networks Crossword Puzzles
James's internet crossword 2022-05-03
Across
- computer-based application for the exchange of messages between users
- a device that stores data packets
- to transmit data from one computer system to another through means of a network
- a hierarchical naming system built on a distributed database for computers
- a family of wired computer networking technologies commonly used in local area networks
- a thing made for a particular purpose
- the electronic devices used to store data
- the ordinary copper wire that connects home and business computers to the telephone company
- one billion bits
Down
- to receive data from a remote system, typically a server such as a web server
- an organization that provides services for
- a electronic device for storing data
- The distance from the ray to the curve
- the overall time something takes to complete
- a sequence of instructions in a programming language that a computer can execute or interpret
- a piece of computer hardware or software that accesses a service made available by a server as part of the client–server model of computer networks.
- the wireless technology used to connect computers, tablets, smartphones and other devices to the internet
- a piece of computer hardware or software that provides functionality for other programs or devices
- the Internet.
19 Clues: the Internet. • one billion bits • a device that stores data packets • a electronic device for storing data • a thing made for a particular purpose • The distance from the ray to the curve • the electronic devices used to store data • an organization that provides services for • the overall time something takes to complete • ...
Computer Class 8 2024-10-27
Across
- A group of computers connected to share resources and data
- A code element in HTML that defines parts of a webpage, like <p> for paragraph
- The amount of data that can be transmitted in a network per second
- A styling language used with HTML to design the appearance of web pages
- A set of instructions given to solve a specific problem
- Software like Chrome or Firefox used to view web pages
- A device that connects different networks and directs data between them
- A clickable link that leads to another webpage or resource
- A local network connecting computers within a small area, like a building
- A wired technology for connecting computers in a local network
- A set of rules for how data is transmitted across networks
Down
- Software like MS Excel used to organize data in rows and columns
- The main page of a website, where navigation usually begins
- Additional information inside an HTML tag, like color or width
- The address used to access a specific web page on the internet
- A device that connects a local network to the internet
- A wide network connecting computers over large areas, like a country
- A wireless technology for connecting devices to a network
- The language used to create and structure web pages
19 Clues: The language used to create and structure web pages • A device that connects a local network to the internet • Software like Chrome or Firefox used to view web pages • A set of instructions given to solve a specific problem • A wireless technology for connecting devices to a network • A group of computers connected to share resources and data • ...
Cybersecurity 2025-06-27
Across
- Malware hidden inside another program.
- A ransomware that attacks networks using a protocol that helps computers communicate with printers and other devices
- Mechanism to run program
- Vulnerability of a system or program that manages to cede control to unauthorized persons.
Down
- Technology that allows the extension of the local area network a public network such as the Internet.
- software that allows anonymous access to the Internet through a series of virtual tunnels or sub-layers that prevent direct connection to the network.
- Exposure of private information.
- Tool that captures data packets on a network.
- Malware that copies itself and spreads across networks
9 Clues: Mechanism to run program • Exposure of private information. • Malware hidden inside another program. • Tool that captures data packets on a network. • Malware that copies itself and spreads across networks • Vulnerability of a system or program that manages to cede control to unauthorized persons. • ...
NETWORKING 2025-06-29
10 Clues: TO INTERACT • NETWORK OF NETWORK • GROUP OF COMPUTERS • USED FOR SHORT DISTANCE • MODULATOR & DEMODULATOR • CHOOSES THE SHORTEST PATH • CONNECTS MULTIPLE NETWORKS • SIGNALS ELECTRO MAGNETIC RADIATION • WIDE WEB VAST INFORMATION • TECHNOLOGY CONNECTING WITHOUT CABLES
AI Themed Word Search 2024-07-03
Crossword puzzle 2024-09-26
Across
- data that has been processed, organized, and interpreted to add meaning and value.
- a group of interconnected nodes or computing devices that exchange data and resources with each other.
- a piece of hardware that is used to output data that has been previously entered into a computer or similar processing device
- is a communication method that uses electronic devices to deliver messages across computer networks.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- information that has been translated into a form that is efficient for movement or processing.
- a set of instructions, data or programs used to operate computers and execute specific tasks.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- Any digital moving picture, which includes a computer file in video formats such as MP4, MOV, M4V, AVI, DivX or FLV.
- is a website designed to make it easy for users to create entries in chronological order.
Down
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- is a device that connects two or more packet-switched networks or subnetworks.
- an electronic communications network that connects computer networks and organizational computer facilities around the world.
- refers to software that requires no paid licenses to use the application, no fees or donations, no restrictions on how many times you can download or open the program, and no expiration date.
- a piece of equipment used to provide data and control signals to an information processing system.
- is a collection of files accessed through a web address, covering a particular theme or subject, and managed by a particular person or organization.
- input device used to enter characters and functions into the computer system by pressing buttons, or keys.
- a hand-held pointing device that detects two-dimensional motion relative to a surface.
- a visual representation of something.
- the field of technology concerned with recording, processing, storing and delivering audible sound using electricity.
20 Clues: a visual representation of something. • is a device that connects two or more packet-switched networks or subnetworks. • data that has been processed, organized, and interpreted to add meaning and value. • a hand-held pointing device that detects two-dimensional motion relative to a surface. • ...
Company Organization checkpoint 2025-10-30
11 Clues: charity • reorganize • dismissals • sole trader • the top executive • manage a business • group of directors • level of management • part of a larger company • someone who bought shares of a business • something to do with computers and networks
cyber crime 2024-11-07
Across
- - A secret string of characters used for authentication.
- - Part of the internet that requires special software to access, often associated with illicit activities.
- - Server that acts as an intermediary for requests from clients seeking resources from other servers.
- - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- - Engineering technique that tricks people into giving away confidential information.
- - Collection of computers and devices connected for communication and resource sharing.
- - Technique of disguising communication from an unknown source as being from a known, trusted source.
- - Software update to fix bugs or vulnerabilities (same as Across).
- - A security system that controls incoming and outgoing network traffic.
- - A deceptive scheme intended to cheat or defraud someone.
Down
- - Person who gains unauthorized access to computer systems.
- - Software that gathers information from a computer without permission.
- - A software update that fixes vulnerabilities or improves functionality.
- - A software tool designed to take advantage of a security flaw.
- - Money demanded by hackers in exchange for access to compromised data.
- - Software that automatically displays or downloads advertising material.
- - Malicious software that gives unauthorized access to a computer system.
- - Malicious code that infects computer files and spreads to others.
- - A type of malware that spreads copies of itself across networks.
- - Prefix related to computers or computer networks.
20 Clues: - Prefix related to computers or computer networks. • - A secret string of characters used for authentication. • - A deceptive scheme intended to cheat or defraud someone. • - Person who gains unauthorized access to computer systems. • - A software tool designed to take advantage of a security flaw. • ...
Assignment Two 2019-06-06
Across
- Future leaders will need to shift from being a director to a _________.
- The perception models to enhance_____includes :Mental model, ladder of inference, frame reflection, iceberg model, scenario planning, cynefin framework.
- The four major components necessary for ensuring that organizations are prepared for IR4 and leadership: include (a phased transition, networked learning, culture program, and _____initiatives).
- The term _______intelligence relates to the ability to build, contribute, and manage the power and energy found in networks of people.
- ________networks are more social-centric and relational that support knowledge creation and sharing in social networks.
- The ____ intelligence theory is the idea that flocks, swarms, schools, colonies, and humans behave more intelligently as a collective rather than as an individual species.
Down
- The author of the textbook maintained that there needs to be a shift away from developing leaders ________through organizationally led and force-fed restrictive reframing tools towards a cognitive readiness and vertical growth approach to developing leaders.
- The four stages of _______ include: unconscious incompetence (‘I don’t know what I don’t know’); conscious incompetence (‘I know that I don’t know’);conscious competence (‘I know that I know’) and unconscious competence (‘I already know …’)
- There will exist two gears in the change process that will build momentum. Gear 1 will include the setup of collaborative networks to work alongside the traditional structures. Gear 2 will require internal ________to merge divisions and silos into larger domains.
- The three types of organizational networks include: centralized, decentralized, and _______networks.
- Rob Cross proposed four steps to building an effective ____: These steps include: Analyze your network by classifying in what way individuals benefit you; De-layer your network by stepping back from ineffective connections; Diversify your network by including more enabling connections; Capitalize your network by being active with the network you have selected.
- The ________(traditional) network, sometimes known as the ‘hub and spoke’ system, from a bicycle wheel, is an organizationally prescribed network which reinforces ego and positional power.
- The basic considerations for of creating an open, collaborative network include: ________, friendly competition of ideas, and mechanisms to narrow choice.
- The three sets of actions that organizational decision-makers needs to be focusing on with regard to future- proofing the organization for leadership 4.0 are: structure, connection, and ______
14 Clues: Future leaders will need to shift from being a director to a _________. • The three types of organizational networks include: centralized, decentralized, and _______networks. • ________networks are more social-centric and relational that support knowledge creation and sharing in social networks. • ...
Assignment Two 2019-06-06
Across
- Future leaders will need to shift from being a director to a _________.
- The three types of organizational networks include: centralized, decentralized, and _______networks.
- Rob Cross proposed four steps to building an effective ____: These steps include: Analyze your network by classifying in what way individuals benefit you; De-layer your network by stepping back from ineffective connections; Diversify your network by including more enabling connections; Capitalize your network by being active with the network you have selected.
- The ________(traditional) network, sometimes known as the ‘hub and spoke’ system, from a bicycle wheel, is an organizationally prescribed network which reinforces ego and positional power.
- There will exist two gears in the change process that will build momentum. Gear 1 will include the setup of collaborative networks to work alongside the traditional structures. Gear 2 will require internal ________to merge divisions and silos into larger domains.
- The author of the textbook maintained that there needs to be a shift away from developing leaders ________through organizationally led and force-fed restrictive reframing tools towards a cognitive readiness and vertical growth approach to developing leaders.
- ________networks are more social-centric and relational that support knowledge creation and sharing in social networks.
- The three sets of actions that organizational decision-makers needs to be focusing on with regard to future- proofing the organization for leadership 4.0 are: structure, connection, and ______
Down
- The four major components necessary for ensuring that organizations are prepared for IR4 and leadership: include (a phased transition, networked learning, culture program, and _____initiatives).
- The basic considerations for of creating an open, collaborative network include: ________, friendly competition of ideas, and mechanisms to narrow choice.
- The ____ intelligence theory is the idea that flocks, swarms, schools, colonies, and humans behave more intelligently as a collective rather than as an individual species.
- The perception models to enhance_____includes :Mental model, ladder of inference, frame reflection, iceberg model, scenario planning, cynefin framework.
- The term _______intelligence relates to the ability to build, contribute, and manage the power and energy found in networks of people.
- The four stages of _______ include: unconscious incompetence (‘I don’t know what I don’t know’); conscious incompetence (‘I know that I don’t know’);conscious competence (‘I know that I know’) and unconscious competence (‘I already know …’)
14 Clues: Future leaders will need to shift from being a director to a _________. • The three types of organizational networks include: centralized, decentralized, and _______networks. • ________networks are more social-centric and relational that support knowledge creation and sharing in social networks. • ...
Crossword 2021-03-10
Across
- it is a computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- They are generally used to connect computers in a LAN.
- also can be called as bridging hub.
Down
- it is a networking device that forwards data packets between computer networks.
- a key stopping point for data on its way to or from other networks.
- It is a circuit board installed in a computer that provides a dedicated network connection to the computer.
6 Clues: also can be called as bridging hub. • They are generally used to connect computers in a LAN. • a key stopping point for data on its way to or from other networks. • it is a networking device that forwards data packets between computer networks. • It is a circuit board installed in a computer that provides a dedicated network connection to the computer. • ...
Technology Terms 2016-02-22
Across
- <strong>
- software and data are stored as a
- hypertext_____ language
- local area network
- (sender/reciever active) communication
- legal right to material
- computer program or a device that provides functionality
- wide area networks
- component that stores data
Down
- IP ____
- related group of networked computers
- internet service provider
- pictures graphics movies
- person or program successfully masquerades as another
- wire optical fiber
15 Clues: IP ____ • <strong> • local area network • wire optical fiber • wide area networks • hypertext_____ language • legal right to material • pictures graphics movies • internet service provider • component that stores data • software and data are stored as a • related group of networked computers • (sender/reciever active) communication • person or program successfully masquerades as another • ...
Electronics parts 2022-09-22
Across
- apps or brands
- shows information
- connect with eachother
- physical componets
- in control
- stores your data
- makes thing faster
- saves important stuff
- get anywhere in the internet
- connect other stuff
- networks
- programmed to do tasks
- wall for viruses
- easier to access websites
Down
- it allows you to type
- keeps the internet
- codes in the computer
- saves stuff
- records info
- helps people search
- connects internet to service provider
- recommendations
- research purpose
- connect people to data
- saves you from using data
25 Clues: networks • in control • saves stuff • records info • apps or brands • recommendations • stores your data • research purpose • wall for viruses • shows information • keeps the internet • physical componets • makes thing faster • helps people search • connect other stuff • it allows you to type • codes in the computer • saves important stuff • connect with eachother • connect people to data • ...
engineer cRaZy crossword 2020-09-23
Across
- programs languages in electronics
- fixes pipeline leaks
- eliminates product waste
- perform mechanical, electrical, and civil engineering
- biology
- Makes 3D Modeling stuff
- makes safe habitats for animals
- make airplanes
- biomedical equipment
- control coastal environments
- makes solutions for things
Down
- maintain standard for manufacture product
- Maintains X-Ray equipment
- designs computers
- designs power-producing machines
- battery
- works on software development
- control and help water
- Makes software for things
- solve financial problems
- manage networks
- data systems
- leads the engineers
23 Clues: battery • biology • data systems • make airplanes • manage networks • designs computers • leads the engineers • fixes pipeline leaks • biomedical equipment • control and help water • Makes 3D Modeling stuff • eliminates product waste • solve financial problems • Maintains X-Ray equipment • Makes software for things • makes solutions for things • control coastal environments • ...
Forms of Media 2016-09-02
Across
- contains stories, essays, pics, etc.
- express ideas by images
- housing for magnetic tape
- electronic mail
- discussion or informational site; consisting of discrete entries
- mobile phone or CP
- regularly published; one main topic
- most popular form of print-media
- TV
- also known as film
- used for advertising
Down
- structured form of play
- a written medium
- oldest form of print media
- used in radio stations
- telecommunications device
- outdoor advertising structure
- to promote or sell a product
- network of networks
- also called pamphlet
20 Clues: TV • electronic mail • a written medium • mobile phone or CP • also known as film • network of networks • also called pamphlet • used for advertising • used in radio stations • structured form of play • express ideas by images • telecommunications device • housing for magnetic tape • oldest form of print media • to promote or sell a product • outdoor advertising structure • ...
Christopher Perez-crossword-1 2016-10-24
Across
- A computer network that links smaller computer networks everywhere
- ctrl+u
- controls info you see on the computer
- feeds the electrical power(techchore)
- a piece of computer equipment where information can be stored
- primary memory
- device used to send data
- considered the brain
- ctrl+c
Down
- primary archival storage
- ctrl+v
- ctrl+x
- The ability to use information and communicate information
- Read only memory
- acts as a control
- world wide web
- ctrl+z
- The enclosure for the main
- random aces memory
- main circuit board
20 Clues: ctrl+v • ctrl+x • ctrl+u • ctrl+z • ctrl+c • world wide web • primary memory • Read only memory • acts as a control • random aces memory • main circuit board • considered the brain • primary archival storage • device used to send data • The enclosure for the main • controls info you see on the computer • feeds the electrical power(techchore) • ...
Prefixes and Suffixes Lessons 4 and 5 2023-12-12
Across
- having the 'quality of' frost
- 'causing' to act on impulse
- a road cutting 'between' another road
- 'not' making sense
- 'not' toxic
- 'causing' something to be destroyed
- having the 'quality of' stone
- 'without' a bottom
- 'without' worth
- the 'state of' being blind
- 'under'ground transportation
Down
- the 'state of' being kind
- 'full of' shame
- to be 'too' confident
- the act of carrying 'across'
- to be 'too' anxious
- to 'put into' danger
- vehicle that goes 'under' the sea
- 'full of' dread
- networks that exist 'between' each other
20 Clues: 'not' toxic • 'full of' shame • 'full of' dread • 'without' worth • 'not' making sense • 'without' a bottom • to be 'too' anxious • to 'put into' danger • to be 'too' confident • the 'state of' being kind • the 'state of' being blind • 'causing' to act on impulse • the act of carrying 'across' • 'under'ground transportation • having the 'quality of' frost • having the 'quality of' stone • ...
Cybersecurity Crossword Puzzle 2025-03-13
Across
- Unwanted email messages
- Hides internet browsing activity
- Software flaw exposing systems
- Software detecting cyber threats
- Person tricked into hacking
- Secret key for authentication
- Authentication requiring two factors
- Tracks and records keystrokes
- Deceptive attack to steal info
Down
- Unauthorized code execution attack
- Fake email for stealing data
- Attack security vulnerabilities
- Malicious software category
- Scrambles data for security
- Multiple accounts, one password
- Cybersecurity framework for networks
- Malicious program holding data hostage
- Unauthorized access attempt
- Digital fingerprint identifier
- Cyber attack flooding network packets
20 Clues: Unwanted email messages • Malicious software category • Scrambles data for security • Person tricked into hacking • Unauthorized access attempt • Fake email for stealing data • Secret key for authentication • Tracks and records keystrokes • Software flaw exposing systems • Digital fingerprint identifier • Deceptive attack to steal info • Attack security vulnerabilities • ...
Engineering Careers 2023-09-27
10 Clues: Lee • argon • Eiffel Tower • energy networks • that study earth • zsoaring baseball • design surveys,onions polls • Building and operating smart • such as transportation systems • Cryogenics liquids are, nitrogen,
Computer Network Concept 2023-11-20
Across
- a group of two or more computers connected with each other for sharing resources and information
- a computer network which spans over a large geographical area
- A computer network which distances over a small geographical
Down
- stands for "modulator-demodulator
- A bundle multiple network ports together to connect incoming and outgoing lines
- A device that forwards data packets along networks
- A computer network which connects two or more LAN networks
- A networking device that allows wireless connectivity to device
8 Clues: stands for "modulator-demodulator • A device that forwards data packets along networks • A computer network which connects two or more LAN networks • A computer network which distances over a small geographical • a computer network which spans over a large geographical area • A networking device that allows wireless connectivity to device • ...
CEO Mania 2024-10-01
10 Clues: CEO of X • CEO of IBM • CEO of Adobe • CEO of NetApp • CEO of YouTube • CEO of Zscaler • CEO of Alphabet • CEO of Microsoft • Co-founder of Workday • CEO of Palo Alto Networks
Data transmition Key terms 2022-10-21
Across
- transfer of small pieces of data across various networks.
- a device that connects two or more packet-switched networks or subnetworks.
- In networking, a ? is a small segment of a larger message.
- How long it takes for data packets to travel
Down
- data transfer capacity for a computer network in bits per second.
- refers to supplemental data (metadata) placed at the end of a block of data being stored or transmitted
- one or more transmitted data packets fail to arrive at their destinations
- is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
- beginning or front part of a packet.
- the carrying capacity of a packet or other transmission data unit.
10 Clues: beginning or front part of a packet. • How long it takes for data packets to travel • transfer of small pieces of data across various networks. • In networking, a ? is a small segment of a larger message. • data transfer capacity for a computer network in bits per second. • the carrying capacity of a packet or other transmission data unit. • ...
Networks and Internet 2014-09-02
9 Clues: 8 bits • World Wide Web • Another word for link • Referred to as information • Might be a charity on the internet • Two or more devices linked together • Protocol determines a way to behave • Hello Firefox this chrome how are you ? • converts a web address or URL into the correct IP address for the computer
Computer Networks -Introduction 2024-02-04
Across
- Carry message from host to host in a subnet
- Wearable Computers
- example Music Sharing
- Popular and mostly used in offices
- A Notebook in hotel room
- with two clients and one server
Down
- no fixed clients and servers
- to consumer Govt distributing tax form electronically
- Networks in unwired buildings
- Wireless LAN IEEE 802.11
10 Clues: Wearable Computers • example Music Sharing • Wireless LAN IEEE 802.11 • A Notebook in hotel room • no fixed clients and servers • Networks in unwired buildings • with two clients and one server • Popular and mostly used in offices • Carry message from host to host in a subnet • to consumer Govt distributing tax form electronically
Internet Hardware Vocabulary Review Game 2023-02-22
Across
- A digital security layer of protection that filter specific content that is input or outputted
- Adapts a computer to a certain line
- A computer that sits between different networks
- Converts digital signals from a router to a network circuit
- Hardware component that connects the computer to the network
Down
- A device that connects LANs into a larger LAN(Local Area Network)
- A device that segments networks into subnets or LAN segments
- defines the way in which Internet communications and other advanced services are provided on wireless mobile devices
- Combination of a transmitter/receiver in a single package
- A device that connects multiple devices and allows computers to send messages to each other without traffic
- A device that connects your home to your internet service provider
11 Clues: Adapts a computer to a certain line • A computer that sits between different networks • Combination of a transmitter/receiver in a single package • Converts digital signals from a router to a network circuit • A device that segments networks into subnets or LAN segments • Hardware component that connects the computer to the network • ...
Student A 2023-04-19
TECHNOOLOGAY 2022-04-13
10 Clues: meta WHO? • a ghost 😰 • silverware • tweet tweet • up the clock • no copy people • a lot of blocks • networks are private • it’s internet and foot • u want a woman but yo fakin it
Crossword 2025-08-25
10 Clues: paid message. • buys a product. • monetary value. • image or symbol. • good or service. • use of products. • identifies a product. • strategy to increase sales. • delivering a product for money. • used to connect five customers.
Computer Network 2025-04-02
Across
- A technique used to divide a large network into smaller, manageable subnetworks.
- A network topology where each device is connected to a central hub.
- A wireless networking standard used in local area networks.
- The process of converting readable data into a coded form to prevent unauthorized access.
Down
- A protocol used for transferring files between a client and a server.
- A protocol used for sending emails.
- Address) A unique identifier assigned to each device on a network.
- A network device that forwards data packets between computer networks.
- A hardware or software device that monitors and controls incoming and outgoing network traffic.
- A model that defines network communication in seven layers.
10 Clues: A protocol used for sending emails. • A wireless networking standard used in local area networks. • A model that defines network communication in seven layers. • Address) A unique identifier assigned to each device on a network. • A network topology where each device is connected to a central hub. • ...
Eating Together 2013-05-30
Across
- Parents, Brother, Sister, etc
- Do this at school
- Mcdonalds, Burger King, etc
- Boy + Girl = ?
- Something we all love
- Where you cook
- an organization that made you collect money from people on halloween in elementary school
- Each ethnicity has their own _____
- Needs
Down
- FB, twitter, etc are ______ networks
- Way of acting
- Healthy Foods
- Hanging with your ______.
- The young ones
14 Clues: Needs • Way of acting • Healthy Foods • Boy + Girl = ? • Where you cook • The young ones • Do this at school • Something we all love • Hanging with your ______. • Mcdonalds, Burger King, etc • Parents, Brother, Sister, etc • Each ethnicity has their own _____ • FB, twitter, etc are ______ networks • ...
Kevin Graham's crossword puzzle 2013-09-10
12 Clues: To renew • A web log • Damages files • A global network • Text or graphics • networks A community • Different exstensions • Part of a computer system • Gains access to computer files • A system of connected computers • A bully who teases people online • engine Software that searches and gathers info
Fictitious Library Crossword 2013-05-28
12 Clues: ? Agency • Legal Rights • Alpha numeric? • ?? Publication • It's all about me! • A collection of networks • I hold related information • Need to define your search? • I am a non serial publication • I can be a continuing resource • I hold authoritative information • Written works by a specific author
Capitolo 11 Percorso II 2021-02-25
12 Clues: the charger • the ringtone • I am reading. • I was drinking. • They are saying. • to leave a message • to call back later • We will be sending. • the social networks • to dial the wrong number • You (inf.) will be doing. • You (inf., pl.)will be eating.
Networking Requirements 2022-08-19
Across
- continuous and predictable simultaneous data block transfer.
- The gathering of devices connected in a single physical location, such as a building, office, or home
- The transmission of data over short distances between fixed and mobile devices and establishment of personal area networks
- Pre-loaded data sent over a network.
- Second Layer in the OSI model.
- the smallest data unit that a computer can sequence and save.
- Using a network without the permission of the network operator.
- a method of combining multiple analog or digital signals into a single signal over a common medium.
Down
- Creates a barrier between a secure and an unauthorized user.
- Two or more computers are linked together to share data.
- Used to link devices in a wired local area network (LAN) or wide area network (WAN).
- the location of temporary data.
- A central server that executes specialized software known as a(n) _______ controls client/server networks.
- Wireless network devices interact with one another using .
- The _______ address is the remarkable number assigned by the manufacturer to a network adapter.
15 Clues: Second Layer in the OSI model. • the location of temporary data. • Pre-loaded data sent over a network. • Two or more computers are linked together to share data. • Wireless network devices interact with one another using . • Creates a barrier between a secure and an unauthorized user. • continuous and predictable simultaneous data block transfer. • ...
puzzle corner 8 2024-09-23
Across
- High-speed storage located close to the CPU to improve processing speed.
- Malicious software that disguises itself as legitimate to trick users.
- A device that forwards data packets between computer networks
- A security system that monitors and controls incoming and outgoing network traffic
- The process of analyzing large sets of data to discover patterns and trends.
- The maximum amount of data that can be transmitted over a network in a given amount of time
- The standard markup language used to create web pages
Down
- A data type with only two possible values: true or false.
- The practice of protecting systems, networks, and programs from digital attacks
- The delay between a user's action and a system's response in a network.
- Supply A component that provides electrical power to a computer
- The practice of using remote servers hosted on the internet to store, manage, and process data
- A common method for connecting devices in a wired local area network (LAN).
- A large, powerful computer used for bulk data processing in organizations.
- A physical location where people can access the internet using Wi-Fi.
15 Clues: The standard markup language used to create web pages • A data type with only two possible values: true or false. • A device that forwards data packets between computer networks • Supply A component that provides electrical power to a computer • A physical location where people can access the internet using Wi-Fi. • ...
Information Extraction 2025-01-16
Cloud Computing Architecture 2013-12-16
Across
- / maximum amount of storage
- / the side the user sees
- / float of data
- / rule
- / #Neuland
- / secure copy of all data
- / multiple existence
- interface / UI
- processing / 0101 + 0110 = 1011
- server / untouchable server
Down
- device / HDD,SSD,SD etc.
- server / touchable server
- / synonym for program
- / prerequisite to use the medium
- / customer
- / maximum connectivity
- / the system side
- server / running solely one application
- computing system / the complete system
- server / administers the whole system
- / electronic letters
- / serves the networks needs
22 Clues: / rule • / customer • / #Neuland • interface / UI • / float of data • / the system side • / multiple existence • / electronic letters • / synonym for program • / maximum connectivity • device / HDD,SSD,SD etc. • / the side the user sees • server / touchable server • / secure copy of all data • / maximum amount of storage • / serves the networks needs • server / untouchable server • ...
ch.20 23 words 2019-12-13
Across
- fores or threats
- politically motivated attacks
- nation with all facilities
- commerce between nations
- creation plants animals
- culture elements
- disease
- difference men and women
- statement united nations declared
- cooperative Venture Sponsored
- process industrialization
- linkage computer networks
- person leaves his or her country
- placing high value
Down
- growth spread
- U.S. federal agency
- all financial interactions
- difference opinion political issues
- economic development that meets people needs
- transferring of genes
- 20th century attempt to increase food
- layer earth's upper atmosphere
- antiterrorism bill of 2001
23 Clues: disease • growth spread • fores or threats • culture elements • placing high value • U.S. federal agency • transferring of genes • creation plants animals • commerce between nations • difference men and women • process industrialization • linkage computer networks • all financial interactions • nation with all facilities • antiterrorism bill of 2001 • politically motivated attacks • ...
Cybersecurity 2023-08-23
Across
- Little card in your phone
- Unwanted email messages
- Being free from public attention
- Stores information on your computer
- Virus that spreads through network
- Attack a nation’s computer networks
- Intrudes on a device remotely
- Wireless data network
Down
- Malicious software
- Prevents device from functioning correctly
- Finger prints
- Secret combination
- Bypass security to gain access
- From an outside/unknown source
- Discarded digital devices
- Malicious software
- Scrambling information
- Tracks all pressed keys
- Copying files from a computer
- Hides inside another program
- Confirming the person is authentic
21 Clues: Finger prints • Malicious software • Secret combination • Malicious software • Wireless data network • Scrambling information • Unwanted email messages • Tracks all pressed keys • Little card in your phone • Discarded digital devices • Hides inside another program • Copying files from a computer • Intrudes on a device remotely • Bypass security to gain access • ...
Prenatal health and development 2016-07-16
12 Clues: 8 weeks • week 14 • stage 12 weeks • self confidence • greater knowledge • networks of people • the level of energy • bifida neural tube defects • connects foetus and placenta • growth of hard and soft tissue • syndrome chromosonal abnormality • syndrome when the brain doesn't recognise the stomach is full
Prenatal health and development 2016-07-16
12 Clues: week 14 • 8 weeks • stage 12 weeks • self confidence • greater knowledge • networks of people • the level of energy • bifida neural tube defects • connects foetus and placenta • growth of hard and soft tissue • syndrome chromosonal abnormality • syndrome when the brain doesn't recognise the stomach is full
CHAPTER 1- INTRODUCTION TO OB 2024-11-29
Across
- employee's in charge of what they do
- performance measure
- maintain networks outside workplace
- deal with socializing, politicking,etc
Down
- fail to report to work
- boarderless organisation
- study of societies
- monitor activities
- act as initiator
- works directly on a task
- withdraw from the organisation
- process of defining goals
12 Clues: act as initiator • study of societies • monitor activities • performance measure • fail to report to work • boarderless organisation • works directly on a task • process of defining goals • withdraw from the organisation • maintain networks outside workplace • employee's in charge of what they do • deal with socializing, politicking,etc
library Crossword 2013-05-24
10 Clues: ? Agency • Legal Rights • Denfine search • ?? Publication • Alpha numeric? • A collection of networks • I hold related information • Can be a continuing resource • I am a non serial publication • Written works by a specific author
Engineering Careers 2023-09-27
10 Clues: Lee • argon • Eiffel Tower • energy networks • that study earth • zsoaring baseball • design surveys,onions polls • Building and operating smart • such as transportation systems • Cryogenics liquids are, nitrogen,
business vocab crossword 2024-03-20
Across
- private networks typically used by orginazations for the sharing of company news, policies, documents and other information
- equipment and systems developed by applying scientific knowledge for practical purposes
- input device which transfers information and images from physical documents to computer files
- connections among computers to facilitate communication and sharing of resources
- programmable machine for storing, processing and retrieving data; includes desktops, laptops, tablets and smartphones
- wireless networking technology using radio waves to transport internet signals
Down
- global system of computer networks
- equipment and systems developed by applying scientific knowledge for practical purposes
- global network of remote servers which operate through the internet
- output device which produces physical versions of computer documents and images using paper and ink
- machine which makes exact duplicates of documents
11 Clues: global system of computer networks • machine which makes exact duplicates of documents • global network of remote servers which operate through the internet • wireless networking technology using radio waves to transport internet signals • connections among computers to facilitate communication and sharing of resources • ...
Vocab crosswords 2022-11-22
Across
- internet
- uses network to overcome technical problems
- assignable legal right
- network printers, scanners
- taking someone else's work
- devices maintain stored data when turned off
- universal serial bus
Down
- Security protects your network and data
- Drive electronic device contain flash memory
- local area network
- protect a network or system
- needed to install computer networks
- Internet etiquette
- irrelevant or unsolicited messages
- short term memory
- central processing unit
- use allows to copy without permission
- storage device
18 Clues: internet • storage device • short term memory • local area network • Internet etiquette • universal serial bus • assignable legal right • central processing unit • network printers, scanners • taking someone else's work • protect a network or system • irrelevant or unsolicited messages • needed to install computer networks • Security protects your network and data • ...
Social Media Keywords TEST1 2021-09-21
Across
- publish on a blog
- buy
- impolite
- recommend
- private life
- Facebook and Instagram are social …
- emotionally touched
- a person who uses their strength or power to frighten or hurt weaker people
- delete
- menace (v.)
- the act of giving wrong information about something
- information
Down
- shocking
- trustworthy
- a person who uses negative and critical comments
- malevolent
- online harassment
- friends can give you … to help you in difficult situations
- to sign in a social network you need a … and a password
- distract
20 Clues: buy • delete • shocking • impolite • distract • recommend • malevolent • trustworthy • menace (v.) • information • private life • publish on a blog • online harassment • emotionally touched • Facebook and Instagram are social … • a person who uses negative and critical comments • the act of giving wrong information about something • to sign in a social network you need a … and a password • ...
Cybersecurity Crossword Puzzle 2023-07-26
Across
- Prevents unauthorized access.
- Unauthorized alteration of data.
- (Common Vulnerabilities and Exposures) Software vulnerability database.
- Flaws Software vulnerabilities.
- Breach Stealing sensitive data.
- Misleading email attacks.
- Malware with a harmful payload.
- Unauthorized access to data.
- Common entry point for attacks.
- Malware that hides within legitimate software.
- Engineering Attacks exploiting human behavior.
Down
- Encrypting communication data.
- Control Access rights limitation.
- Insecure code exploit.
- Scrambling data for security.
- Protects from viruses.
- Removing sensitive data.
- Malicious self-replicating code.
- Protects data from unauthorized changes.
- Malware that spreads via networks.
20 Clues: Insecure code exploit. • Protects from viruses. • Removing sensitive data. • Misleading email attacks. • Unauthorized access to data. • Prevents unauthorized access. • Scrambling data for security. • Encrypting communication data. • Flaws Software vulnerabilities. • Breach Stealing sensitive data. • Malware with a harmful payload. • Common entry point for attacks. • ...
Cybersecurity Crossword Puzzle 2024-06-07
Across
- Hint: Mends security holes.
- Hint: Blocks unauthorized access.
- Hint: Digital fingerprint.
- Hint: Protects data in transit.
- Hint: Dock for data transfer.
- Hint: Concealing information using codes.
- Hint: Echo request.
- Hint: Padlock for websites.
- Hint: Sounds like a sharp inhale.
- Hint: Base of a tree.
Down
- Hint: Neutral ground.
- Hint: Inbox clutter.
- Hint: Crawling through networks.
- Hint: Cyber mischief.
- Hint: Shields your identity.
- Hint: Infectious code.
- Hint: Minor glitch.
- Hint: Sounds like a fishing technique.
- Hint: Private internet highway.
- Hint: Automated program.
20 Clues: Hint: Minor glitch. • Hint: Echo request. • Hint: Inbox clutter. • Hint: Neutral ground. • Hint: Cyber mischief. • Hint: Base of a tree. • Hint: Infectious code. • Hint: Automated program. • Hint: Digital fingerprint. • Hint: Mends security holes. • Hint: Padlock for websites. • Hint: Shields your identity. • Hint: Dock for data transfer. • Hint: Protects data in transit. • ...
The influence of social networks 2012-10-21
Across
- If you want someone to become your friend on Facebook, you send him a ...
- He's giving too much personal details, he's ...
- The person who ... secret information about the royals to the press, can be fined for this.
- Most information on social networks isn't ..., because people who are connected to you can see your profile.
- On Facebook you can ... old friends, but it isn't like in real life.
- He was talkig to people who can help him in his professional life, he was ...
- You have to beware ... your personal information on social networks.
Down
- If you create an account on Facebook, you have to adapt your ..., otherwise everyone can see your pictures and comments.
- To observe
- When you have a profile on a social network, you have to ... it.
- The spread of something
11 Clues: To observe • The spread of something • He's giving too much personal details, he's ... • When you have a profile on a social network, you have to ... it. • On Facebook you can ... old friends, but it isn't like in real life. • You have to beware ... your personal information on social networks. • ...
Test 2021-02-03
Across
- Continuous change
- A platform of ____
- World Class ____
- Yours matters
- Our 5G factory in the US is here
- d
- Strategy execution streams
- Now available for 5G RAN
- The social network
- Make yourself heard
- Business Area
- Up in the sky
- Next generation Supply and _____
Down
- Our North Star to 2025
- Win the Technology ____
- The Head of BNEW
- We have the strongest in the market
- Compete on ____
- Foundation of our culture journey
- _____ excellence
- They choose us over competition
- Our strategy is built on this leadership
- Not walked
23 Clues: d • Not walked • Yours matters • Business Area • Up in the sky • Compete on ____ • The Head of BNEW • World Class ____ • _____ excellence • Continuous change • A platform of ____ • The social network • Make yourself heard • Our North Star to 2025 • Win the Technology ____ • Now available for 5G RAN • Strategy execution streams • They choose us over competition • Our 5G factory in the US is here • ...
3PS2 Technology, Relationship idioms 2021-10-25
Across
- to tolerate
- not efficient or productive
- anything that makes life easier
- to bring together features or ideas
- resemble a family member
- a device that transfers data between networks
- education after high school
- ugly
- grand and impressive in appearance
- have a good relationship with
Down
- easily access evth
- fight and stop being friends
- prisoner
- not useful
- not easily carried, handled, or managed
- to stop doing
- made by hand
- not too expensive
- length of time you can concentrate
- pile
20 Clues: pile • ugly • prisoner • not useful • to tolerate • made by hand • to stop doing • not too expensive • easily access evth • resemble a family member • not efficient or productive • education after high school • fight and stop being friends • have a good relationship with • anything that makes life easier • length of time you can concentrate • grand and impressive in appearance • ...
Cloud Computing Architecture 2013-12-16
Across
- / customer
- server / untouchable server
- / maximum amount of storage
- / prerequisite to use the medium
- / maximum connectivity
- server / running solely one application
- device / HDD,SSD,SD etc.
- / secure copy of all data
- / multiple existence
- end / the side the user sees
- server / touchable server
- server / administers the whole system
- interface / UI
Down
- / float of data
- / electronic letters
- / synonym for program
- / #Neuland
- end / the system side
- / serves the networks needs
- processing / 0101 + 0110 = 1011
- / rule
- computing system / the complete system
22 Clues: / rule • / customer • / #Neuland • interface / UI • / float of data • / electronic letters • / multiple existence • / synonym for program • end / the system side • / maximum connectivity • device / HDD,SSD,SD etc. • / secure copy of all data • server / touchable server • server / untouchable server • / maximum amount of storage • / serves the networks needs • end / the side the user sees • ...
Cloud Computing Architecture 2014-01-12
Across
- electronic letters
- serves the networks needs
- I'm not a program!
- the system side
- HDD,SSD,SD etc.
- touchable server
- maximum connectivity
- running solely one application
- float of data
- prerequisite to use the medium
- customer
- the side the user sees
- Floating in the sky
Down
- untouchable server
- the complete system
- multiple existence
- secure copy of all data
- 0101 + 0110 = 1011
- #Neuland
- administers the whole system
- UI
- synonym for program
- maximum amount of storage
- rule
24 Clues: UI • rule • #Neuland • customer • float of data • the system side • HDD,SSD,SD etc. • touchable server • untouchable server • multiple existence • electronic letters • 0101 + 0110 = 1011 • I'm not a program! • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • serves the networks needs • maximum amount of storage • ...
"The Continuous Exchange. Nnadozie . Pd 1" 2024-10-21
Across
- Arab merchant's domestic transportation
- Money certificates
- Confucianism,+Daiosm & Buddhism
- Invasions formed _ relationships
- Roadside hotel
- Fleas,Rats,and other rodents
- Borobudur is located in...
- The transfer of goods,ideas,and tech
- Sea Cargo,trade,and exploration
- The kingdom of Mansa Musa
Down
- The distribution of diversity
- New crops,who dis?
- King of gold
- Monks mound
- Spoken by African's written in Arbic
- Canyon of networks
- "Ruthless raiders" of the sea
- Form of economic warfare
- Pony express
- The Seven Voyages was led by..
20 Clues: Monks mound • King of gold • Pony express • Roadside hotel • New crops,who dis? • Money certificates • Canyon of networks • Form of economic warfare • The kingdom of Mansa Musa • Borobudur is located in... • Fleas,Rats,and other rodents • The distribution of diversity • "Ruthless raiders" of the sea • The Seven Voyages was led by.. • Confucianism,+Daiosm & Buddhism • ...
Career Choices 2025-04-04
Across
- Operates camera for movies or shows
- Cuts and styles hair
- Helps people with mental health issues
- Designs graphics and digital art
- Analyzes financial data
- Performs surgeries
- Writes books
- fitness Provides training
- person who teaches students
- Manages company finances
- Cooks food professionally
Down
- Creates computer networks
- professional who treats sick animals
- Studies planets and stars
- Protects and preserves wildlife
- Sings or performs music
- Tests and develops medicines
- Creates art pieces
- Builds and repairs structures
- Someone who defends people in court
- Runs a business
21 Clues: Writes books • Runs a business • Performs surgeries • Creates art pieces • Cuts and styles hair • Analyzes financial data • Sings or performs music • Manages company finances • Creates computer networks • Studies planets and stars • fitness Provides training • Cooks food professionally • person who teaches students • Tests and develops medicines • Builds and repairs structures • ...
Spanish 3H Unit 1 Vocab 1 2025-08-30
Across
- sometimes
- whiteboard/blackboard
- to dust the furniture
- melancholic
- open-minded
- proud
- playful
- to chat online
- to upload photos
- to do the shopping
- to think
- to surf the internet
Down
- to take out the trash
- committed
- computer (Spain)
- capable
- social networks
- student desks
- homework
- challenging, demanding
- lively
- never
- often, many times
- to have a good time
- cell phone
- to set the table
- passionate
- persistent
- to wash the clothes
- always
- mesa to clear the table
31 Clues: never • proud • lively • always • capable • playful • homework • to think • committed • sometimes • cell phone • passionate • persistent • melancholic • open-minded • student desks • to chat online • social networks • computer (Spain) • to set the table • to upload photos • often, many times • to do the shopping • to have a good time • to wash the clothes • to surf the internet • to take out the trash • whiteboard/blackboard • ...
spanish 2025-08-22
Across
- lively
- persistent
- compra to do the shopping
- to clear the table
- homework
- always
- capable
- playful
- often, many times
- student desks
- comitted
- passionate
- never
- computer (Spain)
- to surf the internet
Down
- social networks
- to wash the clothes
- to take out the trash
- challenging, demanding
- melancholic
- open-minded
- to think
- proud
- cell phone
- to have a good time
- to upload photos
- to set the table
- to chat online
- to dust the furniture
- whiteboard/blackboard
30 Clues: proud • never • lively • always • capable • playful • homework • to think • comitted • persistent • cell phone • passionate • melancholic • open-minded • student desks • to chat online • social networks • to upload photos • to set the table • computer (Spain) • often, many times • to clear the table • to wash the clothes • to have a good time • to surf the internet • to take out the trash • to dust the furniture • ...
Aris Crossword 2022-11-09
12 Clues: the backbone • binary digits • portable memory • read-only memory • wide area network • short-term memory • local area network • basic input/output system • network internal face card • is the brain of the computer • it handles all parts of the network • things to connect all networks together
Managing Risk 2023-03-08
Across
- A contract that defines the services,products, and time frames for the vendor to achieve.
- A location that consists of a building, facilities, desks,toilets, parking, and everything that a business needs except computers.
- A Document that defines what a person may and may not do on an organization’s computer and networks
- A document used to track the collection, handling, and transfer of evidence.
- The process of downgrading—undoing—a recently applied patch or updated.
- A document between a customer and a service provider that defines the scope, quality, and terms of the service to be provided.
Down
- Facility with all of the physical resources, computers, and network infrastructure to recover from a primary site disaster. A warm site does not have current backup data and it may take a day or more to recover and install backups before business operations can recommence.Aircrack-ng- An open source tool for penetration testing many aspects of wirless networks
- A set of procedures defining actions employees should perform to protect the network’s security.
- An open source tool for penetration testing many aspects of wirless networks
- A set of documents that Defines procedures for changes to the network.
10 Clues: A set of documents that Defines procedures for changes to the network. • The process of downgrading—undoing—a recently applied patch or updated. • An open source tool for penetration testing many aspects of wirless networks • A document used to track the collection, handling, and transfer of evidence. • ...
Crossword 2022-11-07
Across
- device that allows you to plug into an ISDN line
- combination transmitter/receiver for wireless, cables, fiber-optics, and etc
- blocking or permitting certain application/ports from coming in or out to prevent unauthorized access
- digital interface device to connect data terminal equipment like a router
Down
- networking device that joins 2 networks
- network node that connects 2 networks with different transmission protocols
- internet communications and advanced services standard
- hardware that allows device on a network to communicate with each other
8 Clues: networking device that joins 2 networks • device that allows you to plug into an ISDN line • internet communications and advanced services standard • hardware that allows device on a network to communicate with each other • digital interface device to connect data terminal equipment like a router • ...
EC402-OPTICAL COMMUNICATIONS AND NETWORKS 2016-06-26
Across
- Which color has the shortest wavelength of light -----
- When a beam of light enters one medium from another, which quantity will not change?
- Which material is sensitive to light?
- The wavelength of light has no role in ------
- The band of light wavelengths that are too long to be seen by the human eye
- An object nearer to a converging lens than its focal point always has a/an ______ image.
- Is a non-coherent light source foe optical communications system
- An object farther from a converging lens than its focal point always has a/an _____ image.
- ________ dispersion is caused by the difference in the propagation times of light rays that take different paths down a fibe
- If a mirror is used to reflect light, the reflected light angle is ____ as the incident angle
Down
- The real image formed by a spherical mirror is ____ relative to its object
- Which type of laser is the simplest to modulate directly by changing its excitation?
- Which diode is used as an optical receiver in fiber optics communications
- The band of light wavelengths that are too short to be seen by the human eye
- Photodiodes used as fiber optic directors are ------ bias
- The loss in signal power as light travels down a fiber is called-----
- What is the stage of the sand becoming a silicon?
- Which theory states that the light wave behaves as if it consists of many tiny particles?
- What generates a light beam of a specific visible frequency?
19 Clues: Which material is sensitive to light? • The wavelength of light has no role in ------ • What is the stage of the sand becoming a silicon? • Which color has the shortest wavelength of light ----- • Photodiodes used as fiber optic directors are ------ bias • What generates a light beam of a specific visible frequency? • ...
P2P vs client-server networks 2022-11-28
Across
- one or two devices (nodes) connected together
- citizen science project utilising P2P for scientific searches for intelligent extraterrestrial life
- decentralised social network where user data is kept on user-hosted "pods" and privacy is governed by "aspects"
- shared immutable database used in cryptocurrency transactions and exchange
- P2P audio file sharing application that existed between June 1999 and July 2001
- web browser supporting P2P web
- any device on a network
- network configuration where every participant can communicate without going through a centralised point
Down
- node fulfilling requests, e.g. serving files
- digital currency
- the maximum amount of data transmitted over an internet connection in a given amount of time
- form of decentralised digital currency transferred on P2P network
- communication protocol for P2P file sharing
- type of network connection, normally at home, where upload speeds are only a fraction of the download speeds
- number assigned to uniquely identify a connection endpoint and to direct data to a specific service
- node making requests
- computer hardware or software that provides functionality for other programs or devices
- standard for the short-range wireless interconnection
- protocol for distributed web
19 Clues: digital currency • node making requests • any device on a network • protocol for distributed web • web browser supporting P2P web • communication protocol for P2P file sharing • node fulfilling requests, e.g. serving files • one or two devices (nodes) connected together • standard for the short-range wireless interconnection • ...
Telstra Xmas Crossword 2023-11-28
Across
- Cable system (4,4,8)
- Favourite colour?
- A Hub market
- Never ending tagline
- Not an old Workplace
- Head of International Networks (5,6)
- A Telstra value
- Arise from the flames
Down
- He's transforming our business (4,5)
- Old TV show with PoP
- A Telstra partner
- Month of our first Changemakers week
- Customer self-serve portal (6,6)
- Solve this Ambition pillar
- IGT23 winner (7,4)
- A Telstra partner
- Number of DCs we can sell Colo from (7,5)
- A special day
18 Clues: A Hub market • A special day • A Telstra value • A Telstra partner • Favourite colour? • A Telstra partner • IGT23 winner (7,4) • Old TV show with PoP • Cable system (4,4,8) • Never ending tagline • Not an old Workplace • Arise from the flames • Solve this Ambition pillar • Customer self-serve portal (6,6) • He's transforming our business (4,5) • Month of our first Changemakers week • ...
Cloud Computing Architecture 2014-01-12
Across
- rule
- running solely one application
- synonym for program
- multiple existence
- electronic letters
- Floating in the sky
- administers the whole system
- #Neuland
- customer
- prerequisite to use the medium
- the system side
- serves the networks needs
Down
- secure copy of all data
- touchable server
- the complete system
- UI
- I'm not a program!
- 0101 + 0110 = 1011
- float of data
- maximum amount of storage
- untouchable server
- maximum connectivity
- HDD,SSD,SD etc.
- the side the user sees
24 Clues: UI • rule • #Neuland • customer • float of data • HDD,SSD,SD etc. • the system side • touchable server • I'm not a program! • 0101 + 0110 = 1011 • untouchable server • multiple existence • electronic letters • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • maximum amount of storage • serves the networks needs • ...
Cloud Computing Architecture 2014-01-12
Across
- administers the whole system
- running solely one application
- multiple existence
- I'm not a program!
- touchable server
- #Neuland
- synonym for program
- float of data
- prerequisite to use the medium
- customer
Down
- electronic letters
- maximum connectivity
- the complete system
- serves the networks needs
- secure copy of all data
- UI
- untouchable server
- 0101 + 0110 = 1011
- HDD,SSD,SD etc.
- the system side
- the side the user sees
- maximum amount of storage
- Floating in the sky
- rule
24 Clues: UI • rule • #Neuland • customer • float of data • HDD,SSD,SD etc. • the system side • touchable server • electronic letters • multiple existence • I'm not a program! • untouchable server • 0101 + 0110 = 1011 • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • serves the networks needs • maximum amount of storage • ...
Crossword Activity 2022-08-16
Across
- increase communication networks
- capital of Karnataka
- cut the wires
- cream children like this
- holiday of the week
- this animal has a long trunk
- he catch the rat
- costly car
- it flies in the sky
- national bird
Down
- King of the jungle
- collection of books
- a tool in use for cricket
- it is an outdoor game
- day for second day
- national animal of india
- 4th month of the year
- slow down
- it is a pet animal
- before you leap
- watch the home
21 Clues: slow down • costly car • cut the wires • national bird • watch the home • before you leap • he catch the rat • King of the jungle • day for second day • it is a pet animal • collection of books • holiday of the week • it flies in the sky • capital of Karnataka • it is an outdoor game • 4th month of the year • cream children like this • national animal of india • a tool in use for cricket • ...
Electronics parts 2022-09-22
Across
- apps or brands
- shows information
- connect with eachother
- physical componets
- in control
- stores your data
- makes thing faster
- saves important stuff
- get anywhere in the internet
- connect other stuff
- networks
- programmed to do tasks
- wall for viruses
- easier to access websites
Down
- it allows you to type
- keeps the internet
- codes in the computer
- saves stuff
- records info
- helps people search
- connects internet to service provider
- recommendations
- research purpose
- connect people to data
- saves you from using data
25 Clues: networks • in control • saves stuff • records info • apps or brands • recommendations • stores your data • research purpose • wall for viruses • shows information • keeps the internet • physical componets • makes thing faster • helps people search • connect other stuff • it allows you to type • codes in the computer • saves important stuff • connect with eachother • connect people to data • ...
La tecnología 2024-11-16
Across
- . (dot)
- to copy
- to log off
- to download
- to stream
- mouse
- the camera
- the cell phone
- keyboard
- the videogames
- paste
- battery
- link
- monitor
- the headphones
- / (slash)
- the printer
- to delete
Down
- website
- the computer
- to save
- to cut
- the applications
- the television
- @ at
- the networks
- to print
- com
- the technology
- the charger
- to browse/surf (the web)
- password
- to log on
- screen
- WiFi
35 Clues: com • @ at • link • WiFi • mouse • paste • to cut • screen • website • to save • . (dot) • to copy • battery • monitor • to print • keyboard • password • to stream • to log on • / (slash) • to delete • to log off • the camera • to download • the charger • the printer • the computer • the networks • the television • the cell phone • the technology • the videogames • the headphones • the applications • to browse/surf (the web)
Practice Cybersecurity Terminology Puzzle 2025-03-14
Across
- Data hostage for ransom
- Protection of networks from threats
- Update that fixes vulnerabilities
- Requires multiple identity proofs
- Information about cyber threats
- Malicious software that harms systems
- Encoding sensitive information
- Impersonation to obtain information
Down
- Vulnerability with no available patch
- Weakness in a system
- Distributed denial-of-service attack
- Verifying user identity
- Converting data into codes
- Longterm targeted cyberattack
- Secure internet connection
- Unauthorized access to systems
- Blocks unwanted traffic
- Software that detects malware
- Software that secretly monitors
- Continuous cybersecurity monitoring
20 Clues: Weakness in a system • Data hostage for ransom • Verifying user identity • Blocks unwanted traffic • Converting data into codes • Secure internet connection • Longterm targeted cyberattack • Software that detects malware • Unauthorized access to systems • Encoding sensitive information • Information about cyber threats • Software that secretly monitors • ...
spainsh man 2025-03-21
Across
- text message
- the signing
- social networks
- the pool
- at home
- the lake
- the hospial
- the beach
- the mail
- the church
- the store
- to record videos
- the super market
- the school
- the cinema
- lol
Down
- the restaurant
- the email
- the museum
- to tweet
- the mountains
- the screen
- the cell phone
- the field
- past
- the shopping center
- the park
- click
- the bank
- the city
- the coffee
- the town
- the square
33 Clues: lol • past • click • at home • to tweet • the pool • the park • the lake • the bank • the city • the mail • the town • the email • the field • the beach • the store • the museum • the screen • the coffee • the church • the square • the school • the cinema • the signing • the hospial • text message • the mountains • the restaurant • the cell phone • social networks • to record videos • the super market • the shopping center
Vocabulario de Unit 1 2025-08-21
Across
- to have a good time
- to chat online
- to do the shopping
- open-minded
- playful
- capable
- challenging,demanding
- to take out the trash
- social networks
- passionate
- cell phone
- the students' desks
- to clear the table
- persistent
- to think
- whiteboard/blackboard
Down
- proud
- homework
- to surf the internet
- always
- to dust the furniture
- lively
- sometimes
- to set the table
- to wash the clothes
- often, many times
- computer (Spain)
- to upload photos
- committed
- never
- melancholic
31 Clues: proud • never • always • lively • playful • capable • homework • to think • sometimes • committed • passionate • cell phone • persistent • open-minded • melancholic • to chat online • social networks • to set the table • computer (Spain) • to upload photos • often, many times • to do the shopping • to clear the table • to have a good time • to wash the clothes • the students' desks • to surf the internet • to dust the furniture • ...
Telecom Basics 2021-02-05
Across
- A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient.
- Process of confirming a valid user is accessing the website
- First company to launch a smart Phone
- devide that forwards data packets between computer networks
- Physical Link or circuit that connects Customers Wireline Telephone to the Service provider’s Local Exchange Carrier
- a set of rules which governs how networks operate
- data sent to your computer by a Web server that records your actions on a certain Web site
Down
- common technology used for data transfer within the range of 10 metres
- First Mobile service provider in india
- UK has OFCOM, India has ___
- The ability to retain the telephone number, while changing from one service provider to another
- Set of processes that makes ensures what has been promised to the customer is being delivered continuously
- area covered by cellular base station
- The kind of Billing where payment needs to be done before using the service
- Indian Mobile network is divided into zones which are almost based on state boundaries
15 Clues: UK has OFCOM, India has ___ • First company to launch a smart Phone • area covered by cellular base station • First Mobile service provider in india • a set of rules which governs how networks operate • Process of confirming a valid user is accessing the website • devide that forwards data packets between computer networks • ...
computing 2022-02-09
Across
- software that would be most appropriate to use to send an attached document to lots of people at the same time
- wired networks send data along ------
- the law protects the control you have over the things that you create
Down
- it is an electronic communication to bully others
- it is the worldwide network of computers
- protection of information systems from unauthorized access or modification to information
- a device that connects multiple devices together
- networks send and receive messages in small units of data known as ------
8 Clues: wired networks send data along ------ • it is the worldwide network of computers • a device that connects multiple devices together • it is an electronic communication to bully others • the law protects the control you have over the things that you create • networks send and receive messages in small units of data known as ------ • ...
Computer Virus 2024-07-07
Across
- A program designed to detect and remove viruses and other malicious software.
- Software designed to damage or disable computers and computer systems.
- A program that can replicate itself and spread to other computers.
- Crime involving computers and networks.
Down
- A system designed to prevent unauthorized access to or from a private network.
- A type of malicious software that disguises itself as legitimate software.
- A global network connecting millions of private, public, academic, business, and government networks.
- Software that collects information about online activities without the user's knowledge.
8 Clues: Crime involving computers and networks. • A program that can replicate itself and spread to other computers. • Software designed to damage or disable computers and computer systems. • A type of malicious software that disguises itself as legitimate software. • A program designed to detect and remove viruses and other malicious software. • ...
Cross word puzzle GDSC Web 2022-11-30
9 Clues: main memory • security wall • microsoft email • result of a code • Laptop input device • instance of a class • network of networks • device to write code • Executable (exe) file
COSC 100 Assignment 6 2015-09-29
Across
- popular search engine
- corrupts or destroys data
- visits sites, to build index based on keywords
- one of the jobs of the M&M team
- Mac text editor
- group of information
- major challenge of a large website
- neutral content
- text editor program
- related group of networked computers
Down
- exclusive legal right
- physically connected to ISP's modem
- links topics/point-and-click
- consent
- codes to create webpages
- gain unauthorized access
- educational domain
- networks not geographically close
18 Clues: consent • Mac text editor • neutral content • educational domain • text editor program • group of information • exclusive legal right • popular search engine • codes to create webpages • gain unauthorized access • corrupts or destroys data • links topics/point-and-click • one of the jobs of the M&M team • networks not geographically close • major challenge of a large website • ...
OCN 2013-08-21
Network Crossword IDT 2022-09-30
Across
- A device that accepts requests to view websites.
- A network that connects multiple computers in a small area like a room or a group of buildings
- A device inside of a computer that allows it to connect to various networks.
- A security device that filters what comes in and out of a network.
- A network that connects multiple computers across long distances.
- A network in which devices have a direct connection to as many other devices in that network as possible.
- A device that connects multiple separate networks.
Down
- A network in which all devices are connected to one central point.
- A device that receives and forwards packets across a network.
- A device used to connect multiple computers.
- A bunch of connected computers.
- A device that connect to a network and extends that connection, typically through Wi-Fi, to other devices.
12 Clues: A bunch of connected computers. • A device used to connect multiple computers. • A device that accepts requests to view websites. • A device that connects multiple separate networks. • A device that receives and forwards packets across a network. • A network that connects multiple computers across long distances. • ...
Internet (unit 2 vocab 1) 2025-10-13
Across
- The main high-capacity network infrastructure linking major regions of the Internet
- High-speed data transmission technology that uses pulses of light through thin glass cables
- A network that connects computers within a limited area such as one building
- A device that serves as an entry and exit point for data moving between networks
- A network that spans a large geographical area such as several cities or countries
- A method of transmitting data by breaking it into small packets and sending them separately across a network
- An old method of Internet access using a telephone line and modem
Down
- A device that directs data packets between computer networks
- A company that provides Internet access to homes and businesses
- A small unit of data transmitted across a network
- The capacity of a communication channel to carry data
- High-speed Internet connection that transmits multiple data channels at once
12 Clues: A small unit of data transmitted across a network • The capacity of a communication channel to carry data • A device that directs data packets between computer networks • A company that provides Internet access to homes and businesses • An old method of Internet access using a telephone line and modem • ...
Information and Communication Technology 2023-02-23
Across
- - The practice of protecting computer systems and networks from digital attacks.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Programs and applications that run on a computer or mobile device.
- - Software designed to harm computer systems or steal data.
- system - The software that manages a computer's basic functions, such as memory and file systems.
- computing - A model for delivering computing resources over the internet.
- - An input device used for moving the cursor on a computer screen.
- - A device used for processing data and running programs.
- - The process of designing and writing code for software applications.
- - An output device that prints text and images on paper.
Down
- - An input device used for typing text and commands.
- - A type of malicious software that can damage or disrupt computer systems.
- - A structured collection of data that is stored and organized in a computer.
- - A global network of interconnected computer networks.
- - A device that connects multiple devices to a network and directs traffic between them.
- - A device that connects a computer to the internet.
- - The process of converting data into a code to prevent unauthorized access.
- - The physical components of a computer system, such as the CPU, hard drive, and motherboard.
- - A step-by-step procedure for solving a problem or accomplishing a task.
- - An output device that displays images and text.
20 Clues: - An output device that displays images and text. • - An input device used for typing text and commands. • - A device that connects a computer to the internet. • - A global network of interconnected computer networks. • - An output device that prints text and images on paper. • - A device used for processing data and running programs. • ...
JNAEP Fun 2015-02-17
Across
- The new two day course introducing users to features of the QFX5100
- The system to publish your training schedule for customers to search in the Juniper website
- A course formerly known as Security Threat Response Manager (STRM).
- A purchasing method for redeeming Juniper training and exam vouchers
- Complete your written lab exam with this certification provider
- The exam that ever Juniper certified instructor must pass at least once
- A course that gives students in depth knowledge of using the OpenStack and Contrail Web UIs
- These are short and concise tips and instructions that provide quick answers, clarity, and insight into specific features and functions of Juniper technologies.
- The CEO of Juniper Networks
- The total number of JNAEPs in the Americas
- A training modality allowing trainers and students to access a virtual classroom online
Down
- This would be the first course to prepare for the JNCIS-QF examination
- This was the code name for the M40 router.
- Abbreviation for Juniper partners authorized to sell and deliver official training
- Juniper Networks, Inc. NYSE ticker symbol
- Download this app to practice for an exam
- The highest level of Juniper certification
- The discount rate type that you should use for purchasing training lab equipment
- The name of the survey tool that customers should use after each class
- A Person certified to provide official Juniper training
20 Clues: The CEO of Juniper Networks • Juniper Networks, Inc. NYSE ticker symbol • Download this app to practice for an exam • This was the code name for the M40 router. • The highest level of Juniper certification • The total number of JNAEPs in the Americas • A Person certified to provide official Juniper training • ...
Upper Grade Orientation 2024-01-10
Across
- A set of codes which is responsible to complete one task in a program.
- Processes data using electronic technology.
- Often used to access web pages.
- An unit in the CPU which acts like a brain of the computer.
- You will click this to find more options.
- The different robots will work together to assemble a product.
- An item like a word or button that points to another location
- A device that detects and responds to input from the physical environment
- A device which connects network devices and enables users to exchange data packets
- A memory space allocated for the program to remember a value.
- Automated machine that can execute specific tasks
- A device that measures the changes in motion or vibration.
Down
- A tool or object used as hardware.
- Users type this to search for a term on the Internet.
- It conveys information to audience using an electronic tool.
- A device that requests access to a service provided by a server.
- A connection of all the computer peripherals.
- A single chip microprocessor unit.
- A device that connects two or more packet-switched networks, managing traffic between these networks by forwarding data packets to their intended IP addresses.
- A main computer in a network, which offers services to the other connected devices.
- The space around the printed area on a page.
21 Clues: Often used to access web pages. • A tool or object used as hardware. • A single chip microprocessor unit. • You will click this to find more options. • Processes data using electronic technology. • The space around the printed area on a page. • A connection of all the computer peripherals. • Automated machine that can execute specific tasks • ...
"Computers" 2024-11-22
Across
- A unit of digital information that consists of 8 bits
- The process of converting data into a coded form to prevent unauthorized access
- The physical components of a computer, such as the CPU and motherboard
- A structured collection of data stored in a computer
- A system of servers used for storing and accessing data over the Internet
- The central unit in a computer that performs calculations and tasks
- A screen that displays the output of a computer
- A machine that performs calculations and processes data
- A computer or program that provides data and services to other computers
Down
- A global network connecting millions of private and public networks
- A temporary storage area for frequently accessed data
- An input device with keys used to type characters and commands into a computer
- A secret word or phrase used for security to access devices or accounts
- Programs and operating systems used by a computer
- A device used to interact with a computer by clicking, dragging, and selecting items
- A set of rules or instructions for solving a problem or performing a task
- The process of converting information into a code for communication or storage
- A system designed to prevent unauthorized access to a network
- A group of computers and devices connected to share data and resources
- A device that directs data traffic between networks
20 Clues: A screen that displays the output of a computer • Programs and operating systems used by a computer • A device that directs data traffic between networks • A structured collection of data stored in a computer • A unit of digital information that consists of 8 bits • A temporary storage area for frequently accessed data • ...
Network and Security Basics Module 6 Chapter 5 2024-07-24
Across
- rules of communication that ensure packets are sent, recieved and integrated properly
- the connection of two or more central computers or LANS across a wide area
- contains the actual data being transmitted second part of a packet
- use of radio signals traveling through air to transmit data
- contains information needed by the network one part of a packet
- most desktop computers require an external or internal version of this to connect to a WAP
- complex device that stores the routing information for networks
Down
- similar to a hub but aware of the exact address or identity of all the nodes attached
- used to prevent attenuation when packets travel long distances
- in a mesh topology most nodes connect directly to each other
- a data communication system consisting of multiple devices relatively close to eachother
- the most popular standard for wireless networking
- internal version of the internet offered some organizations
- data moves through networks in structures known as
- the device at each node that performs translation and transmission
- used to share some of a company's intranet resources with others outside of the organization
- allows users to share and connect with different devices
- provide multiple ports for connecting nodes
- in this topology all nodes are connected to a hub or switch and communicate through it
- the logical layout of the cables and devices that connect the nodes of the network
20 Clues: provide multiple ports for connecting nodes • the most popular standard for wireless networking • data moves through networks in structures known as • allows users to share and connect with different devices • internal version of the internet offered some organizations • use of radio signals traveling through air to transmit data • ...
AI 2025-10-12
Across
- Idea that true intelligence needs a body.
- Early program that tried to model human reasoning.
- Central idea in Hofstadter and Mitchell’s theory of intelligence.
- The 2012 network that started the deep learning boom.
- The revival that followed, thanks to deep learning.
- Time when AI funding and optimism ran cold.
- Strength of a neuron’s output.
- Models inspired by how the brain processes vision.
- The examples used to teach an AI.
- The challenge of keeping AI’s goals human-friendly.
- Hofstadter’s idea for self-awareness.
- How neural networks adjust their connections.
Down
- Controls how much a neuron “fires.”
- Learning from rewards and punishments.
- One of the earliest programming languages.
- Company known for creating AlphaGo.
- Early approach using rules and symbols instead of data-driven learning.
- Field that inspired AI through ideas of feedback and control.
- Giant visual database used to train AI systems.
- Settings that guide how a model learns.
- Trick image that confuses an AI.
- The horse that “solved” math problems by reading cues.
- IBM’s computer that beat chess champion Garry Kasparov.
- The first artificial neuron model that could learn simple patterns.
- Layered networks that power modern AI systems.
- Hofstadter’s computer model of analogy-making.
- The 1956 workshop that officially launched the field of AI.
- The data used to check an AI’s learning.
- The point when AI surpasses human intelligence.
29 Clues: Strength of a neuron’s output. • Trick image that confuses an AI. • The examples used to teach an AI. • Controls how much a neuron “fires.” • Company known for creating AlphaGo. • Hofstadter’s idea for self-awareness. • Learning from rewards and punishments. • Settings that guide how a model learns. • The data used to check an AI’s learning. • ...
NETWORKING CONCEPTS 2025-06-07
Across
- card used to physically attach a computer to an network
- a network used to connect all computers in a network with each other
- some computers and peripheral devices are connected between a small room ,area, etc
- network device that connects two different types of networks with each other
- network structure in which two nodes are directly connected with each other
- overall design of a computer network that describes how a computer network is configured
- all nodes in a network are connected in a circular manner
Down
- each device connected to a central hub using a point to point connection
- wireless technology used to interconnect mobile phones, computers,etc
- computer network restricted to an organization
- a set of rules that determine how data should be transferred over networks
- connect a computer to the available internet connection over the existing telephone lines
- computer network mainly created foe an individual person
- protecting data and resources from any unauthorized access
- connect some computers located at distant places
15 Clues: computer network restricted to an organization • connect some computers located at distant places • computer network mainly created foe an individual person • card used to physically attach a computer to an network • all nodes in a network are connected in a circular manner • protecting data and resources from any unauthorized access • ...
computer science 2025-10-21
Across
- is the maximum amount of data that can be transferred over a network connection in a given period
- computer or system that provides resources, data, or services to other computers
- Network can be wired or wireless
- address An IP address is a unique numerical label assigned to each device connected to a computer network
- cable also known as an ethernet cable
- a set of rules that govern how data isn transmited
- networking device that connects multiple computer networks, such as your home network to the internet.
- Transmission is the process of transferring data from one device to another over a communication medium
Down
- sometimes simply called the net, is a worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols
- electronic mail
- central device in a network that connects multiple computers
- hardware allowing devices to contact and communicated with eachover
- network connects devices without physical cables
- is a core communication standard for the internet that ensures reliable
- is a small, formatted unit of data that travels over a network
- network is a computer network that uses physical cables
16 Clues: electronic mail • Network can be wired or wireless • cable also known as an ethernet cable • network connects devices without physical cables • a set of rules that govern how data isn transmited • network is a computer network that uses physical cables • central device in a network that connects multiple computers • ...
11.5 Vocabulary 2023-03-28
Across
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- IEEE designation for all wireless networking standards.
- Was introduced in 2018 to address the vulnerabilities inherent in the previous revision.
- Temporal Key Integrity Protocol
- Advanced Encryption Standard
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- Remote Authentication Dial-In Service
- An enhancement that allows multiple antennas to use the same radio frequency.
- Wireless authentication method that uses a passphrase to authenticate users.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- A method that combines channels into one to increase bandwidth.
Down
- It was introduced in 2004 and is still heavily used in today's networks.
- Terminal Access Controller Access-Control System
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Was developed at MIT and is a key component of Windows Active Directory.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Service Set Identifier
- Security flaw that can occur with a wireless network
18 Clues: Service Set Identifier • Advanced Encryption Standard • Temporal Key Integrity Protocol • Remote Authentication Dial-In Service • Terminal Access Controller Access-Control System • Security flaw that can occur with a wireless network • IEEE designation for all wireless networking standards. • A method that combines channels into one to increase bandwidth. • ...
Cyber security 2023-11-28
Across
- Desktop is also known as.
- Hiding one piece of data with in another.
- The crime that related to computers and networks.
- A piece of malware that can replicate itself in order to spread the infection to other connected computer without human interaction.
- Secretly watches computer activity.
- Phishing is malware that asks for ______ details.
- Any program, website, or file that is defined to damage or gain unauthorized access to a device.
- The practice of protecting systems, networks and programs from digital attacks.
Down
- Someone who breaks into a computer system.
- URLs that mislead the user into down leading a virus and visiting a harmful website.
- Illegal production of copyrighted material is often referred as ____.
- Information is also known as.
- A form of malware that deliberately prevent u from accessing files in ur computer,until they are decrypted using at a cost.
- Type of bullying that takes place online.
- ____ is the ability to act in a safe and responsible manner on the internet and other connected environments.
- An online threat that hides itself in computers and mobile device.
- Software that protects computer from virus related harm.
- Copying the data without the permission of owner of the computer/computers system/ computer network.
18 Clues: Desktop is also known as. • Information is also known as. • Secretly watches computer activity. • Hiding one piece of data with in another. • Type of bullying that takes place online. • Someone who breaks into a computer system. • The crime that related to computers and networks. • Phishing is malware that asks for ______ details. • ...
Word List 1 2022-09-13
Across
- This device helps to manage the server by commands.
- The location of computer network elements.
- The measurement of the amount of information that can be transferred between computers.
- A large system consisting of many similar parts that are connected together.
- Something that is easy to attack.
- A computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- The particular arrangement or pattern of a group of related things.
Down
- Something involving many different parts in a way that is difficult to understand.
- To be responsible for controlling or organizing someone or something.
- A networking device that forwards data packets between computer networks.
- A network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
- This device restores the network signal before the signal becomes too weak or damaged.
12 Clues: Something that is easy to attack. • The location of computer network elements. • This device helps to manage the server by commands. • The particular arrangement or pattern of a group of related things. • To be responsible for controlling or organizing someone or something. • A networking device that forwards data packets between computer networks. • ...
Computers, Gabriella Protash 2020-10-01
Across
- hard connections
- Starting up a computer from a halted or powered down condition
- Storage device that stores digitally encoded data on rapidly rotating rigid disks with magnetic surfaces.
- A machine that performs calculation to precise instructions
- Temporary storage
- Groupings of 1's and 0's that makes information that a computer can understand.
- Stores data and information and is usually volatile.
- An example of software
- Hardware and software
- connects the different parts of a computer together
- A computer or series of computers not connected by cables of any kind.
- How your computer remembers things
- wireless internet card
- Programs that make the computer work.
- Something anyone can operate
- Software used to control the computer and its peripheral equipment.
- Excel, word, photoshop, etc
Down
- Stores executing program instrutions
- An example of software
- Read only memory
- random access memory
- memory Long term data storage
- Memory, motherboard, central processing unit (CPU)
- wide area networks
- Physical components of a computer
- Permanent storage
- Responsible for carrying out instruction of a program
- Local area networks
- Center of the network
- How you tell your computer remembers things
- A device that provides electricity to a computer.
- How computers tells your computer remember tells you things
- How your computer talks to other computers
- Programs or applications
34 Clues: hard connections • Read only memory • Temporary storage • Permanent storage • wide area networks • Local area networks • random access memory • Hardware and software • Center of the network • An example of software • An example of software • wireless internet card • Programs or applications • Excel, word, photoshop, etc • Something anyone can operate • memory Long term data storage • ...
Security and Networking 2024-07-24
Across
- Mining New patterns or relationships between data.
- A scam that threatens to delete or expose victims stolen data for money.
- provides multiple port for connecting nodes.
- Term for many types of malicious computer programs that is created to harm users and their computer systems.
- Some information sytems are called.
- A node on a network that serves as an entrance to another network.
- Is a type of computer that is able to continue when problems are present.
- Any step taken to ward off a threat.
- Allows sharing and communication between devices.
- A weakness that's not protected against threats.
Down
- system The complex system for acquiring, storing, organizing, using, and sharing data and information.
- Authentication Its two forms of identification, one being your password and entering a code sent directly to you.
- Information System Software tools that allows managers to gather, organize, and evaluate information.
- Is term for infected computers that under control of a hacker.
- warehouse Is an enormous digital warehouse that contains archived data gathered from multiple databases.
- Assessment Used to identify and examine possible threats.
- Anything that causes harm.
- The act of gaining someones trust by pretending you are someone else.
- Structures that data moves through networks.
- Is used to share company resources with individuals not in the organization.
- Designed to report activity on your computer to another party.
- The most widely used standard for local area networks.
22 Clues: Anything that causes harm. • Some information sytems are called. • Any step taken to ward off a threat. • provides multiple port for connecting nodes. • Structures that data moves through networks. • A weakness that's not protected against threats. • Allows sharing and communication between devices. • Mining New patterns or relationships between data. • ...
Solids and thermochemistry 2023-06-29
Across
- The most common type of exothermic reaction
- Graphite can conduct electricity due each carbon having a free _________
- In diamond, each carbon is bonded to ______ other carbons
- Metals are good conductors of heat and _________
- Conduction of electricity requires _________ particles that are free to move
- When energy is released in a reaction
- During an endothermic reaction you will see a temperature ___________
- Molecules are made of ________ atoms bonded together
- Ionic solids can conduct in molten (liquid) or ________ state
- Ionic solids are _______ which means they will break if a force is applied
- Bond _______ takes in energy
- Giant covalent networks have ______ melting points due to very strong covalent bonds
Down
- Double bonds have more energy than single bonds? True or false
- Attractive forces (bonds) between molecules
- Atoms in giant covalent networks are held together by very strong _______ bonds
- Bond ______ releases energy
- Ionic solids are made of networks of ions with ________charges
- During an exothermic reaction you will see a temperature ___________
- When energy is absorbed in a reaction
- Attractive forces (bonds) between atoms in a substance
- the term for electrons that move between metal atoms
- The shape of the bonds around each C in diamond or each Si in silicon
- ________ intermolecular bonds in a solid means a low melting point
- In graphite, each carbon is bonded to ______ other carbon atoms
- Strong intermolecular bonds in a solid means a _______ melting point
25 Clues: Bond ______ releases energy • Bond _______ takes in energy • When energy is absorbed in a reaction • When energy is released in a reaction • Attractive forces (bonds) between molecules • The most common type of exothermic reaction • Metals are good conductors of heat and _________ • the term for electrons that move between metal atoms • ...
negede gizaw 2024-12-06
Across
- Which element of a security policy describes how users identify themselves to gain access to network resources?
- creates a barrier between networks so that potentially
- only backs up files that have changed since the last full backup
- is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
- Protocol version a mutual authentication protocol
- packets can’t enter or leave the protected networks
- backs up any files that have changed since the last full or incremental backup
- most incoming packets that have been requested
- prevents people from using eavesdropping technology
- used in a Windows domain environment and provides mutual
Down
- creates a barrier between a computer OS and the network
- creates a barrier between two entities
- used by OSs and network devices offer varying levels of secure authentication
- Extensible Authentication Protocol a framework for other protocols
- attackers who do not report problems,
- all of the disk’s contents are backed up as individual folders and files
- a framework for other protocols
- backs up the disk sector by sector to create an exact image of the disk’s contents
- an industry standard client server protocol that offers centralized control
- provide encryption and authentication
- Password Authentication Protocol
- come with a built-in host firewall that is preconfigured to
22 Clues: a framework for other protocols • Password Authentication Protocol • attackers who do not report problems, • provide encryption and authentication • creates a barrier between two entities • most incoming packets that have been requested • Protocol version a mutual authentication protocol • packets can’t enter or leave the protected networks • ...
securing and maintaining an OS 2024-12-07
Across
- Multifactor Authentication
- what users can do after they are logged on to the network.
- Most Linux distributions have a built-in firewall called
- Encrypting File System.
- prevents people from using eavesdropping technology, such as a protocol analyzer.
- Windows Server Update Services
- a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen host firewall a barrier between a computer OS and the network so potentially. harmful packets can’t enter or leave the OS
- backup backs up the disk sector by sector to create an exact image of the disk’s contents.
- file allocated disk area that holds information that is swapped back and forth from RAM to disk.
- firewall creates a barrier between networks so that potentially.harmful packets can’t enter or leave the protected networks.
- packets can’t enter or leave the protected networks
Down
- certificates a digital certificate from a CA, which is responsible for verifying the applicant’s authenticity.
- policy a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps
- management to take control of Microsoft product updates a process is called.
- who has access to the network.
- if rules are breached.
- firewall
- a unique biometric identifying trait.
- key series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- Password Authentication Protocol
- hat who are paid to probe networks and vulnerabilities.
- creates a barrier between two entities.
22 Clues: firewall • if rules are breached. • Encrypting File System. • Multifactor Authentication • who has access to the network. • Windows Server Update Services • Password Authentication Protocol • a unique biometric identifying trait. • creates a barrier between two entities. • packets can’t enter or leave the protected networks • ...
CROSSWORD 2025-05-30
Across
- The art and technique of designing and using typefaces.
- The first pages of a publication, often its visual presentation.
- Related to technology that uses data in the form of numbers, such as computers.
- Images captured with a camera, essential in any visual medium.
- The framework or skeleton that provides support and order to a design or content.
- Creating the illusion of movement from static images.
- Programs designed to perform a specific task on a device.
- A periodical publication with articles, photos, and advertisements, often themed.
- An image format that allows for short animated sequences.
- Captivating attention or arousing curiosity.
- Norms or principles that govern a process or system, such as those of composition.
Down
- Fulfilling its purpose effectively and practically.
- The presentation or display of a project or ideas to an audience.
- A list of people who contributed to the creation of a work or publication.
- Existing only in cyberspace, not in the physical world.
- The process of creating and planning the appearance and function of an object or interface.
- A set of intersecting lines that organize the space of a design.
- The quality of something that pleases the eye or seduces.
- A technology giant known for its search engine and various online tools.
- A set of interconnected systems, such as social networks, that enable communication.
20 Clues: Captivating attention or arousing curiosity. • Fulfilling its purpose effectively and practically. • Creating the illusion of movement from static images. • The art and technique of designing and using typefaces. • Existing only in cyberspace, not in the physical world. • The quality of something that pleases the eye or seduces. • ...
Tech Facts 2022-09-30
Across
- This game console was first released in 1995
- A facility allowing computers, smart phones, or other devices to connect to the internet
- Where PTP tests and learns new devices
- Which company announces new devices at 9:41am?
- A vast computer network linking smaller computer networks worldwide
- Popular floor cleaning robot
- The #1 smart phone in the world :-)
- A website dedicated to anything Android
- Device __________ provided by P360
- a technology that superimposes a computer-generated image on a user's view of the real world 2 words
- sends and receives data on computer networks
- What does WWW stand for in a URL? 3-words
- Texting from an iPhone
Down
- This recent protocol is gaining traction in the consumer market and increases security and privacy risks
- Most popular smart lights! 2 words
- Top rated smart refrigerator manufacturer
- Google's smart home camera
- This OS controls 88% of the world's smartphone market
- Largest ecommerce seller
- Most popular search engine
- What does the "i" in iPhone stand for?
- an egg that can be found by continuously clicking the version number in the about screen on an android phone
- The top #1 most played popular game in the world right now
- Most popular streaming service
- Smart thermostat with a bee in the logo
- Most popular PC game of 2022
- Wireless apple headphones
- Amazon smart speaker
28 Clues: Amazon smart speaker • Texting from an iPhone • Largest ecommerce seller • Wireless apple headphones • Google's smart home camera • Most popular search engine • Popular floor cleaning robot • Most popular PC game of 2022 • Most popular streaming service • Most popular smart lights! 2 words • Device __________ provided by P360 • The #1 smart phone in the world :-) • ...
