computing Crossword Puzzles
Crossword 2024-02-11
Across
- is any other security offered for the said credit facility
- The conversion of data into a secret code for transmission over a public network.
- a description of the steps in an algorithm using a mix of conventions of programming languages
- a set of related fields that encompass computer systems, software, programming languages and data and information processing
- an illegal attempt to defeat the imposition of taxes by individuals, corporations, trusts, and others
- a computer network for sharing information, easier communication, collaboration tools, operational systems, and other computing services within an organization
- practical implementation of ideas that result in the introduction of new goods or services or improvement in offering goods or services.
- It includes all aspects of overseeing and supervising the business operations of an organization.
- independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form
- Completely Automated Public Turing test to tell Computers and Humans Apart
- a document contemplated by or consisting of a contract, which promises the payment of money without condition, which may be paid either on demand or at a future date
- primarily an economic process of interaction and integration that is associated with social and cultural aspects
- system software that manages computer hardware and software resources, and provides common services for computer programs
- set of rules that are created and are enforceable by social or governmental institutions to regulate behavior
- to archive and compress them into one file of smaller size
- set of small transactions that do not fit in a ledger's specified accounts.
- an event or campaign whose primary purpose is to raise money for a cause, charity or non-profit organization
Down
- encompasses crop and livestock production, aquaculture, fisheries, and forestry for food and non-food products.
- any practice which contributes to the sale of products to a retail consumer
- an organization—usually a group of people or a company—authorized by the state to act as a single entity
- he maximum amount of data that can travel in a communication path in a given time, measured in bits per second
- computer that has been hijacked by a cracker without the owner knowledge and used to perform malicious tasks on the Internet.
- the process in which separate organizations unite to form a larger organization or group
- Latin phrase used in English to mean an exchange of goods or services,
- a list of employees of a company who are entitled to receive compensation as well as other work benefits, as well as the amounts that each should obtain
- he study and discipline of money, currency and capital assets.
- originally developed to detect and remove computer viruses
- document that maintains a record of a transaction between a buyer and seller
28 Clues: is any other security offered for the said credit facility • originally developed to detect and remove computer viruses • to archive and compress them into one file of smaller size • he study and discipline of money, currency and capital assets. • Latin phrase used in English to mean an exchange of goods or services, • ...
UCSD Divest Crossword 2025-02-07
Across
- Insurance giant, holds $150.43 million in both shares and bonds in eleven companies that are arming Israel during its genocide against Palestinians in Gaza
- UC investment partner & world’s largest weapons manufacturer, supplies Israel with F-16 & F-35 fighter jets, M270 Multiple-Launch Rocket Systems, Hellfire R9X Missiles, and Apache helicopters (two words)
- Developed an AI-based facial recognition application for the Israeli military to conduct mass surveillance of Palestinians in Gaza
- Publicly traded American company operating an online vacation rental platform, offers listings of accommodation in illegal settlements on occupied Palestinian and Syrian land
- UC investment partner, supplies Israel with artillery information and bombs for fighter jets used to assault Gaza (two words)
- American multinational technology corporation, provided services to the Israeli government, the Israeli Ministry of Defense (IMOD), and cloud services to the Israeli military and security bodies in Israel
- The largest international investor in Israel, recently dropped a $25 billion technical investment amidst pressure against investing in a #ShutDownNation
Down
- Provides technology for Israel’s Population and Immigration Authority databases and IT systems, a crucial pillar of its apartheid systems (two words)
- UC research partner, manufactured guided bombs that killed 40 Palestinians taking shelter at a UN school in Al Nuseirat in Gaza
- Denver-based high-tech mass surveillance company that has been providing its AI-powered tools to the Israeli security forces as well as the U.S. military, immigration authorities, and police department
- Sued its workers union over a posted statement of solidarity with Palestine, but does not have any other apparent financial ties to Israel
- Supplies the servers, maintains services and related equipment to the Israeli military as a part of a $150 million 2023 contract funded by US foreign aid
- Fast-food restaurant that has supported the Israeli occupation forces with free McDonald’s meals during the ongoing genocide, organic boycott supported by the BDS movement
- American multinational tech company, operator of the Israeli Population Registry computing system, which stores information on Palestinians living in the oPt
- UC investment partner, supplied Israel with bulldozers to systematically demolish Palestinian homes, land, and infrastructure
- Gas company, main corporation extracting gas claimed by apartheid Israel in the East Mediterranean
- UC investment partner, supplies Israel with F-15 fighter jets, Apache AH-65 attack helicopters, and Joint Direct Attack Munitions
- American multinational tech giant whose Israel branch supported the development of the digital platform “Israel Rises” of the Home Front Command, a branch of the Israeli military
- Drone manufacturer headquartered in San Diego, California, manufactured the autonomous Nova 2 Drone that "US and Israeli forces" praised as the "Most Mission Capable Indoor Drone" and was used in Gaza
- Drone manufacturer headquartered in San Mateo, California, has sent more than 100 short-range reconnaissance drones to the Israeli military
20 Clues: Gas company, main corporation extracting gas claimed by apartheid Israel in the East Mediterranean • UC investment partner, supplied Israel with bulldozers to systematically demolish Palestinian homes, land, and infrastructure • UC investment partner, supplies Israel with artillery information and bombs for fighter jets used to assault Gaza (two words) • ...
BIG DATA 2025-02-15
Across
- (of data) structured, unstructured, and semistructured data that is gathered from multiple sources
- a query language in Apache Hive for processing and analyzing structured data
- (data) data that were collected in the past, usually for a purpose other than research
- provides a complete record of the information resources maintained by an organisation.
- a term used to describe cloud-based software tools used for working with data, such as managing data in a data warehouse or analyzing data with business intelligence.
- delay before a transfer of data begins following an instruction for its transfer.
- (computing) a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
- the proportion of visitors to a web page who follow a hypertext link to a particular site
- a process that allocates system resources to control the execution of unattended background programs.
- (analytics) the use of data, statistical algorithms and machine learning techniques to identify the likelihood of future outcomes based on historical data.
- (processing) the technique of linking together multiple computer servers over a network into a cluster, to share data and to coordinate processing power
- (processing) a method of running high-volume, repetitive data jobs
Down
- (of data) the speed at which data is entered into a system and must be processed
- (hardware) a device or device component that is relatively inexpensive, widely available and more or less interchangeable with other hardware of its type.
- the resource management and job scheduling technology in the open source Hadoop distributed processing framework
- a set of computers that work together so that they can be viewed as a single system
- (database) database that arranges data elements in vertical columns and horizontal rows.
- (data) data that fits a predefined model or format.
- a distributed file system that handles large data sets running on commodity hardware
- database computer language designed for the retrieval and management of data in a relational database
- (data) information that either does not have a pre-defined data model or is not organized in a pre-defined manner
- (of data) how reliable and significant the data really is
- (database) type of database that stores and provides access to data points that are related to one another
- (data) any data that are essentially not alike, or are distinctly different in kind, quality, or character. they are unequal and cannot be readily integrated to meet the business information demand.
- (also cleansing) the process of fixing incorrect, incomplete, duplicate or otherwise erroneous data in a data set
- a collection of open-source software utilities that facilitates using a network of many computers to solve problems involving massive amounts of data and computation
26 Clues: (data) data that fits a predefined model or format. • (of data) how reliable and significant the data really is • (processing) a method of running high-volume, repetitive data jobs • a query language in Apache Hive for processing and analyzing structured data • (of data) the speed at which data is entered into a system and must be processed • ...
Vocab Journal 2024-12-14
Across
- A simulator that imitates a program or events.
- The process of reducing complexity by hiding unnecessary details to make it easier to think about a problem.
- Data represented as either yes/no or true/false.
- An input and an internal device that identifies the direction
- A Bluetooth® Low Energy (BLE) antenna is an antenna used to create a personal area network that uses low energy to power Bluetooth wireless technology.
- Any type of calculation that follows a well-defined process like an algorithm.
- An input and an internal device that measures tilt shaking and acceleration
- A block of code that is triggered when a certain event happens.
- The design of products or environments that can be used by all people without the need for adaptation or modifications.
- An object-oriented computer programming language commonly used to create interactive effects within web browsers.
- A type of motor or servo that is responsible for moving or controlling a mechanism or components.
- An input that detects the amount of bending.
- The period when a program is running. Runtime begins when a program is opened (or executed) and ends when the program is closed.
Down
- A chip that processes information and data from input and delivers information or data as an output.
- A small image used to express an idea or emotion in digital communication.
- A command that performs different actions depending on whether a condition is true or false.
- The results of the operation of a system. Example - a computer output could be information or signals produced or delivered.
- Code that is easy to read and understand its logic.
- The A and B buttons is an input that is built into a micro bit and it detects when a program has been initiated or started
- A sequence of characters (letters, numerals, symbols, and punctuation marks).
- An input and is not built into a microbit or also known as external and it It detects the light level.
- An input that is not built into the microbit or it is external and it detects the amount of force.
- A type of data in computing that a logical expression evaluates to. The only possible values for Boolean are True and False.
- A method of transferring data by breaking it into small chunks called packets.
- A device that responds to a physical stimulus (as heat, light, sound, pressure, magnetism, or a particular motion) and transmits a resulting impulse (as for measurement or operating a control).
- A placeholder in a device’s memory that stores a value a program is using.
- An input is something put into a system, such as resources, information, or signals, in order to achieve a result
- The execution of one pass of a loop
- A numerical amount defined in an algebraic equation.
29 Clues: The execution of one pass of a loop • An input that detects the amount of bending. • A simulator that imitates a program or events. • Data represented as either yes/no or true/false. • Code that is easy to read and understand its logic. • A numerical amount defined in an algebraic equation. • An input and an internal device that identifies the direction • ...
Vocabulary lesson 2 - Zakkary Turpin 2017-03-02
Across
- The translation of data into a secret code.
- In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
- Stands for "Joint Photographic Experts Group." JPEG is a popular image file format.
- a unit of information equal to one billion (109) or, strictly, 230 bits.
- software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program.
- A computer network or data network is a telecommunications network which allows nodes to share resources.
- an input device that scans documents and images, which can be imported into a computer
- In computer user interfaces, a cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.
- It is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web.
- The term "format" has several meanings, related to 1) disk formatting, 2) page formatting, and 3) file formats. 1) Disk formatting.
Down
- A local-area network (LAN) is a computer network that spans a relatively small area.
- A 3D printer is a computer-aided manufacturing (CAM) device that creates three-dimensional objects.
- A firewall is a network security system designed to prevent unauthorized access to or from a private network.
- In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers.
- a unit of memory or data equal to 1,024 (210) bytes.
- The most widely used local area network (LAN) technology.
- A document that serves as a starting point on a Web site.
- Computer hacking refers to the practice of modifying or alteringcomputer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.
- Java was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model.
- A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web
- The data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells.
- The Internet's system for converting alphabetic names into numeric IP addresses
- a networking device that forwards data packets between computer networks.
25 Clues: The translation of data into a secret code. • a unit of memory or data equal to 1,024 (210) bytes. • The most widely used local area network (LAN) technology. • A document that serves as a starting point on a Web site. • a unit of information equal to one billion (109) or, strictly, 230 bits. • ...
Crossando 2018-11-22
Across
- It is a software development methodology that combines software development with information technology operations. It’s goal is to shorten the systems development life cycle while also delivering features, fixes, and updates frequently in close alignment with business objectives
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- This is a gaming company which has been in news a lot recently. It has recently developed a policy to curb gaming addiction among the minors
- In October 2018, this company got $3 billion funding from Softbank and became the world’s most valuable Startup surpassing Uber. What is the name of the company?
- Which version of Apple's desktop OS changed the name from OS X to macOS?
- A means of providing a common topic identifier in text and chat messages so they can be searched as a group
- Technology for wireless communication between devices using light to transmit data in a high speed
- Capability based operating system currently being developed by Google that can eventually replace Android
- Top smartphone brand by volume in India according to IDC
- It is an American multinational computer software company founded in 1982. The company is headquartered in San Jose, California, United States
Down
- This Encyclopaedia was founded on 9th march, 2000 under the aegis of Bomis, a web portal company. This online encyclopaedia is the largest and most popular general reference work on World Wide Web. Name the predecessor of this company from which this encyclopaedia was developed. Answer?
- This company which is based in Provo, Utah created the most used networking software in the 1980's which is still one of the most used PC networking systems in the world
- Microsoft acquired this business at $26.2 billion in 2016
- This company is a very popular social networking site known as “SMS of the internet”?
- It is a type of blockchain often said to be semi-decentralized. It, too, is permissioned but instead of a single organization controlling it, a number of companies might each operate a node on such a network
- This was the first graphical browser for the World Wide Web
- First trillion dollar company by market capitalization
- A bitmap format that was developed by a team at the bulletin board service (BBS) provider CompuServe led by American computer scientist Steve Wilhite on June 15, 1987. It has since come into widespread usage on the World Wide Web due to its wide support and portability
- This Startup has the privilege of being the first unicorn Startup of India. This company also was the first company to receive the funding from Japanese investment giant Softbank of amount $ 200 million. Name the company?
- This American global company is one of world’s most innovative company having some of breakthrough innovation of the personal computing like GUI (Graphical User Interface), computer mouse etc. Name the company?
20 Clues: First trillion dollar company by market capitalization • Top smartphone brand by volume in India according to IDC • Microsoft acquired this business at $26.2 billion in 2016 • This was the first graphical browser for the World Wide Web • Which version of Apple's desktop OS changed the name from OS X to macOS? • ...
Paramount Puzzle 2014-08-26
Across
- Wrap Cover or enclose someone or something in paper or soft material
- The tapered, sharp end of a tool, weapon, or other object
- Printer A printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attract toner or dry ink powder
- A long thin piece of metal on a scale or dial that moves to indicate a figure or position
- Especially in computing
- A device for examining, reading, or monitoring something, in particular.
- Script A written or printed above the line
- Perform a series of mechanical or chemical operations on something in order to
- All the visible features of an area of countryside or land, often considered in terms of their aesthetic appeal
- A particular design of type
- Size The size of a typeface, measured from line to line, when no additional interline space is added. Digital typefaces may not have an inherent size, as did metal typefaces
- The official procedure or system of rules governing affairs of state or diplomatic occasions
- A folder or box for holding loose papers that are typically arranged in a particular order for easy reference
- A key or command that toggles between two modes, such as the caps lock key
Down
- A length of water wider than a strait, joining two larger areas of water, especially two seas
- Facts and statistics collected together for reference or analysis
- Tools, machinery, and other durable equipment change or preserve it
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- A receptacle in a church for the water used in baptism, typically a freestanding stone structure
- A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- A panel of keys that operate a computer or typewriter
- A position of a person's body when standing or sitting
- The action or method of storing something for future use
- Printer ;A printer in which the characters are formed by minute jets of ink
- ;Computer ; Laptop. A laptop is a portable personal computer with a clamshell form factor, suitable for mobile use. They are also sometimes called notebook computers or notebooks or lappy
- A line or set of lines enclosing or indicating the shape of an object in a sketch or diagram
- Style The overall style of letter will depend on the relationship between the parties concerned.Copy Nation ;A special notation at the end of a letter that indicates copies of the letter were sent to the person(s) listed, usually noted by typing
- The amount of something produced by a person, machine, or industry
- What is put in, taken in, or operated on by any process or system
29 Clues: Especially in computing • A particular design of type • Script A written or printed above the line • A panel of keys that operate a computer or typewriter • A position of a person's body when standing or sitting • The action or method of storing something for future use • The tapered, sharp end of a tool, weapon, or other object • ...
BYETI 2015-01-20
Across
- Rule for communication
- Continuous checking of devices to see if they want to communicate
- Reduction in signal strength
- Type of topology that depicts how data flows through the network
- Process of coding a message for security purposes
- Single certificate used to provide encryption to multiple sub domains
- Telephone system
- Scenario where computing resources (storage, networking, etc..) are offered and fastly delivered to customers on demand
- Protocol used to control which ports of a switch can learn MAC addresses
- Data compression technique
- WiFi is a technology that falls under this category of connection type
- Signal represented as a series of sine waves
- Provides highest level of security and speed
- Creates network standards
- Network that introduces an abstraction between the forwarding and control planes
- Access method in which th device senses whether the line is idle and therefore available to carry a transmission
- Platform on which virtual machines can run
- Physical layout of the network
- Developed by IBM in an effort to improve the True Ring
- Graph algorithm used in routing
- Generates the message or signal
- Multichassis etherchannel solution
- Services make use of it to improve data locality to end users
- Microsoft implementation of NetBIOS name service
- The medium for wireless communications
Down
- In voice, time difference between actual and expected packet arrival
- Disturbance caused by electric or magnetic fields of one telecommunication signal crossing over onto another
- Obsolete routing protocol
- Network which uses 3rd party vendors to provide medium
- Implementation used to reduced the size of an iBGP inside an AS
- Worldwide system of computer networks
- Load balancing algorithm. It's dynamic version can contemplate how many requests each server/machine can handle
- Private network that uses Internet technology to share information with vendors and customers
- Effort to interrupt services of a host connected to a network
- Process of determining if someone or something is who he/it claims to be
- The fastest transmission medium cannot avoid it
- used to share company information and resources among employees
- Regenerates the signal on the next leg of the network medium
- Each node is connected to a main cable or link
- Network security attack in which an impersonation of a device or user takes place
- Accepts data from and sends data to one or more directions on the network
- Located within 3 geographical miles
- Two devices attempting to transmit at exactly the same time
- Common medium for Ethernet
- To send a signal in all directions at the same time.
- Method used to quantify VoIP quality
- Type of network that encapsulate L2 over L3
- This protocol's extension allows for traffic engineering
- Eighth layer of the OSI model
- Protocol extension to secure the DNS look up process
50 Clues: Telephone system • Rule for communication • Obsolete routing protocol • Creates network standards • Data compression technique • Common medium for Ethernet • Reduction in signal strength • Eighth layer of the OSI model • Physical layout of the network • Graph algorithm used in routing • Generates the message or signal • Multichassis etherchannel solution • ...
Computer Whizz 2023-10-27
Across
- tracing: A light-rendering technique that simulates the interaction of light with objects in a game in such a way that it looks ultra-realistic.
- A game version that contains all major features and assets. This version of a game contains no major bugs and is on its way to code release. Beta releases are occasionally given a limited release to the public for bug reporting and critical feedback.
- Translating a game into multiple languages.
- Artificial intelligence; an in-game entity whose functionality is dependent on computer code rather than human input. NPCs are common AI entities.
- art: A design style that is typically limited to 8 and 16-bit graphics in order to closely match classic arcade and console graphics
- A computer-programmed series of lines that form a three-dimensional (3D) object.
- A method of preprocessing performed on game assets and data to ensure they load and perform well in real-time and do not slow down gameplay due to requiring a lot of processor or GPU capacity.
- Compatible with more than one kind of hardware or operating system.
- An in-game character or object that uses AI to interact with other objects in its environment.
- A pre-rendered lighting system that is stored for continual use in a game.
- A fully 3D asset in a video game that is created by adding textures and other features to a mesh.
- The act of continuously generating and refreshing a 2D or 3D image through computer processing
- A game version that contains all major features and most assets. This version of a game is usually circulated internally to test for quality and bugs.
Down
- Utilizing real-life laws of physics in games to make movement and environmental behaviors more realistic.
- Shorthand for anything that goes into a video game – characters, objects, sound effects, maps, environments, etc.
- A handheld device with the computing power of a personal computer and features for real-time voice and data communications.
- Interactive objects in a game.
- Creating a stable and predictable gaming experience. For example, by making sure weapons deal appropriate damage and armor absorbs the damage adequately, as opposed to giving one weapon considerably more power than others, or by making levels too difficult to enjoyably complete. However, imbalanced gameplay is sometimes done on purpose.
- A collection of vertices, edges, and faces that act as the foundation of a model in a video game.
- designer: One who designs the aesthetic and structure of a game. NOTE: The terms “game designer” and “game developer” are often used interchangeably, though the two roles technically vary.
- Small programs within larger game development processes typically used to control lighting and shadow effects.
- gaming: Because you can play a mobile game almost anywhere, mobile gaming is one of the most popular forms of gaming in the world.
- Another word for coding or programming; the act of writing code.
- engine: Software that offers a suite of tools and features to game developers in order to build their games professionally and efficiently.
24 Clues: Interactive objects in a game. • Translating a game into multiple languages. • Another word for coding or programming; the act of writing code. • Compatible with more than one kind of hardware or operating system. • A pre-rendered lighting system that is stored for continual use in a game. • ...
stupid121212 2020-10-23
Across
- printer a printer in which the characters are formed by minute jets of ink.
- a panel of keys that operate a computer or typewriter.
- a small handheld device that is dragged across a flat surface to move the cursor on a computer
- a video camera that inputs to a computer connected to the Internet, so that its images can be viewed by Internet users.
- Drivers In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a compute
- television receiver used in a studio to select or verify the picture being broadcast from a particular camera.
- Peripherals A computer peripheral is any external device that provides input and output for the computer
- showing the time by means of displayed digits rather than hands or a pointer.
- A touchpad or trackpad is a pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on the operating system that is made output to the screen.
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
- Disc (CD) a small plastic disc on which music or other digital information is stored, and from which the information can be read using reflected laser light.
- transistor is a binary switch and the fundamental building block of computer circuitry.
Down
- Serial Bus (USB) is the most common type of computer port used in today's computers.
- A computer peripheral is any external device that provides input and output for the computer
- Speakers are one of the most common output devices used with computer systems.
- circuit n integrated circuit or monolithic integrated circuit (also referred to as an IC, a chip, or a microchip) is a set of electronic circuits on one small flat piece (or "chip") of semiconductor material that is normally silicon.
- a machine for printing text or pictures onto paper, especially one linked to a computer.
- standard for connecting high-definition video devices.
- peripherals is an input device is a peripheral (piece of computer hardware equipment) used to provide data and control signals to an information processing system such as a computer or other information appliance
- Science Vocabulary Terms
- tubes An electronic device that controls the flow of electrons in a vacuum.
- Printer machine allowing the creation of a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession
- 1.3 and 1.4
- printer printer linked to a computer producing good-quality printed material by using a laser to form a pattern
24 Clues: 1.3 and 1.4 • Science Vocabulary Terms • a panel of keys that operate a computer or typewriter. • standard for connecting high-definition video devices. • printer a printer in which the characters are formed by minute jets of ink. • tubes An electronic device that controls the flow of electrons in a vacuum. • ...
Accounting Terminologies 2020 2020-09-19
Across
- manages a decedent's estate
- taking over-controlling interest
- financial instruments
- granted exclusive right
- management of money
- entities business combination
- decline in the prices of goods
- reduction of an asset
- termination of a corporation
- financial plan for future cost
- payment by a business entity
- clear the balance of temporary accounts
- basic financial statement
- business organization
- party that loans monet or assets
- representation by a management
- percentage of selling price
- increase in asset value
- unlikely event
- payment in cash or asset
- collection of formal, written rules
- individual who has died
- ammounts owned
- exchange of a convertible security
- a business partnership
- controlling percentage of stock
- party owing money
- general debt obligation
- not paid as dividends
- asset provided to a creditor
- computing a deduction to account
- recognition of an expense
- spent on a specific item
- owns a bond certificate
- financial shortage
- selling a receivable
- attachment to real property
- make payment for something
- transfer ownership of a check
- recording of financial transactions
- reduction of price
- recording financial transactions
- series of payments
- brokerage house, bank department
- wear and teat on an asset
- prospective financial statements
- seisure of collateral
- payment by cash or check
- failure to meet financial obligation
- annulment of a contract or deed
Down
- a professional examination
- divulging accounting information
- addition of an asset
- use of computer analysis
- income excluded from gross income
- interest rate of a debt security
- debts are liquidated
- asset account on balance sheet
- describe any cash or other property
- complete removal of an amount due
- asset put into custody
- set aside for a specific reason
- unintentional mistakes
- calculate premiums, reserves
- not subject to tax
- financial statement data
- long term promissory note
- transfer of assets
- time granted by a taxing authority
- postponement of the date
- agreement for lawful consideration
- conversion of income to account
- legal claim of a firm
- accounting postulate
- mortgage on entity's assets
- skilled in recording transactions
- auditors receipt
- autorize the payment of dividend
- who audits financial accounts
- discussing inventories
- periodic reduction of an amount
- principal in security transactions
- formal record of money
- transfer of wealth
- willful misrepresentation
- legal arrangement of trade name
- long-term capital appreciation
- refinancing a debt
- bulk goods
- residual interest in assets
- form of doing business
- distribution of earnings
- administration of property
- legal process by federal statute
- signed written order
- provision of tax law
- organizes a business
- mis-use of embezzle funds
- redeemable by the issuer
99 Clues: bulk goods • unlikely event • ammounts owned • auditors receipt • party owing money • not subject to tax • transfer of assets • transfer of wealth • financial shortage • refinancing a debt • reduction of price • series of payments • management of money • addition of an asset • debts are liquidated • accounting postulate • selling a receivable • signed written order • provision of tax law • ...
Unit 1.1 key terms: POE 2020-09-28
Across
- Mechanical Advantage Ratio of distance traveled by the applied effort and resistance force within a system.
- Distance between adjacent threads in a screw.
- A profession for which one trains and which is undertaken as a long-term vocation.
- A series of usually metal links or rings connected to or fitted into one another and used to transmit motion and power within a sprocket system.
- The turning effect of a force about a point equal to the magnitude of the force times the perpendicular distance from the point to the line of action from the force.
- A force that produces or tends to produce rotation or torsion.
- Plane A flat surface set at an angle (or incline) with no moving parts that is able to lift objects by pushing or pulling the load.
- Equilibrium A condition where there are no net external forces acting upon a particle or rigid body and the body remains at rest or continues at a constant velocity.
- A rigid bar used to exert a pressure or sustain a weight at one point of its length by the application of a force at a
- Force Impeding effect exerted by one material object on another.
- Gear A gear positioned between the driver and the driven gear used to change rotational direction.
- The fixed point around which a lever rotates.
- A type of lever that is a wheel with a groove in its rim, which is used to change the direction or multiply a force exerted by a rope or cable.
- An inclined plane wrapped around a cylinder, forming the path and pitch.
- A continuous band of tough flexible material used to transmit motion and power within a pulley system.
- point and turning at a third on a fulcrum.
- something.
Down
- Mechanical Advantage The ratio of the magnitude of the resistance and effort forces applied to a system.
- and Axle Two differently sized circular objects that are attached together and turn as one.
- The resistance that one surface or object encounters when moving over another.
- The recognized accreditor for college and university programs in applied science, computing, engineering, and technology.
- The structure of or the relationship of the parts in a machine or in a construction or process comparable to a machine.
- A substance that tapers to a thin edge and is used for splitting, raising heavy bodies, or tightening by being driven
- A circular toothed object used to transfer rotary motion and torque through interlocking teeth.
- Machine Any of various elementary mechanisms including the lever, wheel and axle, pulley, inclined plane, wedge, and screw.
- Force An external force applied to an object.
- The ratio of useful energy output to the total energy input, or the percentage of work input that is converted to work output.
- A toothed wheel whose teeth engage the links of a chain.
28 Clues: something. • point and turning at a third on a fulcrum. • Distance between adjacent threads in a screw. • Force An external force applied to an object. • The fixed point around which a lever rotates. • A toothed wheel whose teeth engage the links of a chain. • A force that produces or tends to produce rotation or torsion. • ...
HELICAN'S CROSSWORD 2024-11-20
Across
- this mathematics is foundations of modern geometry, algebra, and number theory, with key contributions from mathematicians like Euclid, Pythagoras, and Archimedes.
- a base-10 numeral system that uses ten digits
- used to represent numbers, operations, relationships, and concepts in mathematical expressions and equations.
- This is the operation which Al-Khwarizmi originally described as al-jabr.
- Egyptian mathematics is an ancient mathematical system primarily focused on practical applications, such as measurement, geometry, and arithmetic, using a base-10 system and relying on simple, effective methods for solving everyday problems.
- one of the oldest mathematical traditions, known for its practical applications and innovations in fields like arithmetic, geometry, and algebra
- algebraic expression consisting of variables, coefficients, and exponents combined using addition, subtraction, and multiplication.
- number that represents the absence of quantity or value, serving as a foundational concept in mathematics and computing
- traces the evolution of numerical and logical concepts, from ancient counting systems and geometry to modern algebra, calculus, and abstract theories, driving scientific and technological progress.
- father of algebra
- two quantities that can be expressed as a ratio of integers, meaning they have a common measure.
- was a center of ancient learning, where significant mathematical work, including the contributions of Euclid and other scholars, took place during the Hellenistic period.
- rich mathematical tradition that flourished during the Islamic Golden Age, making significant contributions to algebra, geometry, trigonometry, and number theory, preserving and expanding upon Greek and Indian mathematical knowledge.
Down
- writing system where symbols or letters represent the first sound of the word they stand for, often used in early alphabetic systems.
- used extensively for practical problem-solving and were typically written in a form resembling modern fractions
- an ancient Greek mathematician and astronomer best known for calculating the Earth's circumference and creating one of the earliest known maps of the world
- refers to the gradual development and transformation of societies, cultures, technologies, and ideas over time.
- wooden or bamboo sticks used for counting and performing arithmetic operations, often in place of modern numeral systems.
- branch of mathematics that studies change and motion, focusing on concepts such as derivatives, integrals, limits, and infinite series, and is foundational for understanding dynamic systems.
- branch of mathematics that deals with the basic operations of numbers
- this bone were used by ancient Chinese divination tools, typically made from turtle shells or animal bones, inscribed with characters
- this is a formula or method for calculating the area of a triangle when the lengths of all three sides are known
- traditional counting tool used for arithmetic calculations, consisting of beads that move along rods.
- ancient mathematical tradition from India, contributing key concepts such as the decimal system, zero, and early algebraic ideas, influencing global mathematical thought.
- an ancient Indian script used from around the 3rd century BCE, considered the precursor to many modern South and Southeast Asian writing systems.
25 Clues: father of algebra • a base-10 numeral system that uses ten digits • branch of mathematics that deals with the basic operations of numbers • This is the operation which Al-Khwarizmi originally described as al-jabr. • two quantities that can be expressed as a ratio of integers, meaning they have a common measure. • ...
LEARNING UNIT 2 - Protecting information Resources Puzzle 2023-03-05
Across
- involves deliberate attacks intended to disable computers or networks for the purpose of disrupting commerce, education and recreation for personal gain, committing espionage, or facilitating criminal conspiracies, such as drug and human trafficking.
- The illegal placement of unauthorized charges on your telephone bill for unrequested services or calls not made.
- is a type of malicious software -- or malware -- that is installed on a computing device.
- Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts.
- Someone who uses the Internet to illegally break into computers.
- is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.
- is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.
- in context of network security, corresponds to theft or interception of data by capturing the network traffic using a packet sniffer.
- is any software application in which an advertising banner or other advertising material displays or downloads while a program is running.
- Short for "voice phishing," it's the use of recorded messages to telephones — usually claiming to be from a bank — with the goal of tricking you into revealing personal or account information for identity theft.
Down
- The capturing of information from the magnetic stripe on your ATM and credit card by use of portable "skimmer" devices that are secretly installed on card-reading machines.
- is an act performed by a knowledgeable computer user, sometimes called a "hacker," that illegally browses or steals a company's or individual's private information. Sometimes, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
- is any kind of fraud that is committed by means of a computer system. It typically involves making illicit financial transfers through computer commands.
- runs when the user launches an infected program or boots from an infected disk or USB drive. Keep a low profile because they need to spread widely without being detected
- The use of authentic-looking emails, often purporting to be from a bank or government agency, to trick you into responding with sensitive personal data.
- A network of computers — maybe one of the machines is yours — that scammers have infected with hidden software to secretly send spam.
- Named for the SMS (short message service) technology used to send text messages, it means phishing attempts made on cellphones.
17 Clues: Someone who uses the Internet to illegally break into computers. • is a type of malicious software -- or malware -- that is installed on a computing device. • The illegal placement of unauthorized charges on your telephone bill for unrequested services or calls not made. • ...
Accounting 2020-09-19
Across
- unlikely event
- increase in asset value
- formal record of money
- postponement of the date
- make payment for something
- organizes a business
- periodic reduction of an amount
- financial statement data
- divulging accounting information
- long term promissory note
- signed written order
- clear the balance of temporary accounts
- long-term capital appreciation
- payment by a business entity
- skilled in recording transactions
- mortgage on entity's assets
- recognition of an expense
- complete removal of an amount due
- not paid as dividends
- mis-use of embezzle funds
- amounts owned
- controlling percentage of stock
- financial shortage
- business organization
- asset put into custody
- party that loans money or assets
- income excluded from gross income
- distribution of earnings
- reduction of an asset
- bulk goods
- entities business combination
- computing a deduction to account
- spent on a specific item
- financial plan for future cost
- attachment to real property
- redeemable by the issuer
- auditors’ receipt
- termination of a corporation
- authorize the payment of dividend
- legal claim of a firm
- discussing inventories
- administration of property
- individual who has died
- transfer ownership of a check
- recording of financial transactions
- time granted by a taxing authority
- refinancing a debt
- representation by a management
- taking over-controlling interest
- who audits financial accounts
- party owing money
Down
- form of doing business
- accounting postulate
- granted exclusive right
- selling a receivable
- recording financial transactions
- calculate premiums, reserves
- set aside for a specific reason
- conversion of income to account
- residual interest in assets
- interest rate of a debt security
- unintentional mistakes
- basic financial statement
- decline in the prices of goods
- reduction of price
- transfer of assets
- principal in security transactions
- prospective financial statements
- payment by cash or check
- willful misrepresentation
- asset provided to a creditor
- brokerage house, bank department
- management of money
- a business partnership
- failure to meet financial obligation
- legal process by federal statute
- legal arrangement of trade name
- asset account on balance sheet
- transfer of wealth
- excess of revenue
- series of payments
- percentage of selling price
- owns a bond certificate
- a professional examination
- exchange of a convertible security
- provision of tax law
- agreement for lawful consideration
- manages a decedent's estate
- financial instruments
- collection of formal, written rules
- addition of an asset
- describe any cash or other property
- wear and tear on an asset
- not subject to tax
- annulment of a contract or deed
- payment in cash or asset
- seizure of collateral
- use of computer analysis
- debts are liquidated
- general debt obligation
100 Clues: bulk goods • amounts owned • unlikely event • excess of revenue • auditors’ receipt • party owing money • reduction of price • transfer of assets • transfer of wealth • series of payments • financial shortage • not subject to tax • refinancing a debt • management of money • accounting postulate • selling a receivable • organizes a business • signed written order • provision of tax law • ...
Mr Watson's Technology Crossword 2021-10-19
Across
- - the study of people's efficiency in their working environment
- - a type of digital code that uses structural conventions
- Brief - a project management document outlining the specifics of a design project
- Saw - a very narrow blade stretched across a D-shaped frame
- - involves sound wave frequencies
- - An electromotive force or potential difference expressed in volts
- - An instrument for measuring an electromotive force
- - Application to fill out
- - a material that hardens permanently after applying heat and pressure
- - relating to or using signals or information
- software - A computer software used in the majority of 3D printing processes
- - A detailed and accurate representation
- - An early sample, model, or release of a product built to test a concept or process
- - Electronic technology that generates, stores, and processes data
- - Light Emitting Diode
- - a set of methods and techniques/tools used to find its potential value
- - A sketch or drawing for an idea
- - A container in a computer system for storing information
- - a transparent plastic material
- - Personal Protective Equipment
- Process - A process for making something
- - A tool that is used to drill holes
- - A substance which has a molecular structure built up chiefly
- - making sure you are not in harm or danger
- - A circuit designed to govern a specific operation in an embedded system
Down
- - A term, symbol or name used to define or specify a computing function
- - a roughly circular line, route, or movement that starts and finishes at the same place
- - a material that is used to shape or finish a workpiece
- technology - devices that control, regulate, monitor, collect data, communicate, and diagnose
- - computer-aided design
- - make something on a large scale using machinery
- (Research) - A research method where you gather data yourself
- - a plastic polymer material that becomes pliable or mouldable at a certain elevated temperature
- - a hand tool used in metal work to mark lines
- - A set of standards for something
- - A picture that represents an object or concept
- - type of plastic that is made from ethylene
- - something you wear to protect your eyes
- - A list of instructions to tell people how to build/complete something
- - A clothing to protect stains on your normal clothes
- Square - An implement used to check and mark right angles in constructional work
- - how things work
- - Standard Triangle Language
- (Research) - research method that uses data from others
- - a synthetic material from the polyester family that is used for clothing
- Heater - An electrical heater which is mounted on a surface and used to heat the surface or air
- - A material that helps keep temperature
- - an open-source electronics platform or board
- - a set of principles concerned with the nature and appreciation of beauty
- - A device that responds to heat, light, sound or pressure
- - what people do to create less waste
51 Clues: - how things work • - Light Emitting Diode • - computer-aided design • - Application to fill out • - Standard Triangle Language • - Personal Protective Equipment • - a transparent plastic material • - involves sound wave frequencies • - A sketch or drawing for an idea • - A set of standards for something • - A tool that is used to drill holes • ...
CompTIA A+ Vocabulary (One) 2021-07-30
Across
- A small hardware component that, when attached to a computing device, enables addition functionality such as wireless connectivity.
- The number of pixels that make up the dimension of a display, represented in a ratio as the number of horizontal pixels by vertical pixels.
- An application that scans files for executable code that matches patterns known to be common to viruses, and monitors systems for activity associated with virus.
- A networking device used to connect the drops in a physical star topology network into a logical bus topology. AKA multiport repeater.
- Wires etched onto the motherboard to provide electrical pathways.
- Finger movements on a trackpad or mouse that enable a user to scroll, zoom, and navigate desktop, document, and application content.
- The unencrypted form of data, AKA plaintext.
- The process which shows that the Microsoft copy is legal.
- A group of computers that are connected together to communicate and share resources.
- A computer that provides services and resources on the network.
- A Microsoft network model than an admin implements by grouping computers together for the purpose of sharing a centralized user account database, enabling users to log on to any computer in the network.
Down
- Mobile technology that can determine the orientation of a device with a sensor that measures the acceleration of the device direction.
- An open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds.
- A means of securing the electronic components to a circuit board using a combination of lead, tin, and silver, and a heated iron.
- The smallest discrete element on a display, composed of a red, a blue, and a green dot.
- A security feature that provides full disk encryption protection for your operating system, as well as the data stored on the operating system volume.
- A transmission scheme where a single signal sends data using the entire bandwidth of the transmission media.
- The unit of measurement for visible light that is being emitted from a light source.
- A family of networking technologies that provide connectivity by using network adapters, contention-based media access, and twisted pair, coax, or fiber media.
- A hardware connection interface on a PC that enables devices to be connected to the computer, or the endpoint of a logical connection that client computers use to connect to specific server programs.
- A cloud storage solution that is accessed by using the user’s Apple ID.
- The file and folder management app that is included with OS X.
- Malicious code that masquerades as a harmless file. When a user executes it, thinking it is a harmless application, it destroys and corrupts data on the user’s HDD.
- In a computer system, a group of wires that connect components. They provide a pathway for data transfer.
24 Clues: The unencrypted form of data, AKA plaintext. • The process which shows that the Microsoft copy is legal. • The file and folder management app that is included with OS X. • A computer that provides services and resources on the network. • Wires etched onto the motherboard to provide electrical pathways. • ...
Kareemc 2017-03-03
Across
- the address of a World Wide Web page.
- a unit of information equal to one billion (109) or, strictly, 230 bits.
- a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
- a wall or partition designed to inhibit or prevent the spread of fire.
- the introductory page of a website, typically serving as a table of contents for the site.
- Printing- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- a device for examining, reading, or monitoring something, in particular.
- a man who behaves dishonorably, especially toward a woman.
- using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- a person who looks casually through books or magazines or at things for sale.
- coffee
Down
- a common unit of measure for interest rates and other percentages in finance. One basis point is equal to 1/100th of 1%, or 0.01% (0.0001), and is used to denote the percentage change in a financial instrument.
- a small room in which a prisoner is locked up or in which a monk or nun sleeps.
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
- In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
- a person who uses computers to gain unauthorized access to data.
- a format for compressing image files.
- a unit of memory or data equal to 1,024 (210) bytes.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- a system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
- the way in which something is arranged or set out.
- The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
- is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings. Most LANs connect workstations and personal computers and enable users to access data and devices (e.g., printers and modems) anywhere on the network.
- an arrangement of intersecting horizontal and vertical lines.
25 Clues: coffee • the address of a World Wide Web page. • a format for compressing image files. • the way in which something is arranged or set out. • a unit of memory or data equal to 1,024 (210) bytes. • a man who behaves dishonorably, especially toward a woman. • an arrangement of intersecting horizontal and vertical lines. • ...
Vocabulary 2 2017-03-02
Across
- Printing~ The action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- ~ An arrangement of intersecting horizontal and vertical lines
- ~ The address of a World Wide Web page.
- ~In computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.
- A person who uses computers to gain unauthorized access to data.
- ~ Using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- A power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
- ( In relation to Exel spreadsheet ) ~ A small room in which a prisoner is locked up or in which a monk or nun sleeps.
- ~ The process of converting information or data into a code, especially to prevent unauthorized access.
- ~ A person who looks casually through books or magazines or at things for sale.
- A general-purpose computer programming language designed to produce programs that will run on any computer system.
- ~Short for "Bitmap." It can be pronounced as "bump," "B-M-P," or simply a "bitmap image." The BMP format is a commonly used raster graphic format for saving image files.
- Software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
Down
- ~Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember.
- A unit of memory or data equal to 1,024 (210) bytes.
- The introductory page of a website, typically serving as a table of contents for the site
- A unit of information equal to one billion (109) or, strictly, 230 bits.
- ~The way in which something is arranged or set out.
- ~ A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- instructions.
- cursor is a temporary work area created in the system memory when a SQLstatement is executed. A cursor contains information on a select statement and the rows of data accessed by it.
- ~ A device that scans documents and converts them into digital data.
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- A format for compressing image files.
- ~A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
25 Clues: instructions. • A format for compressing image files. • ~ The address of a World Wide Web page. • ~The way in which something is arranged or set out. • A unit of memory or data equal to 1,024 (210) bytes. • ~ An arrangement of intersecting horizontal and vertical lines • A person who uses computers to gain unauthorized access to data. • ...
About PCs 2016-03-21
Across
- a stage in progress, development etc
- to copy or move programs or information into a computer's memory, especially from the internet or a larger computer
- in computing, a collection of data stored eg on a disc.
- someone who provides something
- to disconnect from the electricity supply
- a quicker way between two places
- a small narrow opening
- to move to another place
- a large amount of information which is stored in a computer
- to see if something (eg a machine) is in good condition or working properly
- a kind of tool for turning screws
- a quality or characteristic
- a maker’s name or trademark
- having great strength, influence etc
- an instrument for doing work, especially by hand
- any of the figures 0 to 9
- to be in control or charge of
- to become hotter than necessary or wanted
- (often with to, together, up) to find the total of (various numbers)
- something made for a purpose, eg a tool or instrument
- to mend or repair
- to keep data in the computer
- not to give or throw away; to preserve
- computer software that is designed to damage the way a computer works
- to act so that, or check that, something is certain or sure
- often with for) to look for something by careful examination
Down
- quickness of moving
- a speaker in a radio, record-player etc.
- ability to hold, contain etc
- a kind of tool used for gripping, bending or cutting wire etc
- to show
- the act of asking for something
- a system of computers that can exchange messages and information
- (of an action, tool etc) producing (quick and) satisfactory results
- a secret word by which those who know it can recognize each other and be allowed to go past, enter etc
- a device that holds a wire in position in a piece of electrical equipment
- a small graphic sign on a computer screen representing an application that the user can choose.
- helpful or serving a purpose well
- to (cause to) grow in size, number etc
- a computer code that is inserted into a program to destroy information or cause errors
- to improve the quality or usefulness of something, such as a machine or a computer program
- a small, round mark
- to take away
- to write (one’s name etc) in a book etc
- to change the form or quality of
- a computer program for searching, especially on a worldwide network.
- to attempt or make an effort (to do, get etc)
- to push something firmly
- to take place or occur; to occur by chance
- to choose or pick from among a numberfile
- a mechanical instrument causing a current of air
51 Clues: to show • to take away • to mend or repair • quickness of moving • a small, round mark • a small narrow opening • to move to another place • any of the figures 0 to 9 • to push something firmly • a quality or characteristic • a maker’s name or trademark • ability to hold, contain etc • to keep data in the computer • to be in control or charge of • the act of asking for something • ...
Women's History Crossword 2023-03-16
Across
- the first Black woman to become chair of a college science department (chemistry) and possibly the first to be named a full professor at any institution of higher learning in the country.
- Dubbed the "Moses of her people" and such was her success that slave owners offered a reward of $40,000 for her capture or death
- considered to be the founder of scientific computing and the first computer programmer
- Arrested in 1872 for voting, was tried and fined $100 for her crime.
- Discovered the composition of the Earth's core
- became the first professionally employed female electrical engineer in the United States in 1922
- American sprinter who overcame childhood polio and went on to become a world-record-holding Olympic champion
- In 1848 organized the first woman's rights convention at Seneca Falls, N.Y.
- her groundbreaking book, Silent Spring, has been credited as the motivation for the modern environmental movement.
- Her success is credited with creating career opportunities for future female network anchors
- She began the development of computer languages written in English, rather than mathematical notation (such as COBOL)
- the first woman to fly solo across the Atlantic Ocean, and the first person ever to fly solo from Hawaii to the U.S. mainland
- Astronomer who discovered the composition of stars
- the first African American woman in Congress and the first woman and African American to seek the nomination for president of the United States from one of the two major political parties
Down
- first African American woman to earn a PhD in chemistry and made important strides in research around the connection between heart health and cholesterol
- the first Black woman to conduct a cable car in San Francisco
- She registered “officially” in 1967 for the Boston Marathon as ““K.V. Switzer” because women were not allowed to run marathons at the time.
- an English astronomer, navigation expert, mathematician, and meteorologist who published various works on astronomy and navigation
- Discovered the structure of insulin
- founded the American Red Cross, and helped with ratifying the Geneva Conventions (laws that protect the war-wounded and civilians in conflict zones)
- a pioneer in the field of paleontology, but wasn’t taken seriously as a scientist in her lifetime because of her gender and poor background
- overcame racial bias to become the first African-American tennis player to win a Grand Slam tournament
- Her calculations of orbital mechanics were critical to the success of the first and subsequent U.S. crewed spaceflights
- the first Black woman to serve as an American ambassador
- the first American woman to fly in space.
- the first person who was deaf and blind to earn a college degree.
- first woman to win a Nobel Prize, the first person to win a Nobel Prize twice, and the only person to win a Nobel Prize in two scientific fields
27 Clues: Discovered the structure of insulin • the first American woman to fly in space. • Discovered the composition of the Earth's core • Astronomer who discovered the composition of stars • the first Black woman to serve as an American ambassador • the first Black woman to conduct a cable car in San Francisco • ...
LITERASI DIGITAL 2024-08-20
Across
- apa singkatan dari AI
- salah satu aplikasi untuk mencari informasi digital
- file kecil yang disimpan di perangkat pengguna oleh situs web untuk menyimpan informasi seperti riwayat penelusuran
- literasi digital mempunyai berapa pilar
- teknik pemblokiran otomatis konten yang dianggap tidak pantas atau berbahaya
- konten yang memberikan informasi dan pengetahuan tertentu
- apa singkatan dari IoT
- bagian dari internet yang tidak dapat diakses oleh mesin pencari biasa dan biasanya memerlukan kredensial khusus untuk diakses
- penerapan elemen-elemen permainan dalam konteks non-game untuk meningkatkan motivasi dan keterlibatan pengguna
- ruang digital yang menyediakan fasilitas untuk menghubungkan pengguna dengan informasi
- literasi digital digunakan untuk mencari
- aktivitas jual beli barang atau jasa melalui internet
- serangkaian instruksi atau aturan yang digunakan untuk menyelesaikan tugas atau
- ketidaksetaraan dalam akses dan keterampilan menggunakan teknologi digital antara berbagai kelompok masyarakat
- perangkat lunak yang kode sumbernya tersedia secara bebas untuk diubah dan didistribusikan kembali
- engine sebuah program di website internet untuk membantu penggunanya
- web browser di ciptakan pada tahun
- dimana kita menulis artikel
- yang merupakan informasi, kabar, berita yang palsu atau bohong
- perangkat lunak berbahaya yang dirancang untuk merusak atau mengambil perangkat lain
- bagian dari internet yang memungkinkan orang menyembunyikan identitas dan lokasi mereka dari orang lain serta dari penegak hukum
- aturan atau etika yang berlaku dalam interaksi online untuk menjaga kesopanan dan profesionalisme
- proses mengidentifikasi pola dan pengetahuan berharga dari kumpulan data besar
- ada berapa unsur literasi digital
- mencakup berbagai aspek, mulai dari cara berkomunikasi, bekerja, hingga bersosialisasi secara online
- periode waktu di mana seseorang menghindari penggunaan teknologi digital untuk meredakan stres
- jejak digital yang ditinggalkan oleh aktivitas online seseorang, termasuk riwayat penelusuran
Down
- perangkat serbaguna yang berfungsi sebagai komputer mini dalam genggaman kita
- berapa komponen literasi digital
- sumber informasi di Internet yang belum terjangkau oleh mesin pencari
- browser web tertua
- sistem yang sering digunakan dalam teknologi cryptocurrency
- negara yang memiliki tingkat literasi digital tertinggi
- pencetus literasi digital
- penggunaan kembali karya-karya yang dilindungi hak cipta
- proses pengumpulan dan menganalisis data pengguna disebut
- aplikasi video conference
- layanan atau platform sederhana yang bisa Anda gunakan untuk membuat blog secara online
- penggunaan internet atau alat elektronik untuk melacak keberadaan dan melecehkan seseorang
- sebutan lain untuk pemasaran online
- jaringan atau perangkat elektronik secara ilegal atau tidak sah
- penggunaan teknologi digital untuk mengganggu, mengancam, atau melecehkan orang lain
- kapan literasi digital dimulai
- algoritma enkripsi terbagi atas….. kategori
- ada berapa jenis pemasaran online
- proses teknis yang mengonversikan informasi menjadi kode rahasia, sehingga mengaburkan data yang anda simpan
- computing penyediaan sumber daya komputasi melalui internet
- layanan dari Google untuk membantu pengguna mereka memiliki blog secara gratis
- adaberapa algoritma enkripsi
- istilah yang mengacu pada kumpulan data yang sangat besar dan kompleks yang sulit diolah menggunakan metode analisis tradisional
50 Clues: browser web tertua • apa singkatan dari AI • apa singkatan dari IoT • pencetus literasi digital • aplikasi video conference • dimana kita menulis artikel • adaberapa algoritma enkripsi • kapan literasi digital dimulai • berapa komponen literasi digital • ada berapa jenis pemasaran online • ada berapa unsur literasi digital • web browser di ciptakan pada tahun • ...
OT InfoSec 2024 2024-09-30
Across
- MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE.
- A TYPE OF MALWARE THAT DENIES A USER'S ACCESS TO A SYSTEM OR DATA UNTIL A SUM OF MONEY IS PAID.
- A ROUTINE FIX FOR A COMPUTER PROGRAM.
- THIS ACRONYM IS A DEVICE THAT EXAMINES WEB TRAFFIC AND CAN PREVENT ATTACKS EXPLOITING WEB APPLICATION VULNERABILITIES.
- FLOW OR WEAKNESS IN AN INFORMATION SYSTEM THAT COULD BE EXPLOITED.
- A CLASS OF MALICIOUS SOFTWARE, OR MALWARE, THAT CIRCULATES BETWEEN COMPUTERS AND CAUSES DAMAGE TO DATA AND SOFTWARE.
- YUBIKEY IS AN EXAMPLE OF A HARDWARE _______
- THIS COLORFUL ACROMYN MEANS TROUBLE ON A WINDOWS SYSTEM.
- A STRING OF CHARACTERS USED TO AUTHENTICATE AN IDENTITY.
- THE POTENTIAL FOR LOSING VALUABLE INFORMATION.
- THE INTENTIONAL OR UNINTENTIONAL RELEASE OF SECURE OR PRIVATE/CONFIDENTIAL INFORMATION TO AN UNTRUSTED ENVIRONMENT (2 WORDS).
- I LOVE ROCK MUSIC AND SPENDING TIME WITH FRIENDS. (WHICH SECURITY TEAM MEMBER AM I?).
- A SELF-REPLICATING MALICIOUS PROGRAM.
- AN ETHICAL SECURITY HACKER THAT USES THEIR SKILLS FOR GOOD.
- A CONTROLLED PRIVATE NETWORK THAT ALLOWS ACCESS TO PARTNERS, VENDORS AND SUPPLIERS, OR AN AUTHORIZED SET OF CUSTOMERS.
- ACCOUNT LOGIN PROCESS THAT REQUIRES USERS TO ENTER MORE INFORMATION THAN JUST A PASSWORD.
- I HAVE A FAMILY OF SIX AND I'M A GRANDPA (WHICH SECURITY TEAM MEMBER AM I?).
Down
- THE ACT OF PUBLISHING SOMEONE’S PERSONAL, CONFIDENTIAL INFORMATION ON THE INTERNET, OFTEN WITH MALICIOUS INTENT.
- UNAUTHORIZED USER WITH MALICIOUS INTENT.
- WORLD FAMOUS HACKER WHO CLAIMED TO BE ABLE TO ISSUE NUCLEAR LAUNCH CODES VIA WHISTLING.
- THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).
- A LIST OF PEOPLE, ORGANIZATIONS, IP ADDRESSES, OR COUNTRIES THAT ARE BLOCKED OR EXCLUDED BY OTHERS BECAUSE THEY ARE ALLEGED TO HAVE ENGAGED IN UNACCEPTABLE, OR UNETHICAL BEHAVIOR/ACTIVITIES.
- CYBER ATTACK IN WHICH THE ATTACKER FLOODS A SERVER WITH INTERNET TRAFFIC TO PREVENT USERS FROM ACCESSING CONNECTED ONLINE SERVICES AND SITES.
- MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
- WHEN I'M NOT WORKING OR WRITING CODE, I LOVE TO PLAY MUSICAL INSTRUMENTS. (WHICH SECURITY TEAM MEMBER AM I?)
- THE PROTECTION OF DIGITAL INFORMATION, AS WELL AS THE INTEGRITY OF THE INFRASTRUCTURE HOUSING AND TRANSMITTING DIGITAL INFORMATION.
- A MECHANISM FOR CREATING A SECURE CONNECTION BETWEEN A COMPUTING DEVICE AND A COMPUTER NETWORK.
- I AM A FOODIE, AND MY FAVORITE FOOTBALL TEAM IS HOCKEY! (WHICH SECURITY TEAM MEMBER AM I?).
- CURRENT HEAD OF THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA).
- ANY SOFTWARE OR APPLICATION THAT DISPLAYS UNSOLICITED ADVERTISEMENTS ON YOUR COMPUTER/BROWSER.
- MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
- ATTEMPTING TO TRICK PEOPLE INTO REVEALING SENSITIVE INFORMATION, OFTEN BY USING EMAILS OR FAKE WEBSITES THAT LOOK LIKE THEY ARE FROM TRUSTED SOURCES.
- A PROCESS USED TO IDENTIFY A HUMAN PERSON ENTERING DATA (I AM NOT A ROBOT).
33 Clues: A ROUTINE FIX FOR A COMPUTER PROGRAM. • A SELF-REPLICATING MALICIOUS PROGRAM. • UNAUTHORIZED USER WITH MALICIOUS INTENT. • YUBIKEY IS AN EXAMPLE OF A HARDWARE _______ • THE VAST UNDERBELLY OF THE INTERNET (2 WORDS). • THE POTENTIAL FOR LOSING VALUABLE INFORMATION. • MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE. • ...
ied 2.1.3-2.2.3 terms 2025-05-01
Across
- Turning around an axis or center point.
- A two-dimensional contour that characterizes an object or area, in contrast to three-dimensional form.
- (noun) The result of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics. (verb) The process of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics.
- A regularly recurring sequence of events or actions.
- A sketch that shows an object's height, width, and depth in a single view.
- Information or signals entered into a computer system. Examples of an input device are a button, keys on a keyboard, touch screen, and accelerometer.
- A functional analysis is a step in the reverse engineering process which identifies the necessary activities or actions of components and subsystems to turn available inputs—such as materials and energy—into desired output. A functional analysis is conducted through careful observation of the object's sequential operation before it is disassembled.
- A variable by which an object can move.
- A group of parts that are connected and form one unit.
Down
- The process of taking something apart and analyzing its workings in detail.
- A group of interacting, interrelated, or interdependent elements or parts that function together as a whole to accomplish a goal. Change happens if you add or remove a part.
- A self-contained system within a larger system.
- 1. A relationship of one set (called the domain) to another set (called the range) that assigns to each element of the domain exactly one element of the range. 2. The action or actions that an item is designed to perform.
- 1. The relationship of one thing to another in size, amount, etc. 2. Size or weight relationships among structures or among elements in a single structure.
- Term used to talk about beauty or art and people's appreciation of beautiful things.
- A product that already exists that does not need to be custom designed and produced.
- A condition in which different elements are equal or in the correct proportions. There are three types of visual balance: symmetry, asymmetry, and radial.
- 1. A relationship of one set (called the domain) to another set (called the range) that assigns to each element of the domain exactly one element of the range. 2. The action or actions that an item is designed to perform.
- The process of taking something apart and analyzing its workings in detail.
- Motion in which all particles of a body move with the same velocity along parallel paths.
- The property possessed by an object of producing different sensations on the eye as a result of the way it reflects or emits light.
- 1. Having the three dimensions of length, width, and depth. Also referred to as a solid. 2. The organization, placement, or relationship of basic elements, as volumes or voids in a sculpture, so as to produce a coherent image.
- In science, computing, and engineering, a black box is a device, system, or object which can be viewed in terms of it inputs and outputs, without any knowledge of its internal workings.
23 Clues: Turning around an axis or center point. • A variable by which an object can move. • A self-contained system within a larger system. • A regularly recurring sequence of events or actions. • A group of parts that are connected and form one unit. • A sketch that shows an object's height, width, and depth in a single view. • ...
DDL 2025-06-09
Across
- is a software program designed to perform specific tasks on a computer, smartphone, or other digital devices
- An electronic device that accept input, process it to give required input
- A folder is a virtual or physical storage space used to organize files.
- is a display screen used to visually present information from a computer. It allows users to see graphics, text, videos, and other digital content.
- Physical components of a computer
- brain of a computer
- refers to gaining unauthorized access to computer systems, networks, or data. It can be ethical or malicious, depending on the intent
- is a device used for typing and inputting commands, commonly found with computers, laptops, and tablets
- is a powerful spreadsheet program used for organizing, analyzing, and visualizing data.
- are the individual buttons on a keyboard that allow users to input text, commands, and shortcuts
- Smallest unit for measuring memory
- Unprocessed facts or figures, like numbers, text, or images.
- is an important keyboard key used to execute commands and create new lines in text.
- An operating system (OS) is the software that manages a computer’s hardware and software, allowing users and applications to interact with the device
- Data entered into a computer
- is a vast network that connects computers and devices globally, allowing the sharing of information and communication.
- on a computer means storing files, documents, or data so they can be accessed later
- is made up of 1024MB.
Down
- refers to programs and applications that run on computers, smartphones, and other digital devices
- is data that has been processed, organized, or structured to convey meaning and knowledge.
- a type of memory that is not needed in the computer but increase memory size
- is a visual indicator on a computer screen that helps users navigate and interact with digital content.
- Safeguarding personal data on websites, social media, and apps
- is a small graphical representation used in computing to symbolize a file, application, or function
- Saving new document on a computer
- A small handheld device that moves a cursor on a screen and allows users to interact with a computer through clicks and movement
- is a keyboard function used to delete characters to the left of the cursor
- Random Access Memory
- The main screen interface of a computer where icons, files, and applications are displayed
- Data getting out of a computer
- A popular word-processing software used for creating, editing, and formatting documents
- a computer refers to the process of starting up the system and loading the operating system so that it becomes functional
- a type of memory that is needed for computer to run well
- is a digital method of sending and receiving messages over the Internet
34 Clues: brain of a computer • Random Access Memory • is made up of 1024MB. • Data entered into a computer • Data getting out of a computer • Saving new document on a computer • Physical components of a computer • Smallest unit for measuring memory • a type of memory that is needed for computer to run well • Unprocessed facts or figures, like numbers, text, or images. • ...
Krzyżówka Angielski 2025-12-10
Across
- The right to keep personal data protected.
- Learning skills or knowledge.
- Records of system activities.
- Studying information to understand it.
- Connected computers that share data.
- Instructions written for computers.
- A direct instruction given to a computer.
- The chance that something bad may happen.
- Use of technology to perform tasks without human input.
- A break in security where data is exposed.
- Rules about what is morally right or wrong.
- The ability to manage or direct something.
- A system on which applications can run.
- A tool that blocks unwanted network traffic.
- Continuous flow of data.
- A simplified digital structure used to predict or analyze.
- A tool used to explore or test a system.
- A call for data or a service.
- To follow the path of an action or data flow.
- Following laws, rules, or standards.
- Official rule made by authorities.
- Something unusual that may signal a problem.
- Monitoring to make sure rules are followed.
- Protection against threats or attacks.
- An event that disrupts normal operations.
- A saved copy of data in case of loss.
- A step taken to solve a problem.
- A set of rules for communication.
- Searching for threats inside a network.
- Proof of an event or action.
- A formal review of systems or processes.
- A prediction based on information.
- To watch or track activity.
- A request for information from a database.
- A user identity in a system.
Down
- A sign that danger or problems may occur.
- Unauthorized entry into a system.
- A formal rule or guideline.
- A document describing an event or findings.
- A specific area or internet address space.
- Long-term storage of old files.
- A computer that provides resources to others.
- A place where data is kept.
- A piece of hardware used in computing.
- Delay in data communication.
- A set of connected computer components.
- Someone who monitors or watches activity.
- Programs used by a computer.
- A risk or danger.
- Related to money or cost.
- A part of a larger software system.
- The way a system or user acts.
- Related to investigating cyber incidents.
- Accidental or unlawful release of information.
- To check a system for issues or threats.
- A connection point in a network.
- A secret code to access a system.
- Numerical information used for analysis.
- Belief that someone or something is reliable.
- A person or system chosen for attack.
- Too much data or activity for a system to handle.
- A weakness that can be exploited.
- Converting information into a secure code.
- The path data takes to reach a destination.
- Permission to use or enter a system.
- Measurements used to evaluate performance.
- Information stored or processed by computers.
67 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A formal rule or guideline. • A place where data is kept. • To watch or track activity. • Delay in data communication. • Programs used by a computer. • Proof of an event or action. • A user identity in a system. • Learning skills or knowledge. • Records of system activities. • A call for data or a service. • ...
IT Fundamentals Chapter 3 2023-04-10
Across
- a way of making data consume less storage space
- a component in a computer that disperses heat from another object
- a short-range wireless communication technology that uses radio waves that operate between 2.4 and 2.485 GHz
- a type of flash memory that utilizes tiers of solid-state flash memory stacked on top of each other
- crystals that undergo a chemical reaction when exposed to light
- the part that connects the computer to the Internet
- the specific way in which a file is organized
- the communication system that allows data to be transferred between the components inside a computer
- glass that captures light by taking advantage of the fact that light bends when it travels through different materials
- drives that are frequently connected to computing devices to add additional storage capacity
- a large flat component that connects all the other parts to each other and sends electrical signals between them
- a printer that uses electrical charges and heat to fuse tiny plastic particles to the paper
- a system that uses a special file called a directory file to keep track of information in storage
- a printer that sprays small dots of ink from an ink reservoir onto a sheet of paper
- the part that replaces the hot air inside the machine with cool air from the outside
- a connector used to connect older or legacy monitors to a computer
- the part that controls the other parts of the computer by getting information from them, then telling them what to do
- the actions users can perform on a file
- the part that supplies additional processing power used for creating images and graphics
- a type of long-term storage disk that uses thick, magnetic disks encased in a protective housing to store data
- computers with all components built into one case
- an artificial kind of DNA that is capable of storing vast amounts of information
- a cooling system composed of a liquid heat sink, internal liquid pump, a fan, and a radiator that all actively pump cooled liquid in and out with no help from an outside pumping system
- small computing devices, such as tablets and smart phones
- a non-volatile drive that uses special memory chips to store data
- a circuit board that connects to a computer's motherboard, giving the motherboard additional power or functionality
- the locating of all the fragmented files on a drive and their reconsolidation into the same physical location on the disk
- a connector that allows you to connect the system to a network
- a process in which a computer’s processor fetches an instruction from memory, decodes the instruction, and executes it
Down
- a part that can take AC power from a wall outlet and convert it into DC power
- a special type of flash storage that is much faster and more durable than hard disk drives
- a connector between a computer and a peripheral device
- an individual who installs, troubleshoots, services, and repairs devices
- the combination of a special material overlaid on the top of a device's regular screen that can detect when you have touched it and where
- an advanced system of cooling in which the coolant is in direct contact with the CPU
- a processor that uses a reduced instruction set compared to x86 processors
- a drive that uses light instead of magnetism to store information
- a connector used to transfer high-definition signals that supports both audio and video data
- a cutting-edge type of drive that allows bits of data to become smaller and more tightly packed together than ever before while still retaining data
- a processor designed to process 64 bits of information at once
- a connector compatible with DisplayPort that is primarily used on Apple computers
- a device used to provide or customize main hardware functions
- the identification, research, and eventual resolution of a problem
- communication technology that uses light waves to transmit information through the air
- the process of noting in a changelog every time a file changes
- a storage device on a computer
- a connector used to connect digital monitors to a computer, typically flat-panel
- the division of a single physical disk into multiple logical drives called volumes
- the introduction of unintentional changes to a file
- the integration of a water-cooled heat exchanger near the heat source that removes the heat and reduces the air temperature
- the integration of fans in a computer in order to efficiently move hot air out of the system
- a static charge that occurs when two objects with different charge levels come together
- a computer system that is small enough to put on or under a desk
- an external device that allows one to scan paper documents into digital files
- memory that is only stored and utilized while the computer is turned on
- an audible code that sounds if a computer encounters an issue before POST is completed
- the storage of parts of a new file or application in different areas of a physical disk
- the process of converting information so that it cannot be understood without a key to convert it back
- an individual who designs tiny microchips as well as large and complex computer systems
- a test that ensures that all system hardware is in working order before loading an operating system
- a moving part that blocks the light while the camera isn’t taking a picture
- a connector that allows you to connect external devices, such as digital cameras, external hard drives, and scanners to a computer
- a group of ones and zeroes that are organized together
63 Clues: a storage device on a computer • the actions users can perform on a file • the specific way in which a file is organized • a way of making data consume less storage space • computers with all components built into one case • the part that connects the computer to the Internet • the introduction of unintentional changes to a file • ...
computer vocab 2 2017-03-03
Across
- A cursor is the position indicator on a computer display screen where a user can enter text. In an operating system with a graphical user interface (GUI), the cursor is also a visible and moving pointer that the user controls with a mouse, touch pad, or similar input device.
- Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible
- JPEG. Stands for "Joint Photographic Experts Group." JPEG is a popular image file format. ... Still, the compression algorithm is lossy, meaning some image quality is lost during the compression process.Jul 26, 2016
- home page - Computer Definition. Also known as page and Web page. A document that serves as a starting point on a Web site. A home page typically contains hypertext and navigation buttons that allows the user to navigate the site by clicking them with a mouse and invoking hyperlinks to other pages and even other sites.
- The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- A router [a] is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another router through the networks that constitute the internetwork until it reaches its destination node.
- In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
- A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
- A computer network or data network is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers. As the term implies, the speed in bps is equal to the number of bits transmitted or received each second.
- While this term originally referred to a clever or expert programmer, it is now more commonly used to refer to someone who can gain unauthorized access to other computers. A hacker can "hack" his or her way through the security levels of a computer system or network.
- printer Printing A 3D printer is a computer-aided manufacturing (CAM) device that creates three-dimensional objects. ... 3D printers use a process called additive manufacturing to form (or "print") physical objects layer by layer until the model is complete.Jan 2, 2014
Down
- The term "format" has several meanings, related to 1) disk formatting, 2) page formatting, and 3) file formats. 1) Disk formatting. In order for storage media, such as a hard drive or flash drive to be recognized by your computer, it first needs to be initialized, or "formatted."Jan 20, 2010
- The data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- A scanner is an input device that scans documents and images, which can be imported into a computer. They are available in flatbed or sheet-fed versions and are usually connected via a high-speed USB port. OCR software can be used to recognize text documents imported from a scanner.Jan 23, 2009
- When used to describe data storage, 1,024 megabits. (2) When used to describe data transfer rates, it refers to 10 to the 9th power (1,000,000,000) bits. Gigabit is abbreviated Gb, as opposed to gigabyte, which is abbreviated GB.
- Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
- The most widely used local area network (LAN) technology. Defined as the 802.3 standard by the IEEE, the Ethernet access method is used to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access.
- A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
- URL is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
- a unit of memory or data equal to 1,024 (210) bytes.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- DNS. (Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
25 Clues: a unit of memory or data equal to 1,024 (210) bytes. • a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web. • Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible • ...
AP Computer Principals Crossword 2018-09-10
Across
- a type of RAM that stored each bit of data on a separate capacitor
- the process of receiving data over the Internet
- acts as a barrier between a trusted system or network and outside connections
- a device that reads and/or writes data to a disk
- constructing and manipulating abstract representations of economic, engineering, manufacturing, and other types of situations and natural phenomenon simulated with the help of a computer system
- most images on your computer are comprised of these
- small dots that make up the images on computer displays
- the process of converting data to an unrecognizable or "encrypted" form
- the process of analyzing large amounts of data in order to discover patterns and other information
- text an algorithm for performing encryption or decryption
- 1,000,000,000 bytes
- a small chip that resides in computers and other electronic devices
- refers to how much disk space one or more storage devices provides
- the process of generating a final digital product from a specific type of input
- a collection of tables with unknown relationships gathered to serve a specific, often transient, often urgent, purpose
- a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication
- a carrier that contains encoded material
- can transfer data faster than standard Bluetooth 2.0
- a technology that recognizes text within a digital image
- a discreet online resource that is collaboratively developed and managed by a community
- the process of representing data in a visual and meaningful way so that a user can better understand it
- refers to a collection of systems used to protect copyrights of electronic media
- a system that transfers data between network access points through data switching, system control, and interconnection transmission lines
- the science of protecting information by transforming it into a secure format
- refers to applications and services offered over the internet
- a list of items that are denied access to a certain system or protocol
- a set of instructions designed to perform a specific task
- a system used to track objects, people, or animals using tags that respond to radio waves
- a central file storage location
- unsightly debris that occurs as the result of the experience of digital living
- the process of converting data from one form to another
- describes other data and provides information about a certain items content
- a number system that only uses two digits - 0 and 1
Down
- a unique address that identifies a device on the Internet or a local network
- information processed or stored by a computer
- a simple routing technique in computer networks where a source or node sends packets through every outgoing link
- the address of a specific webpage or file on the internet
- a continuous transmission of information to senses
- the area of the screen in graphical uses interfaces against which icons and windows appear
- a list of items that are granted access to a certain system or protocol
- the use of digital processing to perform a wide variety of signal processing operations
- a type of data and information mining process where data is gathered, searched, and presented in a report-based, summarized format to achieve specific business objectives or processes and/or conduct human analysis
- reduces a file's size with no loss of quality
- the protection of computer systems from theft or damage to their hardware, software, or electronic data
- a set of programs designed for a specific type of problem in statistics, production control, etc., making it unnecessary for a separate program to be written for each problem
- a word used to describe the virtual world of computers
- a file containing detailed records on a particular person or subject
- 1,000,000 pixels
- the smallest unit of measurement used to quantify computer data
- an organized system for the collection, organization, storage, and communication of information
- enables people to share information online in ways that weren't possible before
- an automated program that runs over the internet
- a particular way of organizing data in a computer so that it can be used efficiently
- refers to an enterprise data storage entity or entities into which data has been specifically partitioned for an analytical or reporting purpose
- results in lost data and quality from the original version
- a symmetric-key block cipher algorithm and U.S. government standard for secure and classifies data encryption and decryption
- a window for an active application
- computing computing done at a central location using terminals that are attached to a central computer
- property refers to the ownership of intangible and non-physical goods
- a physical or virtual infrastructure used by enterprises to house computer systems and associated components
- any letter, number, space, punctuation mark, or symbol that can be typed on the computer
- 1,000,000 bytes
- consists of multiple devices that communicate with one another
- the process of decoding data which has been encrypted into a secret format
- the process of verifying the identity of a person or device
- stores recently used information so that it can be quickly accessed at a later time
- the location where data that is being used come from
- a container or box that carries data over a TCP/IP network and internetworks
- information is stored using a series of ones and zeros
- the language used to create webpages
- states that processor speeds or overall processing power for computers will double every two years
- junk mail or irrelevant postings to a newsgroup or bulletin board
- is sent to a computer system and is processed by a software program rather than a person
- this encoding provides a standard way to represent characters using numeric codes
74 Clues: 1,000,000 bytes • 1,000,000 pixels • 1,000,000,000 bytes • a central file storage location • a window for an active application • the language used to create webpages • a carrier that contains encoded material • information processed or stored by a computer • reduces a file's size with no loss of quality • the process of receiving data over the Internet • ...
SQL Treasure Hunt 2022-09-13
Across
- A Database is an Organized Collection of Data, so that it can be easily accessed and managed.
- One of the capabilities of SQL Select Statement.
- Basic unit of storage.
- User Supplied Value or Constant in SQL.
- Starter Database with CON_ID 3.
- ______ is an electro-mechanical data storage device.
- ________ make the basic query block more powerful, and they are used to manipulate data values.
- Name of Scott's daughter's Pet.
- _________ is a synonym for DISTINCT in Oracle Database.
- Information collected together for reference or analysis.
- A database type which is used to store, manage, query, and retrieve data that is stored in a tabular format.
- Schema name is same as ______.
- Type of Storage Device.
- Objects that contain organized data in a Row-And-Column format such as spreadsheet.
- Temporary or Alternate Name to a Column.
- ______ clause in SQL Statement is used to retrieve data from one or more tables.
- Clause used to Filter Records.
- _________ are used to override the rules of precedence.
- Father Of RDBMS.
Down
- The hardware in a computing device where the operating system (OS), application programs, and data in current use are kept is known as memory.
- Shows the Structure of Table Which Include Name of The Column, Data-Type of Column and The Null-ability.
- ________ set of keywords that returns additional rows with the same sort key as the last row fetched.
- An Oracle-supplied PDB can be used as a template to create another PDB.
- A value which is Unavailable, Unassigned, Unknown or not applicable.
- First Container in an Oracle Database 12c and above.
- Administrative accounts in each container of Oracle Database.
- Default DATE display format.
- Tables, Views, Sequence, Indexes, Synonyms are collectively called as?
- A set consists of three views containing similar information and distinguished from each other by their prefixes.
- Translates alphanumeric characters and symbols into a Computer-Readable Code. (Numbers)
- ______ clause is used to specify the number of rows to skip before row limiting begins.
- Text-Based Interface that is used to Operate Software and Operating Systems.
- You can use the ______ identifier to search for the actual wildcard symbols.
- Used in Conjunction with The SELECT Keyword to Retrieve Data from all Columns of a Table.
- SQL Developer is a _ _ _ Tool. (Type of Interface)
- Used to Sort the Result-Set in Ascending or Descending Order.
- First Name Of SCOTT.
- SQL is a popular relational database language first standardized in 1986 by the _____.
- An acronym for the Sequence of Operations to be performed while simplifying the Mathematical Expressions.
- A database option that enables you to create multiple PDBs in a CDB.
- The order in which Oracle Database evaluates different operators in the same expression.
- A collection of Database Objects like Tables, Triggers, Stored Procedures, Etc.
42 Clues: Father Of RDBMS. • First Name Of SCOTT. • Basic unit of storage. • Type of Storage Device. • Default DATE display format. • Schema name is same as ______. • Clause used to Filter Records. • Starter Database with CON_ID 3. • Name of Scott's daughter's Pet. • User Supplied Value or Constant in SQL. • Temporary or Alternate Name to a Column. • ...
CIW Crossword Puzzle #1 2019-04-03
Across
- An HTML 5 Application Programming Interface (API) used for rendering visual images on the fly by providing scripts with a bitmap canvas.
- Code embedded into an HTML page and downloaded by a user; resides on the client and helps process Web form input. Common client side scripting languages include JavaScript and VBScript.
- An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.
- Software infrastructure and platform services that are hosted by a remote data center and provided to organizations or individuals over the Internet.
- programming methodology that uses a number of existing technologies together and enables Web applications to make incremental updates.
- An e-commerce model in which individual consumers sell products or services to other consumers.
- A technology that allows greater style definition and formatting control of HTML elements. Formatting can be placed within the HTML or called remotely from an external style sheet.
- National departments responsible for controlling items entering and leaving the country.
- XML-based protocol used by credit card companies to add security to online credit.
- A markup element that affects at least an entire paragraph.
Down
- The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.
- A set of universal commands, calls and functions that allows developers to communicate with an application or operating system.
- An e-commerce model in which a Web-based business sells products and/or services to other businesses.
- The study of groups of people. Specifically, the practice of gathering statistical data by studying populations based on characteristics such as age, income and education.
- An e-commerce model in which a Web-based business sells products and/or services to consumers or end users.
- The group of symbols used to render text on a page.
- A directory on a computer where applications, such as Internet apps, can be stored and run without access to the original application.
- A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on user request. The application receives and organizes data, then returns it in a consistent format.
- A text file that contains information sent between a server and a client to help maintain state and track user activities. Cookies can reside in memory or on a hard drive.
- A concept or collection of symbols associated with a product, service or person.
20 Clues: The group of symbols used to render text on a page. • A markup element that affects at least an entire paragraph. • A concept or collection of symbols associated with a product, service or person. • XML-based protocol used by credit card companies to add security to online credit. • ...
TECHNOLOGY 2023-03-15
Across
- a capability given by the practical application of knowledge
- technology combining electronics and mechanical engineering
- a machine or apparatus that operates by itself
- the application of science and mathematics by which the properties of matter and the sources of energy in nature are made useful to people
- something fanciful, elaborate, or intricate in design
- a means of communication
- a program that performs a particular task or set of tasks
- a mobile computing device that has a flat, rectangular form like that of a magazine or pad of paper
- a branch of physics that deals with the giving off, action, and effects of electrons and with electronic devices
- an optical instrument for projecting an image upon a surface
- used to certify the interoperability of telecommunications equipment utilizing UHF radio waves for the close-range wireless transfer of data
- the collecting of information about a particular subject
- a regularly interacting or interdependent group of items forming a unified whole
- a device that mediates the transmission routes of data packets over an electronic communications network
- a system of computers and peripherals that are able to communicate with each other
- having no wire or wires
Down
- a determination arrived at after consideration
- providing a readout in numerical digits
- a series of actions or operations conducing to an end
- an often small mechanical or electronic device with a practical use but often thought of as a novelty
- of a size and design that makes operation and use on one's lap convenient
- a programmable usually electronic device that can store, retrieve, and process data
- an electronic communications network that connects computer networks and organizational computer facilities around the world
- an electronic system of transmitting images with sound over a wire or through space by devices that change light and sound into electrical waves and then change these back into light and sound
- information in digital form that can be transmitted or processed
- to bring into existence
- a device that changes electrical signals into sounds loud enough to be heard at a distance
- an act or instance of transferring something (such as data or files) from a usually large computer to the memory of another device
- a device, contrivance, or process originated after study and experiment
- to transfer (something, such as data or files) from a computer or other digital device to the memory of another device
- a display screen on which the user selects options (as from a menu) by touching the screen
- a flat surface on which a picture or series of pictures is projected or reflected
- a mechanically, electrically, or electronically operated device for performing a task
- situated outside the visible spectrum at its red end
- seldom occurring or found
35 Clues: to bring into existence • having no wire or wires • a means of communication • seldom occurring or found • providing a readout in numerical digits • a determination arrived at after consideration • a machine or apparatus that operates by itself • situated outside the visible spectrum at its red end • a series of actions or operations conducing to an end • ...
ICS133 2017-05-07
Across
- will exploit minor vulnerabilities
- runs the browser in a restricted environment that limits its access to host files and other resources
- a running program
- we call a device a _____ wheb it serves as a stand-in for a different internet host
- keeping information secret
- _______ section that contain instructions to execute
- two parties rely on a thirds party to help negotiate a settlement
- keeping systems available and in operation
- a compromised systems on a network, all controlled by a single attacker
- system works on behalf of the wrong user
- when the network does not take steps to ensure reliable delivery, we call the packets _____
- security standards for federal computer system
- apply the access rights based on the enclosing directories
- does not directly improve system performance or security
- the process of key changing
- group of instructions
- security standards for certain types of personal health data
- a systematic process that reduces the volume of data by tracking advantage of redundancy in the plaintext
- name: identifies the directory entries to follow to find the file
- transforms readable data into unreadable data using secret information
- modify a system to work for the threat agent
- spread through internet via windows vulnerabilities
- the combined set of subnets
- protecting information from improper changes
- applies effort, but avoids social stigma
- a component that connects the host to other hosts or to the networks
Down
- creates botnet focused on financial fraud
- law based on judicial decisions
- are useless if no one listens
- makes an attack possible
- contains text interpreted by a programming language interpreter
- the term coined by Ted Nelson, who wanted to improve the computing experience
- attack that is likely to happen and worth protecting against
- protects the assets
- recovery from a compromise
- a router is traditionally called a _____
- a botnet and spam package that used to produce 7 million messages a day
- owned by a user, usually the creator
- attacks control logic in industrial plants
- mathematical technique to hide or protect data
- a decision to trust someone in a particularly delicate or sensitive capacity
- single arithmetic operations
- creates a botnet that spreads spam and more malware
- mathematical term for a step-by-step procedure
- bogus messages given to computers
- the numbered ports that can connect to a computer
- when we share a key with two or more people, we refer to that group as being the
- a computer connected to the network
- protects a set of files from access by others
- apply the same access rights to all new files
- malicious software
- data on a hard drive are organized into these independent blocks called _____
- law based on legislative enactments
53 Clues: a running program • malicious software • protects the assets • group of instructions • makes an attack possible • recovery from a compromise • keeping information secret • the process of key changing • the combined set of subnets • single arithmetic operations • are useless if no one listens • law based on judicial decisions • bogus messages given to computers • ...
BA520 - Summer 2017 2017-08-12
Across
- Business Process Management
- Open-source software framework that enables distributed parallel processing of a huge amount of data across inexpensive computers
- In-memory database software and analytics for fast, massive data processing
- Software as a Service
- Set of processes in an organization to create, store, transfer, & apply knowledge
- Internet of Things
- Process that streamlines complex data to minimize redundancy and simplify relationships
- Key field which is the unique identifier for all information in any row of a given database table
- Small file deposited on a hard drive when a user visits a website
- The principle of treating all data on the Internet without discrimination or preference
- Trusted entity that issues electronic documents which verify digital entities on the Internet
- Radio Frequency Identification
- Management Information Systems
- Entity Relationship Diagram
- Parallel areas in a BPM which separate the steps performed by different actors
- Cognitive computing platform from IBM
- National Institute of Standards and Technology
- Enterprise Resource Planning
- Data Flow Diagram
- Network device that monitors & blocks allows incoming/outoging network traffic based on security rules
- Contracting out a business process and/or non-core operational function to an outside party
- One trillion bytes of data
- Public Key Infrastructure
- Free website that allows companies to find and compare business software using a "pay-per-click" business model
Down
- Purposeful disruption of the activities of a state or organization using computer technology
- Total Cost of Ownership
- Virtual Private Network
- Stand-alone application designed to run on a specific platform & device
- Storage Area Network
- Amazon Web Services
- Decision Support System
- Tracking click behavior history of users on websites to understand their interest/intentions and expose them to advertisements uniquely suited to them
- Competitive Forces Model
- Random Access Memory
- Service Level Agreement
- Free Cloud-based collaboration platform and software suite
- Interrelated components that collect/process/publish information for operations, innovation, decision-making
- Disciplined thinking that is clear, rational, open-minded, and informed by evidence
- Finding hidden patterns/relationships in large databases; infers rules to predict future behavior
- Using social networking platforms & internal social tools to engage employees, customers, suppliers
- Attempting to obtain sensitive information for malicious reasons by disguising as a trustworthy entity
- Metaphor for the Internet
- Microsoft Cloud PaaS and SaaS Offering
- Computer speed of one trillion floating point operations per second
- Software Development Life Cycle
- Interlinked activities that convert inputs to outputs; add to bottom line; help create competitive advantage
- Online collaboration software for creating business and technical diagrams
- Malicious software programs such as viruses, worms, and Trojan horses that can steal or destroy data
- Cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
49 Clues: Data Flow Diagram • Internet of Things • Amazon Web Services • Storage Area Network • Random Access Memory • Software as a Service • Total Cost of Ownership • Virtual Private Network • Decision Support System • Service Level Agreement • Competitive Forces Model • Metaphor for the Internet • Public Key Infrastructure • One trillion bytes of data • Business Process Management • ...
BA520 - Summer 2017 2017-08-13
Across
- Storage Area Network
- Parallel areas in a BPM which separate the steps performed by different actors
- Computer speed of one trillion floating point operations per second
- Random Access Memory
- Online collaboration software for creating business and technical diagrams
- Service Level Agreement
- Total Cost of Ownership
- Open-source software framework that enables distributed parallel processing of a huge amount of data across inexpensive computers
- Purposeful disruption of the activities of a state or organization using computer technology
- The principle of treating all data on the Internet without discrimination or preference
- Malicious software programs such as viruses, worms, and Trojan horses that can steal or destroy data
- Internet of Things
- Microsoft Cloud PaaS and SaaS Offering
- Cognitive computing platform from IBM
- Tracking click behavior history of users on websites to understand their interest/intentions and expose them to advertisements uniquely suited to them
- Process that streamlines complex data to minimize redundancy and simplify relationships
- Public Key Infrastructure
- Finding hidden patterns/relationships in large databases; infers rules to predict future behavior
- One trillion bytes of data
- Interrelated components that collect/process/publish information for operations, innovation, decision-making
- Enterprise Resource Planning
- Business Process Management
- Using social networking platforms & internal social tools to engage employees, customers, suppliers
- Cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
Down
- Network device that monitors & blocks allows incoming/outoging network traffic based on security rules
- Key Key field which is the unique identifier for all information in any row of a given database table
- Software Development Life Cycle
- Trusted entity that issues electronic documents which verify digital entities on the Internet
- Competitive Forces Model
- Interlinked activities that convert inputs to outputs; add to bottom line; help create competitive advantage
- Small file deposited on a hard drive when a user visits a website
- Contracting out a business process and/or non-core operational function to an outside party
- Set of processes in an organization to create, store, transfer, & apply knowledge
- Free website that allows companies to find and compare business software using a "pay-per-click" business model
- Software as a Service
- Entity Relationship Diagram
- Metaphor for the Internet
- Radio Frequency Identification
- Disciplined thinking that is clear, rational, open-minded, and informed by evidence
- Stand-alone application designed to run on a specific platform & device
- In-memory database software and analytics for fast, massive data processing
- Free Cloud-based collaboration platform and software suite
- Characterized by the 4 V's (volume, variety, velocity, veracity)
- Management Information Systems
- Virtual Private Network
- Data Flow Diagram
- National Institute of Standards and Technology
- Attempting to obtain sensitive information for malicious reasons by disguising as a trustworthy entity
- Amazon Web Services
- Decision Support System
50 Clues: Data Flow Diagram • Internet of Things • Amazon Web Services • Storage Area Network • Random Access Memory • Software as a Service • Service Level Agreement • Total Cost of Ownership • Virtual Private Network • Decision Support System • Competitive Forces Model • Metaphor for the Internet • Public Key Infrastructure • One trillion bytes of data • Entity Relationship Diagram • ...
Get to Know the CAS Tutors - Fall 2017 2017-09-27
Across
- Deanna's favorite food is _____ cakes.
- This tutor ran the XTERRA Georgia Deep South 5K Trail Run 2017.
- Darnell's favorite food is ________.
- Britney is part of TGI Tech, a STEAM initiative for _______.
- This tutor is very open to the existence of ghosts.
- Adriana's favorite videogame is _________.
- Sabine was born and raised in this country.
- If Iciar could close her eyes and be anywhere on earth when they opened, she'd would love to see the sun rising in the middle of ________.
- Michele has a poorly made birthday video with this friendly dinosaur.
- Carolina can speak Spanish and _________.
- This tutor's noteworthy accomplishment is to be the first person out of the spelling bee.
- This tutor is double majoring in Philosophy and mathematics with a minor in psychology.
- This tutor presented at the Association of Computing Machinery Conference in Gatlinburg, TN.
- In 2014, This tutor was a member of the all-girl rap group, "TGZ".
- Jordan studied and can speak this language.
- This tutor won the "Best student in 8th grade" award.
- Douglas shares a birthday with _______ Tesla.
- This tutor can't stand slow walkers.
- This tutor has always wanted to learn how to do magic tricks.
- Laura shares the same birthday as Mark Mothersbaugh, a member of Devo and the writer of this 90's Nickelodeon tv show.
- This tutor is a CNA with a 5 year background in dementia and geriatric care.
- This tutor was the commencement speaker for their graduating class.
Down
- Rodney knows how to play this instrument.
- This tutor received their bachelor's degree at Ho Chi Minh University of Technology.
- ______ would like to run a company one day.
- Austin's favorite animal is a ___________.
- Manny has always wanted to learn how to ___________ with a squirrel suit.
- ________'s biggest pet peeve is when people touch her things without asking.
- Born in New York, _____________ was raised in Venezuela.
- Ashley's favorite movie is Love and ___________.
- This tutor's name is Welsh for "blessed peacemaking".
- __________ wants to be an epidemiologist when she grows up.
- Michael says that this is his favorite book genre.
- This tutor was in a news segment in Japan.
- Tommy won Best _______ '07.
- _______ has presented on nanotoxicology research at the Morehouse School of Medicine Research symposium.
- _______ wants to be a professional sleeper.
- Calvin's favorite animal is the ______ Bear.
- Marie has always wanted to learn how to play the __________.
- Better clean up your car before you give __________ a ride anywhere. Her biggest pet peeve is for things to be out of place.
- If ___________ could receive any one item for free, he'd like a Yeti SC5 Mountain Bike.
- Nia has always wanted to know how to _____ a motorcycle.
- This tutor is quite musical; writing & recording his own songs.
43 Clues: Tommy won Best _______ '07. • Darnell's favorite food is ________. • This tutor can't stand slow walkers. • Deanna's favorite food is _____ cakes. • Rodney knows how to play this instrument. • Carolina can speak Spanish and _________. • Austin's favorite animal is a ___________. • Adriana's favorite videogame is _________. • This tutor was in a news segment in Japan. • ...
Brian Knowles Key Terms 2017-10-18
Across
- any device used to send data from a computer to another device
- completed partially or entirely by using a computer
- a portable computing device such as a smartphone or tablet computer
- a method of banking where transactions are conducted electronically
- a computer that is portable and suitable for use while traveling
- a camera that records and stores digital images
- expected to be transported during normal usage aka cellphone
- generally smaller than a briefcase that can easily be transported
- the software that supports a computer's basic functions
- person or thing that develops something
- appears on the recipient's screen as soon as it is transmitted
- a mobile phone incorporating a digital camera
- the single worldwide computer network that interconnects other networks
- a visual way of interacting with a computer using items such as windows
- an arrangement of intersecting horizontal and vertical lines
- include such things as database programs
- facts and statistics collected together for reference or analysis
- capable of transmitting an analog or digital signal
- a social media site to which a user makes short
- mobile electronic device designed to read digital e-books
- a piece of computer hardware equipment
- place or fix
- online platform which people use to build social networks
- a global computer network providing a variety of information
- a computer designed for use by one person at a time
Down
- the environmentally responsible and eco-friendly use of computers
- computer software used to satisfy the needs of an organization
- a palmtop computer that acts as a personal organizer and provides email or Internet access
- designed primarily for accessing Internet-based applications
- a process by which individual investors and traders buy and sell securities online
- a list of questions and answers relating to a particular subject
- tools, machinery
- A person traveling with a smartphone
- the central processing unit and primary memory of a computer
- personal computer that fits on or under a desk
- controlled by or connected to another computer or to a network
- dedicated function within a larger mechanical or electrical system
- run by an individual or small group
- brain of the computer
- an electronic version of a printed book that can be read on a computer
- is the ability to use computers and related technology efficiently
- the faculty by which the mind stores and remembers information
- ability to use information and communication technologies to find
- in any manner detectable by an observer
- that can conveniently be stored in a pocket
- A specialized desktop computer used to play video games
- facts provided or learned about something
- encompasses all the various types of enterprise software
- carry out or put into effect
- the process or state of converging
- a family member that uses a computer
51 Clues: place or fix • tools, machinery • brain of the computer • carry out or put into effect • the process or state of converging • run by an individual or small group • A person traveling with a smartphone • a family member that uses a computer • a piece of computer hardware equipment • person or thing that develops something • in any manner detectable by an observer • ...
Geografiya 2023-10-22
Across
- software that detects and removes viruses from a computer
- the instructions that tell a computer system how to complete a task
- computer hardware and complex Al software working together to solve a problem without any human interaction
- a wireless technology that allows data transmission using radio waves
- an application that uses rows and columns to organise data and carry out calculations using that data
- programming that requires the programmer to type text, e.g. Python
- the collective name for all types of attacks on a computer or computer network
- the physical parts of a computer that you can touch and see, e.g. the processor, storage devices, input devices, output devices
- (AI) the study of machines and algorithms designed to carry out tasks in a way that is similar to humans
- an application that is used to organise data that can then be stored, processed and accessed electronically
- a measure of the maximum number of bits that can be transmitted over a network or cable in a specified amount of time
- a type of network that communicates over a small geographical area, such as a single building
- software or hardware that prevents unauthorised access to a network
- the software that users access to carry out tasks
- a collection of computing devices connected to each other, either wired or wirelessly
- a popular type of copper cable used to transmit data between devices
Down
- allowing a computer or a human to verify that the user is who they say they are
- carrying out an operation on data, e.g. querying a database or doing a calculation using data in a spreadsheet
- not allowed
- a simulation that superimposes digital images on the user's real- world environment and allows the user to interact with those images
- a computer that offers a service to other devices on a network, such as file-sharing services and printer-sharing services
- the programs or set of instructions that tell a computer what to do to complete a task; aspects of a device you cannot touch
- a type of cyber-attack that uses a dictionary to try to discover passwords automatically
- enables devices to connect to a network using Wi-Fi
- raw facts and figures
- software that detects and removes spyware from a computer
- a network device that forwards data from one device to another
- a type of network that communicates over a large geographical area, such as across a city or country.
- a type of network that communicates over an area of no more than 10 metres, usually connecting smart devices within the immediate area of a user
- step-by-step instructions to solve a particular problem
- connected to the internet
- what happens when something interrupts the transmission of a signal; this could be a physical obstruction such as a wall, or other radio waves
32 Clues: not allowed • raw facts and figures • connected to the internet • the software that users access to carry out tasks • enables devices to connect to a network using Wi-Fi • step-by-step instructions to solve a particular problem • software that detects and removes viruses from a computer • software that detects and removes spyware from a computer • ...
Computer Acronyms 2024-09-07
Across
- A type of non-volatile storage device that uses spinning disks to store and retrieve digital information using magnetic storage.
- A standard interface used for connecting peripherals to computers, such as mice, keyboards, and storage devices.
- A hardware component that enables a computer to connect to a network and communicate with other devices.
- A computer bus interface that connects storage devices like HDDs and SSDs to the motherboard.
- A data storage technology that combines multiple disk drives into one unit for improved performance and fault tolerance.
- An All-Flash Array (AFA) is a storage system using only flash memory for faster data access.
- An analog video display standard used to connect computers to monitors and projectors.
- Refers to something small in size, typically used as a prefix in computing to denote smaller versions of standard technologies, like microprocessors or microcontrollers
- A component of the CPU that directs the operation of the processor by interpreting instructions and controlling data flow within the
- A type of flat-panel display technology that uses liquid crystals to produce images on screens for devices like monitors, TVs, and smartphones.
- A prefix indicating something that is smaller than usual, commonly applied to ports, cables, or devices
- A non-volatile storage device that uses flash memory to store data, offering faster read and write speeds compared to traditional HDDs
- A malicious software program that can replicate itself and spread from one computer to another, often damaging or corrupting data.
Down
- A widely used technology for wired local area network (LAN) connections, enabling devices to communicate over a network.
- A specialized processor used to render images, video, and animations, commonly used in gaming, 3D modeling, and graphics
- Firmware used to initialize and manage communication between the operating system and hardware components during startup
- A standard storage devices to computers
- A type of volatile memory that temporarily stores data for quick access by the CPU, facilitating faster processing and multitasking.
- A video interface used to transmit digital video data from a computer to a display device like a monitor.
- the core part of the CPU that performs arithmetic and logic operations like addition,subtraction,and comparisons
- A type of memory card used for storing data, often in mobile phones, digital cameras, and portable devices.
- A type of non-volatile memory used in computers to store firmware or software that is not intended to be modified frequently.
- A user interface where users interact with the system through text-based commands
- A file system developed by Microsoft, used in Windows operating systems for organizing and storing files on hard drives and other storage devices.
- A standard interface for transmitting high-definition video and audio between devices, such as from a computer to a monitor or TV.
- the main unit of a computer that performs most of the processing inside the system by executing instructions from program
26 Clues: A standard storage devices to computers • A user interface where users interact with the system through text-based commands • An analog video display standard used to connect computers to monitors and projectors. • An All-Flash Array (AFA) is a storage system using only flash memory for faster data access. • ...
December 2024 GK-3 2024-12-14
Across
- Which country is ranked 1 in Global Innovation Index (GII) 2024 ?
- Which state has become the first state to telecast live court proceedings on YouTube.
- How many countries are members of ASEAN ?
- Which organization has launched a quantum computing chip called Willow?
- Which telecom operator has launched the country’s first direct-to-device satellite internet service?
- Jasleen Kaur, a Glasgow-born Scottish Sikh artist of Indian heritage, won the 2024 ____ Prize. Her exhibition Alter Altar explores personal, political, and spiritual themes
- Gharchola handicraft, which has recently received a Geographical Indication (GI) tag, belongs to which state?
- Post Pokhran- II, India and which country signed the 123 Nuclear Agreement for peaceful uses of Nuclear Energy ?(Use abbreviation)
- Google DeepMind unveiled ____, an AI model for weather prediction outperforming the European Centre for Medium-Range Weather Forecasts (ECMWF), the world’s top forecast system.
- What is the name of the chatbot launched by the Prime Minister to assist devotees during Mahakumbh Mela 2025?
- Which institution has completed a 410-meter Hyperloop test track, marking a milestone in futuristic transportation.
- A long-term start-up capital provided to new entrepreneurs
- Hornbill festival is celebrated in which state?
- Which is the oldest nuclear power station in India?
- Union Cabinet has approved the _____ Bill related to elections
- Guruvayur Temple, which was seen in the news, is located in which state?
- The India Maritime Heritage Conclave (IMHC) was held on December 11-12, 2024, at ______ Convention Center, New Delhi, celebrating India’s maritime history
Down
- What is the name of the AI-powered platform developed by IIIT-Delhi for discovering molecules to slow down ageing?What is the name of the AI-powered platform developed by IIIT-Delhi for discovering molecules to slow down ageing?
- India appoints ___ as new central bank (RBI) governor.
- Ramappa Temple is located in which state?
- In a historic turn for Indian chess, 18-year-old ____ won the 2024 World Chess Championship title in Singapore on Thursday, defeating Chinese champion Ding Liren
- Polavaram Multipurpose Project, which was seen in the news, is located in which state?
- Which company is setting-up the world's largest eyewear manufacturing facility in Telangana.
- The Abathsahayeshwarar Temple in which state won UNESCO’s 2023 Award of Distinction for heritage conservation.
- Former ___ President Michelle Bachelet has been awarded the Indira Gandhi Prize for Peace, Disarmament, and Development 2024. She is recognized for her contributions to gender equality, human rights, and democracy.
- Ecologist _____ received the UN’s Champions of the Earth award on December 10, 2024, for his work in the Western Ghats, a global biodiversity hotspot.
- Which country is planning to implement a four-day workweek from 2025 to grow younger and promote work-life balance.
- Which country’s traditional drink named ‘Sake’ has been added to UNESCO’s Intangible Cultural Heritage of Humanity list?
- Currently, labour regulations allow how many hours workday, inclusive of overtime?
- Most searched topic in India in 2024. (Google) (Use abbreviation)
- Indians will be able to travel to which country without a visa from Spring 2025.
- Implementing specialized police units like SHE Teams, for enhanced safety and security of women was started by which state police?
32 Clues: How many countries are members of ASEAN ? • Ramappa Temple is located in which state? • Hornbill festival is celebrated in which state? • Which is the oldest nuclear power station in India? • India appoints ___ as new central bank (RBI) governor. • A long-term start-up capital provided to new entrepreneurs • ...
Engineering Tech Crossword 2025-04-30
Across
- The core part of an operating system that manages system resources.
- Measures taken to protect computers and networks from unauthorized access.
- The server-side logic and database layer of a software application.
- A set of rules for data communication over a network.
- The standard language for creating web pages.
- Network of physical objects embedded with sensors and software.
- A device that converts digital signals for internet transmission over telephone lines.
- Temporary storage that speeds up access to frequently used data.
- A set of practices combining development and IT operations.
- A tiny semiconductor used to perform specific functions in electronics.
- The main circuit board that connects all components in a computer.
- Permanent software programmed into hardware devices.
- Information that can be processed or analyzed by a computer.
- The data transfer capacity of a network connection.
- Number system consisting only of 0s and 1s.
- Technology that creates virtual versions of hardware, servers, or operating systems.
- A complete path through which electric current flows.
- The physical components of a computer or electronic system.
- A version control system for tracking code changes in software development.
- A device that detects and responds to physical inputs like heat or motion.
- A professional who designs, builds, and tests technological systems.
- The process of converting data into a secure, unreadable format.
- Technology that performs tasks with minimal human input.
Down
- A processor designed to accelerate graphics rendering.
- A collection of connected computers or devices that share resources.
- A command-line interface used to interact with a computer system.
- A wired network protocol commonly used in local area networks (LANs).
- A set of integrated circuits that manage data flow between components.
- A secure, distributed ledger system used for tracking digital transactions.
- A program that translates code from high-level to machine language.
- The arrangement of components or settings within a system.
- A remote-controlled or autonomous flying device.
- A lightweight, portable unit that packages software and its dependencies.
- A storage location for code and project files, often managed by version control.
- The number of bits processed per unit of time, often in streaming.
- A device or software that distributes network traffic across multiple servers.
- A versatile, object-oriented programming language used in many applications.
- The point of interaction between hardware, software, or users.
- Internet-based services for data storage, computing, and software delivery.
- To identify and fix bugs or errors in a program.
- Interface allowing different software applications to communicate with each other.
- A precise set of rules or instructions for solving a computational problem.
- A beginner-friendly, high-level programming language with readable syntax.
- A file containing code written to automate tasks.
- Central Processing Unit; executes instructions in a computer.
45 Clues: Number system consisting only of 0s and 1s. • The standard language for creating web pages. • A remote-controlled or autonomous flying device. • To identify and fix bugs or errors in a program. • A file containing code written to automate tasks. • The data transfer capacity of a network connection. • Permanent software programmed into hardware devices. • ...
IBA - Lesson 1 Vocabulary 2024-08-21
Across
- An individual who manages the security measures used to protect electronic data.
- An individual who is responsible for the maintenance and security of an organization's database resources and data.
- The practice of copying data from one source, such as a database, to another.
- An individual who develops Websites and/or applications for mobile devices.
- A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
- The ability for a system to function well when its workload is increased or hardware is added to meet user's need.
- An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities.
- An individual who creates the overview plan of a Website's development.
- A powerful mobile computer similar to a smartphone, but with a larger touchscreen. Tablet computers typically do not have phone service, but are capable of high-speed Internet connections.
- An individual who determines the visibility of Websites across multiple clients and search engines.
- A hyperlink that, when clicked, sends a Website visitor to a page or resource that does not exist on the server.
- Software, infrastructure, and platform services that are hosted by a remote data center and provided to organizations over the Internet
- An individual who troubleshoots and repairs mobile device hardware components.
- A social networking and blogging site that allows individuals to communicate via short messages (www.twitter.com).
- An individual who diagnoses and resolves users' technical hardware and software problems.
- The management and processing of information using computers and computer networks.
Down
- An individual who examines an organization's security requirements and determines the necessary infrastructure.
- An individual who develops primarily server-side Web applications.
- An individual who analyzes Website statistics to determine the site's effectiveness.
- The process of improving the volume and quality of traffic to a Website by structuring content to improve search engine ranking. A specific activity of Internet marketing.
- The premier social networking site on the Web (www.facebook.com). It enables individuals to communicate individually and connect as groups using various communications tools.
- An individual who is responsible for the organization and appearance of a Website.
- An individual who manages and maintains network servers.
- An individual who manages a Web development team.
- An individual who installs, modifies, and repairs personal computer (PC) hardware components.
- The study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study.
- The de facto standard for search engine sites (www.google.com).
- An individual who manages and maintains a network infrastructure.
- A mobile phone with advanced computing ability and Internet connectivity. Smartphones combine a mobile phone, camera, video recorder, global positioning system, touchscreen, Web browser, and wireless high-speed Internet connectivity into one device.
29 Clues: An individual who manages a Web development team. • An individual who manages and maintains network servers. • The de facto standard for search engine sites (www.google.com). • An individual who manages and maintains a network infrastructure. • An individual who develops primarily server-side Web applications. • ...
Day Two Crossword 2024-08-15
Across
- What sport does Coach Anderson coach?
- The only time you are permitted to eat during the school day is at _______.
- A firewall protects a computing network from outside digital threats.
- Programs and other operating information used by a computer, like games or apps.
- During class, you are expected to remain in your _______ at all times.
- The Google tool you would use if you were going to type in a list of numbers.
- The Tidwell mascot is the _________, which is why we are called the Tidwell Titans.
- A tool like Google or Bing that helps you find information on the internet.
- You have _____ minutes to get from one class to another at Tidwell.
- Tidwell's main color.
- A hardware device used to input or type text and commands into a computer.
- Along with cell phones, students may not use ___________ to listen to music.
- Google ________ allows users to make simple mini-websites.
- Windows and MacOS are examples of the __________ system that a computer uses to manage its hardware and software.
- Can you text your mom during class to ask her to bring you Chick Fil A?
- If you were going to type an essay, you would probably use a Google _____ to input your work.
- This class is taught by Coach _____________.
- A network is a group of _________ computers that can share information and resources.
- To transfer a file from the internet to your own device, like saving a song or video.
- How many kids does Coach Anderson have?
Down
- During the school day, students are not permitted to use their ___________ at any time during the school day.
- The Google tool you would use if you were going to make a presentation.
- To transfer a file from your computer to another site on the internet.
- To use the restroom, you will fill out an e-Hall-Pass ticket by clicking on the Pass icon in the NISD ________.
- A common programming langugage used to teach coding. Named after a large snake.
- The short period of time between 2nd and 3rd periods.
- A group of connected computers that can share information and resources.
- A security system that protects a computer network from unauthorized access.
- Python and JavaScript are two examples of a programming ____________.
- At lunch, you will go to the ________ to eat.
- The physical parts of a computer, like the monitor, keyboard, and mouse.
- At all times, students will treat eachother with __________ and kindness.
- A secret word or phrase that you use to access a computer, email, or website.
- A way to send messages electronically over the internet.
- Websites and apps like Instagram or TikTok where people share and connect with others.
- Tidwell's principal is Mr. ___________.
- A global network of computers that are connected and can share information.
- The most popular search engine.
38 Clues: Tidwell's main color. • The most popular search engine. • What sport does Coach Anderson coach? • Tidwell's principal is Mr. ___________. • How many kids does Coach Anderson have? • This class is taught by Coach _____________. • At lunch, you will go to the ________ to eat. • The short period of time between 2nd and 3rd periods. • ...
Calculus Vocabulary AB Year long 2025-06-28
Across
- An area approximation method using trapezoids instead of rectangles
- A point where the function changes from decreasing to increasing
- Distance The integral of the absolute value of velocity
- A point where the function changes from increasing to decreasing
- Theorem A special case of the Mean Value Theorem where the average rate of change is zero
- Net change in position; ∫ velocity
- (1/(b-a)) ∫ f(x) dx
- A function is if its derivative is positive
- The instantaneous rate of change of a function; slope of the tangent line
- A function whose derivative is the given function
- A rule for differentiating the product of two functions
- Integral The general antiderivative of a function
- Endpoint The Riemann sum using the left ends of subintervals
- A rule for differentiating the quotient of two functions
- The value a function approaches as the input approaches a certain value
- The Riemann sum using the midpoint of subintervals
- Point A point where the derivative is zero or undefined
- A method to find volume using circular cross-sections perpendicular to the axis
- The location of a particle at a given time
- The derivative of position; rate of change of position
- Rule A method to evaluate limits involving indeterminate forms
Down
- A rule for computing the derivative of a composite function
- Theorem The theorem that connects derivatives and integrals
- Sum An approximation of area using rectangles
- Differentiation A method for finding derivatives by taking logarithms of both sides
- Differentiation A method to find dy/dx when y is not isolated
- Field A graphical representation of a differential equation
- Rates A method to find the rate of change of one variable in terms of another
- The direction a curve bends; determined by the sign of the second derivative
- Between Curves The integral of the top function minus the bottom function over an interval
- A function is if its derivative is negative
- The derivative of velocity; second derivative of position
- A method for volume involving a hole in the solid
- A function is differentiable if it has a derivative at every point in its domain
- The accumulation of quantities; area under a curve
- Equation A differential equation that can be written as f(y)dy = g(x)dx
- If a function is continuous and differentiable, then at some point, the derivative equals the average rate of change
- Condition: A known value used to solve for C in an antiderivative
- Integral The signed area under a curve between two bounds
- A method for finding integrals using a change of variable
- A function is continuous if there are no breaks, jumps, or holes in its graph
- Point A point where the concavity of a function changes
- Endpoint The Riemann sum using the right ends of subintervals
43 Clues: (1/(b-a)) ∫ f(x) dx • Net change in position; ∫ velocity • The location of a particle at a given time • Sum An approximation of area using rectangles • A method for volume involving a hole in the solid • A function is if its derivative is positive • A function whose derivative is the given function • Integral The general antiderivative of a function • ...
Computer Terminology 2012-08-11
Across
- Information in a form suitable for transmission from internal to external units of a computer, or to an outside medium
- An electronic device that makes possible the transmission of data to or from a computer via telephone or other communication line
- A set of keys, usually arranged in tiers, for operating a typewriter, typesetting machine, computer terminal, or the like
- A lever resembling this, used to control movement of a cursor or other graphic element for video games and computer graphics
- Any of several microcomputer operating systems or environments featuring a graphical user interface
- The capacity of a computer to store information subject to recall
- A device or unit that operates separately from the CPU but is connected to it, as a magnetic disk or tape unit or a printer
- An output device that produces a graphical representation by drawing on paper, as with one or more attached pens
- Acronym for RANDOM ACCESS MEMORY
- A systematic plan for the automatic solution of a problem by a computer
- A recording or registering apparatus or device
- An organizing unit in a computer's file system for storing and locating files
- The process of introducing data into the internal storage of a computer
- A computer-aided electronic system using photoelectric cells to separate copy, as color illustrations, into its primary colors, correct color copy, and produce a set of color separations ready for proofing or printing
- disk A thin, flexible plastic disk coated with magnetic material, on which data and programs can be stored for later retrieval
- A collection of related data or program records stored on some input/output or auxiliary storage medium
Down
- A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables
- A palm-sized, button-operated pointing device that can be used to move, select, activate, and change items on a computer screen
- A person who uses a computer
- A computer-generated image
- Also called a BINARY DIGIT. A single, basic unit of computer infomation
- Also called video screen. the portion of a terminal or monitor upon which information is displayed
- Equipment or programs designed to communicate information from one system of computing devices or programs to another
- An output device that produces a paper copy of alphanumeric or graphic data
- Also called loudspeaker. an electroacoustic device, often housed in a cabinet, that is connected as a component in an audio system, its function being to make speech or music audible
- A systematic series of actions directed to some end
- Available in electronic form; readable and manipulable
- Acronym for READ-ONLY MEMORY
- A set of bits, usually eight, processed by a computer as a unit
29 Clues: A computer-generated image • Acronym for READ-ONLY MEMORY • A person who uses a computer • Acronym for RANDOM ACCESS MEMORY • A recording or registering apparatus or device • A systematic series of actions directed to some end • Available in electronic form; readable and manipulable • A set of bits, usually eight, processed by a computer as a unit • ...
Pamount Puzzle 2014-08-27
Across
- The tapered, sharp end of a tool, weapon, or other object
- Facts and statistics collected together for reference or analysis
- The size of a typeface, measured from line to line, when no additional interline space is added. Digital typefaces may not have an inherent size, as did metal typefaces
- A long thin piece of metal on a scale or dial that moves to indicate a figure or position
- Perform a series of mechanical or chemical operations on something in order to
- The overall style of letter will depend on the relationship between the parties concerned
- The amount of something produced by a person, machine, or industry
- A panel of keys that operate a computer or typewriter
- A particular design of type
- The official procedure or system of rules governing affairs of state or diplomatic occasions
- Cover or enclose someone or something in paper or soft material
- A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- A receptacle in a church for the water used in baptism, typically a freestanding stone structure
- A device for examining, reading, or monitoring something, in particular
- Printer ;A printer in which the characters are formed by minute jets of ink
Down
- A special notation at the end of a letter that indicates copies of the letter were sent to the person(s) listed, usually noted by typing
- The action or method of storing something for future use
- A folder or box for holding loose papers that are typically arranged in a particular order for easy reference
- Printer A printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attract toner or dry ink powder
- Computer Laptop. A laptop is a portable personal computer with a clamshell form factor, suitable for mobile use. They are also sometimes called notebook computers or notebooks or lappy
- What is put in, taken in, or operated on by any process or system
- A written or printed above the line
- A key or command that toggles between two modes, such as the caps lock key
- All the visible features of an area of countryside or land, often considered in terms of their aesthetic appeal
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- A position of a person's body when standing or sitting
- Especially in computing
- Tools, machinery, and other durable equipment change or preserve it
- A line or set of lines enclosing or indicating the shape of an object in a sketch or diagram
- A length of water wider than a strait, joining two larger areas of water, especially two seas
30 Clues: Especially in computing • A particular design of type • A written or printed above the line • A panel of keys that operate a computer or typewriter • A position of a person's body when standing or sitting • The action or method of storing something for future use • The tapered, sharp end of a tool, weapon, or other object • ...
Paramount Puzzle 2014-08-26
Across
- A line or set of lines enclosing or indicating the shape of an object in a sketch or diagram
- A length of water wider than a strait, joining two larger areas of water, especially two seas
- What is put in, taken in, or operated on by any process or system
- Tools, machinery, and other durable equipment change or preserve it
- The action or method of storing something for future use
- The official procedure or system of rules governing affairs of state or diplomatic occasions
- A folder or box for holding loose papers that are typically arranged in a particular order for easy reference
- A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- The tapered, sharp end of a tool, weapon, or other object
- Wrap Cover or enclose someone or something in paper or soft material
- Printer ;A printer in which the characters are formed by minute jets of ink
- Computer ; Laptop. A laptop is a portable personal computer with a clamshell form factor, suitable for mobile use. They are also sometimes called notebook computers or notebooks or lappy
- Facts and statistics collected together for reference or analysis
Down
- A receptacle in a church for the water used in baptism, typically a freestanding stone structure
- Script A written or printed above the line
- A panel of keys that operate a computer or typewriter
- A device for examining, reading, or monitoring something, in particular.
- Style The overall style of letter will depend on the relationship between the parties concerned.Copy Nation ;A special notation at the end of a letter that indicates copies of the letter were sent to the person(s) listed, usually noted by typing
- Printer A printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attract toner or dry ink powder
- All the visible features of an area of countryside or land, often considered in terms of their aesthetic appeal
- Size The size of a typeface, measured from line to line, when no additional interline space is added. Digital typefaces may not have an inherent size, as did metal typefaces
- A position of a person's body when standing or sitting
- A key or command that toggles between two modes, such as the caps lock key
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- Perform a series of mechanical or chemical operations on something in order to
- Especially in computing
- A particular design of type
- A long thin piece of metal on a scale or dial that moves to indicate a figure or position
- The amount of something produced by a person, machine, or industry
29 Clues: Especially in computing • A particular design of type • Script A written or printed above the line • A panel of keys that operate a computer or typewriter • A position of a person's body when standing or sitting • The action or method of storing something for future use • The tapered, sharp end of a tool, weapon, or other object • ...
YETI 2015-01-18
Across
- Common medium for Ethernet
- Continuous checking of devices to see if they want to communicate
- Two devices attempting to transmit at exactly the same time
- Access method in which th device senses whether the line is idle and therefore available to carry a transmission
- Developed by IBM in an effort to improve the True Ring
- Scenario where computing resources (storage, networking, etc..) are offered and fastly delivered to customers on demand
- Generates the message or signal
- Protocol used to control which ports of a switch can learn MAC addresses
- Physical layout of the network
- To send a signal in all directions at the same time.
- Data compression technique
- Single certificate used to provide encryption to multiple sub domains
- Signal represented as a series of sine waves
- Each node is connected to a main cable or link
- Implementation used to reduced the size of an iBGP inside an AS
- In voice, time difference between actual and expected packet arrival
- Protocol extension to secure the DNS look up process
- Reduction in signal strength
- Platform on which virtual machines can run
- The medium for wireless communications
- Provides highest level of security and speed
- Worldwide system of computer networks
- Network security attack in which an impersonation of a device or user takes place
- Located within 3 geographical miles
- Type of topology that depicts how data flows through the network
Down
- Accepts data from and sends data to one or more directions on the network
- Rule for communication
- WiFi is a technology that falls under this category of connection type
- Obsolete routing protocol
- Microsoft implementation of NetBIOS name service
- Multichassis etherchannel solution
- Load balancing algorithm. It's dynamic version can contemplate how many requests each server/machine can handle
- Services make use of it to improve data locality to end users
- Private network that uses Internet technology to share information with vendors and customers
- This protocol's extension allows for traffic engineering
- Process of determining if someone or something is who he/it claims to be
- Type of network that encapsulate L2 over L3
- Regenerates the signal on the next leg of the network medium
- Graph algorithm used in routing
- The fastest transmission medium cannot avoid it
- Network that introduces an abstraction between the forwarding and control planes
- Process of coding a message for security purposes
- Eighth layer of the OSI model
- Telephone system
- Creates network standards
- Disturbance caused by electric or magnetic fields of one telecommunication signal crossing over onto another
- Network which uses 3rd party vendors to provide medium
- Method used to quantify VoIP quality
- used to share company information and resources among employees
- Effort to interrupt services of a host connected to a network
50 Clues: Telephone system • Rule for communication • Obsolete routing protocol • Creates network standards • Common medium for Ethernet • Data compression technique • Reduction in signal strength • Eighth layer of the OSI model • Physical layout of the network • Generates the message or signal • Graph algorithm used in routing • Multichassis etherchannel solution • ...
Tech Hunt Apratim2k19 2019-10-20
Across
- A simulated experience that can be similar to or completely different from the real world.
- A computer program that directly executes instructions written in a programming or scripting language, without requiring them previously to have been compiled into a machine language program.
- A process of inspecting, cleansing, transforming and modeling data with the goal of discovering useful information, informing conclusion and supporting decision-making.
- The name of the first computer build in 1945.
- CEO of Google's parent company, Alphabet Inc.
- Computers used primarily by large organizations for critical applications, bulk data processing.
- A software that conducts a conversation via auditory or textual methods.
- Any set of instructions that tells the hardware what to do and how to do it.
- A decentralized digital currency without a central bank or single administrator that can be sent from user to user on the peer-to-peer network without the need for intermediaries.
- A methodical process of finding a reducing the number of defects in a computer program.
- A collection of related network web resources, such as web pages, multimedia content, which are typically identified with a common domain name, and published on at least one web server.
Down
- The central core of a computer's operating system.
- A program that runs in the context of a browser.
- A graphical representation of a text that may include different typeface,size,design,etc.
- Any type of software that is designed to damage your computer or gain unauthorized access to your personal information.
- It is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language
- A growing list of records that are linked using cryptography.
- It was an early packet-switching network and the first network to implement the TCP/IP protocol suite which laid the technical foundation of the Internet.
- A boundary across which two independent systems meet.
- A combined device for modulation and demodulation.
- Different ways of, implicitly or explicitly, changing an entity of one data type into another.
- A compact disk on which a large amount of digitized read-only data can be stored.
- A Function that calls itself.
- A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data.
- A short term given to a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
25 Clues: A Function that calls itself. • The name of the first computer build in 1945. • CEO of Google's parent company, Alphabet Inc. • A program that runs in the context of a browser. • The central core of a computer's operating system. • A combined device for modulation and demodulation. • A boundary across which two independent systems meet. • ...
BA520 - Summer 2017 2017-08-12
Across
- Key field which is the unique identifier for all information in any row of a given database table
- Free website that allows companies to find and compare business software using a "pay-per-click" business model
- Parallel areas in a BPM which separate the steps performed by different actors
- Contracting out a business process and/or non-core operational function to an outside party
- Small file deposited on a hard drive when a user visits a website
- Cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
- Software as a Service
- Random Access Memory
- Virtual Private Network
- Entity Relationship Diagram
- National Institute of Standards and Technology
- Microsoft Cloud PaaS and SaaS Offering
- Network device that monitors & blocks allows incoming/outoging network traffic based on security rules
- Service Level Agreement
- Trusted entity that issues electronic documents which verify digital entities on the Internet
- Free Cloud-based collaboration platform and software suite
- Radio Frequency Identification
- Decision Support System
- Stand-alone application designed to run on a specific platform & device
- Certifies the ownership of a public key
- Purposeful disruption of the activities of a state or organization using computer technology
- Malicious software programs such as viruses, worms, and Trojan horses that can steal or destroy data
- One trillion bytes of data
- Storage Area Network
- In-memory database software and analytics for fast, massive data processing
- Data Flow Diagram
- Internet of Things
Down
- Metaphor for the Internet
- Public Key Infrastructure
- Interrelated components that collect/process/publish information for operations, innovation, decision-making
- Set of processes in an organization to create, store, transfer, & apply knowledge
- Management Information Systems
- Tracking click behavior history of users on websites to understand their interest/intentions and expose them to advertisements uniquely suited to them
- Using social networking platforms & internal social tools to engage employees, customers, suppliers
- Enterprise Resource Planning
- Disciplined thinking that is clear, rational, open-minded, and informed by evidence
- Process that streamlines complex data to minimize redundancy and simplify relationships
- Attempting to obtain sensitive information for malicious reasons by disguising as a trustworthy entity
- Interlinked activities that convert inputs to outputs; add to bottom line; help create competitive advantage
- Computer speed of one trillion floating point operations per second
- Competitive Forces Model
- The principle of treating all data on the Internet without discrimination or preference
- Software Development Life Cycle
- Finding hidden patterns/relationships in large databases; infers rules to predict future behavior
- Cognitive computing platform from IBM
- Amazon Web Services
- Total Cost of Ownership
- Business Process Management
- Open-source software framework that enables distributed parallel processing of a huge amount of data across inexpensive computers
49 Clues: Data Flow Diagram • Internet of Things • Amazon Web Services • Random Access Memory • Storage Area Network • Software as a Service • Virtual Private Network • Service Level Agreement • Decision Support System • Total Cost of Ownership • Competitive Forces Model • Metaphor for the Internet • Public Key Infrastructure • One trillion bytes of data • Entity Relationship Diagram • ...
BA520 - Summer 2017 2017-08-12
Across
- Cognitive computing platform from IBM
- Service Level Agreement
- Parallel areas in a BPM which separate the steps performed by different actors
- Interrelated components that collect/process/publish information for operations, innovation, decision-making
- Computer speed of one trillion floating point operations per second
- The principle of treating all data on the Internet without discrimination or preference
- Enterprise Resource Planning
- Interlinked activities that convert inputs to outputs; add to bottom line; help create competitive advantage
- Finding hidden patterns/relationships in large databases; infers rules to predict future behavior
- Stand-alone application designed to run on a specific platform & device
- Set of processes in an organization to create, store, transfer, & apply knowledge
- In-memory database software and analytics for fast, massive data processing
- Cloud-based ERP software provider to the distribution, retail, manufacturing, and service industries
- Software as a Service
- Trusted entity that issues electronic documents which verify digital entities on the Internet
- Key field which is the unique identifier for all information in any row of a given database table
- Online collaboration software for creating business and technical diagrams
- Using social networking platforms & internal social tools to engage employees, customers, suppliers
- Free website that allows companies to find and compare business software using a "pay-per-click" business model
- Amazon Web Services
- Business Process Management
- Microsoft Cloud PaaS and SaaS Offering
- Internet of Things
- Entity Relationship Diagram
Down
- Small file deposited on a hard drive when a user visits a website
- Metaphor for the Internet
- Competitive Forces Model
- Process that streamlines complex data to minimize redundancy and simplify relationships
- Malicious software programs such as viruses, worms, and Trojan horses that can steal or destroy data
- Random Access Memory
- Management Information Systems
- Free Cloud-based collaboration platform and software suite
- Total Cost of Ownership
- Open-source software framework that enables distributed parallel processing of a huge amount of data across inexpensive computers
- Network device that monitors & blocks allows incoming/outoging network traffic based on security rules
- Purposeful disruption of the activities of a state or organization using computer technology
- Tracking click behavior history of users on websites to understand their interest/intentions and expose them to advertisements uniquely suited to them
- Radio Frequency Identification
- Virtual Private Network
- National Institute of Standards and Technology
- Attempting to obtain sensitive information for malicious reasons by disguising as a trustworthy entity
- Disciplined thinking that is clear, rational, open-minded, and informed by evidence
- Contracting out a business process and/or non-core operational function to an outside party
- Software Development Life Cycle
- Decision Support System
- One trillion bytes of data
- Storage Area Network
- Public Key Infrastructure
- Data Flow Diagram
49 Clues: Data Flow Diagram • Internet of Things • Amazon Web Services • Random Access Memory • Storage Area Network • Software as a Service • Service Level Agreement • Total Cost of Ownership • Virtual Private Network • Decision Support System • Competitive Forces Model • Metaphor for the Internet • Public Key Infrastructure • One trillion bytes of data • Business Process Management • ...
Technology Terms 2023-08-16
Across
- A point within a network that interconnects with other networks
- currently connected to a network or to the Internet.
- A set of interconnected networks that allow computers in different locations to exchange information. The Internet includes services such as the world wide web, electronic mail, file transfer protocol (FTP), chat and remote access to networks and computers
- refers to unsolicited email messages sent for marketing purposes
- A piece of code or data created by a web server and stored on a user's computer.
- a standard or set of rules that computers and other devices use when communicating with one another.
- A measure of computer processor storage and real and virtual memory
- a microprocessor that performs many functions and calculations that make your computer run
- refers to a software program that has been developed to do harm to other computers.
- the most common way of connecting computers on a network with a wired connection.
- a way of sending messages over the internet.
- a saved link to a particular Web page
- the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet
- o load and initialize the operating system on a computer
- A software program that allows you to surf the web
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider
Down
- the number of distinct pixels that make up the display on a computer monitor. It is denoted in DPI (dots per inch)
- a website's text and information, as opposed to its design and structure
- measures designed to protect your computer, device or network from cybercrime
- the smallest unit of measurement in computing
- a device that allows computers to transmit information to each other via ordinary telephone lines
- the maximum amount of data that can travel a communications path in a given time
- the brains of your computer. It is responsible for performing calculations and tasks that make programs work
- he reduction of the size of a file
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet
- to archive and compress them into one file of smaller size using a program
- a piece of programming code inserted into other programming to cause damage
- the process of converting electronic data to an unrecognizable or encrypted form, one that cannot be easily understood by unauthorized parties
- a set of computers on a network that are managed as a unit
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- a technology that allows computers and other devices to communicate via a wireless signal
31 Clues: he reduction of the size of a file • a saved link to a particular Web page • a way of sending messages over the internet. • the smallest unit of measurement in computing • A software program that allows you to surf the web • currently connected to a network or to the Internet. • o load and initialize the operating system on a computer • ...
AI Practical Work 2 2021-12-17
Across
- Uninformed search algorithm that aims to find a path to the goal node which has the lowest cumulative cost.
- Biological correspondent of the weights in an artificial neural network.
- Logic programming language associated with artificial intelligence and computational linguistics.
- Finite sequence of well-defined computer instructions to solve a computation problem.
- Computer program developed by DeepMind that uses machine learning (artificial neural networks) to identify the best moves to win the board game “Go”.
- Elementary unit of an artificial neural network.
- Restricted Boltzmann Machine: generative stochastic artificial neural network that can learn a probability distribution over its set of inputs.
- Interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers.
- Interdisciplinary branch of computer science and engineering. It involves design, construction, operation, and use of robots and has as its goal to design machines that can help and assist humans.
- Realistic humanoid robot designed for research, education, and entertainment, and helps promote public discussion about Artificial Intelligence ethics and the future of robotics. Developed by the Hong Kong-based company Hanson Robotics.
- Branch of mathematics used to model the strategic interaction between different players in a context with predefined rules and outcomes.
- IBM’s question-answering computer system that is capable of answering questions posed in natural language.
- Type of machine learning and artificial intelligence that imitates the way humans gain certain types of knowledge.
- Type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
- Algorithm for supervised learning of artificial neural networks using gradient descent.
Down
- Computerized system composed of multiple interacting intelligent agents.
- Computing systems that are based on a collection of nodes that simulate the neurons in the human brain.
- Method of inquiry in artificial intelligence for determining whether or not a computer is capable of thinking like a human being.
- simulation of human intelligence processes by machines, especially computer systems.
- act of defining a problem; determining the cause of the problem; identifying, prioritizing, and selecting alternatives for a solution; and implementing a solution.
- Algorithm for supervised learning of binary classifiers.
- Learning rule that describes how the neuronal activities influence the connection between neurons.
- Artificial Immune Systems: machine learning systems inspired by theoretical immunology.
- Java Agent Development Framework: software framework for the development of an intelligent agent, implemented in Java.
- Fully connected network with each node connecting to every other node, including itself. The nodes compete against each other by sending out inhibiting signals to each other.
- Adaptive resonance theory: describes a number of neural network models which use supervised and unsupervised learning methods, and address problems such as pattern recognition and prediction.
26 Clues: Elementary unit of an artificial neural network. • Algorithm for supervised learning of binary classifiers. • Computerized system composed of multiple interacting intelligent agents. • Biological correspondent of the weights in an artificial neural network. • simulation of human intelligence processes by machines, especially computer systems. • ...
ICT crossword 2021-12-07
Across
- a conceptual framework used to describe the functions of a networking system
- describes the opportunity to establish a protected network connection when using public networks
- is a passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid medium
- the portion of a computer that retrieves and executes instructions.
- a computer connected to a network of other workstations called 'clients'.
- the component within your computer that allows you to store and access data on a long-term basis.
- an electrical device that supplies electric power to an electrical load
- a group of computers or other devices interconnected within a single, limited area, typically via Ethernet or Wi-Fi
- any type of computing hardware that is used for storing, porting or extracting data files and objects.
- any external device that provides input and output for the computer.
- instructions that tell a computer what to do
- a type of user interface through which users interact with electronic devices via visual indicator representations
- the main circuit board
- a software program manipulating or extracting data from a stored file.
- a machine or device that performs processes, calculations, and operations based on instructions from the software or hardware.
- existing information or knowledge is represented or coded in some form suitable for better usage or processing.
- a small computer that contains a microprocessor as its central processor.
- to the manner in which the links and nodes of a network are arranged to relate to each other
- an interface between a computer user and computer hardware
Down
- an identifier used as a suffix to a name of the computer file in an operating system
- a class of extremely powerful computers with high class performance
- the part of a computer that houses the primary devices that perform operations and produce results for complex calculations
- a person who utilizes a computer or network service.
- an established set of rules that determine how data is transmitted between different devices in the same network
- a circuit board that can be inserted in a computer to give extra facilities or memory
- computer that is intermediate in size between a laptop computer and a smartphone.
- processes commands to a computer program in the form of lines of text
- an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage
- computer hardware which is used to enter data for processing
- computer a large powerful computer which can be used by many people at the same time and which can do very large or complicated tasks.
- the computers short term memory
- the physical parts of a computer
32 Clues: the main circuit board • the computers short term memory • the physical parts of a computer • instructions that tell a computer what to do • a person who utilizes a computer or network service. • an interface between a computer user and computer hardware • computer hardware which is used to enter data for processing • ...
Coding Q2 2024-12-19
Across
- The results of the operation of a system. Example - a computer output could be information or signals produced or delivered.
- An object-oriented computer programming language commonly used to create interactive effects within web browsers.
- An instrument used for determining direction.
- A small image used to express an idea or emotion in digital communication.
- The process of reducing complexity by hiding unnecessary details to make it easier to think about a problem.
- A type of data in computing that a logical expression evaluates to. The only possible values for Boolean are True and False.
- Something put into a system, such as resources, information, or signals, in order to achieve a result.
- A placeholder in a device’s memory that stores a value a program is using.
- A device that responds to a physical stimulus (as heat, light, sound, pressure, magnetism, or a particular motion) and transmits a resulting impulse (as for measurement or operating a control).
- The person who observes or reviews each line of code in a computer program as it is typed when two programmers are working together.
- Code that is easy to read and understand its logic.
- The network of physical devices, vehicles, buildings, and other items that enable these objects to collect and exchange data.
- A numerical amount defined in an algebraic equation.
- The design of products or environments that can be used by all people without the need for adaptation or modifications.
Down
- Repeating process steps to continuously improve a work product.
- An antenna used to create a personal area network that uses low energy to power Bluetooth wireless technology.
- Two people working together to create a computer program. One person, called the driver, writes the code and explains the logic, while the other person, called the navigator, reviews it and gives feedback.
- A sequence of characters (letters, numerals, symbols, and punctuation marks).
- A method of transferring data by breaking it into small chunks called packets.
- An instrument used to measure acceleration.
- The person who writes the code in a computer program when two programmers are working together.
- Any type of calculation that follows a well-defined process like an algorithm.
- An output device that controls precise position or speed.
- Data that ranges on a continuous scale.
- The execution of one pass of a loop.
- The period when a program is running. Runtime begins when a program is opened (or executed) and ends when the program is closed.
- A type of motor or servo that is responsible for moving or controlling a mechanism or components.
- A block of code that is triggered when a certain event happens.
- A chip that processes information and data from input and delivers information or data as an output.
- Data represented as either yes/no or true/false.
30 Clues: The execution of one pass of a loop. • Data that ranges on a continuous scale. • An instrument used to measure acceleration. • An instrument used for determining direction. • Data represented as either yes/no or true/false. • Code that is easy to read and understand its logic. • A numerical amount defined in an algebraic equation. • ...
Group 2024-11-03
Across
- Superhero team from Marvel Comics
- British public broadcaster known for news and documentaries
- Organization and magazine known for its nature and science content
- Human rights organization advocating for global justice
- U.S. news network known for 24-hour news coverage
- British rock band famous for "Bohemian Rhapsody" and "We Will Rock You"
- Renowned U.S. institution known for its MBA program
- Military alliance focused on collective defense and security
- Electric vehicle manufacturer founded by Elon Musk
- K-pop girl group popular for songs like "Kill This Love" and "How You Like That"
- Entertainment giant known for animated films and theme parks
- Creator of Windows OS and Office software
- United Nations agency providing aid to children worldwide
- United Nations health agency known for global health initiatives
- Premier League football club based at Old Trafford
- Major professional American football league in the U.S.
- South Korean pop group known for its global fanbase and chart-topping songs
- International organization that governs football worldwide
- Organization aimed at global economic stability and growth
- Search engine giant known for internet services and technology innovation
- Famous Spanish soccer team with a history of La Liga victories
- Spanish football club with numerous Champions League titles
- Family musical act that launched Michael Jackson's career
- Research lab at a renowned U.S. university, exploring tech and media
Down
- Tech company behind the iPhone, iPad, and MacBook
- Superhero team featuring Superman, Batman, and Wonder Woman
- British girl group from the '90s with "Wannabe" as a famous hit
- North American professional basketball league
- Major e-commerce and cloud computing company founded by Jeff Bezos
- Iconic British rock band with Mick Jagger as the frontman
- U.S. space agency responsible for moon landings and Mars missions
- British rock band known for "Yellow" and "Fix You"
- Global organization aimed at promoting peace and cooperation
- Humanitarian organization providing emergency assistance worldwide
- Group of museums and research institutions based in Washington, D.C.
- U.S. research lab known for space exploration and Mars rovers
- AI research lab behind advances in artificial intelligence
- International humanitarian medical organization
- Global organization focused on wildlife conservation
- International financial institution supporting economic development
- Legendary British rock band from Liverpool, known for "Hey Jude" and "Let It Be"
- Animation studio famous for movies like "Toy Story" and "Finding Nemo"
- News agency known for global news reporting
- Japanese car manufacturer known for reliability and hybrid technology
- Irish rock band with Bono as the lead vocalist
- Streaming service known for producing original series and films
- Major film and entertainment company behind Looney Tunes and DC Comics
- Environmental organization known for its activism in conservation
- Swedish pop group known for hits like "Dancing Queen" and "Mamma Mia"
- Animation studio behind "Shrek" and "Kung Fu Panda"
50 Clues: Superhero team from Marvel Comics • Creator of Windows OS and Office software • News agency known for global news reporting • North American professional basketball league • Irish rock band with Bono as the lead vocalist • International humanitarian medical organization • Tech company behind the iPhone, iPad, and MacBook • ...
Digital Marketing Ch. 3 2025-03-19
Across
- a decentralized digital currency that utilizes blockchain technology.
- a business model where retailers or wholesalers offer goods and services online.
- original digital assets, like artwork, music, or other digital goods, that are created using blockchain.
- paid media in which content follows the form and function of the site on which it is placed, not traditional advertising formats.
- sets of rules that are written and stored on the blockchain that are automatically executed once the defined conditions in the contract are met.
- a type of community model that is used to obtain needed resources, including financing, by soliciting from a community instead of traditional funding sources.
- buying and selling goods and services online.
- a business model that offers incentives to partner websites, wherein a website agrees to post a link (through an ad or other content) to a transactional site in return for a commission on sales made as a direct result of the link.
- a business model where businesses create value by facilitating interactions between external producers and consumers.
- business model that delivers products, services, and content for a set fee.
- a business model that brings buyers and sellers together to exchange goods and services, often in exchange for a fee or commission.
- business model that delivers services or content on a metered or “pay-as-you-go” basis.
- a type of business model that utilizes the network effects of the internet to connect like-minded individuals and groups.
- the processes by which a business creates value, provides value to its customers, and captures value in the form of profits.
Down
- a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.
- applications, such as smart contracts, that are developed on blockchains.
- a description of the customer value delivered to a specific target market.
- a business model that bypasses intermediaries such as wholesalers and manufacturers’ reps in the channel of distribution; direct from manufacturer to customer.
- intermediaries in channels of distribution that specialize in the capture, analysis, application, and distribution of information.
- the first cryptocurrency.
- a decentralized blockchain with smart contract functionality. Ether is the native cryptocurrency of the platform.
- a quick change from one business model to another. It is usually applied to start-ups that can make rapid model changes that may be impossible for entrenched business models of large enterprises.
- the fee required to conduct a transaction on Ethereum. These fees are paid to miners who use their computing power to validate blockchain transactions (i.e., those running the computations).
- a business model where businesses create value by controlling a linear series of activities (the classic value-chain mode). The inputs at one end of the chain undergo a series of steps that transform them into a finished product to create value. Value is produced upstream and consumed downstream.
24 Clues: the first cryptocurrency. • buying and selling goods and services online. • a decentralized digital currency that utilizes blockchain technology. • applications, such as smart contracts, that are developed on blockchains. • a description of the customer value delivered to a specific target market. • ...
Big Money, Immigration, and Urbanization 2022-10-22
Across
- informal, unwritten agreement backed only integrity of the country party to actually abide by its terms.
- NYC Political Organization was founded in 1786.
- was One of the first industrial moguls to go from rags to riches with the purchase of stock.
- American Politician who systematically plundered NYC with sums estimated between 30 million and 200 Million.
- Inspection station for immigration arriving on the West Coast.
- Company buys out all of its competition.
- Established a merit-based system of selecting government officials and supervising their work.
- American company and corporate trust from 1870 to 1911, controlling all oil production
- Policy or attitude of letting things take their own course, without interfering.
- union members work together to negotiate and enforce a contract with management about things they care about.
- American socialist member of the industrial workers of the world.
- was a Progressive social reformer and activist. She was a pioneer social worker, feminist, and internationalist.
- Self-made multimillionaire and one of the wealthiest Americans.
- Antitrust Act that limited federal government's power/growth.
- Formed trusts and gained control of the oil industry with his standard oil company
- Political Party promoting the interest of native inhabitants against the of immigrants, supporting immigration restriction measures.
- computing companies put control of their business under a single group of trustees.
Down
- owners and top-level executives of monopolies profit greatly, small companies/businesses have no chance to make money.
- Came from Southern and Eastern Europe unskilled, poor, and Jewish.
- Carnegie argued that extremely wealthy Americans had a responsibility to spend their money in order to benefit the greater good.
- Labor protest rally near Chicago's haymarket square turned into a riot someone threw a bomb at the police.
- Company grows its operations at the same level in an industry.
- Scientist an engineer credited with patenting the first practical telephone.
- believe in ¨survival of the fittest¨ idea that certain people become powerful in society because they are innately better.
- Prohibited immigration by Chinese laborers, limited Civil Rights, and forbade naturalization.
- Came mainly from Northern and Central Europe mostly protestant.
- Inspection station for immigration arriving on the East Coast
- Key component of the supply chain that the company has previously contracted.
- Prolific inventor and savvy businessman.
- A tenement building formerly common in NYC and having a long narrow plan characterized by two narrow air wells at each side.
- Inventor and engineer developed the first process for manufacturing steel inexpensively.
- Used holding companies to buy stocks, took over, and merged people's businesses.
- Illegal to form a trust that is interested in trade.
- Produces and sells flat-rolled and tubular steel products primarily in North America and Europe.
- Support, encouragement, privilege, or financial aid that an organization or individual bestows on another.
35 Clues: Company buys out all of its competition. • Prolific inventor and savvy businessman. • NYC Political Organization was founded in 1786. • Illegal to form a trust that is interested in trade. • Inspection station for immigration arriving on the East Coast • Antitrust Act that limited federal government's power/growth. • ...
AWS Practitioner exam 2022-12-02
Across
- To achieve 99.5% uptime, the best solution for a company would be deploying their applications across multiple____.
- It is an AWS service that provides on-demand access to AWS security and compliance reports and select online agreements.
- One of the benefits of cloud computing with AWS is trading capital expense for ____ expense.
- True or False: AWS responsible for the operating system, network & firewall configuration.
- Which extension is being used for PowerShell scripts?
- Typically, events are updated in CloudTrail within how many minutes?
- To allow public traffic from the internet to access your VPC, what do you need to attach to your VPC?Internet ___ ?
- What is the other name for on-premises deployment? ___ cloud.
- Which site does Amazon CloudFront use to cache copies of content for faster delivery to users at any location? ____ location.
- Who is responsible for AWS foundation services such as compute, storage, and database? Customer or AWS?
- Which service allows for the collection and tracking of metrics for AWS services? Amazon___ Watch.
- Which type of storage is more expensive, Standard Storage or Glacier Deep Archive Storage?
- It is a service that provides object-level storage. It is called Amazon ___ bucket
- True or False. On-Ramp Support Plan provides an access to pool of Technical Account Managers (TAMs) and Concierge Support Team
- The ____ pillar is the ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.
Down
- AWS Certified Cloud Practitioner exam includes how many domains?
- Fill in the blank. AWS ___ is a curated digital catalog that customers can use to find, buy, deploy, and manage third-party software, data, and services to build solutions and run their businesses.
- It is a service that provides block-level storage volumes that you can use with Amazon EC2 instances. It is called AWS ___ ?
- AWS Snow Family is composed of: AWS Snowcone, AWS Snowball, and AWS_____.
- In AWS data is stored as objects within the buckets. What is the limit on a single object? Five GB, TB,PB,or EB?
- Fill in the blank. The data needs to be protected at rest and in ____.
- What is AWS Elastic Beanstalk used for? ___ applications.
- What is the minimum percentage score to pass AWS Certified Cloud Practitioner exam?
- Name the second level of protection for AWS Shield.
- Name the first level of protection of AWS Shield.
- Which of the support plans provides <15 minutes response time for mission-critical issues?
- Amazon Route 53 is Amazon ___ web service.
- Which AWS networking service enables a company to create a virtual network within AWS? Amazon ___.
- What are the six AWS CAF perspectives? Business, ______, Governance, Platform, Security, Operations
- It protects web apps running on the AWS cloud from common web exploits.
- It is best practice to use the root user to create first IAM user and assign it permissions to create other users
- Is Amazon EC2 IaaS, PaaS, or SaaS?
32 Clues: Is Amazon EC2 IaaS, PaaS, or SaaS? • Amazon Route 53 is Amazon ___ web service. • Name the first level of protection of AWS Shield. • Name the second level of protection for AWS Shield. • Which extension is being used for PowerShell scripts? • What is AWS Elastic Beanstalk used for? ___ applications. • What is the other name for on-premises deployment? ___ cloud. • ...
Famous Black Inventors 2024-02-27
Across
- American ophthalmologist and humanitarian. She became the first female member of the Jules Stein Eye Institute, the first woman to lead a post-graduate training program in ophthalmology, and the first woman elected to the honorary staff of the UCLA Medical Center.
- American inventor, businessman, and community leader. His most notable inventions were a type of three-way traffic light, and a protective 'smoke hood' notably used in a 1916 tunnel construction disaster rescue.
- American inventor who held more than 50 patents in the United States. He was the first African American mechanical and electrical engineer after the Civil War. Self-taught, he concentrated most of his work on trains and streetcars.
- American inventor most noted for her development of the adjustable sanitary belt. Kenner received five patents, which includes a carrier attachment for invalid walker and bathroom tissue holder.
- American naturalist, mathematician, astronomer and almanac author. A landowner, he also worked as a surveyor and farmer.
- American inventor and businessman, best known for being awarded a patent for automatically opening and closing elevator doors. He was awarded U.S. patent 371,207 on October 11, 1887.
Down
- American inventor to receive a US patent. He was born in Glen Ross, Maryland, United States, in 1807. His first invention was the Seed-Planter, patented October 14, 1834, which allowed farmers to plant more corn using less labor and in a shorter time.
- American inventor. On April 26, 1892, she obtained United States patent number 473,563 for her improvements to the ironing board. Boone's ironing board was designed to improve the quality of ironing the sleeves and bodies of women's garments.
- American inventor, aerospace engineer, and entrepreneur, whose work includes a U.S. Air Force-term of service and a twelve-year stint at NASA, where he worked at the Jet Propulsion Laboratory.
- American inventor and computer engineer. He developed the ISA bus, and he led a design team for making a one-gigahertz computer processor chip. He holds three of nine PC patents for being the co-creator of the IBM personal computer released in 1981.
- American inventor and engineer. His inventions include electrical resistors used in computing, missile guidance, and pacemakers.
- Second African American inventor and acoustician. He holds over 250 foreign and U.S. patents for the production and design of microphones and techniques for creating polymer foil electrets.
12 Clues: American naturalist, mathematician, astronomer and almanac author. A landowner, he also worked as a surveyor and farmer. • American inventor and engineer. His inventions include electrical resistors used in computing, missile guidance, and pacemakers. • ...
computer vocab 2 2017-03-03
Across
- printer Printing A 3D printer is a computer-aided manufacturing (CAM) device that creates three-dimensional objects. ... 3D printers use a process called additive manufacturing to form (or "print") physical objects layer by layer until the model is complete.Jan 2, 2014
- Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
- A scanner is an input device that scans documents and images, which can be imported into a computer. They are available in flatbed or sheet-fed versions and are usually connected via a high-speed USB port. OCR software can be used to recognize text documents imported from a scanner.Jan 23, 2009
- A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
- CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- A router [a] is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another router through the networks that constitute the internetwork until it reaches its destination node.
- JPEG. Stands for "Joint Photographic Experts Group." JPEG is a popular image file format. ... Still, the compression algorithm is lossy, meaning some image quality is lost during the compression process.Jul 26, 2016
- The most widely used local area network (LAN) technology. Defined as the 802.3 standard by the IEEE, the Ethernet access method is used to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access.
- Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible
- The term "format" has several meanings, related to 1) disk formatting, 2) page formatting, and 3) file formats. 1) Disk formatting. In order for storage media, such as a hard drive or flash drive to be recognized by your computer, it first needs to be initialized, or "formatted."Jan 20, 2010
- DNS. (Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
- a unit of memory or data equal to 1,024 (210) bytes.
Down
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
- In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
- In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers. As the term implies, the speed in bps is equal to the number of bits transmitted or received each second.
- A computer network or data network is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- The data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- home page - Computer Definition. Also known as page and Web page. A document that serves as a starting point on a Web site. A home page typically contains hypertext and navigation buttons that allows the user to navigate the site by clicking them with a mouse and invoking hyperlinks to other pages and even other sites.
- A cursor is the position indicator on a computer display screen where a user can enter text. In an operating system with a graphical user interface (GUI), the cursor is also a visible and moving pointer that the user controls with a mouse, touch pad, or similar input device.
- URL is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
- When used to describe data storage, 1,024 megabits. (2) When used to describe data transfer rates, it refers to 10 to the 9th power (1,000,000,000) bits. Gigabit is abbreviated Gb, as opposed to gigabyte, which is abbreviated GB.
- While this term originally referred to a clever or expert programmer, it is now more commonly used to refer to someone who can gain unauthorized access to other computers. A hacker can "hack" his or her way through the security levels of a computer system or network.
- A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
25 Clues: a unit of memory or data equal to 1,024 (210) bytes. • a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web. • Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible • ...
computer vocab 2 2017-03-03
Across
- CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
- A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
- The most widely used local area network (LAN) technology. Defined as the 802.3 standard by the IEEE, the Ethernet access method is used to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access.
- URL is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
- JPEG. Stands for "Joint Photographic Experts Group." JPEG is a popular image file format. ... Still, the compression algorithm is lossy, meaning some image quality is lost during the compression process.Jul 26, 2016
- Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
- a unit of memory or data equal to 1,024 (210) bytes.
- While this term originally referred to a clever or expert programmer, it is now more commonly used to refer to someone who can gain unauthorized access to other computers. A hacker can "hack" his or her way through the security levels of a computer system or network.
- A scanner is an input device that scans documents and images, which can be imported into a computer. They are available in flatbed or sheet-fed versions and are usually connected via a high-speed USB port. OCR software can be used to recognize text documents imported from a scanner.Jan 23, 2009
- A router [a] is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another router through the networks that constitute the internetwork until it reaches its destination node.
- The term "format" has several meanings, related to 1) disk formatting, 2) page formatting, and 3) file formats. 1) Disk formatting. In order for storage media, such as a hard drive or flash drive to be recognized by your computer, it first needs to be initialized, or "formatted."Jan 20, 2010
Down
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- printer Printing A 3D printer is a computer-aided manufacturing (CAM) device that creates three-dimensional objects. ... 3D printers use a process called additive manufacturing to form (or "print") physical objects layer by layer until the model is complete.Jan 2, 2014
- The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- When used to describe data storage, 1,024 megabits. (2) When used to describe data transfer rates, it refers to 10 to the 9th power (1,000,000,000) bits. Gigabit is abbreviated Gb, as opposed to gigabyte, which is abbreviated GB.
- The data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- home page - Computer Definition. Also known as page and Web page. A document that serves as a starting point on a Web site. A home page typically contains hypertext and navigation buttons that allows the user to navigate the site by clicking them with a mouse and invoking hyperlinks to other pages and even other sites.
- In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
- In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers. As the term implies, the speed in bps is equal to the number of bits transmitted or received each second.
- DNS. (Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
- A cursor is the position indicator on a computer display screen where a user can enter text. In an operating system with a graphical user interface (GUI), the cursor is also a visible and moving pointer that the user controls with a mouse, touch pad, or similar input device.
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
- A computer network or data network is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible
25 Clues: a unit of memory or data equal to 1,024 (210) bytes. • a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web. • Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible • ...
Vocabulary 2017-06-21
Across
- To restart a computer. In DOS, you can reboot by pressing the Alt, Control and Delete keys simultaneously. This is called a warm boot. You can also perform a cold boot by turning the computer off and then on again. On a PC running Microsoft Windows you reboot by selecting the "Shut Down" option from the Start menu.
- When not referring to the tasty potted meat product, spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers, complicating the process of tracking down the spammers.
- A desktop computer is a personal computer that fits on or under a desk. They usually consist of a monitor, keyboard, mouse and either a horizontal or vertical (tower) form factor. Unlike a laptop, which is portable, a desktop computer is meant to stay at one location.
- There are many different types of servers. For example: File server: a computer and storage device dedicated to storing files. Any user on the network can store files on the server. Print server: a computer that manages one or more printers, and a network server is a computer that manages network traffic.
- abbreviation for central processing unit sometimes referred to simply as the central processer the CPU is the brains of the computer.
- System-the software the supports a computers basic functions such as scheduling tasks executing applications and controlling peripherals
- A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include as well, data files, or the "boot" sector of the hard drive.
- Computer hardware is the collection of physical parts of a computer system. This includes the computer case, monitor, keyboard, and mouse. It also includes all the parts inside the computer case, such as the hard disk drive, motherboard, video card, and many others. Computer hardware is what you can physically touch.
- observe and check the progress or quality of something over a period of time
- A computer mouse is an input device that is most often used with a personal computer. Moving a mouse along a flat surface can move the on-screen cursor to different items on the screen. Items can be moved or selected by pressing the mouse buttons (called clicking).
- external flash drive, small enough to carry on a key ring, that can be used with any computer that has a USB port.
- Wide Web-The Web, or World Wide Web (W3), is basically a system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to other documents, as well as graphics, audio, and video files.
- A file is an object on a computer that stores data, information, settings, or commands used with a computer program. In a graphical user interface (GUI) such as Microsoft Windows, files display as icons that relate to the program that opens the file.
Down
- When talking about file systems, a folder (also called directory, or catalog) is a way to organize computer files. A folder is a storage space that many files can be placed into to group them together and organize the computer. A folder can also contain other folders.
- an electronic device for storing and processing data typically in binary form according to instructions given to it in a variable program.
- Flash Drive- an external flash drive, small enough to carry on a key ring, that can be used with any computer that has a USB port.
- Short for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves.
- in computing, a computer keyboard is a typewriter-style device which uses an arrangement of buttons or keys to act as a mechanical lever or electronic switch. Following the decline of punch cards and paper tape, interaction via teleprinter-style keyboards became the main input device for computers.
- In a computer's graphical user interface ( GUI ), an icon (pronounced EYE-kahn ) is an image that represents an application, a capability, or some other concept or specific entity with meaning for the user. An icon is usually selectable but can also be a nonselectable image such as a company's logo.
- The Internet is not synonymous with World Wide Web. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.
- In computing, a crash (or system crash) occurs when a computer program, such as a software application or an operating system, stops functioning properly and exits. ... In earlier personal computers, attempting to write data to hardware addresses outside of the system's main memory could cause hardware damage.
- Drive-Definition of: hard drive. hard drive. The primary computer storage device, which spins, reads and writes one or more fixed disk platters. The terms "hard drive" and "hard disk" are synonymous; however, a "drive" technically refers to the entire unit that holds one or more "disk" platters.
- In computer networks, to download is to receive data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar systems. This contrasts with uploading, where data is sent to a remote server.
- Computer Definition. Also known as Web browser. A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data.
- The term virtual is popular among computer scientists and is used in a wide variety of situations. In general, it distinguishes something that is merely conceptual from something that has physical reality. For example, virtual memory refers to an imaginary set of locations, or addresses, where you can store data.
25 Clues: observe and check the progress or quality of something over a period of time • external flash drive, small enough to carry on a key ring, that can be used with any computer that has a USB port. • Flash Drive- an external flash drive, small enough to carry on a key ring, that can be used with any computer that has a USB port. • ...
Part 1: AP Computer Principles 2018-08-30
Across
- Everything we see and hear is a continuous transmission of information to our senses.
- is an organized and functionality based set of related interfaces and classes
- any letter, number, space, punctuation mark, or symbol that can be typed on a computer
- a simple routing technique in computer networks where a source or node sends packets through every outgoing link.
- defines a category of tools and solutions that focus on detecting, investigating, and mitigating suspicious activities and issues on hosts and endpoints.
- the process of converting ciphertext back to plaintext
- refers to an enterprise data storage entity into which data has been specifically partitioned for an analytical or reporting purpose
- are often used to measure the size of large files.
- a program that monitors transactions from one stage to the next, ensuring that each one completes successfully
- appear to be identical to unencrypted packets and are easily routed through any IP network.
- a facility used to house computer systems and houses computing facilities routers, firewalls, etc.
- a list of items that are granted access to a certain system or protocol.
- Stands for "Uniform Resource Locator." the address of a specific webpage or file on the Internet.
- these small little dots are what make up the images on computer displays
- the process of representing data in a visual and meaningful way so that a user can better understand it
- the number of transistors placed in an integrated circuit or chip doubles approximately every two years.
- Stands for "American Standard Code for Information Interchange." It provides a standard way to represent characters using numeric codes
- reduces a file's size with no loss of quality
- refers to a collection of systems used to protect the copyrights of electronic media
- refers to a collection of multiple pieces of equipment involved in the dissemination of information
- a signal that is being used to represent data as a sequence of discrete values
- used to describe the process of representing 3-dimensional objects in a computer
- used to describe the resolution of digital cameras.
- refers to methods of organizing units of data within larger data sets.
- any computing hardware that is used for storing, porting and extracting data files and objects.
- a dot matrix data structure that represents a generally rectangular grid of pixels
- information processed or stored by a computer
- refers to preventative methods used to protect information from being stolen, compromised or attacked.
- the cultural and natural resources accessible to all members of a society
- the process of converting data to an unrecognizable or "encrypted" form
- smallest unit of data in a computer
- a device that reads, writes, and deletes data to a disk.
- contains the applications the user is working on
Down
- describes other data about a certain item’s content
- a small amount of data sent over a network, such as a LAN or the Internet
- a set of instructions designed to perform a specific task
- contains the applications that are behind the scenes
- stores recently used information so that it can be quickly accessed at a later time.
- a list of applications that are denied of access to a certain system
- consists of multiple devices that communicate with one another.
- the science of protecting information by transforming it into a secure format.
- the process of analyzing large amounts of data in order to discover patterns and other information
- another word for question
- the ownership of intangible and non-physical goods, such as an idea, name, content, etc,
- a programming language designed for the visual arts community
- Encrypted text
- a term used to describe unsightly debris that accrues as a result of the experience of digital living
- a small chip that resides in computers and other electronic devices.
- a unique address that identifies a device on the Internet
- any process in which information is gathered and expressed in a summary form
- the process of receiving data over the Internet
- the process of generating a final digital product from a specific type of input
- the use of dedicated websites and applications to interact with other users,
- a database that is located, stored, and maintained in a single location.
- is a collection of tables with unknown relationships gathered to serve a specific purpose
- a numeric system that only uses two digits — 0 and 1
- an automated program that runs over the Internet
- a file or collection of information and details about a particular person or subject
- acts as a barrier between a trusted system or network and outside connections, such as the Internet.
- results in lost data and quality from the original version.
- an outdated symmetric-key method of data encryption
- a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology
- refers to applications and services offered over the Internet
- an electronic medium used to form a global computer network to facilitate online communication.
- junk e-mail or irrelevant postings to a newsgroup or bulletin board.
- a digital telecommunications network which allows nodes to share resources
- Stands for "Hypertext Markup Language." the language used to create web pages.
- Includes the owner's public key and is signed by a trusted Certification Authority
- convert and store information in a digital file format.
- often used to measure storage capacity.
- the primary location from where data comes.
- expressed as series of the digits 0 and 1
- a system used to track objects, people, or animals using tags that respond to radio waves
- a central file storage location.
- stands for "Optical Character Recognition." OCR is a technology that recognizes text within a digital image.
- a type of RAM that stores each bit of data on a separate capacitor
76 Clues: Encrypted text • another word for question • a central file storage location. • smallest unit of data in a computer • often used to measure storage capacity. • expressed as series of the digits 0 and 1 • the primary location from where data comes. • reduces a file's size with no loss of quality • information processed or stored by a computer • ...
Ap Computer Principles (Part 1) 2018-09-04
Across
- a numeric system that only uses two digits — 0 and 1
- also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it
- a type of denial of service (DoS) attack that sends a series of "SYN" messages to a computer, such as a web server
- the process of receiving data over the Internet
- the protection of computer systems from theft of or damage to their hardware
- an automated program that runs over the Internet
- the class of data encoding methods that uses inexact approximations and partial data
- An IP address, or simply an "IP," is a unique address that identifies a device on the Internet
- A megabyte is 106 or 1,000,000 bytes
- the language used to create webpages
- a dot matrix data structure that represents a generally rectangular grid of pixels
- a digital telecommunications network which allows nodes to share resources
- a technology that recognizes text within a digital image
- any process in which information is gathered and expressed in a summary form
- is a database that is located, stored, and maintained in a single location
- the study of visual representations of abstract data to reinforce human cognition
- smallest unit of data in a computer
- a list of applications that are denied of access to a certain system
- Stands for "American Standard Code for Information Interchange." ASCII character encoding provides a standard way to represent characters using numeric codes
- An algorithm is a set of instructions designed to perform a specific task
- A megapixel is one million pixels
- Cryptography is the science of protecting information by transforming it into a secure format
- an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware
- any letter, number, space, punctuation mark, or symbol that can be typed on a computer
- a central file storage location
- the process of analyzing large amounts of data in order to discover patterns and other information
- the process of putting/ converting data into a sequence of characters and symbols into a specialized format
- refers to a collection of systems used to protect the copyrights of electronic media
- A dossier is a collection of papers or other sources, containing detailed information about a particular person or subject
- a symmetric-key block cipher
- Rendering is the process of generating a final digital product from a specific type of input
- the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand
- a term used to describe unsightly debris that accrues as a result of the experience of digital living
- the basic unit of programmable color on a computer display or in a computer image
- - Metadata describes other data about a certain item’s content
Down
- counts as a barrier between a trusted system or network and outside connections, such as the Internet
- a continuous transmission of information to our senses
- A wallpaper or background is a digital image used as a decorative background of a graphical user interface
- any type of hardware that stores data
- a facility used to house computer systems and houses computing facilities routers, firewalls, etc.
- Lossless compression reduces a file's size with no loss of quality
- cloud computing refers to applications and services offered over the Internet
- a collection of tables with unknown relationships gathered to serve a specific
- Stands for "Radio-Frequency Identification." RFID is a system used to track objects, people, or animals using tags that respond to radio waves
- the primary location from where data comes
- the address of a specific webpage or file on the Internet
- information processed or stored by a computer
- is a namespace that organizes a set of related classes and interfaces
- the use of dedicated websites and applications to interact with other users,
- A disk drive is a device that reads, writes, and deletes data to a disk
- the ownership of intangible and non-physical goods, such as an idea, name, content, etc,
- land or resources belonging to or affecting the whole of a community
- is a computer program that is designed to simulate what might or what did happen in a situation
- the software and hardwaresystems that support data-intensive applications
- expressed as series of the digits 0 and 1
- refers to an enterprise data storage entity into which data has been specifically partitioned for an analytical or reporting purpose
- A digital signal is a signal that is being used to represent data as a sequence of discrete values
- consists of multiple devices that communicate with one another
- U.S. government encryption standard supported by the National Institute of Standards & Technology
- can be larger than the original packet for the following
- is an entity that issues digital certificates
- the number of transistors placed in an integrated circuit or chip doubles approximately every two years
- a small amount of data sent over a network, such as a LAN or the Internet
- refers to methods of organizing units of data within larger data sets.
- a list of items that are granted access to a certain system or protocol
- a small chip that resides in computers and other electronic devices
- the part of a view that is nearest to the observer, especially in a picture or photograph
- a type of RAM that stores each bit of data on a separate capacitor
- is 109 or 1,000,000,000 bytes
- Query is another word for question
- Processing is a programming language designed for the visual arts community
- an electronic medium used to form a global computer network to facilitate online communication
- Endpoint Detection and Response (EDR) is an emerging technology
- stores recently used information so that it can be quickly accessed at a later time
- refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board
75 Clues: a symmetric-key block cipher • is 109 or 1,000,000,000 bytes • a central file storage location • A megapixel is one million pixels • Query is another word for question • smallest unit of data in a computer • A megabyte is 106 or 1,000,000 bytes • the language used to create webpages • any type of hardware that stores data • expressed as series of the digits 0 and 1 • ...
🧩 Crossword: Navigating The Future of Edge Computing in Retail 2026-01-09
Across
- The #1 challenge for 61% of leaders when deploying at the edge. 🛡️
- A strategy that mixes local speed with central cloud smarts: Hybrid ____ _____.
Down
- Keeping data local helps retailers follow these regional "Data ______" rules. 🔐
- By 2030,____retail (like self-checkout) will be the new normal.
- This "zero-____" framework is a must-have for keeping hardware secure in public stores.
- SUSE Edge is built on this 'Open'😏 philosophy to keep things flexible. 📖
- The high-speed connectivity that keeps online and physical stores in sync. ⚡
7 Clues: By 2030,____retail (like self-checkout) will be the new normal. • The #1 challenge for 61% of leaders when deploying at the edge. 🛡️ • SUSE Edge is built on this 'Open'😏 philosophy to keep things flexible. 📖 • The high-speed connectivity that keeps online and physical stores in sync. ⚡ • ...
Vocabulary Lesson 1 2017-03-06
Across
- A dialog box launcher is a small icon that appears in a group. Users click this icon to open related dialog boxes or task panes that provide more options that relate to the group.
- When you select text, you can show or hide the handy Mini toolbar, which helps you work with fonts, alignment, text color, indenting, and bullets. Note: You cannot customize the Mini toolbar.
- a number of people or things that are located close together or are considered or classed together.
- Definition of: tab (1) (TABlet) See tablet computer. (2) To move the cursor on a display screen or the print head on a printer to a specified column (the tab stop). Pressing the Tab key on a keyboard moves the screen cursor horizontally to the right. Pressing Shift-Tab moves it to the left.
- In graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen. The insertion point is usually represented by a blinking vertical line. You can reposition the insertion point by pressing arrow keys or by moving the I-beam pointer.
- In computing and telecommunications, a menu or menu bar is graphical control element. It is a list of options or commands presented to an operator by a computer or communications system. Choices given from a menu may be selected by the operator by a number of methods
- In a graphical user interface operating system, a dialog box or dialogue box is a new window that appears above the rest that lists additional information, errors, or options. Below, is an example of a Windows dialog box.
- Keytip. In Microsoft Office 2007 and 2010 applications, like Word, Excel, PowerPoint, and Outlook, a keytip is a keyboard shortcut to use a function on a ribbon, also called a ribbon control.
- The Quick Access Toolbar is a customizable toolbar that contains a set of commands that are independent of the tab on the ribbon that is currently displayed. You can move the Quick Access Toolbar from one of the two possible locations, and you can add buttons that represent commands to the Quick Access Toolbar.
- a software function that gives users the option of completing words or forms by a shorthand method on the basis of what has been typed before.
- Definition of: Save As. Save As. A command in the File menu of most applications that causes a copy of the current document or image to be created. It differs from the regular Save command, which stores the data back to the file and folder it originally came from.
- In computer science, white space is any character or series of characters that represent horizontal or vertical space in typography. When rendered, a whitespace character does not correspond to a visible mark, but typically does occupy an area on a page.
- The term template, when used in the context of word processing software, refers to a sample document that has already some details in place; those can be adapted (that is added/completed, removed or changed, differently from a fill-in-the-blank approach as in a form) either by hand or through an automated iterative ...
- By Vangie Beal A graphical user interface (GUI) feature in which a small text box appears when a mouse pointer is hovered over an icon or button. ... When the mouse is moved away from the icon or button, the ScreenTip will disappear from view. A ScreenTip is also called a ToolTip.
- In computer interface design, a ribbon is a graphical control element in the form of a set of toolbars placed on several tabs. ... However, in 2007, Microsoft Office 2007 used the term to refer to its own implementation of tabbed toolbars bearing heterogeneous controls, which Microsoft calls "The Fluent UI".
Down
- word wrap - Computer Definition. A word processing feature that moves words to the next line automatically as you type based on the current right margin setting. Some word processing programs allow word wrap to be turned off for writing source code.
- In computing and telecommunication, a control character or non-printing character is a code point (a number) in a character set, that does not represent a written symbol. They are used as in-band signaling to cause effects other than the addition of a symbol to the text.
- A context menu (also called contextual, shortcut, and popup or pop-up menu) is a menu in a graphical user interface (GUI) that appears upon user interaction, such as a right-click mouse operation. ... From a technical point of view, such a context menu is a graphical control element.
- Watch this video to see what and where the Microsoft Office Backstage view is in Microsoft Office 2010. The Office Backstage view is where you manage your files and the data about them — creating, saving, inspecting for hidden metadata or personal information, and setting options.
- Undo is a command included in most software programs. It is typically located at the top of the Edit menu and has the standard shortcut "Control+Z" in Windows and "Command-Z" in Mac OS X. The Undo command allows you to undo the last action you performed in the program.
- a girder that has the shape of an I when viewed in section.
- In a web browser, an access key or accesskey allows a computer user to immediately jump to a specific part of a web page via the keyboard.
- Computer Definition. To copy the document, record or image being worked on to a storage medium. If the file has already been created on the hard disk, saving updates the file by writing the data currently in memory (RAM) to the disk.
- produce (books, newspapers, magazines, etc.), especially in large quantities, by a mechanical process involving the transfer of text, images, or designs to paper.
- an inspection or viewing of something before it is bought or becomes generally known and available.
25 Clues: a girder that has the shape of an I when viewed in section. • a number of people or things that are located close together or are considered or classed together. • an inspection or viewing of something before it is bought or becomes generally known and available. • ...
computer vocab 2 2017-03-03
Across
- The term "format" has several meanings, related to 1) disk formatting, 2) page formatting, and 3) file formats. 1) Disk formatting. In order for storage media, such as a hard drive or flash drive to be recognized by your computer, it first needs to be initialized, or "formatted."Jan 20, 2010
- In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers. As the term implies, the speed in bps is equal to the number of bits transmitted or received each second.
- While this term originally referred to a clever or expert programmer, it is now more commonly used to refer to someone who can gain unauthorized access to other computers. A hacker can "hack" his or her way through the security levels of a computer system or network.
- Printing A 3D printer is a computer-aided manufacturing (CAM) device that creates three-dimensional objects. ... 3D printers use a process called additive manufacturing to form (or "print") physical objects layer by layer until the model is complete.Jan 2, 2014
- a unit of memory or data equal to 1,024 (210) bytes.
- A scanner is an input device that scans documents and images, which can be imported into a computer. They are available in flatbed or sheet-fed versions and are usually connected via a high-speed USB port. OCR software can be used to recognize text documents imported from a scanner.Jan 23, 2009
- A cursor is the position indicator on a computer display screen where a user can enter text. In an operating system with a graphical user interface (GUI), the cursor is also a visible and moving pointer that the user controls with a mouse, touch pad, or similar input device.
- URL is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
- In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
- The data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- JPEG. Stands for "Joint Photographic Experts Group." JPEG is a popular image file format. ... Still, the compression algorithm is lossy, meaning some image quality is lost during the compression process.Jul 26, 2016
- A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
Down
- home page - Computer Definition. Also known as page and Web page. A document that serves as a starting point on a Web site. A home page typically contains hypertext and navigation buttons that allows the user to navigate the site by clicking them with a mouse and invoking hyperlinks to other pages and even other sites.
- A computer network or data network is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- DNS. (Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
- Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
- CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
- A router [a] is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another router through the networks that constitute the internetwork until it reaches its destination node.
- When used to describe data storage, 1,024 megabits. (2) When used to describe data transfer rates, it refers to 10 to the 9th power (1,000,000,000) bits. Gigabit is abbreviated Gb, as opposed to gigabyte, which is abbreviated GB.
- The most widely used local area network (LAN) technology. Defined as the 802.3 standard by the IEEE, the Ethernet access method is used to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access.
- The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible
25 Clues: a unit of memory or data equal to 1,024 (210) bytes. • a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web. • Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible • ...
U23 - Key Terms 2024-02-02
Across
- (9,9) Describes technology platforms that are broadly based on the scientific disciplines of artificial intelligence (AI), which is the simulation of human thought processes in a computerised model. These systems learn and naturally interact with humans to extend what machines can do on their own e.g. data analytics from major healthcare research.
- (10,5) In the context of this unit, minimising risks is how potentially negative social, moral and ethical implications of using cognitive computing can be minimised. An example would be ensuring that medical data (relating to patients) was protected and did not fall into the wrong hands.
- Rules of conduct governed by professional and legal guidelines within a particular time and place.
Down
- (7,14) This is taking into consideration how the action(s) taken by a person/persons or machinery can impact on another person or persons e.g. if it is the intention that a machine will carry out the role of a human, what is the impact that this could have on the human.
- (5, 14) This is taking into consideration whether it would be morally acceptable to carry out an action. An example of this is GM (genetically modified) crops. Some people believe in them and find them morally acceptable; those against them say that it is not morally acceptable to interfere with nature. Morals Principles or habits in relation to right and wrong conduct.
- (6,14) How something would impact on society e.g. implementing automated technology would make people redundant, but on the other hand new technology can actually create new jobs.
6 Clues: Rules of conduct governed by professional and legal guidelines within a particular time and place. • (6,14) How something would impact on society e.g. implementing automated technology would make people redundant, but on the other hand new technology can actually create new jobs. • ...
Quiz Globalization and Fourth Industrial Revolution 2022-09-10
Across
- Refers to the digital data sets that are so large either in terms of scale, or complex in terms of variety.
- - Refers to the wild and unexpected technological breakthroughs that require corporations to radically rethink their very existence
- refers to the connectivity and association of electronic devices, vehicles (also called as "connected devices" and "smart devices"), structures, buildings, and other devices with electronics, software, sensors, actuators, and communication capabilities which equip the said items to send, transmit and process information.
- Refers to the multi-disciplinary area of engineering and science involving the fields of mechanical, electrical, computer science, and other engineering-based fields.
- Refers to the technology that changes how people perceive and appreciate the brain and several characteristics of consciousness, thought, and complex activities in the brain.
- - Refers to new technologies that help organizations improve product performance
- Refers to the migration of certain activities from hand production methods to machine processes
- Refers to the model that enables ubiquitous, convenient on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
- Refers to the revolutionary material that makes up a vital component in different fields and areas such as aerospace, automobile, construction and manufacturing
- The phrase used to refer to the Third industrial Revolution and started the migration of analogue electronics technology to digital electronics. It is also known as the computer age.
Down
- Refers to what is commonly called as machine intelligence, is the programmed reasoning and thinking skills applied to machines to mimic human or animal intelligence.
- Also known as 3D-printing and refers to processes used to create a three-dimensional product in which a computer control assembles materials into layers.
- - Refers to technologies that have the potential to disrupt the status quo, alter the way people live and work, rearrange value pools, and lead to entirely new products and services
- This means contact and communication between people who had been culturally and geographically isolated
- The phrase used to refer to the fourth Industrial Revolution. It builds on the with cyber- physical systems providing new mechanisms and allowing technology to be embedded within societies and even the human body
- – Believed to be the fuel of the first industrial revolution that brought the coal-powered external combustion engine oil. Believed to be the fuel of the second industrial revolution that brought the coal-powered internal combustion engine
- Refers to a digital ledger of transactions; this ledger is shared by a network of computers, making use of cryptography to secure the authenticity of the transactions.
- Refers to the technology which stores generated energy for later use
- It narrates the rapid compression of space and time ushered by the unprecedented global proficiency in the use of computer technology.
19 Clues: Refers to the technology which stores generated energy for later use • - Refers to new technologies that help organizations improve product performance • Refers to the migration of certain activities from hand production methods to machine processes • This means contact and communication between people who had been culturally and geographically isolated • ...
Tendências e Inovações Tecnológicas na Computação 2025-10-27
Across
- Modelo que permite o acesso remoto a servidores, bancos de dados, ferramentas e softwares pela internet. Elimina a necessidade de infraestrutura física local, oferecendo mobilidade, economia e escalabilidade.
- Ambiente virtual tridimensional e interativo, onde pessoas podem trabalhar, estudar, socializar e negociar usando avatares digitais.
- Rede que conecta dispositivos inteligentes, permitindo a coleta e o compartilhamento de dados entre eles e com a nuvem. Aplicações incluem casas inteligentes, automação industrial, cidades conectadas e monitoramento de saúde.
- Ramo da IA que permite que sistemas aprendam e melhorem automaticamente com base em dados, sem serem programados explicitamente. Aplicado em reconhecimento de voz, recomendação de conteúdo e análise preditiva.
- Tecnologia que utiliza princípios da mecânica quântica, como superposição e emaranhamento, para realizar cálculos muito mais rápidos que os computadores clássicos. Tem aplicações na fotônica quântica (exames de imagem), química quântica (diagnósticos rápidos e de baixo custo), desenvolvimento de novos materiais, sensores ambientais e energias limpas.
- Conjunto de práticas e tecnologias voltadas à proteção de sistemas, redes e dados contra ataques cibernéticos, como invasões, fraudes e roubo de informações. Aplicada em bancos, governos, empresas e dispositivos pessoais.
- Campo da computação que busca desenvolver sistemas capazes de simular a inteligência humana — raciocínio, aprendizado, percepção e tomada de decisão. Aplicada em assistentes virtuais, reconhecimento facial, veículos autônomos, análise de dados e diagnósticos médicos.
Down
- Conjunto de práticas e tecnologias voltadas à redução do impacto ambiental da computação, como uso eficiente de energia, reciclagem de componentes e data centers sustentáveis.
- Sistema de registro distribuído que armazena e compartilha informações de forma segura, descentralizada e transparente. Base de tecnologias como criptomoedas, contratos inteligentes e rastreabilidade de cadeias produtivas.
- Campo da ciência que descreve o uso de sistemas biológicos para desenvolver produtos e tecnologias. Inclui biologia de sistemas e medicina molecular, com possibilidade de diagnóstico precoce de doenças, uso de agentes de contraste e máquinas de visualização.
- Área que combina elementos de engenharia com métodos computacionais, inteligência artificial, psicologia e neurofisiologia. Aplicada na automatização de processos industriais, transporte, medicina, exploração espacial, submarina e em ambientes insalubres.
- Tecnologia que transforma projetos digitais em produtos físicos por meio da manufatura aditiva. Na saúde, permite a criação de próteses, ossos artificiais e até tecidos biológicos, revolucionando cirurgias e tratamentos.
- Próxima geração das redes móveis, até 100 vezes mais rápida que o 5G. Terá integração nativa com inteligência artificial, permitindo avanços em realidade aumentada, telecirurgia e comunicações em tempo real.
- Recursos de realidade virtual, realidade aumentada, blockchain e inteligência artificial.
- Subcampo do machine learning que utiliza redes neurais artificiais para processar grandes volumes de dados. Usado em reconhecimento de imagem, voz e diagnóstico médico automatizado.
- Tecnologias imersivas que combinam o mundo real e o digital. Usadas em treinamentos, educação, medicina, entretenimento e turismo virtual.
16 Clues: Recursos de realidade virtual, realidade aumentada, blockchain e inteligência artificial. • Ambiente virtual tridimensional e interativo, onde pessoas podem trabalhar, estudar, socializar e negociar usando avatares digitais. • ...
Famous Entrepreneurs 2023-06-09
Across
- - French fashion designer and businesswoman who founded the
- - American industrialist and founder of the Ford Motor Company, known for revolutionizing the automotive industry with the development of the assembly line and the production of affordable automobiles for the masses.
- - American business magnate, investor, and philanthropist who founded Amazon.com, transforming it from an online bookstore into one of the world's largest e-commerce and cloud computing companies.
- - American business magnate and philanthropist who founded the Standard Oil Company and became one of the world's wealthiest individuals in history, exerting significant influence on the oil industry and philanthropy.
- - American media mogul, talk show host, and philanthropist who has had a significant impact on the television industry and popular culture with her influential talk show and media ventures.
- - South African-born American entrepreneur and business magnate known for his ventures such as Tesla, SpaceX, Neuralink, and The Boring Company, as well as his visionary ideas in the fields of electric vehicles, renewable energy, and space exploration.
- - American entrepreneur, animator, and film producer who co-founded The Walt Disney Company, one of the most renowned entertainment conglomerates in the world, responsible for iconic characters and beloved theme parks.
- - American media executive, television host, and philanthropist who established her media empire with "The Oprah Winfrey Show" and has since become one of the most influential figures in the entertainment industry.
- - American businessman and entrepreneur who co-founded Walmart Inc., the world's largest retail corporation, revolutionizing the retail industry with its discount stores and efficient supply chain management.
- - American business magnate, industrial designer, and inventor who co-founded Apple Inc., revolutionizing the technology industry with iconic products like the iPhone, iPad, and Macintosh.
Down
- - American technology entrepreneur and philanthropist who co-founded Facebook, the world's largest social networking platform, and has played a significant role in shaping the landscape of social media and online communication.
- - American business magnate, software developer, and philanthropist who co-founded Microsoft Corporation and played a pivotal role in the personal computer revolution.
- - American investor, business tycoon, and philanthropist widely regarded as one of the most successful investors in history. He is the chairman and CEO of Berkshire Hathaway, a multinational conglomerate holding company.
- - American computer scientist and entrepreneur who co-founded Google, the world's most popular search engine, and served as the CEO of Alphabet Inc., Google's parent company.
- - American businessman, television personality, and politician who became the 45th President of the United States and has been involved in various ventures, particularly in real estate and hospitality.
- - British entrepreneur, investor, and philanthropist who founded the Virgin Group, a multinational conglomerate with businesses spanning various industries, including music, airlines, telecommunications, and space tourism.
- - American entrepreneur, businessman, and philanthropist who co-founded Oracle Corporation, a leading provider of database software and technology solutions.
- - British entrepreneur, investor, and philanthropist who founded the Virgin Group, a multinational conglomerate with businesses spanning various industries, including music, airlines, telecommunications, and space tourism.
- - American intimate apparel brand founded by Sara Blakely, offering innovative and popular shapewear products that have gained widespread recognition and popularity.
19 Clues: - French fashion designer and businesswoman who founded the • - American entrepreneur, businessman, and philanthropist who co-founded Oracle Corporation, a leading provider of database software and technology solutions. • ...
Types of Phishing Attacks 2021-04-15
Across
- a widespread phishing attack that is not highly targeted.
- a suspicious caller claims to be from tech support, a government agency or other legitimate organization and attempts you to share your personal information (e.g., credit card details).
- makes use of a digital ad software to publish legitimate looking ads with malicious code implanted within it.
- phishing that targets a specific “big” victim within a company (e.g., CEO).
- a carefully worded phishing email with a link to a popular website is sent to victims. This link actually takes the victims to a fake version of the said popular website then the site will ask them to confirm or update their account details.
- involves a malicious email seeming to be from a person in or related with the victim’s company demanding urgent action, whether sending money or buying gift cards.
- makes use of an email address that is familiar to the victim and the victim is urgently asked to act and transfer funds, update employee details, or install a new app on their computing device.
- unsuspecting victims who log into the spoofed legitimate-looking Wi-Fi hotspot points, usually in public places (e.g., coffee shops, airports, hospitals, shopping malls, public parks) are asked to enter their username or password via a fake site which goes directly to the hacker.
- attack focused to specific victims or group of victims using personal information.
Down
- In this SMS-enabled phishing with attached malicious link sent to smartphone users.
- involves a shady actor compromising a person’s email account by making changes to an existing email, swapping a legitimate link, attachment or other element with a malicious one, and sending it to the person’s contacts to distribute the infection.
- phishing emails with links to fake websites (e.g., mobile account login page for a popular mail provider) are sent to victims requesting them to share their credentials or other sensitive information into the phony website’s interface.
- cybercriminals hack a popular website and include a phony website login page or pop-up that directs website guests to the phony site.
- an eavesdropper monitors communication between two unsuspecting parties who have logged in at phony public WiFi networks at public places (e.g., coffee shops, shopping malls).
- fake websites which appear in search results are set and used in gathering sensitive personal information and direct payments.
- phishing attack that involves the internet’s domain name system (DNS)
- victim is tempted into clicking a link or download an attachment so that a computer virus, worm, Trojan horse, spyware, or scareware can be installed on the device.
- cybercriminals gaining access to an organization’s web server and steal the confidential or sensitive information kept on the server.
18 Clues: a widespread phishing attack that is not highly targeted. • phishing attack that involves the internet’s domain name system (DNS) • phishing that targets a specific “big” victim within a company (e.g., CEO). • attack focused to specific victims or group of victims using personal information. • ...
Business & Technology Vocabulary 2023-08-02
Across
- refers to an individual's professional journey and long-term employment-related pursuits, including their chosen occupation, the sequence of jobs, and opportunities for growth and advancement.
- a secure and encrypted connection that allows users to access a private network over the internet. In the business world, VPNs are used to enhance data security and privacy when employees access company resources from remote locations.
- refers to the day-to-day activities and processes that a company undertakes to produce goods, deliver services, and achieve its strategic goals. It includes activities such as production, inventory management, customer service, and logistics.
- involves the exchange of information, messages, and data using electronic channels such as email, instant messaging, video conferencing, and social media. It is an essential aspect of modern business communication.
- the department within a business responsible for managing employee-related matters. It includes tasks such as recruitment, training, compensation, benefits, performance management, and employee relations.
Down
- refers to the application of scientific knowledge, tools, techniques, and processes to create, modify, and improve products, services, or systems. In the business world, it plays a crucial role in driving innovation, improving efficiency, and enhancing overall operations.
- involves managing and analyzing financial resources within a company to make informed decisions regarding investments, budgeting, capital allocation, and financial planning
- refers to a specific sector of the economy that produces similar goods or services. For example, the technology industry involves companies that develop and sell technological products and services.
- a collection of programs, data, and instructions that enable computers and other devices to perform specific tasks or functions. In a business context, software applications are used to manage various operations, automate processes, and facilitate communication.
- encompasses all the activities and strategies a business uses to promote, advertise, and sell its products or services to customers. It involves market research, branding, advertising, sales, and customer relationship management.
- the physical components and equipment of a computer system or other electronic devices. In a business setting, hardware includes devices such as computers, servers, routers, printers, and other peripherals used to support and complement software operations.
- an organization or entity engaged in commercial, industrial, or professional activities with the primary goal of generating profit. It involves producing goods, offering services, or trading products to meet the needs of customers and stakeholders.
- in the context of business, refers to remote servers and data storage facilities accessed via the internet. Cloud computing allows businesses to store, manage, and process data and run applications without relying solely on local infrastructure.
13 Clues: involves managing and analyzing financial resources within a company to make informed decisions regarding investments, budgeting, capital allocation, and financial planning • ...
Learning Unit 8 - Radio Frequency Identification, Business Intelligence, Mobile Computing and the Cloud 2022-09-18
Across
- is about delivering the right information to the right people at the right time, and cloud computing provides a lightweight, agile way to access BI applications. The beauty of Cloud BI applications is that they are accessible on multiple devices and web browsers. This is circumventing traditional software barriers such as the requirement to access the application on-site.
- applications are hosted on a virtual network, such as the internet. They are used to provide organizations access to BI-related data such as dashboards, KPIs and other business analytics.
- is the actual program that runs on the mobile hardware. It deals with the characteristics and requirements of mobile applications. This is the engine of the mobile device. In other terms, it is the operating system of the appliance. It's the essential component that operates the mobile device.
- relates to the specific design of new technologies and services that allow data to be sent over distributed networks, through wireless connections, to a remote secure location that is usually maintained by a vendor.
Down
- in this case, refers to the infrastructure put in place to ensure that seamless and reliable communication goes on. These would include devices such as protocols, services, bandwidth, and portals necessary to facilitate and support the stated services. The data format is also defined at this stage. This ensures that there is no collision with other existing systems which offer the same service.
- is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.
- refers to the procedural and technical infrastructure that collects, stores, and analyzes the data produced by a company’s activities.
- device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object.
- includes mobile devices or device components that receive or access the service of mobility. They would range from portable laptops, smartphones, tablet Pc's, Personal Digital Assistants.
9 Clues: refers to the procedural and technical infrastructure that collects, stores, and analyzes the data produced by a company’s activities. • device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. • ...
Types of Phishing Attacks 2021-04-15
Across
- Attack an eavesdropper monitors communication between two unsuspecting parties who have logged in at phony public WiFi networks at public places (e.g., coffee shops, shopping malls).
- involves a malicious email seeming to be from a person in or related with the victim’s company demanding urgent action, whether sending money or buying gift cards.
- Hijacking cybercriminals gaining access to an organization’s web server and steal the confidential or sensitive information kept on the server.
- Phishing victim is tempted into clicking a link or download an attachment so that a computer virus, worm, Trojan horse, spyware, or scareware can be installed on the device.
- Engine Phishing fake websites which appear in search results are set and used in gathering sensitive personal information and direct payments.
- Phishin phishing attack focused to specific victims or group of victims using personal information.
- In this SMS-enabled phishing with attached malicious link sent to smartphone users.
- Fraud makes use of an email address that is familiar to the victim and the victim is urgently asked to act and transfer funds, update employee details, or install a new app on their computing device.
- a suspicious caller claims to be from tech support, a government agency or other legitimate organization and attempts you to share your personal information (e.g., credit card details).
- Manipulation a carefully worded phishing email with a link to a popular website is sent to victims. This link actually takes the victims to a fake version of the said popular website then the site will ask them to confirm or update their account details.
Down
- Injection cybercriminals hack a popular website and include a phony website login page or pop-up that directs website guests to the phony site.
- makes use of a digital ad software to publish legitimate looking ads with malicious code implanted within it.
- Websites phishing emails with links to fake websites (e.g., mobile account login page for a popular mail provider) are sent to victims requesting them to share their credentials or other sensitive information into the phony website’s interface.
- Phishing involves a shady actor compromising a person’s email account by making changes to an existing email, swapping a legitimate link, attachment or other element with a malicious one, and sending it to the person’s contacts to distribute the infection.
- Phishing a widespread phishing attack that is not highly targeted.
- phishing that targets a specific “big” victim within a company (e.g., CEO).
- phishing attack that involves the internet’s domain name system (DNS)
- Twin” Wi-Fi unsuspecting victims who log into the spoofed legitimate-looking Wi-Fi hotspot points, usually in public places (e.g., coffee shops, airports, hospitals, shopping malls, public parks) are asked to enter their username or password via a fake site which goes directly to the hacker.
18 Clues: Phishing a widespread phishing attack that is not highly targeted. • phishing attack that involves the internet’s domain name system (DNS) • phishing that targets a specific “big” victim within a company (e.g., CEO). • In this SMS-enabled phishing with attached malicious link sent to smartphone users. • ...
ict 2018-10-10
Across
- / box/ (STB) a box-shaped device that converts a digital television signal to analogue for viewing on a conventional set, or that enables cable or satellite television to be viewed.
- / the main means of mass communication (broadcasting, publishing, and the Internet) regarded collectively.
- / is defined as manifestation, appearance, or incarnation. In terms of social media in today's world, your Avatar is your identity. You choose to make yourAvatar whatever you want it to be. It is what you project to others. There are many people who have a different image online than in person.
- / give (someone) something, typically money, in recognition of loss, suffering, or injury incurred; recompense.
- / represent (an area) on a map; make a map of.
- / a folder or box for holding loose papers together and in order for easy reference.
- / Definition of: media player (1) Software that "plays" audio, video or animation files in the computer. In the Windows world, Windows Media Player is the defaultplayer from Microsoft, but iTunes, RealPlayer and other software are also widely used.
- / Computer Definition. Coming from the center, or circles within circles. For example, tracks on a hard disk areconcentric. Tracks on optical media are concentric or spiral shaped (in a coil) depending on the type.
- / A high-performance computer system that analyzes multiple data streams from many sources live. The word stream in stream computing is used to mean pulling in streams of data, processing the data and streaming it back out as a single flow.
- / a device which detects or measures a physical property and records, indicates, or otherwise responds to it.
- / A specialized desktop computer used to play video games.
- / a printed circuit board containing the principal components of a computer or other device, with connectors for other circuit boards to be slotted into.
- / is an expansion card or IC for producing sound on a computer that can be heard through speakers or headphones. Although thecomputer does not need a sound device to function, they are included on every machine in one form or another, either in an expansion slot or built into the motherboard (onboard).
- / On Apple computers, the box on a window title bar to increase the size of a window is called a zoom box. 3. Alternatively referred to as optical zoom, zoom is acamera and digital camera feature that uses optics in the camera lens to move in on an object without having to move closer.
- / peripheral (MFP) is a device that performs a variety of functions that would otherwise be carried out by separate peripheral devices. As a rule, amultifunction peripheral includes at least two of the following: A printer. A scanner. A copier.
- / / that uses five audio channels plus a subwoofer channel (the "1" in 5.1). Widely used in home theatersystems, DVDs are often recorded in 5.1 audio encoding technologies (see Dolby Digital and DTS). For more speaker configurations, see surround sound.
- /a person who uses or operates something.
- / Remove the electrical charge from something
- / An embedded system is a programmed controlling and operating system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
- / /compatiblity Compatible with earlier models or versions of the same product. A new version of a program is said to be backward compatible if it can use files and data created with an older version of the same program. A computer is said to be backward compatible if it can run the same softwareas the previous model of the computer.
- / In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable. In computers, volatile is used to describe memory content that is lost when the power is interrupted or switched off. Your computer's ordinary memory (or RAM ) is volatile memory.
- / A Universal Serial Bus (USB) is a common interface that enables communication between devices and a host controller such as a personal computer (PC). It connects peripheral devices such as digital cameras, mice, keyboards, printers, scanners, media devices, external hard drives and flash drives.
- / (short for "binary digit") is the smallest unit of measurement used to quantifycomputer data. It contains a single binary value of 0 or 1.
- / Physical computing means building interactive physical systems by the use of software and hardware that can sense and respond to the analog world.
- / home/ a home equipped with lighting, heating, and electronic devices that can be controlled remotely by smartphone or computer.
- / a record of the address of a file, website, or other data made to enable quick access.
- / In computers, resolution is the number of pixels (individual points of color) contained on a display monitor, expressed in terms of the number of pixels on the horizontal axis and the number on the vertical axis.
- / a hard point, typically of diamond or sapphire, following a groove in a record and transmitting the recorded sound for reproduction.
- / restrict access to the full functionality or data of (a computer, mobile phone, file, etc.), especially by requiring a user to verify their identity with a passcode or other form of authentication.
- / the state of being connected or interconnected.
- / Search Encyclopedia. Definition of: digital zoom. digital zoom. Simulating a longer focal length in a digital camera via software. The digital zoom is accomplished via image enhancement software within the camera itself rather than the inherent mechanics of the physical zoom lens.
Down
- / (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.
- / Computer Definition. An electrically charged ink used in copy machines and laser printers. It adheres to an invisible image that has been charged with the opposite polarity onto a plate or drum or onto the paper itself.
- / facts and statistics collected together for reference or analysis.
- raise /(something) to a higher standard, in particular improve (equipment or machinery) by adding or replacing components
- up/ a copy of a file or other item of data made in case the original is lost or damaged
- / a kind of memory that retains data in the absence of a power supply.
- / copy/ a copy of written or typed material made with carbon paper.
- / is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. A common misconception is that the term Wi-Fi is short for "wireless fidelity.
- / the process or state of converging.
- device / A peripheral device is "an ancillary device used to put information into and get information out of the computer.
- / Physical computing means building interactive physical systems by the use of software and hardware that can sense and respond to the analog world.
- / an integrated circuit that contains all the functions of a central processing unit of a computer.
- /a machine-readable code in the form of numbers and a pattern of parallel lines of varying widths, printed on a commodity and used especially for stock control.
- / Commonly called stereo sound or just stereo, stereophonic sound dividessounds across two channels (recorded on two separate sources) then the recordedsounds are mixed so that some elements are channeled to the left and others to the right.
- / Commonly called mono sound, mono, or non-stereo sound, this early soundsystem used a single channel of audio for sound output. In monophonic soundsystems, the signal sent to the sound system encodes one single stream of soundand it usually uses just one speaker.
- / clean or dry (something) by rubbing with a cloth, a piece of paper, or one's hand.
- / A virtual keyboard is a computer keyboard that a user operates by typing on or within a wireless- or optical-detectable surface or area rather than by depressing physical keys.
- / is the term used in computer graphics to describe blurry sections or fuzziness in an image due to visibility of single-colored square display elements or individual pixels.
- / (also called "big iron") are powerful computers used for large information processing jobs.
- / a machine that processes something.
- / text/ text that is not computationally tagged, specially formatted, or written in code.
- / a battering ram.
- / Hardware and software technologies that help visually or physically impaired people to use the computer. For example, the Accessibility Options control panel in Windows provides keyboard, mouse and screen options for people who have difficulty typing or seeing the screen.
- / /a computer graphic which may be moved on-screen and otherwise manipulated as a single entity.
- / the set of rules that makes it possible to use the Internet for telephone or videophone communication.
- / a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
- / relating to or using signals or information represented by a continuously variable physical quantity such as spatial position, voltage, etc.
- / a software program that runs on your computer.
- / almost or nearly as described, but not completely or according to strict definition.
- / is an electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, LiFi, 3G, etc., that can operate to some extent interactively and autonomously.
- / a long, thin piece of metal on a scale or dial which moves to indicate a figure or position.
- / , which stands for Global Positioning System, is a radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world.
- / / is a shaft that holds rotating hard disk drive (HDD) platters in place. The term is also often used to refer to a single HDD. Spindle speed, measured in rotations per minute (RPM), is one metric used to gauge disk drive performance.
64 Clues: / a battering ram. • /a person who uses or operates something. • / the process or state of converging. • / a machine that processes something. • / Remove the electrical charge from something • / a software program that runs on your computer. • / the state of being connected or interconnected. • ...
ict 2018-10-10
Across
- / a record of the address of a file, website, or other data made to enable quick access.
- / represent (an area) on a map; make a map of.
- /a machine-readable code in the form of numbers and a pattern of parallel lines of varying widths, printed on a commodity and used especially for stock control.
- / a software program that runs on your computer.
- / A Universal Serial Bus (USB) is a common interface that enables communication between devices and a host controller such as a personal computer (PC). It connects peripheral devices such as digital cameras, mice, keyboards, printers, scanners, media devices, external hard drives and flash drives.
- / Hardware and software technologies that help visually or physically impaired people to use the computer. For example, the Accessibility Options control panel in Windows provides keyboard, mouse and screen options for people who have difficulty typing or seeing the screen.
- / , which stands for Global Positioning System, is a radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world.
- / the main means of mass communication (broadcasting, publishing, and the Internet) regarded collectively.
- / an integrated circuit that contains all the functions of a central processing unit of a computer.
- / relating to or using signals or information represented by a continuously variable physical quantity such as spatial position, voltage, etc.
- / (also called "big iron") are powerful computers used for large information processing jobs.
- / a kind of memory that retains data in the absence of a power supply.
- / (short for "binary digit") is the smallest unit of measurement used to quantifycomputer data. It contains a single binary value of 0 or 1.
- / is an expansion card or IC for producing sound on a computer that can be heard through speakers or headphones. Although thecomputer does not need a sound device to function, they are included on every machine in one form or another, either in an expansion slot or built into the motherboard (onboard).
- / that uses five audio channels plus a subwoofer channel (the "1" in 5.1). Widely used in home theatersystems, DVDs are often recorded in 5.1 audio encoding technologies (see Dolby Digital and DTS). For more speaker configurations, see surround sound.
- / a copy of written or typed material made with carbon paper.
- / Search Encyclopedia. Definition of: digital zoom. digital zoom. Simulating a longer focal length in a digital camera via software. The digital zoom is accomplished via image enhancement software within the camera itself rather than the inherent mechanics of the physical zoom lens.
- / a home equipped with lighting, heating, and electronic devices that can be controlled remotely by smartphone or computer.
- / A virtual keyboard is a computer keyboard that a user operates by typing on or within a wireless- or optical-detectable surface or area rather than by depressing physical keys.
- / the state of being connected or interconnected.
- / facts and statistics collected together for reference or analysis.
- / A high-performance computer system that analyzes multiple data streams from many sources live. The word stream in stream computing is used to mean pulling in streams of data, processing the data and streaming it back out as a single flow.
- / A peripheral device is "an ancillary device used to put information into and get information out of the computer.
- / In computers, resolution is the number of pixels (individual points of color) contained on a display monitor, expressed in terms of the number of pixels on the horizontal axis and the number on the vertical axis.
- / /a computer graphic which may be moved on-screen and otherwise manipulated as a single entity.
- / give (someone) something, typically money, in recognition of loss, suffering, or injury incurred; recompense.
- / is the term used in computer graphics to describe blurry sections or fuzziness in an image due to visibility of single-colored square display elements or individual pixels.
- / On Apple computers, the box on a window title bar to increase the size of a window is called a zoom box. 3. Alternatively referred to as optical zoom, zoom is acamera and digital camera feature that uses optics in the camera lens to move in on an object without having to move closer.
- / the process or state of converging.
- / clean or dry (something) by rubbing with a cloth, a piece of paper, or one's hand.
- / Commonly called stereo sound or just stereo, stereophonic sound dividessounds across two channels (recorded on two separate sources) then the recordedsounds are mixed so that some elements are channeled to the left and others to the right.
- / a hard point, typically of diamond or sapphire, following a groove in a record and transmitting the recorded sound for reproduction.
Down
- / is an electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, LiFi, 3G, etc., that can operate to some extent interactively and autonomously.
- / Definition of: media player (1) Software that "plays" audio, video or animation files in the computer. In the Windows world, Windows Media Player is the defaultplayer from Microsoft, but iTunes, RealPlayer and other software are also widely used.
- / Computer Definition. An electrically charged ink used in copy machines and laser printers. It adheres to an invisible image that has been charged with the opposite polarity onto a plate or drum or onto the paper itself.
- / Commonly called mono sound, mono, or non-stereo sound, this early soundsystem used a single channel of audio for sound output. In monophonic soundsystems, the signal sent to the sound system encodes one single stream of soundand it usually uses just one speaker.
- / is defined as manifestation, appearance, or incarnation. In terms of social media in today's world, your Avatar is your identity. You choose to make yourAvatar whatever you want it to be. It is what you project to others. There are many people who have a different image online than in person.
- / Physical computing means building interactive physical systems by the use of software and hardware that can sense and respond to the analog world.
- /(something) to a higher standard, in particular improve (equipment or machinery) by adding or replacing components
- / is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. A common misconception is that the term Wi-Fi is short for "wireless fidelity.
- / a device which detects or measures a physical property and records, indicates, or otherwise responds to it.
- / (STB) a box-shaped device that converts a digital television signal to analogue for viewing on a conventional set, or that enables cable or satellite television to be viewed.
- / Physical computing means building interactive physical systems by the use of software and hardware that can sense and respond to the analog world.
- / peripheral (MFP) is a device that performs a variety of functions that would otherwise be carried out by separate peripheral devices. As a rule, amultifunction peripheral includes at least two of the following: A printer. A scanner. A copier.
- / a printed circuit board containing the principal components of a computer or other device, with connectors for other circuit boards to be slotted into.
- / a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
- / a copy of a file or other item of data made in case the original is lost or damaged
- / is a shaft that holds rotating hard disk drive (HDD) platters in place. The term is also often used to refer to a single HDD. Spindle speed, measured in rotations per minute (RPM), is one metric used to gauge disk drive performance.
- / a battering ram.
- / interface the means by which the user and a computer system interact, in particular the use of input devices and software.
- / a folder or box for holding loose papers together and in order for easy reference.
- / text that is not computationally tagged, specially formatted, or written in code.
- / Computer Definition. Coming from the center, or circles within circles. For example, tracks on a hard disk areconcentric. Tracks on optical media are concentric or spiral shaped (in a coil) depending on the type.
- / compatiblity Compatible with earlier models or versions of the same product. A new version of a program is said to be backward compatible if it can use files and data created with an older version of the same program. A computer is said to be backward compatible if it can run the same softwareas the previous model of the computer.
- / a machine that processes something.
- / Remove the electrical charge from something
- / the set of rules that makes it possible to use the Internet for telephone or videophone communication.
- / A specialized desktop computer used to play video games.
- / a long, thin piece of metal on a scale or dial which moves to indicate a figure or position.
- / An embedded system is a programmed controlling and operating system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
- / almost or nearly as described, but not completely or according to strict definition.
- / In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective used to describe something unstable or changeable. In computers, volatile is used to describe memory content that is lost when the power is interrupted or switched off. Your computer's ordinary memory (or RAM ) is volatile memory.
- / restrict access to the full functionality or data of (a computer, mobile phone, file, etc.), especially by requiring a user to verify their identity with a passcode or other form of authentication.
- / (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image.
64 Clues: / a battering ram. • / the process or state of converging. • / a machine that processes something. • / Remove the electrical charge from something • / a software program that runs on your computer. • / the state of being connected or interconnected. • ...
CAT 2 2025-03-04
Across
- Is the first portion of the operating system to load into a protected area in the memory so as not to be overwritten. It is responsible for key functions of the Operating system such as process management, memory management, file management, interrupt handling and disk drive management to mention a few
- shell is a command line interface that enables the user to interact with the computer
- systems are the oldest and most common architecture where operating systems run as a single program in kernel mode. The OS resides on kernel for anyone to execute. The functionality of the Operating Systems is invoked with simple function calls (system calls) within the kernel as a single large program.
Down
- All information stored in a computer must be in a file. There exists a number of file types such as; data files, program files, directory files, text files etc. Each file type stores a different type of information for example text files stores textual data while program files stores programs. thus, a file is simply a collection of data or information that has a name/identity usually called filename.
- Machines VM is a software program that enables a host machine to support different operating systems just like a separate computer. It is created within another computing environment (host).
- calls are used for hardware services, to create or execute a process and for communicating with kernel services. It is a technique used by programs to interact with the Operating system. Ideally, a computer program makes a system call whenever it makes a request to the kernel.
6 Clues: shell is a command line interface that enables the user to interact with the computer • Machines VM is a software program that enables a host machine to support different operating systems just like a separate computer. It is created within another computing environment (host). • ...
Techno Definition 2022-03-03
Across
- a detection system which works on the principle of radar,but uses light from a laser
- A person who introduces new methods,ideas,or products
- Denoting or relating to a period of a thousand years
- Solar Systems permits electricity to be harnessed by solar panels and stored inside a battery without direct connection to the utility grid
- Take(something) illicitly:steal
- Optimization The process of adjusting your website content to ensure that visitors that access the site from mobile devices have an experience customized to their device
- The process of adding games or games like element to something(such as task) so as to encourage participants
- the formation of ideas or concepts
- Networks a computer system modeled on the human brain and nervous system
- The practice of cross-posting involves posting a single message or piece of content to multiple destinations
- fusion The ability to bring together inputs from multiple radars, lidars and cameras from single model or images of the environment around a vehicle
- Computing a rapidly-emerging technology that harness the laws of quantum mechanics to solve problems too complex for classical computers
- Provide an enhanced viewing experience for content on another device
- Fatigue tiredness and frustration caused by having to remember a large amount of password for electronically-controlled activities
- an accumulation of data that is too large and complex for processing by traditional database management tools
- Key performance indicators
- Someone who believes they have good ideas for businesses or inventions but hasn’t actually managed to get any of them off the ground
- The correct or acceptable way of communicating on the internet
- A system for detecting the presence, direction, distance, and speed of aircraft, ships, and other objects
- reuse(discarded object or materials) in such a way as to create a product of higher quality or value than the original
- specification for a suite of high level communication protocols used to create personal area networks built from small, low-power digital radios
Down
- a form of entertainment
- Leader one whose views on a subject are taken to be authorized and influential
- Massive open online course
- you should focus on putting good content
- audio to describe any digital audio file or format that exceeds the quality of an audio CD
- A set of instructions for solving a problem or accomplishing a task
- The state, fact, quality, or condition of being singular
- a person or thing that interrupts an event, activity, or process by causing a disturbance or problem
- the state or quality of being efficient
- attract attention and encourage visitors to click on a link to a particular web page
- Business model in which a company offers basic or limited features to users at no cost and then charges a premium for supplemental or advanced features
- video recording where a view every direction is recorded at the same time
- An image, video, advertisements, etc.., that is circulated rapidly on the internet
34 Clues: a form of entertainment • Massive open online course • Key performance indicators • Take(something) illicitly:steal • the formation of ideas or concepts • the state or quality of being efficient • you should focus on putting good content • Denoting or relating to a period of a thousand years • A person who introduces new methods,ideas,or products • ...
POE Lesson 1.1 Key Terms 2013-09-04
Across
- Any of various elementary mechanisms including the lever, the wheel and axle, the pulley, the inclined plane, the wedge, and the screw
- An inclined plane wrapped around a cylinder, forming the path and pitch
- A series of usually metal links or rings connected to or fitted into one another and used to transmit motion and power within a sprocket system
- A gear positioned between the driver and the driven gear used to change rotational direction
- The ratio of the magnitude of the resistance and effort forces applied to a system
- The fixed point around which a lever rotates
- A flat surface set at an angle or an incline with no moving parts that is able to lift objects by pushing or pulling the load
- Creating, designing, and transmitting technical information so that people can understand it easily and use it safely, effectively, and efficiently
- A force that produces or tends to produce rotation or torsion
- The ratio of useful energy output to the total energy input, or the percentage of the work input that is converted to work output
- The resistance that one surface or object encounters when moving over another
- The structure of or the relationship of the parts in a machine, or in a construction or process comparable to a machine
- A profession for which one trains and which is undertaken as a permanent calling
- The recognized accreditor for college and university programs in applied science, computing, engineering, and technology
Down
- A substance that tapers to a thin edge and is used for splitting, raising heavy bodies, or for tightening by being driven into something
- The turning effect of a force about a point equal to the magnitude of the force times the perpendicular distance from the point to the line of action from the force
- Ratio of distance traveled by the applied effort and resistance force within a system
- Distance between adjacent threads in a screw
- Two different sized circular objects that are attached together and turn as one
- A continuous band of tough flexible material used to transmit motion and power within a pulley system
- A condition where there are no net external forces acting upon a particle or rigid body and the body remains at rest or continues at a constant velocity
- A type of lever that is a wheel with a groove in its rim, which is used to change the direction or multiply a force exerted by a rope or cable
- An external force applied to an object
- Impeding effect exerted by one material object on another
- A rigid bar used to exert a pressure or sustain a weight at one point of its length by the application of a force at a second and turning at a third on a fulcrum
- A circular toothed object used to transfer rotary motion and torque through interlocking teeth
- A toothed wheel whose teeth engage the links of a chain
27 Clues: An external force applied to an object • Distance between adjacent threads in a screw • The fixed point around which a lever rotates • A toothed wheel whose teeth engage the links of a chain • Impeding effect exerted by one material object on another • A force that produces or tends to produce rotation or torsion • ...
Computers 2014-08-21
Across
- a painting, drawing, photograph, or engraving of a person, especially one depicting only the face or head and shoulders
- In computing, a cursor is an indicator used to show the position on a computer monitor or other display device that will respond to input from a text input or pointing device.
- a class of storage medium used in computers and other electronic devices.
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
- a book that lists words in groups of synonyms and related concepts
- Proofreading is the reading of a galley proof or an electronic copy of a publication to detect and correct production errors of text or art. Proofreaders are expected to be consistently accurate by default because they occupy the last stage of typographic production before publication.
- Row Key It is that middle horizontal row of the keyboard that starts with A and goes all the way across.
- Protection Software a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms.
- a set of type of one particular face and size.
- another term for cursor
- Space type with two empty spaces between lines
- the amount of something produced by a person, machine, or industry.
- Letter A business letter is usually a letter from one company to another, or between such organizations and their customers, clients and other external parties.
- A business letter is usually used when writing from one company to another, or for correspondence between such organizations and their customers, clients and other external parties.
- a random access memory which means it can access any data randomly.
- GWAM is the overall typing speed regardless of how many errors you make.
- place (a document) in a cabinet, box, or folder in a particular order for preservation and easy reference.
- Software is computer software designed to operate and control the computer hardware and to provide a platform for running application software.
Down
- a compact disc used as a read-only optical memory device for a computer system.
- the programs and other operating information used by a computer
- a key or command that toggles between two modes, such as the caps lock key.
- a general description or plan giving the essential features of something but not the detail.
- a device that scans documents and converts them into digital data.
- a covering or containing structure or layer
- a particularly powerful mainframe computer.
- arrangement in a straight line, or in correct or appropriate relative positions.
- the retention of retrievable data on a computer or other electronic system; memory.
- A letterhead is the heading at the top of a sheet of letter paper (stationery). That heading usually consists of a name and an address, and a logo or corporate design, and sometimes a background pattern. The term "letterhead" is often used to refer to the whole sheet imprinted with such a heading.
- a panel of keys that operate a computer or typewriter
- page a page at the beginning of a book giving its title, the names of the author and publisher, and other publication information.
30 Clues: another term for cursor • a covering or containing structure or layer • a particularly powerful mainframe computer. • a set of type of one particular face and size. • Space type with two empty spaces between lines • a panel of keys that operate a computer or typewriter • the programs and other operating information used by a computer • ...
Computer Pioneers And Terms 2015-05-25
Across
- A base 2, 8-bit number system.
- A collection of devices connected to one another allowing data to be shared and used.
- Made of plastic or fiberglass and designed to hold electronic circuits, ICs, switches, and other components.
- Hungarian American mathematician, computer scientist, and educator.
- Developed the Z1, Z3, and Z4 the first programmable computer, making him the father of computer.
- American physicist, electrical engineer, and was known as the inventor of the transistor.
- A data storage device.
- Allows the computer to run and understand the program.
- Inventor of the first digital computer.
- American computer scientist for having planted seeds of computing in the digital age.
- A line of computers introduced by Steve Jobs of Apple Inc.
- A data equal to either seven or eight bits.
- Is used to create electronic documents.
- A hardware device that enables a computer to send and receive information over telephone lines.
- An Indian-American computer architect who developed several USB technologies.
- A component used to control the amount of current or voltage or used for amplification.
- The purpose of the group was to come together and share their knowledge of programming and computers.
- Conceived and built the first integrated circuit.
- Allows the use of icons or other visual indicators to interact with electronic devices.
- An instance of a computer program that accepts and responds to requests made by another program.
- Enable the users to have access to much faster computers or servers.
- An American engineer, entrepreneur and medical doctor who invented the first commercially, the Altair 8800.
Down
- Inventor and a computer engineer for leading the team that developed the ISA bus and the IBM design team.
- An English mathematician, logician, crypt analyst, and computer scientist.
- It has internal memory that saves instructions.
- An external bus standard that supports data.
- An optical disc which contains audio or software data whose memory is read only.
- American engineer and entrepreneur.
- A British professor of computer science, credited with creating the first graphical computer game.
- An electrical engineer and computer pioneer who helped invent the ENIAC and UNIVAC.
- A package containing many electronic components all working together to perform functions.
- A wide area network linking; internet.
- Pioneer computer engineer who designed the first American Electronic computer, the ENIAC.
- Responsible for handling all instructions it receives from hardware and software running on the computer.
- A standardized naming convention for addressing documents accessible over the internet.
- Co-author of Mosaic.
- The smallest portion of an image or display that a computer is capable of printing or displaying.
- Computer scientist and Co-developer of the J Programming Language.
- One of the inventors of the microprocessor.
- Father of video games.
- Austrian inventor who invented the printed circuit board.
- Credited for developing the World Wide Web.
- A two-dimensional barcode that has a larger storage capacity.
- An easy-to-understand programming language.
44 Clues: Co-author of Mosaic. • A data storage device. • Father of video games. • A base 2, 8-bit number system. • American engineer and entrepreneur. • A wide area network linking; internet. • Inventor of the first digital computer. • Is used to create electronic documents. • A data equal to either seven or eight bits. • One of the inventors of the microprocessor. • ...
POE 1.1 Key Terms 2017-02-06
Across
- A force that produces or tends to produce rotation or torsion.
- A continuous band of tough flexible material used to transmit motion and power within a pulley system.
- Creating, designing, and transmitting technical information so that people can understand it easily and use it safely, effectively, and efficiently.
- The fixed point around which a lever rotates.
- The turning effect of a force about a point equal to the magnitude of the force times the perpendicular distance from the point to the line of action from the force.
- A circular toothed object used to transfer rotary motion and torque through interlocking teeth.
- An external force applied to an object.
- A substance that tapers to a thin edge and is used for splitting, raising heavy bodies, or tightening by being driven into something.
- Ratio of distance traveled by the applied effort and resistance force within a system.
- Distance between adjacent threads in a screw.
- The resistance that one surface or object encounters when moving over another.
- Any of various elementary mechanisms including the lever, wheel and axle, pulley, inclined plane, wedge, and screw.
- A gear positioned between the driver and the driven gear used to change rotational direction.
- A toothed wheel whose teeth engage the links of a chain.
- The recognized accreditor for college and university programs in applied science, computing, engineering, and technology.
- A type of lever that is a wheel with a groove in its rim, which is used to change the direction or multiply a force exerted by a rope or cable.
Down
- The ratio of useful energy output to the total energy input, or the percentage of work input that is converted to work output.
- Two differently sized circular objects that are attached together and turn as one.
- Impeding effect exerted by one material object on another.
- The ratio of the magnitude of the resistance and effort forces applied to a system.
- A condition where there are no net external forces acting upon a particle or rigid body and the body remains at rest or continues at a constant velocity.
- The structure of or the relationship of the parts in a machine or in a construction or process comparable to a machine./
- A profession for which one trains and which is undertaken as a long-term vocation.
- An inclined plane wrapped around a cylinder, forming the path and pitch.
- A rigid bar used to exert a pressure or sustain a weight at one point of its length by the application of a force at a second point and turning at a third on a fulcrum.
- A flat surface set at an angle (or incline) with no moving parts that is able to lift objects by pushing or pulling the load.
- A series of usually metal links or rings connected to or fitted into one another and used to transmit motion and power within a sprocket system.
27 Clues: An external force applied to an object. • The fixed point around which a lever rotates. • Distance between adjacent threads in a screw. • A toothed wheel whose teeth engage the links of a chain. • Impeding effect exerted by one material object on another. • A force that produces or tends to produce rotation or torsion. • ...
1102N Crossword Puzzle 2023-11-14
Across
- refers to any physical or virtual component that can be connected to or is part of a computer system.
- It serves as a marketplace for digital content primarily focused on video games.
- Microsoft PowerPoint is an example of ____________ software.
- A video conferencing and online collaboration platform that provides virtual meeting services.
- A file format for capturing and presenting documents consistently across different platforms.
- _____ drivers manage audio devices and capabilities.
- is the process of creating a copy or archive of data
- Apple's operating system for Mac computers.
- Online marketplace for buying and selling.
- ______ software are the programs that allow a computer system to operate.
- A software that is designed for a specific task, such as word processing or spreadsheet calculations.
- Devices Connected without physical cables, using technologies like Bluetooth, Wi-Fi, or infrared.
- The most common input device.
- involves routine tasks and procedures to keep a computer system running efficiently and prevent potential issues.
- Devices used for storing data, including hard drives, SSDs, and USB flash drives.
- A powerful compression and archive manager for Windows, capable of creating and extracting various archive formats, including the proprietary RAR format.
- An _________ system is the primary computer system that allows a computerized device to function.
- Designed to detect, prevent, and remove malicious software.
- Refers to software that acts as an intermediary layer between different applications, services, or components within a computing environment.
- A software category that includes tools like Disk Cleanup and Backup and Restore.
Down
- Device that capture still or moving images.
- Standard for connecting devices to a computer via a cable.
- Devices connected to the computer via cables, such as USB cables, HDMI cables, or Ethernet cables.
- Software that reduces the size of files for storage or transmission.
- A social networking platform for connecting with friends and family.
- Devices refer to physical components or peripherals that can be connected to a computer system.
- _______ drivers facilitate communication with hard drives and other storage devices.
- is an application that can create electronic documents and arrange them in rows and columns.
- A software tool that translates high-level programming languages into machine code.
- It is distributed for free with the option to pay for additional features or to remove limitations.
- Software that is distributed for free, often without any limitations.
- It is a type of systems software that operates a hardware device by telling it how to perform.
- Google's web-based email service with a powerful email client.
- App for fitness tracking and wearable devices.
- A pen-like device used on touchscreens, graphics tablets, and other devices.
- A ______ is a critical network device that forwards data packets between computer networks.
- _______ devices are devices that enable communication over a network, including routers, switches, and network adapters.
- Used to access and navigate the World Wide Web.
- A device ______ is a computer program that enables communication between the operating system and a hardware device.
- Language learning app.
40 Clues: Language learning app. • The most common input device. • Online marketplace for buying and selling. • Device that capture still or moving images. • Apple's operating system for Mac computers. • App for fitness tracking and wearable devices. • Used to access and navigate the World Wide Web. • _____ drivers manage audio devices and capabilities. • ...
AI and Cybersecurity 2025-03-02
Across
- A technique that identifies anomalies by learning normal system behavior.
- A strategy that uses decoy systems to mislead potential attackers.
- A method that detects patterns without pre‐labelled data.
- A general term for software designed to damage or exploit systems.
- The process of converting unstructured text into structured threat intelligence.
- An algorithm that groups similar data points without prior labels.
- A process of embedding hidden messages within non-secret data.
- A generative model used in adversarial defense strategies.
- A decentralized ledger technology that records transactions securely.
- A deceptive email tactic aiming to steal sensitive information.
- A vulnerability exploited before any patch becomes available.
- A method used to scramble data so only authorised parties can read it.
- A process that identifies deviations from normal system behavior.
- A simulated attack conducted to assess a system’s security.
- An attack strategy that manipulates inputs to avoid detection.
- A computing paradigm with the potential to break current cryptographic systems.
- A short-lived digital key that grants temporary access to a system.
- The process of integrating security measures early in the development cycle.
- An autoencoder variant adept at detecting long-term attack patterns.
- A security barrier that filters incoming and outgoing network traffic.
- A security model that denies trust by default.
- A learning technique that uses labelled training data.
- Short abbreviation for a cyberattack that persists undetected.
- A technique that examines user actions to detect irregular behavior.
- A systematic method for testing systems to uncover vulnerabilities.
Down
- The standard established for normal system behavior to flag outliers.
- A type of malware that locks files until a ransom is paid.
- A learning approach where systems adapt through trial and error.
- A GAN-based framework that sanitizes adversarial inputs.
- A decoy system designed to lure attackers away from real assets.
- Coordinated automation of multi-step incident response workflows.
- Neural networks that automatically extract complex features from data.
- An approach combining CNN and RNN for enhanced threat detection.
- A neural network variant particularly effective at visual data analysis.
- The process of confirming a user’s or device’s identity.
- A practice that limits user rights to only what is necessary.
- A technique for extracting actionable intelligence from text.
- The practice of quantifying and managing potential security risks.
- A technique that maps adversarial inputs to a learned data manifold.
- The security centre challenged by overwhelming daily alerts.
- A sequence of operations used to process or secure data.
- A model that integrates spatial and temporal data for threat detection.
- A framework that maps tactics and techniques in cyberattacks.
- A tool that suggests security-focused improvements during code writing.
- The process of cleansing inputs by projecting them onto benign data.
- A software solution that detects and removes malicious programs.
- A network model that captures sequential dependencies in data.
- A device that directs data between networks while managing traffic.
- Abbreviation for analytics that monitor user behavior for anomalies.
- A system designed to monitor network traffic for suspicious activities.
50 Clues: A security model that denies trust by default. • A learning technique that uses labelled training data. • A GAN-based framework that sanitizes adversarial inputs. • The process of confirming a user’s or device’s identity. • A sequence of operations used to process or secure data. • A method that detects patterns without pre‐labelled data. • ...
knowledge is divine 2025-01-25
Across
- The friendly neighbor who ensures your computer has a speedy chat with the internet.
- The suit-and-tie programmer’s language, designed for serious business applications... and secretly dreaming of running a coffee shop.
- The computer's mastermind, managing a zillion tasks while looking cool in its silicon outfit.
- The computer's snack stash, quickly serving up recently used data to keep things running smoothly.
- The ultimate party planner, coordinating all the computer’s activities and making sure everything runs smoothly without any hiccups.
- The secret sauce that adds brains to the computer’s brawn, ensuring it can do everything from writing essays to creating animations.
- The diligent bodyguard patrolling your computer, keeping it safe from nasty digital baddies
- The trusty old cable that ensures your internet connection is as solid as a rock.
- The superhero of programming languages, combining speed and agility to save the day in game development and system programming
- The genius instructions that tell a computer how to solve problems, from simple calculations to complex data analysis.
- The tiny assistants that make your computer more than just a fancy typewriter, handling everything from entertainment to productivity.
- The curious explorer that takes you on virtual adventures across the internet.
- The traffic cop directing digital traffic, ensuring data doesn’t crash into each other.
- The artist in the computer world, bringing stunning visuals and the latest video games to life.
- The magic wand that lets computers learn and make decisions, just like humans (but without the coffee addiction).
Down
- The superfast highway where data zips around, sometimes wishing it had a speedometer.
- The wireless wizard that connects your devices without the hassle of tangled cables.
- The muscle and bones of a computer, flexing its circuits to keep everything running smoothly.
- laid-back, easy-to-read language that’s as versatile as a Swiss Army knife, used by data scientists and developers alike.
- The ultimate multi-tasker that never complains about too many tabs open.
- The bouncer at the computer club, keeping out unwanted guests (a.k.a., viruses and hackers).
- Drive The pocket-sized storage superhero, always ready to save the day when you need to transfer data.
- Computing Your computer’s secret weapon for offloading tasks to the sky and beyond.
- The prankster language that adds all the fun, interactive elements to websites. It’s to blame for pop-ups too. 😉
- The big boss that connects all the parts of the computer and keeps them talking to each other like a family reunion.
- The flashiest, fastest storage solution, speeding up your computer just because it can.
- The invisible force that connects your devices
- The secret agent that converts your data into a code, protecting it from snoopy cyber spies.
- The wild, wavy line that keeps all signals in perfect harmony, like a conductor with an electric baton.
- The network traffic director, making sure all your devices get their fair share of internet goodness
30 Clues: The invisible force that connects your devices • The ultimate multi-tasker that never complains about too many tabs open. • The curious explorer that takes you on virtual adventures across the internet. • The trusty old cable that ensures your internet connection is as solid as a rock. • ...
Computer Security 2025-03-14
Across
- Anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen but has the potential to cause serious damage.
- Use of modern electronic means to manipulate an event or influence public perception toward a certain point of view.
- Misuse This refers to entering a computer system without permission (hacking).
- An attempt to make a machine or network resource unavailable to its intended users, such as temporarily or indefinitely interrupting or suspending services of a host connected to the internet.
- Software that installs itself onto devices and then steals personal information about the user, like passwords, email addresses and other important information.
- An action or method that is applied to prevent, avert or reduce potential threats to computers, servers, networks, operating systems (OS) or information systems (IS).
- Is the use of technology to harass, threaten, embarrass, or target another person.
- Pretends it will be a useful and safe program.
- When someone accesses information without permission.
- Theft Is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.
- A security barrier designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside.
- Copying and distributing of recordings of a piece of music for which the rights owners (composer, recording artist, or copyright-holding record company) did not give consent.
- Sending the same message indiscriminately to a large number of internet users.
Down
- The act of intercepting communications between two points.
- A flaw or weakness in a system or network that could leave it open to attacks or allow an attacker to manipulate the system in some way.
- The protection of computing systems and the data that they store or access.
- An information security threat that involves an attempt to obtain, alter, destroy, remove, implant or reveal information without authorized access or permission.
- The practice of sending emails that appear to be from reputable companies in order to induce individuals to reveal personal information online.
- A malicious program or code that attaches itself to another program or file and can replicate itself, thereby infecting other systems.
- Can spread from device to device, but unlike a virus they don’t need to attach themselves to other programs.
- Gaining unauthorized access to data in a system or computer.
- A network of private computers infected with malicious software and controlled as a group without the owner's knowledge, often used to send spam.
- The act of illegally using, copying or distributing software without ownership or legal rights.
- Any illegal activity that uses a computer as its primary means of commission.
- Covert activities, such as the theft of trade secrets by the removal, copying or recording of confidential or valuable information in a company for use by a competitor.
- The practice of using another person's name and personal information to obtain credit, loans, etc.
26 Clues: Pretends it will be a useful and safe program. • When someone accesses information without permission. • The act of intercepting communications between two points. • Gaining unauthorized access to data in a system or computer. • The protection of computing systems and the data that they store or access. • ...
Mechanisms - Key Terms 2016-09-15
Across
- A continuous band of tough flexible material used to transmit motion and power within a pulley system
- An inclined plane wrapped around a cylinder, forming the path and pitch
- The resistance that one surface or object encounters when moving over another
- A profession for which one trains and which is undertaken as a long-term vocation
- A circular toothed object used to transfer rotary motion and torque through interlocking teeth
- A rigid bar used to exert a pressure or sustain a weight at one point of its length by the application of a force at a second point and turning at a third on a fulcrum
- Ratio of distance traveled by the applied effort and resistance force within a system
- A force that produces or tends to produce rotation or torsion
- The structure of or the relationship of the parts in a machine or in a construction or process comparable to a machine
- A flat surface set at an angle (or incline) with no moving parts that is able to lift objects by pushing or pulling the load
- The recognized accreditor for college and university programs in applied science, computing, engineering, and technology
- The ratio of useful energy output to the total energy input, or the percentage of work input that is converted to work output
- A series of usually metal links or rings connected to or fitted into one another and used to transmit motion and power within a sprocket system
Down
- Creating, designing, and transmitting technical information so that people can understand it easily and use it safely, effectively, and efficiently
- The ratio of the magnitude of the resistance and effort forces applied to a system
- Distance between adjacent threads in a screw
- An external force applied to an object
- Any of various elementary mechanisms including the lever, wheel and axle, pulley, inclined plane, wedge, and screw
- A gear positioned between the driver and the driven gear used to change rotational direction
- Two differently sized circular objects that are attached together and turn as one
- The fixed point around which a lever rotates
- A condition where there are no net external forces acting upon a particle or rigid body and the body remains at rest or continues at a constant velocity
- Impeding effect exerted by one material object on another
- A substance that tapers to a thin edge and is used for splitting, raising heavy bodies, or tightening by being driven into something
- A type of lever that is a wheel with a groove in its rim, which is used to change the direction or multiply a force exerted by a rope or cable
- A toothed wheel whose teeth engage the links of a chain
- The turning effect of a force about a point equal to the magnitude of the force times the perpendicular distance from the point to the line of action from the force
27 Clues: An external force applied to an object • Distance between adjacent threads in a screw • The fixed point around which a lever rotates • A toothed wheel whose teeth engage the links of a chain • Impeding effect exerted by one material object on another • A force that produces or tends to produce rotation or torsion • ...
Vocabulary lesson -AmirTsuli 2017-03-02
Across
- Box launcher- A dialog box launcher is a small icon that appears in a group
- A second or further document or page that can be opened on a spreadsheet or web browser.
- the unprinted area of a piece of printing, as of a poster or newspaper page, or of a portion of a piece of printing, as of an advertisement.
- view- After you click the File tab, you can see the Microsoft Office Backstage view
- a number of people or things that are located close together or are considered or classed together.
- keep and store up something, especially money for future use.
- A context menu (also called contextual, shortcut, and popup or pop-up menu) is a menu in a graphical user interface (GUI) that appears upon user interaction, such as a right-click mouse operation.
- In computing and telecommunication, a control character or non-printing characteris a code point (a number) in a character set, that does not represent a written symbol.
- cancel or reverse the effects or results of a previous action or measure.
- Tips In Microsoft Office 2007 and 2010 applications, like Word, Excel, PowerPoint, and Outlook, a key tip is a keyboard shortcut to use a function on a ribbon, also called a ribbon control.
- a girder that has the shape of an I when viewed in section.
- By Vangie Beal A graphical user interface (GUI) feature in which a small text box appears when a mouse pointer is hovered over an icon or button.
- a feature that automatically moves a word that is too long to fit on a line to the beginning of the next line.
Down
- point In graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen.
- a shaped piece of metal, wood, card, plastic, or other material used as a pattern for processes such as painting, cutting out, shaping, or drilling.
- The Quick Access Toolbar is a customizable toolbarthat contains a set of commands that are independent of the tab on the ribbon that is currently displayed.
- an inspection or viewing of something before it is bought or becomes generally known and available
- a software function that gives users the option of completing words or forms by a shorthand method on the basis of what has been typed before.
- When you select text, you can show or hide the handy Mini toolbar, which helps you work with fonts, alignment, text color, indenting, and bullets.
- A command in the File menu of most applications that causes a copy of the current document or image to be created.
- Keys- allows a computer user to immediately jump to a specific part of a web page via the keyboard.
- a long, narrow strip of fabric, used especially for tying something or for decoration.
- a list of commands or options, especially one displayed on screen.
- produce books, newspapers, magazines, etc., especially in large quantities, by a mechanical process involving the transfer of text, images, or designs to paper.
24 Clues: a girder that has the shape of an I when viewed in section. • keep and store up something, especially money for future use. • a list of commands or options, especially one displayed on screen. • cancel or reverse the effects or results of a previous action or measure. • Box launcher- A dialog box launcher is a small icon that appears in a group • ...
Principles of Business Ch. 12 2017-06-21
Across
- a list of steps to be followed for performing a particular work activity; a description of the way work is to be done.
- the best practices among all competitors.
- using soft ware, resources, and work files that are maintained on a common server.
- a detailed account of a company's materials, supplies, and finished products.
- raw materials supplied by nature.
- maintains the supply of all resources needed for production and the products produced.
- the activities, equipment, and resources needed to manufacture a product.
- software that allows cooperating companies to share ordering, production, and shipping information.
- changing the form of raw materials into a specific product useable for consumption.
- a business that takes resources from nature for direct consumption or for use in developing other products.
- building a specific and unique product to meet the needs of one customer.
- a specific measurement against which an activity or result is judged.
- managing the acquisition, movement, and storage of supplies, materials, and finished products in a business.
- businesses that get supplies from other producers and convert them into products.
- people who cultivate land and use other natural resources to grow crops and raise livestock for consumption.
- soft ware that provides real-time communications capabilities by voice, text, and video.
- crops and animals raised by farmers.
- changing and improving the form of another product.
- describes the financial plan for ongoing operations of the business for a specific period of time.
Down
- identifies how work will be done, who will do it, and what resources will be needed.
- changing the form of raw materials so they can be consumed or used to make other products.
- using technology to access and exchange information to complete the work of an organization.
- products that have been changed in form to increase their value and usefulness.
- a way to increase the quality of work by reducing errors, inefficiencies, and waste.
- facilities management using the practice of protecting the environment.
- a logistics process in which goods arrive when needed for production, use, or sale rather than sitting in storage.
- individuals and organizations that determine what products and services will be available for sale.
- research done without a specific product in mind with the goal of discovering new solutions to problems.
- a form of production in which products are obtained from nature or grown using natural resources.
- using short production runs to produce a precise amount of a variation of a product.
- a time plan for completing activities. It matches people with resources to make sure activities are finished on time.
- marketing research that studies existing products to develop design improvements or new product uses.
- combining raw materials and processed goods into finished products.
- an assembly process that makes a large number of identical products using a continuous efficient procedure.
34 Clues: raw materials supplied by nature. • crops and animals raised by farmers. • the best practices among all competitors. • changing and improving the form of another product. • combining raw materials and processed goods into finished products. • a specific measurement against which an activity or result is judged. • ...
Computer Parts and Terms 2014-11-11
Across
- A computer which may be used to provide services to clients.
- A collection of computers and devices connected by communications channels.
- A pointing device that functions by detecting two-dimensional motion relative to its supporting surface.
- ___________ is a digital display interface developed by the Video Electronics Standards Association (VESA). The interface is primarily used to connect a video source to a display device such as a computer monitor, though it can also be used to transmit audio, USB, and other forms of data.
- A hardware device or software to protect a computer from viruses, malware, trojans etc.
- An electronic or electromechanical hardware device that is used for entering data into, and displaying data from, a computer or a computing system.
- _________ case (or computer chassis, cabinet, box, tower, enclosure, housing, system unit or simply case) - the enclosure that contains most of the components of a computer (usually excluding the display, keyboard and mouse).
- Computer programs and other kinds of information read and written by computers
- Devices that are used to store data or programs on a temporary or permanent basis for use in an electronic digital computer.
- The physical components of a computer.
- (or chip set) - a group of integrated circuits, or chips, that are designed to work together. They are usually marketed as a single product.
- (Digital Video Disc or Digital Versatile Disc) - an optical compact disc - of the same dimensions as compact discs (CDs), but store more than six times as much data.
- (Dynamic random-access memory) - a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit and which must be periodically refreshed to retain the stored data.
Down
- A computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
- A peripheral which produces a text or graphics of documents stored in electronic form, usually on physical print media such as paper or transparencies.
- (Synchronous dynamic random access memory) - dynamic random access memory that is synchronized with the system bus.
- An electronic visual display for computers.
- The central printed circuit board (PCB) in many modern computers which holds many of the crucial components of the system, while providing connectors for other peripherals.
- A device attached to a computer but not part of it.
- Any form of computer data storage that allow stored data to be accessed in any order (i.e., at random).
- An input device, partially modeled after the typewriter keyboard, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches.
- A pointing device consisting of specialized surface that can translate the motion and position of a user's fingers or a stylus to a relative position on a screen.
- A webcam is a video camera that feeds its images in real time to a computer or computer network, often via USB, Ethernet, or Wi-Fi.
23 Clues: The physical components of a computer. • An electronic visual display for computers. • A device attached to a computer but not part of it. • A computer which may be used to provide services to clients. • A collection of computers and devices connected by communications channels. • Computer programs and other kinds of information read and written by computers • ...
Computer Terms 2014-08-21
Across
- An initial public offering (IPO) refers to the first time a company publicly sells shares of its stock on the open market
- link (machines, especially computers) to operate interactively
- the relative physical position or direction of something
- type or format with a full space between lines
- a computer program that checks the spelling of words in files of text, typically by comparison with a stored list of words
- enter (data) by means of a keyboard
- A location in a document where a visible digital signature can be inserted
- a page at the beginning of a book giving its title, the names of the author and publisher, and other publication information
- (of a letter, figure, or symbol) written or printed above the line
- All computer resources are managed by the CU (Control Unit). It directs the flow of data between the Central Processing Unit (CPU) and the other devices
- a compact disc used as a read-only optical memory device for a computer system
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- the text is aligned along the left margin or gutter
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted
- what is put in, taken in, or operated on by any process or system
- a particular design of type
Down
- a standard formula of words used in a letter to address the person being written to
- a line at the head of a dispatch or special article in a newspaper showing the date and place of writing
- Software that analyzes the grammar of a sentence. It can check for and highlight incomplete sentences, awkward phrases, wordiness and poor grammar
- short reports that are prepared without binders or covers
- the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media
- a dot or other punctuation mark, in particular a period
- a printer, linked to a computer, producing good-quality printed material by using a laser to form a pattern of electrostatically charged dots on a light-sensitive drum, which attract toner
- a printed heading on stationery stating a person's or organization's name and address
- the official procedure or system of rules governing affairs of state or diplomatic occasions
- especially in computing) arrange or put into a format .prepare (a storage medium) to receive data
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- a key or command that toggles between two modes, such as the caps lock key
- a printed version on paper of data held in a computer
- the machines, wiring, and other physical components of a computer or other electronic system
30 Clues: a particular design of type • enter (data) by means of a keyboard • type or format with a full space between lines • the text is aligned along the left margin or gutter • a printed version on paper of data held in a computer • a dot or other punctuation mark, in particular a period • the relative physical position or direction of something • ...
Islam 2015-01-15
Across
- The physical struggle with spiritual significance fighting to protect themselves from those who would harm them
- it is a type of building, the muslim house of worship
- It contains passages that Muslims believe Muhammad received from the angel Gabriel
- A pillar that represents the profession or declaration of faith
- A pillar that represents the daily ritual prayer
- those who surrender to God
- Allows people to identify the direction in which they are traveling
- the belief in a single god
- they were used to stitch the wounds
- It was where the Jews were forced to live in crowded neighborhoods
- A pillar that represents the pilgrimage to the holy city of Makkah
- the second caliph
- proposed marriage to Muhammad
- the fourth caliph
- It is the direction of Makkah
- It is a sport in which teams on horseback use mallets to strike a ball through a goal
- prophet of god
- He is the leader the Umayyads
- the third caliph
- Muhammad's birthplace
- The body, or collection, of Islamic law
- The person who chants the call to prayer
- It is a device for computing time based on the location of the sun or the stars
- He started the Ottoman dynasty in northern Anatolia
- It is the supreme ruler in a muslim state
- They were used to put patients to sleep before operations
- A pillar that represents fasting(going without food)and they were instructed to fast for an entire month during Ramadan
Down
- It was the battle of wits in which players move pieces on a board according to complex rules.
- This place was important to the Jews, Christians, and Muslims
- They were people whose homeland was north of China
- It is called where muslims belonged to a single Islamic community
- It separates men and women, surgical patients, and people with diseases that are contagious
- belief in more than one god
- The spreading of ideas and ways of life
- It is the example that Muhammad set for Muslims during his lifetime
- It is the study of objects in the universe
- It was the highest form of decorative art, the art of beautiful handwriting
- It is used to bring water up from the canals and reservoirs
- The angel that brought revelations or revealed teachings from god
- A roman catholic court to combat forms of religious error
- It is the hostility or discrimination against Jews
- It is a ruler in certain Middle east lands such as Persia
- the first caliph
- It is the ninth month of the Islamic calendar during where Muslims are required to fast as part as a tradition
- A pillar that represents charity and told wealthy people to share their riches with the less fortunate
- A series of religious wars launched by European Christians
- They were called where Jews, Christians, and Muslims had their own communities.
- It is the scientific study of animals
48 Clues: prophet of god • the first caliph • the third caliph • the second caliph • the fourth caliph • Muhammad's birthplace • those who surrender to God • the belief in a single god • belief in more than one god • proposed marriage to Muhammad • It is the direction of Makkah • He is the leader the Umayyads • they were used to stitch the wounds • It is the scientific study of animals • ...
Lesson 1.1 Mechanisms - Key Term Crossword 2021-09-15
Across
- A rigid bar used to exert a pressure or sustain a weight at one point of its length by the application of a force at a second point and turning at a third on a fulcrum.
- A type of lever that is a wheel with a groove in its rim, which is used to change the direction or multiply a force exerted by a rope or cable.
- An external force applied to an object.
- The fixed point around which a lever rotates.
- A condition where there are no net external forces acting upon a particle or rigid body and the body remains at rest or continues at a constant velocity.
- The resistance that one surface or object encounters when moving over another.
- The turning effect of a force about a point equal to the magnitude of the force times the perpendicular distance from the point to the line of action from the force.
- Any of various elementary mechanisms including the lever, wheel and axle, pulley, inclined plane, wedge, and screw.
- A substance that tapers to a thin edge and is used for splitting, raising heavy bodies, or tightening by being driven into something.
- The ratio of the magnitude of the resistance and effort forces applied to a system.
- The ratio of useful energy output to the total energy input, or the percentage of work input that is converted to work output.
- A series of usually metal links or rings connected to or fitted into one another and used to transmit motion and power within a sprocket system.
- A gear positioned between the driver and the driven gear used to change rotational direction.
Down
- Ratio of distance traveled by the applied effort and resistance force within a system.
- A toothed wheel whose teeth engage the links of a chain.
- A profession for which one trains and which is undertaken as a long-term vocation.
- Creating, designing, and transmitting technical information so that people can understand it easily and use it safely, effectively, and efficiently.
- A force that produces or tends to produce rotation or torsion.
- Impeding effect exerted by one material object on another.
- A continuous band of tough flexible material used to transmit motion and power within a pulley system.
- Two differently sized circular objects that are attached together and turn as one.
- Distance between adjacent threads in a screw.
- An inclined plane wrapped around a cylinder, forming the path and pitch.
- The structure of or the relationship of the parts in a machine or in a construction or process comparable to a machine.
- A flat surface set at an angle (or incline) with no moving parts that is able to lift objects by pushing or pulling the load.
- The recognized accreditor for college and university programs in applied science, computing, engineering, and technology.
- A circular toothed object used to transfer rotary motion and torque through interlocking teeth.
27 Clues: An external force applied to an object. • The fixed point around which a lever rotates. • Distance between adjacent threads in a screw. • A toothed wheel whose teeth engage the links of a chain. • Impeding effect exerted by one material object on another. • A force that produces or tends to produce rotation or torsion. • ...
AI Practical Work 2 2021-12-17
Across
- Local search algorithm that starts with an arbitrary solution to a problem, then
- simulation of human intelligence processes by machines, especially computer systems.
- Type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
- Adaptive resonance theory: describes a number of neural network models which use supervised and unsupervised learning methods, and address problems such as pattern recognition and prediction.
- Branch of mathematics used to model the strategic interaction between different players in a context with predefined rules and outcomes.
- algorithm for supervised learning of binary classifiers.
- Learning rule that describes how the neuronal activities influence the connection between neurons.
- computerized system composed of multiple interacting intelligent agents.
- Realistic humanoid robot designed for research, education, and entertainment, and helps promote public discussion about Artificial Intelligence ethics and the future of robotics. Developed by the Hong Kong-based company Hanson Robotics.
- Computing systems that are based on a collection of nodes that simulate the neurons in the human brain.
- Artificial Immune Systems: machine learning systems inspired by theoretical immunology.
- test of a machine's ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human.
- Logic programming language associated with artificial intelligence and computational linguistics.
- Autonomous entity that learns and uses knowledge to achieve its goals.
Down
- Algorithm for supervised learning of artificial neural networks using gradient descent.
- Type of machine learning and artificial intelligence that imitates the way humans gain certain types of knowledge.
- Fully connected network with each node connecting to every other node, including itself. The nodes compete against each other by sending out inhibiting signals to each other.
- interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers.
- to find a better solution by making incremental changes to it.
- Computer program developed by DeepMind that uses machine learning (artificial neural networks) to identify the best moves to win the board game “Go”.
- Java Agent Development Framework: software framework for the development of an intelligent agent, implemented in Java.
- Finite sequence of well-defined computer instructions to solve a computation problem.
- act of defining a problem; determining the cause of the problem; identifying, prioritizing, and selecting alternatives for a solution; and implementing a solution.
- Elementary unit of an artificial neural network.
- Biological correspondent of the weights in an artificial neural network.
- Uninformed search algorithm that aims to find a path to the goal node which has the lowest cumulative cost.
- Restricted Boltzmann Machine: generative stochastic artificial neural network that can learn a probability distribution over its set of inputs.
- interdisciplinary branch of computer science and engineering. It involves design, construction, operation, and use of robots and has as its goal to design machines that can help and assist humans.
- IBM’s question-answering computer system that is capable of answering questions posed in natural language.
29 Clues: Elementary unit of an artificial neural network. • algorithm for supervised learning of binary classifiers. • to find a better solution by making incremental changes to it. • Autonomous entity that learns and uses knowledge to achieve its goals. • Biological correspondent of the weights in an artificial neural network. • ...
AI Practical Work 2 2021-12-17
Across
- IBM’s question-answering computer system that is capable of answering questions posed in natural language.
- Algorithm for supervised learning of artificial neural networks using gradient descent.
- Artificial Immune Systems: machine learning systems inspired by theoretical
- Logic programming language associated with artificial intelligence and computational linguistics.
- Computer program developed by DeepMind that uses machine learning (artificial neural networks) to identify the best moves to win the board game “Go”.
- Realistic humanoid robot designed for research, education, and entertainment, and helps promote public discussion about Artificial Intelligence ethics and the future of robotics. Developed by the Hong Kong-based company Hanson Robotics.
- Autonomous entity that learns and uses knowledge to achieve its goals.
- Biological correspondent of the weights in an artificial neural network.
- Finite sequence of well-defined computer instructions to solve a computation
- and unsupervised learning methods, and address problems such as pattern recognition and prediction.
- Local search algorithm that starts with an arbitrary solution to a problem, then
- Java Agent Development Framework: software framework for the development of an intelligent agent, implemented in Java.
- computerized system composed of multiple interacting intelligent agents.
- Branch of mathematics used to model the strategic interaction between different players in a context with predefined rules and outcomes.
- algorithm for supervised learning of binary classifiers.
- interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers.
- simulation of human intelligence processes by machines, especially computer systems.
Down
- Type of machine learning and artificial intelligence that imitates the way humans gain certain types of knowledge.
- Uninformed search algorithm that aims to find a path to the goal node which has the lowest cumulative cost.
- act of defining a problem; determining the cause of the problem; identifying, prioritizing, and selecting alternatives for a solution; and implementing a solution.
- Adaptive resonance theory: describes a number of neural network models which use
- to find a better solution by making incremental changes to it.
- Elementary unit of an artificial neural network.
- test of a machine's ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human.
- Type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
- Fully connected network with each node connecting to every other node, including itself. The nodes compete against each other by sending out inhibiting signals to each
- Computing systems that are based on a collection of nodes that simulate the neurons in the human brain.
- Restricted Boltzmann Machine: generative stochastic artificial neural network that can learn a probability distribution over its set of inputs.
- interdisciplinary branch of computer science and engineering.
- Learning rule that describes how the neuronal activities influence the connection between neurons.
- involves design, construction, operation, and use of robots and has as its goal to design machines that can help and assist humans.
31 Clues: Elementary unit of an artificial neural network. • algorithm for supervised learning of binary classifiers. • interdisciplinary branch of computer science and engineering. • to find a better solution by making incremental changes to it. • Autonomous entity that learns and uses knowledge to achieve its goals. • ...
networks 2019-05-13
Across
- : the copying of physical or virtual files or databases
- : a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor
- : using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- : a type of computer memory that can be accessed randomly
- : The memory from which we can only read but cannot write on it
- : connects all the internal components of a computer, such as CPU and memory, to the motherboard
- : A person responsible for the implementation and maintenance of a website
- : an element of a graphical user interface (GUI) that displays information or provides a specific way for a user to interact with the operating system or an application
- : a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously
- : a listing of text, images, or other objects that are arranged in a chronological order that first started appearing in 1998
- : a region of a physical memory storage used to temporarily store data while it is being moved from one place to another.
- : a telecommunications network, usually used for connecting computers, which spans a wide geographical area
- : any computing hardware that is used for storing, porting and extracting data files and objects
- : a type of memory organization or image file format used to store digital images
- : any physical device capable of storing information temporarily like RAM
- : a point in a network or diagram at which lines or pathways intersect or branch
Down
- : the quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media
- : a software application that lets you visit web pages on the Interneta software application that lets you visit web pages on the Internet
- : a set of computers connected together for the purpose of sharing resources
- : a machine that processes something
- drum : also referred to as drum, is a metal cylinder coated with magnetic iron-oxide material on which data and programs can be stored
- : an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
- : a separate viewing area on a computer display screen in a system that allows multiple viewing areas as part of a graphical user interface ( GUI )
- : a unit of storage capable of holding a single character
- : a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- : a number system where every number is expressed by 0 or 1 or a combination of them
- : the activity or business of providing storage space and access for websites
- : a Microsoft web services strategy to connect information, people, systems, and devices through software
- disk : A magnetic disk on which you can store computer data
29 Clues: : a machine that processes something • : the copying of physical or virtual files or databases • : a type of computer memory that can be accessed randomly • : a unit of storage capable of holding a single character • disk : A magnetic disk on which you can store computer data • : The memory from which we can only read but cannot write on it • ...
Photography 2020-11-30
Across
- minute area of illumination on a display screen, one of many from which an image is composed.
- used to provide momentary illumination of a dark or insufficiently lit subject.
- eye , elevated view of an object from above
- to describe visual distortion and random variation of brightness or color information in images
- center of interest or activity.
- , controls the depth of field
- of field,the distance between the nearest and the farthest objects that are in acceptably sharp focus in an image.
- , an optical aberration that deforms and bends physically straight lines and makes them appear curvy in images
- angle, having or covering an angle of view wider than the ordinary —used especially of lenses of shorter than normal focal length
- sync , the synchronizing the firing of a photographic flash with the opening of the shutter admitting light to photographic film or electronic image sensor.
- detail an image holds.
- of a person especially one depicting only the face or head and shoulders.
- , a reduction of an image's brightness or saturation toward the periphery compared to the image center
- , a strip or sheet of transparent film base coated on one side with a gelatin emulsion containing microscopically small light-sensitive silver halide crystals
- a subject appear closer or farther away in an image.
- part of (a photograph or other image) in order to produce a better picture or to fit a given space.
- photoshop,the predominant photo editing and manipulation software on the market
- speed , controls how long the shutter stays open
- , a device used to make photos
- transparent colored material used to modify lights for photography and cinematography, placed over light sources to create colorful effects.
Down
- the main light source for a photograph behind the primary subject.
- in conjunction with a camera body and mechanism to make images of objects.
- a still or video camera horizontally from a fixed position
- triangle , made up by aperture, shutter speed, and iso
- or become unclear or less distinct.
- , measure of transparency
- working place of a painter, sculptor, or photographer
- , unwanted tint of a particular color
- unbroken view of the whole region surrounding an observer; an unbroken view of the whole region surrounding an observer.
- the placement and position of the subjects in your shots
- a concise collection of your photos created to show people your best work
- the elements of a photo are arranged
- painting,a photographic technique where light is “painted” or “drawn” into the photograph using a hand held light source during a long exposure.
- or become unclear or less distinct.
- processes of altering images, whether they are digital photographs, traditional photo-chemical photographs, or illustrations.
- eye , a view of an object from below
- three-legged stand for supporting a camera
- , controls light sensitivity
- , process of using electronic and computing appliances to capture, create, edit and share images,photographs.
- amount of light per unit area
40 Clues: detail an image holds. • , measure of transparency • , controls light sensitivity • amount of light per unit area • , controls the depth of field • center of interest or activity. • , a device used to make photos • or become unclear or less distinct. • or become unclear or less distinct. • the elements of a photo are arranged • , unwanted tint of a particular color • ...
Photography 2020-11-30
Across
- controls the depth of field
- the center of interest or activity.
- the placement and position of the subjects in your shots
- the synchronizing the firing of a photographic flash with the opening of the shutter admitting light to photographic film or electronic image sensor.
- the distance between the nearest and the farthest objects that are in acceptably sharp focus in an image.
- a transparent colored material used to modify lights for photography and cinematography, placed over light sources to create colorful effects.
- make or become unclear or less distinct.
- a strip or sheet of transparent film base coated on one side with a gelatin emulsion containing microscopically small light-sensitive silver halide crystals
- make or become unclear or less distinct.
- the predominant photo editing and manipulation software on the market
- controls how long the shutter stays open
- the working place of a painter, sculptor, or photographer
- photograph of a person especially one depicting only the face or head and shoulders.
- a view of an object from below
- an optical aberration that deforms and bends physically straight lines and makes them appear curvy in images
- the processes of altering images, whether they are digital photographs, traditional photo-chemical photographs, or illustrations.
- measure of transparency
- positioning the main light source for a photograph behind the primary subject.
- having or covering an angle of view wider than the ordinary —used especially of lenses of shorter than normal focal length
- unwanted tint of a particular color
- a reduction of an image's brightness or saturation toward the periphery compared to the image center
- a concise collection of your photos created to show people your best work
Down
- the detail an image holds.
- used in conjunction with a camera body and mechanism to make images of objects.
- an unbroken view of the whole region surrounding an observer; an unbroken view of the whole region surrounding an observer.
- elevated view of an object from above
- process of using electronic and computing appliances to capture, create, edit and share images,photographs.
- made up by aperture, shutter speed, and iso
- used to provide momentary illumination of a dark or insufficiently lit subject.
- term to describe visual distortion and random variation of brightness or color information in images
- the amount of light per unit area
- a photographic technique where light is “painted” or “drawn” into the photograph using a hand held light source during a long exposure.
- how the elements of a photo are arranged
- a three-legged stand for supporting a camera
- controls light sensitivity
- swiveling a still or video camera horizontally from a fixed position
- remove part of (a photograph or other image) in order to produce a better picture or to fit a given space.
- a minute area of illumination on a display screen, one of many from which an image is composed.
- a device used to make photos
- making a subject appear closer or farther away in an image.
40 Clues: measure of transparency • the detail an image holds. • controls light sensitivity • controls the depth of field • a device used to make photos • a view of an object from below • the amount of light per unit area • the center of interest or activity. • unwanted tint of a particular color • elevated view of an object from above • make or become unclear or less distinct. • ...
