networks Crossword Puzzles
ACTIVITY #1: Crossword Puzzle 2024-04-30
Across
- Buying and selling goods or services online.
- Software for accessing and viewing websites.
- Ability to analyze and evaluate media content critically.
- Simulation of human intelligence by machines.
- Responsible use of technology and the internet.
- Legal protection of creative works.
- Information in digital form.
- Trail of digital activities left behind by a user.
- Writing instructions for computers.
- Electronic device for processing data.
- Reference or connection to another webpage or resource.
- Unsolicited or unwanted emails or messages.
- Transfer data from a local device to a remote system.
- Verifying the identity of a user.
- Secret phrase for access control.
- Software designed for a specific purpose or task.
- Protection against threats.
- Precautions to protect against online threats.
- Right to control personal information.
- Global network connecting computers and devices.
- Document displayed on the internet.
- Device for forwarding data packets between computer networks.
- Physical components of a computer system.
- Programs and applications for computers.
- Legal principle allowing limited use of copyrighted material.
- Malicious software.
- Hidden part of the internet not indexed by search engines.
- Distributed ledger technology for secure and transparent transactions.
Down
- Collection of related web pages.
- Individuals who gain unauthorized access to systems or networks.
- Criminal activities conducted online.
- Platforms for sharing content and connecting with others.
- Deliberate exploitation of computer systems or networks.
- Creating software using programming languages.
- Self-replicating program that spreads and harms systems.
- Reference or connection to another webpage or resource (repeated).
- Knowledge or data.
- Graphical user interface on a computer.
- Encoding data for secure transmission.
- Exchange of information or messages.
- Relating to electronic technology.
- Harassment or intimidation online.
- Main webpage of a website.
- Transfer data from a remote system to a local device.
- Fraudulent attempt to obtain sensitive information.
- Unauthorized use of someone's personal information.
- Information presented on the internet.
- Criminal activities conducted online.
- Legal regulations governing online activities.
- Interconnected computers or devices.
50 Clues: Knowledge or data. • Malicious software. • Main webpage of a website. • Protection against threats. • Information in digital form. • Collection of related web pages. • Verifying the identity of a user. • Secret phrase for access control. • Relating to electronic technology. • Harassment or intimidation online. • Legal protection of creative works. • ...
Internet 2018-03-11
Across
- An end point of a communication flow across a computer network
- The process of directing packets of data between networks
- What does the C in DHCP stand for
Down
- Large global network of networks
- What does the L in URL stand for
- Method of checking the integrity of data by calculating a sum based on the data being sent
- Which service is on well known port 23
- A node on a network that acts as a connection point to another network with a different protocol
- Central agency that registers all domain names
9 Clues: Large global network of networks • What does the L in URL stand for • What does the C in DHCP stand for • Which service is on well known port 23 • Central agency that registers all domain names • The process of directing packets of data between networks • An end point of a communication flow across a computer network • ...
crossword 2017-12-08
Across
- - to store data
- - universal serial bus
- - a computer that only uses intranet
- - opposite of hardware
- - to steal personal information
- - a file that contains cookies
- - internet service provider
- - uniform resource locator
- - bitmapped image
Down
- - a large network made of smaller networks
- - opposite of software
- - not enough time
- - a website
- - to keep safe
- - central processing unit
15 Clues: - a website • - to keep safe • - to store data • - not enough time • - bitmapped image • - opposite of software • - universal serial bus • - opposite of hardware • - central processing unit • - uniform resource locator • - internet service provider • - a file that contains cookies • - to steal personal information • - a computer that only uses intranet • ...
The Internet 2023-03-06
Across
- a facility allowing devices to communicate wirelessly
- copying data from one computer to another typically over the internet
- Stores the data and programs even when the computer is turned off
- a device that connects two or more packet-switched networks or subnetworks
- Files that the user works on, such as images, documents, etc
Down
- a specific unit of data that's equal to about 1 billion bytes of data
- a network of computers or devices all contained within one location
- a machine that can store and process information
- transferring data from one computer to another
- a communication method that uses electronic devices to deliver messages across computer networks
10 Clues: transferring data from one computer to another • a machine that can store and process information • a facility allowing devices to communicate wirelessly • Files that the user works on, such as images, documents, etc • Stores the data and programs even when the computer is turned off • a network of computers or devices all contained within one location • ...
Safer Internet Day 2021-03-29
Across
- program that accesses and displays files and other data available on the Internet and other networks.
- talking in a friendly way
- engine, A software program you can use to find websites, we pages, and Internet files.
- update of personal information
- online harassment
- to look for something
- complain or tell someone about something
- is a name you use to tell a computer or a website who you are.
- knowledge of a situation or fact
Down
- out, signing out of a website or program.
- a collection of related web pages; can contain images, video, or other digital formats
- secure
- warrior, a person who writes aggressive, threatening comments and often hides their identity
- to prevent someone from contacting you online
- safeguard for access to a computer or computer program.
- of, conscious of
- individuals who use computers, networks, and the internet to perpetrate crime
- someone who scares or hurts someone else
- a person who leaves annoying or irritating messages online to cause trouble
- a photo you take of yourself, with your phone
- a person who uses computers to gain unauthorized access to data.
- nasty
- not connected to the computer or the internet
- safety, security on the Internet
24 Clues: nasty • secure • of, conscious of • online harassment • to look for something • talking in a friendly way • update of personal information • knowledge of a situation or fact • safety, security on the Internet • someone who scares or hurts someone else • complain or tell someone about something • out, signing out of a website or program. • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Crime that involves a computer and/or a network
- Someone who uses a computer to gain access to systems or networks
- Malicious attempts by hackers to damage, steal, or destroy a computer
- Software that allows an attacker to obtain information on another computer
- Links two or more devices
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
- Positions ideal for individuals with more than five years of experience
- Web browser feature
- Do not share ____________ across multiple sites
- Internet connection that encrypts traffic from a device to a private network
- software designed to disrupt, damage, or gain unauthorized access to a computer
Down
- Online harassment that uses electronic communication
- Attacker sends fraudulent emails to deceive someone into revealing information
- , Describes the digital environment in which computer networks communicate
- A type of malicious software
- Someone who uses the internet to cause harm to a victim
- ___________ engineering is when an attacker manipulates someone into revealing information
- Software that automatically displays or downloads advertising material
- Store information across pages within the site
- A trail of data intentionally left behind by a user
- Personally identifiable information
- A standalone self-replicating software application that invades and destroys computers
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Crime that involves a computer and/or a network • Do not share ____________ across multiple sites • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
AI Crossword 2025-07-18
Across
- A conversational AI tool based on large language models
- Relating to computers, networks, or virtual reality environments
- Unfair prejudice in AI decision-making due to data or design flaws
- The branch of technology dealing with robots and automated machines
- The process by which AI improves its performance over time
- Facts or information used by computers to learn or make decisions
- The surname of the scientist who proposed a test for machine intelligence
- An AI's attempt to forecast an outcome or event
- A system of connected devices or nodes for communication or computation
- A device that performs work when given power or instructions
Down
- Extremely large datasets analysed by AI to find patterns or trends
- Something made or produced by humans rather than occurring naturally
- Able to operate independently without direct human control
- The use of machines and technology to perform tasks with minimal human input
- Synthetic media created by AI, often replacing a person’s image or voice
- The ability to learn, understand, and apply knowledge
- A step-by-step set of rules for solving a problem or performing a task
- Moral principles guiding the responsible use of AI
- Protection of personal information from misuse
- Relating to nerve cells or networks of the brain, often used in AI models
20 Clues: Protection of personal information from misuse • An AI's attempt to forecast an outcome or event • Moral principles guiding the responsible use of AI • The ability to learn, understand, and apply knowledge • A conversational AI tool based on large language models • Able to operate independently without direct human control • ...
Networking vocabulary 2025-12-12
Across
- system for converting IP addresses into names that users can remember.
- Address of each individual device connected to a home or business network.
- a system designed for quick and easy interconnection using public, standardized protocols.
- small network between nearby devices.
- A network that connects devices and networks over a larger area.
- point where network connections start and end.
- Main IP address of a home or business network, connects the world.
- conceptual framework that standardizes network communication into 7 layers.
- transferring data from one Ip address to another.
Down
- two or more computers that can communicate with each other.
- arrangement of connections and devices in a network, defining how it flows
- Virtual address for every device connected to the internet
- a self contained, isolated network that cannot communicate with other networks
- standardized numbers across devices to assign each port.
- set of rules that govern how data flows between devices on a network.
- A network topology where all devices are connected in a circle.
- A network topology where all devices are connected to a central hub.
- company responsible for providing access to the internet.
- Newer IP system for configuring IP addresses which uses numbers and letters (alphanumerical) to designate IP addresses
- Older IP system which used numerical values to configure IP addresses
20 Clues: small network between nearby devices. • point where network connections start and end. • transferring data from one Ip address to another. • standardized numbers across devices to assign each port. • company responsible for providing access to the internet. • Virtual address for every device connected to the internet • ...
E-Business Chapter 11 - Social Networks Auctions and Portals 2015-11-21
Across
- A social network feature involving posting messages to groups of friend and other group members.
- Time on site is an important way to measure the influence of a site. The more time people spend on a site, called __________, the more time to display ads and generate revenue.
- Let's Facebook users instant message photos and videos to their Facebook friends.
- Auctions where the business sells goods it owns, or controls, using various dynamic pricing models (3 words).
- While the early social networks had a difficult time raising capital and revenues, today's top social network sites are now learning how to _________ their huge audiences.
- The early leader in social networking was overtaken by Facebook; being reinvented as a music-oriented social network by pop start Justin Timberlake.
- The number of unique __________ is just one way to measure the influence of a site.
- This involves a group of people, shared social interaction, common ties among members, and people who share an area for some period of time.
- An auction where users specify what they are willing to pay for goods or services.
- _________ are among the most frequently visited sites on the Web if only because they often are the first page to which many users point their browser on startup.
- Social networks of professionals and practitioners, creators of artifacts such as computer code or music.
- General portal sites such as AOL and Yahoo did not have well-developed search engines, and hence have not grown as fast as __________, which has a powerful search engine.
- A type of social network or community of members who self-identify with demographic or geographic category, such as women, African Americans, or Arab Americans.
Down
- A social network feature that includes user-created Web pages that describe the user on a variety of dimensions.
- Auctions where the auction house acts as an intermediary market maker, providing a forum where consumers can discover prices and trade (3 words).
- Almost 50% of people who use __________ are 35 years old and older.
- Helps groups of people with shared interests plan events and meet online.
- While social networks originally attracted mostly ___________ Internet users, social networks today are not just about teens and college students, but a much larger social phenomenon.
- Let's users send photos to friends that self-extinguish in ten seconds.
- This is an area on the Internet where people who share common ties can interact with one another.
- The risk of an auction highlighted by the fact that online auctions are a significant source of Internet fraud.
- A messaging service that lets users sent text, photos and videos to their friends' cellphones using the Internet and without having to pay telecommunications companies for the use of cellphone SMS messaging services.
- The benefit of an auction where sellers can find willing buyers and buyers can find sellers.
- The world market leader in auctions.
24 Clues: The world market leader in auctions. • Almost 50% of people who use __________ are 35 years old and older. • Let's users send photos to friends that self-extinguish in ten seconds. • Helps groups of people with shared interests plan events and meet online. • Let's Facebook users instant message photos and videos to their Facebook friends. • ...
static route 2023-02-26
Across
- It can be Variable length or fixed length
- Ethernet procedure used to handle collisions during transmissions
- Device which converts between digital and analogue signals, e.g. telephone line to computer.
- It happens when transmissions occur at the same time
- "Cisco command to reactivate an interface on the router"
- The purpose of scrambling data so it can be sent securely over networks.
- Software that provides services to a client, or the hardware that is running it.
- A device for connecting multiple network devices and multiple segments.
- A set of rules or standards that control communication between devices.
Down
- Software or hardware that requests services from a server.
- sense It can be "collision detection" or "collision avoidance".
- The amount of data that can be transferred from one point to another in a given time period.
- When it becomes zero, the packet is discarded
- Automatic switching to a backup computer system in the event of system failure.
- Device that forwards data packets to the appropriate parts of a computer network.
- it can be MAC or IP.
- A tool to check network connectivity
- Formatted unit of data sent across networks.
18 Clues: it can be MAC or IP. • A tool to check network connectivity • It can be Variable length or fixed length • Formatted unit of data sent across networks. • When it becomes zero, the packet is discarded • It happens when transmissions occur at the same time • "Cisco command to reactivate an interface on the router" • ...
Lokalie tikli 2020-10-22
Across
- adrese, kura tiek iedota ierīcei, kad tā pievienojas tīklam
- ierīce kas var iedot interneta savienojumu ierīcēm
- networks, kuram var piekļūt tikai kopā savienotas ierīces
- interneta piegādātāja nosaukums (trīs burti)
- protokola, kas ļauj runāt pa telefonu caur internetu, saīsinājums
- interneta pasts
- tā sauktā rezerves baterija datoram, ja pazūd elektrība
- networka ierīču saslēgumu veidi ir networka...
- kāda tīkla standarts ir IEEE 802.11
- datoram kaitīgs kods tiek saukts par
- ko UTP apzīmē u burts
- tīkls kura izveidei vajadzīgs ka minimums divi datori
- serveris kas automātiski dod ip adreses tam pievienotajām ierīcēm
- programma ko var lietot treniņam networku salikšanā
Down
- bus topoloģija latviski
- protokols, kas nodrošina drošu datu apmaiņu starp divām tīkla ierīcēm.
- ko STP apzīme s burts
- pieslēdzoties globālajam tīmeklim, tu pieslēdzies šai lietai.
- networks kas maskē ip no sava interneta providera (angliski & full name)
- informācijas apjoms ko dod pa datoru tīklu noteiktā laikā
- vieta kur var datus saglabāt interneta vidē
- interneta kabeļa nosaukums
- ierīce kas var iedot interneta savienojumu citām, ja tai pašai tas ir pievienots
- protokola saīsinājums, kas ļauj piekļūt un pārsūtīt failus starp serveri un datoru
- servera veids ar kuru var redzēt servera admins, kas ko iekš servera dara
- rūtera iestatijumi, kas ļauj uzlabot interneta ātrumu, samazinot tā piekļuvi noteiktam lietotājam
26 Clues: interneta pasts • ko STP apzīme s burts • ko UTP apzīmē u burts • bus topoloģija latviski • interneta kabeļa nosaukums • kāda tīkla standarts ir IEEE 802.11 • datoram kaitīgs kods tiek saukts par • vieta kur var datus saglabāt interneta vidē • interneta piegādātāja nosaukums (trīs burti) • networka ierīču saslēgumu veidi ir networka... • ...
AE MODULE 7 - CYBER SECURITY 2024-01-29
Across
- Positions ideal for individuals with more than five years of experience
- A trail of data intentionally left behind by a user
- Store information across pages within the site
- Crime that involves a computer and/or a network
- Describes the digital environment in which computer networks communicate
- Software that automatically displays or downloads advertising material
- A type of malicious software
- Links two or more devices
- Someone who uses the internet to cause harm to a victim
- Online harassment that uses electronic communication
- Web browser feature
Down
- Someone who uses a computer to gain access to systems or networks
- Internet connection that encrypts traffic from a device to a private network
- A standalone self-replicating software application that invades and destroys computers
- Do not share ____________ across multiple sites
- Software that allows an attacker to obtain information on another computer
- Personally identifiable information
- Malicious attempts by hackers to damage, steal, or destroy a computer
- ___________ engineering is when an attacker manipulates someone into revealing information
- Attacker sends fraudulent emails to deceive someone into revealing information
- Software designed to disrupt, damage, or gain unauthorized access to a computer
- Descriptive data that contains information about other data
- In 1988, Robert __________ unleashed a malicious computer program
23 Clues: Web browser feature • Links two or more devices • A type of malicious software • Personally identifiable information • Store information across pages within the site • Do not share ____________ across multiple sites • Crime that involves a computer and/or a network • A trail of data intentionally left behind by a user • Online harassment that uses electronic communication • ...
Communications,Networks and the Internet 2020-08-28
Across
- a WAN can connect networks across a large _____________ area, such as a city or country.
- enable several computers to communicate through a wireless access point at the same time.
- a device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
- lans in different countries can connect together to form a WAN, using _____________ links.
- refers to data transmission using ADSL and cable.
- To access the Internet you need to subscribe to an _________.
- bluetooth has a much slower data transfer rate than ______ and a much shorter range.
- used to refer to data transmission over a telephone line using an analogue modem.
- a _______ can be used where it may be difficult or impractical to use a cabled LAN.
- lans can be divided into _______ categories based on how the computers communicate with one another.
- a ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
Down
- a peer-to-peer network allows every computer to _______ directly.
- __________ Digital Subscriber Line
- data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
- the range of a wireless network can be extended using a ________.
- a __________ consists of a collection of computers that share information and communicate with each other over a network.
- determines the volume of data that can be transmitted in a given time.
- a wireless access point contains a radio receiver, encryption and communications software.
- an international network of networks that connects computers worldwide.
- is a form of wireless communication designed to share information
20 Clues: __________ Digital Subscriber Line • refers to data transmission using ADSL and cable. • To access the Internet you need to subscribe to an _________. • determines the volume of data that can be transmitted in a given time. • a peer-to-peer network allows every computer to _______ directly. • ...
Chapter 5: Groups and Networks 2019-03-13
Across
- the member of a triad who attempts to resolve conflict between the two other actors in the group
- any social network that is defined by a common purpose and has a boundary between its membership and the rest of the social world
- seeks to understand how group life shapes individual behavior and maps out social relationships to understand transmission phenomenon, like STD transmission in high schools
- the role of a member of a triad who intentionally drives a wedge between the other two actors in the group
- a set of relations – essentially, a set of dyads – held together by ties between individuals
- the ways that power and authority are distributed in a social group
- the degree to which social relationships are reinforced through indirect ties (i.e. friends of friends)
- the sum of stories contained in a set of ties
- social groups, such as family or friends, composed of enduring, intimate face-to-face relationships that strongly influence the attitiudes and ideals of those involved
- a gap between network clusters, or even two individuals, if the two units have complementary resources
- the member of a triad who benefits from conflict between the other two members of the group
Down
- the information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
- another term for the powerful group, most often the majority
- a group that is similar to a small group, but is multifocal
- groups marked by impersonal, instrumental relationships (those existing as a means to an end)
- the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
- a group of two
- the notion that relatively weak ties often turn out to be quite valuable because they yield new information
- a group that helps us understand or make sense of our position in society relative to other groups
- the shared beliefs and behaviors within a social group
- a group characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangement, or roles, and a certain level of equality
- a group of characterized by the presence of a formal structure that mediates interaction and consequently status and differentiation
- a group of three
- the tendency for organizations that interact with the same social forces to end up sharing characteristics, or to look alike
- another term for the stigmatized or less powerful group, the minority
25 Clues: a group of two • a group of three • the sum of stories contained in a set of ties • the shared beliefs and behaviors within a social group • a group that is similar to a small group, but is multifocal • another term for the powerful group, most often the majority • the ways that power and authority are distributed in a social group • ...
Ch. 5: Groups and Networks 2021-03-25
Across
- the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
- the tendency for organizations that interact with the same social forces to end up sharing characteristics, or to look alike
- social groups, such as family or friends, composed of enduring, intimate face-to-face relationships that strongly influence the attitiudes and ideals of those involved
- a gap between network clusters, or even two individuals, if the two units have complementary resources
- any social network that is defined by a common purpose and has a boundary between its membership and the rest of the social world
- the ways that power and authority are distributed in a social group
- a group of characterized by the presence of a formal structure that mediates interaction and consequently status and differentiation
- the role of a member of a triad who intentionally drives a wedge between the other two actors in the group
- a group of two
- another term for the powerful group, most often the majority
- the sum of stories contained in a set of ties
Down
- the shared beliefs and behaviors within a social group
- the member of a triad who attempts to resolve conflict between the two other actors in the group
- groups marked by impersonal, instrumental relationships (those existing as a means to an end)
- seeks to understand how group life shapes individual behavior and maps out social relationships to understand transmission phenomenon, like STD transmission in high schools
- a group that is similar to a small group, but is multifocal
- the information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
- a group characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangement, or roles, and a certain level of equality
- the member of a triad who benefits from conflict between the other two members of the group
- the notion that relatively weak ties often turn out to be quite valuable because they yield new information
- a set of relations – essentially, a set of dyads – held together by ties between individuals
- a group that helps us understand or make sense of our position in society relative to other groups
- a group of three
- the degree to which social relationships are reinforced through indirect ties (i.e. friends of friends)
- another term for the stigmatized or less powerful group, the minority
25 Clues: a group of two • a group of three • the sum of stories contained in a set of ties • the shared beliefs and behaviors within a social group • a group that is similar to a small group, but is multifocal • another term for the powerful group, most often the majority • the ways that power and authority are distributed in a social group • ...
Ch. 5 Groups and Networks 2023-11-13
Across
- member of a triad who attempts to resolve conflict between the other two members
- network - set of dyads held together by ties between individuals
- et impera - role of a member of a triad who intentionally causes conflict between the other two members
- group - social group composed of enduring, intimate face-to-face relationships that strongly influence the attitudes and ideals of those involved
- hole - gap between network clusters
- - degree to which social relationships are reinforced through indirect ties (friends of friends)
- - sum of stories contained in a set of ties
- 3 basic forms of political relations - mediator, tertius gaudens, divide et impera
- a group of three
- group - groups marked by impersonal, instrumental relationships (those existing as a means to an end)
Down
- - group that is similar to a small group, but is multifocal
- - the powerful group, most often the majority
- group classifications: small groups, parties, large groups
- conformity - groups have strong influences over individual behavior
- - the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
- a group of two
- group - characterized by the presence of a formal structure that mediates interaction and consequently, status differentiation
- - member of a triad who benefits from conflict between the other two members
- group - characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangements or roles, and equality
- group - group that helps us understand or make sense of our position in society relative to other groups
- capital - information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
- - the stigmatized or less powerful group, generally the minority
- group classification: primary groups, secondary groups
23 Clues: a group of two • a group of three • hole - gap between network clusters • - sum of stories contained in a set of ties • - the powerful group, most often the majority • group classification: primary groups, secondary groups • group classifications: small groups, parties, large groups • - group that is similar to a small group, but is multifocal • ...
Sense of Self - Crossword 2014-03-16
Across
- A group of relatives living under the same roof.
- A rude or insulting expression intended to offend or hurt people.
- When a person/group is cruel to any other person on a regular basis.
- A relation between things or events e.g. there was a connection between eating that pickle and having that nightmare.
- A relation between people e.g. The relationship between the mum and her daughter is good
- Helplines,parents or teachers are people/places you can go to if you are in need of support.Therefore they are support networks.
- Essential characteristics or someone/thing.
Down
- When you have a friendly relationship with another person
- A cure for anger or depression, some people need to have things they can do or use to cope with problems.
- People with the power to affect people or events using persuasion.
- When a person is tormenting another by continually criticizing them.
- Enjoying life in communities or friend groups.
- A situation where a person is being challenged by someone/thing.
- Walls of insecurity.
- Confidently self assured.
- Distinctive and the single one of it's kind.Unusual,different, rare.
16 Clues: Walls of insecurity. • Confidently self assured. • Essential characteristics or someone/thing. • Enjoying life in communities or friend groups. • A group of relatives living under the same roof. • When you have a friendly relationship with another person • A situation where a person is being challenged by someone/thing. • ...
Ch 4 Network Access 2017-02-13
Across
- Analogy: The larger the pipe, more water that can flow through it.
- Allows multiple paths for light.
- Network ports are able to automatically change the sending/receiving pin positions depending on the connected device.
- Cables are normally used to connect hubs to hubs or switches to switches, but they can also be used to directly connect two hosts to create a simple network.
- Converting a stream of data bits into predefined "codes”.
- An arrangement of the nodes and the physical connections between them.
- LLC connects to Layer.
Down
- Regulates the placement of data frames onto the media.
- Contention- based technology for 802.3 networks.
- Indicates the source and destination nodes on the media.
- The way a network transfers frames from one node to the next.
- Cable connect a workstation’s serial port t to a router’s console port, using an adapter.
- Is a pin used for transmitting.
- MAC connects to Layer.
- Contention- based technology for 802.11 networks.
- Analogy: As a valve is opened, more water flows through.
- Used to determine if the frame arrived without error.
- Is a pin used for receiving.
18 Clues: MAC connects to Layer. • LLC connects to Layer. • Is a pin used for receiving. • Is a pin used for transmitting. • Allows multiple paths for light. • Contention- based technology for 802.3 networks. • Contention- based technology for 802.11 networks. • Used to determine if the frame arrived without error. • Regulates the placement of data frames onto the media. • ...
Unit 1 2016-02-21
Across
- __________ communication: the sending and receiving occur at different times
- wide area networks
- web ________: used to view web pages that may contain text, images, videos, and other multimedia to navigate between them via hyperlinks
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
- imitating something while exaggerating it's characteristic features
- the main technology for LANs
- _________ text: contains about half of the word count as the control condition
- _____ extension: a suffix to the name of a computer file applied ot indicate the encoding of its contents or usage
- _____ editor: a type of program used for editing plain text files
Down
- a related group of networked computers
- local area networks
- domain name system
- __________ communication: both the sender and receiver are active at the same time
- ___________ writing: control condition
- __________ language: using neutral rather than subjective, boastful or exaggerated language
- using a system attached to UT resources to capture data packets
- a W3C specification that defines the fifth major revision of the hypertext markup language
- hypertext markup language
18 Clues: domain name system • wide area networks • local area networks • hypertext markup language • the main technology for LANs • a related group of networked computers • ___________ writing: control condition • using a system attached to UT resources to capture data packets • _____ editor: a type of program used for editing plain text files • ...
Astrid's IT crossword puzzle 2020-11-12
Across
- /a piece of computer software that controls input and output operations
- /Which subnet class does 255.255.255.0 belong to? (answer includes a space)
- /a networks characterization that yields an routing prefix after subnetting
- /a group of binary digits or bits
- /a command that shows the computer's and internet's IP adress
Down
- /a unique string of character that identifies each computer Answer includes a space.
- /a minute area of illumination on a display screen, one of many from which an image is composed
- /the action of dividing a network into more networks
- /a computer system with which a computer operates with
- /a computer programm at the core of a computer's OS
10 Clues: /a group of binary digits or bits • /a computer programm at the core of a computer's OS • /the action of dividing a network into more networks • /a computer system with which a computer operates with • /a command that shows the computer's and internet's IP adress • /a piece of computer software that controls input and output operations • ...
IT jobs 2023-09-18
Across
- Develops, tests, and maintains software applications and systems.
- Analyses data to provide insights and support decision-making.
- Offers expert advice and recommendations to businesses on IT strategy and solutions.
- Responsible for configuring, managing, and troubleshooting servers and systems.
- Focuses on protecting computer systems and networks from cyber threats and attacks.
Down
- Focuses on the collection, storage, and management of data for analysis and reporting.
- Creates and maintains websites, web applications, and user interfaces.
- Manages and maintains an organization's computer networks and infrastructure.
- Provides technical support and assistance to end-users and resolves hardware and software issues.
- Designes, plans, and implements complex network infrastructures for organizations.
10 Clues: Analyses data to provide insights and support decision-making. • Develops, tests, and maintains software applications and systems. • Creates and maintains websites, web applications, and user interfaces. • Manages and maintains an organization's computer networks and infrastructure. • ...
Unit 7 Ch 14 Review - Ruqayah and Makenna 2024-04-26
Across
- a set of interconnected nodes without a center
- processes heightening interactions, increasing independence, and deepening relations within different countries
- highly connected cities that function as nodes in global networks
- interconnections among individuals that foster social interactions
- the merging of businesses that serve different steps in one commodity chain
- individuals or corporations who control access to information
Down
- common ownership of multiple companies that compete at the same point on a commodity chain
- a tragic event that draws people together from distant places is an example of
- growing cap in access to Internet and communication technologies between connected and remote places
- cross-promotion of vertically integrated goods
10 Clues: a set of interconnected nodes without a center • cross-promotion of vertically integrated goods • individuals or corporations who control access to information • highly connected cities that function as nodes in global networks • interconnections among individuals that foster social interactions • ...
Objective 2i: Impact of Empire on Trans-Saharan Trade 2024-11-15
Across
- A powerful West African empire that succeeded Mali, expanding control over trade networks and cultural exchange in the region.
- The sharing of ideas, beliefs, art, and technologies facilitated by trade and empire expansion.
- A region central to Afro-Eurasian trade networks, particularly through the Mali Empire’s role in gold and salt exchanges.
- Systems established by expanding empires that enabled contact and information flow across vast regions.
Down
- The spread of innovations across regions through trade and the expansion of empires.
- A powerful West African state that expanded trade networks and facilitated cultural and economic exchanges in Afro-Eurasia.
- A West African kingdom that controlled trade routes and preceded the Mali Empire as a center of wealth and commerce.
- The growth of states like Mali that facilitated increased trade, communication, and cultural interactions across regions.
8 Clues: The spread of innovations across regions through trade and the expansion of empires. • The sharing of ideas, beliefs, art, and technologies facilitated by trade and empire expansion. • Systems established by expanding empires that enabled contact and information flow across vast regions. • ...
thrive 2024-04-22
Across
- Assistance type provided for family-related matters
- Virtual health consultations offered by Casting Networks
- Financial benefits provided to members through discounts
Down
- Casting Networks' program enhancing actor well-being
- General state of health and well-being supported by the new initiative
- Type of care with discounts available to Thrive+ members that will make you smile
- Hotline for advice on annual filings included in benefits
- Eye care services with reduced rates for certain members
8 Clues: Assistance type provided for family-related matters • Casting Networks' program enhancing actor well-being • Eye care services with reduced rates for certain members • Virtual health consultations offered by Casting Networks • Financial benefits provided to members through discounts • Hotline for advice on annual filings included in benefits • ...
IT Crossword 2024-01-18
Across
- Device that forwards data packets between computer networks.
- The maximum rate of data transfer across a given path.
- The official procedure or system of rules governing affairs of state or diplomatic occasions.
Down
- Formatted unit of data carried by a packet-switched network.
- Connection point where data from multiple directions converge and are then sent out in many directions.
- Computer program or process.
- Messages distributed by electronic means.
- Global system of interconnected computer networks.
8 Clues: Computer program or process. • Messages distributed by electronic means. • Global system of interconnected computer networks. • The maximum rate of data transfer across a given path. • Formatted unit of data carried by a packet-switched network. • Device that forwards data packets between computer networks. • ...
Cyber Security 2023-02-10
Across
- or identity theft.
- A company or organization that gives users and devices access to the Internet
- often by using emails or fake websites that look like they are from trusted organizations.
- Someone who uses computers and computer networks to disrupt services or share secret information in
- Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
- until it is decrypted using a secret key
- Consists of code written in a programming language that instructs computers to perform specific tasks.
- computers are usually used to cause damage that couldn’t be achieved with a single computer
- Multiple computers on a network that are infected with a program that can be controlled remotely. The
Down
- The process of using codes to make readable information unreadable. Encrypted information cannot be
- Attempting to trick people into revealing sensitive information, such as passwords and credit card
- A type of malware that holds victims’ computer files hostage by locking access to them or encrypting
- Extra copies of computer files that can be used to restore files that are lost or damaged
- A distributed denial of service attack attempts to make an online service, like a website, unavailable by
- software Computer programs that can block, detect, and remove viruses and other malware
- A computer or computer program that provides specific services on a network, such as an email server
- It then demands a ransom if the victim wants his or her files back.
- Unsolicited emails sent to many addresses. The purpose of most spam is to make money through
- it with a flood of traffic from a team of computers.
- effort to draw attention to political or social issues.
- directs emails and a web server that serves up web pages.
- Software designed to block malware from entering protected networks
- programs.
- A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
- The amount of data that can pass through a network or part of a network per second
25 Clues: programs. • or identity theft. • until it is decrypted using a secret key • it with a flood of traffic from a team of computers. • effort to draw attention to political or social issues. • directs emails and a web server that serves up web pages. • It then demands a ransom if the victim wants his or her files back. • ...
Security within the IoT 2017-04-26
Across
- People don't learn enough about the _______ they use to secure them properly.
- The number of connected devices, systems and sensors worldwide is expected to grow rapidly over the coming years, with Cisco Systems and Intel both predicting as many as 50 ______ or more such devices by 2020.
- 72 percent of consumers do not know how to configure a wireless router in a way to _______ a home network.
- An important step to take during product development is to identify the potential ________ of hackers.
- The Internet of things is changing our _______ of personal security.
- Security can be a significant _______ to organizations adopting IoT technologies.
- BullGuard officials noted that the industry has not yet created common security ______ for IoT devices.
Down
- Recent research from SAS Institute states that only 11 percent of consumers believe that they have total ______ over the data they provide companies.
- IoT networks bring in a diverse set of connected devices that can introduce multiple points of ___________ in the networks.
- IoT systems are groupings of network-connected devices that automatically collect and exchange _____, allowing enterprises to increase efficiency and productivity.
- Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks.
- Most manufacturers are taking their own approaches to ______, which can create update procedures that are complex and difficult to carry out.
- The conflict between the demand for connected devices and the users' _______ to secure them or the networks they're on presents challenges.
- According to BullGuard CEP Paul Lipman "consumers are clearly not equipped to handle the myriad of security ____ presented by connected devices."
- Gartner predicts that by 2020, more than 25 percent of identified _______ in enterprises will be IoT-related.
15 Clues: The Internet of things is changing our _______ of personal security. • People don't learn enough about the _______ they use to secure them properly. • Security can be a significant _______ to organizations adopting IoT technologies. • Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks. • ...
Computers 2024-05-27
Across
- Control center of a computer
- Main circuit board in a computer
- Type of document
- Turn on a computer
- Device named after Jerry.
- Computer Screen
- Send a letter online
Down
- Input device with keys
- Move up and down
- Network of networks
- Portable computer
- Save data on this
- Random Access Memory
- Web search tool
- Pictures on screen
15 Clues: Web search tool • Computer Screen • Move up and down • Type of document • Portable computer • Save data on this • Turn on a computer • Pictures on screen • Network of networks • Random Access Memory • Send a letter online • Input device with keys • Device named after Jerry. • Control center of a computer • Main circuit board in a computer
Internet Vocabulary 2015-02-27
Across
- A registered address for a website or an email address.
- The visual component of the internet. This stands for the World Wide Web.
- The online address of a site or document.
- A personal list of interesting websites.
- Information a person shares about him or herself online.
- A combination of the words "Net" and "etiquette". It refers to good manners online.
- Consists of countless networks of computers connected across the world.
- The ability to talk live with others on the internet.
- An electronic method of composing, sending and receiving messages over the internet.
Down
- The process of transferring computer files from the Internet to a computer.
- The virtual universe of computers and computer networks.
- The software that lets users "surf" the web and view pages on it. Firefox and Internet Explorer are examples.
- An electronic security barrier to prevent outsiders from getting into a computer network.
13 Clues: A personal list of interesting websites. • The online address of a site or document. • The ability to talk live with others on the internet. • A registered address for a website or an email address. • The virtual universe of computers and computer networks. • Information a person shares about him or herself online. • ...
Crossword Puzzle 2022-04-29
Across
- The Women In Motion Network
- Advance Auto Parts has seven Team Member _______
- Promoting a variety of representation among our Team Members across all diverse groups to drive variation in thought and creative thinking
- International Cultural Opportunities Network
- Advance Auto Parts Employee Resource Groups (ERGs) are _________ __________ Networks
- Fostering Unity, Engagement, Growth and Opportunities Latino Network
- The Summer Internship Program: _______ University
Down
- Advance University is a ______ Internship
- Ensuring equal opportunity, treatment, and advancement for all Team Members, while also striving to eliminate barriers for all Team Members
- Fosters visibility and growth for its members and allies of the LGBTQ+ community by acting on our passion of inclusion of our Team Members, Customers and the communities we serve.
- Serve, Educate, Recruit, Value, Inspire, Celebrate and Empower Network
- Creating an environment for each Team Member to be their authentic self, to feel welcomed, valued, respected and heard
- The African American Leading Inclusion and Growth Network
13 Clues: The Women In Motion Network • Advance University is a ______ Internship • International Cultural Opportunities Network • Advance Auto Parts has seven Team Member _______ • The Summer Internship Program: _______ University • The African American Leading Inclusion and Growth Network • Fostering Unity, Engagement, Growth and Opportunities Latino Network • ...
Technology 2017-06-13
Across
- page gives you information
- demandSystems that enable the viewers to order and see a given programme at the exact time the viewer specifies.
- application of information and communications technologies and services, usually in direct combination
- A service provided from a remote location using the telematics infrastructure.
- Card It is a card that is able to store digital information.
- what people ins school are learning
- Message sent or posted to an excessively large number of people on the Internet
- it improves things
- 1 Computer program for a person to browse what is on the Internet
- gives you information
Down
- Network (WAN)
- gives you information about anything
- complement to LAN. A WAN consists of multiple local networks tied together, typically using telephone-company services.
- making something better
- Service A set of basic services that must be made available at an affordable price to all users by public or private operators irrespective of the user's geographical location.
- Time which elapses between ordering information and receiving it through an interactive system.
- which facilitates the communication between the computer and its user
- informatic programme able to disrupt the functioning of other programmes.
- you send and get information
- you send e massage
- popular way to move large amounts of voice, data and video
21 Clues: Network (WAN) • it improves things • you send e massage • gives you information • making something better • page gives you information • you send and get information • what people ins school are learning • gives you information about anything • popular way to move large amounts of voice, data and video • Card It is a card that is able to store digital information. • ...
NWEG Puzzle 2021-11-25
Across
- wireless technology used to connect devices
- a switching device for networks
- the programs and other operating information used by a computer.
- carries the broadband signals between your modem
- a network security device that monitors incoming and outgoing network traffic
- is the arrangement of the elements of a communication network
- the sharing of resources by connecting together all the devices
- a software component that lets the operating system and a device communicate with each other.
- a piece of computer hardware or software that provides functionality for other programs
Down
- a type of software program created to protect information technology systems from malicious software
- a peripheral machine which makes a persistent representation of graphics or text, usually on paper
- computer system that is designed for a single user
- a vast network that connects computers all over the world
- a person who utilizes a computer or network service
- an established set of rules that determine how data is transmitted between different devices in the same network.
- a thick rope used to connect devices
- Network providers
- includes the physical parts of a computer
- responsible for the operation of the networks
- box that connects your home network to the wider Internet
20 Clues: Network providers • a switching device for networks • a thick rope used to connect devices • includes the physical parts of a computer • wireless technology used to connect devices • responsible for the operation of the networks • carries the broadband signals between your modem • computer system that is designed for a single user • ...
Hardware and Software 2022-02-09
Across
- Collections of web pages under a single domain name
- Primary user workspace in an OS
- Where the address is displayed
- Set of options used to help find information or functions in a program
- An object that stores data on a computer
- Rectangular display of a program or location
- A device that can store and process data to help users complete tasks
- Device which takes in data or information
- Virtual space used to group files and other folders
- Browser shortcut to a website
- Suffix at the end of a filename that tells what kind of file it is
- Device which sends out data or information
- Device that connects two or more networks
Down
- Set of instructions or programs that tells a computer what to do
- Multiple websites open inside a browser’s window
- Two or more computers connected together to share resources
- Uses radio to connect computers to the network
- Indicators of events
- Physical components of a computer that can be seen and touched
- Uses cables to physically connect the computer to the network
- Information measured in bits
- Network applications that navigate the Internet
- Image representing a program or a location
- Global network of networks
- An address for something on the Internet
25 Clues: Indicators of events • Global network of networks • Information measured in bits • Browser shortcut to a website • Where the address is displayed • Primary user workspace in an OS • An object that stores data on a computer • An address for something on the Internet • Device which takes in data or information • Device that connects two or more networks • ...
Network Requirements 2023-09-07
Across
- a rule or order issued by authority
- a system design in which a component is duplicated so if it fails
- process that copies all your files, data and information
- protection of information
- the quality of being trustworthy
- the ability of a computing process to be used or produced in a range of capabilities
- the ability or tendency to move from one position or situation to another usually better one
- a process that gathers metrics on the operations of an IT environment
- a method of dividing a single physical network into logical sub-networks
- physical parts of a computer
- programs that run on a device
Down
- the degree to which a product meets some or all of the specifications
- the capacity at which data is transmitted on a network
- the time delay between when a signal is transmitted and when it is received
- capacity for the interconnection of platforms, systems, and applications
- the delay in network communication
- a standardized set of rules for formatting and processing data
- a networking device that forwards data packets between computer networks
- a set of digital security requirements and practices
- a measure of how many units of information a system can process in a given amount of time
20 Clues: protection of information • physical parts of a computer • programs that run on a device • the quality of being trustworthy • the delay in network communication • a rule or order issued by authority • a set of digital security requirements and practices • the capacity at which data is transmitted on a network • process that copies all your files, data and information • ...
CHAPTER 4: INTERACTING WITH OTHERS AS A HCP 2023-10-23
Across
- ____________ CLASS ENVIRONMENTS INVOLVE OPEN DISCUSSION WHERE STUDENTS CAN INTERRUPT AT ANY TIME TO ASK QUESTIONS.
- VISIT YOUR PROFESSOR DURING SCHEDULED ____ ____ WHEN YOU HAVE QUESTIONS ABOUT THE COURSE.
- NETWORKS ARE _______, VOLUNTARY, AND RESPECTFUL.
- JOIN A _____ OR ORGANIZATION ON CAMPUS TO ENRICH YOUR SOCIAL INTERACTIONS.
- MAKE A _________ ______________ FROM THE START BY BEING ATTENTIVE, PARTICIPATING, AND INTERACTING.
- CONVEY __________ WHEN YOU INTRODUCE YOURSELF, PRACTICE WHAT YOU ARE GOING TO SAY, AND MAKE EYE CONTACT.
- _________ YOUR THOUGHTS BEFORE ANSWERING A QUESTION.
- _____________________ IN CLASS DISCUSSIONS BY ASKING QUESTIONS, COMMENTING ON STUDENT COMMENTS, & ANSWERING QUESTIONS.
Down
- ____________ YOURSELF BY BEING INVOLVED IN TOO MANY ACTIVITIES SPREADS YOURSELF TOO THIN.
- A GREAT VARIETY OF HUMAN CHARACTERISTICS
- GETTING TO KNOW YOUR PROFESSOR WILL HELP YOU FEEL ______IN THE CLASSROOM.
- YOUR _______DEPENDS ON MORE SUCCESS JUST SITTING IN CLASS AND TAKING EXAMS AND DOING HOMEWORK.
- _______________ ________________ CAN ANSWER QUESTIONS ABOUT YOUR PROGRAM'S REQUIREMENTS.
- WHEN YOU HAVE A QUESTION, __ ___ ____.
- AN INTERCONNECTED GROUP OF PEOPLE WHO SHARE INFO WITH ONE ANOTHER.
- DON'T EVER THINK A QUESTION IS ________.
- VISIT YOUR PROFESSOR DURING SCHEDULED ____ ____ WHEN YOU HAVE QUESTIONS ABOUT THE COURSE.
- SIT AT THE _____________ OF THE ROOM.
- SCHEDULE AN INDIVIDUAL _________________ WITH EVERY INSTRUCTOR AT LEAST ONCE A SEMESTER.
- BE ___________ BY INTRODUCING YOURSELF TO YOUR PROFESSOR.
- NETWORKS MAKE STUDY TIME MORE ___________.
- ____________ IS AN ACTIVE LEARNING PROCESS WHERE STUDENTS LEARN MOSTLY BY INTERACTING WITH PROFESSORS AND STUDENTS.
22 Clues: SIT AT THE _____________ OF THE ROOM. • WHEN YOU HAVE A QUESTION, __ ___ ____. • A GREAT VARIETY OF HUMAN CHARACTERISTICS • DON'T EVER THINK A QUESTION IS ________. • NETWORKS MAKE STUDY TIME MORE ___________. • NETWORKS ARE _______, VOLUNTARY, AND RESPECTFUL. • _________ YOUR THOUGHTS BEFORE ANSWERING A QUESTION. • ...
Network requirements. 2024-09-23
Across
- IP – An address used to identify devices on a public network like the internet.
- – Process of dividing a network into smaller parts to reduce congestion.
- – A device that converts data for transmission over telephone lines.
- – A network configuration where each node is connected in a loop.
- – A high-speed network within a small area like a home or office.
- – A device that connects multiple networks and directs data based on its destination address.
- – A global system of interconnected networks.
- Address – A unique number that identifies devices on a network.
- – A rule that specifies allowed and disallowed traffic on a network.
- – Protocol used to resolve IP addresses into MAC addresses.
Down
- – Verifying identity before accessing a network resource.
- – A method for managing data collisions on a shared network.
- – Method for encoding and decoding data into electrical signals for communication.
- – Layer responsible for ensuring complete data transfer.
- – Smallest unit of data.
- – A system that translates domain names into IP addresses.
- – A device used to strengthen a signal across long network distances.
- – Device used to split a network connection and send data to all connected devices.
- – A virtual network used to segment a physical network.
- – Protocol for transferring files between client and server.
20 Clues: – Smallest unit of data. • – A global system of interconnected networks. • – A virtual network used to segment a physical network. • – Layer responsible for ensuring complete data transfer. • – Verifying identity before accessing a network resource. • – A system that translates domain names into IP addresses. • ...
Chapter 4 2025-03-11
Across
- the frequency of the wave forms usually expressed as ____
- A telecommunication closer that houses cabling and devices for work area computers
- the location of the cabling and equipment that connects an organization's network
- a cable that uses 568B standard and 568A standard on the other end
- Short cable for connecting a computer
- putting RJ-45 plugs on a cable to make a patch cable
- in ____, an organization might use wireless components to increase a LAN's span
- wireless networks use ____ light beams to send signals between pair of devices
- workstations and other user devices are located
- interference one wire generates on another wire when both are in a bundle
- the process where, bit signals are presented on the medium
Down
- a transmitter/receiver device, called a ___ must be installed to translate between wired and wireless networks
- An equipment room that's the connection point between IDFs
- Cable that comes in two types: unshielded and shielded
- trades electrical pulses for pulses of light
- is a length of cable between two network devices, such as NIC and a switch
- LANs use low powered two-way radio communication
- houses servers, routers, switches, and other major network equipment
- term for all cables and connectors tying a network together
- Cabling designed to carry voice but not data called _____
20 Clues: Short cable for connecting a computer • trades electrical pulses for pulses of light • workstations and other user devices are located • LANs use low powered two-way radio communication • putting RJ-45 plugs on a cable to make a patch cable • Cable that comes in two types: unshielded and shielded • the frequency of the wave forms usually expressed as ____ • ...
Cybersecurity & Internet 2025-03-11
Across
- A fraudulent attempt to obtain sensitive information via the internet.
- A structured set of data held in a computer.
- A form of bullying that occurs online.
- The act of stealing someone’s personal information for malicious purposes.
- A global network connecting millions of computers.
- Software designed to harm or exploit devices.
- The amount of data that can be transmitted in a fixed amount of time.
- The correct or acceptable way of communicating on the internet.
- A system designed to prevent unauthorized access to or from a network.
- A protocol used to transfer data over the internet.
- Individuals who exploit the internet to harm others.
- A unique identifier in a database.
Down
- The use of the internet to stalk or harass someone.
- Software used to manage and organize databases.
- Increased capacity for data transfer.
- A password that is difficult for others to guess or crack.
- A device that forwards data packets between computer networks.
- A unique string of numbers assigned to each device on a network.
- Reduced capacity for data transfer.
- The trail of data that individuals leave when using the internet.
- The system that translates domain names into IP addresses.
- Illegal activities that involve computers or networks.
22 Clues: A unique identifier in a database. • Reduced capacity for data transfer. • Increased capacity for data transfer. • A form of bullying that occurs online. • A structured set of data held in a computer. • Software designed to harm or exploit devices. • Software used to manage and organize databases. • A global network connecting millions of computers. • ...
CN 2024-10-15
Across
- The process of directing data between different networks
- The unique identifier for a device on a network
- A protocol that divides messages into smaller packets for transmission
- A type of IP address that uses 128 bits
Down
- A device that connects multiple networks and forwards packets
- A protocol used for sending error messages and operational information
- A protocol that provides automatic IP address configuration
- A standard format for transmitting packets over the Internet
8 Clues: A type of IP address that uses 128 bits • The unique identifier for a device on a network • The process of directing data between different networks • A protocol that provides automatic IP address configuration • A standard format for transmitting packets over the Internet • A device that connects multiple networks and forwards packets • ...
Networking Basics 2016-10-07
Across
- A network connecting device that maps out MAC addresses of connecting node to mange traffic within a network
- A protocol in the TCP/IP stack for transmitting data within a network by trying to send data only when the medium is not occupied
- Two or more network-ready devices connect together via wired or wireless medium
- A company providing the connection between a network and the Internet for a fee (abbrev.)
- Typical measurement of the Internet speed (abbrev.)
- The physical address of a network node (2, one is abbreviated)
- Node on a network specialized in reducing traffic congestion by segmenting a network into subnetworks (2)
- A unique identifier of a node on a network (2, one is abbreviated)
- A connecting device that allows communication between networks using different communication protocols or access methods
Down
- A node on a network giving services, such as file sharing, Web browsing, and email
- Cable that is often used for Ethernet communication with RJ45 connectors on both ends (abbrev.)
- A type of cable made with glass fibers commonly used for long-distance transmission (2)
- A virtual meeting on the Web using a controlled interface that participants can share their screens or taken over control of another’s screen (2)
- A simple connecting device that broadcasts every message received to the whole network
- pair A type of cable originally used for telephone but now is also popular for LAN transmission (2)
- The actual carrier that transmits data on a network (2)
- Maximum data transfer rate from one point on a network to another in a specific time
- A network-ready device connected to a computer network
- A network connecting device that connects networks and regulates traffic flows between these networks
- The name of a physical topology where each node on the network is connected to a central device
- A hardware device with an antenna that sends and receives radio signals to and from a mobile device and a wired LAN (abbrev.)
- A computer network supporting users in a small geographical area (abbrev.)
22 Clues: Typical measurement of the Internet speed (abbrev.) • A network-ready device connected to a computer network • The actual carrier that transmits data on a network (2) • The physical address of a network node (2, one is abbreviated) • A unique identifier of a node on a network (2, one is abbreviated) • ...
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
Chapter 6 2023-04-04
Across
- is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.
- This automatically assigns IP addressing to a device. a client-server protocol in which servers manage a pool of unique IP addresses.
- an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
- is a feature or characteristic in operating systems which enables computers to self-configure an IP address and subnet mask
- sequence of characters that uniquely names a Wi-Fi network.
- a signal sent to a host that requests a response.
- This statically assigns IP addressing to a device.
- Includes wired and wireless network interface cards (NIC) and network devices such as switches, wireless access points (APs), routers, multipurpose devices, and more.
- is a collection of IP standards designed to optimize the process of allocating IP addresses by forming unique identifiers.
- A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network
- allows prioritization of specific traffic types.
- is a network diagnostic tool used to track the pathway taken by a packet on an IP network from source to destination.
- defines the range of IP addresses that can be used within a network or subnet.
- is an application or computer that sends, receives, and relays email.
- allows a temporary opening in the firewall to allow data to specific inbound ports or a port range for an application or game.
- a network that provides services to an untrusted network.
Down
- used to specify the MAC addresses that are allowed on the wireless network.
- a node that enables a connection between networks in order to allow machines on other networks to communicate.
- It is used to automatically assign an IP address to a device in an IP network when there is no other assignment method available.
- A unique number that is part of the NIC.
- is a temporary address for devices connected to a network that continually changes over time.
- a device that connects two or more packet-switched networks or subnetworks
- A command line utility that is used to display and manage the IP address assigned to the machine.
- a computer network security system that restricts internet traffic in, out, or within a private network.
- allows traffic to specific ports.
- a 32-bit number assigned to a computer as an address on the internet and does not change.
- Involves knowing how networks are interconnected to support the needs of a business.
- The unique identifier that serves as the name of your computer or server.
- allows devices to dynamically add themselves to a wireless network without intervention/configuration.
29 Clues: allows traffic to specific ports. • A unique number that is part of the NIC. • allows prioritization of specific traffic types. • a signal sent to a host that requests a response. • This statically assigns IP addressing to a device. • a network that provides services to an untrusted network. • sequence of characters that uniquely names a Wi-Fi network. • ...
Hardware 2020-03-10
Across
- A unit of information equal to 220 bytes or, loosely, one million bytes.
- A passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid
- A small device able to be connected to and used with a computer, especially to allow access to wireless broadband or use of protected software.
- It is a frequency unit of cycles per second that measures transmissions through airwaves or conduits
- A place in a computer where an expansion card can be inserted.
- A device which can be slotted into a computer to allow the use of audio components for multimedia applications.
- A central processor or main processor, is the electronic circuitry within a computer that executes instructions that make up a computer program.
- A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
- A form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
- A type of storage medium that permanently stores data on personal computers (PCs) and other electronic devices.
Down
- A computer hardware component that connects a computer to a computer network.
- It is a frequency unit that measures the number of cycles per second.
- A family of computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
- An electrical device that supplies electric power to an electrical load.
- A printed circuit board found in general purpose computers and other expandable systems.
- A device that you connect to a home entertainment system, it allows you to send music from your phone to the music system via Bluetooth.
- A standard for connecting computers and their peripherals.
- A unit of information equal to one billion (109) or, strictly, 230 bytes.
- A printed circuit board controlling output to a display screen.
20 Clues: A standard for connecting computers and their peripherals. • A place in a computer where an expansion card can be inserted. • A printed circuit board controlling output to a display screen. • It is a frequency unit that measures the number of cycles per second. • A unit of information equal to 220 bytes or, loosely, one million bytes. • ...
IT terms 2019-05-17
Across
- Standsfor one picture element (one dot on a computer monitor). commonly used as a unit of measurement.
- An unexpected problem with software or hardware. Typical problems are often the result of external interference with the program’s performance that was not anticipated by the developer.
- The physical components of a computer including the keyboard, monitor, disk drive, and internal chips and wiring.
- A collection of information organized so that a computer application can quickly access selected information.
- A person (or software) using an information system
- The manipulation of data to prevent accurate interpretation by all but those for whom the data is intended.
- A set of rules that regulate how computers exchange information.
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- A point within a network that interconnects with other networks.
Down
- A binary digit (either 0 or 1). it is the most basic unit of data that can be recognized and processed by a computer.
- A group of interconnected computers capable of exchanging information.
- Software programs designed to damage or do other unwanted actions on a computer. common examples: viruses, worms, trojan horses, and spyware.
- A handheld device used with a graphical user interface system.
- A measurement of the amount of data that can be transmitted over a network at any given time.
- A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file. often used in conjunction with a username.
- An area on a disk that contains files or additional divisions called "subdirectories" or "folders".
- The method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
- A computer that is responsible for responding to requests made by a client program (e.g., a web browser or an e-mail program) or computer.
- A widely used Open Source Unix-like operating system.
- A penguin character and the official brand character of the Linux kernel.
20 Clues: A person (or software) using an information system • A widely used Open Source Unix-like operating system. • A handheld device used with a graphical user interface system. • A set of rules that regulate how computers exchange information. • A point within a network that interconnects with other networks. • ...
Chapter 5 IT Essentials Vocab (Mr. G) 2023-11-07
Across
- (2 words)commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility. It provides a connection point between PCs and the switches or routers.
- unshielded twisted-pair
- wide area networks. large computer network that connects groups of computers over large distances.
- (2 words) composed of two kinds of glass (core and cladding) and a protective outer shield (jacket). It uses light to transmit signals.
- (or coax) carries data in the form of electrical signals. The cable usually constructed of either copper or aluminum.
- An alternative for customers who cannot get cable or DSL connections. Does not require a phone line or cable, but uses a satellite dish for two-way communication.
- type of server that provides 3 main functions: gather logging information for monitoring and troubleshooting, select the type of logging information that is captured, and specify the destinations of captured syslog messages.
- Post Office Protocol
- electromagnetic interference
- connects a home or small office to the Internet.
- Simple Mail Transfer Protocol
- serves as the gateway to outside networks, use IP addresses to forward traffic to other networks.
Down
- Unified Threat Management
- Use of a cellular device to provide an internet connection to another device
- microsegments a LAN and has replaced bridges and hubs, they filter and segment network traffic by sending data only to the device to which it is sent
- (2 words)
- type of modem that connects a user’s network directly to the digital infrastructure of the phone company. always-on service, which means that there is no need to dial up each time you want to connect to the internet
- personal area network
- (2 words) Acts as storage or cache for web pages that are frequently accessed by devices on the internal network. Has the authority to act as another computer.
- Wireless protocol for close proximity connectivity. Operates in the 2.4 to 2.485 GHz radio frequency range and is typically used for PANs. Incorporates Adaptive Frequency Hopping (AFH)
- Internet Message Access Protocol
- Shielded twisted-pair
22 Clues: (2 words) • Post Office Protocol • personal area network • Shielded twisted-pair • unshielded twisted-pair • Unified Threat Management • electromagnetic interference • Simple Mail Transfer Protocol • Internet Message Access Protocol • connects a home or small office to the Internet. • Use of a cellular device to provide an internet connection to another device • ...
Ziaul Crossword 2024-12-03
Across
- attackers who do not report problems, but instead disseminate the information to other black hat attackers
- prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- memory is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- is a series of letters, numbers, and special characters, much like a password, that two communicating devices use to authenticate each other’s identity.
- protocols used by OSs and network devices offer varying levels of secure authentication
- is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
- requires a user to supply two or more types of authentication drawn from these credential categories:
Down
- used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
- Wizard guides you through the process of selecting the type of rule you want to create and the protocols or applications that the rule will apply to
- Authentication Protocol (PAP)
- or server is not communicating with certain applications or services, the protocol might be blocked
- firewall creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- the information that is swapped back and forth from RAM to disk and vice versa is stored in a specially allocated disk area called
- that creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS.
- – backs up the disk sector by sector to create an exact image of the disk’s contents
- distributions have a built-in firewall called netfilter
- testers who are paid to probe networks and OSs and report vulnerabilities to the OS vendor.
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- Defender Firewall is enabled and configured with default settings
- can be restricted to logging on only from particular workstations
20 Clues: Authentication Protocol (PAP) • distributions have a built-in firewall called netfilter • Defender Firewall is enabled and configured with default settings • can be restricted to logging on only from particular workstations • – backs up the disk sector by sector to create an exact image of the disk’s contents • ...
BTEC DIT C3A - Modern Technologies 2025-03-04
Across
- The same data is stored in multiple locations
- If no transmitter is present in the cell then there will be no signal
- Anyone who is affected by or who can affect an organisations’ actions and policies
- Temporary networks with two or more computing devices
- Allows the same files to be copied to multiple devices via the cloud
- Online tools used to plan times and jobs for teams
Down
- __________ working - working away from the main office
- A secure tunnel between your device and the internet.
- The hardware and software that allow devices, applications, and users to communicate and connect to networks
- A copy of data to be used as part of disaster recovery
- Method of wireless connectivity over short distances (up to 10m)
- Free, unencrypted wireless connections
- Data that is divided up into smaller amounts. The data is then stored in different locations
13 Clues: Free, unencrypted wireless connections • The same data is stored in multiple locations • Online tools used to plan times and jobs for teams • A secure tunnel between your device and the internet. • Temporary networks with two or more computing devices • __________ working - working away from the main office • A copy of data to be used as part of disaster recovery • ...
10 2024-01-31
Across
- SUBMISSIONS Submitting websites to low-quality directories for backlinks.
- Networks of websites created solely for the purpose of linking to a target site.
- Illegally acquiring control over a domain name to redirect traffic.
- Redirecting users to different content than what search engines see.
Down
- Hosting malicious content on legitimate websites to exploit their authority.
- Generating fake likes, shares, or comments on social media.
- Filtering out negative reviews to artificially inflate ratings.
- META TAGS Stuffing meta tags with excessive keywords to manipulate rankings.
- Using misleading titles to attract clicks to low-quality content.
- Creating networks of websites solely for the purpose of link exchange.
10 Clues: Generating fake likes, shares, or comments on social media. • Filtering out negative reviews to artificially inflate ratings. • Using misleading titles to attract clicks to low-quality content. • Illegally acquiring control over a domain name to redirect traffic. • Redirecting users to different content than what search engines see. • ...
Network cross word puzzle 2024-08-14
Across
- The protocol is responsible for ensuring data arrives correctly.
- A network's ability to handle an increase in load or demand.
- A network where computers communicate directly with each other without a central server.
- This type of address uniquely identifies a device on a network.
- A network that covers a large geographical area.
- The smallest unit of data in a network.
- The main method for measuring the capacity of a network connection.
- The device that forwards data packets between computer networks.
- A private network that uses public networks to connect remote sites or users.
- This protocol ensures data is sent securely over the network.
Down
- A standard for connecting computers in a local area network.
- This protocol breaks data into small packets for transmission.
- This network layer protocol handles the routing of packets.
- A type of network configuration where all devices are connected to a central hub.
- A device that amplifies or regenerates network signals to extend the range.
- The maximum amount of data that can be transmitted over a network in a given time.
- A technology that allows multiple devices to share the same network connection.
- A system that converts domain names to IP addresses.
18 Clues: The smallest unit of data in a network. • A network that covers a large geographical area. • A system that converts domain names to IP addresses. • This network layer protocol handles the routing of packets. • A standard for connecting computers in a local area network. • A network's ability to handle an increase in load or demand. • ...
digital literacy 2024-06-17
Across
- controlled by one person
- spreads between files
- pretends to be you
- unsafe websites/unsafe programs visits
- fire extinguisher
- spreads through networks/emails
- unit of measurement for electricity pressure
- spies on you
- wireless,signal loss
Down
- tricks you
- transmission capacity
- before touching inside of a computer
- send signals in network
- blocks you from files
- sends what you type to someone
- number of bits per second
- owns the internet
- defense department project
- dangerous to open
19 Clues: tricks you • spies on you • owns the internet • fire extinguisher • dangerous to open • pretends to be you • wireless,signal loss • transmission capacity • spreads between files • blocks you from files • send signals in network • controlled by one person • number of bits per second • defense department project • sends what you type to someone • spreads through networks/emails • ...
Infosec 2013-05-30
Across
- Your system can remain secured only if it has the latest __________.
- potential that an action or activity will lead to a loss
- A group of your colleagues who assists you in securely evacuating in any emergency situation.
- FAI Information security documents are made available to users on
- important in computers and networks
- a breach in security, such as unauthorized access to data
- or malware is a file or program other then a virus that is potentially harmful.
- Entering premises without swiping your access card by following someone else.
- any information about an individual which can be used to uniquely identify that person, e.g. name, date and place of birth, mother’s maiden name, social security number is ............. Identifiable Information
- is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
- Ensure that authorised user have access to information & associated assets when required.
- emailID to report security incidents
- list of permissions that tells an operating system which users have access rights to objects, and what operation they are allowed to perfom on those objects
- is a self-replicating program that is harmful to networks.
- is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
- who is responsible for security
- I am not authorized to install applications and software that are
Down
- Independent review of how well you are following and complying with the standards and policies.
- visitors need to be
- Organization’s preparedness program for handling disruptions.
- of death is a series of repeated, larger than normal pings that crash the receiving computer.
- If you access a computer systems without the owner’s knowledge and approval, you are committing a _____
- is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- is used to discard hard copies of confidential data.
- Password must be always kept _______ .
- is ensuring the accuracy and completeness of Information.
- Ensuring the information is accessible only to those authorised have access.
- is a program written with malicious intent and sent out by attackers.
- Programming language that allows applets to run within a web browser.
- The scrambling of data into a secret code that can be read only by software set to decode the information.
- Your activities on the network can be ____________ by the company.
- is a software program that displays advertising on your computer.
- these set out the technical controls required to achieve the policy objeclives
- Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain based on information they have obtained from these social networks or victim themselves
- abbreviation for voice communications over internet networks
- anything of value, such as source code, processes, hardware, people etc.
36 Clues: visitors need to be • who is responsible for security • important in computers and networks • emailID to report security incidents • Password must be always kept _______ . • is used to discard hard copies of confidential data. • potential that an action or activity will lead to a loss • is ensuring the accuracy and completeness of Information. • ...
Crossword2 2024-12-18
Across
- A computer that provides resources to other devices.
- The practice of protecting systems, networks, and programs from digital attacks.
- The language used to structure web pages.
- An error in a program that needs fixing.
- Address A unique string of numbers separated by periods that identifies each computer using the Internet Protocol.
Down
- Secures data by converting it into a coded format.
- Protects networks from unauthorized access.
- Stores data on the internet instead of your local device.
8 Clues: An error in a program that needs fixing. • The language used to structure web pages. • Protects networks from unauthorized access. • Secures data by converting it into a coded format. • A computer that provides resources to other devices. • Stores data on the internet instead of your local device. • ...
East Asia 2023-10-04
10 Clues: island chain • move from power • Japanese general • physical geography • money in circulation • transportation networks • groups of representatives • wealthy Japanese landowners • regional difference in language • the characteristics of a population
test 2013-01-02
Across
- / Operating System
- / Our ERP system
- / Our anti-virus software vendor
- / Computer manufacturer
- / Open-source office productivity software suite
- / Electronic message
Down
- / Our anti-spam filter
- / Data storage device
- / What does the V stand for in DVD?
- / Global system of interconnected computer networks
- / Computer screen
- / ********* Serial Bus
- / Copying and archiving of computer data
- / Popular smartphone
14 Clues: / Our ERP system • / Data storage device • / Computer screen • / Operating System • / ********* Serial Bus • / Popular smartphone • / Electronic message • / Our anti-spam filter • / Our anti-virus software vendor • / Computer manufacturer • / What does the V stand for in DVD? • / Copying and archiving of computer data • ...
ISY 106 CROSSWORD 2024-09-22
Across
- A network security system that monitors and controls incoming and outgoing network traffic.
- A common method of network communication in local area networks (LANs).
- The brain of the computer, responsible for executing instructions.
- Service that translates domain names into IP addresses.
- Address, Unique identifier assigned to each device connected to a network.
- A networking device that connects devices within a LAN and forwards data.
- A device that forwards data between networks.
- Firmware used to perform hardware initialization during the booting process.
Down
- The core part of an operating system, managing hardware resources.
- A small-sized type of volatile computer memory that provides high-speed data access to a processor.
- Software that enables the creation and management of virtual machines.
- Technology that allows for the creation of virtual versions of physical computing resources.
- Computing model that allows access to a shared pool of configurable computing resources over the Internet.
- A communication system that transfers data between components inside a computer or between computers.
- Volatile memory used by the CPU to store data for active programs.
- Software that manages computer hardware and software resources.
16 Clues: A device that forwards data between networks. • Service that translates domain names into IP addresses. • Software that manages computer hardware and software resources. • The core part of an operating system, managing hardware resources. • Volatile memory used by the CPU to store data for active programs. • ...
VA/OA 2013-08-19
Across
- Stakeholders within the organisation
- Being able to be seen
- Creating a reaction by your actions
- Testing the 3Es
- A repository of information
- The person in charge
Down
- Create awareness
- to exchange information
- Networks of instant communication
- Working together
- Online writing
- The goal of current PA strategy
- Best friend
- A collection of records
14 Clues: Best friend • Online writing • Testing the 3Es • Create awareness • Working together • The person in charge • Being able to be seen • to exchange information • A collection of records • A repository of information • The goal of current PA strategy • Networks of instant communication • Creating a reaction by your actions • Stakeholders within the organisation
CIW-NTA Lesson 3 Vocabulary 2025-01-16
Across
- A high-speed direct Internet connection that uses all-digital networks.
- The end point of a connection (either side), which usually includes the TCP or UDP port used and the IP address. Used for communication between a client and a server.
- The Internet standard protocol for remote terminal connection service.
- A software application that enables a PC or mobile device to function as a telephone using VoIP technology.
- A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
- A very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity.
- A person's ability to use technology while "on the go."
Down
- A standard for short-range radio signals that is used to form personal area networks (PANs).
- A mobile phone that includes PC-like functionality.
- A more compact, Web-oriented version of the standard laptop PC; relies on the cloud computing model in which the Internet is used for remote access to Web applications.
- A device that allows computers to communicate over a network by modulating and demodulating the cable signal into a stream of data.
- A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
- ABBREVIATION ONLY. The complete domain name of an Internet computer, such as www.CIWcertified.com.
- A file that contains mappings of IP addresses to host names.
- One link between two network devices; the number of hops between two devices is considered a hop count.
15 Clues: A mobile phone that includes PC-like functionality. • A person's ability to use technology while "on the go." • A file that contains mappings of IP addresses to host names. • The Internet standard protocol for remote terminal connection service. • A high-speed direct Internet connection that uses all-digital networks. • ...
CHAPTER 6 TERMS 2020-08-12
Across
- used to rate the trustworthiness of routing information received on one router from its neighboring router
- an external routing protocol that uses a sophisticated algorithm to determine the best route
- means it sends the subnet mask information with the route updates (prefix routing)
- a collection of networks under a common administrative domain
- used to communicate between multiple autonomous systems (AS)
- a way to configure more than one physical router to appear as if they were only a single logical one.
- a router receiving an update from a neighbor router believes the information about remote networks without verifying for itself if the news is actually correct
- all devices in the network must use the same subnet mask for each specific address class.
Down
- the time required by protocols to update their forwarding tables after changes have occurred
- a path considered a backup route
- each router keeps state information about adjacent neighbors
- best route to a remote network
- two types of routing protocols used in internetworks
- involves encapsulating one type of protocol in another type of protocol
- allows a group of routers to for a single virtual router. On router is elected to handle all request sent to the virtual IP address
- a unique IP address on the same subnet as the hosts defined in the configuration
- uses only the hop count to determine the best way to a remote network
- finds the best path to a remote network by judging distance. Each router running RIP sends it complete routing tables out to all active interfaces at periodic time intervals.
- a network that has two or more subnetworks of a classful network connected together by different classful networks.
- the routing tables include information about all the networks in the internetwork.
- useful for carrying IPv6 data over a network that is still IPv4
- contains all destinations advertised by neighboring routers
- a Cisco proprietary protocol that can be run on most, but not all, of Cisco’s router and multilayer switch models
- exchanged by routers to determine which other routers are available to exchange routing data with
- general-purpose encapsulation that allows for transporting packets from one network through another network through a VPN
- allows you to used variable length subnet mask
- translating one routing protocol into another
- uses aspects of both distance vector and link state.
- (shortest path first protocol) sends updates containing the state of their own links to all other routers on the network.
- the amount of bandwidth on the lines will be used to find the best path to the remote network
30 Clues: best route to a remote network • a path considered a backup route • translating one routing protocol into another • allows you to used variable length subnet mask • two types of routing protocols used in internetworks • uses aspects of both distance vector and link state. • contains all destinations advertised by neighboring routers • ...
Chapter 11-12 crossword 2023-11-27
Across
- A solid in which particles lack an organized structure
- Because in the solid and liquid states particles are closer together
- Intermolecular forces that bind a substance to a surface are called
- Extended networks of atoms held together by metallic bonding
- Different structural forms of the same element
- The resistance of a liquid to flow and increases with stronger intermolecular forces and decreases with higher temperature.
- The rise of liquids up narrow tubes is called capillary action.
- Solid in which particles are arranged in a definite repeating pattern
- Discrete molecules held by intermolecular forces
- Intermolecular forces that bind similar molecules to one another are called
Down
- The energy or work required to increase the surface area of a liquid due to intermolecular forces
- Conversion from one state of matter to another is called a
- A temporary attractive force that occurs when electron clouds in neighboring atoms occupy positions that create temporary dipoles
- The pressure needed to compress the liquid at critical temperature is called
- The state beyond this temperature is called a
- Extented networks of ions held together
16 Clues: Extented networks of ions held together • The state beyond this temperature is called a • Different structural forms of the same element • Discrete molecules held by intermolecular forces • A solid in which particles lack an organized structure • Conversion from one state of matter to another is called a • Extended networks of atoms held together by metallic bonding • ...
Crossword 2024-04-18
Across
- the programs and other operating information used by a computer
- he protection of computer systems and networks from attacks by malicious actors
- team focus is on phone networks, recording calls and call center
- a request for information
- set of data processing elements connected in series, the output of one element is the input of another
- (abbrev)determines stakeholder needs and drives strategy for IT team
- objectively analyze desired processes and outcomes, advise on correct combo of IT systems
Down
- position focus is to support teams on IT floor to produce efficiently and effectively
- the systems put in place to operate and manage IT services and environments
- a structured set of data held in a computer
- creates/develops training materials for IT
- team focused on keeping monitors, computers and general physical technology in working order
- maximum rate of data transfer across a given path
- (abbrev) much of the job involves attempting to "break" code
- subset of programming entailing logical reasoning, analysis, and planning a sequence of instructions
- (abbrev) computer systems able to perform tasks such as visual perception, speech recognition, decision-making
16 Clues: a request for information • creates/develops training materials for IT • a structured set of data held in a computer • maximum rate of data transfer across a given path • (abbrev) much of the job involves attempting to "break" code • the programs and other operating information used by a computer • team focus is on phone networks, recording calls and call center • ...
Wireless/Bluethooth 2023-03-28
Across
- Multi-User MIMO
- Clear Channel Assessment
- Multiple-Input, Multiple-Output
- extended service set
- MAN Wireless metropolitan area networks
- Quality of Service
- PAN Wireless personal area networks
- Temporal Key Integrity Protocol
- Remote Authentication Dial-In Service
- Extensible Authentication Protocol
Down
- Multi-User Multiple Input-Multiple Output
- Internet of Things
- Near Field Communication
- WAN Wireless wide area networks
- Dynamic Frequency Selection
- Advanced Encryption Standard
- Received Signal Strength Indication
- Wi-Fi Protected Setup
- Service Set Identifier
- Wireless LAN
- Terminal Access Controller Access-Control System
21 Clues: Wireless LAN • Multi-User MIMO • Internet of Things • Quality of Service • extended service set • Wi-Fi Protected Setup • Service Set Identifier • Near Field Communication • Clear Channel Assessment • Dynamic Frequency Selection • Advanced Encryption Standard • WAN Wireless wide area networks • Multiple-Input, Multiple-Output • Temporal Key Integrity Protocol • ...
CIS 101 Cybersecurity Crossword puzzle 2025-03-14
Across
- Protocol for secure email
- Method to authenticate users
- Scrambles data for privacy
- Protects systems from malware
- Scanning for vulnerabilities
- Prevents unwanted emails
- Remote monitoring of devices
- Standard for network encryption
Down
- Attack on website servers
- Secure file sharing protocol
- Fake website for phishing
- Unauthorized access to data
- Denial of Service attack
- Security for wireless networks
- A breach of security
- Malicious software program
- Unauthorized user access point
- Attack on network resources
- Software to block threats
19 Clues: A breach of security • Denial of Service attack • Prevents unwanted emails • Attack on website servers • Protocol for secure email • Fake website for phishing • Software to block threats • Scrambles data for privacy • Malicious software program • Unauthorized access to data • Attack on network resources • Secure file sharing protocol • Method to authenticate users • ...
Lesson 3 Vocab 2024-02-02
Across
- A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
- A device that allows computers to communicate over a network by modulating and demodulating the cable signal into a stream of data.
- A file that contains mappings of IP addresses to host names.
- A standard for short-range radio signals that is used to form personal area networks (PANs).
- A mobile phone that includes PC-like functionality.
- A more compact, Web-oriented version of the standard laptop PC; relies on the cloud computing model in which the Internet is used for remote access to Web applications.
- A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
- One link between two network devices; the number of hops between two devices is considered a hop count.
- The complete domain name of an Internet computer, such as www.CIWcertified.com.
Down
- The Internet standard protocol for remote terminal connection service.
- The end point of a connection (either side), which usually includes the TCP or UDP port used and the IP address. Used for communication between a client and a server.
- A very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity.
- A high-speed direct Internet connection that uses all-digital networks.
- A software application that enables a PC or mobile device to function as a telephone using VoIP technology.
- A person's ability to use technology while "on the go."
15 Clues: A mobile phone that includes PC-like functionality. • A person's ability to use technology while "on the go." • A file that contains mappings of IP addresses to host names. • The Internet standard protocol for remote terminal connection service. • A high-speed direct Internet connection that uses all-digital networks. • ...
Computer terms 2021-05-10
Across
- It comprises the entire set of programs, procedures, and routines associated with the operation of a computer system.
- It stands for World Wide Web
- It stands for Wireless Fidelity.
- Also called USB or flash drive.
- A set of headphones, especially one with a microphone attached to it.
- a piece of electronic equipment that connects computer networks to each other, and sends information between networks.
Down
- A program you use to look at, and navigate between, pages on the World Wide Web
- Also called cables.
- Also called virus or malware
- an electronic device that allows one computer to send information to another through standard phone lines and therefore over long distances.
- It refers to the physical parts of a computer and related devices.
11 Clues: Also called cables. • It stands for World Wide Web • Also called virus or malware • Also called USB or flash drive. • It stands for Wireless Fidelity. • It refers to the physical parts of a computer and related devices. • A set of headphones, especially one with a microphone attached to it. • ...
The Cardiovascular System 2023-11-16
Across
- cardiac rhythm management
- HEART
- Attack
- vessels that return blood to the heart
- vessels that deliver blood to tissues
- a scan used to look at the heart and nearby blood vessels
- failure When the heart fails
- how the heart works during physical activity
- a sudden blockage
- muscle disease
Down
- peripheral vascular disease
- CELL
- are networks of small vessels that perfuse tissues
- cardiovascular disease
- transient ischemic attack
- a problem with the rate of your heartbeat
- BLOOD
- computed tomography scan
- magnetic resonance imaging
- CLOT, LUMP
- Pumps blood through the system
- electrocardiogram
22 Clues: CELL • HEART • BLOOD • Attack • CLOT, LUMP • muscle disease • a sudden blockage • electrocardiogram • cardiovascular disease • computed tomography scan • cardiac rhythm management • transient ischemic attack • magnetic resonance imaging • peripheral vascular disease • failure When the heart fails • Pumps blood through the system • vessels that deliver blood to tissues • ...
U03 - CSE-CH03 2024-02-15
Across
- A type of malware, similar to a virus, which self-replicates across networks without the need for a user to open an infected program.
- (8,8) Protecting the places where people work, and the locations of systems, services and networks.
- A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
- (5,9) Files containing data unique to particular pieces of malware, including viruses, that security software downloads in order to aid detection.
- A cyber attack where a user is misdirected to a fraudulent website, despite entering the correct address.
- (6,5) A type of malware, disguised as legitimate software, that is used to gain unauthorised access to a victim's computer.
Down
- (5,8) A form of phishing targeting particular individuals, where the email is designed to look like it's from a trusted or known person.
- is any kind of software that can damage computer systems, networks or devices. Includes viruses, ransomware and trojans.
- (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
- Deliberate or accidental threat to an organisation's security from someone who has authorised access (such as an employee).
- Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives.
- (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
- Unsolicited email sent in bulk, also referred to as junk email.
13 Clues: Unsolicited email sent in bulk, also referred to as junk email. • Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives. • (8,8) Protecting the places where people work, and the locations of systems, services and networks. • ...
GCSE Computer Science: Networks 2018-02-17
Across
- The 'b' in mbps stands for…
- A computer on a network that provides facilities to others, such as storage or printing.
- A network with a central hub to which all computers are connected.
- A computer that connects to a network and uses its services and resources.
- A network where there is no server - all clients are equal. (3 words)
- Connecting your phone to your laptop would create this type of network. (3 words)
- A collection of computers connected together to exchange data.
- A network where computers are connected in a circle.
Down
- The unit used to measure network speed.
- The Internet is the most famous example of this type of network. (3 words)
- A network where every computer is connected to every other computer.
- A network set up in a small geographical area, such as an office. (3 words)
- Computers in this network are connected in a line.
- This word means 'the way we lay out our network'.
14 Clues: The 'b' in mbps stands for… • The unit used to measure network speed. • This word means 'the way we lay out our network'. • Computers in this network are connected in a line. • A network where computers are connected in a circle. • A collection of computers connected together to exchange data. • A network with a central hub to which all computers are connected. • ...
Neural Networks and Deep Learning 2023-11-14
Across
- How far the filter moves in every step along one direction
- An unsupervised learning rule that attempts to connect the psychological and neurological underpinnings of learning &
- Function used to calculate the total net input &
- Most popularly used activation function in the areas of convolutional neural networks and deep learning: f(x) is zero when x is less than zero and f(x) is equal to x when x is above or equal to zero &
- Applied after the convolutional layer, used to reduce the dimensions of the feature maps
- A gradient descent learning rule for updating the weights of the inputs to artificial neurons in a single-layer neural network &
- Addition of extra pixels around the borders of the input images or feature map
- The output remains the same as the input &
- A machine learning training method based on rewarding desired behaviors and punishing undesired ones &
- Simplest type of RNN
- A RNN, aimed to deal with the vanishing gradient problem present in traditional RNNs
- A process by which an initial set of data is reduced by identifying key features of the data for machine learning &
- A technique to prevent exploding gradients in very deep networks, usually in RNNs
- A mathematical function that converts a vector of real numbers into a probability distribution &
- A type of RNN that, in certain cases, has advantages over LSTM
- It is a widely adopted activation function for a special type of neural network known as Backpropagation Network &
- A supervised machine learning method where the model tries to predict the correct label of a given input data &
- A systematic error that occurs in the machine learning model itself due to incorrect assumptions in the ML process &
- A type of artificial neural network which uses sequential data or time series data
- A matrix of weights which are multiplied with the input to extract relevant features
Down
- A commonly used activation function: it gives 1 as output of the input is either 0 or positive &
- A type of artificial neural network, which is widely used for image/object recognition and classification
- A branch of artificial intelligence and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy &
- An algorithm that is designed to test for errors working back from output nodes to input nodes &
- When all the training data is used at once and is defined as the total number of iterations of all the training data in one cycle for training the machine learning model &
- Uses machine learning algorithms to analyze and cluster unlabeled datasets &
- A single layer neural network with multiple nodes where each node accepts multiple inputs and generates one output &
- Function decides whether a neuron should be activated or not by calculating the weighted sum and further adding bias to it &
- A hyper-parameter used to govern the pace at which an algorithm updates or learns the values of a parameter estimate &
- A type of machine learning that learns the relationship between input and output &
- An algorithm for supervised learning of binary classifiers &
- A method in artificial intelligence that teaches computers to process data in a way that is inspired by the human brain &
- Kernel
- The need for this activation function stems from the fact that many learning algorithms require the activation function to be differentiable and hence continuous &
34 Clues: Kernel • Simplest type of RNN • The output remains the same as the input & • Function used to calculate the total net input & • How far the filter moves in every step along one direction • An algorithm for supervised learning of binary classifiers & • A type of RNN that, in certain cases, has advantages over LSTM • ...
Chapter 1; Introduction to Networks 2025-02-12
Across
- The type of computer whose primary role in the network is to give client computers access to network resources and services. The computers that most often fit this description are usually in the IT room or locked away in a closet.
- Information added to the back end of a chunk of data so that the data can be correctly interpreted and processed by network protocols.
- The acronym for a type of low-power memory that is used to store configuration information for a PC.
- A collection of users and computers in a server-based network whose accounts are managed by Windows servers called “domain controllers.”
- A type of computer memory in which continual electrical power is required to maintain the data stored in it.
- A chunk of data sent over a network containing source IP address, a destination IP address, and other IP protocol.
- A private network that allows limited and controlled access to internal network resources by outside users, usually in a business-to-business situation.
- A collection of wires that carry data from one place to another on a computer’s motherboard.
- The prefix used to measure data that indicates a Billion bytes.
- The type of CPU containing two or more processing cores.
- A network model in which all computers can function as clients or servers as needed, and there’s no centralized control over network resources.
Down
- A computer program stored in nonvolatile memory that is executed when a computer is first powered on.
- The process of adding IP addresses and then MAC addresses to chunks of data, either at the front or the end.
- A component on a motherboard that controls data transfers between memory, expansion slots, I/O devices, and the CPU.
- _____ protocols.The software defining the rules and formats a computer must use when sending information across a network.
- OS The OS installed on a computer that is designed mainly to access network resources, even though it might be capable of sharing its own. Mac OS and Windows 10 fit this description.
- A networked collection of LANs tied together by devices such as routers.
- ____ Service. The software that manages centralized access and security in a server-based network.
- The term for the username-password pair that must be given to access a computer on a network.
- A packet with source and destination MAC addresses added and an error-checking code added to the back end. Frames are generated and processed by the network interface.
20 Clues: The type of CPU containing two or more processing cores. • The prefix used to measure data that indicates a Billion bytes. • A networked collection of LANs tied together by devices such as routers. • A collection of wires that carry data from one place to another on a computer’s motherboard. • ...
Terms 2024-10-22
Across
- A networking device that connects devices within a local area network (LAN).
- A set of rules that govern communication between devices on a network.
- Zeroconf or Plug&play for IP assignment.
- A connectionless protocol that does not guarantee delivery.
- The first line of defense that monitors incoming and outgoing traffic.
- A process used to establish a connection between two network devices before communication starts.
Down
- A method for handling collisions in Ethernet networks
- The actual rate at which data is successfully transferred over a communication link.
- An organization that provides access to the Internet for individuals or companies.
- The sender can send more than one packet before receiving ACK for that packet
- A device that forwards data packets between computer networks.
- A unique identifier assigned to network interfaces for communications on the physical network segment.
12 Clues: Zeroconf or Plug&play for IP assignment. • A method for handling collisions in Ethernet networks • A connectionless protocol that does not guarantee delivery. • A device that forwards data packets between computer networks. • A set of rules that govern communication between devices on a network. • ...
Wired and Wireless Networks 2024-01-23
Across
- A wireless connection method for earphones, keyboards, etc.
- Two or more devices connected together make this.
- Describes the amount of data that can be sent down a connection in one go.
- A way of transmitting data using light.
- A powerful computer that is used to store network files, connect to printers, etc.
- A billion bits transmitted at once.
- A security method for wireless networks where data is jumbled up.
- A million bits transmitted at once.
Down
- A device used to connect a home network to the Internet.
- Describes a network that uses radio signals.
- Describes how fast data can travel down a connection.
- Describes what is happening when a video or sound pauses unexpectedly.
- A device used to connect devices together to make a network.
- Describes the delay between sending data and it being received.
14 Clues: A billion bits transmitted at once. • A million bits transmitted at once. • A way of transmitting data using light. • Describes a network that uses radio signals. • Two or more devices connected together make this. • Describes how fast data can travel down a connection. • A device used to connect a home network to the Internet. • ...
Computer Science 100 2016-02-23
Across
- World Wide Web
- copying stealing
- can be increased by good writing
- picture movies graph
- Related group of networked computers
- Local Area Network
Down
- Hacking
- component of website
- someone or something of entity
- main technology for local area network
- Wide Area Networks
- the codes or tags of browsers
- Domain Name System
13 Clues: Hacking • World Wide Web • copying stealing • Wide Area Networks • Domain Name System • Local Area Network • component of website • picture movies graph • the codes or tags of browsers • someone or something of entity • can be increased by good writing • Related group of networked computers • main technology for local area network
Acronyms 2024-09-25
Across
- United States Family Health Plan
- Other Health Insurance
- Affordable Care Act
- Qualifying Life Event
- TRICARE Retired Reserve
- Defense Health Networks
- Continued Health Care Benefits Program
Down
- Military Treatment Facility
- Defense Online Enrollment System
- Health Information Technology for Economic and Clinical Health
- Social Security Number
- Potential Quality Issues
- Assistance Reporting Tool
13 Clues: Affordable Care Act • Qualifying Life Event • Social Security Number • Other Health Insurance • TRICARE Retired Reserve • Defense Health Networks • Potential Quality Issues • Assistance Reporting Tool • Military Treatment Facility • Defense Online Enrollment System • United States Family Health Plan • Continued Health Care Benefits Program • ...
BTT1O Crossword Puzzle 2022-09-30
Across
- wide area network
- local area network
- the backbone
- basic input/output system
- The brain of the computer
- binary digits
- it handles all parts of the network
Down
- things to connect all networks together
- network internal face card
- a screen that displays information
- short term memory
- read-only memory
- portable memory
13 Clues: the backbone • binary digits • portable memory • read-only memory • wide area network • short term memory • local area network • basic input/output system • The brain of the computer • network internal face card • a screen that displays information • it handles all parts of the network • things to connect all networks together
Library visit 2021-11-19
10 Clues: a way out • a building • from A'to'Z • take and use • a flat length • a list of all • slow to reveal • to mark our book • computer networks • the action of mentioning
Transformers 2024-12-09
10 Clues: RNN weakness • Encoder output • Decoder mechanism • Attention-based model • Processes input sequence • Generates output sequence • Recurrent Neural Networks • Transformer excels at this • Natural Language Processing • Mechanism for long-range dependencies
Communications,Networks and the Internet 2020-08-28
Across
- is a form of wireless communication designed to share information
- __________ Digital Subscriber Line
- an international network of networks that connects computers worldwide.
- a __________ consists of a collection of computers that share information and communicate with each other over a network.
- a WAN can connect networks across a large _____________ area, such as a city or country.
- lans can be divided into _______ categories based on how the computers communicate with one another.
- a peer-to-peer network allows every computer to _______ directly.
- data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
Down
- a device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
- the range of a wireless network can be extended using a ________.
- a ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
- refers to data transmission using ADSL and cable.
- a wireless access point contains a radio receiver, encryption and communications software.
- determines the volume of data that can be transmitted in a given time.
- a _______ can be used where it may be difficult or impractical to use a cabled LAN.
- lans in different countries can connect together to form a WAN, using _____________ links.
- enable several computers to communicate through a wireless access point at the same time.
- used to refer to data transmission over a telephone line using an analogue modem.
- bluetooth has a much slower data transfer rate than ______ and a much shorter range.
- To access the Internet you need to subscribe to an _________.
20 Clues: __________ Digital Subscriber Line • refers to data transmission using ADSL and cable. • To access the Internet you need to subscribe to an _________. • determines the volume of data that can be transmitted in a given time. • a peer-to-peer network allows every computer to _______ directly. • ...
Unit 2 - Networks of Exchange 2023-09-27
Across
- resulted in millions of deaths in Afro-Eurasia (two words)
- rest stop for traders on land trade routes
- religion that became dominant one in SE Asia due to trading
- new crop that changed East African diet
- main good traded on Silk Road
- major good traded from Africa to rest of Europe and Asia
- Mali leader who converted to Islam (two words)
- crop that spread throughout SE Asia and Africa due to the Indian Ocean trade
- Famous European who traveled throughout China (two words)
- revival of Greek & Roman culture in Europe
Down
- protected traders and allowed religions to spread on Silk Road
- communities created by traders waiting for monsoon winds
- Mongol khanate in Russia (two words)
- crop that allowed China to increase population
- language created from Bantu & Arabic
- Famous Muslim who traveled Islamic ports in Indian Ocean (two words)
- major trading city along the Silk Road
- main travel used on Silk Road
- religion spread to North Africa by traders
- winds that traders used in Indian Ocean
- site of cultural learning in Mali, Africa
- famous Mongol ruler who united the empire (two words)
22 Clues: main travel used on Silk Road • main good traded on Silk Road • Mongol khanate in Russia (two words) • language created from Bantu & Arabic • major trading city along the Silk Road • new crop that changed East African diet • winds that traders used in Indian Ocean • site of cultural learning in Mali, Africa • rest stop for traders on land trade routes • ...
Word List 1 2022-09-13
Across
- This device helps to manage the server using commands.
- Location of computer network elements.
- A measurement of the amount of information that can be sent between computers.
- A large system consisting of many similar parts that are connected together.
- Something that is easy to attack.
- Computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- The particular arrangement or pattern of a group of related things.
Down
- Something involving many different parts in a way that is difficult to understand.
- To be responsible for controlling or organizing someone or something.
- A networking device that forwards data packets between computer networks.
- A network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
- This device restores the network signal before the signal becomes too weak or damaged.
12 Clues: Something that is easy to attack. • Location of computer network elements. • This device helps to manage the server using commands. • The particular arrangement or pattern of a group of related things. • To be responsible for controlling or organizing someone or something. • A networking device that forwards data packets between computer networks. • ...
Word List 1 2022-09-13
Across
- This device helps to manage the server by commands.
- The location of computer network elements.
- The measurement of the amount of information that can be transferred between computers.
- A large system consisting of many similar parts that are connected together.
- Something that is easy to attack.
- A computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- The particular arrangement or pattern of a group of related things.
Down
- Involving many different parts in a way that is difficult to understand.
- To be responsible for controlling or organizing someone or something.
- Networking device that forwards data packets between computer networks.
- Network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
- This device restores the network signal before the signal becomes too weak or damaged.
12 Clues: Something that is easy to attack. • The location of computer network elements. • This device helps to manage the server by commands. • The particular arrangement or pattern of a group of related things. • To be responsible for controlling or organizing someone or something. • Networking device that forwards data packets between computer networks. • ...
Jorge Internet Crossword Puzzle 2013-03-26
Across
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- a piece of writing that has been copied from someone else and is presented as being your own work
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A part of a computer system or network that is designed to block unauthorized
- renew or revitalize; To reload a webpage on the internet
Down
- collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- a list of citations that appear at the end of a paper, article, chapter or book.
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- unauthorized person who secretly gains access to computer files.
12 Clues: renew or revitalize; To reload a webpage on the internet • unauthorized person who secretly gains access to computer files. • A part of a computer system or network that is designed to block unauthorized • a list of citations that appear at the end of a paper, article, chapter or book. • ...
Computer Hardware 2025-09-17
Across
- System Storage
- Interconnected computer networks
- Output,Input
- Numbers signed to a wbsite
- A,B,C,Micro,Mini
- Uses elcectronic flash memory
- program of the computer
Down
- connects with all of the computer
- Network of physical software
- Memory
- Manages hardware and software
- all of the Processing
- Physical Part of the computer
13 Clues: Memory • Output,Input • System Storage • A,B,C,Micro,Mini • all of the Processing • program of the computer • Numbers signed to a wbsite • Network of physical software • Manages hardware and software • Physical Part of the computer • Uses elcectronic flash memory • Interconnected computer networks • connects with all of the computer
HuffleBuff 2019-04-23
Across
- the number of bits per second that can be transmitted along a digital network.
- the signal between computers that indicates that transmission can proceed.
- the transfer of data over a point-to-point or point-to-multipoint communication channel.
- networks not connected by cables
- Transmitting data one bit at a time
- a system of rules that allow two or more entities of a communications system to transmit information
- technologies that support wireless networking of home and business networks.
Down
- Transmitting multiple bits of data simultaneously
- A computer that provides shared resources to network users.
- A network that has no dedicated servers. All computers are of equal status and can both share resources themselves and use resources from other computers
- An exchange of signals between computers when a connection is established.
- a set of rules or procedures for transmitting data
12 Clues: networks not connected by cables • Transmitting data one bit at a time • Transmitting multiple bits of data simultaneously • a set of rules or procedures for transmitting data • A computer that provides shared resources to network users. • the signal between computers that indicates that transmission can proceed. • ...
Cyber Awareness 2025-11-06
Across
- A virtual private network to access remote services securely
- A cyber attack that floods a network or server with excessive traffic to make it unavailable.
- A digital or physical device used to authenticate a user, often as a second factor.
- A hidden way into a system that bypasses normal authentication.
- Fake security alerts that trick users into installing malware or paying money.
- The practice of accessing a computer network illegally.
- A program that performs automated tasks, and can be controlled remotely and malicious
Down
- A secret combination of characters used to verify a user’s identity.
- A targeted form of phishing
- A security model that assumes no user or system is inherently trusted.
- Self-replicating malware that spreads across networks without user action.
- The practice of protecting computers, networks, and data from digital attacks or unauthorised access.
12 Clues: A targeted form of phishing • The practice of accessing a computer network illegally. • A virtual private network to access remote services securely • A hidden way into a system that bypasses normal authentication. • A secret combination of characters used to verify a user’s identity. • A security model that assumes no user or system is inherently trusted. • ...
Computer Science Choice Borad 2025-09-17
Across
- Network of physical software
- System Storage
- Memory
- Uses elcectronic flash memory
- Output,Input
Down
- connects with all of the computer
- Manages hardware and software
- A,B,C,Micro,Mini
- Numbers signed to a wbsite
- Physical Part of the computer
- Interconnected computer networks
- program of the computer
- all of the Processing
13 Clues: Memory • Output,Input • System Storage • A,B,C,Micro,Mini • all of the Processing • program of the computer • Numbers signed to a wbsite • Network of physical software • Manages hardware and software • Physical Part of the computer • Uses elcectronic flash memory • Interconnected computer networks • connects with all of the computer
Jargon 4: Revenge of the Kev 2023-09-06
Across
- Security protocol used in wifi networks that offers greater protection through data encryption
- process of encoding information to a unrecognizable form.
- Part of an application that performs a task not apparent to the user
- A security protocol used in wifi networks designed to provide a level of security similar to a Wired/LAN connection.
- document sent with an email message
- Basic unit of information in computing.
- load and initialize the operating system on a computer
Down
- Physical place where a computer stores information, also known as its HDD.
- Network security system that monitors and controls incoming and outgoing traffic
- Hardware or Software component that stores data so future requests can be served faster
- a set of computers sharing resources located on a node
- application that provides a way to look at and interact with information on the Internet
- any goal-oriented activity requiring computer machinery
- Small blocks of data created by a web server while browsing a website
14 Clues: document sent with an email message • Basic unit of information in computing. • a set of computers sharing resources located on a node • load and initialize the operating system on a computer • any goal-oriented activity requiring computer machinery • process of encoding information to a unrecognizable form. • ...
Types of Technology-Based Training 2014-07-21
Across
- the instantaneous exchange of audio, video or text between two or more individuals or groups at two or more locations
- A general term describing any network contained within an organization. It refers primarily to networks that use Internet technology
- a computer application that uses any combination of text, graphics, audio, animation and/or full-motion video
- a format and system for recording, storing, and retrieving electronic information on a compact disc that is read using an optical drive
Down
- the transmission of television signals via cable or satellite technology
- A loose confederation of computer networks around the world that is connect through several primary networks
- simulation a device or system that replicates or imitates a real device or system
- a collaborative network that uses Internet technology to link organizations with their suppliers, customers, or other organizations that share common goals or information
8 Clues: the transmission of television signals via cable or satellite technology • simulation a device or system that replicates or imitates a real device or system • A loose confederation of computer networks around the world that is connect through several primary networks • ...
Network Crossword 2019-04-24
Across
- a set of rules for allocating locally unique IP addresses to a device as they connect to a network
- where data is transmitted between two computers that do not share a common clock signal, in a stream of single bits
- the rate at which a signal could change
- a protocol to check if another device is transmitting
- the range of frequencies that can be transmitted over the medium measured in Hz
Down
- a method of forwarding data through multiple ports
- a unique code that identifies a particular device on a network
- a global network of wireless networks
- a method of dividing a network into multiple smaller networks
- a system where computers are each connected to a main server
- a combination of IP address and port number
- organisations who allocate and administer domain names and IP addresses
12 Clues: a global network of wireless networks • the rate at which a signal could change • a combination of IP address and port number • a method of forwarding data through multiple ports • a protocol to check if another device is transmitting • a system where computers are each connected to a main server • a method of dividing a network into multiple smaller networks • ...
Where could IT take you? 2021-05-05
10 Clues: designs apps • designs websites • develops software • examines information • designs computer games • identifies user problems • protects against hackers • makes websites look good • sets up computer networks • helps people with computer problems
Networks and the Internet 2021-11-10
Across
- the customer premises to terminate a dial-up Integrated Services Digital Network (ISDN) line and connect it to a computer or a local area network
- a device that is both a transmitter and a receiver, and usually it's in a single device.
- security devices used to stop or mitigate unauthorized access to private networks connected to the Internet, especially intranets.
- hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network, into frames appropriate to a wide-area network and vice versa
Down
- creates a single, aggregate network from multiple networks
- software used in telecommunications for telecommunications networks that allows data to flow from one discrete network to another.
- based on Internet standards, with extensions to reflect the wireless device environment.
- connects devices within a network
8 Clues: connects devices within a network • creates a single, aggregate network from multiple networks • based on Internet standards, with extensions to reflect the wireless device environment. • a device that is both a transmitter and a receiver, and usually it's in a single device. • ...
Computer Hardware & Conputer Networks Crossword 2014-04-11
Across
- A SYSTEM PORT.
- A TYPE OF MEMORY THAT DOESN'T HAVE ANY MOVING PARTS.
- TANGIBLE THINGS OF A COMPUTER.
- A INPUT DEVICE.
- A TYPE OF IC PACKAGE SYSTEM.
- A HDD IS DIVIDED INTO THESE.
- A TYPE OF DISC.
- A COMPONENT IN HDD.
- A TYPE OF RAM.
- A DATA UNIT OF DATA LINK LAYER.
- A LAYER IN TCP/IP REFERENCE MODEL.
- A NETWORK DEVICE.
- DEVICE THAT IS CONNECTED TO A NETWORK.
- PROCESS OF WRITING DATA TO THE DISC.
Down
- A COMPONENT WHICH IS USED TO CONFIGURE A HDD.
- A LAYER IN OSI REFERENCE MODEL.
- A TOPOLOGY.
- COMPONENTS INSIDE A PROCESSOR.
- DONE TO REDUCE THE SIZE OF A FILE.
- A TYPE OF LIGHT SOURCE IN OPTICAL FIBERS.
- A FACTOR THAT EFFECTS THE PROCESSOR SPEED.
- HERE FILES ARE SPREAD ALL OVER THE DISK.
- A SYSTEM START UP PROCESS.
- COMPONENT USED TO WRITE DATA ONTO THE DISC.
- A POINTING DEVICE.
- INTERFERENCE IN A CABLE.
- AN ELEMENT IN A COMPUTER FOR SYNCHRONIZATION AMONG ITS COMPONENTS.
27 Clues: A TOPOLOGY. • A SYSTEM PORT. • A TYPE OF RAM. • A INPUT DEVICE. • A TYPE OF DISC. • A NETWORK DEVICE. • A POINTING DEVICE. • A COMPONENT IN HDD. • INTERFERENCE IN A CABLE. • A SYSTEM START UP PROCESS. • A TYPE OF IC PACKAGE SYSTEM. • A HDD IS DIVIDED INTO THESE. • TANGIBLE THINGS OF A COMPUTER. • COMPONENTS INSIDE A PROCESSOR. • A LAYER IN OSI REFERENCE MODEL. • ...
Ch. 5 Groups and Networks 2023-11-13
Across
- member of a triad who attempts to resolve conflict between the other two members
- network - set of dyads held together by ties between individuals
- et impera - role of a member of a triad who intentionally causes conflict between the other two members
- group - social group composed of enduring, intimate face-to-face relationships that strongly influence the attitudes and ideals of those involved
- hole - gap between network clusters
- - degree to which social relationships are reinforced through indirect ties (friends of friends)
- - sum of stories contained in a set of ties
- 3 basic forms of political relations - mediator, tertius gaudens, divide et impera
- a group of three
- group - groups marked by impersonal, instrumental relationships (those existing as a means to an end)
Down
- - group that is similar to a small group, but is multifocal
- - the powerful group, most often the majority
- group classifications: small groups, parties, large groups
- conformity - groups have strong influences over individual behavior
- - the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
- a group of two
- group - characterized by the presence of a formal structure that mediates interaction and consequently, status differentiation
- - member of a triad who benefits from conflict between the other two members
- group - characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangements or roles, and equality
- group - group that helps us understand or make sense of our position in society relative to other groups
- capital - information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
- - the stigmatized or less powerful group, generally the minority
- group classification: primary groups, secondary groups
23 Clues: a group of two • a group of three • hole - gap between network clusters • - sum of stories contained in a set of ties • - the powerful group, most often the majority • group classification: primary groups, secondary groups • group classifications: small groups, parties, large groups • - group that is similar to a small group, but is multifocal • ...
Communication, Networks and the Internet. 2020-08-28
Across
- A device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
- the volume of data that can be transmitted in a given time.
- A WAN can connect networks across a large _____________ area, such as a city or country.
- A peer-to-peer network allows every computer to _______ directly.
- LANS can be divided into _______ categories based on how the computers communicate with one another.
- Used to refer to data transmission over a telephone line using an analogue modem.
- to data transmission using ADSL and cable.
- A ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
Down
- Data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
- __________ Digital Subscriber Line
- A _______ can be used where it may be difficult or impractical to use a cabled LAN.
- LANS in different countries can connect together to form a WAN, using _____________ links.
- An international network of networks that connects computers worldwide.
- A wireless access point contains a radio receiver, encryption and communications software.
- The range of a wireless network can be extended using a ________.
- A __________ consists of a collection of computers that share information and communicate with each other over a network.
- Is a form of wireless communication designed to share information
- access the Internet you need to subscribe to an _________.
- Bluetooth has a much slower data transfer rate than ______ and a much shorter range.
- Enable several computers to communicate through a wireless access point at the same time.
20 Clues: __________ Digital Subscriber Line • to data transmission using ADSL and cable. • access the Internet you need to subscribe to an _________. • the volume of data that can be transmitted in a given time. • The range of a wireless network can be extended using a ________. • Is a form of wireless communication designed to share information • ...
BTT1O Crossword Puzzle 2022-09-30
Across
- basic input/output system
- The brain of the computer
- binary digits
- wide area network
- short term memory
- local area network
- network internal face card
- it handles all parts of the network
- read-only memory
Down
- the backbone
- portable memory
- things to connect all networks together
- a screen that displays information
13 Clues: the backbone • binary digits • portable memory • read-only memory • wide area network • short term memory • local area network • basic input/output system • The brain of the computer • network internal face card • a screen that displays information • it handles all parts of the network • things to connect all networks together
Crossword puzzle 2024-09-26
Across
- a visual representation of something.
- a set of instructions, data or programs used to operate computers and execute specific tasks.
- a hand-held pointing device that detects two-dimensional motion relative to a surface.
- an electronic communications network that connects computer networks and organizational computer facilities around the world.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- is a collection of files accessed through a web address, covering a particular theme or subject, and managed by a particular person or organization.
- is a device that connects two or more packet-switched networks or subnetworks.
- Any digital moving picture, which includes a computer file in video formats such as MP4, MOV, M4V, AVI, DivX or FLV.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- a group of interconnected nodes or computing devices that exchange data and resources with each other.
Down
- data that has been processed, organized, and interpreted to add meaning and value.
- a piece of equipment used to provide data and control signals to an information processing system.
- is a communication method that uses electronic devices to deliver messages across computer networks.
- refers to software that requires no paid licenses to use the application, no fees or donations, no restrictions on how many times you can download or open the program, and no expiration date.
- a piece of hardware that is used to output data that has been previously entered into a computer or similar processing device
- is a website designed to make it easy for users to create entries in chronological order.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- the field of technology concerned with recording, processing, storing and delivering audible sound using electricity.
- input device used to enter characters and functions into the computer system by pressing buttons, or keys.
- information that has been translated into a form that is efficient for movement or processing.
20 Clues: a visual representation of something. • is a device that connects two or more packet-switched networks or subnetworks. • data that has been processed, organized, and interpreted to add meaning and value. • a hand-held pointing device that detects two-dimensional motion relative to a surface. • ...
Engineering Carrers 2015-10-13
12 Clues: designs cars • Designs tunnels • Makes computers • They make gasoline • makes water cleaner • Makes X-ray machines • Helps design airplanes. • They make products better • Makes programs for computers • These people work on medicine • they help with deep sea exploration • makes cellular communication networks
vlog 2023-11-16
Across
- What is called filling the pages of websites on the Internet?
- Bloggers with a large audience get what from their blog?
- Who was the Hollywood Walk of Fame created for?
- What kind of person do you need to be to interest people?
- What do you need to run social networks?
Down
- Honorary glory as evidence of universal recognition of merit, talent, universal recognition and admiration.
- The most popular social network where you can watch videos on various topics?
- What are the names of the people who follow you on the Internet?
- One of the good ways to make money from a blog is?
- People who have a large audience on social networks are often what are they like?
- What can't be returned?
- In order for us to achieve a goal, we need to …… on it.(insert missing word)
12 Clues: What can't be returned? • What do you need to run social networks? • Who was the Hollywood Walk of Fame created for? • One of the good ways to make money from a blog is? • Bloggers with a large audience get what from their blog? • What kind of person do you need to be to interest people? • What is called filling the pages of websites on the Internet? • ...
CET1600 CH 6 2019-10-31
Across
- In configuring a routing protocol, the network administrator added networks 192.168.50.0 and 172.16.0.0 to which router?
- ___ routing table entries are automatically created when an active router interface is configured with an IP address and subnet mask.
- On a router, the networks can be static which means they are __configured.
- When the source and destination hosts do not share the same network address. A ___ __ IP address is required.
- As a packet travels from one networking device to another the Source and Destination ___ __ never change.
Down
- The router maintains a __ __ containing directly connected and remote network route information.
- On a router the networks can be learned __ by using a routing protocol.
- On the PC, what is the command to display the hardware address and the IP address?
- As a packet travels from one networking device to another the Source & Destination ___ __ change as packet is forwarded from one router to the next.
- What is the gateway address for PC1? Type the alphabet (letter) for the answer. A1-192.168.1.1, B1-192.168.1.100, C1-192.168.1.254, D1-192.168.50.1, E1-192.168.50.2, F1-172.16.0.1, G1-172.16.0.100, H1-172.16.255.254
- What is the gateway address for S2? Type the alphabet (letter) for the answer. A1-192.168.1.1, B1-192.168.1.100, C1-192.168.1.254, D1-192.168.50.1, E1-192.168.50.2, F1-172.16.0.1, G1-172.16.0.100, H1-172.16.255.254
11 Clues: On a router the networks can be learned __ by using a routing protocol. • On a router, the networks can be static which means they are __configured. • On the PC, what is the command to display the hardware address and the IP address? • The router maintains a __ __ containing directly connected and remote network route information. • ...
Local Area Network 2025-01-22
Across
- Stationary device that allows you to access networks from a single point.
- Mobile device that can access the network/internet.
- Mobile computer that allows you to access networks on the go.
- Protects the network from unwanted intrusions.
- Allows multiple devices to have a wired connection to the network.
Down
- Sends & Receives data to/from the internet.
- A networking device that forwards data outside of the local network.
- Allows multiple devices to have a wireless connection to the network.
8 Clues: Sends & Receives data to/from the internet. • Protects the network from unwanted intrusions. • Mobile device that can access the network/internet. • Mobile computer that allows you to access networks on the go. • Allows multiple devices to have a wired connection to the network. • A networking device that forwards data outside of the local network. • ...
Chapter 6 - Network Design Elements 2025-05-21
Across
- A cloud-based delivery model for security services like antivirus and firewalls.
- A cloud model offering virtualized computing resources over the internet.
- A network state where a device defaults to open access after failure.
- A solution that enforces security policies before allowing network access.
- A method of dialing many phone numbers to find modems or unsecured lines.
- Impersonating a device's MAC address to bypass security.
- An attack that allows access to traffic on other VLANs.
- A network design using two firewalls to isolate a DMZ.
Down
- A publicly shared list of known cybersecurity vulnerabilities and exposures.
- A cloud model providing a platform for developers to build and deploy applications.
- A protocol that prevents network loops by managing redundant paths.
- A switch memory table that stores MAC-to-port mappings.
- A cloud model where applications are delivered over the internet.
- An attack that overwhelms a switch's memory with fake MAC addresses.
- A one-to-one mapping between a private and public IP address.
- A firewall setup with three interfaces: internal, external, and DMZ.
- A method that modifies IP addresses to allow private devices to access the internet.
- A buffer zone between internal networks and external, untrusted networks.
- A type of NAT that maps multiple private IPs to one public IP using port numbers.
19 Clues: A network design using two firewalls to isolate a DMZ. • A switch memory table that stores MAC-to-port mappings. • An attack that allows access to traffic on other VLANs. • Impersonating a device's MAC address to bypass security. • A one-to-one mapping between a private and public IP address. • A cloud model where applications are delivered over the internet. • ...
