networks Crossword Puzzles
History Chpt. 19 1984 2023-02-23
Across
- White fang/Call of the Wild
- subdued mist
- Louis Sullivan
- Willard
- Most important institution of rural communities
- native of New England
- Basic needs
- networks
- education
Down
- Galloping Horseman
- Stick style
- cables
- O Captain My Captain
- Father of the modern skyscraper
- NYJ
- Arrangement in grey and black
- Harpers weekly
- evolutionary theory
- In his steps
- Colonial inspired
20 Clues: NYJ • cables • Willard • networks • education • Stick style • Basic needs • subdued mist • In his steps • Louis Sullivan • Harpers weekly • Colonial inspired • Galloping Horseman • evolutionary theory • O Captain My Captain • native of New England • White fang/Call of the Wild • Arrangement in grey and black • Father of the modern skyscraper • Most important institution of rural communities
Spanish 2022-02-28
23 Clues: cure • laptop • Health • online • website • symptoms • username • password • internet • to upload • to update • to comment • cell phone • to download • text message • email address • social networks • to surf the web • to add pic/video • illness/ disease • electronic devices • to connect to the internet • to disconnect from the internet
spainsh man 2025-03-21
24 Clues: lol • past • click • at home • the bank • the city • the mail • to tweet • the lake • the field • the email • the school • the church • the screen • the coffee • the cinema • the hospial • the signing • text message • the mountains • the cell phone • social networks • to record videos • the shopping center
Introduction To Computer Networks 2018-04-03
Across
- Protocol Data Units at the network access layer
- Cables cables are broadly classified into two types namely Single-mode and Multi-mode
- Layer which provides a firm communication interface and end-user services
- Use IP addresses to forward traffic to other networks
- Each device is connected to two other devices in this topology
- The amount of time it takes data to travel from source to destination
- Regenerates weak signals
Down
- Server Server which translates Internet Protocol (IP) addresses to human-readable names
- When data flows in one direction at a time
- Used by sending host to add one or more protocol headers
- Computer hardware component that connects a computer to a computer network
- 32 bit dotted decimal IP address version
- Wireless standard that secures the data with the much stronger TKIP encryption algorithm.
- Application used to block certain IP addresses
- Ethernet cables connect two host devices
- IP address that is assigned is unique to each host within the same network or subnet
- The most common type of LAN
- The world's largest WAN
18 Clues: The world's largest WAN • Regenerates weak signals • The most common type of LAN • 32 bit dotted decimal IP address version • Ethernet cables connect two host devices • When data flows in one direction at a time • Application used to block certain IP addresses • Protocol Data Units at the network access layer • Use IP addresses to forward traffic to other networks • ...
Advantages and disadvantages of networks 2022-01-10
Across
- it means users are not fixed to one place
- easy to share _____ such as a printer
- parts that are needed to make a network
- easy to share _____ and files over a network
Down
- networks make it easier to share malware
- relying on a network - stuck without it
- stream software using web applications
- accessing networks - stealing private info
- using email, texts, voice & video calls
9 Clues: easy to share _____ such as a printer • stream software using web applications • relying on a network - stuck without it • parts that are needed to make a network • using email, texts, voice & video calls • networks make it easier to share malware • it means users are not fixed to one place • accessing networks - stealing private info • ...
COSC 100 Puzzle, mhill39 2015-09-23
Across
- networks that are not geographically close, a collection of point-to-point networks that make up the internet
- main connecting technology for LAN, connects all computers in a lab or building
- a characteristic of a page element, such as font
- networks that are geographically close, can be linked by a single cable
- files that can be embedded in web pages and displayed by a browser (usually includes pictures, movies, and graphics)
- a suffix attached to the name of a computer file which indicates the file format of the contents
- Creating a false website that is similar to another website with the intention to deceive other web users
- translates the hierarchical, human-readable names of websites into 4 number IP addresses
Down
- the codes and tags that browsers use to create web pages
- A command inserted into a document specifying how it should be formatted
- the exclusive legal rights given to creators of literary, artistic, or musical material
- sites that help internet users find information on the web, examples are Google, Yahoo, and Bing
- using about half the word count as normal, characteristic of a good webpage
- using neutral words instead of biased or subjective, characteristic of a good web page
- a related group of networked computers
- Accessing another person's/ company's web communications without permission
- computers programmed to send files to browsers running on other computers connected to the internet
- copyright material can be used in small amounts for purposes such as teaching, news, criticism, and research without having to pay the copyright holder
18 Clues: a related group of networked computers • a characteristic of a page element, such as font • the codes and tags that browsers use to create web pages • networks that are geographically close, can be linked by a single cable • A command inserted into a document specifying how it should be formatted • ...
Einstein 360 2017-07-11
Across
- Account First Look
- Netflix Subscription
- MyAccount Agent Views
- Equipment Health Check
- Search Options
- Available Networks
Down
- X1 DVR, HD boxes, and WG
- XOD issues
- Order Entry
- Online Authorize Users
- Head-End Damages
- Balance Due
- Enter Phone Number
- Customer Own Purchase
- Schedule Trouble Call
- Bank Draft
- Authenticate callers
17 Clues: XOD issues • Bank Draft • Order Entry • Balance Due • Search Options • Head-End Damages • Account First Look • Enter Phone Number • Available Networks • Netflix Subscription • Authenticate callers • Customer Own Purchase • Schedule Trouble Call • MyAccount Agent Views • Online Authorize Users • Equipment Health Check • X1 DVR, HD boxes, and WG
Social Network 2014-06-03
Across
- One of the most popular social networks.
- Somebody post there everything about a trip or about their life.
- Important or popular people have many of them.
- Many young people do it e.g. in the bathroom and delete 99% after they have done them.
- Everybody who uses social networks need one.
- Message over Message.
Down
- Social network where you are not using "likes" but "+".
- To communicate on the Internet.
- Share your opinion on his/her pictures or posts.
- Here you can tweet like a bird.
- Some people have 500+ (not likes).
- If you agree with something you just have to do one klick.
- Tell everyone what are you doing at the moment.
13 Clues: Message over Message. • To communicate on the Internet. • Here you can tweet like a bird. • Some people have 500+ (not likes). • One of the most popular social networks. • Everybody who uses social networks need one. • Important or popular people have many of them. • Tell everyone what are you doing at the moment. • Share your opinion on his/her pictures or posts. • ...
Computer Science 2016-02-24
Across
- The sender and the receiver are active at different times
- This task deals with keeping a website updated and running
- An action that is used to gain unauthorized action and is illegal
- Web tool that creates slideshows with music, video, and photos
- Networks that are not geographically close
- This cache is usually used for international countries to view website
- The legal right to someones'work
Down
- Used to view webpages
- The sender and the receiver are active
- Networks that are geographically close
- Code that can be detrimental to software
- Tags/codes that help make a webpage
- editor Program that is used to edit text files
- Composed of files and tags is used to view via web browsers
14 Clues: Used to view webpages • The legal right to someones'work • Tags/codes that help make a webpage • The sender and the receiver are active • Networks that are geographically close • Code that can be detrimental to software • Networks that are not geographically close • editor Program that is used to edit text files • The sender and the receiver are active at different times • ...
Wireless Technology and Sensors 2025-04-17
Across
- Short-range wireless network, often using Bluetooth or Zigbee
- Measures acceleration or vibration in a device
- Measures atmospheric pressure
- Wireless tech that uses radio waves for identification tags
- Any device connected to a network, like a sensor or router
- The amount of data transmitted through a network in a given time
- Detects angular motion or orientation
- The process of transferring an active connection from one base station to another
- Long-range, low-power wireless system used in IoT networks
Down
- Hardware device allowing wireless devices to connect to a network
- Sensor that converts light into electrical current
- Temperature-sensitive resistor used in heat measurement
- A fixed communication point in cellular and wireless networks
- The physical or logical layout of a network
14 Clues: Measures atmospheric pressure • Detects angular motion or orientation • The physical or logical layout of a network • Measures acceleration or vibration in a device • Sensor that converts light into electrical current • Temperature-sensitive resistor used in heat measurement • Any device connected to a network, like a sensor or router • ...
Social Networks Vocabulary 2021-03-05
Across
- to move your thumb up and down your phone screen
- lots of likes, shares and views around the world
- to prevent someone from viewing your profile
- an anonymous user who makes negative posts
- an online post of 140 characters or less
- the supporters of someone famous
Down
- an attractive but misleading title that causes you to read or watch
- contains information that appears on your screen in the exact moment it happens
- a written record of someone's opinions and adventures
- the place where all news and posts appear
- a series of posts in order about a long topic
- to attach a username to a post or photo
12 Clues: the supporters of someone famous • to attach a username to a post or photo • an online post of 140 characters or less • the place where all news and posts appear • an anonymous user who makes negative posts • to prevent someone from viewing your profile • a series of posts in order about a long topic • to move your thumb up and down your phone screen • ...
Digital Tech./Networks 2022-05-01
Across
- What is an electronic device used to store and share data?
- A type of cable that connects a router to your computer?
- What is a network that doesn't need wires?
- What is a network that you can travel with?
- What is another word for send?
Down
- Some where you can store information that is not on your computer or network?
- To transfer information from one computer to another computer or network?
- What is a process to access the internet, other computers or networks?
- Two or more computers connected together to share data?
- What is a network that does need wires?
- Where you store information on a computer or network?
- Information stored in different formats on a computer or network?
12 Clues: What is another word for send? • What is a network that does need wires? • What is a network that doesn't need wires? • What is a network that you can travel with? • Where you store information on a computer or network? • Two or more computers connected together to share data? • A type of cable that connects a router to your computer? • ...
Wide Area Networks 2023-10-10
Across
- What is meant by the acronym 'DNS'?
- What is meant by the acronym 'URL'?
- What does WAN stand for?
- A network that uses software to subdivide a physical network
- What is the name of the biggest WAN on the planet?
- What is meant by the term 'the cloud'?
- What is meant by the acronym 'ISP'?
Down
- What is an 'IP Address'?
- What is a characteristic of a WAN?
- What is a VLAN?
- What is a VPN?
- This is when a computer on a network serves users from other locations
12 Clues: What is a VPN? • What is a VLAN? • What is an 'IP Address'? • What does WAN stand for? • What is a characteristic of a WAN? • What is meant by the acronym 'DNS'? • What is meant by the acronym 'URL'? • What is meant by the acronym 'ISP'? • What is meant by the term 'the cloud'? • What is the name of the biggest WAN on the planet? • ...
Types of Networks 2025-11-24
Across
- A short-range personal network around one person.
- – A group of connected computers or devices.
- A network that covers a town, city, or large campus.
- A geographic area associated with MAN networks.
- Technology commonly used to create a PAN.
- The items (computers, phones, tablets) connected in a LAN or PAN.
- A small local network used in homes, schools, or offices.
Down
- Describes the large geographical area of a WAN.
- The type of space covered by a PAN.
- A large network that spans countries or continents.
- Refers to the city-wide coverage of a MAN.
- Refers to the short-range area covered by a LAN.
12 Clues: The type of space covered by a PAN. • Technology commonly used to create a PAN. • Refers to the city-wide coverage of a MAN. • – A group of connected computers or devices. • Describes the large geographical area of a WAN. • A geographic area associated with MAN networks. • Refers to the short-range area covered by a LAN. • ...
Telecommunication 2023-11-08
Across
- A service that allows users to access the internet through wireless connections, using different network providers beyond their regular service provider's coverage area.
- The integration of various technologies, services, or networks into a unified platform, typically using Internet Protocol (IP), allowing seamless transmission of voice, data, and multimedia content.
- Networks that amalgamate different types of communication services, such as voice, data, and video, onto a single platform based on Internet Protocol (IP) for efficient and seamless transmission.
- A set of rules governing the format of data sent over the internet or any network. It allows devices to communicate and transfer data across networks, enabling connectivity between different systems and devices.
- The fundamental physical or organizational structures and facilities needed for the operation of a system or enterprise, including the networks, equipment, and facilities supporting telecommunications services.
Down
- A company or entity that provides mobile telecommunications services to consumers, offering voice, data, and other wireless services to mobile device users.
- The transmission of video content in real-time over the internet, allowing users to watch movies without downloading the entire file beforehand, thus enabling immediate viewing.
- High-speed internet connections that have significant bandwidth for transmitting large amounts of data, facilitating high-quality multimedia, including video streaming, gaming, and other bandwidth-intensive applications.
- Networks that utilize Internet Protocol as their underlying technology to transmit data, voice, and multimedia, enabling the convergence of various services onto a single platform.
- Various sources or channels from which a company generates income, often through offering different services, products, or subscriptions to consumers or businesses.
10 Clues: A company or entity that provides mobile telecommunications services to consumers, offering voice, data, and other wireless services to mobile device users. • Various sources or channels from which a company generates income, often through offering different services, products, or subscriptions to consumers or businesses. • ...
Network security management 2024-03-21
Across
- Tools for monitoring and analyzing network traffic
- A mechanism for verifying user identity
- A system for detecting abnormal network behavior
- Protocol for encrypted data transmission
- Technologies to prevent the spread of malicious software
Down
- Technologies used to protect data transmission in networks
- Practice of protecting computer networks from unauthorized access
- A Strategy for Restricting Network Resource Access
- Provide a secure channel for remote access to network devices
- A device for detecting and blocking network attacks
10 Clues: A mechanism for verifying user identity • Protocol for encrypted data transmission • A system for detecting abnormal network behavior • Tools for monitoring and analyzing network traffic • A Strategy for Restricting Network Resource Access • A device for detecting and blocking network attacks • Technologies to prevent the spread of malicious software • ...
La technologie 2026-01-15
12 Clues: app • screen • a text • bullying • worrying • to share • to search • to download • cyber crime • online (2,5) • social networks (7,7) • you can't do without it!
spanish project 2019-02-26
26 Clues: war • news • alien • thief • victim • public • acting • danger • website • to show • channel • to kill • to steal • game show • interview • soap opera • to be bored • sports show • police show • cartoon show • horror movie • Academy Awards • to be arrested • social networks • to be in love with • the star of the show
Computer Networks 2023-06-26
Computer Networks 2015-12-04
Across
- Series of web pages stored on servers across the world.
- A network you can't access wihtout permission.
- shorth form for Wide area Network.
- A backing storage service that runs over the Internet.
Down
- Invisible radio waves.
- A series of connected hardwre over a WAN
- Offers a transmission rate of up to 100 mbps
- Connected to your telephone line that provides access to the internet.
8 Clues: Invisible radio waves. • shorth form for Wide area Network. • A series of connected hardwre over a WAN • Offers a transmission rate of up to 100 mbps • A network you can't access wihtout permission. • A backing storage service that runs over the Internet. • Series of web pages stored on servers across the world. • ...
networks-ViTsa 2022-01-29
Across
- Ενα δίκτυο υπολογιστών που καλύπτει μεγάλες γεωγραφικές περιοχές όπως μια χώρα, μια ήπειρο ολόκληρο τον κόσμο.
- Σύνδεση δύο οι περισσότερων υπολογιστών χωρίς καλώδια
- Σύνδεση δύο οι περισσότερων υπολογιστών με χρήση καλωδίων
- Είναι ένας υπολογιστής που χρησιμοποιούμε για να δούμε τις ιστοσελίδες.
- ένα δίκτυο υπολογιστών που καλύπτει μικρές περιοχές όπως μια αίθουσα, ένα κτήριο κλπ.
Down
- Ενα συνολο απο δυο ή περισσοτερους υπολογιστες που επικοινωνουν μεταξυ τους
- Συνδέει διάφορα δίκτυα και ανεξάρτητους υπολογιστές από όλα τα μέρη του κόσμου μεταξύ τους, ώστε όλα μαζί να σχηματίσουν ένα ενιαίο δίκτυο.
- Είναι ένας υπολογιστής που έχει αποθηκευμένες ιστοσελίδες.
8 Clues: Σύνδεση δύο οι περισσότερων υπολογιστών χωρίς καλώδια • Σύνδεση δύο οι περισσότερων υπολογιστών με χρήση καλωδίων • Είναι ένας υπολογιστής που έχει αποθηκευμένες ιστοσελίδες. • Είναι ένας υπολογιστής που χρησιμοποιούμε για να δούμε τις ιστοσελίδες. • Ενα συνολο απο δυο ή περισσοτερους υπολογιστες που επικοινωνουν μεταξυ τους • ...
Computer Networks 2024-07-05
Across
- Used typically for a direct connection between two devices
- Type of computer network centred around one person
- Uses a radio transceiver to allow wireless connections to a network
- Network topology that required central device, usually a hub or switch.
Down
- Type of cable that suffers from interference which can disrupt data quality
- Type of computer network that covers a limited geographical area
- A collection of computers connected together
- Network topology where nodes are connected via a single cable/backbone.
8 Clues: A collection of computers connected together • Type of computer network centred around one person • Used typically for a direct connection between two devices • Type of computer network that covers a limited geographical area • Uses a radio transceiver to allow wireless connections to a network • ...
Networks Starter 2025-09-29
8 Clues: An example of PAN • Network covering a large • The largest wide area network • Network covering a small area • set of rules for communication • Computer that serves a network • Wireless network in a small area • allows access of shared files among several users
Cybersecurity Vocab 2024-04-08
Across
- A self-replicating type of malware that spreads across networks without human intervention, often causing damage or disruption.
- the fraudulent practice of sending emails or text messages purpretending porting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- Good practices and habits for maintaining cybersecurity, such as keeping software up to date, using strong passwords, and being cautious of suspicious emails or links.
- A type of malware disguised as legitimate software, which appears harmless but actually performs malicious actions when executed.
- The process of converting encrypted data back into its original form using a decryption key or algorithm.
- A strong, complex password that is difficult for attackers to guess or crack, typically consisting of a combination of letters, numbers, and special characters.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The ethical principles and guidelines governing acceptable behavior and conduct in cyberspace, including respect for privacy, intellectual property rights, and online safety.
- Short for malicious software, malware is any software intentionally designed to cause damage to computer systems, steal data, or disrupt operations.
- The practice of protecting computer systems, networks, and data from digital attacks, theft, and damage.
- The process of reacting to and managing cybersecurity incidents, such as data breaches or cyberattacks, to minimize damage and restore normal operations.
- A security process that requires users to provide two different forms of identification before accessing an account or system, typically a password and a unique code sent to a mobile device.
Down
- A type of malware that infects computer systems by attaching itself to files or programs and replicating when executed.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- Measures and practices implemented to protect computer networks from unauthorized access, misuse, or disruption.
- The process of verifying the identity of users or devices attempting to access a system or network.
- the process of converting information or data into secret code, especially to prevent unauthorized access
- A person who uses technical skills to gain unauthorized access to computer systems or networks, often for malicious purposes.
- Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
- A weakness or flaw in computer systems, networks, or software that could be exploited by attackers to gain unauthorized access or cause harm.
- The trail of digital information or data left behind by an individual's online activities, including social media posts, website visits, and online purchases.
- The use of digital communication technologies to harass, intimidate, or bully individuals or groups, often through social media, messaging apps, or online forums.
- The process of granting or denying access to specific resources or services based on user credentials and permissions.
- attack an attempt by a hacker or hackers to infiltrate or damage a computer network or system
- Awareness Knowledge and understanding of cybersecurity risks, best practices, and strategies for protecting against digital threats.
- the gaining of unauthorized access to data in a system or computer
- A software update intended to fix vulnerabilities or bugs in computer programs, often issued by software vendors to improve security.
27 Clues: the gaining of unauthorized access to data in a system or computer • attack an attempt by a hacker or hackers to infiltrate or damage a computer network or system • The process of verifying the identity of users or devices attempting to access a system or network. • ...
Spanish 2/27/25 2025-02-27
23 Clues: cure • online • Health • laptop • website • symptoms • internet • password • username • to upload • to update • cell phone • to comment • to download • text message • email address • to surf the web • social networks • illness/ disease • to add pic/video • electronic devices • to connect to the internet • to disconnect from the internet
The Internet 2025-04-09
Across
- Numeric device identifier
- Internet's address book
- A physical device that is used to connect other physical devices
- a software program used to locate and display information on the Internet
- Set of markup symbols or codes inserted into a file intended for display on the internet.
Down
- "about" in about.google.com
- "google" in about.google.com
- Data traffic director between networks
- A software program used to locate and display information on the Internet
- System of interconnected computer networks
10 Clues: Internet's address book • Numeric device identifier • "about" in about.google.com • "google" in about.google.com • Data traffic director between networks • System of interconnected computer networks • A physical device that is used to connect other physical devices • A software program used to locate and display information on the Internet • ...
Spanish 4 Vocab 2022-02-28
23 Clues: cure • online • Health • laptop • website • symptoms • internet • password • username • to upload • to update • cell phone • to comment • to download • text message • email address • to surf the web • social networks • illness/ disease • to add pic/video • electronic devices • to connect to the internet • to disconnect from the internet
Spanish Ciencia y tecnología Vocab 2022-02-28
23 Clues: cure • online • Health • laptop • website • symptoms • username • internet • password • to update • to upload • to comment • cell phone • to download • text message • email address • to surf the web • social networks • to add pic/video • illness/ disease • electronic devices • to connect to the internet • to disconnect from internet
Networking Concepts 2025-06-16
Across
- electronic devices to exchange data over wireless network
- device; forwards data packets between networks.
- that enables a computer to communicate over a network; also called an ethernet adapter or network interface card.
- top level of a network.
- a computer dedicated to running one or more services; host computer.
- that usually spans a campus or city.
- access point or area.
- of computer networks.
Down
- subsystem; combines digital bits to form common function or variable.
- device attached to computer network; can be a computer or a switch.
- used computer data structure with a set of linked nodes.
- computer network topology shape.
- that interconnects computers in a limited area.
- structure; effectively used to buffer data streams; also called a circular buffer.
- that covers a broad area.
15 Clues: access point or area. • of computer networks. • top level of a network. • that covers a broad area. • computer network topology shape. • that usually spans a campus or city. • device; forwards data packets between networks. • that interconnects computers in a limited area. • used computer data structure with a set of linked nodes. • ...
Star network topologies - adv / disadv 2022-01-23
6 Clues: star networks have higher _____ • each ______ is separately connected • the network _______ if the switch breaks • more nodes can easily be added to the _____ • star networks requires plenty of pricey _____ • ___ networks use a router as the central node
Online Games 2025-07-18
Across
- an electronic communications network that connects computer networks and computer facilities around the world
- the number of points you get in a game or test
- became different
- in the space that separates two things
- groups of computers that can share information with each other
- places with lots of coin-operated video games
Down
- the furthest up or the greatest amount
- not the same
- a special computer used for playing video games, like a PlayStation or Xbox
- metal money
10 Clues: metal money • not the same • became different • the furthest up or the greatest amount • in the space that separates two things • places with lots of coin-operated video games • the number of points you get in a game or test • groups of computers that can share information with each other • a special computer used for playing video games, like a PlayStation or Xbox • ...
Communication Networks 2021-05-19
Across
- a signal composed of discrete or segmented chunks of data.
- Sends data packets between computer networks and is generally used for internet applications.
- a radio wave-based wireless connection technology that provides communication between devices within a short range of each other (generally 30 ft)
Down
- is the process of taking measurements along the analog signal to convert it into a digital signal.
- a wireless router is placed between the modem an the computer and transmissions are sent through the air to the computers with a receiver
- a continuous signal that can vary over an infinite range.
- provides the interface between the computer and the network
- a common connection point for devices in a network.
8 Clues: a common connection point for devices in a network. • a continuous signal that can vary over an infinite range. • a signal composed of discrete or segmented chunks of data. • provides the interface between the computer and the network • Sends data packets between computer networks and is generally used for internet applications. • ...
Networks Crossword 2019-05-17
Across
- Harry's airpods use this (9 letters)
- Internet traffic and crisps come in these ! (6 letters)
- Makes request to a server (6 letters)
- A 'dumb' switch (3 letters)
- A device connected to a network that can receive, create, store or send data along the network routes. (4 letters)
Down
- Sounds a little like internet, a cable (8 letters)
- Fast internet connection (9 letters)
- A film and something that stops signals (9 letters)
8 Clues: A 'dumb' switch (3 letters) • Harry's airpods use this (9 letters) • Fast internet connection (9 letters) • Makes request to a server (6 letters) • Sounds a little like internet, a cable (8 letters) • A film and something that stops signals (9 letters) • Internet traffic and crisps come in these ! (6 letters) • ...
Computing Networks 2019-05-16
Across
- The internet is the world's largest (15 letters)
- A set of rules for how messages are turned into data packets and sent across networks. (8 letters)
Down
- Consists of technologies, processes and controls designed to protect systems, networks, programs, devices and data from cyber attacks. (14 letters)
- Information stored and transferred between devices by binary packets. (4 letters)
- A device or system used to protect a network from unauthorized access. (8 letters)
- Internet protocol address. A unique identifier issued to each device connected to a network. (9 letters)
- the process of converting information or data into a code, especially to prevent unauthorized access. (10 letters)
- A computer that holds data to be shared with other computers. (6 letters)
8 Clues: The internet is the world's largest (15 letters) • A computer that holds data to be shared with other computers. (6 letters) • Information stored and transferred between devices by binary packets. (4 letters) • A device or system used to protect a network from unauthorized access. (8 letters) • ...
Social Networks 2024-05-06
Across
- Someone who works with you.
- Your mother or your father.
- Someone traveling in a vehicle who is not driving.
Down
- Someone who you know fairly well but who is not really a friend yet.
- Someone you know well and get along with.
- Someone who tells you what to do in your job.
- You play sports on the same side as this person.
- Someone you are in business or romantic relationship.
8 Clues: Someone who works with you. • Your mother or your father. • Someone you know well and get along with. • Someone who tells you what to do in your job. • You play sports on the same side as this person. • Someone traveling in a vehicle who is not driving. • Someone you are in business or romantic relationship. • ...
Social networks 2024-10-29
Across
- to communicate with somebody, especially while you work, play or spend time with them
- the way a computer program presents information to a user or receives information from a user, in particular the layout of the screen and the menus
- a description of somebody/something that gives useful information
Down
- something that connects two facts, ideas, etc.
- letters
- the act of looking at a lot of things in a shop rather than looking for one particular thing
- act of communicating
- personalize something to mark something in some way to show that it belongs to a particular person
8 Clues: letters • act of communicating • something that connects two facts, ideas, etc. • a description of somebody/something that gives useful information • to communicate with somebody, especially while you work, play or spend time with them • the act of looking at a lot of things in a shop rather than looking for one particular thing • ...
Wide Area Networks 2023-10-10
Across
- what does VPN stand for?
- what is the name of the biggest WAN on the planet?
- what does ISP stand for?
- what is the term for when a company hosts a website on their server
- what is the name of a network that hosts servers on the internet
Down
- what does DNS stand for?
- what does URL stand for?
- what do you call a connection of LANs
- what do you call a unique number given to every computer on the internet
- what does WAN stand for?
- what does VLAN stand for?
- what is the term for where both LAN and WANs are created on physical hardware
12 Clues: what does DNS stand for? • what does URL stand for? • what does VPN stand for? • what does WAN stand for? • what does ISP stand for? • what does VLAN stand for? • what do you call a connection of LANs • what is the name of the biggest WAN on the planet? • what is the name of a network that hosts servers on the internet • ...
Key IT Terms 2024-01-18
8 Clues: Global system of networks • Computers sharing resources • Transporting & Routing data • Connects two or more networks • Small part of a larger message • Volume of information a computer can handle • Used to send messages from one computer to the other • Device to connect multiple connections to a computer
Edgar 2014-12-08
Across
- software used to view various kinds of Internet resources found on the Web.
- Originally known as Web Log.
- a list of citations that appear at the end of a paper, article, chapter or book.
- networks online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- To renew or revitalize; To reload a webpage on the internet.
Down
- A bully who operates online, in cyberspace; To bully online.
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- the name for a way to display information on websites.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- An unauthorized person who secretly gains access to computer files.
12 Clues: Originally known as Web Log. • the name for a way to display information on websites. • A bully who operates online, in cyberspace; To bully online. • To renew or revitalize; To reload a webpage on the internet. • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • ...
networks 2021-11-30
networks 2019-05-17
5 Clues: Burnt house had one • It is a network in your area • What you follow when on a walk with a data packet • Connects several of the answer to number 3 together • Traditional technology for connecting wired (ANSWER 3)
Networks 2022-10-12
5 Clues: wide area network • local area network • every computer requires an ... thats assigned • data is transmitted in small pieces called... • individual computers act as _____ and share files
COSC 100 2015-09-28
Across
- Used to view web pages that may contain text, images, videos and navigate between them via hyperlinks
- Communication where both the sender and the receiver are active at the same time
- Types of _____: File, Memory, Browser, and Edge
- A group of information on a computer that can be software programs or data
- A person who falsifies data to pretend to be someone else
- A type of program used for editing plain text files
- Always credit the ______
- if I want CAT and DOG to show up in my search, I use ___
- 79% of users ___ the page
- is when computers are geographically close
- Hyper Text Mark-up Language
Down
- Should be used with caution on web-pages
- No more than ___ copies may be made of a project
- Communication where the sending and receiving occur at different times
- Wide Area Networks
- Pictures, movies, or graphics
- Composed of HTML tags and multimedia files
- The main technology for local area networks
18 Clues: Wide Area Networks • Always credit the ______ • 79% of users ___ the page • Hyper Text Mark-up Language • Pictures, movies, or graphics • Should be used with caution on web-pages • Composed of HTML tags and multimedia files • is when computers are geographically close • The main technology for local area networks • Types of _____: File, Memory, Browser, and Edge • ...
networks 2019-05-17
5 Clues: Burnt house had one • It is a network in your area • What you follow when on a walk with a data packet • Connects several of the answer to number 3 together • Traditional technology for connecting wired (ANSWER 3)
Networks 2022-03-27
5 Clues: used to transmit power or data • used to transmit pulses of light. • what is internal protocol address? • longer version of domain name system • used to connect smartphones and other devices
Chapter 14 Review 2024-04-26
Across
- What is a set of interconnected nodes
- processes and outcomes created by people
- One of the most strategic chock points
- What country has the most petroleum?
- How many global cities are in the United States?
Down
- Backbone of economic globalization
- The most important nodes in networks
- Fuel that derives from plant material and animal waste
- The margin of business in one commodity chain... integration
- The rift between rich and poor is... on the global scale
10 Clues: Backbone of economic globalization • The most important nodes in networks • What country has the most petroleum? • What is a set of interconnected nodes • One of the most strategic chock points • processes and outcomes created by people • How many global cities are in the United States? • Fuel that derives from plant material and animal waste • ...
Quiz #2 2019-10-11
Across
- program used for the user like Microsoft word
- malware that blocks access to a computer system until the user pays a sum of money
- how relevant a website is
- the source of the information on a website like who the author is
- a type of malware that copy's itself to spread onto another computer
- malware that is a program loaded on to another persons computer without them knowing
- malware that misleads the user of its full intent
- a global system interconnected by computer networks
- the reality and truth of a website
- how current a website is
Down
- language for creating a web page
- link that takes you from one location to another
- a collection of data used by computers
- supports a computers basic functions
- malware that is meant to find information about a person or a organization
- one of the first packet switching networks
- what is the point of the website
- large scale computer network made to avoid doubling on research
- transmission control protocol communication over the internet
- the web address
20 Clues: the web address • how current a website is • how relevant a website is • language for creating a web page • what is the point of the website • the reality and truth of a website • supports a computers basic functions • a collection of data used by computers • one of the first packet switching networks • program used for the user like Microsoft word • ...
Artificial Intelligence 2020-12-17
Across
- One method to train neural networks is ____.
- One decision rule used in AI is called ____.
- A software that is programmed to simulate a conversation
- One characteristic an agent possesses is about maintaining their internal state through their existence
- A logic programming language from 1970
- ____ is a type of uninformed search algorithm.
- AI, Software Engineering and ____ are multidisciplinary influences to a Software agent
- A set of smart devices and computers linked together
- ____ can be used to optimize, educate, test and train.
- ____ is a common unsupervised network.
Down
- Mutation rate and genomes are common terms when using ____ algorithm.
- A threshold is commonly associated with ____ formal neurons.
- SQL and XSLT are examples of ____ programming
- Siri uses ____
- The layer between the input layer and output layer in a multi-layer neural network is called a ____ layer.
- There are three types of suitability functions: fitness, payoff and ___ .
- ____ and adaline are types of simple pattern recognition networks.
- John McCarthy introduces the term _____ in 1956
- The ability of an agent to move around a network
- Chinese Room
20 Clues: Chinese Room • Siri uses ____ • A logic programming language from 1970 • ____ is a common unsupervised network. • One method to train neural networks is ____. • One decision rule used in AI is called ____. • SQL and XSLT are examples of ____ programming • ____ is a type of uninformed search algorithm. • John McCarthy introduces the term _____ in 1956 • ...
Derek's Crossword Puzzle 2015-01-21
Across
- Device that filters and forwards data packets between LAN segments
- Most common kind of video on the internet involving tiny furry creatures
- A person who writes code for computer programs
- The central computing unit of a computer
- An IDE from microsoft
- Computer memory
- American Standard Code for Information Interchange
- The .NET framework was created by what company?
- A process or set of rules to be followed in calculations or other problem-solving operations
Down
- Stores all files and data on a computer
- A global system of interconnected computer networks
- A diagrammatic representation of an algorithm
- The list of commands a programmer types before they are compiled
- A computer or computer program that manages access to a centralized resource or service in a network
- A positional numeral system with a radix, or base, of 16
- Phase in the software development cycle when an application is tested for functionality
- One of the most in demand programming languages developed by Sun Microsystems
- Network device that forwards data packets to other networks
- Hyper Text Markup Language
- Computer language using ones and zeros
20 Clues: Computer memory • An IDE from microsoft • Hyper Text Markup Language • Computer language using ones and zeros • Stores all files and data on a computer • The central computing unit of a computer • A diagrammatic representation of an algorithm • A person who writes code for computer programs • The .NET framework was created by what company? • ...
Lesson 3 2015-10-09
Across
- The destination of a message sent through a network. (Computer, Terminal, Node.)
- A computer with the capability to provide service to other computer programs
- in order to access the internet you need this (_ _ P)
- Source/ destination of a packet on a network
- performs the funtions of a modulator/demodulator
- provides service to users across a network
- able to connect computers to other devices without wires
- uses a 64 or 128 bit key
- made of super thin filaments of glass that can carry beams of light
- Institute of Electrical and......
- cable Commonly used in high speed wired computer networks
- network created for a home or other small area (_ A N)
Down
- hardware or software device that manages the paths along which info travels between networks.
- joins wireless clients to a wired ethernet network
- allows different devices to print
- links multiple devices on the same data connection.
- enables computers to interpret data received from a network
- Cable Designed for carrying electronic signal
- used for surveillance
- wireless fidelity
20 Clues: wireless fidelity • used for surveillance • uses a 64 or 128 bit key • allows different devices to print • Institute of Electrical and...... • provides service to users across a network • Source/ destination of a packet on a network • Cable Designed for carrying electronic signal • performs the funtions of a modulator/demodulator • ...
TMGT 7123 Review 2016-10-31
Across
- a network that connects head office with a branch office
- used by organizations to better manage their IT
- what is used in a relational database to uniquely identify a table
- an unstructured database such as Cassandra
- An example of a wireless technology similar to RFID
- cabling standard for building networks based on IEEE standard
- the predecessor to Enterprise Resource Planning systems
- the person in an organization that is responsible for creating an IT roadmap
- A research organization that produces findings like Magic Quadrants
- a network devices than connects two different networks together
- device or algorithms used by organizations to prevent cyber attacks
Down
- a system development methodology
- what organizations do to acquire software
- an example of a disruptive technology and is used by billions of users
- volatile memory used by computing devices
- the type of security that is of most concern to e-commerce companies
- waterfall is an example of this
- the successor to MRP
- an organization’s expectations for when it would be able to operate after a disaster
- Open System Interconnection
20 Clues: the successor to MRP • Open System Interconnection • waterfall is an example of this • a system development methodology • what organizations do to acquire software • volatile memory used by computing devices • an unstructured database such as Cassandra • used by organizations to better manage their IT • An example of a wireless technology similar to RFID • ...
GROUP 11 TECHNOLOGY COMPUTER 2023-11-30
Across
- Temporary storage area, often used to improve data transfer.
- The main circuit board containing the central components of a computer.
- Solid State Drive; a faster and more durable storage alternative to HDD.
- Common storage device for digital data.
- Device for producing a paper copy of data from a computer.
- Device for converting sound into an electrical signal.
- Device that forwards data packets between computer networks.
- Central processing unit; the brain of the computer.
- Global network connecting millions of private, public, academic, business, and government networks.
Down
- Input device with keys for entering data into a computer.
- Video Graphics Array; a standard for displaying graphics.
- Computer or system that manages network resources.
- Programs and data that operate a computer.
- Physical components of a computer system
- Read-Only Memory; a type of non-volatile memory.
- Diskette reader device
- Input device for controlling movement in a computer game.
- Pointing device commonly used with computers.
- Autonomous or semi-autonomous mechanical device.
- Process of generating an image from a model.
20 Clues: Diskette reader device • Common storage device for digital data. • Physical components of a computer system • Programs and data that operate a computer. • Process of generating an image from a model. • Pointing device commonly used with computers. • Read-Only Memory; a type of non-volatile memory. • Autonomous or semi-autonomous mechanical device. • ...
Hekking_JAS IT 2025_Net_Module 11 Crosswords 2024-12-02
Across
- control of what users may do after accessing network
- technology that makes data unusuable and unreadable to all but authorized users
- A public certification authority organization
- The most widely used method for encrypting data
- A white hat's role
- unethical hacker who uses network or OS vulnerabilities to gain unauthorized access and permissions
- EFS works in one of three modes: ... mode, USB key mode, and user authentication mode
- Inherence refers to ... traits
- A black hat's role
- Three aspects of a security system for OS or networks: authentication, authorization, and ... (AAA)
Down
- ethical hacker who probes networks or OSs and reports on vulnerabilities
- control of access to network
- A common security tool used by Linux administrators
- Three credential categories for multifactor authentication: knowledge, possession, and ...
- Windows domain associated mutual authentication protocol
- A built-in firewall included in many Linux distributions
- common client-server authentication protocol
- A good security option for servers that are not physically secure
- A Linux Files tool that offers a trash can for deleting files permanently
- Windows Server Update Services
20 Clues: A white hat's role • A black hat's role • control of access to network • Inherence refers to ... traits • Windows Server Update Services • common client-server authentication protocol • A public certification authority organization • The most widely used method for encrypting data • A common security tool used by Linux administrators • ...
crossword 2024-10-07
Across
- - A computer that requests resources from a server.
- - A private network that connects devices in a small area.
- - A computer that provides services to other computers on the network.
- - A type of network that spans a large geographic area.
- - A set of rules governing the exchange of data between devices.
- - The total capacity of a data transmission system.
- - A device that connects devices within a network.
- - A collection of computers and devices connected to share resources.
- - A device that connects two different networks.
- - A smaller network within a larger network.
Down
- - A common method for connecting devices in a wired network.
- - A device that monitors and controls incoming and outgoing network traffic.
- - The amount of data transmitted in a given time.
- - A secure connection over the internet.
- - A device that forwards data packets between computer networks.
- - The arrangement of different elements in a network.
- - A machine that provides resources to other machines.
- - A way to connect devices without wires.
- - Data formatted for transmission over a network.
- Address - The address assigned to a device on a network.
20 Clues: - A secure connection over the internet. • - A way to connect devices without wires. • - A smaller network within a larger network. • - A device that connects two different networks. • - The amount of data transmitted in a given time. • - Data formatted for transmission over a network. • - A device that connects devices within a network. • ...
Momentum and More 2024-12-01
Across
- Programming language used for Soroban Smart Contract Platform. Can also be found on metal left out in the rain
- One of the Ethereum upgrades. Equals scalability, efficiency and low cost
- This is at the heart of the Fediverse. Has 2 layers, a server to serve the federation protocol and a client server protocol
- Concept of the internet through a military project
- Ethereum upgrade that allows ETH 2.O to integrate with Stellar
- This is the preferred interface for 6.9 billion active users.
- Simple syntax and easy to learn. Smart contracts written on this are prone to vulnerabilities
Down
- Ethereum upgrade that is PoS, flexible and has liquidity
- Decentralized social networks make this up. Allows different SM networks to communicate with each other
- This is an upcoming upgrade to Ethereum. Prague and Electra combined is referred to as this upgrade
- This is part of WEB3. This is used to encrypt data and create a trustless environment in WEB3 applications
- This is the system that was the first distributed computer-based learning system.
- This is one of the effects SM has on people. Most people have a good sense of this.
- Allows users to move data and assets across different networks and interact with various blockchain applications and ecosystems
14 Clues: Concept of the internet through a military project • Ethereum upgrade that is PoS, flexible and has liquidity • This is the preferred interface for 6.9 billion active users. • Ethereum upgrade that allows ETH 2.O to integrate with Stellar • One of the Ethereum upgrades. Equals scalability, efficiency and low cost • ...
Andi Wisdom-Crossword-1st period 2016-10-24
Across
- is a peripheral used to provide data and control signals to an information.
- what does ROM stand for
- what does WWW stand for
- it is knowledge,skills,and behaviors in broad range devices.
- who invented WWW
Down
- what is one of the input devices
- a massive networks of networks.
- is the enclosure for all the other main interior components of a computer.
- what does RAM stand for
9 Clues: who invented WWW • what does RAM stand for • what does ROM stand for • what does WWW stand for • a massive networks of networks. • what is one of the input devices • it is knowledge,skills,and behaviors in broad range devices. • is the enclosure for all the other main interior components of a computer. • ...
How Cognizant drove a tech giant towards savings and improved efficiency 2025-04-30
Across
- - Shortcutz is designed to handle these type of road networks
- – The percentage overall operational efficiency improved by
- - Countries covered by the fleet
- - The type of optimization used in Shortcutz
Down
- - Algorithm used alongside Ant Colony Optimization
- - The name of the application developed by Cognizant
- - Programming language used in Shortcutz
- - Type of graphs used to model road networks
- - Technique used to optimize preprocessing
9 Clues: - Countries covered by the fleet • - Programming language used in Shortcutz • - Technique used to optimize preprocessing • - Type of graphs used to model road networks • - The type of optimization used in Shortcutz • - Algorithm used alongside Ant Colony Optimization • - The name of the application developed by Cognizant • ...
Edgar 2014-12-08
Across
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- Originally known as Web Log.
- the name for a way to display information on websites.
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- A bully who operates online, in cyberspace; To bully online.
- software used to view various kinds of Internet resources found on the Web.
- An unauthorized person who secretly gains access to computer files.
Down
- a list of citations that appear at the end of a paper, article, chapter or book.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- To renew or revitalize; To reload a webpage on the internet.
12 Clues: Originally known as Web Log. • the name for a way to display information on websites. • To renew or revitalize; To reload a webpage on the internet. • A bully who operates online, in cyberspace; To bully online. • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • ...
Form 4 Puzzle on Networks 2025-09-19
Across
- The ability of a network to be easily expanded by adding new devices, users, storage and other resources is
- The WIFI standard 802.11ax is also known as?
- A company that provides mobile network services to the public.
- This acronym represents the component of a mobile network that helps route calls and data.
- This type of network covers a very small area and is used to link personal devices such as tablets, smart phones, and laptops.
- A system that uses radio waves to transmit and receive data between devices is called _____________based.
- A network that covers a large area such as a town or city is called.
Down
- This acronym represents the unique name of WIFI network that are being broadcasted.
- A system of interconnected devices that communicate and share resources.
- A feature introduce in 2G networks which allowed users to send text messages is also known as?
- A network made up of computers within a small geographical area, such as an office building or home.
- This terms refers to the number of times a wave repeats or cycles within one second.
- A mobile service supported by 3G networks that allows for the sending of images and videos
- The name given to the technology that uses continuous varying signals to transmit information in 1G networks.
14 Clues: The WIFI standard 802.11ax is also known as? • A company that provides mobile network services to the public. • A network that covers a large area such as a town or city is called. • A system of interconnected devices that communicate and share resources. • This acronym represents the unique name of WIFI network that are being broadcasted. • ...
MODULE 11 QUIZ 2024-12-19
Across
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- Paid to probe networks and report vulnerabilities
- is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- is a server role that makes it possible for administrators to take control of Microsoft product updates
- a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- what the user has (smart card or key)
- Do not report problems, but instead disseminate the information to other
- what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern
- Creates a barrier between two entities
Down
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- features that enable administrators to control who has access to the network authentication
- The most widely used method for encrypting data is IP Security
- prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- What users can do after they are logged on to the network
- An industry-standard client/server protocol that offers centralized control
- what the user knows (username/password)
- A document that enlist the rules about access to an organization’s information resources, enforcement of regulations, and steps taken if rules are breached
20 Clues: what the user has (smart card or key) • Creates a barrier between two entities • what the user knows (username/password) • Paid to probe networks and report vulnerabilities • What users can do after they are logged on to the network • The most widely used method for encrypting data is IP Security • ...
Cybersecurity Fundamental Chapter 1 2022-11-29
Across
- Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
- group of criminals breaks into computers or networks to gain access for various reasons.
- Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- The Honeynet project is an example of creating Early Warning Systems.
Down
- great businesses have been created by collecting and harnessing the power of data and data analytics.
- InfraGard is an example of wide spread sharing of cyber intelligence.
- hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
- Business large and small have recognized the power of big data and data analytics.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence. • The Honeynet project is an example of creating Early Warning Systems. • Business large and small have recognized the power of big data and data analytics. • group of criminals breaks into computers or networks to gain access for various reasons. • ...
Digital literacies 2022-11-28
Across
- ability to read, write, critique and modify computer code for informational, communicational and design purposes
- ability to use digital tools to shape, establish and project a desired online identity as a platform for interacting with others
- ability to apply a critical lens to all aspects of digital technologies, including digital information, and through research, reflection and discussion to arrive at a considered position on their design and/or redesign
- ability to connect with others in personal and/or professional networks, and through these networks to filter, obtain and share information, to communicate and collaborate with others, to develop a reputation and influence, and to act within online and offline contexts
- ability to communicate effectively in textspeak characterised by abbreviations and contextual markers (including emoticons, emoji, emotional punctuation and hashtags)
- ability to contribute to the collective intelligence of digital networks and to leverage the collective intelligence of those networks in the service of goals which may be online and/or offline and which may be personal and/or collective
Down
- ability to effectively interpret, create, and interact through multimodal texts and/or multisensory communications
- ability to effectively interpret, create, and exchange representations of meaning using mobile devices
- ability to communicate effectively and constructively across varying, increasingly superdiverse, cultural contexts
- ability to exercise agency through redesign, specifically by reworking cultural artefacts
- ability to make effective use of a wide array of search engines and services
11 Clues: ability to make effective use of a wide array of search engines and services • ability to exercise agency through redesign, specifically by reworking cultural artefacts • ability to effectively interpret, create, and exchange representations of meaning using mobile devices • ...
Computer Networks: Part 2 2022-03-27
Across
- A more ‘intelligent’ device than a hub.
- World-wide network.
- The process of converting information into a form that is meaningless to anyone except holders of a ‘key’.
- It combines two or more of the basic topologies.
- Private network that provides similar services to The Internet.
- A network device that typically links together two different parts of a LAN.
- A computer setup to share a resource, usually an Internet connection.
- Used to connect all of the computers together. Each computer has a short cable.
Down
- Internet Service Provider.
- Each computer is connected to a loop of cable.
- Device that connects a number of computers together to make a LAN.
- Every computer is connected to a central device. The device passes messages between computers.
- These are still used in most networks, rather than using only wireless, because they can carry much more data per second, and are more secure (less open to hacking).
- A device, or a piece of software that is placed between your computer and the rest of the network
- Special device to join the digital computer to the analogue telephone line.
- A network device that connects together two or more networks.
- Network Interface Card.
17 Clues: World-wide network. • Network Interface Card. • Internet Service Provider. • A more ‘intelligent’ device than a hub. • Each computer is connected to a loop of cable. • It combines two or more of the basic topologies. • A network device that connects together two or more networks. • Private network that provides similar services to The Internet. • ...
Embedded Systems and Networks 2026-02-09
Across
- IP address that is manually assigned and does not change
- Internet protocol using 128-bit hexadecimal addresses
- IP address that changes automatically over time or networks
- Network device that forwards data packets between networks
- Embedded system used to monitor and protect property
- Hardware component that allows a device to connect to a network
- Computer system designed to perform one specific task
- Embedded system application used for navigation
Down
- Permanent hardware address used to identify a network device
- Output device that carries out actions such as movement or sound
- Chip containing CPU, RAM, ROM and input/output on one chip
- Internet protocol using 32-bit addresses written in decimal
- Device that converts analogue input data into digital form
- System on a Chip that includes processor, memory and I/O
- Protocol that automatically assigns IP addresses to devices
15 Clues: Embedded system application used for navigation • Embedded system used to monitor and protect property • Internet protocol using 128-bit hexadecimal addresses • Computer system designed to perform one specific task • IP address that is manually assigned and does not change • System on a Chip that includes processor, memory and I/O • ...
Social Media 2021-01-18
Across
- A self-portrait taken using the reverse camera on a smartphone.
- A small, attractive application on a website such as a hit counter.
- Platform founded by Mark Zuckerberg.
- Anything shared across social networks that get passed along rapidly e. g. YouTube.
- A system that manages content.
- A network for online picture sharing.
- A photo-sharing application gained more than 300 million users.
Down
- #.
- A pictorial representation of a facial expression that is used in writing.
- Here you are allowed to share a 140-character update.
- Simple webpages that can be edited by others.
- It is an image or username that represents a person online most often within forums and social networks.
- They are also known as message boards.
- A site updated frequently by an individual or group to record opinions or information.
- A one-to-one communication on the internet.
- An action that can be made by a Facebook user.
16 Clues: #. • A system that manages content. • Platform founded by Mark Zuckerberg. • A network for online picture sharing. • They are also known as message boards. • A one-to-one communication on the internet. • Simple webpages that can be edited by others. • An action that can be made by a Facebook user. • Here you are allowed to share a 140-character update. • ...
Technology Vocabulary 2021-09-13
Across
- A self-portrait taken using the reverse camera screen on a smartphone
- The first page of a website
- Advertising that comes to your email address
- A message sent on Twitter
- The secret code that is only known by yourself
- Anything shared across social networks that get passed along rapidly e.g. YouTube
- A process of file transfer from the internet
- Platform founded by Mark Zuckerberg
- An action that can be made by a Facebook user
Down
- A name you choose for yourself, that isn't your real name
- The part of your computer with numbers and letters
- It is an image or username that represents a person online most often within forums and social networks
- A pictorial representation of a facial expression which is used in writing
- A hidden program that can hurt your computer
- A label that makes it easier to find information
- A letter you send through your computer
16 Clues: A message sent on Twitter • The first page of a website • Platform founded by Mark Zuckerberg • A letter you send through your computer • Advertising that comes to your email address • A hidden program that can hurt your computer • A process of file transfer from the internet • An action that can be made by a Facebook user • The secret code that is only known by yourself • ...
Unit 1 Review 2014-10-27
Across
- study of workplace health and safety
- part of the email that contains the message
- email service based on a web server
- any part of a computer you can see or touch
- the ability to attach a file or photo to email
- when a page is oriented vertically
- any company that provides access to the internet
- any set of machine readable instructions that gives directions
- any device used to put information into the computer
- any device used to get information out of the computer
- what the email is about
Down
- memory that is volatile
- when the page is turned so it is wider then tall
- manages the computers hardware and software
- network located over a large area
- network located in a small area
- software used to retrieve, present and browse pages on the internet
- computer memory on which data has been prerecorded
- to adjust so the print is even on one side or fills a space evenly
- global system of interconnected computer networks
- collection of private computer networks within an organization
21 Clues: memory that is volatile • what the email is about • network located in a small area • network located over a large area • when a page is oriented vertically • email service based on a web server • study of workplace health and safety • part of the email that contains the message • manages the computers hardware and software • any part of a computer you can see or touch • ...
Derek's Crossword Puzzle 2015-01-21
Across
- A computer or computer program that manages access to a centralized resource or service in a network
- Computer memory
- American Standard Code for Information Interchange
- Hyper Text Markup Language
- A diagrammatic representation of an algorithm
- Stores all files and data on a computer
- An IDE from microsoft
- Phase in the software development cycle when an application is tested for functionality
- A person who writes code for computer programs
Down
- One of the most in demand programming languages developed by Sun Microsystems
- Network device that forwards data packets to other networks
- Most common kind of video on the internet involving tiny furry creatures
- The list of commands a programmer types before they are compiled
- A positional numeral system with a radix, or base, of 16
- The central computing unit of a computer
- A global system of interconnected computer networks
- Computer language using ones and zeros
- Device that filters and forwards data packets between LAN segments
- The .NET framework was created by what company?
- A process or set of rules to be followed in calculations or other problem-solving operations
20 Clues: Computer memory • An IDE from microsoft • Hyper Text Markup Language • Computer language using ones and zeros • Stores all files and data on a computer • The central computing unit of a computer • A diagrammatic representation of an algorithm • A person who writes code for computer programs • The .NET framework was created by what company? • ...
computer class 2016-02-03
Across
- 6 second video site
- shopping community
- how far you are in the internet.
- made to communicate with friends and family
- kinda a clone to facebook
- a source for info and files.
- up- Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telephone line.
- clone of skype
- communicating via voice
- blogging
- communicating via "tweets
Down
- bidding and shopping
- playing nice on the web
- is a family of computer networking technologies commonly used in local area networks (LANs) and metropolitan area networks (MANs). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3, and has since been refined to support higher bit rates and longer link distances.
- media- websites where we talk to people
- gaming community
- pinning favorite things
- a group or system of interconnected people or things.
- game broadcasts
- messages distributed by electronic means from one computer user to one or more recipients via a network.
20 Clues: blogging • clone of skype • game broadcasts • gaming community • shopping community • 6 second video site • bidding and shopping • playing nice on the web • pinning favorite things • communicating via voice • kinda a clone to facebook • communicating via "tweets • a source for info and files. • how far you are in the internet. • media- websites where we talk to people • ...
CW1 2017-10-08
Across
- :Blocks Unauthorised access to networks.
- :__________Signals are used to carry message in fibre optic cables
- :Address space for IoT
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- :A machine which asks or start communication.
- :Deny or allow packet based on rules.
- :All devices can talk to each other.
- :Network attack that occurs on the first
- :An attack named after greek-trojan war.
- :Business and Personal equipment must be protected
- :command to go from switch> to switch#
- :A powerful machine which answers.
- :A Method to connect Business to Internet
- :Creates a secure connection for remote workers.
- that a vulnerability becomes known.
- : An attack which slows down or crashes equipment and programs
Down
- :Marks IP address in network diagram
- :WANs are in control of _______________.
- :Stealing your username and password.
- :Access to people inside company only.
- :Network Can grow
- :Priority Queues
- :interconnects networks
- :A program to stop virus attack.
- Program secretly collecting information.
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • that a vulnerability becomes known. • :Marks IP address in network diagram • :All devices can talk to each other. • :Stealing your username and password. • :Deny or allow packet based on rules. • ...
concepts associated with network requirements. 2021-04-09
Across
- handles connection to the network by the higher layers
- Define the rules that govern the communications between two computers connected to the network
- a communication computer that connects different types of networks using different protocols
- a device on a network can be thought of as this
- Manages sessions among applications
- provides end-to-end errors detection and correction
- defines the physical characteristics of the network
- allows the constitution of communication groups (newsgroups) organized around specific topics
- type of network that covers buildings
- allows the management of the network
- provides safe communication of data over the physical network
Down
- Consists of only 4 layers
- Consists of only 7 layers
- allows the transfer of collection of files between two machines connected to the Internet
- Numeric quantities that are easy for computers with but not for humans to remember
- provides standard data representations for applications
- type of networks that covers cities
- defines a basic service for electronic mails
- allows a user to connect to a remote host in terminal mode
- applications connected to the network
20 Clues: Consists of only 4 layers • Consists of only 7 layers • type of networks that covers cities • Manages sessions among applications • allows the management of the network • applications connected to the network • type of network that covers buildings • defines a basic service for electronic mails • a device on a network can be thought of as this • ...
Network Requirements Crossword 2023-09-05
Across
- network interface card
- a high-speed internet connection
- Local Area Network
- a computer network security system that restricts internet traffic
- an electronic device that relays a transmitted signal
- internet protocol
- a computer program or device that provides a service to another computer program and its user
- Network Operating System
- a piece of networking hardware that links multiple devices together
Down
- a hardware device that acts as a "fence" between two networks
- connects LAN to WAN
- any computer or other device connected to a network that sends, receives, or redistributes data
- a cord, connector or plug
- a device that connects two or more packet-switched networks
- Network Attach Storage
- the maximum capacity of a wired or wireless communications link to deliver data via a network connection
- a device that connects two LANs
- a set of rules that need to be followed
- computers that access and use the network and shared network resources
- a hardware device used at the physical layer to connect multiple devices in the network
20 Clues: internet protocol • Local Area Network • connects LAN to WAN • network interface card • Network Attach Storage • Network Operating System • a cord, connector or plug • a device that connects two LANs • a high-speed internet connection • a set of rules that need to be followed • an electronic device that relays a transmitted signal • ...
ST10050768's NWEG5122 Crossword 2023-08-30
Across
- Topology where all computing devices are connected with a single cable
- converting information into secret code to hide information
- network device that is used to segment the networks into different subnetworks called subnets or LAN segments
- Measuring by quality rather than quantity
- component that allows network device to move data to the system's memory reducing CPU usage
- Device that forwards data packets from one network to another
- protecting computer networks from cyber threats is called network ...
- Amount of data that moves across a network during any given time
- Delay in time taken for data to reach its destination
- rate of message delivery over a communication channel
- data can be stored in ...
Down
- Topology where all computing devices are connected to a central node
- capacity at which a network can transmit data
- Another word for Network Adapter(Abbreviation)
- Information translated into a form efficient for processing
- Measuring by quantity rather than quality
- Data divided into small segments
- Global network
- Time delay over a network connection
- Established set of rules that determines how data is sent
20 Clues: Global network • data can be stored in ... • Data divided into small segments • Time delay over a network connection • Measuring by quantity rather than quality • Measuring by quality rather than quantity • capacity at which a network can transmit data • Another word for Network Adapter(Abbreviation) • Delay in time taken for data to reach its destination • ...
Cybersecurity Term Bank 2025-08-27
Across
- Breach Unauthorized release or theft of information
- Verifying a user’s identity
- Access Terminal Device (screen/keyboard) for interacting with a computer
- Malware that self-replicates and spreads across networks
- Trick users into giving information via fake messages
- Privilege Giving users the minimum access needed
- Instructions that run on hardware to perform tasks
- Device that forwards data between networks
- attacks Flooding a target with traffic to overwhelm it
- Number used by a protocol for communication
- Event with potential to harm systems or data
- Computer providing resources to others
- Reliable access to data and systems
- in Depth Multiple layers of security protection
Down
- Converting plaintext into unreadable code
- Software designed to harm systems or data
- Weakness that can be exploited
- Keeping info accessible only to authorized users
- Reducing features or data exposure
- Ensuring data is accurate and unchanged
- Control Process of granting or denying use of resources
- Information at rest, in use, or in transit
- Malware that spreads by attaching to files/programs
- in the Middle (MITM) Attacker intercepts and alters communication
- Physical parts of a computer
- System that filters network traffic
26 Clues: Verifying a user’s identity • Physical parts of a computer • Weakness that can be exploited • Reducing features or data exposure • System that filters network traffic • Reliable access to data and systems • Computer providing resources to others • Ensuring data is accurate and unchanged • Converting plaintext into unreadable code • Software designed to harm systems or data • ...
Les fake news - vocabulaire 2021-04-03
15 Clues: power • a hoax • to lie • to share • networks • to share • to verify • publicity • aggravate • a propaganda • to make better • false or fake info • computer program that alters • verifying a source is called __ • Information and intoxication equals ___
brain1 2025-02-24
Across
- A process or set of rules followed in calculations or problem-solving
- Software that manages computer hardware and software resources
- The measurement and statistical analysis of people's unique physical and behavioral characteristics
Down
- Secures data by converting it to a coded form
- Field analyzing large datasets
- Logical division of a drive
- Manages hardware and software
- Protects networks from threats
- Device that connects multiple networks
9 Clues: Logical division of a drive • Manages hardware and software • Field analyzing large datasets • Protects networks from threats • Device that connects multiple networks • Secures data by converting it to a coded form • Software that manages computer hardware and software resources • A process or set of rules followed in calculations or problem-solving • ...
How Cognizant drove a tech giant towards savings and improved efficiency 2025-04-29
Across
- - Shortcutz is designed to handle these type of road networks
- – The percentage overall operational efficiency improved by
- - Countries covered by the fleet
- - The type of optimization used in Shortcutz
Down
- - Algorithm used alongside Ant Colony Optimization
- - The name of the application developed by Cognizant
- - Programming language used in Shortcutz
- - Type of graphs used to model road networks
- - Technique used to optimize preprocessing
9 Clues: - Countries covered by the fleet • - Programming language used in Shortcutz • - Technique used to optimize preprocessing • - Type of graphs used to model road networks • - The type of optimization used in Shortcutz • - Algorithm used alongside Ant Colony Optimization • - The name of the application developed by Cognizant • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Alpo 2021-02-25
Across
- used to connect together multiple devices, not that intelligent
- supports 100baseT
- network spanning a metropolitan area
- global network comprised of most devices
- Two or more computers linked to share resources
- supports 10baseT
- aware of every device connected to it, used to connect together multiple devices, smart
- supports 1000baset
- stores and transfers data, has no physical interface
- connects devices to others, provides a firewall
- network spanning a wide area
- ip comprised of 8 sets of 4 long hexadecimal numbers
- fastest speed possible
Down
- ip comprised of 4 different sets of numbers ranging 0 - 255
- Unique six sets of two numbers identifier for a device
- connects two networks together or splits up into two segments
- network spanning a local area
- station for work
- extends the range of cabled networks
- Number assigned by router linked to your internet activity
- data sent with destination and what it wants to do
- reaches up to 100gb/s of speed or higher
- cable with 8 wires used for networking
23 Clues: station for work • supports 10baseT • supports 100baseT • supports 1000baset • fastest speed possible • network spanning a wide area • network spanning a local area • network spanning a metropolitan area • extends the range of cabled networks • cable with 8 wires used for networking • global network comprised of most devices • reaches up to 100gb/s of speed or higher • ...
Cyber Security 2023-09-09
Across
- the protection of data and systems.
- insurance that provides liability.
- training to help educate about possible cyber threats.
- software designed with malicious intent to steal/destroy data.
- a type of malware used to encrypt files and obtain data.
- protecting connected devices and networks from unauthorized access.
- the conversion of readable data to encoded data.
- protects data from physical actions.
- insurance that covers losses money.
- a group of steps that show how to execute a test.
- an organization to help businesses manage cybersecurity risks.
- a set of requirements to help create strong passwords.
Down
- when someone pretends to be something to steal data.
- changes made to a software to improve it.
- helps cover a business's losses from a cyber attack.
- saving data in a different secure and safe place in case data is lost.
- encrypted security used to protect Wi-Fi networks.
- stealing information from an unaware person through the internet.
- a strategy made to protect businesses from threats.
- an attack used to obtain sensitive data by acting as a trusted source.
20 Clues: insurance that provides liability. • the protection of data and systems. • insurance that covers losses money. • protects data from physical actions. • changes made to a software to improve it. • the conversion of readable data to encoded data. • a group of steps that show how to execute a test. • encrypted security used to protect Wi-Fi networks. • ...
saklksdg 2025-03-26
Across
- A unique address used to identify a website
- A network of computers that share resources and data
- A collection of web pages under a single name
- A program used to detect and remove malware
- A type of malicious software that encrypts files for ransom
- System The basic software that manages hardware and software resources
- A virtual storage solution accessible via the internet
- A structured collection of data
- A version control system used for software development
- A technology that enables wireless communication over short distances
Down
- The main circuit board of a computer
- An attack that prevents access to a system by overwhelming it
- A protective barrier for networks against cyber threats
- The process of finding and fixing errors in code
- A worldwide system of interconnected networks
- The process of converting plain text into a secure format
- Address A globally unique identifier for devices on a network
- A computer program designed to interact with users in a conversation
- The language used to structure web pages
- A person who attempts to gain unauthorized access to a system
20 Clues: A structured collection of data • The main circuit board of a computer • The language used to structure web pages • A unique address used to identify a website • A program used to detect and remove malware • A collection of web pages under a single name • A worldwide system of interconnected networks • The process of finding and fixing errors in code • ...
Network Layer 2026-03-31
Across
- – Moving packets from input to output interface
- – Resolves IP addresses to MAC addresses
- – Manually configured routing
- – Connectionless packet used in IP communication
- – Basic unit of data at the network layer
- – Limits the lifetime of a packet
- – Smaller network within a larger network
- – Unique logical identifier assigned to a device on a network
- – 128-bit addressing scheme designed to replace IPv4
- – Automatically updated routing using protocols
- – Translates private IP addresses to public ones
- – Path-vector protocol used between autonomous systems
- – Device that forwards packets between networks
- – Link-state routing protocol
Down
- – Tool that tracks the path packets take
- – Tool used to test reachability using ICMP
- – Breaking packets into smaller pieces
- – Putting fragmented packets back together
- – Resolves MAC addresses to IP addresses (obsolete)
- – Process of selecting paths for traffic
- – Number of routers a packet passes through
- – Entry/exit point connecting different networks
- – 32-bit addressing scheme still widely used
- – Defines network and host portions of an IP address
- – Protocol used for error reporting and diagnostics
25 Clues: – Manually configured routing • – Link-state routing protocol • – Limits the lifetime of a packet • – Breaking packets into smaller pieces • – Tool that tracks the path packets take • – Resolves IP addresses to MAC addresses • – Process of selecting paths for traffic • – Basic unit of data at the network layer • – Smaller network within a larger network • ...
Baby Boomer Trivia 2021-09-17
Across
- Girl, Marlo Thomas' hit TV show from the mid-1960s
- The company that introduced America to the TV dinner
- Boots are Made for Walking, Nancy Sinatra's biggest hit
- The number of major TV broadcast networks in 1959
- tail, Popular boy's hairstyle in the 1950s
- Fictional town that was home to The Andy Griffith Show
- McCarthy Edgar Bergen's ventriloquist dummy
- Monkeys, Product advertised in comic books that was a favorite of budding biologists
Down
- Orange-flavored drink favored by astronauts
- D Eisenhower The U.S. President in 1958
- The first man-made satellite launched into space
- Monroe, Who was on the cover of the first 'Playboy' Magazine?
- TV western that debuted in 1955 and ran for 20 years
- horse cartoon, Who was Quick Draw McGraw?
- Spangled Banner, Song television networks played to signal the end of the programming day
- Eden, Actor who played Jeannie in “I Dream of Jeannie"
16 Clues: D Eisenhower The U.S. President in 1958 • horse cartoon, Who was Quick Draw McGraw? • tail, Popular boy's hairstyle in the 1950s • Orange-flavored drink favored by astronauts • McCarthy Edgar Bergen's ventriloquist dummy • The first man-made satellite launched into space • The number of major TV broadcast networks in 1959 • ...
Networking: Common Ports 2024-10-03
Across
- Web traffic without encryption (80)
- Clock synchronization between two machines (123)
- Send and receive email messages (25)
- Network naming protocol for networks that automatically assign IP addresses (67/68)
- Remote log-in securely to another machine over unsecure networks, typically for CLI (22)
- Naming system for IP Addresses (53)
- Real-time sessions that include voice, video, text messaging, etc. (5060/5061)
- Transfers files between two systems (20/21)
- Transfers files from one system to another with lockstep method (69)
- Microsoft created to provide access to devices on a network (445)
Down
- Hosts the information about machines on a network (161/162)
- Text communication between two machines in plaintext (23)
- Contains directory information for a network (389)
- A client can retrieve emails from an email server (143)
- A client can retrieve emails from an email server (110)
- Access a machine’s desktop remotely (3389)
16 Clues: Web traffic without encryption (80) • Naming system for IP Addresses (53) • Send and receive email messages (25) • Access a machine’s desktop remotely (3389) • Transfers files between two systems (20/21) • Clock synchronization between two machines (123) • Contains directory information for a network (389) • A client can retrieve emails from an email server (143) • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Derek's Crossword Puzzle 2015-01-21
Across
- A diagrammatic representation of an algorithm
- The .NET framework was created by what company?
- Hyper Text Markup Language
- The list of commands a programmer types before they are compiled
- A positional numeral system with a radix, or base, of 16
- Computer language using ones and zeros
- A global system of interconnected computer networks
Down
- A process or set of rules to be followed in calculations or other problem-solving operations
- One of the most in demand programming languages developed by Sun Microsystems
- The central computing unit of a computer
- A person who writes code for computer programs
- American Standard Code for Information Interchange
- An IDE from microsoft
- A computer or computer program that manages access to a centralized resource or service in a network
- Network device that forwards data packets to other networks
- Stores all files and data on a computer
- Most common kind of video on the internet involving tiny furry creatures
- Phase in the software development cycle when an application is tested for functionality
- Device that filters and forwards data packets between LAN segments
- Computer memory
20 Clues: Computer memory • An IDE from microsoft • Hyper Text Markup Language • Computer language using ones and zeros • Stores all files and data on a computer • The central computing unit of a computer • A diagrammatic representation of an algorithm • A person who writes code for computer programs • The .NET framework was created by what company? • ...
Technology computer 2023-11-29
Across
- - Solid State Drive; a faster and more durable storage alternative to HDD.
- - Physical components of a computer system.
- - Central processing unit; the brain of the computer.
- - The main circuit board containing the central components of a computer.
- - Input device for controlling movement in a computer game.
- - Process of generating an image from a model.
- - Writing code to instruct a computer.
- - Temporary storage area, often used to improve data transfer.
Down
- - Programs and data that operate a computer.
- - Device that forwards data packets between computer networks.
- - Device for producing a paper copy of data from a computer.
- - Common storage device for digital data.
- - Pointing device commonly used with computers.
- - Autonomous or semi-autonomous mechanical device.
- - Input device with keys for entering data into a computer.
- - Device for converting sound into an electrical signal.
- - Read-Only Memory; a type of non-volatile memory.
- - Global network connecting millions of private, public, academic, business, and government networks.
- - Computer or system that manages network resources.
- - Video Graphics Array; a standard for displaying graphics.
20 Clues: - Writing code to instruct a computer. • - Common storage device for digital data. • - Physical components of a computer system. • - Programs and data that operate a computer. • - Process of generating an image from a model. • - Pointing device commonly used with computers. • - Autonomous or semi-autonomous mechanical device. • ...
Cybersecurity Crossword 2025-05-14
Across
- A strong and unique combination to protect online accounts.
- Software designed to detect and destroy computer viruses.
- Bullying that occurs over digital devices like phones and computers.
- authentication A security process using two different verification factors.
- A network security system controlling traffic based on rules.
- Data that can be used to identify an individual.
- Encoding info so only authorized parties can understand it.
- Potential dangers or malicious activities found on the internet.
- Protecting computer systems/networks from theft, damage, or disruption.
Down
- Manipulating people to divulge info or perform actions.
- Synthetic media replacing a person's likeness using AI.
- Individuals who exploit weaknesses in computer systems or networks.
- Connected to the internet.
- Extends a private network across public ones for secure data transfer.
- Footprint The trail of data you create while using the Internet.
- Attempts to gain unauthorized access to damage or disrupt systems.
- Software intended to damage or disable computers and systems.
- Trustworthy and accurate sources of information.
- Potential dangers or hazards.
- Online fraud where attackers impersonate to trick you into revealing info.
20 Clues: Connected to the internet. • Potential dangers or hazards. • Trustworthy and accurate sources of information. • Data that can be used to identify an individual. • Manipulating people to divulge info or perform actions. • Synthetic media replacing a person's likeness using AI. • Software designed to detect and destroy computer viruses. • ...
chapter two key terms 2025-02-27
Across
- Distributing available data capacity among users.
- The predefined path for network traffic when no other route is known.
- A signal used in wireless communication before transmitting data.
- Allows data transmission in only one direction at a time.
- The device that connects a local network to other networks.
- A device that connects multiple devices in a network.
- Boosts and extends network signals.
- Provides wireless connectivity to a network.
- A data packet sent to a single destination.
Down
- A hardware component that connects a device to a network.
- Allows data transmission in both directions simultaneously.
- The maximum data transfer rate of a network.
- A data packet sent to all devices in a network.
- A network segment where broadcast traffic is received by all devices.
- A network mode where a device captures all traffic, not just its own.
- A basic device that connects multiple network devices.
- The name of a Wi-Fi network.
- A signal indicating permission to send data.
- Directs data between different networks.
- Connecting one network device to another.
20 Clues: The name of a Wi-Fi network. • Boosts and extends network signals. • Directs data between different networks. • Connecting one network device to another. • A data packet sent to a single destination. • The maximum data transfer rate of a network. • A signal indicating permission to send data. • Provides wireless connectivity to a network. • ...
PC. 2025-09-03
Across
- Malicious software designed to harm or exploit any device.
- A wireless networking technology.
- The physical components of a computer.
- A person who uses computers to gain unauthorized access to data.
- A device that forwards data packets between computer networks.
- A device that displays visual output from a computer.
- The practice of protecting systems, networks, and programs from digital attacks.
- A small piece of data sent from a website and stored on the user's computer.
- A machine that performs tasks according to a set of instructions.
- A global network connecting millions of computers.
Down
- A security system that controls incoming and outgoing network traffic.
- A storage medium that uses flash memory.
- A portable computer.
- A collection of data stored in a structured way.
- Temporary memory that a computer uses to store data for quick access.
- An input device used to type text and commands.
- The process of converting data into a code to prevent unauthorized access.
- The brain of the computer that processes instructions.
- A set of instructions that tells the hardware what to do.
- The process of starting a computer.
20 Clues: A portable computer. • A wireless networking technology. • The process of starting a computer. • The physical components of a computer. • A storage medium that uses flash memory. • An input device used to type text and commands. • A collection of data stored in a structured way. • A global network connecting millions of computers. • ...
COSC 100 2015-09-28
Across
- Composed of HTML tags and multimedia files
- No more than ___ copies may be made of a project
- The main technology for local area networks
- A group of information on a computer that can be software programs or data
- Communication where the sending and receiving occur at different times
- Hyper Text Mark-up Language
- Used to view web pages that may contain text, images, videos and navigate between them via hyperlinks
- A person who falsifies data to pretend to be someone else
- is when computers are geographically close
- if I want CAT and DOG to show up in my search, I use ___
- Always credit the ______
Down
- A type of program used for editing plain text files
- Wide Area Networks
- Types of _____: File, Memory, Browser, and Edge
- Pictures, movies, or graphics
- Communication where both the sender and the receiver are active at the same time
- Should be used with caution on web-pages
- 79% of users ___ the page
18 Clues: Wide Area Networks • Always credit the ______ • 79% of users ___ the page • Hyper Text Mark-up Language • Pictures, movies, or graphics • Should be used with caution on web-pages • Composed of HTML tags and multimedia files • is when computers are geographically close • The main technology for local area networks • Types of _____: File, Memory, Browser, and Edge • ...
DQ Social Media Crossword 2021-08-06
Across
- A self-portrait taken using the reverse camera screen on a smartphone
- A message sent on Twitter
- A photo-sharing application gained more than 300 million users
- Clusters of users friends, colleagues, family, or connections on Google+
- Platform founded by Mark Zuckerberg
- Anything shared across social networks that get passed along rapidly e.g youtube
- A free URL shortening service
Down
- A small, attractive application on a website such as a hit counter
- Simple web pages that can be edited by other users
- #(known as)
- A system that manages content
- They are also known as message boards
- A pictorial representation of a facial expression that is used in writing
- A network for online photo sharing
- An action that can be made by a Facebook user
- It is an image or username that represents a person online most often within forums and social networks
- A one to one communication service on the internet
- A site updated frequently by an individual or group to record opinions or information
18 Clues: #(known as) • A message sent on Twitter • A system that manages content • A free URL shortening service • A network for online photo sharing • Platform founded by Mark Zuckerberg • They are also known as message boards • An action that can be made by a Facebook user • Simple web pages that can be edited by other users • A one to one communication service on the internet • ...
computer knowledge 2021-03-18
Across
- wireless fidelity is long for
- access point is long for
- what allows your phone to get online when you`re away from wifi
- the biggest world wide communication
- what is the main app people use to find information
Down
- world wibe web is long for
- internet service provider is long for
- a system of interconnecting people is the definition of
- LAN,PAN,MAN,WAN are all networks of computers
- the thing that you have to turn on to connect to a speaker
10 Clues: access point is long for • world wibe web is long for • wireless fidelity is long for • the biggest world wide communication • internet service provider is long for • LAN,PAN,MAN,WAN are all networks of computers • what is the main app people use to find information • a system of interconnecting people is the definition of • ...
Theme: Technology 2024-07-24
Across
- An organized collection of data
- A machine capable of carrying out complex actions automatically
- A global network connecting millions of private public academic and government networks
- A process or set of rules to be followed in calculations or other problem-solving operations
- The programs and other operating information used by a computer
Down
- The practice of protecting systems networks and programs from digital attacks
- A mobile phone with advanced features
- A portable personal computer
- An unmanned aerial vehicle
- Abbreviation for Artificial Intelligence
10 Clues: An unmanned aerial vehicle • A portable personal computer • An organized collection of data • A mobile phone with advanced features • Abbreviation for Artificial Intelligence • A machine capable of carrying out complex actions automatically • The programs and other operating information used by a computer • ...
Unit 1 Crossword 9 2025-05-14
Across
- Document specifying standards and protocols for the Internet
- Device that connects multiple computers in a network, broadcasts to all
- Protocol suite with fewer layers than OSI
- Device that connects and filters traffic between two network segments
- Wide Area Network covering large geographic areas
Down
- Conceptual framework with seven network layers
- Device that routes data between different networks
- Device that connects networks using different protocols
- Device that connects devices and forwards data only to intended recipient
- Device or software that controls network security and access
10 Clues: Protocol suite with fewer layers than OSI • Conceptual framework with seven network layers • Wide Area Network covering large geographic areas • Device that routes data between different networks • Device that connects networks using different protocols • Document specifying standards and protocols for the Internet • ...
Computer Network 2025-08-26
Across
- – Network security system that filters traffic (8 letters)
- – System that maps domain names to IP addresses (3 letters)
- – Device that forwards frames based on MAC addresses (6 letters)
- – Connectionless transport protocol (3 letters)
- – Reliable, connection-oriented transport protocol (3 letters)
Down
- – Hardware address used at the data-link layer (3 letters)
- – Smallest unit of data transmitted over networks (6 letters)
- – Device that forwards packets between networks (6 letters)
- – Protocol that automatically assigns IP addresses (4 letters)
- – Identifier for a Wi-Fi network (4 letters)
- – Simple device that repeats signals to all ports (3 letters)
- – 128-bit addressing scheme, successor of IPv4 (4 letters)
12 Clues: – Identifier for a Wi-Fi network (4 letters) • – Connectionless transport protocol (3 letters) • – Hardware address used at the data-link layer (3 letters) • – Network security system that filters traffic (8 letters) • – 128-bit addressing scheme, successor of IPv4 (4 letters) • – Device that forwards packets between networks (6 letters) • ...
Network Requirements Crossword 2023-09-05
Across
- Network Attach Storage
- a set of rules that need to be followed
- internet protocol
- network interface card
- a hardware device that acts as a "fence" between two networks
- a hardware device used at the physical layer to connect multiple devices in the network
- a device that connects two or more packet-switched networks
- an electronic device that relays a transmitted signal
- a device that connects two LANs
Down
- a computer network security system that restricts internet traffic
- a piece of networking hardware that links multiple devices together
- Network Operating System
- Local Area Network
- the maximum capacity of a wired or wireless communications link to deliver data via a network connection
- a computer program or device that provides a service to another computer program and its user
- connects LAN to WAN
- a high-speed internet connection
- any computer or other device connected to a network that sends, receives, or redistributes data
- computers that access and use the network and shared network resources
- a cord, connector or plug
20 Clues: internet protocol • Local Area Network • connects LAN to WAN • Network Attach Storage • network interface card • Network Operating System • a cord, connector or plug • a device that connects two LANs • a high-speed internet connection • a set of rules that need to be followed • an electronic device that relays a transmitted signal • ...
crossword 2024-10-07
Across
- - A computer that requests resources from a server.
- - A private network that connects devices in a small area.
- - A computer that provides services to other computers on the network.
- - A type of network that spans a large geographic area.
- - A set of rules governing the exchange of data between devices.
- - The total capacity of a data transmission system.
- - A device that connects devices within a network.
- - A collection of computers and devices connected to share resources.
- - A device that connects two different networks.
- - A smaller network within a larger network.
Down
- - A common method for connecting devices in a wired network.
- - A device that monitors and controls incoming and outgoing network traffic.
- - The amount of data transmitted in a given time.
- - A secure connection over the internet.
- - A device that forwards data packets between computer networks.
- - The arrangement of different elements in a network.
- - A machine that provides resources to other machines.
- - A way to connect devices without wires.
- - Data formatted for transmission over a network.
- Address - The address assigned to a device on a network.
20 Clues: - A secure connection over the internet. • - A way to connect devices without wires. • - A smaller network within a larger network. • - A device that connects two different networks. • - The amount of data transmitted in a given time. • - Data formatted for transmission over a network. • - A device that connects devices within a network. • ...
