networks Crossword Puzzles

ACTIVITY #1: Crossword Puzzle 2024-04-30

ACTIVITY #1: Crossword Puzzle crossword puzzle
Across
  1. Buying and selling goods or services online.
  2. Software for accessing and viewing websites.
  3. Ability to analyze and evaluate media content critically.
  4. Simulation of human intelligence by machines.
  5. Responsible use of technology and the internet.
  6. Legal protection of creative works.
  7. Information in digital form.
  8. Trail of digital activities left behind by a user.
  9. Writing instructions for computers.
  10. Electronic device for processing data.
  11. Reference or connection to another webpage or resource.
  12. Unsolicited or unwanted emails or messages.
  13. Transfer data from a local device to a remote system.
  14. Verifying the identity of a user.
  15. Secret phrase for access control.
  16. Software designed for a specific purpose or task.
  17. Protection against threats.
  18. Precautions to protect against online threats.
  19. Right to control personal information.
  20. Global network connecting computers and devices.
  21. Document displayed on the internet.
  22. Device for forwarding data packets between computer networks.
  23. Physical components of a computer system.
  24. Programs and applications for computers.
  25. Legal principle allowing limited use of copyrighted material.
  26. Malicious software.
  27. Hidden part of the internet not indexed by search engines.
  28. Distributed ledger technology for secure and transparent transactions.
Down
  1. Collection of related web pages.
  2. Individuals who gain unauthorized access to systems or networks.
  3. Criminal activities conducted online.
  4. Platforms for sharing content and connecting with others.
  5. Deliberate exploitation of computer systems or networks.
  6. Creating software using programming languages.
  7. Self-replicating program that spreads and harms systems.
  8. Reference or connection to another webpage or resource (repeated).
  9. Knowledge or data.
  10. Graphical user interface on a computer.
  11. Encoding data for secure transmission.
  12. Exchange of information or messages.
  13. Relating to electronic technology.
  14. Harassment or intimidation online.
  15. Main webpage of a website.
  16. Transfer data from a remote system to a local device.
  17. Fraudulent attempt to obtain sensitive information.
  18. Unauthorized use of someone's personal information.
  19. Information presented on the internet.
  20. Criminal activities conducted online.
  21. Legal regulations governing online activities.
  22. Interconnected computers or devices.

50 Clues: Knowledge or data.Malicious software.Main webpage of a website.Protection against threats.Information in digital form.Collection of related web pages.Verifying the identity of a user.Secret phrase for access control.Relating to electronic technology.Harassment or intimidation online.Legal protection of creative works....

Internet 2018-03-11

Internet crossword puzzle
Across
  1. An end point of a communication flow across a computer network
  2. The process of directing packets of data between networks
  3. What does the C in DHCP stand for
Down
  1. Large global network of networks
  2. What does the L in URL stand for
  3. Method of checking the integrity of data by calculating a sum based on the data being sent
  4. Which service is on well known port 23
  5. A node on a network that acts as a connection point to another network with a different protocol
  6. Central agency that registers all domain names

9 Clues: Large global network of networksWhat does the L in URL stand forWhat does the C in DHCP stand forWhich service is on well known port 23Central agency that registers all domain namesThe process of directing packets of data between networksAn end point of a communication flow across a computer network...

crossword 2017-12-08

crossword crossword puzzle
Across
  1. - to store data
  2. - universal serial bus
  3. - a computer that only uses intranet
  4. - opposite of hardware
  5. - to steal personal information
  6. - a file that contains cookies
  7. - internet service provider
  8. - uniform resource locator
  9. - bitmapped image
Down
  1. - a large network made of smaller networks
  2. - opposite of software
  3. - not enough time
  4. - a website
  5. - to keep safe
  6. - central processing unit

15 Clues: - a website- to keep safe- to store data- not enough time- bitmapped image- opposite of software- universal serial bus- opposite of hardware- central processing unit- uniform resource locator- internet service provider- a file that contains cookies- to steal personal information- a computer that only uses intranet...

The Internet 2023-03-06

The Internet crossword puzzle
Across
  1. a facility allowing devices to communicate wirelessly
  2. copying data from one computer to another typically over the internet
  3. Stores the data and programs even when the computer is turned off
  4. a device that connects two or more packet-switched networks or subnetworks
  5. Files that the user works on, such as images, documents, etc
Down
  1. a specific unit of data that's equal to about 1 billion bytes of data
  2. a network of computers or devices all contained within one location
  3. a machine that can store and process information
  4. transferring data from one computer to another
  5. a communication method that uses electronic devices to deliver messages across computer networks

10 Clues: transferring data from one computer to anothera machine that can store and process informationa facility allowing devices to communicate wirelesslyFiles that the user works on, such as images, documents, etcStores the data and programs even when the computer is turned offa network of computers or devices all contained within one location...

Safer Internet Day 2021-03-29

Safer Internet Day crossword puzzle
Across
  1. program that accesses and displays files and other data available on the Internet and other networks.
  2. talking in a friendly way
  3. engine, A software program you can use to find websites, we pages, and Internet files.
  4. update of personal information
  5. online harassment
  6. to look for something
  7. complain or tell someone about something
  8. is a name you use to tell a computer or a website who you are.
  9. knowledge of a situation or fact
Down
  1. out, signing out of a website or program.
  2. a collection of related web pages; can contain images, video, or other digital formats
  3. secure
  4. warrior, a person who writes aggressive, threatening comments and often hides their identity
  5. to prevent someone from contacting you online
  6. safeguard for access to a computer or computer program.
  7. of, conscious of
  8. individuals who use computers, networks, and the internet to perpetrate crime
  9. someone who scares or hurts someone else
  10. a person who leaves annoying or irritating messages online to cause trouble
  11. a photo you take of yourself, with your phone
  12. a person who uses computers to gain unauthorized access to data.
  13. nasty
  14. not connected to the computer or the internet
  15. safety, security on the Internet

24 Clues: nastysecureof, conscious ofonline harassmentto look for somethingtalking in a friendly wayupdate of personal informationknowledge of a situation or factsafety, security on the Internetsomeone who scares or hurts someone elsecomplain or tell someone about somethingout, signing out of a website or program....

AE MODULE 7 - CYBER SECURITY 2024-01-29

AE MODULE 7 - CYBER SECURITY crossword puzzle
Across
  1. Crime that involves a computer and/or a network
  2. Someone who uses a computer to gain access to systems or networks
  3. Malicious attempts by hackers to damage, steal, or destroy a computer
  4. Software that allows an attacker to obtain information on another computer
  5. Links two or more devices
  6. Descriptive data that contains information about other data
  7. In 1988, Robert __________ unleashed a malicious computer program
  8. Positions ideal for individuals with more than five years of experience
  9. Web browser feature
  10. Do not share ____________ across multiple sites
  11. Internet connection that encrypts traffic from a device to a private network
  12. software designed to disrupt, damage, or gain unauthorized access to a computer
Down
  1. Online harassment that uses electronic communication
  2. Attacker sends fraudulent emails to deceive someone into revealing information
  3. , Describes the digital environment in which computer networks communicate
  4. A type of malicious software
  5. Someone who uses the internet to cause harm to a victim
  6. ___________ engineering is when an attacker manipulates someone into revealing information
  7. Software that automatically displays or downloads advertising material
  8. Store information across pages within the site
  9. A trail of data intentionally left behind by a user
  10. Personally identifiable information
  11. A standalone self-replicating software application that invades and destroys computers

23 Clues: Web browser featureLinks two or more devicesA type of malicious softwarePersonally identifiable informationStore information across pages within the siteCrime that involves a computer and/or a networkDo not share ____________ across multiple sitesA trail of data intentionally left behind by a userOnline harassment that uses electronic communication...

AI Crossword 2025-07-18

AI Crossword crossword puzzle
Across
  1. A conversational AI tool based on large language models
  2. Relating to computers, networks, or virtual reality environments
  3. Unfair prejudice in AI decision-making due to data or design flaws
  4. The branch of technology dealing with robots and automated machines
  5. The process by which AI improves its performance over time
  6. Facts or information used by computers to learn or make decisions
  7. The surname of the scientist who proposed a test for machine intelligence
  8. An AI's attempt to forecast an outcome or event
  9. A system of connected devices or nodes for communication or computation
  10. A device that performs work when given power or instructions
Down
  1. Extremely large datasets analysed by AI to find patterns or trends
  2. Something made or produced by humans rather than occurring naturally
  3. Able to operate independently without direct human control
  4. The use of machines and technology to perform tasks with minimal human input
  5. Synthetic media created by AI, often replacing a person’s image or voice
  6. The ability to learn, understand, and apply knowledge
  7. A step-by-step set of rules for solving a problem or performing a task
  8. Moral principles guiding the responsible use of AI
  9. Protection of personal information from misuse
  10. Relating to nerve cells or networks of the brain, often used in AI models

20 Clues: Protection of personal information from misuseAn AI's attempt to forecast an outcome or eventMoral principles guiding the responsible use of AIThe ability to learn, understand, and apply knowledgeA conversational AI tool based on large language modelsAble to operate independently without direct human control...

Networking vocabulary 2025-12-12

Networking vocabulary crossword puzzle
Across
  1. system for converting IP addresses into names that users can remember.
  2. Address of each individual device connected to a home or business network.
  3. a system designed for quick and easy interconnection using public, standardized protocols.
  4. small network between nearby devices.
  5. A network that connects devices and networks over a larger area.
  6. point where network connections start and end.
  7. Main IP address of a home or business network, connects the world.
  8. conceptual framework that standardizes network communication into 7 layers.
  9. transferring data from one Ip address to another.
Down
  1. two or more computers that can communicate with each other.
  2. arrangement of connections and devices in a network, defining how it flows
  3. Virtual address for every device connected to the internet
  4. a self contained, isolated network that cannot communicate with other networks
  5. standardized numbers across devices to assign each port.
  6. set of rules that govern how data flows between devices on a network.
  7. A network topology where all devices are connected in a circle.
  8. A network topology where all devices are connected to a central hub.
  9. company responsible for providing access to the internet.
  10. Newer IP system for configuring IP addresses which uses numbers and letters (alphanumerical) to designate IP addresses
  11. Older IP system which used numerical values to configure IP addresses

20 Clues: small network between nearby devices.point where network connections start and end.transferring data from one Ip address to another.standardized numbers across devices to assign each port.company responsible for providing access to the internet.Virtual address for every device connected to the internet...

E-Business Chapter 11 - Social Networks Auctions and Portals 2015-11-21

E-Business Chapter 11 - Social Networks Auctions and Portals crossword puzzle
Across
  1. A social network feature involving posting messages to groups of friend and other group members.
  2. Time on site is an important way to measure the influence of a site. The more time people spend on a site, called __________, the more time to display ads and generate revenue.
  3. Let's Facebook users instant message photos and videos to their Facebook friends.
  4. Auctions where the business sells goods it owns, or controls, using various dynamic pricing models (3 words).
  5. While the early social networks had a difficult time raising capital and revenues, today's top social network sites are now learning how to _________ their huge audiences.
  6. The early leader in social networking was overtaken by Facebook; being reinvented as a music-oriented social network by pop start Justin Timberlake.
  7. The number of unique __________ is just one way to measure the influence of a site.
  8. This involves a group of people, shared social interaction, common ties among members, and people who share an area for some period of time.
  9. An auction where users specify what they are willing to pay for goods or services.
  10. _________ are among the most frequently visited sites on the Web if only because they often are the first page to which many users point their browser on startup.
  11. Social networks of professionals and practitioners, creators of artifacts such as computer code or music.
  12. General portal sites such as AOL and Yahoo did not have well-developed search engines, and hence have not grown as fast as __________, which has a powerful search engine.
  13. A type of social network or community of members who self-identify with demographic or geographic category, such as women, African Americans, or Arab Americans.
Down
  1. A social network feature that includes user-created Web pages that describe the user on a variety of dimensions.
  2. Auctions where the auction house acts as an intermediary market maker, providing a forum where consumers can discover prices and trade (3 words).
  3. Almost 50% of people who use __________ are 35 years old and older.
  4. Helps groups of people with shared interests plan events and meet online.
  5. While social networks originally attracted mostly ___________ Internet users, social networks today are not just about teens and college students, but a much larger social phenomenon.
  6. Let's users send photos to friends that self-extinguish in ten seconds.
  7. This is an area on the Internet where people who share common ties can interact with one another.
  8. The risk of an auction highlighted by the fact that online auctions are a significant source of Internet fraud.
  9. A messaging service that lets users sent text, photos and videos to their friends' cellphones using the Internet and without having to pay telecommunications companies for the use of cellphone SMS messaging services.
  10. The benefit of an auction where sellers can find willing buyers and buyers can find sellers.
  11. The world market leader in auctions.

24 Clues: The world market leader in auctions.Almost 50% of people who use __________ are 35 years old and older.Let's users send photos to friends that self-extinguish in ten seconds.Helps groups of people with shared interests plan events and meet online.Let's Facebook users instant message photos and videos to their Facebook friends....

static route 2023-02-26

static route crossword puzzle
Across
  1. It can be Variable length or fixed length
  2. Ethernet procedure used to handle collisions during transmissions
  3. Device which converts between digital and analogue signals, e.g. telephone line to computer.
  4. It happens when transmissions occur at the same time
  5. "Cisco command to reactivate an interface on the router"
  6. The purpose of scrambling data so it can be sent securely over networks.
  7. Software that provides services to a client, or the hardware that is running it.
  8. A device for connecting multiple network devices and multiple segments.
  9. A set of rules or standards that control communication between devices.
Down
  1. Software or hardware that requests services from a server.
  2. sense It can be "collision detection" or "collision avoidance".
  3. The amount of data that can be transferred from one point to another in a given time period.
  4. When it becomes zero, the packet is discarded
  5. Automatic switching to a backup computer system in the event of system failure.
  6. Device that forwards data packets to the appropriate parts of a computer network.
  7. it can be MAC or IP.
  8. A tool to check network connectivity
  9. Formatted unit of data sent across networks.

18 Clues: it can be MAC or IP.A tool to check network connectivityIt can be Variable length or fixed lengthFormatted unit of data sent across networks.When it becomes zero, the packet is discardedIt happens when transmissions occur at the same time"Cisco command to reactivate an interface on the router"...

Lokalie tikli 2020-10-22

Lokalie tikli crossword puzzle
Across
  1. adrese, kura tiek iedota ierīcei, kad tā pievienojas tīklam
  2. ierīce kas var iedot interneta savienojumu ierīcēm
  3. networks, kuram var piekļūt tikai kopā savienotas ierīces
  4. interneta piegādātāja nosaukums (trīs burti)
  5. protokola, kas ļauj runāt pa telefonu caur internetu, saīsinājums
  6. interneta pasts
  7. tā sauktā rezerves baterija datoram, ja pazūd elektrība
  8. networka ierīču saslēgumu veidi ir networka...
  9. kāda tīkla standarts ir IEEE 802.11
  10. datoram kaitīgs kods tiek saukts par
  11. ko UTP apzīmē u burts
  12. tīkls kura izveidei vajadzīgs ka minimums divi datori
  13. serveris kas automātiski dod ip adreses tam pievienotajām ierīcēm
  14. programma ko var lietot treniņam networku salikšanā
Down
  1. bus topoloģija latviski
  2. protokols, kas nodrošina drošu datu apmaiņu starp divām tīkla ierīcēm.
  3. ko STP apzīme s burts
  4. pieslēdzoties globālajam tīmeklim, tu pieslēdzies šai lietai.
  5. networks kas maskē ip no sava interneta providera (angliski & full name)
  6. informācijas apjoms ko dod pa datoru tīklu noteiktā laikā
  7. vieta kur var datus saglabāt interneta vidē
  8. interneta kabeļa nosaukums
  9. ierīce kas var iedot interneta savienojumu citām, ja tai pašai tas ir pievienots
  10. protokola saīsinājums, kas ļauj piekļūt un pārsūtīt failus starp serveri un datoru
  11. servera veids ar kuru var redzēt servera admins, kas ko iekš servera dara
  12. rūtera iestatijumi, kas ļauj uzlabot interneta ātrumu, samazinot tā piekļuvi noteiktam lietotājam

26 Clues: interneta pastsko STP apzīme s burtsko UTP apzīmē u burtsbus topoloģija latviskiinterneta kabeļa nosaukumskāda tīkla standarts ir IEEE 802.11datoram kaitīgs kods tiek saukts parvieta kur var datus saglabāt interneta vidēinterneta piegādātāja nosaukums (trīs burti)networka ierīču saslēgumu veidi ir networka......

AE MODULE 7 - CYBER SECURITY 2024-01-29

AE MODULE 7 - CYBER SECURITY crossword puzzle
Across
  1. Positions ideal for individuals with more than five years of experience
  2. A trail of data intentionally left behind by a user
  3. Store information across pages within the site
  4. Crime that involves a computer and/or a network
  5. Describes the digital environment in which computer networks communicate
  6. Software that automatically displays or downloads advertising material
  7. A type of malicious software
  8. Links two or more devices
  9. Someone who uses the internet to cause harm to a victim
  10. Online harassment that uses electronic communication
  11. Web browser feature
Down
  1. Someone who uses a computer to gain access to systems or networks
  2. Internet connection that encrypts traffic from a device to a private network
  3. A standalone self-replicating software application that invades and destroys computers
  4. Do not share ____________ across multiple sites
  5. Software that allows an attacker to obtain information on another computer
  6. Personally identifiable information
  7. Malicious attempts by hackers to damage, steal, or destroy a computer
  8. ___________ engineering is when an attacker manipulates someone into revealing information
  9. Attacker sends fraudulent emails to deceive someone into revealing information
  10. Software designed to disrupt, damage, or gain unauthorized access to a computer
  11. Descriptive data that contains information about other data
  12. In 1988, Robert __________ unleashed a malicious computer program

23 Clues: Web browser featureLinks two or more devicesA type of malicious softwarePersonally identifiable informationStore information across pages within the siteDo not share ____________ across multiple sitesCrime that involves a computer and/or a networkA trail of data intentionally left behind by a userOnline harassment that uses electronic communication...

Communications,Networks and the Internet 2020-08-28

Communications,Networks and the Internet crossword puzzle
Across
  1. a WAN can connect networks across a large _____________ area, such as a city or country.
  2. enable several computers to communicate through a wireless access point at the same time.
  3. a device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
  4. lans in different countries can connect together to form a WAN, using _____________ links.
  5. refers to data transmission using ADSL and cable.
  6. To access the Internet you need to subscribe to an _________.
  7. bluetooth has a much slower data transfer rate than ______ and a much shorter range.
  8. used to refer to data transmission over a telephone line using an analogue modem.
  9. a _______ can be used where it may be difficult or impractical to use a cabled LAN.
  10. lans can be divided into _______ categories based on how the computers communicate with one another.
  11. a ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
Down
  1. a peer-to-peer network allows every computer to _______ directly.
  2. __________ Digital Subscriber Line
  3. data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
  4. the range of a wireless network can be extended using a ________.
  5. a __________ consists of a collection of computers that share information and communicate with each other over a network.
  6. determines the volume of data that can be transmitted in a given time.
  7. a wireless access point contains a radio receiver, encryption and communications software.
  8. an international network of networks that connects computers worldwide.
  9. is a form of wireless communication designed to share information

20 Clues: __________ Digital Subscriber Linerefers to data transmission using ADSL and cable.To access the Internet you need to subscribe to an _________.determines the volume of data that can be transmitted in a given time.a peer-to-peer network allows every computer to _______ directly....

Chapter 5: Groups and Networks 2019-03-13

Chapter 5: Groups and Networks crossword puzzle
Across
  1. the member of a triad who attempts to resolve conflict between the two other actors in the group
  2. any social network that is defined by a common purpose and has a boundary between its membership and the rest of the social world
  3. seeks to understand how group life shapes individual behavior and maps out social relationships to understand transmission phenomenon, like STD transmission in high schools
  4. the role of a member of a triad who intentionally drives a wedge between the other two actors in the group
  5. a set of relations – essentially, a set of dyads – held together by ties between individuals
  6. the ways that power and authority are distributed in a social group
  7. the degree to which social relationships are reinforced through indirect ties (i.e. friends of friends)
  8. the sum of stories contained in a set of ties
  9. social groups, such as family or friends, composed of enduring, intimate face-to-face relationships that strongly influence the attitiudes and ideals of those involved
  10. a gap between network clusters, or even two individuals, if the two units have complementary resources
  11. the member of a triad who benefits from conflict between the other two members of the group
Down
  1. the information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
  2. another term for the powerful group, most often the majority
  3. a group that is similar to a small group, but is multifocal
  4. groups marked by impersonal, instrumental relationships (those existing as a means to an end)
  5. the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
  6. a group of two
  7. the notion that relatively weak ties often turn out to be quite valuable because they yield new information
  8. a group that helps us understand or make sense of our position in society relative to other groups
  9. the shared beliefs and behaviors within a social group
  10. a group characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangement, or roles, and a certain level of equality
  11. a group of characterized by the presence of a formal structure that mediates interaction and consequently status and differentiation
  12. a group of three
  13. the tendency for organizations that interact with the same social forces to end up sharing characteristics, or to look alike
  14. another term for the stigmatized or less powerful group, the minority

25 Clues: a group of twoa group of threethe sum of stories contained in a set of tiesthe shared beliefs and behaviors within a social groupa group that is similar to a small group, but is multifocalanother term for the powerful group, most often the majoritythe ways that power and authority are distributed in a social group...

Ch. 5: Groups and Networks 2021-03-25

Ch. 5: Groups and Networks crossword puzzle
Across
  1. the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
  2. the tendency for organizations that interact with the same social forces to end up sharing characteristics, or to look alike
  3. social groups, such as family or friends, composed of enduring, intimate face-to-face relationships that strongly influence the attitiudes and ideals of those involved
  4. a gap between network clusters, or even two individuals, if the two units have complementary resources
  5. any social network that is defined by a common purpose and has a boundary between its membership and the rest of the social world
  6. the ways that power and authority are distributed in a social group
  7. a group of characterized by the presence of a formal structure that mediates interaction and consequently status and differentiation
  8. the role of a member of a triad who intentionally drives a wedge between the other two actors in the group
  9. a group of two
  10. another term for the powerful group, most often the majority
  11. the sum of stories contained in a set of ties
Down
  1. the shared beliefs and behaviors within a social group
  2. the member of a triad who attempts to resolve conflict between the two other actors in the group
  3. groups marked by impersonal, instrumental relationships (those existing as a means to an end)
  4. seeks to understand how group life shapes individual behavior and maps out social relationships to understand transmission phenomenon, like STD transmission in high schools
  5. a group that is similar to a small group, but is multifocal
  6. the information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
  7. a group characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangement, or roles, and a certain level of equality
  8. the member of a triad who benefits from conflict between the other two members of the group
  9. the notion that relatively weak ties often turn out to be quite valuable because they yield new information
  10. a set of relations – essentially, a set of dyads – held together by ties between individuals
  11. a group that helps us understand or make sense of our position in society relative to other groups
  12. a group of three
  13. the degree to which social relationships are reinforced through indirect ties (i.e. friends of friends)
  14. another term for the stigmatized or less powerful group, the minority

25 Clues: a group of twoa group of threethe sum of stories contained in a set of tiesthe shared beliefs and behaviors within a social groupa group that is similar to a small group, but is multifocalanother term for the powerful group, most often the majoritythe ways that power and authority are distributed in a social group...

Ch. 5 Groups and Networks 2023-11-13

Ch. 5 Groups and Networks crossword puzzle
Across
  1. member of a triad who attempts to resolve conflict between the other two members
  2. network - set of dyads held together by ties between individuals
  3. et impera - role of a member of a triad who intentionally causes conflict between the other two members
  4. group - social group composed of enduring, intimate face-to-face relationships that strongly influence the attitudes and ideals of those involved
  5. hole - gap between network clusters
  6. - degree to which social relationships are reinforced through indirect ties (friends of friends)
  7. - sum of stories contained in a set of ties
  8. 3 basic forms of political relations - mediator, tertius gaudens, divide et impera
  9. a group of three
  10. group - groups marked by impersonal, instrumental relationships (those existing as a means to an end)
Down
  1. - group that is similar to a small group, but is multifocal
  2. - the powerful group, most often the majority
  3. group classifications: small groups, parties, large groups
  4. conformity - groups have strong influences over individual behavior
  5. - the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
  6. a group of two
  7. group - characterized by the presence of a formal structure that mediates interaction and consequently, status differentiation
  8. - member of a triad who benefits from conflict between the other two members
  9. group - characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangements or roles, and equality
  10. group - group that helps us understand or make sense of our position in society relative to other groups
  11. capital - information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
  12. - the stigmatized or less powerful group, generally the minority
  13. group classification: primary groups, secondary groups

23 Clues: a group of twoa group of threehole - gap between network clusters- sum of stories contained in a set of ties- the powerful group, most often the majoritygroup classification: primary groups, secondary groupsgroup classifications: small groups, parties, large groups- group that is similar to a small group, but is multifocal...

Sense of Self - Crossword 2014-03-16

Sense of Self - Crossword crossword puzzle
Across
  1. A group of relatives living under the same roof.
  2. A rude or insulting expression intended to offend or hurt people.
  3. When a person/group is cruel to any other person on a regular basis.
  4. A relation between things or events e.g. there was a connection between eating that pickle and having that nightmare.
  5. A relation between people e.g. The relationship between the mum and her daughter is good
  6. Helplines,parents or teachers are people/places you can go to if you are in need of support.Therefore they are support networks.
  7. Essential characteristics or someone/thing.
Down
  1. When you have a friendly relationship with another person
  2. A cure for anger or depression, some people need to have things they can do or use to cope with problems.
  3. People with the power to affect people or events using persuasion.
  4. When a person is tormenting another by continually criticizing them.
  5. Enjoying life in communities or friend groups.
  6. A situation where a person is being challenged by someone/thing.
  7. Walls of insecurity.
  8. Confidently self assured.
  9. Distinctive and the single one of it's kind.Unusual,different, rare.

16 Clues: Walls of insecurity.Confidently self assured.Essential characteristics or someone/thing.Enjoying life in communities or friend groups.A group of relatives living under the same roof.When you have a friendly relationship with another personA situation where a person is being challenged by someone/thing....

Ch 4 Network Access 2017-02-13

Ch 4 Network Access crossword puzzle
Across
  1. Analogy: The larger the pipe, more water that can flow through it.
  2. Allows multiple paths for light.
  3. Network ports are able to automatically change the sending/receiving pin positions depending on the connected device.
  4. Cables are normally used to connect hubs to hubs or switches to switches, but they can also be used to directly connect two hosts to create a simple network.
  5. Converting a stream of data bits into predefined "codes”.
  6. An arrangement of the nodes and the physical connections between them.
  7. LLC connects to Layer.
Down
  1. Regulates the placement of data frames onto the media.
  2. Contention- based technology for 802.3 networks.
  3. Indicates the source and destination nodes on the media.
  4. The way a network transfers frames from one node to the next.
  5. Cable connect a workstation’s serial port t to a router’s console port, using an adapter.
  6. Is a pin used for transmitting.
  7. MAC connects to Layer.
  8. Contention- based technology for 802.11 networks.
  9. Analogy: As a valve is opened, more water flows through.
  10. Used to determine if the frame arrived without error.
  11. Is a pin used for receiving.

18 Clues: MAC connects to Layer.LLC connects to Layer.Is a pin used for receiving.Is a pin used for transmitting.Allows multiple paths for light.Contention- based technology for 802.3 networks.Contention- based technology for 802.11 networks.Used to determine if the frame arrived without error.Regulates the placement of data frames onto the media....

Unit 1 2016-02-21

Unit 1 crossword puzzle
Across
  1. __________ communication: the sending and receiving occur at different times
  2. wide area networks
  3. web ________: used to view web pages that may contain text, images, videos, and other multimedia to navigate between them via hyperlinks
  4. the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
  5. imitating something while exaggerating it's characteristic features
  6. the main technology for LANs
  7. _________ text: contains about half of the word count as the control condition
  8. _____ extension: a suffix to the name of a computer file applied ot indicate the encoding of its contents or usage
  9. _____ editor: a type of program used for editing plain text files
Down
  1. a related group of networked computers
  2. local area networks
  3. domain name system
  4. __________ communication: both the sender and receiver are active at the same time
  5. ___________ writing: control condition
  6. __________ language: using neutral rather than subjective, boastful or exaggerated language
  7. using a system attached to UT resources to capture data packets
  8. a W3C specification that defines the fifth major revision of the hypertext markup language
  9. hypertext markup language

18 Clues: domain name systemwide area networkslocal area networkshypertext markup languagethe main technology for LANsa related group of networked computers___________ writing: control conditionusing a system attached to UT resources to capture data packets_____ editor: a type of program used for editing plain text files...

Astrid's IT crossword puzzle 2020-11-12

Astrid's IT crossword puzzle crossword puzzle
Across
  1. /a piece of computer software that controls input and output operations
  2. /Which subnet class does 255.255.255.0 belong to? (answer includes a space)
  3. /a networks characterization that yields an routing prefix after subnetting
  4. /a group of binary digits or bits
  5. /a command that shows the computer's and internet's IP adress
Down
  1. /a unique string of character that identifies each computer Answer includes a space.
  2. /a minute area of illumination on a display screen, one of many from which an image is composed
  3. /the action of dividing a network into more networks
  4. /a computer system with which a computer operates with
  5. /a computer programm at the core of a computer's OS

10 Clues: /a group of binary digits or bits/a computer programm at the core of a computer's OS/the action of dividing a network into more networks/a computer system with which a computer operates with/a command that shows the computer's and internet's IP adress/a piece of computer software that controls input and output operations...

IT jobs 2023-09-18

IT jobs crossword puzzle
Across
  1. Develops, tests, and maintains software applications and systems.
  2. Analyses data to provide insights and support decision-making.
  3. Offers expert advice and recommendations to businesses on IT strategy and solutions.
  4. Responsible for configuring, managing, and troubleshooting servers and systems.
  5. Focuses on protecting computer systems and networks from cyber threats and attacks.
Down
  1. Focuses on the collection, storage, and management of data for analysis and reporting.
  2. Creates and maintains websites, web applications, and user interfaces.
  3. Manages and maintains an organization's computer networks and infrastructure.
  4. Provides technical support and assistance to end-users and resolves hardware and software issues.
  5. Designes, plans, and implements complex network infrastructures for organizations.

10 Clues: Analyses data to provide insights and support decision-making.Develops, tests, and maintains software applications and systems.Creates and maintains websites, web applications, and user interfaces.Manages and maintains an organization's computer networks and infrastructure....

Unit 7 Ch 14 Review - Ruqayah and Makenna 2024-04-26

Unit 7 Ch 14 Review - Ruqayah and Makenna crossword puzzle
Across
  1. a set of interconnected nodes without a center
  2. processes heightening interactions, increasing independence, and deepening relations within different countries
  3. highly connected cities that function as nodes in global networks
  4. interconnections among individuals that foster social interactions
  5. the merging of businesses that serve different steps in one commodity chain
  6. individuals or corporations who control access to information
Down
  1. common ownership of multiple companies that compete at the same point on a commodity chain
  2. a tragic event that draws people together from distant places is an example of
  3. growing cap in access to Internet and communication technologies between connected and remote places
  4. cross-promotion of vertically integrated goods

10 Clues: a set of interconnected nodes without a centercross-promotion of vertically integrated goodsindividuals or corporations who control access to informationhighly connected cities that function as nodes in global networksinterconnections among individuals that foster social interactions...

Objective 2i: Impact of Empire on Trans-Saharan Trade 2024-11-15

Objective 2i: Impact of Empire on Trans-Saharan Trade crossword puzzle
Across
  1. A powerful West African empire that succeeded Mali, expanding control over trade networks and cultural exchange in the region.
  2. The sharing of ideas, beliefs, art, and technologies facilitated by trade and empire expansion.
  3. A region central to Afro-Eurasian trade networks, particularly through the Mali Empire’s role in gold and salt exchanges.
  4. Systems established by expanding empires that enabled contact and information flow across vast regions.
Down
  1. The spread of innovations across regions through trade and the expansion of empires.
  2. A powerful West African state that expanded trade networks and facilitated cultural and economic exchanges in Afro-Eurasia.
  3. A West African kingdom that controlled trade routes and preceded the Mali Empire as a center of wealth and commerce.
  4. The growth of states like Mali that facilitated increased trade, communication, and cultural interactions across regions.

8 Clues: The spread of innovations across regions through trade and the expansion of empires.The sharing of ideas, beliefs, art, and technologies facilitated by trade and empire expansion.Systems established by expanding empires that enabled contact and information flow across vast regions....

thrive 2024-04-22

thrive crossword puzzle
Across
  1. Assistance type provided for family-related matters
  2. Virtual health consultations offered by Casting Networks
  3. Financial benefits provided to members through discounts
Down
  1. Casting Networks' program enhancing actor well-being
  2. General state of health and well-being supported by the new initiative
  3. Type of care with discounts available to Thrive+ members that will make you smile
  4. Hotline for advice on annual filings included in benefits
  5. Eye care services with reduced rates for certain members

8 Clues: Assistance type provided for family-related mattersCasting Networks' program enhancing actor well-beingEye care services with reduced rates for certain membersVirtual health consultations offered by Casting NetworksFinancial benefits provided to members through discountsHotline for advice on annual filings included in benefits...

IT Crossword 2024-01-18

IT Crossword crossword puzzle
Across
  1. Device that forwards data packets between computer networks.
  2. The maximum rate of data transfer across a given path.
  3. The official procedure or system of rules governing affairs of state or diplomatic occasions.
Down
  1. Formatted unit of data carried by a packet-switched network.
  2. Connection point where data from multiple directions converge and are then sent out in many directions.
  3. Computer program or process.
  4. Messages distributed by electronic means.
  5. Global system of interconnected computer networks.

8 Clues: Computer program or process.Messages distributed by electronic means.Global system of interconnected computer networks.The maximum rate of data transfer across a given path.Formatted unit of data carried by a packet-switched network.Device that forwards data packets between computer networks....

Cyber Security 2023-02-10

Cyber Security crossword puzzle
Across
  1. or identity theft.
  2. A company or organization that gives users and devices access to the Internet
  3. often by using emails or fake websites that look like they are from trusted organizations.
  4. Someone who uses computers and computer networks to disrupt services or share secret information in
  5. Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
  6. until it is decrypted using a secret key
  7. Consists of code written in a programming language that instructs computers to perform specific tasks.
  8. computers are usually used to cause damage that couldn’t be achieved with a single computer
  9. Multiple computers on a network that are infected with a program that can be controlled remotely. The
Down
  1. The process of using codes to make readable information unreadable. Encrypted information cannot be
  2. Attempting to trick people into revealing sensitive information, such as passwords and credit card
  3. A type of malware that holds victims’ computer files hostage by locking access to them or encrypting
  4. Extra copies of computer files that can be used to restore files that are lost or damaged
  5. A distributed denial of service attack attempts to make an online service, like a website, unavailable by
  6. software Computer programs that can block, detect, and remove viruses and other malware
  7. A computer or computer program that provides specific services on a network, such as an email server
  8. It then demands a ransom if the victim wants his or her files back.
  9. Unsolicited emails sent to many addresses. The purpose of most spam is to make money through
  10. it with a flood of traffic from a team of computers.
  11. effort to draw attention to political or social issues.
  12. directs emails and a web server that serves up web pages.
  13. Software designed to block malware from entering protected networks
  14. programs.
  15. A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
  16. The amount of data that can pass through a network or part of a network per second

25 Clues: programs.or identity theft.until it is decrypted using a secret keyit with a flood of traffic from a team of computers.effort to draw attention to political or social issues.directs emails and a web server that serves up web pages.It then demands a ransom if the victim wants his or her files back....

Security within the IoT 2017-04-26

Security within the IoT crossword puzzle
Across
  1. People don't learn enough about the _______ they use to secure them properly.
  2. The number of connected devices, systems and sensors worldwide is expected to grow rapidly over the coming years, with Cisco Systems and Intel both predicting as many as 50 ______ or more such devices by 2020.
  3. 72 percent of consumers do not know how to configure a wireless router in a way to _______ a home network.
  4. An important step to take during product development is to identify the potential ________ of hackers.
  5. The Internet of things is changing our _______ of personal security.
  6. Security can be a significant _______ to organizations adopting IoT technologies.
  7. BullGuard officials noted that the industry has not yet created common security ______ for IoT devices.
Down
  1. Recent research from SAS Institute states that only 11 percent of consumers believe that they have total ______ over the data they provide companies.
  2. IoT networks bring in a diverse set of connected devices that can introduce multiple points of ___________ in the networks.
  3. IoT systems are groupings of network-connected devices that automatically collect and exchange _____, allowing enterprises to increase efficiency and productivity.
  4. Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks.
  5. Most manufacturers are taking their own approaches to ______, which can create update procedures that are complex and difficult to carry out.
  6. The conflict between the demand for connected devices and the users' _______ to secure them or the networks they're on presents challenges.
  7. According to BullGuard CEP Paul Lipman "consumers are clearly not equipped to handle the myriad of security ____ presented by connected devices."
  8. Gartner predicts that by 2020, more than 25 percent of identified _______ in enterprises will be IoT-related.

15 Clues: The Internet of things is changing our _______ of personal security.People don't learn enough about the _______ they use to secure them properly.Security can be a significant _______ to organizations adopting IoT technologies.Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks....

Computers 2024-05-27

Computers crossword puzzle
Across
  1. Control center of a computer
  2. Main circuit board in a computer
  3. Type of document
  4. Turn on a computer
  5. Device named after Jerry.
  6. Computer Screen
  7. Send a letter online
Down
  1. Input device with keys
  2. Move up and down
  3. Network of networks
  4. Portable computer
  5. Save data on this
  6. Random Access Memory
  7. Web search tool
  8. Pictures on screen

15 Clues: Web search toolComputer ScreenMove up and downType of documentPortable computerSave data on thisTurn on a computerPictures on screenNetwork of networksRandom Access MemorySend a letter onlineInput device with keysDevice named after Jerry.Control center of a computerMain circuit board in a computer

Internet Vocabulary 2015-02-27

Internet Vocabulary crossword puzzle
Across
  1. A registered address for a website or an email address.
  2. The visual component of the internet. This stands for the World Wide Web.
  3. The online address of a site or document.
  4. A personal list of interesting websites.
  5. Information a person shares about him or herself online.
  6. A combination of the words "Net" and "etiquette". It refers to good manners online.
  7. Consists of countless networks of computers connected across the world.
  8. The ability to talk live with others on the internet.
  9. An electronic method of composing, sending and receiving messages over the internet.
Down
  1. The process of transferring computer files from the Internet to a computer.
  2. The virtual universe of computers and computer networks.
  3. The software that lets users "surf" the web and view pages on it. Firefox and Internet Explorer are examples.
  4. An electronic security barrier to prevent outsiders from getting into a computer network.

13 Clues: A personal list of interesting websites.The online address of a site or document.The ability to talk live with others on the internet.A registered address for a website or an email address.The virtual universe of computers and computer networks.Information a person shares about him or herself online....

Crossword Puzzle 2022-04-29

Crossword Puzzle crossword puzzle
Across
  1. The Women In Motion Network
  2. Advance Auto Parts has seven Team Member _______
  3. Promoting a variety of representation among our Team Members across all diverse groups to drive variation in thought and creative thinking
  4. International Cultural Opportunities Network
  5. Advance Auto Parts Employee Resource Groups (ERGs) are _________ __________ Networks
  6. Fostering Unity, Engagement, Growth and Opportunities Latino Network
  7. The Summer Internship Program: _______ University
Down
  1. Advance University is a ______ Internship
  2. Ensuring equal opportunity, treatment, and advancement for all Team Members, while also striving to eliminate barriers for all Team Members
  3. Fosters visibility and growth for its members and allies of the LGBTQ+ community by acting on our passion of inclusion of our Team Members, Customers and the communities we serve.
  4. Serve, Educate, Recruit, Value, Inspire, Celebrate and Empower Network
  5. Creating an environment for each Team Member to be their authentic self, to feel welcomed, valued, respected and heard
  6. The African American Leading Inclusion and Growth Network

13 Clues: The Women In Motion NetworkAdvance University is a ______ InternshipInternational Cultural Opportunities NetworkAdvance Auto Parts has seven Team Member _______The Summer Internship Program: _______ UniversityThe African American Leading Inclusion and Growth NetworkFostering Unity, Engagement, Growth and Opportunities Latino Network...

Technology 2017-06-13

Technology crossword puzzle
Across
  1. page gives you information
  2. demandSystems that enable the viewers to order and see a given programme at the exact time the viewer specifies.
  3. application of information and communications technologies and services, usually in direct combination
  4. A service provided from a remote location using the telematics infrastructure.
  5. Card It is a card that is able to store digital information.
  6. what people ins school are learning
  7. Message sent or posted to an excessively large number of people on the Internet
  8. it improves things
  9. 1 Computer program for a person to browse what is on the Internet
  10. gives you information
Down
  1. Network (WAN)
  2. gives you information about anything
  3. complement to LAN. A WAN consists of multiple local networks tied together, typically using telephone-company services.
  4. making something better
  5. Service A set of basic services that must be made available at an affordable price to all users by public or private operators irrespective of the user's geographical location.
  6. Time which elapses between ordering information and receiving it through an interactive system.
  7. which facilitates the communication between the computer and its user
  8. informatic programme able to disrupt the functioning of other programmes.
  9. you send and get information
  10. you send e massage
  11. popular way to move large amounts of voice, data and video

21 Clues: Network (WAN)it improves thingsyou send e massagegives you informationmaking something betterpage gives you informationyou send and get informationwhat people ins school are learninggives you information about anythingpopular way to move large amounts of voice, data and videoCard It is a card that is able to store digital information....

NWEG Puzzle 2021-11-25

NWEG Puzzle crossword puzzle
Across
  1. wireless technology used to connect devices
  2. a switching device for networks
  3. the programs and other operating information used by a computer.
  4. carries the broadband signals between your modem
  5. a network security device that monitors incoming and outgoing network traffic
  6. is the arrangement of the elements of a communication network
  7. the sharing of resources by connecting together all the devices
  8. a software component that lets the operating system and a device communicate with each other.
  9. a piece of computer hardware or software that provides functionality for other programs
Down
  1. a type of software program created to protect information technology systems from malicious software
  2. a peripheral machine which makes a persistent representation of graphics or text, usually on paper
  3. computer system that is designed for a single user
  4. a vast network that connects computers all over the world
  5. a person who utilizes a computer or network service
  6. an established set of rules that determine how data is transmitted between different devices in the same network.
  7. a thick rope used to connect devices
  8. Network providers
  9. includes the physical parts of a computer
  10. responsible for the operation of the networks
  11. box that connects your home network to the wider Internet

20 Clues: Network providersa switching device for networksa thick rope used to connect devicesincludes the physical parts of a computerwireless technology used to connect devicesresponsible for the operation of the networkscarries the broadband signals between your modemcomputer system that is designed for a single user...

Hardware and Software 2022-02-09

Hardware and Software crossword puzzle
Across
  1. Collections of web pages under a single domain name
  2. Primary user workspace in an OS
  3. Where the address is displayed
  4. Set of options used to help find information or functions in a program
  5. An object that stores data on a computer
  6. Rectangular display of a program or location
  7. A device that can store and process data to help users complete tasks
  8. Device which takes in data or information
  9. Virtual space used to group files and other folders
  10. Browser shortcut to a website
  11. Suffix at the end of a filename that tells what kind of file it is
  12. Device which sends out data or information
  13. Device that connects two or more networks
Down
  1. Set of instructions or programs that tells a computer what to do
  2. Multiple websites open inside a browser’s window
  3. Two or more computers connected together to share resources
  4. Uses radio to connect computers to the network
  5. Indicators of events
  6. Physical components of a computer that can be seen and touched
  7. Uses cables to physically connect the computer to the network
  8. Information measured in bits
  9. Network applications that navigate the Internet
  10. Image representing a program or a location
  11. Global network of networks
  12. An address for something on the Internet

25 Clues: Indicators of eventsGlobal network of networksInformation measured in bitsBrowser shortcut to a websiteWhere the address is displayedPrimary user workspace in an OSAn object that stores data on a computerAn address for something on the InternetDevice which takes in data or informationDevice that connects two or more networks...

Network Requirements 2023-09-07

Network Requirements crossword puzzle
Across
  1. a rule or order issued by authority
  2. a system design in which a component is duplicated so if it fails
  3. process that copies all your files, data and information
  4. protection of information
  5. the quality of being trustworthy
  6. the ability of a computing process to be used or produced in a range of capabilities
  7. the ability or tendency to move from one position or situation to another usually better one
  8. a process that gathers metrics on the operations of an IT environment
  9. a method of dividing a single physical network into logical sub-networks
  10. physical parts of a computer
  11. programs that run on a device
Down
  1. the degree to which a product meets some or all of the specifications
  2. the capacity at which data is transmitted on a network
  3. the time delay between when a signal is transmitted and when it is received
  4. capacity for the interconnection of platforms, systems, and applications
  5. the delay in network communication
  6. a standardized set of rules for formatting and processing data
  7. a networking device that forwards data packets between computer networks
  8. a set of digital security requirements and practices
  9. a measure of how many units of information a system can process in a given amount of time

20 Clues: protection of informationphysical parts of a computerprograms that run on a devicethe quality of being trustworthythe delay in network communicationa rule or order issued by authoritya set of digital security requirements and practicesthe capacity at which data is transmitted on a networkprocess that copies all your files, data and information...

CHAPTER 4: INTERACTING WITH OTHERS AS A HCP 2023-10-23

CHAPTER 4: INTERACTING WITH OTHERS AS A HCP crossword puzzle
Across
  1. ____________ CLASS ENVIRONMENTS INVOLVE OPEN DISCUSSION WHERE STUDENTS CAN INTERRUPT AT ANY TIME TO ASK QUESTIONS.
  2. VISIT YOUR PROFESSOR DURING SCHEDULED ____ ____ WHEN YOU HAVE QUESTIONS ABOUT THE COURSE.
  3. NETWORKS ARE _______, VOLUNTARY, AND RESPECTFUL.
  4. JOIN A _____ OR ORGANIZATION ON CAMPUS TO ENRICH YOUR SOCIAL INTERACTIONS.
  5. MAKE A _________ ______________ FROM THE START BY BEING ATTENTIVE, PARTICIPATING, AND INTERACTING.
  6. CONVEY __________ WHEN YOU INTRODUCE YOURSELF, PRACTICE WHAT YOU ARE GOING TO SAY, AND MAKE EYE CONTACT.
  7. _________ YOUR THOUGHTS BEFORE ANSWERING A QUESTION.
  8. _____________________ IN CLASS DISCUSSIONS BY ASKING QUESTIONS, COMMENTING ON STUDENT COMMENTS, & ANSWERING QUESTIONS.
Down
  1. ____________ YOURSELF BY BEING INVOLVED IN TOO MANY ACTIVITIES SPREADS YOURSELF TOO THIN.
  2. A GREAT VARIETY OF HUMAN CHARACTERISTICS
  3. GETTING TO KNOW YOUR PROFESSOR WILL HELP YOU FEEL ______IN THE CLASSROOM.
  4. YOUR _______DEPENDS ON MORE SUCCESS JUST SITTING IN CLASS AND TAKING EXAMS AND DOING HOMEWORK.
  5. _______________ ________________ CAN ANSWER QUESTIONS ABOUT YOUR PROGRAM'S REQUIREMENTS.
  6. WHEN YOU HAVE A QUESTION, __ ___ ____.
  7. AN INTERCONNECTED GROUP OF PEOPLE WHO SHARE INFO WITH ONE ANOTHER.
  8. DON'T EVER THINK A QUESTION IS ________.
  9. VISIT YOUR PROFESSOR DURING SCHEDULED ____ ____ WHEN YOU HAVE QUESTIONS ABOUT THE COURSE.
  10. SIT AT THE _____________ OF THE ROOM.
  11. SCHEDULE AN INDIVIDUAL _________________ WITH EVERY INSTRUCTOR AT LEAST ONCE A SEMESTER.
  12. BE ___________ BY INTRODUCING YOURSELF TO YOUR PROFESSOR.
  13. NETWORKS MAKE STUDY TIME MORE ___________.
  14. ____________ IS AN ACTIVE LEARNING PROCESS WHERE STUDENTS LEARN MOSTLY BY INTERACTING WITH PROFESSORS AND STUDENTS.

22 Clues: SIT AT THE _____________ OF THE ROOM.WHEN YOU HAVE A QUESTION, __ ___ ____.A GREAT VARIETY OF HUMAN CHARACTERISTICSDON'T EVER THINK A QUESTION IS ________.NETWORKS MAKE STUDY TIME MORE ___________.NETWORKS ARE _______, VOLUNTARY, AND RESPECTFUL._________ YOUR THOUGHTS BEFORE ANSWERING A QUESTION....

Network requirements. 2024-09-23

Network requirements. crossword puzzle
Across
  1. IP – An address used to identify devices on a public network like the internet.
  2. – Process of dividing a network into smaller parts to reduce congestion.
  3. – A device that converts data for transmission over telephone lines.
  4. – A network configuration where each node is connected in a loop.
  5. – A high-speed network within a small area like a home or office.
  6. – A device that connects multiple networks and directs data based on its destination address.
  7. – A global system of interconnected networks.
  8. Address – A unique number that identifies devices on a network.
  9. – A rule that specifies allowed and disallowed traffic on a network.
  10. – Protocol used to resolve IP addresses into MAC addresses.
Down
  1. – Verifying identity before accessing a network resource.
  2. – A method for managing data collisions on a shared network.
  3. – Method for encoding and decoding data into electrical signals for communication.
  4. – Layer responsible for ensuring complete data transfer.
  5. – Smallest unit of data.
  6. – A system that translates domain names into IP addresses.
  7. – A device used to strengthen a signal across long network distances.
  8. – Device used to split a network connection and send data to all connected devices.
  9. – A virtual network used to segment a physical network.
  10. – Protocol for transferring files between client and server.

20 Clues: – Smallest unit of data.– A global system of interconnected networks.– A virtual network used to segment a physical network.– Layer responsible for ensuring complete data transfer.– Verifying identity before accessing a network resource.– A system that translates domain names into IP addresses....

Chapter 4 2025-03-11

Chapter 4 crossword puzzle
Across
  1. the frequency of the wave forms usually expressed as ____
  2. A telecommunication closer that houses cabling and devices for work area computers
  3. the location of the cabling and equipment that connects an organization's network
  4. a cable that uses 568B standard and 568A standard on the other end
  5. Short cable for connecting a computer
  6. putting RJ-45 plugs on a cable to make a patch cable
  7. in ____, an organization might use wireless components to increase a LAN's span
  8. wireless networks use ____ light beams to send signals between pair of devices
  9. workstations and other user devices are located
  10. interference one wire generates on another wire when both are in a bundle
  11. the process where, bit signals are presented on the medium
Down
  1. a transmitter/receiver device, called a ___ must be installed to translate between wired and wireless networks
  2. An equipment room that's the connection point between IDFs
  3. Cable that comes in two types: unshielded and shielded
  4. trades electrical pulses for pulses of light
  5. is a length of cable between two network devices, such as NIC and a switch
  6. LANs use low powered two-way radio communication
  7. houses servers, routers, switches, and other major network equipment
  8. term for all cables and connectors tying a network together
  9. Cabling designed to carry voice but not data called _____

20 Clues: Short cable for connecting a computertrades electrical pulses for pulses of lightworkstations and other user devices are locatedLANs use low powered two-way radio communicationputting RJ-45 plugs on a cable to make a patch cableCable that comes in two types: unshielded and shieldedthe frequency of the wave forms usually expressed as ____...

Cybersecurity & Internet 2025-03-11

Cybersecurity & Internet crossword puzzle
Across
  1. A fraudulent attempt to obtain sensitive information via the internet.
  2. A structured set of data held in a computer.
  3. A form of bullying that occurs online.
  4. The act of stealing someone’s personal information for malicious purposes.
  5. A global network connecting millions of computers.
  6. Software designed to harm or exploit devices.
  7. The amount of data that can be transmitted in a fixed amount of time.
  8. The correct or acceptable way of communicating on the internet.
  9. A system designed to prevent unauthorized access to or from a network.
  10. A protocol used to transfer data over the internet.
  11. Individuals who exploit the internet to harm others.
  12. A unique identifier in a database.
Down
  1. The use of the internet to stalk or harass someone.
  2. Software used to manage and organize databases.
  3. Increased capacity for data transfer.
  4. A password that is difficult for others to guess or crack.
  5. A device that forwards data packets between computer networks.
  6. A unique string of numbers assigned to each device on a network.
  7. Reduced capacity for data transfer.
  8. The trail of data that individuals leave when using the internet.
  9. The system that translates domain names into IP addresses.
  10. Illegal activities that involve computers or networks.

22 Clues: A unique identifier in a database.Reduced capacity for data transfer.Increased capacity for data transfer.A form of bullying that occurs online.A structured set of data held in a computer.Software designed to harm or exploit devices.Software used to manage and organize databases.A global network connecting millions of computers....

CN 2024-10-15

CN crossword puzzle
Across
  1. The process of directing data between different networks
  2. The unique identifier for a device on a network
  3. A protocol that divides messages into smaller packets for transmission
  4. A type of IP address that uses 128 bits
Down
  1. A device that connects multiple networks and forwards packets
  2. A protocol used for sending error messages and operational information
  3. A protocol that provides automatic IP address configuration
  4. A standard format for transmitting packets over the Internet

8 Clues: A type of IP address that uses 128 bitsThe unique identifier for a device on a networkThe process of directing data between different networksA protocol that provides automatic IP address configurationA standard format for transmitting packets over the InternetA device that connects multiple networks and forwards packets...

Networking Basics 2016-10-07

Networking Basics crossword puzzle
Across
  1. A network connecting device that maps out MAC addresses of connecting node to mange traffic within a network
  2. A protocol in the TCP/IP stack for transmitting data within a network by trying to send data only when the medium is not occupied
  3. Two or more network-ready devices connect together via wired or wireless medium
  4. A company providing the connection between a network and the Internet for a fee (abbrev.)
  5. Typical measurement of the Internet speed (abbrev.)
  6. The physical address of a network node (2, one is abbreviated)
  7. Node on a network specialized in reducing traffic congestion by segmenting a network into subnetworks (2)
  8. A unique identifier of a node on a network (2, one is abbreviated)
  9. A connecting device that allows communication between networks using different communication protocols or access methods
Down
  1. A node on a network giving services, such as file sharing, Web browsing, and email
  2. Cable that is often used for Ethernet communication with RJ45 connectors on both ends (abbrev.)
  3. A type of cable made with glass fibers commonly used for long-distance transmission (2)
  4. A virtual meeting on the Web using a controlled interface that participants can share their screens or taken over control of another’s screen (2)
  5. A simple connecting device that broadcasts every message received to the whole network
  6. pair A type of cable originally used for telephone but now is also popular for LAN transmission (2)
  7. The actual carrier that transmits data on a network (2)
  8. Maximum data transfer rate from one point on a network to another in a specific time
  9. A network-ready device connected to a computer network
  10. A network connecting device that connects networks and regulates traffic flows between these networks
  11. The name of a physical topology where each node on the network is connected to a central device
  12. A hardware device with an antenna that sends and receives radio signals to and from a mobile device and a wired LAN (abbrev.)
  13. A computer network supporting users in a small geographical area (abbrev.)

22 Clues: Typical measurement of the Internet speed (abbrev.)A network-ready device connected to a computer networkThe actual carrier that transmits data on a network (2)The physical address of a network node (2, one is abbreviated)A unique identifier of a node on a network (2, one is abbreviated)...

CyF Chapter 1 2023-10-08

CyF Chapter 1 crossword puzzle
Across
  1. What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
  2. Attacks that originate from within an organization are known as ___________ security threats.
  3. Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
  4. Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
  5. DDoS in cyber security means "Distributed ______-of-Service.
  6. The acronym of this technology which enable people to connect billions of devices to the Internet.
  7. Criminals can also use rogue devices, such as _____ Wi-Fi access points.
  8. Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
  9. Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
  1. Criminals use this tool to capture data streams over a network.
  2. Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
  3. What is another word used to describe the speed of data.
  4. A group of grey hat hackers who rally and protest against different political and social ideas.
  5. At which level are the employees responsible to protect the organization’s reputation, data, and customers.
  6. Cyber ______ is a weakness that makes a target susceptible to an attack
  7. The acronym of the practice where people used their own devices to access enterprise information.
  8. This group of criminals breaks into computers or networks to gain access for various reasons.
  9. A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
  10. State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  11. _____ hat attackers are unethical criminals who violate computer and network security for personal gain.

20 Clues: What is another word used to describe the speed of data.DDoS in cyber security means "Distributed ______-of-Service.Criminals use this tool to capture data streams over a network.Cyber ______ is a weakness that makes a target susceptible to an attackCriminals can also use rogue devices, such as _____ Wi-Fi access points....

Chapter 6 2023-04-04

Chapter 6 crossword puzzle
Across
  1. is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.
  2. This automatically assigns IP addressing to a device. a client-server protocol in which servers manage a pool of unique IP addresses.
  3. an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
  4. is a feature or characteristic in operating systems which enables computers to self-configure an IP address and subnet mask
  5. sequence of characters that uniquely names a Wi-Fi network.
  6. a signal sent to a host that requests a response.
  7. This statically assigns IP addressing to a device.
  8. Includes wired and wireless network interface cards (NIC) and network devices such as switches, wireless access points (APs), routers, multipurpose devices, and more.
  9. is a collection of IP standards designed to optimize the process of allocating IP addresses by forming unique identifiers.
  10. A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network
  11. allows prioritization of specific traffic types.
  12. is a network diagnostic tool used to track the pathway taken by a packet on an IP network from source to destination.
  13. defines the range of IP addresses that can be used within a network or subnet.
  14. is an application or computer that sends, receives, and relays email.
  15. allows a temporary opening in the firewall to allow data to specific inbound ports or a port range for an application or game.
  16. a network that provides services to an untrusted network.
Down
  1. used to specify the MAC addresses that are allowed on the wireless network.
  2. a node that enables a connection between networks in order to allow machines on other networks to communicate.
  3. It is used to automatically assign an IP address to a device in an IP network when there is no other assignment method available.
  4. A unique number that is part of the NIC.
  5. is a temporary address for devices connected to a network that continually changes over time.
  6. a device that connects two or more packet-switched networks or subnetworks
  7. A command line utility that is used to display and manage the IP address assigned to the machine.
  8. a computer network security system that restricts internet traffic in, out, or within a private network.
  9. allows traffic to specific ports.
  10. a 32-bit number assigned to a computer as an address on the internet and does not change.
  11. Involves knowing how networks are interconnected to support the needs of a business.
  12. The unique identifier that serves as the name of your computer or server.
  13. allows devices to dynamically add themselves to a wireless network without intervention/configuration.

29 Clues: allows traffic to specific ports.A unique number that is part of the NIC.allows prioritization of specific traffic types.a signal sent to a host that requests a response.This statically assigns IP addressing to a device.a network that provides services to an untrusted network.sequence of characters that uniquely names a Wi-Fi network....

Hardware 2020-03-10

Hardware crossword puzzle
Across
  1. A unit of information equal to 220 bytes or, loosely, one million bytes.
  2. A passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid
  3. A small device able to be connected to and used with a computer, especially to allow access to wireless broadband or use of protected software.
  4. It is a frequency unit of cycles per second that measures transmissions through airwaves or conduits
  5. A place in a computer where an expansion card can be inserted.
  6. A device which can be slotted into a computer to allow the use of audio components for multimedia applications.
  7. A central processor or main processor, is the electronic circuitry within a computer that executes instructions that make up a computer program.
  8. A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
  9. A form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
  10. A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
  11. A type of storage medium that permanently stores data on personal computers (PCs) and other electronic devices.
Down
  1. A computer hardware component that connects a computer to a computer network.
  2. It is a frequency unit that measures the number of cycles per second.
  3. A family of computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
  4. An electrical device that supplies electric power to an electrical load.
  5. A printed circuit board found in general purpose computers and other expandable systems.
  6. A device that you connect to a home entertainment system, it allows you to send music from your phone to the music system via Bluetooth.
  7. A standard for connecting computers and their peripherals.
  8. A unit of information equal to one billion (109) or, strictly, 230 bytes.
  9. A printed circuit board controlling output to a display screen.

20 Clues: A standard for connecting computers and their peripherals.A place in a computer where an expansion card can be inserted.A printed circuit board controlling output to a display screen.It is a frequency unit that measures the number of cycles per second.A unit of information equal to 220 bytes or, loosely, one million bytes....

IT terms 2019-05-17

IT terms crossword puzzle
Across
  1. Standsfor one picture element (one dot on a computer monitor). commonly used as a unit of measurement.
  2. An unexpected problem with software or hardware. Typical problems are often the result of external interference with the program’s performance that was not anticipated by the developer.
  3. The physical components of a computer including the keyboard, monitor, disk drive, and internal chips and wiring.
  4. A collection of information organized so that a computer application can quickly access selected information.
  5. A person (or software) using an information system
  6. The manipulation of data to prevent accurate interpretation by all but those for whom the data is intended.
  7. A set of rules that regulate how computers exchange information.
  8. A barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  9. A point within a network that interconnects with other networks.
Down
  1. A binary digit (either 0 or 1). it is the most basic unit of data that can be recognized and processed by a computer.
  2. A group of interconnected computers capable of exchanging information.
  3. Software programs designed to damage or do other unwanted actions on a computer. common examples: viruses, worms, trojan horses, and spyware.
  4. A handheld device used with a graphical user interface system.
  5. A measurement of the amount of data that can be transmitted over a network at any given time.
  6. A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file. often used in conjunction with a username.
  7. An area on a disk that contains files or additional divisions called "subdirectories" or "folders".
  8. The method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
  9. A computer that is responsible for responding to requests made by a client program (e.g., a web browser or an e-mail program) or computer.
  10. A widely used Open Source Unix-like operating system.
  11. A penguin character and the official brand character of the Linux kernel.

20 Clues: A person (or software) using an information systemA widely used Open Source Unix-like operating system.A handheld device used with a graphical user interface system.A set of rules that regulate how computers exchange information.A point within a network that interconnects with other networks....

Chapter 5 IT Essentials Vocab (Mr. G) 2023-11-07

Chapter 5 IT Essentials Vocab (Mr. G) crossword puzzle
Across
  1. (2 words)commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility. It provides a connection point between PCs and the switches or routers.
  2. unshielded twisted-pair
  3. wide area networks. large computer network that connects groups of computers over large distances.
  4. (2 words) composed of two kinds of glass (core and cladding) and a protective outer shield (jacket). It uses light to transmit signals.
  5. (or coax) carries data in the form of electrical signals. The cable usually constructed of either copper or aluminum.
  6. An alternative for customers who cannot get cable or DSL connections. Does not require a phone line or cable, but uses a satellite dish for two-way communication.
  7. type of server that provides 3 main functions: gather logging information for monitoring and troubleshooting, select the type of logging information that is captured, and specify the destinations of captured syslog messages.
  8. Post Office Protocol
  9. electromagnetic interference
  10. connects a home or small office to the Internet.
  11. Simple Mail Transfer Protocol
  12. serves as the gateway to outside networks, use IP addresses to forward traffic to other networks.
Down
  1. Unified Threat Management
  2. Use of a cellular device to provide an internet connection to another device
  3. microsegments a LAN and has replaced bridges and hubs, they filter and segment network traffic by sending data only to the device to which it is sent
  4. (2 words)
  5. type of modem that connects a user’s network directly to the digital infrastructure of the phone company. always-on service, which means that there is no need to dial up each time you want to connect to the internet
  6. personal area network
  7. (2 words) Acts as storage or cache for web pages that are frequently accessed by devices on the internal network. Has the authority to act as another computer.
  8. Wireless protocol for close proximity connectivity. Operates in the 2.4 to 2.485 GHz radio frequency range and is typically used for PANs. Incorporates Adaptive Frequency Hopping (AFH)
  9. Internet Message Access Protocol
  10. Shielded twisted-pair

22 Clues: (2 words)Post Office Protocolpersonal area networkShielded twisted-pairunshielded twisted-pairUnified Threat Managementelectromagnetic interferenceSimple Mail Transfer ProtocolInternet Message Access Protocolconnects a home or small office to the Internet.Use of a cellular device to provide an internet connection to another device...

Ziaul Crossword 2024-12-03

Ziaul Crossword crossword puzzle
Across
  1. attackers who do not report problems, but instead disseminate the information to other black hat attackers
  2. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
  3. memory is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  4. is a series of letters, numbers, and special characters, much like a password, that two communicating devices use to authenticate each other’s identity.
  5. protocols used by OSs and network devices offer varying levels of secure authentication
  6. is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
  7. requires a user to supply two or more types of authentication drawn from these credential categories:
Down
  1. used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
  2. Wizard guides you through the process of selecting the type of rule you want to create and the protocols or applications that the rule will apply to
  3. Authentication Protocol (PAP)
  4. or server is not communicating with certain applications or services, the protocol might be blocked
  5. firewall creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  6. the information that is swapped back and forth from RAM to disk and vice versa is stored in a specially allocated disk area called
  7. that creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS.
  8. – backs up the disk sector by sector to create an exact image of the disk’s contents
  9. distributions have a built-in firewall called netfilter
  10. testers who are paid to probe networks and OSs and report vulnerabilities to the OS vendor.
  11. can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
  12. Defender Firewall is enabled and configured with default settings
  13. can be restricted to logging on only from particular workstations

20 Clues: Authentication Protocol (PAP)distributions have a built-in firewall called netfilterDefender Firewall is enabled and configured with default settingscan be restricted to logging on only from particular workstations– backs up the disk sector by sector to create an exact image of the disk’s contents...

BTEC DIT C3A - Modern Technologies 2025-03-04

BTEC DIT C3A - Modern Technologies crossword puzzle
Across
  1. The same data is stored in multiple locations
  2. If no transmitter is present in the cell then there will be no signal
  3. Anyone who is affected by or who can affect an organisations’ actions and policies
  4. Temporary networks with two or more computing devices
  5. Allows the same files to be copied to multiple devices via the cloud
  6. Online tools used to plan times and jobs for teams
Down
  1. __________ working - working away from the main office
  2. A secure tunnel between your device and the internet.
  3. The hardware and software that allow devices, applications, and users to communicate and connect to networks
  4. A copy of data to be used as part of disaster recovery
  5. Method of wireless connectivity over short distances (up to 10m)
  6. Free, unencrypted wireless connections
  7. Data that is divided up into smaller amounts. The data is then stored in different locations

13 Clues: Free, unencrypted wireless connectionsThe same data is stored in multiple locationsOnline tools used to plan times and jobs for teamsA secure tunnel between your device and the internet.Temporary networks with two or more computing devices__________ working - working away from the main officeA copy of data to be used as part of disaster recovery...

10 2024-01-31

10 crossword puzzle
Across
  1. SUBMISSIONS Submitting websites to low-quality directories for backlinks.
  2. Networks of websites created solely for the purpose of linking to a target site.
  3. Illegally acquiring control over a domain name to redirect traffic.
  4. Redirecting users to different content than what search engines see.
Down
  1. Hosting malicious content on legitimate websites to exploit their authority.
  2. Generating fake likes, shares, or comments on social media.
  3. Filtering out negative reviews to artificially inflate ratings.
  4. META TAGS Stuffing meta tags with excessive keywords to manipulate rankings.
  5. Using misleading titles to attract clicks to low-quality content.
  6. Creating networks of websites solely for the purpose of link exchange.

10 Clues: Generating fake likes, shares, or comments on social media.Filtering out negative reviews to artificially inflate ratings.Using misleading titles to attract clicks to low-quality content.Illegally acquiring control over a domain name to redirect traffic.Redirecting users to different content than what search engines see....

Network cross word puzzle 2024-08-14

Network cross word puzzle crossword puzzle
Across
  1. The protocol is responsible for ensuring data arrives correctly.
  2. A network's ability to handle an increase in load or demand.
  3. A network where computers communicate directly with each other without a central server.
  4. This type of address uniquely identifies a device on a network.
  5. A network that covers a large geographical area.
  6. The smallest unit of data in a network.
  7. The main method for measuring the capacity of a network connection.
  8. The device that forwards data packets between computer networks.
  9. A private network that uses public networks to connect remote sites or users.
  10. This protocol ensures data is sent securely over the network.
Down
  1. A standard for connecting computers in a local area network.
  2. This protocol breaks data into small packets for transmission.
  3. This network layer protocol handles the routing of packets.
  4. A type of network configuration where all devices are connected to a central hub.
  5. A device that amplifies or regenerates network signals to extend the range.
  6. The maximum amount of data that can be transmitted over a network in a given time.
  7. A technology that allows multiple devices to share the same network connection.
  8. A system that converts domain names to IP addresses.

18 Clues: The smallest unit of data in a network.A network that covers a large geographical area.A system that converts domain names to IP addresses.This network layer protocol handles the routing of packets.A standard for connecting computers in a local area network.A network's ability to handle an increase in load or demand....

digital literacy 2024-06-17

digital literacy crossword puzzle
Across
  1. controlled by one person
  2. spreads between files
  3. pretends to be you
  4. unsafe websites/unsafe programs visits
  5. fire extinguisher
  6. spreads through networks/emails
  7. unit of measurement for electricity pressure
  8. spies on you
  9. wireless,signal loss
Down
  1. tricks you
  2. transmission capacity
  3. before touching inside of a computer
  4. send signals in network
  5. blocks you from files
  6. sends what you type to someone
  7. number of bits per second
  8. owns the internet
  9. defense department project
  10. dangerous to open

19 Clues: tricks youspies on youowns the internetfire extinguisherdangerous to openpretends to be youwireless,signal losstransmission capacityspreads between filesblocks you from filessend signals in networkcontrolled by one personnumber of bits per seconddefense department projectsends what you type to someonespreads through networks/emails...

Infosec 2013-05-30

Infosec crossword puzzle
Across
  1. Your system can remain secured only if it has the latest __________.
  2. potential that an action or activity will lead to a loss
  3. A group of your colleagues who assists you in securely evacuating in any emergency situation.
  4. FAI Information security documents are made available to users on
  5. important in computers and networks
  6. a breach in security, such as unauthorized access to data
  7. or malware is a file or program other then a virus that is potentially harmful.
  8. Entering premises without swiping your access card by following someone else.
  9. any information about an individual which can be used to uniquely identify that person, e.g. name, date and place of birth, mother’s maiden name, social security number is ............. Identifiable Information
  10. is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
  11. Ensure that authorised user have access to information & associated assets when required.
  12. emailID to report security incidents
  13. list of permissions that tells an operating system which users have access rights to objects, and what operation they are allowed to perfom on those objects
  14. is a self-replicating program that is harmful to networks.
  15. is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
  16. who is responsible for security
  17. I am not authorized to install applications and software that are
Down
  1. Independent review of how well you are following and complying with the standards and policies.
  2. visitors need to be
  3. Organization’s preparedness program for handling disruptions.
  4. of death is a series of repeated, larger than normal pings that crash the receiving computer.
  5. If you access a computer systems without the owner’s knowledge and approval, you are committing a _____
  6. is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
  7. is used to discard hard copies of confidential data.
  8. Password must be always kept _______ .
  9. is ensuring the accuracy and completeness of Information.
  10. Ensuring the information is accessible only to those authorised have access.
  11. is a program written with malicious intent and sent out by attackers.
  12. Programming language that allows applets to run within a web browser.
  13. The scrambling of data into a secret code that can be read only by software set to decode the information.
  14. Your activities on the network can be ____________ by the company.
  15. is a software program that displays advertising on your computer.
  16. these set out the technical controls required to achieve the policy objeclives
  17. Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain based on information they have obtained from these social networks or victim themselves
  18. abbreviation for voice communications over internet networks
  19. anything of value, such as source code, processes, hardware, people etc.

36 Clues: visitors need to bewho is responsible for securityimportant in computers and networksemailID to report security incidentsPassword must be always kept _______ .is used to discard hard copies of confidential data.potential that an action or activity will lead to a lossis ensuring the accuracy and completeness of Information....

Crossword2 2024-12-18

Crossword2 crossword puzzle
Across
  1. A computer that provides resources to other devices.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. The language used to structure web pages.
  4. An error in a program that needs fixing.
  5. Address A unique string of numbers separated by periods that identifies each computer using the Internet Protocol.
Down
  1. Secures data by converting it into a coded format.
  2. Protects networks from unauthorized access.
  3. Stores data on the internet instead of your local device.

8 Clues: An error in a program that needs fixing.The language used to structure web pages.Protects networks from unauthorized access.Secures data by converting it into a coded format.A computer that provides resources to other devices.Stores data on the internet instead of your local device....

East Asia 2023-10-04

East Asia crossword puzzle
Across
  1. the characteristics of a population
  2. transportation networks
  3. regional difference in language
  4. groups of representatives
Down
  1. physical geography
  2. move from power
  3. money in circulation
  4. island chain
  5. wealthy Japanese landowners
  6. Japanese general

10 Clues: island chainmove from powerJapanese generalphysical geographymoney in circulationtransportation networksgroups of representativeswealthy Japanese landownersregional difference in languagethe characteristics of a population

test 2013-01-02

test crossword puzzle
Across
  1. / Operating System
  2. / Our ERP system
  3. / Our anti-virus software vendor
  4. / Computer manufacturer
  5. / Open-source office productivity software suite
  6. / Electronic message
Down
  1. / Our anti-spam filter
  2. / Data storage device
  3. / What does the V stand for in DVD?
  4. / Global system of interconnected computer networks
  5. / Computer screen
  6. / ********* Serial Bus
  7. / Copying and archiving of computer data
  8. / Popular smartphone

14 Clues: / Our ERP system/ Data storage device/ Computer screen/ Operating System/ ********* Serial Bus/ Popular smartphone/ Electronic message/ Our anti-spam filter/ Our anti-virus software vendor/ Computer manufacturer/ What does the V stand for in DVD?/ Copying and archiving of computer data...

ISY 106 CROSSWORD 2024-09-22

ISY 106 CROSSWORD crossword puzzle
Across
  1. A network security system that monitors and controls incoming and outgoing network traffic.
  2. A common method of network communication in local area networks (LANs).
  3. The brain of the computer, responsible for executing instructions.
  4. Service that translates domain names into IP addresses.
  5. Address, Unique identifier assigned to each device connected to a network.
  6. A networking device that connects devices within a LAN and forwards data.
  7. A device that forwards data between networks.
  8. Firmware used to perform hardware initialization during the booting process.
Down
  1. The core part of an operating system, managing hardware resources.
  2. A small-sized type of volatile computer memory that provides high-speed data access to a processor.
  3. Software that enables the creation and management of virtual machines.
  4. Technology that allows for the creation of virtual versions of physical computing resources.
  5. Computing model that allows access to a shared pool of configurable computing resources over the Internet.
  6. A communication system that transfers data between components inside a computer or between computers.
  7. Volatile memory used by the CPU to store data for active programs.
  8. Software that manages computer hardware and software resources.

16 Clues: A device that forwards data between networks.Service that translates domain names into IP addresses.Software that manages computer hardware and software resources.The core part of an operating system, managing hardware resources.Volatile memory used by the CPU to store data for active programs....

VA/OA 2013-08-19

VA/OA crossword puzzle
Across
  1. Stakeholders within the organisation
  2. Being able to be seen
  3. Creating a reaction by your actions
  4. Testing the 3Es
  5. A repository of information
  6. The person in charge
Down
  1. Create awareness
  2. to exchange information
  3. Networks of instant communication
  4. Working together
  5. Online writing
  6. The goal of current PA strategy
  7. Best friend
  8. A collection of records

14 Clues: Best friendOnline writingTesting the 3EsCreate awarenessWorking togetherThe person in chargeBeing able to be seento exchange informationA collection of recordsA repository of informationThe goal of current PA strategyNetworks of instant communicationCreating a reaction by your actionsStakeholders within the organisation

CIW-NTA Lesson 3 Vocabulary 2025-01-16

CIW-NTA Lesson 3 Vocabulary crossword puzzle
Across
  1. A high-speed direct Internet connection that uses all-digital networks.
  2. The end point of a connection (either side), which usually includes the TCP or UDP port used and the IP address. Used for communication between a client and a server.
  3. The Internet standard protocol for remote terminal connection service.
  4. A software application that enables a PC or mobile device to function as a telephone using VoIP technology.
  5. A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
  6. A very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity.
  7. A person's ability to use technology while "on the go."
Down
  1. A standard for short-range radio signals that is used to form personal area networks (PANs).
  2. A mobile phone that includes PC-like functionality.
  3. A more compact, Web-oriented version of the standard laptop PC; relies on the cloud computing model in which the Internet is used for remote access to Web applications.
  4. A device that allows computers to communicate over a network by modulating and demodulating the cable signal into a stream of data.
  5. A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
  6. ABBREVIATION ONLY. The complete domain name of an Internet computer, such as www.CIWcertified.com.
  7. A file that contains mappings of IP addresses to host names.
  8. One link between two network devices; the number of hops between two devices is considered a hop count.

15 Clues: A mobile phone that includes PC-like functionality.A person's ability to use technology while "on the go."A file that contains mappings of IP addresses to host names.The Internet standard protocol for remote terminal connection service.A high-speed direct Internet connection that uses all-digital networks....

CHAPTER 6 TERMS 2020-08-12

CHAPTER 6 TERMS crossword puzzle
Across
  1. used to rate the trustworthiness of routing information received on one router from its neighboring router
  2. an external routing protocol that uses a sophisticated algorithm to determine the best route
  3. means it sends the subnet mask information with the route updates (prefix routing)
  4. a collection of networks under a common administrative domain
  5. used to communicate between multiple autonomous systems (AS)
  6. a way to configure more than one physical router to appear as if they were only a single logical one.
  7. a router receiving an update from a neighbor router believes the information about remote networks without verifying for itself if the news is actually correct
  8. all devices in the network must use the same subnet mask for each specific address class.
Down
  1. the time required by protocols to update their forwarding tables after changes have occurred
  2. a path considered a backup route
  3. each router keeps state information about adjacent neighbors
  4. best route to a remote network
  5. two types of routing protocols used in internetworks
  6. involves encapsulating one type of protocol in another type of protocol
  7. allows a group of routers to for a single virtual router. On router is elected to handle all request sent to the virtual IP address
  8. a unique IP address on the same subnet as the hosts defined in the configuration
  9. uses only the hop count to determine the best way to a remote network
  10. finds the best path to a remote network by judging distance. Each router running RIP sends it complete routing tables out to all active interfaces at periodic time intervals.
  11. a network that has two or more subnetworks of a classful network connected together by different classful networks.
  12. the routing tables include information about all the networks in the internetwork.
  13. useful for carrying IPv6 data over a network that is still IPv4
  14. contains all destinations advertised by neighboring routers
  15. a Cisco proprietary protocol that can be run on most, but not all, of Cisco’s router and multilayer switch models
  16. exchanged by routers to determine which other routers are available to exchange routing data with
  17. general-purpose encapsulation that allows for transporting packets from one network through another network through a VPN
  18. allows you to used variable length subnet mask
  19. translating one routing protocol into another
  20. uses aspects of both distance vector and link state.
  21. (shortest path first protocol) sends updates containing the state of their own links to all other routers on the network.
  22. the amount of bandwidth on the lines will be used to find the best path to the remote network

30 Clues: best route to a remote networka path considered a backup routetranslating one routing protocol into anotherallows you to used variable length subnet masktwo types of routing protocols used in internetworksuses aspects of both distance vector and link state.contains all destinations advertised by neighboring routers...

Chapter 11-12 crossword 2023-11-27

Chapter 11-12 crossword crossword puzzle
Across
  1. A solid in which particles lack an organized structure
  2. Because in the solid and liquid states particles are closer together
  3. Intermolecular forces that bind a substance to a surface are called
  4. Extended networks of atoms held together by metallic bonding
  5. Different structural forms of the same element
  6. The resistance of a liquid to flow and increases with stronger intermolecular forces and decreases with higher temperature.
  7. The rise of liquids up narrow tubes is called capillary action.
  8. Solid in which particles are arranged in a definite repeating pattern
  9. Discrete molecules held by intermolecular forces
  10. Intermolecular forces that bind similar molecules to one another are called
Down
  1. The energy or work required to increase the surface area of a liquid due to intermolecular forces
  2. Conversion from one state of matter to another is called a
  3. A temporary attractive force that occurs when electron clouds in neighboring atoms occupy positions that create temporary dipoles
  4. The pressure needed to compress the liquid at critical temperature is called
  5. The state beyond this temperature is called a
  6. Extented networks of ions held together

16 Clues: Extented networks of ions held togetherThe state beyond this temperature is called aDifferent structural forms of the same elementDiscrete molecules held by intermolecular forcesA solid in which particles lack an organized structureConversion from one state of matter to another is called aExtended networks of atoms held together by metallic bonding...

Crossword 2024-04-18

Crossword crossword puzzle
Across
  1. the programs and other operating information used by a computer
  2. he protection of computer systems and networks from attacks by malicious actors
  3. team focus is on phone networks, recording calls and call center
  4. a request for information
  5. set of data processing elements connected in series, the output of one element is the input of another
  6. (abbrev)determines stakeholder needs and drives strategy for IT team
  7. objectively analyze desired processes and outcomes, advise on correct combo of IT systems
Down
  1. position focus is to support teams on IT floor to produce efficiently and effectively
  2. the systems put in place to operate and manage IT services and environments
  3. a structured set of data held in a computer
  4. creates/develops training materials for IT
  5. team focused on keeping monitors, computers and general physical technology in working order
  6. maximum rate of data transfer across a given path
  7. (abbrev) much of the job involves attempting to "break" code
  8. subset of programming entailing logical reasoning, analysis, and planning a sequence of instructions
  9. (abbrev) computer systems able to perform tasks such as visual perception, speech recognition, decision-making

16 Clues: a request for informationcreates/develops training materials for ITa structured set of data held in a computermaximum rate of data transfer across a given path(abbrev) much of the job involves attempting to "break" codethe programs and other operating information used by a computerteam focus is on phone networks, recording calls and call center...

Wireless/Bluethooth 2023-03-28

Wireless/Bluethooth crossword puzzle
Across
  1. Multi-User MIMO
  2. Clear Channel Assessment
  3. Multiple-Input, Multiple-Output
  4. extended service set
  5. MAN Wireless metropolitan area networks
  6. Quality of Service
  7. PAN Wireless personal area networks
  8. Temporal Key Integrity Protocol
  9. Remote Authentication Dial-In Service
  10. Extensible Authentication Protocol
Down
  1. Multi-User Multiple Input-Multiple Output
  2. Internet of Things
  3. Near Field Communication
  4. WAN Wireless wide area networks
  5. Dynamic Frequency Selection
  6. Advanced Encryption Standard
  7. Received Signal Strength Indication
  8. Wi-Fi Protected Setup
  9. Service Set Identifier
  10. Wireless LAN
  11. Terminal Access Controller Access-Control System

21 Clues: Wireless LANMulti-User MIMOInternet of ThingsQuality of Serviceextended service setWi-Fi Protected SetupService Set IdentifierNear Field CommunicationClear Channel AssessmentDynamic Frequency SelectionAdvanced Encryption StandardWAN Wireless wide area networksMultiple-Input, Multiple-OutputTemporal Key Integrity Protocol...

CIS 101 Cybersecurity Crossword puzzle 2025-03-14

CIS 101 Cybersecurity Crossword puzzle crossword puzzle
Across
  1. Protocol for secure email
  2. Method to authenticate users
  3. Scrambles data for privacy
  4. Protects systems from malware
  5. Scanning for vulnerabilities
  6. Prevents unwanted emails
  7. Remote monitoring of devices
  8. Standard for network encryption
Down
  1. Attack on website servers
  2. Secure file sharing protocol
  3. Fake website for phishing
  4. Unauthorized access to data
  5. Denial of Service attack
  6. Security for wireless networks
  7. A breach of security
  8. Malicious software program
  9. Unauthorized user access point
  10. Attack on network resources
  11. Software to block threats

19 Clues: A breach of securityDenial of Service attackPrevents unwanted emailsAttack on website serversProtocol for secure emailFake website for phishingSoftware to block threatsScrambles data for privacyMalicious software programUnauthorized access to dataAttack on network resourcesSecure file sharing protocolMethod to authenticate users...

Lesson 3 Vocab 2024-02-02

Lesson 3 Vocab crossword puzzle
Across
  1. A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
  2. A device that allows computers to communicate over a network by modulating and demodulating the cable signal into a stream of data.
  3. A file that contains mappings of IP addresses to host names.
  4. A standard for short-range radio signals that is used to form personal area networks (PANs).
  5. A mobile phone that includes PC-like functionality.
  6. A more compact, Web-oriented version of the standard laptop PC; relies on the cloud computing model in which the Internet is used for remote access to Web applications.
  7. A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
  8. One link between two network devices; the number of hops between two devices is considered a hop count.
  9. The complete domain name of an Internet computer, such as www.CIWcertified.com.
Down
  1. The Internet standard protocol for remote terminal connection service.
  2. The end point of a connection (either side), which usually includes the TCP or UDP port used and the IP address. Used for communication between a client and a server.
  3. A very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity.
  4. A high-speed direct Internet connection that uses all-digital networks.
  5. A software application that enables a PC or mobile device to function as a telephone using VoIP technology.
  6. A person's ability to use technology while "on the go."

15 Clues: A mobile phone that includes PC-like functionality.A person's ability to use technology while "on the go."A file that contains mappings of IP addresses to host names.The Internet standard protocol for remote terminal connection service.A high-speed direct Internet connection that uses all-digital networks....

Computer terms 2021-05-10

Computer terms crossword puzzle
Across
  1. It comprises the entire set of programs, procedures, and routines associated with the operation of a computer system.
  2. It stands for World Wide Web
  3. It stands for Wireless Fidelity.
  4. Also called USB or flash drive.
  5. A set of headphones, especially one with a microphone attached to it.
  6. a piece of electronic equipment that connects computer networks to each other, and sends information between networks.
Down
  1. A program you use to look at, and navigate between, pages on the World Wide Web
  2. Also called cables.
  3. Also called virus or malware
  4. an electronic device that allows one computer to send information to another through standard phone lines and therefore over long distances.
  5. It refers to the physical parts of a computer and related devices.

11 Clues: Also called cables.It stands for World Wide WebAlso called virus or malwareAlso called USB or flash drive.It stands for Wireless Fidelity.It refers to the physical parts of a computer and related devices.A set of headphones, especially one with a microphone attached to it....

The Cardiovascular System 2023-11-16

The Cardiovascular System crossword puzzle
Across
  1. cardiac rhythm management
  2. HEART
  3. Attack
  4. vessels that return blood to the heart
  5. vessels that deliver blood to tissues
  6. a scan used to look at the heart and nearby blood vessels
  7. failure When the heart fails
  8. how the heart works during physical activity
  9. a sudden blockage
  10. muscle disease
Down
  1. peripheral vascular disease
  2. CELL
  3. are networks of small vessels that perfuse tissues
  4. cardiovascular disease
  5. transient ischemic attack
  6. a problem with the rate of your heartbeat
  7. BLOOD
  8. computed tomography scan
  9. magnetic resonance imaging
  10. CLOT, LUMP
  11. Pumps blood through the system
  12. electrocardiogram

22 Clues: CELLHEARTBLOODAttackCLOT, LUMPmuscle diseasea sudden blockageelectrocardiogramcardiovascular diseasecomputed tomography scancardiac rhythm managementtransient ischemic attackmagnetic resonance imagingperipheral vascular diseasefailure When the heart failsPumps blood through the systemvessels that deliver blood to tissues...

U03 - CSE-CH03 2024-02-15

U03 - CSE-CH03 crossword puzzle
Across
  1. A type of malware, similar to a virus, which self-replicates across networks without the need for a user to open an infected program.
  2. (8,8) Protecting the places where people work, and the locations of systems, services and networks.
  3. A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
  4. (5,9) Files containing data unique to particular pieces of malware, including viruses, that security software downloads in order to aid detection.
  5. A cyber attack where a user is misdirected to a fraudulent website, despite entering the correct address.
  6. (6,5) A type of malware, disguised as legitimate software, that is used to gain unauthorised access to a victim's computer.
Down
  1. (5,8) A form of phishing targeting particular individuals, where the email is designed to look like it's from a trusted or known person.
  2. is any kind of software that can damage computer systems, networks or devices. Includes viruses, ransomware and trojans.
  3. (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
  4. Deliberate or accidental threat to an organisation's security from someone who has authorised access (such as an employee).
  5. Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives.
  6. (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
  7. Unsolicited email sent in bulk, also referred to as junk email.

13 Clues: Unsolicited email sent in bulk, also referred to as junk email.Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives.(8,8) Protecting the places where people work, and the locations of systems, services and networks....

GCSE Computer Science: Networks 2018-02-17

GCSE Computer Science: Networks crossword puzzle
Across
  1. The 'b' in mbps stands for…
  2. A computer on a network that provides facilities to others, such as storage or printing.
  3. A network with a central hub to which all computers are connected.
  4. A computer that connects to a network and uses its services and resources.
  5. A network where there is no server - all clients are equal. (3 words)
  6. Connecting your phone to your laptop would create this type of network. (3 words)
  7. A collection of computers connected together to exchange data.
  8. A network where computers are connected in a circle.
Down
  1. The unit used to measure network speed.
  2. The Internet is the most famous example of this type of network. (3 words)
  3. A network where every computer is connected to every other computer.
  4. A network set up in a small geographical area, such as an office. (3 words)
  5. Computers in this network are connected in a line.
  6. This word means 'the way we lay out our network'.

14 Clues: The 'b' in mbps stands for…The unit used to measure network speed.This word means 'the way we lay out our network'.Computers in this network are connected in a line.A network where computers are connected in a circle.A collection of computers connected together to exchange data.A network with a central hub to which all computers are connected....

Neural Networks and Deep Learning 2023-11-14

Neural Networks and Deep Learning crossword puzzle
Across
  1. How far the filter moves in every step along one direction
  2. An unsupervised learning rule that attempts to connect the psychological and neurological underpinnings of learning &
  3. Function used to calculate the total net input &
  4. Most popularly used activation function in the areas of convolutional neural networks and deep learning: f(x) is zero when x is less than zero and f(x) is equal to x when x is above or equal to zero &
  5. Applied after the convolutional layer, used to reduce the dimensions of the feature maps
  6. A gradient descent learning rule for updating the weights of the inputs to artificial neurons in a single-layer neural network &
  7. Addition of extra pixels around the borders of the input images or feature map
  8. The output remains the same as the input &
  9. A machine learning training method based on rewarding desired behaviors and punishing undesired ones &
  10. Simplest type of RNN
  11. A RNN, aimed to deal with the vanishing gradient problem present in traditional RNNs
  12. A process by which an initial set of data is reduced by identifying key features of the data for machine learning &
  13. A technique to prevent exploding gradients in very deep networks, usually in RNNs
  14. A mathematical function that converts a vector of real numbers into a probability distribution &
  15. A type of RNN that, in certain cases, has advantages over LSTM
  16. It is a widely adopted activation function for a special type of neural network known as Backpropagation Network &
  17. A supervised machine learning method where the model tries to predict the correct label of a given input data &
  18. A systematic error that occurs in the machine learning model itself due to incorrect assumptions in the ML process &
  19. A type of artificial neural network which uses sequential data or time series data
  20. A matrix of weights which are multiplied with the input to extract relevant features
Down
  1. A commonly used activation function: it gives 1 as output of the input is either 0 or positive &
  2. A type of artificial neural network, which is widely used for image/object recognition and classification
  3. A branch of artificial intelligence and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy &
  4. An algorithm that is designed to test for errors working back from output nodes to input nodes &
  5. When all the training data is used at once and is defined as the total number of iterations of all the training data in one cycle for training the machine learning model &
  6. Uses machine learning algorithms to analyze and cluster unlabeled datasets &
  7. A single layer neural network with multiple nodes where each node accepts multiple inputs and generates one output &
  8. Function decides whether a neuron should be activated or not by calculating the weighted sum and further adding bias to it &
  9. A hyper-parameter used to govern the pace at which an algorithm updates or learns the values of a parameter estimate &
  10. A type of machine learning that learns the relationship between input and output &
  11. An algorithm for supervised learning of binary classifiers &
  12. A method in artificial intelligence that teaches computers to process data in a way that is inspired by the human brain &
  13. Kernel
  14. The need for this activation function stems from the fact that many learning algorithms require the activation function to be differentiable and hence continuous &

34 Clues: KernelSimplest type of RNNThe output remains the same as the input &Function used to calculate the total net input &How far the filter moves in every step along one directionAn algorithm for supervised learning of binary classifiers &A type of RNN that, in certain cases, has advantages over LSTM...

Chapter 1; Introduction to Networks 2025-02-12

Chapter 1; Introduction to Networks crossword puzzle
Across
  1. The type of computer whose primary role in the network is to give client computers access to network resources and services. The computers that most often fit this description are usually in the IT room or locked away in a closet.
  2. Information added to the back end of a chunk of data so that the data can be correctly interpreted and processed by network protocols.
  3. The acronym for a type of low-power memory that is used to store configuration information for a PC.
  4. A collection of users and computers in a server-based network whose accounts are managed by Windows servers called “domain controllers.”
  5. A type of computer memory in which continual electrical power is required to maintain the data stored in it.
  6. A chunk of data sent over a network containing source IP address, a destination IP address, and other IP protocol.
  7. A private network that allows limited and controlled access to internal network resources by outside users, usually in a business-to-business situation.
  8. A collection of wires that carry data from one place to another on a computer’s motherboard.
  9. The prefix used to measure data that indicates a Billion bytes.
  10. The type of CPU containing two or more processing cores.
  11. A network model in which all computers can function as clients or servers as needed, and there’s no centralized control over network resources.
Down
  1. A computer program stored in nonvolatile memory that is executed when a computer is first powered on.
  2. The process of adding IP addresses and then MAC addresses to chunks of data, either at the front or the end.
  3. A component on a motherboard that controls data transfers between memory, expansion slots, I/O devices, and the CPU.
  4. _____ protocols.The software defining the rules and formats a computer must use when sending information across a network.
  5. OS The OS installed on a computer that is designed mainly to access network resources, even though it might be capable of sharing its own. Mac OS and Windows 10 fit this description.
  6. A networked collection of LANs tied together by devices such as routers.
  7. ____ Service. The software that manages centralized access and security in a server-based network.
  8. The term for the username-password pair that must be given to access a computer on a network.
  9. A packet with source and destination MAC addresses added and an error-checking code added to the back end. Frames are generated and processed by the network interface.

20 Clues: The type of CPU containing two or more processing cores.The prefix used to measure data that indicates a Billion bytes.A networked collection of LANs tied together by devices such as routers.A collection of wires that carry data from one place to another on a computer’s motherboard....

Terms 2024-10-22

Terms crossword puzzle
Across
  1. A networking device that connects devices within a local area network (LAN).
  2. A set of rules that govern communication between devices on a network.
  3. Zeroconf or Plug&play for IP assignment.
  4. A connectionless protocol that does not guarantee delivery.
  5. The first line of defense that monitors incoming and outgoing traffic.
  6. A process used to establish a connection between two network devices before communication starts.
Down
  1. A method for handling collisions in Ethernet networks
  2. The actual rate at which data is successfully transferred over a communication link.
  3. An organization that provides access to the Internet for individuals or companies.
  4. The sender can send more than one packet before receiving ACK for that packet
  5. A device that forwards data packets between computer networks.
  6. A unique identifier assigned to network interfaces for communications on the physical network segment.

12 Clues: Zeroconf or Plug&play for IP assignment.A method for handling collisions in Ethernet networksA connectionless protocol that does not guarantee delivery.A device that forwards data packets between computer networks.A set of rules that govern communication between devices on a network....

Wired and Wireless Networks 2024-01-23

Wired and Wireless Networks crossword puzzle
Across
  1. A wireless connection method for earphones, keyboards, etc.
  2. Two or more devices connected together make this.
  3. Describes the amount of data that can be sent down a connection in one go.
  4. A way of transmitting data using light.
  5. A powerful computer that is used to store network files, connect to printers, etc.
  6. A billion bits transmitted at once.
  7. A security method for wireless networks where data is jumbled up.
  8. A million bits transmitted at once.
Down
  1. A device used to connect a home network to the Internet.
  2. Describes a network that uses radio signals.
  3. Describes how fast data can travel down a connection.
  4. Describes what is happening when a video or sound pauses unexpectedly.
  5. A device used to connect devices together to make a network.
  6. Describes the delay between sending data and it being received.

14 Clues: A billion bits transmitted at once.A million bits transmitted at once.A way of transmitting data using light.Describes a network that uses radio signals.Two or more devices connected together make this.Describes how fast data can travel down a connection.A device used to connect a home network to the Internet....

Computer Science 100 2016-02-23

Computer Science 100 crossword puzzle
Across
  1. World Wide Web
  2. copying stealing
  3. can be increased by good writing
  4. picture movies graph
  5. Related group of networked computers
  6. Local Area Network
Down
  1. Hacking
  2. component of website
  3. someone or something of entity
  4. main technology for local area network
  5. Wide Area Networks
  6. the codes or tags of browsers
  7. Domain Name System

13 Clues: HackingWorld Wide Webcopying stealingWide Area NetworksDomain Name SystemLocal Area Networkcomponent of websitepicture movies graphthe codes or tags of browserssomeone or something of entitycan be increased by good writingRelated group of networked computersmain technology for local area network

Acronyms 2024-09-25

Acronyms crossword puzzle
Across
  1. United States Family Health Plan
  2. Other Health Insurance
  3. Affordable Care Act
  4. Qualifying Life Event
  5. TRICARE Retired Reserve
  6. Defense Health Networks
  7. Continued Health Care Benefits Program
Down
  1. Military Treatment Facility
  2. Defense Online Enrollment System
  3. Health Information Technology for Economic and Clinical Health
  4. Social Security Number
  5. Potential Quality Issues
  6. Assistance Reporting Tool

13 Clues: Affordable Care ActQualifying Life EventSocial Security NumberOther Health InsuranceTRICARE Retired ReserveDefense Health NetworksPotential Quality IssuesAssistance Reporting ToolMilitary Treatment FacilityDefense Online Enrollment SystemUnited States Family Health PlanContinued Health Care Benefits Program...

BTT1O Crossword Puzzle 2022-09-30

BTT1O Crossword Puzzle crossword puzzle
Across
  1. wide area network
  2. local area network
  3. the backbone
  4. basic input/output system
  5. The brain of the computer
  6. binary digits
  7. it handles all parts of the network
Down
  1. things to connect all networks together
  2. network internal face card
  3. a screen that displays information
  4. short term memory
  5. read-only memory
  6. portable memory

13 Clues: the backbonebinary digitsportable memoryread-only memorywide area networkshort term memorylocal area networkbasic input/output systemThe brain of the computernetwork internal face carda screen that displays informationit handles all parts of the networkthings to connect all networks together

Library visit 2021-11-19

Library visit crossword puzzle
Across
  1. the action of mentioning
  2. from A'to'Z
  3. computer networks
  4. to mark our book
  5. slow to reveal
Down
  1. a flat length
  2. a way out
  3. a list of all
  4. a building
  5. take and use

10 Clues: a way outa buildingfrom A'to'Ztake and usea flat lengtha list of allslow to revealto mark our bookcomputer networksthe action of mentioning

Transformers 2024-12-09

Transformers crossword puzzle
Across
  1. Recurrent Neural Networks
  2. Encoder output
  3. Decoder mechanism
  4. Processes input sequence
Down
  1. Mechanism for long-range dependencies
  2. Generates output sequence
  3. Natural Language Processing
  4. Attention-based model
  5. Transformer excels at this
  6. RNN weakness

10 Clues: RNN weaknessEncoder outputDecoder mechanismAttention-based modelProcesses input sequenceGenerates output sequenceRecurrent Neural NetworksTransformer excels at thisNatural Language ProcessingMechanism for long-range dependencies

Communications,Networks and the Internet 2020-08-28

Communications,Networks and the Internet crossword puzzle
Across
  1. is a form of wireless communication designed to share information
  2. __________ Digital Subscriber Line
  3. an international network of networks that connects computers worldwide.
  4. a __________ consists of a collection of computers that share information and communicate with each other over a network.
  5. a WAN can connect networks across a large _____________ area, such as a city or country.
  6. lans can be divided into _______ categories based on how the computers communicate with one another.
  7. a peer-to-peer network allows every computer to _______ directly.
  8. data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
Down
  1. a device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
  2. the range of a wireless network can be extended using a ________.
  3. a ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
  4. refers to data transmission using ADSL and cable.
  5. a wireless access point contains a radio receiver, encryption and communications software.
  6. determines the volume of data that can be transmitted in a given time.
  7. a _______ can be used where it may be difficult or impractical to use a cabled LAN.
  8. lans in different countries can connect together to form a WAN, using _____________ links.
  9. enable several computers to communicate through a wireless access point at the same time.
  10. used to refer to data transmission over a telephone line using an analogue modem.
  11. bluetooth has a much slower data transfer rate than ______ and a much shorter range.
  12. To access the Internet you need to subscribe to an _________.

20 Clues: __________ Digital Subscriber Linerefers to data transmission using ADSL and cable.To access the Internet you need to subscribe to an _________.determines the volume of data that can be transmitted in a given time.a peer-to-peer network allows every computer to _______ directly....

Unit 2 - Networks of Exchange 2023-09-27

Unit 2 - Networks of Exchange crossword puzzle
Across
  1. resulted in millions of deaths in Afro-Eurasia (two words)
  2. rest stop for traders on land trade routes
  3. religion that became dominant one in SE Asia due to trading
  4. new crop that changed East African diet
  5. main good traded on Silk Road
  6. major good traded from Africa to rest of Europe and Asia
  7. Mali leader who converted to Islam (two words)
  8. crop that spread throughout SE Asia and Africa due to the Indian Ocean trade
  9. Famous European who traveled throughout China (two words)
  10. revival of Greek & Roman culture in Europe
Down
  1. protected traders and allowed religions to spread on Silk Road
  2. communities created by traders waiting for monsoon winds
  3. Mongol khanate in Russia (two words)
  4. crop that allowed China to increase population
  5. language created from Bantu & Arabic
  6. Famous Muslim who traveled Islamic ports in Indian Ocean (two words)
  7. major trading city along the Silk Road
  8. main travel used on Silk Road
  9. religion spread to North Africa by traders
  10. winds that traders used in Indian Ocean
  11. site of cultural learning in Mali, Africa
  12. famous Mongol ruler who united the empire (two words)

22 Clues: main travel used on Silk Roadmain good traded on Silk RoadMongol khanate in Russia (two words)language created from Bantu & Arabicmajor trading city along the Silk Roadnew crop that changed East African dietwinds that traders used in Indian Oceansite of cultural learning in Mali, Africarest stop for traders on land trade routes...

Word List 1 2022-09-13

Word List 1 crossword puzzle
Across
  1. This device helps to manage the server using commands.
  2. Location of computer network elements.
  3. A measurement of the amount of information that can be sent between computers.
  4. A large system consisting of many similar parts that are connected together.
  5. Something that is easy to attack.
  6. Computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
  7. The particular arrangement or pattern of a group of related things.
Down
  1. Something involving many different parts in a way that is difficult to understand.
  2. To be responsible for controlling or organizing someone or something.
  3. A networking device that forwards data packets between computer networks.
  4. A network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
  5. This device restores the network signal before the signal becomes too weak or damaged.

12 Clues: Something that is easy to attack.Location of computer network elements.This device helps to manage the server using commands.The particular arrangement or pattern of a group of related things.To be responsible for controlling or organizing someone or something.A networking device that forwards data packets between computer networks....

Word List 1 2022-09-13

Word List 1 crossword puzzle
Across
  1. This device helps to manage the server by commands.
  2. The location of computer network elements.
  3. The measurement of the amount of information that can be transferred between computers.
  4. A large system consisting of many similar parts that are connected together.
  5. Something that is easy to attack.
  6. A computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
  7. The particular arrangement or pattern of a group of related things.
Down
  1. Involving many different parts in a way that is difficult to understand.
  2. To be responsible for controlling or organizing someone or something.
  3. Networking device that forwards data packets between computer networks.
  4. Network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
  5. This device restores the network signal before the signal becomes too weak or damaged.

12 Clues: Something that is easy to attack.The location of computer network elements.This device helps to manage the server by commands.The particular arrangement or pattern of a group of related things.To be responsible for controlling or organizing someone or something.Networking device that forwards data packets between computer networks....

Jorge Internet Crossword Puzzle 2013-03-26

Jorge Internet Crossword Puzzle crossword puzzle
Across
  1. USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
  2. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  3. a piece of writing that has been copied from someone else and is presented as being your own work
  4. Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
  5. A part of a computer system or network that is designed to block unauthorized
  6. renew or revitalize; To reload a webpage on the internet
Down
  1. collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
  2. Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page
  3. NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  4. a list of citations that appear at the end of a paper, article, chapter or book.
  5. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
  6. unauthorized person who secretly gains access to computer files.

12 Clues: renew or revitalize; To reload a webpage on the internetunauthorized person who secretly gains access to computer files.A part of a computer system or network that is designed to block unauthorizeda list of citations that appear at the end of a paper, article, chapter or book....

Computer Hardware 2025-09-17

Computer Hardware crossword puzzle
Across
  1. System Storage
  2. Interconnected computer networks
  3. Output,Input
  4. Numbers signed to a wbsite
  5. A,B,C,Micro,Mini
  6. Uses elcectronic flash memory
  7. program of the computer
Down
  1. connects with all of the computer
  2. Network of physical software
  3. Memory
  4. Manages hardware and software
  5. all of the Processing
  6. Physical Part of the computer

13 Clues: MemoryOutput,InputSystem StorageA,B,C,Micro,Miniall of the Processingprogram of the computerNumbers signed to a wbsiteNetwork of physical softwareManages hardware and softwarePhysical Part of the computerUses elcectronic flash memoryInterconnected computer networksconnects with all of the computer

HuffleBuff 2019-04-23

HuffleBuff crossword puzzle
Across
  1. the number of bits per second that can be transmitted along a digital network.
  2. the signal between computers that indicates that transmission can proceed.
  3. the transfer of data over a point-to-point or point-to-multipoint communication channel.
  4. networks not connected by cables
  5. Transmitting data one bit at a time
  6. a system of rules that allow two or more entities of a communications system to transmit information
  7. technologies that support wireless networking of home and business networks.
Down
  1. Transmitting multiple bits of data simultaneously
  2. A computer that provides shared resources to network users.
  3. A network that has no dedicated servers. All computers are of equal status and can both share resources themselves and use resources from other computers
  4. An exchange of signals between computers when a connection is established.
  5. a set of rules or procedures for transmitting data

12 Clues: networks not connected by cablesTransmitting data one bit at a timeTransmitting multiple bits of data simultaneouslya set of rules or procedures for transmitting dataA computer that provides shared resources to network users.the signal between computers that indicates that transmission can proceed....

Cyber Awareness 2025-11-06

Cyber Awareness crossword puzzle
Across
  1. A virtual private network to access remote services securely
  2. A cyber attack that floods a network or server with excessive traffic to make it unavailable.
  3. A digital or physical device used to authenticate a user, often as a second factor.
  4. A hidden way into a system that bypasses normal authentication.
  5. Fake security alerts that trick users into installing malware or paying money.
  6. The practice of accessing a computer network illegally.
  7. A program that performs automated tasks, and can be controlled remotely and malicious
Down
  1. A secret combination of characters used to verify a user’s identity.
  2. A targeted form of phishing
  3. A security model that assumes no user or system is inherently trusted.
  4. Self-replicating malware that spreads across networks without user action.
  5. The practice of protecting computers, networks, and data from digital attacks or unauthorised access.

12 Clues: A targeted form of phishingThe practice of accessing a computer network illegally.A virtual private network to access remote services securelyA hidden way into a system that bypasses normal authentication.A secret combination of characters used to verify a user’s identity.A security model that assumes no user or system is inherently trusted....

Computer Science Choice Borad 2025-09-17

Computer Science Choice Borad crossword puzzle
Across
  1. Network of physical software
  2. System Storage
  3. Memory
  4. Uses elcectronic flash memory
  5. Output,Input
Down
  1. connects with all of the computer
  2. Manages hardware and software
  3. A,B,C,Micro,Mini
  4. Numbers signed to a wbsite
  5. Physical Part of the computer
  6. Interconnected computer networks
  7. program of the computer
  8. all of the Processing

13 Clues: MemoryOutput,InputSystem StorageA,B,C,Micro,Miniall of the Processingprogram of the computerNumbers signed to a wbsiteNetwork of physical softwareManages hardware and softwarePhysical Part of the computerUses elcectronic flash memoryInterconnected computer networksconnects with all of the computer

Jargon 4: Revenge of the Kev 2023-09-06

Jargon 4: Revenge of the Kev crossword puzzle
Across
  1. Security protocol used in wifi networks that offers greater protection through data encryption
  2. process of encoding information to a unrecognizable form.
  3. Part of an application that performs a task not apparent to the user
  4. A security protocol used in wifi networks designed to provide a level of security similar to a Wired/LAN connection.
  5. document sent with an email message
  6. Basic unit of information in computing.
  7. load and initialize the operating system on a computer
Down
  1. Physical place where a computer stores information, also known as its HDD.
  2. Network security system that monitors and controls incoming and outgoing traffic
  3. Hardware or Software component that stores data so future requests can be served faster
  4. a set of computers sharing resources located on a node
  5. application that provides a way to look at and interact with information on the Internet
  6. any goal-oriented activity requiring computer machinery
  7. Small blocks of data created by a web server while browsing a website

14 Clues: document sent with an email messageBasic unit of information in computing.a set of computers sharing resources located on a nodeload and initialize the operating system on a computerany goal-oriented activity requiring computer machineryprocess of encoding information to a unrecognizable form....

Types of Technology-Based Training 2014-07-21

Types of Technology-Based Training crossword puzzle
Across
  1. the instantaneous exchange of audio, video or text between two or more individuals or groups at two or more locations
  2. A general term describing any network contained within an organization. It refers primarily to networks that use Internet technology
  3. a computer application that uses any combination of text, graphics, audio, animation and/or full-motion video
  4. a format and system for recording, storing, and retrieving electronic information on a compact disc that is read using an optical drive
Down
  1. the transmission of television signals via cable or satellite technology
  2. A loose confederation of computer networks around the world that is connect through several primary networks
  3. simulation a device or system that replicates or imitates a real device or system
  4. a collaborative network that uses Internet technology to link organizations with their suppliers, customers, or other organizations that share common goals or information

8 Clues: the transmission of television signals via cable or satellite technologysimulation a device or system that replicates or imitates a real device or systemA loose confederation of computer networks around the world that is connect through several primary networks...

Network Crossword 2019-04-24

Network Crossword crossword puzzle
Across
  1. a set of rules for allocating locally unique IP addresses to a device as they connect to a network
  2. where data is transmitted between two computers that do not share a common clock signal, in a stream of single bits
  3. the rate at which a signal could change
  4. a protocol to check if another device is transmitting
  5. the range of frequencies that can be transmitted over the medium measured in Hz
Down
  1. a method of forwarding data through multiple ports
  2. a unique code that identifies a particular device on a network
  3. a global network of wireless networks
  4. a method of dividing a network into multiple smaller networks
  5. a system where computers are each connected to a main server
  6. a combination of IP address and port number
  7. organisations who allocate and administer domain names and IP addresses

12 Clues: a global network of wireless networksthe rate at which a signal could changea combination of IP address and port numbera method of forwarding data through multiple portsa protocol to check if another device is transmittinga system where computers are each connected to a main servera method of dividing a network into multiple smaller networks...

Where could IT take you? 2021-05-05

Where could IT take you? crossword puzzle
Across
  1. designs computer games
  2. examines information
  3. identifies user problems
  4. protects against hackers
  5. makes websites look good
Down
  1. sets up computer networks
  2. designs apps
  3. designs websites
  4. develops software
  5. helps people with computer problems

10 Clues: designs appsdesigns websitesdevelops softwareexamines informationdesigns computer gamesidentifies user problemsprotects against hackersmakes websites look goodsets up computer networkshelps people with computer problems

Networks and the Internet 2021-11-10

Networks and the Internet crossword puzzle
Across
  1. the customer premises to terminate a dial-up Integrated Services Digital Network (ISDN) line and connect it to a computer or a local area network
  2. a device that is both a transmitter and a receiver, and usually it's in a single device.
  3. security devices used to stop or mitigate unauthorized access to private networks connected to the Internet, especially intranets.
  4. hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network, into frames appropriate to a wide-area network and vice versa
Down
  1. creates a single, aggregate network from multiple networks
  2. software used in telecommunications for telecommunications networks that allows data to flow from one discrete network to another.
  3. based on Internet standards, with extensions to reflect the wireless device environment.
  4. connects devices within a network

8 Clues: connects devices within a networkcreates a single, aggregate network from multiple networksbased on Internet standards, with extensions to reflect the wireless device environment.a device that is both a transmitter and a receiver, and usually it's in a single device....

Computer Hardware & Conputer Networks Crossword 2014-04-11

Computer Hardware & Conputer Networks Crossword crossword puzzle
Across
  1. A SYSTEM PORT.
  2. A TYPE OF MEMORY THAT DOESN'T HAVE ANY MOVING PARTS.
  3. TANGIBLE THINGS OF A COMPUTER.
  4. A INPUT DEVICE.
  5. A TYPE OF IC PACKAGE SYSTEM.
  6. A HDD IS DIVIDED INTO THESE.
  7. A TYPE OF DISC.
  8. A COMPONENT IN HDD.
  9. A TYPE OF RAM.
  10. A DATA UNIT OF DATA LINK LAYER.
  11. A LAYER IN TCP/IP REFERENCE MODEL.
  12. A NETWORK DEVICE.
  13. DEVICE THAT IS CONNECTED TO A NETWORK.
  14. PROCESS OF WRITING DATA TO THE DISC.
Down
  1. A COMPONENT WHICH IS USED TO CONFIGURE A HDD.
  2. A LAYER IN OSI REFERENCE MODEL.
  3. A TOPOLOGY.
  4. COMPONENTS INSIDE A PROCESSOR.
  5. DONE TO REDUCE THE SIZE OF A FILE.
  6. A TYPE OF LIGHT SOURCE IN OPTICAL FIBERS.
  7. A FACTOR THAT EFFECTS THE PROCESSOR SPEED.
  8. HERE FILES ARE SPREAD ALL OVER THE DISK.
  9. A SYSTEM START UP PROCESS.
  10. COMPONENT USED TO WRITE DATA ONTO THE DISC.
  11. A POINTING DEVICE.
  12. INTERFERENCE IN A CABLE.
  13. AN ELEMENT IN A COMPUTER FOR SYNCHRONIZATION AMONG ITS COMPONENTS.

27 Clues: A TOPOLOGY.A SYSTEM PORT.A TYPE OF RAM.A INPUT DEVICE.A TYPE OF DISC.A NETWORK DEVICE.A POINTING DEVICE.A COMPONENT IN HDD.INTERFERENCE IN A CABLE.A SYSTEM START UP PROCESS.A TYPE OF IC PACKAGE SYSTEM.A HDD IS DIVIDED INTO THESE.TANGIBLE THINGS OF A COMPUTER.COMPONENTS INSIDE A PROCESSOR.A LAYER IN OSI REFERENCE MODEL....

Ch. 5 Groups and Networks 2023-11-13

Ch. 5 Groups and Networks crossword puzzle
Across
  1. member of a triad who attempts to resolve conflict between the other two members
  2. network - set of dyads held together by ties between individuals
  3. et impera - role of a member of a triad who intentionally causes conflict between the other two members
  4. group - social group composed of enduring, intimate face-to-face relationships that strongly influence the attitudes and ideals of those involved
  5. hole - gap between network clusters
  6. - degree to which social relationships are reinforced through indirect ties (friends of friends)
  7. - sum of stories contained in a set of ties
  8. 3 basic forms of political relations - mediator, tertius gaudens, divide et impera
  9. a group of three
  10. group - groups marked by impersonal, instrumental relationships (those existing as a means to an end)
Down
  1. - group that is similar to a small group, but is multifocal
  2. - the powerful group, most often the majority
  3. group classifications: small groups, parties, large groups
  4. conformity - groups have strong influences over individual behavior
  5. - the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
  6. a group of two
  7. group - characterized by the presence of a formal structure that mediates interaction and consequently, status differentiation
  8. - member of a triad who benefits from conflict between the other two members
  9. group - characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangements or roles, and equality
  10. group - group that helps us understand or make sense of our position in society relative to other groups
  11. capital - information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
  12. - the stigmatized or less powerful group, generally the minority
  13. group classification: primary groups, secondary groups

23 Clues: a group of twoa group of threehole - gap between network clusters- sum of stories contained in a set of ties- the powerful group, most often the majoritygroup classification: primary groups, secondary groupsgroup classifications: small groups, parties, large groups- group that is similar to a small group, but is multifocal...

Communication, Networks and the Internet. 2020-08-28

Communication, Networks and the Internet. crossword puzzle
Across
  1. A device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
  2. the volume of data that can be transmitted in a given time.
  3. A WAN can connect networks across a large _____________ area, such as a city or country.
  4. A peer-to-peer network allows every computer to _______ directly.
  5. LANS can be divided into _______ categories based on how the computers communicate with one another.
  6. Used to refer to data transmission over a telephone line using an analogue modem.
  7. to data transmission using ADSL and cable.
  8. A ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
Down
  1. Data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
  2. __________ Digital Subscriber Line
  3. A _______ can be used where it may be difficult or impractical to use a cabled LAN.
  4. LANS in different countries can connect together to form a WAN, using _____________ links.
  5. An international network of networks that connects computers worldwide.
  6. A wireless access point contains a radio receiver, encryption and communications software.
  7. The range of a wireless network can be extended using a ________.
  8. A __________ consists of a collection of computers that share information and communicate with each other over a network.
  9. Is a form of wireless communication designed to share information
  10. access the Internet you need to subscribe to an _________.
  11. Bluetooth has a much slower data transfer rate than ______ and a much shorter range.
  12. Enable several computers to communicate through a wireless access point at the same time.

20 Clues: __________ Digital Subscriber Lineto data transmission using ADSL and cable.access the Internet you need to subscribe to an _________.the volume of data that can be transmitted in a given time.The range of a wireless network can be extended using a ________.Is a form of wireless communication designed to share information...

BTT1O Crossword Puzzle 2022-09-30

BTT1O Crossword Puzzle crossword puzzle
Across
  1. basic input/output system
  2. The brain of the computer
  3. binary digits
  4. wide area network
  5. short term memory
  6. local area network
  7. network internal face card
  8. it handles all parts of the network
  9. read-only memory
Down
  1. the backbone
  2. portable memory
  3. things to connect all networks together
  4. a screen that displays information

13 Clues: the backbonebinary digitsportable memoryread-only memorywide area networkshort term memorylocal area networkbasic input/output systemThe brain of the computernetwork internal face carda screen that displays informationit handles all parts of the networkthings to connect all networks together

Crossword puzzle 2024-09-26

Crossword puzzle crossword puzzle
Across
  1. a visual representation of something.
  2. a set of instructions, data or programs used to operate computers and execute specific tasks.
  3. a hand-held pointing device that detects two-dimensional motion relative to a surface.
  4. an electronic communications network that connects computer networks and organizational computer facilities around the world.
  5. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  6. is a collection of files accessed through a web address, covering a particular theme or subject, and managed by a particular person or organization.
  7. is a device that connects two or more packet-switched networks or subnetworks.
  8. Any digital moving picture, which includes a computer file in video formats such as MP4, MOV, M4V, AVI, DivX or FLV.
  9. the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
  10. a group of interconnected nodes or computing devices that exchange data and resources with each other.
Down
  1. data that has been processed, organized, and interpreted to add meaning and value.
  2. a piece of equipment used to provide data and control signals to an information processing system.
  3. is a communication method that uses electronic devices to deliver messages across computer networks.
  4. refers to software that requires no paid licenses to use the application, no fees or donations, no restrictions on how many times you can download or open the program, and no expiration date.
  5. a piece of hardware that is used to output data that has been previously entered into a computer or similar processing device
  6. is a website designed to make it easy for users to create entries in chronological order.
  7. the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
  8. the field of technology concerned with recording, processing, storing and delivering audible sound using electricity.
  9. input device used to enter characters and functions into the computer system by pressing buttons, or keys.
  10. information that has been translated into a form that is efficient for movement or processing.

20 Clues: a visual representation of something.is a device that connects two or more packet-switched networks or subnetworks.data that has been processed, organized, and interpreted to add meaning and value.a hand-held pointing device that detects two-dimensional motion relative to a surface....

Engineering Carrers 2015-10-13

Engineering Carrers crossword puzzle
Across
  1. Helps design airplanes.
  2. They make products better
  3. makes cellular communication networks
  4. they help with deep sea exploration
  5. Makes computers
  6. Makes X-ray machines
  7. Makes programs for computers
Down
  1. They make gasoline
  2. These people work on medicine
  3. designs cars
  4. makes water cleaner
  5. Designs tunnels

12 Clues: designs carsDesigns tunnelsMakes computersThey make gasolinemakes water cleanerMakes X-ray machinesHelps design airplanes.They make products betterMakes programs for computersThese people work on medicinethey help with deep sea explorationmakes cellular communication networks

vlog 2023-11-16

vlog crossword puzzle
Across
  1. What is called filling the pages of websites on the Internet?
  2. Bloggers with a large audience get what from their blog?
  3. Who was the Hollywood Walk of Fame created for?
  4. What kind of person do you need to be to interest people?
  5. What do you need to run social networks?
Down
  1. Honorary glory as evidence of universal recognition of merit, talent, universal recognition and admiration.
  2. The most popular social network where you can watch videos on various topics?
  3. What are the names of the people who follow you on the Internet?
  4. One of the good ways to make money from a blog is?
  5. People who have a large audience on social networks are often what are they like?
  6. What can't be returned?
  7. In order for us to achieve a goal, we need to …… on it.(insert missing word)

12 Clues: What can't be returned?What do you need to run social networks?Who was the Hollywood Walk of Fame created for?One of the good ways to make money from a blog is?Bloggers with a large audience get what from their blog?What kind of person do you need to be to interest people?What is called filling the pages of websites on the Internet?...

CET1600 CH 6 2019-10-31

CET1600 CH 6 crossword puzzle
Across
  1. In configuring a routing protocol, the network administrator added networks 192.168.50.0 and 172.16.0.0 to which router?
  2. ___ routing table entries are automatically created when an active router interface is configured with an IP address and subnet mask.
  3. On a router, the networks can be static which means they are __configured.
  4. When the source and destination hosts do not share the same network address. A ___ __ IP address is required.
  5. As a packet travels from one networking device to another the Source and Destination ___ __ never change.
Down
  1. The router maintains a __ __ containing directly connected and remote network route information.
  2. On a router the networks can be learned __ by using a routing protocol.
  3. On the PC, what is the command to display the hardware address and the IP address?
  4. As a packet travels from one networking device to another the Source & Destination ___ __ change as packet is forwarded from one router to the next.
  5. What is the gateway address for PC1? Type the alphabet (letter) for the answer. A1-192.168.1.1, B1-192.168.1.100, C1-192.168.1.254, D1-192.168.50.1, E1-192.168.50.2, F1-172.16.0.1, G1-172.16.0.100, H1-172.16.255.254
  6. What is the gateway address for S2? Type the alphabet (letter) for the answer. A1-192.168.1.1, B1-192.168.1.100, C1-192.168.1.254, D1-192.168.50.1, E1-192.168.50.2, F1-172.16.0.1, G1-172.16.0.100, H1-172.16.255.254

11 Clues: On a router the networks can be learned __ by using a routing protocol.On a router, the networks can be static which means they are __configured.On the PC, what is the command to display the hardware address and the IP address?The router maintains a __ __ containing directly connected and remote network route information....

Local Area Network 2025-01-22

Local Area Network crossword puzzle
Across
  1. Stationary device that allows you to access networks from a single point.
  2. Mobile device that can access the network/internet.
  3. Mobile computer that allows you to access networks on the go.
  4. Protects the network from unwanted intrusions.
  5. Allows multiple devices to have a wired connection to the network.
Down
  1. Sends & Receives data to/from the internet.
  2. A networking device that forwards data outside of the local network.
  3. Allows multiple devices to have a wireless connection to the network.

8 Clues: Sends & Receives data to/from the internet.Protects the network from unwanted intrusions.Mobile device that can access the network/internet.Mobile computer that allows you to access networks on the go.Allows multiple devices to have a wired connection to the network.A networking device that forwards data outside of the local network....

Chapter 6 - Network Design Elements 2025-05-21

Chapter 6 - Network Design Elements crossword puzzle
Across
  1. A cloud-based delivery model for security services like antivirus and firewalls.
  2. A cloud model offering virtualized computing resources over the internet.
  3. A network state where a device defaults to open access after failure.
  4. A solution that enforces security policies before allowing network access.
  5. A method of dialing many phone numbers to find modems or unsecured lines.
  6. Impersonating a device's MAC address to bypass security.
  7. An attack that allows access to traffic on other VLANs.
  8. A network design using two firewalls to isolate a DMZ.
Down
  1. A publicly shared list of known cybersecurity vulnerabilities and exposures.
  2. A cloud model providing a platform for developers to build and deploy applications.
  3. A protocol that prevents network loops by managing redundant paths.
  4. A switch memory table that stores MAC-to-port mappings.
  5. A cloud model where applications are delivered over the internet.
  6. An attack that overwhelms a switch's memory with fake MAC addresses.
  7. A one-to-one mapping between a private and public IP address.
  8. A firewall setup with three interfaces: internal, external, and DMZ.
  9. A method that modifies IP addresses to allow private devices to access the internet.
  10. A buffer zone between internal networks and external, untrusted networks.
  11. A type of NAT that maps multiple private IPs to one public IP using port numbers.

19 Clues: A network design using two firewalls to isolate a DMZ.A switch memory table that stores MAC-to-port mappings.An attack that allows access to traffic on other VLANs.Impersonating a device's MAC address to bypass security.A one-to-one mapping between a private and public IP address.A cloud model where applications are delivered over the internet....