networks Crossword Puzzles
Artificial Intelligence 2020-12-17
Across
- One method to train neural networks is ____.
- One decision rule used in AI is called ____.
- A software that is programmed to simulate a conversation
- One characteristic an agent possesses is about maintaining their internal state through their existence
- A logic programming language from 1970
- ____ is a type of uninformed search algorithm.
- AI, Software Engineering and ____ are multidisciplinary influences to a Software agent
- A set of smart devices and computers linked together
- ____ can be used to optimize, educate, test and train.
- ____ is a common unsupervised network.
Down
- Mutation rate and genomes are common terms when using ____ algorithm.
- A threshold is commonly associated with ____ formal neurons.
- SQL and XSLT are examples of ____ programming
- Siri uses ____
- The layer between the input layer and output layer in a multi-layer neural network is called a ____ layer.
- There are three types of suitability functions: fitness, payoff and ___ .
- ____ and adaline are types of simple pattern recognition networks.
- John McCarthy introduces the term _____ in 1956
- The ability of an agent to move around a network
- Chinese Room
20 Clues: Chinese Room • Siri uses ____ • A logic programming language from 1970 • ____ is a common unsupervised network. • One method to train neural networks is ____. • One decision rule used in AI is called ____. • SQL and XSLT are examples of ____ programming • ____ is a type of uninformed search algorithm. • John McCarthy introduces the term _____ in 1956 • ...
Derek's Crossword Puzzle 2015-01-21
Across
- Device that filters and forwards data packets between LAN segments
- Most common kind of video on the internet involving tiny furry creatures
- A person who writes code for computer programs
- The central computing unit of a computer
- An IDE from microsoft
- Computer memory
- American Standard Code for Information Interchange
- The .NET framework was created by what company?
- A process or set of rules to be followed in calculations or other problem-solving operations
Down
- Stores all files and data on a computer
- A global system of interconnected computer networks
- A diagrammatic representation of an algorithm
- The list of commands a programmer types before they are compiled
- A computer or computer program that manages access to a centralized resource or service in a network
- A positional numeral system with a radix, or base, of 16
- Phase in the software development cycle when an application is tested for functionality
- One of the most in demand programming languages developed by Sun Microsystems
- Network device that forwards data packets to other networks
- Hyper Text Markup Language
- Computer language using ones and zeros
20 Clues: Computer memory • An IDE from microsoft • Hyper Text Markup Language • Computer language using ones and zeros • Stores all files and data on a computer • The central computing unit of a computer • A diagrammatic representation of an algorithm • A person who writes code for computer programs • The .NET framework was created by what company? • ...
Lesson 3 2015-10-09
Across
- The destination of a message sent through a network. (Computer, Terminal, Node.)
- A computer with the capability to provide service to other computer programs
- in order to access the internet you need this (_ _ P)
- Source/ destination of a packet on a network
- performs the funtions of a modulator/demodulator
- provides service to users across a network
- able to connect computers to other devices without wires
- uses a 64 or 128 bit key
- made of super thin filaments of glass that can carry beams of light
- Institute of Electrical and......
- cable Commonly used in high speed wired computer networks
- network created for a home or other small area (_ A N)
Down
- hardware or software device that manages the paths along which info travels between networks.
- joins wireless clients to a wired ethernet network
- allows different devices to print
- links multiple devices on the same data connection.
- enables computers to interpret data received from a network
- Cable Designed for carrying electronic signal
- used for surveillance
- wireless fidelity
20 Clues: wireless fidelity • used for surveillance • uses a 64 or 128 bit key • allows different devices to print • Institute of Electrical and...... • provides service to users across a network • Source/ destination of a packet on a network • Cable Designed for carrying electronic signal • performs the funtions of a modulator/demodulator • ...
TMGT 7123 Review 2016-10-31
Across
- a network that connects head office with a branch office
- used by organizations to better manage their IT
- what is used in a relational database to uniquely identify a table
- an unstructured database such as Cassandra
- An example of a wireless technology similar to RFID
- cabling standard for building networks based on IEEE standard
- the predecessor to Enterprise Resource Planning systems
- the person in an organization that is responsible for creating an IT roadmap
- A research organization that produces findings like Magic Quadrants
- a network devices than connects two different networks together
- device or algorithms used by organizations to prevent cyber attacks
Down
- a system development methodology
- what organizations do to acquire software
- an example of a disruptive technology and is used by billions of users
- volatile memory used by computing devices
- the type of security that is of most concern to e-commerce companies
- waterfall is an example of this
- the successor to MRP
- an organization’s expectations for when it would be able to operate after a disaster
- Open System Interconnection
20 Clues: the successor to MRP • Open System Interconnection • waterfall is an example of this • a system development methodology • what organizations do to acquire software • volatile memory used by computing devices • an unstructured database such as Cassandra • used by organizations to better manage their IT • An example of a wireless technology similar to RFID • ...
GROUP 11 TECHNOLOGY COMPUTER 2023-11-30
Across
- Temporary storage area, often used to improve data transfer.
- The main circuit board containing the central components of a computer.
- Solid State Drive; a faster and more durable storage alternative to HDD.
- Common storage device for digital data.
- Device for producing a paper copy of data from a computer.
- Device for converting sound into an electrical signal.
- Device that forwards data packets between computer networks.
- Central processing unit; the brain of the computer.
- Global network connecting millions of private, public, academic, business, and government networks.
Down
- Input device with keys for entering data into a computer.
- Video Graphics Array; a standard for displaying graphics.
- Computer or system that manages network resources.
- Programs and data that operate a computer.
- Physical components of a computer system
- Read-Only Memory; a type of non-volatile memory.
- Diskette reader device
- Input device for controlling movement in a computer game.
- Pointing device commonly used with computers.
- Autonomous or semi-autonomous mechanical device.
- Process of generating an image from a model.
20 Clues: Diskette reader device • Common storage device for digital data. • Physical components of a computer system • Programs and data that operate a computer. • Process of generating an image from a model. • Pointing device commonly used with computers. • Read-Only Memory; a type of non-volatile memory. • Autonomous or semi-autonomous mechanical device. • ...
Hekking_JAS IT 2025_Net_Module 11 Crosswords 2024-12-02
Across
- control of what users may do after accessing network
- technology that makes data unusuable and unreadable to all but authorized users
- A public certification authority organization
- The most widely used method for encrypting data
- A white hat's role
- unethical hacker who uses network or OS vulnerabilities to gain unauthorized access and permissions
- EFS works in one of three modes: ... mode, USB key mode, and user authentication mode
- Inherence refers to ... traits
- A black hat's role
- Three aspects of a security system for OS or networks: authentication, authorization, and ... (AAA)
Down
- ethical hacker who probes networks or OSs and reports on vulnerabilities
- control of access to network
- A common security tool used by Linux administrators
- Three credential categories for multifactor authentication: knowledge, possession, and ...
- Windows domain associated mutual authentication protocol
- A built-in firewall included in many Linux distributions
- common client-server authentication protocol
- A good security option for servers that are not physically secure
- A Linux Files tool that offers a trash can for deleting files permanently
- Windows Server Update Services
20 Clues: A white hat's role • A black hat's role • control of access to network • Inherence refers to ... traits • Windows Server Update Services • common client-server authentication protocol • A public certification authority organization • The most widely used method for encrypting data • A common security tool used by Linux administrators • ...
crossword 2024-10-07
Across
- - A computer that requests resources from a server.
- - A private network that connects devices in a small area.
- - A computer that provides services to other computers on the network.
- - A type of network that spans a large geographic area.
- - A set of rules governing the exchange of data between devices.
- - The total capacity of a data transmission system.
- - A device that connects devices within a network.
- - A collection of computers and devices connected to share resources.
- - A device that connects two different networks.
- - A smaller network within a larger network.
Down
- - A common method for connecting devices in a wired network.
- - A device that monitors and controls incoming and outgoing network traffic.
- - The amount of data transmitted in a given time.
- - A secure connection over the internet.
- - A device that forwards data packets between computer networks.
- - The arrangement of different elements in a network.
- - A machine that provides resources to other machines.
- - A way to connect devices without wires.
- - Data formatted for transmission over a network.
- Address - The address assigned to a device on a network.
20 Clues: - A secure connection over the internet. • - A way to connect devices without wires. • - A smaller network within a larger network. • - A device that connects two different networks. • - The amount of data transmitted in a given time. • - Data formatted for transmission over a network. • - A device that connects devices within a network. • ...
Edgar 2014-12-08
Across
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- Originally known as Web Log.
- the name for a way to display information on websites.
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- A bully who operates online, in cyberspace; To bully online.
- software used to view various kinds of Internet resources found on the Web.
- An unauthorized person who secretly gains access to computer files.
Down
- a list of citations that appear at the end of a paper, article, chapter or book.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- To renew or revitalize; To reload a webpage on the internet.
12 Clues: Originally known as Web Log. • the name for a way to display information on websites. • To renew or revitalize; To reload a webpage on the internet. • A bully who operates online, in cyberspace; To bully online. • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • ...
Form 4 Puzzle on Networks 2025-09-19
Across
- The ability of a network to be easily expanded by adding new devices, users, storage and other resources is
- The WIFI standard 802.11ax is also known as?
- A company that provides mobile network services to the public.
- This acronym represents the component of a mobile network that helps route calls and data.
- This type of network covers a very small area and is used to link personal devices such as tablets, smart phones, and laptops.
- A system that uses radio waves to transmit and receive data between devices is called _____________based.
- A network that covers a large area such as a town or city is called.
Down
- This acronym represents the unique name of WIFI network that are being broadcasted.
- A system of interconnected devices that communicate and share resources.
- A feature introduce in 2G networks which allowed users to send text messages is also known as?
- A network made up of computers within a small geographical area, such as an office building or home.
- This terms refers to the number of times a wave repeats or cycles within one second.
- A mobile service supported by 3G networks that allows for the sending of images and videos
- The name given to the technology that uses continuous varying signals to transmit information in 1G networks.
14 Clues: The WIFI standard 802.11ax is also known as? • A company that provides mobile network services to the public. • A network that covers a large area such as a town or city is called. • A system of interconnected devices that communicate and share resources. • This acronym represents the unique name of WIFI network that are being broadcasted. • ...
MODULE 11 QUIZ 2024-12-19
Across
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- Paid to probe networks and report vulnerabilities
- is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- is a server role that makes it possible for administrators to take control of Microsoft product updates
- a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- what the user has (smart card or key)
- Do not report problems, but instead disseminate the information to other
- what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern
- Creates a barrier between two entities
Down
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- features that enable administrators to control who has access to the network authentication
- The most widely used method for encrypting data is IP Security
- prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- What users can do after they are logged on to the network
- An industry-standard client/server protocol that offers centralized control
- what the user knows (username/password)
- A document that enlist the rules about access to an organization’s information resources, enforcement of regulations, and steps taken if rules are breached
20 Clues: what the user has (smart card or key) • Creates a barrier between two entities • what the user knows (username/password) • Paid to probe networks and report vulnerabilities • What users can do after they are logged on to the network • The most widely used method for encrypting data is IP Security • ...
Cybersecurity Fundamental Chapter 1 2022-11-29
Across
- Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
- group of criminals breaks into computers or networks to gain access for various reasons.
- Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- The Honeynet project is an example of creating Early Warning Systems.
Down
- great businesses have been created by collecting and harnessing the power of data and data analytics.
- InfraGard is an example of wide spread sharing of cyber intelligence.
- hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
- Business large and small have recognized the power of big data and data analytics.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence. • The Honeynet project is an example of creating Early Warning Systems. • Business large and small have recognized the power of big data and data analytics. • group of criminals breaks into computers or networks to gain access for various reasons. • ...
Digital literacies 2022-11-28
Across
- ability to read, write, critique and modify computer code for informational, communicational and design purposes
- ability to use digital tools to shape, establish and project a desired online identity as a platform for interacting with others
- ability to apply a critical lens to all aspects of digital technologies, including digital information, and through research, reflection and discussion to arrive at a considered position on their design and/or redesign
- ability to connect with others in personal and/or professional networks, and through these networks to filter, obtain and share information, to communicate and collaborate with others, to develop a reputation and influence, and to act within online and offline contexts
- ability to communicate effectively in textspeak characterised by abbreviations and contextual markers (including emoticons, emoji, emotional punctuation and hashtags)
- ability to contribute to the collective intelligence of digital networks and to leverage the collective intelligence of those networks in the service of goals which may be online and/or offline and which may be personal and/or collective
Down
- ability to effectively interpret, create, and interact through multimodal texts and/or multisensory communications
- ability to effectively interpret, create, and exchange representations of meaning using mobile devices
- ability to communicate effectively and constructively across varying, increasingly superdiverse, cultural contexts
- ability to exercise agency through redesign, specifically by reworking cultural artefacts
- ability to make effective use of a wide array of search engines and services
11 Clues: ability to make effective use of a wide array of search engines and services • ability to exercise agency through redesign, specifically by reworking cultural artefacts • ability to effectively interpret, create, and exchange representations of meaning using mobile devices • ...
Social Media 2021-01-18
Across
- A self-portrait taken using the reverse camera on a smartphone.
- A small, attractive application on a website such as a hit counter.
- Platform founded by Mark Zuckerberg.
- Anything shared across social networks that get passed along rapidly e. g. YouTube.
- A system that manages content.
- A network for online picture sharing.
- A photo-sharing application gained more than 300 million users.
Down
- #.
- A pictorial representation of a facial expression that is used in writing.
- Here you are allowed to share a 140-character update.
- Simple webpages that can be edited by others.
- It is an image or username that represents a person online most often within forums and social networks.
- They are also known as message boards.
- A site updated frequently by an individual or group to record opinions or information.
- A one-to-one communication on the internet.
- An action that can be made by a Facebook user.
16 Clues: #. • A system that manages content. • Platform founded by Mark Zuckerberg. • A network for online picture sharing. • They are also known as message boards. • A one-to-one communication on the internet. • Simple webpages that can be edited by others. • An action that can be made by a Facebook user. • Here you are allowed to share a 140-character update. • ...
Technology Vocabulary 2021-09-13
Across
- A self-portrait taken using the reverse camera screen on a smartphone
- The first page of a website
- Advertising that comes to your email address
- A message sent on Twitter
- The secret code that is only known by yourself
- Anything shared across social networks that get passed along rapidly e.g. YouTube
- A process of file transfer from the internet
- Platform founded by Mark Zuckerberg
- An action that can be made by a Facebook user
Down
- A name you choose for yourself, that isn't your real name
- The part of your computer with numbers and letters
- It is an image or username that represents a person online most often within forums and social networks
- A pictorial representation of a facial expression which is used in writing
- A hidden program that can hurt your computer
- A label that makes it easier to find information
- A letter you send through your computer
16 Clues: A message sent on Twitter • The first page of a website • Platform founded by Mark Zuckerberg • A letter you send through your computer • Advertising that comes to your email address • A hidden program that can hurt your computer • A process of file transfer from the internet • An action that can be made by a Facebook user • The secret code that is only known by yourself • ...
brain1 2025-02-24
Across
- A process or set of rules followed in calculations or problem-solving
- Software that manages computer hardware and software resources
- The measurement and statistical analysis of people's unique physical and behavioral characteristics
Down
- Secures data by converting it to a coded form
- Field analyzing large datasets
- Logical division of a drive
- Manages hardware and software
- Protects networks from threats
- Device that connects multiple networks
9 Clues: Logical division of a drive • Manages hardware and software • Field analyzing large datasets • Protects networks from threats • Device that connects multiple networks • Secures data by converting it to a coded form • Software that manages computer hardware and software resources • A process or set of rules followed in calculations or problem-solving • ...
How Cognizant drove a tech giant towards savings and improved efficiency 2025-04-29
Across
- - Shortcutz is designed to handle these type of road networks
- – The percentage overall operational efficiency improved by
- - Countries covered by the fleet
- - The type of optimization used in Shortcutz
Down
- - Algorithm used alongside Ant Colony Optimization
- - The name of the application developed by Cognizant
- - Programming language used in Shortcutz
- - Type of graphs used to model road networks
- - Technique used to optimize preprocessing
9 Clues: - Countries covered by the fleet • - Programming language used in Shortcutz • - Technique used to optimize preprocessing • - Type of graphs used to model road networks • - The type of optimization used in Shortcutz • - Algorithm used alongside Ant Colony Optimization • - The name of the application developed by Cognizant • ...
Unit 1 Review 2014-10-27
Across
- study of workplace health and safety
- part of the email that contains the message
- email service based on a web server
- any part of a computer you can see or touch
- the ability to attach a file or photo to email
- when a page is oriented vertically
- any company that provides access to the internet
- any set of machine readable instructions that gives directions
- any device used to put information into the computer
- any device used to get information out of the computer
- what the email is about
Down
- memory that is volatile
- when the page is turned so it is wider then tall
- manages the computers hardware and software
- network located over a large area
- network located in a small area
- software used to retrieve, present and browse pages on the internet
- computer memory on which data has been prerecorded
- to adjust so the print is even on one side or fills a space evenly
- global system of interconnected computer networks
- collection of private computer networks within an organization
21 Clues: memory that is volatile • what the email is about • network located in a small area • network located over a large area • when a page is oriented vertically • email service based on a web server • study of workplace health and safety • part of the email that contains the message • manages the computers hardware and software • any part of a computer you can see or touch • ...
Derek's Crossword Puzzle 2015-01-21
Across
- A computer or computer program that manages access to a centralized resource or service in a network
- Computer memory
- American Standard Code for Information Interchange
- Hyper Text Markup Language
- A diagrammatic representation of an algorithm
- Stores all files and data on a computer
- An IDE from microsoft
- Phase in the software development cycle when an application is tested for functionality
- A person who writes code for computer programs
Down
- One of the most in demand programming languages developed by Sun Microsystems
- Network device that forwards data packets to other networks
- Most common kind of video on the internet involving tiny furry creatures
- The list of commands a programmer types before they are compiled
- A positional numeral system with a radix, or base, of 16
- The central computing unit of a computer
- A global system of interconnected computer networks
- Computer language using ones and zeros
- Device that filters and forwards data packets between LAN segments
- The .NET framework was created by what company?
- A process or set of rules to be followed in calculations or other problem-solving operations
20 Clues: Computer memory • An IDE from microsoft • Hyper Text Markup Language • Computer language using ones and zeros • Stores all files and data on a computer • The central computing unit of a computer • A diagrammatic representation of an algorithm • A person who writes code for computer programs • The .NET framework was created by what company? • ...
computer class 2016-02-03
Across
- 6 second video site
- shopping community
- how far you are in the internet.
- made to communicate with friends and family
- kinda a clone to facebook
- a source for info and files.
- up- Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telephone line.
- clone of skype
- communicating via voice
- blogging
- communicating via "tweets
Down
- bidding and shopping
- playing nice on the web
- is a family of computer networking technologies commonly used in local area networks (LANs) and metropolitan area networks (MANs). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3, and has since been refined to support higher bit rates and longer link distances.
- media- websites where we talk to people
- gaming community
- pinning favorite things
- a group or system of interconnected people or things.
- game broadcasts
- messages distributed by electronic means from one computer user to one or more recipients via a network.
20 Clues: blogging • clone of skype • game broadcasts • gaming community • shopping community • 6 second video site • bidding and shopping • playing nice on the web • pinning favorite things • communicating via voice • kinda a clone to facebook • communicating via "tweets • a source for info and files. • how far you are in the internet. • media- websites where we talk to people • ...
CW1 2017-10-08
Across
- :Blocks Unauthorised access to networks.
- :__________Signals are used to carry message in fibre optic cables
- :Address space for IoT
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- :A machine which asks or start communication.
- :Deny or allow packet based on rules.
- :All devices can talk to each other.
- :Network attack that occurs on the first
- :An attack named after greek-trojan war.
- :Business and Personal equipment must be protected
- :command to go from switch> to switch#
- :A powerful machine which answers.
- :A Method to connect Business to Internet
- :Creates a secure connection for remote workers.
- that a vulnerability becomes known.
- : An attack which slows down or crashes equipment and programs
Down
- :Marks IP address in network diagram
- :WANs are in control of _______________.
- :Stealing your username and password.
- :Access to people inside company only.
- :Network Can grow
- :Priority Queues
- :interconnects networks
- :A program to stop virus attack.
- Program secretly collecting information.
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • that a vulnerability becomes known. • :Marks IP address in network diagram • :All devices can talk to each other. • :Stealing your username and password. • :Deny or allow packet based on rules. • ...
concepts associated with network requirements. 2021-04-09
Across
- handles connection to the network by the higher layers
- Define the rules that govern the communications between two computers connected to the network
- a communication computer that connects different types of networks using different protocols
- a device on a network can be thought of as this
- Manages sessions among applications
- provides end-to-end errors detection and correction
- defines the physical characteristics of the network
- allows the constitution of communication groups (newsgroups) organized around specific topics
- type of network that covers buildings
- allows the management of the network
- provides safe communication of data over the physical network
Down
- Consists of only 4 layers
- Consists of only 7 layers
- allows the transfer of collection of files between two machines connected to the Internet
- Numeric quantities that are easy for computers with but not for humans to remember
- provides standard data representations for applications
- type of networks that covers cities
- defines a basic service for electronic mails
- allows a user to connect to a remote host in terminal mode
- applications connected to the network
20 Clues: Consists of only 4 layers • Consists of only 7 layers • type of networks that covers cities • Manages sessions among applications • allows the management of the network • applications connected to the network • type of network that covers buildings • defines a basic service for electronic mails • a device on a network can be thought of as this • ...
Network Requirements Crossword 2023-09-05
Across
- network interface card
- a high-speed internet connection
- Local Area Network
- a computer network security system that restricts internet traffic
- an electronic device that relays a transmitted signal
- internet protocol
- a computer program or device that provides a service to another computer program and its user
- Network Operating System
- a piece of networking hardware that links multiple devices together
Down
- a hardware device that acts as a "fence" between two networks
- connects LAN to WAN
- any computer or other device connected to a network that sends, receives, or redistributes data
- a cord, connector or plug
- a device that connects two or more packet-switched networks
- Network Attach Storage
- the maximum capacity of a wired or wireless communications link to deliver data via a network connection
- a device that connects two LANs
- a set of rules that need to be followed
- computers that access and use the network and shared network resources
- a hardware device used at the physical layer to connect multiple devices in the network
20 Clues: internet protocol • Local Area Network • connects LAN to WAN • network interface card • Network Attach Storage • Network Operating System • a cord, connector or plug • a device that connects two LANs • a high-speed internet connection • a set of rules that need to be followed • an electronic device that relays a transmitted signal • ...
ST10050768's NWEG5122 Crossword 2023-08-30
Across
- Topology where all computing devices are connected with a single cable
- converting information into secret code to hide information
- network device that is used to segment the networks into different subnetworks called subnets or LAN segments
- Measuring by quality rather than quantity
- component that allows network device to move data to the system's memory reducing CPU usage
- Device that forwards data packets from one network to another
- protecting computer networks from cyber threats is called network ...
- Amount of data that moves across a network during any given time
- Delay in time taken for data to reach its destination
- rate of message delivery over a communication channel
- data can be stored in ...
Down
- Topology where all computing devices are connected to a central node
- capacity at which a network can transmit data
- Another word for Network Adapter(Abbreviation)
- Information translated into a form efficient for processing
- Measuring by quantity rather than quality
- Data divided into small segments
- Global network
- Time delay over a network connection
- Established set of rules that determines how data is sent
20 Clues: Global network • data can be stored in ... • Data divided into small segments • Time delay over a network connection • Measuring by quantity rather than quality • Measuring by quality rather than quantity • capacity at which a network can transmit data • Another word for Network Adapter(Abbreviation) • Delay in time taken for data to reach its destination • ...
Cybersecurity Term Bank 2025-08-27
Across
- Breach Unauthorized release or theft of information
- Verifying a user’s identity
- Access Terminal Device (screen/keyboard) for interacting with a computer
- Malware that self-replicates and spreads across networks
- Trick users into giving information via fake messages
- Privilege Giving users the minimum access needed
- Instructions that run on hardware to perform tasks
- Device that forwards data between networks
- attacks Flooding a target with traffic to overwhelm it
- Number used by a protocol for communication
- Event with potential to harm systems or data
- Computer providing resources to others
- Reliable access to data and systems
- in Depth Multiple layers of security protection
Down
- Converting plaintext into unreadable code
- Software designed to harm systems or data
- Weakness that can be exploited
- Keeping info accessible only to authorized users
- Reducing features or data exposure
- Ensuring data is accurate and unchanged
- Control Process of granting or denying use of resources
- Information at rest, in use, or in transit
- Malware that spreads by attaching to files/programs
- in the Middle (MITM) Attacker intercepts and alters communication
- Physical parts of a computer
- System that filters network traffic
26 Clues: Verifying a user’s identity • Physical parts of a computer • Weakness that can be exploited • Reducing features or data exposure • System that filters network traffic • Reliable access to data and systems • Computer providing resources to others • Ensuring data is accurate and unchanged • Converting plaintext into unreadable code • Software designed to harm systems or data • ...
Les fake news - vocabulaire 2021-04-03
15 Clues: power • a hoax • to lie • to share • networks • to share • to verify • publicity • aggravate • a propaganda • to make better • false or fake info • computer program that alters • verifying a source is called __ • Information and intoxication equals ___
Computer Networks: Part 2 2022-03-27
Across
- A more ‘intelligent’ device than a hub.
- World-wide network.
- The process of converting information into a form that is meaningless to anyone except holders of a ‘key’.
- It combines two or more of the basic topologies.
- Private network that provides similar services to The Internet.
- A network device that typically links together two different parts of a LAN.
- A computer setup to share a resource, usually an Internet connection.
- Used to connect all of the computers together. Each computer has a short cable.
Down
- Internet Service Provider.
- Each computer is connected to a loop of cable.
- Device that connects a number of computers together to make a LAN.
- Every computer is connected to a central device. The device passes messages between computers.
- These are still used in most networks, rather than using only wireless, because they can carry much more data per second, and are more secure (less open to hacking).
- A device, or a piece of software that is placed between your computer and the rest of the network
- Special device to join the digital computer to the analogue telephone line.
- A network device that connects together two or more networks.
- Network Interface Card.
17 Clues: World-wide network. • Network Interface Card. • Internet Service Provider. • A more ‘intelligent’ device than a hub. • Each computer is connected to a loop of cable. • It combines two or more of the basic topologies. • A network device that connects together two or more networks. • Private network that provides similar services to The Internet. • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Alpo 2021-02-25
Across
- used to connect together multiple devices, not that intelligent
- supports 100baseT
- network spanning a metropolitan area
- global network comprised of most devices
- Two or more computers linked to share resources
- supports 10baseT
- aware of every device connected to it, used to connect together multiple devices, smart
- supports 1000baset
- stores and transfers data, has no physical interface
- connects devices to others, provides a firewall
- network spanning a wide area
- ip comprised of 8 sets of 4 long hexadecimal numbers
- fastest speed possible
Down
- ip comprised of 4 different sets of numbers ranging 0 - 255
- Unique six sets of two numbers identifier for a device
- connects two networks together or splits up into two segments
- network spanning a local area
- station for work
- extends the range of cabled networks
- Number assigned by router linked to your internet activity
- data sent with destination and what it wants to do
- reaches up to 100gb/s of speed or higher
- cable with 8 wires used for networking
23 Clues: station for work • supports 10baseT • supports 100baseT • supports 1000baset • fastest speed possible • network spanning a wide area • network spanning a local area • network spanning a metropolitan area • extends the range of cabled networks • cable with 8 wires used for networking • global network comprised of most devices • reaches up to 100gb/s of speed or higher • ...
Cyber Security 2023-09-09
Across
- the protection of data and systems.
- insurance that provides liability.
- training to help educate about possible cyber threats.
- software designed with malicious intent to steal/destroy data.
- a type of malware used to encrypt files and obtain data.
- protecting connected devices and networks from unauthorized access.
- the conversion of readable data to encoded data.
- protects data from physical actions.
- insurance that covers losses money.
- a group of steps that show how to execute a test.
- an organization to help businesses manage cybersecurity risks.
- a set of requirements to help create strong passwords.
Down
- when someone pretends to be something to steal data.
- changes made to a software to improve it.
- helps cover a business's losses from a cyber attack.
- saving data in a different secure and safe place in case data is lost.
- encrypted security used to protect Wi-Fi networks.
- stealing information from an unaware person through the internet.
- a strategy made to protect businesses from threats.
- an attack used to obtain sensitive data by acting as a trusted source.
20 Clues: insurance that provides liability. • the protection of data and systems. • insurance that covers losses money. • protects data from physical actions. • changes made to a software to improve it. • the conversion of readable data to encoded data. • a group of steps that show how to execute a test. • encrypted security used to protect Wi-Fi networks. • ...
saklksdg 2025-03-26
Across
- A unique address used to identify a website
- A network of computers that share resources and data
- A collection of web pages under a single name
- A program used to detect and remove malware
- A type of malicious software that encrypts files for ransom
- System The basic software that manages hardware and software resources
- A virtual storage solution accessible via the internet
- A structured collection of data
- A version control system used for software development
- A technology that enables wireless communication over short distances
Down
- The main circuit board of a computer
- An attack that prevents access to a system by overwhelming it
- A protective barrier for networks against cyber threats
- The process of finding and fixing errors in code
- A worldwide system of interconnected networks
- The process of converting plain text into a secure format
- Address A globally unique identifier for devices on a network
- A computer program designed to interact with users in a conversation
- The language used to structure web pages
- A person who attempts to gain unauthorized access to a system
20 Clues: A structured collection of data • The main circuit board of a computer • The language used to structure web pages • A unique address used to identify a website • A program used to detect and remove malware • A collection of web pages under a single name • A worldwide system of interconnected networks • The process of finding and fixing errors in code • ...
Baby Boomer Trivia 2021-09-17
Across
- Girl, Marlo Thomas' hit TV show from the mid-1960s
- The company that introduced America to the TV dinner
- Boots are Made for Walking, Nancy Sinatra's biggest hit
- The number of major TV broadcast networks in 1959
- tail, Popular boy's hairstyle in the 1950s
- Fictional town that was home to The Andy Griffith Show
- McCarthy Edgar Bergen's ventriloquist dummy
- Monkeys, Product advertised in comic books that was a favorite of budding biologists
Down
- Orange-flavored drink favored by astronauts
- D Eisenhower The U.S. President in 1958
- The first man-made satellite launched into space
- Monroe, Who was on the cover of the first 'Playboy' Magazine?
- TV western that debuted in 1955 and ran for 20 years
- horse cartoon, Who was Quick Draw McGraw?
- Spangled Banner, Song television networks played to signal the end of the programming day
- Eden, Actor who played Jeannie in “I Dream of Jeannie"
16 Clues: D Eisenhower The U.S. President in 1958 • horse cartoon, Who was Quick Draw McGraw? • tail, Popular boy's hairstyle in the 1950s • Orange-flavored drink favored by astronauts • McCarthy Edgar Bergen's ventriloquist dummy • The first man-made satellite launched into space • The number of major TV broadcast networks in 1959 • ...
Networking: Common Ports 2024-10-03
Across
- Web traffic without encryption (80)
- Clock synchronization between two machines (123)
- Send and receive email messages (25)
- Network naming protocol for networks that automatically assign IP addresses (67/68)
- Remote log-in securely to another machine over unsecure networks, typically for CLI (22)
- Naming system for IP Addresses (53)
- Real-time sessions that include voice, video, text messaging, etc. (5060/5061)
- Transfers files between two systems (20/21)
- Transfers files from one system to another with lockstep method (69)
- Microsoft created to provide access to devices on a network (445)
Down
- Hosts the information about machines on a network (161/162)
- Text communication between two machines in plaintext (23)
- Contains directory information for a network (389)
- A client can retrieve emails from an email server (143)
- A client can retrieve emails from an email server (110)
- Access a machine’s desktop remotely (3389)
16 Clues: Web traffic without encryption (80) • Naming system for IP Addresses (53) • Send and receive email messages (25) • Access a machine’s desktop remotely (3389) • Transfers files between two systems (20/21) • Clock synchronization between two machines (123) • Contains directory information for a network (389) • A client can retrieve emails from an email server (143) • ...
COSC 100 2015-09-28
Across
- Composed of HTML tags and multimedia files
- No more than ___ copies may be made of a project
- The main technology for local area networks
- A group of information on a computer that can be software programs or data
- Communication where the sending and receiving occur at different times
- Hyper Text Mark-up Language
- Used to view web pages that may contain text, images, videos and navigate between them via hyperlinks
- A person who falsifies data to pretend to be someone else
- is when computers are geographically close
- if I want CAT and DOG to show up in my search, I use ___
- Always credit the ______
Down
- A type of program used for editing plain text files
- Wide Area Networks
- Types of _____: File, Memory, Browser, and Edge
- Pictures, movies, or graphics
- Communication where both the sender and the receiver are active at the same time
- Should be used with caution on web-pages
- 79% of users ___ the page
18 Clues: Wide Area Networks • Always credit the ______ • 79% of users ___ the page • Hyper Text Mark-up Language • Pictures, movies, or graphics • Should be used with caution on web-pages • Composed of HTML tags and multimedia files • is when computers are geographically close • The main technology for local area networks • Types of _____: File, Memory, Browser, and Edge • ...
DQ Social Media Crossword 2021-08-06
Across
- A self-portrait taken using the reverse camera screen on a smartphone
- A message sent on Twitter
- A photo-sharing application gained more than 300 million users
- Clusters of users friends, colleagues, family, or connections on Google+
- Platform founded by Mark Zuckerberg
- Anything shared across social networks that get passed along rapidly e.g youtube
- A free URL shortening service
Down
- A small, attractive application on a website such as a hit counter
- Simple web pages that can be edited by other users
- #(known as)
- A system that manages content
- They are also known as message boards
- A pictorial representation of a facial expression that is used in writing
- A network for online photo sharing
- An action that can be made by a Facebook user
- It is an image or username that represents a person online most often within forums and social networks
- A one to one communication service on the internet
- A site updated frequently by an individual or group to record opinions or information
18 Clues: #(known as) • A message sent on Twitter • A system that manages content • A free URL shortening service • A network for online photo sharing • Platform founded by Mark Zuckerberg • They are also known as message boards • An action that can be made by a Facebook user • Simple web pages that can be edited by other users • A one to one communication service on the internet • ...
computer knowledge 2021-03-18
Across
- wireless fidelity is long for
- access point is long for
- what allows your phone to get online when you`re away from wifi
- the biggest world wide communication
- what is the main app people use to find information
Down
- world wibe web is long for
- internet service provider is long for
- a system of interconnecting people is the definition of
- LAN,PAN,MAN,WAN are all networks of computers
- the thing that you have to turn on to connect to a speaker
10 Clues: access point is long for • world wibe web is long for • wireless fidelity is long for • the biggest world wide communication • internet service provider is long for • LAN,PAN,MAN,WAN are all networks of computers • what is the main app people use to find information • a system of interconnecting people is the definition of • ...
Theme: Technology 2024-07-24
Across
- An organized collection of data
- A machine capable of carrying out complex actions automatically
- A global network connecting millions of private public academic and government networks
- A process or set of rules to be followed in calculations or other problem-solving operations
- The programs and other operating information used by a computer
Down
- The practice of protecting systems networks and programs from digital attacks
- A mobile phone with advanced features
- A portable personal computer
- An unmanned aerial vehicle
- Abbreviation for Artificial Intelligence
10 Clues: An unmanned aerial vehicle • A portable personal computer • An organized collection of data • A mobile phone with advanced features • Abbreviation for Artificial Intelligence • A machine capable of carrying out complex actions automatically • The programs and other operating information used by a computer • ...
Unit 1 Crossword 9 2025-05-14
Across
- Document specifying standards and protocols for the Internet
- Device that connects multiple computers in a network, broadcasts to all
- Protocol suite with fewer layers than OSI
- Device that connects and filters traffic between two network segments
- Wide Area Network covering large geographic areas
Down
- Conceptual framework with seven network layers
- Device that routes data between different networks
- Device that connects networks using different protocols
- Device that connects devices and forwards data only to intended recipient
- Device or software that controls network security and access
10 Clues: Protocol suite with fewer layers than OSI • Conceptual framework with seven network layers • Wide Area Network covering large geographic areas • Device that routes data between different networks • Device that connects networks using different protocols • Document specifying standards and protocols for the Internet • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Derek's Crossword Puzzle 2015-01-21
Across
- A diagrammatic representation of an algorithm
- The .NET framework was created by what company?
- Hyper Text Markup Language
- The list of commands a programmer types before they are compiled
- A positional numeral system with a radix, or base, of 16
- Computer language using ones and zeros
- A global system of interconnected computer networks
Down
- A process or set of rules to be followed in calculations or other problem-solving operations
- One of the most in demand programming languages developed by Sun Microsystems
- The central computing unit of a computer
- A person who writes code for computer programs
- American Standard Code for Information Interchange
- An IDE from microsoft
- A computer or computer program that manages access to a centralized resource or service in a network
- Network device that forwards data packets to other networks
- Stores all files and data on a computer
- Most common kind of video on the internet involving tiny furry creatures
- Phase in the software development cycle when an application is tested for functionality
- Device that filters and forwards data packets between LAN segments
- Computer memory
20 Clues: Computer memory • An IDE from microsoft • Hyper Text Markup Language • Computer language using ones and zeros • Stores all files and data on a computer • The central computing unit of a computer • A diagrammatic representation of an algorithm • A person who writes code for computer programs • The .NET framework was created by what company? • ...
Technology computer 2023-11-29
Across
- - Solid State Drive; a faster and more durable storage alternative to HDD.
- - Physical components of a computer system.
- - Central processing unit; the brain of the computer.
- - The main circuit board containing the central components of a computer.
- - Input device for controlling movement in a computer game.
- - Process of generating an image from a model.
- - Writing code to instruct a computer.
- - Temporary storage area, often used to improve data transfer.
Down
- - Programs and data that operate a computer.
- - Device that forwards data packets between computer networks.
- - Device for producing a paper copy of data from a computer.
- - Common storage device for digital data.
- - Pointing device commonly used with computers.
- - Autonomous or semi-autonomous mechanical device.
- - Input device with keys for entering data into a computer.
- - Device for converting sound into an electrical signal.
- - Read-Only Memory; a type of non-volatile memory.
- - Global network connecting millions of private, public, academic, business, and government networks.
- - Computer or system that manages network resources.
- - Video Graphics Array; a standard for displaying graphics.
20 Clues: - Writing code to instruct a computer. • - Common storage device for digital data. • - Physical components of a computer system. • - Programs and data that operate a computer. • - Process of generating an image from a model. • - Pointing device commonly used with computers. • - Autonomous or semi-autonomous mechanical device. • ...
Cybersecurity Crossword 2025-05-14
Across
- A strong and unique combination to protect online accounts.
- Software designed to detect and destroy computer viruses.
- Bullying that occurs over digital devices like phones and computers.
- authentication A security process using two different verification factors.
- A network security system controlling traffic based on rules.
- Data that can be used to identify an individual.
- Encoding info so only authorized parties can understand it.
- Potential dangers or malicious activities found on the internet.
- Protecting computer systems/networks from theft, damage, or disruption.
Down
- Manipulating people to divulge info or perform actions.
- Synthetic media replacing a person's likeness using AI.
- Individuals who exploit weaknesses in computer systems or networks.
- Connected to the internet.
- Extends a private network across public ones for secure data transfer.
- Footprint The trail of data you create while using the Internet.
- Attempts to gain unauthorized access to damage or disrupt systems.
- Software intended to damage or disable computers and systems.
- Trustworthy and accurate sources of information.
- Potential dangers or hazards.
- Online fraud where attackers impersonate to trick you into revealing info.
20 Clues: Connected to the internet. • Potential dangers or hazards. • Trustworthy and accurate sources of information. • Data that can be used to identify an individual. • Manipulating people to divulge info or perform actions. • Synthetic media replacing a person's likeness using AI. • Software designed to detect and destroy computer viruses. • ...
chapter two key terms 2025-02-27
Across
- Distributing available data capacity among users.
- The predefined path for network traffic when no other route is known.
- A signal used in wireless communication before transmitting data.
- Allows data transmission in only one direction at a time.
- The device that connects a local network to other networks.
- A device that connects multiple devices in a network.
- Boosts and extends network signals.
- Provides wireless connectivity to a network.
- A data packet sent to a single destination.
Down
- A hardware component that connects a device to a network.
- Allows data transmission in both directions simultaneously.
- The maximum data transfer rate of a network.
- A data packet sent to all devices in a network.
- A network segment where broadcast traffic is received by all devices.
- A network mode where a device captures all traffic, not just its own.
- A basic device that connects multiple network devices.
- The name of a Wi-Fi network.
- A signal indicating permission to send data.
- Directs data between different networks.
- Connecting one network device to another.
20 Clues: The name of a Wi-Fi network. • Boosts and extends network signals. • Directs data between different networks. • Connecting one network device to another. • A data packet sent to a single destination. • The maximum data transfer rate of a network. • A signal indicating permission to send data. • Provides wireless connectivity to a network. • ...
PC. 2025-09-03
Across
- Malicious software designed to harm or exploit any device.
- A wireless networking technology.
- The physical components of a computer.
- A person who uses computers to gain unauthorized access to data.
- A device that forwards data packets between computer networks.
- A device that displays visual output from a computer.
- The practice of protecting systems, networks, and programs from digital attacks.
- A small piece of data sent from a website and stored on the user's computer.
- A machine that performs tasks according to a set of instructions.
- A global network connecting millions of computers.
Down
- A security system that controls incoming and outgoing network traffic.
- A storage medium that uses flash memory.
- A portable computer.
- A collection of data stored in a structured way.
- Temporary memory that a computer uses to store data for quick access.
- An input device used to type text and commands.
- The process of converting data into a code to prevent unauthorized access.
- The brain of the computer that processes instructions.
- A set of instructions that tells the hardware what to do.
- The process of starting a computer.
20 Clues: A portable computer. • A wireless networking technology. • The process of starting a computer. • The physical components of a computer. • A storage medium that uses flash memory. • An input device used to type text and commands. • A collection of data stored in a structured way. • A global network connecting millions of computers. • ...
Computer Network 2025-08-26
Across
- – Network security system that filters traffic (8 letters)
- – System that maps domain names to IP addresses (3 letters)
- – Device that forwards frames based on MAC addresses (6 letters)
- – Connectionless transport protocol (3 letters)
- – Reliable, connection-oriented transport protocol (3 letters)
Down
- – Hardware address used at the data-link layer (3 letters)
- – Smallest unit of data transmitted over networks (6 letters)
- – Device that forwards packets between networks (6 letters)
- – Protocol that automatically assigns IP addresses (4 letters)
- – Identifier for a Wi-Fi network (4 letters)
- – Simple device that repeats signals to all ports (3 letters)
- – 128-bit addressing scheme, successor of IPv4 (4 letters)
12 Clues: – Identifier for a Wi-Fi network (4 letters) • – Connectionless transport protocol (3 letters) • – Hardware address used at the data-link layer (3 letters) • – Network security system that filters traffic (8 letters) • – 128-bit addressing scheme, successor of IPv4 (4 letters) • – Device that forwards packets between networks (6 letters) • ...
Network Requirements Crossword 2023-09-05
Across
- Network Attach Storage
- a set of rules that need to be followed
- internet protocol
- network interface card
- a hardware device that acts as a "fence" between two networks
- a hardware device used at the physical layer to connect multiple devices in the network
- a device that connects two or more packet-switched networks
- an electronic device that relays a transmitted signal
- a device that connects two LANs
Down
- a computer network security system that restricts internet traffic
- a piece of networking hardware that links multiple devices together
- Network Operating System
- Local Area Network
- the maximum capacity of a wired or wireless communications link to deliver data via a network connection
- a computer program or device that provides a service to another computer program and its user
- connects LAN to WAN
- a high-speed internet connection
- any computer or other device connected to a network that sends, receives, or redistributes data
- computers that access and use the network and shared network resources
- a cord, connector or plug
20 Clues: internet protocol • Local Area Network • connects LAN to WAN • Network Attach Storage • network interface card • Network Operating System • a cord, connector or plug • a device that connects two LANs • a high-speed internet connection • a set of rules that need to be followed • an electronic device that relays a transmitted signal • ...
crossword 2024-10-07
Across
- - A computer that requests resources from a server.
- - A private network that connects devices in a small area.
- - A computer that provides services to other computers on the network.
- - A type of network that spans a large geographic area.
- - A set of rules governing the exchange of data between devices.
- - The total capacity of a data transmission system.
- - A device that connects devices within a network.
- - A collection of computers and devices connected to share resources.
- - A device that connects two different networks.
- - A smaller network within a larger network.
Down
- - A common method for connecting devices in a wired network.
- - A device that monitors and controls incoming and outgoing network traffic.
- - The amount of data transmitted in a given time.
- - A secure connection over the internet.
- - A device that forwards data packets between computer networks.
- - The arrangement of different elements in a network.
- - A machine that provides resources to other machines.
- - A way to connect devices without wires.
- - Data formatted for transmission over a network.
- Address - The address assigned to a device on a network.
20 Clues: - A secure connection over the internet. • - A way to connect devices without wires. • - A smaller network within a larger network. • - A device that connects two different networks. • - The amount of data transmitted in a given time. • - Data formatted for transmission over a network. • - A device that connects devices within a network. • ...
Tech Terma 2023-04-26
Across
- Files made by websites you go to
- Connects hardware to processor
- Personal Identifiable Information
- 1 million bytes of data
- hardware or software that has been recently released.
- Read only memory
- A way of scrambling information only authorized parties can understand it
- 8 bits put together
- Ctrl V
- Devices like a printer
- Taking information from somewhere else onto your computer
- Network security device that monitors traffic to and from your network
- Connecting multiple systems together on a local network
- Software made to disrupt a computer network
Down
- Chrome or Safari
- Systems such as Chrome OS, Windows
- Computer that provides service to another computer
- A frequently updated website used for personal commentary or buisnesses
- Worldwide System of Networks
- Computers short term memory
- Ctrl C
- Adress
- Devices like a keyboard or mouse
- A zero or one
- Central processing unit
- Domain name system
- Portable Document Format
- Uniform Resource Locator
- Open Source Software
- Forwards data between computer networks
- Hyper Text Markup Language
- World Wide Web
32 Clues: Ctrl C • Adress • Ctrl V • A zero or one • World Wide Web • Chrome or Safari • Read only memory • Domain name system • 8 bits put together • Open Source Software • Devices like a printer • 1 million bytes of data • Central processing unit • Portable Document Format • Uniform Resource Locator • Hyper Text Markup Language • Computers short term memory • Worldwide System of Networks • ...
saklksdg 2025-03-26
Across
- A globally unique identifier for devices on a network
- A structured collection of data
- The main circuit board of a computer
- A unique address used to identify a website
- A version control system used for software development
- The language used to structure web pages
- A network of computers that share resources and data
- The process of finding and fixing errors in code
- A person who attempts to gain unauthorized access to a system
- A virtual storage solution accessible via the internet
- A collection of web pages under a single name
- A computer program designed to interact with users in a conversation
Down
- A program used to detect and remove malware
- The process of converting plain text into a secure format
- A type of malicious software that encrypts files for ransom
- A technology that enables wireless communication over short distances
- An attack that prevents access to a system by overwhelming it
- A worldwide system of interconnected networks
- A protective barrier for networks against cyber threats
- The basic software that manages hardware and software resources
20 Clues: A structured collection of data • The main circuit board of a computer • The language used to structure web pages • A program used to detect and remove malware • A unique address used to identify a website • A worldwide system of interconnected networks • A collection of web pages under a single name • The process of finding and fixing errors in code • ...
Cybersecurity Crossword 2025-05-14
Across
- Software designed to detect and destroy computer viruses.
- Potential dangers or malicious activities found on the internet.
- Synthetic media replacing a person's likeness using AI.
- A network security system controlling traffic based on rules.
- A security process using two different verification factors.
- Manipulating people to divulge info or perform actions.
- Extends a private network across public ones for secure data transfer.
- Attempts to gain unauthorized access to damage or disrupt systems.
- Trustworthy and accurate sources of information.
Down
- Protecting computer systems/networks from theft, damage, or disruption.
- Connected to the internet.
- Bullying that occurs over digital devices like phones and computers.
- Potential dangers or hazards.
- The trail of data you create while using the Internet.
- Individuals who exploit weaknesses in computer systems or networks.
- Software intended to damage or disable computers and systems.
- Encoding info so only authorized parties can understand it.
- Data that can be used to identify an individual.
- A strong and unique combination to protect online accounts.
- Online fraud where attackers impersonate to trick you into revealing info.
20 Clues: Connected to the internet. • Potential dangers or hazards. • Data that can be used to identify an individual. • Trustworthy and accurate sources of information. • The trail of data you create while using the Internet. • Synthetic media replacing a person's likeness using AI. • Manipulating people to divulge info or perform actions. • ...
Extra task 2023-04-12
Across
- Develops algorithms and computer programs that can perform tasks requiring human intelligence
- Coordinates the deployment and operation of software applications
- Develops applications that incorporate computer-generated perceptual information
- Designs and manages cloud-based systems and services
- Analyzes and optimizes digital marketing campaigns
- Analyzes and interprets complex digital data sets to extract insights
- Designs and builds new types of computers based on quantum mechanics
- Develops software for both client and server-side applications
- Designs and optimizes the experience users have when interacting with digital products
- Designs and manages networks of physical devices connected to the internet
Down
- Creates secure digital ledgers for recording transactions
- Designs the overall structure of information systems
- Creates applications for mobile devices
- Designs, builds, and operates robots for a variety of applications
- Protects computer systems and networks from theft or damage
15 Clues: Creates applications for mobile devices • Analyzes and optimizes digital marketing campaigns • Designs the overall structure of information systems • Designs and manages cloud-based systems and services • Creates secure digital ledgers for recording transactions • Protects computer systems and networks from theft or damage • ...
CNN 2023-11-25
Across
- Model with high bias and low variance
- Activation function used in the output layer for classification
- Categorical Loss function in CNN
- Training algorithm for updating weights in a neural network
- Google's pretrained ML model
- Popular activation function introducing non-linearity
- Technique of creating new training examples by applying transformations
- Another name for Kernel to reduce dimensions in CNNs
- A type of recurrent neural network with memory cell
- A type of Neural Network handling sequential data
- Optimization algorithm using one example at a time
- Issue where gradients become very small during training
- Adapts a pre-trained model for a new task
- Optimization algorithm that accumulates past gradients to accelerate learning
- A set of data samples used in one iteration of training
- Process of selecting and representing relevant information from input data
- Controls the size of steps in gradient descent
- Strategy for setting initial values in a neural network
- Optimization algorithm for finding the minimum
- Technique to prevent overfitting nodes in neural networks
- Adaptive Linear Neuron, a single-layer neural network
- Determines the output of a node in a neural network
Down
- Configuration setting parameters to the model
- Non-linear transformation applied to a neuron's output
- Key operation in Convolutional Neural Networks (CNNs)
- Activation function similar to sigmoid, ranges from -1 to 1
- a type of recurrent neural network cell with memory like operation
- No. of trainable parameters in GRU
- Simplest form of a neural network, single-layer binary classifier
- Also known as recall or TPR
- Table used to assess the performance of a classification model
- A pretrained Model with 13 CNN and 3 Dense Layers
- Model performs well on training data but poorly on new data
- No. of trainable parameters in LSTM
- a CNN Layer where dimensions of the input are reduced
- Neural network designed for sequential data
- Error Square algorithm for updating weights in neural networks
- Layer functioning as FCNN in VGG16
- Basic building block of a neural network
- Additional parameter representing an offset in neural networks
- One complete pass through the entire training dataset
- Technique to prevent exploding gradients in RNN
- Architecture where information flows in one direction
- Adding extra pixels or values around the edges of an image in CNN
- Evaluation of a model on a separate dataset to tune hyperparameters
- An unsupervised Learning rule
- Standard version of a neural network or algorithm
47 Clues: Also known as recall or TPR • Google's pretrained ML model • An unsupervised Learning rule • Categorical Loss function in CNN • No. of trainable parameters in GRU • Layer functioning as FCNN in VGG16 • No. of trainable parameters in LSTM • Model with high bias and low variance • Basic building block of a neural network • Adapts a pre-trained model for a new task • ...
crossword 2025-02-16
Across
- - A unit of digital storage equal to 1,024 gigabytes.
- - A reference in a document that connects to another location or file.
- - Increasing a computer component’s speed beyond its specifications.
- - A cryptographic technique that uses quantum mechanics.
- - An organized collection of structured information or data.
- - A global network connecting millions of devices.
- - A cyber attack that tricks users into revealing personal information.
- - The maximum rate of data transfer across a network.
- - A security system that monitors and controls network traffic.
- - A temporary storage area for frequently accessed data.
- - Software with publicly available source code.
- - A type of AI that mimics human intelligence.
- - Temporary memory used for quick access.
- - The process of replacing sensitive data with unique identifiers.
- - A digital storage space in the cloud.
- - Data that describes other data.
- - A device that connects networks.
- - A wireless networking technology.
- - A step-by-step procedure for solving a problem.
- - The delivery of computing services over the internet.
- - Unwanted or unsolicited messages, typically emails.
- - A self-replicating computer program.
- - The smallest unit of data in computing.
- - A secret code used for security.
- - The smallest unit of a digital image.
Down
- - A decentralized ledger technology used in cryptocurrencies.
- - A program that translates source code into machine code.
- - Permanent software programmed into a hardware device.
- - An error in programming.
- - The manipulation of matter on an atomic scale.
- - A software testing method to verify previous functionality.
- - A set of rules for data transmission.
- - Software that harms a system.
- - The simulation of human intelligence in machines.
- - The delay before data is transferred over a network.
- - A technology that overlays digital content on the real world.
- - A subset of machine learning using neural networks.
- - The process of creating a virtual version of computing resources, such as servers or storage.
- - The practice of protecting systems and networks from digital attacks.
- - The part of a system that users interact with.
- - The process of converting information into a secure format.
- - A type of malware that spreads across networks automatically.
- - A program that performs a specific task.
- - A memory management technique using disk storage.
- - The process of converting analog data to digital.
- - A common wired networking technology.
- - A tool used to test and fix errors in software.
- - The physical parts of a computer.
- - A collection of tools for software development.
- - The brain of a computer.
50 Clues: - An error in programming. • - The brain of a computer. • - Software that harms a system. • - Data that describes other data. • - A device that connects networks. • - A secret code used for security. • - A wireless networking technology. • - The physical parts of a computer. • - A self-replicating computer program. • - A set of rules for data transmission. • ...
Types of Network 2024-10-23
Across
- Is short of metropolitan area network.
- Is short for personal area networks
- This is network in a large geographical area
- A group of two or more computers linked together to communicate and share resources.
- One type of network
- Networks are connected by ____________ or by wireless link.
Down
- This is network within a small area
- One advantage of local area network is that it is fast
- Because of network hardware such as _________ can be shared.
- LAN connects the computers so that we can ____________
10 Clues: One type of network • This is network within a small area • Is short for personal area networks • Is short of metropolitan area network. • This is network in a large geographical area • One advantage of local area network is that it is fast • LAN connects the computers so that we can ____________ • Networks are connected by ____________ or by wireless link. • ...
CompTIA Network+ (009) Ch. 4 2025-04-04
Across
- Dynamically assigns IP addresses to devices.
- Routable address used on the internet.
- Provides an IP address when DHCP fails.
- Used to distinguish the network and host portions of an IP address.
- Routes traffic between networks, usually to the internet.
- 128-bit address system for modern internet communication.
Down
- Special IP address used for local testing (127.0.0.1).
- Logical identifier for a device on a network.
- Non-routable address used within internal networks.
- Method for IP address allocation and routing using prefixes.
10 Clues: Routable address used on the internet. • Provides an IP address when DHCP fails. • Dynamically assigns IP addresses to devices. • Logical identifier for a device on a network. • Non-routable address used within internal networks. • Special IP address used for local testing (127.0.0.1). • Routes traffic between networks, usually to the internet. • ...
Foundations of NN & DL 2025-01-10
Across
- ......... Learning is the subset of machine learning that uses neural networks with multiple layers
- A task of extracting text from images
- A neural network designed for image data
- A popular deep learning framework by Google
- A pretrained NLP model by Google
- A type of neural network for sequential data
- A deep learning model for generating images
Down
- A common activation function used in neural networks
- A mechanism in Transformers for focusing on relevant parts of input
- The simplest type of artificial neural network
- Learning A technique where a pre-trained model is reused for a new task
- A field of study focused on creating intelligent machines
12 Clues: A pretrained NLP model by Google • A task of extracting text from images • A neural network designed for image data • A popular deep learning framework by Google • A deep learning model for generating images • A type of neural network for sequential data • The simplest type of artificial neural network • A common activation function used in neural networks • ...
Computer Network & Computer Topologies 2025-07-26
Across
- A network topology where each device connects to two others, forming a loop.
- A device that connects different networks together, often used to access the internet.
- A topology with each node connected to every other node.
- A common wired technology used in local area networks (LANs).
Down
- A global network that connects millions of private, public, academic, and government networks.
- A network device that connects devices and uses MAC addresses to forward data.
- A device that modulates and demodulates signals for internet access over telephone lines.
- A basic network device that broadcasts data to all connected devices.
8 Clues: A topology with each node connected to every other node. • A common wired technology used in local area networks (LANs). • A basic network device that broadcasts data to all connected devices. • A network topology where each device connects to two others, forming a loop. • A network device that connects devices and uses MAC addresses to forward data. • ...
computing 2016-02-03
Across
- short for "favourites icon"
- it carries signals to local or worldwide networks
- it provides wireless connection to networks.
- short for "malicious hardware"
Down
- allows cameras, music players, phones etc to connect to computers
- it allows users to access other computers, mice etc with their own
- views who bookmarks what websites and puts them on the homepage
- it shares files with other users on other pc's and is good on toast
- lets you get e-mails on a server without having to download it
- megabytes per second
10 Clues: megabytes per second • short for "favourites icon" • short for "malicious hardware" • it provides wireless connection to networks. • it carries signals to local or worldwide networks • lets you get e-mails on a server without having to download it • views who bookmarks what websites and puts them on the homepage • ...
Ed. Tech. Network Operations Crossword 2012-03-26
Across
- a design where all nodes are ran through the switch before going to it's designated location
- provides services to connected network computers
- controls all functions of the network
- rate of data transfer
- joins wired and wirelss networks together
- a network of computers that consists of several smaller networks
- twisted pair of cables that carry signals
Down
- requests services; student computer in lab
- a location that offers wireless internet access
- provides your technology devices internet connections without using a ethernet cable
- connects multiple ethernet devices together to create a single network
- the internet is an example of a ______ network
- a device placed to protect the network from unauthorized access
- a connection plud-in chord that provides internet and/or phone access
- a network of computers that are connected together in a school
15 Clues: rate of data transfer • controls all functions of the network • joins wired and wirelss networks together • twisted pair of cables that carry signals • requests services; student computer in lab • the internet is an example of a ______ network • a location that offers wireless internet access • provides services to connected network computers • ...
computer knowledge 2021-03-18
Across
- what is the main app people use to find information
- world wibe web is long for
- a system of interconnecting people is the definition of
- internet service provider is long for
Down
- the thing that you have to turn on to connect to a speaker
- LAN,PAN,MAN,WAN are all networks of computers
- the biggest world wide communication
- allows your phone to get online when you`re away from wifi
- access point is long for
- wireless fidelity is long for
10 Clues: access point is long for • world wibe web is long for • wireless fidelity is long for • the biggest world wide communication • internet service provider is long for • LAN,PAN,MAN,WAN are all networks of computers • what is the main app people use to find information • a system of interconnecting people is the definition of • ...
COSC Part 1 Crossword 2016-02-22
Across
- networks that are geographically close
- composed of HTML tags and multimedia files
- hyper-text markup language
- universal resource locator
- used to view webpages that may contain text, images, videos, and other multimedia
Down
- a related group of networked computers
- a group of information on a compute that can be software programs or data
- unique address given to each computer connected to the internet
- convert the bits a computer outputs into a form that is compatible with the carrier
- networks that are not geographically close
10 Clues: hyper-text markup language • universal resource locator • a related group of networked computers • networks that are geographically close • composed of HTML tags and multimedia files • networks that are not geographically close • unique address given to each computer connected to the internet • a group of information on a compute that can be software programs or data • ...
Technology for Teaching and Learning 1 2023-11-20
Across
- ability to access internet for resources
- type of learning which has no face-to-face interactions
- ability to find, use, evaluate, share content using information technology and internet
- use of technology in education both non-digital and digital
- program control instructions accompanying documentation
Down
- use of digital and communication tools and networks to communicate knowledge-based information
- learning same time, not same place with the help of online technology
- massive networks
- combination of processes& products to apply knowledge
- simultaneous use of media
10 Clues: massive networks • simultaneous use of media • ability to access internet for resources • combination of processes& products to apply knowledge • type of learning which has no face-to-face interactions • program control instructions accompanying documentation • use of technology in education both non-digital and digital • ...
Internet Hardware 2023-01-10
Across
- Method to send information through frequencies.
- Network connecting individual networks.
- Group of 2 or more computers link together.
- Measures bandwidth, number of bits a system can send.
- Provides individuals and organizations access to the internet.
- Method to send information through light.
Down
- Capacity of data transfer in a system.
- Physical or virtual appliance that passes information between two or more packet-switched computer networks.
- Method to send information through ethernet cables.
- Time it takes for a bit to get frim the sender to the receiver.
10 Clues: Capacity of data transfer in a system. • Network connecting individual networks. • Method to send information through light. • Group of 2 or more computers link together. • Method to send information through frequencies. • Method to send information through ethernet cables. • Measures bandwidth, number of bits a system can send. • ...
Unit III - E.Commerce 2025-04-15
Across
- The legal term for guidelines and regulations in online business.
- An architecture type that connects clients and servers.
- Commerce buying and selling over digital networks
- One of the main risks in E-Commerce (hint: security).
- Online payment gateway widely used by individuals and businesses.
Down
- Used for secure online transactions (abbr., 3 letters).
- Diagram a visual representation of business processes.
- Computers, networks, and software that enable E-Commerce.
- An electronic system of transferring money instantly (abbr.).
- A type of money that exists only in digital form.
10 Clues: Commerce buying and selling over digital networks • A type of money that exists only in digital form. • One of the main risks in E-Commerce (hint: security). • Diagram a visual representation of business processes. • An architecture type that connects clients and servers. • Computers, networks, and software that enable E-Commerce. • ...
cybersecurity 2024-06-27
Across
- The information property of being accessible only to a restricted group of persons
- Cryptographic algorithm used to encrypt and decrypt data
- Technique used to secure sensitive data by encoding it in such a way that only authorized parties can access the information
- The potential for harm or loss resulting from threats exploiting vulnerabilities in an organization's information systems, networks, or data assets
- Any potential danger or risk that can exploit vulnerabilities in an organization's systems, networks, or data
- The way of covering communication based on keeping the very fact of communication secret
- The act of granting rights matching with the identifier
- The process of discovering the true identity of a person or item from the entire collection of similar persons or items
- The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved
- Type of threat sources when the actor is a human-being
Down
- The best subject :)
- The information property of being accessible and usable by a legal user with possible conditions set by information owner
- Type of access control where determined rights can be represented as an authorization matrix
- Type of threat sources occured because of the devices misfunction
- Data that is stored, processed, transmitted, or accessed within an organization's systems, networks, or applications
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- The information property of having no illegal or unauthorized modifications
17 Clues: The best subject :) • Type of threat sources when the actor is a human-being • The act of granting rights matching with the identifier • Cryptographic algorithm used to encrypt and decrypt data • Type of threat sources occured because of the devices misfunction • The information property of having no illegal or unauthorized modifications • ...
LA B(1) 2024-10-07
Across
- (12,7,8) Set of rules that allows all internet users to communicate whatever type of equipment they are using
- (7,6,5) Interchange between networks within the internet. Allows ISPs to interconnect with each other
- (9) Way of measuring how much data can be carried over a network. Measured in bits per second
- (6)Computer or program that runs purely to serve the needs of other computers. Runs special server software to serve the clients
- (5,4,3)The collection of information on computers connected to the internet
- (8,8) Specifies how data should be structured and sent over the internet
- (8)Set of rules to allow the computer systems to communicate
- (8)Connection usually by radio waves
- (10,8)Connecting data route between large networks on the internet and smaller network in local regions
- (12,4)Measure of the number of pieces of information that have been transferred during a specific time period
Down
- (9)Wired connection to a broadband supplier, Normally the connection is via a network card in the computer
- (8,7,8) Company that provides you access to the internet
- (4,8,8)Allows files to be transferred between two computers on a TCP-based network.
- (8)A global network of interconnected computers
- (6)Piece of hardware that connects two or more networks, Data from the ISP is sent into the network and the router then directs the data packets to the correct destinations
- (4-2) Wired connection via a conventional telephone line
- (5,2,8) An access point to the internet,Normally a location that contains the hardware to allow internet users access to the internet
17 Clues: (8)Connection usually by radio waves • (8)A global network of interconnected computers • (8,7,8) Company that provides you access to the internet • (4-2) Wired connection via a conventional telephone line • (8)Set of rules to allow the computer systems to communicate • (8,8) Specifies how data should be structured and sent over the internet • ...
Network Systems 2014-04-23
Across
- a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
- A network interface controller is a computer hardware component that connects a computer to a computer network.
- a unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
- A network switch or switching hub is a computer networking device that links network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer of the OSI model.
Down
- An optical fiber is a flexible, transparent fiber made of high quality extruded glass or plastic, slightly thicker than a human hair. It can function as a waveguide, or “light pipe”, to transmit light between the two ends of the fiber.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- An Ethernet hub, active hub, network hub, repeater hub, multiport repeater or hub is a device for connecting multiple Ethernet devices together and making them act as a single network segment.
- broadcasting, computer networking, or other communication using radio signals, microwaves, etc.
- A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks.
- Network bridging describes the action taken by network equipment to allow two or more communication networks, or two or more network segments, to create an aggregate network. Bridging is distinct from routing which allows the networks to communicate independently as separate networks.
10 Clues: broadcasting, computer networking, or other communication using radio signals, microwaves, etc. • A network interface controller is a computer hardware component that connects a computer to a computer network. • a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices. • ...
Morghan's Crossword 2014-03-20
Across
- vez / each time
- / refrigerator
- / grand demonstration
- riesgos / to run risks
- / essential
- / inauguration
- parlantes / talking robots
- / military
- / indispensable
- fiesta / to ask for a day off
- / to touch
- / assemble
- supersonicas / supersonic aircraft
Down
- / to attend
- redes sociales / social networks
- / keep
- / link
- timidez shyness
- / profile
- / in fact
- / to penetrate
- / to exceed
- / engineering
- / communicate
- / industry
- / rocket
26 Clues: / keep • / link • / rocket • / profile • / in fact • / military • / industry • / to touch • / assemble • / to attend • / essential • / to exceed • / engineering • / communicate • / refrigerator • / to penetrate • / inauguration • vez / each time • timidez shyness • / indispensable • / grand demonstration • riesgos / to run risks • parlantes / talking robots • fiesta / to ask for a day off • ...
Networks 2020-03-21
5 Clues: Wide Area Network • Local Area Network • all devices are equal • powerful computer that provides a service • computer that is logged on to the network
Networks 2020-07-22
Across
- smart device used to split the signal to connect more computers
- map or layout of how computers are connected and located
Down
- a computer that is not connected to any network or other devices
- not very smart device, used to connect more computers together
- the way the network is broken down in terms of sending and receiving the data packet
5 Clues: map or layout of how computers are connected and located • not very smart device, used to connect more computers together • smart device used to split the signal to connect more computers • a computer that is not connected to any network or other devices • the way the network is broken down in terms of sending and receiving the data packet
Networks 2022-03-27
5 Clues: used to transmit power or data • used to transmit pulses of light. • what is internal protocol address? • longer version of domain name system • used to connect smartphones and other devices
Memory storage and Networks 2024-05-02
Across
- It is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.
- Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output (I/O) operations.
- A networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
- It is a specific kind of network topology in which all of the various devices in the network are connected to a single cable or line.
- a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.
- It's a type of non-volatile memory that retains its contents even when the power is turned off. It is programmed with data during manufacturing and cannot be easily modified afterward.
- It is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- Secondary storage that has no mechanical components and can access data electronically.
- It is a network contained within a small geographic area, usually within the same building.
- It is a type of network configuration where devices are connected in a circular manner, forming a closed loop.
- It is a numerical label such as 192.0.2.1 that is assigned to a device connected to a computer network that uses the Internet Protocol for communication.
Down
- It's a type of volatile computer memory. It loses its contents when the power is off. it allows the CPU to access data quickly without having to wait for data to be retrieved from slower storage devices.
- It is the technology that connects your offices, data centers, cloud applications, and cloud storage together. It spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.
- It is a smaller, faster memory, located closer to a processor core, which stores copies of the data from frequently used main memory locations.
- It is a network topology in which each network component is physically connected to a central node such as a router, hub or switch.
- Is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
- An optical disc capable of storing up to 4.7 GB of data, more than six times what a CD can hold.
17 Clues: Secondary storage that has no mechanical components and can access data electronically. • It is a network contained within a small geographic area, usually within the same building. • An optical disc capable of storing up to 4.7 GB of data, more than six times what a CD can hold. • ...
La Tecnologia 2024-10-24
11 Clues: tool • screen • search • battery • to allow • to charge • phone call • to prohibit • to download • social media networks • hooked, addicted (masc. singular form)
ABC Engineering carrers By: Sophia Pineiro 2015-10-13
Across
- Railroads
- Black-box
- fixes-Yachts
- New-networks
- Water-usage
- Oil/Gas
- Braces
- Air-conditioning
- artificial-lenses
- Gas/gas-field
Down
- Fixes-bugs
- Waste-dumpsters
- Fire-alarms
- Program-management
- Design-CT-scans
- Software-products
- NewXRays
- Smart-temporary-tattoos
- New-medical-problems
- redesign-lines
- Fertilizer
- MRI-scans
- New-farming-methods
- Grass-fertilizer
- Antibiotics
- Builds-habitats
26 Clues: Braces • Oil/Gas • NewXRays • Railroads • Black-box • MRI-scans • Fixes-bugs • Fertilizer • Fire-alarms • Water-usage • Antibiotics • fixes-Yachts • New-networks • Gas/gas-field • redesign-lines • Waste-dumpsters • Design-CT-scans • Builds-habitats • Grass-fertilizer • Air-conditioning • Software-products • artificial-lenses • Program-management • New-farming-methods • New-medical-problems • Smart-temporary-tattoos
Ciencia y Technología 2025-02-27
Across
- to add pic/video
- cure
- pagina web - website
- to connect to the internet
- to download
- symptoms
- electronic devices
- to update
- laptop
Down
- email address
- social networks
- to disconnect from the internet
- username
- Health
- to comment
- password
- online
- cell phone
- to surf the web
- text message
- to upload
- illness/ disease
- internet/ La red - internet
23 Clues: cure • Health • online • laptop • username • password • symptoms • to upload • to update • to comment • cell phone • to download • text message • email address • social networks • to surf the web • to add pic/video • illness/ disease • electronic devices • pagina web - website • to connect to the internet • internet/ La red - internet • to disconnect from the internet
Networks 2014-06-02
5 Clues: Illness of a computer • What does a Network do? • Connection spreads around localy • Connection spreads around a wide area • Computer that is not connected to a network
networks 2022-03-27
SRWC- Crossword 1 2024-08-01
Across
- A major concern of wireless networks compared to wired ones
- Procedure used to establish the identity of a station
- used for sensor and control applications
Down
- The function of a portal in a WLAN
- Can be used to bridge remote network nodes in Wifi
- The major advantage of wireless LANs over wired LANs
- Limits the usage of wireless networks
- The basic Bluetooth network
- Bit used to detect error
9 Clues: Bit used to detect error • The basic Bluetooth network • The function of a portal in a WLAN • Limits the usage of wireless networks • used for sensor and control applications • Can be used to bridge remote network nodes in Wifi • The major advantage of wireless LANs over wired LANs • Procedure used to establish the identity of a station • ...
Antivirus and Firewalls 2024-10-04
Across
- A unique string of data or code that identifies a specific virus. Antivirus software uses these signatures to recognize and eliminate known malware by scanning files.
- A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks.
- The process of inspecting data packets during transmission and allowing or blocking them based on security rules. Firewalls use this to prevent unauthorized access and protect against threats.
- A security application that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
- The practices and technologies used to protect networks from unauthorized access, misuse, or attacks, significantly enhanced by antivirus and firewall software.
Down
- A network security technology that monitors network traffic for suspicious activity and potential threats, alerting administrators to possible security breaches.
- A method employed by antivirus software to detect unknown viruses by analyzing the behavior and characteristics of suspicious files, aiding in identifying new or modified malware.
- Malicious software designed to harm, exploit, or otherwise compromise computer systems and networks, including viruses, worms, trojans, and spyware.
- Data packets leaving a network; rules can allow or block traffic based on destination addresses.
- Data packets entering a network; rules can restrict access based on specific ports or IP addresses.
10 Clues: Data packets leaving a network; rules can allow or block traffic based on destination addresses. • Data packets entering a network; rules can restrict access based on specific ports or IP addresses. • A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks. • ...
CIS178 Jake Stevenson 2023-01-25
Across
- virtual private network
- posing as authorized user
- type of malware
- protects you from virus
- protecting online data
- explicitly allowed
- security system
- malicious software
- explicitly not allowed
- not human
- gaining unauthorized access
Down
- network of networks
- type of scam
- protects you from malware
- harassment on the internet
- unsolicited advertisements
- two-factor authentication
- another word for information
- securing data
- human verification test
20 Clues: not human • type of scam • securing data • type of malware • security system • explicitly allowed • malicious software • network of networks • protecting online data • explicitly not allowed • virtual private network • protects you from virus • human verification test • posing as authorized user • protects you from malware • two-factor authentication • harassment on the internet • ...
Societies to Social Networks 2025-04-03
Across
- A society driven by technology, services, and the exchange of information.
- A temporary alliance of individuals or groups who join together for a common goal.
- Soc. Rev: The transition to mechanized production, urbanization, and economic change.
- A society based on the domestication of animals for food and trade.
- The process of establishing and maintaining relationships for mutual benefit, often to exchange information or gain opportunities.
- A major transformation in society that changes how people interact, work, and live.
- A small, close-knit group with strong personal connections, often exclusive.
- Soc. Rev: The development of farming, leading to settled societies and population growth.
Down
- A society that sustains itself through small-scale farming using simple tools.
- Soc. Rev: The rise of artificial intelligence, biotechnology, and human-machine integration, reshaping work and communication.
- Soc. Rev: The shift from hunting and gathering to the domestication of plants and animals.
- Soc. Rev: The transition from industrial production to digital technology, automation, and the internet.
- A large social organization that shares a common culture, territory, and governance.
- A collection of two or more individuals who interact and share a sense of identity.
- A broader web of connections that link individuals, including friendships, acquaintances, and online communities.
- This community is a group of individuals who interact primarily through online platforms rather than in person.
- A collection of people who are in the same place at the same time but do not interact meaningfully.
- A society that relies on mechanized production and manufacturing.
18 Clues: A society that relies on mechanized production and manufacturing. • A society based on the domestication of animals for food and trade. • A society driven by technology, services, and the exchange of information. • A small, close-knit group with strong personal connections, often exclusive. • ...
Security terms puzzle 2025-02-13
Across
- Ensuring data and resources are accessible when needed. Bell-La Padula security model – A security model focused on data confidentiality using mandatory access controls.
- A decoy system designed to lure and detect attackers.
- Protecting information from unauthorized access.
- Engineering Manipulating people to gain unauthorized access to information.
- Hacking phone systems to make free calls or manipulate networks.
- Security Protecting an individual computer or device from threats.
- through obscurity Hiding system details to reduce security risks.
Down
- Aggregation Combining data from multiple sources for analysis.
- Privilege Granting users the minimum access necessary for their tasks.
- Verifying the identity of a user or system.
- of duties Dividing responsibilities to prevent fraud and errors.
- A security system that monitors and controls network traffic.
- Digital documents that verify identities and enable secure communication.
- Preventing denial of actions, ensuring accountability.
- Security Protecting a network from threats and unauthorized access.
- Computing Delivering computing services over the internet.
- Gaining unauthorized access to systems or networks.
- Ensuring data is accurate and unaltered.
- Security Using multiple security measures to protect data and systems.
19 Clues: Ensuring data is accurate and unaltered. • Verifying the identity of a user or system. • Protecting information from unauthorized access. • Gaining unauthorized access to systems or networks. • A decoy system designed to lure and detect attackers. • Preventing denial of actions, ensuring accountability. • Computing Delivering computing services over the internet. • ...
Principal Areas of Computer Use 2020-09-27
14 Clues: DepEd • use barcodes • modelling DNA • Crop information • forecast weather • paperless society • Connect with others • rapid transit system • simulate environment • record keeping in banks • communicate with others • locate and monitor networks • previously performed by people • representation of better analysis
NETWORK 2025-06-02
Across
- a worldwide system of interconnected computer networks
- using someone else's work without giving them proper credit
- any unsolicited and often irrelevant or inappropriate messages sent over the internet
- breach defenses to gain unauthorized access into computers
- the breaching of network encryptions
- s used for short-range wireless voice and data communication
- connects electronic devices close to the user
- known as an address on the Web
Down
- a private network designed by an organization
- connects our computer to a standard phone line or to our cable
- the physical and logical arrangement of nodes and connections in a network
- a program that spreads by first infecting files
- the act of compromising digital devices and networks
- cybercrime activity that takes place over the internet or on email
- is a single source that sends something to all other devices
- an established set of rules that determine how data is transmitted
- the connection point among network devices
- connects electronic devices close to the user
18 Clues: known as an address on the Web • the breaching of network encryptions • the connection point among network devices • a private network designed by an organization • connects electronic devices close to the user • connects electronic devices close to the user • a program that spreads by first infecting files • the act of compromising digital devices and networks • ...
Vocab: How the Internet Works 2023-02-03
Across
- Hierarchical and distributed naming system for computers
- Networking device that connects devices on the same computer network
- A network node that broadcasts data to every device connected to it
- Based on a number system in which there are only two possible states, off and on, usually expressed as ones and zeros
- People who are responsible for writing the code to generate a webpage
- The internet was started as a ________ project
- Networking device that forwards traffic between networks
Down
- Cascading Style Sheets
- A block of data transmitted across a network.
- A network of networks built on open agreed upon protocols
- A document that can be viewed by a web browser
- Hypertext Markup Language
- A widely agreed upon set of rules and standards
13 Clues: Cascading Style Sheets • Hypertext Markup Language • A block of data transmitted across a network. • A document that can be viewed by a web browser • The internet was started as a ________ project • A widely agreed upon set of rules and standards • Hierarchical and distributed naming system for computers • Networking device that forwards traffic between networks • ...
IT Crossword 2013-12-18
Across
- To analyze a sentence or language statement to break down words into functional units that can be converted into machine language
- A term used when system imitates or reproduces another system
- Place where u put files and folders that u want to delete or get rid of
- Is an Internet connection available from telecom companies using existing phone lines providing fast download & upload speeds.
- A digital mapping system used for exploration, demographics, dispatching and tracking.
- Method of accessing e-mail messages on a server without having to download them on your local hard drive
- An open source OS used by several smartphones and can be customized for mobile devices
- The brand name of a family of personal computers and an operating system from apple
- A program that allows u log in to a Unix computer via a text-based interface
Down
- A challenge-response test that determines whether a user is human or automated bot
- A security protocol for Wi-Fi networks whose goal is to make wireless networks as secure as wired networks.
- While applied to hard disk, it is a great way to boost the performance of computer
- Chart displaying horizontal or vertical bars whose length are in proportion to the values of the data items they represent.
- A program pre-installed on Windows-based computers that computers uses to start up
- A social networking website where users can create and customize their own profiles
- It translates the IP addresses of computers in a local network to a single IP address.
- A standard way of transferring data to and from each kind of database
- A file within a directory on your hard drive
18 Clues: A file within a directory on your hard drive • A term used when system imitates or reproduces another system • A standard way of transferring data to and from each kind of database • Place where u put files and folders that u want to delete or get rid of • A program that allows u log in to a Unix computer via a text-based interface • ...
About Upcyling and Technology 2025-07-24
13 Clues: Polution. • Original, make. • Sedentary person. • Rule, regulation. • Causing dependence. • Social conventions. • Electronic, not analog. • Communication networks. • Interaction, discussion. • Most important, principal. • Reuse: materials, objects. • Physical and mental health. • Exept for… / In the contrary…
Let's Revise Cyber Security Fundamentals !! 2021-08-16
Across
- deliberate attempt to compromise security using malicious activity
- Naming system followed to identify computers connected to Internet
- criminal activity performed using computer or a network
- ready to access for authorized people
- state of maintaining secrecy of communication
- malicious software that prevents the users from
- use of Computers and Networks to gain illegal access for confidential information for some gain
Down
- way of confirmation of individual's identity
- unskilled individual who uses programs written by others to initiate attacks
- Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
- their own data for want of money
- computer program designed to protect computer
- illegal piece of software designed to cause harm to computers/networks
13 Clues: their own data for want of money • ready to access for authorized people • way of confirmation of individual's identity • state of maintaining secrecy of communication • computer program designed to protect computer • malicious software that prevents the users from • criminal activity performed using computer or a network • ...
Find the keywords that we have learned in IT. 2024-01-14
Across
- A small segment of a larger message
- a set of rules used for formatting and processing data
- The data capacity of a network in per bits second.
- a worldwide system of computer networks
Down
- electronic mail system
- A device that connects two or more packet-switched networks.
- a center of activity
- Transmission Control Protocol
8 Clues: a center of activity • electronic mail system • Transmission Control Protocol • A small segment of a larger message • a worldwide system of computer networks • The data capacity of a network in per bits second. • a set of rules used for formatting and processing data • A device that connects two or more packet-switched networks.
Tec cross word puzzell 2022-04-13
Across
- network security device that monitors outgoing network traffic
- something designed to make something known to
- data that is left behind when users have been online
- data that describes other data
- bully someone over the internet
- activities a company undertaken to promote the buying or selling of a product or service
Down
- The opportunity to establish a protect network connection when using public networks
- where people can create, share or exchange information in virtual communities and networks
- A file or code
- A way that cyber criminals steal private information
- A network that connects computers all over the world
11 Clues: A file or code • data that describes other data • bully someone over the internet • something designed to make something known to • A way that cyber criminals steal private information • data that is left behind when users have been online • A network that connects computers all over the world • network security device that monitors outgoing network traffic • ...
☂ WIRED AND WIRELESS NETWORKS ☂ 2022-09-22
Across
- This network allows new nodes to be added without interruption to the network.
- unscramble "clalleru hensop"
- ______ ____, twisted pair, or fiber optic cables are all options.
- Wireless network uses _________ rather than wires.
- Wireless networks use radio signals as their communication medium but could also use__________
Down
- Wired networks require this for each device in order to work.
- Wireless is made up of_____________(short term)
- Fibre cables have greater_____ so transfer speeds are faster.
- This network is expensive to install
- A wired network employs wires to link devices to the ________ or another network.
- _______ or sensors will be present on all wireless devices.
11 Clues: unscramble "clalleru hensop" • This network is expensive to install • Wireless is made up of_____________(short term) • Wireless network uses _________ rather than wires. • _______ or sensors will be present on all wireless devices. • Wired networks require this for each device in order to work. • Fibre cables have greater_____ so transfer speeds are faster. • ...
Networks (Grade 6) 2025-01-07
Across
- is where a video or sound file is played over an internet connection
- a private network that is only available within an organization
- using more than its capability
- access something they are not allowed to
- it is a networked device that serves data to other devices
Down
- global positioning system
- junk mail
- is the maximum amount of data that can be transmitted in a network in a specific time
- without using wires
- is a unique name for each user in the system
- is 8 bits
11 Clues: junk mail • is 8 bits • without using wires • global positioning system • using more than its capability • access something they are not allowed to • is a unique name for each user in the system • it is a networked device that serves data to other devices • a private network that is only available within an organization • ...
Year 8 Networks 2024-02-06
Across
- Using the Internet for a phone call.
- A way of sending data by using light.
- A simple network device for connecting devices
- An older method of communication, often used on ships.
- Two or more devices connected together for communication.
- A network of computers across the world.
Down
- Describes all the services on the Internet.
- A standard set of rules for communicating.
- A simple network device for connecting networks.
- Describes the use of devices such as fridges on the Internet.
- Describes the amount of data that can be transmitted in one go.
11 Clues: Using the Internet for a phone call. • A way of sending data by using light. • A network of computers across the world. • A standard set of rules for communicating. • Describes all the services on the Internet. • A simple network device for connecting devices • A simple network device for connecting networks. • An older method of communication, often used on ships. • ...
Crossword 2021-01-12
Across
- created with a camera system which simultaneously records all 360 degrees of a scene
- is when one person shares a video clip with another or many other people.
- community based marketplace which allows members to communicate and sell directly to other members; for example, Etsy®
- online businesses which allow consumers to search and follow their favorite
- form of electronic commerce which uses social networks to facilitate the buying or selling of products
- the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself
- process of uploading, publishing and sharing photos online
- realistic, real-time, three-dimensional computer simulation of physical objects and space; allows users to ‘interact’ and have sensory experiences of the actors, images and sounds through sensors attached to the user’s body which track 360 movement
- writing and publishing short, frequent posts to a microblog such as Twitter®
- buyers agree to make the purchase; for example, Groupon®
Down
- marketplace which allows sales to be driven by referrals from established social networks; social networks collect data to provide accurate suggestions
- BuyingPlatforms marketplace which offers products and services at a reduced rate when
- writing and publishing posts, at any length and time, on a blog such as Blogger®; typically in a chronological format
- RecommendationPlatforms marketplace which offers product or service reviews and in return recommend products based on a member’s purchasing history; for example, Amazon®
- a message sent via the internet that appears on the recipient's screen as soon as it is transmitted.
- recommendations on goods and services
- content sent in compressed form over the Internet and displayed by the viewer in real-time
- all in one place; for example, Wanelo®
18 Clues: recommendations on goods and services • all in one place; for example, Wanelo® • buyers agree to make the purchase; for example, Groupon® • process of uploading, publishing and sharing photos online • is when one person shares a video clip with another or many other people. • online businesses which allow consumers to search and follow their favorite • ...
Programming Crossword 2013-10-10
Across
- Type of programming the runs the entire evening
- Major networks give away office space and financing for distribution rights
- People in power who decide what people need to know
- Sheduling new or weak series before and after a very successful program.
- Scheduling that shows one program at the same time during the week
- Programming a new series in between two successful series
- He lives in a pineapple under the sea
- King of Late Night: Johnny
- A classification of drama
Down
- Programming that aims to attracts a particular demographic
- Sports programming is made unavailable to households 90 miles from the game
- Local stations that obtain programming from major networks
- Reality TV show in the "wild"
- Programming that has already aired on a major network
- The first episode of a series, usually made before a series is ordered
- A collection of stories with different themes and different actors
- Promoting and selling products from a variety of sources
17 Clues: A classification of drama • King of Late Night: Johnny • Reality TV show in the "wild" • He lives in a pineapple under the sea • Type of programming the runs the entire evening • People in power who decide what people need to know • Programming that has already aired on a major network • Promoting and selling products from a variety of sources • ...
Technology 2024-04-16
Online Crossword - Octavio Alvarado 2021-06-25
Across
- Wide bandwidth data transmission which transports multiple signals and traffic types.
- Is an electrical or electromagnetic current that is used for carrying data from one device or network to another. It is the key component behind virtually all:
- Wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building.
- Group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
- Networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
- Twisted pair cable for computer networks. Also used to carry other signals such as telephone and video.
Down
- Transfer of information between two or more points that do not use an electrical conductor as a medium by which to perform the transfer.
- Interface between radio waves propagating through space and electric currents moving in metal conductors, used with a transmitter or receiver.
- Global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- Hardware device that converts data from a digital format, intended for communication directly between devices with specialized wiring, into one suitable for a transmission medium such as telephone lines or radio.
- Computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
11 Clues: Wide bandwidth data transmission which transports multiple signals and traffic types. • Twisted pair cable for computer networks. Also used to carry other signals such as telephone and video. • Transfer of information between two or more points that do not use an electrical conductor as a medium by which to perform the transfer. • ...
