networks Crossword Puzzles
Network Hunting 2023-12-26
Across
- Optics Transmission medium that uses light to transmit data
- Device that connects a computer or network to the internet
- Security system that monitors and controls incoming and outgoing network traffic
- System responsible for translating domain names into IP addresses
- Commonly used technology for wired connections in local networks
- Unit of data transmitted over a network
Down
- Measure of data transfer rate, typically in bits per second
- Device that connects multiple computer networks together
- Computer or software that requests and uses services provided by another computer
- Device used to connect devices within a local area network (LAN)
- Computer system that provides data or services to other computers
- Technology that creates a secure connection over a public network
12 Clues: Unit of data transmitted over a network • Device that connects multiple computer networks together • Device that connects a computer or network to the internet • Optics Transmission medium that uses light to transmit data • Measure of data transfer rate, typically in bits per second • Device used to connect devices within a local area network (LAN) • ...
Desiree Delgado internet crossword puzzle 2013-03-26
Across
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- An unauthorized person who secretly gains access to computer files.
- a piece of writing that has been copied from someone else and is presented as being your own work
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- To renew or revitalize; To reload a webpage on the internet
Down
- – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- A bully who operates online, in cyberspace; To bully online
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- a reference to a published or unpublished source (not always the original source).
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- software used to view various kinds of Internet resources found on the Web.
12 Clues: A bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • a reference to a published or unpublished source (not always the original source). • ...
Crossword 2023-05-02
Across
- The most popular means of communicating data wirelessly within a fixed location
- An interface that enables communication between two different networks
- Determines the volume of data that can be transmitted in a given time
- A standard developed by a group of electronics manufacturers that allows any sort of electronic equipment to automatically make their own connections without wires, cables or any direct action from a user
- A hardware device that allows a computer to send and receive data over a telephone line or a cable or satellite connection
- Acts as an interface between two networks
- A group of two or more computers linked together so that they can share resources and can communicate with one another
Down
- A network of networks that connects computers worldwide via a huge set of telecommunications links
- A device that coverts digital signals in a form that can pass through a transmission medium
- A device that connects multiple devices on the same network to facilitate communication among the devices
- Enables users locally and worldwide to send electronic messages to one person or to a group and to receive messages from others
- Usually referred to as webcasting
- A programming language that you can use to create web pages
- This is a type of threat that originates outside the organisation or institution with the intention of corrupting or stealing confidential information of that organisation
- A set of rules that define how computers interact or communicate with each other
15 Clues: Usually referred to as webcasting • Acts as an interface between two networks • A programming language that you can use to create web pages • Determines the volume of data that can be transmitted in a given time • An interface that enables communication between two different networks • ...
Network Hardware 2019-03-04
Across
- Rules governing how networks send and receive information?
- A method of connecting devices on a network without using cables?
- What does WAN stand for?
- What does WAP stand for?
- Device used for connecting networks to the internet?
Down
- What does LAN stand for?
- NIC stands for Network I............. Card?
- Device used in a star network to connect devices together
8 Clues: What does LAN stand for? • What does WAN stand for? • What does WAP stand for? • NIC stands for Network I............. Card? • Device used for connecting networks to the internet? • Device used in a star network to connect devices together • Rules governing how networks send and receive information? • A method of connecting devices on a network without using cables?
Network and Big Data 2022-10-20
Across
- A set of physical network device that is essential to make a network system function
- Passage to connect 2 networks together that can work on different networking models (MAN/LAN/WAN)
- A collection of discrete values that convey information, describing facts and statistics collected
- A layer of network security designed to limit the control of each user by their level of access
- A set of guidelines that controls how data is transferred between different devices in the same network
Down
- Barriers between an internal and external network
- A set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies
- A repeater that has the ability to filter content by reading the MAC (media access control) addresses and its destination
- One of the 5 Vs of Big Data that refers to the importance of data richness in which big data can provide, it is also dependent on modern society and each individual input is unique to one another
- Collection of connected computing devices
- Arrangement of the elements of a communication network
- Hardware used to used to connect and transfer data and information between computers, routers, switches and storage area networks
12 Clues: Collection of connected computing devices • Barriers between an internal and external network • Arrangement of the elements of a communication network • A set of physical network device that is essential to make a network system function • A layer of network security designed to limit the control of each user by their level of access • ...
Crossword Puzzle 2024-04-30
Across
- Trail of digital activities left behind by a user.
- Protection against threats.
- Simulation of human intelligence by machines.
- Device for forwarding data packets between computer networks.
- Responsible use of technology and the internet.
- Physical components of a computer system.
- Individuals who gain unauthorized access to systems or networks.
- Exchange of information or messages.
- Distributed ledger technology for secure and transparent transactions.
- Collection of related web pages.
- Buying and selling goods or services online.
- Deliberate exploitation of computer systems or networks.
- Reference or connection to another webpage or resource (repeated).
- Malicious software.
- Legal regulations governing online activities.
- Ability to analyze and evaluate media content critically.
- Fraudulent attempt to obtain sensitive information.
- Harassment or intimidation online.
- Information presented on the internet.
- Interconnected computers or devices.
Down
- Criminal activities conducted online.
- Hidden part of the internet not indexed by search engines.
- Transfer data from a remote system to a local device.
- Knowledge or data.
- Electronic device for processing data.
- Criminal activities conducted online.
- Programs and applications for computers.
- Secret phrase for access control.
- Platforms for sharing content and connecting with others.
- Relating to electronic technology.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Unsolicited or unwanted emails or messages.
- Right to control personal information.
- Document displayed on the internet.
- Verifying the identity of a user.
- Writing instructions for computers.
- Main webpage of a website.
- Graphical user interface on a computer.
- Legal principle allowing limited use of copyrighted material.
- Self-replicating program that spreads and harms systems.
- Transfer data from a local device to a remote system.
- Creating software using programming languages.
- Software designed for a specific purpose or task.
- Software for accessing and viewing websites.
- Legal protection of creative works.
- Precautions to protect against online threats.
- Unauthorized use of someone's personal information.
- Global network connecting computers and devices.
- Information in digital form.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Secret phrase for access control. • Verifying the identity of a user. • Relating to electronic technology. • Harassment or intimidation online. • Document displayed on the internet. • ...
Williams-Networking Basics-Spring 2014 2014-03-23
Across
- What is the device that connects a computer to the cabling of a computer network?
- A type of high-speed data transmission used in which bandwidth is shared by more than on signal.
- These devices use tables to lookup recipient addresses to efficiently deliver information packets across networks.
- What type of inexpensive network is used in a small home where security is not a priority and no network administrator is required?
- Districts create these policies to outline the intended uses of the network and Internet.
- What type of topology has every system connected with complete redundancy so that if any cable fails, the system stays connected?
- The government program provides help to obtain affordable telecommunication and Internet access to districts within the United States.
- These are computers that access resources on the server or other computers.
- This protocol is used by districts to handle phone calls via school's data networks.
Down
- __________ computing relies on shared computing resources rather than local servers and local computers to handle applications.
- This type of cabling uses light to carry the signal, but is very expensive.
- These are the computers that provide shared resources like file, email, and print services.
- These components are used to transmit data.
- This type of connection is often used in home and business wired networks.
- This device, often known as a smart hub, forwards information directly to intended recipient without broadcasting information to all other devices on the network.
15 Clues: These components are used to transmit data. • This type of connection is often used in home and business wired networks. • This type of cabling uses light to carry the signal, but is very expensive. • These are computers that access resources on the server or other computers. • What is the device that connects a computer to the cabling of a computer network? • ...
Urban geography 2020-06-23
Across
- transport
- to fall
- spreading
- dirty water
- new settlements out of the city
- loud sounds
- where people live
- locked
- centre
- the increase of importance of large cities
- the throw back of heat
Down
- dirtying the environment
- industry and trade
- from combustion processes
- close together
- to store
- when you have nothing to eat
- networks: important for the society and economy
18 Clues: locked • centre • to fall • to store • transport • spreading • dirty water • loud sounds • close together • where people live • industry and trade • the throw back of heat • dirtying the environment • from combustion processes • when you have nothing to eat • new settlements out of the city • the increase of importance of large cities • networks: important for the society and economy
Chapter 9 2020-01-09
Across
- a communication model in which a dedicated communication path is established between two hosts and on which all messages travel.
- the software that manages network resources for a node on a network, and may provide security and access control.
- a communications device or program that passes data between networks having similar functions but different protocols.
- a set of rules to control the flow of messages through a network.
- a local area network with wireless nodes.
- a network usually constructed with long-distance, point-to- point lines, covering a large geographic area.
Down
- a communication model in which messages are individually routed between hosts, with no previously established communication path.
- an operating system that provides control for a distributed computing system, allowing its resources to be accessed in a unified way.
- a network topology in which each node is connected to two adjacent nodes.
- a protocol designed for use in Internet Protocol (IP) networks, concerned with tracking the operational state of every network interface.
- a type of local area network with stations wired into a ring network.
- a data-link layer device used to interconnect multiple networks using the same protocol.
- a data network intended to serve an area covering only a few square kilometers or less.
13 Clues: a local area network with wireless nodes. • a set of rules to control the flow of messages through a network. • a type of local area network with stations wired into a ring network. • a network topology in which each node is connected to two adjacent nodes. • a data network intended to serve an area covering only a few square kilometers or less. • ...
Social Network 2014-06-03
7 Clues: No like, just +. • Message over Message. • To communicate on the Internet. • Here you can tweet like a bird. • Tell every body what´s up with you. • One of the most popular social networks. • Everybody who uses social networks need one.
5.9.1 Critical Infrastructures Business DP2 Crossword Puzzle ANSWERS 2026-02-02
Across
- Software planted on computers to block access to systems until a certain sum of money is paid, type of cybercrime
- The buildings or sections of buildings that contain servers, support computer networks and run the systems needed to provide digital technologies or services are called?
- A collection of information that is stored in an electronic system that can be processed and filtered for a specific purpose.
- A set of instructions to solve a problem or complete a task, related to ANNs
- The process of analysing data bases; of searching for and finding pattterns and trends within larger data sets.
- Criminal activity carried out using computers, networks and digitial technologies
- The process which involves data storage and computers, software, databases and servers, that allows information to be stored and accessed from anywhere in the world with a network is cloud ____?
Down
- The use of technology to block access to technology systems by criminals.
- The science of analysing data to establish patterns, trends and behaviours to draw conclusions.
- Accronym for Distributed Denial of Service
- The acronym ANN stands for ____ Neural Networks
- Main limitation of critical data infrastructure
12 Clues: Accronym for Distributed Denial of Service • The acronym ANN stands for ____ Neural Networks • Main limitation of critical data infrastructure • The use of technology to block access to technology systems by criminals. • A set of instructions to solve a problem or complete a task, related to ANNs • ...
8.2 terms 2013-02-13
Across
- a type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire
- a special series of bits that travels around a token-ring network
- a common connection point for devices in a network
- a device that forwards data packets between computer networks
- every node is connected to central node called a hub or switch
- a cable rack that interconnects and manages the telecommunications wiring between an MDF and workstation devices
- a network architecture in which each computer or process on the network is either a client or a server
- ethernet card that is plugged into a slot on the computer's motherboard
- a system of digital message formats and rules for exchanging those messages in or between computing systems
- connects multiple star networks
- supplies networking capability to a group of computers in close proximity
- a type of cable that consists of two independently insulated wires twisted around one another
- type of network in which each workstation has equivalent capabilities and responsibilities
- network cabling scheme in which one cable sequentially connects all nodes and forms a closed loop
- topology of a network whose components are connected by a busbar
- critical elements of any computer network
- another fundamental part of many networks because they speed things up
Down
- technology that uses glass (or plastic) threads to transmit data
- a cable rack that interconnects and manages the telecommunication wiring between itself and any number of IDF's
- refers to any type of computer network that is not connected by cables of any kind
- a visual representation or image painted, drawn, or photographed
- unique string of numbers separated by periods that identifies each computer
- collection of computers and other hardware
- spans a large geographic area
- one unit of binary data capable of being routed through a network
25 Clues: spans a large geographic area • connects multiple star networks • critical elements of any computer network • collection of computers and other hardware • a common connection point for devices in a network • a device that forwards data packets between computer networks • every node is connected to central node called a hub or switch • ...
Crossword Puzzle 2024-04-30
Across
- Main webpage of a website.
- Information in digital form.
- Knowledge or data.
- Buying and selling goods or services online.
- Malicious software.
- Platforms for sharing content and connecting with others.
- Information presented on the internet.
- Software designed for a specific purpose or task.
- Relating to electronic technology.
- Protection against threats.
- Interconnected computers or devices.
- Device for forwarding data packets between computer networks.
- Deliberate exploitation of computer systems or networks.
- Harassment or intimidation online.
- Physical components of a computer system.
- Unsolicited or unwanted emails or messages.
- Global network connecting computers and devices.
- Collection of related web pages.
- Individuals who gain unauthorized access to systems or networks.
- Right to control personal information.
- Software for accessing and viewing websites.
- Verifying the identity of a user.
- Programs and applications for computers.
- Legal regulations governing online activities.
- Precautions to protect against online threats.
- Reference or connection to another webpage or resource (repeated).
- Creating software using programming languages.
Down
- Responsible use of technology and the internet.
- Encoding data for secure transmission.
- Transfer data from a local device to a remote system.
- Writing instructions for computers.
- Electronic device for processing data.
- Exchange of information or messages.
- Transfer data from a remote system to a local device.
- Simulation of human intelligence by machines.
- Hidden part of the internet not indexed by search engines.
- Legal principle allowing limited use of copyrighted material.
- Legal protection of creative works.
- Document displayed on the internet.
- Trail of digital activities left behind by a user.
- Criminal activities conducted online.
- Distributed ledger technology for secure and transparent transactions.
- Self-replicating program that spreads and harms systems.
- Reference or connection to another webpage or resource.
- Criminal activities conducted online.
- Ability to analyze and evaluate media content critically.
- Unauthorized use of someone's personal information.
- Fraudulent attempt to obtain sensitive information.
- Secret phrase for access control.
- Graphical user interface on a computer.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Relating to electronic technology. • Harassment or intimidation online. • Writing instructions for computers. • ...
Crossword Puzzle with Technological Terms 2024-10-19
Across
- A type of computer memory used to store working data
- Remote servers used to store and access data over the internet
- Files (named after a type of food) stored on a user's computer that hold data related to their web browsing
- Data and commands entered into a computer for processing
- An acronym for a website's unique identifier
- The main circuit board in a computer
- A global network connecting millions of different networks
- A group of computers connected together to share resources
- Instructions which instruct a computer on what to do
- An acronym for a commonly used file type which presents online images
- A string of numbers used to identify a device on a network
- The address used to access a resource on the internet
- The location of a specific website
- The primary user interface of a computer, where applications and files are displayed
- A device used to control a pointer on a computer screen
- An acronym for animated image files
Down
- A device with keys used to type text
- A programming language used to create interactive effects within web browsers
- A device that forwards data packets between computer networks
- A wireless technology used to connect devices to a local area network or the internet
- The central processing unit of a computer that is responsible for executing instructions
- An electronic device that processes data and performs tasks according to instructions
- The tiny dots which create an image on your computer screen
- The process of converting data into a secure format that cannot be easily accessed
- A wired networking technology used for local area networks
- A unit of digital information equal to roughly one billion bytes
- Software designed to damage or gain unauthorized access to a computer system
- The process of finding and fixing errors in code
- An unwanted or unsolicited email
- A security system that monitors incoming and outgoing network traffic
30 Clues: An unwanted or unsolicited email • The location of a specific website • An acronym for animated image files • A device with keys used to type text • The main circuit board in a computer • An acronym for a website's unique identifier • The process of finding and fixing errors in code • A type of computer memory used to store working data • ...
Betelihem Abeje 12/05/2024 2024-12-06
Across
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- security features that enable administrators to control who has access to the network
- testers who are paid to probe networks and report vulnerabilities
- allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
- a document that describes the rules governing access to an organization’s information resources
- a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- attackers who do not report problems, but instead disseminate the information to other black hat attackers
- creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- WSUS is a server role that makes it possible for administrators to take control of Microsoft product updates a process called
- only backs up files that have changed since the last full backup
Down
- a Windows domain environment and provides mutual authentication
- to supply two or more types of authentication drawn from Knowledge, Possession, Inherence
- security features that enable what users can do after they are logged on to the network
- backs up the disk sector by sector to create an exact image of the disk’s contents
- is specially allocated disk area that holds information that is swapped back and forth from RAM to disk
- good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- The most widely used method for encrypting data
- creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- common tool used by many Linux administrators
- Most Linux distributions have a built-in firewall called
20 Clues: common tool used by many Linux administrators • The most widely used method for encrypting data • Most Linux distributions have a built-in firewall called • a Windows domain environment and provides mutual authentication • only backs up files that have changed since the last full backup • testers who are paid to probe networks and report vulnerabilities • ...
Internet of Things in 5G 2024-04-16
Across
- Devices that act upon data in the IoT ecosystem
- A technology that enables IoT devices to communicate with each other seamlessly.
- Wireless communication standard crucial for IoT evolution.
- Devices that collect data in the IoT ecosystem
Down
- The 'I' in IoT stands for ____________
- IoT devices used for remotely controlling appliances and electronics
- Common IoT device used for home automation.
- A network architecture where computing happens closer to the data source in IoT
- Communication networks in 5G that connect IoT devices.
- A term for the vast network of interconnected devices in IoT.
10 Clues: The 'I' in IoT stands for ____________ • Common IoT device used for home automation. • Devices that collect data in the IoT ecosystem • Devices that act upon data in the IoT ecosystem • Communication networks in 5G that connect IoT devices. • Wireless communication standard crucial for IoT evolution. • A term for the vast network of interconnected devices in IoT. • ...
Day2 recap 2025-06-24
Across
- Activation function used in all the hidden layers
- S-shaped activation function that outputs values between 0 and 1
- Unsupervised learning technique for grouping similar data points
- Machine learning task that predicts discrete categories like spam or not spam
- Popular clustering algorithm that groups data into K clusters
Down
- Basic computational unit in neural networks inspired by brain cells
- Type of regression algorithm used for classification problems
- Type of layer between input and output in neural networks
- term used for parameters in a neuron
- activation function used for multiclass classification
10 Clues: term used for parameters in a neuron • Activation function used in all the hidden layers • activation function used for multiclass classification • Type of layer between input and output in neural networks • Type of regression algorithm used for classification problems • Popular clustering algorithm that groups data into K clusters • ...
MACHINE INTELLIGENCE FOR MEDICAL IMAGE ANALYSIS 2024-01-18
11 Clues: trees • forests • networks • labelling • Classifier • Classifier • CT Scanners • learning process • tumors in PET images • Computation and selection • learning architectures for segmentation
INTERNETWORKING 2025-01-23
Across
- A device that connects different networks and determines the best path for data transmission.
- Devices like routers and bridges that connect different networks and facilitate communication.
- A global collection of interconnected networks.
Down
- A private network used internally within an organization.
- The process of breaking packets into smaller pieces to match the receiving network’s size.
- Devices like computers or printers that are directly connected to the network and use it for communication.
- A device that connects two similar LANs at the Data Link Layer (Layer 2).
7 Clues: A global collection of interconnected networks. • A private network used internally within an organization. • A device that connects two similar LANs at the Data Link Layer (Layer 2). • The process of breaking packets into smaller pieces to match the receiving network’s size. • ...
Word List 2020-04-28
Across
- a type of malware that encrypts data on victim’s computer and demands ransom for the encryption key
- evil which is commited by hackers every day
- is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- person who can intrude the system
- the process of encoding information
- characteristics or information
- a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
- two-dimensional barcode
- the utility that lets the hacker to trace the data of user's device
- to destroy the secret of the data
- the domain that lets the hacker trace the personal geolocation.
Down
- a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
- computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
- situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
- to kidnap the data
- any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices
- a type of cyberattack that targets casual users. The main goal of this cybercrime is to get login information of a user
- the most popular remote access trojan
- the global system of interconnected computer networks
- case of programms for interacting with wireless networks
- to get the data in a dishonest way
- critical system error on Windows
23 Clues: to kidnap the data • two-dimensional barcode • characteristics or information • critical system error on Windows • person who can intrude the system • to destroy the secret of the data • to get the data in a dishonest way • the process of encoding information • the most popular remote access trojan • evil which is commited by hackers every day • ...
Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Crossword Puzzle 2024-04-30
Across
- Trail of digital activities left behind by a user.
- Protection against threats.
- Simulation of human intelligence by machines.
- Device for forwarding data packets between computer networks.
- Responsible use of technology and the internet.
- Physical components of a computer system.
- Individuals who gain unauthorized access to systems or networks.
- Exchange of information or messages.
- Distributed ledger technology for secure and transparent transactions.
- Collection of related web pages.
- Buying and selling goods or services online.
- Deliberate exploitation of computer systems or networks.
- Reference or connection to another webpage or resource (repeated).
- Malicious software.
- Legal regulations governing online activities.
- Ability to analyze and evaluate media content critically.
- Fraudulent attempt to obtain sensitive information.
- Harassment or intimidation online.
- Information presented on the internet.
- Interconnected computers or devices.
Down
- Criminal activities conducted online.
- Hidden part of the internet not indexed by search engines.
- Transfer data from a remote system to a local device.
- Knowledge or data.
- Electronic device for processing data.
- Criminal activities conducted online.
- Programs and applications for computers.
- Secret phrase for access control.
- Platforms for sharing content and connecting with others.
- Relating to electronic technology.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Unsolicited or unwanted emails or messages.
- Right to control personal information.
- Document displayed on the internet.
- Verifying the identity of a user.
- Writing instructions for computers.
- Main webpage of a website.
- Graphical user interface on a computer.
- Legal principle allowing limited use of copyrighted material.
- Self-replicating program that spreads and harms systems.
- Transfer data from a local device to a remote system.
- Creating software using programming languages.
- Software designed for a specific purpose or task.
- Software for accessing and viewing websites.
- Legal protection of creative works.
- Precautions to protect against online threats.
- Unauthorized use of someone's personal information.
- Global network connecting computers and devices.
- Information in digital form.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Secret phrase for access control. • Verifying the identity of a user. • Relating to electronic technology. • Harassment or intimidation online. • Document displayed on the internet. • ...
Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Chapter 11 & 12 Crossword puzzle 2024-06-11
Across
- (Acronym) this technology is used to prevent Layer 2 loops
- gathers a variety of statistics for devices that are configured to send and log status messages
- physically connects the end device to the network (acronym)
- A type of routing that allows for the routing table to be adjusted depending on the available paths for the network
- type of firewall is a combination of various firewall types
- (Acronym) this is used to identify a wireless network name when a home wireless AP is being configured
- (Acronym) this device can control and manage a large number of corporate APs
- It is the object that originates from one end device and being transmitted to another end device
- networks that allow people to work from home, or a remote office (acronym)
- (Acronym) this technology uses Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer.
- a private network that is created over a public network (acronym)
- type of firewall filters IP traffic between a pair of bridged interfaces
Down
- provides statistics on packet flows passing through a networking device
- software installed on a host to monitor and analyze suspicious activity (acronym)
- Connects devices into a star topology. This device makes forwarding decisions using Ethernet MAC addresses.
- A type of routing that follows a pre-determined path in the network
- system, or group of systems, that enforces an access control policy between networks
- allows administrators to monitor and manage network devices (acronym)
- (Acronym) Makes use of the shortest path first algorithm in order to create a route for the network.
- this provides a way to group devices within a LAN. Devices within in this, will be able to communicate as if they were in the same network segment
- An OSI layer 3 device, this helps in connecting remote sites from one another; making use of the process of routing to forward packets between the networks
21 Clues: (Acronym) this technology is used to prevent Layer 2 loops • physically connects the end device to the network (acronym) • type of firewall is a combination of various firewall types • a private network that is created over a public network (acronym) • A type of routing that follows a pre-determined path in the network • ...
Internet Safety Crossword 2025-03-13
Across
- the practice of protecting systems, networks, and programs from digital attacks.
- alter (a photographic image) digitally using Photoshop image-editing software.
- Using bold letter during text
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- any kind of communication over the Internet
- a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style
- It encompasses a wide range of criminal activities that are carried out using digital devices and/or networks
- the part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user
- the acceptable way of communicating on the internet.
- An online predator is an individual who uses the Internet as a means to commit sexual abuse or harassment, specifically of children
- using the Internet, email, or other electronic communications to stalk someone
- Grooming is when someone builds your trust and makes a connection with you to get you to do something sexual or illegal.
Down
- small files of information that a web server generates and sends to a web browse
- intentional video-recorded assault of individuals which are then posted
- Theft an act of pretending to be another person for the purpose of entertainment or fraud.
- when someone posts or comments online to deliberately upset others
- the illegal copying or distribution of copyrighted material via the Internet
- mean content about someone else
- a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
- information about a particular person that exists on the internet
20 Clues: Using bold letter during text • mean content about someone else • any kind of communication over the Internet • the acceptable way of communicating on the internet. • information about a particular person that exists on the internet • when someone posts or comments online to deliberately upset others • ...
INTRODUCTION TO SCALING NETWORKS 2024-08-30
Across
- Displays any ports with security activated.
- This command displays about OSPF neighbors that have been learned, including the Router ID of the neighbor, the priority, the state, the IP address, & the local interface that learned of the neighbor.
- This command displays all MAC addresses that the switch has learned, how those addresses were learned(dynamic/static), the port number, and the VLAN assigned to the port.
- This command displays information about the routing protocols configured.
- This command displays all interfaces with IP addressing information and interface and line protocol status.
- It means the number of users on a network typically grows over time, this means the switch should provide the opportunity for growth.
- is the number of port available on a single switch.
- This command displays routing table information, including routing codes, known networks, administrative distance and metrics, how routes were learned, next hop, static routes and default routes.
Down
- This command displays all secure MAC addresses configured on all switch interfaces.
- This command displays information about the routed protocol that is enabled and the protocol status of interfaces.
- Developed by CISCO as a proprietary distance vector routing protocol with enhanced capabilities.
- Define the processing capabilities of a switch by rating how much data the switch can process per second.
- allows the switch to deliver power to a device over the existing Ethernet cabling.
- This command displays interfaces with line (protocol) status, bandwidth, delay, reliability, encapsulation, duplex, and I/O statistics.
- This command displays interface information, including protocol status, IP address, whether a helper address is configured, and whether ACL is enabled on the interface.
- It means the switch should provide continuous access to the network.
16 Clues: Displays any ports with security activated. • is the number of port available on a single switch. • It means the switch should provide continuous access to the network. • This command displays information about the routing protocols configured. • allows the switch to deliver power to a device over the existing Ethernet cabling. • ...
Information Technology Crossword Puzzle 4 2021-05-10
Across
- This is the capacity for data transfer of an electronic communications system
- Used in cellular networks with the function of providing radio coverage to a large area of mobile network access and high-efficiency output
- CommScope is the sum of its
- Challenge the status quo!
- CommScope renews commitment to energy efficiency in
Down
- What is CommScope's premier copper and fiber structured cabling solution?
- CommScope announces availability of remote PHY and remote MACPHY Device for
- Business Transformation Lead
- CommScope pushes the boundaries of technology to create the world’s most advanced
- Business Work Stream Lead
10 Clues: Challenge the status quo! • Business Work Stream Lead • CommScope is the sum of its • Business Transformation Lead • CommScope renews commitment to energy efficiency in • What is CommScope's premier copper and fiber structured cabling solution? • CommScope announces availability of remote PHY and remote MACPHY Device for • ...
Internet of Things in 5G 2024-04-16
Across
- Devices that act upon data in the IoT ecosystem
- A technology that enables IoT devices to communicate with each other seamlessly.
- Wireless communication standard crucial for IoT evolution.
- Devices that collect data in the IoT ecosystem
Down
- The 'I' in IoT stands for ____________
- IoT devices used for remotely controlling appliances and electronics
- Common IoT device used for home automation.
- A network architecture where computing happens closer to the data source in IoT
- Communication networks in 5G that connect IoT devices.
- A term for the vast network of interconnected devices in IoT.
10 Clues: The 'I' in IoT stands for ____________ • Common IoT device used for home automation. • Devices that collect data in the IoT ecosystem • Devices that act upon data in the IoT ecosystem • Communication networks in 5G that connect IoT devices. • Wireless communication standard crucial for IoT evolution. • A term for the vast network of interconnected devices in IoT. • ...
digital communications 2025-05-01
Across
- A set of related web pages located under a single domain name
- 1's and 0's
- The physical parts of a computer
- a communication method that uses electronic devices to deliver messages across computer networks
- the protection of computer systems
Down
- an emerging technology
- A global network made up of billions of electronic devices
- Information that can be interpreted and used by computers
- a set of computers sharing resources with one an other
- A set of instructions, data or programs used to operate computers and execute specific tasks
10 Clues: 1's and 0's • an emerging technology • The physical parts of a computer • the protection of computer systems • a set of computers sharing resources with one an other • Information that can be interpreted and used by computers • A global network made up of billions of electronic devices • A set of related web pages located under a single domain name • ...
Creative Writing Quiz 2023-11-29
Across
- Social Networks allows us to______
- _________ Networks are computational models used for data analysis and pattern recognition
- A Neural Network refers to a _________
- The Acronym AI stands for?
Down
- Social Networks allows us to______
- A Neural Network is inspired by the ______ ________ Neural Structure.
- Neural Network is made up of ______
- Social Networks allows us to______
- __________Networks are online platforms that facilitate communication between individuals.
- Social Network is made up of ________
10 Clues: The Acronym AI stands for? • Social Networks allows us to______ • Social Networks allows us to______ • Social Networks allows us to______ • Neural Network is made up of ______ • Social Network is made up of ________ • A Neural Network refers to a _________ • A Neural Network is inspired by the ______ ________ Neural Structure. • ...
Topic 7: Networks 2021-06-25
Across
- two or more computers that are linked in order to share resources, exchange files, or allow electronic communications.
- vast network that connects computers all over the world.
- a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously
- computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building
Down
- hardware device that converts data from a digital format, intended for communication directly between devices with specialized wiring
- is a twisted pair cable for computer networks.
- network that links two or more devices using wireless communication to form a local area network (LAN)
- networking device that forwards data packets between computer networks.
- rod, wire, or other device used to transmit or receive radio or television signals.
- an electrical impulse or radio wave transmitted or received.
- operating by means of transmitted electromagnetic waves.
11 Clues: is a twisted pair cable for computer networks. • operating by means of transmitted electromagnetic waves. • vast network that connects computers all over the world. • an electrical impulse or radio wave transmitted or received. • networking device that forwards data packets between computer networks. • ...
Topic 7 Networks 2021-06-30
Across
- With regard to telecommunications, the term Wireless applies to the type of communication in which a means of physical propagation is not used, but rather electromagnetic wave modulation, radiation or optical media is used.
- Local networt
- cylinder that allows you to receive the wifi signal, television etc.
- device that converts digital signals into analog
- any type of network with high capacity to transport information that affects the transmission speed of this.
- device that allows computers operating within the framework of a network to be interconnected.
Down
- electromagnetic waves (frequency range) propagated through a transmission medium.
- Category 5 cable (CAT 5) It is a type of twisted-pair cable that is classified as one of the grades of UTP cabling described in the EIA/TIA 568B standard that is used to run CDDI and can transmit data at speeds up to 100 Mbps at frequencies up to 100 MHz.
- global network of computer networks whose purpose is to allow the free exchange of information between all its users
- set of computers connected to each other through various methods to share information and services.
- stands for a local area network that connects computers without the need for cables
11 Clues: Local networt • device that converts digital signals into analog • cylinder that allows you to receive the wifi signal, television etc. • electromagnetic waves (frequency range) propagated through a transmission medium. • stands for a local area network that connects computers without the need for cables • ...
Topic 7 Networks 2021-06-30
Across
- Is a type of twisted pair cable whose category is one of the UTP cabling grades described in the EIA/TIA 568B
- consists of a set of computers connected to each other through various methods to share information.
- World-wide computer network using the telephone line to transmit information
- Is a wireless communication system to minimize wired connections.
- These networks link computers in a small physical space, such as an office or building.
Down
- Is any type of network with a high capacity to carry information that affects the speed at which it is transmition
- Its function is to establish the route to be used for each data packet within a computer network.
- Device that converts digital signals into analog signals, or vice versa.
- Is a limited form of inter-process communication used in Unix and other POSIX-compliant operating systems.
- Is a normally metallic conductive device, designed for the purpose of emitting and/or receiving electromagneti
- Is one in which the communication is not linked by a physical means of propagation.
11 Clues: Is a wireless communication system to minimize wired connections. • Device that converts digital signals into analog signals, or vice versa. • World-wide computer network using the telephone line to transmit information • Is one in which the communication is not linked by a physical means of propagation. • ...
Crossword Computer Networks 2018-03-06
Across
- It converts fixed length input to variable length Output
- The process of combining multiple inputs to single output
- Data must arrive at receiver exactly as it was sent
- In mobile IP the agent whose IP address is temporary
- The process of splitting single inputs to multiple output
- The encryption which uses same key for encryption and decryption
- The devices whose software have roaming capabilities
Down
- In mobile IP the agent whose IP address is permanent
- The process of converting ciphertext into plaintext
- It provides authentication,integrity,non-repudation
- The process of converting plaintext into ciphertext
11 Clues: The process of converting ciphertext into plaintext • It provides authentication,integrity,non-repudation • Data must arrive at receiver exactly as it was sent • The process of converting plaintext into ciphertext • In mobile IP the agent whose IP address is permanent • In mobile IP the agent whose IP address is temporary • ...
Social networks: YouTube 2023-09-20
Across
- Plural of the word "hora" in Spanish
- People who visit a website are
- Videos have
- A person that uses the internet is ____
- Opposite to men
Down
- Opposite to woman
- Your personal info goes here in an app
- What you consume from a website or app
- It is represented by this symbol (%)
- Human beings are ___
- When people have a profile in an app they are
11 Clues: Videos have • Opposite to men • Opposite to woman • Human beings are ___ • People who visit a website are • Plural of the word "hora" in Spanish • It is represented by this symbol (%) • Your personal info goes here in an app • What you consume from a website or app • A person that uses the internet is ____ • When people have a profile in an app they are
Year 9 - Networks 2023-09-22
Across
- network topology where devices only connect to the central router
- used at home to give off an internet connection
- how to describe a WAN
- network topology where all devices are connected to each other
- wireless connection. Commonly used for speakers
Down
- how to describe a LAN
- what does WAN stand for?
- what does LAN stand for?
- used to send data in WANs
- term used to describe how fast your network is
- type of cable used in LANs
11 Clues: how to describe a LAN • how to describe a WAN • what does WAN stand for? • what does LAN stand for? • used to send data in WANs • type of cable used in LANs • term used to describe how fast your network is • used at home to give off an internet connection • wireless connection. Commonly used for speakers • network topology where all devices are connected to each other • ...
IT 2023-02-02
7 Clues: a network that is wired • an online messaging system • an internet protocol address • Networks classified as wireless • a worldwide system of computer networks • the transfer of data from one digital device to another • computer server or device that provides network to another
Lesson 3 key terms 2016-03-22
Across
- pair cable Cable commonly used in high-speed wired computer networks
- A technology that allows electronic devices to exchange data wirelessly (using radio waves) over a network
- A network created for a home or other small geographic area
- A device that allows a modem to send information formatted to be read by network computers
- Media Transmission media provide a "path" for information to be sent from one computer to another through a network.
- internet service provider) A company that has a permanent connection to the Internet and can provide temporary access to its customers, individuals, and others
- Device A component used to connect computers or other electronic devices together so they can share files or resources
- Software and hardware that provides services to other computer programs and their users.
Down
- Cable Cable specifically designed for carrying an electronic signal
- A host is a computer that manages tasks, communicates instructions, or delivers specific services to other computers, or clients, on a network
- A device that enables computers to interpret data received from a network
- Access Point An intermediary device that joins wireless clients to a wired Ethernet network
- (internet protocol) Provides a unique identification for a specific computer or network.
- A network created around an individual’s personal work space
- cable A type of cable commonly used in high-speed wired computer networks.
- Address a hardware address that uniquely identifies each node of a network.
- A device that manages the sharing of multiple computers or networks on the same data connection
- A collection of LANs that is dispersed over a large geographical area.
- A hardware device or software program that manages the paths along which information travels within a network
- Device A device that is either the source or the destination of a packet on a network
20 Clues: A network created for a home or other small geographic area • A network created around an individual’s personal work space • Cable Cable specifically designed for carrying an electronic signal • pair cable Cable commonly used in high-speed wired computer networks • A collection of LANs that is dispersed over a large geographical area. • ...
lesson 24 2015-04-20
Across
- device that uses coaxial cable to send and receive data
- a computer that handles request for data, email, file transfers, and other network services from other computers
- a series of connected personal computers, workstation, and other devices, such as printers or scanners, within a confined space, such as an office building
- examine a fingerprint, a voice pattern, or the iris or retina of the eye
- acts like a switchboard through a firewall
- Variation of the LAN that uses no physical wires
- an internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines
- allows specific users outside of the organization to access internal information systems
- describes a software architectural model relationship
- supports telephone service and is the world's collection of interconnection of commercial and government-owned voice-oriented systems
- link from one computer to another through which data can be transmitted
- designed for exclusive use of people within an organization
- high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network
Down
- worldwide system composed of thousands of smaller networks
- small, simple, inexpensive device that joins multiple computers together
- no computer is a designated server and all computers are equal
- delivers fast connections speeds
- protects individual companies’ networks from external networks
- recent wireless technology that can deliver maximum speeds up to 7mbps to your cell phone , home computer, or car
- connects WANs or LANs through this device
- computer network that covers a large geographical area
- software program such as Internet Explorer
- type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels
- each device on the network
- people who break into computer systems to steal services and information
- device that enables a computer to transmit voice data over telephone lines
26 Clues: each device on the network • delivers fast connections speeds • connects WANs or LANs through this device • acts like a switchboard through a firewall • software program such as Internet Explorer • Variation of the LAN that uses no physical wires • describes a software architectural model relationship • computer network that covers a large geographical area • ...
Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Crossword Puzzle 2024-04-30
Across
- Distributed ledger technology for secure and transparent transactions.
- Protection against threats.
- Buying and selling goods or services online.
- Software designed for a specific purpose or task.
- Physical components of a computer system.
- Legal regulations governing online activities.
- Transfer data from a remote system to a local device.
- Unauthorized use of someone's personal information.
- Programs and applications for computers.
- Verifying the identity of a user.
- Creating software using programming languages.
- Software for accessing and viewing websites.
- Document displayed on the internet.
- Collection of related web pages.
- Simulation of human intelligence by machines.
- Main webpage of a website.
- Unsolicited or unwanted emails or messages.
- Legal protection of creative works.
- Writing instructions for computers.
- Exchange of information or messages.
- Global network connecting computers and devices.
Down
- Hidden part of the internet not indexed by search engines.
- Harassment or intimidation online.
- Individuals who gain unauthorized access to systems or networks.
- Malicious software.
- Graphical user interface on a computer.
- Trail of digital activities left behind by a user.
- Responsible use of technology and the internet.
- Fraudulent attempt to obtain sensitive information.
- Transfer data from a local device to a remote system.
- Criminal activities conducted online.
- Information presented on the internet.
- Interconnected computers or devices.
- Deliberate exploitation of computer systems or networks.
- Knowledge or data.
- Device for forwarding data packets between computer networks.
- Criminal activities conducted online.
- Precautions to protect against online threats.
- Legal principle allowing limited use of copyrighted material.
- Electronic device for processing data.
- Right to control personal information.
- Reference or connection to another webpage or resource (repeated).
- Ability to analyze and evaluate media content critically.
- Platforms for sharing content and connecting with others.
- Reference or connection to another webpage or resource.
- Encoding data for secure transmission.
- Relating to electronic technology.
- Secret phrase for access control.
- Information in digital form.
- Self-replicating program that spreads and harms systems.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Harassment or intimidation online. • Relating to electronic technology. • Document displayed on the internet. • ...
Topic 7 Networks 2021-06-30
Across
- type of network with high capacity to transport information that affects speed.
- can be analog or digital
- wireless local area network
- set of equipment connected to each other by means of physical or wireless devices that send and receive electrical impulses, electromagnetic waves or any other means to transport data, in order to share information, resources and offer services.
- is a device that allows interconnecting computers that work within the framework of a network. Its function is to establish the route that will be assigned to each data packet within a computer network.
- type of twisted pair cable whose category is one of the grades of UTP cabling described in the EIA / TIA standard.
Down
- connection that is given by means of electromagnetic waves, without the need for a wired or wired network.
- serves to emit or receive electromagnetic waves.
- is a network of computers that are interconnected worldwide to share information.
- is a device that converts digital signals into analog (modulation) and vice versa (demodulation), thus allowing communication between computers through the telephone line or cable modem.
- is a computer network that covers an area confined to a house, an apartment or a building.
11 Clues: can be analog or digital • wireless local area network • serves to emit or receive electromagnetic waves. • type of network with high capacity to transport information that affects speed. • is a network of computers that are interconnected worldwide to share information. • is a computer network that covers an area confined to a house, an apartment or a building. • ...
ระดับยากแบบร้องไห้ 2026-03-21
Across
- ปริมาณที่ใช้วัดความไร้ระเบียบของระบบ ตามกฎข้อที่สองของอุณหพลศาสตร์ ปริมาณนี้ของเอกภพจะเพิ่มขึ้นเสมอ
- กระบวนการตายของเซลล์ที่ถูกโปรแกรมไว้ล่วงหน้าอย่างเป็นระเบียบเพื่อรักษาสมดุลของเนื้อเยื่อ
- วัตถุทางคณิตศาสตร์ที่เป็นนัยทั่วไปของสเกลาร์และเวกเตอร์ เป็นหัวใจสำคัญในทฤษฎีสัมพัทธภาพทั่วไปของไอน์สไตน์
- ฟังก์ชันที่อธิบายพลศาสตร์ของระบบ หาได้จากผลต่างระหว่างพลังงานจลน์และพลังงานศักย์ (L = T - V)
- ฟังก์ชันต่อเนื่องที่มีฟังก์ชันผกผันต่อเนื่อง ใช้ระบุว่าปริภูมิเชิงทอพอโลยีสองปริภูมิมีความสมมูลกัน (เช่น โดนัทกับแก้วกาแฟ)
- ชื่อสมการคลื่นที่เป็นรากฐานของกลศาสตร์ควอนตัม อธิบายการเปลี่ยนแปลงสถานะของระบบควอนตัมตามเวลา
- ปริภูมิทางทอพอโลยีที่ในบริเวณใกล้เคียงจุดใดๆ มีลักษณะคล้ายกับปริภูมิยูคลิด (Euclidean space)
- กระบวนการทางฟิสิกส์ดาราศาสตร์ที่สร้างนิวเคลียสของธาตุใหม่จากนิวคลีออนที่มีอยู่เดิม มักเกิดขึ้นในใจกลางดาวฤกษ์
Down
- ปรากฏการณ์ทางควอนตัมที่สถานะของอนุภาคสองตัวมีความเกี่ยวข้องกันจนอธิบายแยกจากกันไม่ได้แม้จะอยู่ห่างกันแค่ไหน
- อัลกอริทึมหลักที่ใช้ฝึกฝนโครงข่ายประสาทเทียม (Neural Networks) โดยการคำนวณเกรเดียนต์ของฟังก์ชันความสูญเสียแบบย้อนกลับ
- ตัวดำเนินการที่สอดคล้องกับพลังงานรวมของระบบในกลศาสตร์ควอนตัมหรือระบบคลาสสิก (H = T + V)
- อนุภาคที่มีสปินเป็นครึ่งจำนวนเต็ม และต้องปฏิบัติตามหลักการกีดกันของเพาลี (Pauli Exclusion Principle)
- อัลกอริทึมชื่อดังในวิชาวิทยาการคอมพิวเตอร์ สำหรับหาเส้นทางที่สั้นที่สุดจากจุดเริ่มต้นไปยังจุดอื่นๆ ในกราฟ
- ฟังก์ชันแบบหนึ่งต่อหนึ่งและทั่วถึงที่คงสมบัติทางโครงสร้างระหว่างโครงสร้างทางพีชคณิตสองระบบ
- แบบจำลองเชิงคณิตศาสตร์ของการคำนวณที่ใช้เทปอนันต์และหัวอ่าน/เขียน เป็นรากฐานของทฤษฎีการคำนวณ
- กระบวนการที่มีลักษณะสุ่มหรือไม่สามารถพยากรณ์ได้อย่างแม่นยำล่วงหน้า มักใช้ตัวแบบความน่าจะเป็นมาอธิบาย
- โมเลกุลของ RNA ที่มีความสามารถในการเร่งปฏิกิริยาเคมีได้คล้ายกับเอนไซม์ที่เป็นโปรตีน
- สมบัติทางเคมีหรือฟิสิกส์ของโมเลกุลที่ไม่สามารถซ้อนทับกับภาพสะท้อนในกระจกของตัวเองได้สนิท (ความเป็นมือซ้าย-ขวา)
- สเกลาร์ \lambda ที่สอดคล้องกับสมการ Ax = \lambda x สำหรับเมทริกซ์จัตุรัส A และเวกเตอร์ที่ไม่ใช่ศูนย์ x
- เจ้าของหลักความไม่แน่นอนที่ระบุว่าเราไม่สามารถวัดตำแหน่งและโมเมนตัมของอนุภาคให้แม่นยำพร้อมกันได้
20 Clues: โมเลกุลของ RNA ที่มีความสามารถในการเร่งปฏิกิริยาเคมีได้คล้ายกับเอนไซม์ที่เป็นโปรตีน • ตัวดำเนินการที่สอดคล้องกับพลังงานรวมของระบบในกลศาสตร์ควอนตัมหรือระบบคลาสสิก (H = T + V) • กระบวนการตายของเซลล์ที่ถูกโปรแกรมไว้ล่วงหน้าอย่างเป็นระเบียบเพื่อรักษาสมดุลของเนื้อเยื่อ • ฟังก์ชันแบบหนึ่งต่อหนึ่งและทั่วถึงที่คงสมบัติทางโครงสร้างระหว่างโครงสร้างทางพีชคณิตสองระบบ • ...
Les Médias 2013-12-09
Knowledge Management 2012-07-11
Across
- supports it all and can assist in implementing actions of knowledge management
- manual or physical skills
- growth in feelings or emotional areas
- strategy focused on developing social networks to link people with tacit and explicit knowledge
- written or otherwise documented
- are needed to transfer knowledge and implement actions of that knowledge
- art of creating, organizing, applying, and transferring knowledge to facilitate situational understanding and decision making
Down
- consists of comprehension gained through study
- strategy that focuses on connecting people with content through technical networks
- mental skills
- the mental processing unit that receives information from the environment
- the mental processing unit in which information may be stored temporarily
- are needed to provide guidelines and the how, to accomplish actions of knowledge management
- the encyclopedic mental processing unit in which information may be stored permanently
14 Clues: mental skills • manual or physical skills • written or otherwise documented • growth in feelings or emotional areas • consists of comprehension gained through study • are needed to transfer knowledge and implement actions of that knowledge • the mental processing unit that receives information from the environment • ...
Information Technology Career Cluster 2022-03-31
Across
- Creative minds behind computer programs.
- Design and build data communication networks, including local area networks (LANs), wide area network (WANs), and intranets.
- Designs the content and rules of a video game in the pre-production stage and designing the gameplay, environment, storyline, and characters in the production stage.
- Uses both traditional design skills and modern technology to produce a variety of applications including games, websites, audio content, special effects, and animation also work.
- Design and create websites. They are responsible for the look of the site.
- Study an organizations current computer systems, procedures and design information systems solutions to help organization operate more efficiently and effectively.
- Prepares instruction manuals, journal articles, and other supporting documents to communicate complex and technical information more easily.
Down
- Provide help and advice to people and organizations using computer software or equipment.
- Responsible for the day-to-day operation of these networks and is critical parts of almost every organization.
- Create animation and visual effects for television, movies, video games, and other forms of media.
- Writes code to create software programs.
11 Clues: Creative minds behind computer programs. • Writes code to create software programs. • Design and create websites. They are responsible for the look of the site. • Provide help and advice to people and organizations using computer software or equipment. • Create animation and visual effects for television, movies, video games, and other forms of media. • ...
Activity 4 2024-03-30
Across
- In Semantic networks these are denoted by labeled links.
- It chooses a sequence of actions with a high likelihood to complete the specific task
- networks A graphical representation used to represent knowledge in AI
- An heuristic must be
- This funtion is used to represent the knowledge of the environment
Down
- Backward relevant-states search is also called
- It uses a set of ground (variable-free) actions to represent.
- This is based on points of time rather than on situations
- tomatoes are red
- Represents the abstract concepts such as Events, Time, Physical Objects, and Beliefs
10 Clues: tomatoes are red • An heuristic must be • Backward relevant-states search is also called • In Semantic networks these are denoted by labeled links. • This is based on points of time rather than on situations • It uses a set of ground (variable-free) actions to represent. • This funtion is used to represent the knowledge of the environment • ...
OT cybersecurity 2024-07-16
Across
- A system that monitors and controls industrial processes
- An unauthorized act of bypassing security mechanisms
- A secret word or phrase used to authenticate access
- A security flaw that can be exploited
- Protection of sensitive information from unauthorized access
Down
- A unique identifier for a network device
- The practice of securing computer systems and networks
- An act of gaining unauthorized access to systems and networks
- A device used to control the flow of electricity in OT systems
- A network security system that monitors and controls incoming and outgoing network traffic
10 Clues: A security flaw that can be exploited • A unique identifier for a network device • A secret word or phrase used to authenticate access • An unauthorized act of bypassing security mechanisms • The practice of securing computer systems and networks • A system that monitors and controls industrial processes • Protection of sensitive information from unauthorized access • ...
Chapter 4 vocaulary 2025-03-04
Across
- – Connecting virtual networks to enable seamless communication.
- – Logical containers for managing and organizing Azure resource
- – A platform-as-a-service (PaaS) for hosting web applications, RESTful APIs, and backend services.
- - Lightweight, virtualized application environments
- – Cloud storage solution offering blob, file, queue, and disk storage.
Down
- – Cloud-based virtual desktop infrastructure (VDI) solution.
- – Serverless compute service for running event-driven applications.
- – Different levels of storage (hot, cool, and archive) based on access frequency.
- – Emulated computer systems that run in the Azure cloud environment.
- – A logical isolation of the Azure cloud dedicated to your subscription for managing network traffic.
- – Securely connects on-premises networks to the Azure environment.
11 Clues: - Lightweight, virtualized application environments • – Cloud-based virtual desktop infrastructure (VDI) solution. • – Connecting virtual networks to enable seamless communication. • – Logical containers for managing and organizing Azure resource • – Securely connects on-premises networks to the Azure environment. • ...
ISO/OSI 2022-04-04
Across
- are devices or data points on a network
- The process of transforming data into an unintelligible form to prevent the unauthorized use of the data
- a small amount of data sent over Transmission Control Protocol/Internet Protocol (TCP/IP) networks
- is a computer designed to perform a group of function
- temporary and interactive information interchange
- how do we call the information.
- is an established set of rules that determine how data is transmitted
- A worldwide system of interconnected computer networks
- layer provides communication between application processes running on different hosts within a layered architecture of protocols and other network components
- is any computer connected to a network.
Down
- written acknowledgment that something has been transferred
- the device that sends the data
- how do we call a set of protocols
- the device that receives the data
- layer mainly translates data between the application layer and the network format.
- system is a computer that combines portability and interoperability
- how do we call a connection between two devices.
- a group or system of interconnected people or things.
18 Clues: the device that sends the data • how do we call the information. • how do we call a set of protocols • the device that receives the data • are devices or data points on a network • is any computer connected to a network. • how do we call a connection between two devices. • temporary and interactive information interchange • ...
Workplace Technology 2020-09-16
Across
- machine which makes exact duplicates of documents
- computer software which has restrictions on its use and source code is kept secret
- device for sending & receiving printed documents
- wireless networking technology using radio waves to transport internet signals
- programmable machine for storing,processing,& retrieving data
- software that can be used without paying a license fee
- connections among computers to facilitate communication and sharing of resources
- input device which transfers information and images from physical documents to computer files
- public information on the internet which connects billions of documents known as web pages
- output device,which produces physical versions of computer documents
- physical elements of a computer , all support computer functionality
Down
- equipment and systems developed for practical purposes
- global system of computer networks
- Multiline interconnected telephone system
- computer software which provides platforms and instructions for specific tasks
- instructions which guide how hardware,operates
- global network of remote servers which operate through the internet
- Computer software which provides instructions for basic operations of computer hardware
- private networks typically used by organizations for the sharing of company news , etc.
- application software which operate and can be accessed through the World Wide Web
20 Clues: global system of computer networks • Multiline interconnected telephone system • instructions which guide how hardware,operates • device for sending & receiving printed documents • machine which makes exact duplicates of documents • equipment and systems developed for practical purposes • software that can be used without paying a license fee • ...
iQuesta 2022 - Finals 2022-01-27
Across
- acts as a security guard between the internet and a network
- Using material another person has created and claims it as your own
- application for performing numerical and statistical calculations
- is a layout software
- malware type in which security mechanism is bypassed to access a system.
- The purpose of scrambling data so it can be sent securely over networks.
- A location that provides wireless Internet access.
- A number assigned to any item that is connected to the Internet
- To allow communication inside the organization
- Vendor-created program modifications are called
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- a method used for a security breach in wireless networks
Down
- instructions programmed on a hardware
- a program that can analyze and execute a program line by line.
- blockchain programming
- The information about someone on the Internet
- Initialize the system hardware components
- name of the system that manages and programs hardware resources for a computer
- the amount of data that can travel over an analog medium
- Playing video and sound in real time
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
Technical crossword 2025-05-26
Across
- Relating to the structure of a brain or AI
- AI-generated synthetic media
- Translates code into machine language
- Neural network-based machine learning technique
- Exists in digital rather than physical form
- Prefix meaning related to computers or networks
- Wired networking protocol for local networks
- Decentralized ledger used in cryptocurrencies
- Reduces the need for human intervention
- Security system that monitors traffic
- Converts data to hide meaning
- Opposite of natural; precedes “intelligence”
- Software designed to damage or infiltrate
Down
- Structured collection of information
- Data that describes other data
- The base-2 numeral system used by computers
- Data type with two possible values
- Core of an operating system
- Performs computation in electronic devices
- Repeating a process, often in loops
- Deceptive attempt to gain sensitive information
- Instruction to retrieve data from a database
- Low-level software tightly coupled with hardware
- Challenge to verify a human user
- Smallest unit of meaning in programming or crypto
- Set of rules that define structure in code
- Amount of data transmitted over a network
- Interface that lets software components communicate
- Phase when a program is actively executing
- A step-by-step procedure used in computation
30 Clues: Core of an operating system • AI-generated synthetic media • Converts data to hide meaning • Data that describes other data • Challenge to verify a human user • Data type with two possible values • Repeating a process, often in loops • Structured collection of information • Translates code into machine language • Security system that monitors traffic • ...
RU ITEC411 Chapter 5 Crime and Security Crossword 2026-03-12
Across
- Hacking carried out for political or social activist purposes.
- Redirecting website traffic to a fake site to steal credentials.
- Phishing conducted over voice calls or voicemail.
- An unauthorized intrusion into a computer or network.
- Self-replicating malware that spreads across networks without user action.
- A published false statement that damages someone's reputation.
- Malware that encrypts a victim's files and demands payment for their release.
- Decoy systems designed to lure and detect hackers.
- Ethical hackers who test systems legally to find vulnerabilities.
- Abbrv. An attack that floods a system to make it unavailable to users.
Down
- Phishing carried out via SMS text messages.
- Gaining unauthorized access to computer systems or networks.
- A person who exploits weaknesses in computer systems.
- Any software intentionally designed to cause harm to a system.
- A hidden method of bypassing normal authentication in a system.
- Using physical traits like fingerprints or facial recognition for identification.
- Malicious code that attaches to files and spreads when executed.
- Fraudulent emails tricking users into revealing sensitive information.
- Abbrv. US law criminalizing unauthorized computer access.
- US law expanding surveillance powers to combat terrorism post-9/11.
20 Clues: Phishing carried out via SMS text messages. • Phishing conducted over voice calls or voicemail. • Decoy systems designed to lure and detect hackers. • A person who exploits weaknesses in computer systems. • An unauthorized intrusion into a computer or network. • Abbrv. US law criminalizing unauthorized computer access. • ...
cyber security or something 2026-04-03
Across
- — malware that spreads automatically across networks without user action
- citizenship — responsible and safe use of technology and the internet
- — attempt to damage, disrupt, or gain unauthorized access to a system
- — copy of data stored separately in case of loss or damage
- — program that secretly collects your personal information
- security — protection of computer networks from threats and attacks
- authentication — security method requiring two forms of verification
- — software designed to detect and remove malicious programs
- — process of converting data into a coded form to keep it secure
- — scam where attackers trick users into giving sensitive information via fake messages
Down
- — process of verifying a user’s identity
- — software designed to harm or exploit a computer system
- engineering — manipulation of people to trick them into revealing confidential information
- — software that locks your data and demands payment to unlock it
- — security system that monitors and controls incoming and outgoing network traffic
- breach — incident where sensitive information is exposed or stolen
- security — practice of protecting data from unauthorized access or use
- — malware that hides deep in a system to avoid detection
- — a malicious program that spreads by attaching itself to files
- — a secret word or phrase used to access an account
20 Clues: — process of verifying a user’s identity • — a secret word or phrase used to access an account • — software designed to harm or exploit a computer system • — malware that hides deep in a system to avoid detection • — copy of data stored separately in case of loss or damage • — program that secretly collects your personal information • ...
crossword no16 2017-09-12
Across
- most secured os
- small unit for data
- stores the data temporarily
- shopping portal
- vintage programming language
- wireless device used to control
- roots different networks
Down
- connecting devices
- app to communicate message
- gaming device
- connecting devices
- android version
- portable storage
- social blue bird
- full featured web portal+mailing portal
- raw information
16 Clues: gaming device • most secured os • shopping portal • android version • raw information • portable storage • social blue bird • connecting devices • connecting devices • small unit for data • roots different networks • app to communicate message • stores the data temporarily • vintage programming language • wireless device used to control • full featured web portal+mailing portal
AI 2024-12-13
Across
- (2Words)A type of machine learning using layers of neural networks.
- A type of learning that analyzes labeled data.
- Assigning categories to data points.
- The layer that processes input data into features for the output layer.
- (2Words) The feedback mechanism in neural networks for minimizing error.
Down
- (2Words)A system that mimics a human expert’s decision-making.
- A method of grouping data based on common attributes.
- (2Words A system of algorithms modeled after the human brain.
- A large and complex set of data, often used in AI systems.
- An AI system that simulates human conversation
- Error due to incorrect assumptions in the learning process.
11 Clues: Assigning categories to data points. • A type of learning that analyzes labeled data. • An AI system that simulates human conversation • A method of grouping data based on common attributes. • A large and complex set of data, often used in AI systems. • Error due to incorrect assumptions in the learning process. • ...
Computer Scince 2025-10-02
Across
- to receive data from a remote system
- The process of finding and resolving defects or problems within a computer program
- 1000000000bytes.
- A computer that provides information to other computers called "clients" on a computer network
- A networking device that forwards data packets between computer networks.
Down
- base 16 number system
- base 2 number system
- A device that can be instructed to carry out sequences of arithmetic or logical operations automatically
- An organized collection of data, generally stored and accessed electronically from a computer system.
- to extract or remove
- The global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.
11 Clues: 1000000000bytes. • base 2 number system • to extract or remove • base 16 number system • to receive data from a remote system • A networking device that forwards data packets between computer networks. • The process of finding and resolving defects or problems within a computer program • ...
Crossword 2025-02-11
Across
- Neuron firing decision
- Efficient activation function
- Time-series data network
- Neural networks' strength
- Image recognition network
- Visualization technique
Down
- Adjusts weights/biases
- Receives initial data
- Powerful, complex models
- Perform computations
- Provides predictions
- Difficult to interpret
- Early activation function
13 Clues: Perform computations • Provides predictions • Receives initial data • Adjusts weights/biases • Neuron firing decision • Difficult to interpret • Visualization technique • Powerful, complex models • Time-series data network • Early activation function • Neural networks' strength • Image recognition network • Efficient activation function
internet By Adnan 2015-09-22
Across
- Standard network protocol for communication across networks
- Collection of networks of computers & storage devices linked by cables & satellite
- mainframe computers that are capable of very fast processing
- A location on the WWW
- Structure that handles the major traffic in a networked system
- Lead to another website/place within same document
Down
- early version of the Internet
- Companies that proved users with access to the Internet, usually for a fee
- Total collection of hypertext documents stored in computers connected to the Internet
- an agreed upon format for transmitting data between two or more devices
- standard way of indicating the location of a web site (it’s the site’s address)
11 Clues: A location on the WWW • early version of the Internet • Lead to another website/place within same document • Standard network protocol for communication across networks • mainframe computers that are capable of very fast processing • Structure that handles the major traffic in a networked system • ...
Ch. 1 Social 10-1 Globalization and Identity TNN 2024-09-16
Across
- how one understands/sees the world
- how I view myself
- what we deem important, right, good
- able to speak two languages fluently
- a person whose first language is French
- the process by which political decisions and actions are becoming increasingly international
- the process by which the the world citizen's are becoming increasingly connected to and dependent on one another
- a group to which an individual belongs
Down
- what people believe to be true based on collective experience as a group
- the process of expanding world trading networks
- the process by which people's lifestyles spread over global networks
- what individuals believe to be true based on their personal experience
- the practices and beliefs of a culture that have been handed down from generation to generation
- where and when a particular event happens
- a question or situation that involves thoughtful, well-meaning people in honest and sincere dialogue
- laws and other actions taken by governments
16 Clues: how I view myself • how one understands/sees the world • what we deem important, right, good • able to speak two languages fluently • a group to which an individual belongs • a person whose first language is French • where and when a particular event happens • laws and other actions taken by governments • the process of expanding world trading networks • ...
Networks explained 2024-10-14
Across
- a transmission of data to all devices within a network simultaneously
- a network of millions of computers in a large geographical area
- a networking device that forwards data packets between networks
Down
- a division of a bigger network
- a device used to connect to the wider internet via an ISP (short for "modulator-demodulator")
- the flow of data across a network
- a network device that connects different networks and facilitates communication between them
7 Clues: a division of a bigger network • the flow of data across a network • a network of millions of computers in a large geographical area • a networking device that forwards data packets between networks • a transmission of data to all devices within a network simultaneously • a network device that connects different networks and facilitates communication between them • ...
AS 100 - C6L3 - Cybersecurity - Crossword Puzzle 2024-01-10
Across
- Programs and devices that monitor and restrict communication between computer systems and outside networks
- Interacting with other people through dedicated websites and applications (apps)
- One or more computers linked together physically or wirelessly
- Digital text that contains electronic links to other texts
- The use of cyberspace to interfere with an enemy’s command and control, disrupt normal economic activity, steal intellectual property or government secrets, and prevent equipment from functioning properly
- An electronic procedure
- system of networks connecting computers around the world
Down
- A program that accesses and displays files on the Internet or World Wide Web
- Gaining access to a file, computer, or network that you’re not authorized to see
- A large, high-performance computer usually connected to several terminals and used by a large organization
- Harmful software
- computer
- Converting data into secret code
- Another name for the Internet
14 Clues: computer • Harmful software • An electronic procedure • Another name for the Internet • Converting data into secret code • system of networks connecting computers around the world • Digital text that contains electronic links to other texts • One or more computers linked together physically or wirelessly • ...
Computer Crossword 2014-06-12
Across
- Input that moves the cursor
- The most common type of display
- The temporary memory of the computer
- The fastest type of printer
- Converts power entering the computer to 12V DC
- A more efficient data storage drive
- The most common type of printer
- battery that powers the system clock
- Connects computer components
- The type of cable that connects the hard drive to the motherboard
- The most recent external output cable
- A security system where a card is used to store private information
- Used to protect the computer components from dust and other damage
Down
- The brain of the computer
- Expansion card used to process sound
- card used to connect to wireless networks
- Expansion card used to process visuals
- An external input or output
- The most common external connector
- Expansion card used to connect to wireless networks
- Cable that connects the motherboard to power
- Input generally used to input letters and numbers
- Used to connect the CPU to the heat sink and fan assembly
- The permanent memory of a computer
- Drive used to read CDs and DVDs
- Replacement for a mouse. Comes built in to laptops
26 Clues: The brain of the computer • Input that moves the cursor • An external input or output • The fastest type of printer • Connects computer components • The most common type of display • The most common type of printer • Drive used to read CDs and DVDs • The most common external connector • The permanent memory of a computer • A more efficient data storage drive • ...
Computer Crossword 2014-06-03
Across
- The most common type of display
- The most common type of printer
- The most common external connector
- Replacement for a mouse. Comes built in to laptops
- A more secure data storage drive
- Cable that connects the motherboard to power
- The most recent external output cable
- Input generally used to input letters and numbers
- Expansion card used to process visuals
- Converts power entering the computer to 12V DC
- Connects computer components
- Used to protect the computer components from dust and other damage
- Input that moves the cursor
- An external input or output
Down
- A security system where a card is used to store private information
- Expansion card used to connect to wireless networks
- Expansion card used to process sound
- The type of cable that connects the hard drive to the motherboard
- used to connect the CPU to the heat sink and fan assembly
- card used to connect to wireless networks
- Drive The permanent memory of a computer
- battery that powers the system clock
- The temporary memory of the computer
- Drive used to read CDs and DVDs
- The brain of the computer
- The fastest type of printer
26 Clues: The brain of the computer • Input that moves the cursor • An external input or output • The fastest type of printer • Connects computer components • The most common type of display • The most common type of printer • Drive used to read CDs and DVDs • A more secure data storage drive • The most common external connector • Expansion card used to process sound • ...
@@@@MY PUZZLE 12/2/2016 2016-12-02
Across
- machine are the containers that run workloads on top of hyper visors
- power that speed and capacity of computer chips
- center is a large computer room
- are four different levels on which processor commands can be executed
- are virtual machines that already contain an operating system
- an exact copy of a virtual machine
- extra capacity
- server a server that is running no one knows which line of business owns it
- disk sometimes called a child disk
Down
- core a microprocessor that contains more than one processing unit
- cloning performs the clone operation while the source server is booted
- a capturing of a virtual machine state at a particular point in time
- virtulized work loads
- cloud where you store music, pictures etc.
- metal computer server without any operating system software installed
- area networks is a dedicated high speed network
- area networks a system that links together electronic office equipment
- time protocol is an open standard that defines and implements a computers ability to synchronize with the internet time servers
- tools a combination of device drivers and processors that enhance the users with the virtual machines
- head is an infrastructure services in older servers
20 Clues: extra capacity • virtulized work loads • center is a large computer room • an exact copy of a virtual machine • disk sometimes called a child disk • cloud where you store music, pictures etc. • power that speed and capacity of computer chips • area networks is a dedicated high speed network • head is an infrastructure services in older servers • ...
iQuesta 2022 - Finals 2022-01-27
Across
- Playing video and sound in real time
- malware type in which security mechanism is bypassed to access a system.
- The information about someone on the Internet
- Using material another person has created and claims it as your own
- acts as a security guard between the internet and a network
- the amount of data that can travel over an analog medium
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- application for performing numerical and statistical calculations
- a program that can analyze and execute a program line by line.
Down
- The purpose of scrambling data so it can be sent securely over networks.
- A number assigned to any item that is connected to the Internet
- a method used for a security breach in wireless networks
- instructions programmed on a hardware
- Initialize the system hardware components
- blockchain programming
- Vendor-created program modifications are called
- To allow communication inside the organization
- A location that provides wireless Internet access.
- name of the system that manages and programs hardware resources for a computer
- is a layout software
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
Computer Acronyms MK 2025-09-04
Across
- USB type, small and thin
- Initializes the system, bridges hardware and OS
- external storage array that supports only flash media for persistent storage
- Stores data using spinning disks, even through the computer being powered off
- Holds permanent data
- Uses liquid crystals with a backlight to display images
- Damages or compromises information
- Unique, digital assets that can be traded like currency
- USB type, bigger and thicker
- Transmits from computer to monitor
- Renders images
- Input, storage, process, output
- Used to connect storage devices
Down
- Provides a window for monitoring and changing the system
- The way you interact with the system (terminals and typing)
- (Abbreviations) Connects computers and other networks in a physical space
- Uses flash memory to store data
- Stores and retrieves data. Loses data when turned off
- Combines binary to perform mathematical operations
- Transmits audio and video signals between devices
- Part of the Cpu that controls the processing part
- Combines hard drives to a single system
- Used to connect storage devices to motherboard
- Enables computer to connect to networks
- Connects video sources to display devices
- Connects peripherals to computer, allowing for data transfer and power delivery
26 Clues: Renders images • Holds permanent data • USB type, small and thin • USB type, bigger and thicker • Uses flash memory to store data • Input, storage, process, output • Used to connect storage devices • Damages or compromises information • Transmits from computer to monitor • Combines hard drives to a single system • Enables computer to connect to networks • ...
SOCIAL NETWORKS 2013-05-19
7 Clues: Publish • Divide and receive • Relations between people • Give the latest information • Group related in a community • Personal description of someone • Website containing the writer's experience
Computer networks 2024-07-01
Networking Concepts 2025-06-15
Across
- Topology In this topology, each device is connected to a central hub.
- A large network spread across countries or continents.
- In star topology, data flows through this central device.
- Converts digital signals to analog for internet access.
- Unauthorized access is a type of ____ issue in networks.
- One of the key benefits of networking – improves speed and saves cost.
- In a ____-to-point topology, two nodes are directly connected.
- A topology where devices are arranged in a hierarchical or tree-like structure.
- Device that connects a computer to a wireless network.
Down
- Connects different networks and directs data between them.
- A network typically for one person’s devices.
- This device connects multiple computers and sends data only to the intended recipient.
- Common peripheral device shared in a network.
- The act of sending data to all devices in a network.
- In this topology, all devices share a single communication line. (Hint: Not a ring)
- Type of cable used for connecting network devices.
- This network covers a small geographical area like a school or office.
- A Device used to physically connect a computer to network.
18 Clues: A network typically for one person’s devices. • Common peripheral device shared in a network. • Type of cable used for connecting network devices. • The act of sending data to all devices in a network. • A large network spread across countries or continents. • Device that connects a computer to a wireless network. • ...
CW1 2017-10-08
Across
- Program secretly collecting information.
- :Deny or allow packet based on rules.
- :A program to stop virus attack.
- :Business and Personal equipment must be protected
- :All devices can talk to each other.
- :Marks IP address in network diagram
- :An attack named after greek-trojan war.
- :Network Can grow
- :Access to people inside company only.
- :A powerful machine which answers.
- :interconnects networks
Down
- : An attack which slows down or crashes equipment and programs
- :Network attack that occurs on the first day that a vulnerability becomes known.
- :A machine which asks or start communication.
- :A Method to connect Business to Internet
- :Address space for IoT
- :Blocks Unauthorised access to networks.
- :WANs are in control of _______________.
- :A known person trying to access you system.
- :__________Signals are used to carry message in fibre optic cables
- :Creates a secure connection for remote workers.
- :command to go from switch> to switch#
- :Stealing your username and password.
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- :Priority Queues
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :All devices can talk to each other. • :Marks IP address in network diagram • :Deny or allow packet based on rules. • :Stealing your username and password. • :command to go from switch> to switch# • ...
ISDM 2 Crossword 2020-09-03
Across
- form of malware in which ads begin to pop up
- internet service provider
- collection of data or instructions that tell the computer how to work
- very small switches found in microchips
- keep the packets moving smoothly throughout the networks
- a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user
- a block of data transmitted across a network
- physical parts of a computer
- a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
Down
- system of comuting that use two numbers
- a software that supports the basic functions of a device
- world wide web
- network of networks
- Law states that we can expect the speed and capability of our computers to increase every couple of years, and we will pay less for them.
- an interpreted, high-level and general-purpose programming language
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web
- software used to detect and remove malware
- internet protocol
- Transmission Control Protocol
- software used to purposefully damage a computer
20 Clues: world wide web • internet protocol • network of networks • internet service provider • physical parts of a computer • Transmission Control Protocol • system of comuting that use two numbers • very small switches found in microchips • software used to detect and remove malware • form of malware in which ads begin to pop up • a block of data transmitted across a network • ...
unit 3&4 vocab 2022-11-07
Across
- obtaining information or input into a task or project by enlisting the services of a large number of people
- to optimize a website's technical configuration, content relevance and link popularity
- person who has subscribed to receive updates from a specific user
- internet advertising model used to drive traffic to websites
- number of times one’s content is displayed
- et of tools designed to streamline and simplify some of the most time-consuming responsibilities
- psychological phenomenon where people assume the actions
- Filtering through all the interesting content across the web
- represents how many people looked at one’s post.
- business methodology that attracts customers by creating valuable content and experiences
Down
- social media networks to manage and grow an organization’s message and online presence.
- marketing methods conducted through electronic devices
- communication style reflects on their brand.
- user on social media who has established credibility in a specific industry.
- marketing strategy that leverages a business’ employees' networks
- consumers are familiar with the distinctive qualities
- specific group of people desired by various groups
- electronic communication to bully a person
- supports one’s brand on social media
- luring someone into a relationship by means of a fictional online persona.
20 Clues: supports one’s brand on social media • electronic communication to bully a person • number of times one’s content is displayed • communication style reflects on their brand. • represents how many people looked at one’s post. • specific group of people desired by various groups • consumers are familiar with the distinctive qualities • ...
MY PUZZLE 12/2/2016 2016-12-02
Across
- machine are the containers that run workloads on top of hyper visors
- disk sometimes called a child disk
- head is an infrastructure services in older servers
- an exact copy of a virtual machine
- are virtual machines that already contain an operating system
- cloning performs the clone operation while the source server is booted
- power that speed and capacity of computer chips
- time protocol is an open standard that defines and implements a computers ability to synchronize with the internet time servers
- tools a combination of device drivers and processors that enhance the users with the virtual machines
Down
- core a microprocessor that contains more than one processing unit
- a capturing of a virtual machine state at a particular point in time
- area networks is a dedicated high speed network
- virtulized work loads
- area networks a system that links together electronic office equipment
- are four different levels on which processor commands can be executed
- server a server that is running no one knows which line of business owns it
- extra capacity
- cloud where you store music, pictures etc.
- metal computer server without any operating system software installed
- center is a large computer room
20 Clues: extra capacity • virtulized work loads • center is a large computer room • disk sometimes called a child disk • an exact copy of a virtual machine • cloud where you store music, pictures etc. • area networks is a dedicated high speed network • power that speed and capacity of computer chips • head is an infrastructure services in older servers • ...
V T class.... jm 2016-12-01
Across
- shot a set of file that preserve the state of a virtual machine
- a device that allows a computer to connect to a network
- power the speed and capacity of computer chips headroom extra capacity
- center large computer room
- cloning performs the clone operation while the source server is booted
- area networks a system that links together electronic office equipment
- disk sometimes called a child disk
- where you can store music pictures etc.
- are four different levels on which processor commands can be executed
- are virtual machines that already contain an operating system
- tools a combination of device drivers and processors that enhance the users with the virtual machines
Down
- server a server that is running and no one knows which line of business owns it
- to virtual manual or automated process that transfers data
- vitalized work loads
- extra capacity
- an exact copy of a virtual machine
- machine are the containers that run workloads on top of hyper visors
- head infrastructure services an in older servers
- area networks is a dedicated high speed network
- core a microprocessor that contains more than one processing unit
- metal computer server without any operating system software installed
21 Clues: extra capacity • vitalized work loads • center large computer room • an exact copy of a virtual machine • disk sometimes called a child disk • where you can store music pictures etc. • area networks is a dedicated high speed network • head infrastructure services an in older servers • a device that allows a computer to connect to a network • ...
Technology 2023-09-28
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
Rubens CrossWord - Module 11 OS - 12/09/2024 2024-12-09
Across
- what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern)
- A document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached.
- Microsoft Challenge Handshake Authentication Protocol.
- Enable administrators to control who has access to the network.
- A..........creates a barrier between two entities.
- A............creates a barrier between a computer OS and the network.
- The most widely used method for encrypting data.
- ....... testers who are paid to probe networks and report vulnerabilities.
- What users can do after they are logged on to the network.
Down
- Used in a Windows domain environment and provides mutual authentication.
- A....................creates a barrier between networks.
- A good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- By ...... attackers who do not report problems, but instead disseminate the information to other black hat attackers.
- Password Authentication Protocol.
- What the user knows (smart card or key).
- Encrypting File System.
- What the user has (smart card or key).
- Multifactor Authentication.
- Remote Authentication Dial-In User Service.
- Extensible Authentication Protocol.
20 Clues: Encrypting File System. • Multifactor Authentication. • Password Authentication Protocol. • Extensible Authentication Protocol. • What the user has (smart card or key). • What the user knows (smart card or key). • Remote Authentication Dial-In User Service. • The most widely used method for encrypting data. • A..........creates a barrier between two entities. • ...
Cybersecurity Unit 6 and 7 Vocab 2026-03-03
Across
- a network security system—available as hardware, software, or cloud service—that acts as a barrier between trusted internal networks and untrusted external networks
- a comprehensive strategy combining physical security (guards, surveillance, locks) and IT security (firewalls, encryption, access controls) to protect the infrastructure, servers, and sensitive data within a facility
- a concealed, non-indexed layer of the internet requiring specialized software (e.g., Tor) for access, prioritizing user anonymity
- sending fraudulent emails to CEOs or executives in an attempt to steal information from the target for malicious purposes
- standardized sets of rules, techniques, and procedures designed to protect data integrity, confidentiality, and availability during transmission over networks
- the backbone of the internet, owning global, high-capacity infrastructure (fiber, routers) and refocuses on securing infrastructure with increasing complexity, redundancy, and risk, often following NIST CSF guidelines every other network via settlement-free peering
- any unauthorized, malicious action targeting a computer system, network, or data to compromise its confidentiality, integrity, or availability
- Social engineering is the psychological manipulation of people into performing actions or divulging confidential information, bypassing technical security controls. It exploits human emotions—fear, urgency, curiosity, or trust
Down
- a critical cybersecurity tool designed to detect, block, and remove malicious software (malware)—such as viruses, ransomware, spyware, and worms—from devices and networks
- a powerful, networked computer or software program that manages, stores, and processes data while providing services (e.g., website hosting, file storage, email) to client devices
- the practice of protecting internet-connected systems—including hardware, software, and data—from malicious digital attacks, unauthorized access, or damage
- sending fraudulent emails in an attempt to steal information from the target for malicious purposes
- cybersecurity tool that creates an encrypted, secure "tunnel" over a public network (like the internet) to protect user privacy and data
- the stealthy, initial phase of gathering information about a target system, network, or organization without direct engagement or interaction
- all internet content not indexed by standard search engines (like Google) and is not inherently malicious, often consisting of legitimate, private, password-protected, or encrypted data
- redirecting people from popular websites to fraudulent websites in an attempt to steal information for malicious purposes
- the final, often most challenging, step of securing data as it reaches the end user, device, or application
- The surface web is the publicly accessible, indexed portion of the internet searchable via standard browsers (Google, Bing). Representing only 4–5% of total online content, it includes websites, social media, and news
18 Clues: sending fraudulent emails in an attempt to steal information from the target for malicious purposes • the final, often most challenging, step of securing data as it reaches the end user, device, or application • sending fraudulent emails to CEOs or executives in an attempt to steal information from the target for malicious purposes • ...
I.T revision 2016-07-24
11 Clues: 1 or 0 • 8 bits • Monitor • Keyboard • 1000 bytes • Hard drive • control click • 1000 Kilobytes • 1000 megabytes • Input, Process, Output • Collection of devices that communicate with each other
iQuesta 2022 - Finals 2022-01-27
Across
- Playing video and sound in real time
- instructions programmed on a hardware
- the amount of data that can travel over an analog medium
- a method used for a security breach in wireless networks
- Vendor-created program modifications are called
- Initialize the system hardware components
- A location that provides wireless Internet access.
- malware type in which security mechanism is bypassed to access a system.
- a program that can analyze and execute a program line by line.
- application for performing numerical and statistical calculations
- name of the system that manages and programs hardware resources for a computer
Down
- Using material another person has created and claims it as your own
- blockchain programming
- To allow communication inside the organization
- The purpose of scrambling data so it can be sent securely over networks.
- is a layout software
- acts as a security guard between the internet and a network
- A number assigned to any item that is connected to the Internet
- The information about someone on the Internet
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
iQuesta 2022 - Finals 2022-01-27
Across
- instructions programmed on a hardware
- acts as a security guard between the internet and a network
- malware type in which security mechanism is bypassed to access a system.
- application for performing numerical and statistical calculations
- Using material another person has created and claims it as your own
- A location that provides wireless Internet access.
- blockchain programming
- the amount of data that can travel over an analog medium
- Playing video and sound in real time
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- a method used for a security breach in wireless networks
- name of the system that manages and programs hardware resources for a computer
- is a layout software
Down
- A number assigned to any item that is connected to the Internet
- The purpose of scrambling data so it can be sent securely over networks.
- Initialize the system hardware components
- The information about someone on the Internet
- To allow communication inside the organization
- a program that can analyze and execute a program line by line.
- Vendor-created program modifications are called
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
CW1 2017-10-08
Across
- Program secretly collecting information.
- :A powerful machine which answers.
- : An attack which slows down or crashes equipment and programs
- :interconnects networks
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- :Network Can grow
- :Deny or allow packet based on rules.
- :Stealing your username and password.
- :Blocks Unauthorised access to networks.
- :Creates a secure connection for remote workers.
- :__________Signals are used to carry message in fibre optic cables
- :command to go from switch> to switch#
- :An attack named after greek-trojan war.
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- :Network attack that occurs on the first day that a vulnerability becomes known.
Down
- :WANs are in control of _______________.
- :Address space for IoT
- :A program to stop virus attack.
- :Marks IP address in network diagram
- :Business and Personal equipment must be protected
- :Priority Queues
- :Access to people inside company only.
- :A Method to connect Business to Internet
- :All devices can talk to each other.
- :A machine which asks or start communication.
- :A known person trying to access you system.
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :Marks IP address in network diagram • :All devices can talk to each other. • :Deny or allow packet based on rules. • :Stealing your username and password. • :Access to people inside company only. • ...
CW1 2017-10-08
Across
- :A program to stop virus attack.
- :Deny or allow packet based on rules.
- :Blocks Unauthorised access to networks.
- :A powerful machine which answers.
- : An attack which slows down or crashes equipment and programs
- :interconnects networks
- :Stealing your username and password.
- :Marks IP address in network diagram
- :A machine which asks or start communication.
- :All devices can talk to each other.
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- Program secretly collecting information.
Down
- :An attack named after greek-trojan war.
- :Access to people inside company only.
- :Network Can grow
- :Network attack that occurs on the first day that a vulnerability becomes known.
- :Business and Personal equipment must be protected
- :WANs are in control of _______________.
- :A known person trying to access you system.
- :__________Signals are used to carry message in fibre optic cables
- :A Method to connect Business to Internet
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- :Address space for IoT
- :Priority Queues
- :command to go from switch> to switch#
- :Creates a secure connection for remote workers.
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :Marks IP address in network diagram • :All devices can talk to each other. • :Deny or allow packet based on rules. • :Stealing your username and password. • :Access to people inside company only. • ...
The Big Year 7 Crossword 2017-06-27
Across
- the name given to software on a mobile device
- A computer program designed to infect and damage computer networks
- The language used to write web pages
- Abbreviated to CPU
- A stick used to save things on and transfer from one computer to another
- Used to enter text data into a computer
- The programs and instructions used to operate your computer
- When someone looks up another person on the internet and looks at all the pictures information
- AND, OR and NOT are types of these
- Used by the CPU to store programs and data
- The physical components of a computer that you can see and touch
Down
- The interlinked documents that you visit online
- Where you store all of your files on a computer
- A programming language you used back in October
- Using the internet to abuse and harass people
- Data expressed in 1s and 0s
- When two or more computers are connected together
- a sequence of steps followed to solve a problem
- An Output device used to output sound to you
- The interconnected network of networks you use to look at web pages
20 Clues: Abbreviated to CPU • Data expressed in 1s and 0s • AND, OR and NOT are types of these • The language used to write web pages • Used to enter text data into a computer • Used by the CPU to store programs and data • An Output device used to output sound to you • the name given to software on a mobile device • Using the internet to abuse and harass people • ...
Technology computer 2023-11-29
Across
- - Pointing device commonly used with computers.
- Here's a crossword puzzle using the provided questions:
- - Input device for controlling movement in a computer game.
- - Global network connecting millions of private, public, academic, business, and government networks.
- - Process of generating an image from a model.
- - Common storage device for digital data.
- - Device that forwards data packets between computer networks.
- - Physical components of a computer system.
- - Solid State Drive; a faster and more durable storage alternative to HDD.
- - Read-Only Memory; a type of non-volatile memory.
- - Device for producing a paper copy of data from a computer.
- - Video Graphics Array; a standard for displaying graphics.
- - Input device with keys for entering data into a computer.
Down
- - Central processing unit; the brain of the computer.
- - Writing code to instruct a computer.
- - Programs and data that operate a computer.
- free to solve the puzzle!
- - Temporary storage area, often used to improve data transfer.
- - The main circuit board containing the central components of a computer.
- - Device for converting sound into an electrical signal.
- - Autonomous or semi-autonomous mechanical device.
- - Computer or system that manages network resources.
22 Clues: free to solve the puzzle! • - Writing code to instruct a computer. • - Common storage device for digital data. • - Physical components of a computer system. • - Programs and data that operate a computer. • - Process of generating an image from a model. • - Pointing device commonly used with computers. • - Autonomous or semi-autonomous mechanical device. • ...
Raffy's CrossWord Puzzle 2023-05-15
Across
- drive stores data on computer
- Address internet protocol
- Uniform resource locator
- World Wide Web
- Operational Support System
- printed circuit board containing main contents of computer
- booting or restarting a computer system
- worldwide system of computer networks
- Larger unit of data a computer stores
- device keyboard
- engine safari
- Info stored in the software of a computer
- software designed to disrupt computer system
- device that forwards data between network devices
- Portable Document Format
- smallest unit of data a computer can store
- computer program that manages access to a centralized resource in a network
- device speaker
- regularly updated web page usually operated by a small group
Down
- HyperText Markup Language
- firefox
- Central Processing Unit
- Property Creation of the Mind
- Read Only Memory
- controls modulation/demodulation
- a block of data created by a web browser
- cable that connects computer networks in a wide area
- Domain Name System
- Phase Locked Loop
- process of converting info or data into a code
- unit of info equal to 1 million bytes
- language zeros and ones
- security system that manages incoming and outgoing network traffic
- Random Access Memory
34 Clues: firefox • engine safari • World Wide Web • device speaker • device keyboard • Read Only Memory • Phase Locked Loop • Domain Name System • Random Access Memory • Central Processing Unit • language zeros and ones • Uniform resource locator • Portable Document Format • HyperText Markup Language • Address internet protocol • Operational Support System • drive stores data on computer • ...
Technology 2023-09-30
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
CRAZY CROSSWORD DARE TO SOLVE!!! 2025-05-27
Across
- — A device that connects your home or business to the internet.
- — Unwanted and unsolicited messages sent through email or other platforms.
- — A Local Area Network connecting computers in a small area.
- — A secret code of characters used to protect an online account.
- — The right to keep personal information safe from others online.
- — Harassing or threatening people online through messages or posts.
- — A wireless technology for connecting devices to a network.
- — The rules of good behavior and manners while using the internet.
Down
- — A fraudulent attempt to get personal information through fake messages.
- — Moral principles that guide how people behave online.
- — A computer that provides services or data to other computers.
- — Malicious software such as viruses, worms, or spyware.
- — A Wide Area Network covering a large geographical area.
- — Legal protection given to the creator of original content.
- — Unauthorized access to computer systems or networks.
- — A device used to connect multiple devices within a LAN.
- — A set of rules that control how data is sent over a network.
- — A device or program that requests services from a server.
- — A device that forwards data packets between computer networks.
- Address — A unique number identifying a device on a network.
20 Clues: — Unauthorized access to computer systems or networks. • — Moral principles that guide how people behave online. • — Malicious software such as viruses, worms, or spyware. • — A Wide Area Network covering a large geographical area. • — A device used to connect multiple devices within a LAN. • — A device or program that requests services from a server. • ...
Cyber Ethics 2025-06-17
Across
- - a basic network device that broadcasts data to all parts.
- - a network topology where each device connects to exactly two others, forming a loop.
- - a common wired networking technology.
- - connect multiple devices & filters data to the intended recipient.
- - the physical logical arrangement of a network.
- - sending data to all devices.
- - device that modulates & demodulates digital signals for internet access.
- - devices that make up the element of a network.
Down
- - the act of giving others access to files, resources or information.
- - a combination of bus & star topology.
- - a type of network that is mainly created foreign individual person.
- - the practice of connecting computers & devices to share resources.
- - wireless networking technology.
- - topology with multiple parts between devices for fault tolerance.
- - physical medium used to transmit data in wired networks.
- - closeness of devices, affecting wireless signal quality.
- - a type of network limited to a small geographical area.
- - a network topology where each device is connected to a central computer using point-to-point connection.
- - small handheld device used to access & manage digital information.
- - forwards data between different networks, often used to connect to the internet.
20 Clues: - sending data to all devices. • - wireless networking technology. • - a combination of bus & star topology. • - a common wired networking technology. • - the physical logical arrangement of a network. • - devices that make up the element of a network. • - a type of network limited to a small geographical area. • ...
Computer Network & Security 2025-09-17
Across
- – Connection-oriented protocol that ensures reliable communication.
- – Protocol used to map IP addresses to MAC addresses.
- – Widely used point-to-point protocol for data link communication.
- – Reference model with seven layers for networking functions.
- - the rate at which data is successfully transmitted from one point to another in a network
- - Uniquely identifies a device (like a computer, phone, or server) on a network
- – Error detection technique using the sum of data units.
- – A collection of interconnected devices sharing resources.
- – Process of dividing a data stream into manageable units.
- – Scientist who gave a formula for maximum data rate in noiseless channels.
Down
- – Error detection method based on polynomial division.
- – The physical or logical arrangement of a network.
- – Line coding where each bit has a transition at the middle.
- – Transmission mode where data flows in one direction only.
- – Line coding scheme where voltages are positive or negative.
- – Variation in packet arrival time that affects performance.
- – Type of switched network where a dedicated path is reserved.
- - When two or more networks are connected
- – Basic unit of data in packet-switched networks.
- – Device that forwards frames based on MAC addresses.
20 Clues: - When two or more networks are connected • – Basic unit of data in packet-switched networks. • – The physical or logical arrangement of a network. • – Protocol used to map IP addresses to MAC addresses. • – Device that forwards frames based on MAC addresses. • – Error detection method based on polynomial division. • ...
CEH Chapter 16 Crossword Puzzle 2026-03-13
Across
- Tool for ARP poisoning
- Data transfer rate capacity
- WPA2 key reinstallation attack
- Detects WPS enabled access points
- Latest WiFi security protocol
- Wireless security using AES
- Fake access point impersonator
- Hops across multiple frequencies
- Process connecting client to AP
- Portable radio spectrum analyzer
- Public place with WiFi access
- EAP inside secure TLS tunnel
- Unauthorized wireless access point
- Captures wireless packets and handshakes
- Wireless sniffer and detector
- Disrupts wireless communication signals
- Improved wireless security standard
- Spread spectrum using code sequence
Down
- WPA per packet keying
- Marking symbols for WiFi spots
- Fakes hardware network address
- Legacy wireless encryption protocol
- Centralized authentication server system
- Walking to find wireless networks
- Cracks WPS PIN codes
- Access point MAC identifier
- Wireless network name identifier
- Driving to discover wireless networks
- Connects wireless clients to network
- Dragonfly password authentication method
- WPA2 encryption integrity protocol
- Protocol analyzer for packet capture
- Rogue access point lure
- Cracks WEP and WPA keys
- Drone based wireless discovery
- Multi carrier digital modulation method
- Enables wireless monitor mode
- Injects frames into wireless traffic
- Multiple antenna OFDM transmission method
- Strong symmetric encryption algorithm
40 Clues: Cracks WPS PIN codes • WPA per packet keying • Tool for ARP poisoning • Rogue access point lure • Cracks WEP and WPA keys • Data transfer rate capacity • Wireless security using AES • Access point MAC identifier • EAP inside secure TLS tunnel • Latest WiFi security protocol • Public place with WiFi access • Enables wireless monitor mode • Wireless sniffer and detector • ...
The Internet 2015-09-21
Across
- Within the same document you can be lead to another site/place
- Companies that provide access to the internet, for a fee
- where you can store URLs that you would like to visit frequently
- technology that allows over two devices to communicate without using cables or wires
- One of the most popular uses on the internet
- location on the world wide web(WWW)
- Network protocol to communicate across networks
Down
- what kind of computer is capable of fast processing
- What you call a sites address
- what's the gap between people who do and don't have internet access called
- where they store the collection of millions of hypertext documents
- networks of computers and storage that are linked by cables or by satellite
- name of the early version of internet (1960s)
13 Clues: What you call a sites address • location on the world wide web(WWW) • One of the most popular uses on the internet • name of the early version of internet (1960s) • Network protocol to communicate across networks • what kind of computer is capable of fast processing • Companies that provide access to the internet, for a fee • ...
Network Devices 2021-11-09
Across
- adapter that connects it to a computer or a local area network (LAN).
- a device that is both a transmitter and a receiver, and usually it's in a single device.
- security devices used to stop or mitigate unauthorized access to private networks connected to the Internet
- converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- device that creates a single, aggregate network from multiple communication networks or network segments.
- A computer that sits between different networks or applications
- enables users of wireless devices to access and interact with wireless information services and applications.
- connects devices in a network to each other
8 Clues: connects devices in a network to each other • A computer that sits between different networks or applications • adapter that connects it to a computer or a local area network (LAN). • a device that is both a transmitter and a receiver, and usually it's in a single device. • ...
Questions - Crossword 1 - Internet and its Services 2024-05-16
Across
- Live chat via webcam.
- Bulletin Board Service type.
- Electronic mail system.
- E-commerce activity.
- Marketing promotion.
Down
- Exchange of information.
- Modern business concept.
- Real-time conversation method.
- Connected to the internet.
- Network of networks.
- Remote login concept.
- Online discussion platform.
- Web exploration action.
- Internet service provider.
14 Clues: Network of networks. • E-commerce activity. • Marketing promotion. • Live chat via webcam. • Remote login concept. • Electronic mail system. • Web exploration action. • Exchange of information. • Modern business concept. • Connected to the internet. • Internet service provider. • Online discussion platform. • Bulletin Board Service type. • Real-time conversation method.
Network Basics - Terminology 2012-03-27
Across
- connect networks in larger geographic areas
- run over a variety of cable types at 10Mbps
- a central computer that provides resources to other computers and devices on a network
- standard connectors used for unshielded twisted-pair cable
- concentrator in a star topology network where node connections meet
- node that requests services from a server
- describes the way network systems are physically connected to each other by media devices
- provide security to a network and prevent access by unauthorized users
- a board that provides network communication capabilities to and from a computer
Down
- any device attached to a network
- nodes are connected to a common device such as a hub or concentrator
- resources and files are shared without a centralized management source
- connects networks and forwards data of a specific protocol type based on an address
- a cable to which multiple nodes are attached
- nodes are connected to a closed loop
- a network that is confined to a relatively small area
16 Clues: any device attached to a network • nodes are connected to a closed loop • node that requests services from a server • connect networks in larger geographic areas • run over a variety of cable types at 10Mbps • a cable to which multiple nodes are attached • a network that is confined to a relatively small area • standard connectors used for unshielded twisted-pair cable • ...
Claire's internet crossword puzzle 2015-09-22
Across
- groups of networks of computers and devices that are linked by satellites or cables
- version of the internet made in 1960's to link computers together for communication systems
- devices you can use to access the internet computer,tablet
- lets more data be sent from copper telephone lines
- common way of finding the location of a website,every website can be found by using it
- Ethernet or usb cable and a dsl or cable modem
- owned by either an individual,organization or company, located on the WWW
- companies that give users access to the internet for a cost
- converts data to analog signals for travel on the internet
- Lead to another place or site within the same document
- favourite websites that are used frequently
Down
- standard network protocol for communication between networks
- equipment and devices that need infrastructure
- allows 2 or more devices to communicate without cables
- a software that allows you to search for information
- structure that handles the busy traffic of a networked system
16 Clues: favourite websites that are used frequently • equipment and devices that need infrastructure • Ethernet or usb cable and a dsl or cable modem • lets more data be sent from copper telephone lines • a software that allows you to search for information • allows 2 or more devices to communicate without cables • Lead to another place or site within the same document • ...
wireless network 2022-03-01
Across
- The solution of a weak signal
- Wireless networks can work without.........
- A type of network that works at a close range within a reach of person
Down
- Wireless network is a computer network that uses wireless data links to connect .............
- an old name for WIFI
- Wireless networks can be just as ....... and powerful as wired networks
6 Clues: an old name for WIFI • The solution of a weak signal • Wireless networks can work without......... • A type of network that works at a close range within a reach of person • Wireless networks can be just as ....... and powerful as wired networks • Wireless network is a computer network that uses wireless data links to connect .............
Social Media 4 2026-03-24
14 Clues: view or belief • acted or played • systems or links • desire or hunger • exact or detailed • meanings or purpose • Related to politics • generous or abundant • steer, direct, cross • foundations or causes • reporting or newspaper • secrecy or confidentiality • individuality or uniqueness • dirtiness or disorderliness
Profed 4 2020-08-04
Across
- computer networking technology used in local area networks
- open-source Internet browser released by Google
- leading information retrieval service of the InterneT
- receives modulated signals and demodulates them
Down
- Ethernet was created in 1973 by a team at this corporation
- a system architecture that has revolutionized communications and methods of commerce
- one of the first general-purpose computer networks
- Berners-Lee British scientist
8 Clues: Berners-Lee British scientist • open-source Internet browser released by Google • receives modulated signals and demodulates them • one of the first general-purpose computer networks • leading information retrieval service of the InterneT • Ethernet was created in 1973 by a team at this corporation • computer networking technology used in local area networks • ...
