networks Crossword Puzzles
computer networks 2024-10-21
SSE OSI Model Crossword 2018-10-08
Across
- LAYER 2 DEVICE
- PATTERN OF CONNECTION
- LAYER THAT TRANSMITS BITS OF INFORMATION
- REQUIRES LINE OF SIGHT COMMUNICATION
- FASTEST MODE OF COMMUNICATION
- AGREED UPON RULES
Down
- MULTIPORT PHYSICAL LAYER DEVICE
- CABLE TO CONNECT ROUTERS
- TRANSMISSION USING LIGHT
- SPANS A CAMPUS
- GOD OF NETWORKS
- EQUAL
- ONE WAY COMMUNICATION
- NETWORK INTELLIGENT
- REMOVAL PROCESS OF OUTER COVER
15 Clues: EQUAL • LAYER 2 DEVICE • SPANS A CAMPUS • GOD OF NETWORKS • AGREED UPON RULES • NETWORK INTELLIGENT • PATTERN OF CONNECTION • ONE WAY COMMUNICATION • CABLE TO CONNECT ROUTERS • TRANSMISSION USING LIGHT • FASTEST MODE OF COMMUNICATION • REMOVAL PROCESS OF OUTER COVER • MULTIPORT PHYSICAL LAYER DEVICE • REQUIRES LINE OF SIGHT COMMUNICATION • LAYER THAT TRANSMITS BITS OF INFORMATION
Security and Net 2024-07-24
Across
- fundamental building block for the storage, retrieval, and analysis of a company’s data
- type of malware that self-replicates and spreads through computers and networks
- used to prevent attenuation when packets are traveling long distances
- logical layout of the cables and devices that connect the nodes of the network
- weakness that has not been protected against threats
- is anything that can cause harm
- most widely-used standard for local area networks
Down
- malicious computer programs that are created to harm computer systems
- is a node on a network that serves as an entrance to another network
- allows users to communicate and share information between computers
- contains only the company’s private information
- wireless access point
- wide area network (acronym)
- may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams
- can be used to share some of a company’s intranet resources with people outside the organization
- similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it
- device that connects two LANs or two segments of the same LAN
- type of malware that is attached to a host file and has the ability to replicate, or copy, itself
- local area network (acronym)
- provides multiple ports for connecting nodes
20 Clues: wireless access point • wide area network (acronym) • local area network (acronym) • is anything that can cause harm • provides multiple ports for connecting nodes • contains only the company’s private information • most widely-used standard for local area networks • weakness that has not been protected against threats • ...
Mscott - Network Devices 2023-01-03
Across
- Extends the distance a signal can travel
- systems that are no longer supported but are still in operation in today’s networks
- based network controller is a device in the cloud that allows network administrators to manage network devices
- A wireless access point provides connectivity only to the...
- collects incoming cables that run from the various networking devices
- ...networking sends information by sending data on certain frequencies
- What stands for Cisco’s Digital Network Architecture
- includes all the functionality of an IDS/IPS as well as stateful firewall services
- many legacy systems have
- Passively monitors traffic on the network
Down
- protects data and equipment on a network from unauthorized access
- typically responsible for monitoring all the end devices in your network
- With a patch panel why would you ensure that all cables are secured using cable ties or cable management products
- Filters network traffic between LAN segments
- transfers small amounts of DC current over an Ethernet cable
- What type of switch would you use in a home
- low cost and filters network traffic
- uses IP addresses to forward traffic to other networks
- Stand-alone IDS systems have largely disappeared in favor of...
19 Clues: many legacy systems have • low cost and filters network traffic • Extends the distance a signal can travel • Passively monitors traffic on the network • What type of switch would you use in a home • Filters network traffic between LAN segments • What stands for Cisco’s Digital Network Architecture • uses IP addresses to forward traffic to other networks • ...
U11 - Mod 2 Key Terms 2024-09-20
Across
- A method of gaining unauthorised access to a computer system/network.
- (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- (6,6) An individual who uses existing computer scripts or codes to hack into computer systems. They do not have the expertise to write their own code.
- (5,8) Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.
- (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- (6,11) Hackers use this non-technical method to access computer systems/networks without authorisation. It involves fooling people into breaking normal security procedures, such as guarding their passwords and relies on manipulating the good nature of individuals.
- (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Down
- (5,4,3,6) the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.
- (6,6) a path by which a threat actor can access a server, host, or network.
- (5,8) An individual who commits illegal activities using computers and the Internet.
- (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
- Is a weakness in a computer system/network that can be exploited by a threat, for example, out of date anti-malware software can result in the threat of a malware attack. If a computer system/network’s vulnerabilities can be found and dealt with, this will help to minimize threats and risks.
- (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- An individual who gains unauthorised access to computer system/network for social or political purposes.
14 Clues: A method of gaining unauthorised access to a computer system/network. • (6,6) a path by which a threat actor can access a server, host, or network. • (5,8) An individual who commits illegal activities using computers and the Internet. • An individual who gains unauthorised access to computer system/network for social or political purposes. • ...
Technology Career Exploration 2023-02-10
Across
- a career that allows one to maintain safe, networks, workspaces and prevent threats
- the area of interest that one may study
- a position where when designs, implements and maintains networks
- a career where one can create and sometimes maintain a website
- something one may apply for within their field of study
Down
- a career that allows one to create and maintain programs
- teacher job that allows one to teach about technology
- a document one may create to market themselves for a desired position
- my favorite teacher
- a form an employer may require one to complete when seeking a position
10 Clues: my favorite teacher • the area of interest that one may study • teacher job that allows one to teach about technology • something one may apply for within their field of study • a career that allows one to create and maintain programs • a career where one can create and sometimes maintain a website • a position where when designs, implements and maintains networks • ...
Internet crossword 2023-03-11
Across
- a high speed computer network
- used for the rapid transfer of information such as sound, video, and graphics.
- a worldwide system of computer networks
- the notional environment in which communication over computer networks occurs
- a set of computers sharing resources located on or provided by network nodes.
Down
- controlled by or connected to another computer or the internet
- a structured set of data held in a computer
- a computer or computer program which manages access to a centralized resource
- text displayed on a computer display
- an information system enabling documents and other web resources to be accessed over the Internet.
10 Clues: a high speed computer network • text displayed on a computer display • a worldwide system of computer networks • a structured set of data held in a computer • controlled by or connected to another computer or the internet • a computer or computer program which manages access to a centralized resource • ...
Internet crossword 2023-03-11
Across
- a high speed computer network
- used for the rapid transfer of information such as sound, video, and graphics.
- a worldwide system of computer networks
- the notional environment in which communication over computer networks occurs
- a set of computers sharing resources located on or provided by network nodes.
Down
- controlled by or connected to another computer or the internet
- a structured set of data held in a computer
- a computer or computer program which manages access to a centralized resource
- text displayed on a computer display
- an information system enabling documents and other web resources to be accessed over the Internet.
10 Clues: a high speed computer network • text displayed on a computer display • a worldwide system of computer networks • a structured set of data held in a computer • controlled by or connected to another computer or the internet • a computer or computer program which manages access to a centralized resource • ...
Marcus' Magnificent (Word) Maze 2025-01-30
Across
- A legal agreement allowing energy companies to install and maintain equipment on private land. (8)
- An organisation that maintains local electricity networks outside traditional DNO areas. (4)
- The regulatory framework ensuring networks deliver value, overseen by Ofgem. (4)
- A source of light with a wick; used during power outages. (6)
Down
- A swashbuckling adventurer known for plundering ships. (6)
- An animal with black and white stripes. (5)
- A bird of prey known for its speed. (6)
- Used for checking one’s appearance. (6)
- A celestial event where one body obscures another. (7)
- A genre of music with significant improvisational style. (4)
10 Clues: A bird of prey known for its speed. (6) • Used for checking one’s appearance. (6) • An animal with black and white stripes. (5) • A celestial event where one body obscures another. (7) • A swashbuckling adventurer known for plundering ships. (6) • A genre of music with significant improvisational style. (4) • ...
iria's crossword 2024-01-18
12 Clues: Webs • Achive • Able to • Go on a boat • Vehicles vapor • Very dangerous • Build something • Get in a vehicle • Invent something • Very fast vehicle • Amount of something • The thing trains move on
Chapter 7: Networks 2015-10-25
Across
- Maximum data rate
- Local Area Network in small geographic area
- Transfers packets of data between two or more networks
- Any device on the network
- Rules for computer-to-computer communication
Down
- Wireless Fidelity
- Actual data rate
- Very large network spanning a large physical area
- Two or more computers connected for communication
- A network of storage devices for centralized data storage
10 Clues: Actual data rate • Wireless Fidelity • Maximum data rate • Any device on the network • Local Area Network in small geographic area • Rules for computer-to-computer communication • Very large network spanning a large physical area • Two or more computers connected for communication • Transfers packets of data between two or more networks • ...
Mscott - Network Devices 2023-01-03
Across
- collects incoming cables that run from the various networking devices
- transfers small amounts of DC current over an Ethernet cable
- A wireless access point provides connectivity only to the...
- What type of switch would you use in a home
- many legacy systems have
- Passively monitors traffic on the network
- low cost and filters network traffic
- uses IP addresses to forward traffic to other networks
Down
- With a patch panel why would you ensure that all cables are secured using cable ties or cable management products
- typically responsible for monitoring all the end devices in your network
- Extends the distance a signal can travel
- based network controller is a device in the cloud that allows network administrators to manage network devices
- systems that are no longer supported but are still in operation in today’s networks
- ...networking sends information by sending data on certain frequencies
- includes all the functionality of an IDS/IPS as well as stateful firewall services
- What stands for Cisco’s Digital Network Architecture
- protects data and equipment on a network from unauthorized access
- Stand-alone IDS systems have largely disappeared in favor of...
- Filters network traffic between LAN segments
19 Clues: many legacy systems have • low cost and filters network traffic • Extends the distance a signal can travel • Passively monitors traffic on the network • What type of switch would you use in a home • Filters network traffic between LAN segments • What stands for Cisco’s Digital Network Architecture • uses IP addresses to forward traffic to other networks • ...
Cyber Security Threats 2025-11-19
Across
- Fake messages or emails pretending to be genuine to steal information.
- Redirecting a user to a fake version of a legitimate website.
- Persuading someone to give information by pretending to be someone trustworthy.
- Messages designed to deceive users into clicking links or giving information.
- Software that secretly gathers user information without permission.
- An attack that floods a service or website with traffic so it cannot function.
- A network of infected devices controlled remotely by an attacker.
- Entering systems, networks or data without permission.
- Attempting to gain unauthorised access to systems or data.
- A malicious program that attaches to files and spreads between systems.
- Tricking a user into clicking on something different from what they think they are clicking.
Down
- Dishonest schemes to trick people into giving money or information.
- Watching someone enter their PIN or password to steal it.
- Stealing someone’s personal details and using them fraudulently.
- Sites designed to imitate real ones in order to steal data.
- Malicious software such as viruses, spyware, worms or trojans.
- Self-replicating malware that spreads across networks without user action.
- Software that forces unwanted advertising onto a device.
- Manipulating people into giving away confidential information.
19 Clues: Entering systems, networks or data without permission. • Software that forces unwanted advertising onto a device. • Watching someone enter their PIN or password to steal it. • Attempting to gain unauthorised access to systems or data. • Sites designed to imitate real ones in order to steal data. • Redirecting a user to a fake version of a legitimate website. • ...
Social media 2022-03-02
Across
- is one of the most important social networks
- we do these loa on social networks thanks to the fact that we can meet there
- uploaded to social networks
Down
- thoughts are written by people to give or say what is going through their mind
- It is news that is said on the internet and is not true
- A network where kids interact the most
6 Clues: uploaded to social networks • A network where kids interact the most • is one of the most important social networks • It is news that is said on the internet and is not true • we do these loa on social networks thanks to the fact that we can meet there • thoughts are written by people to give or say what is going through their mind
Social media 2020-04-26
Across
- Platform founded by Mark Zuckerberg.
- A network for online picture sharing.
- It is an image or username that represents a person online most often within forums and social networks.
- A photo sharing application gained more than 300 million users.
- A self-portrait taken using the reverse camera screen on a smartphone.
- Simple web pages that can be edited by other users.
- A pictorial representation of a facial expression which is used in writing.
Down
- A small, attractive application on a website such as a hit counter.
- Anything shared across social networks that get passed along rapidly e.g. YouTube.
- #
- Clusters of a user’s friends, colleagues, family or connections on Google+.
- Here you are allowed to share a 140-character update.
- They are also known as message boards.
- A one-to-one communication on the internet.
- A site updated frequently by an individual or group to record opinions or information.
- A system that manages content.
- An action that can be made by a Facebook user.
- A free URL shortening service.
- A message sent on Twitter.
19 Clues: # • A message sent on Twitter. • A system that manages content. • A free URL shortening service. • Platform founded by Mark Zuckerberg. • A network for online picture sharing. • They are also known as message boards. • A one-to-one communication on the internet. • An action that can be made by a Facebook user. • Simple web pages that can be edited by other users. • ...
TEJ2 Networking Terms 2023-04-12
Across
- ___ network of remote servers hosted on the internet that can store and process data.
- A network that is in a local small area.
- Smallest unit of data in a computer.
- Device that forwards packets between networks or between devices on the same network.
- The code used for web pages.
- The first massively popular internet browser.
- Two or more computing devices linked together to share resources.
- Unit of data sent over a network.
- Device or software that filters incoming/outgoing data to the network.
- ___ name system (DNS) converts human-readable domain names into numerical IP addresses.
Down
- Device that converts digital signals to analog signals.
- A group of interconnected networks.
- Device or software that requests services from a server.
- Popular type of physical network.
- A unique identifier used to locate a resource on the Internet.
- Device or software application that provides services to other devices or software applications.
- Amount of data that can be transferred over a given period of time.
- Cascading Style Sheets allows you to style different HTML pages.
- ____ address is a unique number for the device to be on the network.
19 Clues: The code used for web pages. • Popular type of physical network. • Unit of data sent over a network. • A group of interconnected networks. • Smallest unit of data in a computer. • A network that is in a local small area. • The first massively popular internet browser. • Device that converts digital signals to analog signals. • ...
Stems List 1 2023-11-15
12 Clues: join together • talk together • before the date • beyond ordinary • against bacteria • two times a week • around the circle • action between people • away from the advantage • networks within a system • triangle with equal sides • money down toward something
Bailey's Internet Crossword Puzzle 2013-03-26
Across
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work
- Network etiquette; Online manners; following the rules of conduct for online or internet users, being a good digital citizen.
- software used to view various kinds of Internet resources found on the Web
- a piece of writing that has been copied from someone else and is presented as being your own work
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic
- An unauthorized person who secretly gains access to computer files
Down
- RESOURCE LOCATOR (URL) Full website address. Example
- a list of citations that appear at the end of a paper, article, chapter or book
- renew or revitalize; To reload a webpage on the internet
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
12 Clues: RESOURCE LOCATOR (URL) Full website address. Example • renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • software used to view various kinds of Internet resources found on the Web • a list of citations that appear at the end of a paper, article, chapter or book • ...
Logan Robison Crossword Puzzle 2015-04-30
Across
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- An unauthorized person who secretly gains access to computer files
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- a piece of writing that has been copied from someone else and is presented as being your own work
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
Down
- software used to view various kinds of Internet resources found on the Web
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- To renew or revitalize; To reload a webpage on the internet
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
12 Clues: To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • software used to view various kinds of Internet resources found on the Web • a piece of writing that has been copied from someone else and is presented as being your own work • ...
Unit 5 Crossword 2025-04-28
Across
- Running AI models locally on devices like smartphones without needing cloud access.
- AI that can create new content like images, music, or text.
- Python’s basic plotting library used for creating static, animated, and interactive visualizations.
- Google's AI framework known for deep learning and end-to-end machine learning workflows.
- Technology that converts spoken language into text.
- Open-source library used for computer vision tasks like face detection and image processing.
- Identifying human faces in digital images or video streams.
- Meta’s (Facebook's) flexible and dynamic deep learning library.
- Using a pre-trained AI model for a new but similar task.
Down
- Protection of systems and networks from digital attacks.
- Machine learning type where an agent learns by reward and punishment.
- Python library for making attractive and informative statistical graphics.
- Subfield of machine learning involving neural networks with many layers.
13 Clues: Technology that converts spoken language into text. • Protection of systems and networks from digital attacks. • Using a pre-trained AI model for a new but similar task. • AI that can create new content like images, music, or text. • Identifying human faces in digital images or video streams. • Meta’s (Facebook's) flexible and dynamic deep learning library. • ...
Networking concept 2025-05-30
Across
- A device that connects computers and other network devices
- A network that connects devices within a small area, like a home
- A physical connection between devices on a network
- SERVER A type of network where a central server manages resources
- A device that broadcasts data to all devices connected to it
- AREA NETWORK A network that connects devices within a large city
- PROTOCOL A set of rules that govern how devices communicate on a network
- A type of network that connects devices within a small area, like a personal workspace
Down
- A device that connects two or more networks together
- ROUTER A device that forwards data packets between networks
- A type of network that uses wireless technology
- A network that connects computers across a large geographical area, like a city
12 Clues: A type of network that uses wireless technology • A physical connection between devices on a network • A device that connects two or more networks together • A device that connects computers and other network devices • ROUTER A device that forwards data packets between networks • A device that broadcasts data to all devices connected to it • ...
Computer Coding 2024-02-08
Across
- decision making on logical basis
- fixing errors
- in order
- don't repeat yourself
- A container that stores information
- instruction
Down
- something happens in response to an action
- Permanent storage
- connection of networks
- Error in code
- set of instructions
- Something happens in response to an action
- instructions that repeat
- Short term memory
14 Clues: in order • instruction • fixing errors • Error in code • Permanent storage • Short term memory • set of instructions • don't repeat yourself • connection of networks • instructions that repeat • decision making on logical basis • A container that stores information • something happens in response to an action • Something happens in response to an action
Computer Networks: Topologies and Devices” 2025-11-04
Across
- : A device used in a star topology to connect multiple computers.
- : A topology where all devices are connected to a central hub.
- :
- : A device that connects two LAN segments at the data link layer.
- : A device that filters and forwards data to a specific device in a network.
- : A topology that has a root node and all other nodes are connected in a hierarchy.
- : A topology where each computer is connected to exactly two others forming a circle.
Down
- : A device that connects multiple networks and directs data between them.
- : A topology that combines two or more different topologies.
- : A topology where all devices share a single communication line.
- : A device that regenerates weak signals to extend network distance.
- : A topology where every device is connected to every other device.
- : A device that connects networks using different protocols.
13 Clues: : • : A topology that combines two or more different topologies. • : A device that connects networks using different protocols. • : A topology where all devices are connected to a central hub. • : A device used in a star topology to connect multiple computers. • : A topology where all devices share a single communication line. • ...
Network 2025-05-29
Across
- A device that directs data between different networks.
- Computing Storing and accessing data online instead of on local devices.
- A small unit of data transmitted over a network.
- A wired networking technology for local area networks.
- Legal protection for creators of digital content.
- Address A unique identifier for a device on the internet.
- A security system that filters incoming and outgoing network traffic.
- Footprint The trail of data left behind when using the internet.
- System that translates domain names into IP addresses.
- A secure connection that hides your online activities.
Down
- The right to keep personal information safe online.
- should make for an engaging crossword! Want me to add more or refine the hints further?
- Authentication An extra layer of security requiring two forms of verification.
- Malicious software designed to harm a computer.
- The delay in data transmission over a network.
- Hacking Using hacking skills to protect systems legally.
- Harassing or intimidating someone over the internet.
- The maximum data transfer rate of a network.
- A cyber-attack where fraudsters trick people into revealing personal data. Hacking Gaining unauthorized access to a system. Encryption – The process of converting data into a secure format.
19 Clues: The maximum data transfer rate of a network. • The delay in data transmission over a network. • Malicious software designed to harm a computer. • A small unit of data transmitted over a network. • Legal protection for creators of digital content. • The right to keep personal information safe online. • Harassing or intimidating someone over the internet. • ...
Mscott - Network Devices 2023-01-03
Across
- Extends the distance a signal can travel
- systems that are no longer supported but are still in operation in today’s networks
- based network controller is a device in the cloud that allows network administrators to manage network devices
- A wireless access point provides connectivity only to the...
- collects incoming cables that run from the various networking devices
- ...networking sends information by sending data on certain frequencies
- What stands for Cisco’s Digital Network Architecture
- includes all the functionality of an IDS/IPS as well as stateful firewall services
- many legacy systems have
- Passively monitors traffic on the network
Down
- protects data and equipment on a network from unauthorized access
- typically responsible for monitoring all the end devices in your network
- With a patch panel why would you ensure that all cables are secured using cable ties or cable management products
- Filters network traffic between LAN segments
- transfers small amounts of DC current over an Ethernet cable
- What type of switch would you use in a home
- low cost and filters network traffic
- uses IP addresses to forward traffic to other networks
- Stand-alone IDS systems have largely disappeared in favor of...
19 Clues: many legacy systems have • low cost and filters network traffic • Extends the distance a signal can travel • Passively monitors traffic on the network • What type of switch would you use in a home • Filters network traffic between LAN segments • What stands for Cisco’s Digital Network Architecture • uses IP addresses to forward traffic to other networks • ...
Reese's crossword 2025-09-09
Across
- a programmable electronic device
- a wireless networking technology that uses radio waves
- an instrument or device used for observing.
- a combined device for modulation.
- a computer program that simulates human conversation with an end user
- a software program or a system designed to help users find information stored on the internet
- allows access to a wide range of information on a touch.
- forwards data packets between computer networks
- a barrier between internal network and untrustworthy networks.
Down
- carries everything that people use on the internet such as deleted chats, search history and so much more
- device designed to fit on top of a typical office desk.
- the practice of pretending on social media to be someone different, in order to trick or attract another person
- an application for accessing websites.
- an increasingly valuable complement to digital signing practices,
- a type of artificial intelligence that produces new content.
- technology used to connect computers to peripheral devices
- a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
- small text files to gather together your data.
- a scam where attackers deceive people into revealing sensitive information.
19 Clues: a programmable electronic device • a combined device for modulation. • an application for accessing websites. • an instrument or device used for observing. • small text files to gather together your data. • forwards data packets between computer networks • a wireless networking technology that uses radio waves • device designed to fit on top of a typical office desk. • ...
Juniper Networks for Healthcare 2021-11-12
Across
- Juniper Mist upholds "___"-first networking.
- Our EX "___" devices forward data to the destination device.
- A place to care for the NHS' patients.
- Where is the sphygmomanometer? "___" services allow you to track users easily.
- The Wi-Fi here is rubbish, I can't "___".
- a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The patients, staff, and IoT devices that you're responsible for on the network.
Down
- This strategy is vital to protecting patient and hospital data records.
- Juniper Mist's cloud microservices ensures network updates without this.
- What's the "___" password? I can't connect.
- The NHS provides this exceptionally.
- The people that the NHS looks after.
- Technology that uses machine learning to proactively process data and tasks.
- This connects directly to a wired LAN.
- This device forwards packets between networks.
15 Clues: The NHS provides this exceptionally. • The people that the NHS looks after. • A place to care for the NHS' patients. • This connects directly to a wired LAN. • The Wi-Fi here is rubbish, I can't "___". • What's the "___" password? I can't connect. • Juniper Mist upholds "___"-first networking. • This device forwards packets between networks. • ...
Phase 3: Rival Networks 2013-11-29
Across
- voyagers were very important to the ________
- phase 3 is called________
- the land offered by Britain to use for trade was called _______
- Britain recruited men from ________'s Orkney Islands
- after the Haudenosaunee defeated the Ouendat, New France needed an new way to get furs to the first Nations by the _______
- the abbreviation for the Hudson's Bay company
Down
- the HBC competed with the_______ in the fur trade
- metis were also called ________ metis
- this country started the Hudson's Bay Company in 1670
- the Cree and Nakoda were ______ for the British and the French
- ______________ also come from this phase (to do with the HBC)
- this business originated from the Hudson't Bay Company
- the _______ and the Canadien Coureurs de Bois were middlemen between the French and the First Nations in the west
- these people were hired to travel by canoe and transport furs to trading posts
- when French married First Nations, and had children, the children were called this
15 Clues: phase 3 is called________ • metis were also called ________ metis • voyagers were very important to the ________ • the abbreviation for the Hudson's Bay company • the HBC competed with the_______ in the fur trade • Britain recruited men from ________'s Orkney Islands • this country started the Hudson's Bay Company in 1670 • ...
Phase 3: Rival Networks 2013-11-29
Across
- the land offered by Britain to use for trade was called _______
- phase 3 is called________
- these people were hired to travel by canoe and transport furs to trading posts
- this country started the Hudson's Bay Company in 1670
- the Cree and Nakoda were ______ for the British and the French
- Britain recruited men from ________'s Orkney Islands
- the abbreviation for the Hudson's Bay company
Down
- when French married First Nations, and had children, the children were called this
- metis were also called ________ metis
- voyagers were very important to the ________
- after the Haudenosaunee defeated the Ouendat, New France needed an new way to get furs to the first Nations by the _______
- the _______ and the Canadien Coureurs de Bois were middlemen between the French and the First Nations in the west
- ______________ also come from this phase (to do with the HBC)
- this business originated from the Hudson't Bay Company
- the HBC competed with the_______ in the fur trade
15 Clues: phase 3 is called________ • metis were also called ________ metis • voyagers were very important to the ________ • the abbreviation for the Hudson's Bay company • the HBC competed with the_______ in the fur trade • Britain recruited men from ________'s Orkney Islands • this country started the Hudson's Bay Company in 1670 • ...
Networks and Networking Crossword 2023-07-27
Across
- an acronym for virtual private network
- wireless internet acronym
- machinery and equipment developed from the application of scientific knowledge.
- the basis for all code used in computing systems.
- identifies a specific connection between network devices
- a network, or system, that connects millions of computers worldwide.
- routers, switches and cables are examples of this
- a physical or virtual device that sends information contained in a data packets between networks
- a connection point inside a network that can receive, send, create or store data
Down
- two or more computers that are connected
- a device that connects other devices and manages node-to-node communication
- the process or activity of writing computer programs
- an acronym for local area network
- operating systems or business applications
- a unique number assigned to every device connected to a network
15 Clues: wireless internet acronym • an acronym for local area network • an acronym for virtual private network • two or more computers that are connected • operating systems or business applications • the basis for all code used in computing systems. • routers, switches and cables are examples of this • the process or activity of writing computer programs • ...
Networking concept 2025-05-30
Across
- A device that connects computers and other network devices
- A network that connects devices within a small area, like a home
- A physical connection between devices on a network
- SERVER A type of network where a central server manages resources
- A device that broadcasts data to all devices connected to it
- AREA NETWORK A network that connects devices within a large city
- PROTOCOL A set of rules that govern how devices communicate on a network
- A type of network that connects devices within a small area, like a personal workspace
Down
- A device that connects two or more networks together
- ROUTER A device that forwards data packets between networks
- A type of network that uses wireless technology
- A network that connects computers across a large geographical area, like a city
12 Clues: A type of network that uses wireless technology • A physical connection between devices on a network • A device that connects two or more networks together • A device that connects computers and other network devices • ROUTER A device that forwards data packets between networks • A device that broadcasts data to all devices connected to it • ...
Advanced Networking Technologies Crossword 2020-11-10
Across
- Cell relay Network switching technique that uses time division multiplexing (TDM) for data communications
- Technology that uses electromagnetic fields to automatically identify and track tags attached to objects
- ad hoc network that links a wireless user group of devices using Bluetooth technology protocols
- Example of Wireless Network
- network multiple access method in which carrier sensing is used
- wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless IoT networks
Down
- optical multiplexing technology used to increase bandwidth over existing fiber networks
- Network that is spontaneously formed when devices connect and communicate with each other
- Maximum active secondary devices in PICONET
- Light is transmitted through
- Synchronous optical Network
11 Clues: Example of Wireless Network • Synchronous optical Network • Light is transmitted through • Maximum active secondary devices in PICONET • network multiple access method in which carrier sensing is used • optical multiplexing technology used to increase bandwidth over existing fiber networks • ...
Test 2023-10-02
Across
- B: Basic unit of complex life / T: Basic unit of a Jupyter notebook
- Maker of ChatGPT
- Lasker Prize winning tech that predicts the 3D structure of proteins
- Modern neural network building blocks / Giant media franchise
- Key to modern neural networks / Why we're all on Twitter
Down
- Twitter handle for reliable healthcare memes
- Excellent ML/AI Consultants / Horrible Crossword Makers
- B: A type of muscle used to tighten a limb / T: A generalized matrix
- What neural networks, OOP posts, and the healthcare ecosystem have in common
- B: The substance between cells in which they are embedded / T: A multi-dimensional array of numbers
- B: A large plant with a pleasant shade / T: Many real-world AI implementations
11 Clues: Maker of ChatGPT • Twitter handle for reliable healthcare memes • Excellent ML/AI Consultants / Horrible Crossword Makers • Key to modern neural networks / Why we're all on Twitter • Modern neural network building blocks / Giant media franchise • B: Basic unit of complex life / T: Basic unit of a Jupyter notebook • ...
TECH-DAY 2023-11-02
Across
- The address of a webpage , Check the validity of it before clicking on it.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- A security system protecting networks from threats.
- A global network connecting computers and devices.
- Programs running on computers for specific tasks.
- A numbering system using 0s and 1s, fundamental in computing.
- It Should be constructed of upper- and lower-case letters, numbers, and special characters.
Down
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- A device directing data traffic in networks.
- A closed path for electricity to flow, found in electronic devices.
- A wireless technology standard used over short distances using short-wavelength UHF radio waves.
- A collection of interconnected computers.
- An input device for typing characters and commands.
13 Clues: A collection of interconnected computers. • A device directing data traffic in networks. • Programs running on computers for specific tasks. • A global network connecting computers and devices. • A security system protecting networks from threats. • An input device for typing characters and commands. • A numbering system using 0s and 1s, fundamental in computing. • ...
technology terms by kale Curtis 2023-05-05
Across
- A computer program that can copy itself and infect a computer
- a communication method
- connected to a server in the public internet
- files embedded within online communication channels such as emails, instant messages, or social networks.
- a device that turns text and graphics and transfers it from computer to paper.
Down
- stands for central processing unit
- a computer program or device that provides a service to another computer program and its user.
- is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- stands for Uniform Resource Locator.
- small, movable device that lets you control a range of things on a computer.
- any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- an electronic output device which displays images in pictorial form on the screen.
- for putting information including letters, words and numbers into your computer.
- stands for Portable Document Format.
- worldwide system of computer networks
15 Clues: a communication method • stands for central processing unit • stands for Uniform Resource Locator. • stands for Portable Document Format. • worldwide system of computer networks • connected to a server in the public internet • A computer program that can copy itself and infect a computer • small, movable device that lets you control a range of things on a computer. • ...
Crossword Puzzle 2022-09-21
Across
- Managed ? solutions detects and mitigates cyber-attacks and data loss.
- The Name of Huawei Smartboard
- Up to ?% PSG subsidy
- Eemont can help businesses ? Office Networks
Down
- When you move offices, data and networks need to be ? over.
- The Name of your one-stop solution provider
- Is CloudEngine S5731-S48P4X PoE+ Supported?
7 Clues: Up to ?% PSG subsidy • The Name of Huawei Smartboard • The Name of your one-stop solution provider • Is CloudEngine S5731-S48P4X PoE+ Supported? • Eemont can help businesses ? Office Networks • When you move offices, data and networks need to be ? over. • Managed ? solutions detects and mitigates cyber-attacks and data loss.
zoes crossword on networks 2023-10-09
Across
- a disadvantage of networking computers about unauthorised accsess to data
- what does LAN stand for
- encoding message so if intercepted cannot be intetpreteded
- what does WAN stand for
- s network where only one cable is needed
- what is a method to secure a network from unauthorised accsess
- two or more computers connected to share information and resources
Down
- what does NIC stand for
- a type of LAN
- a type of LAN
- an advantage of networking computers
- a type of network topology where all the devices connected to a centre switch
- a device which connects a LAN to a WAN
- a type of network topology where one computer connects to another in one direction
- what is the name given to any device connected to a network
- piece of equipment needed to set up a LAN
16 Clues: a type of LAN • a type of LAN • what does NIC stand for • what does LAN stand for • what does WAN stand for • an advantage of networking computers • a device which connects a LAN to a WAN • s network where only one cable is needed • piece of equipment needed to set up a LAN • encoding message so if intercepted cannot be intetpreteded • ...
El futuro 2021-01-29
Across
- advantage
- environmental
- immediately
- to change
- economy
- to reduce
- el cambio ________ (climate)
- pollution / contamination
- to save
- to get better
- environment (no space)
- networks las ______ sociales
- to cure
- to increase
- to disappear
- politics
- technology
Down
- news
- trustworthy
- advanced
- illness / disease
- to make easier / facilitate
- economic
- medicine
- la vida _______ (daily)
- ser _____ de (capable)
- to try
- to move
- to get worse
- to discover
- company
- to develop
- disadvantage
33 Clues: news • to try • economy • to save • to move • company • to cure • advanced • economic • medicine • politics • advantage • to change • to reduce • to develop • technology • trustworthy • immediately • to discover • to increase • to get worse • disadvantage • to disappear • environmental • to get better • illness / disease • ser _____ de (capable) • environment (no space) • la vida _______ (daily) • pollution / contamination • ...
Technology 2021-12-23
Across
- Connect to gammepad some fun
- Nicola Tesla
- Just music for ears
- Let's take a photo
- People share and makes videos
- Old music player
- alexander graham bell was what invented ?
- writes for you
- People's future
- All social networks
Down
- watch but smart a little
- Clean Clothes
- Let's clean the carpet
- Writes on computer
- Windows
- Need energy for phone
- Small Computer
- Cold for food
- Move on computer
- Watching film or netflix
20 Clues: Windows • Nicola Tesla • Clean Clothes • Cold for food • Small Computer • writes for you • People's future • Old music player • Move on computer • Writes on computer • Let's take a photo • Just music for ears • All social networks • Need energy for phone • Let's clean the carpet • watch but smart a little • Watching film or netflix • Connect to gammepad some fun • People share and makes videos • ...
Crash Course Computer Science 2018-11-12
Across
- the internet what in leaps and bounds in the decades since
- a second benefit of networks was the ability to what
- although many LAN technologies were developed and deployed the most famous and successful was what developed in the early 1970's at Zerox PARC
- this what if all the computers use the same wait duration so a random period is added
- every computer connected to a network gets a what
- the number of hops a message takes along its route is called the what
- to reduce collisions and improve efficiency, we need to shrink the number of devices on any given shared carrier, what's called the what
- this is essentially how big computer networks are constructed, including the biggest on of all
- the solution is to chop up big transmission into many small pieces called what
Down
- with millions of computers online exchanging data what can appear and disappear in milliseconds
- many computers can simultaneous sense the carrier, hence the sense in multiple access and the rate at which the carrier and transmit data is called its what
- whats interesting about these bigger networks is that there's often multiple paths to get data from one location to another and this brings us to another fundamental networking topic
- another approach for getting data from one place to another is what
- network routers are constantly trying to balance the load across whatever routes they know to ensure speedy and reliable delivery, which is called what
- in its simplest form, a what are connected to a single, common Ethernet cable
- it also had the nice property of being what with no central authority or single point of failure
- as network traffic increases, the probability that two computers will attempt to write data at the same time also increases, this is called what
- Ethernet requires that each computer has a unique media access control address or what
18 Clues: every computer connected to a network gets a what • a second benefit of networks was the ability to what • the internet what in leaps and bounds in the decades since • another approach for getting data from one place to another is what • the number of hops a message takes along its route is called the what • ...
Crash Course Computer Science 2018-11-12
Across
- although many LAN technologies were developed and deployed the most famous and successful was what developed in the early 1970's at Zerox PARC
- every computer connected to a network gets a what
- with millions of computers online exchanging data what can appear and disappear in milliseconds
- network routers are constantly trying to balance the load across whatever routes they know to ensure speedy and reliable delivery, which is called what
- whats interesting about these bigger networks is that there's often multiple paths to get data from one location to another and this brings us to another fundamental networking topic
- the number of hops a message takes along its route is called the what
- in its simplest form, a what are connected to a single, common Ethernet cable
- Ethernet requires that each computer has a unique media access control address or what
- another approach for getting data from one place to another is what
Down
- a second benefit of networks was the ability to what
- it also had the nice property of being what with no central authority or single point of failure
- to reduce collisions and improve efficiency, we need to shrink the number of devices on any given shared carrier, what's called the what
- this is essentially how big computer networks are constructed, including the biggest on of all
- the solution is to chop up big transmission into many small pieces called what
- as network traffic increases, the probability that two computers will attempt to write data at the same time also increases, this is called what
- this what if all the computers use the same wait duration so a random period is added
- the internet what in leaps and bounds in the decades since
- many computers can simultaneous sense the carrier, hence the sense in multiple access and the rate at which the carrier and transmit data is called its what
18 Clues: every computer connected to a network gets a what • a second benefit of networks was the ability to what • the internet what in leaps and bounds in the decades since • another approach for getting data from one place to another is what • the number of hops a message takes along its route is called the what • ...
Tilahune's puzzle 2024-12-07
Across
- ___is The most widely used method for encrypting data
- In Windows OSs,______ is used to encrypt files and folders
- testers who are paid to probe networks and report vulnerabilities
- a framework for other protocols that provide encryption and authentication
- ___is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
- an industry-standard client/server protocol that offers centralized control
- creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- A command-line program commonly used by many Linux administrators to see the current firewall configuration
- used in a Windows domain environment and provides mutual authentication
- True or False: an encrypting system, EFS works in one of three modes: transparent mode, USB key mode, and user authentication mode
- attackers who do not report problems, but instead disseminate the information to other black hat attackers
- True or False: disk quota is a specially allocated disk area that holds information that is swapped back and forth from RAM to disk?
- ___is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
Down
- only backs up files that have changed since the last full backup
- ___is a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity (an administrator enters the same key in the IPsec settings on both devices)
- ___is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- True or False: Data can be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- True or False: acceptable use policy is a security policy describes how users identify themselves to gain access to network resources?
- backs up the disk sector by sector to create an exact image of the disk’s contents
20 Clues: ___is The most widely used method for encrypting data • In Windows OSs,______ is used to encrypt files and folders • only backs up files that have changed since the last full backup • testers who are paid to probe networks and report vulnerabilities • used in a Windows domain environment and provides mutual authentication • ...
Questions - Crossword 6 - Network and Telecommunication 2024-05-21
Across
- Type of connector used in co-axial cables.
- Type of computer network that is limited to a small area.
- Type of computer network that is extended to the whole world.
- Type of cable commonly used for network connections.
- Each computer or device in a network.
- Intelligent device that connects two different networks and determines the best route for data.
Down
- Connects servers to data storage devices via fiber-optic cables.
- Device used to connect various components of computer networks.
- Type of computer network that connects multiple LANs and MANs together.
- Type of computer network that covers an entire city or district.
- Circuit board/interface card used to connect a computer to the network.
- A LAN that uses high frequency radio waves for communication.
12 Clues: Each computer or device in a network. • Type of connector used in co-axial cables. • Type of cable commonly used for network connections. • Type of computer network that is limited to a small area. • Type of computer network that is extended to the whole world. • A LAN that uses high frequency radio waves for communication. • ...
Jared Hernandez Internet Crossword Puzzle 2016-11-30
Across
- USE – doctrine that breif experts of copyright matirieal under certain circumstances
- – what Broswer your on
- -to use electronic communication to bully a person
- -local restricted communications networks
- -esclusive legal right given to an originator or an assignee to print or publish
- –a wall or partition designed to inhibit or prevent the spread of fire
Down
- – a person who uses computers to gain unathorized access to data
- – correct or acceptable way of communication on the internet
- link from hypertext file or document to another location or file
- OPERATORS – are simple words used as conjunctions to combine or exclude keywords in a search
- - list of the books referred to in a schoalry work,usually printed as an appendix
- - to locate books, article,webpage
- – global system of inerconnection computer networks that use inernet protocal suite
- (HOST) –an area of territory owened or controled by ruler or government
- –regularly updated website or webpage, typically ran by an indivisual or small group
15 Clues: – what Broswer your on • - to locate books, article,webpage • -local restricted communications networks • -to use electronic communication to bully a person • – correct or acceptable way of communication on the internet • – a person who uses computers to gain unathorized access to data • link from hypertext file or document to another location or file • ...
Chapter 1&2 2019-03-28
Across
- Type of data representation
- One of the components in data communication
- Path of switching that use dedicated communications for the duration of the conversation
- Process in Presentation layer
- In impairment couses as signal travels through the medium, its strength decreases as distance increases
- One of elements in Protocol
- specialized devices responsible for moving information between networks, are also a common network component.
Down
- A sine wave can be represented by three parameters namely, peak amplitude, _________ and phase
- Types of transmission in digital signal
- Level of addresses are used in an internet employing the TCP/IP protocols that relation to Network lawyer
- Local area network (LAN) contain 3 basic hardware components
- Private networks set up using the same technology as the Internet but only open to users inside an organization
- In communication model it converts data into transmitted signals
- One of the phases in circuit switching
- This layer is responsible for the delivery of individual packets from source to destination
15 Clues: Type of data representation • One of elements in Protocol • Process in Presentation layer • One of the phases in circuit switching • Types of transmission in digital signal • One of the components in data communication • Local area network (LAN) contain 3 basic hardware components • In communication model it converts data into transmitted signals • ...
Cyber Security 2025-01-27
Across
- - A cryptographic tool used to validate the authenticity of digital messages or documents
- - The primary legislation in India dealing with cybercrime and electronic commerce (abbreviation)
- - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- - The use of the internet to conduct violent acts that threaten or harm individuals or governments
- - Section of the IT Act that deals with computer-related offenses
- - The process of collecting and analyzing data from computer systems for legal evidence
- - The fraudulent use of someone else's personal information
- - A special police unit in India dedicated to investigating cybercrimes
Down
- - The use of IT to deliver government services and information to citizens
- - Safeguarding important information from corruption, compromise, or loss
- - The process of converting information into a code to prevent unauthorized access
- - Unauthorized access to computer systems or networks
- - Sending unsolicited messages, often in bulk, via electronic means
- - An entity that issues digital certificates for secure online transactions
- - The practice of protecting systems, networks, and programs from digital attacks
15 Clues: - Unauthorized access to computer systems or networks • - The fraudulent use of someone else's personal information • - Section of the IT Act that deals with computer-related offenses • - Sending unsolicited messages, often in bulk, via electronic means • - A special police unit in India dedicated to investigating cybercrimes • ...
CSP Review Puzzle (CF) 2025-05-02
Across
- - an amount of data compressed into a single network message
- - a type of error during running
- - a type of data which is variable values, not limited to 1s & 0s
- - computing which does each task after another
- - algorithms used to check for errors in data
- - a single sequence of code being executed
Down
- - an identification number for devices on local or small networks (ex. your home & school)
- - an event where a calculated number exceeds the maximum bit size the computer can handle
- - a property of an info source which means it is free to view, distribute, & modify
- - a code framework that is made for a specific purpose (ex. physics & games)
- - multiple copies of essential items (soft or hardware) in case one fails (backups)
- - an identification number for devices on large networks (ex. www & internet)
- - measuring speed for 1,000,000 bytes sent in a second
- - a process where language code is converted into CPU instructions
- - appends an IP to a domain name, like an IP phone book
15 Clues: - a type of error during running • - a single sequence of code being executed • - algorithms used to check for errors in data • - computing which does each task after another • - measuring speed for 1,000,000 bytes sent in a second • - appends an IP to a domain name, like an IP phone book • - an amount of data compressed into a single network message • ...
Xantaro crossword 2025-05-08
Across
- Software designed to manage, monitor, and optimise telecommunications infrastructure.
- Protecting data and infrastructure from cyber threats and unauthorised access.
- Facility used to store and manage large volumes of digital data.
- Telecom equipment company, known for routers and switches, headquartered in California.
- The combining of two or more telecom networks into one unified system.
- Finnish company known for telecom equipment and mobile phone manufacturing.
- Fundamental communication protocol used for routing data across networks.
Down
- The part of a telecom network connecting the customer to the service provider.
- Refers to high-speed communication using light signals through fibre cables.
- Outdoor enclosure housing network equipment for telecom service delivery.
- Outsourced service for monitoring and defending network security in real time.
- Facility providing remote monitoring and management of network systems 24/7.
12 Clues: Facility used to store and manage large volumes of digital data. • The combining of two or more telecom networks into one unified system. • Outdoor enclosure housing network equipment for telecom service delivery. • Fundamental communication protocol used for routing data across networks. • ...
Technology 2021-12-23
Across
- Small Computer
- Watching film or netflix
- watch but smart a little
- Nicola Tesla
- Just music for ears
- Windows
- Move on computer
- Writes on computer
- writes for you
Down
- People's future
- Connect to gammepad some fun
- All social networks
- Clean Clothes
- Let's clean the carpet
- Need energy for phone
- Let's take a photo
- Cold for food
- People share and makes videos
- alexander graham bell was what invented ?
- Old music player
20 Clues: Windows • Nicola Tesla • Clean Clothes • Cold for food • Small Computer • writes for you • People's future • Move on computer • Old music player • Let's take a photo • Writes on computer • All social networks • Just music for ears • Need energy for phone • Let's clean the carpet • Watching film or netflix • watch but smart a little • Connect to gammepad some fun • People share and makes videos • ...
CEH Mod 17_18 Mobile/IOT 2023-10-03
Across
- bypass for iOS
- exploit wifi sync
- allows both user/iboot
- using the text feature
- device/info management
- 802.15, 2.4ghz and needs pairing
- using voice feature
- maliscious code
- user-level access
Down
- seperation of networks/areas
- loudspeaker data attack
- kernel will remain patched
- bluetooth full control
- control of ICS devices
- andriod bypass
- no longer have patched kernel
- using the app stores matrix
- made by google
18 Clues: bypass for iOS • andriod bypass • made by google • maliscious code • exploit wifi sync • user-level access • using voice feature • bluetooth full control • allows both user/iboot • using the text feature • control of ICS devices • device/info management • loudspeaker data attack • kernel will remain patched • using the app stores matrix • seperation of networks/areas • ...
Jared Hernandez Internet Crossword Puzzle 2016-12-01
Across
- global system of inerconnection computer networks that use inernet protocal suite
- what Broswer your on
- link from hypertext file or document to another location or file
- a wall or partition designed to inhibit or prevent the spread of fire
- correct or acceptable way of communication on the internet
- OPERATORS are simple words used as conjunctions to combine or exclude keywords in a search
Down
- (HOST) an area of territory owened or controled by ruler or government
- to locate books, article,webpage
- a person who uses computers to gain unathorized access to data
- local restricted communications networks
- esclusive legal right given to an originator or an assignee to print or publish
- list of the books referred to in a schoalry work,usually printed as an appendix
- USE doctrine that breif experts of copyright matirieal under certain circumstances
- to use electronic communication to bully a person
- regularly updated website or webpage, typically ran by an indivisual or small group
15 Clues: what Broswer your on • to locate books, article,webpage • local restricted communications networks • to use electronic communication to bully a person • correct or acceptable way of communication on the internet • a person who uses computers to gain unathorized access to data • link from hypertext file or document to another location or file • ...
technology terms by kale Curtis 2023-05-05
Across
- A computer program that can copy itself and infect a computer
- a communication method
- connected to a server in the public internet
- files embedded within online communication channels such as emails, instant messages, or social networks.
- a device that turns text and graphics and transfers it from computer to paper.
Down
- stands for central processing unit
- a computer program or device that provides a service to another computer program and its user.
- is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- stands for Uniform Resource Locator.
- small, movable device that lets you control a range of things on a computer.
- any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- an electronic output device which displays images in pictorial form on the screen.
- for putting information including letters, words and numbers into your computer.
- stands for Portable Document Format.
- worldwide system of computer networks
15 Clues: a communication method • stands for central processing unit • stands for Uniform Resource Locator. • stands for Portable Document Format. • worldwide system of computer networks • connected to a server in the public internet • A computer program that can copy itself and infect a computer • small, movable device that lets you control a range of things on a computer. • ...
Crash Course Computer Science 2018-11-12
Across
- the solution is to chop up big transmission into many small pieces called what
- every computer connected to a network gets a what
- as network traffic increases, the probability that two computers will attempt to write data at the same time also increases, this is called what
- Ethernet requires that each computer has a unique media access control address or what
- a second benefit of networks was the ability to what
- many computers can simultaneous sense the carrier, hence the sense in multiple access and the rate at which the carrier and transmit data is called its what
- network routers are constantly trying to balance the load across whatever routes they know to ensure speedy and reliable delivery, which is called what
- this is essentially how big computer networks are constructed, including the biggest on of all
Down
- to reduce collisions and improve efficiency, we need to shrink the number of devices on any given shared carrier, what's called the what
- whats interesting about these bigger networks is that there's often multiple paths to get data from one location to another and this brings us to another fundamental networking topic
- it also had the nice property of being what with no central authority or single point of failure
- this what if all the computers use the same wait duration so a random period is added
- in its simplest form, a what are connected to a single, common Ethernet cable
- another approach for getting data from one place to another is what
- with millions of computers online exchanging data what can appear and disappear in milliseconds
- the number of hops a message takes along its route is called the what
- the internet what in leaps and bounds in the decades since
- although many LAN technologies were developed and deployed the most famous and successful was what developed in the early 1970's at Zerox PARC
18 Clues: every computer connected to a network gets a what • a second benefit of networks was the ability to what • the internet what in leaps and bounds in the decades since • another approach for getting data from one place to another is what • the number of hops a message takes along its route is called the what • ...
Vocabulary for using the internet 2025-07-25
Across
- a private network is a computer network that uses a private address space of IP addresses
- it has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers
- is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
- is a family of wired computer networking technologies commonly used in local area networks
- a globally routable unicast IP address, meaning that the address is not an address reserved for use in private networks
- ... are distinct from routers or switches in that they communicate using more than one protocol to connect multiple networks and can operate at any of the seven layers of the OSI model
Down
- 32-bit number that separates an IP address into two parts: the network ID and the host ID. It tells devices which portion of the address belongs to the network and which identifies individual devices
- is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment
- a numerical label such as 192.0.2.1 that is assigned to a device connected to a computer network that uses the Internet Protocol for communication
- s one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as ...
- A router is connected to two or more data lines from different IP networks. When a data packet comes in on a line. It reads the network address information in the packet header to determine the ultimate destination
11 Clues: a private network is a computer network that uses a private address space of IP addresses • is a family of wired computer networking technologies commonly used in local area networks • a globally routable unicast IP address, meaning that the address is not an address reserved for use in private networks • ...
English for IT session 2 2025-04-16
Across
- The process of finding and fixing errors in code.
- The physical components of a computer system.
- The process of converting data into a secure format.
- An organized collection of data, generally stored and accessed electronically.
- A device that forwards data packets between computer networks.
- A network security system that monitors and controls incoming and outgoing traffic.
- Address A unique identifier for a device on a network.
Down
- A system of interconnected devices that communicate with each other.
- A device or program that requests services or resources from a server.
- A storage solution that enables users to save data online.
- A set of rules governing data exchange within or between networks.
- A computer that provides data to other computers in a network.
- A set of rules or steps to solve a problem or complete a task.
- Programs and operating information used by a computer.
- The maximum amount of data that can be transmitted over a network.
15 Clues: The physical components of a computer system. • The process of finding and fixing errors in code. • The process of converting data into a secure format. • Programs and operating information used by a computer. • Address A unique identifier for a device on a network. • A storage solution that enables users to save data online. • ...
Computer 2025-05-28
Across
- A program or set of program that disrupts the normal functioning of a computer.
- A device that connects two different types of network to each other.
- This device enables you to connect your computer to the available networks over the existing telephone lines.
- A security system that prevents unauthorized people from accessing system and network.
- Process of transferring data into unreadable code.
- A computer network that allows controlled access to an informational source available on the internet.
- Criminal activities that involve the use of computers, networks and the internet.
Down
- Purchasing a single licensed copy of the software and load it onto several computers contrary to the license's terms.
- Combination of 'net' and 'etiquette'
- Unwanted bulk emails coming from unknown sources.
- A computer network restricted to an organization
- A malicious technique of tricking a web user into clicking on something different from what the user perceive.
- An illegal intrusion into a computer system or network.
- Converting encrypted data into readable form.
- Each computer in a network
15 Clues: Each computer in a network • Combination of 'net' and 'etiquette' • Converting encrypted data into readable form. • A computer network restricted to an organization • Unwanted bulk emails coming from unknown sources. • Process of transferring data into unreadable code. • An illegal intrusion into a computer system or network. • ...
Spanish vacab 2024-02-27
Across
- portátil laptop
- La red internet
- electrónico email address
- Health
- web website
- to comment
- to update
- to download
- password
- to upload
- de texto text message
- internet to connect to the internet
Down
- la red to surf the web
- celular/el móvil cell phone
- illness/ disease
- electrónicos electronic devices
- internet to disconnect from the internet
- to add pic/video
- online
- symptoms
- sociales social networks
- cure
- usuario username
23 Clues: cure • Health • online • symptoms • password • to update • to upload • to comment • to download • illness/ disease • to add pic/video • La red internet • portátil laptop • web website • la red to surf the web • usuario username • celular/el móvil cell phone • sociales social networks • de texto text message • electrónico email address • ...
MUDE 2024-06-07
Across
- Organizational control.
- Data analysis.
- Information, often numerical.
- Earth-related engineering.
- Forces and motions.
- Potential hazards.
- Substances for construction.
- Moral principles.
- Upkeep and repair.
- Efficiency improvement.
- Imitation of operation.
- Movement of goods or people.
Down
- Long-term viability.
- Programming computers.
- City development.
- Constructed buildings or frameworks.
- Fluids in motion.
- Combining fields.
- Physical behaviors.
- Choices made.
- Complex networks.
- Surrounding natural world.
- Available supplies.
- Weather patterns.
- Information exchange.
- Simulating real-world systems.
- Lack of sureness.
27 Clues: Choices made. • Data analysis. • City development. • Fluids in motion. • Combining fields. • Complex networks. • Weather patterns. • Moral principles. • Lack of sureness. • Potential hazards. • Upkeep and repair. • Physical behaviors. • Available supplies. • Forces and motions. • Long-term viability. • Information exchange. • Programming computers. • Organizational control. • Efficiency improvement. • ...
NETWORKS & CONTROL SYSTEMS 2015-03-30
Across
- STORES ELECTROSTATIC ENERGY
- IMAGINARY PART OF ADMITTANCE
- RATIO OF R.M.S TO AVG VALUE OF AC QUANTITY
- CONDITION WHERE OSCILLATIONS REACH MAXIMUM AMPLITUDE
Down
- WHICH PLOT HAS MAGNITUDE & PHASE
- TAKE INPUT AS ERROR SIGNAL
- WATTLESS POWER
- TIME TO REACH 10% OF STEADY VALUE
- THEOREM APPLICABLE TO ANY NETWORK
- WHERE 2 OR MORE BRANCHES MEET
10 Clues: WATTLESS POWER • TAKE INPUT AS ERROR SIGNAL • STORES ELECTROSTATIC ENERGY • IMAGINARY PART OF ADMITTANCE • WHERE 2 OR MORE BRANCHES MEET • WHICH PLOT HAS MAGNITUDE & PHASE • TIME TO REACH 10% OF STEADY VALUE • THEOREM APPLICABLE TO ANY NETWORK • RATIO OF R.M.S TO AVG VALUE OF AC QUANTITY • CONDITION WHERE OSCILLATIONS REACH MAXIMUM AMPLITUDE
Rashid's Networks Crossword 2017-09-25
Across
- information in a huge variety of formats is on there
- Whenever any computer connects to a website, its IP (Internet Protocol) address is read by the website. If the client server wants to keep its identity under wraps it uses this device.
- it enables users to communicate with others and access the internet while on the move.
Down
- there is no central administration, here in this architecture there is a centralized control.
- a network suitable and capable to be operated in a building.
- connects computes together but.
- It masks you into networks however it limits your bandwidth.
- switches are much better than this device.
- a type of network that is capable to connect parts of a business together from different buildings.
- this device works on both lan and wan however it has a complicated set-up
10 Clues: connects computes together but. • switches are much better than this device. • information in a huge variety of formats is on there • a network suitable and capable to be operated in a building. • It masks you into networks however it limits your bandwidth. • this device works on both lan and wan however it has a complicated set-up • ...
computer networks 2 2024-06-14
Across
- Link between two or more devices on a network.
- Process of converting information into a secure format.
- Amount of data that can be transmitted in a fixed amount of time.
- Group of interconnected computers.
- To exchange information over a network.
Down
- Set of rules for data communication.
- Type of network that uses radio waves to connect devices.
- To send data to a remote system.
- The process of sending data from one place to another.
- To receive data from a remote system.
10 Clues: To send data to a remote system. • Group of interconnected computers. • Set of rules for data communication. • To receive data from a remote system. • To exchange information over a network. • Link between two or more devices on a network. • The process of sending data from one place to another. • Process of converting information into a secure format. • ...
unit 7 2015-12-16
Across
- way of living
- independent
- costs for location
- energy from crops
- energy from the sun
- costs associated with transportation
- energy produced by wind
- energy produced by water
- education retail and wholesale
Down
- highly developed country
- europe northamerica and east asia
- a large quantity of
- slave trade
- professional financial and transportation
- products from the earth
- federal, government and state government
- everybody wants
- costs associated with transportation networks
- woman equal to man
- processing and construction
20 Clues: independent • slave trade • way of living • everybody wants • energy from crops • costs for location • woman equal to man • energy from the sun • a large quantity of • products from the earth • energy produced by wind • highly developed country • energy produced by water • processing and construction • education retail and wholesale • europe northamerica and east asia • ...
Name: __________________Period:________ 2024-12-05
Across
- Codes of behavior that are sometimes, but not always, enforced by laws
- Ongoing effort to protect networks connected to the Internet
- A computer program that attaches itself to other executable files on the computer
- Any code that can steal data, bypass access, or cause harm to a system
- Design to automatically deliver advertisements to a user
- Replicates itself to spread from one computer to another
- A technique that allows suspicious files to be analyzed in a safe environment.
Down
- Any information about you, a company or organization
- An Internet-based conflict that involves the networks of other nations
- Hardware or software that prevents hackers from accessing your data
- A decoys to sneak malicious software past unsuspecting users
- A program that scans a computer for malicious software and deletes it
12 Clues: Any information about you, a company or organization • Design to automatically deliver advertisements to a user • Replicates itself to spread from one computer to another • Ongoing effort to protect networks connected to the Internet • A decoys to sneak malicious software past unsuspecting users • ...
MM 2013-02-10
Across
- Internet service provider.
- An image with a ratio greater than standard.
- Random Access memory.
- A network of networks.
- High definition multimedia interface.
- Electronic mail.
Down
- Bitmap Image.
- GB
- A compact disk to store data.
- A set of rules.
- Musical Instruments Digital Interface.
- Portable document format.
- Internet protocol.
13 Clues: GB • Bitmap Image. • A set of rules. • Electronic mail. • Internet protocol. • Random Access memory. • A network of networks. • Portable document format. • Internet service provider. • A compact disk to store data. • High definition multimedia interface. • Musical Instruments Digital Interface. • An image with a ratio greater than standard.
Software 2025-10-30
Across
- Algorithm that rearranges a collection of elements in an ascending or descending order.
- To divide and manage hardware resources.
- Allows one physical machine to run multiple OS at once.
- The practice of protecting systems, networks, and programs from digital attacks.
- Focuses on how a product looks and how users experience it.
- A language for accessing and managing database data.
Down
- A collection of code and instructions that direct computer operations.
- A global communication system that links together thousands of individual networks.
- Software that runs on a device to carry out user-defined functions.
- Central software that manages both a computer’s hardware and software.
- A theory on how much resource an algorithm takes as the input size grows larger.
- An attack where hackers run harmful scripts in a trusted website’s pages.
12 Clues: To divide and manage hardware resources. • A language for accessing and managing database data. • Allows one physical machine to run multiple OS at once. • Focuses on how a product looks and how users experience it. • Software that runs on a device to carry out user-defined functions. • A collection of code and instructions that direct computer operations. • ...
Crossword puzzle 2022-09-30
13 Clues: a screen • the backbone • binary digits • portable memory • read-only memory • wide area network • short term memory • local are network • basic input/output • the brain of the computer • network internal face card • it handles all parts of the network • things to connect all networks together
Vocabulario de tecnologia 2025-03-04
Across
- enfermedad
- comentar
- descargar
- cura
- sintomas
- actualizar
- anadir/agregar-foto/video
- Nombre-de-usario
- salud
- conectarse-al-internet
- desconectarse-del-internet
Down
- El-correo-electronico
- El-internet
- La-computadora-portatil
- Las-redes-sociales
- El-mensaje-de-texto
- Los-aparatos-electronicos
- Navegar-en-la-red
- subir
- El-telefono
- La-pagina-web
- contrasena
- En-linea
23 Clues: cura • subir • salud • comentar • sintomas • En-linea • descargar • enfermedad • actualizar • contrasena • El-internet • El-telefono • La-pagina-web • Nombre-de-usario • Navegar-en-la-red • Las-redes-sociales • El-mensaje-de-texto • El-correo-electronico • conectarse-al-internet • La-computadora-portatil • Los-aparatos-electronicos • anadir/agregar-foto/video • desconectarse-del-internet
La rafle du Vel d'Hiv 2025-04-29
Across
- Jews
- Persecution
- Statute
- Demarcation
- Concentration camp
- Convoy (often referring to deportation trains)
- Curfew
- Underground/secrecy
- - Collaborator
- Exodus (mass departure of civilians)
- Denunciation
- d'Hiver (Vel d'Hiv) - Winter Velodrome
- Network (often referring to resistance networks)
- The Holocaust
- Liberation
- (f.) - The Occupation
- Black market
Down
- Rationing
- (f.) - The Resistance
- Collaborator (informal)
- star
- German secret police
- (m.) - Anti-Semitism
- Propaganda
- (f.) - Roundup
- Rural resistance group
- (f.) - Deportation
27 Clues: Jews • star • Curfew • Statute • Rationing • Propaganda • Liberation • Persecution • Demarcation • Denunciation • Black market • The Holocaust • (f.) - Roundup • - Collaborator • Concentration camp • (f.) - Deportation • Underground/secrecy • German secret police • (m.) - Anti-Semitism • (f.) - The Resistance • (f.) - The Occupation • Rural resistance group • Collaborator (informal) • ...
Experiencias A. Ocio 4. Prácticas culturales 2023-09-22
Across
- Online gaming
- To go and see a play at the theater
- To listen to the radio
- Leisure centre
- To attend
- To go and see a film at the cinema
- To go to a concert
- Board game
- Video
- Television
- Reading
- Digital technology
Down
- exhibition at a museum
- Holiday camp
- Electronic game
- To educate yourself
- To play cards
- Social networks
- To see a (musical/dance/circus) show
- Youth magazines
- To play chess
21 Clues: Video • Reading • To attend • Board game • Television • Holiday camp • Online gaming • To play cards • To play chess • Leisure centre • Electronic game • Social networks • Youth magazines • To go to a concert • Digital technology • To educate yourself • exhibition at a museum • To listen to the radio • To go and see a film at the cinema • To go and see a play at the theater • ...
Hufflepuff Crossword 2019-04-24
Across
- A protocol that helps allow WiFi signals to be sent and received without having a collision
- A protocol that converts a locally dynamic IP into a public IP
- A bit is transmitted one at a time
- The capacity of a system in which data can be sent
- An organisation that allocates domain names and IP addresses
- A unique code that identifies a particular device on a network
Down
- A method of dividing a network into multiple smaller networks
- A central system and nodes connect to it
- The global computing system of WAN networks
- A method of routing data through additional ports
- A socket is an endpoint of a communication flow across a computer network
- The rate at which data is actually being submitted
12 Clues: A bit is transmitted one at a time • A central system and nodes connect to it • The global computing system of WAN networks • A method of routing data through additional ports • The capacity of a system in which data can be sent • The rate at which data is actually being submitted • An organisation that allocates domain names and IP addresses • ...
NETWORKS & CONTROL SYSTEMS 2015-03-30
Across
- WATTLESS POWER
- WHICH PLOT HAS MAGNITUDE & PHASE
- STORES ELECTROSTATIC ENERGY
- imaginary part of admittance
- THEOREM APPLICABLE TO ANY NETWORK
- RATIO OF R.M.S TO AVG VALUE OF AC QUANTITY
- TIME TO REACH 10% OF STEADY VALUE
Down
- CONDITION WHERE OSCILLATIONS REACH MAXIMUM AMPLITUDE
- WHERE 2 OR MORE BRANCHES MEET
- TAKE INPUT AS ERROR SIGNAL
10 Clues: WATTLESS POWER • TAKE INPUT AS ERROR SIGNAL • STORES ELECTROSTATIC ENERGY • imaginary part of admittance • WHERE 2 OR MORE BRANCHES MEET • WHICH PLOT HAS MAGNITUDE & PHASE • THEOREM APPLICABLE TO ANY NETWORK • TIME TO REACH 10% OF STEADY VALUE • RATIO OF R.M.S TO AVG VALUE OF AC QUANTITY • CONDITION WHERE OSCILLATIONS REACH MAXIMUM AMPLITUDE
Types of Networks 2024-09-30
Across
- The route data takes in a network
- A point in a network that sends or receives data
- A device that connects and filters traffic between network segments
- A device that provides data or services on a network
Down
- A formatted unit of data for transmission, including control info
- A device that connects devices in a LAN and directs data
- A utility that tests a host's reachability and response time
- A device that connects multiple devices and broadcasts data
- A connection enabling data transmission between nodes
- Short for "network," a system of interconnected devices
10 Clues: The route data takes in a network • A point in a network that sends or receives data • A device that provides data or services on a network • A connection enabling data transmission between nodes • Short for "network," a system of interconnected devices • A device that connects devices in a LAN and directs data • ...
NEW GENERATION NETWORKS 2024-12-17
Across
- Protocol for high-speed packet switching
- Integration of different network technologies
- High-speed internet connection technology
Down
- Basic unit of data transmission in NGNs
- Device connecting multiple devices within a network
- Quality of Service guarantee in NGNs
- Voice communication over internet protocol
- Device connecting multiple networks and routing data
- Next-generation network architecture
- Software-defined networking technology
10 Clues: Quality of Service guarantee in NGNs • Next-generation network architecture • Software-defined networking technology • Basic unit of data transmission in NGNs • Protocol for high-speed packet switching • High-speed internet connection technology • Voice communication over internet protocol • Integration of different network technologies • ...
morsecode 2025-06-11
Networks Lesson 1-3 2022-11-04
Across
- take any incoming data and broadcast (copy and send) it to all other devices connected to it.
- A type of connection used in a network. Each device has equal responsibility. They can act as both client and server.
- Required if there are multiple wired connections on the network. The switch is responsible for connecting data to the correct wired device.
- A network of computers that connects devices within the locality of a person.
- Is two or more computers connected together, sharing resources.
Down
- There are two main roles: the client and the server. Clients make requests and servers fulfil the requests.
- Used to connect a LAN to another LAN. When a network becomes too large, it can cause lots of traffic as data moves through it. Helps to reduce the traffic by segmenting the network.
- Connects to a wired network and provides a wireless network radio signal for wireless devices to connect to.
- Used to connect multiple wired devices together.
- Enables a wired network connection between a computer and another networked device.
- Responsible for moving data from one network to another.
- A network of computers that covers a small locality.
- address Every network interface card has a unique address. This unique, physical address is used to locate devices on the network.
- A network of computers that covers a large geographical area.
14 Clues: Used to connect multiple wired devices together. • A network of computers that covers a small locality. • Responsible for moving data from one network to another. • A network of computers that covers a large geographical area. • Is two or more computers connected together, sharing resources. • ...
Xantaro crossword 2025-05-08
Across
- Facility providing remote monitoring and management of network systems 24/7.
- Outdoor enclosure housing network equipment for telecom service delivery.
- Protecting data and infrastructure from cyber threats and unauthorised access.
- The combining of two or more telecom networks into one unified system.
- Finnish company known for telecom equipment and mobile phone manufacturing.
Down
- Refers to high-speed communication using light signals through fibre cables.
- The part of a telecom network connecting the customer to the service provider.
- Facility used to store and manage large volumes of digital data.
- Software designed to manage, monitor, and optimise telecommunications infrastructure.
- Outsourced service for monitoring and defending network security in real time.
- Telecom equipment company, known for routers and switches, headquartered in California.
- Fundamental communication protocol used for routing data across networks.
12 Clues: Facility used to store and manage large volumes of digital data. • The combining of two or more telecom networks into one unified system. • Outdoor enclosure housing network equipment for telecom service delivery. • Fundamental communication protocol used for routing data across networks. • ...
Units 3 & 4 Vocabulary 2022-11-07
Across
- Filtering through all the interesting content across the web.
- Link popularity so its pages can become easily findable.
- Image of a particular brand of goods or services.
- Sending messages of an intimidating or threatening nature.
- A marketing strategy that leverages a business employees networks to increase brand awareness.
- An internet advertising model used to drive traffic to websites.
- The process of luring someone into a relationship by means of a fictional online persona.
- Good automation tools help businesses identify their audience.
- This represents how many people looked at one’s post.
- The specific group of people desired by various groups.
- A business methodology that attracts customers by creating valuable content.
- Since others are doing it, I should be doing it, too.
Down
- The use of social media networks to manage and grow an organization’s online presence.
- The number of times one’s content is displayed.
- A user on social media who has established credibility in a specific industry.
- This is someone who supports one’s brand on social media.
- A person who has subscribed.
- Any marketing methods conducted through electronic devices.
- This is how one’s communication style reflects on their brand.
- The services of a large number of people, either paid or unpaid.
20 Clues: A person who has subscribed. • The number of times one’s content is displayed. • Image of a particular brand of goods or services. • This represents how many people looked at one’s post. • Since others are doing it, I should be doing it, too. • The specific group of people desired by various groups. • Link popularity so its pages can become easily findable. • ...
TNM Event 1 2022-10-12
Across
- A database contains the object values.
- Failure of a networking component is called
- A encoding structure used in SNMP
- point at which public switched network ends and the private network of customer's begin.
- a network of networks
- A device used for the conversion of analog<->digital signals
- connection oriented protocol
- Building block in application layer , used to meet the need of the applications.
- SNMP is a ____________________layer protocol
- a protocol support for request/reply paradigm
- Which management is the most widely used NMS?
- a less intelligent networking element used in physical layer
- Formal language developed for data transfer between systems
- A Management standard adopted by ISO
Down
- A service used to report an occurrence of an event.
- --------------- converts data into a SNMP compatible set
- Grouping Services into units of functionality.
- A manager process running in them
- a model which is concerned with structure and storage of information
- Asynchronous reports or unsolicited messages by an agent
- how many messages are transmitted between manager and agent in SNMP?
- a protocol defined for exchange the management information.
- A passage to connect 2 networks together
- A static virtual database is called
- Does SNMPv1 use TCP or UDP?
- used to validate the managing or managed entity
26 Clues: a network of networks • Does SNMPv1 use TCP or UDP? • connection oriented protocol • A encoding structure used in SNMP • A manager process running in them • A static virtual database is called • A Management standard adopted by ISO • A database contains the object values. • A passage to connect 2 networks together • Failure of a networking component is called • ...
Functionality and performance of network systems 2023-09-14
Across
- Rules and functions for efficient data communications.
- The physical pathway that connects devices in a linear fashion for data transmission within a network.
- Hardware address that uniquely identifies devices on a network, enabling data transfer.
- Has parameters such as admission control and fault tolerance.
- Network application which offers human interface,
- Network ______ is the fluctuation of delay.
- Sets of network protocols and services that enable communication between devices on a network.
- Devices that direct data between different networks, facilitating efficient communication.
- The central unit that manages data processing and routing.
- Data movement between networking devices.
Down
- Promotes benchmarks which enable system developers to choose the appropriate embedded microproccessor for their designs.
- A quantitative parameter which measures completion rates of fundamental data units.
- A type of parameters which capture the characteristics of the network overall rather than the network systems themselves.
- Small units of data that carry information across networks, facilitating efficient communication.
- A packetized network technology.
- Storage for frequently accessed data in a network to enhance performance.
- Direct Memory Access
- Network service with low throughput and packet loss.
- The process of sending data from one device to another across a network.
- High-capacity data transmission technology for fast internet access.
20 Clues: Direct Memory Access • A packetized network technology. • Data movement between networking devices. • Network ______ is the fluctuation of delay. • Network application which offers human interface, • Network service with low throughput and packet loss. • Rules and functions for efficient data communications. • The central unit that manages data processing and routing. • ...
Crossword 6 2017-09-09
Across
- relationship between two things
- send letter electronically
- 1024bytes
- peer to peer download
- allows to you connect remote network
- part of computer processor
- name of arrow
Down
- most common OS
- input device using laser
- display list of commands
- name of chocolate
- input device for gaming
- network of networks
- address on address bar
- abbreviation for Graphic User Interface
- a computer virus
16 Clues: 1024bytes • name of arrow • most common OS • a computer virus • name of chocolate • network of networks • peer to peer download • address on address bar • input device for gaming • input device using laser • display list of commands • send letter electronically • part of computer processor • relationship between two things • allows to you connect remote network • ...
Living in the IT Era 2024-10-06
Across
- used to select items on the screen and to give instructions to your computer to perform tasks.
- A battery- or AC-powered personal computer (PC) smaller than a briefcase.
- It connects to the internet through satellites orbiting the Earth.
- A vast network that connects computers all over the world.
- A combined device for modulation and demodulation
- A series of keys you can press to complete a computer command.
- A telecommunication medium for transmitting moving images and sound.
- All the physical parts of a computer.
- A device that converts electrical signals into sound waves.
Down
- A form of interactive multimedia used for entertainment played on a personal computer.
- An electronic machine that processes raw data to give information as output.
- An electronic device with a screen used for display
- A pointing and controlling device that is used to control the object on the screen
- Works by connecting to cellular networks using radio waves.
- The sum of all values divided by the total number of values.
- The programs and other operating information used by a computer.
- Also known as Electronic Mail
- A device that connects two or more packet-switched networks or subnetworks.
18 Clues: Also known as Electronic Mail • All the physical parts of a computer. • A combined device for modulation and demodulation • An electronic device with a screen used for display • A vast network that connects computers all over the world. • Works by connecting to cellular networks using radio waves. • A device that converts electrical signals into sound waves. • ...
Unit 4 - Networks 2021-08-30
Across
- A network which connects computers on a single site
- two or more computers connected together to share resources
- such as DSL and cable
- allowing a supplier to access your network
- webpages contain information structured in this language
Down
- biggest network in the world
- processes requests
- telephone system
- conevrts signals
- expensive internet connection that uses dishes
10 Clues: telephone system • conevrts signals • processes requests • such as DSL and cable • biggest network in the world • allowing a supplier to access your network • expensive internet connection that uses dishes • A network which connects computers on a single site • webpages contain information structured in this language • ...
Social Networks Crossword 2021-10-22
Across
- a collection of connected nodes
- presenting information based on what you know about a user
- people who interact with a lot of other people
- Facebook network’s equivalence of nodes
Down
- a relationship where people are connected to each other in the same way
- a node connected to a group of people only by one other person
- Facebook network’s equivalence of links
- some argue that Facebook’s use of social networks is this
- clusters of nodes in a social network
- a specific part or unit of a network
10 Clues: a collection of connected nodes • a specific part or unit of a network • clusters of nodes in a social network • Facebook network’s equivalence of links • Facebook network’s equivalence of nodes • people who interact with a lot of other people • some argue that Facebook’s use of social networks is this • presenting information based on what you know about a user • ...
20EC503_Data Communication Networks 2023-09-26
Across
- A smart city project requires the creation of a wireless sensor network to monitor traffic flow and environmental conditions
- provides a connection-oriented reliable service for sending messages
- Finding the MAC address that corresponds to an IP address
- maximum number of devices that can be connected in a Bluetooth piconet?
- protocol primarily used for home automation, building automation, and industrial control applications.
Down
- commonly used to link components of a LAN
- In which Bluetooth layer is the L2CAP protocol located?
- An interconnected collection of piconet is called
- Tell A bluetooth network is called
- Bluetooth profile is used for wireless audio streaming
10 Clues: Tell A bluetooth network is called • commonly used to link components of a LAN • An interconnected collection of piconet is called • Bluetooth profile is used for wireless audio streaming • In which Bluetooth layer is the L2CAP protocol located? • Finding the MAC address that corresponds to an IP address • ...
Set 2 2022-10-16
Across
- An open ecosystem for interchangeable AI models
- A node in a neural network
- A Python library that allows you to define, optimize and evaluate mathematical expressions
- A Neural Network model whose goal is to predict the input itself, typically through a bottleneck
Down
- A Network that won ILSVRC 2012 competition
- A form of regularization used in training deep neural networks
- A dedicated silicon that is designed for processing computer vision media including images and video
- Popular database for handwritten digits
- A software library that specializes in real-time computer vision algorithms
- Invented to prevent the vanishing gradient problem in Recurrent Neural Networks by using a memory gating mechanism
10 Clues: A node in a neural network • Popular database for handwritten digits • A Network that won ILSVRC 2012 competition • An open ecosystem for interchangeable AI models • A form of regularization used in training deep neural networks • A software library that specializes in real-time computer vision algorithms • ...
Kiara inglese bullismo e cyber bullismo 2021-11-20
Across
- one of the many words bullies say to a victim: L...
- names used to make fun of a victim
- synonym for it is arrogant, arrogance
- news indicates articles with invented information
- when you are a victim you have a lot ... cyberbullying bullying is also transmitted on social networks
- he is not confident in front of others, and is unable to react
Down
- anything bad about people's skin color down
- he is a boy or a girl, he is arrogant, and thinks he is superior to the victim
- one of the social networks starting with I.
- When you do this, you speak bad of a person
10 Clues: names used to make fun of a victim • synonym for it is arrogant, arrogance • anything bad about people's skin color down • one of the social networks starting with I. • When you do this, you speak bad of a person • news indicates articles with invented information • one of the many words bullies say to a victim: L... • ...
Quiz 2023-04-03
Across
- The external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- The electronic holding place for the instructions and data a computer needs to reach quickly. I
- A set of instructions, data or programs used to operate computers and execute specific tasks.
- A node that broadcasts data to every computer or Ethernet-based device connected to it.
- A place where power or information leaves a system.
- Wireless distribution method for two or more devices.
Down
- These device manage the traffic between the networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
- A physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network (WLAN) with a router connected to an Internet service provider.
- The part of the computer network infrastructure that interconnects different networks and provides a path for exchange of data between these different networks.
- Emulation programs that allow you to log into a remote host.
10 Clues: A place where power or information leaves a system. • Wireless distribution method for two or more devices. • Emulation programs that allow you to log into a remote host. • A node that broadcasts data to every computer or Ethernet-based device connected to it. • A set of instructions, data or programs used to operate computers and execute specific tasks. • ...
Tv Chapter 01 2016-08-09
Across
- A corporation that bundles a collection of programs (sports, news, and entertainment) and makes the program bundles available exclusively to its affiliates. Generally, networks produce some of their own programming, but do not produce all of their own programs.
- Facilities with sufficient staff and equipment to produce multi-camera, large- budget programming shot on location or in studios for broadcast networks or cable networks.
- Programming made in a specific geographic area, to be shown to the public in that same geographic area.
- Fee-for- service programming where customers pay scheduled fees based on the selected programming package. The television signals are transported by satellite transmission, by underground cables, or a combination of both.
- The process of making a specified number of program episodes available for “lease” to other networks or individual broadcast stations, after the current network’s contract for the program expires.
- A broadcast station that has aligned itself with a particular network. The network provides a certain number of hours of daily programming. The affiliate is responsible for providing the remainder of programming to fill the daily schedule.
- The television signal travels through the air from one antenna to another antenna.
Down
- This type of television production facility is “for-profit.” The television signal is sent via a transmitter tower through the air and is free for anyone with an antenna to receive it.
- television A form of CCTV that is usually, but not always, used for security purposes. The cameras used in the system are always interconnected to a closed circuit television system.
- Television where the signal is sent through wires and serves only an extremely small, private predetermined area.
- Television that aims to inform the public about various topics. This includes television programming that supports classroom studies and replays classroom sessions.
- Businesses with limited staff and equipment resources. They thrive on producing videos of weddings, commercials for local businesses, home inventories for insurance purposes, seminars, legal depositions, and real estate videos.
- Television that communicates relevant information to a specific audience, such as job training videos. Also commonly called corporate television.
- Videotaped records of family events and activities taken by someone using a consumer camcorder.
- A television advertisement for a product or service. Also commonly called a spot.
15 Clues: A television advertisement for a product or service. Also commonly called a spot. • The television signal travels through the air from one antenna to another antenna. • Videotaped records of family events and activities taken by someone using a consumer camcorder. • ...
Computer Hardware Crossword 2025-04-28
Across
- Used to connect to wireless networks
- Pointing Device
- Main circuit boards
- Displays visual output
- sound output device
- Type of memory used for long term storage
- Graphics processing unit
Down
- Used to input audio
- Input Device for typing
- High speed storage
- Portable storage device
- Wireless network device
- Cools the CPU
- Stores data temporarily
- Central Processing Unit
- Portable computer
16 Clues: Cools the CPU • Pointing Device • Portable computer • High speed storage • Used to input audio • Main circuit boards • sound output device • Displays visual output • Input Device for typing • Portable storage device • Wireless network device • Stores data temporarily • Central Processing Unit • Graphics processing unit • Used to connect to wireless networks • ...
corps of signals 2023-01-11
Across
- the use of radio waves to transmit and receive information, a primary means of communication for the corps of signals
- a military branch that specializes in communications, responsible for providing and maintaining the communication systems and networks used by a military force.
- the use of speech to convey information, one of the primary means of communication for the corps of signals
- communications: the use of satellites to transmit and receive information, a key capability of the corps of signals
- a group of interconnected devices and systems that can exchange information and share resources
- the practice of protecting communication systems, networks and data from unauthorized access or attack
Down
- ios or smartphones, to communicate, an essential capability for the corps of signals
- a communication facility that receives a signal from one source and retransmits it on to another, used by the corps of signals to extend the range of communication networks.
- the process of converting plain text into a coded form to protect the information from unauthorized access
- the use of light-carrying fibers to transmit information, a technology used by the corps of signals for high-speed data transfer
10 Clues: ios or smartphones, to communicate, an essential capability for the corps of signals • a group of interconnected devices and systems that can exchange information and share resources • the practice of protecting communication systems, networks and data from unauthorized access or attack • ...
Computers, Operating Systems and Networks 2020-12-11
Across
- also called hard disk
- An application that has multiple programs.
- Os An Operating system
- Random Access Memory
- Solid State Drives
- can be input, if they are used to enter information to the computer or output, if through them, the computer returns the information.
- is the logical part of a computer system, which is made up of programs, data, drivers, etc.
- are several cables linked in parallel.
- Peripheral Component Interconnect
- are the means for the PC to communicate with the outside world
- is a device based on circuits that allow the limited storage of information and its subsequent retrieval.
Down
- a printed circuit board to which the components that make up the computer are connected.
- Keeps the system time and BIOS settings when the computer is off.
- It is divided into two groups: The CPU or central processing unit, and the peripherals.
- An Operating system
- allows it to perform basic functionalities, such as device tests, video and keyboard operation, device recognition and operating system loading.
- Central Processing Unit.
- It is what provides the electrical energy within the CPU.
- An Operating system
- Accelerated Graphics Port
- serves as the connection center between the microprocessor, the random access memory (RAM), the expansion slots and other devices.
- is a bus interface for data transfer between storage drives to the motherboard.
22 Clues: Solid State Drives • An Operating system • An Operating system • Random Access Memory • also called hard disk • Os An Operating system • Central Processing Unit. • Accelerated Graphics Port • Peripheral Component Interconnect • are several cables linked in parallel. • An application that has multiple programs. • It is what provides the electrical energy within the CPU. • ...
Communication Networks and the Internet 2020-08-29
Across
- Is a form of wireless communication designed to share information
- __________ Digital Subscriber Line
- An international network of networks that connects computers worldwide.
- A __________ consists of a collection of computers that share information and communicate with each other over a network.
- A WAN can connect networks across a large _____________ area, such as a city or country.
- LANS can be divided into _______ categories based on how the computers communicate with one another.
- A peer-to-peer network allows every computer to _______ directly.
- Data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
Down
- A device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
- The range of a wireless network can be extended using a ________.
- A ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
- Refers to data transmission using ADSL and cable.
- A wireless access point contains a radio receiver, encryption and communications software.
- Determines the volume of data that can be transmitted in a given time.
- A _______ can be used where it may be difficult or impractical to use a cabled LAN.
- LANS in different countries can connect together to form a WAN, using _____________ links.
- Enable several computers to communicate through a wireless access point at the same time.
- Used to refer to data transmission over a telephone line using an analogue modem.
- Bluetooth has a much slower data transfer rate than ______ and a much shorter range.
- To access the Internet you need to subscribe to an _________.
20 Clues: __________ Digital Subscriber Line • Refers to data transmission using ADSL and cable. • To access the Internet you need to subscribe to an _________. • The range of a wireless network can be extended using a ________. • Is a form of wireless communication designed to share information • A peer-to-peer network allows every computer to _______ directly. • ...
Test 2 2023-10-02
Across
- B: Basic unit of complex life / T: Basic unit of a notebook
- Key to modern neural networks / Why we're all on Twitter
- Modern neural network building blocks / Optimus Prime and friends
- B: Limb tightening muscle / T: Generalized Matrix
Down
- Excellent ML/AI Consultants / Horrible Crossword Makers
- B: Substance cells are embedded in / T: A multi-dimensional array of numbers
- What neural networks, OOP posts, and the healthcare ecosystem have in common
- B: Large plant with a pleasant shade / T: Many real-world AI implementations
- B: Healthcare Meme Source / T: Java Programming Style
9 Clues: B: Limb tightening muscle / T: Generalized Matrix • B: Healthcare Meme Source / T: Java Programming Style • Excellent ML/AI Consultants / Horrible Crossword Makers • Key to modern neural networks / Why we're all on Twitter • B: Basic unit of complex life / T: Basic unit of a notebook • Modern neural network building blocks / Optimus Prime and friends • ...
Computers Summer Key 2020-09-30
Across
- Operating systems is an example of
- how a computer tells you things
- first computers were
- a device which allows a computer to read from and write on to computer disks.
- wireless internet card
- Where the processor & memory live
- A program you use to look at, and navigate between, pages on the World Wide Web
- Temporary storage RAM
- This person created the first apple computer
- center of network
- how your computer remembers things
- an asymmetric algorithm for public key cryptography.
- Permanent storage
Down
- an electronic device for storing and processing data
- hard connection
- has been around since 1936
- a windowing system for computers with bitmap displays
- A computer network that extends over a large geographical area.
- A computer network that connects computers within a limited area
- Speaker- S or H
- a counting frame, a calculating tool used years ago
- Programs or applications
- who were the first computer programmer's.. men or women
- How your computer talks to other computers
- # of transistors on microchips increases double every 2 years
- is to reload the operating system of a computer
- Responsible for carrying out instructions of a program
- Local Area Networks
- how you tell your computer things
- Wide Area Networks
30 Clues: hard connection • Speaker- S or H • center of network • Permanent storage • Wide Area Networks • Local Area Networks • first computers were • Temporary storage RAM • wireless internet card • Programs or applications • has been around since 1936 • how a computer tells you things • Where the processor & memory live • how you tell your computer things • Operating systems is an example of • ...
Technical quiz 2025-03-05
Across
- : A security system that monitors and controls incoming and outgoing network traffic
- : The address of a web page on the internet
- : The smallest unit of data in a computer
- : The practice of protecting systems and networks from digital attacks
- : A decentralized and secure method of recording transactions
- : A step-by-step procedure for solving a problem
- : A cyber attack that tricks people into revealing sensitive information
- Computing : An advanced field of computing using quantum mechanics
- Intelligence : Technology that enables machines to mimic human intelligence
Down
- Computing : The delivery of computing services over the internet
- : A device that forwards data between computer networks
- : The process of converting data into a secure, unreadable format
- : The process of finding and fixing errors in code
- : A popular programming language known for its simplicity and versatility
- : A modern type of storage device that is faster than a hard drive
- : A small storage location that stores frequently accessed data for quick retrieval
- : The standard language for creating web pages
- Source : Software whose source code is freely available to the public
- : A material used to make computer chips and electronic devices
- : A test used to determine whether a user is human or a bot
20 Clues: : The smallest unit of data in a computer • : The address of a web page on the internet • : The standard language for creating web pages • : A step-by-step procedure for solving a problem • : The process of finding and fixing errors in code • : A device that forwards data between computer networks • : A test used to determine whether a user is human or a bot • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Crime that involves a computer and/or a network
- Someone who uses a computer to gain access to systems or networks
- Malicious attempts by hackers to damage, steal, or destroy a computer
- Software that allows an attacker to obtain information on another computer
- Links two or more devices
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
- Positions ideal for individuals with more than five years of experience
- Web browser feature
- Do not share ____________ across multiple sites
- Internet connection that encrypts traffic from a device to a private network
- software designed to disrupt, damage, or gain unauthorized access to a computer
Down
- Online harassment that uses electronic communication
- Attacker sends fraudulent emails to deceive someone into revealing information
- , Describes the digital environment in which computer networks communicate
- A type of malicious software
- Someone who uses the internet to cause harm to a victim
- ___________ engineering is when an attacker manipulates someone into revealing information
- Software that automatically displays or downloads advertising material
- Store information across pages within the site
- A trail of data intentionally left behind by a user
- Personally identifiable information
- A standalone self-replicating software application that invades and destroys computers
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Crime that involves a computer and/or a network • Do not share ____________ across multiple sites • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
Empires Crossword Unit I 2025-09-05
Across
- Forced transport of enslaved Africans to the Americas.
- Powerful West African empire active in the Transatlantic Slave Trade.
- Warrior class of feudal Japan.
- Overland trade network connecting East Asia to the Mediterranean.
- Islamic empire spanning Europe, Asia, and Africa, lasting into the 20th century.
- Vital African export exchanged in trans-Saharan trade.
- Ceremonial ruler in Japan with symbolic authority during Tokugawa rule.
- East African trade network linking Africa, Arabia, and Asia.
- Coastal outposts in Africa and Asia for European trade.
- Policy of limiting foreign contact and influence.
Down
- Caravan trade route exchanging gold, salt, and goods.
- Iconic Mughal architectural masterpiece built by Shah Jahan.
- Southern African kingdom with strong indigenous traditions.
- Religion founded in Punjab that challenged Mughal authority.
- Indian empire blending Islamic and Hindu traditions.
- Southern African city-state known for its stone ruins and trade networks.
- Belief system that attributes spiritual essence to natural objects.
- Major African export in regional and global trade networks.
- West African empire controlling trans-Saharan trade routes.
- Maritime trade network connecting Africa, the Middle East, India, and Southeast Asia.
- Military ruler of Japan with real political power.
- Songhai city and center of trade and Islamic scholarship.
- Central African kingdom that adopted Christianity.
- Valued African export traded with Europe and Asia.
24 Clues: Warrior class of feudal Japan. • Policy of limiting foreign contact and influence. • Military ruler of Japan with real political power. • Central African kingdom that adopted Christianity. • Valued African export traded with Europe and Asia. • Indian empire blending Islamic and Hindu traditions. • Caravan trade route exchanging gold, salt, and goods. • ...
World History AP (ugonna) 2025-10-31
Across
- Dynasty in China that came into power after the Mongols
- Caliphate that was destroyed by Mongolia
- Leader in Mongolia
- went on a pilgrimage giving away loathes of gold.
- The founder and first Great Khan of the Mongol Empire.
- Animal used in trade in the Sand Roads
- System used by Mongols to send information back and forth.
- Leader in China that went on a voyage
- networks of exchange over the Sahara
- small towns built by trade that often became resting spots for travelers
- Original temples for Hinduism in Cambodia
Down
- A major trade city in the Mali and Songhai kingdoms in West Africa.
- A collection of city-states on the east African coast that participated in the Indian Ocean trade.
- Chinese use cash for transactions
- Traditional wooden sailing vessel with sails
- Mongol imposed dynasty in China
- networks of exchange over the Sea
- a system of government in which most of the important decisions are made by state officials rather than by elected representatives.
- Civilization that doesn't stay in one place
- describes China's size, wealth, and wonders. Extensively wrote about the high levels of urbanization he saw in the 13th century.
- group of traders
- Period of peace in Mongolia
- Main animal us by Mongols for invasion
23 Clues: group of traders • Leader in Mongolia • Period of peace in Mongolia • Mongol imposed dynasty in China • Chinese use cash for transactions • networks of exchange over the Sea • networks of exchange over the Sahara • Leader in China that went on a voyage • Animal used in trade in the Sand Roads • Main animal us by Mongols for invasion • Caliphate that was destroyed by Mongolia • ...
FITAVocab.CLK 2013-05-15
Across
- society designed to inform people about internet safety and security
- electronic technology
- unit to measure speed of signaling or data transfer
- Comcast;Xfinity
- arrangement of data
- port to connect peripherals to a computer
- document or file with special format
- device that sends data to a computer
- type of port to connect mouse or keyboard to a PC
- 8 bits
- processes hardware instructions
- main circuit board
- "I'm lovin' it!"
- symbol designed for recognition
- slot to slide in cds and other discs
- data delivered to a computer
- data delivered from a computer
- quoting on an authoritative source
- oath taken by a person before undertaking the duties of an office
- quantity of storage in computers
- to start up
- sequence of instructions to be completed by a computer
- flash drive; earbuds
- rules and behaviors designed to keep individuals safe when online
Down
- relating to computer or computer networks
- cords
- program that searches for documents
- bring in and start anew
- amount your computer can hold
- delivers information to a computer
- internet "hosting" service that allows you to make your own website
- wireless networking technology that connects other wireless electronic devices
- preview of file or page
- collection of software that directs a computer's operations
- way in which parts of something are laid out
- port to connect to the internet
- data transmission in which a single wire can carry several channels at one time
- protecting information on computer systems/networks
- Dogpile;Ixquick
- slot that allows you to add more plugins
- program designed to do a certain function
- ID with 32 characters used for naming wireless networks
- port to connect audio devices to a computer
- area network that uses high frequency radio signals to transmit and receive data
- a computer's main storage device that stores all your files
- collection of related data stored on your computer or other storage device
- code of conduct one uses online
47 Clues: cords • 8 bits • to start up • Comcast;Xfinity • Dogpile;Ixquick • "I'm lovin' it!" • main circuit board • arrangement of data • flash drive; earbuds • electronic technology • bring in and start anew • preview of file or page • data delivered to a computer • amount your computer can hold • data delivered from a computer • port to connect to the internet • processes hardware instructions • ...
lesson 24 vocab 2016-04-18
Across
- the worlds collection of interconnected commercial and government-owned voice-oriented systems.
- a recent wireless technology that can deliver maximum speeds of up to 7 Mbpa to your cel phone or home computer.
- a series of connected personal computers, workstations, and other devices within a confined space.
- highend programs designed to provide network control and include special functions for connecting computers and other devices into a network.
- this thing protects individual companies networks from external networks.
- a type of fiber-optic telephone line that can transmit up to 1.544 mb per second.
- an internet connection technology that provides for the transfer of information to a computer at a high speed bandwidth over ordinary copper telephone lines.
- a variation of a LAN that uses no physical wires.
- link from one computer to another through which data can be transmitted.
- all computers are equal and no computer is designated as the server.
- a device on the network.
- a system that allows specific users outside of the organization to access internal info systems.
- a device that converts analog signals to digital.
- software program such as Internet Explorer.
- a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination.
Down
- this process ensures security, administrative control, and caching service.
- a worldwide system composed of 1000s of smaller networks.
- a system that allows exclusive use of people within an organization.
- something that examines a fingerprint, a voice pattern, or parts of the eye.
- people who break into computer systems to steal services and info.
- hardware that can be one of many types of servers.
- a software architectural model relationship.
- provides connection speeds more than 30 times faster than dial up connections.
- a device that uses coaxial cable to send and receive data.
- a computer network tuhat coveres a large geographical area.
- a small inexpensive device that joins multiple computers together.
26 Clues: a device on the network. • software program such as Internet Explorer. • a software architectural model relationship. • a variation of a LAN that uses no physical wires. • a device that converts analog signals to digital. • hardware that can be one of many types of servers. • a worldwide system composed of 1000s of smaller networks. • ...
