networks Crossword Puzzles
Cyber Security 2023-02-10
Across
- or identity theft.
- A company or organization that gives users and devices access to the Internet
- often by using emails or fake websites that look like they are from trusted organizations.
- Someone who uses computers and computer networks to disrupt services or share secret information in
- Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
- until it is decrypted using a secret key
- Consists of code written in a programming language that instructs computers to perform specific tasks.
- computers are usually used to cause damage that couldn’t be achieved with a single computer
- Multiple computers on a network that are infected with a program that can be controlled remotely. The
Down
- The process of using codes to make readable information unreadable. Encrypted information cannot be
- Attempting to trick people into revealing sensitive information, such as passwords and credit card
- A type of malware that holds victims’ computer files hostage by locking access to them or encrypting
- Extra copies of computer files that can be used to restore files that are lost or damaged
- A distributed denial of service attack attempts to make an online service, like a website, unavailable by
- software Computer programs that can block, detect, and remove viruses and other malware
- A computer or computer program that provides specific services on a network, such as an email server
- It then demands a ransom if the victim wants his or her files back.
- Unsolicited emails sent to many addresses. The purpose of most spam is to make money through
- it with a flood of traffic from a team of computers.
- effort to draw attention to political or social issues.
- directs emails and a web server that serves up web pages.
- Software designed to block malware from entering protected networks
- programs.
- A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
- The amount of data that can pass through a network or part of a network per second
25 Clues: programs. • or identity theft. • until it is decrypted using a secret key • it with a flood of traffic from a team of computers. • effort to draw attention to political or social issues. • directs emails and a web server that serves up web pages. • It then demands a ransom if the victim wants his or her files back. • ...
thrive 2024-04-22
Across
- Assistance type provided for family-related matters
- Virtual health consultations offered by Casting Networks
- Financial benefits provided to members through discounts
Down
- Casting Networks' program enhancing actor well-being
- General state of health and well-being supported by the new initiative
- Type of care with discounts available to Thrive+ members that will make you smile
- Hotline for advice on annual filings included in benefits
- Eye care services with reduced rates for certain members
8 Clues: Assistance type provided for family-related matters • Casting Networks' program enhancing actor well-being • Eye care services with reduced rates for certain members • Virtual health consultations offered by Casting Networks • Financial benefits provided to members through discounts • Hotline for advice on annual filings included in benefits • ...
IT Crossword 2024-01-18
Across
- Device that forwards data packets between computer networks.
- The maximum rate of data transfer across a given path.
- The official procedure or system of rules governing affairs of state or diplomatic occasions.
Down
- Formatted unit of data carried by a packet-switched network.
- Connection point where data from multiple directions converge and are then sent out in many directions.
- Computer program or process.
- Messages distributed by electronic means.
- Global system of interconnected computer networks.
8 Clues: Computer program or process. • Messages distributed by electronic means. • Global system of interconnected computer networks. • The maximum rate of data transfer across a given path. • Formatted unit of data carried by a packet-switched network. • Device that forwards data packets between computer networks. • ...
Security within the IoT 2017-04-26
Across
- People don't learn enough about the _______ they use to secure them properly.
- The number of connected devices, systems and sensors worldwide is expected to grow rapidly over the coming years, with Cisco Systems and Intel both predicting as many as 50 ______ or more such devices by 2020.
- 72 percent of consumers do not know how to configure a wireless router in a way to _______ a home network.
- An important step to take during product development is to identify the potential ________ of hackers.
- The Internet of things is changing our _______ of personal security.
- Security can be a significant _______ to organizations adopting IoT technologies.
- BullGuard officials noted that the industry has not yet created common security ______ for IoT devices.
Down
- Recent research from SAS Institute states that only 11 percent of consumers believe that they have total ______ over the data they provide companies.
- IoT networks bring in a diverse set of connected devices that can introduce multiple points of ___________ in the networks.
- IoT systems are groupings of network-connected devices that automatically collect and exchange _____, allowing enterprises to increase efficiency and productivity.
- Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks.
- Most manufacturers are taking their own approaches to ______, which can create update procedures that are complex and difficult to carry out.
- The conflict between the demand for connected devices and the users' _______ to secure them or the networks they're on presents challenges.
- According to BullGuard CEP Paul Lipman "consumers are clearly not equipped to handle the myriad of security ____ presented by connected devices."
- Gartner predicts that by 2020, more than 25 percent of identified _______ in enterprises will be IoT-related.
15 Clues: The Internet of things is changing our _______ of personal security. • People don't learn enough about the _______ they use to secure them properly. • Security can be a significant _______ to organizations adopting IoT technologies. • Only 1 in 10 smart objects currently available on the market are adequately _____ to prevent hacks. • ...
Technology 2017-06-13
Across
- page gives you information
- demandSystems that enable the viewers to order and see a given programme at the exact time the viewer specifies.
- application of information and communications technologies and services, usually in direct combination
- A service provided from a remote location using the telematics infrastructure.
- Card It is a card that is able to store digital information.
- what people ins school are learning
- Message sent or posted to an excessively large number of people on the Internet
- it improves things
- 1 Computer program for a person to browse what is on the Internet
- gives you information
Down
- Network (WAN)
- gives you information about anything
- complement to LAN. A WAN consists of multiple local networks tied together, typically using telephone-company services.
- making something better
- Service A set of basic services that must be made available at an affordable price to all users by public or private operators irrespective of the user's geographical location.
- Time which elapses between ordering information and receiving it through an interactive system.
- which facilitates the communication between the computer and its user
- informatic programme able to disrupt the functioning of other programmes.
- you send and get information
- you send e massage
- popular way to move large amounts of voice, data and video
21 Clues: Network (WAN) • it improves things • you send e massage • gives you information • making something better • page gives you information • you send and get information • what people ins school are learning • gives you information about anything • popular way to move large amounts of voice, data and video • Card It is a card that is able to store digital information. • ...
NWEG Puzzle 2021-11-25
Across
- wireless technology used to connect devices
- a switching device for networks
- the programs and other operating information used by a computer.
- carries the broadband signals between your modem
- a network security device that monitors incoming and outgoing network traffic
- is the arrangement of the elements of a communication network
- the sharing of resources by connecting together all the devices
- a software component that lets the operating system and a device communicate with each other.
- a piece of computer hardware or software that provides functionality for other programs
Down
- a type of software program created to protect information technology systems from malicious software
- a peripheral machine which makes a persistent representation of graphics or text, usually on paper
- computer system that is designed for a single user
- a vast network that connects computers all over the world
- a person who utilizes a computer or network service
- an established set of rules that determine how data is transmitted between different devices in the same network.
- a thick rope used to connect devices
- Network providers
- includes the physical parts of a computer
- responsible for the operation of the networks
- box that connects your home network to the wider Internet
20 Clues: Network providers • a switching device for networks • a thick rope used to connect devices • includes the physical parts of a computer • wireless technology used to connect devices • responsible for the operation of the networks • carries the broadband signals between your modem • computer system that is designed for a single user • ...
Hardware and Software 2022-02-09
Across
- Collections of web pages under a single domain name
- Primary user workspace in an OS
- Where the address is displayed
- Set of options used to help find information or functions in a program
- An object that stores data on a computer
- Rectangular display of a program or location
- A device that can store and process data to help users complete tasks
- Device which takes in data or information
- Virtual space used to group files and other folders
- Browser shortcut to a website
- Suffix at the end of a filename that tells what kind of file it is
- Device which sends out data or information
- Device that connects two or more networks
Down
- Set of instructions or programs that tells a computer what to do
- Multiple websites open inside a browser’s window
- Two or more computers connected together to share resources
- Uses radio to connect computers to the network
- Indicators of events
- Physical components of a computer that can be seen and touched
- Uses cables to physically connect the computer to the network
- Information measured in bits
- Network applications that navigate the Internet
- Image representing a program or a location
- Global network of networks
- An address for something on the Internet
25 Clues: Indicators of events • Global network of networks • Information measured in bits • Browser shortcut to a website • Where the address is displayed • Primary user workspace in an OS • An object that stores data on a computer • An address for something on the Internet • Device which takes in data or information • Device that connects two or more networks • ...
Network Requirements 2023-09-07
Across
- a rule or order issued by authority
- a system design in which a component is duplicated so if it fails
- process that copies all your files, data and information
- protection of information
- the quality of being trustworthy
- the ability of a computing process to be used or produced in a range of capabilities
- the ability or tendency to move from one position or situation to another usually better one
- a process that gathers metrics on the operations of an IT environment
- a method of dividing a single physical network into logical sub-networks
- physical parts of a computer
- programs that run on a device
Down
- the degree to which a product meets some or all of the specifications
- the capacity at which data is transmitted on a network
- the time delay between when a signal is transmitted and when it is received
- capacity for the interconnection of platforms, systems, and applications
- the delay in network communication
- a standardized set of rules for formatting and processing data
- a networking device that forwards data packets between computer networks
- a set of digital security requirements and practices
- a measure of how many units of information a system can process in a given amount of time
20 Clues: protection of information • physical parts of a computer • programs that run on a device • the quality of being trustworthy • the delay in network communication • a rule or order issued by authority • a set of digital security requirements and practices • the capacity at which data is transmitted on a network • process that copies all your files, data and information • ...
CHAPTER 4: INTERACTING WITH OTHERS AS A HCP 2023-10-23
Across
- ____________ CLASS ENVIRONMENTS INVOLVE OPEN DISCUSSION WHERE STUDENTS CAN INTERRUPT AT ANY TIME TO ASK QUESTIONS.
- VISIT YOUR PROFESSOR DURING SCHEDULED ____ ____ WHEN YOU HAVE QUESTIONS ABOUT THE COURSE.
- NETWORKS ARE _______, VOLUNTARY, AND RESPECTFUL.
- JOIN A _____ OR ORGANIZATION ON CAMPUS TO ENRICH YOUR SOCIAL INTERACTIONS.
- MAKE A _________ ______________ FROM THE START BY BEING ATTENTIVE, PARTICIPATING, AND INTERACTING.
- CONVEY __________ WHEN YOU INTRODUCE YOURSELF, PRACTICE WHAT YOU ARE GOING TO SAY, AND MAKE EYE CONTACT.
- _________ YOUR THOUGHTS BEFORE ANSWERING A QUESTION.
- _____________________ IN CLASS DISCUSSIONS BY ASKING QUESTIONS, COMMENTING ON STUDENT COMMENTS, & ANSWERING QUESTIONS.
Down
- ____________ YOURSELF BY BEING INVOLVED IN TOO MANY ACTIVITIES SPREADS YOURSELF TOO THIN.
- A GREAT VARIETY OF HUMAN CHARACTERISTICS
- GETTING TO KNOW YOUR PROFESSOR WILL HELP YOU FEEL ______IN THE CLASSROOM.
- YOUR _______DEPENDS ON MORE SUCCESS JUST SITTING IN CLASS AND TAKING EXAMS AND DOING HOMEWORK.
- _______________ ________________ CAN ANSWER QUESTIONS ABOUT YOUR PROGRAM'S REQUIREMENTS.
- WHEN YOU HAVE A QUESTION, __ ___ ____.
- AN INTERCONNECTED GROUP OF PEOPLE WHO SHARE INFO WITH ONE ANOTHER.
- DON'T EVER THINK A QUESTION IS ________.
- VISIT YOUR PROFESSOR DURING SCHEDULED ____ ____ WHEN YOU HAVE QUESTIONS ABOUT THE COURSE.
- SIT AT THE _____________ OF THE ROOM.
- SCHEDULE AN INDIVIDUAL _________________ WITH EVERY INSTRUCTOR AT LEAST ONCE A SEMESTER.
- BE ___________ BY INTRODUCING YOURSELF TO YOUR PROFESSOR.
- NETWORKS MAKE STUDY TIME MORE ___________.
- ____________ IS AN ACTIVE LEARNING PROCESS WHERE STUDENTS LEARN MOSTLY BY INTERACTING WITH PROFESSORS AND STUDENTS.
22 Clues: SIT AT THE _____________ OF THE ROOM. • WHEN YOU HAVE A QUESTION, __ ___ ____. • A GREAT VARIETY OF HUMAN CHARACTERISTICS • DON'T EVER THINK A QUESTION IS ________. • NETWORKS MAKE STUDY TIME MORE ___________. • NETWORKS ARE _______, VOLUNTARY, AND RESPECTFUL. • _________ YOUR THOUGHTS BEFORE ANSWERING A QUESTION. • ...
Network requirements. 2024-09-23
Across
- IP – An address used to identify devices on a public network like the internet.
- – Process of dividing a network into smaller parts to reduce congestion.
- – A device that converts data for transmission over telephone lines.
- – A network configuration where each node is connected in a loop.
- – A high-speed network within a small area like a home or office.
- – A device that connects multiple networks and directs data based on its destination address.
- – A global system of interconnected networks.
- Address – A unique number that identifies devices on a network.
- – A rule that specifies allowed and disallowed traffic on a network.
- – Protocol used to resolve IP addresses into MAC addresses.
Down
- – Verifying identity before accessing a network resource.
- – A method for managing data collisions on a shared network.
- – Method for encoding and decoding data into electrical signals for communication.
- – Layer responsible for ensuring complete data transfer.
- – Smallest unit of data.
- – A system that translates domain names into IP addresses.
- – A device used to strengthen a signal across long network distances.
- – Device used to split a network connection and send data to all connected devices.
- – A virtual network used to segment a physical network.
- – Protocol for transferring files between client and server.
20 Clues: – Smallest unit of data. • – A global system of interconnected networks. • – A virtual network used to segment a physical network. • – Layer responsible for ensuring complete data transfer. • – Verifying identity before accessing a network resource. • – A system that translates domain names into IP addresses. • ...
Chapter 4 2025-03-11
Across
- the frequency of the wave forms usually expressed as ____
- A telecommunication closer that houses cabling and devices for work area computers
- the location of the cabling and equipment that connects an organization's network
- a cable that uses 568B standard and 568A standard on the other end
- Short cable for connecting a computer
- putting RJ-45 plugs on a cable to make a patch cable
- in ____, an organization might use wireless components to increase a LAN's span
- wireless networks use ____ light beams to send signals between pair of devices
- workstations and other user devices are located
- interference one wire generates on another wire when both are in a bundle
- the process where, bit signals are presented on the medium
Down
- a transmitter/receiver device, called a ___ must be installed to translate between wired and wireless networks
- An equipment room that's the connection point between IDFs
- Cable that comes in two types: unshielded and shielded
- trades electrical pulses for pulses of light
- is a length of cable between two network devices, such as NIC and a switch
- LANs use low powered two-way radio communication
- houses servers, routers, switches, and other major network equipment
- term for all cables and connectors tying a network together
- Cabling designed to carry voice but not data called _____
20 Clues: Short cable for connecting a computer • trades electrical pulses for pulses of light • workstations and other user devices are located • LANs use low powered two-way radio communication • putting RJ-45 plugs on a cable to make a patch cable • Cable that comes in two types: unshielded and shielded • the frequency of the wave forms usually expressed as ____ • ...
Cybersecurity & Internet 2025-03-11
Across
- A fraudulent attempt to obtain sensitive information via the internet.
- A structured set of data held in a computer.
- A form of bullying that occurs online.
- The act of stealing someone’s personal information for malicious purposes.
- A global network connecting millions of computers.
- Software designed to harm or exploit devices.
- The amount of data that can be transmitted in a fixed amount of time.
- The correct or acceptable way of communicating on the internet.
- A system designed to prevent unauthorized access to or from a network.
- A protocol used to transfer data over the internet.
- Individuals who exploit the internet to harm others.
- A unique identifier in a database.
Down
- The use of the internet to stalk or harass someone.
- Software used to manage and organize databases.
- Increased capacity for data transfer.
- A password that is difficult for others to guess or crack.
- A device that forwards data packets between computer networks.
- A unique string of numbers assigned to each device on a network.
- Reduced capacity for data transfer.
- The trail of data that individuals leave when using the internet.
- The system that translates domain names into IP addresses.
- Illegal activities that involve computers or networks.
22 Clues: A unique identifier in a database. • Reduced capacity for data transfer. • Increased capacity for data transfer. • A form of bullying that occurs online. • A structured set of data held in a computer. • Software designed to harm or exploit devices. • Software used to manage and organize databases. • A global network connecting millions of computers. • ...
Computers 2024-05-27
Across
- Control center of a computer
- Main circuit board in a computer
- Type of document
- Turn on a computer
- Device named after Jerry.
- Computer Screen
- Send a letter online
Down
- Input device with keys
- Move up and down
- Network of networks
- Portable computer
- Save data on this
- Random Access Memory
- Web search tool
- Pictures on screen
15 Clues: Web search tool • Computer Screen • Move up and down • Type of document • Portable computer • Save data on this • Turn on a computer • Pictures on screen • Network of networks • Random Access Memory • Send a letter online • Input device with keys • Device named after Jerry. • Control center of a computer • Main circuit board in a computer
Networking Basics 2016-10-07
Across
- A network connecting device that maps out MAC addresses of connecting node to mange traffic within a network
- A protocol in the TCP/IP stack for transmitting data within a network by trying to send data only when the medium is not occupied
- Two or more network-ready devices connect together via wired or wireless medium
- A company providing the connection between a network and the Internet for a fee (abbrev.)
- Typical measurement of the Internet speed (abbrev.)
- The physical address of a network node (2, one is abbreviated)
- Node on a network specialized in reducing traffic congestion by segmenting a network into subnetworks (2)
- A unique identifier of a node on a network (2, one is abbreviated)
- A connecting device that allows communication between networks using different communication protocols or access methods
Down
- A node on a network giving services, such as file sharing, Web browsing, and email
- Cable that is often used for Ethernet communication with RJ45 connectors on both ends (abbrev.)
- A type of cable made with glass fibers commonly used for long-distance transmission (2)
- A virtual meeting on the Web using a controlled interface that participants can share their screens or taken over control of another’s screen (2)
- A simple connecting device that broadcasts every message received to the whole network
- pair A type of cable originally used for telephone but now is also popular for LAN transmission (2)
- The actual carrier that transmits data on a network (2)
- Maximum data transfer rate from one point on a network to another in a specific time
- A network-ready device connected to a computer network
- A network connecting device that connects networks and regulates traffic flows between these networks
- The name of a physical topology where each node on the network is connected to a central device
- A hardware device with an antenna that sends and receives radio signals to and from a mobile device and a wired LAN (abbrev.)
- A computer network supporting users in a small geographical area (abbrev.)
22 Clues: Typical measurement of the Internet speed (abbrev.) • A network-ready device connected to a computer network • The actual carrier that transmits data on a network (2) • The physical address of a network node (2, one is abbreviated) • A unique identifier of a node on a network (2, one is abbreviated) • ...
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
Networking Know-How 2026-01-29
Across
- A virtual endpoint for network communication. Different services use specific port numbers, like 80.
- The wireless alternative to Ethernet. The 802.11 family of radio-based networking standards.
- Routes data between networks. Most home "routers" are actually routers, switches, and wireless access points in one unit.
- Network Address Translation. Lets multiple devices share one public IP address. A key router feature.
- Connects multiple wired devices on a network so they can talk to each other.
- A Virtual LAN. Partitions a physical network into separate virtual networks for improved management and security.
- Loss The percentage of data packets that get lost in transit. Can noticeably degrade voice and video quality.
- A Local Area Network. A small network confined to one area, like your home or office.
- The Domain Name System. Translates human-friendly domain names like google.com into IP addresses.
- Variation in latency. Too much can cause choppy audio and laggy video.
- A unique string of numbers that identifies each device on a network. Like a virtual return address.
- Converts signals between analog (like cable or phone lines) and digital (like Ethernet). The bridge between your home network and the internet.
- Having multiple paths for data to travel. Helps maintain connectivity if one path fails.
Down
- The actual amount of data that gets sent over a connection in a given time. Less than bandwidth due to overhead.
- Monitors traffic between networks to block suspicious activity. Can be hardware or software.
- Quality of Service. Prioritizes certain types of network traffic, like voice or video, for a smoother experience.
- A permanent ID number assigned to a device's network card when it's manufactured.
- A wired networking technology for connecting devices in a LAN, usually via Cat5 or Cat6 cables.
- How long it takes data to get from source to destination. Lower latency means snappier connections.
- Defines which part of an IP address identifies the network and which part identifies the device.
- Automatically assigns IP addresses to devices on a network. Saves you from configuring them manually.
21 Clues: Variation in latency. Too much can cause choppy audio and laggy video. • Connects multiple wired devices on a network so they can talk to each other. • A permanent ID number assigned to a device's network card when it's manufactured. • A Local Area Network. A small network confined to one area, like your home or office. • ...
Internet Vocabulary 2015-02-27
Across
- A registered address for a website or an email address.
- The visual component of the internet. This stands for the World Wide Web.
- The online address of a site or document.
- A personal list of interesting websites.
- Information a person shares about him or herself online.
- A combination of the words "Net" and "etiquette". It refers to good manners online.
- Consists of countless networks of computers connected across the world.
- The ability to talk live with others on the internet.
- An electronic method of composing, sending and receiving messages over the internet.
Down
- The process of transferring computer files from the Internet to a computer.
- The virtual universe of computers and computer networks.
- The software that lets users "surf" the web and view pages on it. Firefox and Internet Explorer are examples.
- An electronic security barrier to prevent outsiders from getting into a computer network.
13 Clues: A personal list of interesting websites. • The online address of a site or document. • The ability to talk live with others on the internet. • A registered address for a website or an email address. • The virtual universe of computers and computer networks. • Information a person shares about him or herself online. • ...
Crossword Puzzle 2022-04-29
Across
- The Women In Motion Network
- Advance Auto Parts has seven Team Member _______
- Promoting a variety of representation among our Team Members across all diverse groups to drive variation in thought and creative thinking
- International Cultural Opportunities Network
- Advance Auto Parts Employee Resource Groups (ERGs) are _________ __________ Networks
- Fostering Unity, Engagement, Growth and Opportunities Latino Network
- The Summer Internship Program: _______ University
Down
- Advance University is a ______ Internship
- Ensuring equal opportunity, treatment, and advancement for all Team Members, while also striving to eliminate barriers for all Team Members
- Fosters visibility and growth for its members and allies of the LGBTQ+ community by acting on our passion of inclusion of our Team Members, Customers and the communities we serve.
- Serve, Educate, Recruit, Value, Inspire, Celebrate and Empower Network
- Creating an environment for each Team Member to be their authentic self, to feel welcomed, valued, respected and heard
- The African American Leading Inclusion and Growth Network
13 Clues: The Women In Motion Network • Advance University is a ______ Internship • International Cultural Opportunities Network • Advance Auto Parts has seven Team Member _______ • The Summer Internship Program: _______ University • The African American Leading Inclusion and Growth Network • Fostering Unity, Engagement, Growth and Opportunities Latino Network • ...
Hardware 2020-03-10
Across
- A unit of information equal to 220 bytes or, loosely, one million bytes.
- A passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid
- A small device able to be connected to and used with a computer, especially to allow access to wireless broadband or use of protected software.
- It is a frequency unit of cycles per second that measures transmissions through airwaves or conduits
- A place in a computer where an expansion card can be inserted.
- A device which can be slotted into a computer to allow the use of audio components for multimedia applications.
- A central processor or main processor, is the electronic circuitry within a computer that executes instructions that make up a computer program.
- A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
- A form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
- A type of storage medium that permanently stores data on personal computers (PCs) and other electronic devices.
Down
- A computer hardware component that connects a computer to a computer network.
- It is a frequency unit that measures the number of cycles per second.
- A family of computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
- An electrical device that supplies electric power to an electrical load.
- A printed circuit board found in general purpose computers and other expandable systems.
- A device that you connect to a home entertainment system, it allows you to send music from your phone to the music system via Bluetooth.
- A standard for connecting computers and their peripherals.
- A unit of information equal to one billion (109) or, strictly, 230 bytes.
- A printed circuit board controlling output to a display screen.
20 Clues: A standard for connecting computers and their peripherals. • A place in a computer where an expansion card can be inserted. • A printed circuit board controlling output to a display screen. • It is a frequency unit that measures the number of cycles per second. • A unit of information equal to 220 bytes or, loosely, one million bytes. • ...
IT terms 2019-05-17
Across
- Standsfor one picture element (one dot on a computer monitor). commonly used as a unit of measurement.
- An unexpected problem with software or hardware. Typical problems are often the result of external interference with the program’s performance that was not anticipated by the developer.
- The physical components of a computer including the keyboard, monitor, disk drive, and internal chips and wiring.
- A collection of information organized so that a computer application can quickly access selected information.
- A person (or software) using an information system
- The manipulation of data to prevent accurate interpretation by all but those for whom the data is intended.
- A set of rules that regulate how computers exchange information.
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- A point within a network that interconnects with other networks.
Down
- A binary digit (either 0 or 1). it is the most basic unit of data that can be recognized and processed by a computer.
- A group of interconnected computers capable of exchanging information.
- Software programs designed to damage or do other unwanted actions on a computer. common examples: viruses, worms, trojan horses, and spyware.
- A handheld device used with a graphical user interface system.
- A measurement of the amount of data that can be transmitted over a network at any given time.
- A secret combination of characters used to access a secured resource such as a computer, a program, a directory, or a file. often used in conjunction with a username.
- An area on a disk that contains files or additional divisions called "subdirectories" or "folders".
- The method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
- A computer that is responsible for responding to requests made by a client program (e.g., a web browser or an e-mail program) or computer.
- A widely used Open Source Unix-like operating system.
- A penguin character and the official brand character of the Linux kernel.
20 Clues: A person (or software) using an information system • A widely used Open Source Unix-like operating system. • A handheld device used with a graphical user interface system. • A set of rules that regulate how computers exchange information. • A point within a network that interconnects with other networks. • ...
Chapter 5 IT Essentials Vocab (Mr. G) 2023-11-07
Across
- (2 words)commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility. It provides a connection point between PCs and the switches or routers.
- unshielded twisted-pair
- wide area networks. large computer network that connects groups of computers over large distances.
- (2 words) composed of two kinds of glass (core and cladding) and a protective outer shield (jacket). It uses light to transmit signals.
- (or coax) carries data in the form of electrical signals. The cable usually constructed of either copper or aluminum.
- An alternative for customers who cannot get cable or DSL connections. Does not require a phone line or cable, but uses a satellite dish for two-way communication.
- type of server that provides 3 main functions: gather logging information for monitoring and troubleshooting, select the type of logging information that is captured, and specify the destinations of captured syslog messages.
- Post Office Protocol
- electromagnetic interference
- connects a home or small office to the Internet.
- Simple Mail Transfer Protocol
- serves as the gateway to outside networks, use IP addresses to forward traffic to other networks.
Down
- Unified Threat Management
- Use of a cellular device to provide an internet connection to another device
- microsegments a LAN and has replaced bridges and hubs, they filter and segment network traffic by sending data only to the device to which it is sent
- (2 words)
- type of modem that connects a user’s network directly to the digital infrastructure of the phone company. always-on service, which means that there is no need to dial up each time you want to connect to the internet
- personal area network
- (2 words) Acts as storage or cache for web pages that are frequently accessed by devices on the internal network. Has the authority to act as another computer.
- Wireless protocol for close proximity connectivity. Operates in the 2.4 to 2.485 GHz radio frequency range and is typically used for PANs. Incorporates Adaptive Frequency Hopping (AFH)
- Internet Message Access Protocol
- Shielded twisted-pair
22 Clues: (2 words) • Post Office Protocol • personal area network • Shielded twisted-pair • unshielded twisted-pair • Unified Threat Management • electromagnetic interference • Simple Mail Transfer Protocol • Internet Message Access Protocol • connects a home or small office to the Internet. • Use of a cellular device to provide an internet connection to another device • ...
Ziaul Crossword 2024-12-03
Across
- attackers who do not report problems, but instead disseminate the information to other black hat attackers
- prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- memory is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- is a series of letters, numbers, and special characters, much like a password, that two communicating devices use to authenticate each other’s identity.
- protocols used by OSs and network devices offer varying levels of secure authentication
- is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
- requires a user to supply two or more types of authentication drawn from these credential categories:
Down
- used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
- Wizard guides you through the process of selecting the type of rule you want to create and the protocols or applications that the rule will apply to
- Authentication Protocol (PAP)
- or server is not communicating with certain applications or services, the protocol might be blocked
- firewall creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- the information that is swapped back and forth from RAM to disk and vice versa is stored in a specially allocated disk area called
- that creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS.
- – backs up the disk sector by sector to create an exact image of the disk’s contents
- distributions have a built-in firewall called netfilter
- testers who are paid to probe networks and OSs and report vulnerabilities to the OS vendor.
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- Defender Firewall is enabled and configured with default settings
- can be restricted to logging on only from particular workstations
20 Clues: Authentication Protocol (PAP) • distributions have a built-in firewall called netfilter • Defender Firewall is enabled and configured with default settings • can be restricted to logging on only from particular workstations • – backs up the disk sector by sector to create an exact image of the disk’s contents • ...
Chapter 6 2023-04-04
Across
- is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.
- This automatically assigns IP addressing to a device. a client-server protocol in which servers manage a pool of unique IP addresses.
- an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
- is a feature or characteristic in operating systems which enables computers to self-configure an IP address and subnet mask
- sequence of characters that uniquely names a Wi-Fi network.
- a signal sent to a host that requests a response.
- This statically assigns IP addressing to a device.
- Includes wired and wireless network interface cards (NIC) and network devices such as switches, wireless access points (APs), routers, multipurpose devices, and more.
- is a collection of IP standards designed to optimize the process of allocating IP addresses by forming unique identifiers.
- A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network
- allows prioritization of specific traffic types.
- is a network diagnostic tool used to track the pathway taken by a packet on an IP network from source to destination.
- defines the range of IP addresses that can be used within a network or subnet.
- is an application or computer that sends, receives, and relays email.
- allows a temporary opening in the firewall to allow data to specific inbound ports or a port range for an application or game.
- a network that provides services to an untrusted network.
Down
- used to specify the MAC addresses that are allowed on the wireless network.
- a node that enables a connection between networks in order to allow machines on other networks to communicate.
- It is used to automatically assign an IP address to a device in an IP network when there is no other assignment method available.
- A unique number that is part of the NIC.
- is a temporary address for devices connected to a network that continually changes over time.
- a device that connects two or more packet-switched networks or subnetworks
- A command line utility that is used to display and manage the IP address assigned to the machine.
- a computer network security system that restricts internet traffic in, out, or within a private network.
- allows traffic to specific ports.
- a 32-bit number assigned to a computer as an address on the internet and does not change.
- Involves knowing how networks are interconnected to support the needs of a business.
- The unique identifier that serves as the name of your computer or server.
- allows devices to dynamically add themselves to a wireless network without intervention/configuration.
29 Clues: allows traffic to specific ports. • A unique number that is part of the NIC. • allows prioritization of specific traffic types. • a signal sent to a host that requests a response. • This statically assigns IP addressing to a device. • a network that provides services to an untrusted network. • sequence of characters that uniquely names a Wi-Fi network. • ...
Computer Studies 2026-02-11
Across
- a unique numerical label assigned to every device connected to a computer network that uses the Internet Protocol for communication
- a network hardware device that connects your home or business network to your Internet Service Provider (ISP)
- advanced, high-speed networking cables that transmit data as light pulses through thin strands of glass or plastic, rather than electrical signals through copper
- the time delay between sending a data request and receiving a response, typically measured in milliseconds (ms)
- a networking device that acts as a central hub to connect your home or business network to the internet
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the process of converting readable data (plaintext) into an unreadable, scrambled format (ciphertext) using algorithms and a secret key
- the internet's "phonebook," translating human-friendly domain names into machine-readable IP addresses
- a high-performance computer built for intensive professional tasks like 3D modeling, video editing, engineering, and scientific analysis
- the maximum rate at which data can be transferred over an internet connection within a given time
- a networking device that allows wireless-capable devices to connect to a wired network.
Down
- a hardware device that connects multiple devices—such as computers, printers, and servers—within a Local Area Network (LAN) to enable communication, improve data efficiency, and manage traffic
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area
- a core, connection-oriented networking protocol that ensures reliable, ordered, and error-checked delivery of data between applications on an IP network
- a physical network cable used to connect devices—such as computers, routers, switches, and gaming consoles—to a local area network (LAN) or modem for internet access
- a standardized set of rules, procedures, or conventions governing how data is transmitted between devices in a network or how actions are performed in formal, scientific, or diplomatic situations
- a small unit of data used for transmitting information across computer networks
- a powerful computer or software system designed to manage, store, and distribute data, applications, and resources to other computers, known as "clients," over a network
- a desktop computer or workstation that is capable of obtaining information and applications from a server
- a company or organization that provides individuals and businesses with access to the internet
- a large-scale telecommunications network that connects smaller networks—such as Local Area Networks (LANs)—across vast distances, spanning cities, countries, or the globe
- a central networking device that connects multiple computers or Ethernet devices, acting as a, node to facilitate data sharing within a Local Area Network (LAN)
- a, high-speed network that connects computers, servers, and devices (like printers or phones) within a limited,,, shared geographical area, such as a home, school, or office building
23 Clues: a small unit of data used for transmitting information across computer networks • a networking device that allows wireless-capable devices to connect to a wired network. • a company or organization that provides individuals and businesses with access to the internet • ...
CN 2024-10-15
Across
- The process of directing data between different networks
- The unique identifier for a device on a network
- A protocol that divides messages into smaller packets for transmission
- A type of IP address that uses 128 bits
Down
- A device that connects multiple networks and forwards packets
- A protocol used for sending error messages and operational information
- A protocol that provides automatic IP address configuration
- A standard format for transmitting packets over the Internet
8 Clues: A type of IP address that uses 128 bits • The unique identifier for a device on a network • The process of directing data between different networks • A protocol that provides automatic IP address configuration • A standard format for transmitting packets over the Internet • A device that connects multiple networks and forwards packets • ...
BTEC DIT C3A - Modern Technologies 2025-03-04
Across
- The same data is stored in multiple locations
- If no transmitter is present in the cell then there will be no signal
- Anyone who is affected by or who can affect an organisations’ actions and policies
- Temporary networks with two or more computing devices
- Allows the same files to be copied to multiple devices via the cloud
- Online tools used to plan times and jobs for teams
Down
- __________ working - working away from the main office
- A secure tunnel between your device and the internet.
- The hardware and software that allow devices, applications, and users to communicate and connect to networks
- A copy of data to be used as part of disaster recovery
- Method of wireless connectivity over short distances (up to 10m)
- Free, unencrypted wireless connections
- Data that is divided up into smaller amounts. The data is then stored in different locations
13 Clues: Free, unencrypted wireless connections • The same data is stored in multiple locations • Online tools used to plan times and jobs for teams • A secure tunnel between your device and the internet. • Temporary networks with two or more computing devices • __________ working - working away from the main office • A copy of data to be used as part of disaster recovery • ...
10 2024-01-31
Across
- SUBMISSIONS Submitting websites to low-quality directories for backlinks.
- Networks of websites created solely for the purpose of linking to a target site.
- Illegally acquiring control over a domain name to redirect traffic.
- Redirecting users to different content than what search engines see.
Down
- Hosting malicious content on legitimate websites to exploit their authority.
- Generating fake likes, shares, or comments on social media.
- Filtering out negative reviews to artificially inflate ratings.
- META TAGS Stuffing meta tags with excessive keywords to manipulate rankings.
- Using misleading titles to attract clicks to low-quality content.
- Creating networks of websites solely for the purpose of link exchange.
10 Clues: Generating fake likes, shares, or comments on social media. • Filtering out negative reviews to artificially inflate ratings. • Using misleading titles to attract clicks to low-quality content. • Illegally acquiring control over a domain name to redirect traffic. • Redirecting users to different content than what search engines see. • ...
Infosec 2013-05-30
Across
- Your system can remain secured only if it has the latest __________.
- potential that an action or activity will lead to a loss
- A group of your colleagues who assists you in securely evacuating in any emergency situation.
- FAI Information security documents are made available to users on
- important in computers and networks
- a breach in security, such as unauthorized access to data
- or malware is a file or program other then a virus that is potentially harmful.
- Entering premises without swiping your access card by following someone else.
- any information about an individual which can be used to uniquely identify that person, e.g. name, date and place of birth, mother’s maiden name, social security number is ............. Identifiable Information
- is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
- Ensure that authorised user have access to information & associated assets when required.
- emailID to report security incidents
- list of permissions that tells an operating system which users have access rights to objects, and what operation they are allowed to perfom on those objects
- is a self-replicating program that is harmful to networks.
- is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
- who is responsible for security
- I am not authorized to install applications and software that are
Down
- Independent review of how well you are following and complying with the standards and policies.
- visitors need to be
- Organization’s preparedness program for handling disruptions.
- of death is a series of repeated, larger than normal pings that crash the receiving computer.
- If you access a computer systems without the owner’s knowledge and approval, you are committing a _____
- is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- is used to discard hard copies of confidential data.
- Password must be always kept _______ .
- is ensuring the accuracy and completeness of Information.
- Ensuring the information is accessible only to those authorised have access.
- is a program written with malicious intent and sent out by attackers.
- Programming language that allows applets to run within a web browser.
- The scrambling of data into a secret code that can be read only by software set to decode the information.
- Your activities on the network can be ____________ by the company.
- is a software program that displays advertising on your computer.
- these set out the technical controls required to achieve the policy objeclives
- Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain based on information they have obtained from these social networks or victim themselves
- abbreviation for voice communications over internet networks
- anything of value, such as source code, processes, hardware, people etc.
36 Clues: visitors need to be • who is responsible for security • important in computers and networks • emailID to report security incidents • Password must be always kept _______ . • is used to discard hard copies of confidential data. • potential that an action or activity will lead to a loss • is ensuring the accuracy and completeness of Information. • ...
Network cross word puzzle 2024-08-14
Across
- The protocol is responsible for ensuring data arrives correctly.
- A network's ability to handle an increase in load or demand.
- A network where computers communicate directly with each other without a central server.
- This type of address uniquely identifies a device on a network.
- A network that covers a large geographical area.
- The smallest unit of data in a network.
- The main method for measuring the capacity of a network connection.
- The device that forwards data packets between computer networks.
- A private network that uses public networks to connect remote sites or users.
- This protocol ensures data is sent securely over the network.
Down
- A standard for connecting computers in a local area network.
- This protocol breaks data into small packets for transmission.
- This network layer protocol handles the routing of packets.
- A type of network configuration where all devices are connected to a central hub.
- A device that amplifies or regenerates network signals to extend the range.
- The maximum amount of data that can be transmitted over a network in a given time.
- A technology that allows multiple devices to share the same network connection.
- A system that converts domain names to IP addresses.
18 Clues: The smallest unit of data in a network. • A network that covers a large geographical area. • A system that converts domain names to IP addresses. • This network layer protocol handles the routing of packets. • A standard for connecting computers in a local area network. • A network's ability to handle an increase in load or demand. • ...
digital literacy 2024-06-17
Across
- controlled by one person
- spreads between files
- pretends to be you
- unsafe websites/unsafe programs visits
- fire extinguisher
- spreads through networks/emails
- unit of measurement for electricity pressure
- spies on you
- wireless,signal loss
Down
- tricks you
- transmission capacity
- before touching inside of a computer
- send signals in network
- blocks you from files
- sends what you type to someone
- number of bits per second
- owns the internet
- defense department project
- dangerous to open
19 Clues: tricks you • spies on you • owns the internet • fire extinguisher • dangerous to open • pretends to be you • wireless,signal loss • transmission capacity • spreads between files • blocks you from files • send signals in network • controlled by one person • number of bits per second • defense department project • sends what you type to someone • spreads through networks/emails • ...
ISCC Chapter 7 2026-03-16
Across
- Safeguards protecting computer systems from attacks
- Self replicating program that spreads through networks
- Illegal activity conducted using the Internet or computer systems
- Fake QR codes used to trick users into scams
- Providing false or incomplete information
- Situation where personal interest conflicts with professional duty
- Person who gains unauthorized access to systems
- Fraudulent emails attempting to steal personal information
- Malicious program disguised as legitimate software
- Small text files stored by websites on a user's computer
- Obtaining goods or services through trickery
- Hidden method allowing bypass of security controls
- Network of infected computers controlled by attackers
- Failure to fulfill agreement terms
- Attack that disrupts access to an Internet service
- Software that displays unwanted advertisements
- Manipulating people to gain confidential information
- Private combination of words used for authentication
- Attacker who uses tools created by others without deep knowledge
- Program that infects files and alters system operation
- Digital record of a user's online activities
Down
- Individual using networks to cause political damage
- Stealing confidential or personal data
- Guidelines defining acceptable and ethical behaviour
- Using a computer system without permission
- Malware that blocks access until payment is made
- Hacker who intentionally destroys or steals data
- Degree to which information reflects true values
- Protection of devices networks and data from threats
- Illegal copying or stealing of software
- Original creations such as inventions writings or logos
- Attack where communication is secretly intercepted
- Event that could damage computer hardware software or data
- Technique where fake websites mimic real ones
- Program that hides deep in a system to allow remote control
- Valuable confidential business information
- Software that secretly collects user information
- Reporting illegal or unethical actions within an organization
- Unauthorized duplication or distribution of software
- Using computer resources for illegal or unapproved activities
- Right to control personal data collection and use
- Stealing physical computer equipment
- Criminal demanding payment to stop attacks
- Attack using many compromised systems to overwhelm a target
- Moral principles governing technology use
- Policy describing acceptable use of computer systems
46 Clues: Failure to fulfill agreement terms • Stealing physical computer equipment • Stealing confidential or personal data • Illegal copying or stealing of software • Providing false or incomplete information • Moral principles governing technology use • Using a computer system without permission • Valuable confidential business information • ...
Crossword2 2024-12-18
Across
- A computer that provides resources to other devices.
- The practice of protecting systems, networks, and programs from digital attacks.
- The language used to structure web pages.
- An error in a program that needs fixing.
- Address A unique string of numbers separated by periods that identifies each computer using the Internet Protocol.
Down
- Secures data by converting it into a coded format.
- Protects networks from unauthorized access.
- Stores data on the internet instead of your local device.
8 Clues: An error in a program that needs fixing. • The language used to structure web pages. • Protects networks from unauthorized access. • Secures data by converting it into a coded format. • A computer that provides resources to other devices. • Stores data on the internet instead of your local device. • ...
ISY 106 CROSSWORD 2024-09-22
Across
- A network security system that monitors and controls incoming and outgoing network traffic.
- A common method of network communication in local area networks (LANs).
- The brain of the computer, responsible for executing instructions.
- Service that translates domain names into IP addresses.
- Address, Unique identifier assigned to each device connected to a network.
- A networking device that connects devices within a LAN and forwards data.
- A device that forwards data between networks.
- Firmware used to perform hardware initialization during the booting process.
Down
- The core part of an operating system, managing hardware resources.
- A small-sized type of volatile computer memory that provides high-speed data access to a processor.
- Software that enables the creation and management of virtual machines.
- Technology that allows for the creation of virtual versions of physical computing resources.
- Computing model that allows access to a shared pool of configurable computing resources over the Internet.
- A communication system that transfers data between components inside a computer or between computers.
- Volatile memory used by the CPU to store data for active programs.
- Software that manages computer hardware and software resources.
16 Clues: A device that forwards data between networks. • Service that translates domain names into IP addresses. • Software that manages computer hardware and software resources. • The core part of an operating system, managing hardware resources. • Volatile memory used by the CPU to store data for active programs. • ...
test 2013-01-02
Across
- / Operating System
- / Our ERP system
- / Our anti-virus software vendor
- / Computer manufacturer
- / Open-source office productivity software suite
- / Electronic message
Down
- / Our anti-spam filter
- / Data storage device
- / What does the V stand for in DVD?
- / Global system of interconnected computer networks
- / Computer screen
- / ********* Serial Bus
- / Copying and archiving of computer data
- / Popular smartphone
14 Clues: / Our ERP system • / Data storage device • / Computer screen • / Operating System • / ********* Serial Bus • / Popular smartphone • / Electronic message • / Our anti-spam filter • / Our anti-virus software vendor • / Computer manufacturer • / What does the V stand for in DVD? • / Copying and archiving of computer data • ...
CIW-NTA Lesson 3 Vocabulary 2025-01-16
Across
- A high-speed direct Internet connection that uses all-digital networks.
- The end point of a connection (either side), which usually includes the TCP or UDP port used and the IP address. Used for communication between a client and a server.
- The Internet standard protocol for remote terminal connection service.
- A software application that enables a PC or mobile device to function as a telephone using VoIP technology.
- A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
- A very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity.
- A person's ability to use technology while "on the go."
Down
- A standard for short-range radio signals that is used to form personal area networks (PANs).
- A mobile phone that includes PC-like functionality.
- A more compact, Web-oriented version of the standard laptop PC; relies on the cloud computing model in which the Internet is used for remote access to Web applications.
- A device that allows computers to communicate over a network by modulating and demodulating the cable signal into a stream of data.
- A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
- ABBREVIATION ONLY. The complete domain name of an Internet computer, such as www.CIWcertified.com.
- A file that contains mappings of IP addresses to host names.
- One link between two network devices; the number of hops between two devices is considered a hop count.
15 Clues: A mobile phone that includes PC-like functionality. • A person's ability to use technology while "on the go." • A file that contains mappings of IP addresses to host names. • The Internet standard protocol for remote terminal connection service. • A high-speed direct Internet connection that uses all-digital networks. • ...
East Asia 2023-10-04
10 Clues: island chain • move from power • Japanese general • physical geography • money in circulation • transportation networks • groups of representatives • wealthy Japanese landowners • regional difference in language • the characteristics of a population
VA/OA 2013-08-19
Across
- Stakeholders within the organisation
- Being able to be seen
- Creating a reaction by your actions
- Testing the 3Es
- A repository of information
- The person in charge
Down
- Create awareness
- to exchange information
- Networks of instant communication
- Working together
- Online writing
- The goal of current PA strategy
- Best friend
- A collection of records
14 Clues: Best friend • Online writing • Testing the 3Es • Create awareness • Working together • The person in charge • Being able to be seen • to exchange information • A collection of records • A repository of information • The goal of current PA strategy • Networks of instant communication • Creating a reaction by your actions • Stakeholders within the organisation
CHAPTER 6 TERMS 2020-08-12
Across
- used to rate the trustworthiness of routing information received on one router from its neighboring router
- an external routing protocol that uses a sophisticated algorithm to determine the best route
- means it sends the subnet mask information with the route updates (prefix routing)
- a collection of networks under a common administrative domain
- used to communicate between multiple autonomous systems (AS)
- a way to configure more than one physical router to appear as if they were only a single logical one.
- a router receiving an update from a neighbor router believes the information about remote networks without verifying for itself if the news is actually correct
- all devices in the network must use the same subnet mask for each specific address class.
Down
- the time required by protocols to update their forwarding tables after changes have occurred
- a path considered a backup route
- each router keeps state information about adjacent neighbors
- best route to a remote network
- two types of routing protocols used in internetworks
- involves encapsulating one type of protocol in another type of protocol
- allows a group of routers to for a single virtual router. On router is elected to handle all request sent to the virtual IP address
- a unique IP address on the same subnet as the hosts defined in the configuration
- uses only the hop count to determine the best way to a remote network
- finds the best path to a remote network by judging distance. Each router running RIP sends it complete routing tables out to all active interfaces at periodic time intervals.
- a network that has two or more subnetworks of a classful network connected together by different classful networks.
- the routing tables include information about all the networks in the internetwork.
- useful for carrying IPv6 data over a network that is still IPv4
- contains all destinations advertised by neighboring routers
- a Cisco proprietary protocol that can be run on most, but not all, of Cisco’s router and multilayer switch models
- exchanged by routers to determine which other routers are available to exchange routing data with
- general-purpose encapsulation that allows for transporting packets from one network through another network through a VPN
- allows you to used variable length subnet mask
- translating one routing protocol into another
- uses aspects of both distance vector and link state.
- (shortest path first protocol) sends updates containing the state of their own links to all other routers on the network.
- the amount of bandwidth on the lines will be used to find the best path to the remote network
30 Clues: best route to a remote network • a path considered a backup route • translating one routing protocol into another • allows you to used variable length subnet mask • two types of routing protocols used in internetworks • uses aspects of both distance vector and link state. • contains all destinations advertised by neighboring routers • ...
Neural Networks and Deep Learning 2023-11-14
Across
- How far the filter moves in every step along one direction
- An unsupervised learning rule that attempts to connect the psychological and neurological underpinnings of learning &
- Function used to calculate the total net input &
- Most popularly used activation function in the areas of convolutional neural networks and deep learning: f(x) is zero when x is less than zero and f(x) is equal to x when x is above or equal to zero &
- Applied after the convolutional layer, used to reduce the dimensions of the feature maps
- A gradient descent learning rule for updating the weights of the inputs to artificial neurons in a single-layer neural network &
- Addition of extra pixels around the borders of the input images or feature map
- The output remains the same as the input &
- A machine learning training method based on rewarding desired behaviors and punishing undesired ones &
- Simplest type of RNN
- A RNN, aimed to deal with the vanishing gradient problem present in traditional RNNs
- A process by which an initial set of data is reduced by identifying key features of the data for machine learning &
- A technique to prevent exploding gradients in very deep networks, usually in RNNs
- A mathematical function that converts a vector of real numbers into a probability distribution &
- A type of RNN that, in certain cases, has advantages over LSTM
- It is a widely adopted activation function for a special type of neural network known as Backpropagation Network &
- A supervised machine learning method where the model tries to predict the correct label of a given input data &
- A systematic error that occurs in the machine learning model itself due to incorrect assumptions in the ML process &
- A type of artificial neural network which uses sequential data or time series data
- A matrix of weights which are multiplied with the input to extract relevant features
Down
- A commonly used activation function: it gives 1 as output of the input is either 0 or positive &
- A type of artificial neural network, which is widely used for image/object recognition and classification
- A branch of artificial intelligence and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy &
- An algorithm that is designed to test for errors working back from output nodes to input nodes &
- When all the training data is used at once and is defined as the total number of iterations of all the training data in one cycle for training the machine learning model &
- Uses machine learning algorithms to analyze and cluster unlabeled datasets &
- A single layer neural network with multiple nodes where each node accepts multiple inputs and generates one output &
- Function decides whether a neuron should be activated or not by calculating the weighted sum and further adding bias to it &
- A hyper-parameter used to govern the pace at which an algorithm updates or learns the values of a parameter estimate &
- A type of machine learning that learns the relationship between input and output &
- An algorithm for supervised learning of binary classifiers &
- A method in artificial intelligence that teaches computers to process data in a way that is inspired by the human brain &
- Kernel
- The need for this activation function stems from the fact that many learning algorithms require the activation function to be differentiable and hence continuous &
34 Clues: Kernel • Simplest type of RNN • The output remains the same as the input & • Function used to calculate the total net input & • How far the filter moves in every step along one direction • An algorithm for supervised learning of binary classifiers & • A type of RNN that, in certain cases, has advantages over LSTM • ...
Chapter 1; Introduction to Networks 2025-02-12
Across
- The type of computer whose primary role in the network is to give client computers access to network resources and services. The computers that most often fit this description are usually in the IT room or locked away in a closet.
- Information added to the back end of a chunk of data so that the data can be correctly interpreted and processed by network protocols.
- The acronym for a type of low-power memory that is used to store configuration information for a PC.
- A collection of users and computers in a server-based network whose accounts are managed by Windows servers called “domain controllers.”
- A type of computer memory in which continual electrical power is required to maintain the data stored in it.
- A chunk of data sent over a network containing source IP address, a destination IP address, and other IP protocol.
- A private network that allows limited and controlled access to internal network resources by outside users, usually in a business-to-business situation.
- A collection of wires that carry data from one place to another on a computer’s motherboard.
- The prefix used to measure data that indicates a Billion bytes.
- The type of CPU containing two or more processing cores.
- A network model in which all computers can function as clients or servers as needed, and there’s no centralized control over network resources.
Down
- A computer program stored in nonvolatile memory that is executed when a computer is first powered on.
- The process of adding IP addresses and then MAC addresses to chunks of data, either at the front or the end.
- A component on a motherboard that controls data transfers between memory, expansion slots, I/O devices, and the CPU.
- _____ protocols.The software defining the rules and formats a computer must use when sending information across a network.
- OS The OS installed on a computer that is designed mainly to access network resources, even though it might be capable of sharing its own. Mac OS and Windows 10 fit this description.
- A networked collection of LANs tied together by devices such as routers.
- ____ Service. The software that manages centralized access and security in a server-based network.
- The term for the username-password pair that must be given to access a computer on a network.
- A packet with source and destination MAC addresses added and an error-checking code added to the back end. Frames are generated and processed by the network interface.
20 Clues: The type of CPU containing two or more processing cores. • The prefix used to measure data that indicates a Billion bytes. • A networked collection of LANs tied together by devices such as routers. • A collection of wires that carry data from one place to another on a computer’s motherboard. • ...
Chapter 11-12 crossword 2023-11-27
Across
- A solid in which particles lack an organized structure
- Because in the solid and liquid states particles are closer together
- Intermolecular forces that bind a substance to a surface are called
- Extended networks of atoms held together by metallic bonding
- Different structural forms of the same element
- The resistance of a liquid to flow and increases with stronger intermolecular forces and decreases with higher temperature.
- The rise of liquids up narrow tubes is called capillary action.
- Solid in which particles are arranged in a definite repeating pattern
- Discrete molecules held by intermolecular forces
- Intermolecular forces that bind similar molecules to one another are called
Down
- The energy or work required to increase the surface area of a liquid due to intermolecular forces
- Conversion from one state of matter to another is called a
- A temporary attractive force that occurs when electron clouds in neighboring atoms occupy positions that create temporary dipoles
- The pressure needed to compress the liquid at critical temperature is called
- The state beyond this temperature is called a
- Extented networks of ions held together
16 Clues: Extented networks of ions held together • The state beyond this temperature is called a • Different structural forms of the same element • Discrete molecules held by intermolecular forces • A solid in which particles lack an organized structure • Conversion from one state of matter to another is called a • Extended networks of atoms held together by metallic bonding • ...
Crossword 2024-04-18
Across
- the programs and other operating information used by a computer
- he protection of computer systems and networks from attacks by malicious actors
- team focus is on phone networks, recording calls and call center
- a request for information
- set of data processing elements connected in series, the output of one element is the input of another
- (abbrev)determines stakeholder needs and drives strategy for IT team
- objectively analyze desired processes and outcomes, advise on correct combo of IT systems
Down
- position focus is to support teams on IT floor to produce efficiently and effectively
- the systems put in place to operate and manage IT services and environments
- a structured set of data held in a computer
- creates/develops training materials for IT
- team focused on keeping monitors, computers and general physical technology in working order
- maximum rate of data transfer across a given path
- (abbrev) much of the job involves attempting to "break" code
- subset of programming entailing logical reasoning, analysis, and planning a sequence of instructions
- (abbrev) computer systems able to perform tasks such as visual perception, speech recognition, decision-making
16 Clues: a request for information • creates/develops training materials for IT • a structured set of data held in a computer • maximum rate of data transfer across a given path • (abbrev) much of the job involves attempting to "break" code • the programs and other operating information used by a computer • team focus is on phone networks, recording calls and call center • ...
Lesson 3 Vocab 2024-02-02
Across
- A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
- A device that allows computers to communicate over a network by modulating and demodulating the cable signal into a stream of data.
- A file that contains mappings of IP addresses to host names.
- A standard for short-range radio signals that is used to form personal area networks (PANs).
- A mobile phone that includes PC-like functionality.
- A more compact, Web-oriented version of the standard laptop PC; relies on the cloud computing model in which the Internet is used for remote access to Web applications.
- A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
- One link between two network devices; the number of hops between two devices is considered a hop count.
- The complete domain name of an Internet computer, such as www.CIWcertified.com.
Down
- The Internet standard protocol for remote terminal connection service.
- The end point of a connection (either side), which usually includes the TCP or UDP port used and the IP address. Used for communication between a client and a server.
- A very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity.
- A high-speed direct Internet connection that uses all-digital networks.
- A software application that enables a PC or mobile device to function as a telephone using VoIP technology.
- A person's ability to use technology while "on the go."
15 Clues: A mobile phone that includes PC-like functionality. • A person's ability to use technology while "on the go." • A file that contains mappings of IP addresses to host names. • The Internet standard protocol for remote terminal connection service. • A high-speed direct Internet connection that uses all-digital networks. • ...
Wireless/Bluethooth 2023-03-28
Across
- Multi-User MIMO
- Clear Channel Assessment
- Multiple-Input, Multiple-Output
- extended service set
- MAN Wireless metropolitan area networks
- Quality of Service
- PAN Wireless personal area networks
- Temporal Key Integrity Protocol
- Remote Authentication Dial-In Service
- Extensible Authentication Protocol
Down
- Multi-User Multiple Input-Multiple Output
- Internet of Things
- Near Field Communication
- WAN Wireless wide area networks
- Dynamic Frequency Selection
- Advanced Encryption Standard
- Received Signal Strength Indication
- Wi-Fi Protected Setup
- Service Set Identifier
- Wireless LAN
- Terminal Access Controller Access-Control System
21 Clues: Wireless LAN • Multi-User MIMO • Internet of Things • Quality of Service • extended service set • Wi-Fi Protected Setup • Service Set Identifier • Near Field Communication • Clear Channel Assessment • Dynamic Frequency Selection • Advanced Encryption Standard • WAN Wireless wide area networks • Multiple-Input, Multiple-Output • Temporal Key Integrity Protocol • ...
CIS 101 Cybersecurity Crossword puzzle 2025-03-14
Across
- Protocol for secure email
- Method to authenticate users
- Scrambles data for privacy
- Protects systems from malware
- Scanning for vulnerabilities
- Prevents unwanted emails
- Remote monitoring of devices
- Standard for network encryption
Down
- Attack on website servers
- Secure file sharing protocol
- Fake website for phishing
- Unauthorized access to data
- Denial of Service attack
- Security for wireless networks
- A breach of security
- Malicious software program
- Unauthorized user access point
- Attack on network resources
- Software to block threats
19 Clues: A breach of security • Denial of Service attack • Prevents unwanted emails • Attack on website servers • Protocol for secure email • Fake website for phishing • Software to block threats • Scrambles data for privacy • Malicious software program • Unauthorized access to data • Attack on network resources • Secure file sharing protocol • Method to authenticate users • ...
Computer terms 2021-05-10
Across
- It comprises the entire set of programs, procedures, and routines associated with the operation of a computer system.
- It stands for World Wide Web
- It stands for Wireless Fidelity.
- Also called USB or flash drive.
- A set of headphones, especially one with a microphone attached to it.
- a piece of electronic equipment that connects computer networks to each other, and sends information between networks.
Down
- A program you use to look at, and navigate between, pages on the World Wide Web
- Also called cables.
- Also called virus or malware
- an electronic device that allows one computer to send information to another through standard phone lines and therefore over long distances.
- It refers to the physical parts of a computer and related devices.
11 Clues: Also called cables. • It stands for World Wide Web • Also called virus or malware • Also called USB or flash drive. • It stands for Wireless Fidelity. • It refers to the physical parts of a computer and related devices. • A set of headphones, especially one with a microphone attached to it. • ...
The Cardiovascular System 2023-11-16
Across
- cardiac rhythm management
- HEART
- Attack
- vessels that return blood to the heart
- vessels that deliver blood to tissues
- a scan used to look at the heart and nearby blood vessels
- failure When the heart fails
- how the heart works during physical activity
- a sudden blockage
- muscle disease
Down
- peripheral vascular disease
- CELL
- are networks of small vessels that perfuse tissues
- cardiovascular disease
- transient ischemic attack
- a problem with the rate of your heartbeat
- BLOOD
- computed tomography scan
- magnetic resonance imaging
- CLOT, LUMP
- Pumps blood through the system
- electrocardiogram
22 Clues: CELL • HEART • BLOOD • Attack • CLOT, LUMP • muscle disease • a sudden blockage • electrocardiogram • cardiovascular disease • computed tomography scan • cardiac rhythm management • transient ischemic attack • magnetic resonance imaging • peripheral vascular disease • failure When the heart fails • Pumps blood through the system • vessels that deliver blood to tissues • ...
U03 - CSE-CH03 2024-02-15
Across
- A type of malware, similar to a virus, which self-replicates across networks without the need for a user to open an infected program.
- (8,8) Protecting the places where people work, and the locations of systems, services and networks.
- A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
- (5,9) Files containing data unique to particular pieces of malware, including viruses, that security software downloads in order to aid detection.
- A cyber attack where a user is misdirected to a fraudulent website, despite entering the correct address.
- (6,5) A type of malware, disguised as legitimate software, that is used to gain unauthorised access to a victim's computer.
Down
- (5,8) A form of phishing targeting particular individuals, where the email is designed to look like it's from a trusted or known person.
- is any kind of software that can damage computer systems, networks or devices. Includes viruses, ransomware and trojans.
- (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
- Deliberate or accidental threat to an organisation's security from someone who has authorised access (such as an employee).
- Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives.
- (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
- Unsolicited email sent in bulk, also referred to as junk email.
13 Clues: Unsolicited email sent in bulk, also referred to as junk email. • Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives. • (8,8) Protecting the places where people work, and the locations of systems, services and networks. • ...
GCSE Computer Science: Networks 2018-02-17
Across
- The 'b' in mbps stands for…
- A computer on a network that provides facilities to others, such as storage or printing.
- A network with a central hub to which all computers are connected.
- A computer that connects to a network and uses its services and resources.
- A network where there is no server - all clients are equal. (3 words)
- Connecting your phone to your laptop would create this type of network. (3 words)
- A collection of computers connected together to exchange data.
- A network where computers are connected in a circle.
Down
- The unit used to measure network speed.
- The Internet is the most famous example of this type of network. (3 words)
- A network where every computer is connected to every other computer.
- A network set up in a small geographical area, such as an office. (3 words)
- Computers in this network are connected in a line.
- This word means 'the way we lay out our network'.
14 Clues: The 'b' in mbps stands for… • The unit used to measure network speed. • This word means 'the way we lay out our network'. • Computers in this network are connected in a line. • A network where computers are connected in a circle. • A collection of computers connected together to exchange data. • A network with a central hub to which all computers are connected. • ...
Terms 2024-10-22
Across
- A networking device that connects devices within a local area network (LAN).
- A set of rules that govern communication between devices on a network.
- Zeroconf or Plug&play for IP assignment.
- A connectionless protocol that does not guarantee delivery.
- The first line of defense that monitors incoming and outgoing traffic.
- A process used to establish a connection between two network devices before communication starts.
Down
- A method for handling collisions in Ethernet networks
- The actual rate at which data is successfully transferred over a communication link.
- An organization that provides access to the Internet for individuals or companies.
- The sender can send more than one packet before receiving ACK for that packet
- A device that forwards data packets between computer networks.
- A unique identifier assigned to network interfaces for communications on the physical network segment.
12 Clues: Zeroconf or Plug&play for IP assignment. • A method for handling collisions in Ethernet networks • A connectionless protocol that does not guarantee delivery. • A device that forwards data packets between computer networks. • A set of rules that govern communication between devices on a network. • ...
Group 6 2026-02-23
9 Clues: QUICK EXPRESS • HAPPY HIKKUPS • R N ADVOCATES • WOOD AND BEYOND • ORPHEUS BRANDCOM • COMPANY SECRETARY • ARIHANT DIGIPRINT • CROSSROAD NETWORKS • N R KADMAWALA AND SONS
Wired and Wireless Networks 2024-01-23
Across
- A wireless connection method for earphones, keyboards, etc.
- Two or more devices connected together make this.
- Describes the amount of data that can be sent down a connection in one go.
- A way of transmitting data using light.
- A powerful computer that is used to store network files, connect to printers, etc.
- A billion bits transmitted at once.
- A security method for wireless networks where data is jumbled up.
- A million bits transmitted at once.
Down
- A device used to connect a home network to the Internet.
- Describes a network that uses radio signals.
- Describes how fast data can travel down a connection.
- Describes what is happening when a video or sound pauses unexpectedly.
- A device used to connect devices together to make a network.
- Describes the delay between sending data and it being received.
14 Clues: A billion bits transmitted at once. • A million bits transmitted at once. • A way of transmitting data using light. • Describes a network that uses radio signals. • Two or more devices connected together make this. • Describes how fast data can travel down a connection. • A device used to connect a home network to the Internet. • ...
Library visit 2021-11-19
10 Clues: a way out • a building • from A'to'Z • take and use • a flat length • a list of all • slow to reveal • to mark our book • computer networks • the action of mentioning
Transformers 2024-12-09
10 Clues: RNN weakness • Encoder output • Decoder mechanism • Attention-based model • Processes input sequence • Generates output sequence • Recurrent Neural Networks • Transformer excels at this • Natural Language Processing • Mechanism for long-range dependencies
Computer Science 100 2016-02-23
Across
- World Wide Web
- copying stealing
- can be increased by good writing
- picture movies graph
- Related group of networked computers
- Local Area Network
Down
- Hacking
- component of website
- someone or something of entity
- main technology for local area network
- Wide Area Networks
- the codes or tags of browsers
- Domain Name System
13 Clues: Hacking • World Wide Web • copying stealing • Wide Area Networks • Domain Name System • Local Area Network • component of website • picture movies graph • the codes or tags of browsers • someone or something of entity • can be increased by good writing • Related group of networked computers • main technology for local area network
Acronyms 2024-09-25
Across
- United States Family Health Plan
- Other Health Insurance
- Affordable Care Act
- Qualifying Life Event
- TRICARE Retired Reserve
- Defense Health Networks
- Continued Health Care Benefits Program
Down
- Military Treatment Facility
- Defense Online Enrollment System
- Health Information Technology for Economic and Clinical Health
- Social Security Number
- Potential Quality Issues
- Assistance Reporting Tool
13 Clues: Affordable Care Act • Qualifying Life Event • Social Security Number • Other Health Insurance • TRICARE Retired Reserve • Defense Health Networks • Potential Quality Issues • Assistance Reporting Tool • Military Treatment Facility • Defense Online Enrollment System • United States Family Health Plan • Continued Health Care Benefits Program • ...
BTT1O Crossword Puzzle 2022-09-30
Across
- wide area network
- local area network
- the backbone
- basic input/output system
- The brain of the computer
- binary digits
- it handles all parts of the network
Down
- things to connect all networks together
- network internal face card
- a screen that displays information
- short term memory
- read-only memory
- portable memory
13 Clues: the backbone • binary digits • portable memory • read-only memory • wide area network • short term memory • local area network • basic input/output system • The brain of the computer • network internal face card • a screen that displays information • it handles all parts of the network • things to connect all networks together
Jorge Internet Crossword Puzzle 2013-03-26
Across
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- a piece of writing that has been copied from someone else and is presented as being your own work
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A part of a computer system or network that is designed to block unauthorized
- renew or revitalize; To reload a webpage on the internet
Down
- collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- a list of citations that appear at the end of a paper, article, chapter or book.
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- unauthorized person who secretly gains access to computer files.
12 Clues: renew or revitalize; To reload a webpage on the internet • unauthorized person who secretly gains access to computer files. • A part of a computer system or network that is designed to block unauthorized • a list of citations that appear at the end of a paper, article, chapter or book. • ...
Communications,Networks and the Internet 2020-08-28
Across
- is a form of wireless communication designed to share information
- __________ Digital Subscriber Line
- an international network of networks that connects computers worldwide.
- a __________ consists of a collection of computers that share information and communicate with each other over a network.
- a WAN can connect networks across a large _____________ area, such as a city or country.
- lans can be divided into _______ categories based on how the computers communicate with one another.
- a peer-to-peer network allows every computer to _______ directly.
- data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
Down
- a device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
- the range of a wireless network can be extended using a ________.
- a ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
- refers to data transmission using ADSL and cable.
- a wireless access point contains a radio receiver, encryption and communications software.
- determines the volume of data that can be transmitted in a given time.
- a _______ can be used where it may be difficult or impractical to use a cabled LAN.
- lans in different countries can connect together to form a WAN, using _____________ links.
- enable several computers to communicate through a wireless access point at the same time.
- used to refer to data transmission over a telephone line using an analogue modem.
- bluetooth has a much slower data transfer rate than ______ and a much shorter range.
- To access the Internet you need to subscribe to an _________.
20 Clues: __________ Digital Subscriber Line • refers to data transmission using ADSL and cable. • To access the Internet you need to subscribe to an _________. • determines the volume of data that can be transmitted in a given time. • a peer-to-peer network allows every computer to _______ directly. • ...
Unit 2 - Networks of Exchange 2023-09-27
Across
- resulted in millions of deaths in Afro-Eurasia (two words)
- rest stop for traders on land trade routes
- religion that became dominant one in SE Asia due to trading
- new crop that changed East African diet
- main good traded on Silk Road
- major good traded from Africa to rest of Europe and Asia
- Mali leader who converted to Islam (two words)
- crop that spread throughout SE Asia and Africa due to the Indian Ocean trade
- Famous European who traveled throughout China (two words)
- revival of Greek & Roman culture in Europe
Down
- protected traders and allowed religions to spread on Silk Road
- communities created by traders waiting for monsoon winds
- Mongol khanate in Russia (two words)
- crop that allowed China to increase population
- language created from Bantu & Arabic
- Famous Muslim who traveled Islamic ports in Indian Ocean (two words)
- major trading city along the Silk Road
- main travel used on Silk Road
- religion spread to North Africa by traders
- winds that traders used in Indian Ocean
- site of cultural learning in Mali, Africa
- famous Mongol ruler who united the empire (two words)
22 Clues: main travel used on Silk Road • main good traded on Silk Road • Mongol khanate in Russia (two words) • language created from Bantu & Arabic • major trading city along the Silk Road • new crop that changed East African diet • winds that traders used in Indian Ocean • site of cultural learning in Mali, Africa • rest stop for traders on land trade routes • ...
Word List 1 2022-09-13
Across
- This device helps to manage the server using commands.
- Location of computer network elements.
- A measurement of the amount of information that can be sent between computers.
- A large system consisting of many similar parts that are connected together.
- Something that is easy to attack.
- Computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- The particular arrangement or pattern of a group of related things.
Down
- Something involving many different parts in a way that is difficult to understand.
- To be responsible for controlling or organizing someone or something.
- A networking device that forwards data packets between computer networks.
- A network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
- This device restores the network signal before the signal becomes too weak or damaged.
12 Clues: Something that is easy to attack. • Location of computer network elements. • This device helps to manage the server using commands. • The particular arrangement or pattern of a group of related things. • To be responsible for controlling or organizing someone or something. • A networking device that forwards data packets between computer networks. • ...
Word List 1 2022-09-13
Across
- This device helps to manage the server by commands.
- The location of computer network elements.
- The measurement of the amount of information that can be transferred between computers.
- A large system consisting of many similar parts that are connected together.
- Something that is easy to attack.
- A computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- The particular arrangement or pattern of a group of related things.
Down
- Involving many different parts in a way that is difficult to understand.
- To be responsible for controlling or organizing someone or something.
- Networking device that forwards data packets between computer networks.
- Network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
- This device restores the network signal before the signal becomes too weak or damaged.
12 Clues: Something that is easy to attack. • The location of computer network elements. • This device helps to manage the server by commands. • The particular arrangement or pattern of a group of related things. • To be responsible for controlling or organizing someone or something. • Networking device that forwards data packets between computer networks. • ...
Computer Hardware 2025-09-17
Across
- System Storage
- Interconnected computer networks
- Output,Input
- Numbers signed to a wbsite
- A,B,C,Micro,Mini
- Uses elcectronic flash memory
- program of the computer
Down
- connects with all of the computer
- Network of physical software
- Memory
- Manages hardware and software
- all of the Processing
- Physical Part of the computer
13 Clues: Memory • Output,Input • System Storage • A,B,C,Micro,Mini • all of the Processing • program of the computer • Numbers signed to a wbsite • Network of physical software • Manages hardware and software • Physical Part of the computer • Uses elcectronic flash memory • Interconnected computer networks • connects with all of the computer
HuffleBuff 2019-04-23
Across
- the number of bits per second that can be transmitted along a digital network.
- the signal between computers that indicates that transmission can proceed.
- the transfer of data over a point-to-point or point-to-multipoint communication channel.
- networks not connected by cables
- Transmitting data one bit at a time
- a system of rules that allow two or more entities of a communications system to transmit information
- technologies that support wireless networking of home and business networks.
Down
- Transmitting multiple bits of data simultaneously
- A computer that provides shared resources to network users.
- A network that has no dedicated servers. All computers are of equal status and can both share resources themselves and use resources from other computers
- An exchange of signals between computers when a connection is established.
- a set of rules or procedures for transmitting data
12 Clues: networks not connected by cables • Transmitting data one bit at a time • Transmitting multiple bits of data simultaneously • a set of rules or procedures for transmitting data • A computer that provides shared resources to network users. • the signal between computers that indicates that transmission can proceed. • ...
Cyber Awareness 2025-11-06
Across
- A virtual private network to access remote services securely
- A cyber attack that floods a network or server with excessive traffic to make it unavailable.
- A digital or physical device used to authenticate a user, often as a second factor.
- A hidden way into a system that bypasses normal authentication.
- Fake security alerts that trick users into installing malware or paying money.
- The practice of accessing a computer network illegally.
- A program that performs automated tasks, and can be controlled remotely and malicious
Down
- A secret combination of characters used to verify a user’s identity.
- A targeted form of phishing
- A security model that assumes no user or system is inherently trusted.
- Self-replicating malware that spreads across networks without user action.
- The practice of protecting computers, networks, and data from digital attacks or unauthorised access.
12 Clues: A targeted form of phishing • The practice of accessing a computer network illegally. • A virtual private network to access remote services securely • A hidden way into a system that bypasses normal authentication. • A secret combination of characters used to verify a user’s identity. • A security model that assumes no user or system is inherently trusted. • ...
Computer Science Choice Borad 2025-09-17
Across
- Network of physical software
- System Storage
- Memory
- Uses elcectronic flash memory
- Output,Input
Down
- connects with all of the computer
- Manages hardware and software
- A,B,C,Micro,Mini
- Numbers signed to a wbsite
- Physical Part of the computer
- Interconnected computer networks
- program of the computer
- all of the Processing
13 Clues: Memory • Output,Input • System Storage • A,B,C,Micro,Mini • all of the Processing • program of the computer • Numbers signed to a wbsite • Network of physical software • Manages hardware and software • Physical Part of the computer • Uses elcectronic flash memory • Interconnected computer networks • connects with all of the computer
Types of Technology-Based Training 2014-07-21
Across
- the instantaneous exchange of audio, video or text between two or more individuals or groups at two or more locations
- A general term describing any network contained within an organization. It refers primarily to networks that use Internet technology
- a computer application that uses any combination of text, graphics, audio, animation and/or full-motion video
- a format and system for recording, storing, and retrieving electronic information on a compact disc that is read using an optical drive
Down
- the transmission of television signals via cable or satellite technology
- A loose confederation of computer networks around the world that is connect through several primary networks
- simulation a device or system that replicates or imitates a real device or system
- a collaborative network that uses Internet technology to link organizations with their suppliers, customers, or other organizations that share common goals or information
8 Clues: the transmission of television signals via cable or satellite technology • simulation a device or system that replicates or imitates a real device or system • A loose confederation of computer networks around the world that is connect through several primary networks • ...
Jargon 4: Revenge of the Kev 2023-09-06
Across
- Security protocol used in wifi networks that offers greater protection through data encryption
- process of encoding information to a unrecognizable form.
- Part of an application that performs a task not apparent to the user
- A security protocol used in wifi networks designed to provide a level of security similar to a Wired/LAN connection.
- document sent with an email message
- Basic unit of information in computing.
- load and initialize the operating system on a computer
Down
- Physical place where a computer stores information, also known as its HDD.
- Network security system that monitors and controls incoming and outgoing traffic
- Hardware or Software component that stores data so future requests can be served faster
- a set of computers sharing resources located on a node
- application that provides a way to look at and interact with information on the Internet
- any goal-oriented activity requiring computer machinery
- Small blocks of data created by a web server while browsing a website
14 Clues: document sent with an email message • Basic unit of information in computing. • a set of computers sharing resources located on a node • load and initialize the operating system on a computer • any goal-oriented activity requiring computer machinery • process of encoding information to a unrecognizable form. • ...
Network Crossword 2019-04-24
Across
- a set of rules for allocating locally unique IP addresses to a device as they connect to a network
- where data is transmitted between two computers that do not share a common clock signal, in a stream of single bits
- the rate at which a signal could change
- a protocol to check if another device is transmitting
- the range of frequencies that can be transmitted over the medium measured in Hz
Down
- a method of forwarding data through multiple ports
- a unique code that identifies a particular device on a network
- a global network of wireless networks
- a method of dividing a network into multiple smaller networks
- a system where computers are each connected to a main server
- a combination of IP address and port number
- organisations who allocate and administer domain names and IP addresses
12 Clues: a global network of wireless networks • the rate at which a signal could change • a combination of IP address and port number • a method of forwarding data through multiple ports • a protocol to check if another device is transmitting • a system where computers are each connected to a main server • a method of dividing a network into multiple smaller networks • ...
Computer Hardware & Conputer Networks Crossword 2014-04-11
Across
- A SYSTEM PORT.
- A TYPE OF MEMORY THAT DOESN'T HAVE ANY MOVING PARTS.
- TANGIBLE THINGS OF A COMPUTER.
- A INPUT DEVICE.
- A TYPE OF IC PACKAGE SYSTEM.
- A HDD IS DIVIDED INTO THESE.
- A TYPE OF DISC.
- A COMPONENT IN HDD.
- A TYPE OF RAM.
- A DATA UNIT OF DATA LINK LAYER.
- A LAYER IN TCP/IP REFERENCE MODEL.
- A NETWORK DEVICE.
- DEVICE THAT IS CONNECTED TO A NETWORK.
- PROCESS OF WRITING DATA TO THE DISC.
Down
- A COMPONENT WHICH IS USED TO CONFIGURE A HDD.
- A LAYER IN OSI REFERENCE MODEL.
- A TOPOLOGY.
- COMPONENTS INSIDE A PROCESSOR.
- DONE TO REDUCE THE SIZE OF A FILE.
- A TYPE OF LIGHT SOURCE IN OPTICAL FIBERS.
- A FACTOR THAT EFFECTS THE PROCESSOR SPEED.
- HERE FILES ARE SPREAD ALL OVER THE DISK.
- A SYSTEM START UP PROCESS.
- COMPONENT USED TO WRITE DATA ONTO THE DISC.
- A POINTING DEVICE.
- INTERFERENCE IN A CABLE.
- AN ELEMENT IN A COMPUTER FOR SYNCHRONIZATION AMONG ITS COMPONENTS.
27 Clues: A TOPOLOGY. • A SYSTEM PORT. • A TYPE OF RAM. • A INPUT DEVICE. • A TYPE OF DISC. • A NETWORK DEVICE. • A POINTING DEVICE. • A COMPONENT IN HDD. • INTERFERENCE IN A CABLE. • A SYSTEM START UP PROCESS. • A TYPE OF IC PACKAGE SYSTEM. • A HDD IS DIVIDED INTO THESE. • TANGIBLE THINGS OF A COMPUTER. • COMPONENTS INSIDE A PROCESSOR. • A LAYER IN OSI REFERENCE MODEL. • ...
Ch. 5 Groups and Networks 2023-11-13
Across
- member of a triad who attempts to resolve conflict between the other two members
- network - set of dyads held together by ties between individuals
- et impera - role of a member of a triad who intentionally causes conflict between the other two members
- group - social group composed of enduring, intimate face-to-face relationships that strongly influence the attitudes and ideals of those involved
- hole - gap between network clusters
- - degree to which social relationships are reinforced through indirect ties (friends of friends)
- - sum of stories contained in a set of ties
- 3 basic forms of political relations - mediator, tertius gaudens, divide et impera
- a group of three
- group - groups marked by impersonal, instrumental relationships (those existing as a means to an end)
Down
- - group that is similar to a small group, but is multifocal
- - the powerful group, most often the majority
- group classifications: small groups, parties, large groups
- conformity - groups have strong influences over individual behavior
- - the connection between two people in a relationship that varies in strength from one relationship to the next; a story that explains our relationship with another member of our network
- a group of two
- group - characterized by the presence of a formal structure that mediates interaction and consequently, status differentiation
- - member of a triad who benefits from conflict between the other two members
- group - characterized by face-to-face interaction, a unifocal perspective, lack of formal arrangements or roles, and equality
- group - group that helps us understand or make sense of our position in society relative to other groups
- capital - information, knowledge of people or things, and connections that help individuals enter, gain power in, or otherwise leverage social networks
- - the stigmatized or less powerful group, generally the minority
- group classification: primary groups, secondary groups
23 Clues: a group of two • a group of three • hole - gap between network clusters • - sum of stories contained in a set of ties • - the powerful group, most often the majority • group classification: primary groups, secondary groups • group classifications: small groups, parties, large groups • - group that is similar to a small group, but is multifocal • ...
Communication, Networks and the Internet. 2020-08-28
Across
- A device used to convert digital signals emitted by the computer into singnals that can be transmitted over the phone.
- the volume of data that can be transmitted in a given time.
- A WAN can connect networks across a large _____________ area, such as a city or country.
- A peer-to-peer network allows every computer to _______ directly.
- LANS can be divided into _______ categories based on how the computers communicate with one another.
- Used to refer to data transmission over a telephone line using an analogue modem.
- to data transmission using ADSL and cable.
- A ____________ is a group of two or more computers linked together so they can share resources and communicate with one another.
Down
- Data ___________ channels carry the data from one location to another and can be classified according to bandwidth.
- __________ Digital Subscriber Line
- A _______ can be used where it may be difficult or impractical to use a cabled LAN.
- LANS in different countries can connect together to form a WAN, using _____________ links.
- An international network of networks that connects computers worldwide.
- A wireless access point contains a radio receiver, encryption and communications software.
- The range of a wireless network can be extended using a ________.
- A __________ consists of a collection of computers that share information and communicate with each other over a network.
- Is a form of wireless communication designed to share information
- access the Internet you need to subscribe to an _________.
- Bluetooth has a much slower data transfer rate than ______ and a much shorter range.
- Enable several computers to communicate through a wireless access point at the same time.
20 Clues: __________ Digital Subscriber Line • to data transmission using ADSL and cable. • access the Internet you need to subscribe to an _________. • the volume of data that can be transmitted in a given time. • The range of a wireless network can be extended using a ________. • Is a form of wireless communication designed to share information • ...
Where could IT take you? 2021-05-05
10 Clues: designs apps • designs websites • develops software • examines information • designs computer games • identifies user problems • protects against hackers • makes websites look good • sets up computer networks • helps people with computer problems
Networks and the Internet 2021-11-10
Across
- the customer premises to terminate a dial-up Integrated Services Digital Network (ISDN) line and connect it to a computer or a local area network
- a device that is both a transmitter and a receiver, and usually it's in a single device.
- security devices used to stop or mitigate unauthorized access to private networks connected to the Internet, especially intranets.
- hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network, into frames appropriate to a wide-area network and vice versa
Down
- creates a single, aggregate network from multiple networks
- software used in telecommunications for telecommunications networks that allows data to flow from one discrete network to another.
- based on Internet standards, with extensions to reflect the wireless device environment.
- connects devices within a network
8 Clues: connects devices within a network • creates a single, aggregate network from multiple networks • based on Internet standards, with extensions to reflect the wireless device environment. • a device that is both a transmitter and a receiver, and usually it's in a single device. • ...
Crossword puzzle 2024-09-26
Across
- a visual representation of something.
- a set of instructions, data or programs used to operate computers and execute specific tasks.
- a hand-held pointing device that detects two-dimensional motion relative to a surface.
- an electronic communications network that connects computer networks and organizational computer facilities around the world.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- is a collection of files accessed through a web address, covering a particular theme or subject, and managed by a particular person or organization.
- is a device that connects two or more packet-switched networks or subnetworks.
- Any digital moving picture, which includes a computer file in video formats such as MP4, MOV, M4V, AVI, DivX or FLV.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- a group of interconnected nodes or computing devices that exchange data and resources with each other.
Down
- data that has been processed, organized, and interpreted to add meaning and value.
- a piece of equipment used to provide data and control signals to an information processing system.
- is a communication method that uses electronic devices to deliver messages across computer networks.
- refers to software that requires no paid licenses to use the application, no fees or donations, no restrictions on how many times you can download or open the program, and no expiration date.
- a piece of hardware that is used to output data that has been previously entered into a computer or similar processing device
- is a website designed to make it easy for users to create entries in chronological order.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- the field of technology concerned with recording, processing, storing and delivering audible sound using electricity.
- input device used to enter characters and functions into the computer system by pressing buttons, or keys.
- information that has been translated into a form that is efficient for movement or processing.
20 Clues: a visual representation of something. • is a device that connects two or more packet-switched networks or subnetworks. • data that has been processed, organized, and interpreted to add meaning and value. • a hand-held pointing device that detects two-dimensional motion relative to a surface. • ...
BTT1O Crossword Puzzle 2022-09-30
Across
- basic input/output system
- The brain of the computer
- binary digits
- wide area network
- short term memory
- local area network
- network internal face card
- it handles all parts of the network
- read-only memory
Down
- the backbone
- portable memory
- things to connect all networks together
- a screen that displays information
13 Clues: the backbone • binary digits • portable memory • read-only memory • wide area network • short term memory • local area network • basic input/output system • The brain of the computer • network internal face card • a screen that displays information • it handles all parts of the network • things to connect all networks together
vlog 2023-11-16
Across
- What is called filling the pages of websites on the Internet?
- Bloggers with a large audience get what from their blog?
- Who was the Hollywood Walk of Fame created for?
- What kind of person do you need to be to interest people?
- What do you need to run social networks?
Down
- Honorary glory as evidence of universal recognition of merit, talent, universal recognition and admiration.
- The most popular social network where you can watch videos on various topics?
- What are the names of the people who follow you on the Internet?
- One of the good ways to make money from a blog is?
- People who have a large audience on social networks are often what are they like?
- What can't be returned?
- In order for us to achieve a goal, we need to …… on it.(insert missing word)
12 Clues: What can't be returned? • What do you need to run social networks? • Who was the Hollywood Walk of Fame created for? • One of the good ways to make money from a blog is? • Bloggers with a large audience get what from their blog? • What kind of person do you need to be to interest people? • What is called filling the pages of websites on the Internet? • ...
Engineering Carrers 2015-10-13
12 Clues: designs cars • Designs tunnels • Makes computers • They make gasoline • makes water cleaner • Makes X-ray machines • Helps design airplanes. • They make products better • Makes programs for computers • These people work on medicine • they help with deep sea exploration • makes cellular communication networks
CET1600 CH 6 2019-10-31
Across
- In configuring a routing protocol, the network administrator added networks 192.168.50.0 and 172.16.0.0 to which router?
- ___ routing table entries are automatically created when an active router interface is configured with an IP address and subnet mask.
- On a router, the networks can be static which means they are __configured.
- When the source and destination hosts do not share the same network address. A ___ __ IP address is required.
- As a packet travels from one networking device to another the Source and Destination ___ __ never change.
Down
- The router maintains a __ __ containing directly connected and remote network route information.
- On a router the networks can be learned __ by using a routing protocol.
- On the PC, what is the command to display the hardware address and the IP address?
- As a packet travels from one networking device to another the Source & Destination ___ __ change as packet is forwarded from one router to the next.
- What is the gateway address for PC1? Type the alphabet (letter) for the answer. A1-192.168.1.1, B1-192.168.1.100, C1-192.168.1.254, D1-192.168.50.1, E1-192.168.50.2, F1-172.16.0.1, G1-172.16.0.100, H1-172.16.255.254
- What is the gateway address for S2? Type the alphabet (letter) for the answer. A1-192.168.1.1, B1-192.168.1.100, C1-192.168.1.254, D1-192.168.50.1, E1-192.168.50.2, F1-172.16.0.1, G1-172.16.0.100, H1-172.16.255.254
11 Clues: On a router the networks can be learned __ by using a routing protocol. • On a router, the networks can be static which means they are __configured. • On the PC, what is the command to display the hardware address and the IP address? • The router maintains a __ __ containing directly connected and remote network route information. • ...
Chapter 6 - Network Design Elements 2025-05-21
Across
- A cloud-based delivery model for security services like antivirus and firewalls.
- A cloud model offering virtualized computing resources over the internet.
- A network state where a device defaults to open access after failure.
- A solution that enforces security policies before allowing network access.
- A method of dialing many phone numbers to find modems or unsecured lines.
- Impersonating a device's MAC address to bypass security.
- An attack that allows access to traffic on other VLANs.
- A network design using two firewalls to isolate a DMZ.
Down
- A publicly shared list of known cybersecurity vulnerabilities and exposures.
- A cloud model providing a platform for developers to build and deploy applications.
- A protocol that prevents network loops by managing redundant paths.
- A switch memory table that stores MAC-to-port mappings.
- A cloud model where applications are delivered over the internet.
- An attack that overwhelms a switch's memory with fake MAC addresses.
- A one-to-one mapping between a private and public IP address.
- A firewall setup with three interfaces: internal, external, and DMZ.
- A method that modifies IP addresses to allow private devices to access the internet.
- A buffer zone between internal networks and external, untrusted networks.
- A type of NAT that maps multiple private IPs to one public IP using port numbers.
19 Clues: A network design using two firewalls to isolate a DMZ. • A switch memory table that stores MAC-to-port mappings. • An attack that allows access to traffic on other VLANs. • Impersonating a device's MAC address to bypass security. • A one-to-one mapping between a private and public IP address. • A cloud model where applications are delivered over the internet. • ...
Local Area Network 2025-01-22
Across
- Stationary device that allows you to access networks from a single point.
- Mobile device that can access the network/internet.
- Mobile computer that allows you to access networks on the go.
- Protects the network from unwanted intrusions.
- Allows multiple devices to have a wired connection to the network.
Down
- Sends & Receives data to/from the internet.
- A networking device that forwards data outside of the local network.
- Allows multiple devices to have a wireless connection to the network.
8 Clues: Sends & Receives data to/from the internet. • Protects the network from unwanted intrusions. • Mobile device that can access the network/internet. • Mobile computer that allows you to access networks on the go. • Allows multiple devices to have a wired connection to the network. • A networking device that forwards data outside of the local network. • ...
James's internet crossword 2022-05-03
Across
- computer-based application for the exchange of messages between users
- a device that stores data packets
- to transmit data from one computer system to another through means of a network
- a hierarchical naming system built on a distributed database for computers
- a family of wired computer networking technologies commonly used in local area networks
- a thing made for a particular purpose
- the electronic devices used to store data
- the ordinary copper wire that connects home and business computers to the telephone company
- one billion bits
Down
- to receive data from a remote system, typically a server such as a web server
- an organization that provides services for
- a electronic device for storing data
- The distance from the ray to the curve
- the overall time something takes to complete
- a sequence of instructions in a programming language that a computer can execute or interpret
- a piece of computer hardware or software that accesses a service made available by a server as part of the client–server model of computer networks.
- the wireless technology used to connect computers, tablets, smartphones and other devices to the internet
- a piece of computer hardware or software that provides functionality for other programs or devices
- the Internet.
19 Clues: the Internet. • one billion bits • a device that stores data packets • a electronic device for storing data • a thing made for a particular purpose • The distance from the ray to the curve • the electronic devices used to store data • an organization that provides services for • the overall time something takes to complete • ...
Computer Class 8 2024-10-27
Across
- A group of computers connected to share resources and data
- A code element in HTML that defines parts of a webpage, like <p> for paragraph
- The amount of data that can be transmitted in a network per second
- A styling language used with HTML to design the appearance of web pages
- A set of instructions given to solve a specific problem
- Software like Chrome or Firefox used to view web pages
- A device that connects different networks and directs data between them
- A clickable link that leads to another webpage or resource
- A local network connecting computers within a small area, like a building
- A wired technology for connecting computers in a local network
- A set of rules for how data is transmitted across networks
Down
- Software like MS Excel used to organize data in rows and columns
- The main page of a website, where navigation usually begins
- Additional information inside an HTML tag, like color or width
- The address used to access a specific web page on the internet
- A device that connects a local network to the internet
- A wide network connecting computers over large areas, like a country
- A wireless technology for connecting devices to a network
- The language used to create and structure web pages
19 Clues: The language used to create and structure web pages • A device that connects a local network to the internet • Software like Chrome or Firefox used to view web pages • A set of instructions given to solve a specific problem • A wireless technology for connecting devices to a network • A group of computers connected to share resources and data • ...
Cybersecurity 2025-06-27
Across
- Malware hidden inside another program.
- A ransomware that attacks networks using a protocol that helps computers communicate with printers and other devices
- Mechanism to run program
- Vulnerability of a system or program that manages to cede control to unauthorized persons.
Down
- Technology that allows the extension of the local area network a public network such as the Internet.
- software that allows anonymous access to the Internet through a series of virtual tunnels or sub-layers that prevent direct connection to the network.
- Exposure of private information.
- Tool that captures data packets on a network.
- Malware that copies itself and spreads across networks
9 Clues: Mechanism to run program • Exposure of private information. • Malware hidden inside another program. • Tool that captures data packets on a network. • Malware that copies itself and spreads across networks • Vulnerability of a system or program that manages to cede control to unauthorized persons. • ...
Crossword puzzle 2024-09-26
Across
- data that has been processed, organized, and interpreted to add meaning and value.
- a group of interconnected nodes or computing devices that exchange data and resources with each other.
- a piece of hardware that is used to output data that has been previously entered into a computer or similar processing device
- is a communication method that uses electronic devices to deliver messages across computer networks.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- information that has been translated into a form that is efficient for movement or processing.
- a set of instructions, data or programs used to operate computers and execute specific tasks.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- Any digital moving picture, which includes a computer file in video formats such as MP4, MOV, M4V, AVI, DivX or FLV.
- is a website designed to make it easy for users to create entries in chronological order.
Down
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- is a device that connects two or more packet-switched networks or subnetworks.
- an electronic communications network that connects computer networks and organizational computer facilities around the world.
- refers to software that requires no paid licenses to use the application, no fees or donations, no restrictions on how many times you can download or open the program, and no expiration date.
- a piece of equipment used to provide data and control signals to an information processing system.
- is a collection of files accessed through a web address, covering a particular theme or subject, and managed by a particular person or organization.
- input device used to enter characters and functions into the computer system by pressing buttons, or keys.
- a hand-held pointing device that detects two-dimensional motion relative to a surface.
- a visual representation of something.
- the field of technology concerned with recording, processing, storing and delivering audible sound using electricity.
20 Clues: a visual representation of something. • is a device that connects two or more packet-switched networks or subnetworks. • data that has been processed, organized, and interpreted to add meaning and value. • a hand-held pointing device that detects two-dimensional motion relative to a surface. • ...
NETWORKING 2025-06-29
10 Clues: TO INTERACT • NETWORK OF NETWORK • GROUP OF COMPUTERS • USED FOR SHORT DISTANCE • MODULATOR & DEMODULATOR • CHOOSES THE SHORTEST PATH • CONNECTS MULTIPLE NETWORKS • SIGNALS ELECTRO MAGNETIC RADIATION • WIDE WEB VAST INFORMATION • TECHNOLOGY CONNECTING WITHOUT CABLES
cyber crime 2024-11-07
Across
- - A secret string of characters used for authentication.
- - Part of the internet that requires special software to access, often associated with illicit activities.
- - Server that acts as an intermediary for requests from clients seeking resources from other servers.
- - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- - Engineering technique that tricks people into giving away confidential information.
- - Collection of computers and devices connected for communication and resource sharing.
- - Technique of disguising communication from an unknown source as being from a known, trusted source.
- - Software update to fix bugs or vulnerabilities (same as Across).
- - A security system that controls incoming and outgoing network traffic.
- - A deceptive scheme intended to cheat or defraud someone.
Down
- - Person who gains unauthorized access to computer systems.
- - Software that gathers information from a computer without permission.
- - A software update that fixes vulnerabilities or improves functionality.
- - A software tool designed to take advantage of a security flaw.
- - Money demanded by hackers in exchange for access to compromised data.
- - Software that automatically displays or downloads advertising material.
- - Malicious software that gives unauthorized access to a computer system.
- - Malicious code that infects computer files and spreads to others.
- - A type of malware that spreads copies of itself across networks.
- - Prefix related to computers or computer networks.
20 Clues: - Prefix related to computers or computer networks. • - A secret string of characters used for authentication. • - A deceptive scheme intended to cheat or defraud someone. • - Person who gains unauthorized access to computer systems. • - A software tool designed to take advantage of a security flaw. • ...
Company Organization checkpoint 2025-10-30
11 Clues: charity • reorganize • dismissals • sole trader • the top executive • manage a business • group of directors • level of management • part of a larger company • someone who bought shares of a business • something to do with computers and networks
AI Themed Word Search 2024-07-03
Assignment Two 2019-06-06
Across
- Future leaders will need to shift from being a director to a _________.
- The perception models to enhance_____includes :Mental model, ladder of inference, frame reflection, iceberg model, scenario planning, cynefin framework.
- The four major components necessary for ensuring that organizations are prepared for IR4 and leadership: include (a phased transition, networked learning, culture program, and _____initiatives).
- The term _______intelligence relates to the ability to build, contribute, and manage the power and energy found in networks of people.
- ________networks are more social-centric and relational that support knowledge creation and sharing in social networks.
- The ____ intelligence theory is the idea that flocks, swarms, schools, colonies, and humans behave more intelligently as a collective rather than as an individual species.
Down
- The author of the textbook maintained that there needs to be a shift away from developing leaders ________through organizationally led and force-fed restrictive reframing tools towards a cognitive readiness and vertical growth approach to developing leaders.
- The four stages of _______ include: unconscious incompetence (‘I don’t know what I don’t know’); conscious incompetence (‘I know that I don’t know’);conscious competence (‘I know that I know’) and unconscious competence (‘I already know …’)
- There will exist two gears in the change process that will build momentum. Gear 1 will include the setup of collaborative networks to work alongside the traditional structures. Gear 2 will require internal ________to merge divisions and silos into larger domains.
- The three types of organizational networks include: centralized, decentralized, and _______networks.
- Rob Cross proposed four steps to building an effective ____: These steps include: Analyze your network by classifying in what way individuals benefit you; De-layer your network by stepping back from ineffective connections; Diversify your network by including more enabling connections; Capitalize your network by being active with the network you have selected.
- The ________(traditional) network, sometimes known as the ‘hub and spoke’ system, from a bicycle wheel, is an organizationally prescribed network which reinforces ego and positional power.
- The basic considerations for of creating an open, collaborative network include: ________, friendly competition of ideas, and mechanisms to narrow choice.
- The three sets of actions that organizational decision-makers needs to be focusing on with regard to future- proofing the organization for leadership 4.0 are: structure, connection, and ______
14 Clues: Future leaders will need to shift from being a director to a _________. • The three types of organizational networks include: centralized, decentralized, and _______networks. • ________networks are more social-centric and relational that support knowledge creation and sharing in social networks. • ...
Assignment Two 2019-06-06
Across
- Future leaders will need to shift from being a director to a _________.
- The three types of organizational networks include: centralized, decentralized, and _______networks.
- Rob Cross proposed four steps to building an effective ____: These steps include: Analyze your network by classifying in what way individuals benefit you; De-layer your network by stepping back from ineffective connections; Diversify your network by including more enabling connections; Capitalize your network by being active with the network you have selected.
- The ________(traditional) network, sometimes known as the ‘hub and spoke’ system, from a bicycle wheel, is an organizationally prescribed network which reinforces ego and positional power.
- There will exist two gears in the change process that will build momentum. Gear 1 will include the setup of collaborative networks to work alongside the traditional structures. Gear 2 will require internal ________to merge divisions and silos into larger domains.
- The author of the textbook maintained that there needs to be a shift away from developing leaders ________through organizationally led and force-fed restrictive reframing tools towards a cognitive readiness and vertical growth approach to developing leaders.
- ________networks are more social-centric and relational that support knowledge creation and sharing in social networks.
- The three sets of actions that organizational decision-makers needs to be focusing on with regard to future- proofing the organization for leadership 4.0 are: structure, connection, and ______
Down
- The four major components necessary for ensuring that organizations are prepared for IR4 and leadership: include (a phased transition, networked learning, culture program, and _____initiatives).
- The basic considerations for of creating an open, collaborative network include: ________, friendly competition of ideas, and mechanisms to narrow choice.
- The ____ intelligence theory is the idea that flocks, swarms, schools, colonies, and humans behave more intelligently as a collective rather than as an individual species.
- The perception models to enhance_____includes :Mental model, ladder of inference, frame reflection, iceberg model, scenario planning, cynefin framework.
- The term _______intelligence relates to the ability to build, contribute, and manage the power and energy found in networks of people.
- The four stages of _______ include: unconscious incompetence (‘I don’t know what I don’t know’); conscious incompetence (‘I know that I don’t know’);conscious competence (‘I know that I know’) and unconscious competence (‘I already know …’)
14 Clues: Future leaders will need to shift from being a director to a _________. • The three types of organizational networks include: centralized, decentralized, and _______networks. • ________networks are more social-centric and relational that support knowledge creation and sharing in social networks. • ...
Technology Terms 2016-02-22
Across
- <strong>
- software and data are stored as a
- hypertext_____ language
- local area network
- (sender/reciever active) communication
- legal right to material
- computer program or a device that provides functionality
- wide area networks
- component that stores data
Down
- IP ____
- related group of networked computers
- internet service provider
- pictures graphics movies
- person or program successfully masquerades as another
- wire optical fiber
15 Clues: IP ____ • <strong> • local area network • wire optical fiber • wide area networks • hypertext_____ language • legal right to material • pictures graphics movies • internet service provider • component that stores data • software and data are stored as a • related group of networked computers • (sender/reciever active) communication • person or program successfully masquerades as another • ...
Crossword 2021-03-10
Across
- it is a computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- They are generally used to connect computers in a LAN.
- also can be called as bridging hub.
Down
- it is a networking device that forwards data packets between computer networks.
- a key stopping point for data on its way to or from other networks.
- It is a circuit board installed in a computer that provides a dedicated network connection to the computer.
6 Clues: also can be called as bridging hub. • They are generally used to connect computers in a LAN. • a key stopping point for data on its way to or from other networks. • it is a networking device that forwards data packets between computer networks. • It is a circuit board installed in a computer that provides a dedicated network connection to the computer. • ...
Electronics parts 2022-09-22
Across
- apps or brands
- shows information
- connect with eachother
- physical componets
- in control
- stores your data
- makes thing faster
- saves important stuff
- get anywhere in the internet
- connect other stuff
- networks
- programmed to do tasks
- wall for viruses
- easier to access websites
Down
- it allows you to type
- keeps the internet
- codes in the computer
- saves stuff
- records info
- helps people search
- connects internet to service provider
- recommendations
- research purpose
- connect people to data
- saves you from using data
25 Clues: networks • in control • saves stuff • records info • apps or brands • recommendations • stores your data • research purpose • wall for viruses • shows information • keeps the internet • physical componets • makes thing faster • helps people search • connect other stuff • it allows you to type • codes in the computer • saves important stuff • connect with eachother • connect people to data • ...
engineer cRaZy crossword 2020-09-23
Across
- programs languages in electronics
- fixes pipeline leaks
- eliminates product waste
- perform mechanical, electrical, and civil engineering
- biology
- Makes 3D Modeling stuff
- makes safe habitats for animals
- make airplanes
- biomedical equipment
- control coastal environments
- makes solutions for things
Down
- maintain standard for manufacture product
- Maintains X-Ray equipment
- designs computers
- designs power-producing machines
- battery
- works on software development
- control and help water
- Makes software for things
- solve financial problems
- manage networks
- data systems
- leads the engineers
23 Clues: battery • biology • data systems • make airplanes • manage networks • designs computers • leads the engineers • fixes pipeline leaks • biomedical equipment • control and help water • Makes 3D Modeling stuff • eliminates product waste • solve financial problems • Maintains X-Ray equipment • Makes software for things • makes solutions for things • control coastal environments • ...
Forms of Media 2016-09-02
Across
- contains stories, essays, pics, etc.
- express ideas by images
- housing for magnetic tape
- electronic mail
- discussion or informational site; consisting of discrete entries
- mobile phone or CP
- regularly published; one main topic
- most popular form of print-media
- TV
- also known as film
- used for advertising
Down
- structured form of play
- a written medium
- oldest form of print media
- used in radio stations
- telecommunications device
- outdoor advertising structure
- to promote or sell a product
- network of networks
- also called pamphlet
20 Clues: TV • electronic mail • a written medium • mobile phone or CP • also known as film • network of networks • also called pamphlet • used for advertising • used in radio stations • structured form of play • express ideas by images • telecommunications device • housing for magnetic tape • oldest form of print media • to promote or sell a product • outdoor advertising structure • ...
Christopher Perez-crossword-1 2016-10-24
Across
- A computer network that links smaller computer networks everywhere
- ctrl+u
- controls info you see on the computer
- feeds the electrical power(techchore)
- a piece of computer equipment where information can be stored
- primary memory
- device used to send data
- considered the brain
- ctrl+c
Down
- primary archival storage
- ctrl+v
- ctrl+x
- The ability to use information and communicate information
- Read only memory
- acts as a control
- world wide web
- ctrl+z
- The enclosure for the main
- random aces memory
- main circuit board
20 Clues: ctrl+v • ctrl+x • ctrl+u • ctrl+z • ctrl+c • world wide web • primary memory • Read only memory • acts as a control • random aces memory • main circuit board • considered the brain • primary archival storage • device used to send data • The enclosure for the main • controls info you see on the computer • feeds the electrical power(techchore) • ...
Prefixes and Suffixes Lessons 4 and 5 2023-12-12
Across
- having the 'quality of' frost
- 'causing' to act on impulse
- a road cutting 'between' another road
- 'not' making sense
- 'not' toxic
- 'causing' something to be destroyed
- having the 'quality of' stone
- 'without' a bottom
- 'without' worth
- the 'state of' being blind
- 'under'ground transportation
Down
- the 'state of' being kind
- 'full of' shame
- to be 'too' confident
- the act of carrying 'across'
- to be 'too' anxious
- to 'put into' danger
- vehicle that goes 'under' the sea
- 'full of' dread
- networks that exist 'between' each other
20 Clues: 'not' toxic • 'full of' shame • 'full of' dread • 'without' worth • 'not' making sense • 'without' a bottom • to be 'too' anxious • to 'put into' danger • to be 'too' confident • the 'state of' being kind • the 'state of' being blind • 'causing' to act on impulse • the act of carrying 'across' • 'under'ground transportation • having the 'quality of' frost • having the 'quality of' stone • ...
Cybersecurity Crossword Puzzle 2025-03-13
Across
- Unwanted email messages
- Hides internet browsing activity
- Software flaw exposing systems
- Software detecting cyber threats
- Person tricked into hacking
- Secret key for authentication
- Authentication requiring two factors
- Tracks and records keystrokes
- Deceptive attack to steal info
Down
- Unauthorized code execution attack
- Fake email for stealing data
- Attack security vulnerabilities
- Malicious software category
- Scrambles data for security
- Multiple accounts, one password
- Cybersecurity framework for networks
- Malicious program holding data hostage
- Unauthorized access attempt
- Digital fingerprint identifier
- Cyber attack flooding network packets
20 Clues: Unwanted email messages • Malicious software category • Scrambles data for security • Person tricked into hacking • Unauthorized access attempt • Fake email for stealing data • Secret key for authentication • Tracks and records keystrokes • Software flaw exposing systems • Digital fingerprint identifier • Deceptive attack to steal info • Attack security vulnerabilities • ...
Engineering Careers 2023-09-27
10 Clues: Lee • argon • Eiffel Tower • energy networks • that study earth • zsoaring baseball • design surveys,onions polls • Building and operating smart • such as transportation systems • Cryogenics liquids are, nitrogen,
