networks Crossword Puzzles

Tech Terma 2023-04-26

Tech Terma crossword puzzle
Across
  1. Files made by websites you go to
  2. Connects hardware to processor
  3. Personal Identifiable Information
  4. 1 million bytes of data
  5. hardware or software that has been recently released.
  6. Read only memory
  7. A way of scrambling information only authorized parties can understand it
  8. 8 bits put together
  9. Ctrl V
  10. Devices like a printer
  11. Taking information from somewhere else onto your computer
  12. Network security device that monitors traffic to and from your network
  13. Connecting multiple systems together on a local network
  14. Software made to disrupt a computer network
Down
  1. Chrome or Safari
  2. Systems such as Chrome OS, Windows
  3. Computer that provides service to another computer
  4. A frequently updated website used for personal commentary or buisnesses
  5. Worldwide System of Networks
  6. Computers short term memory
  7. Ctrl C
  8. Adress
  9. Devices like a keyboard or mouse
  10. A zero or one
  11. Central processing unit
  12. Domain name system
  13. Portable Document Format
  14. Uniform Resource Locator
  15. Open Source Software
  16. Forwards data between computer networks
  17. Hyper Text Markup Language
  18. World Wide Web

32 Clues: Ctrl CAdressCtrl VA zero or oneWorld Wide WebChrome or SafariRead only memoryDomain name system8 bits put togetherOpen Source SoftwareDevices like a printer1 million bytes of dataCentral processing unitPortable Document FormatUniform Resource LocatorHyper Text Markup LanguageComputers short term memoryWorldwide System of Networks...

saklksdg 2025-03-26

saklksdg crossword puzzle
Across
  1. A globally unique identifier for devices on a network
  2. A structured collection of data
  3. The main circuit board of a computer
  4. A unique address used to identify a website
  5. A version control system used for software development
  6. The language used to structure web pages
  7. A network of computers that share resources and data
  8. The process of finding and fixing errors in code
  9. A person who attempts to gain unauthorized access to a system
  10. A virtual storage solution accessible via the internet
  11. A collection of web pages under a single name
  12. A computer program designed to interact with users in a conversation
Down
  1. A program used to detect and remove malware
  2. The process of converting plain text into a secure format
  3. A type of malicious software that encrypts files for ransom
  4. A technology that enables wireless communication over short distances
  5. An attack that prevents access to a system by overwhelming it
  6. A worldwide system of interconnected networks
  7. A protective barrier for networks against cyber threats
  8. The basic software that manages hardware and software resources

20 Clues: A structured collection of dataThe main circuit board of a computerThe language used to structure web pagesA program used to detect and remove malwareA unique address used to identify a websiteA worldwide system of interconnected networksA collection of web pages under a single nameThe process of finding and fixing errors in code...

Cybersecurity Crossword 2025-05-14

Cybersecurity Crossword crossword puzzle
Across
  1. Software designed to detect and destroy computer viruses.
  2. Potential dangers or malicious activities found on the internet.
  3. Synthetic media replacing a person's likeness using AI.
  4. A network security system controlling traffic based on rules.
  5. A security process using two different verification factors.
  6. Manipulating people to divulge info or perform actions.
  7. Extends a private network across public ones for secure data transfer.
  8. Attempts to gain unauthorized access to damage or disrupt systems.
  9. Trustworthy and accurate sources of information.
Down
  1. Protecting computer systems/networks from theft, damage, or disruption.
  2. Connected to the internet.
  3. Bullying that occurs over digital devices like phones and computers.
  4. Potential dangers or hazards.
  5. The trail of data you create while using the Internet.
  6. Individuals who exploit weaknesses in computer systems or networks.
  7. Software intended to damage or disable computers and systems.
  8. Encoding info so only authorized parties can understand it.
  9. Data that can be used to identify an individual.
  10. A strong and unique combination to protect online accounts.
  11. Online fraud where attackers impersonate to trick you into revealing info.

20 Clues: Connected to the internet.Potential dangers or hazards.Data that can be used to identify an individual.Trustworthy and accurate sources of information.The trail of data you create while using the Internet.Synthetic media replacing a person's likeness using AI.Manipulating people to divulge info or perform actions....

Extra task 2023-04-12

Extra task crossword puzzle
Across
  1. Develops algorithms and computer programs that can perform tasks requiring human intelligence
  2. Coordinates the deployment and operation of software applications
  3. Develops applications that incorporate computer-generated perceptual information
  4. Designs and manages cloud-based systems and services
  5. Analyzes and optimizes digital marketing campaigns
  6. Analyzes and interprets complex digital data sets to extract insights
  7. Designs and builds new types of computers based on quantum mechanics
  8. Develops software for both client and server-side applications
  9. Designs and optimizes the experience users have when interacting with digital products
  10. Designs and manages networks of physical devices connected to the internet
Down
  1. Creates secure digital ledgers for recording transactions
  2. Designs the overall structure of information systems
  3. Creates applications for mobile devices
  4. Designs, builds, and operates robots for a variety of applications
  5. Protects computer systems and networks from theft or damage

15 Clues: Creates applications for mobile devicesAnalyzes and optimizes digital marketing campaignsDesigns the overall structure of information systemsDesigns and manages cloud-based systems and servicesCreates secure digital ledgers for recording transactionsProtects computer systems and networks from theft or damage...

CNN 2023-11-25

CNN crossword puzzle
Across
  1. Model with high bias and low variance
  2. Activation function used in the output layer for classification
  3. Categorical Loss function in CNN
  4. Training algorithm for updating weights in a neural network
  5. Google's pretrained ML model
  6. Popular activation function introducing non-linearity
  7. Technique of creating new training examples by applying transformations
  8. Another name for Kernel to reduce dimensions in CNNs
  9. A type of recurrent neural network with memory cell
  10. A type of Neural Network handling sequential data
  11. Optimization algorithm using one example at a time
  12. Issue where gradients become very small during training
  13. Adapts a pre-trained model for a new task
  14. Optimization algorithm that accumulates past gradients to accelerate learning
  15. A set of data samples used in one iteration of training
  16. Process of selecting and representing relevant information from input data
  17. Controls the size of steps in gradient descent
  18. Strategy for setting initial values in a neural network
  19. Optimization algorithm for finding the minimum
  20. Technique to prevent overfitting nodes in neural networks
  21. Adaptive Linear Neuron, a single-layer neural network
  22. Determines the output of a node in a neural network
Down
  1. Configuration setting parameters to the model
  2. Non-linear transformation applied to a neuron's output
  3. Key operation in Convolutional Neural Networks (CNNs)
  4. Activation function similar to sigmoid, ranges from -1 to 1
  5. a type of recurrent neural network cell with memory like operation
  6. No. of trainable parameters in GRU
  7. Simplest form of a neural network, single-layer binary classifier
  8. Also known as recall or TPR
  9. Table used to assess the performance of a classification model
  10. A pretrained Model with 13 CNN and 3 Dense Layers
  11. Model performs well on training data but poorly on new data
  12. No. of trainable parameters in LSTM
  13. a CNN Layer where dimensions of the input are reduced
  14. Neural network designed for sequential data
  15. Error Square algorithm for updating weights in neural networks
  16. Layer functioning as FCNN in VGG16
  17. Basic building block of a neural network
  18. Additional parameter representing an offset in neural networks
  19. One complete pass through the entire training dataset
  20. Technique to prevent exploding gradients in RNN
  21. Architecture where information flows in one direction
  22. Adding extra pixels or values around the edges of an image in CNN
  23. Evaluation of a model on a separate dataset to tune hyperparameters
  24. An unsupervised Learning rule
  25. Standard version of a neural network or algorithm

47 Clues: Also known as recall or TPRGoogle's pretrained ML modelAn unsupervised Learning ruleCategorical Loss function in CNNNo. of trainable parameters in GRULayer functioning as FCNN in VGG16No. of trainable parameters in LSTMModel with high bias and low varianceBasic building block of a neural networkAdapts a pre-trained model for a new task...

crossword 2025-02-16

crossword crossword puzzle
Across
  1. - A unit of digital storage equal to 1,024 gigabytes.
  2. - A reference in a document that connects to another location or file.
  3. - Increasing a computer component’s speed beyond its specifications.
  4. - A cryptographic technique that uses quantum mechanics.
  5. - An organized collection of structured information or data.
  6. - A global network connecting millions of devices.
  7. - A cyber attack that tricks users into revealing personal information.
  8. - The maximum rate of data transfer across a network.
  9. - A security system that monitors and controls network traffic.
  10. - A temporary storage area for frequently accessed data.
  11. - Software with publicly available source code.
  12. - A type of AI that mimics human intelligence.
  13. - Temporary memory used for quick access.
  14. - The process of replacing sensitive data with unique identifiers.
  15. - A digital storage space in the cloud.
  16. - Data that describes other data.
  17. - A device that connects networks.
  18. - A wireless networking technology.
  19. - A step-by-step procedure for solving a problem.
  20. - The delivery of computing services over the internet.
  21. - Unwanted or unsolicited messages, typically emails.
  22. - A self-replicating computer program.
  23. - The smallest unit of data in computing.
  24. - A secret code used for security.
  25. - The smallest unit of a digital image.
Down
  1. - A decentralized ledger technology used in cryptocurrencies.
  2. - A program that translates source code into machine code.
  3. - Permanent software programmed into a hardware device.
  4. - An error in programming.
  5. - The manipulation of matter on an atomic scale.
  6. - A software testing method to verify previous functionality.
  7. - A set of rules for data transmission.
  8. - Software that harms a system.
  9. - The simulation of human intelligence in machines.
  10. - The delay before data is transferred over a network.
  11. - A technology that overlays digital content on the real world.
  12. - A subset of machine learning using neural networks.
  13. - The process of creating a virtual version of computing resources, such as servers or storage.
  14. - The practice of protecting systems and networks from digital attacks.
  15. - The part of a system that users interact with.
  16. - The process of converting information into a secure format.
  17. - A type of malware that spreads across networks automatically.
  18. - A program that performs a specific task.
  19. - A memory management technique using disk storage.
  20. - The process of converting analog data to digital.
  21. - A common wired networking technology.
  22. - A tool used to test and fix errors in software.
  23. - The physical parts of a computer.
  24. - A collection of tools for software development.
  25. - The brain of a computer.

50 Clues: - An error in programming.- The brain of a computer.- Software that harms a system.- Data that describes other data.- A device that connects networks.- A secret code used for security.- A wireless networking technology.- The physical parts of a computer.- A self-replicating computer program.- A set of rules for data transmission....

Foundations of NN & DL 2025-01-10

Foundations of NN & DL crossword puzzle
Across
  1. ......... Learning is the subset of machine learning that uses neural networks with multiple layers
  2. A task of extracting text from images
  3. A neural network designed for image data
  4. A popular deep learning framework by Google
  5. A pretrained NLP model by Google
  6. A type of neural network for sequential data
  7. A deep learning model for generating images
Down
  1. A common activation function used in neural networks
  2. A mechanism in Transformers for focusing on relevant parts of input
  3. The simplest type of artificial neural network
  4. Learning A technique where a pre-trained model is reused for a new task
  5. A field of study focused on creating intelligent machines

12 Clues: A pretrained NLP model by GoogleA task of extracting text from imagesA neural network designed for image dataA popular deep learning framework by GoogleA deep learning model for generating imagesA type of neural network for sequential dataThe simplest type of artificial neural networkA common activation function used in neural networks...

Communication Tools 2026-02-26

Communication Tools crossword puzzle
Across
  1. Messenger, Free mobile app messaging
  2. Conferencing, A way to bring two or more people in a virtual setting.
  3. A communication software for virtual video sharing and audio conferencing.
  4. Messaging, Computer based communication between two users.
  5. Sites, The no code free website builder.
  6. Meet, Real time meetings using Google.
Down
  1. Chat, Direct messaging group owned by Google.
  2. A way to communicate with people on your phone and see their face.
  3. Authoring, The process of creating web documents.
  4. Outlook, Widely used for internet communication
  5. A way to communicate by delivering messages across computer networks.
  6. Express, A cloud based program where you can create pdf files.
  7. A hosted website platform.
  8. Networking, Ways to use online networks to communicating with people.

14 Clues: A hosted website platform.Messenger, Free mobile app messagingMeet, Real time meetings using Google.Sites, The no code free website builder.Chat, Direct messaging group owned by Google.Outlook, Widely used for internet communicationAuthoring, The process of creating web documents.Messaging, Computer based communication between two users....

Types of Network 2024-10-23

Types of Network crossword puzzle
Across
  1. Is short of metropolitan area network.
  2. Is short for personal area networks
  3. This is network in a large geographical area
  4. A group of two or more computers linked together to communicate and share resources.
  5. One type of network
  6. Networks are connected by ____________ or by wireless link.
Down
  1. This is network within a small area
  2. One advantage of local area network is that it is fast
  3. Because of network hardware such as _________ can be shared.
  4. LAN connects the computers so that we can ____________

10 Clues: One type of networkThis is network within a small areaIs short for personal area networksIs short of metropolitan area network.This is network in a large geographical areaOne advantage of local area network is that it is fastLAN connects the computers so that we can ____________Networks are connected by ____________ or by wireless link....

CompTIA Network+ (009) Ch. 4 2025-04-04

CompTIA Network+ (009) Ch. 4 crossword puzzle
Across
  1. Dynamically assigns IP addresses to devices.
  2. Routable address used on the internet.
  3. Provides an IP address when DHCP fails.
  4. Used to distinguish the network and host portions of an IP address.
  5. Routes traffic between networks, usually to the internet.
  6. 128-bit address system for modern internet communication.
Down
  1. Special IP address used for local testing (127.0.0.1).
  2. Logical identifier for a device on a network.
  3. Non-routable address used within internal networks.
  4. Method for IP address allocation and routing using prefixes.

10 Clues: Routable address used on the internet.Provides an IP address when DHCP fails.Dynamically assigns IP addresses to devices.Logical identifier for a device on a network.Non-routable address used within internal networks.Special IP address used for local testing (127.0.0.1).Routes traffic between networks, usually to the internet....

Computer Network & Computer Topologies 2025-07-26

Computer Network & Computer Topologies crossword puzzle
Across
  1. A network topology where each device connects to two others, forming a loop.
  2. A device that connects different networks together, often used to access the internet.
  3. A topology with each node connected to every other node.
  4. A common wired technology used in local area networks (LANs).
Down
  1. A global network that connects millions of private, public, academic, and government networks.
  2. A network device that connects devices and uses MAC addresses to forward data.
  3. A device that modulates and demodulates signals for internet access over telephone lines.
  4. A basic network device that broadcasts data to all connected devices.

8 Clues: A topology with each node connected to every other node.A common wired technology used in local area networks (LANs).A basic network device that broadcasts data to all connected devices.A network topology where each device connects to two others, forming a loop.A network device that connects devices and uses MAC addresses to forward data....

computing 2016-02-03

computing crossword puzzle
Across
  1. short for "favourites icon"
  2. it carries signals to local or worldwide networks
  3. it provides wireless connection to networks.
  4. short for "malicious hardware"
Down
  1. allows cameras, music players, phones etc to connect to computers
  2. it allows users to access other computers, mice etc with their own
  3. views who bookmarks what websites and puts them on the homepage
  4. it shares files with other users on other pc's and is good on toast
  5. lets you get e-mails on a server without having to download it
  6. megabytes per second

10 Clues: megabytes per secondshort for "favourites icon"short for "malicious hardware"it provides wireless connection to networks.it carries signals to local or worldwide networkslets you get e-mails on a server without having to download itviews who bookmarks what websites and puts them on the homepage...

business technology 2026-02-20

business technology crossword puzzle
Across
  1. telecommunication in the form of a videoconference.
  2. tools, machinery, and other durable equipment
  3. the live exchange of information among people in different locations using telecommunications technology, such as audio, video, or computer networks.
Down
  1. the use of internet-based technologies, networks, and digital platforms to conduct, manage, and optimize core business processes
  2. the programs and other operating information used by a computer.
  3. is a digital service allowing customers to securely manage finances, transfer funds, pay bills, and view transactions in real-time via a bank's website or mobile app.
  4. networks systems of interconnected electronic components, devices, or circuits that enable data communication, information sharing, and, in some contexts, the transmission of electricity.
  5. the retention of digital information using technology that records data on physical or virtual media for future access.
  6. technology the strategic application of information technology, software, hardware, and digital tools to automate, optimize, and manage core business operations
  7. commercial transactions conducted electronically on the internet

10 Clues: tools, machinery, and other durable equipmenttelecommunication in the form of a videoconference.the programs and other operating information used by a computer.commercial transactions conducted electronically on the internet...

Ed. Tech. Network Operations Crossword 2012-03-26

Ed. Tech. Network Operations Crossword crossword puzzle
Across
  1. a design where all nodes are ran through the switch before going to it's designated location
  2. provides services to connected network computers
  3. controls all functions of the network
  4. rate of data transfer
  5. joins wired and wirelss networks together
  6. a network of computers that consists of several smaller networks
  7. twisted pair of cables that carry signals
Down
  1. requests services; student computer in lab
  2. a location that offers wireless internet access
  3. provides your technology devices internet connections without using a ethernet cable
  4. connects multiple ethernet devices together to create a single network
  5. the internet is an example of a ______ network
  6. a device placed to protect the network from unauthorized access
  7. a connection plud-in chord that provides internet and/or phone access
  8. a network of computers that are connected together in a school

15 Clues: rate of data transfercontrols all functions of the networkjoins wired and wirelss networks togethertwisted pair of cables that carry signalsrequests services; student computer in labthe internet is an example of a ______ networka location that offers wireless internet accessprovides services to connected network computers...

Engineering Careers 2026-01-15

Engineering Careers crossword puzzle
Across
  1. Vaccines
  2. HVAC Systems
  3. Air Conditioning
  4. Mobile Networks
  5. Man-made Bridges and roads
  6. Irrigation Systems
  7. Automation
  8. Processors (Computers)
  9. Power Generation
  10. Process Optimization
  11. AI Systems
  12. Cars and robots
Down
  1. Light bulbs
  2. Industrial ROBOTS
  3. Planes and rockets
  4. DIESEL engines
  5. NUCLEAR reactors
  6. Oil Drilling
  7. OFFICE automation
  8. X-ray Machines
  9. LEDs
  10. APPS or GPS
  11. Testing systems
  12. Stethoscopes
  13. Foundation Design

25 Clues: LEDsVaccinesAutomationAI SystemsLight bulbsAPPS or GPSHVAC SystemsOil DrillingStethoscopesDIESEL enginesX-ray MachinesMobile NetworksTesting systemsCars and robotsAir ConditioningNUCLEAR reactorsPower GenerationIndustrial ROBOTSOFFICE automationFoundation DesignPlanes and rocketsIrrigation SystemsProcess OptimizationProcessors (Computers)...

Anna Hope: Wake 2026-02-05

Anna Hope: Wake crossword puzzle
Across
  1. Emotional and social
  2. Amid hardship
  3. With past and self
  4. Shaped by experience
  5. Through connection
  6. Backdrop shaping lives
  7. Honoring the fallen
  8. Complex and critiqued
  9. Physical and emotional
  10. Women’s roles highlighted
Down
  1. Grief and mourning
  2. Moral and physical
  3. Bearing witness
  4. Among women
  5. Fragile and persistent
  6. Support networks
  7. Emotional and physical wounds
  8. Cost of service
  9. Multiple perspectives
  10. Female protagonist caring for wounded

20 Clues: Among womenAmid hardshipBearing witnessCost of serviceSupport networksGrief and mourningMoral and physicalWith past and selfThrough connectionHonoring the fallenEmotional and socialShaped by experienceMultiple perspectivesComplex and critiquedFragile and persistentBackdrop shaping livesPhysical and emotionalWomen’s roles highlighted...

computer knowledge 2021-03-18

computer knowledge crossword puzzle
Across
  1. what is the main app people use to find information
  2. world wibe web is long for
  3. a system of interconnecting people is the definition of
  4. internet service provider is long for
Down
  1. the thing that you have to turn on to connect to a speaker
  2. LAN,PAN,MAN,WAN are all networks of computers
  3. the biggest world wide communication
  4. allows your phone to get online when you`re away from wifi
  5. access point is long for
  6. wireless fidelity is long for

10 Clues: access point is long forworld wibe web is long forwireless fidelity is long forthe biggest world wide communicationinternet service provider is long forLAN,PAN,MAN,WAN are all networks of computerswhat is the main app people use to find informationa system of interconnecting people is the definition of...

COSC Part 1 Crossword 2016-02-22

COSC Part 1 Crossword crossword puzzle
Across
  1. networks that are geographically close
  2. composed of HTML tags and multimedia files
  3. hyper-text markup language
  4. universal resource locator
  5. used to view webpages that may contain text, images, videos, and other multimedia
Down
  1. a related group of networked computers
  2. a group of information on a compute that can be software programs or data
  3. unique address given to each computer connected to the internet
  4. convert the bits a computer outputs into a form that is compatible with the carrier
  5. networks that are not geographically close

10 Clues: hyper-text markup languageuniversal resource locatora related group of networked computersnetworks that are geographically closecomposed of HTML tags and multimedia filesnetworks that are not geographically closeunique address given to each computer connected to the interneta group of information on a compute that can be software programs or data...

Technology for Teaching and Learning 1 2023-11-20

Technology for Teaching and Learning 1 crossword puzzle
Across
  1. ability to access internet for resources
  2. type of learning which has no face-to-face interactions
  3. ability to find, use, evaluate, share content using information technology and internet
  4. use of technology in education both non-digital and digital
  5. program control instructions accompanying documentation
Down
  1. use of digital and communication tools and networks to communicate knowledge-based information
  2. learning same time, not same place with the help of online technology
  3. massive networks
  4. combination of processes& products to apply knowledge
  5. simultaneous use of media

10 Clues: massive networkssimultaneous use of mediaability to access internet for resourcescombination of processes& products to apply knowledgetype of learning which has no face-to-face interactionsprogram control instructions accompanying documentationuse of technology in education both non-digital and digital...

Internet Hardware 2023-01-10

Internet Hardware crossword puzzle
Across
  1. Method to send information through frequencies.
  2. Network connecting individual networks.
  3. Group of 2 or more computers link together.
  4. Measures bandwidth, number of bits a system can send.
  5. Provides individuals and organizations access to the internet.
  6. Method to send information through light.
Down
  1. Capacity of data transfer in a system.
  2. Physical or virtual appliance that passes information between two or more packet-switched computer networks.
  3. Method to send information through ethernet cables.
  4. Time it takes for a bit to get frim the sender to the receiver.

10 Clues: Capacity of data transfer in a system.Network connecting individual networks.Method to send information through light.Group of 2 or more computers link together.Method to send information through frequencies.Method to send information through ethernet cables.Measures bandwidth, number of bits a system can send....

Unit III - E.Commerce 2025-04-15

Unit III - E.Commerce crossword puzzle
Across
  1. The legal term for guidelines and regulations in online business.
  2. An architecture type that connects clients and servers.
  3. Commerce buying and selling over digital networks
  4. One of the main risks in E-Commerce (hint: security).
  5. Online payment gateway widely used by individuals and businesses.
Down
  1. Used for secure online transactions (abbr., 3 letters).
  2. Diagram a visual representation of business processes.
  3. Computers, networks, and software that enable E-Commerce.
  4. An electronic system of transferring money instantly (abbr.).
  5. A type of money that exists only in digital form.

10 Clues: Commerce buying and selling over digital networksA type of money that exists only in digital form.One of the main risks in E-Commerce (hint: security).Diagram a visual representation of business processes.An architecture type that connects clients and servers.Computers, networks, and software that enable E-Commerce....

Memory storage and Networks 2024-05-02

Memory storage and Networks crossword puzzle
Across
  1. It is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.
  2. Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output (I/O) operations.
  3. A networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
  4. It is a specific kind of network topology in which all of the various devices in the network are connected to a single cable or line.
  5. a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.
  6. It's a type of non-volatile memory that retains its contents even when the power is turned off. It is programmed with data during manufacturing and cannot be easily modified afterward.
  7. It is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
  8. Secondary storage that has no mechanical components and can access data electronically.
  9. It is a network contained within a small geographic area, usually within the same building.
  10. It is a type of network configuration where devices are connected in a circular manner, forming a closed loop.
  11. It is a numerical label such as 192.0.2.1 that is assigned to a device connected to a computer network that uses the Internet Protocol for communication.
Down
  1. It's a type of volatile computer memory. It loses its contents when the power is off. it allows the CPU to access data quickly without having to wait for data to be retrieved from slower storage devices.
  2. It is the technology that connects your offices, data centers, cloud applications, and cloud storage together. It spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.
  3. It is a smaller, faster memory, located closer to a processor core, which stores copies of the data from frequently used main memory locations.
  4. It is a network topology in which each network component is physically connected to a central node such as a router, hub or switch.
  5. Is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
  6. An optical disc capable of storing up to 4.7 GB of data, more than six times what a CD can hold.

17 Clues: Secondary storage that has no mechanical components and can access data electronically.It is a network contained within a small geographic area, usually within the same building.An optical disc capable of storing up to 4.7 GB of data, more than six times what a CD can hold....

cybersecurity 2024-06-27

cybersecurity crossword puzzle
Across
  1. The information property of being accessible only to a restricted group of persons
  2. Cryptographic algorithm used to encrypt and decrypt data
  3. Technique used to secure sensitive data by encoding it in such a way that only authorized parties can access the information
  4. The potential for harm or loss resulting from threats exploiting vulnerabilities in an organization's information systems, networks, or data assets
  5. Any potential danger or risk that can exploit vulnerabilities in an organization's systems, networks, or data
  6. The way of covering communication based on keeping the very fact of communication secret
  7. The act of granting rights matching with the identifier
  8. The process of discovering the true identity of a person or item from the entire collection of similar persons or items
  9. The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved
  10. Type of threat sources when the actor is a human-being
Down
  1. The best subject :)
  2. The information property of being accessible and usable by a legal user with possible conditions set by information owner
  3. Type of access control where determined rights can be represented as an authorization matrix
  4. Type of threat sources occured because of the devices misfunction
  5. Data that is stored, processed, transmitted, or accessed within an organization's systems, networks, or applications
  6. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  7. The information property of having no illegal or unauthorized modifications

17 Clues: The best subject :)Type of threat sources when the actor is a human-beingThe act of granting rights matching with the identifierCryptographic algorithm used to encrypt and decrypt dataType of threat sources occured because of the devices misfunctionThe information property of having no illegal or unauthorized modifications...

LA B(1) 2024-10-07

LA B(1) crossword puzzle
Across
  1. (12,7,8) Set of rules that allows all internet users to communicate whatever type of equipment they are using
  2. (7,6,5) Interchange between networks within the internet. Allows ISPs to interconnect with each other
  3. (9) Way of measuring how much data can be carried over a network. Measured in bits per second
  4. (6)Computer or program that runs purely to serve the needs of other computers. Runs special server software to serve the clients
  5. (5,4,3)The collection of information on computers connected to the internet
  6. (8,8) Specifies how data should be structured and sent over the internet
  7. (8)Set of rules to allow the computer systems to communicate
  8. (8)Connection usually by radio waves
  9. (10,8)Connecting data route between large networks on the internet and smaller network in local regions
  10. (12,4)Measure of the number of pieces of information that have been transferred during a specific time period
Down
  1. (9)Wired connection to a broadband supplier, Normally the connection is via a network card in the computer
  2. (8,7,8) Company that provides you access to the internet
  3. (4,8,8)Allows files to be transferred between two computers on a TCP-based network.
  4. (8)A global network of interconnected computers
  5. (6)Piece of hardware that connects two or more networks, Data from the ISP is sent into the network and the router then directs the data packets to the correct destinations
  6. (4-2) Wired connection via a conventional telephone line
  7. (5,2,8) An access point to the internet,Normally a location that contains the hardware to allow internet users access to the internet

17 Clues: (8)Connection usually by radio waves(8)A global network of interconnected computers(8,7,8) Company that provides you access to the internet(4-2) Wired connection via a conventional telephone line(8)Set of rules to allow the computer systems to communicate(8,8) Specifies how data should be structured and sent over the internet...

Internet vocab 2026-02-06

Internet vocab crossword puzzle
Across
  1. a collection of information that is accessed via the internet
  2. small units of data transmitted on a network
  3. device on a network
  4. a number assigned to a website or device, a digital address
  5. a device connecting multiple different networks together
Down
  1. device connecting devices within the same network
  2. a small local area network of computers and devices
  3. global computer network consisting of interconnected networks
  4. interconnected four university computers and became the basis for the internet
  5. a giant phonebook for the internet

10 Clues: device on a networka giant phonebook for the internetsmall units of data transmitted on a networkdevice connecting devices within the same networka small local area network of computers and devicesa device connecting multiple different networks togethera number assigned to a website or device, a digital address...

Network Systems 2014-04-23

Network Systems crossword puzzle
Across
  1. a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
  2. A network interface controller is a computer hardware component that connects a computer to a computer network.
  3. a unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
  4. A network switch or switching hub is a computer networking device that links network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer of the OSI model.
Down
  1. An optical fiber is a flexible, transparent fiber made of high quality extruded glass or plastic, slightly thicker than a human hair. It can function as a waveguide, or “light pipe”, to transmit light between the two ends of the fiber.
  2. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  3. An Ethernet hub, active hub, network hub, repeater hub, multiport repeater or hub is a device for connecting multiple Ethernet devices together and making them act as a single network segment.
  4. broadcasting, computer networking, or other communication using radio signals, microwaves, etc.
  5. A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks.
  6. Network bridging describes the action taken by network equipment to allow two or more communication networks, or two or more network segments, to create an aggregate network. Bridging is distinct from routing which allows the networks to communicate independently as separate networks.

10 Clues: broadcasting, computer networking, or other communication using radio signals, microwaves, etc.A network interface controller is a computer hardware component that connects a computer to a computer network.a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices....

Morghan's Crossword 2014-03-20

Morghan's Crossword crossword puzzle
Across
  1. vez / each time
  2. / refrigerator
  3. / grand demonstration
  4. riesgos / to run risks
  5. / essential
  6. / inauguration
  7. parlantes / talking robots
  8. / military
  9. / indispensable
  10. fiesta / to ask for a day off
  11. / to touch
  12. / assemble
  13. supersonicas / supersonic aircraft
Down
  1. / to attend
  2. redes sociales / social networks
  3. / keep
  4. / link
  5. timidez shyness
  6. / profile
  7. / in fact
  8. / to penetrate
  9. / to exceed
  10. / engineering
  11. / communicate
  12. / industry
  13. / rocket

26 Clues: / keep/ link/ rocket/ profile/ in fact/ military/ industry/ to touch/ assemble/ to attend/ essential/ to exceed/ engineering/ communicate/ refrigerator/ to penetrate/ inaugurationvez / each timetimidez shyness/ indispensable/ grand demonstrationriesgos / to run risksparlantes / talking robotsfiesta / to ask for a day off...

Networks 2020-03-21

Networks crossword puzzle
Across
  1. all devices are equal
  2. computer that is logged on to the network
  3. Wide Area Network
Down
  1. powerful computer that provides a service
  2. Local Area Network

5 Clues: Wide Area NetworkLocal Area Networkall devices are equalpowerful computer that provides a servicecomputer that is logged on to the network

Networks 2020-07-22

Networks crossword puzzle
Across
  1. smart device used to split the signal to connect more computers
  2. map or layout of how computers are connected and located
Down
  1. a computer that is not connected to any network or other devices
  2. not very smart device, used to connect more computers together
  3. the way the network is broken down in terms of sending and receiving the data packet

5 Clues: map or layout of how computers are connected and locatednot very smart device, used to connect more computers togethersmart device used to split the signal to connect more computersa computer that is not connected to any network or other devicesthe way the network is broken down in terms of sending and receiving the data packet

Networks 2022-03-27

Networks crossword puzzle
Across
  1. used to connect smartphones and other devices
  2. longer version of domain name system
  3. used to transmit power or data
Down
  1. used to transmit pulses of light.
  2. what is internal protocol address?

5 Clues: used to transmit power or dataused to transmit pulses of light.what is internal protocol address?longer version of domain name systemused to connect smartphones and other devices

Internet 2026-02-09

Internet crossword puzzle
Across
  1. This is a program that shows webpages
  2. Networks are suseptible to ____ and hackers
  3. flow and digicel are examples of this
  4. How much data can be transmitted over communications channel
  5. A worldwide network of networks
Down
  1. This is also called the wifi box
  2. Group of connected computer devices
  3. The 'M' in Man stands for:

8 Clues: The 'M' in Man stands for:A worldwide network of networksThis is also called the wifi boxGroup of connected computer devicesThis is a program that shows webpagesflow and digicel are examples of thisNetworks are suseptible to ____ and hackersHow much data can be transmitted over communications channel

ABC Engineering carrers By: Sophia Pineiro 2015-10-13

ABC Engineering carrers By: Sophia Pineiro crossword puzzle
Across
  1. Railroads
  2. Black-box
  3. fixes-Yachts
  4. New-networks
  5. Water-usage
  6. Oil/Gas
  7. Braces
  8. Air-conditioning
  9. artificial-lenses
  10. Gas/gas-field
Down
  1. Fixes-bugs
  2. Waste-dumpsters
  3. Fire-alarms
  4. Program-management
  5. Design-CT-scans
  6. Software-products
  7. NewXRays
  8. Smart-temporary-tattoos
  9. New-medical-problems
  10. redesign-lines
  11. Fertilizer
  12. MRI-scans
  13. New-farming-methods
  14. Grass-fertilizer
  15. Antibiotics
  16. Builds-habitats

26 Clues: BracesOil/GasNewXRaysRailroadsBlack-boxMRI-scansFixes-bugsFertilizerFire-alarmsWater-usageAntibioticsfixes-YachtsNew-networksGas/gas-fieldredesign-linesWaste-dumpstersDesign-CT-scansBuilds-habitatsGrass-fertilizerAir-conditioningSoftware-productsartificial-lensesProgram-managementNew-farming-methodsNew-medical-problemsSmart-temporary-tattoos

Ciencia y Technología 2025-02-27

Ciencia y Technología crossword puzzle
Across
  1. to add pic/video
  2. cure
  3. pagina web - website
  4. to connect to the internet
  5. to download
  6. symptoms
  7. electronic devices
  8. to update
  9. laptop
Down
  1. email address
  2. social networks
  3. to disconnect from the internet
  4. username
  5. Health
  6. to comment
  7. password
  8. online
  9. cell phone
  10. to surf the web
  11. text message
  12. to upload
  13. illness/ disease
  14. internet/ La red - internet

23 Clues: cureHealthonlinelaptopusernamepasswordsymptomsto uploadto updateto commentcell phoneto downloadtext messageemail addresssocial networksto surf the webto add pic/videoillness/ diseaseelectronic devicespagina web - websiteto connect to the internetinternet/ La red - internetto disconnect from the internet

La Tecnologia 2024-10-24

La Tecnologia crossword puzzle
Across
  1. screen
  2. to prohibit
  3. to allow
  4. to download
  5. to charge
  6. search
Down
  1. hooked, addicted (masc. singular form)
  2. social media networks
  3. battery
  4. tool
  5. phone call

11 Clues: toolscreensearchbatteryto allowto chargephone callto prohibitto downloadsocial media networkshooked, addicted (masc. singular form)

Networks 2014-06-02

Networks crossword puzzle
Across
  1. Computer that is not connected to a network
Down
  1. Illness of a computer
  2. What does a Network do?
  3. Connection spreads around localy
  4. Connection spreads around a wide area

5 Clues: Illness of a computerWhat does a Network do?Connection spreads around localyConnection spreads around a wide areaComputer that is not connected to a network

networks 2022-03-27

networks crossword puzzle
Across
  1. Optic
  2. rate
Down
  1. rate/collisions
  2. Address
  3. (Domain Name Server)

5 Clues: rateOpticAddressrate/collisions(Domain Name Server)

networks 2022-03-27

networks crossword puzzle
Across
  1. Optic
  2. rate
Down
  1. rate/collisions
  2. Address
  3. (Domain Name Server)

5 Clues: rateOpticAddressrate/collisions(Domain Name Server)

Networks 2024-10-10

Networks crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Antivirus and Firewalls 2024-10-04

Antivirus and Firewalls crossword puzzle
Across
  1. A unique string of data or code that identifies a specific virus. Antivirus software uses these signatures to recognize and eliminate known malware by scanning files.
  2. A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks.
  3. The process of inspecting data packets during transmission and allowing or blocking them based on security rules. Firewalls use this to prevent unauthorized access and protect against threats.
  4. A security application that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
  5. The practices and technologies used to protect networks from unauthorized access, misuse, or attacks, significantly enhanced by antivirus and firewall software.
Down
  1. A network security technology that monitors network traffic for suspicious activity and potential threats, alerting administrators to possible security breaches.
  2. A method employed by antivirus software to detect unknown viruses by analyzing the behavior and characteristics of suspicious files, aiding in identifying new or modified malware.
  3. Malicious software designed to harm, exploit, or otherwise compromise computer systems and networks, including viruses, worms, trojans, and spyware.
  4. Data packets leaving a network; rules can allow or block traffic based on destination addresses.
  5. Data packets entering a network; rules can restrict access based on specific ports or IP addresses.

10 Clues: Data packets leaving a network; rules can allow or block traffic based on destination addresses.Data packets entering a network; rules can restrict access based on specific ports or IP addresses.A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks....

CIS178 Jake Stevenson 2023-01-25

CIS178 Jake Stevenson crossword puzzle
Across
  1. virtual private network
  2. posing as authorized user
  3. type of malware
  4. protects you from virus
  5. protecting online data
  6. explicitly allowed
  7. security system
  8. malicious software
  9. explicitly not allowed
  10. not human
  11. gaining unauthorized access
Down
  1. network of networks
  2. type of scam
  3. protects you from malware
  4. harassment on the internet
  5. unsolicited advertisements
  6. two-factor authentication
  7. another word for information
  8. securing data
  9. human verification test

20 Clues: not humantype of scamsecuring datatype of malwaresecurity systemexplicitly allowedmalicious softwarenetwork of networksprotecting online dataexplicitly not allowedvirtual private networkprotects you from virushuman verification testposing as authorized userprotects you from malwaretwo-factor authenticationharassment on the internet...

SRWC- Crossword 1 2024-08-01

SRWC- Crossword 1 crossword puzzle
Across
  1. A major concern of wireless networks compared to wired ones
  2. Procedure used to establish the identity of a station
  3. used for sensor and control applications
Down
  1. The function of a portal in a WLAN
  2. Can be used to bridge remote network nodes in Wifi
  3. The major advantage of wireless LANs over wired LANs
  4. Limits the usage of wireless networks
  5. The basic Bluetooth network
  6. Bit used to detect error

9 Clues: Bit used to detect errorThe basic Bluetooth networkThe function of a portal in a WLANLimits the usage of wireless networksused for sensor and control applicationsCan be used to bridge remote network nodes in WifiThe major advantage of wireless LANs over wired LANsProcedure used to establish the identity of a station...

Societies to Social Networks 2025-04-03

Societies to Social Networks crossword puzzle
Across
  1. A society driven by technology, services, and the exchange of information.
  2. A temporary alliance of individuals or groups who join together for a common goal.
  3. Soc. Rev: The transition to mechanized production, urbanization, and economic change.
  4. A society based on the domestication of animals for food and trade.
  5. The process of establishing and maintaining relationships for mutual benefit, often to exchange information or gain opportunities.
  6. A major transformation in society that changes how people interact, work, and live.
  7. A small, close-knit group with strong personal connections, often exclusive.
  8. Soc. Rev: The development of farming, leading to settled societies and population growth.
Down
  1. A society that sustains itself through small-scale farming using simple tools.
  2. Soc. Rev: The rise of artificial intelligence, biotechnology, and human-machine integration, reshaping work and communication.
  3. Soc. Rev: The shift from hunting and gathering to the domestication of plants and animals.
  4. Soc. Rev: The transition from industrial production to digital technology, automation, and the internet.
  5. A large social organization that shares a common culture, territory, and governance.
  6. A collection of two or more individuals who interact and share a sense of identity.
  7. A broader web of connections that link individuals, including friendships, acquaintances, and online communities.
  8. This community is a group of individuals who interact primarily through online platforms rather than in person.
  9. A collection of people who are in the same place at the same time but do not interact meaningfully.
  10. A society that relies on mechanized production and manufacturing.

18 Clues: A society that relies on mechanized production and manufacturing.A society based on the domestication of animals for food and trade.A society driven by technology, services, and the exchange of information.A small, close-knit group with strong personal connections, often exclusive....

Itani cybersecurity crossword 2026-04-01

Itani cybersecurity crossword crossword puzzle
Across
  1. – spreads and infects files
  2. – harmful software
  3. – extra login step
  4. – secret login word
  5. – protects networks
Down
  1. – stealing personal info
  2. – locks files for money
  3. – coding data for safety
  4. – tricks people for info
  5. – online trail
  6. – blocks threats
  7. – breaks into systems
  8. – removes malware
  9. – spreads by itself
  10. – steals information

15 Clues: – online trail– blocks threats– removes malware– harmful software– extra login step– secret login word– spreads by itself– protects networks– steals information– breaks into systems– locks files for money– stealing personal info– coding data for safety– tricks people for info– spreads and infects files

Security terms puzzle 2025-02-13

Security terms puzzle crossword puzzle
Across
  1. Ensuring data and resources are accessible when needed. Bell-La Padula security model – A security model focused on data confidentiality using mandatory access controls.
  2. A decoy system designed to lure and detect attackers.
  3. Protecting information from unauthorized access.
  4. Engineering Manipulating people to gain unauthorized access to information.
  5. Hacking phone systems to make free calls or manipulate networks.
  6. Security Protecting an individual computer or device from threats.
  7. through obscurity Hiding system details to reduce security risks.
Down
  1. Aggregation Combining data from multiple sources for analysis.
  2. Privilege Granting users the minimum access necessary for their tasks.
  3. Verifying the identity of a user or system.
  4. of duties Dividing responsibilities to prevent fraud and errors.
  5. A security system that monitors and controls network traffic.
  6. Digital documents that verify identities and enable secure communication.
  7. Preventing denial of actions, ensuring accountability.
  8. Security Protecting a network from threats and unauthorized access.
  9. Computing Delivering computing services over the internet.
  10. Gaining unauthorized access to systems or networks.
  11. Ensuring data is accurate and unaltered.
  12. Security Using multiple security measures to protect data and systems.

19 Clues: Ensuring data is accurate and unaltered.Verifying the identity of a user or system.Protecting information from unauthorized access.Gaining unauthorized access to systems or networks.A decoy system designed to lure and detect attackers.Preventing denial of actions, ensuring accountability.Computing Delivering computing services over the internet....

IT Crossword 2013-12-18

IT Crossword crossword puzzle
Across
  1. To analyze a sentence or language statement to break down words into functional units that can be converted into machine language
  2. A term used when system imitates or reproduces another system
  3. Place where u put files and folders that u want to delete or get rid of
  4. Is an Internet connection available from telecom companies using existing phone lines providing fast download & upload speeds.
  5. A digital mapping system used for exploration, demographics, dispatching and tracking.
  6. Method of accessing e-mail messages on a server without having to download them on your local hard drive
  7. An open source OS used by several smartphones and can be customized for mobile devices
  8. The brand name of a family of personal computers and an operating system from apple
  9. A program that allows u log in to a Unix computer via a text-based interface
Down
  1. A challenge-response test that determines whether a user is human or automated bot
  2. A security protocol for Wi-Fi networks whose goal is to make wireless networks as secure as wired networks.
  3. While applied to hard disk, it is a great way to boost the performance of computer
  4. Chart displaying horizontal or vertical bars whose length are in proportion to the values of the data items they represent.
  5. A program pre-installed on Windows-based computers that computers uses to start up
  6. A social networking website where users can create and customize their own profiles
  7. It translates the IP addresses of computers in a local network to a single IP address.
  8. A standard way of transferring data to and from each kind of database
  9. A file within a directory on your hard drive

18 Clues: A file within a directory on your hard driveA term used when system imitates or reproduces another systemA standard way of transferring data to and from each kind of databasePlace where u put files and folders that u want to delete or get rid ofA program that allows u log in to a Unix computer via a text-based interface...

NETWORK 2025-06-02

NETWORK crossword puzzle
Across
  1. a worldwide system of interconnected computer networks
  2. using someone else's work without giving them proper credit
  3. any unsolicited and often irrelevant or inappropriate messages sent over the internet
  4. breach defenses to gain unauthorized access into computers
  5. the breaching of network encryptions
  6. s used for short-range wireless voice and data communication
  7. connects electronic devices close to the user
  8. known as an address on the Web
Down
  1. a private network designed by an organization
  2. connects our computer to a standard phone line or to our cable
  3. the physical and logical arrangement of nodes and connections in a network
  4. a program that spreads by first infecting files
  5. the act of compromising digital devices and networks
  6. cybercrime activity that takes place over the internet or on email
  7. is a single source that sends something to all other devices
  8. an established set of rules that determine how data is transmitted
  9. the connection point among network devices
  10. connects electronic devices close to the user

18 Clues: known as an address on the Webthe breaching of network encryptionsthe connection point among network devicesa private network designed by an organizationconnects electronic devices close to the userconnects electronic devices close to the usera program that spreads by first infecting filesthe act of compromising digital devices and networks...

Principal Areas of Computer Use 2020-09-27

Principal Areas of Computer Use crossword puzzle
Across
  1. Crop information
  2. paperless society
  3. forecast weather
  4. modelling DNA
  5. DepEd
  6. previously performed by people
  7. locate and monitor networks
Down
  1. rapid transit system
  2. simulate environment
  3. representation of better analysis
  4. record keeping in banks
  5. use barcodes
  6. Connect with others
  7. communicate with others

14 Clues: DepEduse barcodesmodelling DNACrop informationforecast weatherpaperless societyConnect with othersrapid transit systemsimulate environmentrecord keeping in bankscommunicate with otherslocate and monitor networkspreviously performed by peoplerepresentation of better analysis

Vocab: How the Internet Works 2023-02-03

Vocab: How the Internet Works crossword puzzle
Across
  1. Hierarchical and distributed naming system for computers
  2. Networking device that connects devices on the same computer network
  3. A network node that broadcasts data to every device connected to it
  4. Based on a number system in which there are only two possible states, off and on, usually expressed as ones and zeros
  5. People who are responsible for writing the code to generate a webpage
  6. The internet was started as a ________ project
  7. Networking device that forwards traffic between networks
Down
  1. Cascading Style Sheets
  2. A block of data transmitted across a network.
  3. A network of networks built on open agreed upon protocols
  4. A document that can be viewed by a web browser
  5. Hypertext Markup Language
  6. A widely agreed upon set of rules and standards

13 Clues: Cascading Style SheetsHypertext Markup LanguageA block of data transmitted across a network.A document that can be viewed by a web browserThe internet was started as a ________ projectA widely agreed upon set of rules and standardsHierarchical and distributed naming system for computersNetworking device that forwards traffic between networks...

Let's Revise Cyber Security Fundamentals !! 2021-08-16

Let's Revise Cyber Security Fundamentals !! crossword puzzle
Across
  1. deliberate attempt to compromise security using malicious activity
  2. Naming system followed to identify computers connected to Internet
  3. criminal activity performed using computer or a network
  4. ready to access for authorized people
  5. state of maintaining secrecy of communication
  6. malicious software that prevents the users from
  7. use of Computers and Networks to gain illegal access for confidential information for some gain
Down
  1. way of confirmation of individual's identity
  2. unskilled individual who uses programs written by others to initiate attacks
  3. Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
  4. their own data for want of money
  5. computer program designed to protect computer
  6. illegal piece of software designed to cause harm to computers/networks

13 Clues: their own data for want of moneyready to access for authorized peopleway of confirmation of individual's identitystate of maintaining secrecy of communicationcomputer program designed to protect computermalicious software that prevents the users fromcriminal activity performed using computer or a network...

About Upcyling and Technology 2025-07-24

About Upcyling and Technology crossword puzzle
Across
  1. Sedentary person.
  2. Physical and mental health.
  3. Causing dependence.
  4. Social conventions.
  5. Rule, regulation.
  6. Communication networks.
Down
  1. Interaction, discussion.
  2. Most important, principal.
  3. Polution.
  4. Original, make.
  5. Reuse: materials, objects.
  6. Exept for… / In the contrary…
  7. Electronic, not analog.

13 Clues: Polution.Original, make.Sedentary person.Rule, regulation.Causing dependence.Social conventions.Electronic, not analog.Communication networks.Interaction, discussion.Most important, principal.Reuse: materials, objects.Physical and mental health.Exept for… / In the contrary…

Networks (Grade 6) 2025-01-07

Networks (Grade 6) crossword puzzle
Across
  1. is where a video or sound file is played over an internet connection
  2. a private network that is only available within an organization
  3. using more than its capability
  4. access something they are not allowed to
  5. it is a networked device that serves data to other devices
Down
  1. global positioning system
  2. junk mail
  3. is the maximum amount of data that can be transmitted in a network in a specific time
  4. without using wires
  5. is a unique name for each user in the system
  6. is 8 bits

11 Clues: junk mailis 8 bitswithout using wiresglobal positioning systemusing more than its capabilityaccess something they are not allowed tois a unique name for each user in the systemit is a networked device that serves data to other devicesa private network that is only available within an organization...

Year 8 Networks 2024-02-06

Year 8 Networks crossword puzzle
Across
  1. Using the Internet for a phone call.
  2. A way of sending data by using light.
  3. A simple network device for connecting devices
  4. An older method of communication, often used on ships.
  5. Two or more devices connected together for communication.
  6. A network of computers across the world.
Down
  1. Describes all the services on the Internet.
  2. A standard set of rules for communicating.
  3. A simple network device for connecting networks.
  4. Describes the use of devices such as fridges on the Internet.
  5. Describes the amount of data that can be transmitted in one go.

11 Clues: Using the Internet for a phone call.A way of sending data by using light.A network of computers across the world.A standard set of rules for communicating.Describes all the services on the Internet.A simple network device for connecting devicesA simple network device for connecting networks.An older method of communication, often used on ships....

Tec cross word puzzell 2022-04-13

Tec cross word puzzell crossword puzzle
Across
  1. network security device that monitors outgoing network traffic
  2. something designed to make something known to
  3. data that is left behind when users have been online
  4. data that describes other data
  5. bully someone over the internet
  6. activities a company undertaken to promote the buying or selling of a product or service
Down
  1. The opportunity to establish a protect network connection when using public networks
  2. where people can create, share or exchange information in virtual communities and networks
  3. A file or code
  4. A way that cyber criminals steal private information
  5. A network that connects computers all over the world

11 Clues: A file or codedata that describes other databully someone over the internetsomething designed to make something known toA way that cyber criminals steal private informationdata that is left behind when users have been onlineA network that connects computers all over the worldnetwork security device that monitors outgoing network traffic...

☂ WIRED AND WIRELESS NETWORKS ☂ 2022-09-22

☂ WIRED AND WIRELESS NETWORKS ☂ crossword puzzle
Across
  1. This network allows new nodes to be added without interruption to the network.
  2. unscramble "clalleru hensop"
  3. ______ ____, twisted pair, or fiber optic cables are all options.
  4. Wireless network uses _________ rather than wires.
  5. Wireless networks use radio signals as their communication medium but could also use__________
Down
  1. Wired networks require this for each device in order to work.
  2. Wireless is made up of_____________(short term)
  3. Fibre cables have greater_____ so transfer speeds are faster.
  4. This network is expensive to install
  5. A wired network employs wires to link devices to the ________ or another network.
  6. _______ or sensors will be present on all wireless devices.

11 Clues: unscramble "clalleru hensop"This network is expensive to installWireless is made up of_____________(short term)Wireless network uses _________ rather than wires._______ or sensors will be present on all wireless devices.Wired networks require this for each device in order to work.Fibre cables have greater_____ so transfer speeds are faster....

Find the keywords that we have learned in IT. 2024-01-14

Find the keywords that we have learned in IT. crossword puzzle
Across
  1. A small segment of a larger message
  2. a set of rules used for formatting and processing data
  3. The data capacity of a network in per bits second.
  4. a worldwide system of computer networks
Down
  1. electronic mail system
  2. A device that connects two or more packet-switched networks.
  3. a center of activity
  4. Transmission Control Protocol

8 Clues: a center of activityelectronic mail systemTransmission Control ProtocolA small segment of a larger messagea worldwide system of computer networksThe data capacity of a network in per bits second.a set of rules used for formatting and processing dataA device that connects two or more packet-switched networks.

Crossword 2021-01-12

Crossword crossword puzzle
Across
  1. created with a camera system which simultaneously records all 360 degrees of a scene
  2. is when one person shares a video clip with another or many other people.
  3. community based marketplace which allows members to communicate and sell directly to other members; for example, Etsy®
  4. online businesses which allow consumers to search and follow their favorite
  5. form of electronic commerce which uses social networks to facilitate the buying or selling of products
  6. the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself
  7. process of uploading, publishing and sharing photos online
  8. realistic, real-time, three-dimensional computer simulation of physical objects and space; allows users to ‘interact’ and have sensory experiences of the actors, images and sounds through sensors attached to the user’s body which track 360 movement
  9. writing and publishing short, frequent posts to a microblog such as Twitter®
  10. buyers agree to make the purchase; for example, Groupon®
Down
  1. marketplace which allows sales to be driven by referrals from established social networks; social networks collect data to provide accurate suggestions
  2. BuyingPlatforms marketplace which offers products and services at a reduced rate when
  3. writing and publishing posts, at any length and time, on a blog such as Blogger®; typically in a chronological format
  4. RecommendationPlatforms marketplace which offers product or service reviews and in return recommend products based on a member’s purchasing history; for example, Amazon®
  5. a message sent via the internet that appears on the recipient's screen as soon as it is transmitted.
  6. recommendations on goods and services
  7. content sent in compressed form over the Internet and displayed by the viewer in real-time
  8. all in one place; for example, Wanelo®

18 Clues: recommendations on goods and servicesall in one place; for example, Wanelo®buyers agree to make the purchase; for example, Groupon®process of uploading, publishing and sharing photos onlineis when one person shares a video clip with another or many other people.online businesses which allow consumers to search and follow their favorite...

Programming Crossword 2013-10-10

Programming Crossword crossword puzzle
Across
  1. Type of programming the runs the entire evening
  2. Major networks give away office space and financing for distribution rights
  3. People in power who decide what people need to know
  4. Sheduling new or weak series before and after a very successful program.
  5. Scheduling that shows one program at the same time during the week
  6. Programming a new series in between two successful series
  7. He lives in a pineapple under the sea
  8. King of Late Night: Johnny
  9. A classification of drama
Down
  1. Programming that aims to attracts a particular demographic
  2. Sports programming is made unavailable to households 90 miles from the game
  3. Local stations that obtain programming from major networks
  4. Reality TV show in the "wild"
  5. Programming that has already aired on a major network
  6. The first episode of a series, usually made before a series is ordered
  7. A collection of stories with different themes and different actors
  8. Promoting and selling products from a variety of sources

17 Clues: A classification of dramaKing of Late Night: JohnnyReality TV show in the "wild"He lives in a pineapple under the seaType of programming the runs the entire eveningPeople in power who decide what people need to knowProgramming that has already aired on a major networkPromoting and selling products from a variety of sources...

Social Media Crossword 2023-04-01

Social Media Crossword crossword puzzle
Across
  1. A network for online picture sharing.
  2. It is an image or username that represents a person online most often within forums and social networks.
  3. An action that can be made by a Facebook user.
  4. A message sent on Twitter.
  5. Clusters of a user’s friends, colleagues,family or connections on Google+.
  6. A system that manages content.
  7. Here you are allowed to share a 140-character update.
  8. Anything shared across social networks that get passed along rapidly e.g. YouTube.
Down
  1. Simple web pages that can be edited by other users.
  2. A small, attractive application on a website such as a hit counter.
  3. They are also known as message boards.
  4. Platform founded by Mark Zuckerberg.
  5. A pictorial representation of a facial expression which is used in writing.
  6. A self-portrait taken using the reverse camera screen on a smartphone
  7. A photo sharing application gained more than 300 million users
  8. #
  9. A site updated frequently by an individual or group to record opinions or information.
  10. A one-to-one communication on the internet.
  11. A free URL shortening service.

19 Clues: #A message sent on Twitter.A system that manages content.A free URL shortening service.Platform founded by Mark Zuckerberg.A network for online picture sharing.They are also known as message boards.A one-to-one communication on the internet.An action that can be made by a Facebook user.Simple web pages that can be edited by other users....

Definitions for computer 2021-10-06

Definitions for computer crossword puzzle
Across
  1. to gain information from someone else in a bad way
  2. parts of a computer or substance
  3. to pertain something
  4. small and portable soli device that can be inserted onto a USB
  5. the key to the computer system which stands for Central Processing Unit
  6. storage information
  7. a reason or limited use of copyrighting
  8. the way to communicate with other networks
  9. this is used to store memory and has lots of small chips
  10. when you take or steal information from someone else and copy it to make it look like yours
Down
  1. a website that allows to delete, gain, revise a content using a web browser
  2. a local network area
  3. a security use to protect the use of your network and data
  4. the right to make copies of music, artistic work and words
  5. stands for wide network area which is a computer network that connects smaller networks
  6. a storage device
  7. a security device that can help protect the computer
  8. used to connect cables to a computer
  9. this is often seen in messages and posts

19 Clues: a storage devicestorage informationa local network areato pertain somethingparts of a computer or substanceused to connect cables to a computera reason or limited use of copyrightingthis is often seen in messages and poststhe way to communicate with other networksto gain information from someone else in a bad way...

AND-FridayFun 2022-05-06

AND-FridayFun crossword puzzle
Across
  1. Messaging program designed specifically for the workplace
  2. When you start a terminal Linux running the ____, you're greeted with a prompt.
  3. Building of books
  4. the global system of interconnected computer networks that uses protocols to communicate between networks and devices.
  5. Adults and children do not like to share them, some for safety and others for their taste.
  6. IAM identity that you can create in your account that has specific permissions.
  7. Short compilations of songs.
  8. A minimal Docker image basen on Linux
Down
  1. AWS storage container
  2. A reptile that looks a little like a crocodile
  3. A polite address
  4. Puppet _____ is the application that manages the configurations on your nodes
  5. Company's name which the products are used to deliver applications faster.
  6. You can work with one, but more are always welcome.
  7. An open source software that does not require self plugin installations
  8. To resurrect and also pass a flower
  9. Command is used to initialise a working directory containing Terraform configuration files.

17 Clues: A polite addressBuilding of booksAWS storage containerShort compilations of songs.To resurrect and also pass a flowerA minimal Docker image basen on LinuxA reptile that looks a little like a crocodileYou can work with one, but more are always welcome.Messaging program designed specifically for the workplace...

Networking Fundamentals 2025-02-10

Networking Fundamentals crossword puzzle
Across
  1. Networks are critical for the use of email, instant messaging, and fixing.
  2. Layer 7, supplies network services to end-user applications
  3. connects multiple devices devices within a network. Can be managed or unmanaged
  4. Used to make routing decisions. Can be static or dynamic
  5. Personal Area Network
  6. protocol connection-oriented, secure reliable conection
  7. stands for modulator and demodulator, used to convert analog to digital signals
  8. translates digital info into signals used to transfer data (ethernet or WI-FI)
Down
  1. Networks centralize data and make it more accessible to users.
  2. unique 48 bit hardware number that is embedded, consist of 6 octets
  3. Layer 1, responsible for the actual transmission of digital data.
  4. Network permits the sharing of files, database, and media
  5. Layer 6, it handles the syntax processing of message data.
  6. the maing goal is sending datagrams, as quickly as possible
  7. ___is two or more devices connected to exchange information
  8. 128 bits, consist of 8 octates
  9. Layer 3, works for the transmission of data from a source device in one network to a destination in another network
  10. layer 2, trnasmmit data to its destination device using the MAC address

18 Clues: Personal Area Network128 bits, consist of 8 octatesprotocol connection-oriented, secure reliable conectionUsed to make routing decisions. Can be static or dynamicNetwork permits the sharing of files, database, and mediaLayer 6, it handles the syntax processing of message data.Layer 7, supplies network services to end-user applications...

Tech 2023-05-02

Tech crossword puzzle
Across
  1. Operating System
  2. Central Processing Unit
  3. Internet Address
  4. Firefox, Edge, Safari
  5. Start a Device
  6. Ctrl+P
  7. A 0 or 1
Down
  1. Google, Yahoo
  2. Hypertext marker language
  3. System of Networks
  4. Restart a Device
  5. Four 1s or 0s
  6. Portable Documnent Format
  7. Internet Protocol

14 Clues: Ctrl+PA 0 or 1Google, YahooFour 1s or 0sStart a DeviceOperating SystemInternet AddressRestart a DeviceInternet ProtocolSystem of NetworksFirefox, Edge, SafariCentral Processing UnitHypertext marker languagePortable Documnent Format

Online Crossword - Octavio Alvarado 2021-06-25

Online Crossword - Octavio Alvarado crossword puzzle
Across
  1. Wide bandwidth data transmission which transports multiple signals and traffic types.
  2. Is an electrical or electromagnetic current that is used for carrying data from one device or network to another. It is the key component behind virtually all:
  3. Wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building.
  4. Group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
  5. Networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
  6. Twisted pair cable for computer networks. Also used to carry other signals such as telephone and video.
Down
  1. Transfer of information between two or more points that do not use an electrical conductor as a medium by which to perform the transfer.
  2. Interface between radio waves propagating through space and electric currents moving in metal conductors, used with a transmitter or receiver.
  3. Global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
  4. Hardware device that converts data from a digital format, intended for communication directly between devices with specialized wiring, into one suitable for a transmission medium such as telephone lines or radio.
  5. Computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.

11 Clues: Wide bandwidth data transmission which transports multiple signals and traffic types.Twisted pair cable for computer networks. Also used to carry other signals such as telephone and video.Transfer of information between two or more points that do not use an electrical conductor as a medium by which to perform the transfer....

ISSO June 2021 2021-06-07

ISSO June 2021 crossword puzzle
Across
  1. IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
  2. The physical separation or isolation of a system from other systems or networks is known as an __ __.
  3. A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
  4. A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
  5. IRM office responsable for Cyber Operations oversight.
  6. ____ is the only thumb drive authorized on Department of State Automated Information Systems.
  7. vulnerabilities must be remediated within ___calendar days of initial detection.
  8. The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
  9. this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
  10. The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
  1. is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
  2. The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
  3. A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
  4. Criminal organization responsable for the cyber attack against the Colonial Pipeline.
  5. A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
  6. computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
  7. ISSO duties must be performed using an ISSO ___ account.
  8. The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
  9. of ___ is an attack that prevents or impairs the authorized use of information system resources or services.

19 Clues: IRM office responsable for Cyber Operations oversight.ISSO duties must be performed using an ISSO ___ account.vulnerabilities must be remediated within ___calendar days of initial detection.Criminal organization responsable for the cyber attack against the Colonial Pipeline....

Technology 2024-04-16

Technology crossword puzzle
Across
  1. make a_____call
  2. watch
  3. listen to
  4. social
Down
  1. visit
  2. use a
  3. interactive
  4. send
  5. fashion

9 Clues: sendvisituse awatchsocialfashionlisten tointeractivemake a_____call

Chapter 3 2012-09-05

Chapter 3 crossword puzzle
Across
  1. Names that give you some insight to the purpose of the website you visit
  2. Internet feature that allows you to create a list of links for sites
  3. The main list of results from a search
  4. The selling and buying of goods and products on the Internet
  5. Used to help prevent unauthorized users from getting your data
  6. Web of computer networks that spans the earth
  7. When one computer links to another computer
Down
  1. A program that lets you find and view web pages
  2. System of computers that can handle documents in a special language
  3. An unsolicited or unwanted message
  4. Accessing computers or networks without permission
  5. When you put a group of words together between quotation marks in the search bar
  6. Refers to using material created by another person and claiming it as your own
  7. Term often used to describe rules for proper online behavior
  8. Allows users to post messages for others to read

15 Clues: An unsolicited or unwanted messageThe main list of results from a searchWhen one computer links to another computerWeb of computer networks that spans the earthA program that lets you find and view web pagesAllows users to post messages for others to readAccessing computers or networks without permission...

test 2025-05-06

test crossword puzzle
Across
  1. Object-oriented programming language designed for portability
  2. Global system of interconnected computer networks
  3. Data structure that stores elements of the same type in contiguous memory
  4. Set of instructions for a computer to execute a specific task
  5. Software development methodology focused on iterative progress
  6. Representational State Transfer, an architectural style for API design
  7. Instructions written in a programming language
  8. Collection of computers and devices connected together
Down
  1. A step-by-step procedure or formula for solving a problem or accomplishing a task
  2. Popular programming language known for readability and versatility
  3. A security system that monitors and controls incoming and outgoing network traffic
  4. A structured collection of data that is organized and stored for efficient retrieval
  5. Network device that forwards data packets between computer networks
  6. A computer or system that provides resources or services to other computers on a network
  7. A network of remote servers used to store, manage, and process data over the internet

15 Clues: Instructions written in a programming languageGlobal system of interconnected computer networksCollection of computers and devices connected togetherObject-oriented programming language designed for portabilitySet of instructions for a computer to execute a specific taskSoftware development methodology focused on iterative progress...

Marketing Management tutorial 7 2025-11-19

Marketing Management tutorial 7 crossword puzzle
Across
  1. Peer-to-peer communication that influences consumer decisions.
  2. Appeal type that boosts sharing by evoking strong feelings.
  3. The degree to which content is likely to be forwarded.
  4. One of the three viral marketing criteria—people who spread the message.
  5. Persuasive communicators who amplify a message before it spreads.
  6. The exponential spread of content across networks.
Down
  1. Knowledgeable consumers who rapidly pass along information.
  2. Individuals with huge networks who accelerate message spread.
  3. Emotional ad type where the brand is not central to the narrative.
  4. Viral campaigns that go wrong and damage brand reputation.
  5. Includes timing, context, and luck—must be “right” for virality.
  6. Successful viral campaigns with positive brand impact.
  7. Appeal that focuses on product attributes to increase brand evaluation.
  8. Must be interesting, surprising, or emotional to become contagious.
  9. When the brand is essential to the storyline, increasing brand value.

15 Clues: The exponential spread of content across networks.Successful viral campaigns with positive brand impact.The degree to which content is likely to be forwarded.Viral campaigns that go wrong and damage brand reputation.Knowledgeable consumers who rapidly pass along information.Appeal type that boosts sharing by evoking strong feelings....

Season4Sharing Scavenger Hunt! 2020-12-08

Season4Sharing Scavenger Hunt! crossword puzzle
Across
  1. Our CFO's Last Name
  2. Service Makes Individuals’ Lives Easier
  3. Last Name of Nobel Prize Winner interviewed by Jean English during Ignite20
  4. Nikesh announced our intent to acquire this company in Nov 11, 2020
  5. A world where each day is safer and more secure than the one before
Down
  1. First name of one of our founders
  2. One of our NGFW competitors
  3. It is the name of our of our main brands
  4. Where has James McGregor worked the longest?
  5. On this month, Palo Alto Networks became a public company in the NYSE Stock Market
  6. To be the cybersecurity partner of choice, protecting our digital way of life
  7. Palo Alto Networks Stock Symbol

12 Clues: Our CFO's Last NameOne of our NGFW competitorsPalo Alto Networks Stock SymbolFirst name of one of our foundersService Makes Individuals’ Lives EasierIt is the name of our of our main brandsWhere has James McGregor worked the longest?Nikesh announced our intent to acquire this company in Nov 11, 2020...

Web Ethics and Safety IV 2021-02-05

Web Ethics and Safety IV crossword puzzle
Across
  1. connects entirely different networks that work upon different protocols. It is the entry and the exit point of a network and controls access to other networks.
  2. computer device which forwards data packets from one network to another
  3. a multiport repeater having several input/output ports
  4. a billion bytes
  5. a million bytes
  6. uses broadband but does not require cable or phone lines;
Down
  1. category 5 cable with RJ – 45 connector
  2. network controller which connects network devices and allows effective communication between these devices
  3. a trillion bytes
  4. netwrok interface card internal or external component used to connect computer to a network
  5. primary device used to connect to the internet
  6. wireless network

12 Clues: a billion bytesa million bytesa trillion byteswireless networkcategory 5 cable with RJ – 45 connectorprimary device used to connect to the interneta multiport repeater having several input/output portsuses broadband but does not require cable or phone lines;computer device which forwards data packets from one network to another...

CSIT Networks, Security Threats, and protocols 2023-01-23

CSIT Networks, Security Threats, and protocols crossword puzzle
Across
  1. three principles that form the foundation of any organization's security
  2. A network that provides connectivity to wireless devices within a limited geographic area
  3. tricking Internet users into revealing personal or confidential information
  4. keeping data private
  5. Networks for homes, smaller offices and schools in a small, local setting
Down
  1. devices or steps taken to protect hardware or raw data
  2. Small Office and Home Office Networks typically Local Area setups
  3. protection of programs and data against malicious attacks and risks
  4. software intentionally designed to cause damage to a computer
  5. reliability of access to and use of data
  6. accuracy, completeness, and consistency of data
  7. a large network of information that is not tied to a single location.

12 Clues: keeping data privatereliability of access to and use of dataaccuracy, completeness, and consistency of datadevices or steps taken to protect hardware or raw datasoftware intentionally designed to cause damage to a computerSmall Office and Home Office Networks typically Local Area setups...

Wireless, Mobile Computing & Mobile Commerce 2018-05-09

Wireless, Mobile Computing & Mobile Commerce crossword puzzle
Across
  1. a wireless access point that provides service to a number of users within a small geographical perimeter (up to approximately 300 feet).
  2. virtually every object has processing power with either wireless or wired connections to a global network.
  3. networks using multiple Wi-Fi access points to create a wide area network that can be quite large and are essentially a series of interconnected local area networks.
  4. a medium-range WLAN.
  5. a real-time, wireless connection between a mobile device and other computing environments, such as the Internet or an intranet.
  6. offers uninterrupted, near CD-quality transmission that is beamed to your radio, either at home or in your car, from both GEO (XM Radio) and MEO (Sirius) satellites in space
  7. networks that connect users to the Internet over a geographically dispersed territory, they typically operate over the licensed spectrum (government regulation).that is, they use portions of the wireless spectrum that are regulated by the government.
  8. One major limitation of GEO satellites is that their transmissions take a quarter of a second to send and return from the earth's surface.
  9. the area of Earth’s surface reached by a satellite’s transmission overcomes the limitations of microwave data relay stations. The higher a satellite orbits, the larger its footprint
  10. enables peer-to-peer communications, so devices can connect directly allowing users to transfer content among devices without having to rely on a wireless antenna. It can connect pairs or groups of devices at Wi-Fi speeds of up to 250 Mbps and at distances of up to 800 feet.
Down
  1. uses radio-wave frequencies to send data directly between transmitters and receivers
  2. a small, portable wireless device that provides users with a permanent Wi-Fi hotspot wherever they go with a range of about 10 meters (roughly 30 feet).
  3. a wireless system that utilizes satellites to enable users to determine their position anywhere on Earth. GPS is supported by 24 MEO satellites that are shared worldwide
  4. e-commerce (EC) transactions conducted with a mobile device.
  5. in remote parts of the world it is the only option available for Internet connections because installing cables is either too expensive or physically impossible.
  6. Networks the familiar wireless local area networks (WLANs) and the most common type of Medium-Range network is wireless fidelity (Wi-Fi).
  7. a phenomenon that occurs when the functions of many physical devices are included in one other physical device. Consider that your smartphone includes the functions of digital cameras for images and video, radios, televisions, Internet access via Web browsers, recording studios, editing suites, movie theaters, GPS navigators, word processors, spreadsheets, stereos, flashlights, board games, card games, video games, an entire range of medical devices, maps, atlases, encyclopedias, dictionaries, translators, textbooks, watches, alarm clocks, books, calculators, address books, credit card swipers, magnifying glasses, money and credit cards, car keys, hotel keys, cellular telephony, Wi-Fi, e-mail access, text messaging, a full QWERTY keyboard, and many, many others.
  8. something that changes its location over time
  9. without wires.
  10. is red light that is not commonly visible to human eyes and common applications of infrared light are found in remote control units for televisions and DVD and CD players.

20 Clues: without wires.a medium-range WLAN.something that changes its location over timee-commerce (EC) transactions conducted with a mobile device.uses radio-wave frequencies to send data directly between transmitters and receiversvirtually every object has processing power with either wireless or wired connections to a global network....

Chapter 3 - Countermeasure in Cybersecurity 2026-01-12

Chapter 3 - Countermeasure in Cybersecurity crossword puzzle
Across
  1. Security classification related to storage media like USB drives and disks
  2. Software layer where users interact with systems
  3. Security device that filters incoming and outgoing network traffic
  4. Infrastructure that focuses on storing and managing data
  5. A fake system designed to trap and study attackers
  6. Security system that detects suspicious activities in a network
  7. Minimum security standard that systems must follow
  8. IT infrastructure responsible for managing communication between systems
Down
  1. Type of IT infrastructure that includes servers, computers, and hardware
  2. Tool used to scan networks and discover active devices
  3. Process of strengthening an application by removing unnecessary features
  4. A secure tunnel used to protect data over public networks
  5. Security design that shows how security components are arranged in a network
  6. Tool used to capture and analyze network traffic
  7. Small update released to fix a specific security vulnerability
  8. Physical security method that uses fingerprints or facial recognition
  9. Network area that separates internal systems from the internet

17 Clues: Tool used to capture and analyze network trafficSoftware layer where users interact with systemsA fake system designed to trap and study attackersMinimum security standard that systems must followTool used to scan networks and discover active devicesInfrastructure that focuses on storing and managing data...

ICT Terminology 2025-10-07

ICT Terminology crossword puzzle
Across
  1. : Security system for networks
  2. : Device that connects networks
  3. : Wireless Internet connection
Down
  1. : Computer programs
  2. : Online data storage
  3. : Electronic mail

6 Clues: : Electronic mail: Computer programs: Online data storage: Security system for networks: Wireless Internet connection: Device that connects networks

Marketing crosswords 2024-07-03

Marketing crosswords crossword puzzle
Across
  1. actions that are intended to attract the public's attention to someone or something
  2. actions that reflect and measure how much your audience interacts with your content
  3. tangible object or a service provided to consumers
  4. person or something that influences another
  5. synonym of fashion
  6. distinctive catchword or catch phrase
Down
  1. plan for carrying out a process or procedure
  2. act of satisfying and retaining customers
  3. either or a pair of people engaged together in the same activity
  4. the assembledd spectators or listeners at a public or on networks
  5. way to express stories to convey a message in an unforgettable way
  6. condition of sharing or having certain attitudes and interests in common
  7. belief taht doing good for people and planet is also good for brand and bottom line - derived of advertising
  8. a graphic representation or symbol of a company name
  9. acronym - popular type of content on social networks (particularly on Tiktok)

15 Clues: synonym of fashiondistinctive catchword or catch phraseact of satisfying and retaining customersperson or something that influences anotherplan for carrying out a process or proceduretangible object or a service provided to consumersa graphic representation or symbol of a company nameeither or a pair of people engaged together in the same activity...

Computer Network 2023-02-22

Computer Network crossword puzzle
Across
  1. Wireless Topology contains a ___________ to connect hosts in a n/w to servers
  2. All ____________ bits cannot be set to zero/ one
  3. When all hosts in the N/W are connected to every other host, it creates a ____________
  4. ultimate wise area n/w spanning entire globe
  5. Physical layout of computers and other components on a network
  6. time taken by a data signal to travel from one location to another on a N/W
  7. Collection of computers connected together
  8. N/W that connects devices in an individuals workspace
  9. Route Navigation system using satellites
Down
  1. Communication between different networks
  2. Sending messages to all hosts on your network at once
  3. ClassA, ClassB, ClassC, ClassD, ClassE represent concept of ___________
  4. Determines network and host parts of your IP address
  5. Device used to communicate b/w networks
  6. Sending data from your home computer to the Internet

15 Clues: Device used to communicate b/w networksCommunication between different networksRoute Navigation system using satellitesCollection of computers connected togetherultimate wise area n/w spanning entire globeAll ____________ bits cannot be set to zero/ oneDetermines network and host parts of your IP address...

Internet of Things ANALYN B. BULANIT MAEE 208 2024-09-20

Internet of Things   ANALYN B. BULANIT   MAEE 208 crossword puzzle
Across
  1. software that acts as a bridge between an operating system and application, especially where IoT is concerned
  2. a small, fast-moving bird, metaphorically representing quick data processing
  3. the state of being vulnerable to being harmed
  4. the act of changing from one form to another
  5. small device that performs a specific task in IoT, often serving to collect and send data
  6. the link between two or more devices
  7. to think too much about something
  8. abbreviation for the fundamental language of the web's structure, often associated with IoT interface design
Down
  1. the technique of making an apparatus, a process, or a system operate automatically
  2. the worldwide system of interconnected networks
  3. data flow in one direction only
  4. a group or system of interconnected people or things
  5. a wireless technology standard for exchanging data over short distances
  6. device that detects or measures a physical property
  7. the global system of interconnected computer networks

15 Clues: data flow in one direction onlyto think too much about somethingthe link between two or more devicesthe act of changing from one form to anotherthe state of being vulnerable to being harmedthe worldwide system of interconnected networksdevice that detects or measures a physical propertya group or system of interconnected people or things...

Netowkr 2026-03-08

Netowkr crossword puzzle
Across
  1. Mathematical diagrams that represent networks using nodes and edges
  2. Highly connected and influential nodes in a network
  3. The study of how networks change and evolve over time
  4. The individual points or units in a network
  5. A measure of how many connections exist compared to the maximum possible
  6. The connections or links between nodes
  7. A route that connects one node to another
Down
  1. A network property where most nodes are only a few steps apart
  2. Groups of tightly connected nodes within a network
  3. A network pattern where a few nodes have many connections
  4. A measure of how important a node is in a network
  5. The number of connections a node has

12 Clues: The number of connections a node hasThe connections or links between nodesA route that connects one node to anotherThe individual points or units in a networkA measure of how important a node is in a networkGroups of tightly connected nodes within a networkHighly connected and influential nodes in a network...

Topic 7 Networks 2021-06-30

Topic 7 Networks crossword puzzle
Across
  1. type of communication in which a physical propagation medium is not used, but modulation of electromagnetic waves, radiation or optical means is used?
  2. device that connects different computers on the same local area network?
  3. set of computers connected to each other through various methods to share information and services.?
  4. is a systemization of wireless communication to minimize wired connections.?
  5. it is a type of twisted pair cable?
  6. Scope is limited to a small physical space, such as a house, an apartment, or at most a building.?
  7. device capable of converting digital signals into analog, but also analog into digital.?
Down
  1. World-class computer network that uses the telephone line to transmit information?
  2. it is a sign, a gesture or another type of report or warning of something.?
  3. to any type of network with a high capacity to transport information that affects its transmission speed.?
  4. Device used to emit or receive radio waves?

11 Clues: it is a type of twisted pair cable?Device used to emit or receive radio waves?device that connects different computers on the same local area network?it is a sign, a gesture or another type of report or warning of something.?is a systemization of wireless communication to minimize wired connections.?...

Environmental Stress 2021-02-19

Environmental Stress crossword puzzle
Across
  1. Telecommuting is positively/negatively related to job performance (Hypothesis 5).
  2. Surrounding in which a person completes tasks.
  3. Bring in sunlight penetration and views.
  4. Negatively related to telecommuting, the rate at which employees leave.
  5. Term for alternative work arrangement, working somewhere other than the primary workplace.
Down
  1. Most common location to work other than the primary workplace.
  2. Amount of light in an environment.
  3. Most common device people use to complete their telecommuting tasks.
  4. 'Equals control.' Gives one control over breaks, rules, environments, etc.
  5. Which gender experiences lower sunlight penetration and more negative outcomes.
  6. Telecommuting is positively/negatively related to work-family conflict (Hypothesis 2).
  7. Global computer networks linked to other networks and provide information.
  8. Self-governance, independent of one's owns actions and behaviors, increases with telecommunication.
  9. The type of learning we are engaging in, far away from each other.
  10. Type of element found to relieve job stress (i.e., trees, plants, flowers, etc.)

15 Clues: Amount of light in an environment.Bring in sunlight penetration and views.Surrounding in which a person completes tasks.Most common location to work other than the primary workplace.The type of learning we are engaging in, far away from each other.Most common device people use to complete their telecommuting tasks....

Network Hunting 2023-12-26

Network Hunting crossword puzzle
Across
  1. Optics Transmission medium that uses light to transmit data
  2. Device that connects a computer or network to the internet
  3. Security system that monitors and controls incoming and outgoing network traffic
  4. System responsible for translating domain names into IP addresses
  5. Commonly used technology for wired connections in local networks
  6. Unit of data transmitted over a network
Down
  1. Measure of data transfer rate, typically in bits per second
  2. Device that connects multiple computer networks together
  3. Computer or software that requests and uses services provided by another computer
  4. Device used to connect devices within a local area network (LAN)
  5. Computer system that provides data or services to other computers
  6. Technology that creates a secure connection over a public network

12 Clues: Unit of data transmitted over a networkDevice that connects multiple computer networks togetherDevice that connects a computer or network to the internetOptics Transmission medium that uses light to transmit dataMeasure of data transfer rate, typically in bits per secondDevice used to connect devices within a local area network (LAN)...

Hi 2023-02-15

Hi crossword puzzle
Across
  1. a network management protocol used to automate the process of configuring devices on IP networks,
  2. serves the original purpose of private networks where data is protected, and resources are shared.
  3. responsible for translating domain names into a specific ip address.
  4. a company that lets you access the internet from home, usually with a monthly subscription.
  5. stands as a major changing point in the development of computer technology
  6. built around a single, central server that handles all major management and data processing functions.
  7. a service that helps you stay private online.
  8. A system or a program that requests the activity of one or more other systems or programs, called servers, to accomplish specific tasks.
  9. the arrangement of the elements of communication network.
  10. a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers.
  11. a computer program or device that provides a service to another computer program and its user, also known as the client
  12. a computer network that connects computers within a metropolitan area
  13. a part of a system that, if it fails, will stop the entire system from working.
Down
  1. a type of internet hosting in which the client leases and entire server not shared with anyone else.
  2. a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
  3. a computer that stores web server software and a website's component files.
  4. a global computer network providing a variety of information and communication facilities.
  5. connects devices within a user's immediate area
  6. a device which controls access to separately stored files, as part of a multiuser system
  7. a network of multiple interconnected local area networks (LAN) in a limited geographical area.
  8. typically manages and organization's network.
  9. adress of a given unique resource on the web
  10. the technology that connects your offices, data centers, cloud applications, and cloud storage together.

23 Clues: adress of a given unique resource on the weba service that helps you stay private online.typically manages and organization's network.connects devices within a user's immediate areathe arrangement of the elements of communication network.responsible for translating domain names into a specific ip address....

Networking Baics 2013-03-24

Networking Baics crossword puzzle
Across
  1. a scalable topology that includes the uses of “roots”
  2. topology that allows only one system to send information at a time
  3. the principle data routes creating the framework of the internet
  4. common connector style on a twisted pair wiring system
  5. transmits network data to only intended recipient gives all users same bandwidth
  6. any connection point on a network
  7. a computer that provides shared resources to users on a network
  8. a software or hardware based solution to keep a network safe
  9. a site that offers wireless access to the Internet
  10. a network that usually connects many LANS and covers an area the size of a city or district
  11. used between networks using the same protocol and determines the shortest path to destination
  12. network that branches out and covers a large area such as a state country or the globe
  13. network confined to a relatively small geographic area such as a room or building
  14. twisted pair networking cable capable of 1 Gbps transfer speeds, uses twisted pair
Down
  1. five common types describes the way networks are connected
  2. creates and reads “packets” of information created by systems in a network
  3. a user in a network with no centralized server each user can act as client or server
  4. allows the wireless exchange of information on a network
  5. the available data communications resources expressed in bits per second
  6. computers or workstations that access resources on the network
  7. topology using a central hub that all devices plug into
  8. a family of networking technologies commonly used to create LANs
  9. redirects signals received from network components to other systems
  10. a network used for communications between personal devices and the Internet
  11. unreliable topology that is easy to implement for small networks but hard to troubleshoot
  12. the distance one can be from the source of a hotspot

26 Clues: any connection point on a networka site that offers wireless access to the Internetthe distance one can be from the source of a hotspota scalable topology that includes the uses of “roots”common connector style on a twisted pair wiring systemtopology using a central hub that all devices plug into...

IT Profession 2023-10-02

IT Profession crossword puzzle
Across
  1. Who collects, processes, and analyzes data to provide insights and support decisionmaking?
  2. Who combines software development and IT operations to improve the software delivery process?
  3. Who specializes in securing computer networks and data against cyber threats?
  4. Who focuses on creating userfriendly and visually appealing interfaces for software and websites?
  5. Who manages and maintains an organization's computer systems and networks?
  6. Who evaluates software for defects and ensures it meets quality standards?
  7. Who develops algorithms and models for artificial intelligence and machine learning applications?
  8. Who analyzes business processes and designs IT systems to improve efficiency and productivity?
  9. Who specializes in the design, implementation, and management of cloud computing solutions?
  10. Who protects computer systems and data from security breaches and cyberattacks?
  11. Who leads and coordinates IT projects, ensuring they are completed on time and within budget?
  12. Who creates applications specifically for mobile devices, such as smartphones and tablets?
  13. Who oversees the storage, organization, and security of databases?
  14. Who writes and tests code to create software applications and systems?
  15. Who educates individuals or employees on using IT systems and software effectively?
Down
  1. Who analyzes and interprets complex data to extract valuable insights and make datadriven decisions?
  2. Who implements and manages integrated software systems for business processes?
  3. Who designs, implements, and manages computer networks for data communication?
  4. Who assesses an organization's IT systems and practices to ensure compliance and security?
  5. Who designs, develops, and tests software solutions for specific purposes?
  6. Who provides technical assistance and support to endusers and resolves ITrelated issues?
  7. Who identifies business needs and uses technology to find solutions to business problems?
  8. Developer Who works on blockchain technology to create secure and decentralized applications?
  9. Who designs and creates websites, web applications, and user interfaces?
  10. Who offers expert advice and solutions to organizations for their ITrelated challenges?

25 Clues: Who oversees the storage, organization, and security of databases?Who writes and tests code to create software applications and systems?Who designs and creates websites, web applications, and user interfaces?Who designs, develops, and tests software solutions for specific purposes?...

ACTIVITY #1: Crossword Puzzle 2024-04-30

ACTIVITY #1: Crossword Puzzle crossword puzzle
Across
  1. Trail of digital activities left behind by a user.
  2. Secret phrase for access control.
  3. Deliberate exploitation of computer systems or networks.
  4. Interconnected computers or devices.
  5. Right to control personal information.
  6. Hidden part of the internet not indexed by search engines.
  7. Writing instructions for computers.
  8. Main webpage of a website.
  9. Unsolicited or unwanted emails or messages.
  10. Simulation of human intelligence by machines.
  11. Platforms for sharing content and connecting with others.
  12. Legal protection of creative works.
  13. Document displayed on the internet.
  14. Fraudulent attempt to obtain sensitive information.
  15. Software designed for a specific purpose or task.
  16. Distributed ledger technology for secure and transparent transactions.
  17. Malicious software.
  18. Verifying the identity of a user.
  19. Physical components of a computer system.
  20. Self-replicating program that spreads and harms systems.
  21. Precautions to protect against online threats.
Down
  1. Knowledge or data.
  2. Responsible use of technology and the internet.
  3. Transfer data from a remote system to a local device.
  4. Criminal activities conducted online.
  5. Encoding data for secure transmission.
  6. Creating software using programming languages.
  7. Harassment or intimidation online.
  8. Exchange of information or messages.
  9. Protection against threats.
  10. Software for accessing and viewing websites.
  11. Unauthorized use of someone's personal information.
  12. Ability to analyze and evaluate media content critically.
  13. Collection of related web pages.
  14. Buying and selling goods or services online.
  15. Programs and applications for computers.
  16. Electronic device for processing data.
  17. Graphical user interface on a computer.
  18. Legal regulations governing online activities.
  19. Legal principle allowing limited use of copyrighted material.
  20. Individuals who gain unauthorized access to systems or networks.
  21. Transfer data from a local device to a remote system.
  22. Relating to electronic technology.
  23. Reference or connection to another webpage or resource.
  24. Reference or connection to another webpage or resource (repeated).
  25. Information presented on the internet.
  26. Information in digital form.
  27. Criminal activities conducted online.
  28. Device for forwarding data packets between computer networks.
  29. Global network connecting computers and devices.

50 Clues: Knowledge or data.Malicious software.Main webpage of a website.Protection against threats.Information in digital form.Collection of related web pages.Secret phrase for access control.Verifying the identity of a user.Harassment or intimidation online.Relating to electronic technology.Writing instructions for computers....

ACTIVITY #1: Crossword Puzzle 2024-04-30

ACTIVITY #1: Crossword Puzzle crossword puzzle
Across
  1. Distributed ledger technology for secure and transparent transactions.
  2. Protection against threats.
  3. Buying and selling goods or services online.
  4. Software designed for a specific purpose or task.
  5. Physical components of a computer system.
  6. Legal regulations governing online activities.
  7. Transfer data from a remote system to a local device.
  8. Unauthorized use of someone's personal information.
  9. Programs and applications for computers.
  10. Verifying the identity of a user.
  11. Creating software using programming languages.
  12. Software for accessing and viewing websites.
  13. Document displayed on the internet.
  14. Collection of related web pages.
  15. Simulation of human intelligence by machines.
  16. Main webpage of a website.
  17. Unsolicited or unwanted emails or messages.
  18. Legal protection of creative works.
  19. Writing instructions for computers.
  20. Exchange of information or messages.
  21. Global network connecting computers and devices.
Down
  1. Hidden part of the internet not indexed by search engines.
  2. Harassment or intimidation online.
  3. Individuals who gain unauthorized access to systems or networks.
  4. Malicious software.
  5. Graphical user interface on a computer.
  6. Trail of digital activities left behind by a user.
  7. Responsible use of technology and the internet.
  8. Fraudulent attempt to obtain sensitive information.
  9. Transfer data from a local device to a remote system.
  10. Criminal activities conducted online.
  11. Information presented on the internet.
  12. Interconnected computers or devices.
  13. Deliberate exploitation of computer systems or networks.
  14. Knowledge or data.
  15. Device for forwarding data packets between computer networks.
  16. Criminal activities conducted online.
  17. Precautions to protect against online threats.
  18. Legal principle allowing limited use of copyrighted material.
  19. Electronic device for processing data.
  20. Right to control personal information.
  21. Reference or connection to another webpage or resource (repeated).
  22. Ability to analyze and evaluate media content critically.
  23. Platforms for sharing content and connecting with others.
  24. Reference or connection to another webpage or resource.
  25. Encoding data for secure transmission.
  26. Relating to electronic technology.
  27. Secret phrase for access control.
  28. Information in digital form.
  29. Self-replicating program that spreads and harms systems.

50 Clues: Knowledge or data.Malicious software.Main webpage of a website.Protection against threats.Information in digital form.Collection of related web pages.Verifying the identity of a user.Secret phrase for access control.Harassment or intimidation online.Relating to electronic technology.Document displayed on the internet....

Crossword Puzzle 2024-04-30

Crossword Puzzle crossword puzzle
Across
  1. Trail of digital activities left behind by a user.
  2. Protection against threats.
  3. Simulation of human intelligence by machines.
  4. Device for forwarding data packets between computer networks.
  5. Responsible use of technology and the internet.
  6. Physical components of a computer system.
  7. Individuals who gain unauthorized access to systems or networks.
  8. Exchange of information or messages.
  9. Distributed ledger technology for secure and transparent transactions.
  10. Collection of related web pages.
  11. Buying and selling goods or services online.
  12. Deliberate exploitation of computer systems or networks.
  13. Reference or connection to another webpage or resource (repeated).
  14. Malicious software.
  15. Legal regulations governing online activities.
  16. Ability to analyze and evaluate media content critically.
  17. Fraudulent attempt to obtain sensitive information.
  18. Harassment or intimidation online.
  19. Information presented on the internet.
  20. Interconnected computers or devices.
Down
  1. Criminal activities conducted online.
  2. Hidden part of the internet not indexed by search engines.
  3. Transfer data from a remote system to a local device.
  4. Knowledge or data.
  5. Electronic device for processing data.
  6. Criminal activities conducted online.
  7. Programs and applications for computers.
  8. Secret phrase for access control.
  9. Platforms for sharing content and connecting with others.
  10. Relating to electronic technology.
  11. Reference or connection to another webpage or resource.
  12. Encoding data for secure transmission.
  13. Unsolicited or unwanted emails or messages.
  14. Right to control personal information.
  15. Document displayed on the internet.
  16. Verifying the identity of a user.
  17. Writing instructions for computers.
  18. Main webpage of a website.
  19. Graphical user interface on a computer.
  20. Legal principle allowing limited use of copyrighted material.
  21. Self-replicating program that spreads and harms systems.
  22. Transfer data from a local device to a remote system.
  23. Creating software using programming languages.
  24. Software designed for a specific purpose or task.
  25. Software for accessing and viewing websites.
  26. Legal protection of creative works.
  27. Precautions to protect against online threats.
  28. Unauthorized use of someone's personal information.
  29. Global network connecting computers and devices.
  30. Information in digital form.

50 Clues: Knowledge or data.Malicious software.Main webpage of a website.Protection against threats.Information in digital form.Collection of related web pages.Secret phrase for access control.Verifying the identity of a user.Relating to electronic technology.Harassment or intimidation online.Document displayed on the internet....

4.1 Explain the importance of basic network security concepts 2025-09-03

4.1 Explain the importance of basic network security concepts crossword puzzle
Across
  1. Regulation for protecting personal data in the EU
  2. Industrial devices connected to networks
  3. Weakness that could be exploited
  4. Physical method to secure rooms or racks
  5. Review to ensure policies and controls are followed
  6. Authentication that changes codes at regular intervals
  7. Digital proof of identity used in secure communication
  8. Single login grants access to multiple systems
  9. Standard for exchanging authentication data
  10. Device used for physical monitoring and security
  11. Technology used to control industrial equipment
  12. Standard for securing payment card information
  13. Refers to data moving across a network
  14. Process of verifying who a user is
  15. Centralized AAA protocol for network access
  16. Decoy system to attract attackers
  17. Potential danger to systems or data
  18. Security model of confidentiality, integrity, availability
  19. Group of honeypots working together
  20. Protects data by converting it into unreadable form
  21. Separate network for visitors with limited access
Down
  1. Assigning permissions based on a user’s job function
  2. Likelihood of a threat exploiting a vulnerability
  3. Restricts access based on physical location
  4. Code or method used to take advantage of a weakness
  5. Separating networks for security and performance
  6. Determines what resources a user is allowed to access
  7. Everyday smart devices connected to networks
  8. System for monitoring and controlling industrial processes
  9. Certificate created and trusted by its own issuer
  10. Industrial control system for automation and management
  11. Requirement that data stays within a certain region
  12. Principle of granting minimum necessary permissions
  13. Framework of CAs, certs, and keys for encryption
  14. Requires two or more factors for authentication
  15. System of policies and tools for identity management
  16. Directory protocol often used for authentication
  17. Cisco protocol for centralized authentication
  18. Refers to data stored on a device or disk
  19. Policy allowing employees to use personal devices

40 Clues: Weakness that could be exploitedDecoy system to attract attackersProcess of verifying who a user isPotential danger to systems or dataGroup of honeypots working togetherRefers to data moving across a networkIndustrial devices connected to networksPhysical method to secure rooms or racksRefers to data stored on a device or disk...

Las redes sociales 2023-10-31

Las redes sociales crossword puzzle
Across
  1. unknown
  2. locate
  3. advantages
  4. profile
  5. update
  6. they have written (2 palabras)
  7. recipient
  8. reliability
  9. fingerprint
  10. upload videos
  11. social networks/media
  12. risks
  13. password
  14. to check
Down
  1. dangers
  2. you informal have said (2 palabras)
  3. la totalidad
  4. account
  5. to quote
  6. alarming figures (2 palabras)
  7. label
  8. solutions
  9. benefit
  10. user
  11. trace
  12. link
  13. I have seen (2 palabras)
  14. download videos
  15. request
  16. contain

30 Clues: userlinklabeltraceriskslocateupdatedangersaccountunknownprofilebenefitrequestcontainto quotepasswordto checksolutionsrecipientadvantagesreliabilityfingerprintla totalidadupload videosdownload videossocial networks/mediaI have seen (2 palabras)alarming figures (2 palabras)they have written (2 palabras)you informal have said (2 palabras)

Network Concepts and Cyber Ethics 2025-06-03

Network Concepts and Cyber Ethics crossword puzzle
Across
  1. collects data.
  2. Area Network.
  3. data for security.
  4. software.
  5. identifier for a device on a network.
  6. that forwards data packets between networks.
  7. for communication between devices.
  8. system that controls traffic.
  9. emails to steal data.
  10. system access.
Down
  1. networking method.
  2. network technology
  3. bullying.
  4. that provides services or data.
  5. creative work.
  6. data transfer rate.
  7. to access accounts securely.
  8. email.
  9. remote access method.
  10. to keep data secure.

20 Clues: email.bullying.software.Area Network.collects data.creative work.system access.networking method.network technologydata for security.data transfer rate.to keep data secure.remote access method.emails to steal data.to access accounts securely.system that controls traffic.that provides services or data.for communication between devices....

ทดสอบเย่ๆ 2026-03-21

ทดสอบเย่ๆ crossword puzzle
Across
  1. ปริมาณที่ใช้วัดความไร้ระเบียบของระบบ ตามกฎข้อที่สองของอุณหพลศาสตร์ ปริมาณนี้ของเอกภพจะเพิ่มขึ้นเสมอ
  2. กระบวนการตายของเซลล์ที่ถูกโปรแกรมไว้ล่วงหน้าอย่างเป็นระเบียบเพื่อรักษาสมดุลของเนื้อเยื่อ
  3. วัตถุทางคณิตศาสตร์ที่เป็นนัยทั่วไปของสเกลาร์และเวกเตอร์ เป็นหัวใจสำคัญในทฤษฎีสัมพัทธภาพทั่วไปของไอน์สไตน์
  4. ฟังก์ชันที่อธิบายพลศาสตร์ของระบบ หาได้จากผลต่างระหว่างพลังงานจลน์และพลังงานศักย์ (L = T - V)
  5. ฟังก์ชันต่อเนื่องที่มีฟังก์ชันผกผันต่อเนื่อง ใช้ระบุว่าปริภูมิเชิงทอพอโลยีสองปริภูมิมีความสมมูลกัน (เช่น โดนัทกับแก้วกาแฟ)
  6. ชื่อสมการคลื่นที่เป็นรากฐานของกลศาสตร์ควอนตัม อธิบายการเปลี่ยนแปลงสถานะของระบบควอนตัมตามเวลา
  7. ปริภูมิทางทอพอโลยีที่ในบริเวณใกล้เคียงจุดใดๆ มีลักษณะคล้ายกับปริภูมิยูคลิด (Euclidean space)
  8. กระบวนการทางฟิสิกส์ดาราศาสตร์ที่สร้างนิวเคลียสของธาตุใหม่จากนิวคลีออนที่มีอยู่เดิม มักเกิดขึ้นในใจกลางดาวฤกษ์
Down
  1. ปรากฏการณ์ทางควอนตัมที่สถานะของอนุภาคสองตัวมีความเกี่ยวข้องกันจนอธิบายแยกจากกันไม่ได้แม้จะอยู่ห่างกันแค่ไหน
  2. อัลกอริทึมหลักที่ใช้ฝึกฝนโครงข่ายประสาทเทียม (Neural Networks) โดยการคำนวณเกรเดียนต์ของฟังก์ชันความสูญเสียแบบย้อนกลับ
  3. ตัวดำเนินการที่สอดคล้องกับพลังงานรวมของระบบในกลศาสตร์ควอนตัมหรือระบบคลาสสิก (H = T + V)
  4. อนุภาคที่มีสปินเป็นครึ่งจำนวนเต็ม และต้องปฏิบัติตามหลักการกีดกันของเพาลี (Pauli Exclusion Principle)
  5. อัลกอริทึมชื่อดังในวิชาวิทยาการคอมพิวเตอร์ สำหรับหาเส้นทางที่สั้นที่สุดจากจุดเริ่มต้นไปยังจุดอื่นๆ ในกราฟ
  6. ฟังก์ชันแบบหนึ่งต่อหนึ่งและทั่วถึงที่คงสมบัติทางโครงสร้างระหว่างโครงสร้างทางพีชคณิตสองระบบ
  7. แบบจำลองเชิงคณิตศาสตร์ของการคำนวณที่ใช้เทปอนันต์และหัวอ่าน/เขียน เป็นรากฐานของทฤษฎีการคำนวณ
  8. กระบวนการที่มีลักษณะสุ่มหรือไม่สามารถพยากรณ์ได้อย่างแม่นยำล่วงหน้า มักใช้ตัวแบบความน่าจะเป็นมาอธิบาย
  9. โมเลกุลของ RNA ที่มีความสามารถในการเร่งปฏิกิริยาเคมีได้คล้ายกับเอนไซม์ที่เป็นโปรตีน
  10. สมบัติทางเคมีหรือฟิสิกส์ของโมเลกุลที่ไม่สามารถซ้อนทับกับภาพสะท้อนในกระจกของตัวเองได้สนิท (ความเป็นมือซ้าย-ขวา)
  11. สเกลาร์ \lambda ที่สอดคล้องกับสมการ Ax = \lambda x สำหรับเมทริกซ์จัตุรัส A และเวกเตอร์ที่ไม่ใช่ศูนย์ x
  12. เจ้าของหลักความไม่แน่นอนที่ระบุว่าเราไม่สามารถวัดตำแหน่งและโมเมนตัมของอนุภาคให้แม่นยำพร้อมกันได้

20 Clues: โมเลกุลของ RNA ที่มีความสามารถในการเร่งปฏิกิริยาเคมีได้คล้ายกับเอนไซม์ที่เป็นโปรตีนตัวดำเนินการที่สอดคล้องกับพลังงานรวมของระบบในกลศาสตร์ควอนตัมหรือระบบคลาสสิก (H = T + V)กระบวนการตายของเซลล์ที่ถูกโปรแกรมไว้ล่วงหน้าอย่างเป็นระเบียบเพื่อรักษาสมดุลของเนื้อเยื่อฟังก์ชันแบบหนึ่งต่อหนึ่งและทั่วถึงที่คงสมบัติทางโครงสร้างระหว่างโครงสร้างทางพีชคณิตสองระบบ...

Capítulo 5-La tecnología 2023-11-04

Capítulo 5-La tecnología crossword puzzle
Across
  1. blog(m)
  2. app(f)
  3. folder(f)
  4. password(f)
  5. e-reader(m)
  6. file(m)
Down
  1. social networks(f)
  2. portátil laptop(f)
  3. keyboard(m)
  4. electrónico email(m)
  5. “at” sign @ (f)
  6. tablet(f)
  7. streaming(f)

13 Clues: app(f)blog(m)file(m)folder(f)tablet(f)keyboard(m)password(f)e-reader(m)streaming(f)“at” sign @ (f)social networks(f)portátil laptop(f)electrónico email(m)

Unit Vocab 2021-09-28

Unit Vocab crossword puzzle
Across
  1. a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures.
  2. any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices
  3. A hacker that violates computer security for their own profit or gain
  4. the process of recognizing a user's identity'
  5. a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
  6. an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol.
  7. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected"
Down
  1. parts of the Internet not fully accessible through standard search engines
  2. measurement and statistical analysis of people's unique physical and behavioral characteristics
  3. a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities
  4. people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.
  5. a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means
  6. the gaining of unauthorized access to data in a system or computer.
  7. the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  8. a social or political activist act that is carried out by breaking into and wreaking havoc on a secure computer system

15 Clues: the process of recognizing a user's identity'the gaining of unauthorized access to data in a system or computer.A hacker that violates computer security for their own profit or gainparts of the Internet not fully accessible through standard search enginesmeasurement and statistical analysis of people's unique physical and behavioral characteristics...

Computer Hardware 2022-09-30

Computer Hardware crossword puzzle
Across
  1. a combined device for modulation and demodulation
  2. turn on and off
  3. passes information between two or more packet-switched computer networks
  4. hardware device or configured node on a local area network
  5. computers linked together to form a network in a circumscribed location
Down
  1. nodes are linked together, branching off other devices or nodes.
  2. a local area network
  3. a computer network that connects smaller networks.
  4. network which is designed to block unauthorized access
  5. a circuit board or chip, which is installed on a computer so it can connect to a network.

10 Clues: turn on and offa local area networka combined device for modulation and demodulationa computer network that connects smaller networks.network which is designed to block unauthorized accesshardware device or configured node on a local area networknodes are linked together, branching off other devices or nodes....

ttt 2022-08-16

ttt crossword puzzle
Across
  1. a network element
  2. connects a LAN to a WAN
  3. an example of a wireless network medium
  4. filters signals between networks
Down
  1. receives a digital signal and regenerates the signal along the next leg of the medium.
  2. a powerful data terminal equipment in a network
  3. an example of a network operating system
  4. joins together two networks that use different protocols

8 Clues: a network elementconnects a LAN to a WANfilters signals between networksan example of a wireless network mediuman example of a network operating systema powerful data terminal equipment in a networkjoins together two networks that use different protocolsreceives a digital signal and regenerates the signal along the next leg of the medium.

Environmental Stress 2021-02-19

Environmental Stress crossword puzzle
Across
  1. Bring in sunlight penetration and views.
  2. Surrounding in which a person completes tasks.
  3. Negatively related to telecommuting, the rate at which employees leave.
  4. Type of element found to relieve job stress (i.e., trees, plants, flowers, etc.)
  5. 'Equals control.' Gives one control over breaks, rules, environments, etc.
  6. Self-governance, independent of one's owns actions and behaviors, increases with telecommunication.
  7. The type of learning we are engaging in, far away from each other.
  8. Telecommuting is positively/negatively related to job performance (Hypothesis 5).
Down
  1. Amount of light in an environment.
  2. Most common device people use to complete their telecommuting tasks.
  3. Most common location to work other than the primary workplace.
  4. Global computer networks linked to other networks and provide information.
  5. Which gender experiences lower sunlight penetration and more negative outcomes.
  6. Term for alternative work arrangement, working somewhere other than the primary workplace.
  7. Telecommuting is positively/negatively related to work-family conflict (Hypothesis 2).

15 Clues: Amount of light in an environment.Bring in sunlight penetration and views.Surrounding in which a person completes tasks.Most common location to work other than the primary workplace.The type of learning we are engaging in, far away from each other.Most common device people use to complete their telecommuting tasks....

R&T English Crossword 2024-02-21

R&T English Crossword crossword puzzle
Across
  1. Acronym for the biggest form of network
  2. The variation of latency
  3. The equipement used to connect different networks
  4. An equipement that send anything it receive on all of its ports
  5. The delay before a transfer of data begins
  6. Group of technologies that use telephone lines to transmit digital data
  7. The maximum rate of data transfer across a given path
  8. Most used protocol on the Data-Link layer
Down
  1. An equipement that distribute the packets only to their destination
  2. A device or computer program that encodes/decodes a signal or data stream
  3. Usually placed at the entrance of a network to protect it from intrusion
  4. A device used to transmit or receive radio or television signals
  5. A part of a computer network which interconnects networks
  6. A protocol of the fourth layer that doesn't retrensmit lost packets
  7. The smallest addressable unit of memory for a computer

15 Clues: The variation of latencyAcronym for the biggest form of networkMost used protocol on the Data-Link layerThe delay before a transfer of data beginsThe equipement used to connect different networksThe maximum rate of data transfer across a given pathThe smallest addressable unit of memory for a computer...

Crossword 2023-05-02

Crossword crossword puzzle
Across
  1. A device that coverts digital signals in a form that can pass through a transmission medium
  2. Enables users locally and worldwide to send electronic messages to one person or to a group and to receive messages from others
  3. Determines the volume of data that can be transmitted in a given time
  4. The most popular means of communicating data wirelessly within a fixed location
  5. Acts as an interface between two networks
  6. A standard developed by a group of electronics manufacturers that allows any sort of electronic equipment to automatically make their own connections without wires, cables or any direct action from a user
  7. Usually referred to as webcasting
  8. A programming language that you can use to create web pages
  9. An interface that enables communication between two different networks
Down
  1. This is a type of threat that originates outside the organisation or institution with the intention of corrupting or stealing confidential information of that organisation
  2. A hardware device that allows a computer to send and receive data over a telephone line or a cable or satellite connection
  3. A network of networks that connects computers worldwide via a huge set of telecommunications links
  4. A device that connects multiple devices on the same network to facilitate communication among the devices
  5. A set of rules that define how computers interact or communicate with each other
  6. A group of two or more computers linked together so that they can share resources and can communicate with one another

15 Clues: Usually referred to as webcastingActs as an interface between two networksA programming language that you can use to create web pagesDetermines the volume of data that can be transmitted in a given timeAn interface that enables communication between two different networks...

Network Hunting 2023-12-26

Network Hunting crossword puzzle
Across
  1. Optics Transmission medium that uses light to transmit data
  2. Device that connects a computer or network to the internet
  3. Security system that monitors and controls incoming and outgoing network traffic
  4. System responsible for translating domain names into IP addresses
  5. Commonly used technology for wired connections in local networks
  6. Unit of data transmitted over a network
Down
  1. Measure of data transfer rate, typically in bits per second
  2. Device that connects multiple computer networks together
  3. Computer or software that requests and uses services provided by another computer
  4. Device used to connect devices within a local area network (LAN)
  5. Computer system that provides data or services to other computers
  6. Technology that creates a secure connection over a public network

12 Clues: Unit of data transmitted over a networkDevice that connects multiple computer networks togetherDevice that connects a computer or network to the internetOptics Transmission medium that uses light to transmit dataMeasure of data transfer rate, typically in bits per secondDevice used to connect devices within a local area network (LAN)...

Desiree Delgado internet crossword puzzle 2013-03-26

Desiree Delgado internet crossword puzzle crossword puzzle
Across
  1. Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
  2. An unauthorized person who secretly gains access to computer files.
  3. a piece of writing that has been copied from someone else and is presented as being your own work
  4. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  5. To renew or revitalize; To reload a webpage on the internet
Down
  1. – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
  2. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  3. A bully who operates online, in cyberspace; To bully online
  4. – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
  5. a reference to a published or unpublished source (not always the original source).
  6. NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  7. software used to view various kinds of Internet resources found on the Web.

12 Clues: A bully who operates online, in cyberspace; To bully onlineTo renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer files.software used to view various kinds of Internet resources found on the Web.a reference to a published or unpublished source (not always the original source)....