networks Crossword Puzzles
Social Media Crossword 2023-04-01
Across
- A network for online picture sharing.
- It is an image or username that represents a person online most often within forums and social networks.
- An action that can be made by a Facebook user.
- A message sent on Twitter.
- Clusters of a user’s friends, colleagues,family or connections on Google+.
- A system that manages content.
- Here you are allowed to share a 140-character update.
- Anything shared across social networks that get passed along rapidly e.g. YouTube.
Down
- Simple web pages that can be edited by other users.
- A small, attractive application on a website such as a hit counter.
- They are also known as message boards.
- Platform founded by Mark Zuckerberg.
- A pictorial representation of a facial expression which is used in writing.
- A self-portrait taken using the reverse camera screen on a smartphone
- A photo sharing application gained more than 300 million users
- #
- A site updated frequently by an individual or group to record opinions or information.
- A one-to-one communication on the internet.
- A free URL shortening service.
19 Clues: # • A message sent on Twitter. • A system that manages content. • A free URL shortening service. • Platform founded by Mark Zuckerberg. • A network for online picture sharing. • They are also known as message boards. • A one-to-one communication on the internet. • An action that can be made by a Facebook user. • Simple web pages that can be edited by other users. • ...
Definitions for computer 2021-10-06
Across
- to gain information from someone else in a bad way
- parts of a computer or substance
- to pertain something
- small and portable soli device that can be inserted onto a USB
- the key to the computer system which stands for Central Processing Unit
- storage information
- a reason or limited use of copyrighting
- the way to communicate with other networks
- this is used to store memory and has lots of small chips
- when you take or steal information from someone else and copy it to make it look like yours
Down
- a website that allows to delete, gain, revise a content using a web browser
- a local network area
- a security use to protect the use of your network and data
- the right to make copies of music, artistic work and words
- stands for wide network area which is a computer network that connects smaller networks
- a storage device
- a security device that can help protect the computer
- used to connect cables to a computer
- this is often seen in messages and posts
19 Clues: a storage device • storage information • a local network area • to pertain something • parts of a computer or substance • used to connect cables to a computer • a reason or limited use of copyrighting • this is often seen in messages and posts • the way to communicate with other networks • to gain information from someone else in a bad way • ...
Tech 2023-05-02
14 Clues: Ctrl+P • A 0 or 1 • Google, Yahoo • Four 1s or 0s • Start a Device • Operating System • Internet Address • Restart a Device • Internet Protocol • System of Networks • Firefox, Edge, Safari • Central Processing Unit • Hypertext marker language • Portable Documnent Format
AND-FridayFun 2022-05-06
Across
- Messaging program designed specifically for the workplace
- When you start a terminal Linux running the ____, you're greeted with a prompt.
- Building of books
- the global system of interconnected computer networks that uses protocols to communicate between networks and devices.
- Adults and children do not like to share them, some for safety and others for their taste.
- IAM identity that you can create in your account that has specific permissions.
- Short compilations of songs.
- A minimal Docker image basen on Linux
Down
- AWS storage container
- A reptile that looks a little like a crocodile
- A polite address
- Puppet _____ is the application that manages the configurations on your nodes
- Company's name which the products are used to deliver applications faster.
- You can work with one, but more are always welcome.
- An open source software that does not require self plugin installations
- To resurrect and also pass a flower
- Command is used to initialise a working directory containing Terraform configuration files.
17 Clues: A polite address • Building of books • AWS storage container • Short compilations of songs. • To resurrect and also pass a flower • A minimal Docker image basen on Linux • A reptile that looks a little like a crocodile • You can work with one, but more are always welcome. • Messaging program designed specifically for the workplace • ...
Networking Fundamentals 2025-02-10
Across
- Networks are critical for the use of email, instant messaging, and fixing.
- Layer 7, supplies network services to end-user applications
- connects multiple devices devices within a network. Can be managed or unmanaged
- Used to make routing decisions. Can be static or dynamic
- Personal Area Network
- protocol connection-oriented, secure reliable conection
- stands for modulator and demodulator, used to convert analog to digital signals
- translates digital info into signals used to transfer data (ethernet or WI-FI)
Down
- Networks centralize data and make it more accessible to users.
- unique 48 bit hardware number that is embedded, consist of 6 octets
- Layer 1, responsible for the actual transmission of digital data.
- Network permits the sharing of files, database, and media
- Layer 6, it handles the syntax processing of message data.
- the maing goal is sending datagrams, as quickly as possible
- ___is two or more devices connected to exchange information
- 128 bits, consist of 8 octates
- Layer 3, works for the transmission of data from a source device in one network to a destination in another network
- layer 2, trnasmmit data to its destination device using the MAC address
18 Clues: Personal Area Network • 128 bits, consist of 8 octates • protocol connection-oriented, secure reliable conection • Used to make routing decisions. Can be static or dynamic • Network permits the sharing of files, database, and media • Layer 6, it handles the syntax processing of message data. • Layer 7, supplies network services to end-user applications • ...
ISSO June 2021 2021-06-07
Across
- IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
- The physical separation or isolation of a system from other systems or networks is known as an __ __.
- A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
- A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
- IRM office responsable for Cyber Operations oversight.
- ____ is the only thumb drive authorized on Department of State Automated Information Systems.
- vulnerabilities must be remediated within ___calendar days of initial detection.
- The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
- this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
- The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
- is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
- The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
- A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
- Criminal organization responsable for the cyber attack against the Colonial Pipeline.
- A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
- computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
- ISSO duties must be performed using an ISSO ___ account.
- The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
- of ___ is an attack that prevents or impairs the authorized use of information system resources or services.
19 Clues: IRM office responsable for Cyber Operations oversight. • ISSO duties must be performed using an ISSO ___ account. • vulnerabilities must be remediated within ___calendar days of initial detection. • Criminal organization responsable for the cyber attack against the Colonial Pipeline. • ...
Chapter 3 2012-09-05
Across
- Names that give you some insight to the purpose of the website you visit
- Internet feature that allows you to create a list of links for sites
- The main list of results from a search
- The selling and buying of goods and products on the Internet
- Used to help prevent unauthorized users from getting your data
- Web of computer networks that spans the earth
- When one computer links to another computer
Down
- A program that lets you find and view web pages
- System of computers that can handle documents in a special language
- An unsolicited or unwanted message
- Accessing computers or networks without permission
- When you put a group of words together between quotation marks in the search bar
- Refers to using material created by another person and claiming it as your own
- Term often used to describe rules for proper online behavior
- Allows users to post messages for others to read
15 Clues: An unsolicited or unwanted message • The main list of results from a search • When one computer links to another computer • Web of computer networks that spans the earth • A program that lets you find and view web pages • Allows users to post messages for others to read • Accessing computers or networks without permission • ...
test 2025-05-06
Across
- Object-oriented programming language designed for portability
- Global system of interconnected computer networks
- Data structure that stores elements of the same type in contiguous memory
- Set of instructions for a computer to execute a specific task
- Software development methodology focused on iterative progress
- Representational State Transfer, an architectural style for API design
- Instructions written in a programming language
- Collection of computers and devices connected together
Down
- A step-by-step procedure or formula for solving a problem or accomplishing a task
- Popular programming language known for readability and versatility
- A security system that monitors and controls incoming and outgoing network traffic
- A structured collection of data that is organized and stored for efficient retrieval
- Network device that forwards data packets between computer networks
- A computer or system that provides resources or services to other computers on a network
- A network of remote servers used to store, manage, and process data over the internet
15 Clues: Instructions written in a programming language • Global system of interconnected computer networks • Collection of computers and devices connected together • Object-oriented programming language designed for portability • Set of instructions for a computer to execute a specific task • Software development methodology focused on iterative progress • ...
Marketing Management tutorial 7 2025-11-19
Across
- Peer-to-peer communication that influences consumer decisions.
- Appeal type that boosts sharing by evoking strong feelings.
- The degree to which content is likely to be forwarded.
- One of the three viral marketing criteria—people who spread the message.
- Persuasive communicators who amplify a message before it spreads.
- The exponential spread of content across networks.
Down
- Knowledgeable consumers who rapidly pass along information.
- Individuals with huge networks who accelerate message spread.
- Emotional ad type where the brand is not central to the narrative.
- Viral campaigns that go wrong and damage brand reputation.
- Includes timing, context, and luck—must be “right” for virality.
- Successful viral campaigns with positive brand impact.
- Appeal that focuses on product attributes to increase brand evaluation.
- Must be interesting, surprising, or emotional to become contagious.
- When the brand is essential to the storyline, increasing brand value.
15 Clues: The exponential spread of content across networks. • Successful viral campaigns with positive brand impact. • The degree to which content is likely to be forwarded. • Viral campaigns that go wrong and damage brand reputation. • Knowledgeable consumers who rapidly pass along information. • Appeal type that boosts sharing by evoking strong feelings. • ...
Season4Sharing Scavenger Hunt! 2020-12-08
Across
- Our CFO's Last Name
- Service Makes Individuals’ Lives Easier
- Last Name of Nobel Prize Winner interviewed by Jean English during Ignite20
- Nikesh announced our intent to acquire this company in Nov 11, 2020
- A world where each day is safer and more secure than the one before
Down
- First name of one of our founders
- One of our NGFW competitors
- It is the name of our of our main brands
- Where has James McGregor worked the longest?
- On this month, Palo Alto Networks became a public company in the NYSE Stock Market
- To be the cybersecurity partner of choice, protecting our digital way of life
- Palo Alto Networks Stock Symbol
12 Clues: Our CFO's Last Name • One of our NGFW competitors • Palo Alto Networks Stock Symbol • First name of one of our founders • Service Makes Individuals’ Lives Easier • It is the name of our of our main brands • Where has James McGregor worked the longest? • Nikesh announced our intent to acquire this company in Nov 11, 2020 • ...
Web Ethics and Safety IV 2021-02-05
Across
- connects entirely different networks that work upon different protocols. It is the entry and the exit point of a network and controls access to other networks.
- computer device which forwards data packets from one network to another
- a multiport repeater having several input/output ports
- a billion bytes
- a million bytes
- uses broadband but does not require cable or phone lines;
Down
- category 5 cable with RJ – 45 connector
- network controller which connects network devices and allows effective communication between these devices
- a trillion bytes
- netwrok interface card internal or external component used to connect computer to a network
- primary device used to connect to the internet
- wireless network
12 Clues: a billion bytes • a million bytes • a trillion bytes • wireless network • category 5 cable with RJ – 45 connector • primary device used to connect to the internet • a multiport repeater having several input/output ports • uses broadband but does not require cable or phone lines; • computer device which forwards data packets from one network to another • ...
CSIT Networks, Security Threats, and protocols 2023-01-23
Across
- three principles that form the foundation of any organization's security
- A network that provides connectivity to wireless devices within a limited geographic area
- tricking Internet users into revealing personal or confidential information
- keeping data private
- Networks for homes, smaller offices and schools in a small, local setting
Down
- devices or steps taken to protect hardware or raw data
- Small Office and Home Office Networks typically Local Area setups
- protection of programs and data against malicious attacks and risks
- software intentionally designed to cause damage to a computer
- reliability of access to and use of data
- accuracy, completeness, and consistency of data
- a large network of information that is not tied to a single location.
12 Clues: keeping data private • reliability of access to and use of data • accuracy, completeness, and consistency of data • devices or steps taken to protect hardware or raw data • software intentionally designed to cause damage to a computer • Small Office and Home Office Networks typically Local Area setups • ...
Wireless, Mobile Computing & Mobile Commerce 2018-05-09
Across
- a wireless access point that provides service to a number of users within a small geographical perimeter (up to approximately 300 feet).
- virtually every object has processing power with either wireless or wired connections to a global network.
- networks using multiple Wi-Fi access points to create a wide area network that can be quite large and are essentially a series of interconnected local area networks.
- a medium-range WLAN.
- a real-time, wireless connection between a mobile device and other computing environments, such as the Internet or an intranet.
- offers uninterrupted, near CD-quality transmission that is beamed to your radio, either at home or in your car, from both GEO (XM Radio) and MEO (Sirius) satellites in space
- networks that connect users to the Internet over a geographically dispersed territory, they typically operate over the licensed spectrum (government regulation).that is, they use portions of the wireless spectrum that are regulated by the government.
- One major limitation of GEO satellites is that their transmissions take a quarter of a second to send and return from the earth's surface.
- the area of Earth’s surface reached by a satellite’s transmission overcomes the limitations of microwave data relay stations. The higher a satellite orbits, the larger its footprint
- enables peer-to-peer communications, so devices can connect directly allowing users to transfer content among devices without having to rely on a wireless antenna. It can connect pairs or groups of devices at Wi-Fi speeds of up to 250 Mbps and at distances of up to 800 feet.
Down
- uses radio-wave frequencies to send data directly between transmitters and receivers
- a small, portable wireless device that provides users with a permanent Wi-Fi hotspot wherever they go with a range of about 10 meters (roughly 30 feet).
- a wireless system that utilizes satellites to enable users to determine their position anywhere on Earth. GPS is supported by 24 MEO satellites that are shared worldwide
- e-commerce (EC) transactions conducted with a mobile device.
- in remote parts of the world it is the only option available for Internet connections because installing cables is either too expensive or physically impossible.
- Networks the familiar wireless local area networks (WLANs) and the most common type of Medium-Range network is wireless fidelity (Wi-Fi).
- a phenomenon that occurs when the functions of many physical devices are included in one other physical device. Consider that your smartphone includes the functions of digital cameras for images and video, radios, televisions, Internet access via Web browsers, recording studios, editing suites, movie theaters, GPS navigators, word processors, spreadsheets, stereos, flashlights, board games, card games, video games, an entire range of medical devices, maps, atlases, encyclopedias, dictionaries, translators, textbooks, watches, alarm clocks, books, calculators, address books, credit card swipers, magnifying glasses, money and credit cards, car keys, hotel keys, cellular telephony, Wi-Fi, e-mail access, text messaging, a full QWERTY keyboard, and many, many others.
- something that changes its location over time
- without wires.
- is red light that is not commonly visible to human eyes and common applications of infrared light are found in remote control units for televisions and DVD and CD players.
20 Clues: without wires. • a medium-range WLAN. • something that changes its location over time • e-commerce (EC) transactions conducted with a mobile device. • uses radio-wave frequencies to send data directly between transmitters and receivers • virtually every object has processing power with either wireless or wired connections to a global network. • ...
ICT Terminology 2025-10-07
6 Clues: : Electronic mail • : Computer programs • : Online data storage • : Security system for networks • : Wireless Internet connection • : Device that connects networks
Marketing crosswords 2024-07-03
Across
- actions that are intended to attract the public's attention to someone or something
- actions that reflect and measure how much your audience interacts with your content
- tangible object or a service provided to consumers
- person or something that influences another
- synonym of fashion
- distinctive catchword or catch phrase
Down
- plan for carrying out a process or procedure
- act of satisfying and retaining customers
- either or a pair of people engaged together in the same activity
- the assembledd spectators or listeners at a public or on networks
- way to express stories to convey a message in an unforgettable way
- condition of sharing or having certain attitudes and interests in common
- belief taht doing good for people and planet is also good for brand and bottom line - derived of advertising
- a graphic representation or symbol of a company name
- acronym - popular type of content on social networks (particularly on Tiktok)
15 Clues: synonym of fashion • distinctive catchword or catch phrase • act of satisfying and retaining customers • person or something that influences another • plan for carrying out a process or procedure • tangible object or a service provided to consumers • a graphic representation or symbol of a company name • either or a pair of people engaged together in the same activity • ...
Computer Network 2023-02-22
Across
- Wireless Topology contains a ___________ to connect hosts in a n/w to servers
- All ____________ bits cannot be set to zero/ one
- When all hosts in the N/W are connected to every other host, it creates a ____________
- ultimate wise area n/w spanning entire globe
- Physical layout of computers and other components on a network
- time taken by a data signal to travel from one location to another on a N/W
- Collection of computers connected together
- N/W that connects devices in an individuals workspace
- Route Navigation system using satellites
Down
- Communication between different networks
- Sending messages to all hosts on your network at once
- ClassA, ClassB, ClassC, ClassD, ClassE represent concept of ___________
- Determines network and host parts of your IP address
- Device used to communicate b/w networks
- Sending data from your home computer to the Internet
15 Clues: Device used to communicate b/w networks • Communication between different networks • Route Navigation system using satellites • Collection of computers connected together • ultimate wise area n/w spanning entire globe • All ____________ bits cannot be set to zero/ one • Determines network and host parts of your IP address • ...
Internet of Things ANALYN B. BULANIT MAEE 208 2024-09-20
Across
- software that acts as a bridge between an operating system and application, especially where IoT is concerned
- a small, fast-moving bird, metaphorically representing quick data processing
- the state of being vulnerable to being harmed
- the act of changing from one form to another
- small device that performs a specific task in IoT, often serving to collect and send data
- the link between two or more devices
- to think too much about something
- abbreviation for the fundamental language of the web's structure, often associated with IoT interface design
Down
- the technique of making an apparatus, a process, or a system operate automatically
- the worldwide system of interconnected networks
- data flow in one direction only
- a group or system of interconnected people or things
- a wireless technology standard for exchanging data over short distances
- device that detects or measures a physical property
- the global system of interconnected computer networks
15 Clues: data flow in one direction only • to think too much about something • the link between two or more devices • the act of changing from one form to another • the state of being vulnerable to being harmed • the worldwide system of interconnected networks • device that detects or measures a physical property • a group or system of interconnected people or things • ...
Capítulo 5-La tecnología 2023-11-04
13 Clues: app(f) • blog(m) • file(m) • folder(f) • tablet(f) • keyboard(m) • password(f) • e-reader(m) • streaming(f) • “at” sign @ (f) • social networks(f) • portátil laptop(f) • electrónico email(m)
Las redes sociales 2023-10-31
Across
- unknown
- locate
- advantages
- profile
- update
- they have written (2 palabras)
- recipient
- reliability
- fingerprint
- upload videos
- social networks/media
- risks
- password
- to check
Down
- dangers
- you informal have said (2 palabras)
- la totalidad
- account
- to quote
- alarming figures (2 palabras)
- label
- solutions
- benefit
- user
- trace
- link
- I have seen (2 palabras)
- download videos
- request
- contain
30 Clues: user • link • label • trace • risks • locate • update • dangers • account • unknown • profile • benefit • request • contain • to quote • password • to check • solutions • recipient • advantages • reliability • fingerprint • la totalidad • upload videos • download videos • social networks/media • I have seen (2 palabras) • alarming figures (2 palabras) • they have written (2 palabras) • you informal have said (2 palabras)
Network Concepts and Cyber Ethics 2025-06-03
Across
- collects data.
- Area Network.
- data for security.
- software.
- identifier for a device on a network.
- that forwards data packets between networks.
- for communication between devices.
- system that controls traffic.
- emails to steal data.
- system access.
Down
- networking method.
- network technology
- bullying.
- that provides services or data.
- creative work.
- data transfer rate.
- to access accounts securely.
- email.
- remote access method.
- to keep data secure.
20 Clues: email. • bullying. • software. • Area Network. • collects data. • creative work. • system access. • networking method. • network technology • data for security. • data transfer rate. • to keep data secure. • remote access method. • emails to steal data. • to access accounts securely. • system that controls traffic. • that provides services or data. • for communication between devices. • ...
Environmental Stress 2021-02-19
Across
- Telecommuting is positively/negatively related to job performance (Hypothesis 5).
- Surrounding in which a person completes tasks.
- Bring in sunlight penetration and views.
- Negatively related to telecommuting, the rate at which employees leave.
- Term for alternative work arrangement, working somewhere other than the primary workplace.
Down
- Most common location to work other than the primary workplace.
- Amount of light in an environment.
- Most common device people use to complete their telecommuting tasks.
- 'Equals control.' Gives one control over breaks, rules, environments, etc.
- Which gender experiences lower sunlight penetration and more negative outcomes.
- Telecommuting is positively/negatively related to work-family conflict (Hypothesis 2).
- Global computer networks linked to other networks and provide information.
- Self-governance, independent of one's owns actions and behaviors, increases with telecommunication.
- The type of learning we are engaging in, far away from each other.
- Type of element found to relieve job stress (i.e., trees, plants, flowers, etc.)
15 Clues: Amount of light in an environment. • Bring in sunlight penetration and views. • Surrounding in which a person completes tasks. • Most common location to work other than the primary workplace. • The type of learning we are engaging in, far away from each other. • Most common device people use to complete their telecommuting tasks. • ...
Network Hunting 2023-12-26
Across
- Optics Transmission medium that uses light to transmit data
- Device that connects a computer or network to the internet
- Security system that monitors and controls incoming and outgoing network traffic
- System responsible for translating domain names into IP addresses
- Commonly used technology for wired connections in local networks
- Unit of data transmitted over a network
Down
- Measure of data transfer rate, typically in bits per second
- Device that connects multiple computer networks together
- Computer or software that requests and uses services provided by another computer
- Device used to connect devices within a local area network (LAN)
- Computer system that provides data or services to other computers
- Technology that creates a secure connection over a public network
12 Clues: Unit of data transmitted over a network • Device that connects multiple computer networks together • Device that connects a computer or network to the internet • Optics Transmission medium that uses light to transmit data • Measure of data transfer rate, typically in bits per second • Device used to connect devices within a local area network (LAN) • ...
Hi 2023-02-15
Across
- a network management protocol used to automate the process of configuring devices on IP networks,
- serves the original purpose of private networks where data is protected, and resources are shared.
- responsible for translating domain names into a specific ip address.
- a company that lets you access the internet from home, usually with a monthly subscription.
- stands as a major changing point in the development of computer technology
- built around a single, central server that handles all major management and data processing functions.
- a service that helps you stay private online.
- A system or a program that requests the activity of one or more other systems or programs, called servers, to accomplish specific tasks.
- the arrangement of the elements of communication network.
- a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers.
- a computer program or device that provides a service to another computer program and its user, also known as the client
- a computer network that connects computers within a metropolitan area
- a part of a system that, if it fails, will stop the entire system from working.
Down
- a type of internet hosting in which the client leases and entire server not shared with anyone else.
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- a computer that stores web server software and a website's component files.
- a global computer network providing a variety of information and communication facilities.
- connects devices within a user's immediate area
- a device which controls access to separately stored files, as part of a multiuser system
- a network of multiple interconnected local area networks (LAN) in a limited geographical area.
- typically manages and organization's network.
- adress of a given unique resource on the web
- the technology that connects your offices, data centers, cloud applications, and cloud storage together.
23 Clues: adress of a given unique resource on the web • a service that helps you stay private online. • typically manages and organization's network. • connects devices within a user's immediate area • the arrangement of the elements of communication network. • responsible for translating domain names into a specific ip address. • ...
Networking Baics 2013-03-24
Across
- a scalable topology that includes the uses of “roots”
- topology that allows only one system to send information at a time
- the principle data routes creating the framework of the internet
- common connector style on a twisted pair wiring system
- transmits network data to only intended recipient gives all users same bandwidth
- any connection point on a network
- a computer that provides shared resources to users on a network
- a software or hardware based solution to keep a network safe
- a site that offers wireless access to the Internet
- a network that usually connects many LANS and covers an area the size of a city or district
- used between networks using the same protocol and determines the shortest path to destination
- network that branches out and covers a large area such as a state country or the globe
- network confined to a relatively small geographic area such as a room or building
- twisted pair networking cable capable of 1 Gbps transfer speeds, uses twisted pair
Down
- five common types describes the way networks are connected
- creates and reads “packets” of information created by systems in a network
- a user in a network with no centralized server each user can act as client or server
- allows the wireless exchange of information on a network
- the available data communications resources expressed in bits per second
- computers or workstations that access resources on the network
- topology using a central hub that all devices plug into
- a family of networking technologies commonly used to create LANs
- redirects signals received from network components to other systems
- a network used for communications between personal devices and the Internet
- unreliable topology that is easy to implement for small networks but hard to troubleshoot
- the distance one can be from the source of a hotspot
26 Clues: any connection point on a network • a site that offers wireless access to the Internet • the distance one can be from the source of a hotspot • a scalable topology that includes the uses of “roots” • common connector style on a twisted pair wiring system • topology using a central hub that all devices plug into • ...
IT Profession 2023-10-02
Across
- Who collects, processes, and analyzes data to provide insights and support decisionmaking?
- Who combines software development and IT operations to improve the software delivery process?
- Who specializes in securing computer networks and data against cyber threats?
- Who focuses on creating userfriendly and visually appealing interfaces for software and websites?
- Who manages and maintains an organization's computer systems and networks?
- Who evaluates software for defects and ensures it meets quality standards?
- Who develops algorithms and models for artificial intelligence and machine learning applications?
- Who analyzes business processes and designs IT systems to improve efficiency and productivity?
- Who specializes in the design, implementation, and management of cloud computing solutions?
- Who protects computer systems and data from security breaches and cyberattacks?
- Who leads and coordinates IT projects, ensuring they are completed on time and within budget?
- Who creates applications specifically for mobile devices, such as smartphones and tablets?
- Who oversees the storage, organization, and security of databases?
- Who writes and tests code to create software applications and systems?
- Who educates individuals or employees on using IT systems and software effectively?
Down
- Who analyzes and interprets complex data to extract valuable insights and make datadriven decisions?
- Who implements and manages integrated software systems for business processes?
- Who designs, implements, and manages computer networks for data communication?
- Who assesses an organization's IT systems and practices to ensure compliance and security?
- Who designs, develops, and tests software solutions for specific purposes?
- Who provides technical assistance and support to endusers and resolves ITrelated issues?
- Who identifies business needs and uses technology to find solutions to business problems?
- Developer Who works on blockchain technology to create secure and decentralized applications?
- Who designs and creates websites, web applications, and user interfaces?
- Who offers expert advice and solutions to organizations for their ITrelated challenges?
25 Clues: Who oversees the storage, organization, and security of databases? • Who writes and tests code to create software applications and systems? • Who designs and creates websites, web applications, and user interfaces? • Who designs, develops, and tests software solutions for specific purposes? • ...
ACTIVITY #1: Crossword Puzzle 2024-04-30
Across
- Trail of digital activities left behind by a user.
- Secret phrase for access control.
- Deliberate exploitation of computer systems or networks.
- Interconnected computers or devices.
- Right to control personal information.
- Hidden part of the internet not indexed by search engines.
- Writing instructions for computers.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Simulation of human intelligence by machines.
- Platforms for sharing content and connecting with others.
- Legal protection of creative works.
- Document displayed on the internet.
- Fraudulent attempt to obtain sensitive information.
- Software designed for a specific purpose or task.
- Distributed ledger technology for secure and transparent transactions.
- Malicious software.
- Verifying the identity of a user.
- Physical components of a computer system.
- Self-replicating program that spreads and harms systems.
- Precautions to protect against online threats.
Down
- Knowledge or data.
- Responsible use of technology and the internet.
- Transfer data from a remote system to a local device.
- Criminal activities conducted online.
- Encoding data for secure transmission.
- Creating software using programming languages.
- Harassment or intimidation online.
- Exchange of information or messages.
- Protection against threats.
- Software for accessing and viewing websites.
- Unauthorized use of someone's personal information.
- Ability to analyze and evaluate media content critically.
- Collection of related web pages.
- Buying and selling goods or services online.
- Programs and applications for computers.
- Electronic device for processing data.
- Graphical user interface on a computer.
- Legal regulations governing online activities.
- Legal principle allowing limited use of copyrighted material.
- Individuals who gain unauthorized access to systems or networks.
- Transfer data from a local device to a remote system.
- Relating to electronic technology.
- Reference or connection to another webpage or resource.
- Reference or connection to another webpage or resource (repeated).
- Information presented on the internet.
- Information in digital form.
- Criminal activities conducted online.
- Device for forwarding data packets between computer networks.
- Global network connecting computers and devices.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Secret phrase for access control. • Verifying the identity of a user. • Harassment or intimidation online. • Relating to electronic technology. • Writing instructions for computers. • ...
ACTIVITY #1: Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Crossword Puzzle 2024-04-30
Across
- Trail of digital activities left behind by a user.
- Protection against threats.
- Simulation of human intelligence by machines.
- Device for forwarding data packets between computer networks.
- Responsible use of technology and the internet.
- Physical components of a computer system.
- Individuals who gain unauthorized access to systems or networks.
- Exchange of information or messages.
- Distributed ledger technology for secure and transparent transactions.
- Collection of related web pages.
- Buying and selling goods or services online.
- Deliberate exploitation of computer systems or networks.
- Reference or connection to another webpage or resource (repeated).
- Malicious software.
- Legal regulations governing online activities.
- Ability to analyze and evaluate media content critically.
- Fraudulent attempt to obtain sensitive information.
- Harassment or intimidation online.
- Information presented on the internet.
- Interconnected computers or devices.
Down
- Criminal activities conducted online.
- Hidden part of the internet not indexed by search engines.
- Transfer data from a remote system to a local device.
- Knowledge or data.
- Electronic device for processing data.
- Criminal activities conducted online.
- Programs and applications for computers.
- Secret phrase for access control.
- Platforms for sharing content and connecting with others.
- Relating to electronic technology.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Unsolicited or unwanted emails or messages.
- Right to control personal information.
- Document displayed on the internet.
- Verifying the identity of a user.
- Writing instructions for computers.
- Main webpage of a website.
- Graphical user interface on a computer.
- Legal principle allowing limited use of copyrighted material.
- Self-replicating program that spreads and harms systems.
- Transfer data from a local device to a remote system.
- Creating software using programming languages.
- Software designed for a specific purpose or task.
- Software for accessing and viewing websites.
- Legal protection of creative works.
- Precautions to protect against online threats.
- Unauthorized use of someone's personal information.
- Global network connecting computers and devices.
- Information in digital form.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Secret phrase for access control. • Verifying the identity of a user. • Relating to electronic technology. • Harassment or intimidation online. • Document displayed on the internet. • ...
4.1 Explain the importance of basic network security concepts 2025-09-03
Across
- Regulation for protecting personal data in the EU
- Industrial devices connected to networks
- Weakness that could be exploited
- Physical method to secure rooms or racks
- Review to ensure policies and controls are followed
- Authentication that changes codes at regular intervals
- Digital proof of identity used in secure communication
- Single login grants access to multiple systems
- Standard for exchanging authentication data
- Device used for physical monitoring and security
- Technology used to control industrial equipment
- Standard for securing payment card information
- Refers to data moving across a network
- Process of verifying who a user is
- Centralized AAA protocol for network access
- Decoy system to attract attackers
- Potential danger to systems or data
- Security model of confidentiality, integrity, availability
- Group of honeypots working together
- Protects data by converting it into unreadable form
- Separate network for visitors with limited access
Down
- Assigning permissions based on a user’s job function
- Likelihood of a threat exploiting a vulnerability
- Restricts access based on physical location
- Code or method used to take advantage of a weakness
- Separating networks for security and performance
- Determines what resources a user is allowed to access
- Everyday smart devices connected to networks
- System for monitoring and controlling industrial processes
- Certificate created and trusted by its own issuer
- Industrial control system for automation and management
- Requirement that data stays within a certain region
- Principle of granting minimum necessary permissions
- Framework of CAs, certs, and keys for encryption
- Requires two or more factors for authentication
- System of policies and tools for identity management
- Directory protocol often used for authentication
- Cisco protocol for centralized authentication
- Refers to data stored on a device or disk
- Policy allowing employees to use personal devices
40 Clues: Weakness that could be exploited • Decoy system to attract attackers • Process of verifying who a user is • Potential danger to systems or data • Group of honeypots working together • Refers to data moving across a network • Industrial devices connected to networks • Physical method to secure rooms or racks • Refers to data stored on a device or disk • ...
Unit Vocab 2021-09-28
Across
- a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures.
- any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices
- A hacker that violates computer security for their own profit or gain
- the process of recognizing a user's identity'
- a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
- an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected"
Down
- parts of the Internet not fully accessible through standard search engines
- measurement and statistical analysis of people's unique physical and behavioral characteristics
- a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities
- people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.
- a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means
- the gaining of unauthorized access to data in a system or computer.
- the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- a social or political activist act that is carried out by breaking into and wreaking havoc on a secure computer system
15 Clues: the process of recognizing a user's identity' • the gaining of unauthorized access to data in a system or computer. • A hacker that violates computer security for their own profit or gain • parts of the Internet not fully accessible through standard search engines • measurement and statistical analysis of people's unique physical and behavioral characteristics • ...
Computer Hardware 2022-09-30
Across
- a combined device for modulation and demodulation
- turn on and off
- passes information between two or more packet-switched computer networks
- hardware device or configured node on a local area network
- computers linked together to form a network in a circumscribed location
Down
- nodes are linked together, branching off other devices or nodes.
- a local area network
- a computer network that connects smaller networks.
- network which is designed to block unauthorized access
- a circuit board or chip, which is installed on a computer so it can connect to a network.
10 Clues: turn on and off • a local area network • a combined device for modulation and demodulation • a computer network that connects smaller networks. • network which is designed to block unauthorized access • hardware device or configured node on a local area network • nodes are linked together, branching off other devices or nodes. • ...
ttt 2022-08-16
Across
- a network element
- connects a LAN to a WAN
- an example of a wireless network medium
- filters signals between networks
Down
- receives a digital signal and regenerates the signal along the next leg of the medium.
- a powerful data terminal equipment in a network
- an example of a network operating system
- joins together two networks that use different protocols
8 Clues: a network element • connects a LAN to a WAN • filters signals between networks • an example of a wireless network medium • an example of a network operating system • a powerful data terminal equipment in a network • joins together two networks that use different protocols • receives a digital signal and regenerates the signal along the next leg of the medium.
Topic 7 Networks 2021-06-30
Across
- type of communication in which a physical propagation medium is not used, but modulation of electromagnetic waves, radiation or optical means is used?
- device that connects different computers on the same local area network?
- set of computers connected to each other through various methods to share information and services.?
- is a systemization of wireless communication to minimize wired connections.?
- it is a type of twisted pair cable?
- Scope is limited to a small physical space, such as a house, an apartment, or at most a building.?
- device capable of converting digital signals into analog, but also analog into digital.?
Down
- World-class computer network that uses the telephone line to transmit information?
- it is a sign, a gesture or another type of report or warning of something.?
- to any type of network with a high capacity to transport information that affects its transmission speed.?
- Device used to emit or receive radio waves?
11 Clues: it is a type of twisted pair cable? • Device used to emit or receive radio waves? • device that connects different computers on the same local area network? • it is a sign, a gesture or another type of report or warning of something.? • is a systemization of wireless communication to minimize wired connections.? • ...
Crossword 2023-05-02
Across
- A device that coverts digital signals in a form that can pass through a transmission medium
- Enables users locally and worldwide to send electronic messages to one person or to a group and to receive messages from others
- Determines the volume of data that can be transmitted in a given time
- The most popular means of communicating data wirelessly within a fixed location
- Acts as an interface between two networks
- A standard developed by a group of electronics manufacturers that allows any sort of electronic equipment to automatically make their own connections without wires, cables or any direct action from a user
- Usually referred to as webcasting
- A programming language that you can use to create web pages
- An interface that enables communication between two different networks
Down
- This is a type of threat that originates outside the organisation or institution with the intention of corrupting or stealing confidential information of that organisation
- A hardware device that allows a computer to send and receive data over a telephone line or a cable or satellite connection
- A network of networks that connects computers worldwide via a huge set of telecommunications links
- A device that connects multiple devices on the same network to facilitate communication among the devices
- A set of rules that define how computers interact or communicate with each other
- A group of two or more computers linked together so that they can share resources and can communicate with one another
15 Clues: Usually referred to as webcasting • Acts as an interface between two networks • A programming language that you can use to create web pages • Determines the volume of data that can be transmitted in a given time • An interface that enables communication between two different networks • ...
Desiree Delgado internet crossword puzzle 2013-03-26
Across
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- An unauthorized person who secretly gains access to computer files.
- a piece of writing that has been copied from someone else and is presented as being your own work
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- To renew or revitalize; To reload a webpage on the internet
Down
- – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- A bully who operates online, in cyberspace; To bully online
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- a reference to a published or unpublished source (not always the original source).
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- software used to view various kinds of Internet resources found on the Web.
12 Clues: A bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • a reference to a published or unpublished source (not always the original source). • ...
Environmental Stress 2021-02-19
Across
- Bring in sunlight penetration and views.
- Surrounding in which a person completes tasks.
- Negatively related to telecommuting, the rate at which employees leave.
- Type of element found to relieve job stress (i.e., trees, plants, flowers, etc.)
- 'Equals control.' Gives one control over breaks, rules, environments, etc.
- Self-governance, independent of one's owns actions and behaviors, increases with telecommunication.
- The type of learning we are engaging in, far away from each other.
- Telecommuting is positively/negatively related to job performance (Hypothesis 5).
Down
- Amount of light in an environment.
- Most common device people use to complete their telecommuting tasks.
- Most common location to work other than the primary workplace.
- Global computer networks linked to other networks and provide information.
- Which gender experiences lower sunlight penetration and more negative outcomes.
- Term for alternative work arrangement, working somewhere other than the primary workplace.
- Telecommuting is positively/negatively related to work-family conflict (Hypothesis 2).
15 Clues: Amount of light in an environment. • Bring in sunlight penetration and views. • Surrounding in which a person completes tasks. • Most common location to work other than the primary workplace. • The type of learning we are engaging in, far away from each other. • Most common device people use to complete their telecommuting tasks. • ...
R&T English Crossword 2024-02-21
Across
- Acronym for the biggest form of network
- The variation of latency
- The equipement used to connect different networks
- An equipement that send anything it receive on all of its ports
- The delay before a transfer of data begins
- Group of technologies that use telephone lines to transmit digital data
- The maximum rate of data transfer across a given path
- Most used protocol on the Data-Link layer
Down
- An equipement that distribute the packets only to their destination
- A device or computer program that encodes/decodes a signal or data stream
- Usually placed at the entrance of a network to protect it from intrusion
- A device used to transmit or receive radio or television signals
- A part of a computer network which interconnects networks
- A protocol of the fourth layer that doesn't retrensmit lost packets
- The smallest addressable unit of memory for a computer
15 Clues: The variation of latency • Acronym for the biggest form of network • Most used protocol on the Data-Link layer • The delay before a transfer of data begins • The equipement used to connect different networks • The maximum rate of data transfer across a given path • The smallest addressable unit of memory for a computer • ...
Network Hunting 2023-12-26
Across
- Optics Transmission medium that uses light to transmit data
- Device that connects a computer or network to the internet
- Security system that monitors and controls incoming and outgoing network traffic
- System responsible for translating domain names into IP addresses
- Commonly used technology for wired connections in local networks
- Unit of data transmitted over a network
Down
- Measure of data transfer rate, typically in bits per second
- Device that connects multiple computer networks together
- Computer or software that requests and uses services provided by another computer
- Device used to connect devices within a local area network (LAN)
- Computer system that provides data or services to other computers
- Technology that creates a secure connection over a public network
12 Clues: Unit of data transmitted over a network • Device that connects multiple computer networks together • Device that connects a computer or network to the internet • Optics Transmission medium that uses light to transmit data • Measure of data transfer rate, typically in bits per second • Device used to connect devices within a local area network (LAN) • ...
Network Hardware 2019-03-04
Across
- Rules governing how networks send and receive information?
- A method of connecting devices on a network without using cables?
- What does WAN stand for?
- What does WAP stand for?
- Device used for connecting networks to the internet?
Down
- What does LAN stand for?
- NIC stands for Network I............. Card?
- Device used in a star network to connect devices together
8 Clues: What does LAN stand for? • What does WAN stand for? • What does WAP stand for? • NIC stands for Network I............. Card? • Device used for connecting networks to the internet? • Device used in a star network to connect devices together • Rules governing how networks send and receive information? • A method of connecting devices on a network without using cables?
Crossword 2023-05-02
Across
- The most popular means of communicating data wirelessly within a fixed location
- An interface that enables communication between two different networks
- Determines the volume of data that can be transmitted in a given time
- A standard developed by a group of electronics manufacturers that allows any sort of electronic equipment to automatically make their own connections without wires, cables or any direct action from a user
- A hardware device that allows a computer to send and receive data over a telephone line or a cable or satellite connection
- Acts as an interface between two networks
- A group of two or more computers linked together so that they can share resources and can communicate with one another
Down
- A network of networks that connects computers worldwide via a huge set of telecommunications links
- A device that coverts digital signals in a form that can pass through a transmission medium
- A device that connects multiple devices on the same network to facilitate communication among the devices
- Enables users locally and worldwide to send electronic messages to one person or to a group and to receive messages from others
- Usually referred to as webcasting
- A programming language that you can use to create web pages
- This is a type of threat that originates outside the organisation or institution with the intention of corrupting or stealing confidential information of that organisation
- A set of rules that define how computers interact or communicate with each other
15 Clues: Usually referred to as webcasting • Acts as an interface between two networks • A programming language that you can use to create web pages • Determines the volume of data that can be transmitted in a given time • An interface that enables communication between two different networks • ...
Social Network 2014-06-03
7 Clues: No like, just +. • Message over Message. • To communicate on the Internet. • Here you can tweet like a bird. • Tell every body what´s up with you. • One of the most popular social networks. • Everybody who uses social networks need one.
Crossword Puzzle 2024-04-30
Across
- Trail of digital activities left behind by a user.
- Protection against threats.
- Simulation of human intelligence by machines.
- Device for forwarding data packets between computer networks.
- Responsible use of technology and the internet.
- Physical components of a computer system.
- Individuals who gain unauthorized access to systems or networks.
- Exchange of information or messages.
- Distributed ledger technology for secure and transparent transactions.
- Collection of related web pages.
- Buying and selling goods or services online.
- Deliberate exploitation of computer systems or networks.
- Reference or connection to another webpage or resource (repeated).
- Malicious software.
- Legal regulations governing online activities.
- Ability to analyze and evaluate media content critically.
- Fraudulent attempt to obtain sensitive information.
- Harassment or intimidation online.
- Information presented on the internet.
- Interconnected computers or devices.
Down
- Criminal activities conducted online.
- Hidden part of the internet not indexed by search engines.
- Transfer data from a remote system to a local device.
- Knowledge or data.
- Electronic device for processing data.
- Criminal activities conducted online.
- Programs and applications for computers.
- Secret phrase for access control.
- Platforms for sharing content and connecting with others.
- Relating to electronic technology.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Unsolicited or unwanted emails or messages.
- Right to control personal information.
- Document displayed on the internet.
- Verifying the identity of a user.
- Writing instructions for computers.
- Main webpage of a website.
- Graphical user interface on a computer.
- Legal principle allowing limited use of copyrighted material.
- Self-replicating program that spreads and harms systems.
- Transfer data from a local device to a remote system.
- Creating software using programming languages.
- Software designed for a specific purpose or task.
- Software for accessing and viewing websites.
- Legal protection of creative works.
- Precautions to protect against online threats.
- Unauthorized use of someone's personal information.
- Global network connecting computers and devices.
- Information in digital form.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Secret phrase for access control. • Verifying the identity of a user. • Relating to electronic technology. • Harassment or intimidation online. • Document displayed on the internet. • ...
Network and Big Data 2022-10-20
Across
- A set of physical network device that is essential to make a network system function
- Passage to connect 2 networks together that can work on different networking models (MAN/LAN/WAN)
- A collection of discrete values that convey information, describing facts and statistics collected
- A layer of network security designed to limit the control of each user by their level of access
- A set of guidelines that controls how data is transferred between different devices in the same network
Down
- Barriers between an internal and external network
- A set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies
- A repeater that has the ability to filter content by reading the MAC (media access control) addresses and its destination
- One of the 5 Vs of Big Data that refers to the importance of data richness in which big data can provide, it is also dependent on modern society and each individual input is unique to one another
- Collection of connected computing devices
- Arrangement of the elements of a communication network
- Hardware used to used to connect and transfer data and information between computers, routers, switches and storage area networks
12 Clues: Collection of connected computing devices • Barriers between an internal and external network • Arrangement of the elements of a communication network • A set of physical network device that is essential to make a network system function • A layer of network security designed to limit the control of each user by their level of access • ...
MACHINE INTELLIGENCE FOR MEDICAL IMAGE ANALYSIS 2024-01-18
11 Clues: trees • forests • networks • labelling • Classifier • Classifier • CT Scanners • learning process • tumors in PET images • Computation and selection • learning architectures for segmentation
Internet of Things in 5G 2024-04-16
Across
- Devices that act upon data in the IoT ecosystem
- A technology that enables IoT devices to communicate with each other seamlessly.
- Wireless communication standard crucial for IoT evolution.
- Devices that collect data in the IoT ecosystem
Down
- The 'I' in IoT stands for ____________
- IoT devices used for remotely controlling appliances and electronics
- Common IoT device used for home automation.
- A network architecture where computing happens closer to the data source in IoT
- Communication networks in 5G that connect IoT devices.
- A term for the vast network of interconnected devices in IoT.
10 Clues: The 'I' in IoT stands for ____________ • Common IoT device used for home automation. • Devices that collect data in the IoT ecosystem • Devices that act upon data in the IoT ecosystem • Communication networks in 5G that connect IoT devices. • Wireless communication standard crucial for IoT evolution. • A term for the vast network of interconnected devices in IoT. • ...
Day2 recap 2025-06-24
Across
- Activation function used in all the hidden layers
- S-shaped activation function that outputs values between 0 and 1
- Unsupervised learning technique for grouping similar data points
- Machine learning task that predicts discrete categories like spam or not spam
- Popular clustering algorithm that groups data into K clusters
Down
- Basic computational unit in neural networks inspired by brain cells
- Type of regression algorithm used for classification problems
- Type of layer between input and output in neural networks
- term used for parameters in a neuron
- activation function used for multiclass classification
10 Clues: term used for parameters in a neuron • Activation function used in all the hidden layers • activation function used for multiclass classification • Type of layer between input and output in neural networks • Type of regression algorithm used for classification problems • Popular clustering algorithm that groups data into K clusters • ...
Urban geography 2020-06-23
Across
- transport
- to fall
- spreading
- dirty water
- new settlements out of the city
- loud sounds
- where people live
- locked
- centre
- the increase of importance of large cities
- the throw back of heat
Down
- dirtying the environment
- industry and trade
- from combustion processes
- close together
- to store
- when you have nothing to eat
- networks: important for the society and economy
18 Clues: locked • centre • to fall • to store • transport • spreading • dirty water • loud sounds • close together • where people live • industry and trade • the throw back of heat • dirtying the environment • from combustion processes • when you have nothing to eat • new settlements out of the city • the increase of importance of large cities • networks: important for the society and economy
Williams-Networking Basics-Spring 2014 2014-03-23
Across
- What is the device that connects a computer to the cabling of a computer network?
- A type of high-speed data transmission used in which bandwidth is shared by more than on signal.
- These devices use tables to lookup recipient addresses to efficiently deliver information packets across networks.
- What type of inexpensive network is used in a small home where security is not a priority and no network administrator is required?
- Districts create these policies to outline the intended uses of the network and Internet.
- What type of topology has every system connected with complete redundancy so that if any cable fails, the system stays connected?
- The government program provides help to obtain affordable telecommunication and Internet access to districts within the United States.
- These are computers that access resources on the server or other computers.
- This protocol is used by districts to handle phone calls via school's data networks.
Down
- __________ computing relies on shared computing resources rather than local servers and local computers to handle applications.
- This type of cabling uses light to carry the signal, but is very expensive.
- These are the computers that provide shared resources like file, email, and print services.
- These components are used to transmit data.
- This type of connection is often used in home and business wired networks.
- This device, often known as a smart hub, forwards information directly to intended recipient without broadcasting information to all other devices on the network.
15 Clues: These components are used to transmit data. • This type of connection is often used in home and business wired networks. • This type of cabling uses light to carry the signal, but is very expensive. • These are computers that access resources on the server or other computers. • What is the device that connects a computer to the cabling of a computer network? • ...
INTERNETWORKING 2025-01-23
Across
- A device that connects different networks and determines the best path for data transmission.
- Devices like routers and bridges that connect different networks and facilitate communication.
- A global collection of interconnected networks.
Down
- A private network used internally within an organization.
- The process of breaking packets into smaller pieces to match the receiving network’s size.
- Devices like computers or printers that are directly connected to the network and use it for communication.
- A device that connects two similar LANs at the Data Link Layer (Layer 2).
7 Clues: A global collection of interconnected networks. • A private network used internally within an organization. • A device that connects two similar LANs at the Data Link Layer (Layer 2). • The process of breaking packets into smaller pieces to match the receiving network’s size. • ...
Chapter 9 2020-01-09
Across
- a communication model in which a dedicated communication path is established between two hosts and on which all messages travel.
- the software that manages network resources for a node on a network, and may provide security and access control.
- a communications device or program that passes data between networks having similar functions but different protocols.
- a set of rules to control the flow of messages through a network.
- a local area network with wireless nodes.
- a network usually constructed with long-distance, point-to- point lines, covering a large geographic area.
Down
- a communication model in which messages are individually routed between hosts, with no previously established communication path.
- an operating system that provides control for a distributed computing system, allowing its resources to be accessed in a unified way.
- a network topology in which each node is connected to two adjacent nodes.
- a protocol designed for use in Internet Protocol (IP) networks, concerned with tracking the operational state of every network interface.
- a type of local area network with stations wired into a ring network.
- a data-link layer device used to interconnect multiple networks using the same protocol.
- a data network intended to serve an area covering only a few square kilometers or less.
13 Clues: a local area network with wireless nodes. • a set of rules to control the flow of messages through a network. • a type of local area network with stations wired into a ring network. • a network topology in which each node is connected to two adjacent nodes. • a data network intended to serve an area covering only a few square kilometers or less. • ...
8.2 terms 2013-02-13
Across
- a type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire
- a special series of bits that travels around a token-ring network
- a common connection point for devices in a network
- a device that forwards data packets between computer networks
- every node is connected to central node called a hub or switch
- a cable rack that interconnects and manages the telecommunications wiring between an MDF and workstation devices
- a network architecture in which each computer or process on the network is either a client or a server
- ethernet card that is plugged into a slot on the computer's motherboard
- a system of digital message formats and rules for exchanging those messages in or between computing systems
- connects multiple star networks
- supplies networking capability to a group of computers in close proximity
- a type of cable that consists of two independently insulated wires twisted around one another
- type of network in which each workstation has equivalent capabilities and responsibilities
- network cabling scheme in which one cable sequentially connects all nodes and forms a closed loop
- topology of a network whose components are connected by a busbar
- critical elements of any computer network
- another fundamental part of many networks because they speed things up
Down
- technology that uses glass (or plastic) threads to transmit data
- a cable rack that interconnects and manages the telecommunication wiring between itself and any number of IDF's
- refers to any type of computer network that is not connected by cables of any kind
- a visual representation or image painted, drawn, or photographed
- unique string of numbers separated by periods that identifies each computer
- collection of computers and other hardware
- spans a large geographic area
- one unit of binary data capable of being routed through a network
25 Clues: spans a large geographic area • connects multiple star networks • critical elements of any computer network • collection of computers and other hardware • a common connection point for devices in a network • a device that forwards data packets between computer networks • every node is connected to central node called a hub or switch • ...
Crossword Puzzle 2024-04-30
Across
- Main webpage of a website.
- Information in digital form.
- Knowledge or data.
- Buying and selling goods or services online.
- Malicious software.
- Platforms for sharing content and connecting with others.
- Information presented on the internet.
- Software designed for a specific purpose or task.
- Relating to electronic technology.
- Protection against threats.
- Interconnected computers or devices.
- Device for forwarding data packets between computer networks.
- Deliberate exploitation of computer systems or networks.
- Harassment or intimidation online.
- Physical components of a computer system.
- Unsolicited or unwanted emails or messages.
- Global network connecting computers and devices.
- Collection of related web pages.
- Individuals who gain unauthorized access to systems or networks.
- Right to control personal information.
- Software for accessing and viewing websites.
- Verifying the identity of a user.
- Programs and applications for computers.
- Legal regulations governing online activities.
- Precautions to protect against online threats.
- Reference or connection to another webpage or resource (repeated).
- Creating software using programming languages.
Down
- Responsible use of technology and the internet.
- Encoding data for secure transmission.
- Transfer data from a local device to a remote system.
- Writing instructions for computers.
- Electronic device for processing data.
- Exchange of information or messages.
- Transfer data from a remote system to a local device.
- Simulation of human intelligence by machines.
- Hidden part of the internet not indexed by search engines.
- Legal principle allowing limited use of copyrighted material.
- Legal protection of creative works.
- Document displayed on the internet.
- Trail of digital activities left behind by a user.
- Criminal activities conducted online.
- Distributed ledger technology for secure and transparent transactions.
- Self-replicating program that spreads and harms systems.
- Reference or connection to another webpage or resource.
- Criminal activities conducted online.
- Ability to analyze and evaluate media content critically.
- Unauthorized use of someone's personal information.
- Fraudulent attempt to obtain sensitive information.
- Secret phrase for access control.
- Graphical user interface on a computer.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Relating to electronic technology. • Harassment or intimidation online. • Writing instructions for computers. • ...
Crossword Puzzle with Technological Terms 2024-10-19
Across
- A type of computer memory used to store working data
- Remote servers used to store and access data over the internet
- Files (named after a type of food) stored on a user's computer that hold data related to their web browsing
- Data and commands entered into a computer for processing
- An acronym for a website's unique identifier
- The main circuit board in a computer
- A global network connecting millions of different networks
- A group of computers connected together to share resources
- Instructions which instruct a computer on what to do
- An acronym for a commonly used file type which presents online images
- A string of numbers used to identify a device on a network
- The address used to access a resource on the internet
- The location of a specific website
- The primary user interface of a computer, where applications and files are displayed
- A device used to control a pointer on a computer screen
- An acronym for animated image files
Down
- A device with keys used to type text
- A programming language used to create interactive effects within web browsers
- A device that forwards data packets between computer networks
- A wireless technology used to connect devices to a local area network or the internet
- The central processing unit of a computer that is responsible for executing instructions
- An electronic device that processes data and performs tasks according to instructions
- The tiny dots which create an image on your computer screen
- The process of converting data into a secure format that cannot be easily accessed
- A wired networking technology used for local area networks
- A unit of digital information equal to roughly one billion bytes
- Software designed to damage or gain unauthorized access to a computer system
- The process of finding and fixing errors in code
- An unwanted or unsolicited email
- A security system that monitors incoming and outgoing network traffic
30 Clues: An unwanted or unsolicited email • The location of a specific website • An acronym for animated image files • A device with keys used to type text • The main circuit board in a computer • An acronym for a website's unique identifier • The process of finding and fixing errors in code • A type of computer memory used to store working data • ...
Betelihem Abeje 12/05/2024 2024-12-06
Across
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- security features that enable administrators to control who has access to the network
- testers who are paid to probe networks and report vulnerabilities
- allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
- a document that describes the rules governing access to an organization’s information resources
- a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- attackers who do not report problems, but instead disseminate the information to other black hat attackers
- creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- WSUS is a server role that makes it possible for administrators to take control of Microsoft product updates a process called
- only backs up files that have changed since the last full backup
Down
- a Windows domain environment and provides mutual authentication
- to supply two or more types of authentication drawn from Knowledge, Possession, Inherence
- security features that enable what users can do after they are logged on to the network
- backs up the disk sector by sector to create an exact image of the disk’s contents
- is specially allocated disk area that holds information that is swapped back and forth from RAM to disk
- good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- The most widely used method for encrypting data
- creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- common tool used by many Linux administrators
- Most Linux distributions have a built-in firewall called
20 Clues: common tool used by many Linux administrators • The most widely used method for encrypting data • Most Linux distributions have a built-in firewall called • a Windows domain environment and provides mutual authentication • only backs up files that have changed since the last full backup • testers who are paid to probe networks and report vulnerabilities • ...
Creative Writing Quiz 2023-11-29
Across
- Social Networks allows us to______
- _________ Networks are computational models used for data analysis and pattern recognition
- A Neural Network refers to a _________
- The Acronym AI stands for?
Down
- Social Networks allows us to______
- A Neural Network is inspired by the ______ ________ Neural Structure.
- Neural Network is made up of ______
- Social Networks allows us to______
- __________Networks are online platforms that facilitate communication between individuals.
- Social Network is made up of ________
10 Clues: The Acronym AI stands for? • Social Networks allows us to______ • Social Networks allows us to______ • Social Networks allows us to______ • Neural Network is made up of ______ • Social Network is made up of ________ • A Neural Network refers to a _________ • A Neural Network is inspired by the ______ ________ Neural Structure. • ...
Topic 7: Networks 2021-06-25
Across
- two or more computers that are linked in order to share resources, exchange files, or allow electronic communications.
- vast network that connects computers all over the world.
- a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously
- computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building
Down
- hardware device that converts data from a digital format, intended for communication directly between devices with specialized wiring
- is a twisted pair cable for computer networks.
- network that links two or more devices using wireless communication to form a local area network (LAN)
- networking device that forwards data packets between computer networks.
- rod, wire, or other device used to transmit or receive radio or television signals.
- an electrical impulse or radio wave transmitted or received.
- operating by means of transmitted electromagnetic waves.
11 Clues: is a twisted pair cable for computer networks. • operating by means of transmitted electromagnetic waves. • vast network that connects computers all over the world. • an electrical impulse or radio wave transmitted or received. • networking device that forwards data packets between computer networks. • ...
Topic 7 Networks 2021-06-30
Across
- With regard to telecommunications, the term Wireless applies to the type of communication in which a means of physical propagation is not used, but rather electromagnetic wave modulation, radiation or optical media is used.
- Local networt
- cylinder that allows you to receive the wifi signal, television etc.
- device that converts digital signals into analog
- any type of network with high capacity to transport information that affects the transmission speed of this.
- device that allows computers operating within the framework of a network to be interconnected.
Down
- electromagnetic waves (frequency range) propagated through a transmission medium.
- Category 5 cable (CAT 5) It is a type of twisted-pair cable that is classified as one of the grades of UTP cabling described in the EIA/TIA 568B standard that is used to run CDDI and can transmit data at speeds up to 100 Mbps at frequencies up to 100 MHz.
- global network of computer networks whose purpose is to allow the free exchange of information between all its users
- set of computers connected to each other through various methods to share information and services.
- stands for a local area network that connects computers without the need for cables
11 Clues: Local networt • device that converts digital signals into analog • cylinder that allows you to receive the wifi signal, television etc. • electromagnetic waves (frequency range) propagated through a transmission medium. • stands for a local area network that connects computers without the need for cables • ...
Topic 7 Networks 2021-06-30
Across
- Is a type of twisted pair cable whose category is one of the UTP cabling grades described in the EIA/TIA 568B
- consists of a set of computers connected to each other through various methods to share information.
- World-wide computer network using the telephone line to transmit information
- Is a wireless communication system to minimize wired connections.
- These networks link computers in a small physical space, such as an office or building.
Down
- Is any type of network with a high capacity to carry information that affects the speed at which it is transmition
- Its function is to establish the route to be used for each data packet within a computer network.
- Device that converts digital signals into analog signals, or vice versa.
- Is a limited form of inter-process communication used in Unix and other POSIX-compliant operating systems.
- Is a normally metallic conductive device, designed for the purpose of emitting and/or receiving electromagneti
- Is one in which the communication is not linked by a physical means of propagation.
11 Clues: Is a wireless communication system to minimize wired connections. • Device that converts digital signals into analog signals, or vice versa. • World-wide computer network using the telephone line to transmit information • Is one in which the communication is not linked by a physical means of propagation. • ...
Crossword Computer Networks 2018-03-06
Across
- It converts fixed length input to variable length Output
- The process of combining multiple inputs to single output
- Data must arrive at receiver exactly as it was sent
- In mobile IP the agent whose IP address is temporary
- The process of splitting single inputs to multiple output
- The encryption which uses same key for encryption and decryption
- The devices whose software have roaming capabilities
Down
- In mobile IP the agent whose IP address is permanent
- The process of converting ciphertext into plaintext
- It provides authentication,integrity,non-repudation
- The process of converting plaintext into ciphertext
11 Clues: The process of converting ciphertext into plaintext • It provides authentication,integrity,non-repudation • Data must arrive at receiver exactly as it was sent • The process of converting plaintext into ciphertext • In mobile IP the agent whose IP address is permanent • In mobile IP the agent whose IP address is temporary • ...
Social networks: YouTube 2023-09-20
Across
- Plural of the word "hora" in Spanish
- People who visit a website are
- Videos have
- A person that uses the internet is ____
- Opposite to men
Down
- Opposite to woman
- Your personal info goes here in an app
- What you consume from a website or app
- It is represented by this symbol (%)
- Human beings are ___
- When people have a profile in an app they are
11 Clues: Videos have • Opposite to men • Opposite to woman • Human beings are ___ • People who visit a website are • Plural of the word "hora" in Spanish • It is represented by this symbol (%) • Your personal info goes here in an app • What you consume from a website or app • A person that uses the internet is ____ • When people have a profile in an app they are
Year 9 - Networks 2023-09-22
Across
- network topology where devices only connect to the central router
- used at home to give off an internet connection
- how to describe a WAN
- network topology where all devices are connected to each other
- wireless connection. Commonly used for speakers
Down
- how to describe a LAN
- what does WAN stand for?
- what does LAN stand for?
- used to send data in WANs
- term used to describe how fast your network is
- type of cable used in LANs
11 Clues: how to describe a LAN • how to describe a WAN • what does WAN stand for? • what does LAN stand for? • used to send data in WANs • type of cable used in LANs • term used to describe how fast your network is • used at home to give off an internet connection • wireless connection. Commonly used for speakers • network topology where all devices are connected to each other • ...
Information Technology Crossword Puzzle 4 2021-05-10
Across
- This is the capacity for data transfer of an electronic communications system
- Used in cellular networks with the function of providing radio coverage to a large area of mobile network access and high-efficiency output
- CommScope is the sum of its
- Challenge the status quo!
- CommScope renews commitment to energy efficiency in
Down
- What is CommScope's premier copper and fiber structured cabling solution?
- CommScope announces availability of remote PHY and remote MACPHY Device for
- Business Transformation Lead
- CommScope pushes the boundaries of technology to create the world’s most advanced
- Business Work Stream Lead
10 Clues: Challenge the status quo! • Business Work Stream Lead • CommScope is the sum of its • Business Transformation Lead • CommScope renews commitment to energy efficiency in • What is CommScope's premier copper and fiber structured cabling solution? • CommScope announces availability of remote PHY and remote MACPHY Device for • ...
Internet of Things in 5G 2024-04-16
Across
- Devices that act upon data in the IoT ecosystem
- A technology that enables IoT devices to communicate with each other seamlessly.
- Wireless communication standard crucial for IoT evolution.
- Devices that collect data in the IoT ecosystem
Down
- The 'I' in IoT stands for ____________
- IoT devices used for remotely controlling appliances and electronics
- Common IoT device used for home automation.
- A network architecture where computing happens closer to the data source in IoT
- Communication networks in 5G that connect IoT devices.
- A term for the vast network of interconnected devices in IoT.
10 Clues: The 'I' in IoT stands for ____________ • Common IoT device used for home automation. • Devices that collect data in the IoT ecosystem • Devices that act upon data in the IoT ecosystem • Communication networks in 5G that connect IoT devices. • Wireless communication standard crucial for IoT evolution. • A term for the vast network of interconnected devices in IoT. • ...
digital communications 2025-05-01
Across
- A set of related web pages located under a single domain name
- 1's and 0's
- The physical parts of a computer
- a communication method that uses electronic devices to deliver messages across computer networks
- the protection of computer systems
Down
- an emerging technology
- A global network made up of billions of electronic devices
- Information that can be interpreted and used by computers
- a set of computers sharing resources with one an other
- A set of instructions, data or programs used to operate computers and execute specific tasks
10 Clues: 1's and 0's • an emerging technology • The physical parts of a computer • the protection of computer systems • a set of computers sharing resources with one an other • Information that can be interpreted and used by computers • A global network made up of billions of electronic devices • A set of related web pages located under a single domain name • ...
Word List 2020-04-28
Across
- a type of malware that encrypts data on victim’s computer and demands ransom for the encryption key
- evil which is commited by hackers every day
- is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- person who can intrude the system
- the process of encoding information
- characteristics or information
- a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
- two-dimensional barcode
- the utility that lets the hacker to trace the data of user's device
- to destroy the secret of the data
- the domain that lets the hacker trace the personal geolocation.
Down
- a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
- computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
- situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
- to kidnap the data
- any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices
- a type of cyberattack that targets casual users. The main goal of this cybercrime is to get login information of a user
- the most popular remote access trojan
- the global system of interconnected computer networks
- case of programms for interacting with wireless networks
- to get the data in a dishonest way
- critical system error on Windows
23 Clues: to kidnap the data • two-dimensional barcode • characteristics or information • critical system error on Windows • person who can intrude the system • to destroy the secret of the data • to get the data in a dishonest way • the process of encoding information • the most popular remote access trojan • evil which is commited by hackers every day • ...
Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Crossword Puzzle 2024-04-30
Across
- Trail of digital activities left behind by a user.
- Protection against threats.
- Simulation of human intelligence by machines.
- Device for forwarding data packets between computer networks.
- Responsible use of technology and the internet.
- Physical components of a computer system.
- Individuals who gain unauthorized access to systems or networks.
- Exchange of information or messages.
- Distributed ledger technology for secure and transparent transactions.
- Collection of related web pages.
- Buying and selling goods or services online.
- Deliberate exploitation of computer systems or networks.
- Reference or connection to another webpage or resource (repeated).
- Malicious software.
- Legal regulations governing online activities.
- Ability to analyze and evaluate media content critically.
- Fraudulent attempt to obtain sensitive information.
- Harassment or intimidation online.
- Information presented on the internet.
- Interconnected computers or devices.
Down
- Criminal activities conducted online.
- Hidden part of the internet not indexed by search engines.
- Transfer data from a remote system to a local device.
- Knowledge or data.
- Electronic device for processing data.
- Criminal activities conducted online.
- Programs and applications for computers.
- Secret phrase for access control.
- Platforms for sharing content and connecting with others.
- Relating to electronic technology.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Unsolicited or unwanted emails or messages.
- Right to control personal information.
- Document displayed on the internet.
- Verifying the identity of a user.
- Writing instructions for computers.
- Main webpage of a website.
- Graphical user interface on a computer.
- Legal principle allowing limited use of copyrighted material.
- Self-replicating program that spreads and harms systems.
- Transfer data from a local device to a remote system.
- Creating software using programming languages.
- Software designed for a specific purpose or task.
- Software for accessing and viewing websites.
- Legal protection of creative works.
- Precautions to protect against online threats.
- Unauthorized use of someone's personal information.
- Global network connecting computers and devices.
- Information in digital form.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Secret phrase for access control. • Verifying the identity of a user. • Relating to electronic technology. • Harassment or intimidation online. • Document displayed on the internet. • ...
Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Chapter 11 & 12 Crossword puzzle 2024-06-11
Across
- (Acronym) this technology is used to prevent Layer 2 loops
- gathers a variety of statistics for devices that are configured to send and log status messages
- physically connects the end device to the network (acronym)
- A type of routing that allows for the routing table to be adjusted depending on the available paths for the network
- type of firewall is a combination of various firewall types
- (Acronym) this is used to identify a wireless network name when a home wireless AP is being configured
- (Acronym) this device can control and manage a large number of corporate APs
- It is the object that originates from one end device and being transmitted to another end device
- networks that allow people to work from home, or a remote office (acronym)
- (Acronym) this technology uses Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer.
- a private network that is created over a public network (acronym)
- type of firewall filters IP traffic between a pair of bridged interfaces
Down
- provides statistics on packet flows passing through a networking device
- software installed on a host to monitor and analyze suspicious activity (acronym)
- Connects devices into a star topology. This device makes forwarding decisions using Ethernet MAC addresses.
- A type of routing that follows a pre-determined path in the network
- system, or group of systems, that enforces an access control policy between networks
- allows administrators to monitor and manage network devices (acronym)
- (Acronym) Makes use of the shortest path first algorithm in order to create a route for the network.
- this provides a way to group devices within a LAN. Devices within in this, will be able to communicate as if they were in the same network segment
- An OSI layer 3 device, this helps in connecting remote sites from one another; making use of the process of routing to forward packets between the networks
21 Clues: (Acronym) this technology is used to prevent Layer 2 loops • physically connects the end device to the network (acronym) • type of firewall is a combination of various firewall types • a private network that is created over a public network (acronym) • A type of routing that follows a pre-determined path in the network • ...
Internet Safety Crossword 2025-03-13
Across
- the practice of protecting systems, networks, and programs from digital attacks.
- alter (a photographic image) digitally using Photoshop image-editing software.
- Using bold letter during text
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- any kind of communication over the Internet
- a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style
- It encompasses a wide range of criminal activities that are carried out using digital devices and/or networks
- the part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user
- the acceptable way of communicating on the internet.
- An online predator is an individual who uses the Internet as a means to commit sexual abuse or harassment, specifically of children
- using the Internet, email, or other electronic communications to stalk someone
- Grooming is when someone builds your trust and makes a connection with you to get you to do something sexual or illegal.
Down
- small files of information that a web server generates and sends to a web browse
- intentional video-recorded assault of individuals which are then posted
- Theft an act of pretending to be another person for the purpose of entertainment or fraud.
- when someone posts or comments online to deliberately upset others
- the illegal copying or distribution of copyrighted material via the Internet
- mean content about someone else
- a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
- information about a particular person that exists on the internet
20 Clues: Using bold letter during text • mean content about someone else • any kind of communication over the Internet • the acceptable way of communicating on the internet. • information about a particular person that exists on the internet • when someone posts or comments online to deliberately upset others • ...
IT 2023-02-02
7 Clues: a network that is wired • an online messaging system • an internet protocol address • Networks classified as wireless • a worldwide system of computer networks • the transfer of data from one digital device to another • computer server or device that provides network to another
Les Médias 2013-12-09
Lesson 3 key terms 2016-03-22
Across
- pair cable Cable commonly used in high-speed wired computer networks
- A technology that allows electronic devices to exchange data wirelessly (using radio waves) over a network
- A network created for a home or other small geographic area
- A device that allows a modem to send information formatted to be read by network computers
- Media Transmission media provide a "path" for information to be sent from one computer to another through a network.
- internet service provider) A company that has a permanent connection to the Internet and can provide temporary access to its customers, individuals, and others
- Device A component used to connect computers or other electronic devices together so they can share files or resources
- Software and hardware that provides services to other computer programs and their users.
Down
- Cable Cable specifically designed for carrying an electronic signal
- A host is a computer that manages tasks, communicates instructions, or delivers specific services to other computers, or clients, on a network
- A device that enables computers to interpret data received from a network
- Access Point An intermediary device that joins wireless clients to a wired Ethernet network
- (internet protocol) Provides a unique identification for a specific computer or network.
- A network created around an individual’s personal work space
- cable A type of cable commonly used in high-speed wired computer networks.
- Address a hardware address that uniquely identifies each node of a network.
- A device that manages the sharing of multiple computers or networks on the same data connection
- A collection of LANs that is dispersed over a large geographical area.
- A hardware device or software program that manages the paths along which information travels within a network
- Device A device that is either the source or the destination of a packet on a network
20 Clues: A network created for a home or other small geographic area • A network created around an individual’s personal work space • Cable Cable specifically designed for carrying an electronic signal • pair cable Cable commonly used in high-speed wired computer networks • A collection of LANs that is dispersed over a large geographical area. • ...
lesson 24 2015-04-20
Across
- device that uses coaxial cable to send and receive data
- a computer that handles request for data, email, file transfers, and other network services from other computers
- a series of connected personal computers, workstation, and other devices, such as printers or scanners, within a confined space, such as an office building
- examine a fingerprint, a voice pattern, or the iris or retina of the eye
- acts like a switchboard through a firewall
- Variation of the LAN that uses no physical wires
- an internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines
- allows specific users outside of the organization to access internal information systems
- describes a software architectural model relationship
- supports telephone service and is the world's collection of interconnection of commercial and government-owned voice-oriented systems
- link from one computer to another through which data can be transmitted
- designed for exclusive use of people within an organization
- high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network
Down
- worldwide system composed of thousands of smaller networks
- small, simple, inexpensive device that joins multiple computers together
- no computer is a designated server and all computers are equal
- delivers fast connections speeds
- protects individual companies’ networks from external networks
- recent wireless technology that can deliver maximum speeds up to 7mbps to your cell phone , home computer, or car
- connects WANs or LANs through this device
- computer network that covers a large geographical area
- software program such as Internet Explorer
- type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels
- each device on the network
- people who break into computer systems to steal services and information
- device that enables a computer to transmit voice data over telephone lines
26 Clues: each device on the network • delivers fast connections speeds • connects WANs or LANs through this device • acts like a switchboard through a firewall • software program such as Internet Explorer • Variation of the LAN that uses no physical wires • describes a software architectural model relationship • computer network that covers a large geographical area • ...
Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Topic 7 Networks 2021-06-30
Across
- type of network with high capacity to transport information that affects speed.
- can be analog or digital
- wireless local area network
- set of equipment connected to each other by means of physical or wireless devices that send and receive electrical impulses, electromagnetic waves or any other means to transport data, in order to share information, resources and offer services.
- is a device that allows interconnecting computers that work within the framework of a network. Its function is to establish the route that will be assigned to each data packet within a computer network.
- type of twisted pair cable whose category is one of the grades of UTP cabling described in the EIA / TIA standard.
Down
- connection that is given by means of electromagnetic waves, without the need for a wired or wired network.
- serves to emit or receive electromagnetic waves.
- is a network of computers that are interconnected worldwide to share information.
- is a device that converts digital signals into analog (modulation) and vice versa (demodulation), thus allowing communication between computers through the telephone line or cable modem.
- is a computer network that covers an area confined to a house, an apartment or a building.
11 Clues: can be analog or digital • wireless local area network • serves to emit or receive electromagnetic waves. • type of network with high capacity to transport information that affects speed. • is a network of computers that are interconnected worldwide to share information. • is a computer network that covers an area confined to a house, an apartment or a building. • ...
Information Technology Career Cluster 2022-03-31
Across
- Creative minds behind computer programs.
- Design and build data communication networks, including local area networks (LANs), wide area network (WANs), and intranets.
- Designs the content and rules of a video game in the pre-production stage and designing the gameplay, environment, storyline, and characters in the production stage.
- Uses both traditional design skills and modern technology to produce a variety of applications including games, websites, audio content, special effects, and animation also work.
- Design and create websites. They are responsible for the look of the site.
- Study an organizations current computer systems, procedures and design information systems solutions to help organization operate more efficiently and effectively.
- Prepares instruction manuals, journal articles, and other supporting documents to communicate complex and technical information more easily.
Down
- Provide help and advice to people and organizations using computer software or equipment.
- Responsible for the day-to-day operation of these networks and is critical parts of almost every organization.
- Create animation and visual effects for television, movies, video games, and other forms of media.
- Writes code to create software programs.
11 Clues: Creative minds behind computer programs. • Writes code to create software programs. • Design and create websites. They are responsible for the look of the site. • Provide help and advice to people and organizations using computer software or equipment. • Create animation and visual effects for television, movies, video games, and other forms of media. • ...
Knowledge Management 2012-07-11
Across
- supports it all and can assist in implementing actions of knowledge management
- manual or physical skills
- growth in feelings or emotional areas
- strategy focused on developing social networks to link people with tacit and explicit knowledge
- written or otherwise documented
- are needed to transfer knowledge and implement actions of that knowledge
- art of creating, organizing, applying, and transferring knowledge to facilitate situational understanding and decision making
Down
- consists of comprehension gained through study
- strategy that focuses on connecting people with content through technical networks
- mental skills
- the mental processing unit that receives information from the environment
- the mental processing unit in which information may be stored temporarily
- are needed to provide guidelines and the how, to accomplish actions of knowledge management
- the encyclopedic mental processing unit in which information may be stored permanently
14 Clues: mental skills • manual or physical skills • written or otherwise documented • growth in feelings or emotional areas • consists of comprehension gained through study • are needed to transfer knowledge and implement actions of that knowledge • the mental processing unit that receives information from the environment • ...
INTRODUCTION TO SCALING NETWORKS 2024-08-30
Across
- Displays any ports with security activated.
- This command displays about OSPF neighbors that have been learned, including the Router ID of the neighbor, the priority, the state, the IP address, & the local interface that learned of the neighbor.
- This command displays all MAC addresses that the switch has learned, how those addresses were learned(dynamic/static), the port number, and the VLAN assigned to the port.
- This command displays information about the routing protocols configured.
- This command displays all interfaces with IP addressing information and interface and line protocol status.
- It means the number of users on a network typically grows over time, this means the switch should provide the opportunity for growth.
- is the number of port available on a single switch.
- This command displays routing table information, including routing codes, known networks, administrative distance and metrics, how routes were learned, next hop, static routes and default routes.
Down
- This command displays all secure MAC addresses configured on all switch interfaces.
- This command displays information about the routed protocol that is enabled and the protocol status of interfaces.
- Developed by CISCO as a proprietary distance vector routing protocol with enhanced capabilities.
- Define the processing capabilities of a switch by rating how much data the switch can process per second.
- allows the switch to deliver power to a device over the existing Ethernet cabling.
- This command displays interfaces with line (protocol) status, bandwidth, delay, reliability, encapsulation, duplex, and I/O statistics.
- This command displays interface information, including protocol status, IP address, whether a helper address is configured, and whether ACL is enabled on the interface.
- It means the switch should provide continuous access to the network.
16 Clues: Displays any ports with security activated. • is the number of port available on a single switch. • It means the switch should provide continuous access to the network. • This command displays information about the routing protocols configured. • allows the switch to deliver power to a device over the existing Ethernet cabling. • ...
Activity 4 2024-03-30
Across
- In Semantic networks these are denoted by labeled links.
- It chooses a sequence of actions with a high likelihood to complete the specific task
- networks A graphical representation used to represent knowledge in AI
- An heuristic must be
- This funtion is used to represent the knowledge of the environment
Down
- Backward relevant-states search is also called
- It uses a set of ground (variable-free) actions to represent.
- This is based on points of time rather than on situations
- tomatoes are red
- Represents the abstract concepts such as Events, Time, Physical Objects, and Beliefs
10 Clues: tomatoes are red • An heuristic must be • Backward relevant-states search is also called • In Semantic networks these are denoted by labeled links. • This is based on points of time rather than on situations • It uses a set of ground (variable-free) actions to represent. • This funtion is used to represent the knowledge of the environment • ...
OT cybersecurity 2024-07-16
Across
- A system that monitors and controls industrial processes
- An unauthorized act of bypassing security mechanisms
- A secret word or phrase used to authenticate access
- A security flaw that can be exploited
- Protection of sensitive information from unauthorized access
Down
- A unique identifier for a network device
- The practice of securing computer systems and networks
- An act of gaining unauthorized access to systems and networks
- A device used to control the flow of electricity in OT systems
- A network security system that monitors and controls incoming and outgoing network traffic
10 Clues: A security flaw that can be exploited • A unique identifier for a network device • A secret word or phrase used to authenticate access • An unauthorized act of bypassing security mechanisms • The practice of securing computer systems and networks • A system that monitors and controls industrial processes • Protection of sensitive information from unauthorized access • ...
Chapter 4 vocaulary 2025-03-04
Across
- – Connecting virtual networks to enable seamless communication.
- – Logical containers for managing and organizing Azure resource
- – A platform-as-a-service (PaaS) for hosting web applications, RESTful APIs, and backend services.
- - Lightweight, virtualized application environments
- – Cloud storage solution offering blob, file, queue, and disk storage.
Down
- – Cloud-based virtual desktop infrastructure (VDI) solution.
- – Serverless compute service for running event-driven applications.
- – Different levels of storage (hot, cool, and archive) based on access frequency.
- – Emulated computer systems that run in the Azure cloud environment.
- – A logical isolation of the Azure cloud dedicated to your subscription for managing network traffic.
- – Securely connects on-premises networks to the Azure environment.
11 Clues: - Lightweight, virtualized application environments • – Cloud-based virtual desktop infrastructure (VDI) solution. • – Connecting virtual networks to enable seamless communication. • – Logical containers for managing and organizing Azure resource • – Securely connects on-premises networks to the Azure environment. • ...
ISO/OSI 2022-04-04
Across
- are devices or data points on a network
- The process of transforming data into an unintelligible form to prevent the unauthorized use of the data
- a small amount of data sent over Transmission Control Protocol/Internet Protocol (TCP/IP) networks
- is a computer designed to perform a group of function
- temporary and interactive information interchange
- how do we call the information.
- is an established set of rules that determine how data is transmitted
- A worldwide system of interconnected computer networks
- layer provides communication between application processes running on different hosts within a layered architecture of protocols and other network components
- is any computer connected to a network.
Down
- written acknowledgment that something has been transferred
- the device that sends the data
- how do we call a set of protocols
- the device that receives the data
- layer mainly translates data between the application layer and the network format.
- system is a computer that combines portability and interoperability
- how do we call a connection between two devices.
- a group or system of interconnected people or things.
18 Clues: the device that sends the data • how do we call the information. • how do we call a set of protocols • the device that receives the data • are devices or data points on a network • is any computer connected to a network. • how do we call a connection between two devices. • temporary and interactive information interchange • ...
Workplace Technology 2020-09-16
Across
- machine which makes exact duplicates of documents
- computer software which has restrictions on its use and source code is kept secret
- device for sending & receiving printed documents
- wireless networking technology using radio waves to transport internet signals
- programmable machine for storing,processing,& retrieving data
- software that can be used without paying a license fee
- connections among computers to facilitate communication and sharing of resources
- input device which transfers information and images from physical documents to computer files
- public information on the internet which connects billions of documents known as web pages
- output device,which produces physical versions of computer documents
- physical elements of a computer , all support computer functionality
Down
- equipment and systems developed for practical purposes
- global system of computer networks
- Multiline interconnected telephone system
- computer software which provides platforms and instructions for specific tasks
- instructions which guide how hardware,operates
- global network of remote servers which operate through the internet
- Computer software which provides instructions for basic operations of computer hardware
- private networks typically used by organizations for the sharing of company news , etc.
- application software which operate and can be accessed through the World Wide Web
20 Clues: global system of computer networks • Multiline interconnected telephone system • instructions which guide how hardware,operates • device for sending & receiving printed documents • machine which makes exact duplicates of documents • equipment and systems developed for practical purposes • software that can be used without paying a license fee • ...
iQuesta 2022 - Finals 2022-01-27
Across
- acts as a security guard between the internet and a network
- Using material another person has created and claims it as your own
- application for performing numerical and statistical calculations
- is a layout software
- malware type in which security mechanism is bypassed to access a system.
- The purpose of scrambling data so it can be sent securely over networks.
- A location that provides wireless Internet access.
- A number assigned to any item that is connected to the Internet
- To allow communication inside the organization
- Vendor-created program modifications are called
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- a method used for a security breach in wireless networks
Down
- instructions programmed on a hardware
- a program that can analyze and execute a program line by line.
- blockchain programming
- The information about someone on the Internet
- Initialize the system hardware components
- name of the system that manages and programs hardware resources for a computer
- the amount of data that can travel over an analog medium
- Playing video and sound in real time
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
Technical crossword 2025-05-26
Across
- Relating to the structure of a brain or AI
- AI-generated synthetic media
- Translates code into machine language
- Neural network-based machine learning technique
- Exists in digital rather than physical form
- Prefix meaning related to computers or networks
- Wired networking protocol for local networks
- Decentralized ledger used in cryptocurrencies
- Reduces the need for human intervention
- Security system that monitors traffic
- Converts data to hide meaning
- Opposite of natural; precedes “intelligence”
- Software designed to damage or infiltrate
Down
- Structured collection of information
- Data that describes other data
- The base-2 numeral system used by computers
- Data type with two possible values
- Core of an operating system
- Performs computation in electronic devices
- Repeating a process, often in loops
- Deceptive attempt to gain sensitive information
- Instruction to retrieve data from a database
- Low-level software tightly coupled with hardware
- Challenge to verify a human user
- Smallest unit of meaning in programming or crypto
- Set of rules that define structure in code
- Amount of data transmitted over a network
- Interface that lets software components communicate
- Phase when a program is actively executing
- A step-by-step procedure used in computation
30 Clues: Core of an operating system • AI-generated synthetic media • Converts data to hide meaning • Data that describes other data • Challenge to verify a human user • Data type with two possible values • Repeating a process, often in loops • Structured collection of information • Translates code into machine language • Security system that monitors traffic • ...
crossword no16 2017-09-12
Across
- most secured os
- small unit for data
- stores the data temporarily
- shopping portal
- vintage programming language
- wireless device used to control
- roots different networks
Down
- connecting devices
- app to communicate message
- gaming device
- connecting devices
- android version
- portable storage
- social blue bird
- full featured web portal+mailing portal
- raw information
16 Clues: gaming device • most secured os • shopping portal • android version • raw information • portable storage • social blue bird • connecting devices • connecting devices • small unit for data • roots different networks • app to communicate message • stores the data temporarily • vintage programming language • wireless device used to control • full featured web portal+mailing portal
AI 2024-12-13
Across
- (2Words)A type of machine learning using layers of neural networks.
- A type of learning that analyzes labeled data.
- Assigning categories to data points.
- The layer that processes input data into features for the output layer.
- (2Words) The feedback mechanism in neural networks for minimizing error.
Down
- (2Words)A system that mimics a human expert’s decision-making.
- A method of grouping data based on common attributes.
- (2Words A system of algorithms modeled after the human brain.
- A large and complex set of data, often used in AI systems.
- An AI system that simulates human conversation
- Error due to incorrect assumptions in the learning process.
11 Clues: Assigning categories to data points. • A type of learning that analyzes labeled data. • An AI system that simulates human conversation • A method of grouping data based on common attributes. • A large and complex set of data, often used in AI systems. • Error due to incorrect assumptions in the learning process. • ...
Computer Scince 2025-10-02
Across
- to receive data from a remote system
- The process of finding and resolving defects or problems within a computer program
- 1000000000bytes.
- A computer that provides information to other computers called "clients" on a computer network
- A networking device that forwards data packets between computer networks.
Down
- base 16 number system
- base 2 number system
- A device that can be instructed to carry out sequences of arithmetic or logical operations automatically
- An organized collection of data, generally stored and accessed electronically from a computer system.
- to extract or remove
- The global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.
11 Clues: 1000000000bytes. • base 2 number system • to extract or remove • base 16 number system • to receive data from a remote system • A networking device that forwards data packets between computer networks. • The process of finding and resolving defects or problems within a computer program • ...
Crossword 2025-02-11
Across
- Neuron firing decision
- Efficient activation function
- Time-series data network
- Neural networks' strength
- Image recognition network
- Visualization technique
Down
- Adjusts weights/biases
- Receives initial data
- Powerful, complex models
- Perform computations
- Provides predictions
- Difficult to interpret
- Early activation function
13 Clues: Perform computations • Provides predictions • Receives initial data • Adjusts weights/biases • Neuron firing decision • Difficult to interpret • Visualization technique • Powerful, complex models • Time-series data network • Early activation function • Neural networks' strength • Image recognition network • Efficient activation function
internet By Adnan 2015-09-22
Across
- Standard network protocol for communication across networks
- Collection of networks of computers & storage devices linked by cables & satellite
- mainframe computers that are capable of very fast processing
- A location on the WWW
- Structure that handles the major traffic in a networked system
- Lead to another website/place within same document
Down
- early version of the Internet
- Companies that proved users with access to the Internet, usually for a fee
- Total collection of hypertext documents stored in computers connected to the Internet
- an agreed upon format for transmitting data between two or more devices
- standard way of indicating the location of a web site (it’s the site’s address)
11 Clues: A location on the WWW • early version of the Internet • Lead to another website/place within same document • Standard network protocol for communication across networks • mainframe computers that are capable of very fast processing • Structure that handles the major traffic in a networked system • ...
Ch. 1 Social 10-1 Globalization and Identity TNN 2024-09-16
Across
- how one understands/sees the world
- how I view myself
- what we deem important, right, good
- able to speak two languages fluently
- a person whose first language is French
- the process by which political decisions and actions are becoming increasingly international
- the process by which the the world citizen's are becoming increasingly connected to and dependent on one another
- a group to which an individual belongs
Down
- what people believe to be true based on collective experience as a group
- the process of expanding world trading networks
- the process by which people's lifestyles spread over global networks
- what individuals believe to be true based on their personal experience
- the practices and beliefs of a culture that have been handed down from generation to generation
- where and when a particular event happens
- a question or situation that involves thoughtful, well-meaning people in honest and sincere dialogue
- laws and other actions taken by governments
16 Clues: how I view myself • how one understands/sees the world • what we deem important, right, good • able to speak two languages fluently • a group to which an individual belongs • a person whose first language is French • where and when a particular event happens • laws and other actions taken by governments • the process of expanding world trading networks • ...
Networks explained 2024-10-14
Across
- a transmission of data to all devices within a network simultaneously
- a network of millions of computers in a large geographical area
- a networking device that forwards data packets between networks
Down
- a division of a bigger network
- a device used to connect to the wider internet via an ISP (short for "modulator-demodulator")
- the flow of data across a network
- a network device that connects different networks and facilitates communication between them
7 Clues: a division of a bigger network • the flow of data across a network • a network of millions of computers in a large geographical area • a networking device that forwards data packets between networks • a transmission of data to all devices within a network simultaneously • a network device that connects different networks and facilitates communication between them • ...
Computer Crossword 2014-06-12
Across
- Input that moves the cursor
- The most common type of display
- The temporary memory of the computer
- The fastest type of printer
- Converts power entering the computer to 12V DC
- A more efficient data storage drive
- The most common type of printer
- battery that powers the system clock
- Connects computer components
- The type of cable that connects the hard drive to the motherboard
- The most recent external output cable
- A security system where a card is used to store private information
- Used to protect the computer components from dust and other damage
Down
- The brain of the computer
- Expansion card used to process sound
- card used to connect to wireless networks
- Expansion card used to process visuals
- An external input or output
- The most common external connector
- Expansion card used to connect to wireless networks
- Cable that connects the motherboard to power
- Input generally used to input letters and numbers
- Used to connect the CPU to the heat sink and fan assembly
- The permanent memory of a computer
- Drive used to read CDs and DVDs
- Replacement for a mouse. Comes built in to laptops
26 Clues: The brain of the computer • Input that moves the cursor • An external input or output • The fastest type of printer • Connects computer components • The most common type of display • The most common type of printer • Drive used to read CDs and DVDs • The most common external connector • The permanent memory of a computer • A more efficient data storage drive • ...
Computer Crossword 2014-06-03
Across
- The most common type of display
- The most common type of printer
- The most common external connector
- Replacement for a mouse. Comes built in to laptops
- A more secure data storage drive
- Cable that connects the motherboard to power
- The most recent external output cable
- Input generally used to input letters and numbers
- Expansion card used to process visuals
- Converts power entering the computer to 12V DC
- Connects computer components
- Used to protect the computer components from dust and other damage
- Input that moves the cursor
- An external input or output
Down
- A security system where a card is used to store private information
- Expansion card used to connect to wireless networks
- Expansion card used to process sound
- The type of cable that connects the hard drive to the motherboard
- used to connect the CPU to the heat sink and fan assembly
- card used to connect to wireless networks
- Drive The permanent memory of a computer
- battery that powers the system clock
- The temporary memory of the computer
- Drive used to read CDs and DVDs
- The brain of the computer
- The fastest type of printer
26 Clues: The brain of the computer • Input that moves the cursor • An external input or output • The fastest type of printer • Connects computer components • The most common type of display • The most common type of printer • Drive used to read CDs and DVDs • A more secure data storage drive • The most common external connector • Expansion card used to process sound • ...
@@@@MY PUZZLE 12/2/2016 2016-12-02
Across
- machine are the containers that run workloads on top of hyper visors
- power that speed and capacity of computer chips
- center is a large computer room
- are four different levels on which processor commands can be executed
- are virtual machines that already contain an operating system
- an exact copy of a virtual machine
- extra capacity
- server a server that is running no one knows which line of business owns it
- disk sometimes called a child disk
Down
- core a microprocessor that contains more than one processing unit
- cloning performs the clone operation while the source server is booted
- a capturing of a virtual machine state at a particular point in time
- virtulized work loads
- cloud where you store music, pictures etc.
- metal computer server without any operating system software installed
- area networks is a dedicated high speed network
- area networks a system that links together electronic office equipment
- time protocol is an open standard that defines and implements a computers ability to synchronize with the internet time servers
- tools a combination of device drivers and processors that enhance the users with the virtual machines
- head is an infrastructure services in older servers
20 Clues: extra capacity • virtulized work loads • center is a large computer room • an exact copy of a virtual machine • disk sometimes called a child disk • cloud where you store music, pictures etc. • power that speed and capacity of computer chips • area networks is a dedicated high speed network • head is an infrastructure services in older servers • ...
iQuesta 2022 - Finals 2022-01-27
Across
- Playing video and sound in real time
- malware type in which security mechanism is bypassed to access a system.
- The information about someone on the Internet
- Using material another person has created and claims it as your own
- acts as a security guard between the internet and a network
- the amount of data that can travel over an analog medium
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- application for performing numerical and statistical calculations
- a program that can analyze and execute a program line by line.
Down
- The purpose of scrambling data so it can be sent securely over networks.
- A number assigned to any item that is connected to the Internet
- a method used for a security breach in wireless networks
- instructions programmed on a hardware
- Initialize the system hardware components
- blockchain programming
- Vendor-created program modifications are called
- To allow communication inside the organization
- A location that provides wireless Internet access.
- name of the system that manages and programs hardware resources for a computer
- is a layout software
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
Computer Acronyms MK 2025-09-04
Across
- USB type, small and thin
- Initializes the system, bridges hardware and OS
- external storage array that supports only flash media for persistent storage
- Stores data using spinning disks, even through the computer being powered off
- Holds permanent data
- Uses liquid crystals with a backlight to display images
- Damages or compromises information
- Unique, digital assets that can be traded like currency
- USB type, bigger and thicker
- Transmits from computer to monitor
- Renders images
- Input, storage, process, output
- Used to connect storage devices
Down
- Provides a window for monitoring and changing the system
- The way you interact with the system (terminals and typing)
- (Abbreviations) Connects computers and other networks in a physical space
- Uses flash memory to store data
- Stores and retrieves data. Loses data when turned off
- Combines binary to perform mathematical operations
- Transmits audio and video signals between devices
- Part of the Cpu that controls the processing part
- Combines hard drives to a single system
- Used to connect storage devices to motherboard
- Enables computer to connect to networks
- Connects video sources to display devices
- Connects peripherals to computer, allowing for data transfer and power delivery
26 Clues: Renders images • Holds permanent data • USB type, small and thin • USB type, bigger and thicker • Uses flash memory to store data • Input, storage, process, output • Used to connect storage devices • Damages or compromises information • Transmits from computer to monitor • Combines hard drives to a single system • Enables computer to connect to networks • ...
AS 100 - C6L3 - Cybersecurity - Crossword Puzzle 2024-01-10
Across
- Programs and devices that monitor and restrict communication between computer systems and outside networks
- Interacting with other people through dedicated websites and applications (apps)
- One or more computers linked together physically or wirelessly
- Digital text that contains electronic links to other texts
- The use of cyberspace to interfere with an enemy’s command and control, disrupt normal economic activity, steal intellectual property or government secrets, and prevent equipment from functioning properly
- An electronic procedure
- system of networks connecting computers around the world
Down
- A program that accesses and displays files on the Internet or World Wide Web
- Gaining access to a file, computer, or network that you’re not authorized to see
- A large, high-performance computer usually connected to several terminals and used by a large organization
- Harmful software
- computer
- Converting data into secret code
- Another name for the Internet
14 Clues: computer • Harmful software • An electronic procedure • Another name for the Internet • Converting data into secret code • system of networks connecting computers around the world • Digital text that contains electronic links to other texts • One or more computers linked together physically or wirelessly • ...
