networks Crossword Puzzles
Networks 2025-10-08
4 Clues: Two or more connected devices • Created by Sir Tim Berners-Lee • An agreed set of standards for communication • A network of networks. The largest in the world
Social 10-2 Ch. 1 TNN 2025-09-10
Across
- one company hiring another company to fulfill certain tasks in production
- the different ways of delivering mass communication, such as the internet, radio, and television
- the process by which the world’s citizens are becoming increasingly connected to and dependent on one another
- a person who buys goods or services for personal use
Down
- a corporation that operates in two or more countries
- the process by which people’s lifestyles spread over global networks
- the process of expanding world trading networks
- the basic physical systems of a community including roads, utilities, water, sewage, bridges, etc.
8 Clues: the process of expanding world trading networks • a corporation that operates in two or more countries • a person who buys goods or services for personal use • the process by which people’s lifestyles spread over global networks • one company hiring another company to fulfill certain tasks in production • ...
Connective Tissue 2022-10-03
Across
- cartilage cells
- produced by cells
- blood cells
- forms delicate networks that surround small blood vessels and support tissues of organs
- connective tissue proper cells
- connects body parts
- extremely tough, thick
- covers whole range of vascularity
Down
- found in skin, lungs, and blood vessel walls
- holds large amounts of fluids
- rises from mesenchyme
- poor vascularity
- bone cells
13 Clues: bone cells • blood cells • cartilage cells • poor vascularity • produced by cells • connects body parts • rises from mesenchyme • extremely tough, thick • holds large amounts of fluids • connective tissue proper cells • covers whole range of vascularity • found in skin, lungs, and blood vessel walls • ...
SSE OSI Model Crossword 2 2018-10-08
Across
- USER DATA IS TRANSFERRED/RECEIVED
- PDU AT THE TRANSPORT LAYER
- FILTERS THE NOISE IN TRANSMISSION
- CABLE USED IN SET TOP BOXES
- USED TO TRANSPORT BITS
Down
- PDU AT THE DATALINK LAYER
- NO CLIENT AND NO SERVER
- TCP,UDP PROTOCOLS
- USED TO CONNECT SEGMENTS OF LAN
- SPANS A CITY
- INTERCONNECTION OF SYSTEMS
- HIERARCHICAL TOPOLOGY
- ADDRESS THAT IS LOGICAL
13 Clues: SPANS A CITY • TCP,UDP PROTOCOLS • HIERARCHICAL TOPOLOGY • USED TO TRANSPORT BITS • NO CLIENT AND NO SERVER • ADDRESS THAT IS LOGICAL • PDU AT THE DATALINK LAYER • PDU AT THE TRANSPORT LAYER • INTERCONNECTION OF SYSTEMS • CABLE USED IN SET TOP BOXES • USED TO CONNECT SEGMENTS OF LAN • USER DATA IS TRANSFERRED/RECEIVED • FILTERS THE NOISE IN TRANSMISSION
Networking Basics 2014-03-16
Across
- Converts packets of systems into electrical signals to be sent over the media.
- Topology similar to linear bus topology, except that tree networks can contain branches with multiple nodes.
- Refers to the configuration of cables, computers, and other peripherals, and the method used to pass the information between workstations.
- Transmits data to intended recipient, creates internal connections, and isolates communications on one port.
- Used in between networks, determines shortest path to a destination and uses a routing table to look up an address.
- Series of ports that receive signals for network components or redirects them to other network systems.
- Measurement of bit-rate of available or consumed data communication resources expressed in bits per second or multiples of it.
- Network used for data transmission among devices such as computers, telephones and personal digital assistants.
- End point of a network connection. Includes any device attached to a network.
- Computers that provide shared resources to network users.
- Network that is confined to a relatively small area (such as a school or building).
Down
- Program makes a service request from another program.
- A twisted pair cable for carrying signals that is used in structured cabling for computer networks such as Ethernet.
- Allows an electronic device to exchange data or connect to the internet wirelessly.
- A network protocol invented by Xerox Corporation and developed jointly by Xerox, Intel and Digital Equipment Corporation.
- A cable to which multiple nodes or workstations are attached.
- Topology in which each node on a network is connected directly to a central network hub or concentrator.
- A network connecting computers over a large geographical area, such as a city or school district.
- Uses rules to filter traffic into and out of the private network, to protect the private network users and data from hac
- The possible values that may be stored in a variable.
- A network topology in which each node attaches directly to a common cable.
- Site that offers Internet access over a wireless local area network (WLAN)through the use of a router connected to a link to an Internet service provider.
- A network in which resources and files are shared without a centralized management source.
- Topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node.
24 Clues: Program makes a service request from another program. • The possible values that may be stored in a variable. • Computers that provide shared resources to network users. • A cable to which multiple nodes or workstations are attached. • A network topology in which each node attaches directly to a common cable. • ...
lesson 24 2016-04-20
Across
- A device on a network; generally shares resources such as printers, software, and other hardware.
- Method of high-level security that examines a fingerprint, voice pattern, or the iris or retina of the eye and matches it with the original entry in the system.
- (WLAN) A variation of a LAN that uses no physical wires.
- A network in which all the computers are equal; no computer is designated as the server.
- Connects two or more LANS to form a WAN.
- (WISP) Provides connection speeds more than 30 times faster than dial-up connections.
- Device that enables a computer to transmit voice data over telephone lines.
- Small, simple, inexpensive device that joins multiple computers together.
- A software program such as Internet Explorer.
- Special hardware and software that protect individual companies' networks from external networks.
- (LAN) Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area.
- Similar to an intranet, but allows specific users outside of the organization to access internal information systems.
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
Down
- Uses coaxial cable to send and receive data.
- Acts as an intermediary between a user and the Internet to ensure security, administrative control, and caching service.
- Hardware such as a mail server, a database server, an FTP server, an application server, or a Web server.
- (PSTN) World's collection of interconnected commercial and government-owned voice-oriented systems.
- High-end program designed to provide network control that includes special functions for connecting computers and other devices into a network.
- Software architectural model relationship.
- A network designed for the exclusive use of people within an organization.
- Can include telephone systems, fiber optics, satellites, microwaves, or any combination of these.
- (DSL) Internet connection technology that provides for the transfer of information to a computer at high-speed bandwidth over ordinary copper telephone lines.
- (WAN) Covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries.
- Person who breaks into computer systems to steal services and information.
- Worldwide system composed of thousands of smaller networks.
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.
26 Clues: Connects two or more LANS to form a WAN. • Software architectural model relationship. • Uses coaxial cable to send and receive data. • A software program such as Internet Explorer. • (WLAN) A variation of a LAN that uses no physical wires. • Worldwide system composed of thousands of smaller networks. • ...
NOVA Cybersecurity Lab Glossary 2022-10-03
Across
- a fictional virus modeled after the Stuxnet virus that is able to damage physical infrastructure.
- extra copies of computer files that can be used to restore files that are lost or damaged.
- a computer program that can copy itself and cause harm in various ways, such as stealing private
- the amount of data that can pass through a network or part of a network per second.
- or destroying data.
- a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
- a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
- someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
- a company or organization that gives users and devices access to the Internet.
- two or more interconnected devices that can exchange data.
Down
- a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them.
- a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
- attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
- code written in a programming language that instructs computers to perform specific tasks.
- a type of connection between devices that can exchange information and power supply.
- a data storage device that is used to store, back up, and transfer computer files.
- multiple computers on a network that are infected with a program that can be controlled remotely.
- software designed to block malware from entering protected networks.
- programs that harm computers, networks, or people.
- viruses, worms, ransomware, and other
- unsolicited emails sent to many addresses in order to make money through advertising or identity theft.
- a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
- the process of using codes to make readable information unreadable.
23 Clues: or destroying data. • viruses, worms, ransomware, and other • programs that harm computers, networks, or people. • two or more interconnected devices that can exchange data. • the process of using codes to make readable information unreadable. • software designed to block malware from entering protected networks. • ...
Network Hardware and Transmission Media 2022-09-04
Across
- a computer in a network that controls one or more printers and stores data to be printed (5,6)
- a cable that consists of a single copper wire surrounded by an insulator, grounded shielding and an outer insulator, commonly used over distances of less than a few kilometres
- a computer in a network that provides a connection to the Internet (3,6)
- a device that allows Wi-Fi devices to connect to a wired network (8,6,5)
- a short-range wireless mobile technology used for line-of-sight device communication over short ranges
- a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances
- a combination of hardware and software to link two similar networks
- an expansion card within a computer or other device, that allows the device to connect to a network (7,9,4)
- a device for modulation and demodulation between the digital data of a computer and the analogue signal of a phone line.
Down
- a networking device that forwards data packets between computer networks
- a type of transmission medium that moves the data through air and space, without the need of a fixed physical connection between the source and the destination
- a combination of hardware and software to link two different types of networks
- relay stations in space used for the transmission of voice, video and data communications using the electromagnetic spectrum
- a cable that consists of two thin insulated copper wires, twisted to form a spiral and reduce interference (7-4)
- a high-speed device that receives incoming data packets and redirects them to their destination on a LAN
- a controlling computer in a network that stores the program and data files shared by users (4,6)
- a computer in a network that stores incoming mail for distribution to users and forwards outgoing mail to appropriate devices (4,6)
- a cable free from electromagnetic and radio interference that uses a laser of light to carry data in small glass fibres up to 100 Gbps (5-5)
- a central connecting device in a network that forwards data without any change
- a type of radio wave used to transmit data from a few meters to several kilometers apart, previously used by television broadcasters
- amplify the received/input signal to a higher frequency to expand the coverage area of the network
21 Clues: a combination of hardware and software to link two similar networks • a networking device that forwards data packets between computer networks • a computer in a network that provides a connection to the Internet (3,6) • a device that allows Wi-Fi devices to connect to a wired network (8,6,5) • ...
COMPUTER SCIENCE 2023-06-30
Across
- The ease with which a user interface can be used by its intended audience to achieve defined goals
- A SEQUENCE OF UNAMBIGUOUS INSTRUCTIONS FOR SOLVING A PROBLEM
- An object is defined based on a class
- A problem which can be solved, but for which no polynomial time solution (or better) has been found
- A last-in-first-out (LIFO) abstract data type
- A collection of elements with an inherent order
- A device used to connect networks using different protocols so that information can be successfully passed from one system to another
- A computer that provides shared resources to network users
- A problem that has a reasonable (polynomial) time solution as the size of the input increases
- A set of attribute values in a database
- The result of a calculation is too large to be represented using the available number of bits
- _______ protocol: The sending and receiving devices exchange signals to establish that they are each ready to initiate data transfer
- A program that hides in or masquerades as desirable software, such as utility or a game, but attacks computers it infects
- A small program that exploits a network security weakness (security hole) to replicate itself through computer networks
Down
- A global wide area network that is formed from the interconnection of many other networks and that uses the TCP/IP protocol
- Fixing bugs, changing parameters and responding to changing requirements
- A diagram consisting of vertices joined by edges.
- The result of a calculation is too small to be represented using the available number of bits
- When someone tries to get you to give them your personal information
- A STRUCTURED COLLECTION OF DATA
- Combining a record with the procedures and functions that manipulate it to form a new data type; a class in OOP.
- A small program attached to another program or data file. It replicates itself by attaching itself to other programs
- THE SCIENCE OF DESIGNING CIPHER SYSTEMS
- An early or trial working version of the proposed system developed to test possible solutions
- FOR A TRANSMISSION MEDIUM, THE RANGE OF SIGNAL FREQUENCIES IT MAY TRANSMIT
- A multiple data channel system in which the bandwidth of the transmission medium carries several data streams at the same time.
26 Clues: A STRUCTURED COLLECTION OF DATA • An object is defined based on a class • THE SCIENCE OF DESIGNING CIPHER SYSTEMS • A set of attribute values in a database • A last-in-first-out (LIFO) abstract data type • A collection of elements with an inherent order • A diagram consisting of vertices joined by edges. • A computer that provides shared resources to network users • ...
Grade 8 Crossword puzzle 2022-08-13
Across
- the part of you that thinks, knows, remembers, and feels things
- is often shown using the symbol %
- the work that you do to keep your house clean and neat
- a publication issued at regular intervals, usually weekly or monthly, containing articles, stories, photographs, advertisements, and other features
- a hot, slightly bitter drink made by pouring hot water over brown powder consisting of coffee beans
- someone whose job is to examine and treat people’s teeth.
Down
- a network that links computer networks all over the world by satellite and telephone, connecting users with service networks such as e-mail and the World Wide Web
- old, broken, or useless things; things that are of very low quality
- two times
- the condition of your body, especially whether or not you are sick
- not wanting to eat any more because you have eaten a lot
11 Clues: two times • is often shown using the symbol % • the work that you do to keep your house clean and neat • not wanting to eat any more because you have eaten a lot • someone whose job is to examine and treat people’s teeth. • the part of you that thinks, knows, remembers, and feels things • the condition of your body, especially whether or not you are sick • ...
chapter 24 2015-04-15
Across
- Uses coaxial cable to send and receive data
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car
- High-end program designed to provide network control that includes special functions for connecting computers and other devices into a network
- Method of high-level security that examines a fingerprint, voice pattern, or the iris or retina of the eye and matches it with the original entry in the system
- A device on a network; generally shares resources such as printers, software, and other hardware
- Acts as an intermediary between a user and the Internet to ensure security, administrative control, and caching service
- Special hardware and software that protect individual companies' networks from external networks
- World's collection of interconnected commercial and government-owned voice-oriented systems
- Can include telephone systems, fiber optics, satellites, microwaves, or any combination of these
- Worldwide system composed of thousands of smaller networks
- Hardware such as a mail server, a database server, an FTP server, an application server, or a Web server
- A variation of a LAN that uses no physical wires
- Device that enables a computer to transmit voice data over telephone lines
- Connects two or more LANS to form a WAN
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second
Down
- Internet connection technology that provides for the transfer of information to a computer at high-speed bandwidth over ordinary copper telephone lines
- Provides connection speeds more than 30 times faster than dial-up connections
- A software program such as Internet Explorer
- Similar to an intranet, but allows specific users outside of the organization to access internal information systems
- A network designed for the exclusive use of people within an organization
- Person who breaks into computer systems to steal services and information
- Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area
- Software architectural model relationship
- A network in which all the computers are equal; no computer is designated as the server
- Covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries
- Small, simple, inexpensive device that joins multiple computers together
26 Clues: Connects two or more LANS to form a WAN • Software architectural model relationship • Uses coaxial cable to send and receive data • A software program such as Internet Explorer • A variation of a LAN that uses no physical wires • Worldwide system composed of thousands of smaller networks • Small, simple, inexpensive device that joins multiple computers together • ...
Lesson Twenty-Four Vocabulary Words 2015-04-15
Across
- Acts like a switchboard through a firewall.
- Examine a fingerprint, a voice pattern, or the iris or retina of an eye.
- High-end programs designed to provide network control and include special functions for connecting computers and other devices.
- An acronym for modulate-demodulate, which means to convert analog signals to digital and vice versa.
- A software program such as Internet Explorer.
- Describes a software architectural model relationship.
- These connect personal computers, workstations, and other devices such as printers and scanners in limited geographical area.
- A recent wireless technology that can deliver maximum speeds for up to 7 Mbps to your cell phone.
- Provide connection speeds more that 30 times faster than dial-up connections.
- This is similar to an intranet, but it allows specific users outside of the organization to access internal information systems.
- A small, simple, inexpensive device that joins multiple computers together.
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels.
- An Internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines.
- Special hardware and software, protect individual companies' networks from external networks.
Down
- This supports telephone services and is the world's collection of interconnected commercial and government-owned voice-oriented systems.
- Uses coaxial cable to send and receive data.
- These cover a large geographical are and can contain communication links across metropolitan, regional, or national boundaries.
- When all of the computers are equal.
- People who break into computer systems to steal services and information.
- This is designed for the exclusive use of people within an organization.
- Hardware and can be one of many types of servers.
- Each device on the network is referred to as this.
- Most WAN's consist of two or more LAN's and are connected by this.
- These can include telephone systems, fiber optics, satellites, microwaves, or any other combination of these.
- A variation of the LAN that uses no physical wires.
- A worldwide system compounded of thousands of smaller networks.
26 Clues: When all of the computers are equal. • Acts like a switchboard through a firewall. • Uses coaxial cable to send and receive data. • A software program such as Internet Explorer. • Hardware and can be one of many types of servers. • Each device on the network is referred to as this. • A variation of the LAN that uses no physical wires. • ...
Lesson 24 Vocabulary 2016-04-20
Across
- A device that uses coaxial cable to send and receive data
- Special hardware and software that protect individual companies' networks from external networks.
- Connects two or more LANS to form a WAN.
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
- Small, simple, inexpensive device that joins multiple computers together.
- A computer that uses the services of another program
- Person who breaks into computer systems to steal services and information
- Computer configuration in which one or more computers on the network acts as a server
- World's collection of interconnected commercial and government-owned voice-oriented systems.
- Worldwide system composed of thousands of smaller networks
- A network in which all the computers are equal; no computer is designated as the server
- A technique or device that examines a fingerprint, voice pattern or the iris of retine of the eye
- Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area.
- type of fiber-optic telephone line that can transmit up to 1.544 megabits per second
- Acts as an intermediary between a user and the Internet to ensure security, administrative control, and caching service.
Down
- A device on a network; generally shares resources such as printers, software, and other hardware
- High-end program designed to provide network control that includes special functions for connecting computers and other devices into a network.
- An Internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines.
- Covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries.
- Provides connection speeds more than 30 times faster than dial-up connections.
- A computer that handles request of data, e-mail, file transfers, and other network services from other computers
- Similar to an intranet, but allows specific users outside of the organization to access internal information systems.
- A variation of a LAN that uses no physical wires
- Device that enables a computer to transmit voice data over telephone lines
- Link from one computer to another through which data can be transmitted
- A network designed for the exclusive use of people within an organization
26 Clues: Connects two or more LANS to form a WAN. • A variation of a LAN that uses no physical wires • A computer that uses the services of another program • A device that uses coaxial cable to send and receive data • Worldwide system composed of thousands of smaller networks • Link from one computer to another through which data can be transmitted • ...
Network Components 2021-11-09
Across
- adapter device that connects a computer to an integrated services digital network.
- an electronic device.
- a network security device that monitors and filters incoming and outgoing network traffic.
- is a digital-interface device used to connect data terminal equipment.
Down
- a computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- A computer that sits between different networks or applications.
- a separate network device with a built-in antenna, transmitter, and adapter.
- a device in a computer network that connects other devices together.
8 Clues: an electronic device. • A computer that sits between different networks or applications. • a device in a computer network that connects other devices together. • is a digital-interface device used to connect data terminal equipment. • a separate network device with a built-in antenna, transmitter, and adapter. • ...
Network Puzzle 2023-02-07
Across
- established and finalized set of rules which should be followed in a specific event
- Address Unique string of characters identifying each and every computer on the internet to communicate throughout a network
- Transmission Transfers digital data over a communication medium
- System of computer networks of which are worldwide
Down
- Network two or more devices connected together to communicate
- Device used to connect 2 or more networks between eachother
- Maximum amount of data which can be transmitted throughout a computer network system
- Messages sent from 1 or more devices to communicate with people
8 Clues: System of computer networks of which are worldwide • Device used to connect 2 or more networks between eachother • Network two or more devices connected together to communicate • Transmission Transfers digital data over a communication medium • Messages sent from 1 or more devices to communicate with people • ...
Test 2021-07-28
Across
- of finding the optimal path from between networks
- Digital representation of real world entities
- communication between devices
Down
- of the protocol that decides the action/decision to be taken
- ,Logical division of network into several networks to increase the network performance and security.
- Technique of extracting and discovering patterns from meaningful information from huge sets of data
- ,Which layer compresses and decompresses the data to ensure faster data transfer
7 Clues: communication between devices • Digital representation of real world entities • of finding the optimal path from between networks • of the protocol that decides the action/decision to be taken • ,Which layer compresses and decompresses the data to ensure faster data transfer • ...
Networking Terms 2016-08-30
Across
- Blocks unauthorized access while permitting outward communication
- A packet is a unit of data sent between devices.
- A network protocol that builds a logical loop-free topology for Ethernet networks
- A device that passes traffic back and forth.
- Technology platform standardized across the state of Colorado
Down
- Global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide
- A numerical address that corresponds to your computer on a network.
- Fictional artificial intelligence in the Terminator franchise and serves as the franchise's main antagonist.
8 Clues: A device that passes traffic back and forth. • A packet is a unit of data sent between devices. • Technology platform standardized across the state of Colorado • Blocks unauthorized access while permitting outward communication • A numerical address that corresponds to your computer on a network. • ...
Network Basics 2013-03-24
Across
- connects computers in a star topology.
- allows an electronic device to exchange data wirelessly.
- simple to implement; smaller networks; a single break can cause network failure.
- connects networks in a larger geographical area.
- traffic director of the global internet.
- uses a bus or star topology and supports data transfer rates of 10Mbps; Most widely uses LAN standards.
- how much information can be transmitted over a connection.
- a network that is confined to a relatively small area' limited to a geographical area such as a writing lab, school, or building.
- offers internet access over a wireless LAN through the use of a router connected a link to an internet services provider.
- all systems connected to a circle of cable; degrades gracefully as systems are added.
- combines characteristics of a linear bus and start topologies.
Down
- carries data to smaller lines of transmission.
- uses rules to filter traffic into and out of the private network to protect the private network users and data from hackers.
- provides central connection point for cables from workstations, servers, and peripherals.
- an interconnection point on a computer network.
- the arrangement and interlinking of computers in a computer network.
- utilizes a central network device; all systems plug directly into the device.
- are computers that provide shared resources to network users.
- network card; connects computer to the cabling.
19 Clues: connects computers in a star topology. • traffic director of the global internet. • carries data to smaller lines of transmission. • an interconnection point on a computer network. • network card; connects computer to the cabling. • connects networks in a larger geographical area. • allows an electronic device to exchange data wirelessly. • ...
Network Key terms 2024-10-25
Across
- The basic unit of information for computer systems.
- a device and can send and receive data.
- Device on a network.
- Used to strengthen signals in networks.
- Used to store temporary files like google Crome tabs.
- A device that forwards computer packets to their destination on a network.
- Public network with a huge number of devices and can be accessed by anyone.
- A local network with some devices connected.
- Use of light to transmit data.
- A system using changes in the strength of radio waves emitted from satellites to pin point the location of a device.
- Links similar networks together using the same protocol.
Down
- A connecting device between a switch and a group of computers.
- A public network with a large number of devices and can be accessed by anyone.
- A private network with a limited number of devices and uses firewall protection.
- stores information which is essential to the computer booting like the bios and is attached to the motherboard.
- A computer that provides information to other computers called 'clients'.
- A network over a wide area with many devices connected.
- Has terminators at either end and allows devices to go down without interrupting over devices connection.
- All devices on the network are linked and data flows around all the linked devices to the server.
- An appropriate method for transmitting data over shot distances and cant travel through solid objects.
20 Clues: Device on a network. • Use of light to transmit data. • a device and can send and receive data. • Used to strengthen signals in networks. • A local network with some devices connected. • The basic unit of information for computer systems. • Used to store temporary files like google Crome tabs. • A network over a wide area with many devices connected. • ...
Information security -Unit 4 2022-11-18
Across
- attack using birth dates
- translating key into code
- barrier between trusted networks
- recognising somebody
- sepcial form of information
- certainty to remain safe
- Symmetric block cipher
- tool to practice encryption
- process of determining something or someone
Down
- cipher in which one character is replaced by another
- security structure to decide user privileges
- inspection
- cipher in which we use polyalphabetic substitution
- scrambling position of characters
- act of invading illegally
- method to transform a message
16 Clues: inspection • recognising somebody • Symmetric block cipher • attack using birth dates • certainty to remain safe • translating key into code • act of invading illegally • sepcial form of information • tool to practice encryption • method to transform a message • barrier between trusted networks • scrambling position of characters • process of determining something or someone • ...
cyber security crossword (designed by:X, the Awesome!) 2015-12-31
Across
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- The process of translating plaintext into ciphertext
- the process of attempting to acquire sensitive information used for identity theft
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
- software that records everything you type, then sends it off to whomever installed the software.
- an adjective to describe your professor Xiaoyu
Down
- a bridge between two computer networks
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- to choose options in order to create a custom system
- software installed on a network of computers without the owner’s knowledge
- A capability to limit network traffic between networks and/or information systems
11 Clues: a bridge between two computer networks • an adjective to describe your professor Xiaoyu • to choose options in order to create a custom system • The process of translating plaintext into ciphertext • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
lesson 24 vocab 2016-04-28
Across
- Covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries.
- Provides connection speeds more than 30 times faster than dial-up connections.
- channels Can include telephone systems, fiber optics, satellites, microwaves, or any combination of these.
- software program such as Internet Explorer.
- Similar to an intranet, but allows specific users outside of the organization to access internal information systems.
- A network in which all the computers are equal; no computer is designated as the server.
- A variation of a LAN that uses no physical wires.
- High-end program designed to provide network control that includes special functions for connecting computers and other devices into a network.
- Special hardware and software that protect individual companies' networks from external networks.
- Network (PSTN) World's collection of interconnected commercial and government-owned voice-oriented systems.
- A device on a network; generally shares resources such as printers, software, and other hardware.
- Device that enables a computer to transmit voice data over telephone lines.
Down
- network Software architectural model relationship.
- of high-level security that examines a fingerprint, voice pattern, or the iris or retina of the eye and matches it with the original entry in the system.
- Internet connection technology that provides for the transfer of information to a computer at high-speed bandwidth over ordinary copper telephone lines.
- network (LAN) Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area.
- modem Uses coaxial cable to send and receive data.
- Worldwide system composed of thousands of smaller networks.
- Connects two or more LANS to form a WAN.
- server Acts as an intermediary between a user and the Internet to ensure security, administrative control, and caching service.
- A network designed for the exclusive use of people within an organization.
- Hardware such as a mail server, a database server, an FTP server, an application server, or a Web server.
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
- Small, simple, inexpensive device that joins multiple computers together.
- Person who breaks into computer systems to steal services and information.
26 Clues: Connects two or more LANS to form a WAN. • software program such as Internet Explorer. • A variation of a LAN that uses no physical wires. • network Software architectural model relationship. • modem Uses coaxial cable to send and receive data. • Worldwide system composed of thousands of smaller networks. • ...
Lesson 24 Vocabulary 2015-04-14
Across
- Uses coaxial cable to send and receive data.
- Acts as an intermediary between a user and the Internet to ensure security, administrative control, and caching service.
- Method of high-level security that examines a fingerprint, voice pattern, or the iris or retina of the eye and matches it with the original entry in the system.
- A software program such as Internet Explorer.
- A network designed for the exclusive use of people within an organization.
- connection speeds more than 30 times faster than dial-up connections.
- Small, simple, inexpensive device that joins multiple computers together.
- Special hardware and software that protect individual companies' networks from external networks.
- A device on a network; generally shares resources such as printers, software, and other hardware.
- Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area
Down
- Software architectural model relationship.
- A variation of a LAN that uses no physical wires.
- Covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries.
- World's collection of interconnected commercial and government-owned voice-oriented systems.
- Internet connection technology that provides for the transfer of information to a computer
- Device that enables a computer to transmit voice data over telephone lines.
- Connects two or more LANS to form a WAN.
- allows specific users outside of the organization to access internal information systems.
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.
- Person who breaks into computer systems to steal services and information.
- Can include telephone systems, fiber optics, satellites, microwaves, or any combination of these.
- Worldwide system composed of thousands of smaller networks.
- High-end program designed to provide network control that includes special functions for connecting computers and other devices into a network.
- A network in which all the computers are equal; no computer is designated as the server.
- Hardware such as a mail server, a database server, an FTP server, an application server, or a Web server.
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
26 Clues: Connects two or more LANS to form a WAN. • Software architectural model relationship. • Uses coaxial cable to send and receive data. • A software program such as Internet Explorer. • A variation of a LAN that uses no physical wires. • Worldwide system composed of thousands of smaller networks. • connection speeds more than 30 times faster than dial-up connections. • ...
Lesson 24 vocab 2016-04-19
Across
- A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
- World's collection of interconnected commercial and government-owned voice-oriented systems.
- A network in which all the computers are equal; no computer is designated as the server.
- A software program such as Internet Explorer.
- A network designed for the exclusive use of people within an organization.
- Worldwide system composed of thousands of smaller networks.
- Connects two or more LANS to form a WAN.
- Can include telephone systems, fiber optics, satellites, microwaves, or any combination of these.
- Similar to an intranet, but allows specific users outside of the organization to access internal information systems.
- Internet connection technology that provides for the transfer of information to a computer at high-speed bandwidth over ordinary copper telephone lines.
- High-end program designed to provide network control that includes special functions for connecting computers and other devices into a network.
- Acts as an intermediary between a user and the Internet to ensure security, administrative control, and caching service.
- Uses coaxial cable to send and receive data.
- Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area.
- Person who breaks into computer systems to steal services and information.
Down
- Method of high-level security that examines a fingerprint, voice pattern, or the iris or retina of the eye and matches it with the original entry in the system.
- A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.
- Provides connection speeds more than 30 times faster than dial-up connections.
- Covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries.
- Small, simple, inexpensive device that joins multiple computers together.
- A device on a network; generally shares resources such as printers, software, and other hardware.
- Hardware such as a mail server, a database server, an FTP server, an application server, or a Web server.
- Software architectural model relationship.
- Special hardware and software that protect individual companies' networks from external networks.
- A variation of LAN that uses no physical wires.
- Device that enables a computer to transmit voice data over telephone lines.
26 Clues: Connects two or more LANS to form a WAN. • Software architectural model relationship. • Uses coaxial cable to send and receive data. • A software program such as Internet Explorer. • A variation of LAN that uses no physical wires. • Worldwide system composed of thousands of smaller networks. • Small, simple, inexpensive device that joins multiple computers together. • ...
Zscaler Crossword puzzle 2023-07-17
Across
- (IDS): Monitors network traffic for suspicious activity or unauthorized access attempts.
- Software update that fixes security vulnerabilities or improves the functionality of a program.
- (2FA): Adds an extra layer of security by requiring users to provide two different forms of identification, typically a password and unique code.
- Weakness or flaw in a system that can be exploited by attackers.
- Involves managing and securing personal information on social media platforms to prevent unauthorized access or misuse.
- Secret combination of characters used to authenticate and gain access to a system or account.
- Security model that assumes no trust by default, requiring strict identity verification and continuous authentication for all users and devices, regardless of their location or network.
- Software designed to detect, prevent, and remove malicious software from a computer system.
- Type of malware that encrypts a victim's files and demands a ransom in exchange for their release.
- Type of social engineering attack that tricks users into revealing sensitive information through deceptive emails or websites.
- Manipulation of individuals to gain unauthorized access or sensitive information.
- Encompasses practices, technologies, and measures taken to protect computer systems, networks, and data from unauthorized access or attacks.
- Occurs when sensitive or confidential information is accessed, disclosed, or stolen by unauthorized individuals.
Down
- Creates a connection over a public network, allowing users to access private networks remotely.
- Information collected and analyzed to understand potential cyber threats and take proactive measures to mitigate risks.
- Protocol that encrypts data transmitted between a web server and a browser, ensuring secure communication.
- Simulated cyber attack conducted by professionals to identify vulnerabilities and assess the security of a system or network.
- Acts as a barrier between a trusted internal network and an untrusted external network.
- Converts data into a format that can only be read or accessed with the correct decryption key.
- Broad term for malicious software designed to harm or exploit computer systems.
- Technology that separates the network control plane from the physical infrastructure, allowing organizations to manage and optimize their wide area networks using software-based solutions.
- Software vulnerability that is unknown to the vendor or developers, leaving no time for a patch or fix before it's exploited.
- Cloud-based security approach that combines network security functions with wide-area networking (WAN) services to provide secure connectivity and protection at the network edge.
23 Clues: Weakness or flaw in a system that can be exploited by attackers. • Broad term for malicious software designed to harm or exploit computer systems. • Manipulation of individuals to gain unauthorized access or sensitive information. • Acts as a barrier between a trusted internal network and an untrusted external network. • ...
Prefixes: en, em, in, im, over, sub & inter 2023-03-16
Across
- too much time
- a way to travel underground
- a lot of joy
- a connection between networks
- to put time or money towards something
- to allow something to be able to work
- to include
- to employ someone
- too much loaded up
Down
- too much confidence
- a marine vessel that goes beneath the sea
- between nations
- to breathe in
- to explode but fall within
- to cause a feeling of power
- to have joy
16 Clues: to include • to have joy • a lot of joy • too much time • to breathe in • between nations • to employ someone • too much loaded up • too much confidence • to explode but fall within • a way to travel underground • to cause a feeling of power • a connection between networks • to allow something to be able to work • to put time or money towards something • ...
Computer Networking 2025-05-12
9 Clues: sharing resources • faster and smarter • arrangement of network • boosts network signals • assigned by manufacturer • connect two different networks • device that allows communication • connects multiple devices together • converts digital signals to analog signals
Chapter 8 MED216 2019-09-25
Across
- private internal network
- practice management
- reports, test results, etc.
- networks allowing instant access around world
- real time use within a practice
- quality of a scanned image
- dataset that provides structure
Down
- message appears on screen in written form
- preformatted document built into practice
- value that automatically appears
- equipment that digitizes documents
- optical character recognition
- electronic health record system
13 Clues: practice management • private internal network • quality of a scanned image • reports, test results, etc. • optical character recognition • real time use within a practice • dataset that provides structure • electronic health record system • value that automatically appears • equipment that digitizes documents • message appears on screen in written form • ...
Tech 2018-04-04
Across
- To store data locally in order to speed up subsequent retrievals
- steal valuable info.
- The most widely used hardware.
- secure from intruders.
- serves employees only.
- access to the Internet.
- network made up of smaller networks.
- To write and post an entry in a Weblog.
Down
- central processing unit.
- A small text file.
- Instructions for the computer.
- capability and time.
- machinery and equipment.
- address that defines.
- electronic screen.
15 Clues: A small text file. • electronic screen. • steal valuable info. • capability and time. • address that defines. • secure from intruders. • serves employees only. • access to the Internet. • central processing unit. • machinery and equipment. • Instructions for the computer. • The most widely used hardware. • network made up of smaller networks. • To write and post an entry in a Weblog. • ...
Network and Viruses 2018-06-08
Across
- Trojan horse targeting windows
- Fastest spreading email virus
- Allows wireless device to connect
- Group of computers together
- Connects nearby computer
- Craeted by Sven Jaschan
- A MAC malware
- Trojan horse made to infect windows
Down
- Network that covers cities
- Virus named after a dancer in florida
- Used to connect multiple network
- Connect multiple device in a network
- Network that covers country or world
- Virus crated for cyberwarfare
- Known as downup
15 Clues: A MAC malware • Known as downup • Craeted by Sven Jaschan • Connects nearby computer • Network that covers cities • Group of computers together • Fastest spreading email virus • Virus crated for cyberwarfare • Trojan horse targeting windows • Used to connect multiple network • Allows wireless device to connect • Trojan horse made to infect windows • ...
Social Media Icons 2025-01-20
Across
- tools to edit selfies and pictures
- trend of taking pictures of yourself
- app for disappearing messages
- online fan count
- early influencers on YouTube
- reality TV family
- Facebook founder
Down
- top friends feature
- one of the first social networks
- photo-sharing app launched in 2010
- people sharing video blogs
- microblogging site for creative content
- symbol used to tag posts
- iconic blue bird app
- viral video platform of 2000s influence
15 Clues: online fan count • Facebook founder • reality TV family • top friends feature • iconic blue bird app • symbol used to tag posts • people sharing video blogs • early influencers on YouTube • app for disappearing messages • one of the first social networks • tools to edit selfies and pictures • photo-sharing app launched in 2010 • trend of taking pictures of yourself • ...
Internet – Concepts and Terminologies 2018-03-03
Across
- transfer data from your computer over networks
- ------ is an information system on the Internet.
- worldwide public network of computers
Down
- it is the first network developed for sharing Military information.
- -------- is a software that allows the user to surf the Internet/www
- transfer data to your computer over networks
6 Clues: worldwide public network of computers • transfer data to your computer over networks • transfer data from your computer over networks • ------ is an information system on the Internet. • it is the first network developed for sharing Military information. • -------- is a software that allows the user to surf the Internet/www
Internet Connections Terms 2022-03-23
Across
- Connecting to the Internet using light pulses over a fiber-optic cable network
- A desktop computer, mobile phone or tablet
- Connecting to the internet via satellite
- Is a computer program that indexes millions of sites on the Web so that users can easily find Web sites with the information they want
- Internet service provided by a cable company
- Software the communicates with a computer’s hardware (for example, Windows, Macintosh, Linux)
- Is a system of tools and services that enables us to access the information on the Internet
- Is a very large network of networks, it essentially hardware machines and data
- High-speed wireless connection for smartphones and other devices
Down
- Connecting to the Internet using a modem and a standard telephone line
- Protocol software used to communicate with the Internet and built into all major operating systems
- Directly connecting to an Internet Service Providers (ISP)
- A device used to connect other devices such as telephone to networks
- A number that uniquely identifies each computer
- A Web browser or other application used to access and display Web sites on a computer (for example, Chrome, Internet Explorer (Microsoft Edge)
- A technology that provides high-speed Internet connections using regular copper telephone lines
- End user’s computer
- A network that uses radio signals to provide Internet connections to wireless computer an devices
- Consists of servers
19 Clues: End user’s computer • Consists of servers • Connecting to the internet via satellite • A desktop computer, mobile phone or tablet • Internet service provided by a cable company • A number that uniquely identifies each computer • Directly connecting to an Internet Service Providers (ISP) • High-speed wireless connection for smartphones and other devices • ...
Social Media 2021-01-18
Across
- anything shared across social networks that get passed along rapidly e. g. YouTube.
- A small, attractive application on a website such as a hit counter.
- it is an image or username that represents a person online most often within forums and social networks.
Down
- #.
- a site updated frequently by an individual or group to record opinions or information.
- a system that manages content.
- simple webpages that can be edited by others.
7 Clues: #. • a system that manages content. • simple webpages that can be edited by others. • A small, attractive application on a website such as a hit counter. • anything shared across social networks that get passed along rapidly e. g. YouTube. • a site updated frequently by an individual or group to record opinions or information. • ...
ICVGIP 2024-12-06
Across
- A feature detection algorithm used to identify and describe key points in an image.
- Deep learning model for image analysis that processes images as sequences of patches using self-attention.
- A grid of pixels used to form an image in computer graphics.
- When one object blocks the view of another in an image or scene.
- Used in vision-language tasks to connect images and textual descriptions.
- In image processing, it’s applied to modify or detect patterns in an image.
Down
- A concept enabling neural networks to weigh input features differently based on their importance.
- A method in graphics that projects 3D data into 2D images using Gaussian representations for rendering.
- A rendering technique that simulates the way light interacts with objects.
- A transform used to detect shapes like lines and circles in images.
- ICVGIP Parent body
- A mathematical operation often used in neural networks for image processing.
- A method in computer vision and graphics that models 3D scenes by learning volumetric representations.
- The position and orientation of an object in space.
14 Clues: ICVGIP Parent body • The position and orientation of an object in space. • A grid of pixels used to form an image in computer graphics. • When one object blocks the view of another in an image or scene. • A transform used to detect shapes like lines and circles in images. • Used in vision-language tasks to connect images and textual descriptions. • ...
AP Gov: Iron Triangles Project 2022-01-11
Across
- Issue Networks are more common nowadays than Iron Triangles. True or False?
- Issue Networks can become like Iron Triangles. True or False?
- A powerful independent group that is part of an Iron Triangle
- Issue Networks usually last a _____ amount of time
- An alliance between an interest group, congressional subcommittee, and a bureaucratic agency
Down
- A loose alliance between a group of experts trying to pass legislation for a common goal, and Congress
- A smaller, more private committee of Congress
- Government agencies that do the day-to-day executive branch work
- Iron Triangles usually last a ____ amount of time
9 Clues: A smaller, more private committee of Congress • Iron Triangles usually last a ____ amount of time • Issue Networks usually last a _____ amount of time • Issue Networks can become like Iron Triangles. True or False? • A powerful independent group that is part of an Iron Triangle • Government agencies that do the day-to-day executive branch work • ...
NWEG Crossword puzzle 2021-11-25
Across
- AT&T is an example of a_
- Desktop, laptop and mobile smartphones are an example of
- control data flow across a network by sending a received network packet exclusively to the one or more devices for whom it was intended.
- A broadband network connection device that links a computer or router to the internet.
- A computer used for work or school purposes
- used to connect two or more devices
- provides access to a diverse set of information resources and services, including the World Wide Web's (WWW) interconnected hypertext documents and applications, electronic mail, telephony, and file sharing.
- a network security device that monitors incoming and outgoing network traffic and allows or disallows data packets according to a set of security criteria.
- Someone whose responsible with emphasis on local area networks up to wide area networks
Down
- Someone who uses something is called
- wireless internet
- study of geometric properties and spatial relations
- something that connects your electronic device to a network.
- It routes traffic between the devices and the internet.
- sets of instructions, program used to operate computers and execute specific tasks
- A system that provides resources, data, services, programs to other computers.
- A software that protects the computer from malware
- ICMP is an example of
- A device that accepts text and graphic output from a computer and transfers the information to paper.
19 Clues: wireless internet • ICMP is an example of • AT&T is an example of a_ • used to connect two or more devices • Someone who uses something is called • A computer used for work or school purposes • A software that protects the computer from malware • study of geometric properties and spatial relations • It routes traffic between the devices and the internet. • ...
Chapter 3 Turning on the Television 2014-02-03
9 Clues: Camera Tube • Cable Television • Mechanical scanning • One to a market rule • Author: Vast Wasteland • World's Greatest Newspaper • Type of television NOT used • American Television standard • What networks want from affiliates
Chapter 6 Vocal 2019-02-21
Across
- knowledge Information we have but don't know how to use
- Movie of memories
- Why people forget
- Knowing how to do a task
- When brain development begins
- Controls basic functions
- Receives information
- Memory stores for a few seconds
Down
- Limited resource
- Networks of memories
- Maintaining through repetition
- Knowledge about one's own learning
- Most important in Nervous System
- How people remember
- Memory that is stored for long period of time
- Interpretation
16 Clues: Interpretation • Limited resource • Movie of memories • Why people forget • How people remember • Networks of memories • Receives information • Knowing how to do a task • Controls basic functions • When brain development begins • Maintaining through repetition • Memory stores for a few seconds • Most important in Nervous System • Knowledge about one's own learning • ...
networks 2022-03-27
NETWORKS 2020-06-02
Networks, Protocols and Layers 2022-07-07
Across
- A set of rules that allow two devices to communicate
- Personal Area Network
- The process of making data in a computer system unintelligible.
- Wide Area Network
- Any computer network which predominantly connects its hardware via Wi-Fi
- A standard for networking local area networks using protocols. F
- The arrangement of the elements of a communication network
- Any computer network which predominantly connects its hardware via the user of physical cables e.g. Copper, Fibre optic
Down
- Transmission Control Protocol
- Local Area Network
- A group of software policies and written procedures which, together help to enhance and maintain the security of data held on a computer network
- Computers connected to a central switch
12 Clues: Wide Area Network • Local Area Network • Personal Area Network • Transmission Control Protocol • Computers connected to a central switch • A set of rules that allow two devices to communicate • The arrangement of the elements of a communication network • The process of making data in a computer system unintelligible. • ...
Security 2023-03-28
Across
- - The practice of secure communication in the presence of third parties.
- - A type of DDoS attack that uses long-form field input to overwhelm the target server.
- - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- - A group of computers and other devices that are connected together to share resources and information.
- - A network of compromised computers that can be used to perform malicious activities.
- - A method of transferring data securely across an untrusted network, by encapsulating data
- - A protocol suite for securing Internet Protocol (IP) communications.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
Down
- - The study of analyzing and breaking encryption systems.
- - A type of cyber attack in which multiple compromised systems attack a target,.
- - A type of DDoS attack that floods a victim with ICMP echo request packets.
- - A global network of interconnected computer networks.
- - A security algorithm for wireless networks.
14 Clues: - A security algorithm for wireless networks. • - A global network of interconnected computer networks. • - The study of analyzing and breaking encryption systems. • - A protocol suite for securing Internet Protocol (IP) communications. • - The practice of secure communication in the presence of third parties. • ...
Flare Community! Membership Livestream (+20 XRP) 2022-05-09
Across
- Flare’s tagline: Connect____
- The most recent protocol to be enabled on the Songbird Network
- Something you do can do with SGB in order to earn weekly rewards
- ____ Swap, a new DEX soon to be launching on the Songbird Network
- Abbreviation for a wave of new financial services which are hosted on a decentralised network
- The LayerCake protocol will allow for scaling in a ____ fashion, allowing 100 networks to be bridged with 101 smart contracts or 200 networks to be bridged with 201 smart contracts.
Down
- When an asset is falling in value and someone is trying to buy the bottom they can be said to be trying to catch a falling ____
- Obese Feline
- Inflation rate of SGB (percentage)
- Common browser extension for interacting with a Web3 enabled website.
- An extremely large object used to describe an asset which has dramatically increased in price.
- Baron Rothschild: "Buy when there is _____ in the streets, even if that ____ is your own.”
- Something you can do with your investments to mitigate risk.
- A period of time which represents 1 week of Songbird activity.
14 Clues: Obese Feline • Flare’s tagline: Connect____ • Inflation rate of SGB (percentage) • Something you can do with your investments to mitigate risk. • The most recent protocol to be enabled on the Songbird Network • A period of time which represents 1 week of Songbird activity. • Something you do can do with SGB in order to earn weekly rewards • ...
FUN CyberSecurity Puzzle CIS120 2025-03-18
Across
- Rule specific configuration setting that determines how data flows through a firewall.
- type of malware that spreads by attaching itself to other programs or files.
- cyberattack that redirects users to fake websites to steal personal information.
- A network compromised of computers controlled remotely to perform certain activities.
- The process of converting data into code to prevent hacks.
- A program that records keystrokes to steal information like passwords and Keys.
- A person who gains unauthorized access to systems or networks.
Down
- type of malware that replicates itself to spread across networks without needing a host file.
- A group of devices used to monitor and gather information without user consent.
- An act of disguising communication to appear as if it's from a trusted source.
- Software updates. These fix vulnerabilities or improve security.
- Malware or Hacker that locks users out of their system. until ransom is paid.
- Factor Authentication The security process that requires two forms of verification to access an account.
- vulnerability in software that is unknown to the vendor and can be exploited by attackers.
14 Clues: The process of converting data into code to prevent hacks. • A person who gains unauthorized access to systems or networks. • Software updates. These fix vulnerabilities or improve security. • type of malware that spreads by attaching itself to other programs or files. • Malware or Hacker that locks users out of their system. until ransom is paid. • ...
GE 30/09/24 2024-09-30
10 Clues: Panic-stricken • Vague or unclear • Started a journey • Took a quick look • Urged or pressured • Shocked and saddened • Complex networks of paths • Noise from chains or metal • Done without care or interest • American luxury car under General Motors
Introduction to Computer Networks Chapter 2025-02-11
Across
- A private internet
- The process of adding IP addresses and then MAC addresses to chunks of data is called
- represented by collections of 8 bits, called a ____
- is a computer program stored in nonvolatile memory, such as ROM or flash memory
- The _______ control data transfers between memory, expansion slots, I/O devices, and the CPU.
- A network that allows limited and controlled access to internal network resources by outside users.
- ther types of nontraditional computers include smartphones, smart watches, home assistants like Amazon Echo and Google Home,
- information added at the end of data is called a ______
Down
- the more well-known term, is often used generically to mean a chunk of data sent over the network.
- The most obvious are network _______ and workstations that run operating systems, such as Windows, Linux, UNIX, and Mac OS X.
- A bus is a collection of wires carrying data from one place to another on the computer.
- The brain of a computer
- The username and password for accessing a computer are called
- The function of this ____ is to tell the CPU to perform certain tasks when power is first applied to the computer
- A _____ is a packet with the source and destination MAC addresses added to it.
- It holds a 1 or 0 value
- Information added at the front of data is called a ____
17 Clues: A private internet • The brain of a computer • It holds a 1 or 0 value • represented by collections of 8 bits, called a ____ • Information added at the front of data is called a ____ • information added at the end of data is called a ______ • The username and password for accessing a computer are called • ...
puzzle engglish 2025-02-06
Across
- waves, radio waves are transmitted in every direction throughout free space
- transmission media, also known as unbounder or wireless media they help in transmitting electromagnetic signals without using a phisical medium
- this is transverse electromagnetic (tem) type of transmission media in computer network that is built on the inner layers of multi-layer printed circuit boards
- pair cable, in this type of transmission media in computer networks two insulated conductors of a single circuit are twisted together to inprove electromagnetic compatibility
- cable, these guided transmission media contain an insulation layer that transmits information in baseband mode and broadband mode
Down
- coaxial cable, this is one of the types of transmission media in computer networks that are used for high signal strength applications including long-distance telephone lines
- while microstripline is similar to stripline it is not sandwiched and is present above the ground plane
- transmission media, guided media is a type of transmission media in computer networks which is also known as wired or bounded media
- cable, also known as triax these are the electrical cables that come with an add-on layer of insulation and a second conducting sheet
- fiber cable, also known as fiber optic cable these types of transmission media are thin strands of glass that guide light along their length
10 Clues: waves, radio waves are transmitted in every direction throughout free space • while microstripline is similar to stripline it is not sandwiched and is present above the ground plane • cable, these guided transmission media contain an insulation layer that transmits information in baseband mode and broadband mode • ...
IT-3 2018-01-22
Across
- Done or chosen by chance rather than according to a plan.
- To start using a computer system or program by giving a password.
- A preset format for a document or file.
- To stop using a computer system or program by giving a particular instruction.
- To improve the quality or usefulness of something, such as a machine or a computer program.
- A three character addition that follows the name of a file (e.g.: .exe, .doc).
- A computer program that finds information on the internet by looking for words that you have typed in.
Down
- A preselected option.
- To start a computer and put it into a state of readiness for operation.
- A message that is automatically sent to you.
- Way of showing information to a user.
- To stop something such as (part of) a machine, system, or weapon from working.
- To collect and arrange the sheets of a report, book, etc., in the correct order.
- A piece of electronic equipment that connects computer networks to each other, and sends information between networks.
14 Clues: A preselected option. • Way of showing information to a user. • A preset format for a document or file. • A message that is automatically sent to you. • Done or chosen by chance rather than according to a plan. • To start using a computer system or program by giving a password. • To start a computer and put it into a state of readiness for operation. • ...
Security 2023-03-28
Across
- - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- - The practice of secure communication in the presence of third parties.
- - A security algorithm for wireless networks.
- - A protocol suite for securing Internet Protocol (IP) communications.
- - A global network of interconnected computer networks.
- - A group of computers and other devices that are connected together to share resources and information.
- - A method of transferring data securely across an untrusted network, by encapsulating data
Down
- - A type of cyber attack in which multiple compromised systems attack a target,.
- - The study of analyzing and breaking encryption systems.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A network of compromised computers that can be used to perform malicious activities.
- - A type of DDoS attack that floods a victim with ICMP echo request packets.
- - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
- - A type of DDoS attack that uses long-form field input to overwhelm the target server.
14 Clues: - A security algorithm for wireless networks. • - A global network of interconnected computer networks. • - The study of analyzing and breaking encryption systems. • - A protocol suite for securing Internet Protocol (IP) communications. • - The practice of secure communication in the presence of third parties. • ...
Cybersecurity Fundamental Chapter 1 2022-11-03
Across
- attacks that originate from within an organization.
- the honeynet project.
- unethical criminals who violate computer and network security for personal gain, or for malicious reason, such as attacking networks.
- breaks into network or computer systems to discover weakness in order to improve the security of these systems.
- infragard is an example of widespread sharing of cyber intelligent.
- groups of criminals break into computers or networks to gain access for various reason.
- who rally and protest against different political and social ideas
- external threats from amateurs or skills attackers can exploit vulnerabilities in network devices.
Down
- somewhere between white and black hat attackers.
- grey hat hackers who attempt to discover exploits and report them to vendor, and sometimes for prizes or rewards.
- hobbyists mostly limited to pranks and vandalism, have little or no skills.
- nation common vulnerabilities and exposures (CVE) database.
- black hat hackers who are either self-employed or working for large cybercrime organizations.
- the standard provides a framework for implementing cybersecurity measures within an organization.
14 Clues: the honeynet project. • somewhere between white and black hat attackers. • attacks that originate from within an organization. • nation common vulnerabilities and exposures (CVE) database. • who rally and protest against different political and social ideas • infragard is an example of widespread sharing of cyber intelligent. • ...
change my seat plz 2018-04-04
Across
- central processing unit.
- address that defines.
- capability and time.
- machinery and equipment.
- A small text file.
- network made up of smaller networks.
Down
- electronic screen.
- steal valuable info.
- Instructions for the computer.
- The most widely used hardware.
- To store data locally in order to speed up subsequent retrievals
- serves employees only.
- secure from intruders.
- To write and post an entry in a Weblog.
- access to the Internet.
15 Clues: electronic screen. • A small text file. • steal valuable info. • capability and time. • address that defines. • serves employees only. • secure from intruders. • access to the Internet. • central processing unit. • machinery and equipment. • Instructions for the computer. • The most widely used hardware. • network made up of smaller networks. • To write and post an entry in a Weblog. • ...
Crossword puzzle 2023-02-11
Across
- could be the name of a dessert
- Software that allows or blocks network traffic
- not with wire
- a global system of interconnected computer networks
- a cyberpunk
- used to store something temporarily in a computing environment
- e.g. siri,Alexa,e.t.c
Down
- personal digital assistant
- meaningful impact in a market or society
- software designing
- computer program
- not physical
- command Line and graphical user are examples of this
- Techie's device
- e.g. 404
15 Clues: e.g. 404 • a cyberpunk • not physical • not with wire • Techie's device • computer program • software designing • e.g. siri,Alexa,e.t.c • personal digital assistant • could be the name of a dessert • meaningful impact in a market or society • Software that allows or blocks network traffic • a global system of interconnected computer networks • ...
Internet surfing and E commerce 2023-03-15
Across
- Sell products to buyers
- Sell directly to consumers
- Manners to be followed on the internet
- A collection of webpages
- Automatic Teller Machine
- Buying and selling of goods services or products
- World Wide Web
- Buy products from sellers
- derives from i-pod and broadcasting
- Local area networks
Down
- Sell to retailers not directly to customers
- a financial transaction
- Volp
- form websites
- Learn subjects via the internet
15 Clues: Volp • form websites • World Wide Web • Local area networks • Sell products to buyers • a financial transaction • A collection of webpages • Automatic Teller Machine • Buy products from sellers • Sell directly to consumers • Learn subjects via the internet • derives from i-pod and broadcasting • Manners to be followed on the internet • Sell to retailers not directly to customers • ...
wd 2024-10-22
Across
- look something in the Internet
- very cheap to buy
- dance at the club
- unkind to another person
- always crate something
- think only about himself
- honest
- go and look on the things you're not going to buy
- a person who never says the truth
Down
- calm
- helpful during difficult situations
- send messages in social networks
- angry and violent
- once in two weeks
- annoyed because someone has something he wants
15 Clues: calm • honest • angry and violent • very cheap to buy • dance at the club • once in two weeks • always crate something • unkind to another person • think only about himself • look something in the Internet • send messages in social networks • a person who never says the truth • helpful during difficult situations • annoyed because someone has something he wants • ...
computer science 2025-10-21
Across
- is a unique numerical label assigned to every device connected to a computer network?
- is a small, formatted unit of data that travels over a network, like the internet?
- a communication method that uses electronic devices to deliver messages across computer networks?
- Electronic mail, commonly shortened to ?
- is a computer or system that provides resources, data, or services to other computers?
- is a networking device that connects multiple computer networks?
- is the maximum rate of data that can be transferred over a network connection?
- is a set of rules that govern how data is transmitted and received?
- is a fundamental internet protocol that enables reliable, ordered, and error-checked data transmission ?
- is a system that connects devices like computers and routers using physical cables?
- most commonly an Ethernet cable?
Down
- is the process of transferring data from one device to another?
- is a system of two or more interconnected devices?
- consists of the physical devices that enable communication and data transfer between computers and other devices on a network?
- connects devices using radio waves instead of physical cables?
- is a central device that connects multiple computers or devices in a network?
- is a global network of billions of computers and other electronic device?
17 Clues: most commonly an Ethernet cable? • Electronic mail, commonly shortened to ? • is a system of two or more interconnected devices? • connects devices using radio waves instead of physical cables? • is the process of transferring data from one device to another? • is a networking device that connects multiple computer networks? • ...
cyber 2021-09-30
Across
- is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
- The dark web refers to sites and services that aren't indexed by search engines
- Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
- A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.
- Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason
- Hardening is the process by which something becomes harder or is made harder.
- a method or pathway used by a hacker to access or penetrate the target system.
Down
- Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
- A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- A hacker is an individual who uses computer, networking or other skills to overcome a technical problem
- is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials.
- A computer worm is a type of malware that spreads copies of itself from computer to computer.
- Phreaking is a slang term for hacking into secure telecommunication networks.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user.
15 Clues: Phreaking is a slang term for hacking into secure telecommunication networks. • Hardening is the process by which something becomes harder or is made harder. • a method or pathway used by a hacker to access or penetrate the target system. • The dark web refers to sites and services that aren't indexed by search engines • ...
PBL 2021-02-11
10 Clues: graph database • NoSQL Database Type • not a NoSQL database • cypher query language • language used in neo4j • simplest nosql database • format supported by mongodb • stores information about networks • NoSQL databases support automatic___ • MongoDB has been adopted as a ____ software
PBL 2021-02-11
10 Clues: graph database • NoSQL Database Type • not a NoSQL database • cypher query language • language used in neo4j • simplest nosql database • format supported by mongodb • stores information about networks • NoSQL databases support automatic___ • MongoDB has been adopted as a ____ software
Free time activity 2021-10-20
10 Clues: prepare foot • go to the gym • soccer tetris. • walk with the pets • look at social networks • buy clothes shirt dresses • this activiti help the bones • this activiti help to reason • this activiti help to fingers • Ricardo Arjona Chayanne Thalia
Computers 2015-09-23
Across
- appropriate and responsible behaviour regarding technology use.
- stands for acceptable use policy
- local area networks
- Better than Dodge
- stands for accelerated graphics port
- Universal serial bus
Down
- Rhymes with hover board
- means electronic content
- example mouse and keyboards
- means a global electronic communications system
- means online social interaction
- stands for Peripheral Component Interconnect)
- Power supply unit
13 Clues: Better than Dodge • Power supply unit • local area networks • Universal serial bus • Rhymes with hover board • means electronic content • example mouse and keyboards • means online social interaction • stands for acceptable use policy • stands for accelerated graphics port • stands for Peripheral Component Interconnect) • means a global electronic communications system • ...
Chapter 20 World 2019-12-12
Across
- identical copies of DNA
- linkage of computer networks
- tranfering of genes
- greener growth
- efforts terrorism
- growth
- all financial interactions
- difference opinion political issues
- acquired immune deficiency syndrome
- difference men women wealth status
- increase food population
- process of industrialization
- elimination of trade
Down
- maintain working laboratory science
- frighten people change policies
- leaves country find safety in another
- human right standards nations
- nation facilities needed production goods
- groups background changing interests
- value materials
- motivated attacks information systems
- main protection against sun
- antiterrorism strengthen government rights
23 Clues: growth • greener growth • value materials • efforts terrorism • tranfering of genes • elimination of trade • identical copies of DNA • increase food population • all financial interactions • main protection against sun • linkage of computer networks • process of industrialization • human right standards nations • frighten people change policies • difference men women wealth status • ...
Marketing crosswords 2023-03-22
Across
- registered on the platform
- boomers' social networks
- form
- used to point a word in a post
- reject cultural difference
- social media based on videos
- customer
- weekly email
- number of followers after a bad buzz
- tendency
- division into groups to target
- discount
- online marketing
Down
- consciousness
- non-desired email
- attain a target
- how you act
- what a company sells
- important word on your website
- goal
- how marketing is seen by people
- said of marketing when sustainable
- mail strategy
- prospect
- internet
- video to know more about someone
26 Clues: form • goal • customer • prospect • internet • tendency • discount • how you act • weekly email • consciousness • mail strategy • attain a target • online marketing • non-desired email • what a company sells • boomers' social networks • registered on the platform • reject cultural difference • social media based on videos • used to point a word in a post • important word on your website • ...
test 2013-10-22
Across
- Product Design Group
- Kiewit Sons Co. (Canada)
- Controls Corporation
- Technologies (Canada) Ltd
- Fuel Cell Cooperation (AFCC)
- Natural Resources Ltd
- Medical
- Project
- Networks Canada
- Corporation
- Radloff & Associates
- Management Inc.
- Inc.
- Energy Canada
- Thermal Technologies Inc.
- International Group PLC
- Energy Inc
Down
- Payment Technologies Inc
- Billiton Inc
- Life Sciences Software Inc
- Group
- Aerospace Inc.
- Energy Fireplace Products Limited
- of Calgary
- Mines Limited
- North America Inc
- Island Health Authority
- Transit
- Canada Ltd
- Corporation
- Ltd
- Industries Ltd.
- Systems Ltd Canada
- Inc.
34 Clues: Ltd • Inc. • Inc. • Group • Medical • Transit • Project • of Calgary • Canada Ltd • Energy Inc • Corporation • Corporation • Billiton Inc • Mines Limited • Energy Canada • Aerospace Inc. • Networks Canada • Industries Ltd. • Management Inc. • North America Inc • Systems Ltd Canada • Product Design Group • Controls Corporation • Radloff & Associates • Natural Resources Ltd • Island Health Authority • International Group PLC • ...
Morad Stern's Technology crossword puzzle 2014-04-14
Across
- Zune was developed by...
- Social networks that allows only 140 characters
- Apple's first Personal Digital Assistants
- Android's latest edition
- Google's web browser
- Portable Document Format is...
- Google smart glasses
- The world online encyclopedia
- The next generation of IPV4
- Samsung's latest flag smartphone
- LinkedIn news app
- HyperText Markup Language is...
Down
- IOT stands for
- stands for World Wide Web
- Jeff Weiner is the CEO of...
- the creators of Firefox
- Apple's latest mobile operating system
- Apple's voice assistant
- LG and Google latest smartphone
- "start-up nation"
- Apple in car OS integration
21 Clues: IOT stands for • "start-up nation" • LinkedIn news app • Google's web browser • Google smart glasses • the creators of Firefox • Apple's voice assistant • Zune was developed by... • Android's latest edition • stands for World Wide Web • The next generation of IPV4 • Apple in car OS integration • Jeff Weiner is the CEO of... • The world online encyclopedia • Portable Document Format is... • ...
growth and spread of islam 2022-01-12
Across
- shared language of muslims
- deputy of the prophet
- tries to resolve the conflict
- Ali's son
- striving to encourage
- a person or proclaimer of the will of god
- Uthman's family
- the spread of something
- the muslim community
- larger opinion over others
- people linked by culture religion etc.
Down
- rightly guided caliphs
- the international city
- kept it together
- muhammad's son in law
- what muhammad did not have also another word for son
- those who wanted Ali
- period expanded old trade networks
- those who supported Abu-Bakr
- muhammad's friend and a military leader
20 Clues: Ali's son • Uthman's family • kept it together • those who wanted Ali • the muslim community • deputy of the prophet • muhammad's son in law • striving to encourage • rightly guided caliphs • the international city • the spread of something • shared language of muslims • larger opinion over others • those who supported Abu-Bakr • tries to resolve the conflict • ...
spainsh man 2025-03-21
Across
- goes
- click
- the text message
- the town
- the park
- at home
- the coffee
- the super market
- the store
- the signing
- to tweet
- the lake
- the bank
- to record videos
- past
- the mountains
- the square
- the shopping center
- the restaurant
- the cinema
Down
- the pool
- the beach
- social networks
- the mobile
- the museum
- the hospial
- text message
- lol
- the email
- send
- the screen
- the city
- the field
- the cell phone
- the school
- the church
- the mail
37 Clues: lol • goes • send • past • click • at home • the pool • the town • the park • to tweet • the lake • the city • the bank • the mail • the beach • the email • the store • the field • the mobile • the museum • the screen • the coffee • the school • the square • the church • the cinema • the hospial • the signing • text message • the mountains • the cell phone • the restaurant • social networks • the text message • the super market • to record videos • ...
Acronym Fun 2024-09-06
Across
- Vital Information Resources under Siege
- solid-state storage
- New Technology File System
- High-Definition Multimedia Interface
- graphics processing unit
- central processing unit
- Serial Advanced Technology Attachment
- Liquid Crystal Display
- small
- Read-Only Memory
- Video Graphics Array
- Digital Visual Interface
Down
- (Abbreviations) local area networks
- basic input/output system
- control unit
- Solid-state drives
- network interface controller
- Arithmetic Logic Unit
- Advanced Technology Attachment.
- Hard Disk Drive
- Universal Serial Bus
- Controlled Unclassified Information
- MultiMediaCard
- redundant array of independent disks
- random-access memory
- smaller general-purpose computer
26 Clues: small • control unit • MultiMediaCard • Hard Disk Drive • Read-Only Memory • Solid-state drives • solid-state storage • Universal Serial Bus • random-access memory • Video Graphics Array • Arithmetic Logic Unit • Liquid Crystal Display • central processing unit • graphics processing unit • Digital Visual Interface • basic input/output system • New Technology File System • ...
Networking concepts and cyber ethics 2025-05-18
Across
- : Used to access accounts securely.
- : Maximum data transfer rate.
- : Security system that controls traffic.
- : Online bullying.
- : Rules for communication between devices.
- : Secure remote access method.
- : Fake emails to steal data.
Down
- : Secretly collects data.
- : Wireless network technology.
- : A device that forwards data packets between networks.
- : Wired networking method.
- : Unwanted email.
- : Harmful software.
- : Protects creative work.
- : Scrambling data for security.
- : Local Area Network.
- : Right to keep data secure.
- Address : Unique identifier for a device on a network.
- : Unauthorized system access.
- : A computer that provides services or data.
20 Clues: : Unwanted email. • : Online bullying. • : Harmful software. • : Local Area Network. • : Secretly collects data. • : Protects creative work. • : Wired networking method. • : Right to keep data secure. • : Fake emails to steal data. • : Maximum data transfer rate. • : Unauthorized system access. • : Wireless network technology. • : Secure remote access method. • ...
Inter-means between, among 2024-05-05
10 Clues: to cut between • to cut between • to come between • between nations • to break between • electronic networks • to act amongst others • a break in between acts • occurring between two levels • to come between other’s concerns
Laura's Internet Crossword Puzzle 2015-09-22
Across
- Technology that allows two or more devices (eg. Computers and peripherals, cell phones, PDAs) to communicate without cables or wires
- Standard network protocol for communication across networks
- Set of rules for how HTML documents are interpreted & displayed through a browser
- An agreed upon format for transmitting data between two or more devices
- Companies that provide users with access to the Internet, usually with a fee
- Early version of the internet
- Collection of networks of computers & storage devices linked by cables and satellite
- Where you can keep URLs that you would like to consult frequently
- Standard way of indicating the location of a web site
Down
- A location on the World Wide Web
- A web authoring language: set of text & codes, only visible to the web browser & instruct the browser how to display the text
- Light pulses used to carry info
- Lead to another website/place within same document
- Allows more data to be sent over traditional copper telephone lines
- Total collection of hypertext documents stored in computers connected to the Internet
- Mainframe computers that are capable of very fast processing
- Converts digital data on a computer to analog signals for travel on the Internet along telephone lines & converts analog signals sent to a computer into digital data so the computer can understand them
17 Clues: Early version of the internet • Light pulses used to carry info • A location on the World Wide Web • Lead to another website/place within same document • Standard way of indicating the location of a web site • Standard network protocol for communication across networks • Mainframe computers that are capable of very fast processing • ...
computer science 2025-10-21
Across
- is a unique numerical label assigned to every device connected to a computer network?
- is a small, formatted unit of data that travels over a network, like the internet?
- a communication method that uses electronic devices to deliver messages across computer networks?
- Electronic mail, commonly shortened to ?
- is a computer or system that provides resources, data, or services to other computers?
- is a networking device that connects multiple computer networks?
- is the maximum rate of data that can be transferred over a network connection?
- is a set of rules that govern how data is transmitted and received?
- is a fundamental internet protocol that enables reliable, ordered, and error-checked data transmission ?
- is a system that connects devices like computers and routers using physical cables?
- most commonly an Ethernet cable?
Down
- is the process of transferring data from one device to another?
- is a system of two or more interconnected devices?
- consists of the physical devices that enable communication and data transfer between computers and other devices on a network?
- connects devices using radio waves instead of physical cables?
- is a central device that connects multiple computers or devices in a network?
- is a global network of billions of computers and other electronic device?
17 Clues: most commonly an Ethernet cable? • Electronic mail, commonly shortened to ? • is a system of two or more interconnected devices? • connects devices using radio waves instead of physical cables? • is the process of transferring data from one device to another? • is a networking device that connects multiple computer networks? • ...
cyber 2021-09-30
Across
- Phreaking is a slang term for hacking into secure telecommunication networks.
- is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
- Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user.
- A computer worm is a type of malware that spreads copies of itself from computer to computer.
- A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- A hacker is an individual who uses computer, networking or other skills to overcome a technical problem
- Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
- A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.
Down
- a method or pathway used by a hacker to access or penetrate the target system.
- Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason
- is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials.
- Hardening is the process by which something becomes harder or is made harder.
- The dark web refers to sites and services that aren't indexed by search engines
15 Clues: Phreaking is a slang term for hacking into secure telecommunication networks. • Hardening is the process by which something becomes harder or is made harder. • a method or pathway used by a hacker to access or penetrate the target system. • The dark web refers to sites and services that aren't indexed by search engines • ...
Ecology 2025-02-07
Across
- Eats off of dead things
- Number of animals or people in an area
- Lives off of other's energy
- Non-living
- Consists of all of the food chains
- Community of living organisms
Down
- Top of the food chain
- Major community of plants and animals
- Linear networks of links in a food web
- Meat eater
- Natural home or environment
- Living
- Plant eater
- Plant and meat eater
- Produces energy
15 Clues: Living • Meat eater • Non-living • Plant eater • Produces energy • Plant and meat eater • Top of the food chain • Eats off of dead things • Natural home or environment • Lives off of other's energy • Community of living organisms • Consists of all of the food chains • Major community of plants and animals • Linear networks of links in a food web • Number of animals or people in an area
Douglas EdTC 5325 Networking Crossword 2013-03-25
Across
- The part of a machine that allows for network connection.
- A device that allows for multiple wired connections, through a single network port.
- The allowable amount of data that can travel over a network.
- End point of a network connection.
- The physical connection cable of a network.
- A device that allows for multiple connections, wirelessly, to a networks and performs small scale client management.
- The distance a wireless signal can carry without signal degradation.
- Physical and logical. The physical of a network refers to the configuration of cables, computers, and other peripherals. Logical is the method used to pass the information between workstations.
Down
- A large scale network connecting entire states, a nation, or countries to one another.
- Wireless networks, commonly available at local business like DairyQueen and StarBucks.
- The receiving machine of a network: Desktop, laptop, tablet, or mobile devices.
- A cable to which multiple nodes or workstations are attached.
- The managing machine of a network: often control network distribution or user access.
- A form of digital protection attached to a network.
- A small scale network, focused on a location like a room, building, or small geographic area.
- A hardware device that contains multiple independent but connected modules of network and internet work equipment.
- A machine connected, locally, to another machine.
17 Clues: End point of a network connection. • The physical connection cable of a network. • A machine connected, locally, to another machine. • A form of digital protection attached to a network. • The part of a machine that allows for network connection. • The allowable amount of data that can travel over a network. • ...
Network Basics Terminology by Natasha 2012-03-24
Across
- the distance that a wifi network provides coverage
- a network protocol invented by Xerox Corporation
- the amount of transmission capacity available on a network at any time
- a computer or workstation being served
- a type of physical topology that uses a combination of linear bus and star topologies
- abbreviation for local area network
- a type of topology in which systems are connected to a circle of cable
Down
- a centralized computer that provides shared resources to network users; generally not used by humans directly
- a networking device that acts like a shield to protect the private network from hackers or viruses or other unwanted things
- term for a computer in a network where all of the computers are equal
- network where cables are not needed for one to connect; this network uses radio waves opposed to cables to communicate
- many coffee shops can be referred to as this because they offer customers the ability to access the internet wirelessly
- abbreviation for wide area network; connects local and metropolitan networks to global communication networks, such as the internet
- the configuration of cables, computers, and other peripherals
- abbreviation for metropolitan area network
- connector used for unshielded twisted-pair cable
- abbreviation for network interface card; provides physical connection between the network and computer workstation
17 Clues: abbreviation for local area network • a computer or workstation being served • abbreviation for metropolitan area network • a network protocol invented by Xerox Corporation • connector used for unshielded twisted-pair cable • the distance that a wifi network provides coverage • the configuration of cables, computers, and other peripherals • ...
Network devices 2023-08-04
Across
- Is a network device that connects different networks
- Serves as an entry or exit point between two networks
Down
- A security device that monitors and controls incoming and outgoing network traffic
- It broadcasts data to all connected devices
- converts digital data into analog signals
- Allows wireless devices to connect to a wired network
6 Clues: converts digital data into analog signals • It broadcasts data to all connected devices • Is a network device that connects different networks • Allows wireless devices to connect to a wired network • Serves as an entry or exit point between two networks • A security device that monitors and controls incoming and outgoing network traffic
Test 2021-07-28
Across
- Method of finding the optimal path from between networks
- Element of the protocol that decides the action/decision to be taken
- mining, Technique of extracting and discovering patterns from meaningful information from huge sets of data
- Twin, Digital representation of real world entities
Down
- , Logical division of network into several networks to increase the network performance and security.
- , Which layer compresses and decompresses the data to ensure faster data transfer
- Unidirectional communication between devices
7 Clues: Unidirectional communication between devices • Twin, Digital representation of real world entities • Method of finding the optimal path from between networks • Element of the protocol that decides the action/decision to be taken • , Which layer compresses and decompresses the data to ensure faster data transfer • ...
Routers 2023-08-11
Across
- A device used to connect different networks
- A small piece of data that router forwards
- Is the act of sending data packets to their next hop based on the routing decision
Down
- The process of selecting a path for data to travel between networks
- Router is a type of networking device that operates at the network boundary
- Routers are high-performance networking devices that operate within the core of a large-scale computer network
- Routing protocol example
7 Clues: Routing protocol example • A small piece of data that router forwards • A device used to connect different networks • The process of selecting a path for data to travel between networks • Router is a type of networking device that operates at the network boundary • Is the act of sending data packets to their next hop based on the routing decision • ...
I.T revision 2016-07-24
11 Clues: 8 bits • 1 or 0 • 1000 bytes • 1000 megabytes • 1000 Kilobytes • click 'right click' • Input, Process, Output • drive a box shaped storage device • an input device that allows you to type • an output device that shows you something • Collection of devices that communicate with each other
Unit 2 Vocabulary 2024-01-24
Across
- the information about the packet is stored in the header
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- a programmer hides all but the relevant data about an object in order to reduce complexity and increase efficiency
- the duplication of critical components or functions of a system with the intention of increasing reliability of the system
- a small amount of data sent over a network, such as a LAN or the Internet
- An agreed-upon set of rules that specify the behavior of some system
- Protocol a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- There are two hierarchical Internet addressing systems, domain names (as shown below) and IP addresses. These address hierarchies work much like the postal system, which locates people first by state, then city, then street, then house number, then apartment, and then finally person.
Down
- the property that enables a system to continue operating properly in the event of the failure of (or one or more faults within) some of its components
- Control Protocol a standard that defines how to establish and maintain a network conversation through which application programs can exchange data
- The unique number assigned to each device on the Internet.
- a set of rules
- is used to send short messages called datagrams but can be described as a ‘best-effort’ protocol; UDP is used over TCP for applications where speed matters such as video streaming since it is a faster transmission time
- a small chunk of any kind of data: text, numbers, lists, etc
- a device that forwards data packets along networks. It is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. They are located at gateways, the places where two or more networks connec
15 Clues: a set of rules • the information about the packet is stored in the header • The unique number assigned to each device on the Internet. • a small chunk of any kind of data: text, numbers, lists, etc • An agreed-upon set of rules that specify the behavior of some system • a small amount of data sent over a network, such as a LAN or the Internet • ...
CSHM 2015-03-06
Across
- break the flow of
- to give up something for something else
- big boom
- hate
- in between grades
- not local
- to act one upon another
- dislike for food
- with another office
- pull out a cord
- taking someone else's pass (sport)
- melt
Down
- to fail to fulfill the expectations
- something out of proportion
- not agree
- to give out
- computer network linking smaller computer networks worldwide
- to get rid of
- not allow
- a meeting with questions
- vanish
- shout
- involving different states
- without respect
- not comply
25 Clues: hate • melt • shout • vanish • big boom • not agree • not local • not allow • not comply • to give out • to get rid of • without respect • pull out a cord • dislike for food • break the flow of • in between grades • with another office • to act one upon another • a meeting with questions • involving different states • something out of proportion • taking someone else's pass (sport) • ...
Nervous System 2021-02-02
Across
- uses its two networks
- consists of nerve fibres
- wave of chemical disturbance
- consumes 20 per cent of oxygen
- contains the cerebrospinal fluid
- Opposite parts control each other
- optic nerve
Down
- 3+1 pairs
- Similar to an egg
- these nerve link with CNS
- brings coordination and integration
- close coordination with CNS
- Won the Noble Prize for Research
- 1+2+3+6 pairs
- located in CNS
- This part is the continuation
- published his results in 1903
- Italian scientist
- Important, tallest and has many copies
- A bridge for communication
20 Clues: 3+1 pairs • optic nerve • 1+2+3+6 pairs • located in CNS • Similar to an egg • Italian scientist • uses its two networks • consists of nerve fibres • these nerve link with CNS • A bridge for communication • close coordination with CNS • wave of chemical disturbance • This part is the continuation • published his results in 1903 • consumes 20 per cent of oxygen • ...
CIS Module 9 Participation: Erin B. 2023-08-15
Across
- attacks nationwide networks
- string of upper and lowercase letters/numbers
- malicious computer code
- motivated by principles or beliefs
- use of technology to stalk someone
- unlocks encrypted information
- a false warning
- specifies design and arrangement
- harmful computer code
- hides inside another program
Down
- bullying that takes place with a device/online
- stores information on your computer
- security threat from own employees
- waste from discarded digital services
- ensures no imposters
- prevents device function until paid
- wireless data technology
- free from public attention
- email with false claims
- malicious software
- unwanted email
21 Clues: unwanted email • a false warning • malicious software • ensures no imposters • harmful computer code • malicious computer code • email with false claims • wireless data technology • free from public attention • attacks nationwide networks • hides inside another program • unlocks encrypted information • specifies design and arrangement • security threat from own employees • ...
Mobile Computing 2023-02-03
Across
- program runs on hardware
- router in foreign network
- request to send
- Transport Layer protocol
- temporary IP address for a mobile
- mobile ad-hoc network
- world in hand (a device)
- forward packet from home agent to foreign agent
- fixed and wired mobile communication
- Multiple devices access shared media network
Down
- Short range wireless technology
- Replacing traditional networks
- fixed and wireless mobile communication
- network address translator
- two or more piconets
- One of fixed assignment schemes
- router on home network
- heart of mobile systems
- each user uses different band of frequency
- clear to send
20 Clues: clear to send • request to send • two or more piconets • mobile ad-hoc network • router on home network • heart of mobile systems • program runs on hardware • Transport Layer protocol • world in hand (a device) • router in foreign network • network address translator • Replacing traditional networks • Short range wireless technology • One of fixed assignment schemes • ...
Spanish 3 H Vocab 2025-08-21
Across
- cell phone
- sometimes
- to do the shopping
- open-minded
- to chat online
- committed
- to upload photos
- computer (Spain)
- to surf the internet
- student desks
- social networks
- always
- to clear the table
- to wash the clothes
Down
- lively
- whiteboard/blackboard
- to think
- playful
- melancholic
- to take out the trash
- often, many times
- to dust the furniture
- persistent
- proud
- homework
- to set the table
- passionate
- challenging, demanding
- capable
- to have a good time
- never
31 Clues: proud • never • lively • always • playful • capable • to think • homework • sometimes • committed • cell phone • persistent • passionate • melancholic • open-minded • student desks • to chat online • social networks • to upload photos • computer (Spain) • to set the table • often, many times • to do the shopping • to clear the table • to have a good time • to wash the clothes • to surf the internet • whiteboard/blackboard • ...
Vocab 1 2025-08-22
Across
- to do the shopping
- to set the table
- always
- challenging, demanding
- whiteboard/blackboard
- lively
- proud
- playful
- capable
- sometimes
- to think
- to dust the furniture
- often, many times
- to clear the table
- social networks
- computer (Spain)
- to take out the trash
Down
- committed
- internet to surf the internet
- passionate
- open-minded
- cell phone
- to have a good time
- persistent
- homework
- melancholic
- student desks
- to chat online
- to upload photos
- never
- to wash the clothes
31 Clues: proud • never • always • lively • playful • capable • homework • to think • committed • sometimes • passionate • cell phone • persistent • open-minded • melancholic • student desks • to chat online • social networks • to set the table • to upload photos • computer (Spain) • often, many times • to do the shopping • to clear the table • to have a good time • to wash the clothes • whiteboard/blackboard • to dust the furniture • ...
Network 2022-05-13
Across
- Translate Analogue data to digital data
- Global Network of all Networks
- Unwanted emials
- connects computers together
- engine website used to search the internet
- Program that most of the time harms the computer
- Internet based technology but internal
Down
- software used to surf Internet
- Illegal copying of data
- Internet Etiquette
- Link to a website
- group of computers connected together
- company provides internet service
- illegal access to data
14 Clues: Unwanted emials • Link to a website • Internet Etiquette • illegal access to data • Illegal copying of data • connects computers together • software used to surf Internet • Global Network of all Networks • company provides internet service • group of computers connected together • Internet based technology but internal • Translate Analogue data to digital data • ...
IT Networking & Cybersecurity 2025-03-27
Across
- Connects multiple local networks
- Personal small device network
- Defines data transmission rules
- Central hub connects devices
- Single central network cable
Down
- Mix of multiple topologies
- Devices form a closed loop
- Nodes interconnect with redundancy
- Splits, checks, and reassembles data
- Large, wide-area network
- Small local network area
11 Clues: Large, wide-area network • Small local network area • Mix of multiple topologies • Devices form a closed loop • Central hub connects devices • Single central network cable • Personal small device network • Defines data transmission rules • Connects multiple local networks • Nodes interconnect with redundancy • Splits, checks, and reassembles data
nw3ctf3 2020-04-10
Across
- search for and publish private or identifying information about (a particular individual) on the Internet, typically with malicious intent
- the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers
- ______ ______ system typically called DNS (2 words)
- the condition of being anonymous
- part of the World Wide Web whose contents are not indexed by standard web search-engines (2 words)
- the practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information (2 words)
- _____ ______ networks typically called a LAN (2 words)
- ________ __________information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual(2 words)
- type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
Down
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- One's unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices (2 words)
- ______ ________ address is the numerical value assigned to each device connected to a network (2 words)
- an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner (2 words)
- ________ ________ translation is the method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device (2 words)
- ______ _______ locator typically called a URL (2 words)
- World Wide Web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations, or authorization to access (2 words)
- _____ ______ networks typically called a WAN (2 words)
17 Clues: the condition of being anonymous • ______ ______ system typically called DNS (2 words) • _____ ______ networks typically called a LAN (2 words) • _____ ______ networks typically called a WAN (2 words) • ______ _______ locator typically called a URL (2 words) • part of the World Wide Web whose contents are not indexed by standard web search-engines (2 words) • ...
Computers 2021-12-07
Across
- a type of drive
- Electronics
- "visual interface"
- runs programs
- holds information
- portable device
- "client"
- logical operations
- established set of rules
- manages computer hardware
- links networks together
- adapter card
- action of steps
- a type of ware
Down
- a secure channel
- allows the computers in small areas
- type of computer
- Evidence
- a person the operating
- computing, data
- absorbs unwanted heat
- storing
- large, very fast
- the hardware in a device
- preforms operations
- a type of ware
- type of computer
- main circuit
- the ending of a file
- gives power
- _devices
- conceptual framework
32 Clues: storing • Evidence • "client" • _devices • Electronics • gives power • main circuit • adapter card • runs programs • a type of ware • a type of ware • a type of drive • computing, data • portable device • action of steps • a secure channel • type of computer • large, very fast • type of computer • holds information • "visual interface" • logical operations • preforms operations • the ending of a file • ...
test 2013-10-22
Across
- Management Inc.
- Product Design Group
- Kiewit Sons Co. (Canada)
- Group
- Inc.
- Energy Canada
- Technologies (Canada) Ltd
- Transit
- Aerospace Inc.
- Natural Resources Ltd
- Canada Ltd
- Fuel Cell Cooperation (AFCC)
- Radloff & Associates
- Project
- Medical
- Ltd
- Mines Limited
Down
- Payment Technologies Inc
- Energy Fireplace Products Limited
- Inc.
- Corporation
- Controls Corporation
- Life Sciences Software Inc
- Island Health Authority
- North America Inc
- Billiton Inc
- International Group PLC
- Industries Ltd.
- Corporation
- of Calgary
- Systems Ltd Canada
- Thermal Technologies Inc.
- Energy Inc
- Networks Canada
34 Clues: Ltd • Inc. • Inc. • Group • Transit • Project • Medical • Canada Ltd • of Calgary • Energy Inc • Corporation • Corporation • Billiton Inc • Energy Canada • Mines Limited • Aerospace Inc. • Management Inc. • Industries Ltd. • Networks Canada • North America Inc • Systems Ltd Canada • Product Design Group • Controls Corporation • Radloff & Associates • Natural Resources Ltd • Island Health Authority • International Group PLC • ...
Notes 2015-12-16
Across
- Encourage domestic production of goods
- Renewable resource supplied by sun
- percentage of people engaged in agriculture
- able to buy
- Costs from unique location
- woman status increase
- GNI
- power of moving water into electricity
- open themselves to foreign investment
- important factor
- new factories or expand existing ones
Down
- Costs transportation networks
- HDI
- Renewable resource supplied by wind
- The North Atlantic Free Trade Agriculture
- wood and crops that can be used as fuel
- large lots
- Been Around thousands of years ex. silk road
- Rapid Growth
- available for sale
20 Clues: HDI • GNI • large lots • able to buy • Rapid Growth • important factor • available for sale • woman status increase • Costs from unique location • Costs transportation networks • Renewable resource supplied by sun • Renewable resource supplied by wind • open themselves to foreign investment • new factories or expand existing ones • Encourage domestic production of goods • ...
Cross word activity 2022-08-16
Across
- he catch the rat
- increase communication networks
- king of the jungle
- this animal likes bananas
- it is the national fruit of India.
- children like this
- using the cricket game
- It is the strongest wild animal
- performed on stage
- It produces Oxygen.
Down
- the most beautiful birds of the earth.
- this animal has a long trunk
- watch the home
- it is a pet animal
- captain cool of indian cricket team
- It flies in the sky
- it is an outdoor game
- collect nectar from the flowers
- it is a red flower
- cut the wires
20 Clues: cut the wires • watch the home • he catch the rat • it is a pet animal • king of the jungle • children like this • it is a red flower • performed on stage • It flies in the sky • It produces Oxygen. • it is an outdoor game • using the cricket game • this animal likes bananas • this animal has a long trunk • increase communication networks • collect nectar from the flowers • ...
DA3_19BCE1344 2022-05-02
Across
- TCP is a subset of this
- cookie
- in case data is corrupted
- fastest layer 1
- collection of networks
- no weapons
- allocated IP
- layer 3 device
- type of handshake
- ARP
- a specialized job
- used in webpages
- camel
- more than 4 billion
- legacy version of TCP
- type of server
- layer 2 device
Down
- kali is known for this
- illegal content
- response
- NAT
- routers update this
- UDP is
- successor of RIP
- ACL
- data obfuscation
- commonly used OS
- unsafe protocol
- major player in networking
- cryptography technique
30 Clues: NAT • ARP • ACL • camel • cookie • UDP is • response • no weapons • allocated IP • layer 3 device • type of server • layer 2 device • illegal content • fastest layer 1 • unsafe protocol • successor of RIP • data obfuscation • commonly used OS • used in webpages • type of handshake • a specialized job • routers update this • more than 4 billion • legacy version of TCP • kali is known for this • collection of networks • ...
Security Safety 2023-07-19
Across
- Biological user authentication methods
- Software used to prevent cyberattacks
- Malicious web browser advertisements
- Publishing private user information
- Blocks fraudulent network traffic
- Maliciously placed computer system infection
- Attacker changes DNS server information
- Intimidating and threatening electronic communication
- Words used for account access
Down
- Tracks user's keystrokes
- Practice of protecting computer systems
- Computer networks used for cyberattacks
- Forceful hacker password guessing technique
- Fraudulent solicitation through an email
- More than two authentication techniques
- Requires users to confirm identity
- Tracks user's online behavior
- Plans and implements security measures
- Malicious click tricks
- Use of fake website addresses
20 Clues: Malicious click tricks • Tracks user's keystrokes • Tracks user's online behavior • Use of fake website addresses • Words used for account access • Blocks fraudulent network traffic • Requires users to confirm identity • Publishing private user information • Malicious web browser advertisements • Software used to prevent cyberattacks • Biological user authentication methods • ...
