computing Crossword Puzzles

UNIT 4 2024-07-19

UNIT 4 crossword puzzle
Across
  1. A device that connects to the internet
  2. At or to a greater distance
  3. In a slow manner over a period of time
  4. Easy to perceive, understand, or interpret
  5. A protective cover or container for a device
  6. An impression or mark made on a surface by a person's fingertip
  7. a signal To receive a transmission for communication
  8. A set of keys used to input data into a computer
  9. Established or founded on something
  10. Relating to soldiers or armed forces
  11. A group of twelve items
  12. To publish or share something online
  13. The process of creating or improving a product or software
  14. For the most part; mainly
  15. A device into which an electric plug is inserted
  16. When a computer or program stops working suddenly
  17. To desire something strongly
  18. A device that produces physical copies of digital documents
  19. A roll of parchment or paper for writing on
  20. A person highly interested in knowledge and ideas
  21. Awkward in movement or in handling things
  22. A thick wire or group of wires used to carry electricity or signals
  23. Close to or not far away
  24. tree A type of coniferous tree that has needle-like leaves
  25. A device that outputs sound from a computer
  26. Valuable items or wealth
  27. Relating to or characteristic of a colony or colonies
  28. Involving or determined by competition
  29. To set up software for use on a computer or device
  30. A feeling of enthusiasm or eagerness
Down
  1. Instructions written for a computer to execute
  2. Easy to carry or move around
  3. Not known or familiar
  4. A long fictional narrative
  5. To recognize the full worth of something
  6. To travel through an unfamiliar area in order to learn about it
  7. A device that directs data packets between networks
  8. A device that stores and provides electrical power
  9. A device used to replenish the battery of an electrical device
  10. witness A person who has seen something happen and can give a firsthand description of it
  11. Without life
  12. A feeling of worry or unease
  13. To look through or glance at casually
  14. Not present or included; absent
  15. A screen used to display the output from a computer
  16. A small book or magazine containing pictures and information about a product or service
  17. To pursue someone or something
  18. Having no money; financially ruined
  19. Deliberately cruel or violent
  20. To put data or software into a computer's memory
  21. A small integrated circuit used in electronics
  22. A small hand-held device used for computing
  23. A camera used for video communication over the internet
  24. Of short duration; not lasting for long
  25. A brief statement of the main points
  26. in To connect a device to an electrical outlet
  27. Not confident or assured; uncertain and anxious
  28. A precious gem produced by mollusks
  29. To the smallest extent or degree
  30. for To search for and find
  31. Showing too much curiosity about other people's affairs
  32. A precious stone used in jewelry
  33. An imitation of a situation or process
  34. out To fail to participate in something
  35. Not common or frequent

65 Clues: Without lifeNot known or familiarNot common or frequentA group of twelve itemsClose to or not far awayValuable items or wealthFor the most part; mainlyA long fictional narrativefor To search for and findAt or to a greater distanceEasy to carry or move aroundA feeling of worry or uneaseTo desire something stronglyDeliberately cruel or violent...

803ab - Weather Schoolhouse 2023-07-10

803ab - Weather Schoolhouse crossword puzzle
Across
  1. The NAVGEM does not perform well with forecasting _______ systems.
  2. A limitation of a Deterministic model is that
  3. The GFS is known for "progressive bias" and pushes storms to far ____.
  4. The NAVGEM does not forecast well over ______.
  5. Mathematical computations relating to force acting on or exerted by ice, water, or water vapor.
  6. The GFS tends to move __________ features to quickly.
  7. WAA is most common on the ____ side of low pressure centers.
  8. Deterministic models align data within a models _____ points (Vertical and Horizontal).
  9. The _______ derives probability products using 16 emmbers in 2 hour increments, and provides mesoscale-to-microscale products.
  10. Mathematical projections of a 3-D atmopshere for a specific location over time, uses hydrodynamical equations.
  11. A limitation of a Deterministic model is that it is impossible to aquire precise _____ conditions.
  12. An advantage of Stochastic models is that it increases the solution spread, which increases the _____ of occurrence.
  13. A limitation of Stochastic models is that it uses a lot of _____ power, and takes longer to produce/deliver.
  14. The ______ is a Stochastic model created by the 557th weather wing and derives probability products using 63 ensemble members.
  15. High thickness values indicate ____ air.
  16. During trend analysis, you will have ________ when the new analysis data is slightly different from model.
  17. ________ vorticity is Shear + Curvature.
  18. When a parcel's "Z" axis is ______ to Earths "Z" axis then Planetary vorticity is near zero.
  19. Created by NCEP, and products are available out to 16 days.
  20. An advantage of a Deterministic model is that it is easy to use, and products are avilable for _________ use quickly.
  21. On thickness, forecast a ________ when there is a contour trough without a thickness gradient.
  22. Negative vorticity is indicated by "N" and indicates ______ upward vertical motion.
Down
  1. Algorithms produce mathematical solutions displayed on this type of model, with specific values.
  2. An example of ______ is 528dam to 540 dam.
  3. When using the thickness model to forecast, SFC fronts are found in ________.
  4. The GFS beyond 7-10 days is often unreliable based on ______.
  5. A thickness gradient identifies areas of _____ advection, horizontal movement of temperature.
  6. The GFS works best for ____ range forecasts (3-10 days).
  7. ________ vorticity is the amount of rotation in straight-line flow.
  8. For Stochastic models, multiple ______ members result in different solutions.
  9. Primary model for oceanic operations.
  10. Algorithms produce descriptive statistic, and repeats equation multipletimes with randomization.
  11. What would you forecast if you see a closed, cold core thickness isopleth in nearly the same location and orientation as the isobaric pattern?
  12. Created by roation in the jet axis, and parallels contours on the vorticity model.
  13. The ______ displays weather parameters in a table format.
  14. On the vorticity model, a deepening MSWT is indicated by greater ____.
  15. Lines interconnecting the same thickness height are called _____.
  16. __________ is the vertical distance between two constant pressure surfaces.
  17. The ______________ thickness gradient parallels the 500mb contours.
  18. The 570 dam thickness isopleth is the boundary between modified polar and ______ air.
  19. Process example: 00-hour forecast of new model compared to 06-hour froecast of OLD model.
  20. You will locate the ____ between 528-570 on the thickness isopleths.
  21. This process determines model accuracy.
  22. Downstream of a MSWT axis on the vorticity chart you will find ______.
  23. ________ vorticity is the total roation of parcel due to a combination of all forces.
  24. Negative vorticity advection is the movement of ______ vorticity values.

46 Clues: Primary model for oceanic operations.This process determines model accuracy.High thickness values indicate ____ air.________ vorticity is Shear + Curvature.An example of ______ is 528dam to 540 dam.A limitation of a Deterministic model is thatThe NAVGEM does not forecast well over ______.The GFS tends to move __________ features to quickly....

Krzyżówka zadanie 2025-12-10

Krzyżówka zadanie crossword puzzle
Across
  1. Use of technology to perform tasks without human input.
  2. A sign that danger or problems may occur.
  3. Information stored or processed by computers.
  4. A request for information from a database.
  5. Accidental or unlawful release of information.
  6. A risk or danger.
  7. A specific area or internet address space.
  8. A user identity in a system.
  9. Related to money or cost.
  10. A tool that blocks unwanted network traffic.
  11. A document describing an event or findings.
  12. The current condition of a system.
  13. Related to investigating cyber incidents.
  14. To check a system for issues or threats.
  15. A computer that provides resources to others.
  16. Too much data or activity for a system to handle.
  17. Numerical information used for analysis.
  18. A saved copy of data in case of loss.
  19. Unauthorized entry into a system.
  20. A piece of hardware used in computing.
  21. A written record of actions or events.
  22. Someone who monitors or watches activity.
  23. A set of rules for communication.
  24. Measurements used to evaluate performance.
  25. A call for data or a service.
  26. Permission to use or enter a system.
  27. Proof of an event or action.
  28. Programs used by a computer.
  29. A person or system chosen for attack.
  30. The ability to manage or direct something.
  31. Long-term storage of old files.
  32. A prediction based on information.
  33. A formal review of systems or processes.
Down
  1. A direct instruction given to a computer.
  2. A formal rule or guideline.
  3. To watch or track activity.
  4. A part of a larger software system.
  5. Official rule made by authorities.
  6. Searching for threats inside a network.
  7. Something unusual that may signal a problem.
  8. Continuous flow of data.
  9. A system on which applications can run.
  10. Instructions written for computers.
  11. An event that disrupts normal operations.
  12. A weakness that can be exploited.
  13. Monitoring to make sure rules are followed.
  14. A secret code to access a system.
  15. To follow the path of an action or data flow.
  16. A mistake or problem in a system.
  17. Information sent from one place to another.
  18. A connection point in a network.
  19. A place where data is kept.
  20. Protection against threats or attacks.
  21. Records of system activities.
  22. To protect from harm or attacks.
  23. Delay in data communication.
  24. The way a system or user acts.
  25. The right to keep personal data protected.
  26. Belief that someone or something is reliable.
  27. A set of connected computer components.
  28. The path data takes to reach a destination.
  29. A simplified digital structure used to predict or analyze.
  30. An action taken after an incident.
  31. Connected computers that share data.
  32. The chance that something bad may happen.
  33. Converting information into a secure code.
  34. Following laws, rules, or standards.
  35. A break in security where data is exposed.
  36. A step taken to solve a problem.
  37. Rules about what is morally right or wrong.
  38. A tool used to explore or test a system.
  39. Studying information to understand it.
  40. Learning skills or knowledge.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A formal rule or guideline.To watch or track activity.A place where data is kept.A user identity in a system.Delay in data communication.Proof of an event or action.Programs used by a computer.Records of system activities.A call for data or a service.Learning skills or knowledge....

PaulinaNatalia 2025-12-10

PaulinaNatalia crossword puzzle
Across
  1. An action taken after an incident.
  2. A place where data is kept.
  3. To protect from harm or attacks.
  4. A tool that blocks unwanted network traffic.
  5. Converting information into a secure code.
  6. The right to keep personal data protected.
  7. A computer that provides resources to others.
  8. A tool used to explore or test a system.
  9. The path data takes to reach a destination.
  10. Programs used by a computer.
  11. A part of a larger software system.
  12. Information sent from one place to another.
  13. A step taken to solve a problem.
  14. A direct instruction given to a computer.
  15. Use of technology to perform tasks without human input.
  16. Learning skills or knowledge.
  17. Following laws, rules, or standards.
  18. A sign that danger or problems may occur.
  19. The way a system or user acts.
  20. Protection against threats or attacks.
  21. Rules about what is morally right or wrong.
  22. Connected computers that share data.
  23. Delay in data communication.
  24. A specific area or internet address space.
  25. A mistake or problem in a system.
  26. Instructions written for computers.
  27. A connection point in a network.
  28. Permission to use or enter a system.
  29. A risk or danger.
  30. Too much data or activity for a system to handle.
  31. Official rule made by authorities.
  32. A system on which applications can run.
  33. Belief that someone or something is reliable.
  34. Information stored or processed by computers.
  35. A prediction based on information.
  36. A document describing an event or findings.
  37. A formal review of systems or processes.
Down
  1. Unauthorized entry into a system.
  2. Related to money or cost.
  3. Continuous flow of data.
  4. Someone who monitors or watches activity.
  5. The ability to manage or direct something.
  6. Something unusual that may signal a problem.
  7. A call for data or a service.
  8. A break in security where data is exposed.
  9. A request for information from a database.
  10. Numerical information used for analysis.
  11. Records of system activities.
  12. A set of connected computer components.
  13. A set of rules for communication.
  14. A secret code to access a system.
  15. Monitoring to make sure rules are followed.
  16. To watch or track activity.
  17. To check a system for issues or threats.
  18. A formal rule or guideline.
  19. Related to investigating cyber incidents.
  20. Long-term storage of old files.
  21. Searching for threats inside a network.
  22. Proof of an event or action.
  23. Measurements used to evaluate performance.
  24. An event that disrupts normal operations.
  25. A weakness that can be exploited.
  26. A written record of actions or events.
  27. The chance that something bad may happen.
  28. A user identity in a system.
  29. A simplified digital structure used to predict or analyze.
  30. Studying information to understand it.
  31. To follow the path of an action or data flow.
  32. The current condition of a system.
  33. Accidental or unlawful release of information.
  34. A person or system chosen for attack.
  35. A saved copy of data in case of loss.
  36. A piece of hardware used in computing.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A place where data is kept.To watch or track activity.A formal rule or guideline.Programs used by a computer.Proof of an event or action.Delay in data communication.A user identity in a system.A call for data or a service.Records of system activities.Learning skills or knowledge....

Technology Vocab 2021-05-30

Technology Vocab crossword puzzle
Across
  1. the organization of data according to preset specifications
  2. adjust the spaces between words
  3. an organized body of related information
  4. a program used to view HTML documents
  5. an application that provides the user with tools needed to write and edit and format text and to send it to a printer
  6. a portable computer
  7. the address of a web page on the world wide web
  8. a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
  9. a copy of a file or directory on a separate storage device
  10. having an output that is proportional to the input
  11. a language designed for programming computers
  12. any small compartment
  13. a specific size and style of type within a type family
  14. a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
  15. a system of world-wide electronic communication in which a computer user can compose a message at one terminal that can be regenerated at the recipient's terminal when the recipient logs in
  16. written programs operating on a computer system
  17. a programmer who breaks into computer systems
  18. wipe out digitally or magnetically recorded information
  19. a digital audio file made available on the internet
  20. the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
  21. computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol
  22. a device that takes signals and displays them
  23. a system of interconnected electronic components or circuits
  24. a program that gives a computer instructions
Down
  1. the standard typewriter keyboard
  2. computer hardware that holds and spins a magnetic or optical disk and reads and writes information on it
  3. a fault or defect in a computer program, system, or machine
  4. the symbolic arrangement of data in a computer program
  5. a user interface based on graphics instead of text
  6. the mechanical components making up a computer system
  7. transfer data to a server, remote computer, or website
  8. a hand-operated electronic device that controls a cursor
  9. transfer a file or program to a smaller computer
  10. an online journal where people post about their experiences
  11. a worldwide network of computer networks
  12. the area of the screen in graphical user interfaces against which icons and windows appear
  13. a facial expression represented by a sequence of characters
  14. indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  15. a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)
  16. a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet; uses ethernet protocol
  17. a set of related records kept together
  18. out exit a computer
  19. put into a format that can be read or processed by computers
  20. an electronic storage device
  21. in enter a computer

45 Clues: a portable computerout exit a computerin enter a computerany small compartmentan electronic storage deviceadjust the spaces between wordsthe standard typewriter keyboarda program used to view HTML documentsa set of related records kept togetheran organized body of related informationa worldwide network of computer networks...

WHITECOATS 2021 - All Answers Lie Within 2021-08-16

WHITECOATS 2021 - All Answers Lie Within crossword puzzle
Across
  1. Interventional radiology has assisted in treating many patients who may have a blockage in this system.
  2. The surgeon who pioneered the first middle bone transplant by 3D printing.
  3. A science that studies the skin, hair and nails.
  4. The Tanzanian term for steam inhalation which gained popularity of recent.
  5. This fish skin is in experimental use to cover large areas of skin loss.
  6. A neurodevelopmental disorder characterized by pervasive difficulties in social interaction, communication and behavioral flexibility since early childhood.
  7. We must be prepared for this at anytime, at an individual, family and community level.
  8. This type of rehabilitation facilities will allow physiotherapy anywhere.
  9. Medical term for when the uterine tissue implants and grows outside of the uterus.
  10. Not completing prescribed doses of this and stopping the usage of the medications once symptoms have been alleviated is what is causing resistance.
  11. The organ system/group with the leading causes of death in our community from 2000 to 2016.
  12. The sort of diagnosis your doctor makes initially which may be learned and predicted by artificial intelligence systems.
  13. They produce around 40% of the world’s coffee and have managed to hold the top position for the last 150 years.
  14. This form of computing by engineers helps create clearer and more accurate medical images.
  15. The American Hospital Association (AHA) reports that 76% of United States hospitals connect with patients and practitioners using this new innovation in medicine.
Down
  1. A psychiatric disorder where a person is always obsessed with the idea of feeling sick with some undiagnosed disease.
  2. A type of fasting which allows drinks such as black coffee, black tea, herbal tea and water throughout the day.
  3. A vaccine after which you want to specifically watch out for blood clots as a side effect
  4. The last name of the Italian physician who first described PCOS in 1712
  5. Which syndrome can you develop after Bariatric surgery as a side effect.
  6. A drop in these triggers depression in the same way as it causes mood swings before menses.
  7. You need these if your teeth are too spaced out, crowded or out of place.
  8. An application focused on lifestyle modification and medication management in Diabetics.
  9. Preventing this is permissible but terminating a pregnancy after this is haraam.
  10. This is a non communicable condition stressed upon in our community alongside diabetes, hypercholesterolemia and cancer.
  11. Although this is an attractive alternative to traditional forms of physical activity, it should not replace physical exercises.
  12. Medical detox causes drug abusers to go through this which needs professionals and a controlled environment to handle it.
  13. This helps in providing our brain oxygen as well as assists in stimulation of muscle contraction, amount of energy consumption, lowers systemic inflammation and reduces chronic diseases.
  14. The Quran tells us to eat and drink but not to be of this character in relation to food.
  15. The fear of facing this leads people not to get tested or treated for HIV
  16. Severe forms of this could have someone go completely out of their way to avoid whatever they feel is triggering the attack
  17. This type of medicine helps doctors to know exactly what arrangement the lock is and in turn pick the perfect key

32 Clues: A science that studies the skin, hair and nails.The last name of the Italian physician who first described PCOS in 1712Which syndrome can you develop after Bariatric surgery as a side effect.This fish skin is in experimental use to cover large areas of skin loss.You need these if your teeth are too spaced out, crowded or out of place....

Vocab lesson 2 2017-03-03

Vocab lesson 2 crossword puzzle
Across
  1. term template, when used in the context of word processing software, refers to a sample document that has already some details in place
  2. box Launcher-A dialog box launcher is a small icon that appears in a group.
  3. the I-beam pointer is a mouse cursor shaped similar to the capital letter "I" that indicates that the text can be highlighted,
  4. Quick Access Toolbar is a customizable toolbar that contains a set of commands that are independent of the tab on the ribbon that is currently displayed.
  5. characters-In computing and telecommunication, a control character or non-printing character is a code point
  6. view- The Office Backstage view is where you manage your files and the data about them — creating, saving, inspecting for hidden metadata or personal information, and setting options.
  7. Save As A command in the File menu of most applications that causes a copy of the current document or image to be created.
  8. inspection or viewing of something before it is bought or becomes generally known and available.
  9. list of dishes available in a restaurant
  10. copy the document, record or image being worked on to a storage medium.
  11. log box-a small area on screen, in which the user is prompted to provide information or select commands
  12. context menu also called contextual, shortcut, and popup or pop-up menu is a menu in a graphical user interface.
Down
  1. is any character or series of characters that represent horizontal or vertical space in typography. When rendered
  2. graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen.In graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen.
  3. number of people or things that are located close together or are considered or classed together.
  4. Keys- an access key correlates to a designated character in a control label.
  5. is a command included in most software programs.
  6. tips-A Key Tip is a string. Its maximum width is equal to 3 characters
  7. When the mouse is moved away from the icon or button, the Screen Tip will disappear from view. A
  8. small flap or strip of material attached to or projecting from something, used to hold or manipulate it, or for identification and information
  9. complete-a software function that gives users the option of completing words or forms by a shorthand method on the basis of what has been typed before.
  10. a ribbon is a graphical control element in the form of a set of toolbars placed on several tabs
  11. especially in large quantities, by a mechanical process involving the transfer of text, images, or designs to paper
  12. small flap or strip of material attached to or projecting from something, used to hold or manipulate it, or for identification and information.
  13. word processing feature that moves words to the next line automatically as you type based on the current right margin setting.

25 Clues: list of dishes available in a restaurantis a command included in most software programs.tips-A Key Tip is a string. Its maximum width is equal to 3 characterscopy the document, record or image being worked on to a storage medium.box Launcher-A dialog box launcher is a small icon that appears in a group....

Vocab lesson 1 2017-03-02

Vocab lesson 1 crossword puzzle
Across
  1. context menu also called contextual, shortcut, and popup or pop-up menu is a menu in a graphical user interface.
  2. number of people or things that are located close together or are considered or classed together.
  3. small flap or strip of material attached to or projecting from something, used to hold or manipulate it, or for identification and information.
  4. When the mouse is moved away from the icon or button, the Screen Tip will disappear from view. A
  5. Quick Access Toolbar is a customizable toolbar that contains a set of commands that are independent of the tab on the ribbon that is currently displayed.
  6. characters-In computing and telecommunication, a control character or non-printing character is a code point
  7. tips-A Key Tip is a string. Its maximum width is equal to 3 characters
  8. term template, when used in the context of word processing software, refers to a sample document that has already some details in place
  9. Save As A command in the File menu of most applications that causes a copy of the current document or image to be created.
  10. the I-beam pointer is a mouse cursor shaped similar to the capital letter "I" that indicates that the text can be highlighted,
  11. log box-a small area on screen, in which the user is prompted to provide information or select commands
  12. complete-a software function that gives users the option of completing words or forms by a shorthand method on the basis of what has been typed before.
  13. Keys- an access key correlates to a designated character in a control label.
  14. box Launcher-A dialog box launcher is a small icon that appears in a group.
Down
  1. word processing feature that moves words to the next line automatically as you type based on the current right margin setting.
  2. is a command included in most software programs.
  3. view- The Office Backstage view is where you manage your files and the data about them — creating, saving, inspecting for hidden metadata or personal information, and setting options.
  4. is any character or series of characters that represent horizontal or vertical space in typography. When rendered
  5. copy the document, record or image being worked on to a storage medium.
  6. inspection or viewing of something before it is bought or becomes generally known and available.
  7. list of dishes available in a restaurant
  8. a ribbon is a graphical control element in the form of a set of toolbars placed on several tabs
  9. small flap or strip of material attached to or projecting from something, used to hold or manipulate it, or for identification and information
  10. graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen.In graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen.
  11. especially in large quantities, by a mechanical process involving the transfer of text, images, or designs to paper

25 Clues: list of dishes available in a restaurantis a command included in most software programs.tips-A Key Tip is a string. Its maximum width is equal to 3 characterscopy the document, record or image being worked on to a storage medium.box Launcher-A dialog box launcher is a small icon that appears in a group....

Vocabulary Lesson 2 Dylan Preston 2017-03-02

Vocabulary Lesson 2 Dylan Preston crossword puzzle
Across
  1. Printing: the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
  2. The data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
  3. Basis point (BPS) refers to a common unit of measure for interest rates and other percentages in finance. One basis point is equal to 1/100th of 1%, or 0.01% (0.0001), and is used to denote the percentage change in a financial instrument.
  4. broadcasting, computer networking, or other communication using radio signals, microwaves, etc.
  5. the way in which something is arranged or set out.
  6. a person who uses computers to gain unauthorized access to data.
  7. connects as or operates with a network.
  8. CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
  9. a format for compressing image files.
  10. In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
  11. the address of a World Wide Web page
  12. a unit of information equal to one billion (109) or, strictly, 230 bits.
  13. the introductory page of a website, typically serving as a table of contents for the site.
Down
  1. program instructions.
  2. Definition of: DNS. DNS. (Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
  3. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
  4. in a relatively small area, typically a single building or a group of buildings. Most LANs connect workstations and personal computers and enable users to access data and devices (e.g., printers and modems) anywhere on the network
  5. a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
  6. use encryption to protect sensitive information transmitted online"
  7. system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  8. a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  9. the process of converting information or data into a code, especially to prevent unauthorized access.
  10. device that scans documents and converts them into digital data.
  11. a unit of memory or data equal to 1,024 (210) bytes.
  12. Java was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network.
  13. a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.

26 Clues: program instructions.the address of a World Wide Web pagea format for compressing image files.connects as or operates with a network.the way in which something is arranged or set out.a unit of memory or data equal to 1,024 (210) bytes.a person who uses computers to gain unauthorized access to data....

Chapter 03 part 03 2018-04-05

Chapter 03 part 03 crossword puzzle
Across
  1. your data center is looking to conserve space in its server room, what are you most likely to choose as a result
  2. you are looking for a general purpose port to connect two devices together, what is is called
  3. you keep hearing a colleague of yours use a term and you are unfamiliar with it, ultimately, however, you realize that is a synonym for the term port, what is it
  4. a type of computer usually has only one user what is most likely to be the type of computer
  5. at you local supermarket there is a kiosk that allows you to rent your favorite movie on DVD what is it called
  6. you need a version of USB technology that will support older USB devices, of which you have many, as well as new ones. what word do you want to see the specs
  7. you are storing a new worksheet online for members of you project team to be able to share access to it, what kind of computing is this
  8. what do you need to verify that you are the holder of the bankcard at your local bank branch
  9. you recceived a new portable media player for your birthday, it is less than ideal as a gift, however, because you were hoping to do something with it, and it is not something you can do with the player, what is that thing you were hoping to do
  10. your server room has ample floor space, what are you likely to choose as a result
Down
  1. a thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually undetectable to you, what is this technology called
  2. a friend of yours was talking on a mobile phone and her attention was diverted from something that was happening around her while she was on the phone, what phenomenon does this illustrate
  3. when an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low
  4. you go to your local town utility in order to pay your gas bill, what kiosk are you going to use
  5. you see a kiosk in the lobby of your local hospital, what kind of kiosk is it
  6. recent photos you captured are low in quality, what is one of the first things to check
  7. a type of computer usually has thousands of users, what is most likely to be the type of computer
  8. you have a collection of all the photos, videos, and audio you have captured from your new nephew, what is the name for this collection
  9. what kind of kiosk are you most likely to find on you next trip to an amusement park
  10. you want to connect your mobile device to a speaker, what is the way to do so
  11. your organization has a large number of servers, what are you most likely to choose as a result
  12. what is your library using because it costs less, is easier to maintain, and uses less power than desktop computers

22 Clues: you see a kiosk in the lobby of your local hospital, what kind of kiosk is ityou want to connect your mobile device to a speaker, what is the way to do soyour server room has ample floor space, what are you likely to choose as a resultwhat kind of kiosk are you most likely to find on you next trip to an amusement park...

Chapter 03 part 03 2018-04-05

Chapter 03 part 03 crossword puzzle
Across
  1. you see a kiosk in the lobby of your local hospital, what kind of kiosk is it
  2. at you local supermarket there is a kiosk that allows you to rent your favorite movie on DVD what is it called
  3. you recceived a new portable media player for your birthday, it is less than ideal as a gift, however, because you were hoping to do something with it, and it is not something you can do with the player, what is that thing you were hoping to do
  4. what kind of kiosk are you most likely to find on you next trip to an amusement park
  5. a type of computer usually has only one user what is most likely to be the type of computer
  6. a thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually undetectable to you, what is this technology called
  7. you need a version of USB technology that will support older USB devices, of which you have many, as well as new ones. what word do you want to see the specs
  8. what is your library using because it costs less, is easier to maintain, and uses less power than desktop computers
  9. you are storing a new worksheet online for members of you project team to be able to share access to it, what kind of computing is this
  10. you want to connect your mobile device to a speaker, what is the way to do so
  11. when an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low
Down
  1. you go to your local town utility in order to pay your gas bill, what kiosk are you going to use
  2. your organization has a large number of servers, what are you most likely to choose as a result
  3. your data center is looking to conserve space in its server room, what are you most likely to choose as a result
  4. a type of computer usually has thousands of users, what is most likely to be the type of computer
  5. you keep hearing a colleague of yours use a term and you are unfamiliar with it, ultimately, however, you realize that is a synonym for the term port, what is it
  6. recent photos you captured are low in quality, what is one of the first things to check
  7. a friend of yours was talking on a mobile phone and her attention was diverted from something that was happening around her while she was on the phone, what phenomenon does this illustrate
  8. you have a collection of all the photos, videos, and audio you have captured from your new nephew, what is the name for this collection
  9. your server room has ample floor space, what are you likely to choose as a result
  10. you are looking for a general purpose port to connect two devices together, what is is called
  11. what do you need to verify that you are the holder of the bankcard at your local bank branch

22 Clues: you see a kiosk in the lobby of your local hospital, what kind of kiosk is ityou want to connect your mobile device to a speaker, what is the way to do soyour server room has ample floor space, what are you likely to choose as a resultwhat kind of kiosk are you most likely to find on you next trip to an amusement park...

Chapter 1 to Chapter 4 2013-07-22

Chapter 1 to Chapter 4 crossword puzzle
Across
  1. has primary responsibility for the assessment, management, and implementation of information security in the organization.
  2. when it is free from mistakes or errors and it has the value that the end user expects.
  3. of information is the quality or state of ownership or control.
  4. is a respected professional society that was established in 1947 as “the world’s first educational and scientific computing society.
  5. enables authorized users—persons or computer systems—to access information without interference or obstruction and to receive it in the required format.
  6. The organization must be able to demonstrate that the relevant policy has been made readily available for review by the employee.
  7. is the analysis of measures against established standards.
  8. is an identified weakness in a controlled system, where controls are not present or are no longer effective.
  9. A single instance of an information asset suffering damage or unintended or unauthorized modification or disclosure.
  10. The organization must be able to demonstrate that the employee understood the requirements and content of the policy.
  11. A subject or object’s ability to use, manipulate, modify, or affect another subject or object.
  12. is the American contribution to an international effort by the World Intellectual Properties Organization (WIPO) to reduce the impact of copyright, trademark, and privacy infringement, especially when accomplished via the removal of technological copyright protection measures.
  13. is a formal approach to solving a problem by means of a structured sequence of procedures.
  14. The organization must be able to demonstrate that the employee agreed to comply with the policy through act or affirmation.
  15. is an attempt to gain personal or financial information from an individual, usually by posing as a legitimate entity.
  16. is any software program intended for marketing purposes such as that used to deliver and display advertising banners
Down
  1. guidelines that describe acceptable and unacceptable employee behaviors in the workplace
  2. allows any person to request access to federal agency records or information not determined to be a matter of national security.
  3. is the legal obligation of an entity that extends beyond criminal or contract law
  4. when it is protected from disclosure or exposure to unauthorized individuals or systems.
  5. The organization must be able to demonstrate that it disseminated the document in an intelligible form, including versions for illiterate, non-English read- ing, and reading-impaired employees.
  6. also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
  7. of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
  8. is any technology that aids in gathering information about a person or organization without their knowledge.
  9. created by the World Trade Organization (WTO) and negotiated over the years 1986–1994, introduced intellectual property rules into the multilateral trade system.
  10. when it is whole, complete, and uncorrupted.
  11. control strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.
  12. is a program or device that can monitor data traveling over a network.
  13. control strategy attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.
  14. can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

30 Clues: when it is whole, complete, and uncorrupted.is the analysis of measures against established standards.of information is the quality or state of ownership or control.is a program or device that can monitor data traveling over a network.is the legal obligation of an entity that extends beyond criminal or contract law...

Debbie and Eric's 40th Anniversary Crossword 2015-10-18

Debbie and Eric's 40th Anniversary Crossword crossword puzzle
Across
  1. Which market and cathedral city (our third smallest) lies at the confluence of two tributaries of the River Ure?
  2. What computing company was established in 1975 by Bill Gates?
  3. Black, mute, trumpeter and whooper are all types of what animal?
  4. Which Eric was one half of a comedy double act with Ernie Wise?
  5. The Great Fire of London in 1666 started at the Bakery on which “lane”?
  6. Which Scottish singer-songwriter was best known for his hits “Baker Street”, “Right Down The Line”, and “Night Owl”: ‘….. Rafferty’?
  7. What is the surname of the American-born loudmouth comedienne: ‘Ruby …’?
  8. What is the name given to the 40 day period preceding Easter Sunday?
  9. Which 1990 film, directed by Tim Burton, tells the story of a gentle man with unusual hands: Edward …………?
  10. What type of flower traditionally signifies a 40th wedding anniversary?
  11. Complete the 1967 Rolling Stones song title: '.... Tuesday'
  12. Approximately 40% of worldwide total Guinness volume is brewed and sold in which continent?
  13. What common spice is used in the making of Easter biscuits?
  14. Add together what (Eric the half a) bee makes to the destination of Wallace and Gromit’s Grand Day Out. Where was yours?
  15. Debbie Harry is the lead singer from which late 70s band?
  16. Complete the 1978 Blondie single: 'Heart of .....'
  17. Which fictional character resides at 221b Baker Street: ‘Sherlock ……’?
  18. What vessel was named after the capital of Australia in 1957: ‘SS ……..’?
Down
  1. What 1992 film stars Glenn Close as dog-napping villainess Cruella de Vil?
  2. What was the generic nickname given to the car Eric drove when you first met?
  3. What gas helps form the head when pouring Guinness?
  4. Eric Idle is one sixth of which comedy group, also starring John Cleese, Terry Jones, and Michael Palin?
  5. From which tuneful production do “Oh, What A Beautiful Mornin’” and “I Cain’t Say No” come?
  6. What did the cowardly lion seek in the Wizard of Oz?
  7. Which American State adopted the Ruby Red grapefruit as their state fruit in 1993?
  8. What iconic ruby-coloured clothing did Dorothy wear in The Wizard of Oz?
  9. What collectable ornaments is David Corbridge famous for creating?
  10. Which colourful bird, used to advertise a popular alcoholic beverage, is native to Central and South America?
  11. Which Manor, appropriately enough, did we all stay at in Liskeard, Cornwall?
  12. Which Eric penned and performed songs such as Layla, After Midnight, and Lay Down Sally?
  13. Which country does Eric Cantona, former Manchester United footballer, come from?
  14. From 1 Corinthians, Chapter 13, Verse 13 – ‘And now these three remain: faith, hope and love. But the greatest of these is ….?’
  15. What popular BBC1 “home improvement” series is fronted by Nick Knowles with Billy Byrne and co.?
  16. The name “Debbie” is derived from a Hebrew word for what yellow and black-striped buzzing insect?
  17. What did your wedding reception venue have 6 of?
  18. What anagram of “Baker” does the middle foot pedal in a manual car allow you to do?
  19. Which popular BBC TV programme has been fronted by Percy Thrower, Geoff Hamilton, Monty Don and Nigel: ‘Gardener’s …..’?
  20. Which famous silent movie actor was knighted in 1975: ‘Charlie …….’?
  21. Which “Debbie” is the magical assistant and wife to Paul Daniels?
  22. From which base on the Oxford canal did we start our narrow boat holiday?

40 Clues: What did your wedding reception venue have 6 of?Complete the 1978 Blondie single: 'Heart of .....'What gas helps form the head when pouring Guinness?What did the cowardly lion seek in the Wizard of Oz?Debbie Harry is the lead singer from which late 70s band?Complete the 1967 Rolling Stones song title: '.... Tuesday'...

Islam 2015-01-15

Islam crossword puzzle
Across
  1. It is a sport in which teams on horseback use mallets to strike a ball through a goal
  2. When the Muslim government is led by the caliphs
  3. Muhammad's birthplace
  4. He is Muhammad's uncle and took charge of Muhammad's orphanage
  5. The physical struggle with spiritual significance fighting to protect themselves from those who would harm them
  6. It is the hostility or discrimination against Jews
  7. A roman catholic court to combat forms of religious error
  8. It is used to bring water up from the canals and reservoirs
  9. the fourth caliph
  10. This place was important to the Jews, Christians, and Muslims
  11. The person who chants the call to prayer
  12. It is the example that Muhammad set for Muslims during his lifetime
  13. A pillar that represents the profession or declaration of faith
  14. prophet of god
  15. It is the scientific study of animals
  16. A pillar that represents the daily ritual prayer
  17. It contains passages that Muslims believe Muhammad received from the angel Gabriel
  18. It was where the Jews were forced to live in crowded neighborhoods
  19. Allows people to identify the direction in which they are traveling
  20. They were called where Jews, Christians, and Muslims had their own communities.
  21. A pillar that represents fasting(going without food)and they were instructed to fast for an entire month during Ramadan
  22. They were used to put patients to sleep before operations
Down
  1. It is a ruler in certain Middle east lands such as Persia
  2. the belief in a single god
  3. belief in more than one god
  4. It separates men and women, surgical patients, and people with diseases that are contagious
  5. A pillar that represents charity and told wealthy people to share their riches with the less fortunate
  6. they were used to stitch the wounds
  7. It is the ninth month of the Islamic calendar during where Muslims are required to fast as part as a tradition
  8. the third caliph
  9. the second caliph
  10. the first caliph
  11. It was the highest form of decorative art, the art of beautiful handwriting
  12. The spreading of ideas and ways of life
  13. It is a device for computing time based on the location of the sun or the stars
  14. It is called where muslims belonged to a single Islamic community
  15. It is the study of objects in the universe
  16. It is the direction of Makkah
  17. A series of religious wars launched by European Christians
  18. The angel that brought revelations or revealed teachings from god
  19. He is the leader the Umayyads
  20. A pillar that represents the pilgrimage to the holy city of Makkah
  21. The body, or collection, of Islamic law
  22. those who surrender to God
  23. Organized stories that they could verify into collections
  24. He started the Ottoman dynasty in northern Anatolia
  25. They were people whose homeland was north of China
  26. It was the battle of wits in which players move pieces on a board according to complex rules.
  27. It is the supreme ruler in a muslim state
  28. it is a type of building, the muslim house of worship

50 Clues: prophet of godthe third caliphthe first caliphthe second caliphthe fourth caliphMuhammad's birthplacethe belief in a single godthose who surrender to Godbelief in more than one godIt is the direction of MakkahHe is the leader the Umayyadsthey were used to stitch the woundsIt is the scientific study of animalsThe spreading of ideas and ways of life...

MIS Chapter 7 Crossword Puzzle 2016-04-19

MIS Chapter 7 Crossword Puzzle crossword puzzle
Across
  1. The English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet
  2. Software for locating and managing stored Web pages
  3. Two or more pairs of insulated copper wires twisted together
  4. Any computer on the network that requests and uses the services provided by the server
  5. Integrates disparate channels for voice communication, data communication, instant messaging, email, and electronic conferencing into a single experience where users can seamlessly switch back and forth between different communication modes
  6. A 32-bit number represented by four strings of numbers ranging from 0 to 255
  7. The process of improving the quality and volume of traffic to a Web site by employing a series of techniques that help a Web site achieve a higher ranking in search engine results
  8. A form of distributed computing that partitions software processes between client and server computers
  9. Advanced networking consortium of over 500 universities, businesses, government agencies, and other institutions
  10. A computer that is specifically optimized to provide software and other resources to other computers on the network
  11. Made of light-conducting glass or plastic core, surrounded by more glass, called cladding, and a tough outer sheath
Down
  1. A network that span large geographical distances
  2. Allows millions of users to send chunks of data across the Internet concurrently
  3. A collection of Webpages linked to a homepage
  4. Used to filter and forward data to a specified destination on the network. More efficient than hub
  5. Identifies Web pages that appear to match keywords (queries) entered by a user, and provides a list of best matches based on one or more of a variety of techniques
  6. Technology that delivers voice information on digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks
  7. A network that is designed to connect personal computers and other digital devices within a half-mile
  8. A 128-bit IP address
  9. A set of rules and procedures governing transmission of information between two points in a network
  10. Breaks the data into smaller packets, numbers them, ensures each packet is reliably delivered, and puts them in the proper order at the destination
  11. Contains a solid inner copper conductor surrounded by insulation and outer braided copper or foil shield
  12. Device used to connect network components, sending packets of data to all other connected devices. Least intelligent and expensive
  13. Two or more connected computers
  14. A large worldwide collection of networks that use a common protocol to communicate with each other
  15. A network that spans a metropolitan area, usually a city and its major suburbs
  16. Converts domain names to IP addresses
  17. The directory path and document name within a Web address that helps the browser track down the requested page
  18. A special communications processor used to route packets of data through different networks, ensuring that the data sent gets to the correct address. Smartest and most complicated
  19. Provides a universally agreed-on method for breaking up digital messages into packets, routing them to the proper address, and then reassembling them into coherent messages
  20. Provides powerful technology for tracking the movement of goods throughout the supply chain using tiny tags with embedded microchips
  21. A secure connection between two points across the Internet to transmit corporate data
  22. Addresses each packet with the source and destination address and routes the message to the final destination

33 Clues: A 128-bit IP addressTwo or more connected computersConverts domain names to IP addressesA collection of Webpages linked to a homepageA network that span large geographical distancesSoftware for locating and managing stored Web pagesTwo or more pairs of insulated copper wires twisted together...

Vocabulary Unit 3 CSP 2023-12-18

Vocabulary Unit 3 CSP crossword puzzle
Across
  1. (also called an array) stores multiple pieces of information at once
  2. A sequence of bits that can be used to represent sets or to manipulate binary data
  3. The space of potential possibilities
  4. a particular way of organizing and storing data in a computer so that it can be accessed and modified efficiently
  5. Associating each element of a given set with one or more elements of a second set
  6. If words, numbers, sentences—any two values—must be concatenated together, you can use this block.
  7. similar data appears in the same position of each line of data.
  8. (abbreviated) American standard code for information interchange outlines a common set of conventions for converting between binary values and alphanumeric values
  9. Non-digital signals or information represented by a continuously variable physical quantity such as spatial position or voltage
  10. A binary code invented by Emile Baudot in 1870 that uses crosses and dots in order to encode 2^5 or 32 characters (fixed width encoding)
  11. A subset of a string of alphanumeric fields or variables
  12. A character encoding form whose sequences are not all of the same length is known as a variable width encoding.
  13. variables that can take on any real value within a specified range rather than being restricted to discrete values
  14. A growth rate that increases rapidly, usually squaring the previous metric.
  15. (short for binary digit) is the smallest unit of data in computing. Typically a 1 or 0.
  16. refers to the 26-letter alphabet of Latin characters and the numerals 0-9. Sometimes including some special characters such as punctuation marks and common symbols, such as the sign "@,".
  17. research
Down
  1. Irrelevant or meaningless data that has found its way into otherwise meaningful code
  2. A binary encoding system that can represent much more of the world's text than ASCII can (represents 65,536 different characters)
  3. the process of simplifying complex systems by breaking them down into their essential components while ignoring unnecessary details.
  4. How information is stored, accessed, transformed and used by computers
  5. A code where letters are represented by combinations of long and short signals of light or sound (variable width encoding)
  6. any information (or effect) that a program produces including sounds, lights, pictures, text, motion, etc.
  7. A group of blocks that are combined to perform a specific task
  8. A method for finding a target value within a list (whether presorted or not) by checking each value until a match is found or until all the elements have been searched
  9. a synonym for bringing together, (latin meaning is “chain-together”)
  10. code a system by which numbers, letters and other information are represented using only two symbols, or binary digits.
  11. Separate or divided: Digital provide an example
  12. the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage.
  13. In which something can only be one thing or another (Yes or NO)
  14. Digital copies are only approximations of the natural object
  15. information that has been into a form that is efficient for movement or processing.
  16. a sequence of characters (letters, numbers, symbols) used to represent test. Example: “Hello World”.

33 Clues: researchThe space of potential possibilitiesSeparate or divided: Digital provide an exampleA subset of a string of alphanumeric fields or variablesDigital copies are only approximations of the natural objectA group of blocks that are combined to perform a specific tasksimilar data appears in the same position of each line of data....

Unit 3 Vocabulary 2023-12-20

Unit 3 Vocabulary crossword puzzle
Across
  1. A standardized system for representing characters and text in most of the world's writing systems, enabling consistent encoding and exchange of textual data.
  2. Separate and distinct entities or values, as opposed to continuous data.
  3. A reusable collection of statements
  4. A numerical reference indicating the position of an element within a data structure, often starting from zero.
  5. a single unit of data that can only have one of two values
  6. A method of representing values with a degree of inaccuracy for the sake of simplicity or efficiency.
  7. American Standard Code for Information Interchange, a widely used character encoding standard representing text characters with seven or eight bits.
  8. electronic technology that uses discrete values, generally zero and one, to generate, store and process data
  9. The increase in size or complexity of a system, often referring to the expansion of data, resources, or capabilities over time.
  10. A contiguous sequence of characters within a larger string, often extracted or manipulated in programming.
  11. Refers to character encodings where different characters may occupy different numbers of bits or bytes.
  12. A method of encoding text characters using sequences of dots and dashes, widely used in early telecommunication systems.
  13. Can contain any number of characters, including none at all, and those characters can be letters, numbers, or symbols
  14. Combining data from two or more tables in a relational database based on a common attribute.
  15. A constraint is a condition to be satisfied by a state
  16. The association between elements of one set to elements of another set, often used in computer science to relate data or values.
  17. The process of converting information into a specific format for storage or transmission, such as converting text characters into binary code.
  18. A collection of elements or items arranged in a linear order, often used in programming for data organization.
  19. A character set that includes both letters and numbers, commonly used in computer systems and programming.
  20. A sequence of binary digits (bits) representing data or information in computers.
Down
  1. A binary character encoding scheme used in early telegraph communication, representing characters with combinations of five bits.
  2. The process of simplifying complex systems by focusing on essential features and ignoring unnecessary details for easier understanding and problem-solving.
  3. Data that can take any value within a given range, without any gaps or interruptions.
  4. A method of finding a specific value in a list by checking each element in sequence.
  5. To create a new string with all the characters in the first string followed by all of the characters in the second string
  6. The result produced by a computer program or process, typically displayed, printed, or stored for further use.
  7. A specialized format for organizing and storing data to facilitate efficient manipulation and retrieval.
  8. Divided into 2 parts
  9. Binary numbers form the basis of computing systems
  10. expressible or approximately expressible by an exponential function
  11. Raw facts, figures, or information that can be processed or stored by a computer.
  12. Unwanted random variations in digital signals that can adversely affect data integrity and communication.
  13. Representing data as a continuously variable physical quantity, such as voltage in analog signals.
  14. Character encoding where each character takes up the same amount of space, often a fixed number of bits or bytes.

34 Clues: Divided into 2 partsA reusable collection of statementsBinary numbers form the basis of computing systemsA constraint is a condition to be satisfied by a statea single unit of data that can only have one of two valuesexpressible or approximately expressible by an exponential function...

AWS Quiz III 2022-06-10

AWS Quiz III crossword puzzle
Across
  1. is an edge computing, data migration, and edge storage device that comes in two Options.
  2. is a cloud-based hardware security module that enables you to easily generate and use your own encryption keys on the AWS Cloud.
  3. is a highly available and scalable cloud Domain Name System (DNS) web service.
  4. provides a single location to track the progress of application migrations across multiple AWS and partner solutions
  5. is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs) and their on-premises networks to a single gateway
  6. is a data transfer service that makes it easy for you to automate moving data between on-premises storage and Amazon S3 or EFS.
  7. is an object storage service that offers industry-leading scalability, data availability, security, and performance.
  8. is a fully managed service that makes it easy for developers to create, publish,maintain, monitor, and secure APIs at any scale.
  9. lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily
  10. provides alerts and remediation guidance when AWS is experiencing events that might affect you.
  11. is a security service that uses machine learning to automatically discover, classify, and protect PII in S3 buckets.
  12. provides on-demand access to AWS’ security and compliance reports and select online agreements.
Down
  1. makes it easy to establish a dedicated network connection from your premises to AWS.
  2. running on AWS
  3. is a threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.
  4. gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
  5. can migrate your data to and from most widely used commercial and open-source databases.
  6. is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
  7. is a networking service that improves the availability and performance of the applications that you offer to your global users.
  8. enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions
  9. provides a unified user interface so you can view operational data from multiple AWS services and allows you to automate operational tasks across your AWS resources.
  10. is a service that makes it easy to develop, test, and deploy intelligent robotics applications at scale
  11. provides a simple, scalable, elastic file system for Linux-based workloads for use with AWS Cloud services and on-premises resources.
  12. is a networking service that helps establish secure connections between your on-premises networks,remote offices, client devices, and the AWS global network.
  13. is a hybrid storage service that allows your on-premises applications to seamlessly use AWS cloud storage.
  14. makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
  15. is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
  16. helps you create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

28 Clues: running on AWSis a highly available and scalable cloud Domain Name System (DNS) web service.makes it easy to establish a dedicated network connection from your premises to AWS.is an edge computing, data migration, and edge storage device that comes in two Options....

AWS 2024-02-29

AWS crossword puzzle
Across
  1. The ____________ feature in AWS allows you to scale your EC capacity up or down automatically according to conditions you define
  2. ____________ is an AWS tool for visualizing, understanding, and managing your AWS cloud environment
  3. ____________ is an AWS service that helps improve application security by filtering traffic based on conditions you define
  4. The service that provides a detailed report of AWS costs and usage is ____________
  5. ____________ is the process of distributing incoming application or network traffic across multiple targets, such as EC instances, in AWS
  6. AWS ____________ is a tool that allows you to manage your AWS costs and usage
  7. The ____________ model allows customers to rent virtual servers to run applications on the cloud
  8. The AWS service that enables you to create and manage AWS resources with templates is called ____________
  9. ____________ is the AWS service that offers a simple way to distribute content globally with low latency
  10. AWS's global infrastructure is composed of ____________ and Availability Zones
  11. AWS recommends designing systems that are ____________, meaning they are capable of detecting and correcting failures to stay operational
  12. ____________ is an AWS service that provides cost management tools to monitor, control, and optimize AWS costs
  13. The shared responsibility model in AWS implies that AWS is responsible for ____________ of the cloud, while the customer is responsible for ____________ in the cloud
  14. The AWS feature that allows you to analyze and debug your applications with logs is called ____________
  15. The AWS pricing model that offers significant discounts on reserved instances for a -year or -year term is called ____________ pricing
  16. ____________ pricing in AWS allows you to pay only for the compute time you consume
Down
  1. AWS ____________ is a service that helps you protect sensitive data by setting permissions and tracking access
  2. The AWS ____________ is a document that provides security control details required by various regulatory standards
  3. AWS ____________ is a feature that allows you to deliver data, videos, applications, and APIs to customers globally with low latency, high transfer speeds
  4. ____________ is the AWS service that automates code deployments to any instance, including EC instances and Lambda functions
  5. AWS ____________ is a managed service that is used for deploying applications within and across regions quickly
  6. ____________ storage in AWS is designed for long-term archival at a low cost
  7. AWS ____________ is a service that provides a managed identity to provide permissions for actions on AWS resources
  8. ____________ are AWS resources that act as virtual firewalls for your VPC to control inbound and outbound traffic
  9. The AWS service that enables users to deploy applications in various AWS regions to reduce latency is called ____________
  10. AWS ____________ is a managed relational database service that supports MySQL, PostgreSQL, Oracle, and SQL Server
  11. The principle of ____________ in cloud computing describes the ability of a system to increase resources based on the workload automatically
  12. ____________ is the AWS service that allows developers to build conversational interfaces for applications using voice and text
  13. ____________ is the AWS service that provides resizable compute capacity in the cloud
  14. ____________ is the AWS service that provides a detailed view of cloud resources and their associated costs
  15. The AWS service that provides a virtual network dedicated to your AWS account is called ____________
  16. AWS ____________ is the pricing feature that automatically saves money when you use more services
  17. ____________ in AWS allows you to isolate and manage resources in a virtual network
  18. The AWS service that allows you to run code in response to events without provisioning or managing servers is called ____________
  19. The AWS service that enables you to manage keys used to encrypt data is called ____________

35 Clues: ____________ storage in AWS is designed for long-term archival at a low costAWS ____________ is a tool that allows you to manage your AWS costs and usageAWS's global infrastructure is composed of ____________ and Availability ZonesThe service that provides a detailed report of AWS costs and usage is ____________...

ML Crossword 2024-08-26

ML Crossword crossword puzzle
Across
  1. Limitation or restriction impacting solution space in optimization problems.
  2. Group of data samples processed together in training a neural network.
  3. Perform calculations using data in a systematic manner.
  4. Sorting data points into predefined categories or labels.
  5. A fundamental neural network algorithm for fine-tuning weights by minimizing error.
  6. Labeling process crucial for training supervised learning models.
  7. Starting point for model performance before any optimization.
  8. Deep learning architecture commonly used for image recognition.
  9. Feature in PyTorch enabling automatic differentiation.
  10. Type of data that represents distinct groups or categories without any intrinsic ordering.
  11. Optimizer named after the first man in biblical history.
  12. Reference point for measuring model performance.
  13. Adaptive learning strategy in reinforcement learning optimizing action selection while exploring options.
  14. Estimation technique used in machine learning to generalize models for prediction.
  15. Parallel computing platform and programming model by NVIDIA.
  16. Common operation to compare elements in two sets.
  17. A multiplier that quantifies the relationship between variables in linear regression.
  18. Related to a probabilistic approach that updates beliefs in light of new evidence.
  19. Type of attack where input data is subtly altered to deceive a model
  20. Link between nodes in a neural network.
  21. Autonomous entity in a reinforcement learning environment.
  22. Optimization goal during training when loss function decreases.
  23. Sequential model structure linking multiple layers.
  24. Ensemble method involving random sampling with replacement.
  25. Algorithm known for combining weak classifiers to form a strong one.
  26. Neural network component responsible for generating output sequences in machine translation.
Down
  1. The metric optimized in training to minimize error.
  2. Technique of expanding training data by applying transformations.
  3. Standard used for evaluating machine learning models
  4. Group similar data points together without supervision.
  5. Core component central to processing tasks in most computers.
  6. Unexpected data point that deviates from the norm
  7. The central part of a neural network where the main computations take place.
  8. Boost in training speed achieved by hardware like GPUs or TPUs.
  9. A key operation in neural networks, especially effective for image processing.
  10. A technique used in deep learning to stabilize and accelerate neural network training by normalizing layer inputs.
  11. Statistical distribution in ML algorithms inspired by a physicist's thermodynamics work.
  12. Influential variable impacting predictions in a model
  13. A collection of text or data used for training linguistic models.
  14. A foundational concept in probabilistic models and statistics, often representing the likelihood of an event occurring.
  15. Tendency of a model to make consistent errors on certain data.
  16. Obtain annotations or data by gathering contributions from a large group of people.
  17. Father of a theorem crucial to probabilistic modeling and inference
  18. Function applied to neurons in a neural network to introduce non-linearity.
  19. Bring into proper position for model optimization
  20. Ensemble method that sequentially adjusts weak models to improve performance.
  21. A neural mechanism that helps models focus on specific parts of input sequences.
  22. AI model that assigns input data to specific categories or labels.
  23. Direction of error propagation in neural network training.
  24. Canada's neural network pioneer and deep learning stalwart.

50 Clues: Link between nodes in a neural network.Reference point for measuring model performance.Unexpected data point that deviates from the normCommon operation to compare elements in two sets.Bring into proper position for model optimizationThe metric optimized in training to minimize error.Sequential model structure linking multiple layers....

Technology CW 2023-06-07

Technology CW crossword puzzle
Across
  1. Is small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
  2. Is a collection of discrete values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted.
  3. Is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
  4. Is a hardware or software component that stores data so that future requests for that data can be served faster.
  5. Is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
  6. Is a mobile operating system based on a modified version of the Linux kernel and other open-source software.
  7. An American multinational technology company headquartered in Cupertino, California. It is the world's largest technology company by revenue.
  8. Is a digital multimedia container format most commonly used to store video and audio, but it can also be used to store other data such as subtitles and still images.
  9. Is the most important processor in a given computer. Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output (I/O) operations.
  10. Is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on June 15, 1987.
  11. Is a mapping from some domain (for example, a range of integers) to bits.
Down
  1. Is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
  2. Is a method of representing data in a visual, machine-readable form. Initially, its represented data by varying the widths, spacings and sizes of parallel lines
  3. Is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
  4. Is a method of transmitting and receiving messages using electronic devices. It was conceived in the late–20th century as the digital version of, or counterpart to, mail
  5. Is a number expressed in the base-2 numeral system
  6. Is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  7. Is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.
  8. Is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems.
  9. Is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg.

20 Clues: Is a number expressed in the base-2 numeral systemIs a mapping from some domain (for example, a range of integers) to bits.Is a mobile operating system based on a modified version of the Linux kernel and other open-source software.Is a hardware or software component that stores data so that future requests for that data can be served faster....

Final Review 2022-04-29

Final Review crossword puzzle
Across
  1. Encompasses the recovery, investigation, examination, and analysis of material found in digital devices during incidents.
  2. Security team that manages an organization's network defense.
  3. Type of RFID tag can send a signal over a long distance.
  4. Provides the network virtualization solution called XenServer.
  5. type of interference is caused by motors, heavy machinery, and fluorescent lights.
  6. The most volatile memory in the gathering of potential evidence.
  7. An security system that identifies any attacks. In addition, takes immediate action to stop or prevent the attack.
  8. Backup strategy backs up all files from a computer's file system.
  9. Cloud computing solutions delivers software applications to a client.
  10. Used as a secure tunnel to connect two networks.
  11. This layer of SDN communicates with the Control layer through what is called the northbound interface.
  12. Password attack employs a list of pre-defined passwords that it tries against a login prompt.
  13. Message authentication code that allows a user to verify that a file or message is legitimate.
  14. Type of wireless access point is generally used in a residential setting.
  15. sends unsolicited business cards and messages to a Bluetooth device.
  16. Process of adding random characters at the beginning or end of a password to generate a completely different hash.
  17. An exploit in which malware allows the virtual OS to interact directly with the hypervisor.
  18. Protocol for logging.
  19. An attack that injects malicious scripts into web pages to redirect users to fake websites to gather personal information.
  20. A PKI is an implementation for managing which type of encryption.
  21. Dumpster diving is this type of reconnaissance.
  22. One of the most popular packet capturing tools.
  23. Rights management category is applied to music, videos, and software that is sold to consumers.
Down
  1. Connects multiple servers together so that if one server fails, the others immediately take over its tasks.
  2. Entering random data to the inputs of an application.
  3. Violation of a security policy.
  4. SIEM component that is responsible for gathering all event logs from configured devices.
  5. A Cloud technology that allows cloud services to be shared by several.
  6. DLP method works by replacing sensitive data with realistic fictional data.
  7. A Cloud technology that provides cloud services to just about anyone.
  8. These types of logs are generated when a computer randomly restarts.
  9. (SOAR) system automation components that shows processes and procedures that are to be used by a human.
  10. Tool that can be used to view and modify DNS server information in Linux.
  11. A vulnerability scan method in which administrator logos into a system for scanning.
  12. Used to verify that a downloaded file has not been altered.
  13. Protocol used by IPsec to create a security association between communicating partners.
  14. Cryptography mechanism that hides secret communications within various forms of data.
  15. A Wireless device used to manage multiple access points in your organization.
  16. MOST secure EAP implementation.
  17. used on a wireless network to identify the network name.
  18. passive reconnaissance tool is used to gather information from a variety of public sources.
  19. Computer software, firmware, or hardware that creates and runs virtual machines.
  20. Acronym for a solution that pushes security policies directly to mobile devices over a network.
  21. An SDN layer also known as the Infrastructure layer.
  22. Password attack with a large table of hashes.
  23. Harddrive configuration used for data redundancy.

46 Clues: Protocol for logging.Violation of a security policy.MOST secure EAP implementation.Password attack with a large table of hashes.Dumpster diving is this type of reconnaissance.One of the most popular packet capturing tools.Used as a secure tunnel to connect two networks.Harddrive configuration used for data redundancy....

IT Crossword puzzle 2 2022-11-22

IT Crossword puzzle 2 crossword puzzle
Across
  1. A device that is portable.
  2. A cloud backup service on the Internet that backs up data to the cloud.
  3. An outdated wireless technology that has been replaced by Bluetooth to connect devices.
  4. A website by Apple used to sync content on Apple devices in order to provide a backup of content.
  5. An app installed on a smartphone to provide multifactor authentication.
  6. An operating system for mobile devices that is based on the Linux OS and supported by Google.
  7. An account that accesses multiple independent resources, systems, or applications after signing in one time to one account.
  8. A process that backs up and restores everything on a device to a previous state.
  9. A newer USB charging port.
  10. A process that backs up and restores individual files.
  11. A process to break through the restrictions that only allow apps for an iOS device to be downloaded from the iTunes Store.
  12. An email service provided by Google.
  13. A smartphone developed by Apple.
  14. A handheld tablet developed by Apple.
  15. Makes it so that the device can neither transmit nor receive the signals.
  16. A unique number that identifies a mobile phone or tablet device worldwide.
  17. The process of obtaining root or administrator privileges to an Android device.
  18. a short-range wireless technology to connect two devices in a small PAN.
  19. The older USB charging port a size above miniUSB.
  20. A list of preferred service providers or radio frequencies your carrier wants a mobile device to use.
  21. The proprietary Apple connector used on Apple mobile devices for power and communication.
  22. To authenticate to a network, computer, or other computing device by means of biometric data.
Down
  1. The smaller USB charging port.
  2. The point when the manufacturer of software or hardware stops providing updates or patches for its product.
  3. Software by Apple installed on a Mac or Windows computer to sync an iPhone or iPad to iOS updates.
  4. A set of policies and procedures that restrict how a user can access, create, and edit a organization’s resources.
  5. A wireless technology that creates a connection between two NFC devices that are within 4 inches.
  6. Information published by the manufacturer of an operating system that describes what to expect from a published update.
  7. The use of more than one method to authenticate access.
  8. An operation that remotely erases all data.
  9. An email service provided by Microsoft that is hosted on Microsoft servers.
  10. A source for downloading software that is considered reliable.
  11. A set of policies and procedures that define how a users profile settings are configured for security purposes.
  12. Storage space at that can be synced with files stored on any Apple device.
  13. Source code for an operating system or other software that is available for free.
  14. The operating system owned and developed by Apple and used for their various mobile devices.
  15. A process that encrypts all the stored data on a device.
  16. A protocol that encrypts an outgoing email message and includes a digital signature (there is a "/" in its name).
  17. An app on a mobile device that can be used to locate a device.
  18. A unique number that identifies a cellular subscription for a device or subscriber.
  19. A corporate policy that allows employees or students to connect their own devices to the corporate network.

41 Clues: A device that is portable.A newer USB charging port.The smaller USB charging port.A smartphone developed by Apple.An email service provided by Google.A handheld tablet developed by Apple.An operation that remotely erases all data.The older USB charging port a size above miniUSB.A process that backs up and restores individual files....

Computer Science 2025-03-27

Computer Science crossword puzzle
Across
  1. A technique used to map data to fixed-size values for quick retrieval, often used in hash tables.
  2. A set of rules governing how data is transmitted between devices in a network.
  3. A signal that temporarily halts the CPU to allow immediate processing of a high-priority task.
  4. The ability of different classes to use the same method name but with different implementations.
  5. A system that translates domain names (like google.com) into IP addresses.
  6. A small, high-speed memory area that stores frequently accessed data for faster processing.
  7. A problem-solving algorithm that tries partial solutions and undoes them when necessary.
  8. A four-layer model used to structure network communications.
  9. A number system using only 0s and 1s, fundamental to computer operations.
  10. The practice of hiding implementation details and showing only essential features.
  11. The object-oriented programming principle that hides data inside a class and only allows controlled access.
  12. The process of repeatedly executing a set of instructions using loops.
  13. A base-16 number system used to simplify binary representation.
  14. A data structure that follows the Last In, First Out (LIFO) principle.
  15. A CPU design technique where multiple instructions are processed simultaneously at different stages.
  16. A data structure that follows the First In, First Out (FIFO) principle.
  17. The part of a machine instruction that specifies the operation to be performed.
  18. The fundamental protocol suite that enables communication over the internet.
  19. A technique where a computer uses secondary storage (e.g., a hard drive) to extend RAM.
  20. The latest version of the Internet Protocol, designed to provide more IP addresses.
  21. A device that directs data packets between different networks.
  22. A logical subdivision of a network that improves security and efficiency.
Down
  1. A method for representing real numbers in a way that supports fractions and large values.
  2. A computer architecture that separates memory for data and instructions, allowing simultaneous access.
  3. A method of data transmission where messages are broken into smaller units and reassembled at their destination.
  4. A field in one database table that links to the primary key of another table.
  5. The process of organising a database to reduce redundancy and improve integrity.
  6. A computer architecture where programs and data share the same memory.
  7. A notation used to describe the efficiency of an algorithm in terms of time or space complexity.
  8. A small, fast memory location within the CPU that stores temporary data and instructions.
  9. A computing technique that divides tasks into smaller parts and processes them simultaneously.
  10. The maximum data transfer rate of a network connection, usually measured in bits per second (bps).
  11. A divide-and-conquer sorting algorithm that splits an array into smaller parts and then merges them in order.
  12. A character encoding standard that supports multiple languages and symbols.
  13. The structured query language used to manage and manipulate relational databases.
  14. A data structure made up of nodes, where each node contains data and a reference to the next node.
  15. A unique identifier for a record in a database table.
  16. A security system that monitors and controls incoming and outgoing network traffic.
  17. A function that calls itself within its definition.

39 Clues: A function that calls itself within its definition.A unique identifier for a record in a database table.A four-layer model used to structure network communications.A device that directs data packets between different networks.A base-16 number system used to simplify binary representation....

A crossword puzzle crafted specifically for individuals who possess a penchant for grandiloquence, featuring an array of complex and sophisticated vocabulary 2024-10-05

A crossword puzzle crafted specifically for individuals who possess a penchant for grandiloquence, featuring an array of complex and sophisticated vocabulary crossword puzzle
Across
  1. The act or habit of describing or regarding something as unimportant, worthless, or insignificant.
  2. A demonstration organized to oppose or counteract another demonstration, typically related to political or social issues.
  3. In a manner that is not typical of a particular person, group, or situation; often describes actions or behaviors that deviate from the norm.
  4. Pertaining to the zygomatic bone and the face; often used in anatomical and medical contexts to describe the region of the face associated with the cheekbone.
  5. The process of reducing or eliminating industrial activity in a region, often resulting in economic and social changes.
  6. A political position that originated in 19th-century Britain, advocating against the disestablishment of the Church of England as the state church.
  7. A scientific technique used to measure the light spectra of small areas, often used in chemistry and biology for analyzing materials.
  8. In a manner related to thermodynamics, the branch of physics that deals with heat, work, and energy transfer.
  9. A medical technique used to record electrical activity of the brain through electrodes placed on the scalp.
  10. A historic term for a type of blood test used for diagnosing syphilis, named after the German bacteriologist August von Wassermann.
  11. In a manner that involves excessive compensation, often referring to actions taken to counteract perceived deficiencies.
Down
  1. The process of dividing a larger compartment into smaller subcompartments, often used in biological or organizational contexts.
  2. In a manner that involves placing two or more elements side by side to highlight their differences or similarities.
  3. In a manner that exhibits patterns that are nearly periodic but not perfectly so, often used in mathematics and physics.
  4. Instructions that appear to be real but are actually misleading or not intended to be followed, often used in computing or programming contexts.
  5. The process by which chromatin becomes heterochromatin, a tightly packed form of DNA, which is typically associated with gene silencing.
  6. The state or quality of being incomprehensible, referring to things that are difficult or impossible to understand.
  7. The transmission of information by electromagnetic waves, including radio, television, and other forms of wireless communication.
  8. The skill or art of sailing and managing a yacht, often involving knowledge of navigation, sailing techniques, and boat handling.
  9. The inhibition of the growth and reproduction of bacteria, often used in the context of microbiology and pharmaceuticals.
  10. A chemical substance that transmits signals across a synapse from one neuron to another, playing a crucial role in the nervous system.
  11. Relating to the branch of medicine that deals with the digestive system and its disorders.
  12. In a manner related to language or linguistics; often refers to the study or use of language.
  13. A medical condition characterized by dryness of the conjunctiva and cornea of the eye, often due to a deficiency of vitamin A.
  14. The act of speaking without moving one's lips, often used in the context of ventriloquism, where the speaker makes it appear as if the voice is coming from elsewhere.
  15. In a way that resembles the changing patterns of colors and shapes seen in a kaleidoscope; often used to describe something that is rapidly changing or varied.

26 Clues: Relating to the branch of medicine that deals with the digestive system and its disorders.In a manner related to language or linguistics; often refers to the study or use of language.The act or habit of describing or regarding something as unimportant, worthless, or insignificant....

English 2025-12-10

English crossword puzzle
Across
  1. A weakness that can be exploited.
  2. Long-term storage of old files.
  3. The way a system or user acts.
  4. A request for information from a database.
  5. A system on which applications can run.
  6. Connected computers that share data.
  7. A direct instruction given to a computer.
  8. Instructions written for computers.
  9. A person or system chosen for attack.
  10. A step taken to solve a problem.
  11. Accidental or unlawful release of information.
  12. A piece of hardware used in computing.
  13. A place where data is kept.
  14. To protect from harm or attacks.
  15. Continuous flow of data.
  16. Converting information into a secure code.
  17. Related to investigating cyber incidents.
  18. The right to keep personal data protected.
  19. The current condition of a system.
  20. A formal rule or guideline.
  21. A mistake or problem in a system.
  22. Someone who monitors or watches activity.
  23. Information stored or processed by computers.
  24. The chance that something bad may happen.
  25. An action taken after an incident.
  26. Unauthorized entry into a system.
  27. Protection against threats or attacks.
  28. To follow the path of an action or data flow.
  29. Use of technology to perform tasks without human input.
  30. A written record of actions or events.
  31. Permission to use or enter a system.
  32. Learning skills or knowledge.
  33. A simplified digital structure used to predict or analyze.
  34. A set of rules for communication.
  35. Monitoring to make sure rules are followed.
  36. A break in security where data is exposed.
  37. A specific area or internet address space.
  38. A part of a larger software system.
Down
  1. Official rule made by authorities.
  2. A tool that blocks unwanted network traffic.
  3. A formal review of systems or processes.
  4. Programs used by a computer.
  5. Searching for threats inside a network.
  6. Proof of an event or action.
  7. Related to money or cost.
  8. Numerical information used for analysis.
  9. Following laws, rules, or standards.
  10. Information sent from one place to another.
  11. A call for data or a service.
  12. A prediction based on information.
  13. The ability to manage or direct something.
  14. Belief that someone or something is reliable.
  15. Measurements used to evaluate performance.
  16. To watch or track activity.
  17. A user identity in a system.
  18. Studying information to understand it.
  19. A computer that provides resources to others.
  20. A set of connected computer components.
  21. A risk or danger.
  22. Too much data or activity for a system to handle.
  23. Something unusual that may signal a problem.
  24. The path data takes to reach a destination.
  25. To check a system for issues or threats.
  26. A saved copy of data in case of loss.
  27. A document describing an event or findings.
  28. A sign that danger or problems may occur.
  29. An event that disrupts normal operations.
  30. Delay in data communication.
  31. A connection point in a network.
  32. A secret code to access a system.
  33. A tool used to explore or test a system.
  34. Rules about what is morally right or wrong.
  35. Records of system activities.

73 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A place where data is kept.To watch or track activity.A formal rule or guideline.Programs used by a computer.Proof of an event or action.A user identity in a system.Delay in data communication.A call for data or a service.Learning skills or knowledge.Records of system activities....

Threats and Solutions 2021-06-01

Threats and Solutions crossword puzzle
Across
  1. the act of luring a person out by someone posting a legitimate institution to trap individuals into providing credit card data, banking and passwords
  2. a name that uniquely identifies an individual on a computer system
  3. theft is the act of someone using your personal information and pretending to be you
  4. is an insidious activity-monitoring software program that give hackers access to your personal data
  5. this is a type of monitoring that uses a system that constantly monitors a computer network for slow or failing components
  6. a term used to describe illegal and covert theft to gain a business advantage
  7. of service an attack meant to shut down a machine or network, allowing the rightful user to have access to it
  8. by someone posting a legitimate institution to lure individuals into providing credit card data, banking and passwords
  9. a type of malicious code or software that looks legitimate but can take control of your computer
  10. a type of scam practice in which a hostile code is installed on a PC or server that leads users to fraud websites without their consent
  11. a word, phrase or string of characters with the main purpose of authenticating a user on a computer system
  12. a program that helps workers learn specific knowledge or skills to improve performance in their current roles
Down
  1. a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  2. a kind of software used to detect, prevent, scan, detect and terminate computer viruses
  3. a method to protect digital information, by scrambling it as it travels across the Internet
  4. a large number of internet-connected devices from which each is running one or more bots
  5. card threat is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property.
  6. solutions is a type of system built end-to-end for a customer that can be easily implemented into a current business process
  7. a type of malware that spreads copies of itself from computer to computer
  8. an electronic device that is designed to detect and measure movement
  9. a software that prevents unauthorized access to or from a network by controlling incoming and outgoing traffic as well as data packets, based on security rules given
  10. a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another
  11. bomb is a piece of often-malicious code that is intentionally inserted into software
  12. is a technological system that uses specific data and mathematical algorithms for identification and is typically found in the latest models of smartphones
  13. the collective name for a number of malicious software variants, including viruses, ransomware and spyware
  14. also known as sniffing or snooping and it typically occurs over a network in which traffic is not secured or encrypted
  15. an unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
  16. any kind of undesired, unsolicited digital communication, that gets sent out as part of a larger collection of messages

28 Clues: a name that uniquely identifies an individual on a computer systeman electronic device that is designed to detect and measure movementa type of malware that spreads copies of itself from computer to computera term used to describe illegal and covert theft to gain a business advantage...

DCM Vocabulary 2022-12-07

DCM Vocabulary crossword puzzle
Across
  1. the cumulative permissions a user has based on individual /group permissions or explicit/implicit permissions
  2. Rules for how long data needs to be kept on backup and archive systems.
  3. software designed to infiltrate or damage a computer system
  4. A software that allows one physical computer to run several "digital only" computer spaces
  5. A Windows feature that requires administrator permission for a user to change system settings
  6. starts Windows in a basic state using limited files and drivers.
  7. A type of malware that can replicate without human interaction and does not need to attach itself to a program.
  8. User account with complete access to the system without restriction.
  9. Internal or external hardware used to store data and files
  10. a program that appears desirable but actually contains something harmful
  11. Hardware and software that help visually or physically impaired people use the computer
  12. A policy that allows employees to connect personally owned devices
  13. wipe Erases data on a mobile device using a different device
  14. Define WHO can access certain resources and WHAT they can do
  15. A software that allows hardware to communicate with the computer operating system
  16. to remove an app/program from a device
  17. Rules that users must follow to access a network.
  18. An attack through email trying to trick the user into giving private information
  19. Malicious code attached to a program or file that corrupts a computer or destroys data.
  20. matches the file on two or more devices with each other
  21. Holes for peripheral cables.
  22. return a system to working condition without reinstalling the operating system
  23. A Windows program that provides detailed device settings
  24. verifies the identity of someone who connects to a network
  25. "Points to" a storage space on a network
  26. Tool to monitor and limit user activities.
  27. A text file of startup activity that lists all the drivers that load
  28. a software or computer that blocks outside access to a network
  29. A web service that uses one account to synchronize devices
Down
  1. Remotely controls smart phones and tablets
  2. A type of malware that locates and saves data from users without them knowing about it.
  3. Explicit permissions applied directly to a file are applied before inherited permissions from a parent folder/group
  4. Hackers use their social skills to trick people into revealing access credentials or personal information
  5. The official source for Windows apps and outside media
  6. a type of malware that blocks access to a computer system until a sum of money is paid.
  7. A function/behavior that makes a software special
  8. The ability of one device to work with another
  9. A document outlining an agreement between two parties
  10. Internet based computing
  11. the identification of a user based on a physical characteristic
  12. To prevent malware from being delivered or spread
  13. A "phonebook" of users and devices on a network
  14. Characteristics of a file
  15. any external device that provides input or output for the computer
  16. Identifies resources a user can access on a computer
  17. copying files to a another location in case of equipment failure
  18. An app installed on devices managed by an organization
  19. Allowing multiple people to access a folder or file
  20. Applies security settings to users and computers what they can do and access.
  21. a software that delivers advertising that is unexpected and unwanted by the user

50 Clues: Internet based computingCharacteristics of a fileHoles for peripheral cables.to remove an app/program from a device"Points to" a storage space on a networkRemotely controls smart phones and tabletsTool to monitor and limit user activities.The ability of one device to work with anotherA "phonebook" of users and devices on a network...

Science, Technology, and Society 2020-05-14

Science, Technology, and Society crossword puzzle
Across
  1. were invented which replaced human labor
  2. makes education and business much easier
  3. The natural world or ecosystem
  4. The Laws of Organic Life
  5. has become one of the clearest indicators of life outcomes such as employment, income and social status, and is a strong predictor of attitudes and wellbeing
  6. is the average of many years of weather observation
  7. floating gardens
  8. change and improvement
  9. a situation that is a risk for a given population
  10. refers to merging of what were three separate industries: telecommunications, computing, and electronics or broadcasting
  11. reduces soil erosion
  12. first antibiotic
  13. is a patented brand of genetically modified (GM) fluorescent zebra fish with bright red, green, and orange fluorescent color
  14. rational self
  15. is released by coal mining,landfills, and by agriculture, particularly through the digestive processes of beef and milk cows
  16. unique system writing
  17. unconscious part of the mind that acts as our conscience.
  18. A group, large or small, of people in a particular place and time who are linked by common goals and interests
  19. “people of the sun”
  20. “Rule by the people”
  21. first mammal ever to have been cloned
  22. ability to transfer genetic material to plants
  23. using computers tostore,manipulate and transmit information in form of speech, text, data, and video more cheaply and faster than every before.
  24. attempting to convince others of your value judgment
  25. an idea on which people hold different beliefs and values
  26. Comes from the Latin word “techne”
  27. literally means “to spell” in Tagalog
  28. is a wheeled motor vehicle used for transportation
Down
  1. Least priority in Maslow's hierarchy of human needs
  2. The sole purpose of the original event was to give the news of the Athenians having won over the Persians
  3. This is a way of freeing the unconscious mind or opening up drawers to remember vivid details of the past.
  4. Comes from the Latin word “scientia”
  5. rich and valuable sources of new genes, proteins and metabolic processes with important applications for human benefits
  6. a two-way television
  7. Identified as what is happening outdoors in a place at a given time
  8. a vast network of high speed wires and satellite relays linking computers worldwide
  9. is the theory that explains how organisms have arisen and diversified from earlier organisms
  10. unconconscious part of the mind
  11. "mother culture"
  12. Made with pens made from reeds, mixed wit soot, beeswax and vegetable gum to make ink.
  13. raising finfish or shellfish in controlled conditions for use as food sources
  14. using living organisms, or the products of living organisms, for human benefit to make a product or solve a problem
  15. originally referred to a group of boats and their passengers who migrated to the Philippines
  16. is a series of improvements in human life marked by inventions and discoveries
  17. were the first organisms to be modified in the laboratory, due to their simple genetics.
  18. distributed, fast digital networks wired and wireless
  19. Birthplace of the industrial Revolution
  20. comes from the Latin word "Modo"
  21. knots tied to colored rope
  22. Developed system of mathematics & number system
  23. The use of biotechnology to process and degrade a variety of natural and manmade substances
  24. built one of the largest & wealthiest empires in the world
  25. is an ancient writing system that was used in what is now the Philippines

53 Clues: rational selffloating gardensfirst antibiotic"mother culture"“people of the sun”a two-way televisionreduces soil erosion“Rule by the people”unique system writingchange and improvementThe Laws of Organic Lifeknots tied to colored ropeThe natural world or ecosystemunconconscious part of the mindcomes from the Latin word "Modo"...

iman taylor's vocabulary 2 2017-03-02

iman taylor's vocabulary 2 crossword puzzle
Across
  1. connect or operate with a network
  2. the introductory page of a website, typically serving as a table of contents for the site.
  3. computer-aided design.
  4. a format for compressing image files.
  5. a device that scans documents and converts them into digital data.
  6. In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
  7. the process of converting information or data into a code, especially to prevent unauthorized access.
  8. broadcasting, computer networking, or other communication using radio signals, microwaves, etc.
  9. the address of a World Wide Web page.
  10. a unit of memory or data equal to 1,024 (210) bytes.
Down
  1. A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
  2. a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
  3. Java is a general purpose, high-level programming language developed by Sun Microsystems. A small team of engineers, known as the Green Team, initiated the language in 1991. Javawas originally called OAK, and was designed for handheld devices and set-top boxes.
  4. a person who uses computers to gain unauthorized access to data.
  5. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  6. a unit of information equal to one billion (109) or, strictly, 230 bits.
  7. Basis point (BPS) refer to a common unit of measure for interest rates and other percentages in finance. One basis point is equal to 1/100th of 1%, or 0.01% (0.0001), and is used to denote the percentage change in a financial instrument.
  8. the way in which something is arranged or set out.
  9. the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
  10. A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
  11. a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  12. program instructions.
  13. The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNSservers return the IP address of the Web server associated with that name.
  14. The data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
  15. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.

25 Clues: program instructions.computer-aided design.connect or operate with a networka format for compressing image files.the address of a World Wide Web page.the way in which something is arranged or set out.a unit of memory or data equal to 1,024 (210) bytes.a person who uses computers to gain unauthorized access to data....

SIMPLIFIED ACCOUNTING MODULE 1 2019-05-31

SIMPLIFIED ACCOUNTING MODULE 1 crossword puzzle
Across
  1. Accountants involved in tax work are responsible for computing the amount of tax payable by both business entities and individuals.
  2. In _____________ Recognition Principle, Revenue is to be recognized in the accounting period when goods are delivered or services are rendered or performed.
  3. As to_______________: Accounting is the process of identifying, measuring and communicating economic information to permit informed judgment and decision by users of information.
  4. Traditionally, _____________ is defined as the art of recording, classifying and summarizing in a significant manner and in terms of money, transactions and events which in part at least of a financial character and interpreting the results thereof.
  5. A well maintained bookkeeping system will enable your business for balanced____________ or Financial Planning as a means of working to quantify your Vision, Mission, Goals and Objectives.
  6. In ________________ Principle, Accounting records and statements are based on the most reliable data available so that they will be as accurate and as useful as possible.
  7. ______________depends on the size and nature of the item judged in the particular circumstances of its omission.
  8. ____________ is the process of preparing and distributing accounting reports to potential users of accounting information. This is why Accounting has been called the “language of business”.
  9. In this first stage of Accounting, the business activities of the entity are determined whether accountable or not.
  10. As to_______________: Accounting is a service activity. It provides quantitative information primarily financial in nature, about economic entities that is intended to be useful in making economic decision.
  11. ________________ is the preparation of the financial statements which are the end product of the accounting process.
Down
  1. Financial __________________is where financial managers are responsible for setting financial objectives, making plans based on those objectives, obtaining the finance needed to achieve the plans, and generally safeguarding all the financial resources of the entity.
  2. is the NEW ACCOUNTING STANDARD SETTING BODY, replacing the
  3. ______________ is the systematic process of maintaining a record of all business transactions after they have been identified and measured.
  4. In _____________ Recognition Principle, Expenses should be recognized in the accounting period in which goods and services are used up to produce revenue and not when the entity pays for those goods and services.
  5. _______________ Disclosure requires that all relevant information that would affect the user’s understanding and assessment of the accounting entity be disclosed in the financial statements.
  6. In ________________ Principle, the firms should use the same accounting method from period to period to achieve comparability over time within a single enterprise.
  7. This is where the economic activities of the entity are given financial equivalent.
  8. ______________ Cost. states that acquired assets should be recorded at their actual cost and not at what management thinks they are worth as at reporting date.
  9. is a profession whose members are engaged in the collection of financial data, the summary of that data, and then presentation of information in a form which helps recipients take effective decisions.
  10. In Communicating, Accounting has been called the “______________ of business”.
  11. is a mechanical task involving the collection of basic financial data.
  12. ______________ Accounting is the more specific term applied to the preparation and subsequent publication of highly summarized financial information.
  13. forms a most important part of accountancy. Once accounts have been prepared, they may have to be checked in order to ensure that they do not present a distorted picture.
  14. Accountancy is the term to describe the profession while accounting refers to the_________.

25 Clues: is the NEW ACCOUNTING STANDARD SETTING BODY, replacing theis a mechanical task involving the collection of basic financial data.In Communicating, Accounting has been called the “______________ of business”.This is where the economic activities of the entity are given financial equivalent....

NW3CTF 2020-03-29

NW3CTF crossword puzzle
Across
  1. the process of using scientific knowledge for collecting, analyzing, and presenting evidence to the courts
  2. globally unique identifier
  3. software or hardware that prevents changes being made to data on media (2 words)
  4. most common type of computer port used in today's computers
  5. Bill Gates operating system
  6. the process of using a mathematical algorithm against data to produce a hexadecimal value that is representative of that data
  7. portable computer
  8. also know as a property list
  9. logical block addressing
  10. unpartitioned space
  11. a word that acts as the key to a cipher or code
  12. 1024 zettabytes
  13. needed to logon or open an encrypted container
  14. data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both
  15. an area of the hard drive that is not accessible by the OS
  16. a hierarchical database used to store information necessary to configure the system for one or more users, applications, and hardware devices
  17. unified extensible firmware interface
  18. the process of converting information or data into a code, especially to prevent unauthorized access
  19. _____ files are a group of keys, sub-keys, values, and data which make up a branch of the hierarchical registry tree
  20. Mac built encryption
  21. mobile computing device bigger than a cellphone but smaller than a laptop
  22. a platform on which all other software functions operate (2 words)
  23. 0's and 1's, base 2
  24. message digest 5
  25. random access memory
  26. a _____ container prevents signal from entering or exiting
  27. number scheme that is base 16
Down
  1. removal of memory chip from a device
  2. 1024 gigabytes
  3. Windows built in encryption
  4. a structured set of data held in a computer, especially one that is accessible in various ways
  5. four bits
  6. two bytes are used to represent one character
  7. the storage area of a hard drive ranging from the end of a stored file to the end of that file cluster (2 words)
  8. open source operating system used for smartphones and tablet computers
  9. transfer (data) from main memory to temporary storage in readiness for later use
  10. collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data
  11. the process used to keep all cells on NAND memory roughly the same level of use (2 words)
  12. detailed examination of data on digital media
  13. the system that the OS and other programs use to keep track of files and disk space (2 words)
  14. used in a dictionary attack
  15. basic input output system
  16. secure hash algoritm
  17. Steve Jobs operating system
  18. American standard code for information interchange
  19. smallest physical storage unit on a disk
  20. whole number; a number that is not a fraction
  21. sometimes referred to as the. net or web
  22. a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems, and which operates independently of a central bank.
  23. a bit by bit capture and storage of data without changing or manipulating any of the bits (2 words)

50 Clues: four bits1024 gigabytes1024 zettabytesmessage digest 5portable computerunpartitioned space0's and 1's, base 2secure hash algoritmMac built encryptionrandom access memorylogical block addressingbasic input output systemglobally unique identifierWindows built in encryptionBill Gates operating systemused in a dictionary attack...

Unit 5 Part 2 2023-01-31

Unit 5 Part 2 crossword puzzle
Across
  1. a condition of limited mental ability, indicated by an intelligence test score of 70 or below and difficulty adapting to the demands of life. (Formerly referred to as mental retardation.)
  2. (an aptitude test) its and its companion versions for children are the most widely used intelligence tests; they contain verbal and performance (nonverbal) subtests.
  3. defining uniform testing procedures and meaningful scores by comparison with the performance of a pretested group.
  4. a condition of mild to serve intellectual disability and associated physical disorders caused by an extra copy of chromosome 21.
  5. a measure of intelligence test performance devised by Binet; the level of performance typically associated with children of a certain chronological age. Thus, a child who does as well as an average 8-year-old is said to have a mental age of 8.
  6. the bell-shaped curve that describes the distribution of many physical and psychological attributes. Most scores fall near the average, and fewer scores lie near the extremes.
  7. our ability to reason speedily and abstractly; tends to decrease with age, especially during late adulthood.
  8. according to Spearman and others, underlies all mental abilities and is therefore measured by every task on an intelligence test
  9. defined originally as the ratio of mental age (ma) to chronological age (ca) multiplied by 100 (thus, IQ = ma/ca * 100). On contemporary intelligence tests, the average performance for a given age is assigned a score of 100.
  10. research that compares people of different ages at the same point in time.
  11. a self-confirming concern that one will be evaluated based on a negative
  12. the extent to which a test samples the behavior that is of interest.
  13. the extent to which a test measures or predicts what it is supposed to. (See also content validity and predictive validity.)
  14. the proportion of variation among individuals in a group that we can attribute to genes. The heritability of a trait may vary, depending on the range of populations and environment.
  15. the ability to perceive, understand manage, and use emotions.
Down
  1. the extent to which a test yields consistent results, as assessed by the consistency of scores on two halves of the test, on alternative forms of the test, or on retesting.
  2. a test designed to assess what a person has learned
  3. a condition in which a person otherwise limited in mental ability has an exceptional specific skill, such as in computation or drawing.
  4. the widely used American revision (by Terman at Stanford University) of Binet’s original intelligence test.
  5. a test designed to predict a person’s future performance; aptitude is the capacity to learn.
  6. the ability to learn from experience, solve problems, and use knowledge to adapt to new situations.
  7. a method for assessing an individual’s mental aptitudes and comparing them with those of others, using numerical scores
  8. in psychology, grit is passion and perseverance in the pursuit of long-term goals
  9. research that follows and retests the same people over time.
  10. the success with which a test predicts the behavior it is designed to predict; it is assessed by computing the correlation between test scores and the criterion behavior. (Also called criterion-related validity)
  11. a statistical procedure that identifies clusters of related items (called factors) on a test; used to identify different dimensions of performance that underlie a person’s total score
  12. a group of people sharing a common characteristic, such as from a given time period.

27 Clues: a test designed to assess what a person has learnedresearch that follows and retests the same people over time.the ability to perceive, understand manage, and use emotions.the extent to which a test samples the behavior that is of interest.a self-confirming concern that one will be evaluated based on a negative...

Computer terms 2015-06-04

Computer terms crossword puzzle
Across
  1. coding language used to make web sites.
  2. He was an American electrical engineer who took part in the realization of the first integrated circuit while working at texas instruments in 1958.
  3. a computer by apple, took over the market
  4. The homebrew Computer club was an early computer hobbyist group in silicon valley which met from march 5, 1975 to December 1986, and was depicted in films pirates of silicon valley 199 and jobs 2013.
  5. He is an English computer scientist best known as the inventor of the world wide web.
  6. a second name for chip
  7. He was a civil engineer, inventor and computer pioneer. His best achievement was the world's first programmable computer.
  8. He is an indian-american architect who created the USB, PCI Express, platform power, Architecture and various chipset improvments.
  9. He was a member of the engineering team that designed the first American Electronic computer.
  10. its a chip that has cpu.
  11. hold a single character also equal 8 bits.
  12. He is an American engineer and entrepreneur who founded both Atarci, inc. And the chuck cheese pizza time theatre.
  13. manages a network resource.
  14. He is an American Psychologist and computer scientist considered one of the most important figures in computer science and general computing history.
  15. able to use icon to open programs .
  16. number system that uses 1&0
  17. specifies IP address or the domaine name.
  18. He is an American entrepreneur, investor, and software engineer.
  19. He was a video game inventor, and engineer and was known as the “The Father Of Video Games”
  20. computers linked together,device allocate resources.
  21. He was an American physicist and Electrical engineer , the only person to have won the Nobel prize in Physics twice.
Down
  1. Amplifies a signal.
  2. He was an austrian inventor born in vienna his best invention was the printed circuit board.
  3. its a programing language.
  4. He's a retired Dartmouth professor of mathematicians and computer scientist.
  5. a point in a graphic image.
  6. He was an American electrical engineer and computer pioneer. With john Mauchly he invented the first general purpose electronic digital computer.
  7. created the first ever graphical game called OXO.
  8. He was an American physicist and inventor, best known for inventing the first Electronic digital computer. Atanasoff invented the first Electronic digital computer in the 1930s at iowa state college.
  9. enables a computer to transmit data
  10. send data to output device,receives information.
  11. cables, connectors and communications protocols.
  12. He was a mathematician, computer science, and educator best known for co developing BASIC programing language.
  13. carries information in both vertical, horizontal direction .
  14. changes source code to object code
  15. was a computer scientists, mathematicians, logician, and cryptanalyst.
  16. He is an American inventor and computer engineer. He was part of the team that developed the ISA bus.
  17. optical disk to store data
  18. He is one of the inventors of the microprocessor.
  19. thin board which holds electronic components.
  20. He was an american activist, He was the first student with severe disabilities to attend the University of california, Berkely.
  21. store large amounts of digital information.
  22. Large wide area network by the USA.

43 Clues: Amplifies a signal.a second name for chipits a chip that has cpu.its a programing language.optical disk to store dataa point in a graphic image.manages a network resource.number system that uses 1&0changes source code to object codeenables a computer to transmit dataable to use icon to open programs .Large wide area network by the USA....

Debbie and Eric's 40th Anniversary Crossword 2015-10-18

Debbie and Eric's 40th Anniversary Crossword crossword puzzle
Across
  1. Which fictional character resides at 221b Baker Street: ‘Sherlock ……’?
  2. What iconic ruby-coloured clothing did Dorothy wear in The Wizard of Oz?
  3. What popular BBC1 “home improvement” series is fronted by Nick Knowles with Billy Byrne and co.?
  4. What was the generic nickname given to the car Eric drove when you first met?
  5. Which Eric was one half of a comedy double act with Ernie Wise?
  6. Eric Idle is one sixth of which comedy group, also starring John Cleese, Terry Jones, and Michael Palin?
  7. Which popular BBC TV programme has been fronted by Percy Thrower, Geoff Hamilton, Monty Don and Nigel: ‘Gardener’s …..’?
  8. From which tuneful production do “Oh, What A Beautiful Mornin’” and “I Cain’t Say No” come?
  9. Which 1990 film, directed by Tim Burton, tells the story of a gentle man with unusual hands: Edward …………?
  10. From which base on the Oxford canal did we start our narrow boat holiday?
  11. Which Eric penned and performed songs such as Layla, After Midnight, and Lay Down Sally?
  12. What vessel was named after the capital of Australia in 1957: ‘SS ……..’?
  13. The Great Fire of London in 1666 started at the Bakery on which “lane”?
  14. Which American State adopted the Ruby Red grapefruit as their state fruit in 1993?
  15. Which market and cathedral city (our third smallest) lies at the confluence of two tributaries of the River Ure?
  16. What gas helps form the head when pouring Guinness?
  17. Which country does Eric Cantona, former Manchester United footballer, come from?
  18. What anagram of “Baker” does the middle foot pedal in a manual car allow you to do?
Down
  1. Complete the 1978 Blondie single: 'Heart of .....'
  2. Add together what (Eric the half a) bee makes to the destination of Wallace and Gromit’s Grand Day Out. Where was yours?
  3. Debbie Harry is the lead singer from which late 70s band?
  4. What did your wedding reception venue have 6 of?
  5. What 1992 film stars Glenn Close as dog-napping villainess Cruella de Vil?
  6. Which “Debbie” is the magical assistant and wife to Paul Daniels?
  7. What type of flower traditionally signifies a 40th wedding anniversary?
  8. Black, mute, trumpeter and whooper are all types of what animal?
  9. Complete the 1967 Rolling Stones song title: '.... Tuesday'
  10. What computing company was established in 1975 by Bill Gates?
  11. Approximately 40% of worldwide total Guinness volume is brewed and sold in which continent?
  12. What did the cowardly lion seek in the Wizard of Oz?
  13. Which Manor, appropriately enough, did we all stay at in Liskeard, Cornwall?
  14. What is the surname of the American-born loudmouth comedienne: ‘Ruby …’?
  15. What common spice is used in the making of Easter biscuits?
  16. What collectable ornaments is David Corbridge famous for creating?
  17. From 1 Corinthians, Chapter 13, Verse 13 – ‘And now these three remain: faith, hope and love. But the greatest of these is ….?’
  18. Which famous silent movie actor was knighted in 1975: ‘Charlie …….’?
  19. Which colourful bird, used to advertise a popular alcoholic beverage, is native to Central and South America?
  20. Which Scottish singer-songwriter was best known for his hits “Baker Street”, “Right Down The Line”, and “Night Owl”: ‘….. Rafferty’?
  21. What is the name given to the 40 day period preceding Easter Sunday?
  22. The name “Debbie” is derived from a Hebrew word for what yellow and black-striped buzzing insect?

40 Clues: What did your wedding reception venue have 6 of?Complete the 1978 Blondie single: 'Heart of .....'What gas helps form the head when pouring Guinness?What did the cowardly lion seek in the Wizard of Oz?Debbie Harry is the lead singer from which late 70s band?Complete the 1967 Rolling Stones song title: '.... Tuesday'...

DIT crossword 2017-06-13

DIT crossword crossword puzzle
Across
  1. : A ________ is a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one.
  2. : In information technology, _______ is the construction, design, and use of a network.
  3. : In data processing, using an office metaphor, a ____ is a related collection of records.
  4. : a broadcasted television or radio production or similar Internet-based content produced for distribution.
  5. : _______ describes electronic technology that generates, stores, and processes data in terms of two states: positive and non-positive.
  6. : A device that is used to record data, sound, etc.
  7. : A ________ is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of.
  8. : an electroacoustic device, often housed in a cabinet, that is connected as a component in an audio system, its function being to make speech or music audible.
  9. : On most computers, a _____ is the primary text input device.
  10. : Memory the user can change
  11. : A _______ equalizer is a high-fidelity audio control that allows the user to see graphically and control individually a number of different frequency.
  12. : A series of steps
  13. : ________ is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output
  14. : A group of binary digits or bits (usually eight) operated on as a unit.
  15. : A ______ is a printer that interprets commands from a computer to make line drawings on paper with one or more automated pens.
Down
  1. : a movable or fixed device, usually consisting of a covered frame, that provides shelter, serves as a partition, etc.
  2. : _____ computing is a general term for the delivery of hosted services over the internet.
  3. : _______ is the electronic holding place for instructions and data that your computer's microprocessor can reach quickly.
  4. : A ________ is a printer that interprets commands from a computer to make line drawings on paper with one or more automated pens.
  5. : A ______ modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone.
  6. : A _______ is a graphical (rather than purely textual) user interface to a computer.
  7. : In the Windows, Macintosh, and some other operating systems, a _______ is a named collection of related files that can be retrieved and moved.
  8. : a person who opperates a computer
  9. : A __________ , a noun truncation of _________ device, ) is any computer device that is not part of the essential .
  10. : As a noun, an ________ is either:A user _______, consisting of the set of dials, knobs, operating system commands, graphical display formats.
  11. : computer memory in which program instructions, operating procedures, or other data are permanently stored, generally on electronic chips during manufacture, and that ordinarily cannot be changed by the user.
  12. : ________ is a Microsoft Windows program that supervises the interaction between file system requests and events and input/output.
  13. : a computer-aided electronic system using photoelectric cells to separate copy, as color illustrations, into its primary colors, correct color copy, and produce a set of color separations ready for proofing or printing.
  14. : A ______ is the smallest unit of data in a computer.

29 Clues: : A series of steps: Memory the user can change: a person who opperates a computer: A device that is used to record data, sound, etc.: A ______ is the smallest unit of data in a computer.: On most computers, a _____ is the primary text input device.: A group of binary digits or bits (usually eight) operated on as a unit....

Tencho Definitions 2022-02-25

Tencho Definitions crossword puzzle
Across
  1. Data data that contains greater variety, arriving in increasing volumes and with more velocity
  2. a course of study made available over the internet without charge to a very large number of people.
  3. posting a single message or piece of content to multiple destinations.
  4. Networks a computer system modeled on the human brain and nervous system.
  5. the state or quality of being efficient.
  6. 360 video recordings where a view in every direction is recorded at the same time, shot using an omnidirectional camera or a collection of cameras.
  7. the formation of ideas or concepts.
  8. Computing a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
  9. a form of entertainment
  10. business model in which a company offers basic or limited features to users at no cost and then charges a premium for supplemental or advanced features.
  11. Audio high-resolution audio files are superior sound quality over compressed audio formats such as MP3 and AAC.
  12. Solar Systems permits electricity to be harnessed by solar panels and stored inside a battery without direct connection to the utility grid.
  13. content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
  14. the state, fact, quality, or condition of being singular.
  15. someone who would like to start a business and thinks and talks about doing so, but never gets started.
Down
  1. a mobile device used while watching television especially to access supplementary content or applications
  2. a person, company, or technology that changes the way an industry operates.
  3. reuse (discarded objects or material) in such a way as to create a product of higher quality or value than the original.
  4. fusion the process of combining sensor data or data derived from disparate sources such that the resulting information has less uncertainty than.
  5. the correct or acceptable way of communicating on the internet
  6. Leader one whose views on a subject are taken to be authoritative and influential.
  7. a person who introduces new methods, ideas, or products.
  8. denoting or relating to a period of a thousand years.
  9. Fatigue the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine.
  10. a standards-based wireless technology developed to enable low-cost, low-power wireless machines a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  11. take (something) illicitly; steal.
  12. an image, video, advertisement, etc., that is circulated rapidly on the internet.
  13. Optimization the process of ensuring that visitors who access your site from mobile devices have an experience optimized for the device.
  14. the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
  15. is King you should focus on putting out good content frequently and consistently.
  16. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  17. short for key performance indicator.
  18. or Radio detection and ranging: a detection system that uses radio waves to determine the distance (ranging), angle, or velocity of objects.

33 Clues: a form of entertainmenttake (something) illicitly; steal.the formation of ideas or concepts.short for key performance indicator.the state or quality of being efficient.denoting or relating to a period of a thousand years.a person who introduces new methods, ideas, or products.the state, fact, quality, or condition of being singular....

tech 2022-03-15

tech crossword puzzle
Across
  1. a link from a hypertext document to another location, activated by clicking on a highlighted word or image.
  2. the original draft of a diplomatic document, especially of the terms of a treaty agreed to in conference and signed by the parties.
  3. Intranets are predominantly used by employees to search for information, communicate across an organization, and manage workflows
  4. transfer protocol (FTP) The term file transfer protocol (FTP) refers to a process that involves the transfer of files between devices over a network. The process works when one party allows another to send or receive files over the internet.
  5. an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet in a secure way.
  6. Internet service provider (ISP) Intent to Package (computing) ITP. Information Technology Professional. ITP. Instruction to Proceed.
  7. page a hypertext document on the World Wide Web.
  8. mark-up language (HTML) Hypertext Markup Language, a standardized system for tagging text files to achieve font, colour, graphic, and hyperlink effects on World Wide Web pages.
  9. Wide Web (WWW) an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
  10. transfer protocol (http) What is HTTP (Hypertext Transfer Protocol)? The Hypertext Transfer Protocol is an application protocol for distributed, collaborative, hypermedia information systems that allows users to communicate data on the World Wide Web.
  11. browser Definition of a "web browser" and links to support websites for further information and help. "A web browser, or simply 'browser,' is an application used to access and view websites. Common web browsers include Microsoft Edge, Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
  12. a collection of items of the same type stored in a hidden or inaccessible place.
  13. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  14. user interface (GUI) a visual way of interacting with a computer using items such as windows, icons, and menus, used by most modern operating systems.
Down
  1. a packet of data sent by a web server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.
  2. mail transfer protocol (SMTP) SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  3. a software system allowing extensive cross-referencing between related sections of text and associated graphic material.
  4. messages distributed by electronic means from one computer user to one or more recipients via a network.
  5. the online exchange of messages in real time with one or more simultaneous users of a computer network.
  6. page the introductory page of a website, typically serving as a table of contents for the site.
  7. a database format similar to hypertext in which text, sound, or video images related to that on a display can be accessed directly from the display.
  8. a wall or partition designed to inhibit or prevent the spread of fire.
  9. telecommunication in the form of a videoconference.
  10. an area on a computer screen which can be clicked to activate a function, especially an image or piece of text acting as a hyperlink.
  11. engine a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.
  12. resource locator (URL) the address of a web page.
  13. a set of related web pages located under a single domain name, typically produced by a single person or organization.
  14. control protocol/Internet protocol (TCP/IP) TCP/IP, in full Transmission Control Protocol/Internet Protocol, standard Internet communications protocols that allow digital computers to communicate over long distances.
  15. server A proxy server acts as a gateway between you and the internet. It's an intermediary server separating end users from the websites they browse.

29 Clues: page a hypertext document on the World Wide Web.resource locator (URL) the address of a web page.telecommunication in the form of a videoconference.a wall or partition designed to inhibit or prevent the spread of fire.a collection of items of the same type stored in a hidden or inaccessible place....

Networking 2023-10-21

Networking crossword puzzle
Across
  1. A basic networking device that connects multiple devices in a network. It operates at the physical layer of the OSI model.
  2. A more advanced networking device than a hub, operating at the data link layer. It uses MAC addresses to forward data only to the device it is intended for.
  3. A smaller network within a larger network. Often used to organize hosts based on location or function.
  4. The identity of each host on the internet, essential for communication. It consists of 32 bits, divided into four octets and represented as a decimal number.
  5. A set of rules governing the format of data sent over the internet or other networks. IP addresses are a key component of the Internet Protocol.
  6. The IP address indicating the origin of a data packet. For example, when a client sends a request to a server, the source IP address is the client's IP address.
  7. Network of interconnected devices embedded with sensors, software, and other technologies, enabling them to collect and exchange data.
  8. In the context of IP addresses, refers to the organization of IP addresses into subnets.
  9. A device that connects different networks and directs traffic between them based on IP addresses. It operates at the network layer of the OSI model.
  10. A type of grouping of hosts based on shared characteristics or requirements. In networking, logical grouping refers to creating networks where hosts have similar connectivity needs.
Down
  1. The use of largely automatic systems to perform tasks without human intervention, especially in the context of networking, where automation simplifies and streamlines processes.
  2. Any device that sends or receives traffic. Examples include computers, laptops, phones, printers, servers, and cloud resources.
  3. A device that connects and filters traffic between two network segments at the data link layer of the OSI model.
  4. A unit of data transmitted over a network. It includes the actual data being sent, as well as control information like source and destination IP addresses.
  5. A type of host that initiates requests. For instance, a computer making a request to a web server.
  6. A type of host that responds to requests. For example, a web server providing content in response to a client's request.
  7. The IP address indicating the intended recipient of a data packet. In the context of a client-server interaction, the destination IP address is the server's IP address when the client is making a request. In response, when the server sends data back to the client, the source and destination IP addresses are swapped.
  8. The process of dividing and assigning IP addresses hierarchically, creating sub-networks or subnets.
  9. Computing services and resources (e.g., servers, storage, databases) delivered over the internet, often provided by cloud service providers.
  10. A logical grouping of hosts that share similar connectivity. Networks facilitate the transportation of traffic between hosts.
  11. A technology that allows devices to connect wirelessly to a local area network (LAN) using radio waves.
  12. A network device that amplifies and retransmits signals to extend the reach of a network.
  13. Conceptual framework that standardizes the functions of a communication system into seven abstraction layers, from physical transmission to application.
  14. Provides internet access to consumers by managing the data exchange between networks.

24 Clues: Provides internet access to consumers by managing the data exchange between networks.In the context of IP addresses, refers to the organization of IP addresses into subnets.A network device that amplifies and retransmits signals to extend the reach of a network....

crossword 2024-12-08

crossword crossword puzzle
Across
  1. It refers to regular patterns of division in society that are associated with membership of particular social groupings.
  2. State of humid.
  3. A social unit.
  4. It can store and process data.
  5. A group of inhabitants that has the same characteristics and adaptations.
  6. A division into two sharply contrasting groups or sets of opinions or beliefs.
  7. It is species morphed similarly but does not have the same genetics.
  8. A form of computing uses phenomena like superposition.
  9. Is a hydrocarbon of natural gas.
  10. One hundred years.
  11. It is the diversity of the biological traits inside a species.
  12. Physical work.
  13. To direct the course of a ship, aircraft, or other form of transportation
  14. It helps identify species depending on the particular region.
  15. Facts learned from something or someone.
  16. The human race.
  17. A colorless liquid from rivers, seas, lakes, and rain.
  18. It is the diversity of different inhabitants on our planet.
  19. A condition of a human owned by another.
  20. The degree of the internal heat.
  21. Treating a person or a particular group of people differently.
  22. A system of recorded transactions maintained across computers.
  23. Is a structure for plants for better temperature and humidity.
  24. Water vapor frozen into ice crystals.
  25. It is a mobile device.
  26. Relates to the entire world.
  27. The holding of extreme political or religious views.
  28. The well-being of an organism.
  29. An arrangement of ranks.
  30. Cause of great damage and suffering.
  31. Organisms are assigned with a scientific name.
Down
  1. It is an individual and collective effort made to identify and address issues of public concern.
  2. A process of something that hasn’t been made before.
  3. A land full of trees.
  4. It protects systems, networks, programs, devices, and data from cyberattacks.
  5. Movement of air.
  6. Spreading harmfully and intruding.
  7. Used for communication.
  8. An accumulation of ice and snow that flows over land.
  9. The ability to criticize stories that are shown in mass media and determine whether it is accurate or credible.
  10. Semiconductor that regulates voltage flow.
  11. Nature of robots.
  12. It is the different kinds of life you find in an area, like animals, fungi, plants, and microorganisms.
  13. It is the protection and restoration for plants.
  14. Free from public attention.
  15. It is the diversity of the variety of inhabitants found in a geographic location.
  16. A social program that has unemployment benefits, social security, affordable housing, and helping poverty.
  17. The effect of something bad, severe, serious, or painful more or less.
  18. A global computer network.
  19. Refers to the number of times the alternating current switches between positive and negative in 1 second.
  20. The state of the atmosphere.
  21. A gap in various forms, education, rich and more, or social injustice.
  22. It is an identification of species that are on the brink of extinction.
  23. A suspension of liquid particles in gas.
  24. Use of technology.
  25. It is a practice of science in dealing with classifications for living organisms.
  26. Refers to long-term shifts in temperatures and weather patterns.
  27. Is related closely.
  28. An organized body of people with a specific purpose, especially in business.
  29. The practice of collecting taxes.
  30. It is a field of computer science that uses math, statistics, and machine learning.

61 Clues: A social unit.Physical work.State of humid.The human race.Movement of air.Nature of robots.One hundred years.Use of technology.Is related closely.A land full of trees.It is a mobile device.Used for communication.An arrangement of ranks.A global computer network.Free from public attention.The state of the atmosphere.Relates to the entire world....

APCSP Exam Review Puzzle 2025-05-09

APCSP Exam Review Puzzle crossword puzzle
Across
  1. the process of accessing each item in a list one at a time.
  2. occurs when the ending condition will never evaluate to true.
  3. provides a "good enough" solution to a problem when an actual solution is impractical or impossible
  4. a measure of how many steps are needed to complete an algorithm
  5. Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
  6. a process that makes the data uniform without changing its meaning (e.g., replacing all equivalent abbreviations, spellings, and capitalizations with the same word).
  7. differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
  8. a group of functions (procedures) that may be used in creating new programs
  9. a type of search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated.
  10. the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
  11. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  12. Type of data with values that change continuously, or smoothly, over time. Some examples of analog data include music, colors of a painting, or position of a sprinter during a race.
  13. Type of error from attempting to represent a number that is too large
Down
  1. a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
  2. the value passed to the parameter
  3. the practice of obtaining input or information from a large number of people via the Internet.
  4. A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.
  5. he time used to complete a task sequentially divided by the time to complete a task in parallel
  6. a model in which programs are broken into small pieces, some of which are run simultaneously
  7. a written description of how a command or piece of code works or was developed.
  8. the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network.
  9. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  10. A collection of public copyright licenses that enable the free distribution of an otherwise copyrighted work, used when an author wants to give people the right to share, use, and build upon a work that they have created
  11. a process of encoding messages to keep them secret, so only "authorized" parties can read it.
  12. a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met.
  13. An agreed-upon set of rules that specify the behavior of some system

26 Clues: the value passed to the parameterthe process of accessing each item in a list one at a time.occurs when the ending condition will never evaluate to true.a measure of how many steps are needed to complete an algorithmAn agreed-upon set of rules that specify the behavior of some system...

Exploring the Muslim World 2015-01-06

Exploring the Muslim World crossword puzzle
Across
  1. In this field, Muslims wrote books about animals' bodies.
  2. Muslims believe that they do God's work, reveal to prophets, and observe and record deeds of each human being.
  3. He was sent to the desert to learn traditional Arab values.
  4. Muslims learned how about paper from these people.
  5. The art of beautiful handwriting.
  6. For Muslims, ________ is the word for God and the center of life.
  7. The belief in one God.
  8. These are used for Muslims to wash their bodies before prayer.
  9. During Ramadan, Muslims ____ until sunset.
  10. Muhammad delivered his __________ in 632 (two words).
  11. He realized that infections were caused by bacteria.
  12. Took care of Muhammad when Muhammad's parents died (two words).
  13. The _________ is where Muhammad went to Jerusalem, prayed with earlier prophets, and met God (two words).
  14. This was built by Abraham in the city of Makkah.
  15. This device allowed people to identify the direction in which they traveled.
  16. This was the art of stems, leaves, flowers, and tendrils in repeating patterns.
  17. The shared language among Muslim lands.
  18. Means "those who surrender to God".
  19. Came to Muhammad when Muhammad was meditating in a cave.
  20. Provides commands to perform declaration of faith, prayer, charity, fasting, and making pilgrimages.
  21. Muslim scholars used _____ and logic to prove important truths.
  22. Through this field of study, Muslims discovered that Earth rotates like a spinning top.
  23. A talented musician and singer from Baghdad who developed a music schooling 822.
  24. The body of Islamic law.
Down
  1. Arabs lived a ________ life during the time of Muhammad's birth.
  2. This was a game of strategy that symbolized war.
  3. The third pillar that apples to charity.
  4. A device for computing time based on the location of the sun or the stars.
  5. ______ were important t medieval Muslims because they were trade goods.
  6. The spreading of ideas and ways of life (two words).
  7. The struggle inside and the world as they want to please God.
  8. During the pilgrimage to Makkah, Muslims cast stones at pillars that represent _____.
  9. These were learning centers for doctors in training.
  10. It was one way to draw closer to God.
  11. Muslims were only _____ miles off on the circumference of the Earth.
  12. A prosperous city during the time of Muhmmad's birth.
  13. It took a over 100,000 architects, workers, ad craftspeople _____ years to build Baghdad.
  14. The name of one of al-Khwarizmi's books that was important to mathematics.
  15. When Jews and Christians ask for donations, they are called ______.
  16. This game shows wealth because horses were status symbols.
  17. Christians, Jews, and Muslims all trace their origins to this person.
  18. The holy city for Muslims.
  19. During this procedure, doctors removed limbs, took out tumors, or cleared cataracts from the eye.
  20. The pilgrimage to Makkah that is the fifth pillar.
  21. The Indian concept of _____ was important to calculations and helped to make numbers larger.
  22. The second pillar of Islam and represents the daily ritual prayer.
  23. The holy book of Islam.
  24. Muslims pray _______ times a day.
  25. The first to translate to Islam.
  26. Sometimes these were used to dull a patients pain or put them to sleep before surgery.

50 Clues: The belief in one God.The holy book of Islam.The body of Islamic law.The holy city for Muslims.The first to translate to Islam.The art of beautiful handwriting.Muslims pray _______ times a day.Means "those who surrender to God".It was one way to draw closer to God.The shared language among Muslim lands.The third pillar that apples to charity....

Debbie and Eric's 40th Anniversary Crossword 2015-10-18

Debbie and Eric's 40th Anniversary Crossword crossword puzzle
Across
  1. Which famous silent movie actor was knighted in 1975: ‘Charlie …….’?
  2. What anagram of “Baker” does the middle foot pedal in a manual car allow you to do?
  3. Which Eric was one half of a comedy double act with Ernie Wise?
  4. What did your wedding reception venue have 6 of?
  5. What common spice is used in the making of Easter biscuits?
  6. What is the name given to the 40 day period preceding Easter Sunday?
  7. What vessel was named after the capital of Australia in 1957: ‘SS ……..’?
  8. What 1992 film stars Glenn Close as dog-napping villainess Cruella de Vil?
  9. From which tuneful production do “Oh, What A Beautiful Mornin’” and “I Cain’t Say No” come?
  10. What collectable ornaments is David Corbridge famous for creating?
  11. What was the generic nickname given to the car Eric drove when you first met?
  12. Which Manor, appropriately enough, did we all stay at in Liskeard, Cornwall?
  13. What type of flower traditionally signifies a 40th wedding anniversary?
  14. Which American State adopted the Ruby Red grapefruit as their state fruit in 1993?
  15. Complete the 1978 Blondie single: 'Heart of .....'
  16. What popular BBC1 “home improvement” series is fronted by Nick Knowles with Billy Byrne and co.?
Down
  1. Which market and cathedral city (our third smallest) lies at the confluence of two tributaries of the River Ure?
  2. Which country does Eric Cantona, former Manchester United footballer, come from?
  3. The name “Debbie” is derived from a Hebrew word for what yellow and black-striped buzzing insect?
  4. Which fictional character resides at 221b Baker Street: ‘Sherlock ……’?
  5. What gas helps form the head when pouring Guinness?
  6. Black, mute, trumpeter and whooper are all types of what animal?
  7. Add together what (Eric the half a) bee makes to the destination of Wallace and Gromit’s Grand Day Out. Where was yours?
  8. Complete the 1967 Rolling Stones song title: '.... Tuesday'
  9. Eric Idle is one sixth of which comedy group, also starring John Cleese, Terry Jones, and Michael Palin?
  10. From 1 Corinthians, Chapter 13, Verse 13 – ‘And now these three remain: faith, hope and love. But the greatest of these is ….?’
  11. Which colourful bird, used to advertise a popular alcoholic beverage, is native to Central and South America?
  12. Which 1990 film, directed by Tim Burton, tells the story of a gentle man with unusual hands: Edward …………?
  13. Which “Debbie” is the magical assistant and wife to Paul Daniels?
  14. The Great Fire of London in 1666 started at the Bakery on which “lane”?
  15. Which Scottish singer-songwriter was best known for his hits “Baker Street”, “Right Down The Line”, and “Night Owl”: ‘….. Rafferty’?
  16. What computing company was established in 1975 by Bill Gates?
  17. Debbie Harry is the lead singer from which late 70s band?
  18. What iconic ruby-coloured clothing did Dorothy wear in The Wizard of Oz?
  19. What did the cowardly lion seek in the Wizard of Oz?
  20. Approximately 40% of worldwide total Guinness volume is brewed and sold in which continent?
  21. Which Eric penned and performed songs such as Layla, After Midnight, and Lay Down Sally?
  22. From which base on the Oxford canal did we start our narrow boat holiday?
  23. Which popular BBC TV programme has been fronted by Percy Thrower, Geoff Hamilton, Monty Don and Nigel: ‘Gardener’s …..’?
  24. What is the surname of the American-born loudmouth comedienne: ‘Ruby …’?

40 Clues: What did your wedding reception venue have 6 of?Complete the 1978 Blondie single: 'Heart of .....'What gas helps form the head when pouring Guinness?What did the cowardly lion seek in the Wizard of Oz?Debbie Harry is the lead singer from which late 70s band?Complete the 1967 Rolling Stones song title: '.... Tuesday'...

HOI 2020-02-25

HOI crossword puzzle
Across
  1. / a series of coded software instructions to control the operation of a computer or other machine
  2. social network / is an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections
  3. / a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
  4. reader / s a mobile electronic device that is designed primarily for the purpose of reading digital e-books
  5. / combining 2 or more functions in a unit.
  6. / an extra copy of data on a computer.
  7. engine / is designed to carry out web search, which means to search the World Wide Web
  8. device / A communication device is a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or wirelessly.
  9. console / a piece of electronic equipment for playing games on
  10. / cause to occur or operate at the same time or rate
  11. computing / is an application of environmental science which offers economically possible solutions that conserve natural environment and its resources
  12. device / is a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance.
  13. / an application, downloaded usually by a mobile user.
  14. / is a document commonly written in HTML (Hypertext Markup Language) that is accessible through the Internet or other networks using an Internet browser.
  15. / a program with graphic interface on a world wide web.
  16. / a location connected to the Internet that maintains one or more pages on the World Wide Web
  17. / a group or system of interconnected people or things
  18. device / is any piece of computer hardware equipment which converts information into human-readable form.
  19. server / a computer program that distributes web pages as they are requisitioned
Down
  1. / type of notebook computer that has an LCD screen on which the user can write using finger and swipe actions
  2. drive / a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
  3. media player / a handheld electronic device for playing digital media such as audio and video files
  4. device convergence / means the ability to view the same multimedia content from different types devices and thanks to the digitization of content
  5. / short-range wireless interconnection of devices.
  6. / a program or piece of software made to fulfill a purpose.
  7. storage / a model of computer data storage in which the digital data is stored in logical pools.
  8. / a machine for printing text or pictures onto paper, especially one linked to a computer.
  9. / the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket.
  10. / synchronization, in-sync = a state in which two or more people or things move or happen together at the same time and speed
  11. / the programs and other operating information used by a computer.
  12. device / a wearable device is a technology that is worn on the human body
  13. / a computer or computer program which manages access to a centralized resource or service in a network
  14. / the faculty by which the mind stores and remembers information
  15. / is basically a system of Internet servers that support specially formatted documents.

34 Clues: / an extra copy of data on a computer./ combining 2 or more functions in a unit./ short-range wireless interconnection of devices./ cause to occur or operate at the same time or rate/ an application, downloaded usually by a mobile user./ a group or system of interconnected people or things/ a program with graphic interface on a world wide web....

Computer Vocabulary 2017-06-21

Computer Vocabulary crossword puzzle
Across
  1. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  2. using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals
  3. a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
  4. a symbol or graphic representation on a screen of a program, option, or window, especially one of several for selection.
  5. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
  6. the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
  7. a panel of keys that operate a computer or typewriter
  8. the working surface of a desk
  9. almost or nearly as described, but not completely or according to strict definition
  10. a sudden failure that puts a system out of action
  11. an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the Internet
  12. a folding cover or holder typically made of stiff paper or cardboard, for storing loose papers
  13. a network security system designed to prevent unauthorized access to or from a private network
  14. the part of a computer in which data or program instructions can be stored for retrieval
  15. irrelevant or inappropriate messages sent on the Internet to a large number of recipients
Down
  1. an electronic document in which data is arranged in the rows and columns of a grid and can be manipulated and used in calculations
  2. a folder or box for holding loose papers that are typically arranged in a particular order for easy reference.
  3. an external flash drive, small enough to carry on a key ring, that can be used with any computer that has a USB port
  4. a portable computing device such as a smartphone or tablet computer
  5. a printed version on paper of data held in a computer.
  6. an act or instance of booting a computer system again
  7. a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server
  8. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  9. tools, machinery, and other durable equipment
  10. copy (data) from one computer system to another, typically over the Internet.
  11. a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web
  12. a computer or computer program that manages access to a centralized resource or service in a network
  13. a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a telephone line
  14. a small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions.
  15. is the abbreviation for central processing unit

30 Clues: the working surface of a desktools, machinery, and other durable equipmentis the abbreviation for central processing unita sudden failure that puts a system out of actionan act or instance of booting a computer system againa panel of keys that operate a computer or typewritera printed version on paper of data held in a computer....

Chapter 03 part 03 2018-04-05

Chapter 03 part 03 crossword puzzle
Across
  1. recent photos you captured are low in quality, what is one of the first things to check
  2. your organization has a large number of servers, what are you most likely to choose as a result
  3. you are looking for a general purpose port to connect two devices together, what is is called
  4. when an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low
  5. you need a version of USB technology that will support older USB devices, of which you have many, as well as new ones. what word do you want to see the specs
  6. you go to your local town utility in order to pay your gas bill, what kiosk are you going to use
  7. a type of computer usually has only one user what is most likely to be the type of computer
  8. you want to connect your mobile device to a speaker, what is the way to do so
  9. your server room has ample floor space, what are you likely to choose as a result
  10. you recceived a new portable media player for your birthday, it is less than ideal as a gift, however, because you were hoping to do something with it, and it is not something you can do with the player, what is that thing you were hoping to do
  11. at you local supermarket there is a kiosk that allows you to rent your favorite movie on DVD what is it called
  12. what kind of kiosk are you most likely to find on you next trip to an amusement park
Down
  1. a thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually undetectable to you, what is this technology called
  2. your data center is looking to conserve space in its server room, what are you most likely to choose as a result
  3. what is your library using because it costs less, is easier to maintain, and uses less power than desktop computers
  4. a friend of yours was talking on a mobile phone and her attention was diverted from something that was happening around her while she was on the phone, what phenomenon does this illustrate
  5. you keep hearing a colleague of yours use a term and you are unfamiliar with it, ultimately, however, you realize that is a synonym for the term port, what is it
  6. a type of computer usually has thousands of users, what is most likely to be the type of computer
  7. what do you need to verify that you are the holder of the bankcard at your local bank branch
  8. you see a kiosk in the lobby of your local hospital, what kind of kiosk is it
  9. you have a collection of all the photos, videos, and audio you have captured from your new nephew, what is the name for this collection
  10. you are storing a new worksheet online for members of you project team to be able to share access to it, what kind of computing is this

22 Clues: you see a kiosk in the lobby of your local hospital, what kind of kiosk is ityou want to connect your mobile device to a speaker, what is the way to do soyour server room has ample floor space, what are you likely to choose as a resultwhat kind of kiosk are you most likely to find on you next trip to an amusement park...

Chapter 03 part 03 2018-04-05

Chapter 03 part 03 crossword puzzle
Across
  1. you recceived a new portable media player for your birthday, it is less than ideal as a gift, however, because you were hoping to do something with it, and it is not something you can do with the player, what is that thing you were hoping to do
  2. you have a collection of all the photos, videos, and audio you have captured from your new nephew, what is the name for this collection
  3. you need a version of USB technology that will support older USB devices, of which you have many, as well as new ones. what word do you want to see the specs
  4. you are storing a new worksheet online for members of you project team to be able to share access to it, what kind of computing is this
  5. a thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually undetectable to you, what is this technology called
  6. your data center is looking to conserve space in its server room, what are you most likely to choose as a result
  7. when an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low
  8. at you local supermarket there is a kiosk that allows you to rent your favorite movie on DVD what is it called
  9. what kind of kiosk are you most likely to find on you next trip to an amusement park
  10. recent photos you captured are low in quality, what is one of the first things to check
Down
  1. you want to connect your mobile device to a speaker, what is the way to do so
  2. a friend of yours was talking on a mobile phone and her attention was diverted from something that was happening around her while she was on the phone, what phenomenon does this illustrate
  3. you go to your local town utility in order to pay your gas bill, what kiosk are you going to use
  4. a type of computer usually has only one user what is most likely to be the type of computer
  5. a type of computer usually has thousands of users, what is most likely to be the type of computer
  6. you keep hearing a colleague of yours use a term and you are unfamiliar with it, ultimately, however, you realize that is a synonym for the term port, what is it
  7. what do you need to verify that you are the holder of the bankcard at your local bank branch
  8. your organization has a large number of servers, what are you most likely to choose as a result
  9. your server room has ample floor space, what are you likely to choose as a result
  10. you are looking for a general purpose port to connect two devices together, what is is called
  11. what is your library using because it costs less, is easier to maintain, and uses less power than desktop computers
  12. you see a kiosk in the lobby of your local hospital, what kind of kiosk is it

22 Clues: you want to connect your mobile device to a speaker, what is the way to do soyou see a kiosk in the lobby of your local hospital, what kind of kiosk is ityour server room has ample floor space, what are you likely to choose as a resultwhat kind of kiosk are you most likely to find on you next trip to an amusement park...

Chapter 03 part 03 2018-04-05

Chapter 03 part 03 crossword puzzle
Across
  1. you see a kiosk in the lobby of your local hospital, what kind of kiosk is it
  2. your server room has ample floor space, what are you likely to choose as a result
  3. you are looking for a general purpose port to connect two devices together, what is is called
  4. recent photos you captured are low in quality, what is one of the first things to check
  5. when an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low
  6. you recceived a new portable media player for your birthday, it is less than ideal as a gift, however, because you were hoping to do something with it, and it is not something you can do with the player, what is that thing you were hoping to do
  7. you go to your local town utility in order to pay your gas bill, what kiosk are you going to use
  8. you want to connect your mobile device to a speaker, what is the way to do so
  9. you need a version of USB technology that will support older USB devices, of which you have many, as well as new ones. what word do you want to see the specs
  10. what kind of kiosk are you most likely to find on you next trip to an amusement park
  11. your data center is looking to conserve space in its server room, what are you most likely to choose as a result
Down
  1. you keep hearing a colleague of yours use a term and you are unfamiliar with it, ultimately, however, you realize that is a synonym for the term port, what is it
  2. a thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually undetectable to you, what is this technology called
  3. a type of computer usually has thousands of users, what is most likely to be the type of computer
  4. what is your library using because it costs less, is easier to maintain, and uses less power than desktop computers
  5. a friend of yours was talking on a mobile phone and her attention was diverted from something that was happening around her while she was on the phone, what phenomenon does this illustrate
  6. your organization has a large number of servers, what are you most likely to choose as a result
  7. you are storing a new worksheet online for members of you project team to be able to share access to it, what kind of computing is this
  8. at you local supermarket there is a kiosk that allows you to rent your favorite movie on DVD what is it called
  9. a type of computer usually has only one user what is most likely to be the type of computer
  10. you have a collection of all the photos, videos, and audio you have captured from your new nephew, what is the name for this collection
  11. what do you need to verify that you are the holder of the bankcard at your local bank branch

22 Clues: you see a kiosk in the lobby of your local hospital, what kind of kiosk is ityou want to connect your mobile device to a speaker, what is the way to do soyour server room has ample floor space, what are you likely to choose as a resultwhat kind of kiosk are you most likely to find on you next trip to an amusement park...

Civil Engineering 2023-09-16

Civil Engineering crossword puzzle
Across
  1. An opening for drainage in a wall, curb or parapet.
  2. Currently in the deputy director rotation
  3. The phenomenal growth, use, and accessibility of information.
  4. inter-regional roadway that is part of the state transportation system.
  5. The sharing of unannounced, relevant information between a PR professional and the media that cannot be published before an agreed upon time and date.
  6. Type of bridge that distributes its load across a series of small sections fitted together.
  7. Microscopic plants which contain chlorophyll and live floating or are suspended in water.
  8. The heavy, coarse mixture of grit and organic material carried by wastewater.
  9. Sections of roadway or rail are areas where the roadway has a lower elevation than the surrounding terrain.
  10. A 10″ or 12″ diameter hole drilled into the earth and embedded into bedrock 3 – 4 feet.
  11. A primarily organic solid product, produced by wastewater treatment processes, that
  12. This type of media is publicity gained through public relations efforts and is completely separate from paid media such as advertising.
  13. This type of computing allows businesses to access products and services over the internet
  14. connects the deck of a bridge to the ground, at the ends of a bridge span.
  15. Slope or slanted
  16. Leveling dirt
  17. The cost paid to a lender for borrowed money.
  18. A lawn sprinkler system.
  19. Secondary background footage that will be cut into any film footage’s primary story line.
  20. The movement or flow of waster through soil or rocks.
Down
  1. A mixture of sand and stone and a major component of concrete.
  2. a surface through which water cannot penetrate, like a roof, road, sidewalk, or paved parking lot
  3. Water underneath the earth's surface
  4. The addition of oxygen or removal of hydrogen.
  5. A structural member transversely supporting a load.
  6. Another term for biolsolids
  7. Wood that has been impregnated with chemical pesticides to reduce damage from wood rot or insects.
  8. be beneficially recycled.
  9. Adding air to water
  10. Bodies of water that are located at the lower end of a river and are subject to tidal
  11. A loan where the initial payments are based on a certain interest rate for a stated period .
  12. Licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
  13. Processes, tools, technologies, and software that help businesses manage their relationships with their customers.
  14. A liquid, gas, or other material that continuously flows under an applied shear stress or external force.
  15. A substance which takes up or accepts protons.
  16. Having a cloudy or muddy appearance.
  17. This type of communications addresses a high level of media scrutiny that has the potential of causing reputation issues for a brand.
  18. Prevents or minimizes damage to the environment through the development of project alternatives, mitigation measures, and mitigation monitoring.
  19. A brand of polyethylene plastic sheeting.
  20. An interface that is based in graphic design and audio indicators.
  21. of electrons from an element or compound.
  22. Blank engineering deals with the design and construction of public works projects.
  23. The ratio of money gained or lost on an investment relative to the amount of money invested.
  24. A formal offer by a contractor.
  25. This type of technology helps people with disabilities in order for them to work efficiently and productively.

45 Clues: Leveling dirtSlope or slantedAdding air to waterA lawn sprinkler system.be beneficially recycled.Another term for biolsolidsA formal offer by a contractor.Water underneath the earth's surfaceHaving a cloudy or muddy appearance.Currently in the deputy director rotationA brand of polyethylene plastic sheeting.of electrons from an element or compound....

Crossword 2023-03-24

Crossword crossword puzzle
Across
  1. Tool we use for more casual communication
  2. Each Region has at least 3 of these to provide redundancy
  3. Manages running your RDBMS
  4. Which layer does the Network Load Balancer work at? (Name of the layer)
  5. Our highly performant proprietary RDBMS
  6. Amazon’s generic private-label brand on Amazon.com (include the full name)
  7. Tool we use to see the organization structure
  8. Accelerated workforce development program enabling early-career talent
  9. Data Warehousing
  10. Audiobook company
  11. Build, test, manage APIs
  12. Company that makes our electric delivery van
  13. City of Amazon HQ
  14. Manage containers
  15. Run virtual machines
  16. Our learning management system for TechU
  17. Create cost estimates for your use case
  18. Backup of an EBS volume
  19. Manage users, roles, and permissions
  20. Livestreaming platform owned by Amazon
  21. 16 of these help guide our every day actions and decisions at Amazon
  22. Managed ETL
  23. EDU/SLG Director
  24. Build, train, and deploy ML models
  25. Onboarding plans
  26. Create and manage cryptographic keys
  27. Current largest competitor to AWS
  28. Amazon's virtual meeting platform
  29. Manage Kubernetes Clusters
  30. Query S3
  31. Type of EC2 instance that helps companies adhere to compliance requirements and save on licensing
  32. Serverless containers
  33. Leading cloud service provider
  34. Our in-person cloud computing learning conference (include the colon symbol)
  35. Amazon's version of OneDrive, Google Drive, or Dropbox
  36. What does the arrow on the Amazon logo look like?
  37. Collaborative whiteboarding tool
  38. Monitor service usage
  39. ML to analyze text
  40. Business Intelligence Dashboards
  41. Signed before work on an engagement can begin
  42. Popular caffeinated beverage made from beans
  43. The easiest of the 3 ways to interact with AWS. Used to quickly develop and test
Down
  1. Content Distribution Network
  2. Deploy AWS services using templates
  3. What is the APN? (It’s AWS-related)
  4. MongoDB-compatible DB
  5. We currently have 31 of these across the world
  6. We track our hours in this
  7. Cheapest type of EC2 instance but can be interrupted
  8. Serverless compute
  9. LP related to Door Desks
  10. Connect IoT Devices to the cloud
  11. What is ENI an acronym for?
  12. Block storage
  13. Most recently added Well-Architected Pillar
  14. Every programmer’s first resource when debugging
  15. Graph Database
  16. Object storage
  17. CEO of AWS
  18. Amazon’s cargo airline
  19. Current CEO of Amazon
  20. Number 1 LP
  21. Active EDU/SLG Guilds
  22. The Herndon building number
  23. Our Virtual Assistant
  24. Logically isolated network on the cloud
  25. What year was AWS founded?
  26. Managed DNS
  27. Tool we use for email and formal communication
  28. Supermarket chain bought by Amazon
  29. Archival object storage
  30. A building that houses computer systems and associated components
  31. Internal tool to create development AWS accounts
  32. Manages running Big Data processing frameworks
  33. Tool we use to log our hours
  34. Our parent company
  35. MariaElena reminds us to complete these every Friday
  36. One place to store all data for analytics
  37. 6th layer of the OSI model
  38. Dedicated network connection to AWS
  39. Managed NoSQL key-value DB
  40. Hugely popular subscription service that provides 2-day shipping through Amazon.com
  41. The face of Amazon
  42. Create CloudFormation templates using code
  43. Platform that Stephane Maarek teaches on
  44. Track account API calls
  45. Company that made Webex

88 Clues: Query S3CEO of AWSNumber 1 LPManaged DNSManaged ETLBlock storageGraph DatabaseObject storageData WarehousingEDU/SLG DirectorOnboarding plansAudiobook companyCity of Amazon HQManage containersServerless computeOur parent companyThe face of AmazonML to analyze textRun virtual machinesMongoDB-compatible DBCurrent CEO of AmazonActive EDU/SLG Guilds...

Students with Learning Disabilities 2021-05-08

Students with Learning Disabilities crossword puzzle
Across
  1. one of the causes of a learning disability linked to the effects of low socioeconomic status and poverty, San ineffective teaching practices.
  2. Fluency, a student with a reading disability might have difficulty with ______, causing the student to have issues reading in an automatic fashion with appropriate speed and smoothness.
  3. Problems, a student with a math disability might have difficulty with ______, causing the student to have frequent errors in understanding math concept, computing simple and complex math problems and sequencing the steps of complex problems.
  4. Standard, refers to certain criteria not clearly within the definition so it does not included the conditions that the definition covers; As a result of Visual, Hearing, or Motor Disabilities.
  5. Standard, refers to embedding certain criteria within a definition so it clearly states the conditions that the definition covers; Ex Perceptual Disabilities, Brain Injury, Dyslexia, and Development Aphasia.
  6. Comprehension, a student with a reading disability might have have difficulty with ______, causing the student to have issues accurately interpreting the meaning of reading passages and drawing appropriate conclusions.
  7. processing, refers to the capacity of a students with a learning disability to use the sound system of language to process oral and written information.
  8. Memory, students with a learning disability could have difficulty with this memory process needed to store information permanently for later recall.
  9. multi-tier approach to the early identification and support of students with learning and behavior needs.
  10. Memory, students with a learning disability could have difficulty with this memory process needed to recall information shorty after it is presented.
  11. can be interchangeably used with the term mathematics disability
  12. Challenges, Students with a learning disability must suffer form ______ ______, frequently as a by-product of their academic challenges.
  13. Analysis, a student with a reading disability might have difficulty with ______, causing the student to have issues demonstrating sound-simple awareness that leads to being able to break down words into their basic phonemic parts.
Down
  1. Mechanism, one of the causes of a learning disability linked to neurological problems and structural brain differences.
  2. Evaluation, the process to determine the presence of a learning disability: includes observation, screening, pre-referral, referral, procedures & standards, and determination.
  3. can be interchangeably used with the term reading disability.
  4. Learning Disability, a disorder that may manifest an imperfect ability to listen, think, speak, read, write, spell, or do mathematical calculations.
  5. Memory, students with a learning disability could have difficulty with this memory process needed to process information in order to remember it.
  6. believed to be the most effective approach to teaching students with learning disabilities that has recently developed: through the use of explicit instruction.
  7. one of the causes of a learning disability linked to specific genes; influenced by the study between twins.
  8. Identification, a student with a reading disability might have difficulty with ______, causing the student to have issues decoding words that do not follow phonemic guidelines.
  9. Self-Regulated Strategy Development; a research-based strategy used in a variety of academic areas; specifically to teach students with learning disabilities how to write.
  10. Retrieval, a student with a math disability might have difficulty with ______, causing the student to have issues memorizing math facts and retrieving facts that are needed.
  11. Disabilities, this continues to the most prevalent of all disabilities: Thirty-five percent of all students with disabilities served under IDEA have this ____ _____; for a total of 2,310,000 students.

24 Clues: can be interchangeably used with the term reading disability.can be interchangeably used with the term mathematics disabilitymulti-tier approach to the early identification and support of students with learning and behavior needs.one of the causes of a learning disability linked to specific genes; influenced by the study between twins....

made by Giancarlo 2024-01-03

made by Giancarlo crossword puzzle
Across
  1. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  2. cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  3. System is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  4. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  5. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  6. A request for specific data from a database.
  7. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  8. Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  9. Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  11. engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
Down
  1. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  2. The time it takes a signal to travel from one location to another on a network.
  3. computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. Vision Syndrome Technology-related health condition that affects eyesight. See also CVS
  5. Device Convergence The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  7. processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  8. The number of horizontal and vertical pixels in a display device
  9. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  10. Defragmenter Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  11. Group of files waiting in the buffer to be printed.
  12. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  13. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.

24 Clues: A request for specific data from a database.Group of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceThe time it takes a signal to travel from one location to another on a network.Vision Syndrome Technology-related health condition that affects eyesight. See also CVS...

Made By Morgan 2024-01-03

Made By Morgan crossword puzzle
Across
  1. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  2. cache Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  3. System is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  4. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  5. An electrical disturbance that can degrade communications (definition found in module 10 - Communicating Digital Content)
  6. A request for specific data from a database
  7. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  8. Scientist Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  9. Aggregation A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. Disc Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  11. engineer Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
Down
  1. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  2. The time it takes a signal to travel from one location to another on a network.
  3. computing Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. Vision Syndrome Technology-related health condition that affects eyesight. See also CVS
  5. Device Convergence The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  7. processing unit The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  8. The number of horizontal and vertical pixels in a display device
  9. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  10. Defragmenter Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  11. Group of files waiting in the buffer to be printed.
  12. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  13. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.

24 Clues: A request for specific data from a databaseGroup of files waiting in the buffer to be printed.The number of horizontal and vertical pixels in a display deviceThe time it takes a signal to travel from one location to another on a network.Vision Syndrome Technology-related health condition that affects eyesight. See also CVS...

CSP Vocab Crossword 2023-12-20

CSP Vocab Crossword crossword puzzle
Across
  1. similar data appears in the same position of each line of data.
  2. (short for binary digit) is the smallest unit of data in computing. Typically a 1 or 0.
  3. the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage.
  4. How information is stored, accessed, transformed and used by computers
  5. (abbreviated) American standard code for information interchange outlines a common set of conventions for converting between binary values and alphanumeric values
  6. A growth rate that increases rapidly, usually squaring the previous metric.
  7. information that has been translated into a form that is efficient for movement or processing.
  8. a synonym for bringing together, (latin meaning is “chain-together”)
  9. a system by which numbers, letters and other information are represented using only two symbols, or binary digits.
  10. A group of blocks that are combined to perform a specific task
  11. A character encoding form whose sequences are not all of the same length is known as a variable width encoding.
  12. If words, numbers, sentences—any two values—must be concatenated together, you can use this block.
  13. Morse code is a method of transmitting text information as a series of on-off tones, lights, or clicks that can be directly understood by a skilled listener or observer without special equipment.
  14. A subset of a string of alphanumeric fields or variables
  15. (also called an array) stores multiple pieces of information at once
  16. Associating each elemented by combinations of long and short signals of light or sound (variable width encoding)
Down
  1. Digital copies are only approximations of the natural object
  2. refers to the 26-letter alphabet of Latin characters and the numerals 0-9. Sometimes including some special characters such as punctuation marks and common symbols, such as the sign "@,".
  3. a sequence of characters (letters, numbers, symbols) used to represent test. Example: “Hello World”.
  4. A sequence of bits that can be used to represent sets or to manipulate binary data
  5. A binary encoding system that can represent much more of the world's text than ASCII can (represents 65,536 different characters)
  6. Non-digital signals or information represented by a continuously variable physical quantity such as spatial position or voltage
  7. any information (or effect) that a program produces: – sounds, lights, pictures, text, motion, etc.
  8. Irrelevant or meaningless data that has found its way into otherwise meaningful code
  9. a number assigned do to item
  10. a particular way of organizing and storing data in a computer so that it can be accessed and modified efficiently
  11. In which something can only be one thing or another (Yes or NO)
  12. A method for finding a target value within a list (whether presorted or not) by checking each value until a match is found or until all the elements have been searched
  13. A binary code invented by Emile Baudot in 1870 that uses crosses and dots in order to encode 2^5 or 32 characters (fixed width encoding)
  14. the process of simplifying complex systems by breaking them down into their essential components while ignoring unnecessary details.
  15. space The space of potential possibilities
  16. Separate or divided: Digital provide an example
  17. variables that can take on any real value within a specified range rather than being restricted to discrete values

33 Clues: a number assigned do to itemspace The space of potential possibilitiesSeparate or divided: Digital provide an exampleA subset of a string of alphanumeric fields or variablesDigital copies are only approximations of the natural objectA group of blocks that are combined to perform a specific task...

DOMAIN 3 CROSSWORD | CYBER 2024-03-15

DOMAIN 3 CROSSWORD | CYBER crossword puzzle
Across
  1. software that creates, runs and manages virtual machines (VMs)
  2. module(TPM) an embedded hardware chip on a motherboard that stores cryptographic keys used for encryption hardware
  3. environment an environment used to test and application and discover any bugs or errors
  4. automation the Internet connection in home appliances, such as refrigerators and coffee makers
  5. a wireless network used to provide guests with Internet access
  6. a protocol that translates public IP addresses to private IP addresses and private addresses back to public IP addresses
  7. the use of different security control types, such as technical controls (firewalls, IDSs and proxy servers); administrative controls (vulnerability assessments and penetration tests); and physical controls (security cameras and locked rooms)
  8. an OS that manages a network device; some Cisco devices use the Cisco IOS (Internetwork OS)
  9. is the hardware-based and software-based encryption of an entire disk
  10. the exposure of data by an error, such as an integer overflow or buffer overflow
  11. a combination of all the elements required to produce a product
  12. the use of implementing security controls from different vendors to increase security
  13. environment an environment that simulates the production environment and is used for late stage testing
  14. a group of SQL statements that execute as one SQL statement, like a mini-program
  15. isolation that ensures that a system isn't connected to any other system to reduce risk of being attacked
Down
  1. the analysis of code without executing it
  2. a structure of basic concepts that is used to provide guidance to professionals on how to implement security in various systems
  3. theorganization of tables and columns in a database to reduce redundant data and improve overall database performance
  4. (SDN)a network that is comprised of virtualization technologies instead of hardware routers and switches
  5. a framework that is based on relevant laws and regulations, such as HIPAA
  6. is the software-based encryption of an entire disk;
  7. the analysis of code as the code is running
  8. a framework that is not based on law, but by common standards and practices
  9. a metaphor for physical isolation, indicating that there is a gap of air between an isolated system and other systems
  10. an internal network, used to communicate and share content
  11. encryption/self-encrypting drive (FDE/SED)
  12. a group of honeypots that is within a separate network or zone, but accessible from an organization's primary network
  13. to provide a digital signature for code
  14. an OS that manages a server, such as Windows Server 2016 or the Server base environments in Linux
  15. training of users on common threats and emerging threats to help avoid these types of attacks
  16. a part of a network that can be accessed by authorized users from outside of the network, such as business partners, customers, vendors, etc.
  17. an integrated circuit that includes all the functionality of a computing system within the hardware
  18. to use an isolated area on a system (usually, a virtual machine), often for testing purpose
  19. network a bridge to a wired network; a network that provides employees access to network resources as if they were connected from a wired dest node at their desk

34 Clues: to provide a digital signature for codethe analysis of code without executing itencryption/self-encrypting drive (FDE/SED)the analysis of code as the code is runningis the software-based encryption of an entire disk;an internal network, used to communicate and share contentsoftware that creates, runs and manages virtual machines (VMs)...

Cyber Security Review 2021-09-08

Cyber Security Review crossword puzzle
Across
  1. Use IP Address to pass the data between networks
  2. Reduce collisions because split the
  3. is software/hardware based network security system that controls the in and out network traffic
  4. _____________ Control Protocol
  5. Downloads onto a computer disguised as a legitimate program
  6. software intentionally designed to harm a network, server, or computer
  7. Data arriving to a _____ port is repeated on all the other ports
  8. Misrepresenting oneself by using fake e- mail addresses or masquerading as someone else
  9. Intentionally disrupting, defacing or destroying a Web site
  10. Destroy data when certain conditions are met
  11. is an object, person, or other entity that represents a constant danger to an asset
  12. is a flexible filament of very clear glass capable of carrying information in the form of light
  13. This address is a 48 bits long binary number unique for every network card
  14. A type of software security
  15. These IPs do not change. Whether you
  16. translates the locally significant source address into a globally unique address
  17. Is a device that plugs into a motherboard and provides ports for the network cable connections
  18. Doesn’t needs user intervention to replicates
  19. These losses refer to the loss of trust and lowered opinion of people to a business as a result of them being affected by a threat
  20. Cable that consists of a cylindrical conductor that surrounds a single inner wire made of two conducting elements
  21. is a series of LANs linked together to form a network in an extended area
  22. Type of network that consists of a series of computers linked together to form a network in a circumscribed location
  23. person who intends to gain unauthorized access to a computer systems
  24. It forward the information based on MAC address list and ports
  25. your machine or reboot your router it remains the
Down
  1. Topology in which all nodes indirectly connect to each other through one or more switches
  2. A group of computers and associated devices that are connected by communications facilities
  3. These losses refer to damages of the operating capability of an organisation
  4. Its purpose is to regenerate signals distorted by transmission loss due to attenuation
  5. is a network that is spread over a very small area
  6. domains
  7. These losses refer to damages to the wealth of an organisation
  8. Activated when infected program is loaded in memory and executed by its own or a user action
  9. between computers on a network plural)
  10. In this topology data travels in one direction using a control signal called a ‘token’
  11. Fraudulent email leading to a fraudulent website
  12. Network topology where all the nodes are joined to one cable
  13. The practice and study of techniques for secure communication
  14. A type of physical security
  15. cable type that is commonly used on Ethernet networks
  16. is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  17. to a computing device or node when it’s connected to a network
  18. is a temporary IP address that is
  19. Is a set of rules that governs the
  20. occurs when someone steals your personal information to commit crimes in your name
  21. the process of converting plaintext to ciphertext

46 Clues: domainsA type of physical securityA type of software security_____________ Control Protocolis a temporary IP address that isIs a set of rules that governs theReduce collisions because split theThese IPs do not change. Whether youbetween computers on a network plural)Destroy data when certain conditions are met...

DCM Foundation Vocabulary 2022-12-07

DCM Foundation Vocabulary crossword puzzle
Across
  1. the cumulative permissions a user has based on individual /group permissions or explicit/implicit permissions
  2. Rules for how long data needs to be kept on backup and archive systems.
  3. software designed to infiltrate or damage a computer system
  4. A software that allows one physical computer to run several "digital only" computer spaces
  5. A Windows feature that requires administrator permission for a user to change system settings
  6. starts Windows in a basic state using limited files and drivers.
  7. A type of malware that can replicate without human interaction and does not need to attach itself to a program.
  8. User account with complete access to the system without restriction.
  9. Internal or external hardware used to store data and files
  10. a program that appears desirable but actually contains something harmful
  11. Hardware and software that help visually or physically impaired people use the computer
  12. A policy that allows employees to connect personally owned devices
  13. wipe Erases data on a mobile device using a different device
  14. Define WHO can access certain resources and WHAT they can do
  15. A software that allows hardware to communicate with the computer operating system
  16. to remove an app/program from a device
  17. Rules that users must follow to access a network.
  18. An attack through email trying to trick the user into giving private information
  19. Malicious code attached to a program or file that corrupts a computer or destroys data.
  20. matches the file on two or more devices with each other
  21. Holes for peripheral cables.
  22. return a system to working condition without reinstalling the operating system
  23. A Windows program that provides detailed device settings
  24. verifies the identity of someone who connects to a network
  25. "Points to" a storage space on a network
  26. Tool to monitor and limit user activities.
  27. A text file of startup activity that lists all the drivers that load
  28. a software or computer that blocks outside access to a network
  29. A web service that uses one account to synchronize devices
Down
  1. Remotely controls smart phones and tablets
  2. A type of malware that locates and saves data from users without them knowing about it.
  3. Explicit permissions applied directly to a file are applied before inherited permissions from a parent folder/group
  4. Hackers use their social skills to trick people into revealing access credentials or personal information
  5. The official source for Windows apps and outside media
  6. a type of malware that blocks access to a computer system until a sum of money is paid.
  7. A function/behavior that makes a software special
  8. The ability of one device to work with another
  9. A document outlining an agreement between two parties
  10. Internet based computing
  11. the identification of a user based on a physical characteristic
  12. To prevent malware from being delivered or spread
  13. A "phonebook" of users and devices on a network
  14. Characteristics of a file
  15. any external device that provides input or output for the computer
  16. Identifies resources a user can access on a computer
  17. copying files to a another location in case of equipment failure
  18. An app installed on devices managed by an organization
  19. Allowing multiple people to access a folder or file
  20. Applies security settings to users and computers what they can do and access.
  21. a software that delivers advertising that is unexpected and unwanted by the user

50 Clues: Internet based computingCharacteristics of a fileHoles for peripheral cables.to remove an app/program from a device"Points to" a storage space on a networkRemotely controls smart phones and tabletsTool to monitor and limit user activities.The ability of one device to work with anotherA "phonebook" of users and devices on a network...

CS. 30 Crossword 2022-06-07

CS. 30 Crossword crossword puzzle
Across
  1. In 1998, WinAmp was offered for free on the Internet and allowed individuals to play ___ music files on their computers. Initially sharing music on the Internet was not a problem because in the late 90’s most people had slow home Internet connections.
  2. With the prevalence of _________ _________, non-human generated comments, posts and re-posts, much of the social media content that reaches our streams is propaganda.
  3. Wadih El Hage, one of the suspects in the 1998 bombing of two U.S. embassies in East Africa, sent _________ e-mails under various names, including "Norman" and "Abdus Sabbur," to "associates in al Qaida," according to the Oct. 25, 1998, U.S. indictment against him.
  4. The point in time where advances will happen so quickly that only artificial intelligence will be able to grasp the changes. He suggests that one way to handle this transition is by merging with the technology.
  5. School, friends and ______ make up a person's usual support system
  6. is rampant in software and can lead to, at its mildest, tech that performs poorly for some groups. At its worst, it can lead the justice system to make incorrect judgements based on stereotypes and profiling.
  7. a software platform for the browser that enables the display multimedia such as animations and other graphical content that is being phased out of active development.
  8. Artificial intelligence (AI) is the ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans because they require human intelligence and discernment.
  9. Facebook's new name
  10. A term used to describe an ndividual on the internet whos can not be traced
  11. Today many people use Internet security and encryption for their email, online banking and making phone calls with _____ ____ __.
Down
  1. suggests that the media confirms audience beliefs and attitudes rather than creating new ones and that this cycle is even more pronounced since the advent of Social Media.
  2. Can be argued as a way to take away ones freedom of speech
  3. The internet ranks among the greatest innovations in history. Yet in spite of continuing progress, ____ _______ people around the world still remain offline, and some of them live in Canada
  4. A __________ ____ is a habitual chain of activities that will be repeated by the user to cause them to continue the activity. Typically, this loop is designed to create a neurochemical reward in the user such as the release of dopamine.
  5. refers to differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
  6. used to decide, for instance, who gets a job interview, who gets granted parole, and who gets a loan
  7. In 2013, ______ _______ stole thousands of NSA documents and smuggled them out of the US. He then began to leak these documents to selected members of the media. These documents revealed what was then a secret program to read the content of American’s and non-American's emails.
  8. is the process of breaking into a computer system, whether they do any harm to the computer system or not.
  9. Tracking cookies are a specialized type of cookie that can be shared by more than one website or service. They are commonly used for legitimate marketing and advertising purposes, but because they contain a history of the user's actions on multiple sites, they may be exploited or misused to track the user's behavior

20 Clues: Facebook's new nameCan be argued as a way to take away ones freedom of speechSchool, friends and ______ make up a person's usual support systemA term used to describe an ndividual on the internet whos can not be tracedused to decide, for instance, who gets a job interview, who gets granted parole, and who gets a loan...

Theory Revision 2025-09-02

Theory Revision crossword puzzle
Across
  1. Is a technology that automatically provides users with updated content from many different sites (abbreviation)
  2. Device that connects computers in a network with cables, to enable communication between them (but not used for internet access)
  3. Allows you to control which programs can access the internet; protects your computer or network from unauthorised access
  4. An upgrade on WiFi and a more secure wireless networking technology that allows wireless devices to communicate with one another
  5. Includes the spreading of rumours, gossip and the general bullying of another person using digital communication methods (2 words)
  6. A place where a WiFi network has been created so that people can connect to the network
  7. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  8. Getting the latest 'bug fixes' or obtaining new features
  9. Where computer resources are used without permission, or for tasks not authorised by the owner of the computer (2 words)
  10. Connecting to your bank via the internet to perform online transactions (2 words)
  11. A wireless networking technology using radio waves to provide internet access
  12. A type of cabling that transmits data as pulses of light through thin strands of glass or plastic
  13. Generally, the minimum hardware requirements needed to run the software (2 words)
  14. Online publishing tools
  15. Any type of business transaction that involves communication across the internet
  16. Any online environment that allows people to 'chat' in real time (2 words)
  17. 'Free' software that is ad-sponsored and pops up adverts while the program is running
  18. Error in the program caused by the way it was written (2 words)
  19. Allows two or more people to hold online conferences at different locations (2 words)
Down
  1. where likes, dislikes, interests, photographs, etc. can be posted for friends to see and read (3 words)
  2. The use of deception to manipulate or 'con' someone into giving out confidential information (such as a password or account number) or into giving access to their computer or premises (2 words)
  3. Usually relate to the type of operating system, e.g. Linux or macOS versus Windows, and the version needed (2 words)
  4. Refers to centralising and automating or 'computerising' all tasks and systems in the office (2 words)
  5. Connects computer to a cabled network, allows computer to communicate with the network
  6. Network which connects computers in a small area such as a school
  7. Any technique or software that tries to monitor and track the way you use your computer, and then report this information to a third party
  8. Software that runs on internet servers - interface viewed in web browser (2 words)
  9. Is usually carried out by an individual who is obsessed with someone (2 words)
  10. outlines rights and responsibilities of network users (abbreviation)
  11. Web-based word processor, presentation and spreadsheet applications (2 words)
  12. Computing devices that use network resources
  13. Organisation's private network (abbreviation)
  14. The protocol (rule for communication) used for the fast, easy transfer of files between remote computers that have an internet connection (abbreviation)
  15. Cable that is easy and cheap to install (abbreviation)
  16. A type of malware that encrypts your files or locks your device, making them inaccessible until a ransom is paid to the attacker (2 words)
  17. Powerful computers that provide resources
  18. A technology that allows telephone calls to be made over LANs, WANs and the internet (abbreviation)

37 Clues: Online publishing toolsPowerful computers that provide resourcesComputing devices that use network resourcesOrganisation's private network (abbreviation)Cable that is easy and cheap to install (abbreviation)Getting the latest 'bug fixes' or obtaining new featuresError in the program caused by the way it was written (2 words)...

Try 2023-03-29

Try crossword puzzle
Across
  1. Cloud Computing
  2. Cloud Computing
Down
  1. Cloud Computing
  2. Cloud Computing

4 Clues: Cloud ComputingCloud ComputingCloud ComputingCloud Computing

Try 2023-03-29

Try crossword puzzle
Across
  1. Cloud Computing
  2. Cloud Computing
Down
  1. Cloud Computing
  2. Cloud Computing

4 Clues: Cloud ComputingCloud ComputingCloud ComputingCloud Computing

Describe core solutions and management tools on Azure 2021-10-19

Describe core solutions and management tools on Azure crossword puzzle
Across
  1. is serverless computing
Down
  1. are azure logic apps

2 Clues: are azure logic appsis serverless computing

stuff to know 2017-04-27

stuff to know crossword puzzle
Across
  1. in computer programming, a word or identifier that has a particular meaning to the programming language; also a term that captures the essence of the topic of a document used by a search engine to retrieve online documents related to that term or terms.
  2. phone handheld device built on a mobile computing platform that features, typically, a digital camera, video camera, Global Positioning System (GPS), e-mail, and all the features of a standard cell phone; usually equipped with a high definition, touch pad screen and miniature keyboard, smartphone allows downloading of apps for a wide range of uses.
  3. Hotpot a wireless access point to the Internet or other computer network over a wireless local area network through the use of a router connected to a link to an Internet service provider; frequently found in coffee shops and other public establishments, a hotpot usually offers Internet access within a range of about 65 feet (20 meters) indoors and a greater range outdoors; many smartphones provide built in ability to establish a WiFi hotpot.
Down
  1. a collection of specially formatted, related Web files (or pages) on a particular subject or organization that are stored on a computer known as a web server and accessible through a network such as the Internet; include a beginning file called a home page; a web page can contain any type of content, including text, color, graphics, animation, and sound.
  2. web application, accessed over the Internet, for a mobile device (e.g., smartphone, tablet) that works much like user installed software on a computer allowing the device to perform specific tasks.

5 Clues: web application, accessed over the Internet, for a mobile device (e.g., smartphone, tablet) that works much like user installed software on a computer allowing the device to perform specific tasks....

School Subjects 2022-02-03

School Subjects crossword puzzle
Across
  1. History, Geography, English, french,Music, Art, Computing
Down

    1 Clue: History, Geography, English, french,Music, Art, Computing

    python crossword 2016-12-02

    python crossword crossword puzzle
    Across
    1. LOOP In most computer programming languages, a while loop is a control flow statement that allows code to be executed repeatedly based on a given Boolean condition. The while loop can be thought of as a repeating if statement.
    2. In computer programming, a string is traditionally a sequence of characters, either as a literal constant or as some kind of variable. The latter may allow its elements to be mutated and the length changed, or it may be fixed (after creation).
    3. quality of hospital food is highly variable"
    4. denoting a system of algebraic notation used to represent logical propositions by means of the binary digits 0 (false) and 1 (true), especially in computing and electronics.
    5. An integer is a whole number (not a fraction) that can be positive, negative, or zero. Therefore, the numbers 10, 0, -25, and 5,148 are all integers. Unlike floating point numbers, integers cannot have decimal places. Integers are a commonly used data type in computer programming.
    6. TYPE a particular kind of data item, as defined by the values it can take, the programming language used, or the operations that can be performed on it.
    7. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
    8. ERROR In computer science, a syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language. For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected.
    Down
    1. int (signed integers): They are often called just integers or ints, are positive or negative whole numbers with no decimal point. ... float (floating point real values) : Also called floats, they represent real numbers and are written with a decimal point dividing the integer and fractional parts.
    2. a particular kind of data item, as defined by the values it can take, the programming language used, or the operations that can be performed on it.
    3. Programmers write computer programs in a language we call code. However, because no one is perfect, computer programmers sometimes make mistakes when writing their code. These mistakes are known as 'bugs'. ... An important part of programming is testing your program and 'debugging' (which means removing the bugs). 2.
    4. basic algorithm for division"
    5. VARIABLE In computer programming, a global variable is a variable with global scope, meaning that it is visible (hence accessible) throughout the program, unless shadowed. The set of all global variables is known as the global environment or global state.
    6. not consistent or having a fixed pattern; liable to change.
    7. LOOP A "For" Loop is used to repeat a specific block of code a known number of times. For example, if we want to check the grade of every student in the class, we loop from 1 to that number. When the number of times is not known before hand, we use a "While" loop.

    15 Clues: basic algorithm for division"quality of hospital food is highly variable"not consistent or having a fixed pattern; liable to change.a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer....

    Household items 2023-12-07

    Household items crossword puzzle
    Across
    1. A timekeeping device with hands or digital displays that show the current time. Clocks are important for keeping schedules, managing daily activities, and ensuring punctuality in various areas of the home.
    2. A piece of furniture with shelves for storing and organizing books. Bookshelves can be found in bedrooms, living rooms, or home offices, providing a dedicated space for displaying and accessing a collection of books.
    3. A piece of furniture with drawers for storing clothes and personal items. Dressers are commonly found in bedrooms and provide a functional and organized solution for keeping clothing and accessories tidy.
    4. A device that produces light, often consisting of a bulb and a shade or cover. Lamps are used for illumination in various rooms, providing both functional lighting for tasks and creating a warm and inviting atmosphere.
    5. Curtain A waterproof curtain that hangs in a bathroom shower or bathtub to prevent water from splashing onto the floor. Shower curtains come in various designs, adding a decorative touch to the bathroom while serving a practical purpose.
    6. Oven A kitchen appliance that uses microwaves to heat and cook food quickly. Microwave ovens are convenient for reheating leftovers, cooking snacks, and preparing meals in a short amount of time.
    7. Can A container for collecting and disposing of waste and garbage. Trash cans come in various sizes and designs, and they are placed in kitchens, bathrooms, and other areas to maintain cleanliness and hygiene.
    8. An appliance that automates the cleaning of dishes, utensils, and cookware. Dishwashers save time and effort in the kitchen, using water and detergent to efficiently clean and sanitize items after meals.
    Down
    1. Cleaner An electrical device used for cleaning floors and carpets by suctioning dirt and debris. Vacuum cleaners come in various types, including upright, canister, and robotic models, making household cleaning more efficient.
    2. Desk A desk specifically designed for using a computer or laptop. Computer desks often feature space for a monitor, keyboard, mouse, and other accessories, providing an organized and ergonomic workspace for computing tasks.
    3. An appliance used for storing and cooling food and beverages. Refrigerators have compartments with adjustable temperatures to keep items fresh, and they play a crucial role in kitchen organization and meal preparation.
    4. A piece of furniture designed for sleeping or resting. Beds come in different sizes, such as twin, full, queen, and king, and may include a mattress, bed frame, and headboard, providing a comfortable sleeping space.
    5. A comfortable piece of furniture designed for seating multiple people. Sofas are commonly found in living rooms and provide a cozy space for relaxation, socializing, and watching television or reading.
    6. Machine An appliance designed for washing clothes and linens. Washing machines use water and detergent to clean clothes through a series of cycles, providing a convenient and effective way to maintain personal hygiene.
    7. A reflective surface, typically made of glass, that allows individuals to see their reflections. Mirrors are used for personal grooming, decorating spaces, and creating a sense of openness and brightness in rooms.

    15 Clues: Oven A kitchen appliance that uses microwaves to heat and cook food quickly. Microwave ovens are convenient for reheating leftovers, cooking snacks, and preparing meals in a short amount of time....

    Computering 2016-11-30

    Computering crossword puzzle
    Across
    1. Loop- In most computer programming languages, a while loop is a control flow statement that allows code to be executed repeatedly based on a given Boolean condition. The while loop can be thought of as a repeating if statement.
    2. In computer science a string is any finite sequence of characters (i.e., letters, numerals, symbols and punctuation marks). An important characteristic of each string is its length, which is the number of characters in it. The length can be any natural number (i.e., zero or any positive integer).
    3. USB Debugging Mode is a mode that can be enabled in Android after connecting the device directly to a computer with a USB cable. The primary function of this mode is to facilitate a connection between an Android device and a computer with Android SDK (software development kit).
    4. A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
    5. In computer science, the Boolean data type is a data type, having two values (usually true and false), intended to represent the truth values of logic and Boolean algebra. It is named after George Boole, who first defined an algebraic system of logic in the mid-19th century.
    6. Not consistent or having a fixed pattern liable to change.
    Down
    1. In computing, floating point is the formulaic representation that approximates a real number so as to support a trade-off between range and precision. A number is, in general, represented approximately to a fixed number of significant digits (the significand) and scaled using an exponent in some fixed base; the base for the scaling is normally two, ten, or sixteen.
    2. Link things together in a chain or series.
    3. An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero. Examples of integers are: -5, 1, 5, 8, 97, and 3,043. Examples of numbers that are not integers are: -1.43, 1 3/4, 3.14, .09, and 5,643.1.
    4. Error- In computer science, a syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language. For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected.
    5. Loop- In computer science a for-loop (or simply for loop) is a control flow statement for specifying iteration, which allows code to be executed repeatedly.
    6. Variable- In computer programming, a global variable is a variable with global scope, meaning that it is visible (hence accessible) throughout the program, unless shadowed. The set of all global variables is known as the global environment or global state.
    7. Type- A particular kind of data item, as defined by the values it can take, the programming language used, or the operations that can be performed on it.

    13 Clues: Link things together in a chain or series.Not consistent or having a fixed pattern liable to change.A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer....

    Computering 2016-11-30

    Computering crossword puzzle
    Across
    1. Loop- In most computer programming languages, a while loop is a control flow statement that allows code to be executed repeatedly based on a given Boolean condition. The while loop can be thought of as a repeating if statement.
    2. In computer science a string is any finite sequence of characters (i.e., letters, numerals, symbols and punctuation marks). An important characteristic of each string is its length, which is the number of characters in it. The length can be any natural number (i.e., zero or any positive integer).
    3. USB Debugging Mode is a mode that can be enabled in Android after connecting the device directly to a computer with a USB cable. The primary function of this mode is to facilitate a connection between an Android device and a computer with Android SDK (software development kit).
    4. A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
    5. In computer science, the Boolean data type is a data type, having two values (usually true and false), intended to represent the truth values of logic and Boolean algebra. It is named after George Boole, who first defined an algebraic system of logic in the mid-19th century.
    6. Not consistent or having a fixed pattern liable to change.
    Down
    1. In computing, floating point is the formulaic representation that approximates a real number so as to support a trade-off between range and precision. A number is, in general, represented approximately to a fixed number of significant digits (the significand) and scaled using an exponent in some fixed base; the base for the scaling is normally two, ten, or sixteen.
    2. Link things together in a chain or series.
    3. An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number) that can be positive, negative, or zero. Examples of integers are: -5, 1, 5, 8, 97, and 3,043. Examples of numbers that are not integers are: -1.43, 1 3/4, 3.14, .09, and 5,643.1.
    4. Error- In computer science, a syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language. For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected.
    5. Loop- In computer science a for-loop (or simply for loop) is a control flow statement for specifying iteration, which allows code to be executed repeatedly.
    6. Variable- In computer programming, a global variable is a variable with global scope, meaning that it is visible (hence accessible) throughout the program, unless shadowed. The set of all global variables is known as the global environment or global state.
    7. Type- A particular kind of data item, as defined by the values it can take, the programming language used, or the operations that can be performed on it.

    13 Clues: Link things together in a chain or series.Not consistent or having a fixed pattern liable to change.A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer....

    infotech 2017-06-22

    infotech crossword puzzle
    Across
    1. data information processed by a computer.
    2. Tags are used to determine what and how something is displayed on a Web Page. Tags are the foundation of HTML code and are used for design and content structuring.
    3. firewall is a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
    4. cache When you download (read) a web page, the data is "cached," meaning it is temporarily stored on your computer.
    5. Pixel The short form for ‘Picture Element’, a Pixel is what makes up displays and images on a computer screen.
    6. browser software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
    7. online If a computer (or computer user) is online, it is currently connected to a network or to the Internet. Online also refers to resources and services available on the Internet - e.g. online banking, online dictionary.
    8. Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
    9. Downloading is the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
    10. Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment
    11. boot (or re-boot) is to load and initialise the operating system on a computer. Think of it as starting up your computer. In Windows you can use the key combination CTRL and ALT and DEL as a "soft" boot. This means restarting the computer rather than turning it completely off and on again, which could cause damage to your computer's hard disk under some circumstances.
    12. Analogue is a conventional method of transmitting data. Standard landline telephones use analogue technology. It is distinct from digital technology, which provides for greater quality and speed of data transmission.
    13. bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as "favourites."
    14. Compression is the reduction of the size of a file. Compressed files take up less memory and can be downloaded or sent over the Internet more quickly.
    15. freeze a system error which causes the cursor to lock in place.
    16. bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
    17. Spam refers to unsolicited email messages sent for marketing purposes.
    18. partition a subdivision of a hard drives surface that is defined and used as a separate drive.
    19. gateway point within a network that interconnects with other networks.
    20. zip files is to archive and compress them into one file of smaller size using a program such as WinZip. It's a handy way to make files smaller before sending them via email.
    21. processor is the brains of your computer. It is responsible for performing calculations and tasks that make programs work. The faster the processor, the faster the computer works.
    22. a programming error that causes a program to behave in an unexpected way.
    23. attachment is a document sent with an email message. Many types of files can be sent this way (e.g. Word documents, PDFs, Excel files, JPEGs). Be wary of attaching large files because these can take a lot of time for the recipient to download. If you have a large file, it is considered good practice to compress the file using software such as Winzip before attaching it.
    24. modem is a device that allows computers to transmit information to each other via ordinary telephone lines.
    25. drag to move the mouse while its button is being depressed.
    Down
    1. Email or electronic mail is a way of sending messages over the internet. Popular email programs include Outlook, Mozilla Thunderbird, Gmail and Yahoo Mail.
    2. viral If an online video, photo or article "goes viral", it experiences a sudden spike in popularity in a short period of time.
    3. Java is a programming language that is commonly used in the development of client-server web applications.
    4. Malware" is short for malicious software. It refers to a software program that has been developed to do harm to other computers. Types of malware include viruses, worms and spyware.
    5. URL is short for ‘Uniform Resource Locator’ and is the web address of a specific Website or file location.
    6. server is a computer that handles requests for data, email, file transfers, and other network services from other computers.
    7. JPEG stands for Joint Photographic Experts Group, which was the committee that created the file format known as JPEG. The format is commonlyl used for photos displayed on the world wide web.
    8. Ethernet is the most common way of connecting computers on a network with a wired connection. It is a type of local area network (LAN) technology, providing a simple interface for connecting multiple devices
    9. internet set of interconnected networks that allow computers in different locations to exchange information. The Internet includes services such as the world wide web, electronic mail, file transfer protocol (FTP), chat and remote access to networks and computers.
    10. protocol is a standard or set of rules that computers and other devices use when communicating with one another.
    11. hyperlink Is a link embedded within a photo, word, or document that allows you to navigate around a webpage and/or to an external page or file.
    12. Content refers to a website's text and information, as opposed to its design and structure.
    13. Broadband is a type of communications technology whereby a single wire can carry more than one type of signal at once; for example, audio and video. Cable TV is one technology that uses broadband data transmission.
    14. Encryption is the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
    15. domain is a set of computers on a network that are managed as a unit.
    16. megabyte measure of computer processor storage and real and virtual memory. A megabyte (Mb) is 2 to the 20th power bytes, or 1,048,576 bytes in decimal notation.
    17. virus is a piece of programming code inserted into other programming to cause damage.
    18. Software Software is essentially a computer program. Photoshop and Word are examples of Software and were created by computer programmers using lines of code.
    19. Cybercrime is any type of illegal activity that is undertaken (or relies heavily) on a computer. There are thousands of types of cybercrime, including network intrusions, identity theft and the spreading of computer viruses.
    20. Megahertz is the unit used to measure the speed of a computer's processor (e.g. 2.8Ghz)
    21. Phishing is a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider.
    22. unzip a zip file is to extract and decompress compressed files from it. If you are sent a zip file via email, you will need to unzip it before you can access the files inside it.
    23. backup a copy of a file or disk you make for archiving purposes.
    24. cookie A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences.
    25. cloud Often represented by the shape of a Cloud, Cloud Computing is the delivery of applications and services over the internet

    50 Clues: data information processed by a computer.drag to move the mouse while its button is being depressed.freeze a system error which causes the cursor to lock in place.backup a copy of a file or disk you make for archiving purposes.domain is a set of computers on a network that are managed as a unit....

    AP Computer Principles 2018-08-02

    AP Computer Principles crossword puzzle
    Across
    1. signal that is used to represent data as a sequence of discrete values
    2. Most common format for text files in computers and on the Internet
    3. relating to our using signal is represented by a continuously variable physical quantity
    4. authority: a trusted entity that manages and issues security certificates and public keys used for secure communication in a public network
    5. list of items that are granted access to a certain system or protocol
    6. to store data and perform calculations using only zeros and ones
    7. the use of dedicated websites and applications to interact with other users
    8. the place an active program is running but is not visible to the user
    9. Digital rights management is a systematic approach to copyright protection for digital media
    10. describes how, when and by whom a particular set of data was collected and how data is formed
    11. a unit of information equal to 1 million bytes
    12. Term used to describe unsightly debris that occurs due to digital living
    13. state of being protected against criminal or unauthorized use of electronic data
    14. the address of the world wide web page
    15. the observation that the number of transistors in a dense, integrated circuit doubles approximately every two years
    16. forwarding by a router of a packet from any node to every other node attached to the router
    17. A small amount of data sent over a network which includes a source and destination
    18. event data recorder’s capture information for analysis or better understanding of an event
    19. hypertext markup language is standard text based computer language for creating electronic documents for the web or offline uses
    20. smallest unit of data in a computer
    21. a list of email addresses or domains of known spammers which are considered dangerous
    22. Dynamic random-access memory is a type of random access semiconductor memory that stores each bit of data in a separate tiny capacitator within an integrated circuit
    23. Trusted platform module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication
    24. quantities, characters or symbols on which operations are performed by a computer
    25. a group or system of interconnected people or things
    26. term referring to creations of the intellect for which a monopoly is assigned to designated owners by law
    27. a device that allows a computer to read data and/or write data to a disk
    28. request for information from a database
    29. Discreet online resource that is collaboratively developed and managed by a community
    30. the process of converting information or data into a code, especially to prevent unauthorized access
    31. describes the method of converting data for storage or transmission
    32. to copy data from one computer system to another, typically over the Internet
    33. the process of examining large databases in order to generate new information
    34. the art of writing or solving codes
    35. enterprise data storage entity in which data has been specifically partitioned for an analytical or reporting purpose
    36. the online world of computer networks and especially the Internet
    37. something that is created dynamically according to the needs of the data user
    38. an instance of a program running in a computer which is started when the program is initiated
    39. primary location from where data, such as a database, data set or spreadsheet
    Down
    1. Collection of documents about a person, event or subject
    2. expressed as a series of zero and one, typically represented by values of a physical quantity
    3. Algorithm for performing encryption or decryption - a series of steps that can be followed as a procedure - which converts plain text into a coded set of data
    4. the practice of using a network of remote servers hosted on the Internet to store, manage and process data
    5. Central location in which data is stored and managed
    6. a minute area of illumination on a display screen, one of many from which an image is come
    7. system that transfers data between network access points known as nodes through data switching, system control and interconnection transmission lines
    8. a rectangular pattern of parallel scanning lines followed by the electron beams on a TV screen or computer monitor
    9. any letter, number, punctuation mark or symbol that can be typed
    10. well-defined procedure that allows computers to solve a problem
    11. any process in which information is gathered and expressed in a summary form
    12. use of interactive, sensory representations of abstract data to reinforce cognition, hypothesis building and reasons
    13. An automated program that runs over the Internet - a computer program that executes a specific task according to the users instructions
    14. a large group of network computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data
    15. radio frequency identification is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum
    16. Collection of hardware and software needed to have a working system
    17. a unit of graphic solution equivalent to 1 million pixels
    18. an identifier for devices on the TCP/IP network
    19. A class of data compression algorithms that allows original data to be perfectly reconstructed from compressed data
    20. encryption standard developed by IBM - data encryption standard is a block cipher thus applying cryptographic key and algorithms to a block of data rather than one bit at a time
    21. reduces a file by permanently eliminating certain information
    22. a unit of information equal to 1 billion bytes
    23. process of taking encoded text or other data and converting it back to a text that you or the computer can read and understand
    24. into relationship among data elements that determine how data is recorded, manipulated, stored and presented in a database
    25. A type of computing architecture where all or most of the processing is performed on a central server
    26. computer program that analyzes data in order to translate it to a form acceptable to the computer
    27. any computing hardware that is used for storing, porting and extracting data files
    28. the process of representing a real world object or phenomenon as a set of mathematical equations
    29. software used to organize and analyze data
    30. process of generating an image from a model using computer programs
    31. Part of a computer system that is designed to block unauthorized access while permitting outward communication
    32. practice of sending unwanted email messages, frequently with commercial content
    33. contains the applications the user is working on - a priority assigned to programs running in a multitasking environment
    34. To store data locally in order to speed up subsequent retrievals
    35. recognition of printed or written text characters by a computer - optical character recognition
    36. Advanced encryption standard is a symmetric block cipher to protect classified information and is implemented in software and hardware to encrypt sensitive data

    75 Clues: smallest unit of data in a computerthe art of writing or solving codesthe address of the world wide web pagerequest for information from a databasesoftware used to organize and analyze dataa unit of information equal to 1 million bytesa unit of information equal to 1 billion bytesan identifier for devices on the TCP/IP network...

    Media Vocabulary 2024-05-02

    Media Vocabulary crossword puzzle
    Across
    1. The gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access. This can include the imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen.
    2. The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security. In media, this can involve the government or other controlling bodies limiting access to information.
    3. An environment where a person only encounters information or opinions that reflect and reinforce their own. In media, this often pertains to how platforms or channels may only show content that aligns with a user’s pre-existing beliefs.
    4. The presentation of an issue by the media, which influences how audiences perceive it. Different ways of presenting a news story can frame it differently, leading to different interpretations by the audience.
    5. The use of different media to convey information or entertainment. This includes a combination of text, audio, images, animations, video, and interactive content.
    6. The ability of the news media to influence the importance placed on the topics of the public agenda. If a news item is covered frequently and prominently, the audience will regard the issue as more important.
    7. Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view. It often has the connotation of being harmful.
    8. The ability to access, analyze, evaluate, and create media in a variety of forms. It involves understanding the role of media in society as well as essential skills of inquiry and self-expression.
    Down
    1. Any form of content such as video, blogs, discussion forum posts, digital images, audio files, and other forms of media that was created by consumers or end-users of an online system or service and is publicly available.
    2. The process through which information is filtered for dissemination, whether for publication, broadcasting, the Internet, or some other mode of communication. The gatekeeper decides which information will go forward, and which will not.
    3. Communication channels through which news, entertainment, education, data, or promotional messages are disseminated. Includes every broadcasting and narrowcasting medium such as newspapers, magazines, TV, radio, billboards, direct mail, telephone, fax, and internet.
    4. The merging of distinct technologies, industries, or devices into a unified whole. This often refers to the synergy between telecommunications, computing technology, and media content.
    5. A tendency, inclination, or prejudice toward or against something or someone. In media, it often refers to a predisposition towards a particular perspective, ideology, or result, thereby influencing fairness or impartiality.
    6. A widely held but fixed and oversimplified image or idea of a particular type of person or thing. Media can perpetuate stereotypes by only presenting certain types of individuals in specific roles or narratives.
    7. Media content that spreads rapidly through a population by being frequently shared by individuals in that population. This can include videos, memes, articles, etc.

    15 Clues: The use of different media to convey information or entertainment. This includes a combination of text, audio, images, animations, video, and interactive content.Media content that spreads rapidly through a population by being frequently shared by individuals in that population. This can include videos, memes, articles, etc....

    Vocab Lesson #1 Julio romero 2017-03-02

    Vocab Lesson #1 Julio romero crossword puzzle
    Across
    1. Undo is a command included in most software programs. It is typically located at the top of the Edit menu and has the standard shortcut "Control+Z" in Windows and "Command-Z" in Mac OS X. The Undo command allows you to undo the last action you performed in the program.
    2. keys-In a web browser, an access key or access key allows a computer user to immediately jump to a specific part of a web page via the keyboard.
    3. The term template, when used in the context of word processing software, refers to a sample document that has already some details in place; those can be adapted (that is added/completed, removed or changed, differently from a fill-in-the-blank approach as in a form) either by hand or through an automated iterative
    4. tips- Key tip. In Microsoft Office 2007 and 2010 applications, like Word, Excel, PowerPoint, and Outlook, a key tip is a keyboard shortcut to use a function on a ribbon, also called a ribbon control.
    5. a girder that has the shape of an I when viewed in section.
    Down
    1. wrap- word wrap - Computer Definition. A word processing feature that moves words to the next line automatically as you type based on the current right margin setting. Some word processing programs allow word wrap to be turned off for writing source code.
    2. space- In computer science, white space is any character or series of characters that represent horizontal or vertical space in typography. When rendered, a whitespace character does not correspond to a visible mark, but typically does occupy an area on a page.
    3. complete-a software function that gives users the option of completing words or forms by a shorthand method on the basis of what has been typed before.
    4. view-After you click the File tab, you can see the Microsoft Office Backstage view.
    5. lesson 1
    6. computing, the term group generally refers to a grouping of users. In principle, users may belong to none, one, or many groups (although in practice some systems place limits on this.) The primary purpose of user groups is to simplify access control to computer systems.
    7. point - In graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen. The insertion point is usually represented by a blinking vertical line. You can reposition the insertion point by pressing arrow keys or by moving the I-beam pointer.
    8. a list of commands or options, especially one displayed on screen.
    9. Definition of: tab (1) (Tablet) See tablet computer. (2) To move the cursor on a display screen or the print head on a printer to a specified column (the tab stop). Pressing the Tab key on a keyboard moves the screen cursor horizontally to the right. Pressing Shift-Tab moves it to the left.
    10. box launcher-A dialog box launcher is a small icon that appears in a group. Users click this icon to open related dialog boxes or task panes that provide more options that relate to the group.

    15 Clues: lesson 1a girder that has the shape of an I when viewed in section.a list of commands or options, especially one displayed on screen.view-After you click the File tab, you can see the Microsoft Office Backstage view....

    Computer Principles Crossword Puzzle 2018-09-04

    Computer Principles Crossword Puzzle crossword puzzle
    Across
    1. the process of discovering interesting and useful patterns and relationships in large volumes of data
    2. American Standard Code for Information Interchange
    3. a space in your computer's hard drive and in RAM memory where your browser saves copies of previously visited Web pages
    4. discreet online resource that is collaboratively developed and managed by a community
    5. digital telecommunications network which allows nodes to share resources
    6. Advanced Encryption Standard, the standard for data encryption adopted by the NIST in 2001
    7. Trusted Platform Module, specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication
    8. a device that originates, or generates, an information transfer to one or more receivers
    9. storing and accessing data and programs over the Internet instead of a computer's hard drive
    10. information processed or stored by a computer
    11. virtual space created by interconnected computers and computer networks on the Internet
    12. used by many websites for encryption to protect files and information that is transmitted over the Internet
    13. computing done at a central location, using terminals that are attached to a central computer
    14. Constructing and manipulating abstract (mathematical and , or graphical) representations of economic, engineering, manufacturing, social, and other types of situations and natural phenomenon, simulated with the help of a computer system
    15. radio frequency identification, similar to barcodes
    16. data compression techniques in which some amount of data is lost; this technique attempts to eliminate redundant info
    17. an online platform which people use to build social networks or social relations with other people
    18. a collection of data that can be used by computers which need to communicate with each other
    19. software that helps you organize and analyze data
    20. an identifier for devices on a TCP , IP network
    21. recognition of printed or written text characters by a computer(optical character recognition)
    22. event data recorder
    23. a numeric system that only uses two digits — 0 and 1
    24. namespace that organizes a set of related classes and interfaces
    25. any intangible asset, something proprietary that doesn't exist as a physical object but has value
    26. process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand
    27. smallest unit of data in a computer, has a single binary value of 0 or 1
    28. form of computer that uses the continuously changeable aspects of physical phenomena such as electrical, mechanical, or hydraulic quantities to model the problem being solved
    29. an instance of a computer program that is being executed. It contains the program code and its activity.
    30. central place in which an aggregation of data is kept and maintained in an organized way, usually in computer storage
    31. a request for information from a database
    32. term used to describe unsightly debris that accrues as the result of the experience of digital living
    33. a general category of storage mechanisms where data is recorded by various electronic, magnetic, optical, or mechanical changes to a surface layer of one or more rotating disks
    Down
    1. Dynamic random access memory, type of memory that is typically used for data or program code that a computer processor needs to function
    2. unsolicited junk email sent indiscriminately in bulk, often for commercial purposes
    3. known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it
    4. the forwarding by a router of a packet from any node to every other node attached to the router except the node from which the packet arrived
    5. set of steps for solving a particular problem
    6. the protection of internet-connected systems, including hardware, software and data, from cyberattacks
    7. contains the applications the user is working on
    8. a collection of data values, the relationships among them, and the functions or operations that can be applied to the data.
    9. facility used to store computers, servers, routers, switches, and other networking equipment in a single location
    10. an electrical signal that is converted into a pattern of bits
    11. A method of presenting data or information in non-traditional, interactive graphical forms
    12. a digital image (photo, drawing etc.) stored on a graphical user interface on the screen of a computer, mobile communications device or other electronic device.
    13. list of items that are granted access to a certain system or protocol
    14. any letter, number, space, punctuation mark, or symbol that can be typed on a computer
    15. a place where multiple databases or files are located for distribution over a network
    16. the translation of data into secret code
    17. any of a class of devices capable of solving problems by processing information in discrete form. It operates on data, including magnitudes, letters, and symbols, that are expressed in binary code—i.e., using only the two digits 0 and 1
    18. transmission of a file from one computer system to another
    19. any process in which information is gathered and expressed in a summary form for purposes such as statistical analysis
    20. a small chip that resides in computers and other electronic devices
    21. data compression techniques in which no data is lost
    22. the phrase used to describe the method of preparing data for storage or transmission
    23. hypertext markup language, a formatting system for displaying text, graphics, and audio retrieved over the Internet on a computer monitor
    24. the basic unit of programmable color on a computer display or in a computer image
    25. is a dot matrix data structure that represents a generally rectangular grid of pixels (points of color), viewable via a monitor, paper, or other display medium
    26. type of security program that enables encryption and decryption of a data stream at rest or in transit
    27. Data Encryption Standard is a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time
    28. any computing hardware that is used for storing, porting and extracting data files and objects
    29. measure of a computer's disk storage capacity or a computer file's size. Equal to 1,024 kilobytes.
    30. art of protecting information by transforming it into an unreadable format, called cipher text
    31. an automated program that runs over the Internet
    32. basic access control mechanism that allows through all elements except those explicitly mentioned
    33. Digital rights management, refers to any scheme that controls access to copyrighted material using technological means
    34. created in order to get information when the need arises
    35. trend regarding the number of transistors per square inch on integrated circuits doubling every year
    36. data about data; describes how and when and by whom a particular set of data was collected, and how data is formatted
    37. when two or more computers are linked in order to share resources
    38. a system designed to prevent unauthorized access to or from a private network
    39. used in reference to resolution of graphics device. Equal to 1,000,000 pixels
    40. a collection of documents about a person, event, or subject
    41. unit of data storage capacity that is roughly equivalent to 1 billion bytes
    42. sources the source of the data
    43. Uniform Resource Locator, a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it

    76 Clues: event data recordersources the source of the datathe translation of data into secret codea request for information from a databaseset of steps for solving a particular probleminformation processed or stored by a computercontains the applications the user is working onan automated program that runs over the Internet...

    Kareem Ceaser 2017-03-03

    Kareem Ceaser crossword puzzle
    Across
    1. unfasten, untie, or loosen (something).
    2. Point- In graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen. The insertion point is usually represented by a blinking vertical line. You can reposition the insertion point by pressing arrow keys or by moving the I-beam pointer.
    3. a device for examining, reading, or monitoring something, in particular.
    4. the address of a World Wide Web page.
    5. a common unit of measure for interest rates and other percentages in finance. One basis point is equal to 1/100th of 1%, or 0.01% (0.0001), and is used to denote the percentage change in a financial instrument.
    6. a unit of memory or data equal to 1,024 (210) bytes.
    7. a unit of information equal to one billion (109) or, strictly, 230 bits.
    8. Printing- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
    9. context menu (also called contextual, shortcut, and popup or pop-up menu) is a menu in a graphical user interface (GUI) that appears upon user interaction,
    10. Box- a small area on screen, in which the user is prompted to provide information or select commands.
    11. using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
    12. Quick Access Toolbar is a customizable toolbarthat contains a set of commands that are independent of the tab on the ribbon that is currently displayed. You can move the Quick Access Toolbar from one of the two possible locations, and you can add buttons that represent commands to the Quick Access Toolbar.
    13. In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
    14. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
    15. The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
    16. Complete- a software function that gives users the option of completing words or forms by a shorthand method on the basis of what has been typed before.
    17. a number of people or things that are located close together or are considered or classed together.
    18. the process of converting information or data into a code, especially to prevent unauthorized access.
    19. a man who behaves dishonorably, especially toward a woman.
    20. the introductory page of a website, typically serving as a table of contents for the site.
    21. Toolbar- When you select text, you can show or hide the handy Mini toolbar, which helps you work with fonts, alignment, text color, indenting, and bullets. Note: You cannot customize the Mini toolbar.
    22. a system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
    23. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
    24. an arrangement of intersecting horizontal and vertical lines.
    25. a person who uses computers to gain unauthorized access to data.
    26. as- Definition of: Save As. Save As. A command in the File menu of most applications that causes a copy of the current document or image to be created. It differs from the regular Save command, which stores the data back to the file and folder it originally came from.
    Down
    1. a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
    2. a small flap or strip of material attached to or projecting from something, used to hold or manipulate it, or for identification and information.
    3. View- After you click the File tab, you can see the Microsoft Office Backstage view. The Office Backstage view is where you manage your files and the data about them — creating, saving, inspecting for hidden metadata or personal information, and setting options.
    4. Wrap- (in word processing) a feature that automatically moves a word that is too long to fit on a line to the beginning of the next line.
    5. a shaped piece of metal, wood, card, plastic, or other material used as a pattern for processes such as painting, cutting out, shaping, or drilling.
    6. (books, newspapers, magazines, etc.), especially in large quantities, by a mechanical process involving the transfer of text, images, or designs to paper.
    7. a wall or partition designed to inhibit or prevent the spread of fire.
    8. a girder that has the shape of an I when viewed in section.
    9. an inspection or viewing of something before it is bought or becomes generally known and available.
    10. computing and telecommunication, a control character or non-printing characteris a code point (a number) in a character set, that does not represent a written symbol. They are used as in-band signaling to cause effects other than the addition of a symbol to the text.
    11. coffee
    12. a long, narrow strip of fabric, used especially for tying something or for decoration.
    13. keep safe or rescue (someone or something) from harm or danger.
    14. the way in which something is arranged or set out.
    15. a small room in which a prisoner is locked up or in which a monk or nun sleeps.
    16. Menu-
    17. By Vangie Beal A graphical user interface (GUI) feature in which a small text box appears when a mouse pointer is hovered over an icon or button. The pop-up window will provide details that explain the icon's or button's function. In some instances, though, the Screen Tip will display only the item's name.
    18. is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings. Most LANs connect workstations and personal computers and enable users to access data and devices (e.g., printers and modems) anywhere on the network.
    19. Space- the unprinted area of a piece of printing, as of a poster or newspaper page, or of a portion of a piece of printing, as of an advertisement; blank space: White space is as effective in a layout as type. Origin of white space Expand.
    20. In a web browser, an access key or accesskey allows a computer user to immediately jump to a specific part of a web page via the keyboard. They were introduced in 1999 and quickly achieved near-universal browser support.
    21. a format for compressing image files.
    22. a list of dishes available in a restaurant.
    23. a person who looks casually through books or magazines or at things for sale.
    24. Tips- Keytip. In Microsoft Office 2007 and 2010 applications, like Word, Excel, PowerPoint, and Outlook, a keytip is a keyboard shortcut to use a function on a ribbon, also called a ribbon control.
    25. as a right-click mouse operation. ... From a technical point of view, such a context menu is a graphical control element.
    26. Key

    52 Clues: KeyMenu-coffeethe address of a World Wide Web page.a format for compressing image files.unfasten, untie, or loosen (something).a list of dishes available in a restaurant.the way in which something is arranged or set out.a unit of memory or data equal to 1,024 (210) bytes.a man who behaves dishonorably, especially toward a woman....

    Kareem Ceaser 2017-03-03

    Kareem Ceaser crossword puzzle
    Across
    1. unfasten, untie, or loosen (something).
    2. Menu-
    3. a wall or partition designed to inhibit or prevent the spread of fire.
    4. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
    5. as a right-click mouse operation. ... From a technical point of view, such a context menu is a graphical control element.
    6. an inspection or viewing of something before it is bought or becomes generally known and available.
    7. In a web browser, an access key or accesskey allows a computer user to immediately jump to a specific part of a web page via the keyboard. They were introduced in 1999 and quickly achieved near-universal browser support.
    8. Key
    9. a shaped piece of metal, wood, card, plastic, or other material used as a pattern for processes such as painting, cutting out, shaping, or drilling.
    10. Toolbar- When you select text, you can show or hide the handy Mini toolbar, which helps you work with fonts, alignment, text color, indenting, and bullets. Note: You cannot customize the Mini toolbar.
    11. Box- a small area on screen, in which the user is prompted to provide information or select commands.
    12. a person who uses computers to gain unauthorized access to data.
    13. The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
    14. a unit of information equal to one billion (109) or, strictly, 230 bits.
    15. context menu (also called contextual, shortcut, and popup or pop-up menu) is a menu in a graphical user interface (GUI) that appears upon user interaction,
    16. a number of people or things that are located close together or are considered or classed together.
    17. In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
    18. By Vangie Beal A graphical user interface (GUI) feature in which a small text box appears when a mouse pointer is hovered over an icon or button. The pop-up window will provide details that explain the icon's or button's function. In some instances, though, the Screen Tip will display only the item's name.
    19. a person who looks casually through books or magazines or at things for sale.
    20. Printing- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
    21. a list of dishes available in a restaurant.
    22. a format for compressing image files.
    23. a common unit of measure for interest rates and other percentages in finance. One basis point is equal to 1/100th of 1%, or 0.01% (0.0001), and is used to denote the percentage change in a financial instrument.
    Down
    1. coffee
    2. Point- In graphics-based programs, the insertion point is the point where the next characters typed from the keyboard will appear on the display screen. The insertion point is usually represented by a blinking vertical line. You can reposition the insertion point by pressing arrow keys or by moving the I-beam pointer.
    3. Wrap- (in word processing) a feature that automatically moves a word that is too long to fit on a line to the beginning of the next line.
    4. an arrangement of intersecting horizontal and vertical lines.
    5. using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
    6. a device for examining, reading, or monitoring something, in particular.
    7. the way in which something is arranged or set out.
    8. a small flap or strip of material attached to or projecting from something, used to hold or manipulate it, or for identification and information.
    9. View- After you click the File tab, you can see the Microsoft Office Backstage view. The Office Backstage view is where you manage your files and the data about them — creating, saving, inspecting for hidden metadata or personal information, and setting options.
    10. a man who behaves dishonorably, especially toward a woman.
    11. Space- the unprinted area of a piece of printing, as of a poster or newspaper page, or of a portion of a piece of printing, as of an advertisement; blank space: White space is as effective in a layout as type. Origin of white space Expand.
    12. a small room in which a prisoner is locked up or in which a monk or nun sleeps.
    13. keep safe or rescue (someone or something) from harm or danger.
    14. (books, newspapers, magazines, etc.), especially in large quantities, by a mechanical process involving the transfer of text, images, or designs to paper.
    15. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
    16. the process of converting information or data into a code, especially to prevent unauthorized access.
    17. the introductory page of a website, typically serving as a table of contents for the site.
    18. Tips- Keytip. In Microsoft Office 2007 and 2010 applications, like Word, Excel, PowerPoint, and Outlook, a keytip is a keyboard shortcut to use a function on a ribbon, also called a ribbon control.
    19. a unit of memory or data equal to 1,024 (210) bytes.
    20. computing and telecommunication, a control character or non-printing characteris a code point (a number) in a character set, that does not represent a written symbol. They are used as in-band signaling to cause effects other than the addition of a symbol to the text.
    21. Complete- a software function that gives users the option of completing words or forms by a shorthand method on the basis of what has been typed before.
    22. is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings. Most LANs connect workstations and personal computers and enable users to access data and devices (e.g., printers and modems) anywhere on the network.
    23. a long, narrow strip of fabric, used especially for tying something or for decoration.
    24. a system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
    25. a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
    26. a girder that has the shape of an I when viewed in section.
    27. Quick Access Toolbar is a customizable toolbarthat contains a set of commands that are independent of the tab on the ribbon that is currently displayed. You can move the Quick Access Toolbar from one of the two possible locations, and you can add buttons that represent commands to the Quick Access Toolbar.
    28. the address of a World Wide Web page.
    29. as- Definition of: Save As. Save As. A command in the File menu of most applications that causes a copy of the current document or image to be created. It differs from the regular Save command, which stores the data back to the file and folder it originally came from.

    52 Clues: KeyMenu-coffeethe address of a World Wide Web page.a format for compressing image files.unfasten, untie, or loosen (something).a list of dishes available in a restaurant.the way in which something is arranged or set out.a unit of memory or data equal to 1,024 (210) bytes.a man who behaves dishonorably, especially toward a woman....

    Vocab lesson 2 2017-03-02

    Vocab lesson 2 crossword puzzle
    Across
    1. (computer- aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
    2. page - Computer Definition. Also known as page and Web page. A document that serves as a starting point on a Web site. A home page typically contains hypertext and navigation buttons that allows the user to navigate the site by clicking them with a mouse and invoking hyperlinks to other pages and even other sites.
    3. is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
    4. firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
    5. of: DNS. DNS. (Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
    6. process of converting information or data into a code, especially to prevent unauthorized access.
    Down
    1. was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network.
    2. hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”
    3. Point (BPS) refer to a common unit of measure for interest rates and other percentages in finance. One basis point is equal to 1/100th of 1%, or 0.01% (0.0001), and is used to denote the percentage change in a financial instrument.
    4. for Joint Photographic Experts Group, and pronounced jay-peg. JPEG is a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
    5. computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.

    11 Clues: process of converting information or data into a code, especially to prevent unauthorized access.firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both....

    coa 2022-12-02

    coa crossword puzzle
    Across
    1. coherence problem , snooping based coherence , distributed shared memory , Grid computing ,
    Down

      1 Clue: coherence problem , snooping based coherence , distributed shared memory , Grid computing ,

      words 2017-04-26

      words crossword puzzle
      Across
      1. “web log,” a regularly updated personal journal, conversation, commentary, or news forum on virtually any topic that is published on the Web and may include text, hypertext, images, and links; typically displayed in reverse chronological order, blog posts invite comments from readers creating online communities of individuals with shared interests over time; updating a blog is “blogging,” someone who keeps a blog is a “blogger,” and blog entries are called “posts.”
      2. computing—a technology that uses the Internet and remote servers to maintain data and applications, allowing users to access applications without installation and access to their personal files from any computer with Internet access; centralizes storage, memory, processing, and bandwidth; examples include Yahoo email or Gmail with the software managed by the cloud service providers Yahoo and Google.
      Down
      1. personalized graphic file or rendering that represents a computer user or user’s alter ego, often used on Web exchange boards and in online gaming; can be a real-life digital photo, but is more often a graphical representation.
      2. “web log,” a regularly updated personal journal, conversation, commentary, or news forum on virtually any topic that is published on the Web and may include text, hypertext, images, and links; typically displayed in reverse chronological order, blog posts invite comments from readers creating online communities of individuals with shared interests over time; updating a blog is “blogging,” someone who keeps a blog is a “blogger,” and blog entries are called “posts.”
      3. reader—a portable electronic device that is designed primarily for the purpose of reading digital books and periodicals
      4. –also called “data transfer rate,” the amount of data that can be carried online from one point to another in a given time period, usually expressed in bits (of data) per second (bps) or bytes per second (Bps). Dial-up Internet accounts, which use a standard telephone line to connect to an Internet Service Provider (ISP), have a very narrow bandwidth (about 50 Kbps or 50,000 bits per second) and take a long time to download data. A broadband Internet account can move data at anywhere from 128 Kbps to 2,000 Kbps or more and can download large files, such as video files, much faster.

      6 Clues: reader—a portable electronic device that is designed primarily for the purpose of reading digital books and periodicalspersonalized graphic file or rendering that represents a computer user or user’s alter ego, often used on Web exchange boards and in online gaming; can be a real-life digital photo, but is more often a graphical representation....

      Videogames_Crossword 2022-05-04

      Videogames_Crossword crossword puzzle
      Across
      1. is a Single-player First-person Logic video game developed by Valve Corporation. The game was released in a package called The Orange Box for Microsoft Windows and Xbox 360 on October 9, 2007, and for PlayStation 3 on December 11 of that year.
      2. es un videojuego de arcade desarrollado por Nintendo en el año 1983. Fue creado por Shigeru Miyamoto.
      3. is an action role-playing video game, developed by the From Software company for the PlayStation 3, PlayStation 4, Xbox 360 and Microsoft Windows platforms, distributed by Namco Bandai Games. Previously known as Project Souls, it is the second video game in the Souls series.
      4. is an action-adventure video game series created by Japanese designers Shigeru Miyamoto and Takashi Tezuka, and developed by Nintendo, a company that is also responsible for its international distribution.
      5. is a sandbox video game the company that created this game is part of Xbox Game Studios, which in turn is part of Microsoft.
      6. is an online tactical shooter video game developed by Ubisoft Montreal and publisher by Ubisoft. It went on sale worldwide for Microsoft Windows, PlayStation 4, and Xbox One on December 1, 2015, and for PlayStation 5 and Xbox Series X|S on December 1, 2020.
      Down
      1. is a war-style first-person shooter video game developed by Treyarch and published by Activision. It is the seventh title in the Call of Duty series and the third title in the series developed by Treyarch, being the direct sequel to its previous title, Call of Duty: World at War.
      2. is a media franchise that originally started as an RPG video game, but due to its popularity it has managed to expand to other entertainment media such as television series, movies, card games, clothing, among others, becoming a brand that is recognized in the world market. Video game sales up to December 1, 2006 had reached an amount of 340 million copies.
      3. is a logic video game originally designed and programmed by Aleksei Pázhitnov in the Soviet Union. It was released on June 6, 1984, while working for the Dorodnitsyn Computing Center of the USSR Academy of Sciences in Moscow, Russian SFSR.
      4. is a saga of football video games published annually by Electronic Arts under the EA Sports label created in Japan.
      5. es un videojuego de terror y de acción y aventura desarrollado por la compañía estadounidense Naughty Dog y distribuido por Sony Computer Entertainment para la consola PlayStation 3 en 2013. La trama describe las vivencias de Joel y Ellie, un par de supervivientes de una pandemia en Estados Unidos que provoca la mutación de los seres humanos en criaturas caníbales.
      6. is a first-person shooter of the Survival Horror genre, which takes place during a zombie apocalypse. It was developed by Techland and published by Warner Bros.

      12 Clues: es un videojuego de arcade desarrollado por Nintendo en el año 1983. Fue creado por Shigeru Miyamoto.is a saga of football video games published annually by Electronic Arts under the EA Sports label created in Japan.is a sandbox video game the company that created this game is part of Xbox Game Studios, which in turn is part of Microsoft....

      Techno definitions 2022-02-28

      Techno definitions crossword puzzle
      Across
      1. take (something) illicitly; steal.
      2. a term for audio files with greater than 44.1 kHz sample rate or higher than 16-bit audio bit depth.
      3. a course of study made available over the internet without charge to a very large number of people.
      4. meeting all your energy needs from the power of the sun — with no help from the electrical grid.
      5. the state, fact, quality, or condition of being singular.
      6. a person or thing that interrupts an event, activity, or process by causing a disturbance or problem.
      7. someone who believes they have good ideas for new businesses or inventions but hasn't actually managed to get any of them off the ground.
      8. the state or quality of being efficient.
      9. extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
      10. the process of ensuring that visitors who access your site from mobile devices have an experience optimized for the device.
      11. often used in conjunction with content marketing and SEO.
      12. the correct or acceptable way of communicating on the internet.
      13. an image, video, advertisement, etc., that is circulated rapidly on the internet.
      14. the formation of ideas or concepts.
      Down
      1. an area of computing focused on developing computer technology based on the principles of quantum theory (which explains the behavior of energy and material on the atomic and subatomic levels).
      2. standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
      3. process of combining sensor data or data derived from disparate sources such that the resulting information has less uncertainty than would be possible when these sources were used individually.
      4. tiredness and frustration caused by having to remember a large number of passwords for electronically-controlled activities.
      5. one whose views on a subject are taken to be authoritative and influential.
      6. posting a single message or piece of content to multiple destinations.
      7. a form of entertainment (such as a movie or television show) that is created primarily to advertise something.
      8. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
      9. a detection system that uses radio waves to determine the distance (ranging), angle, or velocity of objects.
      10. a type of business model that offers basic features of a product or service to users at no cost and charges a premium for supplemental or advanced features.
      11. a person reaching young adulthood in the early 21st century.
      12. reuse (discarded objects or material) in such a way as to create a product of higher quality or value than the original.
      13. a mobile device used while watching television, especially to access supplementary content or applications.
      14. a computer system modeled on the human brain and nervous system.
      15. content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
      16. short for key performance indicator.
      17. a person who introduces new methods, ideas, or products.
      18. the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
      19. video recordings where a view in every direction is recorded at the same time, shot using an omnidirectional camera or a collection of cameras.
      20. or Light Detection and Ranging: remote sensing method used to examine the surface of the Earth.

      34 Clues: take (something) illicitly; steal.the formation of ideas or concepts.short for key performance indicator.the state or quality of being efficient.a person who introduces new methods, ideas, or products.the state, fact, quality, or condition of being singular.often used in conjunction with content marketing and SEO....

      Module Vocab 1 2020-02-25

      Module Vocab 1 crossword puzzle
      Across
      1. The Web, or World Wide Web (W3), is basically a system of Internet servers that support specially formatted documents.
      2. Wearable technology, wearables, fashion technology, tech togs, or fashion electronics are smart electronic devices that can be incorporated into clothing or worn on the body as implants or accessories.
      3. a computer or computer program which manages access to a centralized resource or service in a network.
      4. cause (a set of data or files) to remain identical in more than one location.
      5. a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
      6. link (computers or other machines) to operate interactively.
      7. a program or piece of software designed and written to fulfill a particular purpose of the user.
      8. a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
      9. a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
      10. a machine for printing text or pictures onto paper, especially one linked to a computer.
      11. the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket.
      12. combining two or more items or functions in a single unit.
      13. Cloud storage is a model of computer data storage in which the digital data is stored in logical pools.
      14. A communication device is a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or wirelessly.
      15. an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections.
      16. an input device is a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance.
      17. a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
      18. a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.
      19. the study and practice of environmentally sustainable computing or IT.
      20. an extra copy of data from a computer
      Down
      1. An output device is any piece of computer hardware equipment which converts information into human-readable form.
      2. A web server is server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web.
      3. -a computer device that outputs a video signal or visual image to display a video game that one or more people can play.
      4. the programs and other operating information used by a computer.
      5. a handheld electronic device for playing digital media such as audio and video files.
      6. a mobile electronic device that is designed primarily for the purpose of reading digital e-books.
      7. a location connected to the Internet that maintains one or more pages on the World Wide Web.
      8. the ability to view the same multimedia content from different types devices.
      9. a hypertext document connected to the World Wide Web.
      10. an application, especially as downloaded by a user to a mobile device
      11. a small portable computer that accepts input directly on to its screen rather than via a keyboard or mouse.
      12. the part of a computer in which data or program instructions can be stored for retrieval.
      13. Having the same data in two or more locations.
      14. a series of coded software instructions to control the operation of a computer or other machine.

      34 Clues: an extra copy of data from a computerHaving the same data in two or more locations.a hypertext document connected to the World Wide Web.combining two or more items or functions in a single unit.link (computers or other machines) to operate interactively.the programs and other operating information used by a computer....

      My Brother Sam is Dead 2020-10-08

      My Brother Sam is Dead crossword puzzle
      Across
      1. a small, thin piece of wood for laying in overlapping rows as a covering for a roof
      2. Any of various metallic substances made mostly of tin
      3. the troops stationed in a fortress or town to defend it
      4. a talk about God or the Bible given by a Priest or Minister
      5. A citizen army
      6. A number of shots fired at the same time or rapidly one after another
      7. American colonists who fought for independence from Great Britain during the Revolutionary War
      8. to get revenge
      9. suddenly attacking an enemy
      10. the crime of betraying one's country
      11. to have both anger and disgust; contemptuous
      12. projectiles to be fired from a gun
      13. Basic beliefs, rules, or laws
      14. work in a steady, determined manner
      15. warm and friendly
      16. A device for controlling a horse made up of a set of straps enclosing the head, a bit, and a pair of reins
      17. it has a long handle used especially in hitching hay
      18. violation of the rights of others
      19. to move through or cut
      20. up to have strength and courage
      21. stubborn
      22. an insulting nickname given to the British soldiers during the Revolutionary War because of their red coats
      23. A riding whip with a short handle and a rawhide tip
      24. A very confused or disturbed state or condition
      25. To strike forcefully especially with a long instrument (as a whip)
      26. Arnold United States general and traitor in the American Revolution
      27. doing arithmetic
      28. a special type of fishing that uses a net
      Down
      1. The stirring up of feelings against lawful authority
      2. A structure built on the shore at which ships can load and unload
      3. long-bodied fish that have a thick skin covered with rows of bony plates
      4. a small usually cylindrical pointed piece of wood used to pin down or fasten things
      5. A room in which alcoholic drinks are stored and/or served
      6. members of a militia during the American Revolution who could be read to fight with a minute's notice
      7. To be sullenly silent or irritable.
      8. to brag or show off
      9. Stubborn resistance to or defiant of authority or guidance
      10. a long knife that is attached to the end of a rifle and used as a weapon in battle
      11. American colonists who remained loyal to Britain and opposed the war for independence
      12. to go get and bring back
      13. American colonists who were determined to fight the British until American independence was won
      14. a slight stinging or tingling sensation
      15. Lacking in quantity or number
      16. A military unit consisting usually of a number of battalions
      17. what did soldiers spend most time doing; practicing
      18. crouched or bent over something
      19. a book containing a calendar of days, weeks, and months and usually facts about the rising and setting of the sun and moon, changes in the tides, and information of general interest
      20. To travel or wander through on foot
      21. to behave in a very proud manner / walk with a proud strut
      22. an area of trees kept usually to meet fuel and lumber needs
      23. people who supported the British cause in the American Revolution; loyalists
      24. to spend time doing nothing
      25. Any of various small boats; especially : a flat-bottomed
      26. To catch, fasten, or connect by or as if by a hook or knot
      27. thinking about something
      28. to poke quickly with something sharp
      29. sabotage, undermining
      30. animals kept or raised
      31. To engage in a business deal in which much profit may be made although at a big risk
      32. an upper room or floor
      33. an act or method of computing
      34. A former unit of British money equal to 1/20 pound
      35. laziness
      36. To shout or cry out loudly; to weep noisily

      64 Clues: stubbornlazinessA citizen armyto get revengedoing arithmeticwarm and friendlyto brag or show offsabotage, undermininganimals kept or raisedto move through or cutan upper room or floorto go get and bring backthinking about somethingsuddenly attacking an enemyto spend time doing nothingLacking in quantity or numberBasic beliefs, rules, or laws...

      information as semi private property 2021-04-22

      information as semi private property crossword puzzle
      Across
      1. a generic term to describe a barrier against destruction
      2. legal or other formal measure intended to preserve civil liberties and rights.
      3. enhanced version of the real physical Augmented "reality" that is achieved through the use of digital visual elements, sound, or other sensory stimuli delivered via technology
      4. a state in which one is not observed or disturbed by other people.
      5. belonging to or for the use of one particular person or group of people only.
      6. any item that a person or a business has legal title over.
      7. a circular prison with cells arranged around a central well, from which prisoners could at all times be observed.
      8. a financial gain, especially the difference between the amount earned and the amount spent in buying, operating, or producing something.
      9. the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients
      10. prejudice for or against one person or group, especially in a way considered to be unfair.
      11. keep under systematic review.
      12. the legal rights of the owner of intellectual property.
      13. Quick Response code
      14. what do we communicate through
      15. the best policy
      16. the reason for which something is done or created or for which something exists.
      17. while connected to a computer or under computer control
      18. convert (a text written in code, or a coded signal) into normal language.
      19. malicious software designed to steal your private information
      20. artificial intelligence
      21. the study of human societies and cultures and their development.
      22. a person who uses computers to gain unauthorized access to data/ advanced computer technology enthusiast
      23. a modern online writer's column
      24. Internet Protocol
      25. the modern version of the 1970s mainframe computing model
      26. knowledge obtained from investigation, study, or instruction
      27. logbook
      28. a word used to describe an action, state, or occurrence, and forming the main part of the predicate of a sentence, such as hear, become, happen.
      29. the power to influence or direct people's behaviour or the course of events.
      30. a morpheme added at the end of a word to form a derivative
      Down
      1. the power or right to give orders, make decisions, and enforce obedience.
      2. a matter of interest or importance to someone.
      3. the group of people with the authority to govern a country or state
      4. the state of having no protection from something harmful.
      5. stage of society that reflects an inversion of modernity in which the function of an object has its reference point in the form of an object rather than function being the reference point for form
      6. character or symbol.
      7. a computer or computer program which manages access to a centralized resource or service in a network
      8. currency for accessing this information
      9. suppression of speech
      10. a pictorial symbol for a word or phrase.
      11. just behaviour or treatment.
      12. a large company or group of companies authorized to act as a single entity and recognized as such in law
      13. anthropological spaces of transience where the human beings remain anonymous and that do not hold enough significance to be regarded as "places"
      14. the use of what language allows the speaker to relate meaning without being specific.
      15. conceal data in (something) by converting it into a code.
      16. preffered mode
      17. an area on the internet or other computer network where users can communicate, typically one dedicated to a particular topic.
      18. denoting products, services, or interests that appeal to a small, specialized section of the population.
      19. a word, letter, or number placed before another.

      49 Clues: logbookpreffered modethe best policyInternet ProtocolQuick Response codecharacter or symbol.suppression of speechartificial intelligencejust behaviour or treatment.keep under systematic review.what do we communicate throughcurrency for accessing this informationa pictorial symbol for a word or phrase.a modern online writer's column...

      Computer Definitions 2024-06-24

      Computer Definitions crossword puzzle
      Across
      1. files embedded within online communication channels such as emails, instant messages, or social networks
      2. the transmission of high-quality data of wide bandwidth.
      3. a type of malware that downloads onto a computer disguised as a legitimate program
      4. a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
      5. the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
      6. used to refer to computer files or memory that can be read or used, but not changed or added to in any way
      7. a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
      8. the amount of data that can reside within the disk drive or storage medium to a maximum limit.
      9. allows devices to communicate with each other without cables or wires.
      10. the practice of protecting systems, networks, and programs from digital attacks
      11. a data measurement unit applied to digital computer or media storage
      12. a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
      13. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
      14. a file format that can contain multiple files combined and compressed into one file.
      15. the use or operation of computers.
      16. A computer program that can copy itself and infect a computer without permission or knowledge of the user
      17. the capacity at which a network can transmit data.
      18. the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
      19. malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
      20. the logic circuitry that responds to and processes the basic instructions that drive a computer
      Down
      1. the ability of software and hardware from different sources to work together without having to be altered to do so
      2. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
      3. a software program used to locate and display information on the Internet or an intranet.
      4. a unit of data that is eight binary digits long
      5. Any stored data.
      6. a set of rules for formatting and processing data.
      7. device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
      8. a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
      9. the number of pixels that are displayed per inch for an image
      10. computer systems that are connected to a network and are accessible to users from anywhere at any time
      11. any unsolicited communication sent in bulk.
      12. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
      13. small files of information that a web server generates and sends to a web browser
      14. to reload the operating system of a computer:
      15. the smallest unit of data that a computer can process and store.
      16. the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
      17. any criminal activity that involves a computer, network or networked device.
      18. a tiny wafer of semiconducting material with an embedded electronic circuit.
      19. a computer on a network that provides the interface between two applications or networks that use different protocols
      20. an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.

      40 Clues: Any stored data.the use or operation of computers.any unsolicited communication sent in bulk.to reload the operating system of a computer:a unit of data that is eight binary digits longa set of rules for formatting and processing data.the capacity at which a network can transmit data.the transmission of high-quality data of wide bandwidth....

      Digital literacy 2024-05-01

      Digital literacy crossword puzzle
      Across
      1. Is the transfer of data from one digital devices to another
      2. Privilegedaccessmanagement
      3. Is about expressing ourselves artistically online
      4. To add security features within the computer apps or software to prevent it from cyber attack
      5. Allows sharing ideas and information, including text and visual, through virtual network and communities
      6. Having the knowledge and skills you need to participate in making change in your community
      7. a sever site,or method that delivers media to an audience
      8. Process of transferring files from a user computers to the webserver
      9. A person who commits fraud or participate in a dishonest scheme
      10. A secret word or expression used by authorized person to prove their right to access information, etc.
      11. The process of transferring files from a computer
      12. The hardware and software use to create, store, transmit, manipulate and display information and data.
      13. acts performed by individual with harmful intent, whose goal is to steal data cause damage to a disrupt computing system
      14. A sever cyber security threats that leverages the networking capabilities of computers to spread Malicious programs,steal data and damage or destroy computers and computer system
      15. Creating a copy of the data on your system that you use for recovery Incase your original data is last or corrupter
      16. individual ability to find evaluate,and communicate information using typing or digital media platform
      17. Safeguards information from loss through backup and recovery
      18. The right to control how your information is view and used
      19. Operating system
      20. Constructivedigitalliteracy
      Down
      1. Global network of billions of computers and other electronic devices
      2. security Process that prevents sensitive information from getting into the wrong hands
      3. Vertualprivatenetwork
      4. address. Address is a string of numbers separated by periods
      5. Malware
      6. A scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicity
      7. Civicdigitalliteracy
      8. Unauthorizedaccess
      9. The use of technology to harass, threaten, embarrass, or target another person
      10. Emailspoofing
      11. Communicationdigitalliteracy
      12. The ability to find, evaluate, use, share and create content using digital devices
      13. form of media that uses dectronic devices distribution
      14. appreciating and respecting different cultures online
      15. Refers to responsible use of technology by anyone who use computers the internet and digital devices to engage with society on any level
      16. Impression made by the papilarry ridges on the ends of the fingers and thombs
      17. It is a process of transferring files from the users computers to the webserver (on the internet)
      18. Understanding where to go on the internet to find reliable and correct information
      19. Design to give a full, multi-layered, end to end protection solution to give your peace of mind when it comes to cyber security
      20. are any illegitimate internet website used to deceive users into fraud or malicious attack s
      21. Is a machine that can be programmed to automatically carry out sequence of arithmetic or logical operations
      22. To aid the user doing specific task
      23. Popups
      24. Any activity designed to protect the ability and integrity of your network and data
      25. Is a way to conceal information by altering it so that it appears to be random data
      26. Collection of programs and data that tell computer running
      27. The trial of data you leave when using the internet
      28. Collection of files and related resources accessable through the world wide web and the uhh internet via a domain name
      29. Tells a machine which actions to perform and how to complete task

      49 Clues: PopupsMalwareEmailspoofingOperating systemUnauthorizedaccessCivicdigitalliteracyVertualprivatenetworkPrivilegedaccessmanagementConstructivedigitalliteracyCommunicationdigitalliteracyTo aid the user doing specific taskIs about expressing ourselves artistically onlineThe process of transferring files from a computer...

      Solo Leveling 2024-11-05

      Solo Leveling crossword puzzle
      Across
      1. Monarch title of Antares
      2. Abilities hunters use in dungeons
      3. Allies who oppose the Monarchs
      4. Powerful healer and Jinwoo’s potential love interest
      5. Realm where high-ranking hunters fight powerful beasts
      6. Final antagonist monarch Jinwoo faces
      7. Monarch with powers of a beast
      8. Jinwoo’s skill to turn corpses into shadows
      9. Leader of a guild
      10. Jinwoo’s little sister
      11. Jinwoo’s loyal friend and guild vice master
      12. Japanese Nickname for Jinwoo due to his power
      13. Deadlier dungeon type
      14. Main protagonist who becomes a powerful hunter
      15. Guild led by Choi Jong-In, one of the strongest in Korea
      16. High-ranking hunter known as the Sword Saint
      17. Jinwoo’s trusted healer shadow
      18. Style of dungeon crawling, done without a team
      19. Beru’s terrifying and powerful scream
      20. Portals leading to dungeons
      21. Beings or entities with godlike powers
      22. Jinwoo's little sister
      23. City attacked by ants from the Jeju Island Dungeon
      24. Manhwa’s illustrator
      25. Group expedition into a dungeon
      26. Large monsters fought in high-level dungeons
      27. Powerful creature on Jeju Island
      28. Lowest rank for hunters, where Jinwoo began
      29. Power source for hunters
      30. Jinwoo’s loyal general shadow
      31. Type of attack relying on strength rather than magic
      32. Powerful monster type fought in dungeons
      33. System where Jinwoo starts as E-rank
      34. Jinwoo's loyal knight shadow
      35. Guild with strong hunters, led by Choi Jong-In
      36. Force led by the Ant Queen
      37. Guild that took part in the Jeju Raid
      38. Powerful race with abilities to control shadows
      39. Statue that acted as a judge in the dual dungeon
      40. Shadow dragon under Jinwoo’s command
      41. High hunter rank below S-Rank
      42. Tool used by hunters in combat
      43. S-Rank healer and member of the Hunters Guild
      44. Jinwoo’s father who mysteriously disappeared
      45. Leader of the White Tiger Guild
      46. Creature Jinwoo first fought in the dual dungeon
      47. Powerful creatures serving under Antares
      48. Jinwoo's summon resembling a giant bear
      49. Highest rank for hunters, where Jinwoo eventually reaches
      50. Guild created and founded by Jinwoo
      Down
      1. Rare phenomenon, experienced by Jinwoo
      2. Class of hunters who can summon creatures
      3. Resource obtained from monsters
      4. Artifact obtained by Jinwoo in a dungeon
      5. Magical item providing abilities
      6. Rebirth/Reliving
      7. Governing body for hunters worldwide
      8. One of the lower hunter ranks above E-Rank
      9. Ability Jinwoo uses to transport to different locations
      10. Shadow soldier known for his armor and defense
      11. Refers to Jinwoo's ability to keep leveling
      12. Family name of the protagonist Jinwoo
      13. Resource collected from monsters
      14. Mysterious beings who oppose the Monarchs
      15. Special dungeon where Jinwoo’s journey began
      16. Beings in the dual dungeon in the first chapter
      17. Special item granting access to solo dungeons
      18. Designer of the dual dungeon
      19. American hunter known for strength and arrogance
      20. Computing used to raise one's stats and abilities
      21. Creatures created and controlled by Jinwoo
      22. High-stakes raid on Jeju Island
      23. Beings from another world who clash with humanity
      24. Type of attack using magical power
      25. "Ice elf" who served under Jinwoo as a shadow soldier
      26. Jinwoo's title after becoming one of the most powerful beings
      27. Title used to refer to Jinwoo
      28. Location of a deadly dungeon filled with ants
      29. Term for monsters in dungeons
      30. Country where Jinwoo is from
      31. Process through which hunters grow stronger
      32. Weapons used by hunters in dungeons
      33. Country known for powerful hunters besides Korea
      34. Ability to move unseen in dungeons
      35. Phrase for Jinwoo’s gradual increase in power
      36. Powerful beast fought by hunters
      37. Class of hunter with healing abilities
      38. Term for high-ranking hunters

      88 Clues: Rebirth/RelivingLeader of a guildManhwa’s illustratorDeadlier dungeon typeJinwoo’s little sisterJinwoo's little sisterMonarch title of AntaresPower source for huntersForce led by the Ant QueenPortals leading to dungeonsDesigner of the dual dungeonCountry where Jinwoo is fromJinwoo's loyal knight shadowTitle used to refer to Jinwoo...

      AI 2025-02-03

      AI crossword puzzle
      Across
      1. – To set something in motion, such as starting a project, introducing a product, or sending a rocket into space.
      2. – To come into view, existence, or awareness, often after being hidden or unknown.
      3. – A work, such as a book, magazine, or research paper, that has been made available to the public in print or digital form.
      4. – A rivalry between individuals or groups striving to achieve superiority in a particular area, such as sports, business, or academics.
      5. – A digitally manipulated image or video that convincingly alters appearances or voices, often used for deception.
      6. – A major discovery, achievement, or sudden advance in knowledge, often in science or technology.
      7. – A defect, weakness, or imperfection that reduces quality or effectiveness, such as in objects, plans, or arguments.
      8. – Existing in digital or simulated form rather than physically, such as virtual reality, virtual meetings, or online environments.
      9. – Advice, direction, or mentorship provided to help someone make decisions or navigate a situation effectively.
      10. – The process of removing software restrictions on devices like smartphones to gain unauthorized control over them.
      11. – A matter of interest, worry, or importance that requires attention or action.
      12. – A microorganism, such as a virus or bacteria, that causes disease in humans, animals, or plants.
      13. – Short for Artificial Intelligence, the simulation of human intelligence in computers, enabling them to learn, reason, and make decisions.
      14. – Acting independently, without external control or intervention, often used in robotics and AI.
      15. – Referring to the prestigious Nobel Prizes, awarded for outstanding contributions in fields like peace, literature, and science.
      16. – To break down into simpler components, often referring to organic material rotting or decaying.
      17. – The ability to learn, understand, and apply knowledge; also refers to information gathering in security contexts.
      18. – Having the intent to harm, deceive, or cause damage, often in a cruel or hostile way, such as a malicious virus or rumor.
      19. – A person who studies or researches the natural world through experiments, observations, and analysis.
      Down
      1. – The belief that all events are predetermined and inevitable, reducing the role of human free will in changing outcomes.
      2. – The quality of being exact, accurate, or carefully measured, important in science, engineering, and calculations.
      3. – A mentor, protector, or influential supporter; also used to describe a leader in organized crime or the head of a mafia family.
      4. – An electronic device that processes data, performs calculations, and executes programs to assist with various tasks.
      5. – The act of threatening to reveal damaging information unless demands, usually money or favors, are met.
      6. – A specific area of knowledge, control, or activity; in computing, it refers to internet addresses or data management spaces.
      7. – To collect, organize, and assemble information, data, or code into a structured form for reference or execution.
      8. – To move forward, improve, or develop in a particular field, skill, or situation.
      9. – A person skilled in computer systems who either breaks into networks illegally or uses their skills to improve security.
      10. – An independent being or organization with a distinct existence, such as a company, a legal body, or a living organism.
      11. – A biological agent, such as a virus or toxin, deliberately used as a weapon to cause harm or death.
      12. – Showing unfair preference or prejudice for or against something, often based on personal opinions rather than facts.
      13. – A beginner or someone with little experience in a particular activity, profession, or skill.
      14. – A possible effect, consequence, or suggestion that something is true or will happen.
      15. – The condition of being protected from harm, danger, or risk, ensuring security and well-being in various environments.
      16. – A weakness or flaw that makes something susceptible to harm, attacks, or exploitation, whether in security, health, or emotions.

      35 Clues: – A matter of interest, worry, or importance that requires attention or action.– To come into view, existence, or awareness, often after being hidden or unknown.– To move forward, improve, or develop in a particular field, skill, or situation.– A possible effect, consequence, or suggestion that something is true or will happen....

      IED 2.1.3,2.2.1-2.2.6 terms 2025-05-02

      IED 2.1.3,2.2.1-2.2.6 terms crossword puzzle
      Across
      1. embodies naturalness, simplicity, and subtle imperfection.
      2. The relationship of one thing to another in size, amount, etc. \
      3. The action or actions that an item is designed to perform.
      4. The process of taking something apart and analyzing its workings in detail.
      5. To separate into pieces.
      6. feature allows you to model threads on a cylindrical curved surface
      7. A two-dimensional contour that characterizes an object or area, in contrast to three-dimensional form.
      8. A system that has external interactions. Such interactions can take the form of information, energy, matter, or force transfers across the system boundary.
      9. Motion in which all particles of a body move with the same velocity along parallel paths.
      10. The property possessed by an object of producing different sensations on the eye as a result of the way it reflects or emits light.
      11. A group of interacting, interrelated, or interdependent elements or parts that function together as a whole to accomplish a goal. Change happens if you add or remove a part.
      12. An exchange of one thing in return for another: especially relinquishment of one benefit or advantage for another regarded as more desirable.
      13. Term used to talk about beauty or art and people's appreciation of beautiful things.
      14. Understanding a system by examining the connections between the parts that compose the entirety of the system.
      15. 3D modeling where geometry is created with association to other geometry.
      16. Term used to talk about beauty or art and people's appreciation of beautiful things.
      17. A product that already exists that does not need to be custom designed and produced.
      Down
      1. In geometry, a closed shape (or profile) is a shape or figure whose line segments and/or curves are connected or meet. They start and end at the same point.
      2. Turning around an axis or center point.
      3. A condition in which different elements are equal or in the correct proportions. There are three types of visual balance: symmetry, asymmetry, and radial.
      4. A sketch that shows an object's height, width, and depth in a single view.
      5. Having the three dimensions of length, width, and depth. Also referred to as a solid.
      6. A modeling strategy where an assembly model is created as a system of parts that are parametrically modeled within the assembly.
      7. A system that is isolated from its surroundings by a boundary that allows no transfer of matter, energy, force, or information across it.
      8. Information or signals entered into a computer system. Examples of an input device are a button, keys on a keyboard, touch screen, and accelerometer.
      9. A regularly recurring sequence of events or actions.
      10. The result of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics.
      11. A functional analysis is a step in the reverse engineering process which identifies the necessary activities or actions of components and subsystems to turn available inputs—such as materials and energy—into desired output. A functional analysis is conducted through careful observation of the object's sequential operation before it is disassembled.
      12. feature creates a form by revolving a closed profile around an axis
      13. method of harvesting or using a resource so that the resource is not depleted or permanently damaged and will still be available for future generations.
      14. is a thread created on the outside of a cylinder such as a bolt. An internal thread is a thread created on the inside of a hole like the threads in a nut
      15. A self-contained system within a larger system
      16. A group of parts that are connected and form one unit.
      17. A variable by which an object can move.
      18. A group of interacting, interrelated, or interdependent elements or parts that function together as a whole to accomplish a goal. Change happens if you add or remove a part.
      19. In science, computing, and engineering, a black box is a device, system, or object which can be viewed in terms of it inputs and outputs, without any knowledge of its internal workings.

      36 Clues: To separate into pieces.Turning around an axis or center point.A variable by which an object can move.A self-contained system within a larger systemA regularly recurring sequence of events or actions.A group of parts that are connected and form one unit.embodies naturalness, simplicity, and subtle imperfection....

      february 2025 2025-03-22

      february 2025 crossword puzzle
      Across
      1. The concept of Judicial Review in India is adopted from the Constitution of which country?(Use abbreviation).It is the power of court to examine the actions of the legislative, executive and administrative arms of the government and determine their constitutional validity.
      2. Currency of Thailand
      3. New CM of Delhi
      4. Iron Dome is which country’s short-range air defense system that intercepts rockets in the air.
      5. Which state is home to India’s first biopolymer plant.he plant will be built by Balrampur Sugar Mills Limited at a cost of ₹2,850 crore. It will produce biopolymers using biological methods, supporting eco-friendly industrial growth. The project aims to replace plastic with sustainable biopolymers, promoting environmental protection. This initiative aligns with India’s goal of self-reliance and sustainability.
      6. From which nation the Democratic Republic of Congo gained its independence in 1960?
      7. The Union Budget 2025-26 introduced the Bharatiya Bhasha Pustak Scheme to provide __ in Indian languages
      8. Which naval vessel is used for Navika Sagar Parikrama II?
      9. Govt of India has appointed former RBI Governor _ as Principal Secretary to Prime Minister Narendra Modi
      10. Capital of Philippines
      11. Who declared that the Sun was the Center of the Solar system and that the earth and other planets revolved around it?(Use 2nd name)
      12. Guwahati airport's new terminal design features a bamboo orchid theme reflecting the state’s biodiversity.
      13. Which country was the host of Artificial Intelligence (AI) Action Summit 2025?
      14. Kolleru Lake is located in which state?
      15. Asian Financial Crisis of 1997 started from which country
      16. India added _ new Ramsar sites on World Wetlands Day, February 2. The total number of Ramsar sites in India has now reached 89.
      Down
      1. Indian Air Force officer and ISRO astronaut _ was named the pilot for Axiom Mission 4 (Ax-4). Ax-4 is the fourth private astronaut mission to the International Space Station (ISS). The mission is organized by Axiom Space in collaboration with NASA. The crew will launch aboard a SpaceX Dragon spacecraft from NASA’s Kennedy Space Center. They will spend up to 14 days on the ISS conducting scientific research and technology demonstrations.
      2. The idea of French Revolution was based on “Liberty, Equality and ___
      3. Who has been named as the only Indian woman in TIME Magazine’s Women of the Year 2025 list?
      4. Which Indian city is home to Fort William, recently renamed Vijay Durg.Originally built in 1696 by the English East India Company, it was known as the “black hole of ___” after prisoners were held there. After being attacked in 1756, it was rebuilt by Robert Clive following the Battle of Plassey.
      5. Which organization has launched its first quantum computing chip called Majorana 1?
      6. Bart De Wever was sworn in as _ Prime Minister by King Philippe on 3rd February 2025.This country has a complex political system, divided into Dutch-speaking Flanders and French-speaking Wallonia. De Wever is the first nationalist Flanders leader to become PM.
      7. Dialogue is India’s top conference on geopolitics and geoeconomics
      8. Which country becomes the first nation to criminalize artificial intelligence child abuse tools?(Use abbreviation)
      9. Which country is the host of BRICS summit 2025?
      10. BrahMos NG missile is jointly developed by India and which country?
      11. The Finance Minister announced a ₹20,000 crore _ Mission to develop indigenous Small Modular Reactors (SMRs).SMRs are small, modular, and reactor-based, generating low-carbon electricity. They have small footprints, lower capital costs, and can be factory-built. SMRs can be deployed in locations unsuitable for large nuclear plants. They support incremental power additions, energy hubs, industrial heating, district heating, and hydrogen production.
      12. India established ____ through the National Tiger Conservation Authority (NTCA) under the Ministry of Environment, Forest & Climate Change (MoEFCC). It was launched on April 9, 2023, marking 50 years of Project Tiger. It aims to conserve seven big cats: Tiger, Lion, Leopard, Snow Leopard, Cheetah, Jaguar, and Puma.(Use abbreviation)

      28 Clues: New CM of DelhiCurrency of ThailandCapital of PhilippinesKolleru Lake is located in which state?Which country is the host of BRICS summit 2025?Which naval vessel is used for Navika Sagar Parikrama II?Asian Financial Crisis of 1997 started from which countryDialogue is India’s top conference on geopolitics and geoeconomics...

      Technology Hunt 2025-07-30

      Technology Hunt crossword puzzle
      Across
      1. Someone who uses technical skills to gain unauthorized access to systems or data.
      2. Sink Prevents the computer from overheating by cooling the CPU or GPU.
      3. Exploit An attack that targets a previously unknown software vulnerability.
      4. A weakness in a system that can be exploited by a threat actor.
      5. A set of instructions or programs that tells a computer what to do.
      6. A sequence of characters inside quotes (e.g., "hello").
      7. An error or flaw in software that causes it to not work correctly.
      8. Spaces at the beginning of lines that define blocks of code in Python.
      9. The main circuit board that connects all computer components.
      10. Captures video, often used for video calls and streaming.
      11. A collection of ordered items (e.g., fruits = ['apple', 'banana']).
      12. A name that stores a value, like a container (e.g., x = 5).
      13. A collection of data or information stored on a computer.
      14. Engineering Manipulating people into giving up confidential information.
      15. A type of social engineering where attackers trick users into revealing sensitive information.
      16. A block of reusable code that performs a specific task (e.g., def greet():).
      17. Computing Using internet-based services to store and access data and software.
      18. Malicious software designed to damage or gain unauthorized access to a computer.
      19. Breach An incident where sensitive information is accessed without authorization.
      20. Drive Long-term storage that uses spinning disks to store data.
      21. The process of converting data into a code to prevent unauthorized access.
      22. System (OS) The main software that manages computer hardware and other software (e.g., Windows, macOS, Linux).
      23. Software that secretly gathers user information without consent.
      24. Authentication (2FA) A security method that requires two types of identification to access a system.
      25. A change or improvement to software that can fix bugs or add new features.
      26. Interface Card Allows the computer to connect to the internet or a network.
      27. Access Memory Short-term memory where data is stored temporarily while programs run.
      Down
      1. Input device used to type text and interact with the computer.
      2. A small program that helps the operating system communicate with hardware devices.
      3. Software that detects and removes viruses and other malware.
      4. Displays the visual output from the computer.
      5. A potential danger that could exploit a vulnerability to cause harm.
      6. Card Handles audio input and output (often built into the motherboard).
      7. Processing Unit Handles rendering images, video, and animations; essential for gaming and design.
      8. Processing Unit The "brain" of the computer that performs calculations and runs programs.
      9. Captures audio for recording or communication.
      10. Used to include external code or libraries (e.g., import random).
      11. Supply Unit Converts electricity from the wall into usable power for the computer.
      12. A data type with two values: True or False.
      13. Drive Reads and writes data from CDs, DVDs, or Blu-rays (less common today).
      14. A software update that fixes security flaws or bugs.
      15. The likelihood that a threat will exploit a vulnerability and cause damage.
      16. State Drive Faster storage device with no moving parts used for storing files and programs.
      17. Statement Used to make decisions in code based on conditions (e.g., if x > 0:).
      18. Interface (UI) The part of the software that users interact with, like buttons and menus.
      19. Pointing device used to interact with items on the screen.
      20. (App) A software program designed to help users perform specific tasks (e.g., Word, Excel).
      21. Repeats a block of code (e.g., for or while loop).
      22. A security system that controls incoming and outgoing network traffic based on rules.
      23. Connection points on a computer to plug in external devices like keyboards or monitors.
      24. A whole number without a decimal (e.g., 10).
      25. Output device that plays sound from the computer.

      52 Clues: A data type with two values: True or False.A whole number without a decimal (e.g., 10).Displays the visual output from the computer.Captures audio for recording or communication.Output device that plays sound from the computer.Repeats a block of code (e.g., for or while loop).A software update that fixes security flaws or bugs....

      MIS ch. 8 2011-12-08

      MIS ch. 8 crossword puzzle
      Across
      1. intentional disruption/defacement/destruction of a web site or information system
      2. eavesdroppers drive by & try to intecept wireless network traffic
      3. the process of transforming plain text/data inot cipher text that cannot be read by anyone other than the sender and the intended reciever
      4. small peices of software to rapair software flaws without disturbing the proper operation of the software
      5. uses two keys; one public to encrypt; one private to decrypt
      6. conceals the ip addresses of the org's internal host computers to prevent sniffer programs (NAT)
      7. hackers flood a network server with thousands of false communications to crash the network (DoS)
      8. policies, procedures, and technical measures used to prevent hacking/theft
      9. computer infected with bot malware that allos the hacker to manipulate and order the computer
      10. authentication system that reads and interprets individual human traits
      11. small programs that install themselves on computers to monitor user web surfing and servve up ads
      12. examines the firm's overall security environment as well as controls governing individual info systems; trace the flow of transactions through the system
      13. malicious software programs including viruses, worms, and trojan horses
      14. individual who intends to gain unathorized access to a computer system
      15. a hacker with criminal intent
      16. intruders trick employees into revealing their passwords by prentending to be legitimate members of the company in need of info
      17. computer system that helps operators pinpoint the faults in the system and easily correct their mistakes
      Down
      1. rogue software program that attaches itself to other software programs or data files in order to be ennacted
      2. program code defects
      3. bus processes and software tools for identifying the valid users of a system and controlling their access to system resources
      4. monitors network activity and perform vulnerability testing and intrustion detection
      5. hackers misrepresenting themselves; redirect a web link to a different address than intended
      6. info system controls which are unique to each computerized application ; both automated and manual processes
      7. the ability to know that a person is who they claim to be
      8. full-time monitoring tools placed at the most vulnerable point of a corp network
      9. examines the application content of the packets
      10. methods, policies, and procedures that ensure the saftey of the org's assets; the accuracy of its records; and the adherance to mgt standards
      11. attacks largest malware threat; take advantage of vulnerabilities in poorly coded web application software to introduce malware into the network
      12. firewalls, virtual private networks, intrusion detection system, web content filtering and antispam software are examples of (UTM)
      13. info system controls which govern the design security and use of computer programs and the security of data files in general throughout the IT infrastructure
      14. examining data files and prioritizing them to decide which packet to continue processing and whcih to block or delay (DPI)
      15. software program that appears to be benign but then does something other than expected
      16. defines acceptable uses of the firm's info resources and computing equipment
      17. computer system that has redundant components that provides continuous uninterupted service
      18. act taht imposes responsibility on companies and their management to safeguard the accuracy & integrity of financial info used internally or released externally
      19. attack uses numerous computers to inundate and overwhelm the netowrk from multiple launch points (with acronym)
      20. independent computer programs that copy themselves from one computer to others over a network
      21. eavesdropping program that monitors info traveling over a network; can be sued for good
      22. a form of spoofing; setting up fake web sites or emails or text messages that look like those of legit businesses to ask users for personal data
      23. outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and transfer of data (acronym)

      40 Clues: program code defectsa hacker with criminal intentexamines the application content of the packetsthe ability to know that a person is who they claim to beuses two keys; one public to encrypt; one private to decrypteavesdroppers drive by & try to intecept wireless network trafficindividual who intends to gain unathorized access to a computer system...

      Technology Terms 2012-12-19

      Technology Terms crossword puzzle
      Across
      1. A sign that represents an object by resembling it
      2. site A page on the internet with information on a certain subject
      3. an operating system produced by Microsoft for use on personal computers
      4. Controls the pointer on the computer screen and lets you navigate through your computer
      5. An electronic device that generates a digital representation of an image for computer data input into a computer
      6. Term for all of the distinguished parts of a computer, as distinguished from the data it contains
      7. Allows one computer to connect to another computer and transfer data
      8. mail Online mailing system
      9. software Used to prevent, find, and remove malware like viruses
      10. A set of rules that allows computers to communicate with each other
      11. An optical DVD player designed to supersede the standard DVD format
      12. the number of pixels horizontally and vertically across the monitor
      13. The identification of printed characters using photoelectric devices and computer software
      14. A tablet computer that had a touch screen, developed by Apple.
      15. port A connector for a computer that can send and receive data by using more than one wire; connects peripherals
      16. drive A data storage device to transfer and carry data
      17. Disk A rigid magnetic disk fixed permanently within a drive unit and used for storing computer data
      18. A personal computer mostly used for regular use and at a single location
      19. phone A mobile phone that offers more advanced computing ability
      20. Any type of hardware that stores data
      21. A disc that can store a large amount of digital data like text, music, videos, or images
      22. The unit that sound, light, and radio waves are measured by
      23. The way something is arranged to appear of function
      24. flash drive A memory card that you stick into a USB port
      Down
      1. An area of anywhere form 120ft-300ft that has internet access by radio waves instead of wires
      2. A book you read on an electronic devise such as a kindle, iPod, or smart phone
      3. With is displayed on the screen is what will be printed out
      4. Any letter, number, space, punctuation mark, or symbol that can be typed on a computer
      5. up folder The logo at the bottom left corner of every PC
      6. A program that determines how a computer will communicate with an external hardware device
      7. Is equal to 1,000 kilobytes and precedes the gigabyte unit of measurement
      8. Any external device that provides input and output for the computer
      9. A hand held electronic device that lets you read books, play games, and on the internet.
      10. English keyboard consisting of Q-W-E-R-T-Y-U-I-O-P on the top row
      11. Contains files on your hard drive
      12. To copy files to a second media: disk, flash drive, ect.
      13. To save information on your computer or on a drive from the internet
      14. Acceptable Use Policy
      15. A very small picture element that makes up an image
      16. Messages exchanged by using computers to send texts, graphics, and sometimes sounds and animated images
      17. Connecting two or more computers in order to communicate and share data
      18. A lightweight consumer electronic device that looks like a handheld computer but instead performs a specific task
      19. Rom A Cd that can be read by a computer but not altered or deleted
      20. Instructions used to perform a specific task with a computer
      21. tray the tool bar on the bottom, right hand side of the screen that displays date, time, volume, ect.
      22. A computer that provides data to other computers
      23. up To restart a computer
      24. serial A pointing device that is used to move, select, and activate items on the computer screen by a click
      25. Any problem with operating systems of any technology

      49 Clues: Acceptable Use Policyup To restart a computermail Online mailing systemContains files on your hard driveAny type of hardware that stores dataA computer that provides data to other computersA sign that represents an object by resembling itA very small picture element that makes up an imageThe way something is arranged to appear of function...

      Cool Jobs: Data Detective 2014-02-27

      Cool Jobs: Data Detective crossword puzzle
      Across
      1. A technique that relies on a special type of machine to study brain activity. It uses a strong magnetic field to monitor blood flow in the brain. Tracking the movement of blood can tell researchers which brain regions are active (using oxygen).
      2. A term largely used in the business world to mean the interpretation of large quantities of data.
      3. An endangered species in the bear family, found in the wild only in China. It has a distinctive white body with black-coated limbs and dark spots around the eyes.
      4. Statistics applied to biology or medicine. When it’s used for neurology, it’s called neurostatistics.
      5. Unwanted and random variations that obscure or do not contain meaningful data.
      6. A measure of the amount of “spread” in a dataset to either side of its central, or mean, value.
      7. The use of an imaging technology, typically using X-rays or a magnetic resonance imaging (or MRI) machine, to view structures inside the brain. With MRI technology — especially the type known as functional MRI (or fMRI) — the activity of different brain regions can be viewed while the patient is doing something, such as viewing pictures, computing sums or listening to music.
      8. A metallic chemical element in the same family as silver and gold.
      9. Any of a large number of proteins that the body produces as part of its immune response. Antibodies neutralize, tag or destroy viruses, bacteria and other foreign substances in the blood.
      10. The field of research that explores the biological basis of injuries or disease and their treatments.
      11. A blend of two or more metals
      12. A subject that a student chooses as an area of focus in college, such as: chemistry, English literature, German, journalism, pre-medicine, electrical engineering or elementary education.
      13. A person who uses science to solve problems. As a verb, to engineer means to design a device, material or process that will solve some problem or unmet need.
      14. Something that occurs haphazardly or without reason, based on no intention or purpose.
      15. A description of some aspect of the natural world based on extensive observations, tests and reason. A theory can also be a way of organizing a broad body of knowledge that applies in a broad range of circumstances to explain what will happen. Unlike the common definition of theory, a theory in science is not just a hunch.
      Down
      1. A metallic alloy that consists primarily of copper and tin, but may include other metals. It is harder and more durable than copper.
      2. The science of interpreting data, and in particular reducing or estimating errors attributable to random variation.
      3. One of several measures of the “average” of a data set. Most commonly used is the arithmetic mean, obtained by adding the data and dividing by the number of data points.
      4. A medical compound consisting of a killed or inactivated disease-producing organism, or a compound that resembles the organism, which is intended to produce immunity to the disease.
      5. In statistics, a test used to determine whether an observed pattern in data is real or could be explained by random variations in the data.
      6. An advanced degree offered by universities — typically after five or six years of study — for work that creates new knowledge. People qualify to begin this type of graduate study only after having first completed a college (a program that typically takes four years of study).
      7. A metallic element, belonging to the same chemical family as lead, germanium, silicon and carbon.
      8. The study of the structure or function of the brain and other parts of the nervous system. Researchers in this field are known as neuroscientists.
      9. The ability of an organism to resist a particular infection or poison by producing and releasing special protective cells.

      24 Clues: A blend of two or more metalsA metallic chemical element in the same family as silver and gold.Unwanted and random variations that obscure or do not contain meaningful data.Something that occurs haphazardly or without reason, based on no intention or purpose....

      Vocabulary Chapter 2 2014-09-22

      Vocabulary Chapter 2 crossword puzzle
      Across
      1. allergy / immune system reaction that occurs soon after eating a certain food
      2. / crumbling soft friable earth suited to plant growth
      3. / careful examination or scrutiny
      4. safety management system / standard developed by the International Organization for Standardization dealing with food safety
      5. food / Commercially prepared food designed for ease of consumption
      6. time / The time the water is allowed to contain the disinfectant to assure potability.
      7. / make clean; remove dirt, marks, or stains from.
      8. pest management program / comprehensive information on the life cycles of pests and their interaction with the environment
      9. stemmed thermometer / common type of thermometer
      10. / When one food comes in contact with another food and their proteins mix
      11. Analysis Critical Control Point / systematic preventive approach to food safety from biological, chemical, and physical hazards in production
      12. / a person who receives or entertains other people as guests
      13. / microscopic living organisms
      14. populations / Specific group or subgroup that is more likely to be exposed, or is more sensitive to risk
      15. and thermistors / measuring devices
      16. outbreak / A food borne disease outbreak is a sudden increase in the number of cases of a particular illness that is associated with eating or handling a certain food
      17. limit / Specified safety limits which your Control Measures at Critical Control Points
      18. / the action or process of calibrating something.
      19. control operator / Person or company that applies pesticides as a business (e.g. exterminator); usually describes household services, not agricultural applications
      20. / taxonomic kingdom
      21. / bacterium, virus, or other microorganism that can cause disease
      22. abused / occurs when food is not stored or held at required temperatures
      23. / make clean and hygienic
      24. / an infective agent that typically consists of a nucleic acid molecule in a protein coat
      Down
      1. illness / an infection or irritation of the gastrointestinal tract caused by food or beverages that contain harmful bacteria, parasites, viruses, or chemicals.
      2. / Any person who handles or prepares food whether open (unwrapped) or packaged, even if physical contact is only a small part of their work.
      3. / a microscopic fungus consisting of single oval cells that reproduce by budding, and capable of converting sugar into alcohol and carbon dioxide
      4. food / food that requires time-temperature control to prevent the growth of microorganisms and the production of toxins
      5. control points / is the point where failure of standard operation procedure
      6. / a person or thing that cleans something
      7. / the process by which bacteria or other microorganisms are unintentionally transferred from one substance or object to another, with harmful effect.
      8. TOM / mnemonic device that is used in the food service industry to describe the six favorable conditions required for the growth of foodborne pathogens.
      9. / to soil, stain, corrupt, or infect by contact or association
      10. action / Identification and elimination of the causes of a problem
      11. first-out method / Means of computing equivalent units in a process cost system that accounts for the degree of completion of both beginning and ending inventories
      12. danger zone / temperature range in which food-borne bacteria can grow
      13. hygiene policies / refers to practices that lead to cleanliness and health preservation
      14. of food / The sequence of steps needed to transform raw materials and ingredients into manufactured food products
      15. / method that removes or destroys microorganisms on hands
      16. / a danger or risk
      17. / an organism which lives in or on another organism (its host) and benefits by deriving nutrients at the other's expense
      18. cleaning schedule / A detailed schedule that lists all cleaning tasks in an establishment, when and how the establishment is to be cleaned, and who will do the cleaning
      19. thermometers / a thermometer which infers temperature from a portion of the thermal radiation
      20. system / the organs and processes of the body that provide resistance to infection and toxins. Organs include the thymus, bone marrow, and lymph nodes

      44 Clues: / a danger or risk/ taxonomic kingdom/ make clean and hygienic/ microscopic living organisms/ careful examination or scrutinyand thermistors / measuring devices/ a person or thing that cleans somethingstemmed thermometer / common type of thermometer/ make clean; remove dirt, marks, or stains from./ the action or process of calibrating something....

      VEXcodeVR 2022-03-04

      VEXcodeVR crossword puzzle
      Across
      1. anything your robot does; there are 3 types
      2. a set of steps used to complete a task
      3. the grey category of code blocks; they are added to the program to describe what the code is doing, and they are ignored by the robot during runtime; they are just notes for the programmer and are not regarded as code
      4. a control flow statement loop that makes the robot repeat a conditional statement over and over again indefinitely
      5. under file in VEXcode VR, it is what to select to begin a new coding project (3 words, no spaces)
      6. a code statement or block that controls the flow of a program, such as a conditional statement or a loop (2 words, no space)
      7. a control statement that controls the flow of the program by pausing the program until a specific action or response is received (2 words, no space)
      8. the name of the blue box in VEXcode VR where you change and save the name of your program (2 words, no space)
      9. 1 of the 3 types of robot behaviors; this is a behavior at the highest level, and it is always composed of smaller behaviors
      10. the naming convention used to name your projects in VEXcode VR; instead of placing a space between each word, the first letter of each new word is capitalized
      11. the yellow control block used to end code in VEXcode VR (2 words, no space)
      12. the purple category of code blocks; it includes the blocks that set the robot pen color
      13. 1 of the 3 types of robot behaviors; it is a small behavior your robot can understand and perform directly
      Down
      1. the attempt to find errors in a program and then fix them
      2. the three colors that can be detected by the VEXcode VR robot using its Front Eye and its Down Eye; abbreviated RGB (3 words, no spaces)
      3. a control statement the controls the flow of the program by pausing the program for a set number of seconds
      4. a device that sends information or signals into a computer system, such as a robot (2 words, no spaces)
      5. a control flow statement that allows code to be executed repeatedly
      6. 1 of the 3 types of robot behaviors; it is a small, bite-sized behavior that allows your robot to perform a simple yet significant task; it is large enough to describe useful actions but small enough to code in ROBOTC
      7. the blue category of code blocks; it includes the blocks that tell the robot what direction to drive and turn and how fast to drive
      8. an embedded test environment where you can run your code to look for errors; it offers options to start, stop, and reset your program, as well as control the camera view
      9. input devices that provide robots information such as the distance to an object, the amount of light around the robot, the color the robot detects, or whether the robot has bumped into an object
      10. self-driving
      11. expressions in computing that evaluate to one of two values: true or false (2 words, no space)
      12. the yellow control block used to begin code in VEXcode VR (2 words, no space)
      13. a compact and informal description of a computer program; it is a hybrid of programming language and human language
      14. the light blue (turquoise) category of code blocks; some are shaped like a hexagon (to represent a yes/no question), and some are shaped like an oval (to represent a numeric value)

      27 Clues: self-drivinga set of steps used to complete a taskanything your robot does; there are 3 typesthe attempt to find errors in a program and then fix thema control flow statement that allows code to be executed repeatedlythe yellow control block used to end code in VEXcode VR (2 words, no space)...

      AP Calculus Vocabulary 2022-05-24

      AP Calculus Vocabulary crossword puzzle
      Across
      1. the largest value that a function has over a curve
      2. an interval which includes all of its limited points
      3. rectangles located on top-left vertices on a curve
      4. the lowest set of elements within a set
      5. the point where a curve changes from concave to convex (or convex to concave)
      6. a rule that helps in expressing the derivative of two different functions
      7. a rate of change in respect to a variable
      8. a straight line that is not there but divides a shape into two identical parts
      9. the region that is bounded by a function on a graph
      10. a value where a function approaches the output for a range of input values
      11. a section of the curve on a graph that increases its slope from left to right
      12. when a graph lies below its set of tangent lines
      13. a function that reverses a derivative
      14. a relation between two numbers where one input is equal to an output
      15. the limit of a definite integral as an endpoint approaches a real number
      16. the greatest set of elements within a set
      17. a cut-off that defines regions where the test statistic is unlikely to lie
      18. point a point in a curve where a direction change occurs
      19. a number that gets multiplied when there is an exponent
      20. a line that touches and matches a slope of a curve
      21. range of real numbers between two given numbers
      22. of a function that varies with no abrupt breaks or jumps
      23. when a function is formed when the original two functions are applied in succession
      24. the real number will always be the positive value of x regardless of the sign
      25. the function where f is the derivative of the derivative of f
      26. a line that defines the direction and steepness of a line
      Down
      1. a function whose derivative exists at each point in its domain
      2. values belonging to a set of data that continue on any value
      3. evaluating integrals and antiderivatives
      4. the power that a number has to be raised to in order to receive a different value
      5. a function whose value is the same for every input value
      6. computing the volume of a solid of revolution that is hollow about its axis
      7. a function whose value decreases as the independent variable increase over a given range
      8. a straight line where all of the fixed points of a rotating rigid body are around the other points where movement occurs in circles
      9. approximation the region under the graph of the function f(x) as a trapezoid and calculating its area
      10. the theory that states that if there is a function that is continuous on a closed interval, then there must be a maximum and minimum on that interval
      11. the derivative of a function’s velocity
      12. an area changes to revolve a formation of a solid around a revolution
      13. rectangles located on top-right vertices on a curve
      14. the lowest value that a function has over a curve
      15. point on the graph that is undefined
      16. a line that is not on the graph but gives guidance to x-values
      17. a method where you estimate a value of a function
      18. how much a function can change on average per unit over an interval
      19. involved variables that change at the same time
      20. vertical lines that are not on the graph but it is the range of values where a function does not cross
      21. a certain amount of numbers that are divided by that value
      22. lines where a curve of a function on a graph approaches infinity
      23. a set that is of a finite size
      24. when a function is the same on both sides

      50 Clues: a set that is of a finite sizepoint on the graph that is undefineda function that reverses a derivativethe lowest set of elements within a setthe derivative of a function’s velocityevaluating integrals and antiderivativesa rate of change in respect to a variablethe greatest set of elements within a setwhen a function is the same on both sides...

      System technology 2024-02-20

      System technology crossword puzzle
      Across
      1. An audio file (often in an MP3 format) that is made available to download for free or to purchase from the internet.
      2. Large rectangular board inside the computer case, containing circuitry with slots and connectors for the CPU, RAM, storage devices and peripherals to connect to it.
      3. Point Of Sale system – designed to speed up the sale of goods and services in the marketplace.
      4. A built-in connection to another place in a document (web page, resource), often indicated as text underlined in blue.
      5. Step-by-step solution used to solve a problem.
      6. The succession of folders, starting from the drive letter and separated by \ , that lead to the location of a specific file.
      7. The trend where separate technologies and functions that required different devices in the past are combined into one single device.
      8. Making copies of files with the aim of having extra copies of the files in case the originals get lost.
      9. A device used to connect computers in a network (e.g. a LAN) with cables so that communication can occur between the computers. It
      10. the highest number of pixels that the display supports, given by the number of horizontal pixels multiplied by the number of vertical pixels (e.g. 1920 x 1080).
      11. an interface that transmits high definition video and sound via a single cable.
      12. Input device in smartphones and tablets, used to detect which way around the device is held or how it is being moved.
      13. Temporary storage area for programs and data being processed in the computer.
      14. Optical Character Recognition – converts text in an image into editable text.
      Down
      1. A tip or information that pops up when you rest the pointer on an icon or object.
      2. A completely electronic alternative to the traditional hard drive. It uses the same technology as flash drives, making for very fast disk access.
      3. Downloadable update to an operating system – especially one that fixes bugs or security vulnerabilities.
      4. The ability of the operating system to load and process multiple tasks or processes at the same time.
      5. A special chip on the motherboard that holds the instructions needed to start the computer and load the operating system when you switch it on.
      6. A computer that provide services or resources to other computers (clients) that are linked in the network.
      7. A barrier between your computer and the internet. It checks which programs are trying to access your computer via the internet
      8. Additional data stored about a file that describes the contents of the file, such as the author and title of the file.
      9. Software that allows a computer to communicate with hardware or devices.
      10. The study and design of the workplace and the equipment used in the workplace for the comfort and safety of people in their work environments.
      11. A standard or technology that allows electronic devices to connect wirelessly and exchange data, simply by touching them together or bringing them close together
      12. Central Processing Unit – hardware component that processes all data and carries out all instructions.
      13. A policy where people are allowed to bring their own computing device (laptop, phone or tablet) to school or work and use it instead of relying on equipment owned or supplied by the school or company.
      14. A controller that connects the computer to a cabled network, allowing the computer to communicate with the network.
      15. End User Licence Agreement – a legally binding contract between a user and a software company. It describes what one may and may not do with the software.
      16. A test to determine whether it is a human being interacting with the computer
      17. A wireless technology that allows devices such as mice, printers and smartphones to communicate over a relatively short distance.

      31 Clues: Step-by-step solution used to solve a problem.Software that allows a computer to communicate with hardware or devices.A test to determine whether it is a human being interacting with the computerTemporary storage area for programs and data being processed in the computer.Optical Character Recognition – converts text in an image into editable text....

      Science, Technology, and Society 2020-05-14

      Science, Technology, and Society crossword puzzle
      Across
      1. is the average of many years of weather observation
      2. reduces soil erosion
      3. is a series of improvements in human life marked by inventions and discoveries
      4. "mother culture"
      5. is a patented brand of genetically modified (GM) fluorescent zebra fish with bright red, green, and orange fluorescent color
      6. The use of biotechnology to process and degrade a variety of natural and manmade substances
      7. has become one of the clearest indicators of life outcomes such as employment, income and social status, and is a strong predictor of attitudes and wellbeing
      8. unique system writing
      9. Developed system of mathematics & number system
      10. is an ancient writing system that was used in what is now the Philippines
      11. unconscious part of the mind that acts as our conscience.
      12. rich and valuable sources of new genes, proteins and metabolic processes with important applications for human benefits
      13. distributed, fast digital networks wired and wireless
      14. is the variety of all life forms
      15. rational self
      16. “people of the sun”
      17. literally means “to spell” in Tagalog
      18. refers to merging of what were three separate industries: telecommunications, computing, and electronics or broadcasting
      19. were invented which replaced human labor
      20. The sole purpose of the original event was to give the news of the Athenians having won over the Persians
      21. change and improvement
      22. first antibiotic
      23. using living organisms, or the products of living organisms, for human benefit to make a product or solve a problem
      24. were the first organisms to be modified in the laboratory, due to their simple genetics.
      25. A group, large or small, of people in a particular place and time who are linked by common goals and interests
      26. Giraffa camelopardalis
      27. using computers tostore,manipulate and transmit information in form of speech, text, data, and video more cheaply and faster than every before.
      28. built one of the largest & wealthiest empires in the world
      29. The natural world or ecosystem
      30. a two-way television
      31. attempting to convince others of your value judgment
      32. Made with pens made from reeds, mixed wit soot, beeswax and vegetable gum to make ink.
      Down
      1. is released by coal mining,landfills, and by agriculture, particularly through the digestive processes of beef and milk cows
      2. comes from the Latin word "Modo"
      3. raising finfish or shellfish in controlled conditions for use as food sources
      4. Mangifera indica
      5. can be useful for monitoring air quality and indicating environmental health
      6. floating gardens
      7. Solanum tuberosum
      8. a vast network of high speed wires and satellite relays linking computers worldwide
      9. Tarsius syrichta
      10. Identified as what is happening outdoors in a place at a given time
      11. Least priority in Maslow's hierarchy of human needs
      12. originally referred to a group of boats and their passengers who migrated to the Philippines
      13. knots tied to colored rope
      14. The Laws of Organic Life
      15. a situation that is a risk for a given population
      16. first mammal ever to have been cloned
      17. is the theory that explains how organisms have arisen and diversified from earlier organisms
      18. Panthera tigris
      19. ability to transfer genetic material to plants
      20. A species present in such small numbers that it is at risk of extinction
      21. “Rule by the people”
      22. is a wheeled motor vehicle used for transportation
      23. makes education and business much easier
      24. An organism exclusively native to a place or biota
      25. This is a way of freeing the unconscious mind or opening up drawers to remember vivid details of the past.
      26. Comes from the Latin word “scientia”
      27. an idea on which people hold different beliefs and values
      28. Comes from the Latin word “techne”
      29. unconconscious part of the mind
      30. Birthplace of the industrial Revolution

      62 Clues: rational selfPanthera tigrisMangifera indica"mother culture"floating gardensTarsius syrichtafirst antibioticSolanum tuberosum“people of the sun”reduces soil erosion“Rule by the people”a two-way televisionunique system writingchange and improvementGiraffa camelopardalisThe Laws of Organic Lifeknots tied to colored ropeThe natural world or ecosystem...

      Module Vocab 1 2020-03-02

      Module Vocab 1 crossword puzzle
      Across
      1. a system of Internet servers that support specially formatted documents.
      2. Having the same data in two or more locations.
      3. an input device is a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance.
      4. a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
      5. a program or piece of software designed and written to fulfill a particular purpose of the user.
      6. link (computers or other machines) to operate interactively.
      7. is a model of computer data storage in which the digital data is stored in logical pools
      8. the part of a computer in which data or program instructions can be stored for retrieval.
      9. combining two or more items or functions in a single unit.
      10. an extra copy of data from a computer.
      11. a server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web.
      12. the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket.
      13. a hypertext document connected to the World Wide Web.
      14. a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
      15. a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or wirelessly.
      16. the programs and other operating information used by a computer.
      17. a mobile electronic device that is designed primarily for the purpose of reading digital e-books.
      18. a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
      19. Wearable technology, wearables, fashion technology, tech togs, or fashion electronics are smart electronic devices that can be incorporated into clothing or worn on the body as implants or accessories.
      20. the study and practice of environmentally sustainable computing or IT.
      21. a machine for printing text or pictures onto paper, especially one linked to a computer.
      Down
      1. a location connected to the Internet that maintains one or more pages on the World Wide Web.
      2. cause (a set of data or files) to remain identical in more than one location.
      3. the ability to view the same multimedia content from different types devices.
      4. an application, especially as downloaded by a user to a mobile device.
      5. a small portable computer that accepts input directly on to its screen rather than via a keyboard or mouse.
      6. a series of coded software instructions to control the operation of a computer or other machine.
      7. a handheld electronic device for playing digital media such as audio and video files.
      8. a computer device that outputs a video signal or visual image to display a video game that one or more people can play.
      9. any piece of computer hardware equipment which converts information into human-readable form.
      10. a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
      11. an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections
      12. a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.
      13. a computer or computer program which manages access to a centralized resource or service in a network.

      34 Clues: an extra copy of data from a computer.Having the same data in two or more locations.a hypertext document connected to the World Wide Web.combining two or more items or functions in a single unit.link (computers or other machines) to operate interactively.the programs and other operating information used by a computer....

      Theory Keywords 2024-05-02

      Theory Keywords crossword puzzle
      Across
      1. memory used to ttemporarily store instructions of programs currently in use so they can be quickly accessed by the CPU
      2. a type of computer with a high level of performance as compared to a general-purpose computer
      3. is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular phone line
      4. an online place where people sharing the same interest can interact
      5. a networking device that forwards data packets to the correct network.
      6. the SQL keyword used to create a query
      7. a protocol used for automatically assigning IP addresses to clients
      8. the time it takes for a data packet to travel from a sender to a reciever
      9. a type of wired connection
      10. a type of low-cost and very easy to implement communication method, mostly used for IoT
      11. a type of software used by the user to perform specific tasks
      12. type of data thta can be organised in a database
      13. a networking device that connects end devices to a network
      14. a legal agreement between the software owner and the user that defines the terms and conditions for using the software
      15. system designed for a specific function within a larger system
      16. a type of diagram that depicts the steps in a process
      17. a type of software that are designed to manage system resources, hardware and other software
      18. a type of key in a database that uniquely identifies each record
      19. a quick-repair job for a piece of software designed to resolve functionality issues
      Down
      1. software that provides low-level control of computing device hardware
      2. Fetches, decodes and executes program instructions
      3. memory used to store computer start-up instructions
      4. an IP address that does not change
      5. a type of device that allows users to feed data into a computer system
      6. breaking down large problems into several smaller, simpler tasks. Often used for systems design.
      7. a type of secondary storage medium that uses laser beams to record and retrieve digital data
      8. a hardware device that connects to a computer and used to transfer information into and out of a computer
      9. a machine-readable code consisting of an array of black and white squares, typically used for storing URLs or other information for reading by the camera on a smartphone
      10. a type of encryption that uses two keys: a public key to encrypt and a private key to decrypt
      11. software with source code that anyone can inspect, modify, and enhance
      12. a diagram used to represent a flow of data through a process or a system
      13. a type of cable cables that carries digital audio and video signals over
      14. the tendency for separated technologies to become integrated into one device
      15. a measure of the maximum amount of data per second that can be transmitted over a network
      16. technology that uses a network of satellites and receiving devices used to determine the location of something on Earth
      17. a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network
      18. technology that consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter that allow for tracking or matching of an item or individual
      19. a type of secondary storage medium that stores data electronically and has no moving parts
      20. a type of website where the pages can be personalised for each user, and they can create accounts, post comments etc
      21. a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules

      40 Clues: a type of wired connectionan IP address that does not changethe SQL keyword used to create a querytype of data thta can be organised in a databaseFetches, decodes and executes program instructionsmemory used to store computer start-up instructionsa type of diagram that depicts the steps in a process...