networks Crossword Puzzles
I.T revision 2016-07-24
11 Clues: 1 or 0 • 8 bits • Monitor • Keyboard • 1000 bytes • Hard drive • control click • 1000 Kilobytes • 1000 megabytes • Input, Process, Output • Collection of devices that communicate with each other
Networking Concepts 2025-06-15
Across
- Topology In this topology, each device is connected to a central hub.
- A large network spread across countries or continents.
- In star topology, data flows through this central device.
- Converts digital signals to analog for internet access.
- Unauthorized access is a type of ____ issue in networks.
- One of the key benefits of networking – improves speed and saves cost.
- In a ____-to-point topology, two nodes are directly connected.
- A topology where devices are arranged in a hierarchical or tree-like structure.
- Device that connects a computer to a wireless network.
Down
- Connects different networks and directs data between them.
- A network typically for one person’s devices.
- This device connects multiple computers and sends data only to the intended recipient.
- Common peripheral device shared in a network.
- The act of sending data to all devices in a network.
- In this topology, all devices share a single communication line. (Hint: Not a ring)
- Type of cable used for connecting network devices.
- This network covers a small geographical area like a school or office.
- A Device used to physically connect a computer to network.
18 Clues: A network typically for one person’s devices. • Common peripheral device shared in a network. • Type of cable used for connecting network devices. • The act of sending data to all devices in a network. • A large network spread across countries or continents. • Device that connects a computer to a wireless network. • ...
CW1 2017-10-08
Across
- Program secretly collecting information.
- :Deny or allow packet based on rules.
- :A program to stop virus attack.
- :Business and Personal equipment must be protected
- :All devices can talk to each other.
- :Marks IP address in network diagram
- :An attack named after greek-trojan war.
- :Network Can grow
- :Access to people inside company only.
- :A powerful machine which answers.
- :interconnects networks
Down
- : An attack which slows down or crashes equipment and programs
- :Network attack that occurs on the first day that a vulnerability becomes known.
- :A machine which asks or start communication.
- :A Method to connect Business to Internet
- :Address space for IoT
- :Blocks Unauthorised access to networks.
- :WANs are in control of _______________.
- :A known person trying to access you system.
- :__________Signals are used to carry message in fibre optic cables
- :Creates a secure connection for remote workers.
- :command to go from switch> to switch#
- :Stealing your username and password.
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- :Priority Queues
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :All devices can talk to each other. • :Marks IP address in network diagram • :Deny or allow packet based on rules. • :Stealing your username and password. • :command to go from switch> to switch# • ...
ISDM 2 Crossword 2020-09-03
Across
- form of malware in which ads begin to pop up
- internet service provider
- collection of data or instructions that tell the computer how to work
- very small switches found in microchips
- keep the packets moving smoothly throughout the networks
- a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user
- a block of data transmitted across a network
- physical parts of a computer
- a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
Down
- system of comuting that use two numbers
- a software that supports the basic functions of a device
- world wide web
- network of networks
- Law states that we can expect the speed and capability of our computers to increase every couple of years, and we will pay less for them.
- an interpreted, high-level and general-purpose programming language
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web
- software used to detect and remove malware
- internet protocol
- Transmission Control Protocol
- software used to purposefully damage a computer
20 Clues: world wide web • internet protocol • network of networks • internet service provider • physical parts of a computer • Transmission Control Protocol • system of comuting that use two numbers • very small switches found in microchips • software used to detect and remove malware • form of malware in which ads begin to pop up • a block of data transmitted across a network • ...
unit 3&4 vocab 2022-11-07
Across
- obtaining information or input into a task or project by enlisting the services of a large number of people
- to optimize a website's technical configuration, content relevance and link popularity
- person who has subscribed to receive updates from a specific user
- internet advertising model used to drive traffic to websites
- number of times one’s content is displayed
- et of tools designed to streamline and simplify some of the most time-consuming responsibilities
- psychological phenomenon where people assume the actions
- Filtering through all the interesting content across the web
- represents how many people looked at one’s post.
- business methodology that attracts customers by creating valuable content and experiences
Down
- social media networks to manage and grow an organization’s message and online presence.
- marketing methods conducted through electronic devices
- communication style reflects on their brand.
- user on social media who has established credibility in a specific industry.
- marketing strategy that leverages a business’ employees' networks
- consumers are familiar with the distinctive qualities
- specific group of people desired by various groups
- electronic communication to bully a person
- supports one’s brand on social media
- luring someone into a relationship by means of a fictional online persona.
20 Clues: supports one’s brand on social media • electronic communication to bully a person • number of times one’s content is displayed • communication style reflects on their brand. • represents how many people looked at one’s post. • specific group of people desired by various groups • consumers are familiar with the distinctive qualities • ...
MY PUZZLE 12/2/2016 2016-12-02
Across
- machine are the containers that run workloads on top of hyper visors
- disk sometimes called a child disk
- head is an infrastructure services in older servers
- an exact copy of a virtual machine
- are virtual machines that already contain an operating system
- cloning performs the clone operation while the source server is booted
- power that speed and capacity of computer chips
- time protocol is an open standard that defines and implements a computers ability to synchronize with the internet time servers
- tools a combination of device drivers and processors that enhance the users with the virtual machines
Down
- core a microprocessor that contains more than one processing unit
- a capturing of a virtual machine state at a particular point in time
- area networks is a dedicated high speed network
- virtulized work loads
- area networks a system that links together electronic office equipment
- are four different levels on which processor commands can be executed
- server a server that is running no one knows which line of business owns it
- extra capacity
- cloud where you store music, pictures etc.
- metal computer server without any operating system software installed
- center is a large computer room
20 Clues: extra capacity • virtulized work loads • center is a large computer room • disk sometimes called a child disk • an exact copy of a virtual machine • cloud where you store music, pictures etc. • area networks is a dedicated high speed network • power that speed and capacity of computer chips • head is an infrastructure services in older servers • ...
V T class.... jm 2016-12-01
Across
- shot a set of file that preserve the state of a virtual machine
- a device that allows a computer to connect to a network
- power the speed and capacity of computer chips headroom extra capacity
- center large computer room
- cloning performs the clone operation while the source server is booted
- area networks a system that links together electronic office equipment
- disk sometimes called a child disk
- where you can store music pictures etc.
- are four different levels on which processor commands can be executed
- are virtual machines that already contain an operating system
- tools a combination of device drivers and processors that enhance the users with the virtual machines
Down
- server a server that is running and no one knows which line of business owns it
- to virtual manual or automated process that transfers data
- vitalized work loads
- extra capacity
- an exact copy of a virtual machine
- machine are the containers that run workloads on top of hyper visors
- head infrastructure services an in older servers
- area networks is a dedicated high speed network
- core a microprocessor that contains more than one processing unit
- metal computer server without any operating system software installed
21 Clues: extra capacity • vitalized work loads • center large computer room • an exact copy of a virtual machine • disk sometimes called a child disk • where you can store music pictures etc. • area networks is a dedicated high speed network • head infrastructure services an in older servers • a device that allows a computer to connect to a network • ...
Technology 2023-09-28
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
Rubens CrossWord - Module 11 OS - 12/09/2024 2024-12-09
Across
- what the user is; a unique biometric identifying trait (fingerprint, retina scan, or voice pattern)
- A document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached.
- Microsoft Challenge Handshake Authentication Protocol.
- Enable administrators to control who has access to the network.
- A..........creates a barrier between two entities.
- A............creates a barrier between a computer OS and the network.
- The most widely used method for encrypting data.
- ....... testers who are paid to probe networks and report vulnerabilities.
- What users can do after they are logged on to the network.
Down
- Used in a Windows domain environment and provides mutual authentication.
- A....................creates a barrier between networks.
- A good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- By ...... attackers who do not report problems, but instead disseminate the information to other black hat attackers.
- Password Authentication Protocol.
- What the user knows (smart card or key).
- Encrypting File System.
- What the user has (smart card or key).
- Multifactor Authentication.
- Remote Authentication Dial-In User Service.
- Extensible Authentication Protocol.
20 Clues: Encrypting File System. • Multifactor Authentication. • Password Authentication Protocol. • Extensible Authentication Protocol. • What the user has (smart card or key). • What the user knows (smart card or key). • Remote Authentication Dial-In User Service. • The most widely used method for encrypting data. • A..........creates a barrier between two entities. • ...
iQuesta 2022 - Finals 2022-01-27
Across
- Playing video and sound in real time
- instructions programmed on a hardware
- the amount of data that can travel over an analog medium
- a method used for a security breach in wireless networks
- Vendor-created program modifications are called
- Initialize the system hardware components
- A location that provides wireless Internet access.
- malware type in which security mechanism is bypassed to access a system.
- a program that can analyze and execute a program line by line.
- application for performing numerical and statistical calculations
- name of the system that manages and programs hardware resources for a computer
Down
- Using material another person has created and claims it as your own
- blockchain programming
- To allow communication inside the organization
- The purpose of scrambling data so it can be sent securely over networks.
- is a layout software
- acts as a security guard between the internet and a network
- A number assigned to any item that is connected to the Internet
- The information about someone on the Internet
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
iQuesta 2022 - Finals 2022-01-27
Across
- instructions programmed on a hardware
- acts as a security guard between the internet and a network
- malware type in which security mechanism is bypassed to access a system.
- application for performing numerical and statistical calculations
- Using material another person has created and claims it as your own
- A location that provides wireless Internet access.
- blockchain programming
- the amount of data that can travel over an analog medium
- Playing video and sound in real time
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- a method used for a security breach in wireless networks
- name of the system that manages and programs hardware resources for a computer
- is a layout software
Down
- A number assigned to any item that is connected to the Internet
- The purpose of scrambling data so it can be sent securely over networks.
- Initialize the system hardware components
- The information about someone on the Internet
- To allow communication inside the organization
- a program that can analyze and execute a program line by line.
- Vendor-created program modifications are called
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
CW1 2017-10-08
Across
- Program secretly collecting information.
- :A powerful machine which answers.
- : An attack which slows down or crashes equipment and programs
- :interconnects networks
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- :Network Can grow
- :Deny or allow packet based on rules.
- :Stealing your username and password.
- :Blocks Unauthorised access to networks.
- :Creates a secure connection for remote workers.
- :__________Signals are used to carry message in fibre optic cables
- :command to go from switch> to switch#
- :An attack named after greek-trojan war.
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- :Network attack that occurs on the first day that a vulnerability becomes known.
Down
- :WANs are in control of _______________.
- :Address space for IoT
- :A program to stop virus attack.
- :Marks IP address in network diagram
- :Business and Personal equipment must be protected
- :Priority Queues
- :Access to people inside company only.
- :A Method to connect Business to Internet
- :All devices can talk to each other.
- :A machine which asks or start communication.
- :A known person trying to access you system.
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :Marks IP address in network diagram • :All devices can talk to each other. • :Deny or allow packet based on rules. • :Stealing your username and password. • :Access to people inside company only. • ...
CW1 2017-10-08
Across
- :A program to stop virus attack.
- :Deny or allow packet based on rules.
- :Blocks Unauthorised access to networks.
- :A powerful machine which answers.
- : An attack which slows down or crashes equipment and programs
- :interconnects networks
- :Stealing your username and password.
- :Marks IP address in network diagram
- :A machine which asks or start communication.
- :All devices can talk to each other.
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- Program secretly collecting information.
Down
- :An attack named after greek-trojan war.
- :Access to people inside company only.
- :Network Can grow
- :Network attack that occurs on the first day that a vulnerability becomes known.
- :Business and Personal equipment must be protected
- :WANs are in control of _______________.
- :A known person trying to access you system.
- :__________Signals are used to carry message in fibre optic cables
- :A Method to connect Business to Internet
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- :Address space for IoT
- :Priority Queues
- :command to go from switch> to switch#
- :Creates a secure connection for remote workers.
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :Marks IP address in network diagram • :All devices can talk to each other. • :Deny or allow packet based on rules. • :Stealing your username and password. • :Access to people inside company only. • ...
The Big Year 7 Crossword 2017-06-27
Across
- the name given to software on a mobile device
- A computer program designed to infect and damage computer networks
- The language used to write web pages
- Abbreviated to CPU
- A stick used to save things on and transfer from one computer to another
- Used to enter text data into a computer
- The programs and instructions used to operate your computer
- When someone looks up another person on the internet and looks at all the pictures information
- AND, OR and NOT are types of these
- Used by the CPU to store programs and data
- The physical components of a computer that you can see and touch
Down
- The interlinked documents that you visit online
- Where you store all of your files on a computer
- A programming language you used back in October
- Using the internet to abuse and harass people
- Data expressed in 1s and 0s
- When two or more computers are connected together
- a sequence of steps followed to solve a problem
- An Output device used to output sound to you
- The interconnected network of networks you use to look at web pages
20 Clues: Abbreviated to CPU • Data expressed in 1s and 0s • AND, OR and NOT are types of these • The language used to write web pages • Used to enter text data into a computer • Used by the CPU to store programs and data • An Output device used to output sound to you • the name given to software on a mobile device • Using the internet to abuse and harass people • ...
Technology computer 2023-11-29
Across
- - Pointing device commonly used with computers.
- Here's a crossword puzzle using the provided questions:
- - Input device for controlling movement in a computer game.
- - Global network connecting millions of private, public, academic, business, and government networks.
- - Process of generating an image from a model.
- - Common storage device for digital data.
- - Device that forwards data packets between computer networks.
- - Physical components of a computer system.
- - Solid State Drive; a faster and more durable storage alternative to HDD.
- - Read-Only Memory; a type of non-volatile memory.
- - Device for producing a paper copy of data from a computer.
- - Video Graphics Array; a standard for displaying graphics.
- - Input device with keys for entering data into a computer.
Down
- - Central processing unit; the brain of the computer.
- - Writing code to instruct a computer.
- - Programs and data that operate a computer.
- free to solve the puzzle!
- - Temporary storage area, often used to improve data transfer.
- - The main circuit board containing the central components of a computer.
- - Device for converting sound into an electrical signal.
- - Autonomous or semi-autonomous mechanical device.
- - Computer or system that manages network resources.
22 Clues: free to solve the puzzle! • - Writing code to instruct a computer. • - Common storage device for digital data. • - Physical components of a computer system. • - Programs and data that operate a computer. • - Process of generating an image from a model. • - Pointing device commonly used with computers. • - Autonomous or semi-autonomous mechanical device. • ...
Raffy's CrossWord Puzzle 2023-05-15
Across
- drive stores data on computer
- Address internet protocol
- Uniform resource locator
- World Wide Web
- Operational Support System
- printed circuit board containing main contents of computer
- booting or restarting a computer system
- worldwide system of computer networks
- Larger unit of data a computer stores
- device keyboard
- engine safari
- Info stored in the software of a computer
- software designed to disrupt computer system
- device that forwards data between network devices
- Portable Document Format
- smallest unit of data a computer can store
- computer program that manages access to a centralized resource in a network
- device speaker
- regularly updated web page usually operated by a small group
Down
- HyperText Markup Language
- firefox
- Central Processing Unit
- Property Creation of the Mind
- Read Only Memory
- controls modulation/demodulation
- a block of data created by a web browser
- cable that connects computer networks in a wide area
- Domain Name System
- Phase Locked Loop
- process of converting info or data into a code
- unit of info equal to 1 million bytes
- language zeros and ones
- security system that manages incoming and outgoing network traffic
- Random Access Memory
34 Clues: firefox • engine safari • World Wide Web • device speaker • device keyboard • Read Only Memory • Phase Locked Loop • Domain Name System • Random Access Memory • Central Processing Unit • language zeros and ones • Uniform resource locator • Portable Document Format • HyperText Markup Language • Address internet protocol • Operational Support System • drive stores data on computer • ...
Technology 2023-09-30
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
CRAZY CROSSWORD DARE TO SOLVE!!! 2025-05-27
Across
- — A device that connects your home or business to the internet.
- — Unwanted and unsolicited messages sent through email or other platforms.
- — A Local Area Network connecting computers in a small area.
- — A secret code of characters used to protect an online account.
- — The right to keep personal information safe from others online.
- — Harassing or threatening people online through messages or posts.
- — A wireless technology for connecting devices to a network.
- — The rules of good behavior and manners while using the internet.
Down
- — A fraudulent attempt to get personal information through fake messages.
- — Moral principles that guide how people behave online.
- — A computer that provides services or data to other computers.
- — Malicious software such as viruses, worms, or spyware.
- — A Wide Area Network covering a large geographical area.
- — Legal protection given to the creator of original content.
- — Unauthorized access to computer systems or networks.
- — A device used to connect multiple devices within a LAN.
- — A set of rules that control how data is sent over a network.
- — A device or program that requests services from a server.
- — A device that forwards data packets between computer networks.
- Address — A unique number identifying a device on a network.
20 Clues: — Unauthorized access to computer systems or networks. • — Moral principles that guide how people behave online. • — Malicious software such as viruses, worms, or spyware. • — A Wide Area Network covering a large geographical area. • — A device used to connect multiple devices within a LAN. • — A device or program that requests services from a server. • ...
Cyber Ethics 2025-06-17
Across
- - a basic network device that broadcasts data to all parts.
- - a network topology where each device connects to exactly two others, forming a loop.
- - a common wired networking technology.
- - connect multiple devices & filters data to the intended recipient.
- - the physical logical arrangement of a network.
- - sending data to all devices.
- - device that modulates & demodulates digital signals for internet access.
- - devices that make up the element of a network.
Down
- - the act of giving others access to files, resources or information.
- - a combination of bus & star topology.
- - a type of network that is mainly created foreign individual person.
- - the practice of connecting computers & devices to share resources.
- - wireless networking technology.
- - topology with multiple parts between devices for fault tolerance.
- - physical medium used to transmit data in wired networks.
- - closeness of devices, affecting wireless signal quality.
- - a type of network limited to a small geographical area.
- - a network topology where each device is connected to a central computer using point-to-point connection.
- - small handheld device used to access & manage digital information.
- - forwards data between different networks, often used to connect to the internet.
20 Clues: - sending data to all devices. • - wireless networking technology. • - a combination of bus & star topology. • - a common wired networking technology. • - the physical logical arrangement of a network. • - devices that make up the element of a network. • - a type of network limited to a small geographical area. • ...
Computer Network & Security 2025-09-17
Across
- – Connection-oriented protocol that ensures reliable communication.
- – Protocol used to map IP addresses to MAC addresses.
- – Widely used point-to-point protocol for data link communication.
- – Reference model with seven layers for networking functions.
- - the rate at which data is successfully transmitted from one point to another in a network
- - Uniquely identifies a device (like a computer, phone, or server) on a network
- – Error detection technique using the sum of data units.
- – A collection of interconnected devices sharing resources.
- – Process of dividing a data stream into manageable units.
- – Scientist who gave a formula for maximum data rate in noiseless channels.
Down
- – Error detection method based on polynomial division.
- – The physical or logical arrangement of a network.
- – Line coding where each bit has a transition at the middle.
- – Transmission mode where data flows in one direction only.
- – Line coding scheme where voltages are positive or negative.
- – Variation in packet arrival time that affects performance.
- – Type of switched network where a dedicated path is reserved.
- - When two or more networks are connected
- – Basic unit of data in packet-switched networks.
- – Device that forwards frames based on MAC addresses.
20 Clues: - When two or more networks are connected • – Basic unit of data in packet-switched networks. • – The physical or logical arrangement of a network. • – Protocol used to map IP addresses to MAC addresses. • – Device that forwards frames based on MAC addresses. • – Error detection method based on polynomial division. • ...
SOCIAL NETWORKS 2013-05-19
7 Clues: Publish • Divide and receive • Relations between people • Give the latest information • Group related in a community • Personal description of someone • Website containing the writer's experience
Computer networks 2024-07-01
The Internet 2015-09-21
Across
- Within the same document you can be lead to another site/place
- Companies that provide access to the internet, for a fee
- where you can store URLs that you would like to visit frequently
- technology that allows over two devices to communicate without using cables or wires
- One of the most popular uses on the internet
- location on the world wide web(WWW)
- Network protocol to communicate across networks
Down
- what kind of computer is capable of fast processing
- What you call a sites address
- what's the gap between people who do and don't have internet access called
- where they store the collection of millions of hypertext documents
- networks of computers and storage that are linked by cables or by satellite
- name of the early version of internet (1960s)
13 Clues: What you call a sites address • location on the world wide web(WWW) • One of the most popular uses on the internet • name of the early version of internet (1960s) • Network protocol to communicate across networks • what kind of computer is capable of fast processing • Companies that provide access to the internet, for a fee • ...
Network Devices 2021-11-09
Across
- adapter that connects it to a computer or a local area network (LAN).
- a device that is both a transmitter and a receiver, and usually it's in a single device.
- security devices used to stop or mitigate unauthorized access to private networks connected to the Internet
- converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- device that creates a single, aggregate network from multiple communication networks or network segments.
- A computer that sits between different networks or applications
- enables users of wireless devices to access and interact with wireless information services and applications.
- connects devices in a network to each other
8 Clues: connects devices in a network to each other • A computer that sits between different networks or applications • adapter that connects it to a computer or a local area network (LAN). • a device that is both a transmitter and a receiver, and usually it's in a single device. • ...
Questions - Crossword 1 - Internet and its Services 2024-05-16
Across
- Live chat via webcam.
- Bulletin Board Service type.
- Electronic mail system.
- E-commerce activity.
- Marketing promotion.
Down
- Exchange of information.
- Modern business concept.
- Real-time conversation method.
- Connected to the internet.
- Network of networks.
- Remote login concept.
- Online discussion platform.
- Web exploration action.
- Internet service provider.
14 Clues: Network of networks. • E-commerce activity. • Marketing promotion. • Live chat via webcam. • Remote login concept. • Electronic mail system. • Web exploration action. • Exchange of information. • Modern business concept. • Connected to the internet. • Internet service provider. • Online discussion platform. • Bulletin Board Service type. • Real-time conversation method.
Network Basics - Terminology 2012-03-27
Across
- connect networks in larger geographic areas
- run over a variety of cable types at 10Mbps
- a central computer that provides resources to other computers and devices on a network
- standard connectors used for unshielded twisted-pair cable
- concentrator in a star topology network where node connections meet
- node that requests services from a server
- describes the way network systems are physically connected to each other by media devices
- provide security to a network and prevent access by unauthorized users
- a board that provides network communication capabilities to and from a computer
Down
- any device attached to a network
- nodes are connected to a common device such as a hub or concentrator
- resources and files are shared without a centralized management source
- connects networks and forwards data of a specific protocol type based on an address
- a cable to which multiple nodes are attached
- nodes are connected to a closed loop
- a network that is confined to a relatively small area
16 Clues: any device attached to a network • nodes are connected to a closed loop • node that requests services from a server • connect networks in larger geographic areas • run over a variety of cable types at 10Mbps • a cable to which multiple nodes are attached • a network that is confined to a relatively small area • standard connectors used for unshielded twisted-pair cable • ...
Claire's internet crossword puzzle 2015-09-22
Across
- groups of networks of computers and devices that are linked by satellites or cables
- version of the internet made in 1960's to link computers together for communication systems
- devices you can use to access the internet computer,tablet
- lets more data be sent from copper telephone lines
- common way of finding the location of a website,every website can be found by using it
- Ethernet or usb cable and a dsl or cable modem
- owned by either an individual,organization or company, located on the WWW
- companies that give users access to the internet for a cost
- converts data to analog signals for travel on the internet
- Lead to another place or site within the same document
- favourite websites that are used frequently
Down
- standard network protocol for communication between networks
- equipment and devices that need infrastructure
- allows 2 or more devices to communicate without cables
- a software that allows you to search for information
- structure that handles the busy traffic of a networked system
16 Clues: favourite websites that are used frequently • equipment and devices that need infrastructure • Ethernet or usb cable and a dsl or cable modem • lets more data be sent from copper telephone lines • a software that allows you to search for information • allows 2 or more devices to communicate without cables • Lead to another place or site within the same document • ...
wireless network 2022-03-01
Across
- The solution of a weak signal
- Wireless networks can work without.........
- A type of network that works at a close range within a reach of person
Down
- Wireless network is a computer network that uses wireless data links to connect .............
- an old name for WIFI
- Wireless networks can be just as ....... and powerful as wired networks
6 Clues: an old name for WIFI • The solution of a weak signal • Wireless networks can work without......... • A type of network that works at a close range within a reach of person • Wireless networks can be just as ....... and powerful as wired networks • Wireless network is a computer network that uses wireless data links to connect .............
Profed 4 2020-08-04
Across
- computer networking technology used in local area networks
- open-source Internet browser released by Google
- leading information retrieval service of the InterneT
- receives modulated signals and demodulates them
Down
- Ethernet was created in 1973 by a team at this corporation
- a system architecture that has revolutionized communications and methods of commerce
- one of the first general-purpose computer networks
- Berners-Lee British scientist
8 Clues: Berners-Lee British scientist • open-source Internet browser released by Google • receives modulated signals and demodulates them • one of the first general-purpose computer networks • leading information retrieval service of the InterneT • Ethernet was created in 1973 by a team at this corporation • computer networking technology used in local area networks • ...
Network and Cable 2022-02-03
Across
- It is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 500 meters.
- It is a type of fiber optic cable that has a very thin core.
- It is a cable that has two or four pairs of wires.
- It is a glass or plastic conductor that transmits information using light.
- It is the cabling used in local area networks to connect a PC to a network hub and router.
- It is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 185 meters.
Down
- It is a type of fiber optic cable that has a thicker core than a single-mode cable.
- It is a pair of wires that is wrapped in metallic foil to better shield the wires from noise.
- It is a copper-cored cable surrounded by heavy shielding.
- It is a type of cabling that is used to connect two network devices directly, without the need for a router in the middle.
10 Clues: It is a cable that has two or four pairs of wires. • It is a copper-cored cable surrounded by heavy shielding. • It is a type of fiber optic cable that has a very thin core. • It is a glass or plastic conductor that transmits information using light. • It is a type of fiber optic cable that has a thicker core than a single-mode cable. • ...
Technology 2018-10-07
Across
- You can download them from Google Play and other platforms.
- Instrument, tool that is related to technology
- Internet, applications, social networks are part of it.
- The action of develop.
Down
- Small devices that you use to call, send messages, take pictures and use social networks
- Instagram, Facebook, Twitter, Myspace, Snapchat, etc.
- Making machines behave like humans.
- that you use for saving information, play and use social media.
- Small and flat computer that works when you touch its screen.
9 Clues: The action of develop. • Making machines behave like humans. • Instrument, tool that is related to technology • Instagram, Facebook, Twitter, Myspace, Snapchat, etc. • Internet, applications, social networks are part of it. • You can download them from Google Play and other platforms. • Small and flat computer that works when you touch its screen. • ...
Keywords for ICT yr7 by RLG HotshoT 2012-03-20
Across
- A series of questions asked to lots of people.(6)
- Virtual ________ environment.(8)
- Modular Object Oriented Dynamic Learning Environment.(6)
- A personal storage device on your computer.(10)
- Acceptable use policy.(3)
- How well you can trust a website.(8)
- Allows you to store and retrieve information quickly.(8)
- A set of social conventions that facilitate interactions over networks.(10)
- A small part of something.(6)
Down
- An online service that focuses on building and reflecting the social networks among people.(3)
- _______ resource locator.(7)
- A piece of server software that allows users to freely create and edit web page content using any web browser.(4)
- Series of questions.(13)
- bullying The use of internet and related technologiesto harm other people in a delliberate way. (14)
- To search or look at something on the internet.(6)
- An internet site where people can hold a conversation via posted messages.(5)
- To search appropriate information to find the right answer.(8)
- To tell people information about themselves by posting information or pictures on a website.(4)
- Footprint A trail left by an entity's interactions in a digital environment.(17)
- Search ______.(6)
20 Clues: Search ______.(6) • Series of questions.(13) • Acceptable use policy.(3) • _______ resource locator.(7) • A small part of something.(6) • Virtual ________ environment.(8) • How well you can trust a website.(8) • A personal storage device on your computer.(10) • A series of questions asked to lots of people.(6) • To search or look at something on the internet.(6) • ...
Computer History, Software, Hardware 2020-09-30
Across
- type of memory that doesn't need power on to remember data
- Carries out instructions in a program
- Networks that connect with computers over a very large area
- The man in computer history who used machines to help with the Census in the US
- Microsoft Word, Chrome, and Pandora are examples of Software ____________
- A type of Hardware used to generate sound from a computer
- The woman in computer history considered as the first programmer
- A video game is a type of this
- How your computer tells you things
- A type of hardware used to type words
- a type of hardware that creates physical copies of images or writing from computers
Down
- The center of Network
- how computers communicate with other computers
- A motherboard is a type of this
- A person in computer history who is referred to as the father of computers
- The first device that could solve problems of all four operations
- Networks that connect with computers over a small range
- How you tell your computer things
- A hand-operated calculator; it started the development of computers
- The first 'computers'
- Temporary Storage
21 Clues: Temporary Storage • The center of Network • The first 'computers' • A video game is a type of this • A motherboard is a type of this • How you tell your computer things • How your computer tells you things • Carries out instructions in a program • A type of hardware used to type words • how computers communicate with other computers • ...
Computers Crossword Words and Clues 2025-01-12
Across
- Firmware that initializes hardware at startup.
- A component for rendering graphics.
- A universal interface for connecting devices.
- A small, fast memory for frequently used data.
- A global network of computers.
- The process of securing data by converting it into code.
- A type of volatile memory for temporary data storage.
- A malicious program that disrupts computer operation.
- A faster alternative to hard drives for storage.
- The smallest unit of a digital image.
- A device forwarding data between networks.
- The main circuit board of a computer.
- A group of connected computers for sharing resources.
Down
- The clarity or sharpness of a digital image or display.
- A security system to protect networks from unauthorized access.
- Software managing hardware and software resources.
- A display device for viewing output.
- An input device with keys for typing.
- The smallest unit of data in a computer.
- A storage device for digital data.
- A unit of digital data, 8 bits.
- The brain of the computer.
- A type of non-volatile memory storing firmware.
- Remote servers storing data and applications.
- A pointing device for computer navigation.
25 Clues: The brain of the computer. • A global network of computers. • A unit of digital data, 8 bits. • A storage device for digital data. • A component for rendering graphics. • A display device for viewing output. • An input device with keys for typing. • The smallest unit of a digital image. • The main circuit board of a computer. • The smallest unit of data in a computer. • ...
Chapter 13 CIS 25 2024-11-12
Across
- Network segment for public-facing services
- Automatically running programs from media
- Grouping objects within Active Directory
- Access rights granted to users
- Reusing captured data to gain access
- Enticing victims to reveal sensitive information
- Observing someone’s private information
- Vulnerability exploited before being patched
- Corrupting DNS data to redirect traffic
- Self-replicating malware spreading across networks
- Unauthorized entry by following authorized person
- Unsolicited, often irrelevant, bulk messages
- Pretending to be someone else
- Retrieving sensitive information from trash
- Malware encrypting files, demanding ransom payment
- Full disk encryption for Windows systems
- Overloading a system to deny service
Down
- Directory service for Windows domain networks
- Guidelines for protecting information assets
- Faking identity to gain unauthorized access
- Double-door system for controlled access
- Rules for creating and managing passwords
- Malicious software disguised as legitimate
- Manipulating people to divulge information
- Gathering information about a target system
- Targeted phishing aimed at specific individuals
- Database of known malware signatures
- Overwhelming server with connection requests
- Hardware-based security for cryptographic operations
- Erasing data from magnetic storage
- Software providing unauthorized access to systems
31 Clues: Pretending to be someone else • Access rights granted to users • Erasing data from magnetic storage • Reusing captured data to gain access • Database of known malware signatures • Overloading a system to deny service • Observing someone’s private information • Corrupting DNS data to redirect traffic • Double-door system for controlled access • ...
Los Jovenes de Hoy:ASD1-2 2021-08-17
10 Clues: proud • energetic • passionate • open/sincere • melancolic/sad • social networks • capable/qualified • to have a good time • difficult/demanding • to surf the internet
CHAPTER 6 TERMS 2020-08-12
Across
- used to rate the trustworthiness of routing information received on one router from its neighboring router
- an external routing protocol that uses a sophisticated algorithm to determine the best route
- means it sends the subnet mask information with the route updates (prefix routing)
- a collection of networks under a common administrative domain
- used to communicate between multiple autonomous systems (AS)
- a way to configure more than one physical router to appear as if they were only a single logical one.
- a router receiving an update from a neighbor router believes the information about remote networks without verifying for itself if the news is actually correct
- all devices in the network must use the same subnet mask for each specific address class.
Down
- the time required by protocols to update their forwarding tables after changes have occurred
- a path considered a backup route
- each router keeps state information about adjacent neighbors
- best route to a remote network
- two types of routing protocols used in internetworks
- involves encapsulating one type of protocol in another type of protocol
- One router is elected to handle all request sent to the virtual IP address
- a unique IP address on the same subnet as the hosts defined in the configuration
- uses only the hop count to determine the best way to a remote network
- finds the best path to a remote network by judging distance. Each router running RIP sends its complete routing tables out to all active interfaces at periodic time intervals.
- a network that has two or more subnetworks of a classful network connected together by different classful networks.
- the routing tables include information about all the networks in the internetwork.
- useful for carrying IPv6 data over a network that is still IPv4
- contains all destinations advertised by neighboring routers
- a Cisco proprietary protocol that can be run on most, but not all, of Cisco’s router and multilayer switch models
- exchanged by routers to determine which other routers are available to exchange routing data with
- general-purpose encapsulation that allows for transporting packets from one network through another network through a VPN
- allows you to used variable length subnet mask
- translating one routing protocol into another
- uses aspects of both distance vector and link state.
- (shortest path first protocol) sends updates containing the state of their own links to all other routers on the network.
- the amount of bandwidth on the lines will be used to find the best path to the remote network
30 Clues: best route to a remote network • a path considered a backup route • translating one routing protocol into another • allows you to used variable length subnet mask • two types of routing protocols used in internetworks • uses aspects of both distance vector and link state. • contains all destinations advertised by neighboring routers • ...
Network Security 2023-05-10
Across
- Exposes confidential, sensitive, or protected information to an unauthorized person.
- The process of reviewing, analyzing and managing network traffic for any abnormality or process that can affect the network.
- Addresses that are associated with specific devices and assigned to them by the manufacturer.
- The process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.
- A network security technology commonly used on Wi-Fi wireless networks that is part of a technology which was designed as a replacement for the older and less secure WEP.
Down
- The process or action of proving or showing something to be true, genuine, or valid:
- Is the overall accuracy, completeness, and consistency of data.
- A security mechanism that identifies people by verifying their physical or behavioral characteristics.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious data loss or damage.
10 Clues: Is the overall accuracy, completeness, and consistency of data. • The process or action of proving or showing something to be true, genuine, or valid: • Exposes confidential, sensitive, or protected information to an unauthorized person. • Addresses that are associated with specific devices and assigned to them by the manufacturer. • ...
CHAPTER 6 TERMS 2020-08-12
Across
- used to rate the trustworthiness of routing information received on one router from its neighboring router
- an external routing protocol that uses a sophisticated algorithm to determine the best route
- means it sends the subnet mask information with the route updates (prefix routing)
- a collection of networks under a common administrative domain
- used to communicate between multiple autonomous systems (AS)
- a way to configure more than one physical router to appear as if they were only a single logical one.
- a router receiving an update from a neighbor router believes the information about remote networks without verifying for itself if the news is actually correct
- all devices in the network must use the same subnet mask for each specific address class.
Down
- the time required by protocols to update their forwarding tables after changes have occurred
- a path considered a backup route
- each router keeps state information about adjacent neighbors
- best route to a remote network
- two types of routing protocols used in internetworks
- involves encapsulating one type of protocol in another type of protocol
- One router is elected to handle all request sent to the virtual IP address
- a unique IP address on the same subnet as the hosts defined in the configuration
- uses only the hop count to determine the best way to a remote network
- finds the best path to a remote network by judging distance. Each router running RIP sends its complete routing tables out to all active interfaces at periodic time intervals.
- a network that has two or more subnetworks of a classful network connected together by different classful networks.
- the routing tables include information about all the networks in the internetwork.
- useful for carrying IPv6 data over a network that is still IPv4
- contains all destinations advertised by neighboring routers
- a Cisco proprietary protocol that can be run on most, but not all, of Cisco’s routers and multilayer switch models
- exchanged by routers to determine which other routers are available to exchange routing data with
- general-purpose encapsulation that allows for transporting packets from one network through another network through a VPN
- allows you to used variable length subnet mask
- translating one routing protocol into another
- uses aspects of both distance vector and link state.
- (shortest path first protocol) sends updates containing the state of their own links to all other routers on the network.
- the amount of bandwidth on the lines will be used to find the best path to the remote network
30 Clues: best route to a remote network • a path considered a backup route • translating one routing protocol into another • allows you to used variable length subnet mask • two types of routing protocols used in internetworks • uses aspects of both distance vector and link state. • contains all destinations advertised by neighboring routers • ...
Do You Know Your Computer Terms 2012-03-25
Across
- A LAN in which all nodes are connected to a central computer.
- Collection of wires through which data is transmitted from one part of a computer to another; It’s like a highway on which data travels within a computer.
- A site that offers Internet access over a wireless local area network though the use of a router connected to a link to an Internet service provider.
- Another term for bus, the main wire that connects nodes; often used to describe the main network connections composing the Internet.
- Abbreviation for local area network; covers a small local area, such as a home or office.
- Permit or deny network transmissions based upon a set of rules and is used to protect networks from unauthorized access while permitting legitimate communications to pass.
- Allow an electronic device to exchange data wirelessly over a computer network.
- The most widely installed local area network (LAN) technology.
- Series of web sites linked together.
- In networks, a device that filters and forwards packets between LAN segments.
- Computer or computer program that manages access to a centralized resource or service in a network.
- Abbreviation for wide area network; is not restricted to a geographical location.
- Relationship between two or more small or medium sized ISPs.
- Abbreviation for network interface card; describes a way to increase available bandwidth.
Down
- Low-volume amplification system that improves clarity of speech and sound throughout the classroom.
- Used in a wired network to connect Ethernet cables from a number of devices together.
- Data transfer rate; amount of data that can be carried from one point to another in a given time period.
- Can be a computer or some other device, such as a printer; Every one of these have a unique network address sometimes called a data link control address or media access control address.
- Abbreviation for metropolitan area network; A larger network that usually spans several buildings in the same city or town.
- Refers to a layout of a network and how different nodes in a network are connected to each other and how they communicate.
- Point where two or more lines meet.
- An application that runs on a personal computer or workstation and relies on a server to perform some operations for example email.
- Device that forwards data packets between computers networks.
- An eight-wire connector used commonly to connect computers onto a local area networks especially Ethernets.
- The distance and/or how far an Internet connection can travel; In a spreadsheet application it could be an entire row or column, or multiple rows or columns.
- Abbreviation for personal area network; computer network used for communication among computerized devices, including telephones and personal digital assistants.
26 Clues: Point where two or more lines meet. • Series of web sites linked together. • Relationship between two or more small or medium sized ISPs. • Device that forwards data packets between computers networks. • A LAN in which all nodes are connected to a central computer. • The most widely installed local area network (LAN) technology. • ...
Chapter 7 - Networking: Connecting Computing Devices 2021-10-16
Across
- creates a channel for the transmission of data between two nodes.
- actual speed of data transfer
- WIFI5 is more resistant to __ than previous versions of WI-FI
- Key used by computers on your network to decrypt data transmissions.
- benefit of a network.
- requests resources from the server.
- A unique serial unique assigned to each router.
- Referred to as high-speed internet.
- networks are classified by __
- is a specialized device designed to store and manage all network data.
- is a large network designed to provide access to a specific
- used for communication among devices close to one person.
- illegal behavior initiated by a hacker
- et you tether, or connect, more than one device to the Internet but require access to a data plan.
- Ability of current devices to use earlier standards in addition to the current standard
- Network operating system that supports P2P networks.
- Allows nodes to communicate and connect to the network
- provides slower throughput when compared to a wired connection.
- a single copper wire surrounded by layers of plastic.
- standard for wired ethernet cable
- area, such as an entire city.
- Device used on a home network to share and store files.
- disadvantage of a network.
- can use to amplify or to extend the wireless signal to parts of your home that are experiencing poor connectivity
- is made up of plastic or glass fibers that transmit data at extremely fast speeds.
- Homeowner purchases internet service from Flow
Down
- transfer packets between networks.
- another name for network design
- is an access point that intruders used to get into your network.
- Your router has read-only memory that has software written to it.
- cables transmit data over this transmission media
- Communicate directly with each node.
- Two or more computers that are connected via software and hardware so they can communicate with each other.
- Ethernet protocol was developed by ___
- tasks performed from one computer can affect the other computers on the network.
- Connects your network to the internet
- maximum speed data can be transmitted between two nodes.
- Configuring and maintaining a network.
- is a method used to protect your packet during transmission between nodes.
- direct the packet to its destination on the network.
- devices connected to a network.
- transmission medium used in a home network
- is placed in the location where the original Wi-Fi signal becomes weaker.
- Wireless networks used this transmission media to set up their network
- handles requests for information, Internet access, and the use of peripherals for the rest of the network nodes.
- helps hardware or software used to protect your computers from intruders.
- Used to identify each wireless network
- transmits data using light signals.
- is connecting to a wireless network without the permission of the owner.
- provides information and resources upon request
50 Clues: benefit of a network. • disadvantage of a network. • actual speed of data transfer • networks are classified by __ • area, such as an entire city. • another name for network design • devices connected to a network. • standard for wired ethernet cable • transfer packets between networks. • requests resources from the server. • Referred to as high-speed internet. • ...
Innova Inside Puzzle 2025-03-24
Across
- Relating to online tech
- The company name
- Job paths
- To change
- Worldwide
- Item made for sale
- Group of workers
- Applied science
- Answers to problems
- Last name of the CEO
- Internet storage
Down
- Facts and figures
- Clear understanding
- Commercial activity
- Skilled workers
- Short for Generative Artificial Intelligence
- Employed people
- City of headquarters
- Connected systems
- Number of business sectors served
- Asia-Pacific region
- Help provided
22 Clues: Job paths • To change • Worldwide • Help provided • Skilled workers • Employed people • Applied science • The company name • Group of workers • Internet storage • Facts and figures • Connected systems • Item made for sale • Clear understanding • Commercial activity • Asia-Pacific region • Answers to problems • City of headquarters • Last name of the CEO • Relating to online tech • ...
5.01 Vocab 2023-11-17
Across
- programs that tell your computer what to do
- Computer-aided design
- special computer software designed to mimic the knowledge of a human expert.
- This type of technology connects people quickly, either by voice or by voice and picture combined
- the practical application of science to society and industry.
- refers to communications that take place online rather than over traditional public networks
Down
- a mobile phone that performs many of the functions of a computer
- inventions related to or associated with computers and devices with a central processing unit
- global positioning systems
- technology affects your life—satellite radio, satellite television, GPS
- working from home or a remote location
- an organized collection of structured information, or data, typically stored electronically in a computer system
- computer-aided manufacturing
- physical components of a computer
- consists of two or more computers that are linked in order to share resources, exchange files, or allow electronic communications
- personal identification number
16 Clues: Computer-aided design • global positioning systems • computer-aided manufacturing • personal identification number • physical components of a computer • working from home or a remote location • programs that tell your computer what to do • the practical application of science to society and industry. • a mobile phone that performs many of the functions of a computer • ...
SOCIAL MEDIA 2024-02-19
Across
- Name and surname of the new owner of Twitter (X)
- A small, attractive application on a website such as a hit counter.
- A self-portrait taken using the reverse camera screen on a smartphone.
- Platform founded by Mark Zuckerberg.
- A message sent on Twitter.
- A one-to-one communication on the internet.
- #
- A photo sharing application which is very popular among teens.
Down
- A site updated frequently by an individual or group to record opinions or information.
- . Anything shared across social networks that get passed along rapidly e.g. YouTube
- Share again on social media.
- Simple web pages that can be edited by other users. e.g.........pedia
- An image made up of symbols, used in text messages, to express an emotion.
- Here you are allowed to share a 140-character update.
- It is an image that represents a person online most often within forums and social networks.
- A platform whereusers create lipsync videos to share with their followers
16 Clues: # • A message sent on Twitter. • Share again on social media. • Platform founded by Mark Zuckerberg. • A one-to-one communication on the internet. • Name and surname of the new owner of Twitter (X) • Here you are allowed to share a 140-character update. • A photo sharing application which is very popular among teens. • ...
Social Media 2020-01-23
Across
- It is an image or username that represents a person online most often within forums and social networks.
- A message sent on Twitter.
- A network for online picture sharing.
- A pictorial representation of a facial expression which is used in writing.
- A self-portrait taken using the reverse camera screen on a smartphone.
- A site updated frequently by an individual or group to record opinions or information.
- A photo sharing application gained more than 300 million users.
- Here you are allowed to share a 140-character update.
Down
- A one-to-one communication on the internet.
- They are also known as message boards.
- A video-sharing social networking service, that is used to create short lip-sync, comedy, and talent videos.
- Anything shared across social networks that get passed along rapidly e.g. YouTube.
- A system that manages content.
- A small, attractive application on a website such as a hit counter.
- #
- Simple web pages that can be edited by other users.
16 Clues: # • A message sent on Twitter. • A system that manages content. • A network for online picture sharing. • They are also known as message boards. • A one-to-one communication on the internet. • Simple web pages that can be edited by other users. • Here you are allowed to share a 140-character update. • A photo sharing application gained more than 300 million users. • ...
CHAPTER 6 TERMS 2020-08-12
Across
- used to rate the trustworthiness of routing information received on one router from its neighboring router
- an external routing protocol that uses a sophisticated algorithm to determine the best route
- means it sends the subnet mask information with the route updates (prefix routing)
- a collection of networks under a common administrative domain
- used to communicate between multiple autonomous systems (AS)
- a way to configure more than one physical router to appear as if they were only a single logical one.
- a router receiving an update from a neighbor router believes the information about remote networks without verifying for itself if the news is actually correct
- all devices in the network must use the same subnet mask for each specific address class.
Down
- the time required by protocols to update their forwarding tables after changes have occurred
- a path considered a backup route
- each router keeps state information about adjacent neighbors
- best route to a remote network
- two types of routing protocols used in internetworks
- involves encapsulating one type of protocol in another type of protocol
- One router is elected to handle all request sent to the virtual IP address
- a unique IP address on the same subnet as the hosts defined in the configuration
- uses only the hop count to determine the best way to a remote network
- finds the best path to a remote network by judging distance. Each router running RIP sends its complete routing tables out to all active interfaces at periodic time intervals.
- a network that has two or more subnetworks of a classful network connected together by different classful networks.
- the routing tables include information about all the networks in the internetwork.
- useful for carrying IPv6 data over a network that is still IPv4
- contains all destinations advertised by neighboring routers
- a Cisco proprietary protocol that can be run on most, but not all, of Cisco’s routers and multilayer switch models
- exchanged by routers to determine which other routers are available to exchange routing data with
- general-purpose encapsulation that allows for transporting packets from one network through another network through a VPN
- allows you to use variable length subnet mask
- translating one routing protocol into another
- uses aspects of both distance vector and link state.
- (shortest path first protocol) sends updates containing the state of their own links to all other routers on the network.
- the amount of bandwidth on the lines will be used to find the best path to the remote network
30 Clues: best route to a remote network • a path considered a backup route • allows you to use variable length subnet mask • translating one routing protocol into another • two types of routing protocols used in internetworks • uses aspects of both distance vector and link state. • contains all destinations advertised by neighboring routers • ...
Phase 3: Rival Networks 2013-11-29
Across
- the abbreviation for the Hudson's Bay company
- the land offered by Britain to use for trade was called _______
- phase 3 is called________
- after the Haudenosaunee defeated the Ouendat, New France needed an new way to get furs to the first Nations by the _______ and farther west
- this business originated from the Hudson't Bay Company
- the Cree and Nakoda were ______ for the British and the French
- when French married First Nations, and had children, the children were called this
Down
- Britain recruited men from ________'s Orkney Islands
- voyagers were very important to the ________
- metis were also called ________ metis
- these people were hired to travel by canoe and transport furs to trading posts
- this country started the Hudson's Bay Company in 1670
- the _______ and the Canadien Coureurs de Bois were middlemen between the French and the First Nations in the west
- ______________ also come from this phase (to do with the HBC)
- the HBC competed with the_______ in the fur trade
15 Clues: phase 3 is called________ • metis were also called ________ metis • voyagers were very important to the ________ • the abbreviation for the Hudson's Bay company • the HBC competed with the_______ in the fur trade • Britain recruited men from ________'s Orkney Islands • this country started the Hudson's Bay Company in 1670 • ...
Phase 3: Rival Networks 2013-11-29
Across
- the abbreviation for the Hudson's Bay company
- the Cree and Nakoda were ______ for the British and the French
- the _______ and the Canadien Coureurs de Bois were middlemen between the French and the First Nations in the west
- metis were also called ________ metis
- this business originated from the Hudson't Bay Company
- ______________ also come from this phase (to do with the HBC)
Down
- Britain recruited men from ________'s Orkney Islands
- phase 3 is called________
- when French married First Nations, and had children, the children were called this
- these people were hired to travel by canoe and transport furs to trading posts
- the HBC competed with the_______ in the fur trade
- voyagers were very important to the ________
- after the Haudenosaunee defeated the Ouendat, New France needed an new way to get furs to the first Nations by the _______ and farther west
- the land offered by Britain to use for trade was called _______
- this country started the Hudson's Bay Company in 1670
15 Clues: phase 3 is called________ • metis were also called ________ metis • voyagers were very important to the ________ • the abbreviation for the Hudson's Bay company • the HBC competed with the_______ in the fur trade • Britain recruited men from ________'s Orkney Islands • this country started the Hudson's Bay Company in 1670 • ...
Optical Communication and Networks 2024-08-04
Across
- which detects the signal information from optical signal
- Angle between incoming light and surface normal
- sin^-1(n2/n1)
- The radio waves and light are
- Fiber with a parabolic refractive index profile
- Undergo total internal reflection
- The small section of fiber which is coupled to the optical source
- Which exhibit the variation in the light acceptability ability ?
Down
- mixture of TE and TM modes
- act as light source at the inaccessible places
- The ratio of speed of light in air to the speed of light in another medium
- Light wave used to transmit data in fiber optics
- Merges two fiber optic ends to form a unified light path.
- prevent light loss.
- rays that pass through the axis of the optical fiber.
15 Clues: sin^-1(n2/n1) • prevent light loss. • mixture of TE and TM modes • The radio waves and light are • Undergo total internal reflection • act as light source at the inaccessible places • Angle between incoming light and surface normal • Fiber with a parabolic refractive index profile • Light wave used to transmit data in fiber optics • ...
R1 Crossword 2021-10-04
Across
- - an angular measurement equal to 1/3600 of a degree or 1/60 of an arcminute
- - matter in particulate form.
- - the action or process of calibrating an instrument or experimental readings.
Down
- - the breeding of specimens of a plant or animal by natural processes from the parent stock.
- - the place at which independent and often unrelated systems meet and act on or communicate with each other the man-machine interface.
- - a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN)
- - the SI unit of luminous intensity. One candela is the luminous intensity, in a given direction, of a source that emits monochromatic radiation of frequency 540 × 1012 Hz and that has a radiant intensity in that direction of 1/683 watt per steradian.
- - the point in the sky or celestial sphere directly above an observer.
- - Night sky brightness
- - the action or process of flowing or flowing out.
10 Clues: - Night sky brightness • - matter in particulate form. • - the action or process of flowing or flowing out. • - the point in the sky or celestial sphere directly above an observer. • - an angular measurement equal to 1/3600 of a degree or 1/60 of an arcminute • - the action or process of calibrating an instrument or experimental readings. • ...
POB cross word Puzzle 2021-04-06
Unit 1 Vocabulary 2023-10-17
12 Clues: s... up • get m... • e... trip • h... party • get on w... • l... present • place of b... • c... postcards • use s... networks • f... a driving test • go to your school p... • congratulations on g... your license
Engineering Crosswords 2022-09-02
Across
- work to understand petrolem
- electric systems
- complex networks
- Develop organisms
- design safety systems
- roads and stuff
- invent
- flight and space
Down
- chemicals
- innovative designs and projects
- fac tor y work
- deals with physical and life sciences
- develop cages for endangered species
- materials around pipes and in walls
- develop and test software
- design lighting effects
- radiation and energy
- fix problems
- make sure planes work
19 Clues: invent • chemicals • fix problems • fac tor y work • roads and stuff • electric systems • complex networks • flight and space • Develop organisms • radiation and energy • design safety systems • make sure planes work • design lighting effects • develop and test software • work to understand petrolem • innovative designs and projects • materials around pipes and in walls • ...
Do You Know Your Computer Terms? 2012-03-25
Across
- Used in a wired network to connect Ethernet cables from a number of devices together.
- Computer or computer program that manages access to a centralized resource or service in a network.
- In networks, a device that filters and forwards packets between LAN segments.
- Abbreviation for metropolitan area network; A larger network that usually spans several buildings in the same city or town.
- The most widely installed local area network (LAN) technology.
- Abbreviation for personal area network; computer network used for communication among computerized devices, including telephones and personal digital assistants.
- Data transfer rate; amount of data that can be carried from one point to another in a given time period.
- Point where two or more lines meet.
- Another term for bus, the main wire that connects nodes; often used to describe the main network connections composing the Internet.
- Abbreviation for local area network; covers a small local area, such as a home or office.
- The distance and/or how far an Internet connection can travel; In a spreadsheet application it could be an entire row or column, or multiple rows or columns.
Down
- A LAN in which all nodes are connected to a central computer.
- Collection of wires through which data is transmitted from one part of a computer to another; It’s like a highway on which data travels within a computer.
- Low-volume amplification system that improves clarity of speech and sound throughout the classroom.
- Allow an electronic device to exchange data wirelessly over a computer network.
- Device that forwards data packets between computers networks.
- Permit or deny network transmissions based upon a set of rules and is used to protect networks from unauthorized access while permitting legitimate communications to pass.
- Abbreviation for wide area network; is not restricted to a geographical location.
- A site that offers Internet access over a wireless local area network though the use of a router connected to a link to an Internet service provider.
- Abbreviation for network interface card; describes a way to increase available bandwidth.
- Refers to a layout of a network and how different nodes in a network are connected to each other and how they communicate.
- Relationship between two or more small or medium sized ISPs.
- Series of web sites linked together.
- An application that runs on a personal computer or workstation and relies on a server to perform some operations for example email.
- An eight-wire connector used commonly to connect computers onto a local area networks especially Ethernets.
- Can be a computer or some other device, such as a printer; Every one of these have a unique network address sometimes called a data link control address or media access control address.
26 Clues: Point where two or more lines meet. • Series of web sites linked together. • Relationship between two or more small or medium sized ISPs. • Device that forwards data packets between computers networks. • A LAN in which all nodes are connected to a central computer. • The most widely installed local area network (LAN) technology. • ...
Let's Revise Cyber Security Fundamentals !! 2021-08-16
Across
- deliberate attempt to compromise security using malicious activity
- state of maintaining secrecy of communication
- Naming system followed to identify computers connected to Internet
- criminal activity performed using computer or a network
- way of confirmation of individual's identity
- illegal piece of software designed to cause harm to computers/networks
Down
- ready to access for authorized people
- unskilled individual who uses programs written by others to initiate attacks
- Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
- use of Computers and Networks to gain illegal access for confidential information for some gain
- computer program designed to protect computer
- malicious software that prevents the users from accessing their own data for want of money
12 Clues: ready to access for authorized people • way of confirmation of individual's identity • state of maintaining secrecy of communication • computer program designed to protect computer • criminal activity performed using computer or a network • deliberate attempt to compromise security using malicious activity • ...
Let's Revise Cyber Security Fundamentals !! 2021-08-16
Across
- deliberate attempt to compromise security using malicious activity
- state of maintaining secrecy of communication
- Naming system followed to identify computers connected to Internet
- criminal activity performed using computer or a network
- way of confirmation of individual's identity
- illegal piece of software designed to cause harm to computers/networks
Down
- ready to access for authorized people
- unskilled individual who uses programs written by others to initiate attacks
- Use of Internet to threaten Individual, Group, Organization and Country or violent activity to cause harm for some gain
- use of Computers and Networks to gain illegal access for confidential information for some gain
- computer program designed to protect computer
- malicious software that prevents the users from accessing their own data for want of money
12 Clues: ready to access for authorized people • way of confirmation of individual's identity • state of maintaining secrecy of communication • computer program designed to protect computer • criminal activity performed using computer or a network • deliberate attempt to compromise security using malicious activity • ...
Computer Networks-Pedagogy 1 2025-07-25
Across
- A simple electrical circuit model for physical layer.
- Controls frame flow and retransmissions
- The physical path between sender and receiver.
- Converts analog signals back into digital form.
- Layer responsible for electrical and mechanical interface.
- Breaks data into segments and ensures reliable delivery.
- Adds source and destination IP addresses
- The rate at which bits are transmitted.
- Used to establish, maintain and terminate network connections.
Down
- A way to uniquely identify devices in a LAN.
- Technique that allows multiple signals to travel simultaneously on the same channel.
- A method used to avoid collisions in wireless networks.
- Multiplexing method that assigns separate frequencies.
- Type of network topology where each device connects to a central hub.
- Noise and signal loss over a medium is called.
15 Clues: Controls frame flow and retransmissions • The rate at which bits are transmitted. • Adds source and destination IP addresses • A way to uniquely identify devices in a LAN. • The physical path between sender and receiver. • Noise and signal loss over a medium is called. • Converts analog signals back into digital form. • ...
Find Me 2025-03-18
Exercise 1 2023-04-10
Across
- in Presentation layer
- layer is responsible for the delivery of individual packets from source to destination
- of transmission in digital signal
- of switching that use dedicated communications for the duration of the conversation
- of elements in Protocol
- impairment courses as signal travels through the medium, its strength decreases distance increases
- Area Network (LAN)contains 3 basic hardware components
- of the phases in circuit switching
- communication model it converts data into transmitted signals
Down
- networks set up using the same technology as the Internet but only open to users inside the organization
- device responsible for moving information between networks, are also a common network component
- sine wave can be represented by three parameter namely, peak amplitude, _______, and phase
- of data representation
- of addresses are used in an internet employing the TCP/IP protocols that relation to Network Layer
- of the components in data communication
15 Clues: in Presentation layer • of data representation • of elements in Protocol • of transmission in digital signal • of the phases in circuit switching • of the components in data communication • Area Network (LAN)contains 3 basic hardware components • communication model it converts data into transmitted signals • ...
testing 2024-09-25
Across
- (packets ...) Dropping data packets to emulate unreliable networks.
- Assessing performance over cellular data networks.
- Splitting network segments to test isolated communication.
Down
- Limiting data transfer speed to test performance.
- (... testing) Testing application recovery after network failures.
- (SSL ... testing) Simulating secure connection setup processes.
- Delays in network communication.
7 Clues: Delays in network communication. • Limiting data transfer speed to test performance. • Assessing performance over cellular data networks. • Splitting network segments to test isolated communication. • (SSL ... testing) Simulating secure connection setup processes. • (... testing) Testing application recovery after network failures. • ...
El Vocabulario de Espanol 2019-02-21
Across
- show el programa de concursos
- la acuacion
- movie la pelicula de horror
- opera la telenova
- el canal
- el extraterrestre
- networks las redes sociales
- la victima
- la ladron
- las noticas
Down
- star la estrella del cine
- el peligro
- show el programa de dibujos animados
- Awards los premios de la Academia
- entrevistar
- el sitio web
- show el programa policiaco
- el publico
- show el programa deportiva
- la guerra
20 Clues: el canal • la guerra • la ladron • el peligro • el publico • la victima • la acuacion • entrevistar • las noticas • el sitio web • el extraterrestre • opera la telenova • star la estrella del cine • show el programa policiaco • show el programa deportiva • movie la pelicula de horror • networks las redes sociales • show el programa de concursos • Awards los premios de la Academia • ...
C6 Tecnomundo 2022-01-25
26 Clues: @ • to tag • to dial • to like • to post • to ring • to love • to call • to swipe • the post • to share • the user • to reply • the email • dot (.com) • to hang up • the profile • the comment • the cellphone • the followers • the video call • the phone call • to send a text • the phone number • to leave a message • the Social Networks
RISTSÕNA INGLISE KEEL XD 2024-11-21
Across
- ühendatud
- magistraalvõrk
- suhteliselt odav
- seadmed
- kuju
- võrgusilm/sõlm
- tegeleb millegagi
- kasutamatu
- pakk/pakett
- mesh topology täis silmvõrk
- katki tegema
- eesmärk
- puudused
- sõnum
- kogu
Down
- topoloogia(viis kuidas ühendatakse arvuti võrku)
- networks magistraalvõrk
- täitma eostama elluviima/ täitma teostama elluviima.
- ühendused
- interconnections liiased/liigsed/ülearused omavahelised ühendused
- kohtvõrk
- eelised
- kesk kaabel
- sisaldab
- ebaõnnestuma/nurjuma/läbikukkuma
- mesh technolog osaline silmvõrk
- NÕUAB
- traffic võrguliiklus
28 Clues: kuju • kogu • NÕUAB • sõnum • seadmed • eelised • eesmärk • kohtvõrk • sisaldab • puudused • ühendatud • ühendused • kasutamatu • kesk kaabel • pakk/pakett • katki tegema • magistraalvõrk • võrgusilm/sõlm • suhteliselt odav • tegeleb millegagi • traffic võrguliiklus • networks magistraalvõrk • mesh topology täis silmvõrk • ebaõnnestuma/nurjuma/läbikukkuma • mesh technolog osaline silmvõrk • ...
SYNONYMS CROSSWORD PUZZLE GRID 2025-05-20
Across
- FALLING
- SHIFT
- ABOUT
- STRESSES
- INCLUSIVE
- MAKING SURE
- POSITION
- ADDRESSING
- UNLAWFUL
- ENCOURAGING
- ENFORCING
- SEIZED
- PREVENT
- GOVERNS
- DESIGNED
- ENGAGEDLY
- AMONG WHICH
- RINGS
- TRAFFICKING
Down
- FRONTIERS
- BATTLE
- REDUCE THE SUPPLY
- LAUNCH
- ACTION
- RESULTED IN
- ARISING
- OBSERVED
- HIGH-SPEED
- INTERCEPTION
- UNDERSCORES
- IMPORTANT
- MEANS
- TERRITORIES
- ADDITIONALLY
- PLANNED
- POLICY
- FALLING
- DIMINUTION
- DOMESTIC AFFAIRS
- ENTERS AROUND
40 Clues: SHIFT • ABOUT • MEANS • RINGS • BATTLE • LAUNCH • ACTION • SEIZED • POLICY • FALLING • ARISING • PLANNED • PREVENT • FALLING • GOVERNS • STRESSES • OBSERVED • POSITION • UNLAWFUL • DESIGNED • FRONTIERS • INCLUSIVE • IMPORTANT • ENFORCING • ENGAGEDLY • HIGH-SPEED • ADDRESSING • DIMINUTION • RESULTED IN • UNDERSCORES • MAKING SURE • TERRITORIES • ENCOURAGING • AMONG WHICH • TRAFFICKING • INTERCEPTION • ADDITIONALLY • ENTERS AROUND • DOMESTIC AFFAIRS • ...
La tecnologia 2025-01-27
30 Clues: blog • apps • email • limit • screen • tablet • laptop • battery • to save • website • to text • charger • keyboard • to erase • to print • home page • to record • cell phone • to develop • to refresh • web browser • to download • to turn off • touch screen • text message • remote control • to communicate • internet/networks • to check or consult • to explore or navigate
Network security 2024-01-24
Across
- Used to disrupt, damage or gain unauthorized access to a computer system
- The gap between regions and demographics that have access to modern technology
- Attempting to gain sensitive information using emails
- Used to supress ideas on the internet
- Monitoring of data being transferred over computer networks
Down
- Malware that can self-replicate causing them to spread more rapidly
- Malware that spreads by copying infected files and activates when opening infected files
- The process of converting information into a line of code
- Malware disguised as legitimate software
- Two or more computers that are connected together for the purpose of communication
10 Clues: Used to supress ideas on the internet • Malware disguised as legitimate software • Attempting to gain sensitive information using emails • The process of converting information into a line of code • Monitoring of data being transferred over computer networks • Malware that can self-replicate causing them to spread more rapidly • ...
Wireless Networks 2022-09-14
7 Clues: To make stronger • To transmit a signal • To cast back light, heat, etc • To be distributed over an area • To take in or assimilate; incorporate • To accept delivery or transmission of sth • To diffuse by collisions between the wave and particles of the medium
Networks security 2021-02-09
7 Clues: LAN • Is bigger than LAN • A biometric of facial features • What is a Malware but is hidden • when an attack occurs to networks • A person who infiltrates systems or servers • A system protection against malware and hackers
computer networks 2024-10-21
Engineering Crosswords 2022-09-02
Across
- make sure planes work
- complex networks
- deals with physical and life sciences
- Develop organisms
- roads and stuff
- flight and space
- design safety systems
- design lighting effects
- invent
Down
- fix problems
- materials around pipes and in walls
- fac tor y work
- develop cages for endangered species
- chemicals
- develop and test software
- radiation and energy
- electric systems
- work to understand petrolem
- innovative designs and projects
19 Clues: invent • chemicals • fix problems • fac tor y work • roads and stuff • complex networks • flight and space • electric systems • Develop organisms • radiation and energy • make sure planes work • design safety systems • design lighting effects • develop and test software • work to understand petrolem • innovative designs and projects • materials around pipes and in walls • ...
Cybersecurity by Hazel 2025-05-07
Across
- the process of identifying and fixing vulnerabilities on a system.
- The smallest unit of information storage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
- A list of entities that are considered trustworthy and are granted access or privileges.
- Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
- A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
- Whom someone or what something is.
- the process of protecting electrical devices and networks from attacks.
Down
- A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
- A term to describe connecting multiple separate networks together.
- The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
- An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
- A list of entities that are blocked or denied privileges.
- A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
- A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
- A cryptographic algorithm for encryption and decryption.
- A connection between two devices.
- A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.
19 Clues: A connection between two devices. • Whom someone or what something is. • The smallest unit of information storage. • A cryptographic algorithm for encryption and decryption. • A list of entities that are blocked or denied privileges. • the process of identifying and fixing vulnerabilities on a system. • ...
CN 2024-10-15
Across
- The unique identifier for a device on a network
- A protocol that divides messages into smaller packets for transmission
- A type of IP address that uses 128 bits
Down
- The process of directing data between different networks
- A protocol for translating domain names to IP addresses
- A protocol that provides automatic IP address configuration
- A device that connects multiple networks and forwards packets
- A standard format for transmitting packets over the Internet
- A protocol used for sending error messages and operational information
9 Clues: A type of IP address that uses 128 bits • The unique identifier for a device on a network • A protocol for translating domain names to IP addresses • The process of directing data between different networks • A protocol that provides automatic IP address configuration • A standard format for transmitting packets over the Internet • ...
day2 recap 2025-08-05
Across
- Parameters that determine the importance of inputs in neural networks
- Learning with labeled training data
- S-shaped activation function with formula 1/(1+e^-z)
- Basic unit of neural networks, inspired by brain cells
Down
- Type of regression algorithm used for classification problems
- Unsupervised learning technique for discovering patterns in unlabeled data
- ML technique for predicting continuous values like temperature or sales
- ML technique for discrete values that can be counted, not measured
- Popular clustering algorithm mentioned in the presentation
9 Clues: Learning with labeled training data • S-shaped activation function with formula 1/(1+e^-z) • Basic unit of neural networks, inspired by brain cells • Popular clustering algorithm mentioned in the presentation • Type of regression algorithm used for classification problems • ML technique for discrete values that can be counted, not measured • ...
COSC 1-9 Assignment 2016-02-20
Across
- A group of information on a computer that can be software programs or data
- The main technology for local area networks
- No more than _____ seconds of music or lyrics from individual work
- Web _____ are built from instructions of HTML
- The _____ is a collection of wide area networks (WAN)
- No more than ____ images from one artist or photographer
- Sender and receiver are active at different times
Down
- Both sender and receiver are both active at the same time
- When writing for the web, the content should have ___ percent of the words
- An inverted _____ is used to start with the conclusion
- They do developments on the site, usually major changes to the site
- They design what the site looks like, but do not write code often
- A ____ editor can be used to make an html file
- The codes or tags that browsers use to create web pages
14 Clues: The main technology for local area networks • Web _____ are built from instructions of HTML • A ____ editor can be used to make an html file • Sender and receiver are active at different times • The _____ is a collection of wide area networks (WAN) • An inverted _____ is used to start with the conclusion • The codes or tags that browsers use to create web pages • ...
IT-OT Gap 2022-11-16
Across
- Susceptible to physical or cyber attacks or harm
- When a system has been compromised over the web or network
- This controls the logic of a process and runs the program
- The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss
- Two or more individuals or groups working together to accomplish a goal
- This is how Technicians interact with a process
Down
- Another term for outdated, like processes equipment in many industrial plants
- Person tasked to handle implementing, maintaining, and repairing computer networks.
- Unwilling or hesitant. Like OT is to accept change
- The act of being ready
- Unique number used to identify a computer or component on a network
- Should be unique and hard to guess
- Person in charge of others at a plant or facility
- The practice of employing people, policies, processes and technology to protect organizations
14 Clues: The act of being ready • Should be unique and hard to guess • This is how Technicians interact with a process • Susceptible to physical or cyber attacks or harm • Person in charge of others at a plant or facility • Unwilling or hesitant. Like OT is to accept change • This controls the logic of a process and runs the program • ...
Technology Crossword Puzzle 2023-06-16
Across
- a cellular or mobile telephone
- the programs, or instructions, that tell the hardware what to do
- an assembly of interconnected components arranged to transmit or modify force in order to perform useful work
- the process of learning about the natural world through observation and experimentation
- an instrument designed for the simultaneous transmission and reception of the human voice
- the online world of computer networks
- a group of two or more devices or nodes that can communicate
Down
- the application of science and maths to solve problems
- information that has been translated into a form that is efficient for movement or processing
- knowledge obtained from investigation, study, or instruction
- the application of scientific knowledge to the practical aims of human life
- an electronic device that manipulates information, or data
- a worldwide system of computer networks
- the flow of electrical power or charge
14 Clues: a cellular or mobile telephone • the online world of computer networks • the flow of electrical power or charge • a worldwide system of computer networks • the application of science and maths to solve problems • an electronic device that manipulates information, or data • knowledge obtained from investigation, study, or instruction • ...
Social 10-2 Ch. 1 Understanding Globalization TNN 2024-09-16
Across
- what people believe to be true based on collective experience as a group
- the different ways of delivering mass communication, such as newspapers, radio, television, and internet
- the basic physical systems of a community, including roads, utilities, water, and sewage
- a society in which a diversity of languages, beliefs, traditions, values, and religions exist
- the process of expanding world trading networks
- the process by which the the world citizen's are becoming increasingly connected to and dependent on one another
Down
- tied together
- the process by which political decisions and actions are becoming increasingly international
- what individuals believe to be true based on their personal experience
- the process by which people's lifestyles spread over global networks
- a person who buys goods or services for personnel use
- a corporation that operates in two or more countries
- one company hiring another company to fulfill certain tasks in production
- North American Free Trade Agreement
14 Clues: tied together • North American Free Trade Agreement • the process of expanding world trading networks • a corporation that operates in two or more countries • a person who buys goods or services for personnel use • the process by which people's lifestyles spread over global networks • what individuals believe to be true based on their personal experience • ...
Mod 2 Keywords 2024-11-20
Across
- A method of gaining unauthorised access to a computer system/network.
- (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- (6,6) An individual who uses existing computer scripts or codes to hack into computer systems. They do not have the expertise to write their own code.
- (5,8) Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.
- (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- (6,11) Hackers use this non-technical method to access computer systems/networks without authorisation. It involves fooling people into breaking normal security procedures, such as guarding their passwords and relies on manipulating the good nature of individuals.
- (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Down
- (5,4,3,6) the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.
- (6,6) a path by which a threat actor can access a server, host, or network.
- (5,8) An individual who commits illegal activities using computers and the Internet.
- (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
- Is a weakness in a computer system/network that can be exploited by a threat, for example, out of date anti-malware software can result in the threat of a malware attack. If a computer system/network’s vulnerabilities can be found and dealt with, this will help to minimize threats and risks.
- (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- An individual who gains unauthorised access to computer system/network for social or political purposes.
14 Clues: A method of gaining unauthorised access to a computer system/network. • (6,6) a path by which a threat actor can access a server, host, or network. • (5,8) An individual who commits illegal activities using computers and the Internet. • An individual who gains unauthorised access to computer system/network for social or political purposes. • ...
stems 2022-09-30
Across
- to sent students away
- felling of togetherness
- half-yearly
- someone drawing attention
- is not certain
- a group of musicians
- linked between
Down
- not all the way sweet
- apart from being present
- burst apart
- half a circle
- not equal
- similarity or exact correspondence between different things
- not done
- networks that exist between each other
- not able
16 Clues: not done • not able • not equal • burst apart • half-yearly • half a circle • is not certain • linked between • a group of musicians • not all the way sweet • to sent students away • apart from being present • felling of togetherness • someone drawing attention • networks that exist between each other • similarity or exact correspondence between different things
Network 2025-05-05
Across
- internet protocol
- where a person lives
- a document format
- a person
- a network access
- study of networks
- private network to send things securely
- a hub for storing information
- a way of securing data
- network
Down
- a secured way of protecting data
- a server outline
- network speed
- the server overseers
- a server connector
- local area network
16 Clues: network • a person • network speed • a server outline • a network access • internet protocol • a document format • study of networks • a server connector • local area network • where a person lives • the server overseers • a way of securing data • a hub for storing information • a secured way of protecting data • private network to send things securely
Security Networks .__. 2019-05-16
8 Clues: -you analyse it • - share resources • -internet protocol • -how to find someones house • -to make something authentic • - security online and on devices • -resilience against potential harm • -resilience against potential harm
social networks 2020-11-02
Across
- most popular social network
- a function that allows you to comment posts of other people in social network
- sign that mean you like the photo or post
- a imparting or exchange of information or news
Down
- people that made friends with you in social network
- a people who were studying with you at school
- a photo or video that you share with other people in social network
7 Clues: most popular social network • sign that mean you like the photo or post • a people who were studying with you at school • a imparting or exchange of information or news • people that made friends with you in social network • a photo or video that you share with other people in social network • ...
INTERNET AND NETWORKING 2025-09-22
Across
- – The part of a web address that identifies a website (e.g., google.com).
- – A computer that provides data or services to other computers on a network.
- – A wireless way of connecting devices to the internet.
- – A wired connection standard for local area networks (LANs).
- – The maximum amount of data that can pass through a network connection.
Down
- – Device that connects a computer to the internet via a service provider.
- – A program used to access and view websites.
- – Security system that blocks unauthorized access to a network.
- – A device that directs data between different networks.
- – A unique number identifying each device on a network.
10 Clues: – A program used to access and view websites. • – A wireless way of connecting devices to the internet. • – A unique number identifying each device on a network. • – A device that directs data between different networks. • – A wired connection standard for local area networks (LANs). • – Security system that blocks unauthorized access to a network. • ...
social media 2022-09-20
Across
- The most used social media
- Anything shared across social networks that get passed along quickly
- It can be spread easily on social media
- It is a job which requires the use of social media
- Being able to use social media in this place can be usefull
- A message sent on twitter
Down
- An action that can be made by a Facebook user
- A pictoral representation of a facial expression
- It is an image or username that represents a person online most often whithin forums and social networks
- It is a consequence of excessive use of social media
10 Clues: A message sent on twitter • The most used social media • It can be spread easily on social media • An action that can be made by a Facebook user • A pictoral representation of a facial expression • It is a job which requires the use of social media • It is a consequence of excessive use of social media • Being able to use social media in this place can be usefull • ...
Unit 2 Keywords 2023-10-03
Across
- policies, rules, and guidelines that govern operations
- the specific tools used in organizations to help communicate information (ICT)
- machine readable instructions for systems hardware
- collection of information to organize, analyze, and utilize
Down
- type of system that is a combination of networks that people use to distribute useful information
- assembly of things, people, and processes that work together
- most important component in information systems
- how computers and other technology communicate with one another
- machinery used to create content and manage/communicate information
9 Clues: most important component in information systems • machine readable instructions for systems hardware • policies, rules, and guidelines that govern operations • collection of information to organize, analyze, and utilize • assembly of things, people, and processes that work together • how computers and other technology communicate with one another • ...
Daniel Martinez's Internet Crossword puzzle 2013-03-26
Across
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- An unauthorized person who secretly gains access to computer files.
- a list of citations that appear at the end of a paper, article, chapter or book.
- OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results.
Down
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- A bully who operates online, in cyberspace; To bully online
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- A collaborative website which can be directly edited by anyone with access to it
- To renew or revitalize; To reload a webpage on the internet
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
12 Clues: A bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • A collaborative website which can be directly edited by anyone with access to it • a list of citations that appear at the end of a paper, article, chapter or book. • ...
Network Vocab 2024-03-07
Across
- a........is a device that uses its ports to connect devices, such as computers, together.
- This term was first coined in 1984 by Sci-Fi writer William Gibson. Today it refers to the environment in which communication over computer networks occurs.
- If you have high...........you're probably experiencing a lag during gaming. Low............means less lag and smoother gameplay!
- a.........is a company that physically owns the telecommunication lines and maintains them. This company provides transport facilities between two points.
- a specific worldwide interconnected network that is widely used to connect universities, government offices, companies, and private individuals. (a.k.a. the network of networks)
- the largest type of network in terms of geographic area.
- a geographic network that covers a large geographic area such as a city or community. It may be used to connect computers in libraries, government agencies, etc but no more than 48km in size.
Down
- a............is an auxiliary device such as a computer mouse or keyboard that connects to, and works with, the computer in some way.
- Sosh is an............, but it is not a carrier.
- the amount of data that can be transferred over a network in a certain amount of time.
- a geographic network that covers a relatively small geographic area such as a building or a small campus.
- a computer networking device that connects network segments.
- a........is any device physically connected to a network.
- a personal computer located on a network is a ...........
- a global network of peer-based internet exchange points used for the exchange of traffic between ISPs and large networks.
15 Clues: Sosh is an............, but it is not a carrier. • the largest type of network in terms of geographic area. • a........is any device physically connected to a network. • a personal computer located on a network is a ........... • a computer networking device that connects network segments. • ...
TECH-DAY 2023-09-25
Across
- A fraudulent email purportedly from a reputable company attempting to get personal information
- A wireless technology standard used over short distances using short-wavelength UHF radio waves
- A global network connecting computers and devices
- The address of a webpage,Check the validity of it before clicking on it
- An input device for typing characters and commands
- Programs running on computers for specific tasks
Down
- A closed path for electricity to flow, found in electronic devices
- A device directing data traffic in networks
- A numbering system using 0s and 1s, fundamental in computing
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet
- A collection of interconnected computers
- Should be constructed of upper and lower case letters, numbers, and special characters
- A security system protecting networks from threats
13 Clues: A collection of interconnected computers • A device directing data traffic in networks • Programs running on computers for specific tasks • A global network connecting computers and devices • A security system protecting networks from threats • An input device for typing characters and commands • A numbering system using 0s and 1s, fundamental in computing • ...
internet crossword 2024-05-29
Across
- interactive technologies that facilitate the creation, sharing and aggregation of content, ideas, interests, and other forms of expression through virtual communities and networks.
- portable telephone that can make and receive calls over a radio frequency
- intentional act causing injury or trauma to another person
- an activity that one engages in for amusement or fun.
- someone who uses the internet
- making fun of someone on the internet
- global system of interconnected computer networks
Down
- indicates a state of connectivit
- psychological/mental abuse that involves the use of oral, gestured, and written language directed to a victim.
- to give someone or something a name that isn't their actual name
- someone who makes fun of other people
- machine that can be programmed to automatically carry out sequences of arithmetic or logical operations
- making fun of someone
13 Clues: making fun of someone • someone who uses the internet • indicates a state of connectivit • someone who makes fun of other people • making fun of someone on the internet • global system of interconnected computer networks • an activity that one engages in for amusement or fun. • intentional act causing injury or trauma to another person • ...
Internet crossword 2023-03-11
Across
- a high speed computer network
- used for the rapid transfer of information such as sound, video, and graphics.
- a worldwide system of computer networks
- the notional environment in which communication over computer networks occurs
- a set of computers sharing resources located on or provided by network nodes.
Down
- controlled by or connected to another computer or the internet
- a structured set of data held in a computer
- a computer or computer program which manages access to a centralized resource
- text displayed on a computer display
- an information system enabling documents and other web resources to be accessed over the Internet.
10 Clues: a high speed computer network • text displayed on a computer display • a worldwide system of computer networks • a structured set of data held in a computer • controlled by or connected to another computer or the internet • a computer or computer program which manages access to a centralized resource • ...
EEDX51- AI FOR EE- MODULE 1- PUZZLE 1 2024-07-28
Across
- The process of adjusting weights based on error in ANNs.
- Neural networks are inspired by this biological structure.
- The main body of a neuron where information is processed.
- The ability of ANNs to recognize patterns and learn from data
- A problem-solving model used in simple feedforward neural networks
Down
- A feature of ANNs that allows them to function despite some components failing.
- The function that decides whether a neuron should fire based on the input.
- The part of the biological neuron responsible for receiving signals.
- ANNs are often used for this type of vehicle.
- These connections in ANNs store learned information
10 Clues: ANNs are often used for this type of vehicle. • These connections in ANNs store learned information • The process of adjusting weights based on error in ANNs. • The main body of a neuron where information is processed. • Neural networks are inspired by this biological structure. • The ability of ANNs to recognize patterns and learn from data • ...
computer network quiz 2023-02-06
Across
- organising communication between computer networks
- Internet Protocol address.
- enables two hosts to establish a connection and exchange streams of data.
- An online place witch is called a server
- the result of joining 2 or more computes
Down
- a small segment of a larger message.
- where you physically plug your computer or moor station into an ethernet cord or wall jack
- A form of a app to text on and is very easy to send links and send messages from over the Wolde
- a worldwide system of computer networks
- a set of rules for formatting and processing data
10 Clues: Internet Protocol address. • a small segment of a larger message. • a worldwide system of computer networks • An online place witch is called a server • the result of joining 2 or more computes • a set of rules for formatting and processing data • organising communication between computer networks • ...
Network Vocab 2015-09-27
Across
- a computer networking device that connects network segments
- ...........are companies that physically owns the telecommunication lines and maintain them. They provide transport facilities between two points. Not all ISPs are..........
- the amount of data that can be transferred over a network in a certain amount of time
- a specific worldwide interconnected network that is widely used to connect universities, government offices, companies, and private individuals. (a.k.a. the network of networks)
- a global network of peer-based Internet exchange points used for the exchange of traffic between ISPs and large networks
- a device that uses its ports to connect devices together such as a computer
- a...........is any device physically connected to a network
- ...........lines are T1, T2 or T3 lines rented to users
Down
- this term was first coined in 1984 by Sci-Fi writer William Gibson. Today it refers to the environment in which communication over computer networks occurs.
- a personal computer located on a network is a.............
- a geographic network that covers a large geographic area such as a city or community. It may be used to connect computers in libraries, government agencies, etc but no more than 48 km in size
- a..............is any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way
- a geographic network that covers a relatively small geographic area such as a building or a small campus
- the largest type of network in terms of geographic area
14 Clues: the largest type of network in terms of geographic area • ...........lines are T1, T2 or T3 lines rented to users • a personal computer located on a network is a............. • a computer networking device that connects network segments • a...........is any device physically connected to a network • ...
Adam Telfer 2015-09-22
Across
- stuff like smartphones and web TV
- Gap between those who have Internet access and those who don’t
- Collection of networks of computers & storage devices linked by cables & satellite
- early version of internet?
- what does TCPIP stand for
- standard way of indicating the location of a web site
- technology that allows two or more devices
- where you can keep URLs that you would like to visit frequently
Down
- set of rules for how HTML documents are interpreted & displayed through a browser
- Allows more data to be sent over traditional copper telephone lines
- a location on the WWW
- collection of hypertext documents stored in computers connected to the Internet
- Lead to another website or place within same document
- networking, it is a set of formal rules describing how to transmit data across networks
- a web authoring language: set of text & codes, only visible to the web browser (ex. Internet Explorer) & instruct the browser how to display the text
- Structure that handles the major traffic in a networked system
- Companies that proved users with access to the Internet, usually for a fee
17 Clues: a location on the WWW • what does TCPIP stand for • early version of internet? • stuff like smartphones and web TV • technology that allows two or more devices • Lead to another website or place within same document • standard way of indicating the location of a web site • Gap between those who have Internet access and those who don’t • ...
Cyber Ethics 2025-06-07
6 Clues: : Harmful software • : Wireless internet access • : Moral rules for digital use • : A global network of networks • : Local network in a small area • : Sends data between computer networks
Exploring Computer Networks 2025-05-28
Across
- Which device connects two networks and filters traffic between them?
- Which device provides wireless access to a wired network?
- What device is used to monitor and control incoming and outgoing network traffic based on security rules?
Down
- What device amplifies signals to extend the range of a network?
- Which device connects multiple networks and directs data between them?
- What is a wireless version of a local area network called?
- Which type of network is designed for personal devices within a short range?
- Which device modulates and demodulates digital signals over telephone lines?
- What device connects devices within a LAN and uses MAC addresses to forward data?
- What type of network is typically used within a single building or campus?
10 Clues: Which device provides wireless access to a wired network? • What is a wireless version of a local area network called? • What device amplifies signals to extend the range of a network? • Which device connects two networks and filters traffic between them? • Which device connects multiple networks and directs data between them? • ...
NETWORKS AND TOPOLOGY 2025-06-03
Across
- TO PEER, It is the simplest and most basic type of network topology. It consists of two nodes that are connected by a single link.
- It is a network used in educational environments such as universities or schools
- all nodes are connected to a single cable—known as the bus.
- It extends over a large geographic area.
- A mesh topology is a highly interconnected network structure where each node is directly linked to multiple other nodes.
- It allows users to connect within a short distance in a common area.
Down
- It is a small-scale network that revolves around one person or device
- Nodes are connected in a circular fashion, with each node having exactly two neighbors.
- All the nodes are connected to a central hub. The nodes are positioned around that central hub in a star shape.
- It is a medium-sized network that's larger than a CAN.
10 Clues: It extends over a large geographic area. • It is a medium-sized network that's larger than a CAN. • all nodes are connected to a single cable—known as the bus. • It allows users to connect within a short distance in a common area. • It is a small-scale network that revolves around one person or device • ...
Week 4 Networks 2025-09-29
Across
- to break trust or act disloyal
- to keep going
- an organized course of action
- to tell a lie
- to get to know something or someone
Down
- a thing done successfully
- a source of income
- to begin or continue a course of action
- behaving or showing high moral standards
- extending in one direction without a curve or bend
10 Clues: to keep going • to tell a lie • a source of income • a thing done successfully • an organized course of action • to break trust or act disloyal • to get to know something or someone • to begin or continue a course of action • behaving or showing high moral standards • extending in one direction without a curve or bend
Computer networks 2023-10-20
7 Clues: Layout of the network • A device used in star topology • Exchanging information within a network • Assigns automatic IP addresses in network • Protects the network from unauthorized access • Set of rules used in a network to communicate • A device that connects local network to the internet
Industrial networks 2023-01-26
7 Clues: Type of topology. • Type of OSI layer. • Physical connector. • Sequence of information bits. • Way to protect code from errors. • Name of the modul of the PLC for create network. • What is the name of the "space" for data transmission.
