networks Crossword Puzzles
Networking Concepts 2025-05-30
Across
- The type of network connects two or more computers located at distant places
- The process of building and maintaining connections with other individuals or organizations
- TOPOLOGY In this type of topology each device is connected to a central computer using a point-to-point connection
- Device that enables you to connect your computer to the available internet connection over the existing telephone lines
- TOPOLOGY In this type of topology network setups that consists of a group of star-figured workstations connected to a linear bus backbone cable
- The type of network is used to connect two or more computer within a room
- A network device used to connect all computers with each other
Down
- CARD Device used to physically attach a computer to a network to participate in network communication
- The type of network is used for communication among laptops, etc
- The example is City Cable Network
- A connecting device that provides a direct connection between the source and the destination
- A device that connects two different types of networks with each other
- TOPOLOGY I this type of topology each node is connected to every other node in the network
- TOPOLOGY In this type of topology all the nodes in the network are connected in a circular manner
- TOPOLOGY This type of topology uses only one main cable and all the nodes are directly connected to it
15 Clues: The example is City Cable Network • A network device used to connect all computers with each other • The type of network is used for communication among laptops, etc • A device that connects two different types of networks with each other • The type of network is used to connect two or more computer within a room • ...
OS & Utility Software 2020-01-31
Across
- can be used to filter between trusted and untrusted networks and prevent programs from communicating through the use of ports.
- involves rearranging the information on a disk so that files appear in continuous sequences of clusters. This will improve file access times.
- The storage drive is divided into a number of clusters. The table of contents serves as an address book, keeping a record of each file and the clusters used to store that file.
Down
- This allows the user to restore the system to a previous state which is saved as a ______.
- The OS usually ¬_______ storage media when it is connected to the computer.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- allow the user to allocate specific users and protects personal files and programs from unauthorised access.
- The software which is used to detect and remove the malwares from our computer system.
8 Clues: The OS usually ¬_______ storage media when it is connected to the computer. • The software which is used to detect and remove the malwares from our computer system. • This allows the user to restore the system to a previous state which is saved as a ______. • ...
Alert: Phishing Warning! 2023-01-30
Across
- A wireless access point that gives unauthorized access to secure networks.
Down
- going to your browser history and clearing your browsing data.
- The unauthorized access or retrieval of confidential or otherwise protected data.
- Software intended to damage a computing system or to take partial control over its operation.
- Small text-based bits of information about your browser that a web server saves.
- Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
- The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
- Information about an individual, such as social security number, age, race, phone number(s), medical information, financial information, and biometric data such as fingerprint records and retina scans.
8 Clues: going to your browser history and clearing your browsing data. • A wireless access point that gives unauthorized access to secure networks. • Small text-based bits of information about your browser that a web server saves. • The unauthorized access or retrieval of confidential or otherwise protected data. • ...
CROSSWORD 2022-05-12
Across
- The social network associated with the world of work par excellence. With more than 500 million users
- Network created in 2004 and with more than 2 billion active users. It is a free social network that allows you to upload photos, videos, publications or broadcast live.
- With nearly 800 million monthly active users, it's one of the most visual social networks.
Down
- It is characterized by its short and concise texts: each tweet does not exceed 240 characters.
- We are facing a network that is also an application and whose charm lies in the short duration of its videos: only 10 seconds per video, the same one that disappears after being seen by its recipients.
- Open and free platform for reading, publishing, writing and sharing publications online.
- An audiovisual content network where users can view, share, comment and publish videos.
- This is a social network of questions and answers that receives around 100 million visitors a month.
8 Clues: An audiovisual content network where users can view, share, comment and publish videos. • Open and free platform for reading, publishing, writing and sharing publications online. • With nearly 800 million monthly active users, it's one of the most visual social networks. • ...
Stay Compliance: Crossword Challenge 2024-10-03
Across
- Is a “type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return - 1 word (1 point)
- The best practice when receiving email from external party – Acronym (2 points)
- Any information that when used alone or combine with other information, identifies an individual - 2 words (1 point)
- The practice of manipulating people to gain confidential information through deception – 2 words (1 point)
Down
- Lilly’s code of business conduct - 3 words (2 points)
- Combines several methods of authentication (e.g., a password and a token) to provide greater security when proving your identity – Acronym (1 point)
- Fraudulent attempts to trick individuals into revealing sensitive information through fake emails or websites - 1 word (1 point)
- A program that was established to identify & manage potential risk posed to Lilly by associated third party – Acronym (1 point)
8 Clues: Lilly’s code of business conduct - 3 words (2 points) • The best practice when receiving email from external party – Acronym (2 points) • The practice of manipulating people to gain confidential information through deception – 2 words (1 point) • ...
Cross Community Crossword 2025-07-03
Across
- IAM Portfolio: Identity creation, modification, rights and roles assignment, identity deletion.
- IAM Portfolio: Human and non-human identities.
- Security Solution Group: At Computacenter we help our customers to establish reliable, scalable and secure methods with which to validate and assign authorisation requests.
Down
- IAM Portfolio: Configure and manage all certificates.
- Security Solution Group: We help organisations to implement the protection functions innate within core operating systems as well as supporting the adoption of CIS.
- Solution Area: We leverage AI to help our customers boost business growth by enhancing developer productivity and innovative application development, while optimising cloud infrastructure.
- IAM Portfolio: For workforce user and consumer.
- Solution Area: Successful organisations are exploiting the economies of speed offered by cloud adoption, next generation networks, AI and automation. They are also implementing extensive integrated security solutions to secure these new architectures, safeguard data and protect users embracing new ways of working.
8 Clues: IAM Portfolio: Human and non-human identities. • IAM Portfolio: For workforce user and consumer. • IAM Portfolio: Configure and manage all certificates. • IAM Portfolio: Identity creation, modification, rights and roles assignment, identity deletion. • ...
Unit 6 Security + 2022-04-07
Across
- uses labels for both subjects (users who need access) and objects (resources with controlled access, such as data, applications, systems, networks, and physical space)
- a list that identifies users or groups who have specific security assignments to an object.
- process of copying changes to Active Directory on the domain controllers.
- the verification of the issued identification credentials. It is usually the second step in the identification process and establishes that you are who you say you are.
- type of access that is allowed or denied for an object.
- a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.
- group of related domains that share the same contiguous DNS namespace.
- Account policies help you control the composition and use of passwords.
- set of configuration settings applied to users or computers.
- can be your role, position, or current project. This information can be used to determine policy and permission.
Down
- The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.
- collection of related domain trees.
- have limited permission
- The point at which the number of false positives matches the number of false negatives in a biometric system.
- developed by Microsoft, is a centralized database that contains user accounts and security information.
- have complete control of the system
- device or a file used to authenticate
17 Clues: have limited permission • collection of related domain trees. • have complete control of the system • device or a file used to authenticate • type of access that is allowed or denied for an object. • set of configuration settings applied to users or computers. • group of related domains that share the same contiguous DNS namespace. • ...
Social Justice Crossword 2022-09-29
Across
- ____ training data can be another source of algorithmic bias
- people are more prone to look for media that ____ what they already believe in
- Computer systems can be ____ based on who builds them, how they are developed, and how they are used.
- the digital divide can create barriers for access to ____ care
- algorithmic bias describes systematic and ____ errors in a computing system that create unfair outcomes
- _____ issues such as internet speeds and broadband coverage make it more difficult for certain communities to have access to the internet
- algorithmic bias often reflects ____ bias
- Bots on social networks like Twitter likely sit somewhere between five to ____ percent of users
Down
- "the media has little power to influence people and, most of the time, it just ____ our preexisting attitudes and beliefs"
- Left unexamined, value-laden software can have unintended ____ effects.
- Joseph ____, an American Sociologist most well known for his book "The Effects of Mass Communication"
- the digital divide mostly affects those of _____ socioeconomic status
- in the UK, one in ____ low-income households struggle to pay broadband bills
- automated social media accounts often used multiple ____ in an attempt to target global audiences
- During the 2016 US election more than fifty ____ Russia linked Twitter accounts posted automated content related to the election
- nearly 3.6 ____ people remain totally unconnected to the Internet
- According to Klapper, the only time the media can influence people is when the media introduces a ____ idea or concept.
17 Clues: algorithmic bias often reflects ____ bias • ____ training data can be another source of algorithmic bias • the digital divide can create barriers for access to ____ care • nearly 3.6 ____ people remain totally unconnected to the Internet • the digital divide mostly affects those of _____ socioeconomic status • ...
Immigration and Urbanization 2023-11-29
Across
- Type of violence experienced by immigrants as a result of immigration policies.
- Chains of densely populated areas that extend over long stretches of space.
- Urban areas with at least 10 million people.
- The Great ______: Movement of millions of African Americans, from 1900 to 1970, into cities outside the south.
- The largest number of new immigrants come from India, Mexico, the Philippines, El Salvador, and ______
- A group that hold values and engage in activities that separate them from wider society.
- _____ Capital: Tight connections that people form with each other through organizations, civic life, and strong social ties.
- Practice of outlining in red any sections of a city that were considered “risky” and rejecting loan applications in that area
- _____ Cities: Major urban areas that serve as nodes for the worldwide network of economic activity.
Down
- Movement of products, services, and information across national and continental boundaries.
- Social _____: Various types of connections that individuals form with other people, no matter where they’re located.
- Migration of Whites out of central city neighborhoods and into suburban communities (2 words)
- Ethnic ______: Section of a city where the local culture and labor market are dominated by a single ethnic group.
- Chicago New York, and ______ have the highest levels of segregation between Black and white people
- More than ___ million African Americans left the south between 1900-1970
- Unique ways of life found in cities.
- Growth in the proportion of a nation’s population living in cities.
17 Clues: Unique ways of life found in cities. • Urban areas with at least 10 million people. • Growth in the proportion of a nation’s population living in cities. • More than ___ million African Americans left the south between 1900-1970 • Chains of densely populated areas that extend over long stretches of space. • ...
Murder most horrid keywords 2012-03-21
Across
- A website that is a bit like a diary.
- Bullying Is when people send mean and nasty messages to others by text, email or on facebook and other websites.
- key A field that is in a database that allows a record to be looked at.
- Footprint A collection of actvities and a persons behaviour.
- Networking Site A website that allows you to interact with other people.
- A list of questions that is used to get information from your answers.
- view Something that lets you view the contents of a table. The table is a bit similar to a spread sheet.
- view A table or chart that shows field names and their data types.
Down
- Takes away any unwanted items on a computer.
- A set of rules to follow while on the internet.
- Use Policy Rules that apply to many transit networks.
- Means being safe on the internet.
- One piece of data that is about a person or a thing.
- A free e-learning software.
- merge A technique that lets you create documents and letters using a template.
- Is when a request has been asked for information from a certain database. Query is a search engine, so then when you type something into the search engine a list of answers will come up.
- A large record of data, that has links and that can be accessed by many different programs.
- When a list of items have been sorted out into an order for example from ‘A’ to ‘Z’.
- type When many types of data are called data types.
19 Clues: A free e-learning software. • Means being safe on the internet. • A website that is a bit like a diary. • Takes away any unwanted items on a computer. • A set of rules to follow while on the internet. • One piece of data that is about a person or a thing. • type When many types of data are called data types. • Use Policy Rules that apply to many transit networks. • ...
IT 2020-11-12
Across
- A collection of information organized so that a computer application can quickly access selected information; it can be thought of as an electronic filing system.
- Any software that covertly gathers user information, usually for advertising purposes.
- A group of interconnected computers capable of exchanging information.
- A program or computer that connects to and requests information from a server.
- A device used for connecting two Local Area Networks.
- The physical components of a computer including the keyboard, monitor, disk drive, and internal chips and wiring.
- A small piece of information you may be asked to accept when connecting to certain servers via a web browser.
- Software programs designed to damage or do other unwanted actions on a computer.
- A collection of data that has a name.
Down
- A wireless networking technology that allows users to send voice and data from one electronic device to another via radio waves.
- A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file.
- A functional unit that provides shared services to workstations or to other functional units over a data network.
- Any program that performs a specific function.
- The process of transferring one or more files from your local computer to a remote computer.
- Stands for one picture element.
- Central processing unit
- A name used in conjunction with a password to gain access to a computer system or a network service.
- A term that has commonly come to mean "connected to the Internet".
- Random Access Memory.
19 Clues: Random Access Memory. • Central processing unit • Stands for one picture element. • A collection of data that has a name. • Any program that performs a specific function. • A device used for connecting two Local Area Networks. • A term that has commonly come to mean "connected to the Internet". • A group of interconnected computers capable of exchanging information. • ...
AP Research Crossword Puzzle 2021-05-21
Across
- The body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- Written works of superior or scholarly merit.
- Unanswered questions or problems in others' research.
- A type of data collected in research that can be recorded as numbers or counts.
- The quality of being fair and following conduct.
- A shortcoming in research that influences the validity of a study’s conclusions or results.
- A type of data that is not numerical and often describes characteristics.
- The collection of information from a sample of people through their responses to questions.
- A unique series of numbers and letters assigned to every device connected to a computer network with the purpose of making an internet-connected device identifiable.
Down
- Statement or legal document where a company explains how a customer’s privacy and personal data will be handled.
- The moral rules researchers must follow to protect the safety of participants.
- The state of being protected from dangers or threats.
- A real-world effect of your argument.
- Tables that help organize qualitative data.
- The group of participants taken and used from the population that should be representative of the population as a whole.
- Tech corporation famous for devices such as the iPhone,iPad, and Macbook.
- The study of documents or other forms of text to determine the presence of certain words, themes, or concepts.
- Research method that combines quantitative and qualitative data.
- A prediction for a research study made before the research process was conducted.
19 Clues: A real-world effect of your argument. • Tables that help organize qualitative data. • Written works of superior or scholarly merit. • The quality of being fair and following conduct. • The state of being protected from dangers or threats. • Unanswered questions or problems in others' research. • Research method that combines quantitative and qualitative data. • ...
Payment option 2022-11-07
Across
- an amount of money that you pay regularly to receive a product or service
- A digital currency in which transactions are verified and records maintained by a decentralized system rather than by a centralized authority.
- a flat disc or piece of metal with an official stamp.
- An electronic device, online service, or software program that allows one party to make electronic transactions with another party bartering digital currency units for goods and services.
- Drawee is the person who _______________ the transaction
- An instruction to the bank to transfer funds to another account on a monthly basis
- A digital movement of money from one bank account to another
- It is a _______________ processing networks in the world.
Down
- a certificate or document that either allows you to purchase something or proves that you paid for something
- Credit is the ___________ of money now in return for the promise of paying it back later.
- When money is sent from one bank account to another.
- An online payment system that makes paying for things online and sending and receiving money safe and secure
- Drawee pays a ____________ a specific amount of money
- An assessment of likelihood that you will repay the debt based on past financial history and determines your creditworthiness
- An assessment of your actual payment history for a specific debt
- _______________ the value of an item is difficult
- The action of buying and selling goods and services
- A written communication ordering your bank, which you sign and give to another party as payment
- Swapping or exchanging one good for another without using coins and notes
19 Clues: _______________ the value of an item is difficult • The action of buying and selling goods and services • When money is sent from one bank account to another. • Drawee pays a ____________ a specific amount of money • a flat disc or piece of metal with an official stamp. • Drawee is the person who _______________ the transaction • ...
Marketing 2025-10-21
Across
- Data that is observed or collected first-hand specifically for the research project.
- Transporting of goods and services to the consumer.
- What are the target market’s preferences and expectations.
- Using data and research to make marketing decisions.
- Observing and reporting how consumers interact in a real-life setting.
- A study in which a small group of people is interviewed informally and a moderator observes interactions.
- The number of steps in the Marketing Research Process that include collecting data and making recommendations.
- Collecting data through mail, telephone, online, or social networks with a pre-created questionnaire.
- Are important to consider when designing a marketing campaign.
Down
- The development, design, and improvement of a good.
- Responding to questions verbally, usually more open-ended questions than a survey, provides more in-depth information, often one-on-one or in small groups.
- Setting a price based on perceived value and cost it takes to make the good or service.
- A small group of customers who are brought together to serve as sounding boards for new product ideas and to offer other insights.
- Using social media hashtags, analytics, and conversations to gather information that can be used to make business decisions.
- The process companies use to create, communicate, and deliver value to customers, with the goal of building customer relationships and achieving business objectives.
- Product, Price, Place, Promotion are all apart of what.
- Pursuing leads to make sales, building relationships, and communicating value to consumers.
- Raising brand awareness to encourage consumers to buy.
- Getting the money needed to run a marketing campaign.
19 Clues: The development, design, and improvement of a good. • Transporting of goods and services to the consumer. • Using data and research to make marketing decisions. • Getting the money needed to run a marketing campaign. • Raising brand awareness to encourage consumers to buy. • Product, Price, Place, Promotion are all apart of what. • ...
Intellectual Disabilities 2023-06-15
Across
- The process of using activities and other hands-on tasks to teach skills.
- Every task, skill or activity needs to be broken down into small steps
- It is used to reinforce the child positively every time he learns a new skill or performs or practices a known skill
- Refers to the "general mental ability that includes reasoning, planning, problem solving, abstract thinking, comprehending complex ideas, learning quickly and learning from experience"
- Is a disability characterized by significant limitations both in intellectual functioning and in adaptive behavior as expressed in conceptual, social, and practical adaptive skills.
Down
- The networks of people that can provide practical or emotional support
- What everyone uses to function in everyday life can be conceptual, social and practical
- Is when you bring children together in a group to teach various skills
- Disabilities It is a term used when there are limits to a person's ability to learn at an expected level and function in daily life.
9 Clues: The networks of people that can provide practical or emotional support • Every task, skill or activity needs to be broken down into small steps • Is when you bring children together in a group to teach various skills • The process of using activities and other hands-on tasks to teach skills. • ...
What is Digital Marketing? 2013-10-28
Across
- A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis.
- Publications that are regularly developed and distributed by businesses and organizations to their customers through the Internet.
- Commercial transactions conducted electronically on the Internet.
- A software application designed to run on smartphones, tablet computers and other mobile devices.
Down
- A set of related web pages served from a single web domain that connects to the Internet.
- A process of gaining traffic and visibility from search engines through both paid and unpaid efforts. It encompasses Search Engine Optimization and Pay Per Click campaign.
- The means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- A model, software, or strategy for managing a company’s interactions with current and future customers,for example, the introduction of Salesforce.com and marketing automation software to the company.
8 Clues: Commercial transactions conducted electronically on the Internet. • A set of related web pages served from a single web domain that connects to the Internet. • A software application designed to run on smartphones, tablet computers and other mobile devices. • ...
Aboriginal & Torres St Islander Spirituality 2013-05-26
Across
- Natural land formations where Aboriginal ancestral spirits interacted with creation.
- A flat piece of wood or stone that is swung around on a thong. Used in order to call Aboriginals to ceremonies or to imitate the voice of an ancestral being.
- Highly sophisticated networks of relationships governing interactions between members of Aboriginal clans.
- The exclusive title, rights and interests that Aboriginal people have in regard to land. Extinguishment of native title requires compensation.
- It holds the Aboriginal view of creation: the origins of the universe, the workings of nature and the nature of humanity, the cycle of life and death.
- The destruction, in whole or in part, or a national, ethnical, racial or religious group.
Down
- Governmental practices and policies that set Aboriginals physically apart from white settlements.
- The inherent rights of Aboriginals to their lands, forming the basis of a movement designed to ensure the preservation of Aboriginal spirituality and culture.
8 Clues: Natural land formations where Aboriginal ancestral spirits interacted with creation. • The destruction, in whole or in part, or a national, ethnical, racial or religious group. • Governmental practices and policies that set Aboriginals physically apart from white settlements. • ...
Cybersecurity Crosswords 2024-10-17
Across
- Any incident that results in unauthorized access to computer data, applications, networks or devices. It results in information being accessed without authorization
- Program that maliciously takes advantage of vulnerabilities or security flaws in software
- The act of disguising a communication from an unknown source as being from a known, trusted source by impersonating a domain
- Two or more ways of authentication e.g. pincodes,OTPs
Down
- The process of protecting information or data by scrambling it in such a way that only the parties who have the key to unscramble it can access it
- Fraudulent Email sent to people to share their personal info by pretending to be legitimate business or person
- A type of malware or malicious software that can replicate rapidly and spread across devices within a network
- Any kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages
8 Clues: Two or more ways of authentication e.g. pincodes,OTPs • Program that maliciously takes advantage of vulnerabilities or security flaws in software • Any kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages • ...
Global Entry Strategies 2024-09-18
Across
- An agreement in which a domestic firm buys part of a foreign firm or joins with a foreign firm to create a new entity.
- the domestic firm allows a foreign owner to recreate their entire business model in another country
- Active ownership of a foreign company or of manufacturing or marketing facilities in a foreign country.
- The basic institutions and public facilities upon which an economy’s development depends (such as transportation and communications networks, banks, and educational institutions)
Down
- The practice in which a foreign firm manufactures private-label goods under a domestic firm’s brand name.
- A sense of national consciousness that boosts the culture and interests of one country over those of all other countries.
- Selling domestically produced products to buyers in another country
- The legal process whereby a firm agrees to allow another firm to use a manufacturing process, trademark, patent, trade secret, or other proprietary knowledge in exchange for the payment of a royalty.
8 Clues: Selling domestically produced products to buyers in another country • the domestic firm allows a foreign owner to recreate their entire business model in another country • Active ownership of a foreign company or of manufacturing or marketing facilities in a foreign country. • ...
Managing Risk to Avoid Supply-Chain Breakdown 2013-03-24
Across
- This company lost over $400 million in sales because they employed a single sourcing policy and there was a fire at their only supplier.
- Risk Results from a mismatch between a company's projections and actual demand.
- Intellectual property risk has grown rapidly as supply chains become less...
- This risk refers to unanticipated increases in acquisition costs resulting from fluctuating exchange rates or supplier price hikes.
- Sears stock plummeted more than 30% in one day because of this type of risk.
- Managers can lower excess risks by making existing capacity more...
- If the level of risk is high, managers need to focus on this.
Down
- This can be countered by creating financial hedges, balancing cost and revenue flows by region and building flexible global capacity.
- A group exercise that helps managers and their companies understand and prioritize supply chain risks.
- This occurs when a supplier, through high utilization or another cause of inflexibility, cannot respond to changes in demand.
- The more a company networks its ___, the greater the threat that a failure anywhere can cause failure everywhere.
- For products with high holding costs and/or a high rate of obsolescence, using ___ suppliers is a better strategy.
- Natural disasters lead to this type of risk.
- Holding inventory is appropriate for __ products with relatively low holding costs.
- Distortion increases in the supply chain as you get farther away from the end consumer, known as the ___ effect.
15 Clues: Natural disasters lead to this type of risk. • If the level of risk is high, managers need to focus on this. • Managers can lower excess risks by making existing capacity more... • Intellectual property risk has grown rapidly as supply chains become less... • Sears stock plummeted more than 30% in one day because of this type of risk. • ...
Trends 2021 2021-01-11
Across
- Acronym for the current industry revolution.
- Term referring to new way for employees, starting with the acronym WFH
- Increasing cry amongst internet and social media users to protect their data _______.
- South Africa will receive 1 million doses of this from India at the end of January to combat Covid 19
- Customers continue to have high service expectations and have become smarter and more impatient. Companies must deliver on this (hint Cx)
- One of the larger international streaming partners available in South Africa
- A new standard currently being deployed in Radio Access Networks to reduce vendor lock in.
- A constant state of the unknown making it difficult to predict the future. Opposite of certainty.
- AWS, Google, Microsoft all offer this service where everything is hosted in the ______
- What comes after 4G? Vodacom and MTN launched it in 2020.
Down
- Umbrella tech term top of the IT agenda to ensure integrity and safety of network
- A freemium video and conferencing based tool which exploded in growth and subscriptions in 2020
- Two common words for new age term for machine learning often shortened to two letters
- Something most people make up in the beginning of January, but most broken later in the year
- New technology trend which is “smart” and happening closer to the source or locality (hint on the "----" of my seat)
15 Clues: Acronym for the current industry revolution. • What comes after 4G? Vodacom and MTN launched it in 2020. • Term referring to new way for employees, starting with the acronym WFH • One of the larger international streaming partners available in South Africa • Umbrella tech term top of the IT agenda to ensure integrity and safety of network • ...
Chapter 8 - Ryan Ly 2021-12-07
Across
- The original author or creator of the work retains ownership of the work and has the exclusive right to reproduce and distribute the creative work.
- hides within or is designed to look like a legitimate program
- the use of a computer or network without permission.
- a potentially damaging computer program designed to affect your computer negatively without your knowledge
- are moral guidelines that govern the use of computers, networks, and information systems
- acomputer program designed to protect your computer
- security system consisting of hardware and/or software that prevents unauthorized access to data and info on a network
- a malfunction of the computer
Down
- ULTIMATE SAFEGUARD Against System Failures
- A type of virus that uses macro language of an app (such as word processing or spreadsheet program) to hide virus codes. When the infected document is opened the macro virus loads into the memory.
- A type of virus that inserts virus code into program files, then spreads to any program that accesses the infected file
- A type of virus that replaces the boot program used to start the computer with a modified, infected version; it loads the virus into the computer's memory then
- unsolicited email/newsgroup posting sent to many recipients/newsgroups at once.
- a scam to obtain personal & financial information
- a program that copies itself repeatedly using up resources and possibly shutting down the computer.
15 Clues: a malfunction of the computer • ULTIMATE SAFEGUARD Against System Failures • a scam to obtain personal & financial information • acomputer program designed to protect your computer • the use of a computer or network without permission. • hides within or is designed to look like a legitimate program • ...
Márkus Dániel 2024-01-04
Across
- .....is a document for the World Wide Web that is identified by a unique uniform resource locator (URL)
- A .... is a part of a sentence that contains the person or thing performing the action (or verb) in a sentence.
- spam or junk email, is the name given to unwanted message
- the activity of exploring various websites and webpages using a web browser.
- electronic mail system
- you can make a web page using an HTML
- A ...., also known as a web address, is a standardised address for certain resources on the Internet.
- which may be displayed in a variety of sizes , styles and fonts
Down
- computer system capable of delivering web content to end users over the internet via a web browser.
- website, the browser retrieves its files from a web server and then displays the page on the user's screen
- the text was sent using regular text messaging ín phone
- the most usual music file format on the Web
- a .... is a piece of computer hardware or software that accesses a service made available by a server as part of the client–server model of computer networks.
- a wireless technology , to connect my phone to other devices at home or ín my office
- WWW or ... for short is a system of documents on the Internet, linked by so-called hyperlinks.
15 Clues: electronic mail system • you can make a web page using an HTML • the most usual music file format on the Web • the text was sent using regular text messaging ín phone • spam or junk email, is the name given to unwanted message • which may be displayed in a variety of sizes , styles and fonts • ...
Wyche 2024-02-22
Across
- is the permanent reduction of a company's labor force by removing unproductive workers or divisions.
- is a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts
- is coordinating, managing, and allocating human capital, or employees, in ways that move an organization's goals forward
- is means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- is the process of hiring someone from within your existing business structure to fill a vacant position for your company
- is meeting of people face to face, especially for consultation.
Down
- is filling up a job opening by hiring an appropriate candidate from outside of the company rather than hiring existing employees within the organization
- is a form you fill out for applying a job
- is an effort where job responsibilities and tasks are reviewed, and possibly re-allocated among staff, to improve output.
- is to encourage people to like, buy, use, do, or support something
- is the processes in which new hires are integrated into the organization
- is a quick summary of a person's relevant education and experiences
- is someone who works at a company or business
- is people who know you and can tell an employer positive things about you.
- is a person or organization that employs people
15 Clues: is a form you fill out for applying a job • is someone who works at a company or business • is a person or organization that employs people • is meeting of people face to face, especially for consultation. • is to encourage people to like, buy, use, do, or support something • is a quick summary of a person's relevant education and experiences • ...
UNIT06: THE INTERNET 2019-03-25
Across
- a text file created by web sites which contains personal information about an end user
- a predecessor to modern websites, these were early online communities that users could dial into using a modem
- any electronic cross-referencing document first prophesized by Vannevar Bush in 1945
- an organization which develops specifications and guidelines for the World Wide Web.
- The term for buying and selling goods and services over the world wide web
- developed by the military for defense purposes, this was the first global network with packet switching
- the address which specifies the location of a file on the Internet
Down
- a central high-speed network that connects smaller, independent networks
- a global hypertext system operating on the Internet that enables electronic communication of text and multimedia.
- the coding or tagging syntax used to write documents for web browsers
- The transfer a file or files from a remote computer to the user's computer
- A document cross-reference technique enabling the retrieval of a related document or resource simply by clicking on an underlined word or image.
- the unique name which identifies a web site.
- A symbol that uses the characters on a computer keyboard to convey emotion an email or instant message, such as the smiley face :)
- to transfer a file from a local computer to a remote computer
15 Clues: the unique name which identifies a web site. • to transfer a file from a local computer to a remote computer • the address which specifies the location of a file on the Internet • the coding or tagging syntax used to write documents for web browsers • a central high-speed network that connects smaller, independent networks • ...
1984 Crossword 2019-01-17
Across
- Offering nothing that is stimulating or challenging
- Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view
- Discover or identify the presence or existence of
- Systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum
- Intense and eager enjoyment, interest, or approval
- Of or characteristic of the middle class, typically with reference to its perceived materialistic values or conventional attitudes
- A secret plan by a group to do something unlawful or harmful
- Softened or matured by age or experience
Down
- Special words or expressions that are used by a particular profession or group and are difficult for others to understand
- A political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole
- The state or practice of refraining from extramarital, or especially from all, sexual intercourse
- The acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination
- The action of subjecting a country or person to one's control, or the fact of being subjected
- Showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with
- Fail to resist pressure, temptation, or some other negative force
15 Clues: Softened or matured by age or experience • Discover or identify the presence or existence of • Intense and eager enjoyment, interest, or approval • Offering nothing that is stimulating or challenging • A secret plan by a group to do something unlawful or harmful • Fail to resist pressure, temptation, or some other negative force • ...
Hailey 2019-11-05
Across
- A computer program or a piece of code that is loaded onto your computer without your knowledge and run against your consent.
- A virus that allows the attacker to control the infected users computer.
- Worm A Trojan horse that opens a backdoor in the computer which then allows it to be remotely controlled, while also installing a rootkit that hides the malicious program.
- Creates a backdoor on your computer that gives malicious users access to your system.
- Information stored on a computer that is exchanged between two users over telecommunications.
- A worm that could disrupt private and public services.
- An attack that occurs when multiple systems flood the bandwidth or resources of a targeted system.
- Cause harm to their host networks by consuming bandwidth and overloading web servers.
- A very damaging computer virus that affected Microsoft Windows-based computers.
Down
- The first virus to cause damage in the real world, designed to damage machinery.
- An attempt by a person or a group of people to obtain sensitive information.
- A collection of data or computer instructions that tell the computer how to work.
- A virus that is sent through email with the attachment labeled "I love you".
- A macro virus that is spread through email attachments.
- A Trojan malware which has the ability to modify the master Boot Record (MBR) of your computer.
15 Clues: A worm that could disrupt private and public services. • A macro virus that is spread through email attachments. • A virus that allows the attacker to control the infected users computer. • An attempt by a person or a group of people to obtain sensitive information. • A virus that is sent through email with the attachment labeled "I love you". • ...
AMAZE 1.0 2020-01-26
Across
- A Hollywood movie that explores the possibilities of coupling of AI and data analytics with humanity
- A scheme by Indian government that used analytics to predict the distribution centres of LPG gas in Indian villages
- An open source database management system
- Process of changing the weights and biases to minimize the difference between estimated and actual output in neural networks
- A speech recognition software used in windows
- 10 people take various subsets of data (from the same set) and create multiple prediction models. Later they combine all the results to determine the final prediction. This technique is called
- In the year 2054, this movie explores the possibility of predicting crime even before it happens
- The process of analysing historical performance to determine the cause and effect of the performance is called ________ Analytics
- A market research team assigns a variable ‘b’ to the responses to the question “Do you smoke?” What kind of a variable is b?
Down
- Name of the mother organization of tableau software
- Old name of Microsoft excel
- An analytical forecasting method that uses historical time steps as input and predicts future time steps using regression model
- Method of ensuring that the data used in a particular analysis is precise.
- A domain suffix used to anonymous search in dark web
- _____________Analysis A kind of analytical method used in predicting future share market prices.
15 Clues: Old name of Microsoft excel • An open source database management system • A speech recognition software used in windows • Name of the mother organization of tableau software • A domain suffix used to anonymous search in dark web • Method of ensuring that the data used in a particular analysis is precise. • ...
Negotiations 2020-04-16
Across
- What is the negotiation style where the goal is to maximize the share of resources is the goal?
- How much you believe that you can rely on the other party to be truthful with you
- Small actions or behaviors that seem inconsequential in the moment but affect how we relate to one another.
- What is the kind of interest that is based on maintaining a current or creating a future relationship between the parties?
- What kind of power is based on a position of authority?
- What is a negotiation that is a win-lose
- Ranking what is most to least important
Down
- Trying to figure out how resources can meet both sides' demands is called what?
- The method used to convey a message is called what?
- What is it called when power is used to work together?
- This an example of what: “I need the report by Friday for the presentation”
- When someone has specialized knowledge, they have what type of power?
- What is it called when someone views potential outcomes of their decisions differently relative to an earlier status quo?
- , What is it called when you are receiving the message while providing no feedback to the sender?
- Competitive bargaining, misrepresentation to opponent’s networks, inappropriate info collection, emotional manipulation, bluffing, and misrepresentation are examples of what
15 Clues: Ranking what is most to least important • What is a negotiation that is a win-lose • The method used to convey a message is called what? • What is it called when power is used to work together? • What kind of power is based on a position of authority? • When someone has specialized knowledge, they have what type of power? • ...
puzzle-corner-5 2024-09-22
Across
- A software application used to access and navigate the internet, displaying web pages.
- The process of transferring data from a remote server to a local device.
- Unsolicited and often irrelevant messages sent over email or other communication platforms.
- The process of converting information or data into a code to prevent unauthorized access.
- A centralized repository that stores large amounts of structured data for analysis and reporting.
- Uniform Resource Locator, the specific address used to access a resource on the internet.
Down
- A set of rules governing the exchange of data between devices in a network.
- A small piece of data stored on a user's device by a web browser, used to remember user preferences and login information.
- The practice of securing information by transforming it into an unreadable format for unauthorized users.
- A technique used to trick individuals into revealing sensitive information by masquerading as a trustworthy source.
- A human-readable address used to access websites, such as www.example.com.
- A unit of digital information equivalent to approximately one billion bytes.
- Private Network A service that creates a secure and encrypted connection over a less secure network, such as the internet.
- A copy of data stored separately to prevent loss in case of failure or corruption.
- Malicious software designed to harm, exploit, or otherwise compromise computer systems and networks.
15 Clues: The process of transferring data from a remote server to a local device. • A human-readable address used to access websites, such as www.example.com. • A set of rules governing the exchange of data between devices in a network. • A unit of digital information equivalent to approximately one billion bytes. • ...
1984 2023-01-23
Across
- fail to resist pressure, temptation, or some other negative force.
- the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination.
- special words or expressions that are used by a particular profession or group and are difficult for others to understand.
- the action of subjecting a country or person to one's control, or the fact of being subjected.
- intense and eager enjoyment, interest, or approval.
- information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- the state or practice of refraining from extramarital, or especially from all, sexual intercourse.
Down
- of or characteristic of the middle class, typically with reference to its perceived materialistic values or conventional attitudes.
- systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- a secret plan by a group to do something unlawful or harmful.
- discover or identify the presence or existence of.
- a political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole.
- offering nothing that is stimulating or challenging.
- showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with.
- easy-going and relaxed.
15 Clues: easy-going and relaxed. • discover or identify the presence or existence of. • intense and eager enjoyment, interest, or approval. • offering nothing that is stimulating or challenging. • a secret plan by a group to do something unlawful or harmful. • fail to resist pressure, temptation, or some other negative force. • ...
HOIIIYA 2023-01-25
Across
- offering nothing that is stimulating or challenging
- intense and eager enjoyment, interest, or approval.
- information especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with.
- fail to resist pressure, temptation, or some other negative force.
- the state or practice of refraining from extramarital, or especially from all, sexual intercourse.
- of or characteristic of the middle class, typically with reference to its perceived materialistic values or conventional attitudes.
Down
- systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination.
- a secret plan by a group to do something unlawful or harmful.
- a political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole.
- the action of subjecting a country or person to one's control, or the fact of being subjected.
- special words or expressions that are used by a particular profession or group and are difficult for others to understand.
- discover or identify the presence or existence of.
- easy-going and relaxed
15 Clues: easy-going and relaxed • discover or identify the presence or existence of. • offering nothing that is stimulating or challenging • intense and eager enjoyment, interest, or approval. • a secret plan by a group to do something unlawful or harmful. • fail to resist pressure, temptation, or some other negative force. • ...
1984 2023-01-31
Across
- offering nothing that is stimulating or challenging.
- tube systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time, especially as a result of political indoctrination.
- of or characteristic of the middle class, typically with reference to its perceived materialistic values or conventional attitudes.
- softened or matured by age or experience.
- the state or practice of refraining from extramarital, or especially from all, sexual intercourse.
- the action of subjecting a country or person to one's control, or the fact of being subjected.
- intense and eager enjoyment,interest,or approval.
Down
- words or expressions that are used by a particular profession or group and are difficult for others to understand.
- discover or identify the presence or existence of.
- fail to resist pressure, temptation, or some other negative force.
- a political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole.
- information,especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with.
- a secret plan by a group to do something unlawful or harmful.
15 Clues: softened or matured by age or experience. • intense and eager enjoyment,interest,or approval. • discover or identify the presence or existence of. • offering nothing that is stimulating or challenging. • a secret plan by a group to do something unlawful or harmful. • fail to resist pressure, temptation, or some other negative force. • ...
What is Digital Marketing? 2013-10-28
Across
- A process of gaining traffic and visibility from search engines through both paid and unpaid efforts. It encompasses Search Engine Optimization and Pay Per Click campaign.
- Publications that are regularly developed and distributed by businesses and organizations to their customers through the Internet.
- Commercial transactions conducted electronically on the Internet.
- A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis.
Down
- The means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- A set of related web pages served from a single web domain that connects to the Internet.
- A model, software, or strategy for managing a company’s interactions with current and future customers,for example, the introduction of Salesforce.com and marketing automation software to the company.
- A software application designed to run on smartphones, tablet computers and other mobile devices.
8 Clues: Commercial transactions conducted electronically on the Internet. • A set of related web pages served from a single web domain that connects to the Internet. • A software application designed to run on smartphones, tablet computers and other mobile devices. • ...
Technology Terminologies 2023-04-28
Across
- The process of designing, writing, testing, and maintaining computer programs.
- A programming language used to create interactive web pages and web applications.
- The process of encoding data in a way that can only be accessed by authorized parties.
- The process of creating a virtual version of something, such as a computer system or network.
- A set of instructions written in a programming language that a computer can execute.
- A programming language used to manage and manipulate relational databases.
- A collection of data that can be accessed, managed, and updated by a computer.
- The language used to create web pages and define their structure and content.
- A step-by-step process for solving a problem or completing a task.
Down
- The practice of protecting computer systems and networks from digital attacks, theft, and damage.
- A group of interconnected devices and computers that can communicate and share resources.
- The practice of securing communication and data through techniques such as encryption and decryption.
- The part of a website or application that the user interacts with directly.
- A collection of programs and data that perform a specific task or set of tasks on a computer.
- Data that describes other data, such as information about a file's format, size, or author.
- A set of practices that combines software development and IT operations to streamline software delivery.
- A security system that monitors and controls incoming and outgoing network traffic.
- The latest version of HTML, used to create modern web pages and applications.
- Refers to the design and user experience of software or applications.
19 Clues: A step-by-step process for solving a problem or completing a task. • Refers to the design and user experience of software or applications. • A programming language used to manage and manipulate relational databases. • The part of a website or application that the user interacts with directly. • ...
GEEC111 Gender and Society Midterm Exam 2023-11-07
Across
- Campaign for the equality of access and provision in education and employment opportunities.
- An umbrella term for all theorists who critique modernism and the humanistic assumptions that are attached to it.
- The girl power movement
- Feminists who argued that women’s liberation cannot be achieved by the theoretical framework and political practice of liberalism that create provision for the rights of abstract individuals irrespective of their gender relation and social class
- A struggle for political rights.
- Women’s subordination was neither biologically natural nor God-given
- The theoretical watchword for male domination.
- Age of social media.
- In her writing, she emphasized the need for women to be rational and educated for human virtue to progress and for improvement in knowledge to happen.
Down
- The child’s separation from the mother.
- Recognized the problems identified by Marxist and radical feminisms and created a holistic approach to understand their relations.
- The personal is political.
- The practice of attaching categories to individuals has resulted for them to perform in a predictable way in their interaction with other people.
- Is a theory about social life and human experience that investigates the conditions and experiences of women in society.
- The rise of Social Media Activism.
- Energizes social movements in its creation of online petitions, consciousness-raising groups, and pressing contents on social networks.
- Creates a virtual space where survivors of inequality could co-exist together in a community that acknowledges their pain, narrative, and isolation.
- The root of oppression and women subordination.
- #YesAllWomen, #HobbyLobby, and #AskHerMore
- Women’s right to vote.
20 Clues: Age of social media. • Women’s right to vote. • The girl power movement • The personal is political. • A struggle for political rights. • The rise of Social Media Activism. • The child’s separation from the mother. • #YesAllWomen, #HobbyLobby, and #AskHerMore • The theoretical watchword for male domination. • The root of oppression and women subordination. • ...
Global Supplychain 2025-11-05
Across
- Which term do Harland et al. use for their classification of supply networks by dynamics and focal-firm influence?
- In the IMP lens used for the IKEA case, what process among firms drives network change and sourcing outcomes?
Down
- What is the EU mechanism that applies a carbon price to certain imports based on embedded emissions (abbr.)?
- Which aluminium profile company acted as IKEA’s tier-1 assembler for PAX sliding doors in the case study?
- Fill in the blank from Trent & Monczka: “Global ______ is the coordinated, cross-location procurement approach beyond ad-hoc international purchasing.”
- Which performance dimension triggered joint problem-solving when early Chinese glass supplies struggled in the IKEA case?
- What is the general term for exposure to disruption or loss—e.g., from floods in supplier regions or from not funding a capability?
7 Clues: Which aluminium profile company acted as IKEA’s tier-1 assembler for PAX sliding doors in the case study? • What is the EU mechanism that applies a carbon price to certain imports based on embedded emissions (abbr.)? • In the IMP lens used for the IKEA case, what process among firms drives network change and sourcing outcomes? • ...
IT 2020-11-12
Across
- A collection of information organized so that a computer application can quickly access selected information; it can be thought of as an electronic filing system.
- Any software that covertly gathers user information, usually for advertising purposes.
- A group of interconnected computers capable of exchanging information.
- A program or computer that connects to and requests information from a server.
- A device used for connecting two Local Area Networks.
- The physical components of a computer including the keyboard, monitor, disk drive, and internal chips and wiring.
- A small piece of information you may be asked to accept when connecting to certain servers via a web browser.
- Software programs designed to damage or do other unwanted actions on a computer.
- A collection of data that has a name.
Down
- A wireless networking technology that allows users to send voice and data from one electronic device to another via radio waves.
- A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file.
- A functional unit that provides shared services to workstations or to other functional units over a data network.
- Any program that performs a specific function.
- The process of transferring one or more files from your local computer to a remote computer.
- Stands for one picture element.
- Central processing unit
- A name used in conjunction with a password to gain access to a computer system or a network service.
- A term that has commonly come to mean "connected to the Internet".
- Random Access Memory.
19 Clues: Random Access Memory. • Central processing unit • Stands for one picture element. • A collection of data that has a name. • Any program that performs a specific function. • A device used for connecting two Local Area Networks. • A term that has commonly come to mean "connected to the Internet". • A group of interconnected computers capable of exchanging information. • ...
Cell Search 2013-10-14
Across
- has 9 microtuble doublets arranged in a circle around two central microtubles (has a 9+2) pattern
- controls microtuble construction
- formerly called microfilaments, they are long extremely thin fibers that occur in bundles or meshlike networks
- contain a limited amount of genetic material and divide by splitting their DNA
- this part of the cell is highly organized, and it contains actin filaments, microtubles and intermediate filaments
- molecules joined to form a thick filament
- prokaryotes have a single chromosome (loop of DNA) located within the region and is not bounded by membrane
- Some bacterias have this, which are short appendages that help them to attach to an appropriate surface
- Cytoplasmic myosin tails are bound to membranes, but the heads still interact with actin
Down
- Most prokaryotes have small accesory rings of DNA
- Actin filaments are involved in the movement of cells and its organelles by the motor molecule called?
- ropelike assemblies of fibrous polypeptides that support the nuclear envelope and the plasma membrane
- In some bacteria, the cell wall is further surrounded by a slime layer also called this
- other major type of cell, do not have a nucleus as Eukaryotic cells do, Archaea and bacteria are this type of cell
- short cylinders with a 9+0 pattern of microtuble triplets
- Initiates polymerization of the 9 outer doublets of a cilium or flagellum
- proteins that derive energy from ATP to propel themselves along a protein filament or microtuble
- hair like projections that can move either like a whip of stiff like an oar
- all organisms are composed of this
19 Clues: controls microtuble construction • all organisms are composed of this • molecules joined to form a thick filament • Most prokaryotes have small accesory rings of DNA • short cylinders with a 9+0 pattern of microtuble triplets • Initiates polymerization of the 9 outer doublets of a cilium or flagellum • ...
LCaravelli-Network Devices 2023-01-04
Across
- switches come with additional features that the network administrator can configure to improve the network
- a method for powering devices that do not have a battery or access to a power outlet
- bridges and hubs are now considered legacy devices because of the benefits and low cost of ________
- does not allow packets to enter the target system without first being analyzed
- provides the physical connection to the network at the PC or other end device
- a device in the cloud that allows network administrators to manage network devices
- networking systems that are no longer supported but are still in operation in today’s networks
- a generic name for an all in one network appliance
Down
- a more common term for power over ethernet
- security should be top of mind when the technician recommends and installs this type of system
- typically responsible for monitoring all you end devices on your network
- passively monitors traffic on the network
- Every device on a network has a unique media access control ___ address
- uses various techniques for determining what is and what is not permitted in a network segment
- In the early days of networking, solutions like using repeaters, hubs, and bridges were created to add more _______ to the network
- commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility
- receives data from one port and sends it to all other ports
- its main purpose is to regenerating weak signals
- introduced to divide LANs into segments
19 Clues: introduced to divide LANs into segments • passively monitors traffic on the network • a more common term for power over ethernet • its main purpose is to regenerating weak signals • a generic name for an all in one network appliance • receives data from one port and sends it to all other ports • Every device on a network has a unique media access control ___ address • ...
Communication 2022-05-05
Across
- a person who gets or accepts something that has been sent or given to them.
- information, especially of a biased or misleading nature.
- means of doing something.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- the use of telecommunication devices to hold discussions between participants in different locations.
- practice of working from home, making use of the internet, email, and the telephone.
- communication over a distance by cable, telegraph, telephone, or broadcasting.
Down
- a statement or representation published without just cause and tending to expose another to public contempt.
- the activity or profession of writing for newspapers, magazines, or news websites or preparing news to be broadcast.
- the practice of taking someone else's work or ideas and passing them off as one's own
- the omission or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security.
- the action or process of delivering a message.
- a verbal, written, or recorded communication sent to a recipient.
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- convert message into intelligible language.
- a person who sends or transmits a message.
- means of sending or receiving information.
- Agency an organization that collects news items and distributes them to newspapers or broadcasters.
- to convert information from one system of communication into another.
19 Clues: means of doing something. • a person who sends or transmits a message. • means of sending or receiving information. • convert message into intelligible language. • the action or process of delivering a message. • information, especially of a biased or misleading nature. • a verbal, written, or recorded communication sent to a recipient. • ...
computer science 2025-09-18
Across
- tools, machinery, and other durable equipment.
- an external hardware device, like a keyboard, mouse, or printer, that connects to a computer to expand its capabilities or make it easier to use
- a unique numerical label assigned to each device on a computer network that uses the Internet Protocol for communication
- a computer or program on a network that provides resources, data, services, or programs to other computers or devices, called clients
- Solid State Drive
- Universal Serial Bus
Down
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
- a vast network of physical objects that are embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the internet
- the core software that manages all the hardware and software resources of a computer or device, acting as an intermediary between the user and the machine's physical components
- the main printed circuit board (PCB) in a computer.
- "brain" of a computer or electronic device, responsible for executing commands and processing data from software and operating systems.
- random-access memory
13 Clues: Solid State Drive • random-access memory • Universal Serial Bus • tools, machinery, and other durable equipment. • the main printed circuit board (PCB) in a computer. • a unique numerical label assigned to each device on a computer network that uses the Internet Protocol for communication • ...
Computer Terms 2013-11-12
Across
- A computer that serves as the main connection point for other computers or terminals.
- Program that checks the information of the web page and restricts it in case that it is insecure.
- The most important program that runs on a computer. It also recognizes input from the keyboard, sends output to the display screen, and controls peripheral devices such as disk drives and printers.
- Malicious programs that make copies of themselves over and over, on the local drive, network, email, or Internet.
Down
- Used in remote controls, it carries data signals for a short distance and a clear line of sight.
- Malicious programs that make copies of themselves over and over, on the local drive, network, email, or Internet.
- Used for television and computer networks. It converts data into pulses of light that flashes through the cables.
- A device that is physically connected to your computer or something that can be physically touched.
8 Clues: A computer that serves as the main connection point for other computers or terminals. • Used in remote controls, it carries data signals for a short distance and a clear line of sight. • Program that checks the information of the web page and restricts it in case that it is insecure. • ...
Insider Threat 2022-08-25
Across
- Warning signs of an insider being at risk of becoming an insider threat might include change in an insider's ____
- Additional warnings signs might include accessing or downloading data outside of their unique ____
- A consequence of insider threats, in addition to theft or sabotage to an organization, includes damage to an organization's ______
- Insider of this type exposes an organization to a threat through knowingly engaging in risky or careless actions that go against best practices or policies
Down
- Insider of this type consciously engages in actions to harm an organization typically for personal benefit or personal grievance
- Insider of this type causes an unintended risk to an organization through a mistake
- Anyone who has or had access to or knowledge of an organization's assets (including: personnel, facilities, information, systems, or networks)
7 Clues: Insider of this type causes an unintended risk to an organization through a mistake • Additional warnings signs might include accessing or downloading data outside of their unique ____ • Warning signs of an insider being at risk of becoming an insider threat might include change in an insider's ____ • ...
Online Communication and Identity 2025-07-22
Across
- – A digital image or icon used to represent a user in online communities, games, or social networks.
- – A unique name chosen by a user to identify themselves on a digital platform or online account.
- – A digital tool used to change or enhance photos or videos by adding effects, colors, or altering appearances.
- – A written response or message posted by a user to express thoughts or feedback on digital content such as videos, posts, or articles.
Down
- account – An online profile created with false information, often used to deceive, impersonate, or mislead others.
- – A humorous or viral image, video, or piece of text that is copied and spread rapidly by internet users, often with slight variations.
- – The characteristics, traits, and information that define who someone is, including how they present themselves online.
7 Clues: – A unique name chosen by a user to identify themselves on a digital platform or online account. • – A digital image or icon used to represent a user in online communities, games, or social networks. • – A digital tool used to change or enhance photos or videos by adding effects, colors, or altering appearances. • ...
What is Digital Marketing? 2013-10-28
Across
- A process of gaining traffic and visibility from search engines through both paid and unpaid efforts. It encompasses Search Engine Optimization and Pay Per Click campaign.
- A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis.
- Publications that are regularly developed and distributed by businesses and organizations to their customers through the Internet.
- Commercial transactions conducted electronically on the Internet.
Down
- A software application designed to run on smartphones, tablet computers and other mobile devices.
- The means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- A set of related web pages served from a single web domain that connects to the Internet.
- A model, software, or strategy for managing a company’s interactions with current and future customers,for example, the introduction of Salesforce.com and marketing automation software to the company.
8 Clues: Commercial transactions conducted electronically on the Internet. • A set of related web pages served from a single web domain that connects to the Internet. • A software application designed to run on smartphones, tablet computers and other mobile devices. • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- An area of data protection that concerns the proper handling of sensitive data
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Extortion software that can lock your computer and then demand a ransom for its release.
Down
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
8 Clues: An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
Apple TV App 2020-06-05
Across
- You can stream AppleTV app through your Samsung _____ TV, Roku, or Fire TV if you don't have an Apple device.
- In this tab in the Apple TV app you can get suggestions on what to watch, resume from where you left off, or see curated playlists of content.
- In this tab you can see what shows you have downloaded episodes of that you can watch offline.
- Oprah's book club releases episodes on Apple TV+ every ____ months.
Down
- In this tab you can type in a network, movie, tv series, actor/actress name, or any keywords to narrow down to specific results.
- With this app you can watch originals from Apple TV+ as well as shows from any other networks or streaming services you subscribe to.
- You can ____ movies which are available for 30 days or purchase them for unlimited access.
- When you purchase an Apple TV+ compatible device you get ____ year(s) of Apple TV+ free.
8 Clues: Oprah's book club releases episodes on Apple TV+ every ____ months. • When you purchase an Apple TV+ compatible device you get ____ year(s) of Apple TV+ free. • You can ____ movies which are available for 30 days or purchase them for unlimited access. • In this tab you can see what shows you have downloaded episodes of that you can watch offline. • ...
Disruptive Technology 2025-08-09
Across
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
Down
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
8 Clues: Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • the development and use of technologies that minimize environmental impact while promoting social and economic benefits • ...
AI 2025-10-20
Across
- A field of AI that focuses on enabling machines to understand, interpret, and generate human language.3 words
- A software application designed to simulate conversation with human users.
- An AI model trained on vast amounts of text data to understand and generate human-like language. 3 words
Down
- A subset of machine learning that uses neural networks with many layers to model complex patterns in data. 2 words
- A type of AI that can create new content—such as text, images, or music—based on patterns learned from existing data. 3 words
- The practice of crafting effective inputs to guide AI models to produce desired outputs. 2 Words
- When an AI generates plausible sounding information that is false.
- A set of step-by-step instructions or rules used to solve a problem or perform a task, often used in computing and data processing.
8 Clues: When an AI generates plausible sounding information that is false. • A software application designed to simulate conversation with human users. • The practice of crafting effective inputs to guide AI models to produce desired outputs. 2 Words • An AI model trained on vast amounts of text data to understand and generate human-like language. 3 words • ...
JOURNALISM/ENGLISH NOTES for REVIEW 2022-09-15
Across
- THIS AUDIENCE GETS MOST NEWS FROM LOCAL TV AND NETWORKS SUCH AS PRIME-TIME "MAGAZINES," RARELY WATCHES CABLE NEWS; ENJOYS HEALTH, COMMUNITY AND CRIME NEWS
- HOW MANY NEWS AUDIENCES HAVE WE IDENTIFIED?
- THIS AUDIENCE WATCHES, LISTENS TO, AND READS ALMOST EVERYTHING, SOMEWHAT INDISCRIMINATELY; LIKES ALL THE TOPICS AND USES THE REMOTE
Down
- THIS AUDIENCE TUNES IN ONLY WHEN SOMETHING BIG IS HAPPENING, TENDS TO BE LOWER INCOME, AND IS HEAVILY MALE
- THIS AUDIENCE READS THE LOCAL NEWSPAPER, WATCHES BOTH NETWORK AND CABLE NEWS, IS INTERESTED IN SPORTS AND CRIME BUT NOT IN FOREIGN NEWS
- THIS AUDIENCE REJECTS TRADITIONAL BROADCAST NEWS; FAVORS THE NATIONAL ENQUIRER, ETC.
- THIS AUDIENCE RELIES HEAVILY ON NATIONAL PUBLIC RADIO, THE NEWSHOUR WITH JIM LEHRER, THE WALL STREET JOURNAL, THE NEW YORK TIMES; LIKES NEWS AND BUSINESS MAGAZINES
7 Clues: HOW MANY NEWS AUDIENCES HAVE WE IDENTIFIED? • THIS AUDIENCE REJECTS TRADITIONAL BROADCAST NEWS; FAVORS THE NATIONAL ENQUIRER, ETC. • THIS AUDIENCE TUNES IN ONLY WHEN SOMETHING BIG IS HAPPENING, TENDS TO BE LOWER INCOME, AND IS HEAVILY MALE • ...
Unit 1 Computer Science Terms 2015-09-28
Across
- Text that has half the word count of the control condition for making a good website.
- Text editor usually used on a Windows machine.
- A group of information on a computer that can be software programs or data.
- When both the sender and the receiver are active at the same time.
- Use Up to 10 percent of the work but no more than 30 seconds of the music or lyrics from an individual musical work can be used.
- Your UT email is private. T or F
- Computers unique address when it is connected to the internet.
- Pictures, movies, or graphics that can be embedded in web page and displayed by a browser.
- Use No more than five images from the same artist or photographer can be used and no more than 10 percent or 15 images, whichever is less, from a collection can be used.
- Page Composed of HTML tags and multimedia files.
- Related group of networked computers.
Down
- Dominant media and marketing company in the food, home, travel and entertainment brands.
- A person who falsifies data to pretend to be someone else.
- Text editor usually used on a Mac.
- Visits sites on the internet, discovering Web pages and building and index to the Web's content based on keywords.
- Terms used to narrow one's search when using a search engine.
- Language that is neutral rather than subjective.
- The number of people on the maintenance team for the six core websites for Scripps.
- Networks that are not geographically close.
19 Clues: Your UT email is private. T or F • Text editor usually used on a Mac. • Related group of networked computers. • Networks that are not geographically close. • Text editor usually used on a Windows machine. • Language that is neutral rather than subjective. • Page Composed of HTML tags and multimedia files. • A person who falsifies data to pretend to be someone else. • ...
Cell Search 2013-10-14
Across
- ropelike assemblies of fibrous polypeptides that support the nuclear envelope and the plasma membrane
- hair like projections that can move either like a whip of stiff like an oar
- all organisms are composed of this
- In some bacteria, the cell wall is further surrounded by a slime layer also called this
- formerly called microfilaments, they are long extremely thin fibers that occur in bundles or meshlike networks
- controls microtuble construction
- other major type of cell, do not have a nucleus as Eukaryotic cells do, Archaea and bacteria are this type of cell
- molecules joined to form a thick filament
Down
- Cytoplasmic myosin tails are bound to membranes, but the heads still interact with actin
- Initiates polymerization of the 9 outer doublets of a cilium or flagellum
- proteins that derive energy from ATP to propel themselves along a protein filament or microtuble
- Some bacterias have this, which are short appendages that help them to attach to an appropriate surface
- contain a limited amount of genetic material and divide by splitting their DNA
- short cylinders with a 9+0 pattern of microtuble triplets
- Actin filaments are involved in the movement of cells and its organelles by the motor molecule called?
- prokaryotes have a single chromosome (loop of DNA) located within the region and is not bounded by membrane
- this part of the cell is highly organized, and it contains actin filaments, microtubles and intermediate filaments
- Most prokaryotes have small accesory rings of DNA
- has 9 microtuble doublets arranged in a circle around two central microtubles (has a 9+2) pattern
19 Clues: controls microtuble construction • all organisms are composed of this • molecules joined to form a thick filament • Most prokaryotes have small accesory rings of DNA • short cylinders with a 9+0 pattern of microtuble triplets • Initiates polymerization of the 9 outer doublets of a cilium or flagellum • ...
Tims Crossword 2013-09-15
Across
- The illegal copying and/or distribution of software
- Commercial software, usually packaged in cellophane wrapping and usually having a higher price tag
- Formally known as OH&S
- Authorising to perform a particular task or make use of a particular software
- A kind of shareware that allows the user to try the software, but some of the features are disabled
- A connected set of computers (networks)
- Internet Industry Association
- The right to use, copy or control the work of authors or artists, including software developers
- Simular to public domain software.
- The original creative work of a person that can be legally protected. It includes the ideas developed by writers, musicians, film-makers, scientists and inventors.
Down
- 'Try before you buy' software. Software that is provided free and can be copied and distributed, but the licence agreement requires the to pay for the software if they continue using it after a specified period. Some shareware automatically becomes disabled after the free testing period has expired
- Software licence that allows a program to be used over a network
- It causes a great deal of damage, such as deleting personal data, removing system files and blocking email.
- Software that can be freely distributed and used
- Equal Employment Opportunity
- A private network that uses a simular interface to the internet. Not everyone can access an intranet
- Software licence that permits an organisation to use the software on any number of computers on the same site
- Uniform Resource Locator-an internet address
- Internet Service Provider
19 Clues: Formally known as OH&S • Internet Service Provider • Equal Employment Opportunity • Internet Industry Association • Simular to public domain software. • A connected set of computers (networks) • Uniform Resource Locator-an internet address • Software that can be freely distributed and used • The illegal copying and/or distribution of software • ...
IT 2020-11-12
Across
- A collection of information organized so that a computer application can quickly access selected information; it can be thought of as an electronic filing system.
- Any software that covertly gathers user information, usually for advertising purposes.
- A group of interconnected computers capable of exchanging information.
- A program or computer that connects to and requests information from a server.
- A device used for connecting two Local Area Networks.
- The physical components of a computer including the keyboard, monitor, disk drive, and internal chips and wiring.
- A small piece of information you may be asked to accept when connecting to certain servers via a web browser.
- Software programs designed to damage or do other unwanted actions on a computer.
- A collection of data that has a name.
Down
- A wireless networking technology that allows users to send voice and data from one electronic device to another via radio waves.
- A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file.
- A functional unit that provides shared services to workstations or to other functional units over a data network.
- Any program that performs a specific function.
- The process of transferring one or more files from your local computer to a remote computer.
- Stands for one picture element.
- Central processing unit
- A name used in conjunction with a password to gain access to a computer system or a network service.
- A term that has commonly come to mean "connected to the Internet".
- Random Access Memory.
19 Clues: Random Access Memory. • Central processing unit • Stands for one picture element. • A collection of data that has a name. • Any program that performs a specific function. • A device used for connecting two Local Area Networks. • A term that has commonly come to mean "connected to the Internet". • A group of interconnected computers capable of exchanging information. • ...
Cybersecurity Crossword Puzzle 2023-05-15
Across
- It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
- is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
- -factor authentication is a second layer of security that protects our networks from cyber-attack.
- Alert Button We report phishing by using the
- threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
- is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
- Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
- such as curiosity, urgency, greed, and fear are used in phishing emails.
- can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.
9 Clues: Alert Button We report phishing by using the • such as curiosity, urgency, greed, and fear are used in phishing emails. • -factor authentication is a second layer of security that protects our networks from cyber-attack. • can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data. • ...
iACE Crossword Puzzle 3 2021-11-09
Across
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
- An official inspection of an individual’s or organization’s accounts.
Down
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Unacceptable or improper behaviour, especially by an employee or professional person.
- Wrongful or criminal deception intended to result in financial or personal gain.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain. • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
AI components 2023-02-07
Across
- A branch of AI that allows a computer to perform tasks that typically require human intelligence (14)
- A type of AI that imitates human thought and reasoning processes (9)
- A type of AI model that uses a combination of decision trees and neural networks to make predictions (12)
- The process of training a machine learning model using large amounts of data (10)
- A statistical technique used in machine learning to classify data into two or more classes (7)
Down
- A type of AI model that is trained on large amounts of data and makes predictions based on patterns in the data (11)
- A type of AI that uses deep learning techniques to identify patterns in data and make predictions (13)
- A type of AI that performs tasks that typically require human intelligence, such as recognizing speech or images (13)
- The process of fine-tuning an AI model by adjusting its parameters to improve its performance on a specific task (10)
9 Clues: A type of AI that imitates human thought and reasoning processes (9) • The process of training a machine learning model using large amounts of data (10) • A statistical technique used in machine learning to classify data into two or more classes (7) • A branch of AI that allows a computer to perform tasks that typically require human intelligence (14) • ...
Innovation 2023-12-28
Across
- The word refers to information or experience regarding a product or service that is used for making improvements.
- It is a granted right to the owner of an invention to exclude others from producing or selling their invention for a limited period of time.
- The word means gathering information and new ideas with the help of external networks, typically via online channels.
Down
- It is an event in which a group of people meet to work on solutions to the challenges the organizer or they themselves face.
- It is the person who creates a new idea.
5 Clues: It is the person who creates a new idea. • The word refers to information or experience regarding a product or service that is used for making improvements. • The word means gathering information and new ideas with the help of external networks, typically via online channels. • ...
Team 5 Crossword 2021-01-21
Across
- Which is designed to deliver ultra-low latency applications to 5G devices by extending AWS infrastructure, services, APIs, and tools to 5G networks.
- ----- is a pool of centralized resources that function as a cloud or data center
- 5G small cells are used in ----------- layer.
- is a subset of artificial intelligence that measures, understands, simulates, and reacts to human emotions.
Down
- ------------- has blocked Huawei and ZTE from providing equipment for its 5G network
- provides a scalable data analytics solution—with machine learning built-in so telecommunications companies can store, process, and analyze data in real time, and build personalization models on top of this data(clue: Google’s platform)
- When used along with other upcoming technologies such as Artificial Intelligence (AI), it can allow telecom providers to analyze predictive patterns based on structured datasets
7 Clues: 5G small cells are used in ----------- layer. • ----- is a pool of centralized resources that function as a cloud or data center • ------------- has blocked Huawei and ZTE from providing equipment for its 5G network • is a subset of artificial intelligence that measures, understands, simulates, and reacts to human emotions. • ...
ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ 2024-12-11
Across
- αφορά στην παράνομη αντιγραφή καιχρήση προγραμμάτων χωρίς την άδεια του δημιουργού τους καιστην παράνομη αναπαραγωγή και διάθεση αντιγράφων προγραμμάτων με κίνητρο το οικονομικό όφελος.
- (κείμενα, εικόνες, μουσική,βίντεο κ.λπ.)
- αποτελεί το κυριότερο μέσο διακίνησης πειρατικού λογισμικού είτε μέσωιστότοπων είτε μέσω ομότιμων δικτύων διαμοιρασμού αρχείων(peer to peer networks).
- έφερε επανάσταση στον τρόπο που αναζητούμε και αποκτούμε πρόσβαση σε πληροφορίες
- Η προώθηση μέσω του Διαδικτύου παράνομων αντιγράφωνέργων πνευματικής ιδιοκτησίας (π.χ. μουσικής, ταινιών, ηλεκτρονικών βιβλίων, προγραμμάτων)
Down
- το δικαίωμα που αποκτά κάποιος πάνω σε ένα πρωτότυπο πνευματικό δημιούργημα, π.χ. μουσική, συγγραφικό έργο, εικαστικό έργο, θεατρικό έργο, οπτικοακουστικό έργο, λογισμικό κ.λπ
- είναι το σύνολο των εξουσιών που δίνει ονόμος στον ιδιοκτήτη ενός πνευματικού έργου (συγγραφέα, συνθέτη, προγραμματιστή κ.λπ.) να προστατεύσει, να διαχειριστείκαι να αμειφθεί ακόμη από τρίτους, όταν εκείνοι εκμεταλλεύονταιτην πνευματική του περιουσία.
7 Clues: (κείμενα, εικόνες, μουσική,βίντεο κ.λπ.) • έφερε επανάσταση στον τρόπο που αναζητούμε και αποκτούμε πρόσβαση σε πληροφορίες • Η προώθηση μέσω του Διαδικτύου παράνομων αντιγράφωνέργων πνευματικής ιδιοκτησίας (π.χ. μουσικής, ταινιών, ηλεκτρονικών βιβλίων, προγραμμάτων) • ...
Eli Russell's Internet Cross Word Puzzle 2013-12-02
Across
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- A bully who operates online, in cyberspace; To bully online
- (HOST) Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
- unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
Down
- Network etiquette; Online manners; following the rules of conduct for online or internet users, being a good digital citizen.
- a list of citations that appear at the end of a paper, article, chapter or book.
- OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results.
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
9 Clues: A bully who operates online, in cyberspace; To bully online • a list of citations that appear at the end of a paper, article, chapter or book. • OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results. • unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing) • ...
ICT SPELLING 2012-12-04
Across
- SOFTWARE USED TO SEARCH AND RETRIEVE INFORMATION FROM THE WORLD WIDE WEB. NETSCAPE, MICROSOFT INTERNET EXPLORER AND SAFARI ARE BROWSERS.
- CHARTS, DIAGRAMS, PICTURES, SYMBOLS OR ANIMATIONS ON A COMPUTER SCREEN WHICH MAY BE PRINTED OUT OR SAVED TO DISK.
- TO PREPARE AND ISSUE (PRINTED MATERIAL) FOR PUBLIC DISTRIBUTION OR SALE.
- FACTS PROVIDED OR LEARNED ABOUT SOMETHING OR SOMEONE.
- A SIMPLIFIED DRAWING SHOWING THE APPEARANCE, STRUCTURE, OR WORKING OF SOMETHING.
- ELECTRONIC COMMUNICATIONS SYSTEM LINKING COMPUTERS, COMPUTER SYSTEMS AND PERIPHERALS SUCH AS FILE SERVERS AND PRINTERS.
Down
- THE NAME USED TO DESCRIBE BULLYING BEHAVIOUR THAT TAKES PLACE VIA MOBILE PHONES OR OVER THE INTERNET THROUGH EMAILS, INSTANT MESSAGING AND SOCIAL NETWORKING WEBSITES.
- A SECRET CODE WHICH A USER MUST SUPPLY DURING A LOGIN TO DEMONSTRATE THAT THEY ARE, IN FACT, THE PERSON THEY ARE CLAIMING TO BE.
- ORIGINALLY KNOWN AS 'INTER-NETWORK', THIS IS THE INTER-COMMUNICATING COMPUTER NETWORKS WHICH HOST AND PROVIDE ACCESS TO THE WORLD WIDE WEB, FILE TRANSFER, EMAIL, NEWS AND OTHER SERVICES.
9 Clues: FACTS PROVIDED OR LEARNED ABOUT SOMETHING OR SOMEONE. • TO PREPARE AND ISSUE (PRINTED MATERIAL) FOR PUBLIC DISTRIBUTION OR SALE. • A SIMPLIFIED DRAWING SHOWING THE APPEARANCE, STRUCTURE, OR WORKING OF SOMETHING. • CHARTS, DIAGRAMS, PICTURES, SYMBOLS OR ANIMATIONS ON A COMPUTER SCREEN WHICH MAY BE PRINTED OUT OR SAVED TO DISK. • ...
Technology vocabulary 2021-09-15
Across
- a piece of electronic equipment that makes sending messages between different computers or between different networks easier and faster
- a piece of equipment used to put electricity into a battery
- a machine which is connected to a computer and can make a printed record of computer information
Down
- stick a small flat card that is used to store information electronically and which fits into portable electronic machines such as computers, digital cameras, and wireless telephones
- a small object that you move with your hand to give instructions to a computer
- the part of a radio, sound system etc where the sound comes out
- a place in a wall where you can connect electrical equipment to the supply of electricity
- a piece of equipment that starts or stops the flow of electricity to a machine, light etc when you push it
- a small object at the end of a wire that is used for connecting a piece of electrical equipment to the main supply of electricity
9 Clues: a piece of equipment used to put electricity into a battery • the part of a radio, sound system etc where the sound comes out • a small object that you move with your hand to give instructions to a computer • a place in a wall where you can connect electrical equipment to the supply of electricity • ...
dete terensemeshen 2022-07-13
Across
- actual data being in a data packet
- the part of the data packet that contains the IP addresses of the sender and receiver; and includes the packet number which allows reassembly of the data packets
- a method of transmission in which a message is broken into many data packets which can then be sent along pathways independently of each other
- data that can be sent on one direction only
Down
- stages in a network that can receive and transmit data package; routers are nodes in communication networks
- the part of a data packet that indicates the end of the data packet and cyclic redundancy check error check
- a verification method used to check if data transferred has been altered or corrupted; calculated from the block of data being sent; the checksum value is sent after each data block
- data that arrives at the destination with the bits no longer synchronized
- a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths / routes
9 Clues: actual data being in a data packet • data that can be sent on one direction only • data that arrives at the destination with the bits no longer synchronized • stages in a network that can receive and transmit data package; routers are nodes in communication networks • ...
Internet Terminology 2022-11-09
Across
- default page displayed when a website is first opened.
- program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.
- website containing a writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other websites.
- website that allows users to add, delete or revise content by using a web browser.
Down
- practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users for purposes of identity theft.
- link from a hypertext file or document to another location or file
- an address that identifies a particular file on the internet
- The rules of etiquette that apply when communicating over computer networks, especially the internet.
- secret word or expression used by authorized persons to prove their right to access, information, etc.
9 Clues: default page displayed when a website is first opened. • an address that identifies a particular file on the internet • link from a hypertext file or document to another location or file • website that allows users to add, delete or revise content by using a web browser. • ...
Internet Terminology 2022-11-19
Across
- Also called index page, main page the initial page of a website, usually containing an introduction and links to its contents.
- An object, as text or graphics linked through hypertext to a document, another object.
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
- A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
Down
- A website containing a writers or group of writer's own experiences, observations, opinions, ect; and often having images and links to other websites.
- EngineA computer program that searches documents, especially on the world wide web, for a specified word or words provide a list od documents in which they are found.
- The rules of etiquette that apply when communicating over computer networks, especially the internet.
- A website that allows users to add, delete or revise content by using a web browser.
- A secret word or expression used by authorized persons to prove their right to access, information, ect.
9 Clues: A website that allows users to add, delete or revise content by using a web browser. • An object, as text or graphics linked through hypertext to a document, another object. • A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet • ...
malware 2023-06-19
Across
- An attack in which the victim receives a message disguised to look like it has come from a reputable source (for example, a bank), in order to trick them into giving up personal information.
- A generic term used to refer to applications, scripts, programs and systems that run on a device and execute specific tasks
- A form of malware that captures data from a computing device and transmits it without the user's knowledge
- A piece of malware that is hidden inside another file in a computer system.
Down
- Gaining unauthorized access to or control of a computer system.
- Malware in the form of a program that attaches itself to another file and can replicate itself when the file is executed
- A global system of interconnected computer networks
- Malicious software. A program designed to cause damage to computer systems, corrupt or change files, steal data, or cause disruption to services
- Malware that is able to replicate itself and does not need to use another file as a vector
9 Clues: A global system of interconnected computer networks • Gaining unauthorized access to or control of a computer system. • A piece of malware that is hidden inside another file in a computer system. • Malware that is able to replicate itself and does not need to use another file as a vector • ...
computer security puzzle 2020-08-20
Across
- A set of rules or procedures for transmitting data between electronic devices, such as computers.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
Down
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- A company that provides customers with Internet access.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line
9 Clues: A company that provides customers with Internet access. • A set of rules or procedures for transmitting data between electronic devices, such as computers. • A telecommunications network or computer network that extends over a large geographical distance/place. • ...
The internet 2022-03-24
Across
- Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.
- connect network nodes and send and receive analog or digital signals.
- provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic
- A computer that sits between different networks or applications.
Down
- a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
- networking hardware that connects devices on a computer network by using packet
- a product that connects a local area network (LAN) to another local area network that uses the same
- an established set of rules that determine how data is transmitted between different devices in the same network
- device used at the customer premises to terminate a dial-up Integrated Services Digital Network (ISDN) line and connect it to a computer or a local area network (LAN).
9 Clues: A computer that sits between different networks or applications. • connect network nodes and send and receive analog or digital signals. • networking hardware that connects devices on a computer network by using packet • a product that connects a local area network (LAN) to another local area network that uses the same • ...
iACE Crossword Puzzle 3 2021-11-08
Across
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- An official inspection of an individual’s or organization’s accounts.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
Down
- Unacceptable or improper behaviour, especially by an employee or professional person.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- Wrongful or criminal deception intended to result in financial or personal gain
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
Crossword Puzzle on Science and The British Imperial Project In Asia 2019-09-09
Across
- Joseph ____ was the person responsible for drawing science within the imperial policy in the period which followed the American Revolution (late 1700s to early 1800s).
- Which famous person went on a voyage on HMS Beagle, who later made huge contribution to the science of evolution?
- Who was the person who resurrected the theoretical study of the tides in the 1830s after almost a century of neglect?
- Which imperial power expect scientists to contribute their expertise to benefit them instead of seeing science as a voluntary service.
- The study of _____ had helped scientists to study the weather and make accurate predictions.
Down
- The East ___ Company played an important role in acting as the center of local networks of intelligence and succeeded in classifying such data into more readily usable forms.
- The " ____'s Line" found between Lombok and Bali in 1859.
- The study of ___ was important in helping the British to create a comprehensive map of India .
- The ___ Crusade started by the British natural philosophers had resulted in huge contributions in in terrestrial magnetism.
9 Clues: The " ____'s Line" found between Lombok and Bali in 1859. • The study of _____ had helped scientists to study the weather and make accurate predictions. • The study of ___ was important in helping the British to create a comprehensive map of India . • ...
AI Holiday Homework 2022-06-22
Across
- is the way by which solutions are developed to remove an obstacle to achieving an ultimate goal.
- is an interdisciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge
- is a subfield of linguistics, computer science, and artificial intelligence concerned with the interactions between computers and human language
- is a finite sequence of rigorous well-defined
- is a systematic determination of a subject's merit, worth and significance, using criteria governed by a set of standards
- is data which has been specifically identified for use in tests
Down
- the use and development of computer systems that can learn and adapt without following explicit instructions, by using algorithms and statistical models to analyze and draw inferences from patterns in data.
- A computer system modelled on the human brain and nervous system.
- is an interdisciplinary scientific field that deals with how computers can gain high-level understanding from digital images or videos
- a type of machine learning based on artificial neural networks in which multiple layers of processing are used to extract progressively higher-level features from data
10 Clues: is a finite sequence of rigorous well-defined • is data which has been specifically identified for use in tests • A computer system modelled on the human brain and nervous system. • is the way by which solutions are developed to remove an obstacle to achieving an ultimate goal. • ...
Wireless Networks (DE-IV)- IA-II- July to October 2023 2023-10-20
Across
- A software application in NFV that deliver network functions like file sharing, directory services, and IP configuration
- A field in OpenFlow table is used to track as how many packets have been forwarded or dropped for the flow
- In IETF ForCES the element that is responsible for enforcement of the forwarding and filtering rules that it receives from the controller
- A transport control WSN protocol that distributes data from sink to sensors by placing data at a slow speed and have three operation pump, fetch and report
- A geographical routing technique in WSN that selects among its neigbours the one that is closest to the destination
- The adaption function that addresses a gap between applications and network protocols to satisfy the requirements of WSN
- In SDN _____ cosists of various ports that are used for reception and transmission of packets, and forwarding table with associated logic
- a protocol in OpenFlow that describes how control plane talks to the forwarding devices
Down
- A group in Bluetooth protocol stack that is used to locate and connect the device with each other
- IrisNet middleware architecture comprises of ________ and organizing agent
- A WSN routing protocol that creates a TDMA-based schedule whereby each node of the cluster is assigned a time slot for transmission
- A model that is used by directed diffusion WSN routing protocol
- A WSN routing protocl that uses a chain structure for data gathering and dissemination
- SPIN exploits data naming, whereby nodes associate _____ with data they produce and use these descriptive data to perform negotiation
- Name the message that is used for exchange of network management information in SNMP protocol
15 Clues: A model that is used by directed diffusion WSN routing protocol • IrisNet middleware architecture comprises of ________ and organizing agent • A WSN routing protocl that uses a chain structure for data gathering and dissemination • a protocol in OpenFlow that describes how control plane talks to the forwarding devices • ...
Technology Crossword Puzzle 2017-04-25
Across
- a worldwide collection of computer networks that use the standard Internet Protocol Suite to serve billions of users interconnected by a broad array of electronic, wireless, and optical networking technologies; the Internet carries an extensive range of information resources and services, including inter-linked hypertext documents of the World Wide Web and the infrastructure to support email.
- pop-up ads, are a form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses; created by advertisers, pop-ups generally appear unexpectedly in a small web browser window when a user is linking to a new Web site.
- short for electronic mail, the transmission of digital messages over communications networks, including the Internet; consists of three components: the message envelope, the message header, and the message body.
Down
- bullying that takes place using electronic technology, including the Internet, and related technologies to harm other people, in a deliberate, repeated, and hostile manner; may involve text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, Web sites, or fake profiles.
- also called a computer network, is a collection of computers interconnected by communication channels that allow sharing of resources (hardware, data, and software) and information; most common is the local area network or LAN, anywhere from a few computers in a small office to several thousand computer spread through dozens of buildings; a wide area network or WAN connects computers across multiple geographic locations, even on different continents
- device also called a handheld, handheld device, or handheld computer, a pint-sized computer device, typically having a display screen with touch input or a miniature keyboard; most common types are smartphones, PDA, pagers, and personal navigation devices.
- a web application, accessed over the Internet, for a mobile device (e.g., smartphone, tablet) that works much like user-installed software on a computer allowing the device to perform specific tasks.
7 Clues: a web application, accessed over the Internet, for a mobile device (e.g., smartphone, tablet) that works much like user-installed software on a computer allowing the device to perform specific tasks. • ...
Immerse yourself in English! 2014-03-03
Across
- an art of sound in time that expresses ideas and emotions in significant forms through the elements of rhythm, melody, harmony, and color.
- the behaviors and beliefs characteristic of a particular social, ethnic, or age group: the youth culture.
- absorbing or controlling possession of the mind by any interest or pursuit; lively interest: He shows marked enthusiasm for his studies.
- the broadcasting of a still or moving image via radiowaves to receivers that project a view of the image on a picture tube.
- to involve deeply; absorb: She is totally immersed in her law practice.
- a call or summons to engage in any contest, as of skill, strength, etc.
- the habits, attitudes, tastes, moral standards, economic level, etc., that together constitute the mode of living of an individual or group.
- to glance at or over or read hastily
Down
- a vast computer network linking smaller computer networks worldwide
- the state or condition of being motivated: We know that these students have strong motivation to learn.
- to read, study, consider, treat, etc., in a superficial or cursory manner.
- great in amount, number, or degree: an extensive fortune; extensive political influence.
- a publication issued at regular and usually close intervals, especially daily or weekly, and commonly containing news, comment, features, and advertising.
13 Clues: to glance at or over or read hastily • a vast computer network linking smaller computer networks worldwide • to involve deeply; absorb: She is totally immersed in her law practice. • a call or summons to engage in any contest, as of skill, strength, etc. • to read, study, consider, treat, etc., in a superficial or cursory manner. • ...
Populations Crossword 2023-10-14
Across
- the act of leaving one's own country to settle permanently in another; moving abroad.
- way in which something is shared out among a group or spread over an area.
- It models and analyses economic systems as networks and flows of objects through time and space
- the number of people, other living organisms, or crops that a region can support without environmental degradation.
- Population _______ measures how many individuals are in a given area
- regulating factors because of their potential for maintaining population density within a narrow range of values.
- the proportionate numbers of people in different age categories in a given population for a defined time
Down
- the process of moving to a new country or region with the intention of staying and living there
- characterized by or being an extremely rapid increase
- he study of statistics such as births, deaths, income, or the incidence of disease, which illustrate the changing structure of human populations.
- the process or a period of changing from one state or condition to another.
- anything that constrains a population's size and slows or stops it from growing
- any force that affects the size of a population of living things regardless of the density of the population.
13 Clues: characterized by or being an extremely rapid increase • Population _______ measures how many individuals are in a given area • way in which something is shared out among a group or spread over an area. • the process or a period of changing from one state or condition to another. • anything that constrains a population's size and slows or stops it from growing • ...
ISIS Presentation Crossword 2025-04-22
Across
- System in which military branches are kept separate rather than integrated, designed to be "coup-proof"
- State's capacity to maintain a monopoly on the means of coercion, essential to maintaining an authoritarian state
- Name of the regime in Syria that was in power during the Arab Spring
- The former prime minister of Iraq from 2006-2014, politicized military leadership, centralized power, and instituted Shia government
- Iraqi dictator in power from 1979-2003 who led the Iran-Iraq war and the Gulf War
Down
- Revolutionary leninist group that emerges to try to overthrow a regime (type of group)
- Armed forces where the lines between the official army and paramilitary were blurred, emphasis on the centrality of private-personal networks in government
- Popular use of aggressive and divise communalist rhetoric to further political elite interests
- Islamic form of government idolized by Jihadists and led by a main leader who rules over all Muslim people
- Word used by academics to describe the ideology of islamic military groups that see violence as necessary to create an islamic state
- Name of party that ran a socialist campaign with notable leaders, Hussein and Assad
- Group that is tasked with enforcing sharia law in specific districts under ISIS control
- Tax levied by ISIS against Christians for protection and freedom to practice religion
13 Clues: Name of the regime in Syria that was in power during the Arab Spring • Iraqi dictator in power from 1979-2003 who led the Iran-Iraq war and the Gulf War • Name of party that ran a socialist campaign with notable leaders, Hussein and Assad • Tax levied by ISIS against Christians for protection and freedom to practice religion • ...
Team7-Q1 2017-11-23
Across
- The part of a cable that plugs into a port or interface to connect one device to another
- The wireless networking standard that is useful for creating small personal area networks is
Down
- These twins have to be configured between any two end points, to send and receive data in packs of 53
- an open source automation framework for testing the webapp in multiple OS with 7 language support.Minerals and Metal are called by my name as well.
- Converting a primitive type data into its corresponding wrapper class object instance is called(In Java)
5 Clues: The part of a cable that plugs into a port or interface to connect one device to another • The wireless networking standard that is useful for creating small personal area networks is • These twins have to be configured between any two end points, to send and receive data in packs of 53 • ...
FOG And Dairy 2018-03-27
Across
- facilities including pumps and equipment for pumping fluids from one place to another.
- Sewage Treatment, Or Domestic Wastewater Treatment::Sewage treatment, or domestic wastewater treatment, is the process of removing contaminants from wastewater, both runoff (effluents) and domestic.
- An urban sewer network consists of pipe networks draining city blocks, buildings and groups of buildings, and streets, sewage mains, and pressure lines.
- a natural oily or greasy substance occurring in animal bodies, especially when deposited as a layer under the skin or around certain organs.
- a viscous liquid derived from petroleum, especially for use as a fuel or lubricant.
Down
- a condition in which untreated sewage is discharged from a sanitary sewer into the environment prior to reaching sewage treatment facilities.
- oily or fatty matter, in particular.
- an underground carriage system specifically for transporting sewage from houses and commercial buildings through pipes to treatment facilities or disposal.
- a building, room, or establishment for the storage, processing, and distribution of milk and milk products.
9 Clues: oily or fatty matter, in particular. • a viscous liquid derived from petroleum, especially for use as a fuel or lubricant. • facilities including pumps and equipment for pumping fluids from one place to another. • a building, room, or establishment for the storage, processing, and distribution of milk and milk products. • ...
FOG And Dairy 2018-03-27
Across
- an underground carriage system specifically for transporting sewage from houses and commercial buildings through pipes to treatment facilities or disposal.
- a condition in which untreated sewage is discharged from a sanitary sewer into the environment prior to reaching sewage treatment facilities.
- facilities including pumps and equipment for pumping fluids from one place to another.
- oily or fatty matter, in particular.
- a building, room, or establishment for the storage, processing, and distribution of milk and milk products.
Down
- a viscous liquid derived from petroleum, especially for use as a fuel or lubricant.
- Sewage Treatment, Or Domestic Wastewater Treatment::Sewage treatment, or domestic wastewater treatment, is the process of removing contaminants from wastewater, both runoff (effluents) and domestic.
- An urban sewer network consists of pipe networks draining city blocks, buildings and groups of buildings, and streets, sewage mains, and pressure lines.
- a natural oily or greasy substance occurring in animal bodies, especially when deposited as a layer under the skin or around certain organs.
9 Clues: oily or fatty matter, in particular. • a viscous liquid derived from petroleum, especially for use as a fuel or lubricant. • facilities including pumps and equipment for pumping fluids from one place to another. • a building, room, or establishment for the storage, processing, and distribution of milk and milk products. • ...
Product Trial and Repeat Purchase 2013-10-06
Across
- businesses which specialise in selling goods in small quantities to the consumer
- Setting an initial low price for a new product so that it is attractive to customers. The price is likely to be raised later as the product gains market share
- businesses which buy in bulk from a manufacturer or other supplier and then sell the stock on in small quantities to retailers
- buyers of goods which then sell those goods on to a consumer or other buyers; they include supermarket chains and wholesalers
Down
- Getting individuals to spread a message about a product through social networks like Facebook or their group of friends
- Promotion of a positive image about a product or business through giving information about the product to the general public, other businesses or the press
- when a customer buys a product more than once
- When consumers buy a product for the first time and assess whether or not they want to buy it again
- the willingness of buyers to make repeated purchases of a product or from a business
9 Clues: when a customer buys a product more than once • businesses which specialise in selling goods in small quantities to the consumer • the willingness of buyers to make repeated purchases of a product or from a business • When consumers buy a product for the first time and assess whether or not they want to buy it again • ...
iACE Crossword Puzzle 3 2021-11-09
Across
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
- An official inspection of an individual’s or organization’s accounts.
Down
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Unacceptable or improper behaviour, especially by an employee or professional person.
- Wrongful or criminal deception intended to result in financial or personal gain.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain. • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
Intellectual Disabilities 2023-06-15
Across
- The process of using activities and other hands-on tasks to teach skills.
- Every task, skill or activity needs to be broken down into small steps
- It is used to reinforce the child positively every time he learns a new skill or performs or practices a known skill
- Refers to the "general mental ability that includes reasoning, planning, problem solving, abstract thinking, comprehending complex ideas, learning quickly and learning from experience"
- Is a disability characterized by significant limitations both in intellectual functioning and in adaptive behavior as expressed in conceptual, social, and practical adaptive skills.
Down
- The networks of people that can provide practical or emotional support
- What everyone uses to function in everyday life can be conceptual, social and practical
- Is when you bring children together in a group to teach various skills
- Disabilities It is a term used when there are limits to a person's ability to learn at an expected level and function in daily life.
9 Clues: The networks of people that can provide practical or emotional support • Every task, skill or activity needs to be broken down into small steps • Is when you bring children together in a group to teach various skills • The process of using activities and other hands-on tasks to teach skills. • ...
Accent + Dialect Theories 2022-12-14
Across
- Studied the accent of the inhabitants of Marthas Vineyard (an island on the north-east coast of the USA)
- Found that those who use non-standard forms ahve different social 'norms', including trouble, excitement, fighting...
- Studied the link between ethnocentrism ( perceiving ones own culture to be the most important)
- Suggested that accents and dialects are dying out and studied 10 speech sounds that had a different pronunciation in the Milton Keynes area
Down
- called for more regional accents on the channel, following complaints from viewers that they were being 'ignored'
- Had groups of students listen to presentations (about capital punishment) from speakers with a Somerset accent, a South Welsh accent, a Birmingham accent and Received Pronunciation
- Studied social networks (a group of people who regularly interact with one another) in three working class areas of Belfast
- Studied the use of the postvocailic 'r' (such as in 'farm' and 'car'
- Studied speakers in Bradford, examining the dropped 'h' at the beginning of words
9 Clues: Studied the use of the postvocailic 'r' (such as in 'farm' and 'car' • Studied speakers in Bradford, examining the dropped 'h' at the beginning of words • Studied the link between ethnocentrism ( perceiving ones own culture to be the most important) • Studied the accent of the inhabitants of Marthas Vineyard (an island on the north-east coast of the USA) • ...
Cyber Ethics 2025-06-02
Across
- Practices this means accessing the internet in an illegal manner
- this refers to the act of using or imitating the language and thoughts of other person at one's original work
- dossier what is digital footprint also known as
- this refers to an illegal intrusion into a computer system or network
- ethics while using the internet, we need to follow certain moral rules which includes honesty, respecting the privacy of others, and property rights. These rules are called
- this refers to criminal activities that involves the use of computer, networks, and the internet connection with the intend to cause harm to individual or their digital devices
Down
- this refer to unwanted bulk emails that come from unknown sources
- it refers to being aware of the ethical practices and behaving Responsibly and appropriately while using the internet
- footprint this is an impression or information about a person that exist on the internet because of his online activity
- they are highly technical people who secretly break into computer to steal important data or sometimes to destroy it
10 Clues: dossier what is digital footprint also known as • Practices this means accessing the internet in an illegal manner • this refer to unwanted bulk emails that come from unknown sources • this refers to an illegal intrusion into a computer system or network • ...
Habi 2022-09-01
Across
- Program review of prospective Agent Networks and Independent Agents prior to activation.
- elections from a machine learning risk model used to assess indicators of Agent AML risk at the Agent location and Agent network level.
Down
- compliance program reviews are completed via telephone or other communication methods.
- contains the same financial information as the prepayment disclosure and information, such as, the date by which funds will be available to the designated recipient.
4 Clues: compliance program reviews are completed via telephone or other communication methods. • Program review of prospective Agent Networks and Independent Agents prior to activation. • elections from a machine learning risk model used to assess indicators of Agent AML risk at the Agent location and Agent network level. • ...
OSI LAYER 2021-06-28
Across
- how many layers are there in the Upper Layers?
- how many layers are there in the Lower Layers?
- Layer, is the user interface that internet users interact with to send or receive data through email, online games, peer to peer file transfer, and other applications.
- Layer, establishes a “mechanism for opening, closing and managing a session between end-user application processes and responses”.
- Layer, to enable different networks to be interconnected. It does this by forwarding packets to network routers, which rely on algorithms to determine the best paths for the data to travel.
Down
- Layer, consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables.
- Link Layer, ensures that a transmission occurs without any errors.
- Systems Interconnection Model, is a conceptual model that characterises and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
- Layer, provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.
- Layer, translates the commands received from the application layer into universal, well-known networking formats.
10 Clues: how many layers are there in the Upper Layers? • how many layers are there in the Lower Layers? • Link Layer, ensures that a transmission occurs without any errors. • Layer, translates the commands received from the application layer into universal, well-known networking formats. • ...
Unit 4 Create Social Media Content 2022-10-03
Across
- Offline digital marketing that displays advertisement in either static images or visual motion format with the help of an electronic conductor
- A paid media, one purchase ad space with search engines companies such as Google, Yahoo, Bing.
- The process of boosting one’s content to appear at a higher rank on the search engines
- Involves the use of offline marketing technique focused on reaching audience via their smartphones.
- Advertising gains visibility online by the method of bringing the brand or content in front of its target audience via platforms such as Facebook ads, twitter ads, etc
- Involves the creation, publication, and distribution of relevant content across networks
- Display of advertisements to communicate with viewers in both audio and visual motion format.
Down
- A form of digital marketing which utilises social networking sites as a marketing tool to promote companies’ brand and increase website traffic.
- A modern day content-driven marketing campaign where brands collaborate with influencers who have social influence in their respective fields
- Incorporating interactive sections to engage listeners with call-and-response programs with incentive thrown in to entice participation.
10 Clues: The process of boosting one’s content to appear at a higher rank on the search engines • Involves the creation, publication, and distribution of relevant content across networks • Display of advertisements to communicate with viewers in both audio and visual motion format. • ...
Page 95-105 2013-09-19
Across
- A wiring fault that occurs when a conductor connects to the earth through a coninuous path.
- A wiring fault that occurs in cabling when two conductors are improperly connected, resulting in a shorter circuit path.
- A media access method used in Ethernet networks
- an IEEE standard that specifies the supply of small amounts of electrical power to nework devices such as cameras, IP phones, Wireless access points, speakers, and phone or PDA chargers.
- A wiring fault that occus when two pairs of conductors are reversed in connection with another pair.
- An electronic chip technology incorporated into Gigabit ethernet devices to automatically reassign pin functions and eliminate the need for a crossover cable.
Down
- A special cable where the pin order is completely reversed on one end of the cable.
- A wiring fault that occurs when two pairs of a cable assembly have reversed two connections.
- A wiring fault that occurs when one of each of two cable pairs has become part of the other pair's connection.
- A wiring fault that occurs when the length of a conductor has an open spot.
10 Clues: A media access method used in Ethernet networks • A wiring fault that occurs when the length of a conductor has an open spot. • A special cable where the pin order is completely reversed on one end of the cable. • A wiring fault that occurs when a conductor connects to the earth through a coninuous path. • ...
Kinney-hiring and staffing 2023-09-14
Across
- a person, company, or organization that pays people to work for them
- someone you hire and pay for their work, which you use to benefit your business
- the process of actively seeking out, finding and hiring candidates for a specific position or job
- media the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
Down
- recruitment the process of hiring someone from within your existing business structure to fill a vacant position for your company
- the permanent reduction of a company's labor force through the elimination of unproductive workers or divisions
- report a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts
- application a form employers use to collection information about you to see if you are a good fit for the position
- recruitment filling a job vacancy with an employee from outside the company, rather than promoting or transferring an existing employee from
- to help or encourage to exist or flourish; further
10 Clues: to help or encourage to exist or flourish; further • a person, company, or organization that pays people to work for them • someone you hire and pay for their work, which you use to benefit your business • the process of actively seeking out, finding and hiring candidates for a specific position or job • ...
CF Chapter 1 & 2 2023-10-23
Across
- A secure virtual network that uses the public network (i.e., the Internet). The security of a virtual private network lies in the encryption of packet content between the endpoints that define the virtual private network
- The 3 states of data are Data at rest, Data in transit, Data in ???
- Script Kiddies are cyber-criminals having little or no ???, often using existing tools or instructions to launch attacks.
- The 3 security services for controlling access are ???, Authorization, Accounting
- is a weakness that makes a target susceptible to an attack.
Down
- The 3 principles of security are Confidentiality, ???, Availability
- Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- Hat Hackers cyber-criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- A type records that cyber criminals would be interested in stealing from organisations (hint: hospital)
- ??? net is a method of sending information from one device to another using removable media
10 Clues: is a weakness that makes a target susceptible to an attack. • The 3 principles of security are Confidentiality, ???, Availability • The 3 states of data are Data at rest, Data in transit, Data in ??? • The 3 security services for controlling access are ???, Authorization, Accounting • ...
TYLER'S HIRING ADN STAFFING 2023-09-14
Across
- to help or encourage to exist or flourish; further
- a form employers use to collection information about you to see if you are a good fit for the position.
- the process of actively seeking out, finding and hiring candidates for a specific position or job.
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts.
- the permanent reduction of a company's labor force through the elimination of unproductive workers or divisions.
Down
- the process of hiring someone from within your existing business structure to fill a vacant position for your company.
- a person, company, or organization that pays people to work for them
- someone you hire and pay for their work, which you use to benefit your business.
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- opening up a vacancy to a wider pool of candidates rather than selecting someone from the existing staff to fill the role.
10 Clues: to help or encourage to exist or flourish; further • a person, company, or organization that pays people to work for them • someone you hire and pay for their work, which you use to benefit your business. • the process of actively seeking out, finding and hiring candidates for a specific position or job. • ...
Word Hike 2023-10-08
Across
- A programming technique where a function calls itself in order to solve problems in a repetitive manner.
- The delivery of computing services (e.g., storage, processing) over the internet, often on a pay-as-you-go basis.
- A common networking technology used for local area networks (LANs) that relies on wired connections.
- A software application used to access and display content on the World Wide Web, such as websites and web applications
- A mechanism in object-oriented programming where a new class inherits properties and methods from an existing class.
Down
- A symbol or keyword that performs operations on one or more operands, such as addition, subtraction, or comparison.
- A step-by-step set of instructions or rules used to solve a specific problem or perform a task in programming.
- A reusable block of code that performs a specific task or operation, often with inputs and outputs.
- A high-level, interpreted, interactive, and object-oriented programming language developed by Guido van Rossum.
- A data structure that stores a collection of elements of the same data type, accessible by an index or key.
10 Clues: A reusable block of code that performs a specific task or operation, often with inputs and outputs. • A common networking technology used for local area networks (LANs) that relies on wired connections. • A programming technique where a function calls itself in order to solve problems in a repetitive manner. • ...
Digital Citizenship 2024-05-14
Across
- an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
- a program designed to harm a computer, destroying data and files.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Down
- when a person takes information and images, typically from other people, and uses them to create a new identity for themselves.
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a string of characters that allows access to a computer system or service.
- messages distributed by electronic means from one computer user to one or more recipients via a network.
- a part of the internet made of documents linked to one another.
- an identification used by a person with access to a computer, network, or online service.
10 Clues: a part of the internet made of documents linked to one another. • a program designed to harm a computer, destroying data and files. • a string of characters that allows access to a computer system or service. • an identification used by a person with access to a computer, network, or online service. • ...
INTELLECTUAL PROPERTY RIGHTS 2025-02-05
Across
- The specific legal statements in a patent that define the scope of protection granted to the inventor.
- is the natural person who has created the work. Some examples of authors include: writers, composers, carvers, etc.
- The practice of protecting online systems, networks, and data from cyber threats, ensuring the safe use of e-services.
- How well a product performs its intended purpose.
Down
- The process where a patent office reviews an application to determine if it meets legal requirements for patentability.
- The detailed explanation of an invention in a patent application, ensuring that the public can understand how it works once the patent expires.
- the transmission by wireless means for the public reception of sounds or of images or of representations thereof
- An exclusive legal right granted to an inventor, giving them control over the use, sale, and production of their invention for a limited period.
- a legal term which comprises both the economic and moral rights which creators have over their literary and artistic works.
- process where a neutral arbitrator hears evidence from both parties and makes a binding decision to resolve the dispute.
10 Clues: How well a product performs its intended purpose. • The specific legal statements in a patent that define the scope of protection granted to the inventor. • the transmission by wireless means for the public reception of sounds or of images or of representations thereof • ...
Immerse yourself in English! 2014-03-03
Across
- an art of sound in time that expresses ideas and emotions in significant forms through the elements of rhythm, melody, harmony, and color.
- the behaviors and beliefs characteristic of a particular social, ethnic, or age group: the youth culture.
- to glance at or over or read hastily
- a publication issued at regular and usually close intervals, especially daily or weekly, and commonly containing news, comment, features, and advertising.
- great in amount, number, or degree: an extensive fortune; extensive political influence.
- absorbing or controlling possession of the mind by any interest or pursuit; lively interest: He shows marked enthusiasm for his studies.
- the state or condition of being motivated: We know that these students have strong motivation to learn.
- to involve deeply; absorb: She is totally immersed in her law practice.
Down
- a call or summons to engage in any contest, as of skill, strength, etc.
- the habits, attitudes, tastes, moral standards, economic level, etc., that together constitute the mode of living of an individual or group.
- the broadcasting of a still or moving image via radiowaves to receivers that project a view of the image on a picture tube.
- a vast computer network linking smaller computer networks worldwide
- to read, study, consider, treat, etc., in a superficial or cursory manner.
13 Clues: to glance at or over or read hastily • a vast computer network linking smaller computer networks worldwide • a call or summons to engage in any contest, as of skill, strength, etc. • to involve deeply; absorb: She is totally immersed in her law practice. • to read, study, consider, treat, etc., in a superficial or cursory manner. • ...
Accent + Dialect Theories 2022-12-07
Across
- Found that 94% of the working class dropped the "H" at beginning of words, 67% dropped it in the upper class and 28% in lower middle classes
- Studied 10 speech sounds that had a different pronunciation in the Milton Keynes area
- Found that RP is deemed more professional than regional accents, but regional accents are more professional than RP accents
- Found those who use non-standard forms have different social "norms" including trouble, excitement, fighting...
- Found that men whose speech revealed high usage of vernacular or non-standard forms were also found to belong to tight-knit social networks
Down
- Found ethnocentrism lead to a direct effect on how the speaker was perceived (his attractiveness, creditability, perceived homophily)
6 Clues: Studied 10 speech sounds that had a different pronunciation in the Milton Keynes area • Found those who use non-standard forms have different social "norms" including trouble, excitement, fighting... • Found that RP is deemed more professional than regional accents, but regional accents are more professional than RP accents • ...
Information Security 2023-01-30
3 Clues: A technique to secure data by transforming it into an unreadable format • The unauthorized access to or manipulation of computer systems and networks. • A type of cyberattack that attempts to steal sensitive information through deceptive emails or websites
Habi 2022-09-01
Across
- Program review of prospective Agent Networks and Independent Agents prior to activation.
- elections from a machine learning risk model used to assess indicators of Agent AML risk at the Agent location and Agent network level.
Down
- compliance program reviews are completed via telephone or other communication methods.
- contains the same financial information as the prepayment disclosure and information, such as, the date by which funds will be available to the designated recipient.
4 Clues: compliance program reviews are completed via telephone or other communication methods. • Program review of prospective Agent Networks and Independent Agents prior to activation. • elections from a machine learning risk model used to assess indicators of Agent AML risk at the Agent location and Agent network level. • ...
Previous Page 100 of 100
