiut joints.
- It provides a voltage-adjustable source of alternating current (AC) electricity
- A resistor which reacts to heat.
- The unit of magnetic flux in the International System of Units (SI)
- It is a moving component of an electromagnetic system in the electric motor
- Semi-conductor with 3 connections to it.
- A high-level programming language allows matrix manipulations, plotting of functions and data and much more.
- A common return path for electric current, often used for protection from shocks and alternative path in case of malfunction.
- A device that selects between several analog or digital input signals and forwards the selected input to a single output line.
- A substance or material that allows electricity to flow through it.
- A passive component that decreases resistance with respect to receiving luminosity (light) on the component's sensitive surface.
- Current only flows one way through this component.
25 Clues: Another name for wire. • A resistor which reacts to heat. • A device for disconnecting a circuit. • A popular brand of insulation tester. • Semi-conductor with 3 connections to it. • A device which produces electrical energy. • It is the primary language of computing systems • Current only flows one way through this component. • ...
hey 2022-07-27
Across
- A substance or material that allows electricity to flow through it.
- A high-level programming language allows matrix manipulations, plotting of functions and data and much more.
- A Serbian-American[5][6][7] inventor, electrical engineer, mechanical engineer, and futurist best known for his contributions to the design of the modern alternating current (AC)
- A device that selects between several analog or digital input signals and forwards the selected input to a single output line.
- A resistor which reacts to heat.
- A fusible metal alloy with low melting point used to create a permanent bond between metal workpieces or circiut joints.
- It is the primary language of computing systems
- The unit of magnetic flux in the International System of Units (SI)
- It provides a voltage-adjustable source of alternating current (AC) electricity
- A common return path for electric current, often used for protection from shocks and alternative path in case of malfunction.
Down
- It allows us to store the signal or the waveform in the digital format, and in the digital memory also it allows us to do the digital signal processing techniques over that signal.
- A passive component that decreases resistance with respect to receiving luminosity (light) on the component's sensitive surface.
- Occurs in a system that involves a magnetic field ans a common property of ferromagnetic substance.
- Semi-conductor with 3 connections to it.
- It is used for voltage regulation, as reference elements, surge suppressors, and in switching applications and clipper circuits.
- A device which produces electrical energy.
- It is a moving component of an electromagnetic system in the electric motor
- Another name for wire.
- A device for disconnecting a circuit.
- It is a digital logic gate that gives a true (1 or HIGH) output when the number of true inputs is odd.
- A popular brand of insulation tester.
- It occurs in an electric circuit at a particular frequency when the impedances or admittances of circuit elements cancel each other
- Current only flows one way through this component.
- A device that converts an oscillating two-directional alternating current (AC) into a single-directional direct current (DC)
- The standard unit of capacitance (C) in the International System of Units (SI).
25 Clues: Another name for wire. • A resistor which reacts to heat. • A device for disconnecting a circuit. • A popular brand of insulation tester. • Semi-conductor with 3 connections to it. • A device which produces electrical energy. • It is the primary language of computing systems • Current only flows one way through this component. • ...
ICT 2022-05-16
Across
- refers to any means of shariing information with your coworkers.
- systematic process of organizing.
- the people that are needed to run the system and the procedures.
- it is designed for specific tasks, such as spreadsheets and many more.
- a portable usually cordless telephone used in a cellular system.
- the use of inernet-based social media to stay conected to people.
- one example of word processing
- the transfer of information among people and machines through use of technology.
- organized set of equipments.
- a collection used for particular tasks.
- a panel of keys that operate a computer or typewriter.
- a term for the truly massive amounts of data.
- this involves basic onlin information management skills.
- reation of documents using page layout software on a personal desktop.
- a vast network that connects computers all over the world.
- a place where data is collected.
- computers are more dispersed.
- an internet-based form of communiations.
- a machine that can store an process informations.
- allows users in different locations to hold face-face meetings.
- contains all o data in whatever form that an organization needs.
- the infrastructure and components that enable modern computing.
Down
- collected and analyzed to answer questions and theories.
- Many employers require their employees to use these.
- a process of writing or inputting text by pressing keys.
- the imparting pr exchanging of informations on a large scale to a wide range of people.
- messages distribute by electronic means.
- the location from which inormation is gathered.
- involves the creation of materials that need to be printed and distributed.
- the physical technology that works with information.
- act of using a computer to create, edit, save,and print documents.
- the modern miracle of mass communication.
- process of obtaining raw data.
- software accessed on the internet that searches a database of information according to the users query.
- designed to tie together computers.
- being able to effectively nd successfully communicate via email.
- process of producing text and images typcally with ink on paper using printing press.
- online social media owned by Meta.
- other term for computer.
- connects the hardware together to orm a network.
40 Clues: other term for computer. • organized set of equipments. • computers are more dispersed. • one example of word processing • process of obtaining raw data. • a place where data is collected. • systematic process of organizing. • online social media owned by Meta. • designed to tie together computers. • a collection used for particular tasks. • ...
Inteligência Artificial e Direito 2023-11-24
Across
- Sistema de IA que realiza triagem de processos de executivos fiscais, utilizado pelo TJPE
- Um dos componentes que atravessam e dão forma às atividades e às narrativas do Direito
- Software de IA que desafiou um dos melhores jogadores de "Go" do mundo
- Empresa britânica que desenvolveu o software de IA AlphaGo
- Subconjunto do uso da IA, o qual aprende por conta própria enquanto recebe mais dados para poder desenvolver uma tarefa específica com precisão
- Faculdade de conhecer, compreender e aprender
- Sistema de IA que classifica processos judiciais, utilizado pelo TJRN
- Super computador do filme "Eu Robô" que é dotada de onipresença e onisciência
- Sistema de IA que prevê movimentação de processos, realiza sumarização e parametrização de decisões. utilizado pelo TJRO
- IA capaz de formular argumentos para temas complexos
- Determina o quão duradouro o resultado obtido podem ser, a partir dos meios empregados
- Projeto de lei que propõe fundamentos, princípios e diretrizes para o desenvolvimento e a aplicação da IA no Brasil
- Plataforma de IA que competiu no programa Jeoparty!
- Sistema de IA que auxilia na realização das atividades judiciais (recomenda tarefas e decisões) utilizado pelo TJRN
- Sistema de IA que atua no fluxo de análise de repercussão geral no STF
- Robô do filme "Eu Robô" dotado de "dois cérebros positrônicos" que não oferece respostas, apenas perguntas
- Filme que tem como protagonista o matemático Alan Turing
- Sistema de IA que realiza penhora online, utilizado pelo TJRN
- Criador da plataforma de IA denominada Watson
- Autor do livro que inspirou o filme "Eu Robô"
Down
- Sistema de IA que identifica os fundamentos de interposição em recursos especiais utilizado pelo STJ
- Chances dos meios empregados para obter os resultados pretendidos
- Autor do texto "Computing Machinery and Intelligence"
- Sistema de IA que identifica e separa recursos com pedidos similares, utilizado pelo TJMG
- Portaria do CNJ que traz definições de projetos de IA no âmbito do judiciário
- Desempenho dos meios empregados para obtenção de determinados fins
- Sinônimo de Inteligência Artificial
- Softwares e hardware que atuam de forma semelhante a certas qualidades cognitivas humanas
- Subconjunto do uso de Machine Learning que aprende a realizar tarefas específicas com precisão por conta própria e evolui sem a necessidade de intervenção humana
- Enxadrista que competiu contra computadores da IBM em 1985, 1996 e 1997
30 Clues: Sinônimo de Inteligência Artificial • Faculdade de conhecer, compreender e aprender • Criador da plataforma de IA denominada Watson • Autor do livro que inspirou o filme "Eu Robô" • Plataforma de IA que competiu no programa Jeoparty! • IA capaz de formular argumentos para temas complexos • Autor do texto "Computing Machinery and Intelligence" • ...
College Writing Crossword Puzzle 2023-09-01
Across
- Aid A topic that the Solution Center Staff can assist students with.
- These constitute 40% of the total course grade.
- A formal reference to sources, demonstrating academic integrity.
- Center A free resource where students can receive tutoring services at any stage in the writing process.
- The act of presenting someone else's work as your own, considered cheating.
- The term for the specific learning outcomes that students will work towards during the semester.
- Special arrangements provided in accordance with the ADA and University policy.
- Guidelines describing how each essay in the course will be graded.
- To combine information from multiple sources, a skill required for at least one major project in the course.
- The form of currency that can be added to a student's UCard for printing services in the library.
- A status that, if applied to first drafts, means they won’t receive written feedback from the instructor.
- B The nickname students can use for the instructor, whose full name is Jason Bellipanni.
- The course code for College Writing I at the aforementioned university.
- A documentation format that might be appropriate for some majors, abbreviated.
Down
- Type of equivalent given for letter grades in the course.
- A service that provides crisis intervention, assessment, and referrals.
- A crucial aspect of this workshop course that affects students' grades.
- Those for whom the writing is intended, and whom students must learn to engage.
- Valued in all its forms, whether expressed through race, ethnicity, gender, etc.
- A place where research, computing and printing services are available.
- A required material for the course, often paired with a pen.
- One step in the writing process that comes after pre-writing but before revising.
- A type of knowledge students will develop, related to effective or persuasive communication.
- This policy prohibits recording of video or audio of the course or private conversations without consent.
- A document outlining the structure, expectations, and policies of this course.
- A retention program that the course participates in at UMass Lowell.
- The online platform where all readings and assignments will be made available.
- The abbreviation of the university where this course is offered.
- Information from others that students should use to build substantial content.
29 Clues: These constitute 40% of the total course grade. • Type of equivalent given for letter grades in the course. • A required material for the course, often paired with a pen. • A formal reference to sources, demonstrating academic integrity. • The abbreviation of the university where this course is offered. • ...
Danica's puzzle 2023-11-27
Across
- A computer that is suitable for use while travelling.
- type of online fraud where a cyber criminal designs a fake
- the hardware in a computing device where the operating system
- a place where u can store pictures and files and other things and u can loge into the cloud from anywhere and see all your stuff
- text files with small pieces of data like a username and password that are used to identify your computer as you use a network.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- is a common interface that enables communication between devices and a host controller such as a personal computer
- a electronic device with a screen which puts out pixels
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
- System It manages the computer's memory and processes
- video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
- It brings you to a certain website or page, the address.
Down
- performs many of the same functions as a computer,typically having a touch screen, internet access, and a operating system capable of running download applications.
- a peripheral device that enables a user to input text into a computer or any other electronic machinery.
- information that is easy to access which can include management, updating computer databases usually collect aggreations of data, records.
- a generic term used to refer to applications, scripts and programs that run on a device.
- global network of billions of computers and other electronic devices
- a personal computer designed to be used on a desk or table the opposite of portable computers like laptops or tablets
- web-centric laptops that run Google's Chrome operating system
- an application for accessing websites and the Internet.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- a wireless connection that connects you to the internet through radio waves
23 Clues: A computer that is suitable for use while travelling. • System It manages the computer's memory and processes • a electronic device with a screen which puts out pixels • an application for accessing websites and the Internet. • It brings you to a certain website or page, the address. • type of online fraud where a cyber criminal designs a fake • ...
Cybersecurity Awareness Month Crossword 2023-09-21
Across
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- A cybersecurity risk that originates from within an organization (2 words).
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
- A mechanism for creating a secure connection between a computing device and a computer network
- The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- Unsolicited emails sent to many addresses.
- A process or measure used to verify a user's identity.
- Part of the internet that isn't indexed by search engines.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities (2 words).
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization (2 words).
- Computer programs that can block, detect, and remove viruses and other malware.
- A type of malware that denies a user's access to a system or data until a sum of money is paid.
Down
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
- Software that compromises the operation of a system by performing an unauthorized function or process.
- A string of characters used to authenticate an identity.
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- A flaw or weakness in an information system that could be exploited.
- An unauthorized user who attempts to or gains access to an information system.
- A collection of computers compromised by malicious code and controlled across a network.
- Software designed to block malware from entering protected networks.
- Converting data into a form that cannot be easily understood by unauthorized people.
24 Clues: Unsolicited emails sent to many addresses. • A process or measure used to verify a user's identity. • A string of characters used to authenticate an identity. • Part of the internet that isn't indexed by search engines. • A flaw or weakness in an information system that could be exploited. • Software designed to block malware from entering protected networks. • ...
Tic-Tac-Toe Chapter 12 Crossword Puzzle 2018-12-18
Across
- a symbolic illustration showing the weather occurring at a given reporting station.
- Effect an increase in the frequency of sound, light, or other waves as the source and observer move toward each other.
- the state of the atmosphere at a place and time as regards heat, dryness, sunshine, wind, and rain.
- Winds a wind blowing steadily toward the equator from the northeast in the northern hemisphere or the southeast in the southern hemisphere, especially at sea.
- a change in the properties of a tropospheric air mass when the air mass moves to different latitudes or over an underlying surface different from that of the source region.
- an instrument for measuring the speed of the wind, or of any current of gas.
- the cloud expert to help your business utilize and manage cloud computing technologies.
- the process of phenomena of the atmosphere(as means of forecasting the weather).
- the weather conditions prevailing in an area in general or over a long period of time.
Down
- searching historical meteorological records for previous events or flow patterns similar to the current situation.
- an instrument for measuring the humidity of the air or a gas.
- a narrow variable band of very strong predominantly westerly air currents encircling the globe several miles above the earth.
- an instrument carried by balloon or other means to various levels of the atmosphere and transmitting measurements by radio.
- are the dry, cold prevailing winds that blow from the high-pressure areas of the polar highs at the North and South Poles towards low-pressure areas within the Westerlies at high latitudes.
- the west-to-east winds that occur in the temperate zones of the Earth.
- the boundary between two air masses that have different temperatures or humidity.
- a device for measuring and recording the height of clouds.
- a body of air with horizontally uniform temperature, humidity, and pressure.
- a line on a map connecting points having equal incidence of a specified meteorological feature.
- an instrument for measuring and indicating temperature.
- an instrument measuring atmospheric pressure.
- an effect of mass moving in a rotating system experiences a force acting perpendicular to the direction of motion and to the axis of rotation.
22 Clues: an instrument measuring atmospheric pressure. • an instrument for measuring and indicating temperature. • a device for measuring and recording the height of clouds. • an instrument for measuring the humidity of the air or a gas. • the west-to-east winds that occur in the temperate zones of the Earth. • ...
colton puentes 2019-04-02
Across
- We had nearly two hundred passengers, who were seated about on the sofas, reading, or playing games, or engaged in conversation.
- The minute stain on the document was not visible to the naked eye.
- cientists have been conducting studies of individual genes for years.
- The scandal broke out in October after former chief executive Michael Woodford claimed he was fired for raising concerns about the company's accounting practices.
- He directed and acted in plays every season and became known for exploring Elizabethan theatre practices.
- Meanwhile, heating oil could grow more scarce in the Northeast this winter, the Energy Department warned last month.
- The committee worked in accord on the bill, and it eventually passed.
- In other words, Apple’s stock is cheap, and you should buy it.
- Spain’s jobless rate for people ages 16 to 24 is approaching 50 percent.
- As a psychologist, I have always found the concept of speed dating fascinating.
- The scandal broke out in October after former chief executive Michael Woodford claimed he was fired for raising concerns about the company's accounting practices.
Down
- No one can blame an honest mechanic for holding a wealthy snob in utter contempt.
- As a result, the privacy issues surrounding mobile computing are becoming ever-more complex.
- In 1863 he was appointed by the general assembly professor of oriental languages at New College.
- That confidence was certainly evident in the way Smith handled the winning play with 14 seconds left on the clock.
- He delayed making the unclassified report public while awaiting an Army review, but Rolling Stone magazine obtained the report and posted it Friday night.
- “Lipstick, as a product intended for topical use with limited absorption, is ingested only in very small quantities,” the agency said on its website.
- Inflation has lagged behind the central bank’s 2 percent target, giving policy makers extra scope to cut rates.
- A small French colony, Port Louis, was established on East Falkland in 1764 and handed to the Spanish three years later.
- For a time, indeed, he had fancied that things were changed.
- fter three straight losing seasons, Hoosiers fans were just hoping for a winning record.
- Owing to these magic properties, it was often planted near dwellings to keep away evil spirits.
- But the elderly creak is beginning to become apparent in McCartney’s voice.
- When Brown pleaded not guilty to assaulting Rihanna, their violent past came out in court.
24 Clues: For a time, indeed, he had fancied that things were changed. • In other words, Apple’s stock is cheap, and you should buy it. • The minute stain on the document was not visible to the naked eye. • cientists have been conducting studies of individual genes for years. • The committee worked in accord on the bill, and it eventually passed. • ...
App2/2 2020-02-21
Across
- The type of information stored in a variable. Common data types are Number, String, and Boolean.
- A value provided as input to a code block or a predefined procedure.
- Using this command, even though the code is in the program, it will not execute it when you run the app.
- A placeholder in a device's memory that stores a value a program is using.
- An ordered collection of data elements stored and accessed in a program.
- A set of instructions that a computer executes to achieve a particular objective.
- This is a mutator block that help with having more items on a list
- This block helps pickng up a random item from a list.
- A keyword used when declaring a variable. Makes the variable available to the blocks in the program.
- to decrease the value of a numeric variable by a set amount.
- To assign a variable its initial, or first, value.
- This command does not affect the code during runtime. In other words, the code inside the event handler is still active and will run normally.
- A type of data in computing that represents alphanumeric characters.Includes any character that you can type on a computer: like letters, numbers, symbols, and punctuation.
- command Using this command your blocks are not highlighted in gray anymore and the event handler is functioning.
Down
- A list that contains data that is pre-set in the program.
- Programmers are using this command to their code to allow others to read and understand their code.
- A block which can be expanded or shrunk and is adding more actions for that event handler.
- The position of an item in a list
- A command that performs different actions depending on whether a condition is true or false.
- Component that helps you hear a file.
- Programmers use lowercase for the first letter of the variable name, unlike component names, which start with an uppercase letter.
- A set of code that performs an action and is considered a type of abstraction.
- A drower that has most of the non-visible components.
- Computer scientists use many strategies to reduce the amount of __________ to shorten the code and make it easier to read and understand
- A type of loop that repeats for a given number of repetitions.
25 Clues: The position of an item in a list • Component that helps you hear a file. • To assign a variable its initial, or first, value. • A drower that has most of the non-visible components. • This block helps pickng up a random item from a list. • A list that contains data that is pre-set in the program. • to decrease the value of a numeric variable by a set amount. • ...
Electronic Devices 2020-05-19
Across
- the complete path of an electric current, including the generating apparatus, intervening resistors, or capacitors.
- Computers. a palm-sized, button-operated pointing device that can be used to move, select, activate, and change items on a computer screen.
- the programs used to direct the operation of a computer, as well as documentation giving instructions on how to use them
- a set of symbols that can be interpreted by a computer or piece of software:
- random-access memory; computer memory available to the user for creating, loading, or running programs and for the temporary storage and manipulation of data, in which time of access to each item is independent of the storage sequence. As a storage medium, RAM is volatile, so its contents are lost when the power fails or is turned off.
- Computers. to transfer (information) from internal storage to an external medium.
- Computers. of, relating to, or written in binary code; programmed or encoded using only the digits 0 and 1:
- See integrated circuit.
- . the mechanical, magnetic, electronic, and electrical devices comprising a computer system, as the CPU, disk drives, keyboard, or screen.
- a rigid, slotted board upon which other boards that contain the basic circuitry of a computer or of a computer component can be mounted.
Down
- a controller, the key component of a computing device that contains the circuitry necessary to interpret and execute electrical signals fed into the device.
- a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.
- the collection of software that directs a computer's operations, controlling and scheduling the execution of other programs, and managing storage, input/output, and communication resources.
- capacity or space for storing Computers. memory
- Also called binary digit. a single, basic unit of information, used in connection with computers and information theory.
- central processing unit: the key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions.
- the screen component of a computer, especially a free-standing screen.
- a set of keys usually arranged in tiers, for operating a typewriter, typesetting machine, computer terminal, or the like.
- something that is put in.
- a body of facts; information:
20 Clues: See integrated circuit. • something that is put in. • a body of facts; information: • capacity or space for storing Computers. memory • the screen component of a computer, especially a free-standing screen. • a set of symbols that can be interpreted by a computer or piece of software: • ...
6th Grade Math Vocabulary 2024-03-28
Across
- A letter used to represent one or more numbers.
- The distance a number is away from zero, written like: |-3| (2 words)
- Give a logical reason supporting a statement.
- A number that is not multiplied by a variable in an algebraic expression
- A rate with a denominator of one when simplified. (2 words)
- The result of adding two or more numbers
- Least common multiple
- The specific order in which certain operations are to be completed. (Parenthesis, exponents, multiplication or division (from left to right), and addition or subtraction (from left to right).(2 words)
- The coordinate plane is divided into four quadrants. The quadrants are 1, 2, 3, and 4.
- A combination of individual terms with a combination of numbers, operations, and sometimes variables.
- A positive or negative whole number (Ex: -3, -52, 5, 7...)
- A graph showing a summary of data using the mean, median, quartiles, and extremes of data.
- The sum of given values divided by the number of values used in computing the sum, also called the mean.
- The result of multiplying.
- The result of subtracting one number from another
- To find the value of.
Down
- A ratio comparing two quantities. For example, miles per hour.
- The sum of all areas of the surfaces of a 3D solid.(2 words)
- A _____ compares two quantities by division.
- A positive integer with exactly two factors, one and itself.(2 words)
- A mathematical sentence in which two expressions appear on each side of an =, stating that the two expressions are equivalent.
- The number corresponding to a point on a coordinate grid (x, y) (2 words)
- The result of a division problem.
- Referring to statistics, the ____ of data with gaps, clusters, peaks, and distribution.
- Two or more terms that contain the same variables, with corresponding variables raised to the same power.(2 words)
- A number multiplying a variable or product of variables in an algebraic expression.
- A number with more than two factors
- When two or more numbers are multiplied, each of the numbers is a _____.
- The largest common factor between two or more numbers. (The largest number that goes into BOTH factors)
29 Clues: Least common multiple • To find the value of. • The result of multiplying. • The result of a division problem. • A number with more than two factors • The result of adding two or more numbers • A _____ compares two quantities by division. • Give a logical reason supporting a statement. • A letter used to represent one or more numbers. • ...
Unit 5 - Crossword 2025-04-29
Across
- Which AI model architecture powers GPT, BERT, and Gemini?
- Which AWS service provides facial recognition?
- Which company provides the Azure AI platform
- Which Python library is used for data analysis and manipulation?
- Which library can you use for drawing bar charts and line plots?
- What term refers to AI that can process text, image, and code together?
- Which AWS tool is used to build chatbots?
- Which AWS service converts text to speech?
- Which Python library is not directly related to AI/ML?
- Which type of AI can explain its decisions to humans?
- Which AI field studies machines learning without supervision?
- Which library would you choose for image classification tasks?
- Which library is used for building and training deep neural networks in TensorFlow?
- Which tool by OpenAI converts speech to text?
- Which platform allows you to deploy ML models in the cloud? ]
- Which AI model is developed by OpenAI for natural language processing?
- Which tool is used to generate code snippets and assist in software development using AI?
- Which AI trend focuses on privacy by keeping data on-device?
- Which AI tool helps in generating marketing content and blogs?
- Which AI trend combines physics with computation for future speed?
Down
- Which term is used for AI that performs specific, limited tasks?
- Which AWS service extracts insights from unstructured text
- Which term defines learning from reward and punishment?
- Which term refers to machines doing tasks that normally require human intelligence?
- Who develops PyTorch?
- Which type of learning uses labeled datasets?
- Which of these is used to visualize decision trees or clusters?
- TensorFlow is developed by
- Matplotlib is written in which programming language?
- What is the graphical interface used for data dashboards by Google?
- Which AI framework is known for dynamic computation graphs?
- Which AI assistant was previously known as Bard?
- Which of the following is used to detect objects in real-time videos?
- Which Google platform provides insights into website traffic using AI?
- Which Python library is most used for scientific computing?
- Which of the following is NOT used for machine learning?
- Which AI platform by Google helps manage ML workflows?
- Which Python library is built on top of Matplotlib for statistical plots?
38 Clues: Who develops PyTorch? • TensorFlow is developed by • Which AWS tool is used to build chatbots? • Which AWS service converts text to speech? • Which company provides the Azure AI platform • Which type of learning uses labeled datasets? • Which tool by OpenAI converts speech to text? • Which AWS service provides facial recognition? • ...
Unit 5 - Crossword 2025-04-29
Across
- Which term defines learning from reward and punishment?
- Matplotlib is written in which programming language?
- Which AI trend focuses on privacy by keeping data on-device?
- Which library can you use for drawing bar charts and line plots?
- TensorFlow is developed by
- Which type of AI can explain its decisions to humans?
- What is the graphical interface used for data dashboards by Google?
- Which AI assistant was previously known as Bard?
- Which of the following is NOT used for machine learning?
- Which company provides the Azure AI platform
- Which platform allows you to deploy ML models in the cloud? ]
- Which library is used for building and training deep neural networks in TensorFlow?
- Which of these is used to visualize decision trees or clusters?
- Which AI framework is known for dynamic computation graphs?
- Which AI trend combines physics with computation for future speed?
- Which Python library is built on top of Matplotlib for statistical plots?
- Which term refers to machines doing tasks that normally require human intelligence?
- Which AWS service extracts insights from unstructured text
- Which AI model is developed by OpenAI for natural language processing?
Down
- Which tool by OpenAI converts speech to text?
- Which AI tool helps in generating marketing content and blogs?
- Which AI field studies machines learning without supervision?
- Which AWS service provides facial recognition?
- Which of the following is used to detect objects in real-time videos?
- Which AWS service converts text to speech?
- Who develops PyTorch?
- Which AI model architecture powers GPT, BERT, and Gemini?
- Which Python library is not directly related to AI/ML?
- Which AWS tool is used to build chatbots?
- Which term is used for AI that performs specific, limited tasks?
- Which library would you choose for image classification tasks?
- Which AI platform by Google helps manage ML workflows?
- Which Google platform provides insights into website traffic using AI?
- Which type of learning uses labeled datasets?
- Which Python library is used for data analysis and manipulation?
- What term refers to AI that can process text, image, and code together?
- Which tool is used to generate code snippets and assist in software development using AI?
- Which Python library is most used for scientific computing?
38 Clues: Who develops PyTorch? • TensorFlow is developed by • Which AWS tool is used to build chatbots? • Which AWS service converts text to speech? • Which company provides the Azure AI platform • Which tool by OpenAI converts speech to text? • Which type of learning uses labeled datasets? • Which AWS service provides facial recognition? • ...
Java Hard 2025-01-23
Across
- Abstract superclass for writing binary data.
- Abstraction for input and output in Java.
- API for processing collections functionally.
- Class for atomic updates to an integer.
- Automatically reclaims unused memory.
- Situation where threads are blocked waiting for each other.
- Redefining a superclass method in a subclass.
- Deprecated method for object cleanup before garbage collection.
- Compiler that converts bytecode to machine code at runtime.
- Synchronization aid for coordinating threads at phases.
- Special class representing a group of constants.
- Automatic resource management introduced in Java 7.
- Represents the result of an asynchronous computation.
- Framework for parallel computing in Java.
- Alternative to synchronized for fine-grained thread control.
- Collection that stores key-value pairs, not thread-safe.
- Keyword ensuring visibility of changes across threads.
- Legacy synchronized key-value collection.
- Thread-safe key-value store for high concurrency.
- Interface providing advanced thread management.
- Class for reading text efficiently from input streams.
- Feature for type-safe programming using angle brackets.
- Metadata providing instructions to the compiler or runtime.
- Interface for custom object sorting logic.
- Allows objects to take many forms at runtime.
Down
- Objects whose state cannot be changed after creation.
- Modifier requiring subclasses to implement methods.
- Interface allowing tasks to return results and throw exceptions.
- Exception requiring handling at compile-time.
- Runtime exception that does not need explicit handling.
- Wrapper to avoid null pointer exceptions.
- Anonymous function introduced in Java 8.
- Interface marking objects eligible for byte stream storage.
- Pattern restricting a class to a single instance.
- Ensures consistent behavior in multithreaded programs.
- Process of converting a byte stream back to an object.
- Java Virtual Machine that executes bytecode.
- Mechanism for loading classes dynamically.
- Collection of abstract methods and constants.
- Defining multiple methods with the same name but different parameters.
- Interface defining a natural order for objects.
- Sorted map implemented as a red-black tree.
- Represents a file or directory location in Java NIO.
- Parameter defining the location of user-defined classes and libraries.
- API for monitoring file system changes.
- API for inspecting and modifying classes at runtime.
- Abstract superclass for reading binary data.
- Framework for managing and controlling threads.
48 Clues: Automatically reclaims unused memory. • Class for atomic updates to an integer. • API for monitoring file system changes. • Anonymous function introduced in Java 8. • Wrapper to avoid null pointer exceptions. • Abstraction for input and output in Java. • Framework for parallel computing in Java. • Legacy synchronized key-value collection. • ...
Cloud Security and Data Privacy in Industrial IoT 2024-12-02
Across
- A technology that creates a virtual representation of physical hardware, such as servers, storage, and networks
- The unauthorized alteration or manipulation of devices, systems, or data to disrupt operations.
- A decentralized digital ledger used to securely record transactions across multiple systems.
- The principle of ensuring that information is accessible only to authorized users and systems.
- The implementation of measures to safeguard systems, networks, and data against cyber threats and attacks.
- A device that detects the change in the environment and responds to some output on the other system.
- The assurance that an individual or entity cannot deny the authenticity of their actions or communications.
- A mechanical or electronic component that performs actions based on control signals from a system.
- Malicious software designed to disrupt, damage, or gain unauthorized access to systems or data.
- The process of granting or denying specific permissions to a verified user or system.
- A framework that ensures the right individuals have appropriate access to technology resources.
- The process of verifying the identity of a user or device to ensure legitimate access.
- A cloud-based software delivery model where applications are accessed via a subscription over the internet.
Down
- A cyberattack where malicious code is inserted into a program or script to exploit vulnerabilities.
- An attack where a perpetrator intercepts and manipulates communication between two parties.
- The use of IoT technologies in industrial settings to enhance operational efficiency and automation.
- A type of key helps a user encrypt the available data while the private key decrypts it
- The process of securely creating, storing, distributing, and managing cryptographic keys.
- A security tool that monitors and filters network traffic to block unauthorized access while allowing legitimate communication.
- The process of converting readable data into a cipher text to prevent unauthorized access.
- A distributed computing paradigm that processes data near its source to minimize latency and improve efficiency.
- The practice of protecting personal or sensitive information from unauthorized access or disclosure.
- The assurance that data remains accurate, consistent, and unaltered during transmission or storage.
- A cyberattack that overwhelms a system or network to make it unavailable to users.
- Actions taken to reduce the severity or impact of identified security risks or vulnerabilities.
- Deliberate actions designed to exploit vulnerabilities in systems to gain unauthorized access or cause damage.
26 Clues: A cyberattack that overwhelms a system or network to make it unavailable to users. • The process of granting or denying specific permissions to a verified user or system. • The process of verifying the identity of a user or device to ensure legitimate access. • A type of key helps a user encrypt the available data while the private key decrypts it • ...
Computer Terms 2025-11-04
Across
- an internal timing device that synchronizes all operations by generating a constant stream of pulses, or "ticks"
- a component of the computer's central processing unit (CPU) that directs and coordinates all other parts of the system
- a computer's short-term memory that temporarily stores data for quick access by the processor
- brain of a computer
- the smallest unit of digital information in a computer, representing a single binary value of either 0 or 1.
- a very small, high-speed storage location within a computer's central processing unit (CPU) used to temporarily hold data for immediate processing
- chipset that controls the flow of data between the CPU and other parts of the computer
- a small, high-speed temporary memory that stores frequently accessed data to speed up future requests, improving overall system performance
- a fundamental digital circuit within a computer's CPU that performs all arithmetic and logical operations on binary data
- a numerical system that uses only two digits, 0 and 1, to represent all data and instructions.
- the basic unit of digital information in computing, consisting of eight bits.
- a computer hardware device that stores digital data, such as the operating system, applications, and user files like photos and documents
Down
- a small piece of firmware on a computer's motherboard that contains the initial instructions to start up the computer
- a computer component that reads and writes data to and from optical discs like CDs, DVDs, and Blu-rays using a laser
- the main printed circuit board (PCB) in a computer that connects all its essential components, acting as the system's central communication hub
- a device that converts high-voltage AC power from a wall outlet into low-voltage, regulated DC power for its internal components
- chipset that controls the flow of data between the CPU and RAM and GPU
- a specialized electronic circuit that handles graphics and image processing by performing mathematical calculations at high speed
- a passive heat exchanger in a computer that dissipates heat from components like the CPU or GPU by drawing heat away and releasing it into the air
- a microscopic electronic switch or amplifier that acts as the fundamental building block of computer chips
20 Clues: brain of a computer • chipset that controls the flow of data between the CPU and RAM and GPU • the basic unit of digital information in computing, consisting of eight bits. • chipset that controls the flow of data between the CPU and other parts of the computer • a computer's short-term memory that temporarily stores data for quick access by the processor • ...
Ap Comp-Sci Crossword Puzzle 2025-12-08
Across
- An open-source software framework for storing and processing massive datasets across clusters of computers
- Bigger than a gigabyte of code
- Compression Reduces file size by finding and eliminating statistical redundancies (like repeated patterns) without discarding any original data, ensuring the decompressed file is a perfect, bit-for-bit identical copy of the original
- The act of disguising an electronic communication, like a phone call, email, or website, to look like it's from a trusted source to deceive the recipient
- Code A system that uses 1s and 0s to represent data in a computer.
- The standard language for creating web pages, using tags to structure content like headings, paragraphs, links, and images, forming the fundamental skeleton of websites
- Data Represents physical quantities (like sound, light, temperature) that vary continuously, having infinite possible values. within a range.
- A small, formatted unit of data sent over a network, like the internet, that carries a piece of a larger message, containing both the actual data (payload) and crucial control information (header) like source/destination addresses, allowing data to be broken down, routed independently, and reassembled at its destination
Down
- Law The observation that the number of transistors on a microchip doubles approximately every two years, leading to exponential growth in computing power, speed, and efficiency, while costs decrease.
- A fast, connectionless internet protocol for sending data packets called datagrams
- The smallest unit of a digital image or computer display, often a tiny square or dot of a single color.
- World Wide and Search
- Data Information that can be freely accessed, used, re-used, and redistributed by anyone for any purpose, with minimal restrictions
- A tiny semiconductor device that acts as a microscopic electronic switch or amplifier, controlling electrical current flow to process information
- The smallest unit of code
- A is malicious software (malware) that blocks access to a computer system or encrypts its files, demanding
- Compression A data compression technique that reduces file size by permanently removing certain data deemed unnecessary or less important, resulting in a smaller file but with some loss of quality
- Cerf One of the inventors of the internet
- Blue, Red, Green.
- A character encoding standard that uses numerical values to represent letters, numbers, and symbols for computers to process.
20 Clues: Blue, Red, Green. • World Wide and Search • The smallest unit of code • Bigger than a gigabyte of code • Cerf One of the inventors of the internet • Code A system that uses 1s and 0s to represent data in a computer. • A fast, connectionless internet protocol for sending data packets called datagrams • ...
Matth 2025-12-16
Across
- Formula for the midpoint of a line segment
- Value of a function used in the Remainder Theorem
- Standard representation of a polynomial function
- Formula for adding the first n counting numbers
- General term of a harmonic sequence
- Mean of two numbers using multiplication
- 7/2) - find the midpoint of the two points (-3,-2) and (8,9)
- Equation used to determine x-intercepts
- Measurement across a circle through its center
- Requirement of the Rational Root Theorem
- Average of two numbers using the harmonic mean
- Standard form of a circle’s equation
- Algebraic expression representing a second-degree polynomial
- Algebraic expression representing a third-degree polynomial
- Equation for the perimeter of a circle
- Set of possible rational zeros of a polynomial
- Condition that defines a finite sequence
- Formula for calculating the sum of an arithmetic series
- Formula for the center of a circle
- Condition stated in the Factor Theorem
- Symbolic form of a geometric series
Down
- General equation representing a circle
- Expression for computing a circle’s radius
- Rule defining each Fibonacci term
- Average of two values using the arithmetic mean
- Polynomial division relationship
- Equation for the sum of a finite geometric series
- - find the midpoint of K(-8,-2) and L(2,8)
- Equation for the distance between two coordinates
- Equation used to find any term in an arithmetic sequence
- Common form of a quadratic expression
- Value used to locate the y-intercept
- Formula for the area enclosed by a circle
- Formula for the total of an infinite geometric series
- Ordered pair representing a point
- Indicates a sequence that continues without end
- Formula for determining the nth term of a geometric sequence
- Formula for finding the area of a circular sector
- Symbolic form of an arithmetic series
39 Clues: Polynomial division relationship • Rule defining each Fibonacci term • Ordered pair representing a point • Formula for the center of a circle • General term of a harmonic sequence • Symbolic form of a geometric series • Value used to locate the y-intercept • Standard form of a circle’s equation • Common form of a quadratic expression • Symbolic form of an arithmetic series • ...
Technology 2025-01-29
Across
- It’s the technology that designs and builds machines or devices that can perform tasks automatically, often like humans do, without needing direct control.
- It’s a virtual world where people can interact with each other and digital environments in real time, often using avatars, just like in real life, but online.
- It’s the ability of computers or machines to think, learn, and solve problems on their own, similar to how humans use their brains to understand things and make decisions.
- It’s the science of creating and using extremely small materials and devices, often at the level of atoms and molecules, to solve problems or improve things like medicine, electronics, and energy.
- It’s the practice of protecting computers, networks, and data from being accessed or damaged by hackers or other online threats.
Down
- It’s a type of computing that uses tiny particles to process information in a way that’s much faster and more powerful than regular computers, allowing it to solve complex problems.
- It’s a way of storing and accessing data or programs over the internet instead of on your computer, so you can use them from anywhere with an internet connection.
- It’s the technology that blends real and virtual worlds, allowing people to experience things like 3D environments, simulations, or interactive spaces, using devices like headsets.
- It’s the use of data, patterns, and trends to make guesses about what might happen in the future, like predicting sales or how likely something is to occur.
- It’s using technology to perform tasks automatically, without needing people to do them by hand, making things faster and more efficient.
10 Clues: It’s the practice of protecting computers, networks, and data from being accessed or damaged by hackers or other online threats. • It’s using technology to perform tasks automatically, without needing people to do them by hand, making things faster and more efficient. • ...
Artificial Intelligence 2020-10-12
Across
- 360 / its new and improved version have also added AI programs to their games that give game characters the ability to think like a real person
- Making / use machine learning techniques to automatically analyse data to make recommendations and decisions
- / technology by which a process or procedure is performed with minimal human assistance
- Recognition / include advanced human-computer interaction, video surveillance, automatic indexing of images, and video database, among others
- Learning / based on algorithms of neural networks
- Vision / makes the computer see
- Mining / similar to text analytics, is the process of deriving high-quality information from text
- / design intelligent machines that can help and assist humans in their day-to-day lives and keep everyone safe
- Data / describes the large volume of data – both structured and unstructured
- Car / appeared in the 1980s, with Carnegie Mellon University's Navlab and ALV projects in 1984 and Mercedes-Benz and Bundeswehr University Munich's Eureka Prometheus Project in 1987
- Speech / overcome speech recognition barriers such as speaking style, vocabulary and background noise
- Reality / simulated experience that can be similar to or completely different from the real world
- / subsidiary of Amazon providing on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis
Down
- / Microsoft’s personal productivity assistant that helps you save time and focus attention on what matters most
- Learning / based around the idea that we should really just be able to give machines access to data and let them learn for themselves
- / interact with users using natural language and speech capabilities
- Analysis / can be used to analyse how customers feel about an organisation’s products, services, marketing campaigns or your brand as a whole
- Turing / widely considered to be the father of theoretical computer science and artificial intelligence
- / a more popular language over C++ for AI and leads with a 57% vote among developers
- / general purpose language that is especially associated with artificial intelligence and computational linguistics
- / to notice that a particular thing or person exists or is present:
- / finite sequence of well-defined, computer-implementable instructions
- Language Processing / is now used in machine translation, information retrieval, and dialogue systems
23 Clues: Vision / makes the computer see • Learning / based on algorithms of neural networks • / to notice that a particular thing or person exists or is present: • / interact with users using natural language and speech capabilities • / finite sequence of well-defined, computer-implementable instructions • ...
Vocabulary 2020-10-22
Across
- Manufactured and composed object to facilitate or perform a certain work, generally transforming a form of energy into movement or work
- the belief that a person or group will be able and willing to act appropriately in a given situation and thoughts
- Very short period of time, almost imperceptible
- Make something started but not finished not continue definitively or for a limited time
- Place where you enter or arrive at a site
- It is a unique name by which each user is identified. Usernames are generally based on short alphanumeric strings
- Volume occupied by liquids and aggregates within a container
- Interfere [a person or a thing] in the process or development of something in a way that alters or prevents it
- Make a person know one thing
- Increase in size something, such as a photograph
- It is the declaration of the will of a natural or legal person, formulated in writing and addressed to the judicial body, where the beginning of a litigation, its processing and its completion will be requested by means of a judgment favorable to the interests of the plaintiff
Down
- Situation or place in which a thing is found
- Line that limits the outer part or furthest from the center of a thing
- Word, phrase or signal that only certain people know and that allows them to be recognized by each other or by other people
- Absence of danger or risk
- Voluntary application of mental activity or of the senses to a certain stimulus or mental or sensitive object
- Make a thing better than it was.
- Product or solution made up of a set of instruments, methods and techniques designed to solve a problem
- They are structures formed on the Internet by people or organizations that connect based on common interests or values
- Which is done in the presence of few people, family and domestic, without any formality or ceremony
- Make someone find out something they don't know
- Taking from a person something that belongs to him for profit, through violence or intimidation or using force
- person or a community that has knowledge in the area of computing and is dedicated to accessing computer systems to make changes to it
23 Clues: Absence of danger or risk • Make a person know one thing • Make a thing better than it was. • Place where you enter or arrive at a site • Situation or place in which a thing is found • Very short period of time, almost imperceptible • Make someone find out something they don't know • Increase in size something, such as a photograph • ...
Computer Science 2020-11-16
Across
- A basic unit of information in computing and digital communications
- It's an electronic device used to make holes
- It is intelligence demonstrated by machines
- A service that makes website accessible via the World Wide Web
- It's an organized collection of data
- A computer expert with advanced technical knowledge
- Physical parts of a computer
- A computer program that converses in natural language
- A hand-held pointing device that detects two-dimensional motion relative to a surface
- User who has all permissions on the system
- It's a system software that manages computer hardware, software resources, and provides common services for computer programs
- It's firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs
- It's the process of improving the quality and quantity of website traffic to a website or a web page from search engines
- A program that transforms source code into object code
- It is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks and wide area networks
- A method of exchanging messages between people using electronic devices
- A software application that provides comprehensive facilities to computer programmers for software development
- Tt's the global system of interconnected computer networks
Down
- A peripheral device which makes a persistent representation of graphics or text, usually on paper
- An object that has been intentionally placed into orbit
- A system used for reporting and data analysis, and is considered a core component of business intelligence
- A communication endpoint in computer networking
- An end-point in a communication across a network or the Internet
- A computer program used to prevent, detect, and remove malware
- It's a spreadsheet developed by Microsoft,It features calculation, graphing tools, pivot tables, and a macro programming language
- A small, portable personal computer
- A common means for unrelated objects to communicate with each other
- It's cause a malfunction in a computer program
- You can have light with it
- A piece of computer hardware or software that provides functionality for other programs or devices
- It is a domain-specific language used in programming and designed for managing data held in a relational database management system
- A set of instructions that describes how to perform a specific task to a computer
32 Clues: You can have light with it • Physical parts of a computer • A small, portable personal computer • It's an organized collection of data • User who has all permissions on the system • It is intelligence demonstrated by machines • It's an electronic device used to make holes • It's cause a malfunction in a computer program • A communication endpoint in computer networking • ...
ISO/OSI model in communication networks 2022-04-04
Across
- a set of rules formally described that define the communication modalities between two or more entities.
- a small segment of a larger message.
- display in succession.
- the activity performed by the user from the first time he accesses a page of the server side application, until he closes the browser.
- connection between a computer and its peripheral units, or, also, the connection between two or more computers.
- the set of methods and techniques used in the transmission, reception and processing of data and information.
- a written acknowledgment that something of value has been transferred from one party to another.
- a device that originates, or generates, an information transfer to one or more receivers.
- a hardware module or device used to receive signals of different kinds, depending on the context of the application.
- computer on which information is stored which other computers (called clients) can access by means of a connection.
- a system of networking of several computers and users.
- a software installed or a series of software being run on a computer with the purpose and result of making one or more functions possible.
- information that has been translated into a form that is efficient for movement or processing
- transmit data between sender and recipient.
Down
- the process of sending and propagating analog or signals of digital information.
- the organization of programming into separate functional components that interact in some sequential and hierarchical way
- The degree of subordination in a hierarchy in data management structures or communication protocols.
- who provides a standard service or product.
- any hardware device in the system capable of communicating with other devices that are part of the network.
- interconnected computing devices that can exchange data and share resources with each other
- system is a computer system that combines portability and interoperability and uses open software standards.
- is a way of converting the original text into a sequence of letters, numbers and special signs that only those with the correct decryption key can convert back.
- the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
- an unregulated custom that develops and spreads as if it were. Specifications or styles that are widely accepted by users and adopted by several vendors.
24 Clues: display in succession. • a small segment of a larger message. • who provides a standard service or product. • transmit data between sender and recipient. • a system of networking of several computers and users. • the process of sending and propagating analog or signals of digital information. • ...
Summer's Crossword Puzzle 2018-11-02
Across
- IS ANOTHER WORD FOR SOLUTION
- THE RELATIVE HIGH AND/OR LOW POINTS ON A GRAPH
- CONSTANT RATE OF CHANGE
- POWER GIVEN TO STATES
- THE OUTERMOST LAYER OF THE ATMOSPHERE
- CLOUD OF INTERSTELLAR DUST
- SPACE AND ALL THE MATTER AND ENERGY IN IT
- BRANCH STATED IN ARTICLE TWO
- POWER GIVEN TO BOTH STATE AND CONGRESS
- GOVERNMENT WITH LIMITED POWERS DEFINED BY LAW
- ANOTHER NAME A LITERAL EQUATION
- THE BELIEF THAT GOVERNMENT IS SUBJECT TO WILL OF THE PEOPLE
- POWER GIVEN TO CONGRESS
- A LARGE CELESTIALBODY THAT EMITS LIGHT
- DISTANCE THAT LIGHT TRAVELS IN ONE YEAR
- COMPARING THINGS USING LIKE OR AS
- REAL NAME FOR PREBOLA
- ACT OF GIVING NON HUMAN THINGS HUMAN CHARACTERISTICS
- NATURAL SATELLITE OF THE EARTH, VISIBLE BECAUSE OF THE SUN'S REFLECTED LIGHT
- BRANCH STATED IN ARTICLE ONE
- AVERAGE DISTANCE FROM EARTH TO SUN
- MILKY WAY IS THIS TYPE OF GALAXY
- TO APROVE
- A COMPARISON OF TWO QUANTITIES BY DIVISION
- PARENTHESES,EXPONENTS,MULTIPLICATION,DIVISION,ADDITION,SUBTRACTION
Down
- IF A=B, THEN B=A
- FIRST STAGE OF A STAR'S LIFE CYCLE
- GROUP OF ADVISORS TO A PRESIDENT
- OUR SOLAR SYSTEM'S CENTRAL STAR
- FORCE THAT CREATED OUR SOLAR SYSTEM
- CHECK IF ACTIONS ARE CONSTITUTIONAL
- FEARED STRONG GOVERNMENT
- IS ALWAYS A RATION
- INDICATES THE NUMBER OF TIMES THE BASE IS USED AS A FACTOR
- THE ACT OF COMPUTING A PROBLEM WHEN INCLUDING UNITS OF MEASUREMENT
- SPHERICAL BODY THAT ORBITS SUN
- POWER SUGGESTED BUT NOT SAID IN CONSTITUTION
- MS. BULL KNOWS ALL OF THESE ELA TERMS
- COLLECTION OF LARGE AND SMALL BODIES THAT ORBIT OUR CENTRAL STAR
- BRANCH STATED IN ARTICLE THREE
- PROCESS OF BECOMING A CITIZEN OF ANOTHER COUNTRY
- IF A=B AND B=C, THEN A=C
- THE FIRST TEN AMENDMENTS
- USED IN PLACE OF NOUNS
- LORD OF THE FLIES WAS A MEANINGFUL
- A COLLECTION OF STARS,DUST,AND GAS BOUND TOGETHERBY GRAVITY
- GALAXY THAT DOES NOT HAVE A DISTINCT SHAPE
- THE LIFE CYCLE OF A STAR DEPENDS ON THIS
- GALAXY SHAPED LIKE AN ECLIPSE OR STRETCHED CIRCLE
- AN EQUATION STATING TWO RATES ARE EQUAL
50 Clues: TO APROVE • IF A=B, THEN B=A • IS ALWAYS A RATION • POWER GIVEN TO STATES • REAL NAME FOR PREBOLA • USED IN PLACE OF NOUNS • CONSTANT RATE OF CHANGE • POWER GIVEN TO CONGRESS • FEARED STRONG GOVERNMENT • IF A=B AND B=C, THEN A=C • THE FIRST TEN AMENDMENTS • CLOUD OF INTERSTELLAR DUST • IS ANOTHER WORD FOR SOLUTION • BRANCH STATED IN ARTICLE TWO • BRANCH STATED IN ARTICLE ONE • ...
Personal Finance Vocabulary Crossword 2016-08-29
Across
- the amount borrowed p, or the unpaid portion of the amount borrowed, on which the borrowed pays interest
- interest rate that banks offer to their best business customer
- a complete record of your borrowing and repayment performance
- remaining credit available to you on current accounts
- a business that gathers, stores, and sells credit information to other businesses
- treating someone differently based on prejudice rather than individual merit
- loans in which the interest rates goes up or down with inflation
- checking several places to be sure you are getting the best prices for equal quality
- buying something without thinking about it and making a conscious decision
- loans in which the interest rate does not change over the life of the loan
- a person or company hired to collect an overdue balance on an account
- a person or business that loans money to others
- the financial ability to repay a loan repay a loan with present income
- tells potential creditors the likelihood that you will repay debt as agreed
Down
- an accredited person who borrows money from others, and must be prepaid later
- unlicensed lenders that charge illegally high interest rates
- interest computed only on the account borrowed or saved without computing
- a consumer's credit history issued by a bureau to a business
- a legal business that makes high interest loans based on the value of personal possessions
- the use of someone's money, borrowed now with an agreement to pay it back later
- involves providing a service for which you will pay later
- predetermined amount that can be borrowed on demand with no collateral
- the total dollar amount of all interest and fees you pay for use of credit
- state law that sets maximum interest rates that may be charged for consumer loans
- the cost of credit expressed as a yearly percentage
- an organization that makes high risk consumer loans
- a person who agrees to pay the loan if the borrower falls to
- the measure of creditworthiness based on an analysis of your credit and financial history
- a code that protects your account name, number, and other information
- the percentage of interest you pay on a loan
30 Clues: the percentage of interest you pay on a loan • a person or business that loans money to others • the cost of credit expressed as a yearly percentage • an organization that makes high risk consumer loans • remaining credit available to you on current accounts • involves providing a service for which you will pay later • ...
Computer Management and safe-guarding our data 2016-04-15
Across
- 3. A form of malware that exploits weakness in an application or operating system in order to spread. (4)
- 19. Creating a backup image of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure Disk… (7)
- 20. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry Defensive… (11)
- 16. Backup schedule whereby backups are made only of new files and files that have changed since the last backup. Resulting in greater backup efficiency (11)
- 18. Checking for accuracy of data Data… (10)
- 5. Morden computing makes it easy to ‘crack’ passwords. There is a simple way of scrambling data or text into a new format using a set of rules, name it (9)
- 13. Redundant Array of Inexpensive/ Independent Disks (4)
- 2. Name a one Madware threat (5)
- 7. A collection of programs that are designed to infiltrate a computer and gain the highest levels of privileges(administrator rights) to take control of the infected computer (7)
Down
- 17. Checking for the correctness of data Data… (10)
- 14. A form of malware disguised as a useful program, but in reality designed to do harm (6)
- 6. This is a form of malware. It can cause relatively minor, annoying problems such as redirecting you to websites you don’t intend going to. (7)
- 11. Security based on measurement and identification of unique physical characteristics of a person (17)
- 8. Name another word for ‘fishing for information’ (8)
- 1. Name one category of threats to data (11)
- 12. A software that is specifically designed to install itself without the users knowledge to negativity affect or ‘harm ’a computer system (7)
- 10. Hardware or software that monitors the traffic between a computer and the interne t, to safeguard against beaches in security (7)
- 9. This acts as a barrier between your computer and the internet (9)
- 4. The quality of computer is often summarised by the ‘Garbage In, Garbage Out’. Fill in the acronym for this principle (4)
- 15. Uninterruptible Power Supply (3)
20 Clues: 2. Name a one Madware threat (5) • 15. Uninterruptible Power Supply (3) • 1. Name one category of threats to data (11) • 18. Checking for accuracy of data Data… (10) • 17. Checking for the correctness of data Data… (10) • 8. Name another word for ‘fishing for information’ (8) • 13. Redundant Array of Inexpensive/ Independent Disks (4) • ...
Computer Vocab 2013-09-26
Across
- Up / The initial set of operations that a computer system performs.
- / A device that modulates an analog carrier signal to encode digital information.
- / An organized collection of data.
- / A type of user interface that allows users to interact with electronic devices through graphical icons.
- / A computer network that interconnects computers in a limited area such as a home.
- computer / Portable personal computer.
- Search / Search engine queries.
- / A physical point in a raster image.
- / The main printed circuit board found in computers.
- / A specific character string that constitutes a reference to a resource also known as a web address.
- / A computer system used primarily to provide one or more network services.
- / A pictogram displayed on a computer screen in order to help a user navigate a computer system.
- Device / Any piece of computer hardware equipment used to communicate the results of data processing carried out by an information processing system.
- / A network that covers a broad area.
- Address / A numerical label assigned to each device.
- / A telecommunications network that allows computers to exchange data.
- / An operating system designed primarily for touchscreen mobile devices such as smartphones.
Down
- / A unit of digital information in computing and telecommunications.
- / Any physical mechanism that prevents modification or erasure of valuable data on a device.
- computer / Personal computer in a form intended for regular use at a single location.
- / The quantities, characters, or symbols on which operations are performed by a computer.
- / Any data entered into a computer or data processing system.
- Code / Represents text or computer processor instructions using the binary number systems.
- / A list of options or commands presented to an operator by a computer.
- Engines / A software system that is designed to search for information on the World Wide Web.
- / Large and powerful data processing systems.
- System / A collection of software that manages computer hardware resources and provides common services for computer programs.
- / The number of distinct pixels in each dimension that can be displayed.
- / A form of computer data storage.
- / The hardware within a computer that carries out the instructions of a computer program.
- Card / An expansion card which generates a feed of output images to a display.
- / A type of malware that, when executed, replicates by inserting copies of itself.
32 Clues: Search / Search engine queries. • / An organized collection of data. • / A form of computer data storage. • / A physical point in a raster image. • / A network that covers a broad area. • computer / Portable personal computer. • / Large and powerful data processing systems. • / The main printed circuit board found in computers. • ...
computer vocabulary 2014-02-12
Across
- the central proccesing unit where most of the calculations on a computer take place
- computing the practice of using a network of remote servers hosted on the internet to store, manage, and process data
- a printed circuit board containing the principle components of a computer
- a collection of items of the same type stored in a hidden or inaccessible place
- any computer registered to join the domain server.
- a uniform recourse locator is used to specify addresses on the world wide web
- a program with graphical user interface for displaying HTML files
- a piece of your computer that you can touch that is connected to the computer
- port a connection point on a computer for hardware or other devices
- the first piece of software that starts a computer
- a computer memory that uses programs to remember necessarily tasks
- a group of binary digits or bits operated as one unit.
- address, a unique string of numbers separated by periods that identify each computer using the internet protocol
- the programs and other operating information used by a computer
- code, a coding system using the digits 0 and 1 to represent a digit, letter, or other character
- a setting or value automatically assigned to a software application
- source a detonating software for which the original source code is made freely available
Down
- an internet service provider provides services such as internet access, internet transit, and domain name registration.
- small files that websites put on your computer
- a mouse keyboard or monitor.
- system a software that supports a computers basic functions
- a program with graphical user interface for displaying HTML files.
- a computer system where a central server provides information to a number of networked workstations.
- drive a high capacity self contained storage device containing a read write mechanism and multiple disks.
- a computer program that manages access to a centralized recourse
- data that stays on a computer and can be read
- a computer network consisting of a worldwide computer network that uses TCP/IP network protocols.
- system of computers that can communicate with each other
- a personal computer small enough to fit conveniently in a work space
29 Clues: a mouse keyboard or monitor. • data that stays on a computer and can be read • small files that websites put on your computer • any computer registered to join the domain server. • the first piece of software that starts a computer • a group of binary digits or bits operated as one unit. • system of computers that can communicate with each other • ...
computer vocab 2014-08-25
Across
- The physical structure of a person
- The central processing unit (CPU) is the brain of your computer
- checker A grammar checker, in computing terms, is a program, or part of a program, that attempts to verify written text for grammatical correctness
- Read to find errors
- A plural of datum
- printer A printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attract toner
- The study of people's efficiency in their working environment
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- Various possible meanings of the acronym, abbreviation, shorthand
- The act of turning out
- A particularly powerful mainframe computer
- A place to store facts
- A Folder
- A computer that is portable and suitable for use while traveling
- Any netlike combination of filaments
- A line at the head of a dispatch
Down
- unit A component of a computer's central processing unit (CPU) that directs operation of the processor Home row key. A, S, D, F, J, K, L, AND SEMICOLON (;) these are designated as the keys from which all keystrokes are made
- A small computer that contains a microprocessor as its central processor
- A section or expanse of rural scenery
- A movable indicator on a computer screen
- A book that lists words in groups of synonyms and related concepts Hard copy. A printed version on paper of data held in a computer
- Something uttered
- The official procedure or system of rules governing affairs of state or diplomatic occasions
- page A page at the beginning of a book giving its title, the names of the author and publisher, and other publication information
- A printed circuit board containing the principal components of a computer or other device
- A flat paper container with a sealable flap
- A body's relative mass or the quantity of matter contained by it, giving rise to a downward force; the heaviness of a person or thing
- What is put in, taken in, or operated on by any process or system
28 Clues: A Folder • A plural of datum • Something uttered • Read to find errors • The act of turning out • A place to store facts • A line at the head of a dispatch • The physical structure of a person • Any netlike combination of filaments • A section or expanse of rural scenery • A movable indicator on a computer screen • A particularly powerful mainframe computer • ...
Unit 1 Technology Vocabulary 2023-10-11
Across
- Programs designed to make users more productive and/or assist them with personal tasks.
- Each electronic document on the web; can contain text, graphics, audio, and video.
- A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individuals.
- Any hardware component that allows you to enter data and instructions into a computer or mobile device.
- Software that enables users with an Internet connection to access and view webpages on computers or mobile devices.
- Process of matching the files on computers or mobile devices in two or more locations with each other.
- A worldwide collection of electronic documents; short for World Wide Web.
- A collection of computers and mobile devices connected together, often wirelessly, via communications devices and transmission media.
- Program designed to make users more productive and/or assist them with personal tasks.
- An Internet-capable phone that usually also includes a calendar, an appointment book, an address book, a calculator, a notepad, games, browser, and numerous other apps.
Down
- Desktop that does not have a tower and instead houses the screen and system unit in the same case.
- A high-speed, high-quality nonimpact printer that creates images using a laser beam and powdered ink called toner.
- Any hardware component that conveys information from a computer or mobile device to one or more people.
- Electronic components that store instructions waiting to be executed and the data needed by those instructions.
- Wireless communication technology that uses short-range radio signals to transmit data between two Bluetooth-enabled computers or devices to communicate with each other.
- A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
- A mobile device that is used primarily for reading e-books and other digital publications. Short for electronic book reader.
- A mobile computing device designed for single-player or multiplayer video games.
- Broadband Internet connection that uses radio signals to provide high-speed Internet and network connections to computers and devices capable of communicating. Short for wireless fidelity.
- A computer dedicated to providing one or more services to other computers or devices on a network. Sometimes called a host computer.
20 Clues: A worldwide collection of electronic documents; short for World Wide Web. • A mobile computing device designed for single-player or multiplayer video games. • Each electronic document on the web; can contain text, graphics, audio, and video. • Program designed to make users more productive and/or assist them with personal tasks. • ...
Chapter 13 Vocabulary 2023-11-08
Across
- change the frequency, amplitude, or other characteristic of an electronic communication signal; allows a signal to carry information over long distances
- the main circuit board in a computer
- an electronic device that retains information until it is needed
- the operating system and applications that allow us to perform meaningful tasks using a computer
- a device that allows people to touch and move objects in a virtual reality system
- the physical input, processing, and output components of a computer, such as a standard keyboard, mouse, CPU, and monitor
- an Internet protocol that converts voice signals into a digital format that can be sent over the Internet, allowing people to use their computers and the Internet to make calls
- an electronic signal that has only two values: on or off
- a receiver's response to a source's question or statement
- the protocol, or language that allows people to access the Internet
- an electronic signal that changes continuously in a smooth manner
- a computer system that consists of many individual computers working together
- the process of sending a signal to three different satellites; the time it takes the signal to bounce off each satellite and return to the sending device is then computed to identify the exact location of the sending device
Down
- a system that uses a microchip equipped with radio transmitter
- a form of distributed computing that uses the Internet to provide access to computer applications and other files
- the equipment and systems used for storing, processing, and extending the human ability to communicate information
- a central, powerful computer that "serves" or provides storage and services, to other computers on a network
- a group of eight binary bits that are read together as a single "word"
- a code used by digital electronics to convey information
- the part of a computer that accepts inputs, performs calculations, and other processing tasks, and send the results to output devices
- sources of communication and information, such as newspapers, radio and television broadcasts, and the Internet
- an electronic device that allows two or more different networks to communicate
- an on or off signal, known as a binary digit, in binary code used by computer
23 Clues: the main circuit board in a computer • a code used by digital electronics to convey information • an electronic signal that has only two values: on or off • a receiver's response to a source's question or statement • a system that uses a microchip equipped with radio transmitter • an electronic device that retains information until it is needed • ...
HISTORICAL DEVELOPMENTS IN PROGRAMMING 2024-02-06
Across
- the classification, style or way of programming.
- a programming paradigm that facilitates the creation of programs with readable code and reusable components.
- developed the c programming language (last name)
- autocode developed by Tony Brooker and Derrick Morris.
- Alick ____ Developed AUTOCODE in 1952.
- early high-level programming language designed for scientific and numerical computations in 1958
- this is always evolving every second
- this language is the superset of typescript, this language also introduced static typing
- The algorithmic language for Symbolic Systems.
- ALGOL stands for _____ language
- the designer of the Nim programming language
- key contributors to ALGOL 58 included computer scientists such as John ____, Peter Naur and Friedrich Bauer.
- Open-source scripting language developed by facebook
- programming language released by Sun Microsystems in 1995 which simplified many complex C++ features
- Regularized Programming Model
- Open-source, general-purpose, multi-paradigm, compiled programming language developed by Apple
- "no smile only ______" - jannsen ramos
- Designed the von Neumann architecture
- A programming language inspired by the Go programming language
- someone who writes/creates computer software or applications generally by providing instructions
Down
- widely used for systems programming where low-level control is necessary.
- language known for its pioneering role in numerical calculations and mathematical operations
- Named after the French mathematician and philosopher Blaise Pascal
- Autocode aimed to ease this programming challenge, contributing to a more efficient and user-friendly coding process.
- IPL was eventually replaced by this language.
- Pure object-oriented language emphasizing reliability
- User-friendly platform to create 3D games
- Task Automation Framework designed by Jeffrey Snover
- IPL stands for ______ processing language
- is a system is any outdated computing system, hardware or software that is still in use.
- Developed in 1959 by Fletcher Jones, Roy Nutt, and Robert L. Patrick
- “Father of the computer”
- "Regularized Programming Model"
- developed by google for building web, server, and mobile applications.
- SQL - ______ query language.
- Released in 1981 as the native language for the BBC Micro computer.
- this programming language is a superset of ALGOL 60 and was influenced by the design Simscript.
- Programming language developed in 1959 which still handles more than 70% of the world’s business transactions
38 Clues: “Father of the computer” • SQL - ______ query language. • Regularized Programming Model • "Regularized Programming Model" • ALGOL stands for _____ language • this is always evolving every second • Designed the von Neumann architecture • Alick ____ Developed AUTOCODE in 1952. • "no smile only ______" - jannsen ramos • User-friendly platform to create 3D games • ...
APCSP Vocabulary Unit 5, 6, & 7 2024-04-30
Across
- the process of accessing each item in a list one at a time\
- a process and allows a procedure to be used only knowing what it does, not how it does it. Procedural abstraction allows a solution to a large problem to be based on the solution of smaller subproblems. This is accomplished by creating procedures to solve each of the subproblems.
- the value passed to the parameter
- a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
- the subdivision of a computer program into separate subprograms
- manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation
- occurs when the ending condition will never evaluate to true
- Data a process that makes the data uniform without changing its meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word).
- Application Program Interface - specifications for how functions in a library behave and can be used
Down
- data that does not accurately reflect the full population or phenomenon being studied
- a group of functions (procedures) that may be used in creating new programs
- a common method for referencing the elements in a list or string using numbers
- an ordered collection of elements
- the practice of obtaining input or information from a large number of people via the Internet
- used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression
- a variable in a function definition. Used as a placeholder for values that will be passed through the function
- a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
- the collection of facts and patterns extracted from data
- an individual value in a list that is assigned a unique index
- Filtering choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table
- the collection of facts and patterns extracted from data
- data about data
- Science scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
23 Clues: data about data • an ordered collection of elements • the value passed to the parameter • the collection of facts and patterns extracted from data • the collection of facts and patterns extracted from data • the process of accessing each item in a list one at a time\ • occurs when the ending condition will never evaluate to true • ...
