networks Crossword Puzzles
Networks and Internet 2014-09-02
9 Clues: 8 bits • World Wide Web • Another word for link • Referred to as information • Might be a charity on the internet • Two or more devices linked together • Protocol determines a way to behave • Hello Firefox this chrome how are you ? • converts a web address or URL into the correct IP address for the computer
Computer Networks -Introduction 2024-02-04
Across
- Carry message from host to host in a subnet
- Wearable Computers
- example Music Sharing
- Popular and mostly used in offices
- A Notebook in hotel room
- with two clients and one server
Down
- no fixed clients and servers
- to consumer Govt distributing tax form electronically
- Networks in unwired buildings
- Wireless LAN IEEE 802.11
10 Clues: Wearable Computers • example Music Sharing • Wireless LAN IEEE 802.11 • A Notebook in hotel room • no fixed clients and servers • Networks in unwired buildings • with two clients and one server • Popular and mostly used in offices • Carry message from host to host in a subnet • to consumer Govt distributing tax form electronically
Computer Network Concept 2023-11-20
Across
- a group of two or more computers connected with each other for sharing resources and information
- a computer network which spans over a large geographical area
- A computer network which distances over a small geographical
Down
- stands for "modulator-demodulator
- A bundle multiple network ports together to connect incoming and outgoing lines
- A device that forwards data packets along networks
- A computer network which connects two or more LAN networks
- A networking device that allows wireless connectivity to device
8 Clues: stands for "modulator-demodulator • A device that forwards data packets along networks • A computer network which connects two or more LAN networks • A computer network which distances over a small geographical • a computer network which spans over a large geographical area • A networking device that allows wireless connectivity to device • ...
Data transmition Key terms 2022-10-21
Across
- transfer of small pieces of data across various networks.
- a device that connects two or more packet-switched networks or subnetworks.
- In networking, a ? is a small segment of a larger message.
- How long it takes for data packets to travel
Down
- data transfer capacity for a computer network in bits per second.
- refers to supplemental data (metadata) placed at the end of a block of data being stored or transmitted
- one or more transmitted data packets fail to arrive at their destinations
- is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
- beginning or front part of a packet.
- the carrying capacity of a packet or other transmission data unit.
10 Clues: beginning or front part of a packet. • How long it takes for data packets to travel • transfer of small pieces of data across various networks. • In networking, a ? is a small segment of a larger message. • data transfer capacity for a computer network in bits per second. • the carrying capacity of a packet or other transmission data unit. • ...
CEO Mania 2024-10-01
10 Clues: CEO of X • CEO of IBM • CEO of Adobe • CEO of NetApp • CEO of YouTube • CEO of Zscaler • CEO of Alphabet • CEO of Microsoft • Co-founder of Workday • CEO of Palo Alto Networks
Internet Hardware Vocabulary Review Game 2023-02-22
Across
- A digital security layer of protection that filter specific content that is input or outputted
- Adapts a computer to a certain line
- A computer that sits between different networks
- Converts digital signals from a router to a network circuit
- Hardware component that connects the computer to the network
Down
- A device that connects LANs into a larger LAN(Local Area Network)
- A device that segments networks into subnets or LAN segments
- defines the way in which Internet communications and other advanced services are provided on wireless mobile devices
- Combination of a transmitter/receiver in a single package
- A device that connects multiple devices and allows computers to send messages to each other without traffic
- A device that connects your home to your internet service provider
11 Clues: Adapts a computer to a certain line • A computer that sits between different networks • Combination of a transmitter/receiver in a single package • Converts digital signals from a router to a network circuit • A device that segments networks into subnets or LAN segments • Hardware component that connects the computer to the network • ...
Computer Network 2025-04-02
Across
- A technique used to divide a large network into smaller, manageable subnetworks.
- A network topology where each device is connected to a central hub.
- A wireless networking standard used in local area networks.
- The process of converting readable data into a coded form to prevent unauthorized access.
Down
- A protocol used for transferring files between a client and a server.
- A protocol used for sending emails.
- Address) A unique identifier assigned to each device on a network.
- A network device that forwards data packets between computer networks.
- A hardware or software device that monitors and controls incoming and outgoing network traffic.
- A model that defines network communication in seven layers.
10 Clues: A protocol used for sending emails. • A wireless networking standard used in local area networks. • A model that defines network communication in seven layers. • Address) A unique identifier assigned to each device on a network. • A network topology where each device is connected to a central hub. • ...
TECHNOOLOGAY 2022-04-13
10 Clues: meta WHO? • a ghost 😰 • silverware • tweet tweet • up the clock • no copy people • a lot of blocks • networks are private • it’s internet and foot • u want a woman but yo fakin it
Crossword 2025-08-25
10 Clues: paid message. • buys a product. • monetary value. • image or symbol. • good or service. • use of products. • identifies a product. • strategy to increase sales. • delivering a product for money. • used to connect five customers.
Kevin Graham's crossword puzzle 2013-09-10
12 Clues: To renew • A web log • Damages files • A global network • Text or graphics • networks A community • Different exstensions • Part of a computer system • Gains access to computer files • A system of connected computers • A bully who teases people online • engine Software that searches and gathers info
Fictitious Library Crossword 2013-05-28
12 Clues: ? Agency • Legal Rights • Alpha numeric? • ?? Publication • It's all about me! • A collection of networks • I hold related information • Need to define your search? • I am a non serial publication • I can be a continuing resource • I hold authoritative information • Written works by a specific author
Capitolo 11 Percorso II 2021-02-25
12 Clues: the charger • the ringtone • I am reading. • I was drinking. • They are saying. • to leave a message • to call back later • We will be sending. • the social networks • to dial the wrong number • You (inf.) will be doing. • You (inf., pl.)will be eating.
Networking Requirements 2022-08-19
Across
- continuous and predictable simultaneous data block transfer.
- The gathering of devices connected in a single physical location, such as a building, office, or home
- The transmission of data over short distances between fixed and mobile devices and establishment of personal area networks
- Pre-loaded data sent over a network.
- Second Layer in the OSI model.
- the smallest data unit that a computer can sequence and save.
- Using a network without the permission of the network operator.
- a method of combining multiple analog or digital signals into a single signal over a common medium.
Down
- Creates a barrier between a secure and an unauthorized user.
- Two or more computers are linked together to share data.
- Used to link devices in a wired local area network (LAN) or wide area network (WAN).
- the location of temporary data.
- A central server that executes specialized software known as a(n) _______ controls client/server networks.
- Wireless network devices interact with one another using .
- The _______ address is the remarkable number assigned by the manufacturer to a network adapter.
15 Clues: Second Layer in the OSI model. • the location of temporary data. • Pre-loaded data sent over a network. • Two or more computers are linked together to share data. • Wireless network devices interact with one another using . • Creates a barrier between a secure and an unauthorized user. • continuous and predictable simultaneous data block transfer. • ...
puzzle corner 8 2024-09-23
Across
- High-speed storage located close to the CPU to improve processing speed.
- Malicious software that disguises itself as legitimate to trick users.
- A device that forwards data packets between computer networks
- A security system that monitors and controls incoming and outgoing network traffic
- The process of analyzing large sets of data to discover patterns and trends.
- The maximum amount of data that can be transmitted over a network in a given amount of time
- The standard markup language used to create web pages
Down
- A data type with only two possible values: true or false.
- The practice of protecting systems, networks, and programs from digital attacks
- The delay between a user's action and a system's response in a network.
- Supply A component that provides electrical power to a computer
- The practice of using remote servers hosted on the internet to store, manage, and process data
- A common method for connecting devices in a wired local area network (LAN).
- A large, powerful computer used for bulk data processing in organizations.
- A physical location where people can access the internet using Wi-Fi.
15 Clues: The standard markup language used to create web pages • A data type with only two possible values: true or false. • A device that forwards data packets between computer networks • Supply A component that provides electrical power to a computer • A physical location where people can access the internet using Wi-Fi. • ...
Eating Together 2013-05-30
Across
- Parents, Brother, Sister, etc
- Do this at school
- Mcdonalds, Burger King, etc
- Boy + Girl = ?
- Something we all love
- Where you cook
- an organization that made you collect money from people on halloween in elementary school
- Each ethnicity has their own _____
- Needs
Down
- FB, twitter, etc are ______ networks
- Way of acting
- Healthy Foods
- Hanging with your ______.
- The young ones
14 Clues: Needs • Way of acting • Healthy Foods • Boy + Girl = ? • Where you cook • The young ones • Do this at school • Something we all love • Hanging with your ______. • Mcdonalds, Burger King, etc • Parents, Brother, Sister, etc • Each ethnicity has their own _____ • FB, twitter, etc are ______ networks • ...
Student A 2023-04-19
EC402-OPTICAL COMMUNICATIONS AND NETWORKS 2016-06-26
Across
- Which color has the shortest wavelength of light -----
- When a beam of light enters one medium from another, which quantity will not change?
- Which material is sensitive to light?
- The wavelength of light has no role in ------
- The band of light wavelengths that are too long to be seen by the human eye
- An object nearer to a converging lens than its focal point always has a/an ______ image.
- Is a non-coherent light source foe optical communications system
- An object farther from a converging lens than its focal point always has a/an _____ image.
- ________ dispersion is caused by the difference in the propagation times of light rays that take different paths down a fibe
- If a mirror is used to reflect light, the reflected light angle is ____ as the incident angle
Down
- The real image formed by a spherical mirror is ____ relative to its object
- Which type of laser is the simplest to modulate directly by changing its excitation?
- Which diode is used as an optical receiver in fiber optics communications
- The band of light wavelengths that are too short to be seen by the human eye
- Photodiodes used as fiber optic directors are ------ bias
- The loss in signal power as light travels down a fiber is called-----
- What is the stage of the sand becoming a silicon?
- Which theory states that the light wave behaves as if it consists of many tiny particles?
- What generates a light beam of a specific visible frequency?
19 Clues: Which material is sensitive to light? • The wavelength of light has no role in ------ • What is the stage of the sand becoming a silicon? • Which color has the shortest wavelength of light ----- • Photodiodes used as fiber optic directors are ------ bias • What generates a light beam of a specific visible frequency? • ...
P2P vs client-server networks 2022-11-28
Across
- one or two devices (nodes) connected together
- citizen science project utilising P2P for scientific searches for intelligent extraterrestrial life
- decentralised social network where user data is kept on user-hosted "pods" and privacy is governed by "aspects"
- shared immutable database used in cryptocurrency transactions and exchange
- P2P audio file sharing application that existed between June 1999 and July 2001
- web browser supporting P2P web
- any device on a network
- network configuration where every participant can communicate without going through a centralised point
Down
- node fulfilling requests, e.g. serving files
- digital currency
- the maximum amount of data transmitted over an internet connection in a given amount of time
- form of decentralised digital currency transferred on P2P network
- communication protocol for P2P file sharing
- type of network connection, normally at home, where upload speeds are only a fraction of the download speeds
- number assigned to uniquely identify a connection endpoint and to direct data to a specific service
- node making requests
- computer hardware or software that provides functionality for other programs or devices
- standard for the short-range wireless interconnection
- protocol for distributed web
19 Clues: digital currency • node making requests • any device on a network • protocol for distributed web • web browser supporting P2P web • communication protocol for P2P file sharing • node fulfilling requests, e.g. serving files • one or two devices (nodes) connected together • standard for the short-range wireless interconnection • ...
Prenatal health and development 2016-07-16
12 Clues: 8 weeks • week 14 • stage 12 weeks • self confidence • greater knowledge • networks of people • the level of energy • bifida neural tube defects • connects foetus and placenta • growth of hard and soft tissue • syndrome chromosonal abnormality • syndrome when the brain doesn't recognise the stomach is full
Prenatal health and development 2016-07-16
12 Clues: week 14 • 8 weeks • stage 12 weeks • self confidence • greater knowledge • networks of people • the level of energy • bifida neural tube defects • connects foetus and placenta • growth of hard and soft tissue • syndrome chromosonal abnormality • syndrome when the brain doesn't recognise the stomach is full
CHAPTER 1- INTRODUCTION TO OB 2024-11-29
Across
- employee's in charge of what they do
- performance measure
- maintain networks outside workplace
- deal with socializing, politicking,etc
Down
- fail to report to work
- boarderless organisation
- study of societies
- monitor activities
- act as initiator
- works directly on a task
- withdraw from the organisation
- process of defining goals
12 Clues: act as initiator • study of societies • monitor activities • performance measure • fail to report to work • boarderless organisation • works directly on a task • process of defining goals • withdraw from the organisation • maintain networks outside workplace • employee's in charge of what they do • deal with socializing, politicking,etc
Cloud Computing Architecture 2013-12-16
Across
- / maximum amount of storage
- / the side the user sees
- / float of data
- / rule
- / #Neuland
- / secure copy of all data
- / multiple existence
- interface / UI
- processing / 0101 + 0110 = 1011
- server / untouchable server
Down
- device / HDD,SSD,SD etc.
- server / touchable server
- / synonym for program
- / prerequisite to use the medium
- / customer
- / maximum connectivity
- / the system side
- server / running solely one application
- computing system / the complete system
- server / administers the whole system
- / electronic letters
- / serves the networks needs
22 Clues: / rule • / customer • / #Neuland • interface / UI • / float of data • / the system side • / multiple existence • / electronic letters • / synonym for program • / maximum connectivity • device / HDD,SSD,SD etc. • / the side the user sees • server / touchable server • / secure copy of all data • / maximum amount of storage • / serves the networks needs • server / untouchable server • ...
ch.20 23 words 2019-12-13
Across
- fores or threats
- politically motivated attacks
- nation with all facilities
- commerce between nations
- creation plants animals
- culture elements
- disease
- difference men and women
- statement united nations declared
- cooperative Venture Sponsored
- process industrialization
- linkage computer networks
- person leaves his or her country
- placing high value
Down
- growth spread
- U.S. federal agency
- all financial interactions
- difference opinion political issues
- economic development that meets people needs
- transferring of genes
- 20th century attempt to increase food
- layer earth's upper atmosphere
- antiterrorism bill of 2001
23 Clues: disease • growth spread • fores or threats • culture elements • placing high value • U.S. federal agency • transferring of genes • creation plants animals • commerce between nations • difference men and women • process industrialization • linkage computer networks • all financial interactions • nation with all facilities • antiterrorism bill of 2001 • politically motivated attacks • ...
Cybersecurity 2023-08-23
Across
- Little card in your phone
- Unwanted email messages
- Being free from public attention
- Stores information on your computer
- Virus that spreads through network
- Attack a nation’s computer networks
- Intrudes on a device remotely
- Wireless data network
Down
- Malicious software
- Prevents device from functioning correctly
- Finger prints
- Secret combination
- Bypass security to gain access
- From an outside/unknown source
- Discarded digital devices
- Malicious software
- Scrambling information
- Tracks all pressed keys
- Copying files from a computer
- Hides inside another program
- Confirming the person is authentic
21 Clues: Finger prints • Malicious software • Secret combination • Malicious software • Wireless data network • Scrambling information • Unwanted email messages • Tracks all pressed keys • Little card in your phone • Discarded digital devices • Hides inside another program • Copying files from a computer • Intrudes on a device remotely • Bypass security to gain access • ...
Information Extraction 2025-01-16
Social Media Keywords TEST1 2021-09-21
Across
- publish on a blog
- buy
- impolite
- recommend
- private life
- Facebook and Instagram are social …
- emotionally touched
- a person who uses their strength or power to frighten or hurt weaker people
- delete
- menace (v.)
- the act of giving wrong information about something
- information
Down
- shocking
- trustworthy
- a person who uses negative and critical comments
- malevolent
- online harassment
- friends can give you … to help you in difficult situations
- to sign in a social network you need a … and a password
- distract
20 Clues: buy • delete • shocking • impolite • distract • recommend • malevolent • trustworthy • menace (v.) • information • private life • publish on a blog • online harassment • emotionally touched • Facebook and Instagram are social … • a person who uses negative and critical comments • the act of giving wrong information about something • to sign in a social network you need a … and a password • ...
Cybersecurity Crossword Puzzle 2023-07-26
Across
- Prevents unauthorized access.
- Unauthorized alteration of data.
- (Common Vulnerabilities and Exposures) Software vulnerability database.
- Flaws Software vulnerabilities.
- Breach Stealing sensitive data.
- Misleading email attacks.
- Malware with a harmful payload.
- Unauthorized access to data.
- Common entry point for attacks.
- Malware that hides within legitimate software.
- Engineering Attacks exploiting human behavior.
Down
- Encrypting communication data.
- Control Access rights limitation.
- Insecure code exploit.
- Scrambling data for security.
- Protects from viruses.
- Removing sensitive data.
- Malicious self-replicating code.
- Protects data from unauthorized changes.
- Malware that spreads via networks.
20 Clues: Insecure code exploit. • Protects from viruses. • Removing sensitive data. • Misleading email attacks. • Unauthorized access to data. • Prevents unauthorized access. • Scrambling data for security. • Encrypting communication data. • Flaws Software vulnerabilities. • Breach Stealing sensitive data. • Malware with a harmful payload. • Common entry point for attacks. • ...
Cybersecurity Crossword Puzzle 2024-06-07
Across
- Hint: Mends security holes.
- Hint: Blocks unauthorized access.
- Hint: Digital fingerprint.
- Hint: Protects data in transit.
- Hint: Dock for data transfer.
- Hint: Concealing information using codes.
- Hint: Echo request.
- Hint: Padlock for websites.
- Hint: Sounds like a sharp inhale.
- Hint: Base of a tree.
Down
- Hint: Neutral ground.
- Hint: Inbox clutter.
- Hint: Crawling through networks.
- Hint: Cyber mischief.
- Hint: Shields your identity.
- Hint: Infectious code.
- Hint: Minor glitch.
- Hint: Sounds like a fishing technique.
- Hint: Private internet highway.
- Hint: Automated program.
20 Clues: Hint: Minor glitch. • Hint: Echo request. • Hint: Inbox clutter. • Hint: Neutral ground. • Hint: Cyber mischief. • Hint: Base of a tree. • Hint: Infectious code. • Hint: Automated program. • Hint: Digital fingerprint. • Hint: Mends security holes. • Hint: Padlock for websites. • Hint: Shields your identity. • Hint: Dock for data transfer. • Hint: Protects data in transit. • ...
business vocab crossword 2024-03-20
Across
- private networks typically used by orginazations for the sharing of company news, policies, documents and other information
- equipment and systems developed by applying scientific knowledge for practical purposes
- input device which transfers information and images from physical documents to computer files
- connections among computers to facilitate communication and sharing of resources
- programmable machine for storing, processing and retrieving data; includes desktops, laptops, tablets and smartphones
- wireless networking technology using radio waves to transport internet signals
Down
- global system of computer networks
- equipment and systems developed by applying scientific knowledge for practical purposes
- global network of remote servers which operate through the internet
- output device which produces physical versions of computer documents and images using paper and ink
- machine which makes exact duplicates of documents
11 Clues: global system of computer networks • machine which makes exact duplicates of documents • global network of remote servers which operate through the internet • wireless networking technology using radio waves to transport internet signals • connections among computers to facilitate communication and sharing of resources • ...
library Crossword 2013-05-24
10 Clues: ? Agency • Legal Rights • Denfine search • ?? Publication • Alpha numeric? • A collection of networks • I hold related information • Can be a continuing resource • I am a non serial publication • Written works by a specific author
Engineering Careers 2023-09-27
10 Clues: Lee • argon • Eiffel Tower • energy networks • that study earth • zsoaring baseball • design surveys,onions polls • Building and operating smart • such as transportation systems • Cryogenics liquids are, nitrogen,
Vocab crosswords 2022-11-22
Across
- internet
- uses network to overcome technical problems
- assignable legal right
- network printers, scanners
- taking someone else's work
- devices maintain stored data when turned off
- universal serial bus
Down
- Security protects your network and data
- Drive electronic device contain flash memory
- local area network
- protect a network or system
- needed to install computer networks
- Internet etiquette
- irrelevant or unsolicited messages
- short term memory
- central processing unit
- use allows to copy without permission
- storage device
18 Clues: internet • storage device • short term memory • local area network • Internet etiquette • universal serial bus • assignable legal right • central processing unit • network printers, scanners • taking someone else's work • protect a network or system • irrelevant or unsolicited messages • needed to install computer networks • Security protects your network and data • ...
Test 2021-02-03
Across
- Continuous change
- A platform of ____
- World Class ____
- Yours matters
- Our 5G factory in the US is here
- d
- Strategy execution streams
- Now available for 5G RAN
- The social network
- Make yourself heard
- Business Area
- Up in the sky
- Next generation Supply and _____
Down
- Our North Star to 2025
- Win the Technology ____
- The Head of BNEW
- We have the strongest in the market
- Compete on ____
- Foundation of our culture journey
- _____ excellence
- They choose us over competition
- Our strategy is built on this leadership
- Not walked
23 Clues: d • Not walked • Yours matters • Business Area • Up in the sky • Compete on ____ • The Head of BNEW • World Class ____ • _____ excellence • Continuous change • A platform of ____ • The social network • Make yourself heard • Our North Star to 2025 • Win the Technology ____ • Now available for 5G RAN • Strategy execution streams • They choose us over competition • Our 5G factory in the US is here • ...
3PS2 Technology, Relationship idioms 2021-10-25
Across
- to tolerate
- not efficient or productive
- anything that makes life easier
- to bring together features or ideas
- resemble a family member
- a device that transfers data between networks
- education after high school
- ugly
- grand and impressive in appearance
- have a good relationship with
Down
- easily access evth
- fight and stop being friends
- prisoner
- not useful
- not easily carried, handled, or managed
- to stop doing
- made by hand
- not too expensive
- length of time you can concentrate
- pile
20 Clues: pile • ugly • prisoner • not useful • to tolerate • made by hand • to stop doing • not too expensive • easily access evth • resemble a family member • not efficient or productive • education after high school • fight and stop being friends • have a good relationship with • anything that makes life easier • length of time you can concentrate • grand and impressive in appearance • ...
Cloud Computing Architecture 2013-12-16
Across
- / customer
- server / untouchable server
- / maximum amount of storage
- / prerequisite to use the medium
- / maximum connectivity
- server / running solely one application
- device / HDD,SSD,SD etc.
- / secure copy of all data
- / multiple existence
- end / the side the user sees
- server / touchable server
- server / administers the whole system
- interface / UI
Down
- / float of data
- / electronic letters
- / synonym for program
- / #Neuland
- end / the system side
- / serves the networks needs
- processing / 0101 + 0110 = 1011
- / rule
- computing system / the complete system
22 Clues: / rule • / customer • / #Neuland • interface / UI • / float of data • / electronic letters • / multiple existence • / synonym for program • end / the system side • / maximum connectivity • device / HDD,SSD,SD etc. • / secure copy of all data • server / touchable server • server / untouchable server • / maximum amount of storage • / serves the networks needs • end / the side the user sees • ...
Cloud Computing Architecture 2014-01-12
Across
- electronic letters
- serves the networks needs
- I'm not a program!
- the system side
- HDD,SSD,SD etc.
- touchable server
- maximum connectivity
- running solely one application
- float of data
- prerequisite to use the medium
- customer
- the side the user sees
- Floating in the sky
Down
- untouchable server
- the complete system
- multiple existence
- secure copy of all data
- 0101 + 0110 = 1011
- #Neuland
- administers the whole system
- UI
- synonym for program
- maximum amount of storage
- rule
24 Clues: UI • rule • #Neuland • customer • float of data • the system side • HDD,SSD,SD etc. • touchable server • untouchable server • multiple existence • electronic letters • 0101 + 0110 = 1011 • I'm not a program! • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • serves the networks needs • maximum amount of storage • ...
"The Continuous Exchange. Nnadozie . Pd 1" 2024-10-21
Across
- Arab merchant's domestic transportation
- Money certificates
- Confucianism,+Daiosm & Buddhism
- Invasions formed _ relationships
- Roadside hotel
- Fleas,Rats,and other rodents
- Borobudur is located in...
- The transfer of goods,ideas,and tech
- Sea Cargo,trade,and exploration
- The kingdom of Mansa Musa
Down
- The distribution of diversity
- New crops,who dis?
- King of gold
- Monks mound
- Spoken by African's written in Arbic
- Canyon of networks
- "Ruthless raiders" of the sea
- Form of economic warfare
- Pony express
- The Seven Voyages was led by..
20 Clues: Monks mound • King of gold • Pony express • Roadside hotel • New crops,who dis? • Money certificates • Canyon of networks • Form of economic warfare • The kingdom of Mansa Musa • Borobudur is located in... • Fleas,Rats,and other rodents • The distribution of diversity • "Ruthless raiders" of the sea • The Seven Voyages was led by.. • Confucianism,+Daiosm & Buddhism • ...
Career Choices 2025-04-04
Across
- Operates camera for movies or shows
- Cuts and styles hair
- Helps people with mental health issues
- Designs graphics and digital art
- Analyzes financial data
- Performs surgeries
- Writes books
- fitness Provides training
- person who teaches students
- Manages company finances
- Cooks food professionally
Down
- Creates computer networks
- professional who treats sick animals
- Studies planets and stars
- Protects and preserves wildlife
- Sings or performs music
- Tests and develops medicines
- Creates art pieces
- Builds and repairs structures
- Someone who defends people in court
- Runs a business
21 Clues: Writes books • Runs a business • Performs surgeries • Creates art pieces • Cuts and styles hair • Analyzes financial data • Sings or performs music • Manages company finances • Creates computer networks • Studies planets and stars • fitness Provides training • Cooks food professionally • person who teaches students • Tests and develops medicines • Builds and repairs structures • ...
Spanish 3H Unit 1 Vocab 1 2025-08-30
Across
- sometimes
- whiteboard/blackboard
- to dust the furniture
- melancholic
- open-minded
- proud
- playful
- to chat online
- to upload photos
- to do the shopping
- to think
- to surf the internet
Down
- to take out the trash
- committed
- computer (Spain)
- capable
- social networks
- student desks
- homework
- challenging, demanding
- lively
- never
- often, many times
- to have a good time
- cell phone
- to set the table
- passionate
- persistent
- to wash the clothes
- always
- mesa to clear the table
31 Clues: never • proud • lively • always • capable • playful • homework • to think • committed • sometimes • cell phone • passionate • persistent • melancholic • open-minded • student desks • to chat online • social networks • computer (Spain) • to set the table • to upload photos • often, many times • to do the shopping • to have a good time • to wash the clothes • to surf the internet • to take out the trash • whiteboard/blackboard • ...
spanish 2025-08-22
Across
- lively
- persistent
- compra to do the shopping
- to clear the table
- homework
- always
- capable
- playful
- often, many times
- student desks
- comitted
- passionate
- never
- computer (Spain)
- to surf the internet
Down
- social networks
- to wash the clothes
- to take out the trash
- challenging, demanding
- melancholic
- open-minded
- to think
- proud
- cell phone
- to have a good time
- to upload photos
- to set the table
- to chat online
- to dust the furniture
- whiteboard/blackboard
30 Clues: proud • never • lively • always • capable • playful • homework • to think • comitted • persistent • cell phone • passionate • melancholic • open-minded • student desks • to chat online • social networks • to upload photos • to set the table • computer (Spain) • often, many times • to clear the table • to wash the clothes • to have a good time • to surf the internet • to take out the trash • to dust the furniture • ...
Managing Risk 2023-03-08
Across
- A contract that defines the services,products, and time frames for the vendor to achieve.
- A location that consists of a building, facilities, desks,toilets, parking, and everything that a business needs except computers.
- A Document that defines what a person may and may not do on an organization’s computer and networks
- A document used to track the collection, handling, and transfer of evidence.
- The process of downgrading—undoing—a recently applied patch or updated.
- A document between a customer and a service provider that defines the scope, quality, and terms of the service to be provided.
Down
- Facility with all of the physical resources, computers, and network infrastructure to recover from a primary site disaster. A warm site does not have current backup data and it may take a day or more to recover and install backups before business operations can recommence.Aircrack-ng- An open source tool for penetration testing many aspects of wirless networks
- A set of procedures defining actions employees should perform to protect the network’s security.
- An open source tool for penetration testing many aspects of wirless networks
- A set of documents that Defines procedures for changes to the network.
10 Clues: A set of documents that Defines procedures for changes to the network. • The process of downgrading—undoing—a recently applied patch or updated. • An open source tool for penetration testing many aspects of wirless networks • A document used to track the collection, handling, and transfer of evidence. • ...
The influence of social networks 2012-10-21
Across
- If you want someone to become your friend on Facebook, you send him a ...
- He's giving too much personal details, he's ...
- The person who ... secret information about the royals to the press, can be fined for this.
- Most information on social networks isn't ..., because people who are connected to you can see your profile.
- On Facebook you can ... old friends, but it isn't like in real life.
- He was talkig to people who can help him in his professional life, he was ...
- You have to beware ... your personal information on social networks.
Down
- If you create an account on Facebook, you have to adapt your ..., otherwise everyone can see your pictures and comments.
- To observe
- When you have a profile on a social network, you have to ... it.
- The spread of something
11 Clues: To observe • The spread of something • He's giving too much personal details, he's ... • When you have a profile on a social network, you have to ... it. • On Facebook you can ... old friends, but it isn't like in real life. • You have to beware ... your personal information on social networks. • ...
Aris Crossword 2022-11-09
12 Clues: the backbone • binary digits • portable memory • read-only memory • wide area network • short-term memory • local area network • basic input/output system • network internal face card • is the brain of the computer • it handles all parts of the network • things to connect all networks together
Crossword 2022-11-07
Across
- device that allows you to plug into an ISDN line
- combination transmitter/receiver for wireless, cables, fiber-optics, and etc
- blocking or permitting certain application/ports from coming in or out to prevent unauthorized access
- digital interface device to connect data terminal equipment like a router
Down
- networking device that joins 2 networks
- network node that connects 2 networks with different transmission protocols
- internet communications and advanced services standard
- hardware that allows device on a network to communicate with each other
8 Clues: networking device that joins 2 networks • device that allows you to plug into an ISDN line • internet communications and advanced services standard • hardware that allows device on a network to communicate with each other • digital interface device to connect data terminal equipment like a router • ...
Cloud Computing Architecture 2014-01-12
Across
- rule
- running solely one application
- synonym for program
- multiple existence
- electronic letters
- Floating in the sky
- administers the whole system
- #Neuland
- customer
- prerequisite to use the medium
- the system side
- serves the networks needs
Down
- secure copy of all data
- touchable server
- the complete system
- UI
- I'm not a program!
- 0101 + 0110 = 1011
- float of data
- maximum amount of storage
- untouchable server
- maximum connectivity
- HDD,SSD,SD etc.
- the side the user sees
24 Clues: UI • rule • #Neuland • customer • float of data • HDD,SSD,SD etc. • the system side • touchable server • I'm not a program! • 0101 + 0110 = 1011 • untouchable server • multiple existence • electronic letters • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • maximum amount of storage • serves the networks needs • ...
Cloud Computing Architecture 2014-01-12
Across
- administers the whole system
- running solely one application
- multiple existence
- I'm not a program!
- touchable server
- #Neuland
- synonym for program
- float of data
- prerequisite to use the medium
- customer
Down
- electronic letters
- maximum connectivity
- the complete system
- serves the networks needs
- secure copy of all data
- UI
- untouchable server
- 0101 + 0110 = 1011
- HDD,SSD,SD etc.
- the system side
- the side the user sees
- maximum amount of storage
- Floating in the sky
- rule
24 Clues: UI • rule • #Neuland • customer • float of data • HDD,SSD,SD etc. • the system side • touchable server • electronic letters • multiple existence • I'm not a program! • untouchable server • 0101 + 0110 = 1011 • the complete system • synonym for program • Floating in the sky • maximum connectivity • the side the user sees • secure copy of all data • serves the networks needs • maximum amount of storage • ...
Crossword Activity 2022-08-16
Across
- increase communication networks
- capital of Karnataka
- cut the wires
- cream children like this
- holiday of the week
- this animal has a long trunk
- he catch the rat
- costly car
- it flies in the sky
- national bird
Down
- King of the jungle
- collection of books
- a tool in use for cricket
- it is an outdoor game
- day for second day
- national animal of india
- 4th month of the year
- slow down
- it is a pet animal
- before you leap
- watch the home
21 Clues: slow down • costly car • cut the wires • national bird • watch the home • before you leap • he catch the rat • King of the jungle • day for second day • it is a pet animal • collection of books • holiday of the week • it flies in the sky • capital of Karnataka • it is an outdoor game • 4th month of the year • cream children like this • national animal of india • a tool in use for cricket • ...
Electronics parts 2022-09-22
Across
- apps or brands
- shows information
- connect with eachother
- physical componets
- in control
- stores your data
- makes thing faster
- saves important stuff
- get anywhere in the internet
- connect other stuff
- networks
- programmed to do tasks
- wall for viruses
- easier to access websites
Down
- it allows you to type
- keeps the internet
- codes in the computer
- saves stuff
- records info
- helps people search
- connects internet to service provider
- recommendations
- research purpose
- connect people to data
- saves you from using data
25 Clues: networks • in control • saves stuff • records info • apps or brands • recommendations • stores your data • research purpose • wall for viruses • shows information • keeps the internet • physical componets • makes thing faster • helps people search • connect other stuff • it allows you to type • codes in the computer • saves important stuff • connect with eachother • connect people to data • ...
La tecnología 2024-11-16
Across
- . (dot)
- to copy
- to log off
- to download
- to stream
- mouse
- the camera
- the cell phone
- keyboard
- the videogames
- paste
- battery
- link
- monitor
- the headphones
- / (slash)
- the printer
- to delete
Down
- website
- the computer
- to save
- to cut
- the applications
- the television
- @ at
- the networks
- to print
- com
- the technology
- the charger
- to browse/surf (the web)
- password
- to log on
- screen
- WiFi
35 Clues: com • @ at • link • WiFi • mouse • paste • to cut • screen • website • to save • . (dot) • to copy • battery • monitor • to print • keyboard • password • to stream • to log on • / (slash) • to delete • to log off • the camera • to download • the charger • the printer • the computer • the networks • the television • the cell phone • the technology • the videogames • the headphones • the applications • to browse/surf (the web)
Practice Cybersecurity Terminology Puzzle 2025-03-14
Across
- Data hostage for ransom
- Protection of networks from threats
- Update that fixes vulnerabilities
- Requires multiple identity proofs
- Information about cyber threats
- Malicious software that harms systems
- Encoding sensitive information
- Impersonation to obtain information
Down
- Vulnerability with no available patch
- Weakness in a system
- Distributed denial-of-service attack
- Verifying user identity
- Converting data into codes
- Longterm targeted cyberattack
- Secure internet connection
- Unauthorized access to systems
- Blocks unwanted traffic
- Software that detects malware
- Software that secretly monitors
- Continuous cybersecurity monitoring
20 Clues: Weakness in a system • Data hostage for ransom • Verifying user identity • Blocks unwanted traffic • Converting data into codes • Secure internet connection • Longterm targeted cyberattack • Software that detects malware • Unauthorized access to systems • Encoding sensitive information • Information about cyber threats • Software that secretly monitors • ...
spainsh man 2025-03-21
Across
- text message
- the signing
- social networks
- the pool
- at home
- the lake
- the hospial
- the beach
- the mail
- the church
- the store
- to record videos
- the super market
- the school
- the cinema
- lol
Down
- the restaurant
- the email
- the museum
- to tweet
- the mountains
- the screen
- the cell phone
- the field
- past
- the shopping center
- the park
- click
- the bank
- the city
- the coffee
- the town
- the square
33 Clues: lol • past • click • at home • to tweet • the pool • the park • the lake • the bank • the city • the mail • the town • the email • the field • the beach • the store • the museum • the screen • the coffee • the church • the square • the school • the cinema • the signing • the hospial • text message • the mountains • the restaurant • the cell phone • social networks • to record videos • the super market • the shopping center
Vocabulario de Unit 1 2025-08-21
Across
- to have a good time
- to chat online
- to do the shopping
- open-minded
- playful
- capable
- challenging,demanding
- to take out the trash
- social networks
- passionate
- cell phone
- the students' desks
- to clear the table
- persistent
- to think
- whiteboard/blackboard
Down
- proud
- homework
- to surf the internet
- always
- to dust the furniture
- lively
- sometimes
- to set the table
- to wash the clothes
- often, many times
- computer (Spain)
- to upload photos
- committed
- never
- melancholic
31 Clues: proud • never • always • lively • playful • capable • homework • to think • sometimes • committed • passionate • cell phone • persistent • open-minded • melancholic • to chat online • social networks • to set the table • computer (Spain) • to upload photos • often, many times • to do the shopping • to clear the table • to have a good time • to wash the clothes • the students' desks • to surf the internet • to dust the furniture • ...
Communication Apps 2026-02-19
Across
- Creation
- quick message
- used for video conference
- Widely used chat
- Real time
- Website builder
- instant chat that is now on Facebook
- manages chats and info
- Face to face
- chat on computer
- Secure Switzerland based email
- A Email replacement
Down
- A free email service
- Instant chat on Facebook
- Conferencing service by google
- Made to learn
- Courses on internet
- Google website builder
- Team or group chat
- Professional networks
- Social media management
- Design social media post
- User friendly social media management
- Screen sharing
24 Clues: Creation • Real time • Face to face • Made to learn • quick message • Screen sharing • Website builder • Widely used chat • chat on computer • Team or group chat • Courses on internet • A Email replacement • A free email service • Professional networks • Google website builder • manages chats and info • Social media management • Instant chat on Facebook • Design social media post • ...
Telstra Xmas Crossword 2023-11-28
Across
- Cable system (4,4,8)
- Favourite colour?
- A Hub market
- Never ending tagline
- Not an old Workplace
- Head of International Networks (5,6)
- A Telstra value
- Arise from the flames
Down
- He's transforming our business (4,5)
- Old TV show with PoP
- A Telstra partner
- Month of our first Changemakers week
- Customer self-serve portal (6,6)
- Solve this Ambition pillar
- IGT23 winner (7,4)
- A Telstra partner
- Number of DCs we can sell Colo from (7,5)
- A special day
18 Clues: A Hub market • A special day • A Telstra value • A Telstra partner • Favourite colour? • A Telstra partner • IGT23 winner (7,4) • Old TV show with PoP • Cable system (4,4,8) • Never ending tagline • Not an old Workplace • Arise from the flames • Solve this Ambition pillar • Customer self-serve portal (6,6) • He's transforming our business (4,5) • Month of our first Changemakers week • ...
Telecom Basics 2021-02-05
Across
- A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient.
- Process of confirming a valid user is accessing the website
- First company to launch a smart Phone
- devide that forwards data packets between computer networks
- Physical Link or circuit that connects Customers Wireline Telephone to the Service provider’s Local Exchange Carrier
- a set of rules which governs how networks operate
- data sent to your computer by a Web server that records your actions on a certain Web site
Down
- common technology used for data transfer within the range of 10 metres
- First Mobile service provider in india
- UK has OFCOM, India has ___
- The ability to retain the telephone number, while changing from one service provider to another
- Set of processes that makes ensures what has been promised to the customer is being delivered continuously
- area covered by cellular base station
- The kind of Billing where payment needs to be done before using the service
- Indian Mobile network is divided into zones which are almost based on state boundaries
15 Clues: UK has OFCOM, India has ___ • First company to launch a smart Phone • area covered by cellular base station • First Mobile service provider in india • a set of rules which governs how networks operate • Process of confirming a valid user is accessing the website • devide that forwards data packets between computer networks • ...
antoine cyber security 2026-04-01
Across
- A cyber attack that tricks people into giving personal information through fake messages or websites
- Any software designed to harm, damage, or gain unauthorized access to a computer
- The process of converting data into a secret code to protect it
- A self-replicating malware that spreads across networks without needing a file
- Gaining unauthorized access to computer systems or data
- – A security method that requires two forms of verification to access an account
- – Malware that disguises itself as a safe program to trick users into installing it
- The process of proving who you are when logging into a system
- A type of malware that spreads by attaching itself to files and programs
Down
- Software that secretly collects information about a user without their knowledge
- Protecting data from unauthorized access, use, or damage
- A secret word or phrase used to verify a user’s identity
- Malware that locks or encrypts files and demands payment to restore access
- A security system that monitors and controls incoming and outgoing network traffic
- Protecting computer networks from unauthorized access or attacks
15 Clues: Protecting data from unauthorized access, use, or damage • A secret word or phrase used to verify a user’s identity • Gaining unauthorized access to computer systems or data • The process of proving who you are when logging into a system • The process of converting data into a secret code to protect it • ...
computing 2022-02-09
Across
- software that would be most appropriate to use to send an attached document to lots of people at the same time
- wired networks send data along ------
- the law protects the control you have over the things that you create
Down
- it is an electronic communication to bully others
- it is the worldwide network of computers
- protection of information systems from unauthorized access or modification to information
- a device that connects multiple devices together
- networks send and receive messages in small units of data known as ------
8 Clues: wired networks send data along ------ • it is the worldwide network of computers • a device that connects multiple devices together • it is an electronic communication to bully others • the law protects the control you have over the things that you create • networks send and receive messages in small units of data known as ------ • ...
Computer Virus 2024-07-07
Across
- A program designed to detect and remove viruses and other malicious software.
- Software designed to damage or disable computers and computer systems.
- A program that can replicate itself and spread to other computers.
- Crime involving computers and networks.
Down
- A system designed to prevent unauthorized access to or from a private network.
- A type of malicious software that disguises itself as legitimate software.
- A global network connecting millions of private, public, academic, business, and government networks.
- Software that collects information about online activities without the user's knowledge.
8 Clues: Crime involving computers and networks. • A program that can replicate itself and spread to other computers. • Software designed to damage or disable computers and computer systems. • A type of malicious software that disguises itself as legitimate software. • A program designed to detect and remove viruses and other malicious software. • ...
COSC 100 Assignment 6 2015-09-29
Across
- popular search engine
- corrupts or destroys data
- visits sites, to build index based on keywords
- one of the jobs of the M&M team
- Mac text editor
- group of information
- major challenge of a large website
- neutral content
- text editor program
- related group of networked computers
Down
- exclusive legal right
- physically connected to ISP's modem
- links topics/point-and-click
- consent
- codes to create webpages
- gain unauthorized access
- educational domain
- networks not geographically close
18 Clues: consent • Mac text editor • neutral content • educational domain • text editor program • group of information • exclusive legal right • popular search engine • codes to create webpages • gain unauthorized access • corrupts or destroys data • links topics/point-and-click • one of the jobs of the M&M team • networks not geographically close • major challenge of a large website • ...
Cross word puzzle GDSC Web 2022-11-30
9 Clues: main memory • security wall • microsoft email • result of a code • Laptop input device • instance of a class • network of networks • device to write code • Executable (exe) file
Information and Communication Technology 2023-02-23
Across
- - The practice of protecting computer systems and networks from digital attacks.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Programs and applications that run on a computer or mobile device.
- - Software designed to harm computer systems or steal data.
- system - The software that manages a computer's basic functions, such as memory and file systems.
- computing - A model for delivering computing resources over the internet.
- - An input device used for moving the cursor on a computer screen.
- - A device used for processing data and running programs.
- - The process of designing and writing code for software applications.
- - An output device that prints text and images on paper.
Down
- - An input device used for typing text and commands.
- - A type of malicious software that can damage or disrupt computer systems.
- - A structured collection of data that is stored and organized in a computer.
- - A global network of interconnected computer networks.
- - A device that connects multiple devices to a network and directs traffic between them.
- - A device that connects a computer to the internet.
- - The process of converting data into a code to prevent unauthorized access.
- - The physical components of a computer system, such as the CPU, hard drive, and motherboard.
- - A step-by-step procedure for solving a problem or accomplishing a task.
- - An output device that displays images and text.
20 Clues: - An output device that displays images and text. • - An input device used for typing text and commands. • - A device that connects a computer to the internet. • - A global network of interconnected computer networks. • - An output device that prints text and images on paper. • - A device used for processing data and running programs. • ...
JNAEP Fun 2015-02-17
Across
- The new two day course introducing users to features of the QFX5100
- The system to publish your training schedule for customers to search in the Juniper website
- A course formerly known as Security Threat Response Manager (STRM).
- A purchasing method for redeeming Juniper training and exam vouchers
- Complete your written lab exam with this certification provider
- The exam that ever Juniper certified instructor must pass at least once
- A course that gives students in depth knowledge of using the OpenStack and Contrail Web UIs
- These are short and concise tips and instructions that provide quick answers, clarity, and insight into specific features and functions of Juniper technologies.
- The CEO of Juniper Networks
- The total number of JNAEPs in the Americas
- A training modality allowing trainers and students to access a virtual classroom online
Down
- This would be the first course to prepare for the JNCIS-QF examination
- This was the code name for the M40 router.
- Abbreviation for Juniper partners authorized to sell and deliver official training
- Juniper Networks, Inc. NYSE ticker symbol
- Download this app to practice for an exam
- The highest level of Juniper certification
- The discount rate type that you should use for purchasing training lab equipment
- The name of the survey tool that customers should use after each class
- A Person certified to provide official Juniper training
20 Clues: The CEO of Juniper Networks • Juniper Networks, Inc. NYSE ticker symbol • Download this app to practice for an exam • This was the code name for the M40 router. • The highest level of Juniper certification • The total number of JNAEPs in the Americas • A Person certified to provide official Juniper training • ...
Upper Grade Orientation 2024-01-10
Across
- A set of codes which is responsible to complete one task in a program.
- Processes data using electronic technology.
- Often used to access web pages.
- An unit in the CPU which acts like a brain of the computer.
- You will click this to find more options.
- The different robots will work together to assemble a product.
- An item like a word or button that points to another location
- A device that detects and responds to input from the physical environment
- A device which connects network devices and enables users to exchange data packets
- A memory space allocated for the program to remember a value.
- Automated machine that can execute specific tasks
- A device that measures the changes in motion or vibration.
Down
- A tool or object used as hardware.
- Users type this to search for a term on the Internet.
- It conveys information to audience using an electronic tool.
- A device that requests access to a service provided by a server.
- A connection of all the computer peripherals.
- A single chip microprocessor unit.
- A device that connects two or more packet-switched networks, managing traffic between these networks by forwarding data packets to their intended IP addresses.
- A main computer in a network, which offers services to the other connected devices.
- The space around the printed area on a page.
21 Clues: Often used to access web pages. • A tool or object used as hardware. • A single chip microprocessor unit. • You will click this to find more options. • Processes data using electronic technology. • The space around the printed area on a page. • A connection of all the computer peripherals. • Automated machine that can execute specific tasks • ...
"Computers" 2024-11-22
Across
- A unit of digital information that consists of 8 bits
- The process of converting data into a coded form to prevent unauthorized access
- The physical components of a computer, such as the CPU and motherboard
- A structured collection of data stored in a computer
- A system of servers used for storing and accessing data over the Internet
- The central unit in a computer that performs calculations and tasks
- A screen that displays the output of a computer
- A machine that performs calculations and processes data
- A computer or program that provides data and services to other computers
Down
- A global network connecting millions of private and public networks
- A temporary storage area for frequently accessed data
- An input device with keys used to type characters and commands into a computer
- A secret word or phrase used for security to access devices or accounts
- Programs and operating systems used by a computer
- A device used to interact with a computer by clicking, dragging, and selecting items
- A set of rules or instructions for solving a problem or performing a task
- The process of converting information into a code for communication or storage
- A system designed to prevent unauthorized access to a network
- A group of computers and devices connected to share data and resources
- A device that directs data traffic between networks
20 Clues: A screen that displays the output of a computer • Programs and operating systems used by a computer • A device that directs data traffic between networks • A structured collection of data stored in a computer • A unit of digital information that consists of 8 bits • A temporary storage area for frequently accessed data • ...
Network and Security Basics Module 6 Chapter 5 2024-07-24
Across
- rules of communication that ensure packets are sent, recieved and integrated properly
- the connection of two or more central computers or LANS across a wide area
- contains the actual data being transmitted second part of a packet
- use of radio signals traveling through air to transmit data
- contains information needed by the network one part of a packet
- most desktop computers require an external or internal version of this to connect to a WAP
- complex device that stores the routing information for networks
Down
- similar to a hub but aware of the exact address or identity of all the nodes attached
- used to prevent attenuation when packets travel long distances
- in a mesh topology most nodes connect directly to each other
- a data communication system consisting of multiple devices relatively close to eachother
- the most popular standard for wireless networking
- internal version of the internet offered some organizations
- data moves through networks in structures known as
- the device at each node that performs translation and transmission
- used to share some of a company's intranet resources with others outside of the organization
- allows users to share and connect with different devices
- provide multiple ports for connecting nodes
- in this topology all nodes are connected to a hub or switch and communicate through it
- the logical layout of the cables and devices that connect the nodes of the network
20 Clues: provide multiple ports for connecting nodes • the most popular standard for wireless networking • data moves through networks in structures known as • allows users to share and connect with different devices • internal version of the internet offered some organizations • use of radio signals traveling through air to transmit data • ...
AI 2025-10-12
Across
- Idea that true intelligence needs a body.
- Early program that tried to model human reasoning.
- Central idea in Hofstadter and Mitchell’s theory of intelligence.
- The 2012 network that started the deep learning boom.
- The revival that followed, thanks to deep learning.
- Time when AI funding and optimism ran cold.
- Strength of a neuron’s output.
- Models inspired by how the brain processes vision.
- The examples used to teach an AI.
- The challenge of keeping AI’s goals human-friendly.
- Hofstadter’s idea for self-awareness.
- How neural networks adjust their connections.
Down
- Controls how much a neuron “fires.”
- Learning from rewards and punishments.
- One of the earliest programming languages.
- Company known for creating AlphaGo.
- Early approach using rules and symbols instead of data-driven learning.
- Field that inspired AI through ideas of feedback and control.
- Giant visual database used to train AI systems.
- Settings that guide how a model learns.
- Trick image that confuses an AI.
- The horse that “solved” math problems by reading cues.
- IBM’s computer that beat chess champion Garry Kasparov.
- The first artificial neuron model that could learn simple patterns.
- Layered networks that power modern AI systems.
- Hofstadter’s computer model of analogy-making.
- The 1956 workshop that officially launched the field of AI.
- The data used to check an AI’s learning.
- The point when AI surpasses human intelligence.
29 Clues: Strength of a neuron’s output. • Trick image that confuses an AI. • The examples used to teach an AI. • Controls how much a neuron “fires.” • Company known for creating AlphaGo. • Hofstadter’s idea for self-awareness. • Learning from rewards and punishments. • Settings that guide how a model learns. • The data used to check an AI’s learning. • ...
Network Crossword IDT 2022-09-30
Across
- A device that accepts requests to view websites.
- A network that connects multiple computers in a small area like a room or a group of buildings
- A device inside of a computer that allows it to connect to various networks.
- A security device that filters what comes in and out of a network.
- A network that connects multiple computers across long distances.
- A network in which devices have a direct connection to as many other devices in that network as possible.
- A device that connects multiple separate networks.
Down
- A network in which all devices are connected to one central point.
- A device that receives and forwards packets across a network.
- A device used to connect multiple computers.
- A bunch of connected computers.
- A device that connect to a network and extends that connection, typically through Wi-Fi, to other devices.
12 Clues: A bunch of connected computers. • A device used to connect multiple computers. • A device that accepts requests to view websites. • A device that connects multiple separate networks. • A device that receives and forwards packets across a network. • A network that connects multiple computers across long distances. • ...
Internet (unit 2 vocab 1) 2025-10-13
Across
- The main high-capacity network infrastructure linking major regions of the Internet
- High-speed data transmission technology that uses pulses of light through thin glass cables
- A network that connects computers within a limited area such as one building
- A device that serves as an entry and exit point for data moving between networks
- A network that spans a large geographical area such as several cities or countries
- A method of transmitting data by breaking it into small packets and sending them separately across a network
- An old method of Internet access using a telephone line and modem
Down
- A device that directs data packets between computer networks
- A company that provides Internet access to homes and businesses
- A small unit of data transmitted across a network
- The capacity of a communication channel to carry data
- High-speed Internet connection that transmits multiple data channels at once
12 Clues: A small unit of data transmitted across a network • The capacity of a communication channel to carry data • A device that directs data packets between computer networks • A company that provides Internet access to homes and businesses • An old method of Internet access using a telephone line and modem • ...
NETWORKING CONCEPTS 2025-06-07
Across
- card used to physically attach a computer to an network
- a network used to connect all computers in a network with each other
- some computers and peripheral devices are connected between a small room ,area, etc
- network device that connects two different types of networks with each other
- network structure in which two nodes are directly connected with each other
- overall design of a computer network that describes how a computer network is configured
- all nodes in a network are connected in a circular manner
Down
- each device connected to a central hub using a point to point connection
- wireless technology used to interconnect mobile phones, computers,etc
- computer network restricted to an organization
- a set of rules that determine how data should be transferred over networks
- connect a computer to the available internet connection over the existing telephone lines
- computer network mainly created foe an individual person
- protecting data and resources from any unauthorized access
- connect some computers located at distant places
15 Clues: computer network restricted to an organization • connect some computers located at distant places • computer network mainly created foe an individual person • card used to physically attach a computer to an network • all nodes in a network are connected in a circular manner • protecting data and resources from any unauthorized access • ...
computer science 2025-10-21
Across
- is the maximum amount of data that can be transferred over a network connection in a given period
- computer or system that provides resources, data, or services to other computers
- Network can be wired or wireless
- address An IP address is a unique numerical label assigned to each device connected to a computer network
- cable also known as an ethernet cable
- a set of rules that govern how data isn transmited
- networking device that connects multiple computer networks, such as your home network to the internet.
- Transmission is the process of transferring data from one device to another over a communication medium
Down
- sometimes simply called the net, is a worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols
- electronic mail
- central device in a network that connects multiple computers
- hardware allowing devices to contact and communicated with eachover
- network connects devices without physical cables
- is a core communication standard for the internet that ensures reliable
- is a small, formatted unit of data that travels over a network
- network is a computer network that uses physical cables
16 Clues: electronic mail • Network can be wired or wireless • cable also known as an ethernet cable • network connects devices without physical cables • a set of rules that govern how data isn transmited • network is a computer network that uses physical cables • central device in a network that connects multiple computers • ...
OCN 2013-08-21
11.5 Vocabulary 2023-03-28
Across
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- IEEE designation for all wireless networking standards.
- Was introduced in 2018 to address the vulnerabilities inherent in the previous revision.
- Temporal Key Integrity Protocol
- Advanced Encryption Standard
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- Remote Authentication Dial-In Service
- An enhancement that allows multiple antennas to use the same radio frequency.
- Wireless authentication method that uses a passphrase to authenticate users.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- A method that combines channels into one to increase bandwidth.
Down
- It was introduced in 2004 and is still heavily used in today's networks.
- Terminal Access Controller Access-Control System
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Was developed at MIT and is a key component of Windows Active Directory.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Service Set Identifier
- Security flaw that can occur with a wireless network
18 Clues: Service Set Identifier • Advanced Encryption Standard • Temporal Key Integrity Protocol • Remote Authentication Dial-In Service • Terminal Access Controller Access-Control System • Security flaw that can occur with a wireless network • IEEE designation for all wireless networking standards. • A method that combines channels into one to increase bandwidth. • ...
Cyber security 2023-11-28
Across
- Desktop is also known as.
- Hiding one piece of data with in another.
- The crime that related to computers and networks.
- A piece of malware that can replicate itself in order to spread the infection to other connected computer without human interaction.
- Secretly watches computer activity.
- Phishing is malware that asks for ______ details.
- Any program, website, or file that is defined to damage or gain unauthorized access to a device.
- The practice of protecting systems, networks and programs from digital attacks.
Down
- Someone who breaks into a computer system.
- URLs that mislead the user into down leading a virus and visiting a harmful website.
- Illegal production of copyrighted material is often referred as ____.
- Information is also known as.
- A form of malware that deliberately prevent u from accessing files in ur computer,until they are decrypted using at a cost.
- Type of bullying that takes place online.
- ____ is the ability to act in a safe and responsible manner on the internet and other connected environments.
- An online threat that hides itself in computers and mobile device.
- Software that protects computer from virus related harm.
- Copying the data without the permission of owner of the computer/computers system/ computer network.
18 Clues: Desktop is also known as. • Information is also known as. • Secretly watches computer activity. • Hiding one piece of data with in another. • Type of bullying that takes place online. • Someone who breaks into a computer system. • The crime that related to computers and networks. • Phishing is malware that asks for ______ details. • ...
The Internet and Networks 2025-01-15
Across
- The time that data takes to transfer across the network (7)
- A unique address for a device on a network (2, 7)
- Connects your devices wirelessly (4)
- The maximum rate at which data can be transferred across a network (9)
- When data can be sent and received at the same time (4-6)
- Cable used to connect devices to a network (often blue) (8)
Down
- Transfers data using light (5, 5)
- Device that manages data traffic (6)
- When data can only be sent in or received, not both at the same time (4-6)
- The actual amount of data that is transmitted across a network (10)
- Device which directs traffic within a network (6)
- What data is broken into before being sent across a network (7)
- Converts digital to analog (5)
13 Clues: Converts digital to analog (5) • Transfers data using light (5, 5) • Device that manages data traffic (6) • Connects your devices wirelessly (4) • A unique address for a device on a network (2, 7) • Device which directs traffic within a network (6) • When data can be sent and received at the same time (4-6) • The time that data takes to transfer across the network (7) • ...
Networks and Internet 2014-09-02
9 Clues: 8 bits • World Wide Web • Another word for link • Referred to as information • Might be a charity on the internet • Two or more devices linked together • Protocol determines a way to behave • Hello Firefox this chrome how are you ? • converts a web address or URL into the correct IP address for the computer
Networks and Internet 2020-11-06
Across
- a group of two or more computers linked together
- a network of networks that connects computers globally
- a program that lets you find, retrieve view and send hypertext and hypermedia documents over the web
- a network in a room or building
Down
- a document that contains links to text, graphics, sound or video files
- a micro version of the internet within a company or organisation
- allows data to be transmitted over a telephone line to get to the computer.
- a network that connects computers over a large geographic area.
- the address of an internet file
9 Clues: the address of an internet file • a network in a room or building • a group of two or more computers linked together • a network of networks that connects computers globally • a network that connects computers over a large geographic area. • a micro version of the internet within a company or organisation • ...
Energy Networks' Crossword 2024-01-04
Across
- ENA Chief Executive (8)
- Device that changes voltage levels in the power distribution system (11)
- The barman at the summer town hall event (5)
- A [BLANK] market that enables customers to shift when and how much electricity they use or generate for money (11)
Down
- Our Christmas party gamesmaster (4)
- Series of planned and managed power cuts (3;abbreviated)
- All companies that are in the ENA (7)
- Energy derived from sources that are naturally replenished (9)
- The decline in mental and/or physical performance that results from prolonged exertion (7)
9 Clues: ENA Chief Executive (8) • Our Christmas party gamesmaster (4) • All companies that are in the ENA (7) • The barman at the summer town hall event (5) • Series of planned and managed power cuts (3;abbreviated) • Energy derived from sources that are naturally replenished (9) • Device that changes voltage levels in the power distribution system (11) • ...
IT Careers 2024-04-11
Across
- Build and maintain the client-side components of websites and web applications, including HTML, CSS, and JavaScript code.
- Plan, coordinate, and oversee web design projects from initiation to completion. They manage resources, timelines, and budgets, communicate with stakeholders, and ensure project objectives are met within scope and quality standards.
- Create visually compelling designs, graphics, and branding elements for websites and digital media.
- Design, develop, and maintain software applications and systems.
- Manage and maintain computer systems, networks, and servers. They are responsible for ensuring the smooth operation, security, and reliability of IT infrastructure.
- Protect computer systems, networks, and data from cyber threats and attacks. They monitor security incidents, conduct risk assessments, and implement security measures to safeguard information assets.
Down
- Develop and maintain the server-side components of websites and web applications, including databases, APIs, and server logic.
- Manage and maintain databases, including installation, configuration, backup, and optimization. They ensure data integrity, security, and availability for efficient data management.
- Develop and maintain websites and web applications, specializing in areas such as frontend, backend, or full stack development
- Test software applications and systems to identify defects, bugs, and performance issues. They develop test plans, execute test cases, and report findings to ensure software quality and reliability
- Analyze website performance, user behavior, and traffic data to identify trends, insights, and opportunities for improvement
- Design, implement, and manage computer networks, including hardware, software, and protocols. They ensure network performance, security, and availability.
- Create visually appealing and user-friendly websites by designing layouts, graphics, and user interfaces.
13 Clues: Design, develop, and maintain software applications and systems. • Create visually compelling designs, graphics, and branding elements for websites and digital media. • Create visually appealing and user-friendly websites by designing layouts, graphics, and user interfaces. • ...
Computers, Gabriella Protash 2020-10-01
Across
- hard connections
- Starting up a computer from a halted or powered down condition
- Storage device that stores digitally encoded data on rapidly rotating rigid disks with magnetic surfaces.
- A machine that performs calculation to precise instructions
- Temporary storage
- Groupings of 1's and 0's that makes information that a computer can understand.
- Stores data and information and is usually volatile.
- An example of software
- Hardware and software
- connects the different parts of a computer together
- A computer or series of computers not connected by cables of any kind.
- How your computer remembers things
- wireless internet card
- Programs that make the computer work.
- Something anyone can operate
- Software used to control the computer and its peripheral equipment.
- Excel, word, photoshop, etc
Down
- Stores executing program instrutions
- An example of software
- Read only memory
- random access memory
- memory Long term data storage
- Memory, motherboard, central processing unit (CPU)
- wide area networks
- Physical components of a computer
- Permanent storage
- Responsible for carrying out instruction of a program
- Local area networks
- Center of the network
- How you tell your computer remembers things
- A device that provides electricity to a computer.
- How computers tells your computer remember tells you things
- How your computer talks to other computers
- Programs or applications
34 Clues: hard connections • Read only memory • Temporary storage • Permanent storage • wide area networks • Local area networks • random access memory • Hardware and software • Center of the network • An example of software • An example of software • wireless internet card • Programs or applications • Excel, word, photoshop, etc • Something anyone can operate • memory Long term data storage • ...
Security and Networking 2024-07-24
Across
- Mining New patterns or relationships between data.
- A scam that threatens to delete or expose victims stolen data for money.
- provides multiple port for connecting nodes.
- Term for many types of malicious computer programs that is created to harm users and their computer systems.
- Some information sytems are called.
- A node on a network that serves as an entrance to another network.
- Is a type of computer that is able to continue when problems are present.
- Any step taken to ward off a threat.
- Allows sharing and communication between devices.
- A weakness that's not protected against threats.
Down
- system The complex system for acquiring, storing, organizing, using, and sharing data and information.
- Authentication Its two forms of identification, one being your password and entering a code sent directly to you.
- Information System Software tools that allows managers to gather, organize, and evaluate information.
- Is term for infected computers that under control of a hacker.
- warehouse Is an enormous digital warehouse that contains archived data gathered from multiple databases.
- Assessment Used to identify and examine possible threats.
- Anything that causes harm.
- The act of gaining someones trust by pretending you are someone else.
- Structures that data moves through networks.
- Is used to share company resources with individuals not in the organization.
- Designed to report activity on your computer to another party.
- The most widely used standard for local area networks.
22 Clues: Anything that causes harm. • Some information sytems are called. • Any step taken to ward off a threat. • provides multiple port for connecting nodes. • Structures that data moves through networks. • A weakness that's not protected against threats. • Allows sharing and communication between devices. • Mining New patterns or relationships between data. • ...
Solids and thermochemistry 2023-06-29
Across
- The most common type of exothermic reaction
- Graphite can conduct electricity due each carbon having a free _________
- In diamond, each carbon is bonded to ______ other carbons
- Metals are good conductors of heat and _________
- Conduction of electricity requires _________ particles that are free to move
- When energy is released in a reaction
- During an endothermic reaction you will see a temperature ___________
- Molecules are made of ________ atoms bonded together
- Ionic solids can conduct in molten (liquid) or ________ state
- Ionic solids are _______ which means they will break if a force is applied
- Bond _______ takes in energy
- Giant covalent networks have ______ melting points due to very strong covalent bonds
Down
- Double bonds have more energy than single bonds? True or false
- Attractive forces (bonds) between molecules
- Atoms in giant covalent networks are held together by very strong _______ bonds
- Bond ______ releases energy
- Ionic solids are made of networks of ions with ________charges
- During an exothermic reaction you will see a temperature ___________
- When energy is absorbed in a reaction
- Attractive forces (bonds) between atoms in a substance
- the term for electrons that move between metal atoms
- The shape of the bonds around each C in diamond or each Si in silicon
- ________ intermolecular bonds in a solid means a low melting point
- In graphite, each carbon is bonded to ______ other carbon atoms
- Strong intermolecular bonds in a solid means a _______ melting point
25 Clues: Bond ______ releases energy • Bond _______ takes in energy • When energy is absorbed in a reaction • When energy is released in a reaction • Attractive forces (bonds) between molecules • The most common type of exothermic reaction • Metals are good conductors of heat and _________ • the term for electrons that move between metal atoms • ...
negede gizaw 2024-12-06
Across
- Which element of a security policy describes how users identify themselves to gain access to network resources?
- creates a barrier between networks so that potentially
- only backs up files that have changed since the last full backup
- is a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached
- Protocol version a mutual authentication protocol
- packets can’t enter or leave the protected networks
- backs up any files that have changed since the last full or incremental backup
- most incoming packets that have been requested
- prevents people from using eavesdropping technology
- used in a Windows domain environment and provides mutual
Down
- creates a barrier between a computer OS and the network
- creates a barrier between two entities
- used by OSs and network devices offer varying levels of secure authentication
- Extensible Authentication Protocol a framework for other protocols
- attackers who do not report problems,
- all of the disk’s contents are backed up as individual folders and files
- a framework for other protocols
- backs up the disk sector by sector to create an exact image of the disk’s contents
- an industry standard client server protocol that offers centralized control
- provide encryption and authentication
- Password Authentication Protocol
- come with a built-in host firewall that is preconfigured to
22 Clues: a framework for other protocols • Password Authentication Protocol • attackers who do not report problems, • provide encryption and authentication • creates a barrier between two entities • most incoming packets that have been requested • Protocol version a mutual authentication protocol • packets can’t enter or leave the protected networks • ...
securing and maintaining an OS 2024-12-07
Across
- Multifactor Authentication
- what users can do after they are logged on to the network.
- Most Linux distributions have a built-in firewall called
- Encrypting File System.
- prevents people from using eavesdropping technology, such as a protocol analyzer.
- Windows Server Update Services
- a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen host firewall a barrier between a computer OS and the network so potentially. harmful packets can’t enter or leave the OS
- backup backs up the disk sector by sector to create an exact image of the disk’s contents.
- file allocated disk area that holds information that is swapped back and forth from RAM to disk.
- firewall creates a barrier between networks so that potentially.harmful packets can’t enter or leave the protected networks.
- packets can’t enter or leave the protected networks
Down
- certificates a digital certificate from a CA, which is responsible for verifying the applicant’s authenticity.
- policy a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps
- management to take control of Microsoft product updates a process is called.
- who has access to the network.
- if rules are breached.
- firewall
- a unique biometric identifying trait.
- key series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- Password Authentication Protocol
- hat who are paid to probe networks and vulnerabilities.
- creates a barrier between two entities.
22 Clues: firewall • if rules are breached. • Encrypting File System. • Multifactor Authentication • who has access to the network. • Windows Server Update Services • Password Authentication Protocol • a unique biometric identifying trait. • creates a barrier between two entities. • packets can’t enter or leave the protected networks • ...
CROSSWORD 2025-05-30
Across
- The art and technique of designing and using typefaces.
- The first pages of a publication, often its visual presentation.
- Related to technology that uses data in the form of numbers, such as computers.
- Images captured with a camera, essential in any visual medium.
- The framework or skeleton that provides support and order to a design or content.
- Creating the illusion of movement from static images.
- Programs designed to perform a specific task on a device.
- A periodical publication with articles, photos, and advertisements, often themed.
- An image format that allows for short animated sequences.
- Captivating attention or arousing curiosity.
- Norms or principles that govern a process or system, such as those of composition.
Down
- Fulfilling its purpose effectively and practically.
- The presentation or display of a project or ideas to an audience.
- A list of people who contributed to the creation of a work or publication.
- Existing only in cyberspace, not in the physical world.
- The process of creating and planning the appearance and function of an object or interface.
- A set of intersecting lines that organize the space of a design.
- The quality of something that pleases the eye or seduces.
- A technology giant known for its search engine and various online tools.
- A set of interconnected systems, such as social networks, that enable communication.
20 Clues: Captivating attention or arousing curiosity. • Fulfilling its purpose effectively and practically. • Creating the illusion of movement from static images. • The art and technique of designing and using typefaces. • Existing only in cyberspace, not in the physical world. • The quality of something that pleases the eye or seduces. • ...
Tech Facts 2022-09-30
Across
- This game console was first released in 1995
- A facility allowing computers, smart phones, or other devices to connect to the internet
- Where PTP tests and learns new devices
- Which company announces new devices at 9:41am?
- A vast computer network linking smaller computer networks worldwide
- Popular floor cleaning robot
- The #1 smart phone in the world :-)
- A website dedicated to anything Android
- Device __________ provided by P360
- a technology that superimposes a computer-generated image on a user's view of the real world 2 words
- sends and receives data on computer networks
- What does WWW stand for in a URL? 3-words
- Texting from an iPhone
Down
- This recent protocol is gaining traction in the consumer market and increases security and privacy risks
- Most popular smart lights! 2 words
- Top rated smart refrigerator manufacturer
- Google's smart home camera
- This OS controls 88% of the world's smartphone market
- Largest ecommerce seller
- Most popular search engine
- What does the "i" in iPhone stand for?
- an egg that can be found by continuously clicking the version number in the about screen on an android phone
- The top #1 most played popular game in the world right now
- Most popular streaming service
- Smart thermostat with a bee in the logo
- Most popular PC game of 2022
- Wireless apple headphones
- Amazon smart speaker
28 Clues: Amazon smart speaker • Texting from an iPhone • Largest ecommerce seller • Wireless apple headphones • Google's smart home camera • Most popular search engine • Popular floor cleaning robot • Most popular PC game of 2022 • Most popular streaming service • Most popular smart lights! 2 words • Device __________ provided by P360 • The #1 smart phone in the world :-) • ...
Computer Network Puzzle 2026-03-31
Across
- The OSI layer that determines routing and logical addressing (like IP).
- The top layer of the OSI model that interacts directly with the end user.
- The process of dividing a network into smaller sub-networks.
- A routing technique where packets are sent through all possible paths.
- A unit of data transmitted across a network.
- A technique used to combine multiple signals into one transmission channel.
- The range of frequencies a communication channel can transmit.
- The number of cycles of a signal per second.
- A transmission medium that uses light signals through glass strands.
- The process of combining multiple smaller networks into a larger one.
- A type of cable consisting of two insulated copper wires twisted together.
- The OSI layer that manages and controls communication between devices.
Down
- The lowest OSI layer responsible for transmitting raw bits over a medium.
- A satellite that remains fixed relative to a point on Earth.
- The OSI layer that ensures error-free transfer between adjacent nodes.
- The OSI layer responsible for end-to-end delivery and error control.
- A technique used to avoid confusion with flag sequences in data frames.
- A method used for simple error detection in data transmission.
- The time taken to complete one full cycle of a signal.
- The OSI layer responsible for data encryption, compression, and translation.
20 Clues: A unit of data transmitted across a network. • The number of cycles of a signal per second. • The time taken to complete one full cycle of a signal. • A satellite that remains fixed relative to a point on Earth. • The process of dividing a network into smaller sub-networks. • A method used for simple error detection in data transmission. • ...
Word List 1 2022-09-13
Across
- This device helps to manage the server by commands.
- The location of computer network elements.
- The measurement of the amount of information that can be transferred between computers.
- A large system consisting of many similar parts that are connected together.
- Something that is easy to attack.
- A computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- The particular arrangement or pattern of a group of related things.
Down
- Something involving many different parts in a way that is difficult to understand.
- To be responsible for controlling or organizing someone or something.
- A networking device that forwards data packets between computer networks.
- A network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
- This device restores the network signal before the signal becomes too weak or damaged.
12 Clues: Something that is easy to attack. • The location of computer network elements. • This device helps to manage the server by commands. • The particular arrangement or pattern of a group of related things. • To be responsible for controlling or organizing someone or something. • A networking device that forwards data packets between computer networks. • ...
Foundation of AI 2 2026-03-22
Across
- NLP teaches machines to understand and generate human ______.
- Model ________ is a key stage in the AI Project Life Cycle where the model actually learns.
- What a computer learns from in Machine Learning.
Down
- A popular chatbot that serves as an example of NLP.
- ______ Learning involves training a computer to learn from data.
- Artificial neural networks are inspired by the ______.
- Deep Learning uses artificial ______ networks to handle complex tasks.
7 Clues: What a computer learns from in Machine Learning. • A popular chatbot that serves as an example of NLP. • Artificial neural networks are inspired by the ______. • NLP teaches machines to understand and generate human ______. • ______ Learning involves training a computer to learn from data. • Deep Learning uses artificial ______ networks to handle complex tasks. • ...
AI Vocabulary Task 2020-11-29
Across
- propagation Learning algorithm that computes a gradient descent with respect to weights
- rate configurable hyperparameter used in the training of neural networks
- Tendency towards something.
- network A network of neurons
- Process related to categorization.
- intelligence Intelligence that is programmed by humans to perform activities that require human intelligence.
- Reducing something to the smallest possible amount.
- propagation Processing data and passing it to successive layers
- learning Artificial intelligence that enables self-learning from data and then applies that learning without the need for human intervention.
- extraction Process of reducing data set by identifiying key features
- error measure of error between what value your model predicts and what the value actually is
- function measure of error between what value your model predicts and what the value actually is
- Characteristic that is retained or reproduced throughout different data sets of the same conetxt.
Down
- An element, feature, or factor that can be changed or adapted.
- descent Optimization algorithm for finding a local minimum
- Forseing a future state or result.
- A Collection of neurons.
- Process of distinguishing elements using unique properties.
- A finite sequence of well-defined, computer-implementable instructions.
- Value that is attached to nodes.
- learning Learning process that uses artificial neural networks to recognize patterns and predict a certain output.
- Part of a larger group of related things.
22 Clues: A Collection of neurons. • Tendency towards something. • network A network of neurons • Value that is attached to nodes. • Forseing a future state or result. • Process related to categorization. • Part of a larger group of related things. • Reducing something to the smallest possible amount. • descent Optimization algorithm for finding a local minimum • ...
Technology Terms 2021-05-06
Across
- a document sent with an email message
- a way of sending messages over the internet
- load and initialise operating system on a computer
- page that an Internet browser first opens up to
- a type of email fraud
- wireless communication instead of cables
- Computer-aided design
- string of characters typed into a browser to access a website
- to archive and compress files into one file
- device that allows computers to transmit information
- security system to protect networks from outside connections
- a computer that handles requests for data
- a saved link to a particular Web page
- central processing unit
- enables a computer user to search information on the Internet
Down
- program developed to do harm to other computers
- data temporarily stored on your computer
- refers to unsolicited email
- connecting computers on a network with a wired connection
- software program that allows you to surf the web
- a programming language
- physical place where a computer stores information
- set of connected networks that allow computers in different locations to exchange information
- the brains of your computer
- currently connected to a network or to the Internet
- a piece of programming code inserted to cause damage
- computers on a network that are managed as a unit
- access and save software/files to your computer
28 Clues: a type of email fraud • Computer-aided design • a programming language • central processing unit • refers to unsolicited email • the brains of your computer • a document sent with an email message • a saved link to a particular Web page • data temporarily stored on your computer • wireless communication instead of cables • a computer that handles requests for data • ...
HACKING CROSSWORD 2022-11-18
Across
- for transfering files between computer
- This layer interfaces directly to the application and preforms common application services for the application processes
- is used to send a test packet, or echo packet, to a machine to find out if the machine is reachable
- This layer routes the information in the network
- Translates URLs into web addresses
- Displays web pages
- used to verify the DNS server is running
- tells you what connections your computer currently has
- A command that queries a target IP address for information
- This layer describes the logical organization of data bits transmitted on a particular medium on two layers (MAC) and (LLC)
Down
- Retrieves email
- The layer relieves the application layer of concern regarding syntactical differences in data representation within the end-user system
- This layer provides end-to-end communication control
- tells you if the packet got to the destination, tells you how long it took, and how many hops it used
- this layer provides the mechanism for managing the dialogue between end-user application processes
- If you want to connect two or more networks
- This layer describes the physical properties of the various communications media, as well as the electrical properties and interpretation of the of the exchanged signals.
- this model shows how networks communicate
- used to boost your signal
- Used for chat rooms
20 Clues: Retrieves email • Displays web pages • Used for chat rooms • used to boost your signal • Translates URLs into web addresses • for transfering files between computer • used to verify the DNS server is running • this model shows how networks communicate • If you want to connect two or more networks • This layer routes the information in the network • ...
Networking Hardware, Topologies and Protocols 2023-05-22
Across
- Network arrangement that has data all communicated across one line.
- Data item which says that you can transmit across the network.
- Network arrangement that has data going through a central node or device.
- Type of smaller computer that accesses resources on a network.
- Type of large computer that has (hosts) a number of services shared out to others e.g. web sites, printers, file sharing etc.
- Data item in which the destination, actual data, and source are all contained in the one item.
- Allows connection between two networks of the same type.
- Rules
- Network type that refers to all the computers spread across multiple areas.
- Network arrangement which is a combination of two or more of the others.
- Network arrangement that has data all going in one direction using a token.
Down
- Broadcasts to everyone.
- Network type that refers to all the computers in a suburb within an organisation.
- Sends data on paths, with all data guided intelligently to its destination.
- Another word for 'computer' but specifically on a network.
- Sends data on paths.
- Protocol that runs the internet
- Allows connection between two networks of different types.
- Network type that refers to all the computers in one area or building.
- Protocol that allows computers and devices to connect to each other without wires.
20 Clues: Rules • Sends data on paths. • Broadcasts to everyone. • Protocol that runs the internet • Allows connection between two networks of the same type. • Another word for 'computer' but specifically on a network. • Allows connection between two networks of different types. • Data item which says that you can transmit across the network. • ...
TOPIC 8 2024-05-02
Across
- What technology provides high-speed internet access through cable television lines?
- What are programs and operating information used by a computer?
- What refers to buying and selling goods or services over the internet?
- What are materials that do not conduct electricity?
- What technology uses unique biological characteristics for authentication?
- What refers to the physical components of a computer system?
- What are private networks that can only be accessed by authorized users?
- What material has electrical conductivity between a conductor and an insulator?
- What connects computers and other devices to share resources and information?
Down
- What is the process of combining multiple signals into one signal?
- What focuses on protecting computer systems from theft or damage to their hardware, software, or electronic data?
- What technology delivers computing services over the Internet?
- What technology overlays digital information on the real world?
- What is a decentralized and distributed digital ledger used for secure transactions?
- What are private networks that allow access to specific external users?
- What is a type of artificial intelligence that enables systems to learn from data?
- What technology uses lasers to read and write data on discs?
- What process converts information into a code to prevent unauthorized access?
- What concerns the protection of sensitive information from unauthorized access?
- What allows users to access data and information from anywhere using mobile devices?
20 Clues: What are materials that do not conduct electricity? • What technology uses lasers to read and write data on discs? • What refers to the physical components of a computer system? • What technology delivers computing services over the Internet? • What technology overlays digital information on the real world? • ...
OCN 2013-08-21
SOCIAL NETWORKS 2023-09-26
6 Clues: WHO IS THE FOUNDER OF FACEBOOK? • WHAT MONTH WAS TWITTER FOUNDED? • FACEBOOK OFFER THE PURCHASE OF? • WHO MADE THE FIRST TWEET IN TWITTER HISTORY? • LINKEDIN IS A BUSINESS AND _____ SOCIAL MEDIA PLATFORM • THE USE OF SOCIAL NETWORKING FOR ____ CAN REDUCE ADVERTISING AND PROMOTIONAL COST
Social networks 2026-03-26
Across
- to subscribe to someone’s account on a social network so you can see their posts and updates in your feed
- something (like a post or video) that spreads very quickly online and is seen by many people
- to mention or link a person in a post, photo, or comment
Down
- a system of connected people or accounts on a platform where users interact and share content
- a short photo or video that disappears after a limited time (usually 24 hours)
- to put a photo, video, or file onto the internet
6 Clues: to put a photo, video, or file onto the internet • to mention or link a person in a post, photo, or comment • a short photo or video that disappears after a limited time (usually 24 hours) • something (like a post or video) that spreads very quickly online and is seen by many people • ...
Computer Networks 2025-12-09
Across
- Software used to simulate and configure networks in laboratory works.
- Protocol that prevents loops at OSI Layer 2.
- Cable type used to connect two computers directly.
Down
- Protocol that automatically assigns IP addresses.
- A simple network of two computers without intermediate devices.
- Technology used to logically divide a network into separate segments.
6 Clues: Protocol that prevents loops at OSI Layer 2. • Protocol that automatically assigns IP addresses. • Cable type used to connect two computers directly. • A simple network of two computers without intermediate devices. • Software used to simulate and configure networks in laboratory works. • Technology used to logically divide a network into separate segments.
Operating System & Networking 2022-09-26
Across
- chip which is the master control circuit of a computer
- connects computers without the use of cables or wires
- protecting a business or organization's data assets
- covers the small area around a user's workspace
- local, privately owned networks
- network which provides connections between computers in multiple locations
- device dividing traffic on a local area network
- extremely fast computer, can support hundreds or thousands of users simultaneously
- multi-user computer designed to handle hundreds of users at the same time
Down
- machine which can be programmed to control symbols
- programs which direct the operation of computers; instructions for a computer
- method of travel for informaton from computer-to-computer; consists of light waves, radio waves, microwaves, etc
- small, single-user computer used in homes and businesses
- variation of the unix operating system
- physical and mechanical components of a computer such as the monitor, mouse, chips, etc
- a person who designs, writes and installs computer programs and applications
- serves as a security device between a computer and internet sites or between multiple computer networks
- powerful, single-user computer
- worldwide, publicly access network
- system for communication between two or more computers
- tags and instructions developed by the creator which tell the foundation of the system and how it was created
- designed to be a small, flexible system for use by computer programmers
22 Clues: powerful, single-user computer • local, privately owned networks • worldwide, publicly access network • variation of the unix operating system • covers the small area around a user's workspace • device dividing traffic on a local area network • machine which can be programmed to control symbols • protecting a business or organization's data assets • ...
