networks Crossword Puzzles
Network Requirements Crossword 2023-09-05
Across
- Network Attach Storage
- a set of rules that need to be followed
- internet protocol
- network interface card
- a hardware device that acts as a "fence" between two networks
- a hardware device used at the physical layer to connect multiple devices in the network
- a device that connects two or more packet-switched networks
- an electronic device that relays a transmitted signal
- a device that connects two LANs
Down
- a computer network security system that restricts internet traffic
- a piece of networking hardware that links multiple devices together
- Network Operating System
- Local Area Network
- the maximum capacity of a wired or wireless communications link to deliver data via a network connection
- a computer program or device that provides a service to another computer program and its user
- connects LAN to WAN
- a high-speed internet connection
- any computer or other device connected to a network that sends, receives, or redistributes data
- computers that access and use the network and shared network resources
- a cord, connector or plug
20 Clues: internet protocol • Local Area Network • connects LAN to WAN • Network Attach Storage • network interface card • Network Operating System • a cord, connector or plug • a device that connects two LANs • a high-speed internet connection • a set of rules that need to be followed • an electronic device that relays a transmitted signal • ...
crossword 2024-10-07
Across
- - A computer that requests resources from a server.
- - A private network that connects devices in a small area.
- - A computer that provides services to other computers on the network.
- - A type of network that spans a large geographic area.
- - A set of rules governing the exchange of data between devices.
- - The total capacity of a data transmission system.
- - A device that connects devices within a network.
- - A collection of computers and devices connected to share resources.
- - A device that connects two different networks.
- - A smaller network within a larger network.
Down
- - A common method for connecting devices in a wired network.
- - A device that monitors and controls incoming and outgoing network traffic.
- - The amount of data transmitted in a given time.
- - A secure connection over the internet.
- - A device that forwards data packets between computer networks.
- - The arrangement of different elements in a network.
- - A machine that provides resources to other machines.
- - A way to connect devices without wires.
- - Data formatted for transmission over a network.
- Address - The address assigned to a device on a network.
20 Clues: - A secure connection over the internet. • - A way to connect devices without wires. • - A smaller network within a larger network. • - A device that connects two different networks. • - The amount of data transmitted in a given time. • - Data formatted for transmission over a network. • - A device that connects devices within a network. • ...
Tech Terma 2023-04-26
Across
- Files made by websites you go to
- Connects hardware to processor
- Personal Identifiable Information
- 1 million bytes of data
- hardware or software that has been recently released.
- Read only memory
- A way of scrambling information only authorized parties can understand it
- 8 bits put together
- Ctrl V
- Devices like a printer
- Taking information from somewhere else onto your computer
- Network security device that monitors traffic to and from your network
- Connecting multiple systems together on a local network
- Software made to disrupt a computer network
Down
- Chrome or Safari
- Systems such as Chrome OS, Windows
- Computer that provides service to another computer
- A frequently updated website used for personal commentary or buisnesses
- Worldwide System of Networks
- Computers short term memory
- Ctrl C
- Adress
- Devices like a keyboard or mouse
- A zero or one
- Central processing unit
- Domain name system
- Portable Document Format
- Uniform Resource Locator
- Open Source Software
- Forwards data between computer networks
- Hyper Text Markup Language
- World Wide Web
32 Clues: Ctrl C • Adress • Ctrl V • A zero or one • World Wide Web • Chrome or Safari • Read only memory • Domain name system • 8 bits put together • Open Source Software • Devices like a printer • 1 million bytes of data • Central processing unit • Portable Document Format • Uniform Resource Locator • Hyper Text Markup Language • Computers short term memory • Worldwide System of Networks • ...
saklksdg 2025-03-26
Across
- A globally unique identifier for devices on a network
- A structured collection of data
- The main circuit board of a computer
- A unique address used to identify a website
- A version control system used for software development
- The language used to structure web pages
- A network of computers that share resources and data
- The process of finding and fixing errors in code
- A person who attempts to gain unauthorized access to a system
- A virtual storage solution accessible via the internet
- A collection of web pages under a single name
- A computer program designed to interact with users in a conversation
Down
- A program used to detect and remove malware
- The process of converting plain text into a secure format
- A type of malicious software that encrypts files for ransom
- A technology that enables wireless communication over short distances
- An attack that prevents access to a system by overwhelming it
- A worldwide system of interconnected networks
- A protective barrier for networks against cyber threats
- The basic software that manages hardware and software resources
20 Clues: A structured collection of data • The main circuit board of a computer • The language used to structure web pages • A program used to detect and remove malware • A unique address used to identify a website • A worldwide system of interconnected networks • A collection of web pages under a single name • The process of finding and fixing errors in code • ...
Cybersecurity Crossword 2025-05-14
Across
- Software designed to detect and destroy computer viruses.
- Potential dangers or malicious activities found on the internet.
- Synthetic media replacing a person's likeness using AI.
- A network security system controlling traffic based on rules.
- A security process using two different verification factors.
- Manipulating people to divulge info or perform actions.
- Extends a private network across public ones for secure data transfer.
- Attempts to gain unauthorized access to damage or disrupt systems.
- Trustworthy and accurate sources of information.
Down
- Protecting computer systems/networks from theft, damage, or disruption.
- Connected to the internet.
- Bullying that occurs over digital devices like phones and computers.
- Potential dangers or hazards.
- The trail of data you create while using the Internet.
- Individuals who exploit weaknesses in computer systems or networks.
- Software intended to damage or disable computers and systems.
- Encoding info so only authorized parties can understand it.
- Data that can be used to identify an individual.
- A strong and unique combination to protect online accounts.
- Online fraud where attackers impersonate to trick you into revealing info.
20 Clues: Connected to the internet. • Potential dangers or hazards. • Data that can be used to identify an individual. • Trustworthy and accurate sources of information. • The trail of data you create while using the Internet. • Synthetic media replacing a person's likeness using AI. • Manipulating people to divulge info or perform actions. • ...
Extra task 2023-04-12
Across
- Develops algorithms and computer programs that can perform tasks requiring human intelligence
- Coordinates the deployment and operation of software applications
- Develops applications that incorporate computer-generated perceptual information
- Designs and manages cloud-based systems and services
- Analyzes and optimizes digital marketing campaigns
- Analyzes and interprets complex digital data sets to extract insights
- Designs and builds new types of computers based on quantum mechanics
- Develops software for both client and server-side applications
- Designs and optimizes the experience users have when interacting with digital products
- Designs and manages networks of physical devices connected to the internet
Down
- Creates secure digital ledgers for recording transactions
- Designs the overall structure of information systems
- Creates applications for mobile devices
- Designs, builds, and operates robots for a variety of applications
- Protects computer systems and networks from theft or damage
15 Clues: Creates applications for mobile devices • Analyzes and optimizes digital marketing campaigns • Designs the overall structure of information systems • Designs and manages cloud-based systems and services • Creates secure digital ledgers for recording transactions • Protects computer systems and networks from theft or damage • ...
CNN 2023-11-25
Across
- Model with high bias and low variance
- Activation function used in the output layer for classification
- Categorical Loss function in CNN
- Training algorithm for updating weights in a neural network
- Google's pretrained ML model
- Popular activation function introducing non-linearity
- Technique of creating new training examples by applying transformations
- Another name for Kernel to reduce dimensions in CNNs
- A type of recurrent neural network with memory cell
- A type of Neural Network handling sequential data
- Optimization algorithm using one example at a time
- Issue where gradients become very small during training
- Adapts a pre-trained model for a new task
- Optimization algorithm that accumulates past gradients to accelerate learning
- A set of data samples used in one iteration of training
- Process of selecting and representing relevant information from input data
- Controls the size of steps in gradient descent
- Strategy for setting initial values in a neural network
- Optimization algorithm for finding the minimum
- Technique to prevent overfitting nodes in neural networks
- Adaptive Linear Neuron, a single-layer neural network
- Determines the output of a node in a neural network
Down
- Configuration setting parameters to the model
- Non-linear transformation applied to a neuron's output
- Key operation in Convolutional Neural Networks (CNNs)
- Activation function similar to sigmoid, ranges from -1 to 1
- a type of recurrent neural network cell with memory like operation
- No. of trainable parameters in GRU
- Simplest form of a neural network, single-layer binary classifier
- Also known as recall or TPR
- Table used to assess the performance of a classification model
- A pretrained Model with 13 CNN and 3 Dense Layers
- Model performs well on training data but poorly on new data
- No. of trainable parameters in LSTM
- a CNN Layer where dimensions of the input are reduced
- Neural network designed for sequential data
- Error Square algorithm for updating weights in neural networks
- Layer functioning as FCNN in VGG16
- Basic building block of a neural network
- Additional parameter representing an offset in neural networks
- One complete pass through the entire training dataset
- Technique to prevent exploding gradients in RNN
- Architecture where information flows in one direction
- Adding extra pixels or values around the edges of an image in CNN
- Evaluation of a model on a separate dataset to tune hyperparameters
- An unsupervised Learning rule
- Standard version of a neural network or algorithm
47 Clues: Also known as recall or TPR • Google's pretrained ML model • An unsupervised Learning rule • Categorical Loss function in CNN • No. of trainable parameters in GRU • Layer functioning as FCNN in VGG16 • No. of trainable parameters in LSTM • Model with high bias and low variance • Basic building block of a neural network • Adapts a pre-trained model for a new task • ...
crossword 2025-02-16
Across
- - A unit of digital storage equal to 1,024 gigabytes.
- - A reference in a document that connects to another location or file.
- - Increasing a computer component’s speed beyond its specifications.
- - A cryptographic technique that uses quantum mechanics.
- - An organized collection of structured information or data.
- - A global network connecting millions of devices.
- - A cyber attack that tricks users into revealing personal information.
- - The maximum rate of data transfer across a network.
- - A security system that monitors and controls network traffic.
- - A temporary storage area for frequently accessed data.
- - Software with publicly available source code.
- - A type of AI that mimics human intelligence.
- - Temporary memory used for quick access.
- - The process of replacing sensitive data with unique identifiers.
- - A digital storage space in the cloud.
- - Data that describes other data.
- - A device that connects networks.
- - A wireless networking technology.
- - A step-by-step procedure for solving a problem.
- - The delivery of computing services over the internet.
- - Unwanted or unsolicited messages, typically emails.
- - A self-replicating computer program.
- - The smallest unit of data in computing.
- - A secret code used for security.
- - The smallest unit of a digital image.
Down
- - A decentralized ledger technology used in cryptocurrencies.
- - A program that translates source code into machine code.
- - Permanent software programmed into a hardware device.
- - An error in programming.
- - The manipulation of matter on an atomic scale.
- - A software testing method to verify previous functionality.
- - A set of rules for data transmission.
- - Software that harms a system.
- - The simulation of human intelligence in machines.
- - The delay before data is transferred over a network.
- - A technology that overlays digital content on the real world.
- - A subset of machine learning using neural networks.
- - The process of creating a virtual version of computing resources, such as servers or storage.
- - The practice of protecting systems and networks from digital attacks.
- - The part of a system that users interact with.
- - The process of converting information into a secure format.
- - A type of malware that spreads across networks automatically.
- - A program that performs a specific task.
- - A memory management technique using disk storage.
- - The process of converting analog data to digital.
- - A common wired networking technology.
- - A tool used to test and fix errors in software.
- - The physical parts of a computer.
- - A collection of tools for software development.
- - The brain of a computer.
50 Clues: - An error in programming. • - The brain of a computer. • - Software that harms a system. • - Data that describes other data. • - A device that connects networks. • - A secret code used for security. • - A wireless networking technology. • - The physical parts of a computer. • - A self-replicating computer program. • - A set of rules for data transmission. • ...
Foundations of NN & DL 2025-01-10
Across
- ......... Learning is the subset of machine learning that uses neural networks with multiple layers
- A task of extracting text from images
- A neural network designed for image data
- A popular deep learning framework by Google
- A pretrained NLP model by Google
- A type of neural network for sequential data
- A deep learning model for generating images
Down
- A common activation function used in neural networks
- A mechanism in Transformers for focusing on relevant parts of input
- The simplest type of artificial neural network
- Learning A technique where a pre-trained model is reused for a new task
- A field of study focused on creating intelligent machines
12 Clues: A pretrained NLP model by Google • A task of extracting text from images • A neural network designed for image data • A popular deep learning framework by Google • A deep learning model for generating images • A type of neural network for sequential data • The simplest type of artificial neural network • A common activation function used in neural networks • ...
Communication Tools 2026-02-26
Across
- Messenger, Free mobile app messaging
- Conferencing, A way to bring two or more people in a virtual setting.
- A communication software for virtual video sharing and audio conferencing.
- Messaging, Computer based communication between two users.
- Sites, The no code free website builder.
- Meet, Real time meetings using Google.
Down
- Chat, Direct messaging group owned by Google.
- A way to communicate with people on your phone and see their face.
- Authoring, The process of creating web documents.
- Outlook, Widely used for internet communication
- A way to communicate by delivering messages across computer networks.
- Express, A cloud based program where you can create pdf files.
- A hosted website platform.
- Networking, Ways to use online networks to communicating with people.
14 Clues: A hosted website platform. • Messenger, Free mobile app messaging • Meet, Real time meetings using Google. • Sites, The no code free website builder. • Chat, Direct messaging group owned by Google. • Outlook, Widely used for internet communication • Authoring, The process of creating web documents. • Messaging, Computer based communication between two users. • ...
Computer Network & Computer Topologies 2025-07-26
Across
- A network topology where each device connects to two others, forming a loop.
- A device that connects different networks together, often used to access the internet.
- A topology with each node connected to every other node.
- A common wired technology used in local area networks (LANs).
Down
- A global network that connects millions of private, public, academic, and government networks.
- A network device that connects devices and uses MAC addresses to forward data.
- A device that modulates and demodulates signals for internet access over telephone lines.
- A basic network device that broadcasts data to all connected devices.
8 Clues: A topology with each node connected to every other node. • A common wired technology used in local area networks (LANs). • A basic network device that broadcasts data to all connected devices. • A network topology where each device connects to two others, forming a loop. • A network device that connects devices and uses MAC addresses to forward data. • ...
Types of Network 2024-10-23
Across
- Is short of metropolitan area network.
- Is short for personal area networks
- This is network in a large geographical area
- A group of two or more computers linked together to communicate and share resources.
- One type of network
- Networks are connected by ____________ or by wireless link.
Down
- This is network within a small area
- One advantage of local area network is that it is fast
- Because of network hardware such as _________ can be shared.
- LAN connects the computers so that we can ____________
10 Clues: One type of network • This is network within a small area • Is short for personal area networks • Is short of metropolitan area network. • This is network in a large geographical area • One advantage of local area network is that it is fast • LAN connects the computers so that we can ____________ • Networks are connected by ____________ or by wireless link. • ...
CompTIA Network+ (009) Ch. 4 2025-04-04
Across
- Dynamically assigns IP addresses to devices.
- Routable address used on the internet.
- Provides an IP address when DHCP fails.
- Used to distinguish the network and host portions of an IP address.
- Routes traffic between networks, usually to the internet.
- 128-bit address system for modern internet communication.
Down
- Special IP address used for local testing (127.0.0.1).
- Logical identifier for a device on a network.
- Non-routable address used within internal networks.
- Method for IP address allocation and routing using prefixes.
10 Clues: Routable address used on the internet. • Provides an IP address when DHCP fails. • Dynamically assigns IP addresses to devices. • Logical identifier for a device on a network. • Non-routable address used within internal networks. • Special IP address used for local testing (127.0.0.1). • Routes traffic between networks, usually to the internet. • ...
computing 2016-02-03
Across
- short for "favourites icon"
- it carries signals to local or worldwide networks
- it provides wireless connection to networks.
- short for "malicious hardware"
Down
- allows cameras, music players, phones etc to connect to computers
- it allows users to access other computers, mice etc with their own
- views who bookmarks what websites and puts them on the homepage
- it shares files with other users on other pc's and is good on toast
- lets you get e-mails on a server without having to download it
- megabytes per second
10 Clues: megabytes per second • short for "favourites icon" • short for "malicious hardware" • it provides wireless connection to networks. • it carries signals to local or worldwide networks • lets you get e-mails on a server without having to download it • views who bookmarks what websites and puts them on the homepage • ...
business technology 2026-02-20
Across
- telecommunication in the form of a videoconference.
- tools, machinery, and other durable equipment
- the live exchange of information among people in different locations using telecommunications technology, such as audio, video, or computer networks.
Down
- the use of internet-based technologies, networks, and digital platforms to conduct, manage, and optimize core business processes
- the programs and other operating information used by a computer.
- is a digital service allowing customers to securely manage finances, transfer funds, pay bills, and view transactions in real-time via a bank's website or mobile app.
- networks systems of interconnected electronic components, devices, or circuits that enable data communication, information sharing, and, in some contexts, the transmission of electricity.
- the retention of digital information using technology that records data on physical or virtual media for future access.
- technology the strategic application of information technology, software, hardware, and digital tools to automate, optimize, and manage core business operations
- commercial transactions conducted electronically on the internet
10 Clues: tools, machinery, and other durable equipment • telecommunication in the form of a videoconference. • the programs and other operating information used by a computer. • commercial transactions conducted electronically on the internet • ...
Ed. Tech. Network Operations Crossword 2012-03-26
Across
- a design where all nodes are ran through the switch before going to it's designated location
- provides services to connected network computers
- controls all functions of the network
- rate of data transfer
- joins wired and wirelss networks together
- a network of computers that consists of several smaller networks
- twisted pair of cables that carry signals
Down
- requests services; student computer in lab
- a location that offers wireless internet access
- provides your technology devices internet connections without using a ethernet cable
- connects multiple ethernet devices together to create a single network
- the internet is an example of a ______ network
- a device placed to protect the network from unauthorized access
- a connection plud-in chord that provides internet and/or phone access
- a network of computers that are connected together in a school
15 Clues: rate of data transfer • controls all functions of the network • joins wired and wirelss networks together • twisted pair of cables that carry signals • requests services; student computer in lab • the internet is an example of a ______ network • a location that offers wireless internet access • provides services to connected network computers • ...
Engineering Careers 2026-01-15
Across
- Vaccines
- HVAC Systems
- Air Conditioning
- Mobile Networks
- Man-made Bridges and roads
- Irrigation Systems
- Automation
- Processors (Computers)
- Power Generation
- Process Optimization
- AI Systems
- Cars and robots
Down
- Light bulbs
- Industrial ROBOTS
- Planes and rockets
- DIESEL engines
- NUCLEAR reactors
- Oil Drilling
- OFFICE automation
- X-ray Machines
- LEDs
- APPS or GPS
- Testing systems
- Stethoscopes
- Foundation Design
25 Clues: LEDs • Vaccines • Automation • AI Systems • Light bulbs • APPS or GPS • HVAC Systems • Oil Drilling • Stethoscopes • DIESEL engines • X-ray Machines • Mobile Networks • Testing systems • Cars and robots • Air Conditioning • NUCLEAR reactors • Power Generation • Industrial ROBOTS • OFFICE automation • Foundation Design • Planes and rockets • Irrigation Systems • Process Optimization • Processors (Computers) • ...
Anna Hope: Wake 2026-02-05
Across
- Emotional and social
- Amid hardship
- With past and self
- Shaped by experience
- Through connection
- Backdrop shaping lives
- Honoring the fallen
- Complex and critiqued
- Physical and emotional
- Women’s roles highlighted
Down
- Grief and mourning
- Moral and physical
- Bearing witness
- Among women
- Fragile and persistent
- Support networks
- Emotional and physical wounds
- Cost of service
- Multiple perspectives
- Female protagonist caring for wounded
20 Clues: Among women • Amid hardship • Bearing witness • Cost of service • Support networks • Grief and mourning • Moral and physical • With past and self • Through connection • Honoring the fallen • Emotional and social • Shaped by experience • Multiple perspectives • Complex and critiqued • Fragile and persistent • Backdrop shaping lives • Physical and emotional • Women’s roles highlighted • ...
computer knowledge 2021-03-18
Across
- what is the main app people use to find information
- world wibe web is long for
- a system of interconnecting people is the definition of
- internet service provider is long for
Down
- the thing that you have to turn on to connect to a speaker
- LAN,PAN,MAN,WAN are all networks of computers
- the biggest world wide communication
- allows your phone to get online when you`re away from wifi
- access point is long for
- wireless fidelity is long for
10 Clues: access point is long for • world wibe web is long for • wireless fidelity is long for • the biggest world wide communication • internet service provider is long for • LAN,PAN,MAN,WAN are all networks of computers • what is the main app people use to find information • a system of interconnecting people is the definition of • ...
COSC Part 1 Crossword 2016-02-22
Across
- networks that are geographically close
- composed of HTML tags and multimedia files
- hyper-text markup language
- universal resource locator
- used to view webpages that may contain text, images, videos, and other multimedia
Down
- a related group of networked computers
- a group of information on a compute that can be software programs or data
- unique address given to each computer connected to the internet
- convert the bits a computer outputs into a form that is compatible with the carrier
- networks that are not geographically close
10 Clues: hyper-text markup language • universal resource locator • a related group of networked computers • networks that are geographically close • composed of HTML tags and multimedia files • networks that are not geographically close • unique address given to each computer connected to the internet • a group of information on a compute that can be software programs or data • ...
Technology for Teaching and Learning 1 2023-11-20
Across
- ability to access internet for resources
- type of learning which has no face-to-face interactions
- ability to find, use, evaluate, share content using information technology and internet
- use of technology in education both non-digital and digital
- program control instructions accompanying documentation
Down
- use of digital and communication tools and networks to communicate knowledge-based information
- learning same time, not same place with the help of online technology
- massive networks
- combination of processes& products to apply knowledge
- simultaneous use of media
10 Clues: massive networks • simultaneous use of media • ability to access internet for resources • combination of processes& products to apply knowledge • type of learning which has no face-to-face interactions • program control instructions accompanying documentation • use of technology in education both non-digital and digital • ...
Internet Hardware 2023-01-10
Across
- Method to send information through frequencies.
- Network connecting individual networks.
- Group of 2 or more computers link together.
- Measures bandwidth, number of bits a system can send.
- Provides individuals and organizations access to the internet.
- Method to send information through light.
Down
- Capacity of data transfer in a system.
- Physical or virtual appliance that passes information between two or more packet-switched computer networks.
- Method to send information through ethernet cables.
- Time it takes for a bit to get frim the sender to the receiver.
10 Clues: Capacity of data transfer in a system. • Network connecting individual networks. • Method to send information through light. • Group of 2 or more computers link together. • Method to send information through frequencies. • Method to send information through ethernet cables. • Measures bandwidth, number of bits a system can send. • ...
Unit III - E.Commerce 2025-04-15
Across
- The legal term for guidelines and regulations in online business.
- An architecture type that connects clients and servers.
- Commerce buying and selling over digital networks
- One of the main risks in E-Commerce (hint: security).
- Online payment gateway widely used by individuals and businesses.
Down
- Used for secure online transactions (abbr., 3 letters).
- Diagram a visual representation of business processes.
- Computers, networks, and software that enable E-Commerce.
- An electronic system of transferring money instantly (abbr.).
- A type of money that exists only in digital form.
10 Clues: Commerce buying and selling over digital networks • A type of money that exists only in digital form. • One of the main risks in E-Commerce (hint: security). • Diagram a visual representation of business processes. • An architecture type that connects clients and servers. • Computers, networks, and software that enable E-Commerce. • ...
Memory storage and Networks 2024-05-02
Across
- It is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.
- Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output (I/O) operations.
- A networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
- It is a specific kind of network topology in which all of the various devices in the network are connected to a single cable or line.
- a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.
- It's a type of non-volatile memory that retains its contents even when the power is turned off. It is programmed with data during manufacturing and cannot be easily modified afterward.
- It is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- Secondary storage that has no mechanical components and can access data electronically.
- It is a network contained within a small geographic area, usually within the same building.
- It is a type of network configuration where devices are connected in a circular manner, forming a closed loop.
- It is a numerical label such as 192.0.2.1 that is assigned to a device connected to a computer network that uses the Internet Protocol for communication.
Down
- It's a type of volatile computer memory. It loses its contents when the power is off. it allows the CPU to access data quickly without having to wait for data to be retrieved from slower storage devices.
- It is the technology that connects your offices, data centers, cloud applications, and cloud storage together. It spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.
- It is a smaller, faster memory, located closer to a processor core, which stores copies of the data from frequently used main memory locations.
- It is a network topology in which each network component is physically connected to a central node such as a router, hub or switch.
- Is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
- An optical disc capable of storing up to 4.7 GB of data, more than six times what a CD can hold.
17 Clues: Secondary storage that has no mechanical components and can access data electronically. • It is a network contained within a small geographic area, usually within the same building. • An optical disc capable of storing up to 4.7 GB of data, more than six times what a CD can hold. • ...
cybersecurity 2024-06-27
Across
- The information property of being accessible only to a restricted group of persons
- Cryptographic algorithm used to encrypt and decrypt data
- Technique used to secure sensitive data by encoding it in such a way that only authorized parties can access the information
- The potential for harm or loss resulting from threats exploiting vulnerabilities in an organization's information systems, networks, or data assets
- Any potential danger or risk that can exploit vulnerabilities in an organization's systems, networks, or data
- The way of covering communication based on keeping the very fact of communication secret
- The act of granting rights matching with the identifier
- The process of discovering the true identity of a person or item from the entire collection of similar persons or items
- The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved
- Type of threat sources when the actor is a human-being
Down
- The best subject :)
- The information property of being accessible and usable by a legal user with possible conditions set by information owner
- Type of access control where determined rights can be represented as an authorization matrix
- Type of threat sources occured because of the devices misfunction
- Data that is stored, processed, transmitted, or accessed within an organization's systems, networks, or applications
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- The information property of having no illegal or unauthorized modifications
17 Clues: The best subject :) • Type of threat sources when the actor is a human-being • The act of granting rights matching with the identifier • Cryptographic algorithm used to encrypt and decrypt data • Type of threat sources occured because of the devices misfunction • The information property of having no illegal or unauthorized modifications • ...
LA B(1) 2024-10-07
Across
- (12,7,8) Set of rules that allows all internet users to communicate whatever type of equipment they are using
- (7,6,5) Interchange between networks within the internet. Allows ISPs to interconnect with each other
- (9) Way of measuring how much data can be carried over a network. Measured in bits per second
- (6)Computer or program that runs purely to serve the needs of other computers. Runs special server software to serve the clients
- (5,4,3)The collection of information on computers connected to the internet
- (8,8) Specifies how data should be structured and sent over the internet
- (8)Set of rules to allow the computer systems to communicate
- (8)Connection usually by radio waves
- (10,8)Connecting data route between large networks on the internet and smaller network in local regions
- (12,4)Measure of the number of pieces of information that have been transferred during a specific time period
Down
- (9)Wired connection to a broadband supplier, Normally the connection is via a network card in the computer
- (8,7,8) Company that provides you access to the internet
- (4,8,8)Allows files to be transferred between two computers on a TCP-based network.
- (8)A global network of interconnected computers
- (6)Piece of hardware that connects two or more networks, Data from the ISP is sent into the network and the router then directs the data packets to the correct destinations
- (4-2) Wired connection via a conventional telephone line
- (5,2,8) An access point to the internet,Normally a location that contains the hardware to allow internet users access to the internet
17 Clues: (8)Connection usually by radio waves • (8)A global network of interconnected computers • (8,7,8) Company that provides you access to the internet • (4-2) Wired connection via a conventional telephone line • (8)Set of rules to allow the computer systems to communicate • (8,8) Specifies how data should be structured and sent over the internet • ...
Internet vocab 2026-02-06
Across
- a collection of information that is accessed via the internet
- small units of data transmitted on a network
- device on a network
- a number assigned to a website or device, a digital address
- a device connecting multiple different networks together
Down
- device connecting devices within the same network
- a small local area network of computers and devices
- global computer network consisting of interconnected networks
- interconnected four university computers and became the basis for the internet
- a giant phonebook for the internet
10 Clues: device on a network • a giant phonebook for the internet • small units of data transmitted on a network • device connecting devices within the same network • a small local area network of computers and devices • a device connecting multiple different networks together • a number assigned to a website or device, a digital address • ...
Network Systems 2014-04-23
Across
- a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
- A network interface controller is a computer hardware component that connects a computer to a computer network.
- a unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
- A network switch or switching hub is a computer networking device that links network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer of the OSI model.
Down
- An optical fiber is a flexible, transparent fiber made of high quality extruded glass or plastic, slightly thicker than a human hair. It can function as a waveguide, or “light pipe”, to transmit light between the two ends of the fiber.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- An Ethernet hub, active hub, network hub, repeater hub, multiport repeater or hub is a device for connecting multiple Ethernet devices together and making them act as a single network segment.
- broadcasting, computer networking, or other communication using radio signals, microwaves, etc.
- A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks.
- Network bridging describes the action taken by network equipment to allow two or more communication networks, or two or more network segments, to create an aggregate network. Bridging is distinct from routing which allows the networks to communicate independently as separate networks.
10 Clues: broadcasting, computer networking, or other communication using radio signals, microwaves, etc. • A network interface controller is a computer hardware component that connects a computer to a computer network. • a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices. • ...
Morghan's Crossword 2014-03-20
Across
- vez / each time
- / refrigerator
- / grand demonstration
- riesgos / to run risks
- / essential
- / inauguration
- parlantes / talking robots
- / military
- / indispensable
- fiesta / to ask for a day off
- / to touch
- / assemble
- supersonicas / supersonic aircraft
Down
- / to attend
- redes sociales / social networks
- / keep
- / link
- timidez shyness
- / profile
- / in fact
- / to penetrate
- / to exceed
- / engineering
- / communicate
- / industry
- / rocket
26 Clues: / keep • / link • / rocket • / profile • / in fact • / military • / industry • / to touch • / assemble • / to attend • / essential • / to exceed • / engineering • / communicate • / refrigerator • / to penetrate • / inauguration • vez / each time • timidez shyness • / indispensable • / grand demonstration • riesgos / to run risks • parlantes / talking robots • fiesta / to ask for a day off • ...
Networks 2020-03-21
5 Clues: Wide Area Network • Local Area Network • all devices are equal • powerful computer that provides a service • computer that is logged on to the network
Networks 2020-07-22
Across
- smart device used to split the signal to connect more computers
- map or layout of how computers are connected and located
Down
- a computer that is not connected to any network or other devices
- not very smart device, used to connect more computers together
- the way the network is broken down in terms of sending and receiving the data packet
5 Clues: map or layout of how computers are connected and located • not very smart device, used to connect more computers together • smart device used to split the signal to connect more computers • a computer that is not connected to any network or other devices • the way the network is broken down in terms of sending and receiving the data packet
Networks 2022-03-27
5 Clues: used to transmit power or data • used to transmit pulses of light. • what is internal protocol address? • longer version of domain name system • used to connect smartphones and other devices
Internet 2026-02-09
Across
- This is a program that shows webpages
- Networks are suseptible to ____ and hackers
- flow and digicel are examples of this
- How much data can be transmitted over communications channel
- A worldwide network of networks
Down
- This is also called the wifi box
- Group of connected computer devices
- The 'M' in Man stands for:
8 Clues: The 'M' in Man stands for: • A worldwide network of networks • This is also called the wifi box • Group of connected computer devices • This is a program that shows webpages • flow and digicel are examples of this • Networks are suseptible to ____ and hackers • How much data can be transmitted over communications channel
ABC Engineering carrers By: Sophia Pineiro 2015-10-13
Across
- Railroads
- Black-box
- fixes-Yachts
- New-networks
- Water-usage
- Oil/Gas
- Braces
- Air-conditioning
- artificial-lenses
- Gas/gas-field
Down
- Fixes-bugs
- Waste-dumpsters
- Fire-alarms
- Program-management
- Design-CT-scans
- Software-products
- NewXRays
- Smart-temporary-tattoos
- New-medical-problems
- redesign-lines
- Fertilizer
- MRI-scans
- New-farming-methods
- Grass-fertilizer
- Antibiotics
- Builds-habitats
26 Clues: Braces • Oil/Gas • NewXRays • Railroads • Black-box • MRI-scans • Fixes-bugs • Fertilizer • Fire-alarms • Water-usage • Antibiotics • fixes-Yachts • New-networks • Gas/gas-field • redesign-lines • Waste-dumpsters • Design-CT-scans • Builds-habitats • Grass-fertilizer • Air-conditioning • Software-products • artificial-lenses • Program-management • New-farming-methods • New-medical-problems • Smart-temporary-tattoos
Ciencia y Technología 2025-02-27
Across
- to add pic/video
- cure
- pagina web - website
- to connect to the internet
- to download
- symptoms
- electronic devices
- to update
- laptop
Down
- email address
- social networks
- to disconnect from the internet
- username
- Health
- to comment
- password
- online
- cell phone
- to surf the web
- text message
- to upload
- illness/ disease
- internet/ La red - internet
23 Clues: cure • Health • online • laptop • username • password • symptoms • to upload • to update • to comment • cell phone • to download • text message • email address • social networks • to surf the web • to add pic/video • illness/ disease • electronic devices • pagina web - website • to connect to the internet • internet/ La red - internet • to disconnect from the internet
La Tecnologia 2024-10-24
11 Clues: tool • screen • search • battery • to allow • to charge • phone call • to prohibit • to download • social media networks • hooked, addicted (masc. singular form)
Networks 2014-06-02
5 Clues: Illness of a computer • What does a Network do? • Connection spreads around localy • Connection spreads around a wide area • Computer that is not connected to a network
networks 2022-03-27
Antivirus and Firewalls 2024-10-04
Across
- A unique string of data or code that identifies a specific virus. Antivirus software uses these signatures to recognize and eliminate known malware by scanning files.
- A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks.
- The process of inspecting data packets during transmission and allowing or blocking them based on security rules. Firewalls use this to prevent unauthorized access and protect against threats.
- A security application that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
- The practices and technologies used to protect networks from unauthorized access, misuse, or attacks, significantly enhanced by antivirus and firewall software.
Down
- A network security technology that monitors network traffic for suspicious activity and potential threats, alerting administrators to possible security breaches.
- A method employed by antivirus software to detect unknown viruses by analyzing the behavior and characteristics of suspicious files, aiding in identifying new or modified malware.
- Malicious software designed to harm, exploit, or otherwise compromise computer systems and networks, including viruses, worms, trojans, and spyware.
- Data packets leaving a network; rules can allow or block traffic based on destination addresses.
- Data packets entering a network; rules can restrict access based on specific ports or IP addresses.
10 Clues: Data packets leaving a network; rules can allow or block traffic based on destination addresses. • Data packets entering a network; rules can restrict access based on specific ports or IP addresses. • A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks. • ...
CIS178 Jake Stevenson 2023-01-25
Across
- virtual private network
- posing as authorized user
- type of malware
- protects you from virus
- protecting online data
- explicitly allowed
- security system
- malicious software
- explicitly not allowed
- not human
- gaining unauthorized access
Down
- network of networks
- type of scam
- protects you from malware
- harassment on the internet
- unsolicited advertisements
- two-factor authentication
- another word for information
- securing data
- human verification test
20 Clues: not human • type of scam • securing data • type of malware • security system • explicitly allowed • malicious software • network of networks • protecting online data • explicitly not allowed • virtual private network • protects you from virus • human verification test • posing as authorized user • protects you from malware • two-factor authentication • harassment on the internet • ...
SRWC- Crossword 1 2024-08-01
Across
- A major concern of wireless networks compared to wired ones
- Procedure used to establish the identity of a station
- used for sensor and control applications
Down
- The function of a portal in a WLAN
- Can be used to bridge remote network nodes in Wifi
- The major advantage of wireless LANs over wired LANs
- Limits the usage of wireless networks
- The basic Bluetooth network
- Bit used to detect error
9 Clues: Bit used to detect error • The basic Bluetooth network • The function of a portal in a WLAN • Limits the usage of wireless networks • used for sensor and control applications • Can be used to bridge remote network nodes in Wifi • The major advantage of wireless LANs over wired LANs • Procedure used to establish the identity of a station • ...
Societies to Social Networks 2025-04-03
Across
- A society driven by technology, services, and the exchange of information.
- A temporary alliance of individuals or groups who join together for a common goal.
- Soc. Rev: The transition to mechanized production, urbanization, and economic change.
- A society based on the domestication of animals for food and trade.
- The process of establishing and maintaining relationships for mutual benefit, often to exchange information or gain opportunities.
- A major transformation in society that changes how people interact, work, and live.
- A small, close-knit group with strong personal connections, often exclusive.
- Soc. Rev: The development of farming, leading to settled societies and population growth.
Down
- A society that sustains itself through small-scale farming using simple tools.
- Soc. Rev: The rise of artificial intelligence, biotechnology, and human-machine integration, reshaping work and communication.
- Soc. Rev: The shift from hunting and gathering to the domestication of plants and animals.
- Soc. Rev: The transition from industrial production to digital technology, automation, and the internet.
- A large social organization that shares a common culture, territory, and governance.
- A collection of two or more individuals who interact and share a sense of identity.
- A broader web of connections that link individuals, including friendships, acquaintances, and online communities.
- This community is a group of individuals who interact primarily through online platforms rather than in person.
- A collection of people who are in the same place at the same time but do not interact meaningfully.
- A society that relies on mechanized production and manufacturing.
18 Clues: A society that relies on mechanized production and manufacturing. • A society based on the domestication of animals for food and trade. • A society driven by technology, services, and the exchange of information. • A small, close-knit group with strong personal connections, often exclusive. • ...
Itani cybersecurity crossword 2026-04-01
Across
- – spreads and infects files
- – harmful software
- – extra login step
- – secret login word
- – protects networks
Down
- – stealing personal info
- – locks files for money
- – coding data for safety
- – tricks people for info
- – online trail
- – blocks threats
- – breaks into systems
- – removes malware
- – spreads by itself
- – steals information
15 Clues: – online trail • – blocks threats • – removes malware • – harmful software • – extra login step • – secret login word • – spreads by itself • – protects networks • – steals information • – breaks into systems • – locks files for money • – stealing personal info • – coding data for safety • – tricks people for info • – spreads and infects files
Security terms puzzle 2025-02-13
Across
- Ensuring data and resources are accessible when needed. Bell-La Padula security model – A security model focused on data confidentiality using mandatory access controls.
- A decoy system designed to lure and detect attackers.
- Protecting information from unauthorized access.
- Engineering Manipulating people to gain unauthorized access to information.
- Hacking phone systems to make free calls or manipulate networks.
- Security Protecting an individual computer or device from threats.
- through obscurity Hiding system details to reduce security risks.
Down
- Aggregation Combining data from multiple sources for analysis.
- Privilege Granting users the minimum access necessary for their tasks.
- Verifying the identity of a user or system.
- of duties Dividing responsibilities to prevent fraud and errors.
- A security system that monitors and controls network traffic.
- Digital documents that verify identities and enable secure communication.
- Preventing denial of actions, ensuring accountability.
- Security Protecting a network from threats and unauthorized access.
- Computing Delivering computing services over the internet.
- Gaining unauthorized access to systems or networks.
- Ensuring data is accurate and unaltered.
- Security Using multiple security measures to protect data and systems.
19 Clues: Ensuring data is accurate and unaltered. • Verifying the identity of a user or system. • Protecting information from unauthorized access. • Gaining unauthorized access to systems or networks. • A decoy system designed to lure and detect attackers. • Preventing denial of actions, ensuring accountability. • Computing Delivering computing services over the internet. • ...
IT Crossword 2013-12-18
Across
- To analyze a sentence or language statement to break down words into functional units that can be converted into machine language
- A term used when system imitates or reproduces another system
- Place where u put files and folders that u want to delete or get rid of
- Is an Internet connection available from telecom companies using existing phone lines providing fast download & upload speeds.
- A digital mapping system used for exploration, demographics, dispatching and tracking.
- Method of accessing e-mail messages on a server without having to download them on your local hard drive
- An open source OS used by several smartphones and can be customized for mobile devices
- The brand name of a family of personal computers and an operating system from apple
- A program that allows u log in to a Unix computer via a text-based interface
Down
- A challenge-response test that determines whether a user is human or automated bot
- A security protocol for Wi-Fi networks whose goal is to make wireless networks as secure as wired networks.
- While applied to hard disk, it is a great way to boost the performance of computer
- Chart displaying horizontal or vertical bars whose length are in proportion to the values of the data items they represent.
- A program pre-installed on Windows-based computers that computers uses to start up
- A social networking website where users can create and customize their own profiles
- It translates the IP addresses of computers in a local network to a single IP address.
- A standard way of transferring data to and from each kind of database
- A file within a directory on your hard drive
18 Clues: A file within a directory on your hard drive • A term used when system imitates or reproduces another system • A standard way of transferring data to and from each kind of database • Place where u put files and folders that u want to delete or get rid of • A program that allows u log in to a Unix computer via a text-based interface • ...
NETWORK 2025-06-02
Across
- a worldwide system of interconnected computer networks
- using someone else's work without giving them proper credit
- any unsolicited and often irrelevant or inappropriate messages sent over the internet
- breach defenses to gain unauthorized access into computers
- the breaching of network encryptions
- s used for short-range wireless voice and data communication
- connects electronic devices close to the user
- known as an address on the Web
Down
- a private network designed by an organization
- connects our computer to a standard phone line or to our cable
- the physical and logical arrangement of nodes and connections in a network
- a program that spreads by first infecting files
- the act of compromising digital devices and networks
- cybercrime activity that takes place over the internet or on email
- is a single source that sends something to all other devices
- an established set of rules that determine how data is transmitted
- the connection point among network devices
- connects electronic devices close to the user
18 Clues: known as an address on the Web • the breaching of network encryptions • the connection point among network devices • a private network designed by an organization • connects electronic devices close to the user • connects electronic devices close to the user • a program that spreads by first infecting files • the act of compromising digital devices and networks • ...
Vocab: How the Internet Works 2023-02-03
Across
- Hierarchical and distributed naming system for computers
- Networking device that connects devices on the same computer network
- A network node that broadcasts data to every device connected to it
- Based on a number system in which there are only two possible states, off and on, usually expressed as ones and zeros
- People who are responsible for writing the code to generate a webpage
- The internet was started as a ________ project
- Networking device that forwards traffic between networks
Down
- Cascading Style Sheets
- A block of data transmitted across a network.
- A network of networks built on open agreed upon protocols
- A document that can be viewed by a web browser
- Hypertext Markup Language
- A widely agreed upon set of rules and standards
13 Clues: Cascading Style Sheets • Hypertext Markup Language • A block of data transmitted across a network. • A document that can be viewed by a web browser • The internet was started as a ________ project • A widely agreed upon set of rules and standards • Hierarchical and distributed naming system for computers • Networking device that forwards traffic between networks • ...
Principal Areas of Computer Use 2020-09-27
14 Clues: DepEd • use barcodes • modelling DNA • Crop information • forecast weather • paperless society • Connect with others • rapid transit system • simulate environment • record keeping in banks • communicate with others • locate and monitor networks • previously performed by people • representation of better analysis
Networks (Grade 6) 2025-01-07
Across
- is where a video or sound file is played over an internet connection
- a private network that is only available within an organization
- using more than its capability
- access something they are not allowed to
- it is a networked device that serves data to other devices
Down
- global positioning system
- junk mail
- is the maximum amount of data that can be transmitted in a network in a specific time
- without using wires
- is a unique name for each user in the system
- is 8 bits
11 Clues: junk mail • is 8 bits • without using wires • global positioning system • using more than its capability • access something they are not allowed to • is a unique name for each user in the system • it is a networked device that serves data to other devices • a private network that is only available within an organization • ...
Year 8 Networks 2024-02-06
Across
- Using the Internet for a phone call.
- A way of sending data by using light.
- A simple network device for connecting devices
- An older method of communication, often used on ships.
- Two or more devices connected together for communication.
- A network of computers across the world.
Down
- Describes all the services on the Internet.
- A standard set of rules for communicating.
- A simple network device for connecting networks.
- Describes the use of devices such as fridges on the Internet.
- Describes the amount of data that can be transmitted in one go.
11 Clues: Using the Internet for a phone call. • A way of sending data by using light. • A network of computers across the world. • A standard set of rules for communicating. • Describes all the services on the Internet. • A simple network device for connecting devices • A simple network device for connecting networks. • An older method of communication, often used on ships. • ...
Let's Revise Cyber Security Fundamentals !! 2021-08-16
Across
- deliberate attempt to compromise security using malicious activity
- Naming system followed to identify computers connected to Internet
- criminal activity performed using computer or a network
- ready to access for authorized people
- state of maintaining secrecy of communication
- malicious software that prevents the users from
- use of Computers and Networks to gain illegal access for confidential information for some gain
Down
- way of confirmation of individual's identity
- unskilled individual who uses programs written by others to initiate attacks
- Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
- their own data for want of money
- computer program designed to protect computer
- illegal piece of software designed to cause harm to computers/networks
13 Clues: their own data for want of money • ready to access for authorized people • way of confirmation of individual's identity • state of maintaining secrecy of communication • computer program designed to protect computer • malicious software that prevents the users from • criminal activity performed using computer or a network • ...
About Upcyling and Technology 2025-07-24
13 Clues: Polution. • Original, make. • Sedentary person. • Rule, regulation. • Causing dependence. • Social conventions. • Electronic, not analog. • Communication networks. • Interaction, discussion. • Most important, principal. • Reuse: materials, objects. • Physical and mental health. • Exept for… / In the contrary…
Tec cross word puzzell 2022-04-13
Across
- network security device that monitors outgoing network traffic
- something designed to make something known to
- data that is left behind when users have been online
- data that describes other data
- bully someone over the internet
- activities a company undertaken to promote the buying or selling of a product or service
Down
- The opportunity to establish a protect network connection when using public networks
- where people can create, share or exchange information in virtual communities and networks
- A file or code
- A way that cyber criminals steal private information
- A network that connects computers all over the world
11 Clues: A file or code • data that describes other data • bully someone over the internet • something designed to make something known to • A way that cyber criminals steal private information • data that is left behind when users have been online • A network that connects computers all over the world • network security device that monitors outgoing network traffic • ...
☂ WIRED AND WIRELESS NETWORKS ☂ 2022-09-22
Across
- This network allows new nodes to be added without interruption to the network.
- unscramble "clalleru hensop"
- ______ ____, twisted pair, or fiber optic cables are all options.
- Wireless network uses _________ rather than wires.
- Wireless networks use radio signals as their communication medium but could also use__________
Down
- Wired networks require this for each device in order to work.
- Wireless is made up of_____________(short term)
- Fibre cables have greater_____ so transfer speeds are faster.
- This network is expensive to install
- A wired network employs wires to link devices to the ________ or another network.
- _______ or sensors will be present on all wireless devices.
11 Clues: unscramble "clalleru hensop" • This network is expensive to install • Wireless is made up of_____________(short term) • Wireless network uses _________ rather than wires. • _______ or sensors will be present on all wireless devices. • Wired networks require this for each device in order to work. • Fibre cables have greater_____ so transfer speeds are faster. • ...
Find the keywords that we have learned in IT. 2024-01-14
Across
- A small segment of a larger message
- a set of rules used for formatting and processing data
- The data capacity of a network in per bits second.
- a worldwide system of computer networks
Down
- electronic mail system
- A device that connects two or more packet-switched networks.
- a center of activity
- Transmission Control Protocol
8 Clues: a center of activity • electronic mail system • Transmission Control Protocol • A small segment of a larger message • a worldwide system of computer networks • The data capacity of a network in per bits second. • a set of rules used for formatting and processing data • A device that connects two or more packet-switched networks.
Crossword 2021-01-12
Across
- created with a camera system which simultaneously records all 360 degrees of a scene
- is when one person shares a video clip with another or many other people.
- community based marketplace which allows members to communicate and sell directly to other members; for example, Etsy®
- online businesses which allow consumers to search and follow their favorite
- form of electronic commerce which uses social networks to facilitate the buying or selling of products
- the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself
- process of uploading, publishing and sharing photos online
- realistic, real-time, three-dimensional computer simulation of physical objects and space; allows users to ‘interact’ and have sensory experiences of the actors, images and sounds through sensors attached to the user’s body which track 360 movement
- writing and publishing short, frequent posts to a microblog such as Twitter®
- buyers agree to make the purchase; for example, Groupon®
Down
- marketplace which allows sales to be driven by referrals from established social networks; social networks collect data to provide accurate suggestions
- BuyingPlatforms marketplace which offers products and services at a reduced rate when
- writing and publishing posts, at any length and time, on a blog such as Blogger®; typically in a chronological format
- RecommendationPlatforms marketplace which offers product or service reviews and in return recommend products based on a member’s purchasing history; for example, Amazon®
- a message sent via the internet that appears on the recipient's screen as soon as it is transmitted.
- recommendations on goods and services
- content sent in compressed form over the Internet and displayed by the viewer in real-time
- all in one place; for example, Wanelo®
18 Clues: recommendations on goods and services • all in one place; for example, Wanelo® • buyers agree to make the purchase; for example, Groupon® • process of uploading, publishing and sharing photos online • is when one person shares a video clip with another or many other people. • online businesses which allow consumers to search and follow their favorite • ...
Programming Crossword 2013-10-10
Across
- Type of programming the runs the entire evening
- Major networks give away office space and financing for distribution rights
- People in power who decide what people need to know
- Sheduling new or weak series before and after a very successful program.
- Scheduling that shows one program at the same time during the week
- Programming a new series in between two successful series
- He lives in a pineapple under the sea
- King of Late Night: Johnny
- A classification of drama
Down
- Programming that aims to attracts a particular demographic
- Sports programming is made unavailable to households 90 miles from the game
- Local stations that obtain programming from major networks
- Reality TV show in the "wild"
- Programming that has already aired on a major network
- The first episode of a series, usually made before a series is ordered
- A collection of stories with different themes and different actors
- Promoting and selling products from a variety of sources
17 Clues: A classification of drama • King of Late Night: Johnny • Reality TV show in the "wild" • He lives in a pineapple under the sea • Type of programming the runs the entire evening • People in power who decide what people need to know • Programming that has already aired on a major network • Promoting and selling products from a variety of sources • ...
Social Media Crossword 2023-04-01
Across
- A network for online picture sharing.
- It is an image or username that represents a person online most often within forums and social networks.
- An action that can be made by a Facebook user.
- A message sent on Twitter.
- Clusters of a user’s friends, colleagues,family or connections on Google+.
- A system that manages content.
- Here you are allowed to share a 140-character update.
- Anything shared across social networks that get passed along rapidly e.g. YouTube.
Down
- Simple web pages that can be edited by other users.
- A small, attractive application on a website such as a hit counter.
- They are also known as message boards.
- Platform founded by Mark Zuckerberg.
- A pictorial representation of a facial expression which is used in writing.
- A self-portrait taken using the reverse camera screen on a smartphone
- A photo sharing application gained more than 300 million users
- #
- A site updated frequently by an individual or group to record opinions or information.
- A one-to-one communication on the internet.
- A free URL shortening service.
19 Clues: # • A message sent on Twitter. • A system that manages content. • A free URL shortening service. • Platform founded by Mark Zuckerberg. • A network for online picture sharing. • They are also known as message boards. • A one-to-one communication on the internet. • An action that can be made by a Facebook user. • Simple web pages that can be edited by other users. • ...
Definitions for computer 2021-10-06
Across
- to gain information from someone else in a bad way
- parts of a computer or substance
- to pertain something
- small and portable soli device that can be inserted onto a USB
- the key to the computer system which stands for Central Processing Unit
- storage information
- a reason or limited use of copyrighting
- the way to communicate with other networks
- this is used to store memory and has lots of small chips
- when you take or steal information from someone else and copy it to make it look like yours
Down
- a website that allows to delete, gain, revise a content using a web browser
- a local network area
- a security use to protect the use of your network and data
- the right to make copies of music, artistic work and words
- stands for wide network area which is a computer network that connects smaller networks
- a storage device
- a security device that can help protect the computer
- used to connect cables to a computer
- this is often seen in messages and posts
19 Clues: a storage device • storage information • a local network area • to pertain something • parts of a computer or substance • used to connect cables to a computer • a reason or limited use of copyrighting • this is often seen in messages and posts • the way to communicate with other networks • to gain information from someone else in a bad way • ...
AND-FridayFun 2022-05-06
Across
- Messaging program designed specifically for the workplace
- When you start a terminal Linux running the ____, you're greeted with a prompt.
- Building of books
- the global system of interconnected computer networks that uses protocols to communicate between networks and devices.
- Adults and children do not like to share them, some for safety and others for their taste.
- IAM identity that you can create in your account that has specific permissions.
- Short compilations of songs.
- A minimal Docker image basen on Linux
Down
- AWS storage container
- A reptile that looks a little like a crocodile
- A polite address
- Puppet _____ is the application that manages the configurations on your nodes
- Company's name which the products are used to deliver applications faster.
- You can work with one, but more are always welcome.
- An open source software that does not require self plugin installations
- To resurrect and also pass a flower
- Command is used to initialise a working directory containing Terraform configuration files.
17 Clues: A polite address • Building of books • AWS storage container • Short compilations of songs. • To resurrect and also pass a flower • A minimal Docker image basen on Linux • A reptile that looks a little like a crocodile • You can work with one, but more are always welcome. • Messaging program designed specifically for the workplace • ...
Networking Fundamentals 2025-02-10
Across
- Networks are critical for the use of email, instant messaging, and fixing.
- Layer 7, supplies network services to end-user applications
- connects multiple devices devices within a network. Can be managed or unmanaged
- Used to make routing decisions. Can be static or dynamic
- Personal Area Network
- protocol connection-oriented, secure reliable conection
- stands for modulator and demodulator, used to convert analog to digital signals
- translates digital info into signals used to transfer data (ethernet or WI-FI)
Down
- Networks centralize data and make it more accessible to users.
- unique 48 bit hardware number that is embedded, consist of 6 octets
- Layer 1, responsible for the actual transmission of digital data.
- Network permits the sharing of files, database, and media
- Layer 6, it handles the syntax processing of message data.
- the maing goal is sending datagrams, as quickly as possible
- ___is two or more devices connected to exchange information
- 128 bits, consist of 8 octates
- Layer 3, works for the transmission of data from a source device in one network to a destination in another network
- layer 2, trnasmmit data to its destination device using the MAC address
18 Clues: Personal Area Network • 128 bits, consist of 8 octates • protocol connection-oriented, secure reliable conection • Used to make routing decisions. Can be static or dynamic • Network permits the sharing of files, database, and media • Layer 6, it handles the syntax processing of message data. • Layer 7, supplies network services to end-user applications • ...
Tech 2023-05-02
14 Clues: Ctrl+P • A 0 or 1 • Google, Yahoo • Four 1s or 0s • Start a Device • Operating System • Internet Address • Restart a Device • Internet Protocol • System of Networks • Firefox, Edge, Safari • Central Processing Unit • Hypertext marker language • Portable Documnent Format
Online Crossword - Octavio Alvarado 2021-06-25
Across
- Wide bandwidth data transmission which transports multiple signals and traffic types.
- Is an electrical or electromagnetic current that is used for carrying data from one device or network to another. It is the key component behind virtually all:
- Wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building.
- Group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
- Networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
- Twisted pair cable for computer networks. Also used to carry other signals such as telephone and video.
Down
- Transfer of information between two or more points that do not use an electrical conductor as a medium by which to perform the transfer.
- Interface between radio waves propagating through space and electric currents moving in metal conductors, used with a transmitter or receiver.
- Global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- Hardware device that converts data from a digital format, intended for communication directly between devices with specialized wiring, into one suitable for a transmission medium such as telephone lines or radio.
- Computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
11 Clues: Wide bandwidth data transmission which transports multiple signals and traffic types. • Twisted pair cable for computer networks. Also used to carry other signals such as telephone and video. • Transfer of information between two or more points that do not use an electrical conductor as a medium by which to perform the transfer. • ...
ISSO June 2021 2021-06-07
Across
- IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
- The physical separation or isolation of a system from other systems or networks is known as an __ __.
- A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
- A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
- IRM office responsable for Cyber Operations oversight.
- ____ is the only thumb drive authorized on Department of State Automated Information Systems.
- vulnerabilities must be remediated within ___calendar days of initial detection.
- The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
- this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
- The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
- is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
- The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
- A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
- Criminal organization responsable for the cyber attack against the Colonial Pipeline.
- A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
- computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
- ISSO duties must be performed using an ISSO ___ account.
- The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
- of ___ is an attack that prevents or impairs the authorized use of information system resources or services.
19 Clues: IRM office responsable for Cyber Operations oversight. • ISSO duties must be performed using an ISSO ___ account. • vulnerabilities must be remediated within ___calendar days of initial detection. • Criminal organization responsable for the cyber attack against the Colonial Pipeline. • ...
Technology 2024-04-16
Chapter 3 2012-09-05
Across
- Names that give you some insight to the purpose of the website you visit
- Internet feature that allows you to create a list of links for sites
- The main list of results from a search
- The selling and buying of goods and products on the Internet
- Used to help prevent unauthorized users from getting your data
- Web of computer networks that spans the earth
- When one computer links to another computer
Down
- A program that lets you find and view web pages
- System of computers that can handle documents in a special language
- An unsolicited or unwanted message
- Accessing computers or networks without permission
- When you put a group of words together between quotation marks in the search bar
- Refers to using material created by another person and claiming it as your own
- Term often used to describe rules for proper online behavior
- Allows users to post messages for others to read
15 Clues: An unsolicited or unwanted message • The main list of results from a search • When one computer links to another computer • Web of computer networks that spans the earth • A program that lets you find and view web pages • Allows users to post messages for others to read • Accessing computers or networks without permission • ...
test 2025-05-06
Across
- Object-oriented programming language designed for portability
- Global system of interconnected computer networks
- Data structure that stores elements of the same type in contiguous memory
- Set of instructions for a computer to execute a specific task
- Software development methodology focused on iterative progress
- Representational State Transfer, an architectural style for API design
- Instructions written in a programming language
- Collection of computers and devices connected together
Down
- A step-by-step procedure or formula for solving a problem or accomplishing a task
- Popular programming language known for readability and versatility
- A security system that monitors and controls incoming and outgoing network traffic
- A structured collection of data that is organized and stored for efficient retrieval
- Network device that forwards data packets between computer networks
- A computer or system that provides resources or services to other computers on a network
- A network of remote servers used to store, manage, and process data over the internet
15 Clues: Instructions written in a programming language • Global system of interconnected computer networks • Collection of computers and devices connected together • Object-oriented programming language designed for portability • Set of instructions for a computer to execute a specific task • Software development methodology focused on iterative progress • ...
Marketing Management tutorial 7 2025-11-19
Across
- Peer-to-peer communication that influences consumer decisions.
- Appeal type that boosts sharing by evoking strong feelings.
- The degree to which content is likely to be forwarded.
- One of the three viral marketing criteria—people who spread the message.
- Persuasive communicators who amplify a message before it spreads.
- The exponential spread of content across networks.
Down
- Knowledgeable consumers who rapidly pass along information.
- Individuals with huge networks who accelerate message spread.
- Emotional ad type where the brand is not central to the narrative.
- Viral campaigns that go wrong and damage brand reputation.
- Includes timing, context, and luck—must be “right” for virality.
- Successful viral campaigns with positive brand impact.
- Appeal that focuses on product attributes to increase brand evaluation.
- Must be interesting, surprising, or emotional to become contagious.
- When the brand is essential to the storyline, increasing brand value.
15 Clues: The exponential spread of content across networks. • Successful viral campaigns with positive brand impact. • The degree to which content is likely to be forwarded. • Viral campaigns that go wrong and damage brand reputation. • Knowledgeable consumers who rapidly pass along information. • Appeal type that boosts sharing by evoking strong feelings. • ...
Season4Sharing Scavenger Hunt! 2020-12-08
Across
- Our CFO's Last Name
- Service Makes Individuals’ Lives Easier
- Last Name of Nobel Prize Winner interviewed by Jean English during Ignite20
- Nikesh announced our intent to acquire this company in Nov 11, 2020
- A world where each day is safer and more secure than the one before
Down
- First name of one of our founders
- One of our NGFW competitors
- It is the name of our of our main brands
- Where has James McGregor worked the longest?
- On this month, Palo Alto Networks became a public company in the NYSE Stock Market
- To be the cybersecurity partner of choice, protecting our digital way of life
- Palo Alto Networks Stock Symbol
12 Clues: Our CFO's Last Name • One of our NGFW competitors • Palo Alto Networks Stock Symbol • First name of one of our founders • Service Makes Individuals’ Lives Easier • It is the name of our of our main brands • Where has James McGregor worked the longest? • Nikesh announced our intent to acquire this company in Nov 11, 2020 • ...
Web Ethics and Safety IV 2021-02-05
Across
- connects entirely different networks that work upon different protocols. It is the entry and the exit point of a network and controls access to other networks.
- computer device which forwards data packets from one network to another
- a multiport repeater having several input/output ports
- a billion bytes
- a million bytes
- uses broadband but does not require cable or phone lines;
Down
- category 5 cable with RJ – 45 connector
- network controller which connects network devices and allows effective communication between these devices
- a trillion bytes
- netwrok interface card internal or external component used to connect computer to a network
- primary device used to connect to the internet
- wireless network
12 Clues: a billion bytes • a million bytes • a trillion bytes • wireless network • category 5 cable with RJ – 45 connector • primary device used to connect to the internet • a multiport repeater having several input/output ports • uses broadband but does not require cable or phone lines; • computer device which forwards data packets from one network to another • ...
CSIT Networks, Security Threats, and protocols 2023-01-23
Across
- three principles that form the foundation of any organization's security
- A network that provides connectivity to wireless devices within a limited geographic area
- tricking Internet users into revealing personal or confidential information
- keeping data private
- Networks for homes, smaller offices and schools in a small, local setting
Down
- devices or steps taken to protect hardware or raw data
- Small Office and Home Office Networks typically Local Area setups
- protection of programs and data against malicious attacks and risks
- software intentionally designed to cause damage to a computer
- reliability of access to and use of data
- accuracy, completeness, and consistency of data
- a large network of information that is not tied to a single location.
12 Clues: keeping data private • reliability of access to and use of data • accuracy, completeness, and consistency of data • devices or steps taken to protect hardware or raw data • software intentionally designed to cause damage to a computer • Small Office and Home Office Networks typically Local Area setups • ...
Wireless, Mobile Computing & Mobile Commerce 2018-05-09
Across
- a wireless access point that provides service to a number of users within a small geographical perimeter (up to approximately 300 feet).
- virtually every object has processing power with either wireless or wired connections to a global network.
- networks using multiple Wi-Fi access points to create a wide area network that can be quite large and are essentially a series of interconnected local area networks.
- a medium-range WLAN.
- a real-time, wireless connection between a mobile device and other computing environments, such as the Internet or an intranet.
- offers uninterrupted, near CD-quality transmission that is beamed to your radio, either at home or in your car, from both GEO (XM Radio) and MEO (Sirius) satellites in space
- networks that connect users to the Internet over a geographically dispersed territory, they typically operate over the licensed spectrum (government regulation).that is, they use portions of the wireless spectrum that are regulated by the government.
- One major limitation of GEO satellites is that their transmissions take a quarter of a second to send and return from the earth's surface.
- the area of Earth’s surface reached by a satellite’s transmission overcomes the limitations of microwave data relay stations. The higher a satellite orbits, the larger its footprint
- enables peer-to-peer communications, so devices can connect directly allowing users to transfer content among devices without having to rely on a wireless antenna. It can connect pairs or groups of devices at Wi-Fi speeds of up to 250 Mbps and at distances of up to 800 feet.
Down
- uses radio-wave frequencies to send data directly between transmitters and receivers
- a small, portable wireless device that provides users with a permanent Wi-Fi hotspot wherever they go with a range of about 10 meters (roughly 30 feet).
- a wireless system that utilizes satellites to enable users to determine their position anywhere on Earth. GPS is supported by 24 MEO satellites that are shared worldwide
- e-commerce (EC) transactions conducted with a mobile device.
- in remote parts of the world it is the only option available for Internet connections because installing cables is either too expensive or physically impossible.
- Networks the familiar wireless local area networks (WLANs) and the most common type of Medium-Range network is wireless fidelity (Wi-Fi).
- a phenomenon that occurs when the functions of many physical devices are included in one other physical device. Consider that your smartphone includes the functions of digital cameras for images and video, radios, televisions, Internet access via Web browsers, recording studios, editing suites, movie theaters, GPS navigators, word processors, spreadsheets, stereos, flashlights, board games, card games, video games, an entire range of medical devices, maps, atlases, encyclopedias, dictionaries, translators, textbooks, watches, alarm clocks, books, calculators, address books, credit card swipers, magnifying glasses, money and credit cards, car keys, hotel keys, cellular telephony, Wi-Fi, e-mail access, text messaging, a full QWERTY keyboard, and many, many others.
- something that changes its location over time
- without wires.
- is red light that is not commonly visible to human eyes and common applications of infrared light are found in remote control units for televisions and DVD and CD players.
20 Clues: without wires. • a medium-range WLAN. • something that changes its location over time • e-commerce (EC) transactions conducted with a mobile device. • uses radio-wave frequencies to send data directly between transmitters and receivers • virtually every object has processing power with either wireless or wired connections to a global network. • ...
Chapter 3 - Countermeasure in Cybersecurity 2026-01-12
Across
- Security classification related to storage media like USB drives and disks
- Software layer where users interact with systems
- Security device that filters incoming and outgoing network traffic
- Infrastructure that focuses on storing and managing data
- A fake system designed to trap and study attackers
- Security system that detects suspicious activities in a network
- Minimum security standard that systems must follow
- IT infrastructure responsible for managing communication between systems
Down
- Type of IT infrastructure that includes servers, computers, and hardware
- Tool used to scan networks and discover active devices
- Process of strengthening an application by removing unnecessary features
- A secure tunnel used to protect data over public networks
- Security design that shows how security components are arranged in a network
- Tool used to capture and analyze network traffic
- Small update released to fix a specific security vulnerability
- Physical security method that uses fingerprints or facial recognition
- Network area that separates internal systems from the internet
17 Clues: Tool used to capture and analyze network traffic • Software layer where users interact with systems • A fake system designed to trap and study attackers • Minimum security standard that systems must follow • Tool used to scan networks and discover active devices • Infrastructure that focuses on storing and managing data • ...
Marketing crosswords 2024-07-03
Across
- actions that are intended to attract the public's attention to someone or something
- actions that reflect and measure how much your audience interacts with your content
- tangible object or a service provided to consumers
- person or something that influences another
- synonym of fashion
- distinctive catchword or catch phrase
Down
- plan for carrying out a process or procedure
- act of satisfying and retaining customers
- either or a pair of people engaged together in the same activity
- the assembledd spectators or listeners at a public or on networks
- way to express stories to convey a message in an unforgettable way
- condition of sharing or having certain attitudes and interests in common
- belief taht doing good for people and planet is also good for brand and bottom line - derived of advertising
- a graphic representation or symbol of a company name
- acronym - popular type of content on social networks (particularly on Tiktok)
15 Clues: synonym of fashion • distinctive catchword or catch phrase • act of satisfying and retaining customers • person or something that influences another • plan for carrying out a process or procedure • tangible object or a service provided to consumers • a graphic representation or symbol of a company name • either or a pair of people engaged together in the same activity • ...
Computer Network 2023-02-22
Across
- Wireless Topology contains a ___________ to connect hosts in a n/w to servers
- All ____________ bits cannot be set to zero/ one
- When all hosts in the N/W are connected to every other host, it creates a ____________
- ultimate wise area n/w spanning entire globe
- Physical layout of computers and other components on a network
- time taken by a data signal to travel from one location to another on a N/W
- Collection of computers connected together
- N/W that connects devices in an individuals workspace
- Route Navigation system using satellites
Down
- Communication between different networks
- Sending messages to all hosts on your network at once
- ClassA, ClassB, ClassC, ClassD, ClassE represent concept of ___________
- Determines network and host parts of your IP address
- Device used to communicate b/w networks
- Sending data from your home computer to the Internet
15 Clues: Device used to communicate b/w networks • Communication between different networks • Route Navigation system using satellites • Collection of computers connected together • ultimate wise area n/w spanning entire globe • All ____________ bits cannot be set to zero/ one • Determines network and host parts of your IP address • ...
Internet of Things ANALYN B. BULANIT MAEE 208 2024-09-20
Across
- software that acts as a bridge between an operating system and application, especially where IoT is concerned
- a small, fast-moving bird, metaphorically representing quick data processing
- the state of being vulnerable to being harmed
- the act of changing from one form to another
- small device that performs a specific task in IoT, often serving to collect and send data
- the link between two or more devices
- to think too much about something
- abbreviation for the fundamental language of the web's structure, often associated with IoT interface design
Down
- the technique of making an apparatus, a process, or a system operate automatically
- the worldwide system of interconnected networks
- data flow in one direction only
- a group or system of interconnected people or things
- a wireless technology standard for exchanging data over short distances
- device that detects or measures a physical property
- the global system of interconnected computer networks
15 Clues: data flow in one direction only • to think too much about something • the link between two or more devices • the act of changing from one form to another • the state of being vulnerable to being harmed • the worldwide system of interconnected networks • device that detects or measures a physical property • a group or system of interconnected people or things • ...
Netowkr 2026-03-08
Across
- Mathematical diagrams that represent networks using nodes and edges
- Highly connected and influential nodes in a network
- The study of how networks change and evolve over time
- The individual points or units in a network
- A measure of how many connections exist compared to the maximum possible
- The connections or links between nodes
- A route that connects one node to another
Down
- A network property where most nodes are only a few steps apart
- Groups of tightly connected nodes within a network
- A network pattern where a few nodes have many connections
- A measure of how important a node is in a network
- The number of connections a node has
12 Clues: The number of connections a node has • The connections or links between nodes • A route that connects one node to another • The individual points or units in a network • A measure of how important a node is in a network • Groups of tightly connected nodes within a network • Highly connected and influential nodes in a network • ...
ICT Terminology 2025-10-07
6 Clues: : Electronic mail • : Computer programs • : Online data storage • : Security system for networks • : Wireless Internet connection • : Device that connects networks
Topic 7 Networks 2021-06-30
Across
- type of communication in which a physical propagation medium is not used, but modulation of electromagnetic waves, radiation or optical means is used?
- device that connects different computers on the same local area network?
- set of computers connected to each other through various methods to share information and services.?
- is a systemization of wireless communication to minimize wired connections.?
- it is a type of twisted pair cable?
- Scope is limited to a small physical space, such as a house, an apartment, or at most a building.?
- device capable of converting digital signals into analog, but also analog into digital.?
Down
- World-class computer network that uses the telephone line to transmit information?
- it is a sign, a gesture or another type of report or warning of something.?
- to any type of network with a high capacity to transport information that affects its transmission speed.?
- Device used to emit or receive radio waves?
11 Clues: it is a type of twisted pair cable? • Device used to emit or receive radio waves? • device that connects different computers on the same local area network? • it is a sign, a gesture or another type of report or warning of something.? • is a systemization of wireless communication to minimize wired connections.? • ...
Environmental Stress 2021-02-19
Across
- Telecommuting is positively/negatively related to job performance (Hypothesis 5).
- Surrounding in which a person completes tasks.
- Bring in sunlight penetration and views.
- Negatively related to telecommuting, the rate at which employees leave.
- Term for alternative work arrangement, working somewhere other than the primary workplace.
Down
- Most common location to work other than the primary workplace.
- Amount of light in an environment.
- Most common device people use to complete their telecommuting tasks.
- 'Equals control.' Gives one control over breaks, rules, environments, etc.
- Which gender experiences lower sunlight penetration and more negative outcomes.
- Telecommuting is positively/negatively related to work-family conflict (Hypothesis 2).
- Global computer networks linked to other networks and provide information.
- Self-governance, independent of one's owns actions and behaviors, increases with telecommunication.
- The type of learning we are engaging in, far away from each other.
- Type of element found to relieve job stress (i.e., trees, plants, flowers, etc.)
15 Clues: Amount of light in an environment. • Bring in sunlight penetration and views. • Surrounding in which a person completes tasks. • Most common location to work other than the primary workplace. • The type of learning we are engaging in, far away from each other. • Most common device people use to complete their telecommuting tasks. • ...
Hi 2023-02-15
Across
- a network management protocol used to automate the process of configuring devices on IP networks,
- serves the original purpose of private networks where data is protected, and resources are shared.
- responsible for translating domain names into a specific ip address.
- a company that lets you access the internet from home, usually with a monthly subscription.
- stands as a major changing point in the development of computer technology
- built around a single, central server that handles all major management and data processing functions.
- a service that helps you stay private online.
- A system or a program that requests the activity of one or more other systems or programs, called servers, to accomplish specific tasks.
- the arrangement of the elements of communication network.
- a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers.
- a computer program or device that provides a service to another computer program and its user, also known as the client
- a computer network that connects computers within a metropolitan area
- a part of a system that, if it fails, will stop the entire system from working.
Down
- a type of internet hosting in which the client leases and entire server not shared with anyone else.
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- a computer that stores web server software and a website's component files.
- a global computer network providing a variety of information and communication facilities.
- connects devices within a user's immediate area
- a device which controls access to separately stored files, as part of a multiuser system
- a network of multiple interconnected local area networks (LAN) in a limited geographical area.
- typically manages and organization's network.
- adress of a given unique resource on the web
- the technology that connects your offices, data centers, cloud applications, and cloud storage together.
23 Clues: adress of a given unique resource on the web • a service that helps you stay private online. • typically manages and organization's network. • connects devices within a user's immediate area • the arrangement of the elements of communication network. • responsible for translating domain names into a specific ip address. • ...
Networking Baics 2013-03-24
Across
- a scalable topology that includes the uses of “roots”
- topology that allows only one system to send information at a time
- the principle data routes creating the framework of the internet
- common connector style on a twisted pair wiring system
- transmits network data to only intended recipient gives all users same bandwidth
- any connection point on a network
- a computer that provides shared resources to users on a network
- a software or hardware based solution to keep a network safe
- a site that offers wireless access to the Internet
- a network that usually connects many LANS and covers an area the size of a city or district
- used between networks using the same protocol and determines the shortest path to destination
- network that branches out and covers a large area such as a state country or the globe
- network confined to a relatively small geographic area such as a room or building
- twisted pair networking cable capable of 1 Gbps transfer speeds, uses twisted pair
Down
- five common types describes the way networks are connected
- creates and reads “packets” of information created by systems in a network
- a user in a network with no centralized server each user can act as client or server
- allows the wireless exchange of information on a network
- the available data communications resources expressed in bits per second
- computers or workstations that access resources on the network
- topology using a central hub that all devices plug into
- a family of networking technologies commonly used to create LANs
- redirects signals received from network components to other systems
- a network used for communications between personal devices and the Internet
- unreliable topology that is easy to implement for small networks but hard to troubleshoot
- the distance one can be from the source of a hotspot
26 Clues: any connection point on a network • a site that offers wireless access to the Internet • the distance one can be from the source of a hotspot • a scalable topology that includes the uses of “roots” • common connector style on a twisted pair wiring system • topology using a central hub that all devices plug into • ...
IT Profession 2023-10-02
Across
- Who collects, processes, and analyzes data to provide insights and support decisionmaking?
- Who combines software development and IT operations to improve the software delivery process?
- Who specializes in securing computer networks and data against cyber threats?
- Who focuses on creating userfriendly and visually appealing interfaces for software and websites?
- Who manages and maintains an organization's computer systems and networks?
- Who evaluates software for defects and ensures it meets quality standards?
- Who develops algorithms and models for artificial intelligence and machine learning applications?
- Who analyzes business processes and designs IT systems to improve efficiency and productivity?
- Who specializes in the design, implementation, and management of cloud computing solutions?
- Who protects computer systems and data from security breaches and cyberattacks?
- Who leads and coordinates IT projects, ensuring they are completed on time and within budget?
- Who creates applications specifically for mobile devices, such as smartphones and tablets?
- Who oversees the storage, organization, and security of databases?
- Who writes and tests code to create software applications and systems?
- Who educates individuals or employees on using IT systems and software effectively?
Down
- Who analyzes and interprets complex data to extract valuable insights and make datadriven decisions?
- Who implements and manages integrated software systems for business processes?
- Who designs, implements, and manages computer networks for data communication?
- Who assesses an organization's IT systems and practices to ensure compliance and security?
- Who designs, develops, and tests software solutions for specific purposes?
- Who provides technical assistance and support to endusers and resolves ITrelated issues?
- Who identifies business needs and uses technology to find solutions to business problems?
- Developer Who works on blockchain technology to create secure and decentralized applications?
- Who designs and creates websites, web applications, and user interfaces?
- Who offers expert advice and solutions to organizations for their ITrelated challenges?
25 Clues: Who oversees the storage, organization, and security of databases? • Who writes and tests code to create software applications and systems? • Who designs and creates websites, web applications, and user interfaces? • Who designs, develops, and tests software solutions for specific purposes? • ...
ACTIVITY #1: Crossword Puzzle 2024-04-30
Across
- Trail of digital activities left behind by a user.
- Secret phrase for access control.
- Deliberate exploitation of computer systems or networks.
- Interconnected computers or devices.
- Right to control personal information.
- Hidden part of the internet not indexed by search engines.
- Writing instructions for computers.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Simulation of human intelligence by machines.
- Platforms for sharing content and connecting with others.
- Legal protection of creative works.
- Document displayed on the internet.
- Fraudulent attempt to obtain sensitive information.
- Software designed for a specific purpose or task.
- Distributed ledger technology for secure and transparent transactions.
- Malicious software.
- Verifying the identity of a user.
- Physical components of a computer system.
- Self-replicating program that spreads and harms systems.
- Precautions to protect against online threats.
Down
- Knowledge or data.
- Responsible use of technology and the internet.
- Transfer data from a remote system to a local device.
- Criminal activities conducted online.
- Encoding data for secure transmission.
- Creating software using programming languages.
- Harassment or intimidation online.
- Exchange of information or messages.
- Protection against threats.
- Software for accessing and viewing websites.
- Unauthorized use of someone's personal information.
- Ability to analyze and evaluate media content critically.
- Collection of related web pages.
- Buying and selling goods or services online.
- Programs and applications for computers.
- Electronic device for processing data.
- Graphical user interface on a computer.
- Legal regulations governing online activities.
- Legal principle allowing limited use of copyrighted material.
- Individuals who gain unauthorized access to systems or networks.
- Transfer data from a local device to a remote system.
- Relating to electronic technology.
- Reference or connection to another webpage or resource.
- Reference or connection to another webpage or resource (repeated).
- Information presented on the internet.
- Information in digital form.
- Criminal activities conducted online.
- Device for forwarding data packets between computer networks.
- Global network connecting computers and devices.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Secret phrase for access control. • Verifying the identity of a user. • Harassment or intimidation online. • Relating to electronic technology. • Writing instructions for computers. • ...
ACTIVITY #1: Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Crossword Puzzle 2024-04-30
Across
- Trail of digital activities left behind by a user.
- Protection against threats.
- Simulation of human intelligence by machines.
- Device for forwarding data packets between computer networks.
- Responsible use of technology and the internet.
- Physical components of a computer system.
- Individuals who gain unauthorized access to systems or networks.
- Exchange of information or messages.
- Distributed ledger technology for secure and transparent transactions.
- Collection of related web pages.
- Buying and selling goods or services online.
- Deliberate exploitation of computer systems or networks.
- Reference or connection to another webpage or resource (repeated).
- Malicious software.
- Legal regulations governing online activities.
- Ability to analyze and evaluate media content critically.
- Fraudulent attempt to obtain sensitive information.
- Harassment or intimidation online.
- Information presented on the internet.
- Interconnected computers or devices.
Down
- Criminal activities conducted online.
- Hidden part of the internet not indexed by search engines.
- Transfer data from a remote system to a local device.
- Knowledge or data.
- Electronic device for processing data.
- Criminal activities conducted online.
- Programs and applications for computers.
- Secret phrase for access control.
- Platforms for sharing content and connecting with others.
- Relating to electronic technology.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Unsolicited or unwanted emails or messages.
- Right to control personal information.
- Document displayed on the internet.
- Verifying the identity of a user.
- Writing instructions for computers.
- Main webpage of a website.
- Graphical user interface on a computer.
- Legal principle allowing limited use of copyrighted material.
- Self-replicating program that spreads and harms systems.
- Transfer data from a local device to a remote system.
- Creating software using programming languages.
- Software designed for a specific purpose or task.
- Software for accessing and viewing websites.
- Legal protection of creative works.
- Precautions to protect against online threats.
- Unauthorized use of someone's personal information.
- Global network connecting computers and devices.
- Information in digital form.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Secret phrase for access control. • Verifying the identity of a user. • Relating to electronic technology. • Harassment or intimidation online. • Document displayed on the internet. • ...
4.1 Explain the importance of basic network security concepts 2025-09-03
Across
- Regulation for protecting personal data in the EU
- Industrial devices connected to networks
- Weakness that could be exploited
- Physical method to secure rooms or racks
- Review to ensure policies and controls are followed
- Authentication that changes codes at regular intervals
- Digital proof of identity used in secure communication
- Single login grants access to multiple systems
- Standard for exchanging authentication data
- Device used for physical monitoring and security
- Technology used to control industrial equipment
- Standard for securing payment card information
- Refers to data moving across a network
- Process of verifying who a user is
- Centralized AAA protocol for network access
- Decoy system to attract attackers
- Potential danger to systems or data
- Security model of confidentiality, integrity, availability
- Group of honeypots working together
- Protects data by converting it into unreadable form
- Separate network for visitors with limited access
Down
- Assigning permissions based on a user’s job function
- Likelihood of a threat exploiting a vulnerability
- Restricts access based on physical location
- Code or method used to take advantage of a weakness
- Separating networks for security and performance
- Determines what resources a user is allowed to access
- Everyday smart devices connected to networks
- System for monitoring and controlling industrial processes
- Certificate created and trusted by its own issuer
- Industrial control system for automation and management
- Requirement that data stays within a certain region
- Principle of granting minimum necessary permissions
- Framework of CAs, certs, and keys for encryption
- Requires two or more factors for authentication
- System of policies and tools for identity management
- Directory protocol often used for authentication
- Cisco protocol for centralized authentication
- Refers to data stored on a device or disk
- Policy allowing employees to use personal devices
40 Clues: Weakness that could be exploited • Decoy system to attract attackers • Process of verifying who a user is • Potential danger to systems or data • Group of honeypots working together • Refers to data moving across a network • Industrial devices connected to networks • Physical method to secure rooms or racks • Refers to data stored on a device or disk • ...
Network Hunting 2023-12-26
Across
- Optics Transmission medium that uses light to transmit data
- Device that connects a computer or network to the internet
- Security system that monitors and controls incoming and outgoing network traffic
- System responsible for translating domain names into IP addresses
- Commonly used technology for wired connections in local networks
- Unit of data transmitted over a network
Down
- Measure of data transfer rate, typically in bits per second
- Device that connects multiple computer networks together
- Computer or software that requests and uses services provided by another computer
- Device used to connect devices within a local area network (LAN)
- Computer system that provides data or services to other computers
- Technology that creates a secure connection over a public network
12 Clues: Unit of data transmitted over a network • Device that connects multiple computer networks together • Device that connects a computer or network to the internet • Optics Transmission medium that uses light to transmit data • Measure of data transfer rate, typically in bits per second • Device used to connect devices within a local area network (LAN) • ...
Las redes sociales 2023-10-31
Across
- unknown
- locate
- advantages
- profile
- update
- they have written (2 palabras)
- recipient
- reliability
- fingerprint
- upload videos
- social networks/media
- risks
- password
- to check
Down
- dangers
- you informal have said (2 palabras)
- la totalidad
- account
- to quote
- alarming figures (2 palabras)
- label
- solutions
- benefit
- user
- trace
- link
- I have seen (2 palabras)
- download videos
- request
- contain
30 Clues: user • link • label • trace • risks • locate • update • dangers • account • unknown • profile • benefit • request • contain • to quote • password • to check • solutions • recipient • advantages • reliability • fingerprint • la totalidad • upload videos • download videos • social networks/media • I have seen (2 palabras) • alarming figures (2 palabras) • they have written (2 palabras) • you informal have said (2 palabras)
Network Concepts and Cyber Ethics 2025-06-03
Across
- collects data.
- Area Network.
- data for security.
- software.
- identifier for a device on a network.
- that forwards data packets between networks.
- for communication between devices.
- system that controls traffic.
- emails to steal data.
- system access.
Down
- networking method.
- network technology
- bullying.
- that provides services or data.
- creative work.
- data transfer rate.
- to access accounts securely.
- email.
- remote access method.
- to keep data secure.
20 Clues: email. • bullying. • software. • Area Network. • collects data. • creative work. • system access. • networking method. • network technology • data for security. • data transfer rate. • to keep data secure. • remote access method. • emails to steal data. • to access accounts securely. • system that controls traffic. • that provides services or data. • for communication between devices. • ...
ทดสอบเย่ๆ 2026-03-21
Across
- ปริมาณที่ใช้วัดความไร้ระเบียบของระบบ ตามกฎข้อที่สองของอุณหพลศาสตร์ ปริมาณนี้ของเอกภพจะเพิ่มขึ้นเสมอ
- กระบวนการตายของเซลล์ที่ถูกโปรแกรมไว้ล่วงหน้าอย่างเป็นระเบียบเพื่อรักษาสมดุลของเนื้อเยื่อ
- วัตถุทางคณิตศาสตร์ที่เป็นนัยทั่วไปของสเกลาร์และเวกเตอร์ เป็นหัวใจสำคัญในทฤษฎีสัมพัทธภาพทั่วไปของไอน์สไตน์
- ฟังก์ชันที่อธิบายพลศาสตร์ของระบบ หาได้จากผลต่างระหว่างพลังงานจลน์และพลังงานศักย์ (L = T - V)
- ฟังก์ชันต่อเนื่องที่มีฟังก์ชันผกผันต่อเนื่อง ใช้ระบุว่าปริภูมิเชิงทอพอโลยีสองปริภูมิมีความสมมูลกัน (เช่น โดนัทกับแก้วกาแฟ)
- ชื่อสมการคลื่นที่เป็นรากฐานของกลศาสตร์ควอนตัม อธิบายการเปลี่ยนแปลงสถานะของระบบควอนตัมตามเวลา
- ปริภูมิทางทอพอโลยีที่ในบริเวณใกล้เคียงจุดใดๆ มีลักษณะคล้ายกับปริภูมิยูคลิด (Euclidean space)
- กระบวนการทางฟิสิกส์ดาราศาสตร์ที่สร้างนิวเคลียสของธาตุใหม่จากนิวคลีออนที่มีอยู่เดิม มักเกิดขึ้นในใจกลางดาวฤกษ์
Down
- ปรากฏการณ์ทางควอนตัมที่สถานะของอนุภาคสองตัวมีความเกี่ยวข้องกันจนอธิบายแยกจากกันไม่ได้แม้จะอยู่ห่างกันแค่ไหน
- อัลกอริทึมหลักที่ใช้ฝึกฝนโครงข่ายประสาทเทียม (Neural Networks) โดยการคำนวณเกรเดียนต์ของฟังก์ชันความสูญเสียแบบย้อนกลับ
- ตัวดำเนินการที่สอดคล้องกับพลังงานรวมของระบบในกลศาสตร์ควอนตัมหรือระบบคลาสสิก (H = T + V)
- อนุภาคที่มีสปินเป็นครึ่งจำนวนเต็ม และต้องปฏิบัติตามหลักการกีดกันของเพาลี (Pauli Exclusion Principle)
- อัลกอริทึมชื่อดังในวิชาวิทยาการคอมพิวเตอร์ สำหรับหาเส้นทางที่สั้นที่สุดจากจุดเริ่มต้นไปยังจุดอื่นๆ ในกราฟ
- ฟังก์ชันแบบหนึ่งต่อหนึ่งและทั่วถึงที่คงสมบัติทางโครงสร้างระหว่างโครงสร้างทางพีชคณิตสองระบบ
- แบบจำลองเชิงคณิตศาสตร์ของการคำนวณที่ใช้เทปอนันต์และหัวอ่าน/เขียน เป็นรากฐานของทฤษฎีการคำนวณ
- กระบวนการที่มีลักษณะสุ่มหรือไม่สามารถพยากรณ์ได้อย่างแม่นยำล่วงหน้า มักใช้ตัวแบบความน่าจะเป็นมาอธิบาย
- โมเลกุลของ RNA ที่มีความสามารถในการเร่งปฏิกิริยาเคมีได้คล้ายกับเอนไซม์ที่เป็นโปรตีน
- สมบัติทางเคมีหรือฟิสิกส์ของโมเลกุลที่ไม่สามารถซ้อนทับกับภาพสะท้อนในกระจกของตัวเองได้สนิท (ความเป็นมือซ้าย-ขวา)
- สเกลาร์ \lambda ที่สอดคล้องกับสมการ Ax = \lambda x สำหรับเมทริกซ์จัตุรัส A และเวกเตอร์ที่ไม่ใช่ศูนย์ x
- เจ้าของหลักความไม่แน่นอนที่ระบุว่าเราไม่สามารถวัดตำแหน่งและโมเมนตัมของอนุภาคให้แม่นยำพร้อมกันได้
20 Clues: โมเลกุลของ RNA ที่มีความสามารถในการเร่งปฏิกิริยาเคมีได้คล้ายกับเอนไซม์ที่เป็นโปรตีน • ตัวดำเนินการที่สอดคล้องกับพลังงานรวมของระบบในกลศาสตร์ควอนตัมหรือระบบคลาสสิก (H = T + V) • กระบวนการตายของเซลล์ที่ถูกโปรแกรมไว้ล่วงหน้าอย่างเป็นระเบียบเพื่อรักษาสมดุลของเนื้อเยื่อ • ฟังก์ชันแบบหนึ่งต่อหนึ่งและทั่วถึงที่คงสมบัติทางโครงสร้างระหว่างโครงสร้างทางพีชคณิตสองระบบ • ...
Capítulo 5-La tecnología 2023-11-04
13 Clues: app(f) • blog(m) • file(m) • folder(f) • tablet(f) • keyboard(m) • password(f) • e-reader(m) • streaming(f) • “at” sign @ (f) • social networks(f) • portátil laptop(f) • electrónico email(m)
Unit Vocab 2021-09-28
Across
- a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures.
- any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices
- A hacker that violates computer security for their own profit or gain
- the process of recognizing a user's identity'
- a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
- an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected"
Down
- parts of the Internet not fully accessible through standard search engines
- measurement and statistical analysis of people's unique physical and behavioral characteristics
- a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities
- people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.
- a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means
- the gaining of unauthorized access to data in a system or computer.
- the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- a social or political activist act that is carried out by breaking into and wreaking havoc on a secure computer system
15 Clues: the process of recognizing a user's identity' • the gaining of unauthorized access to data in a system or computer. • A hacker that violates computer security for their own profit or gain • parts of the Internet not fully accessible through standard search engines • measurement and statistical analysis of people's unique physical and behavioral characteristics • ...
Computer Hardware 2022-09-30
Across
- a combined device for modulation and demodulation
- turn on and off
- passes information between two or more packet-switched computer networks
- hardware device or configured node on a local area network
- computers linked together to form a network in a circumscribed location
Down
- nodes are linked together, branching off other devices or nodes.
- a local area network
- a computer network that connects smaller networks.
- network which is designed to block unauthorized access
- a circuit board or chip, which is installed on a computer so it can connect to a network.
10 Clues: turn on and off • a local area network • a combined device for modulation and demodulation • a computer network that connects smaller networks. • network which is designed to block unauthorized access • hardware device or configured node on a local area network • nodes are linked together, branching off other devices or nodes. • ...
ttt 2022-08-16
Across
- a network element
- connects a LAN to a WAN
- an example of a wireless network medium
- filters signals between networks
Down
- receives a digital signal and regenerates the signal along the next leg of the medium.
- a powerful data terminal equipment in a network
- an example of a network operating system
- joins together two networks that use different protocols
8 Clues: a network element • connects a LAN to a WAN • filters signals between networks • an example of a wireless network medium • an example of a network operating system • a powerful data terminal equipment in a network • joins together two networks that use different protocols • receives a digital signal and regenerates the signal along the next leg of the medium.
Environmental Stress 2021-02-19
Across
- Bring in sunlight penetration and views.
- Surrounding in which a person completes tasks.
- Negatively related to telecommuting, the rate at which employees leave.
- Type of element found to relieve job stress (i.e., trees, plants, flowers, etc.)
- 'Equals control.' Gives one control over breaks, rules, environments, etc.
- Self-governance, independent of one's owns actions and behaviors, increases with telecommunication.
- The type of learning we are engaging in, far away from each other.
- Telecommuting is positively/negatively related to job performance (Hypothesis 5).
Down
- Amount of light in an environment.
- Most common device people use to complete their telecommuting tasks.
- Most common location to work other than the primary workplace.
- Global computer networks linked to other networks and provide information.
- Which gender experiences lower sunlight penetration and more negative outcomes.
- Term for alternative work arrangement, working somewhere other than the primary workplace.
- Telecommuting is positively/negatively related to work-family conflict (Hypothesis 2).
15 Clues: Amount of light in an environment. • Bring in sunlight penetration and views. • Surrounding in which a person completes tasks. • Most common location to work other than the primary workplace. • The type of learning we are engaging in, far away from each other. • Most common device people use to complete their telecommuting tasks. • ...
R&T English Crossword 2024-02-21
Across
- Acronym for the biggest form of network
- The variation of latency
- The equipement used to connect different networks
- An equipement that send anything it receive on all of its ports
- The delay before a transfer of data begins
- Group of technologies that use telephone lines to transmit digital data
- The maximum rate of data transfer across a given path
- Most used protocol on the Data-Link layer
Down
- An equipement that distribute the packets only to their destination
- A device or computer program that encodes/decodes a signal or data stream
- Usually placed at the entrance of a network to protect it from intrusion
- A device used to transmit or receive radio or television signals
- A part of a computer network which interconnects networks
- A protocol of the fourth layer that doesn't retrensmit lost packets
- The smallest addressable unit of memory for a computer
15 Clues: The variation of latency • Acronym for the biggest form of network • Most used protocol on the Data-Link layer • The delay before a transfer of data begins • The equipement used to connect different networks • The maximum rate of data transfer across a given path • The smallest addressable unit of memory for a computer • ...
Crossword 2023-05-02
Across
- A device that coverts digital signals in a form that can pass through a transmission medium
- Enables users locally and worldwide to send electronic messages to one person or to a group and to receive messages from others
- Determines the volume of data that can be transmitted in a given time
- The most popular means of communicating data wirelessly within a fixed location
- Acts as an interface between two networks
- A standard developed by a group of electronics manufacturers that allows any sort of electronic equipment to automatically make their own connections without wires, cables or any direct action from a user
- Usually referred to as webcasting
- A programming language that you can use to create web pages
- An interface that enables communication between two different networks
Down
- This is a type of threat that originates outside the organisation or institution with the intention of corrupting or stealing confidential information of that organisation
- A hardware device that allows a computer to send and receive data over a telephone line or a cable or satellite connection
- A network of networks that connects computers worldwide via a huge set of telecommunications links
- A device that connects multiple devices on the same network to facilitate communication among the devices
- A set of rules that define how computers interact or communicate with each other
- A group of two or more computers linked together so that they can share resources and can communicate with one another
15 Clues: Usually referred to as webcasting • Acts as an interface between two networks • A programming language that you can use to create web pages • Determines the volume of data that can be transmitted in a given time • An interface that enables communication between two different networks • ...
