networks Crossword Puzzles
cybersecurity crossword puzzle 2025-03-14
Across
- authentication two-step identity verification
- exploits unknown software vulnerability
- verifies user identity
- secretly monitors user activity
- hides malicious activities
- engineering manipulates people for information
- fixes software vulnerabilities
- force attack tries all password combinations
- self-replicating malicious program
- horse disguised malicious software
- blocks unauthorized network access
Down
- hidden access to systems
- spreads copies across networks
- converts data into code
- encrypts data, demands ransom
- testing simulates attacks to find vulnerabilities
- fraudulent attempt to obtain information
- network of infected devices
- malicious software causing harm
- overwhelms service with traffic
20 Clues: verifies user identity • converts data into code • hidden access to systems • hides malicious activities • network of infected devices • encrypts data, demands ransom • spreads copies across networks • fixes software vulnerabilities • secretly monitors user activity • malicious software causing harm • overwhelms service with traffic • self-replicating malicious program • ...
Ethical Hacking 2025-10-19
Across
- is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
- refers to any access or action that is not permitted or approved, usually involving someone trying to enter systems or data without permission.
- means having the intention to cause harm. In tech, it describes software or behavior designed to damage or disrupt systems or steal data.
- are individuals who gain access to systems or networks, often bypassing security measures. They can be malicious (black-hat), ethical (white-hat), or somewhere in between (gray-hat).
- is a type of malware that locks or encrypts a victim’s data and demands payment (a ransom) to restore access.
- is any potential danger or risk that could exploit a vulnerability to harm a system, network, or organization.
Down
- is someone who commits crimes through the internet or using computers, often for financial gain, data theft, or sabotage.
- are a type of malware that attach themselves to legitimate programs or files and spread when those files are opened, often damaging systems or data.
- refers to criminal activities carried out using computers or the internet, such as hacking, identity theft, or spreading malware.
- refers to information that is stored and processed by computers. It can include text, images, videos, or any other type of digital content.
- (short for malicious software) is any software designed to harm, exploit, or otherwise compromise a computer, system, or network.
- is an incident where unauthorized individuals gain access to data, systems, or networks, often resulting in data loss, theft, or compromise.
12 Clues: is a type of malware that locks or encrypts a victim’s data and demands payment (a ransom) to restore access. • is any potential danger or risk that could exploit a vulnerability to harm a system, network, or organization. • is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage. • ...
TechTonic - The Cross Word 1 2021-11-28
Across
- software that harms the computer
- Social network founded by Zukerburg
- Junk e-mail
- Network of Networks
- known as a main memory
- Common mobile app for chatting
- A famous Operating System
- device that moves the cursor
- a output device
Down
- Term for Single Binary Digit
- Electronic mail
- Quit all application and turn off the computer
- operating System used on most Mobiles
- 8-Bits
- Commonly used search engine
- used to secure a computer
- Physical components of an electronic device
- Name of Indian super computer
- Brain of Computer
- group of web pages on the internet
20 Clues: 8-Bits • Junk e-mail • Electronic mail • a output device • Brain of Computer • Network of Networks • known as a main memory • used to secure a computer • A famous Operating System • Commonly used search engine • Term for Single Binary Digit • device that moves the cursor • Name of Indian super computer • Common mobile app for chatting • software that harms the computer • ...
J.Morgan 2022-01-19
Across
- period expanded old trade networks
- tries to resolve the conflict
- rightly guided caliphs
- striving to encourage
- those who supported ABu-Bakr
- kept it together
- Ali's son
- those who wanted Ali
- shared language of muslims
- people linked by culture religion ect.
- a person or proclaimer of the will of god
Down
- the international city
- he spread of something
- uthman's family
- deputy of the prophet
- son
- muhammad's son in law
- muhammad's son in law
- the muslim community
- muhammad's friend and a military leader
- larger opinion over others
- what muhammad's did bit have also another word
22 Clues: son • Ali's son • uthman's family • kept it together • the muslim community • those who wanted Ali • deputy of the prophet • muhammad's son in law • muhammad's son in law • striving to encourage • the international city • he spread of something • rightly guided caliphs • larger opinion over others • shared language of muslims • those who supported ABu-Bakr • tries to resolve the conflict • ...
Marketing 2015-10-06
Across
- STATEMENT OF PURPOSE
- EXTERNAL FACTORS AFFECTING COMPANY
- GROUP THAT HAS POTENTIAL INTEREST
- RESEARCH INTERACT IN THEIR OWN ENVIRONMENT
- GIVING AND RECEIVING SIMULTANEOUSLY
- DATA FOR SPECIFIC PLAN
- STUDY OF HUMAN POPULATION
- COLLECT OF BUSINESSES AND PRODUCTS
- DATA THAT ALREADY EXISTS
Down
- SEGMENT OF POPULATION
- TYPE OF SATISFACTION
- FACTORS AFFECTING COMPANY ABILITY TO SERVE
- GROWTH BY INCREASING SALES OF CURRENT PRODUCTS
- RESEARCH THAT HELPS DEFINE PROBLEMS
- STATE OF FELT DEPRIVATION
- BORN BETWEEN 1965 AND 1976
- WEB OF COMPUTER NETWORKS
- ACTUAL AND POTENTIAL BUYER
- GROWTH THROUGH ACQUIRING BUSINESSES OUTSIDE CURRENT PRODUCTS
- A TYPE OF PLANNING
20 Clues: A TYPE OF PLANNING • TYPE OF SATISFACTION • STATEMENT OF PURPOSE • SEGMENT OF POPULATION • DATA FOR SPECIFIC PLAN • WEB OF COMPUTER NETWORKS • DATA THAT ALREADY EXISTS • STATE OF FELT DEPRIVATION • STUDY OF HUMAN POPULATION • BORN BETWEEN 1965 AND 1976 • ACTUAL AND POTENTIAL BUYER • GROUP THAT HAS POTENTIAL INTEREST • EXTERNAL FACTORS AFFECTING COMPANY • ...
Cross word activity 2022-08-15
Across
- he catch the rat
- increase communication networks
- king of the jungle
- this animal likes bananas
- it is the national fruit of India.
- children like this
- using the cricket game
- It is the strongest wild animal
- performed on stage
- It produces Oxygen.
Down
- the most beautiful birds of the earth.
- this animal has a long trunk
- watch the home
- it is a pet animal
- captain cool of indian cricket team
- It flies in the sky
- it is an outdoor game
- collect nectar from the flowers
- it is a red flower
- cut the wires
20 Clues: cut the wires • watch the home • he catch the rat • it is a pet animal • king of the jungle • children like this • it is a red flower • performed on stage • It flies in the sky • It produces Oxygen. • it is an outdoor game • using the cricket game • this animal likes bananas • this animal has a long trunk • increase communication networks • collect nectar from the flowers • ...
Practice Cybersecurity Terminology Puzzle 2025-03-12
Across
- Software to remove malware
- Fraud started with phone freaking
- Any harmful hacking techniques
- Malicious software
- An unintended problem with electronics
- Access using tor browser
- Deliberate theft of sensitive data
- Taking advantage of a vulnerability
- Performs tasks to solve problems
- A barrier between networks
Down
- A weakness or flaw
- Manages computers recourses and processes
- Online harassment
- String of octets under 256
- Unauthorized access to sensitive data
- Malicious program that infects computers
- Used to block specific users
- Maintenance of data quality
- A type of malware
- Recently discovered exploits
20 Clues: Online harassment • A type of malware • A weakness or flaw • Malicious software • Access using tor browser • Software to remove malware • String of octets under 256 • A barrier between networks • Maintenance of data quality • Used to block specific users • Recently discovered exploits • Any harmful hacking techniques • Performs tasks to solve problems • Fraud started with phone freaking • ...
UNIT 5 ACTIVITY 2 2024-11-07
Across
- Aorta
- Vessel
- Blood flow decrease of stops
- Impairment in the heart
- Beats per minute
- Pumps blood
- Yellowish
- Atrium
- Vessels that return blood to the heart
- Atherosclerotic Plaque
- Networks of small vessels that perfuse tissues
- One dimensional
Down
- Preformed before and after exercise
- Most common film taken in medicine
- Heartbeat irregularities
- Brain
- Coronary artery bypass grafting
- The hearts electrical activity
- Done when exercising
- Extracted from a vein in arm
- Vessels that deliver blood to tissues
- Artery
- Blood pressure
- Coronary artery disease
24 Clues: Aorta • Brain • Vessel • Atrium • Artery • Yellowish • Pumps blood • Blood pressure • One dimensional • Beats per minute • Done when exercising • Atherosclerotic Plaque • Impairment in the heart • Coronary artery disease • Heartbeat irregularities • Blood flow decrease of stops • Extracted from a vein in arm • The hearts electrical activity • Coronary artery bypass grafting • ...
Ciencia y Technología 2025-03-04
Across
- To connect to the internet
- Cure
- Social Networks
- Symptoms
- Cell Phone
- Health
- To surf the web
- Password
- Electronic Devices
- To Comment
Down
- Laptop
- To add a photo
- Website
- To Download
- Internet 1
- Username
- To disconnect from the internet
- Online
- To Update
- Text message
- Email Address
- To add video
- To Upload
- Internet 2
- Illness/Disease
25 Clues: Cure • Laptop • Online • Health • Website • Username • Symptoms • Password • To Update • To Upload • Internet 1 • Cell Phone • Internet 2 • To Comment • To Download • Text message • To add video • Email Address • To add a photo • Social Networks • To surf the web • Illness/Disease • Electronic Devices • To connect to the internet • To disconnect from the internet
Yule Time North Port 2024-12-10
Across
- changes in living things over time
- before recorded time
- have many structural units
- came up with, created
- taken care of a problem
- having life
- adding what's necessary so that an egg can become a living thing
- networks
- magazine
- confused, puzzled
- the study of DNA
- shoreline
- puzzle, mystery
Down
- unborn, egg
- having to do with beliefs
- in the end, at last
- Christmas
- bits of knowledge
- like something else
- stand under it to get kissed
- having to do with the sea
- a holiday drink made of cream, eggs and sugar
22 Clues: networks • magazine • Christmas • shoreline • unborn, egg • having life • puzzle, mystery • the study of DNA • bits of knowledge • confused, puzzled • in the end, at last • like something else • before recorded time • came up with, created • taken care of a problem • having to do with beliefs • having to do with the sea • have many structural units • stand under it to get kissed • ...
North Port 12/15/25 2025-12-15
Across
- what it says, or what's in it
- rules
- plural possessive pronoun
- how many years old
- nose, mouth, eyes, ears
- diseases or psychological problems
- dislike of or prejudice against women
- at no cost
- duty, control of
- told, suggested
- door or way into something
- on top of, higher than
Down
- hurting, injuring
- worth
- note, letter
- feeling by oneself
- look at, test, look over
- linked communications
- charge money for not following laws
- registered business deals
- not closed, as a door
- believe as fact
- let
- not old
- taboo, forbid
25 Clues: let • worth • rules • not old • at no cost • note, letter • taboo, forbid • believe as fact • told, suggested • duty, control of • hurting, injuring • feeling by oneself • how many years old • linked communications • not closed, as a door • on top of, higher than • nose, mouth, eyes, ears • look at, test, look over • registered business deals • plural possessive pronoun • door or way into something • ...
Test 2021-07-28
Across
- , Unidirectional communication between devices
- mining, Technique of extracting and discovering patterns from meaningful information from huge sets of data
- Method of finding the optimal path from between networks
- , Which layer compresses and decompresses the data to ensure faster data transfer
Down
- Element of the protocol that decides the action/decision to be taken
- Twin, Digital representation of real world entities
- , Logical division of network into several networks to increase the network performance and security.
7 Clues: , Unidirectional communication between devices • Twin, Digital representation of real world entities • Method of finding the optimal path from between networks • Element of the protocol that decides the action/decision to be taken • , Which layer compresses and decompresses the data to ensure faster data transfer • ...
Bio chap 5 cell structure and organization part 2 2022-12-10
11 Clues: bag • factory • of starch • up of pectin • like networks • for movements • house of cells • in plants cells • in both plants and animals cells • found near the nucleus of animas cell • enzymes that convert toxic H2o2 to water
Career Services: Cybersecurity Crossword 2025-03-24
Across
- The practice of protecting systems, networks, and programs from digital attacks
- The process of verifying a user’s identity.
- The process of converting data into a secret code to prevent unauthorized access.
- A type of malware that locks or encrypts a victim’s files and demands payment for their release.
- A security system that monitors and controls incoming and outgoing network traffic.
- A simulated cyber attack to test a system’s security.
- A tool that collects and analyzes security logs (Security Information and Event Management).
Down
- A security process that requires two forms of verification also known as 2FA.
- Protects devices like desktops, laptops, and mobile devices from cyber threats by implementing measures to prevent, detect, and respond to malicious activity.
- A type of malware that secretly gathers information from a user’s device.
- A person who gains unauthorized access to systems or networks.
- Malicious software designed to damage or disrupt computer systems.
- Software that detects and removes malicious programs from a computer.
- A cybersecurity professional who tests systems for vulnerabilities to improve security.
- A cyber attack where hackers trick people into revealing sensitive information through fake emails or websites.
15 Clues: The process of verifying a user’s identity. • A simulated cyber attack to test a system’s security. • A person who gains unauthorized access to systems or networks. • Malicious software designed to damage or disrupt computer systems. • Software that detects and removes malicious programs from a computer. • ...
Chapter 2: Data Communication 2024-10-21
Across
- single wire transmission
- contains the addresses of the data
- data itself
- method of error detection by summing the data values
- convert to gibberish
- multiple wire transmission
- both directions one at a time
- the transfer of small pieces of data across various networks.
- example application for check digit
Down
- different keys
- small segment of data sent over a network
- same keys
- one direction only
- convert to readable language
- prevents infinite sending of data
- sender checks the sent data
- contains the EOF
- positive and negative acknowledgements
18 Clues: same keys • data itself • different keys • contains the EOF • one direction only • convert to gibberish • single wire transmission • multiple wire transmission • sender checks the sent data • convert to readable language • both directions one at a time • prevents infinite sending of data • contains the addresses of the data • example application for check digit • ...
Test 2021-02-03
Across
- Continuous change
- A platform of ____
- World Class ____
- Yours matters
- Our 5G factory in the US is here
- Virtualisation in the sky
- Strategy execution streams
- Now available for 5G RAN
- The social network
- Make yourself heard
- Business Area
- Up in the sky
- Next generation Supply and _____
Down
- Our North Star to 2025
- Win the Technology ____
- The Head of BNEW
- We have the strongest in the market
- Compete on ____
- Foundation of our culture journey
- _____ excellence
- They choose us over competition
- Our strategy is built on this leadership
- Not walked
23 Clues: Not walked • Yours matters • Business Area • Up in the sky • Compete on ____ • The Head of BNEW • World Class ____ • _____ excellence • Continuous change • A platform of ____ • The social network • Make yourself heard • Our North Star to 2025 • Win the Technology ____ • Now available for 5G RAN • Virtualisation in the sky • Strategy execution streams • They choose us over competition • ...
Spanish 3H Unit 1 Vocab 2025-08-22
Across
- Sometimes
- Capable
- Playful (masculine)
- To upload photos
- To dust the furniture
- Open-minded (masculine)
- Social networks
- To set the table
- móvil Cell phone
- To wash the clothes
- To chat online
- Proud
- Challenging, demanding
- Passionate (masculine)
- Persistent
- To clear the table
Down
- Often, many times
- To do the shopping
- Lively
- To surf the internet
- To think
- To take out the trash
- Always
- Computer (Spain)
- Homework
- Committed (masculine)
- Melancholic (masculine)
- Student desks
- Whiteboard/Blackboard
- To have a good time
- Never
31 Clues: Proud • Never • Lively • Always • Capable • To think • Homework • Sometimes • Persistent • Student desks • To chat online • Social networks • Computer (Spain) • To upload photos • To set the table • móvil Cell phone • Often, many times • To do the shopping • To clear the table • Playful (masculine) • To have a good time • To wash the clothes • To surf the internet • To take out the trash • Committed (masculine) • ...
DBW Transport Strategies 2021-05-18
Across
- Stock of fixed capital equipment,14
- Ability to be linked,12
- Progress, incident,11
- Working together,13
- Capable of being maintained at a steady level without exhausting natural resources,11
- Blighty,7
- His stake increased,10
- Strike on a countrywide basis,8
- Catch nothing
Down
- Sector of economy not under state control,7
- Make one’s way,6
- Powers that be,10
- Rock backwards on iron,7
- Well mannered originator of a situation,5,8
- Game plan,8
- Forethought, groundwork,8
- Carry away,9
- Interconnected systems,8
18 Clues: Blighty,7 • Game plan,8 • Carry away,9 • Catch nothing • Make one’s way,6 • Powers that be,10 • Working together,13 • Progress, incident,11 • His stake increased,10 • Ability to be linked,12 • Rock backwards on iron,7 • Interconnected systems,8 • Forethought, groundwork,8 • Strike on a countrywide basis,8 • Stock of fixed capital equipment,14 • Sector of economy not under state control,7 • ...
I/O Ports 2019-10-01
Across
- digital, not physical, not tangible
- RS-232 port
- technical name system unit
- Magenta port that hosts printers
- tangible, physical
- bluetooth creates these types of networks
- common input device variety includes trackball
Down
- Green and purple ports
- IEEE-1394
- King of input devices
- blue video port on motherboard
- can transfer up to 6 gbps
- output device that creates hardcopies
- device port can host up to 127 devices
14 Clues: IEEE-1394 • RS-232 port • tangible, physical • King of input devices • Green and purple ports • can transfer up to 6 gbps • technical name system unit • blue video port on motherboard • Magenta port that hosts printers • digital, not physical, not tangible • output device that creates hardcopies • device port can host up to 127 devices • bluetooth creates these types of networks • ...
MyGait Train your Brain 2022-10-12
Across
- A set of computers on a network that are managed as a unit.
- A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- A broad term to describe a system of storing data on a different server and accessing it via a network. The server could be offsite or onsite.
- A saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as "favourites."
- The most common way of connecting computers on a network with a wired connection. It is a type of local area network (LAN) technology, providing a simple interface for connecting multiple devices.
- A point within a network that interconnects with other networks.
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
Down
- Software whose source code is open to the public. This means others can modify it, and it is often designed communally. Open-source software is typically free.
- A small file left on a user’s machine by a website. The file stores information sent by the website, and each time the user returns to the site, the site can access the file and add information.
- A computer’s way of storing information, often temporarily, so it can be quickly accessed.
- A way of sending messages over the internet. Popular email programs include Outlook, Mozilla Thunderbird, Gmail and Yahoo Mail.
- (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
12 Clues: A set of computers on a network that are managed as a unit. • A point within a network that interconnects with other networks. • A computer’s way of storing information, often temporarily, so it can be quickly accessed. • (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte. • ...
NWEG 2022-08-17
Across
- Enables devices in a network to communicate via a protocol
- is responsible for all aspects of memory management.
- The process of transferring one or more files from a remote computer to your local computer.
- a method of exchanging files between computers via the Internet
- A piece of hardware that switches data within the stacks at the data link layer
- The layer which would execute the File Transfer Protocol
- Protocol used in the Network Layer
- Protocol used in the Transport Layer
- a protocol that lets a server on a local network assign temporary IP addresses to a computer or other network devices
Down
- the network devices that route packets between networks
- When the amount of data requested among all users is more than the network service can handle, the result is a __
- a larger network that covers a wider area.
- a technique that focuses a wireless signal towards a specific receiving device, rather than having the signal spread in all directions from a broadcast antenna
- Older network adapter memory that had terrible memory management
- is a global network of computers using internet protocol (IP) to communicate globally via switches and routers
- Layer that holds the SQL protocol
- the opposite action in number 18
- a wide bandwidth data transmission that transports multiple signals and traffic types swiftly.
- stacks can have any ___
- is the set of rules governing the format of data sent over networks.
20 Clues: stacks can have any ___ • the opposite action in number 18 • Layer that holds the SQL protocol • Protocol used in the Network Layer • Protocol used in the Transport Layer • a larger network that covers a wider area. • is responsible for all aspects of memory management. • the network devices that route packets between networks • ...
Technical concepts 2020-09-06
Across
- A unit of transmission in data communications.
- A system of replacing the words in a message with other words or symbols.
- Program for navigating the internet.
- A number system in which only the digits 0 and 1 exist.
- The ‘aaa’ in : eee = aaa.bbb(ccc,ddd).
- Python,Scratch, c+t, and java, for example.
- base, A collection of information organized so that a computer application can quickly access selected information.
- A program or computer that connects to and requests information from a server.
- law, The number of transistors on a chip will double every 2 years while the cost goes down by half.
- A device used for connecting two local area networks.
- Part of the web address is the unique identifier for the website in the internet.
- Unwanted stuff installed on your machine.
- Highlighted word or icon at a particular location on the screen.
Down
- A computer that is responsible for responding to requests made by a client program or computer.
- A small piece of information you may be asked to accept when connecting to certain servers via a web browser.
- The process of transferring one or more files from a remote computer to your local computer. The opposite action is upload.
- A semiconductor device used to amplify or switch electronic signals and electrical power.
- Transferring data from your computer to another computer system.
- A set of interconnected networks that form a global TCP/IP network.
- The first component of a web address.
20 Clues: Program for navigating the internet. • The first component of a web address. • The ‘aaa’ in : eee = aaa.bbb(ccc,ddd). • Unwanted stuff installed on your machine. • Python,Scratch, c+t, and java, for example. • A unit of transmission in data communications. • A device used for connecting two local area networks. • A number system in which only the digits 0 and 1 exist. • ...
Cisco Chapter 1 Crossword Project 2020-09-25
Across
- Protect devices from malicious spyware
- LAN's provide ______ speed bandwidth
- Digital subscriber lines abbreviation
- One way to communicate in real-time between two people
- theft, Steal another's identity
- Wide area network
- multiple networks interconnected
- Expand quickly for new users without performance loss
- Networks come in all...
- device, Connects end devices to the network
- networks, Capable of data, voice and video in one
- port, Connector or port
- Local area network
- What a communication on a network is carried with?
- Provide services for people where usually no service is provided
- _______ is what television service providers use
- Small business owners use to connect o the Internet
- Another name for end device
- How many different clouds are there?
- date is encoded into __________ impulses
Down
- Physical connection to network abbreviation
- Someone who gets into someone else's computer
- Bring your own device
- Secure connection for people of organizations at home
- Packet switching ______ traffic into packets
- Private connections to LAN's and WAN's
- Virtual private network
- The largest network
- Wireless lan
- Usually administrated by a ____________ organization (LAN)
- Diagrams often use ___________
- Up, Only Mrs. Smith knows this... hint... telephone
- Malicious spyware, bad code
- Webpage that people can edit together
- device, Source or destination of a message over a network
- Of Service, QoS meaning
- Internet is short for what?
- Usually administrated by __________ organizations (WAN)
- WAN's provide _________ speeds than LAN's;)
- Block unauthorized access to network
40 Clues: Wireless lan • Wide area network • Local area network • The largest network • Bring your own device • Virtual private network • Networks come in all... • Of Service, QoS meaning • port, Connector or port • Malicious spyware, bad code • Internet is short for what? • Another name for end device • Diagrams often use ___________ • theft, Steal another's identity • ...
Lesson 3 Assignment: Peer to peer quiz 2025-03-04
Across
- Analog techniques to encode binary 1s and 0s across a continuous range of values
- Abbreviation for point-to-multipointtopology
- The most widely used in networks containing more than just a few computers
- Two or more devices on the same medium transmit simultaneously
- like a bus, in that devices are daisy-chained one to another
- Point-to-point topologies are also used with wireless networks in what is called
- Traveling across the medium
- when electricity bounces off the end of a cable and back in the other direction
- Connects each device to every other device in a network
- What does CRC stand for?
- Uses a central device, such as a hub or switch, to interconnect computers in a LAN
- Sends digital signals in which each bit of data is represented by a pulse of electricity
Down
- The set of rules for each networking technology is referred to as
- A direct link between two devices
- The path data travels between computers on a network
- A continuous length of cable connecting one computer to another in daisy-chain fashion.
- The extent to which signals in an Ethernet bus topology network are propagated
- The arrangement of cabling and how cables connect one device to another
- Cabling used to communicate between LANs or between switches
- An electrical component called a “resistor” that absorbs the signal instead of allowing it to bounce back up the wire.
20 Clues: What does CRC stand for? • Traveling across the medium • A direct link between two devices • Abbreviation for point-to-multipointtopology • The path data travels between computers on a network • Connects each device to every other device in a network • like a bus, in that devices are daisy-chained one to another • ...
Browsing safely 2025-06-14
Across
- he practice of protecting networks, applications, sensitive information, and users from cyber attacks
- repeated harmed through the use of computers, cell phones, and other electronic devices
- a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
- type of computer program that's designed to seek out and remove computer viruses that have infected
- data that directly follow either by clicking
- when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
- text files with small data
- a threat that involves sending email messages with a fake sender address
Down
- the process of befriending someone online and make them do a physical meeting and physically harm them
- unauthorized users who gain access to computers in order to steal, alter, or delete data
- appears when an application wants you to pay attention.
- software that spreads between computers and causes damage to data and software.
- illegal activities involving computers, networks, or the internet as a tool to commit attacks.
- deceive people into revealing sensitive information or installing malware
- Web pages, links in one domain
15 Clues: text files with small data • Web pages, links in one domain • data that directly follow either by clicking • appears when an application wants you to pay attention. • a threat that involves sending email messages with a fake sender address • deceive people into revealing sensitive information or installing malware • ...
Security Information Crossword 2013-10-01
Across
- Interfere with computer operation
- Social networks targets business professionals
- Largest social network today
- Not a form of social media
- Real-time communication
- Not harmful to your computer
- Common form of authentication
Down
- Stealing a person’s bank account number
- Activity computer becoming infected by Malware
- Junk e-mail
- Responsible for managing LAN
- Computer viruses and Trojan Horses
12 Clues: Junk e-mail • Real-time communication • Not a form of social media • Largest social network today • Responsible for managing LAN • Not harmful to your computer • Common form of authentication • Interfere with computer operation • Computer viruses and Trojan Horses • Stealing a person’s bank account number • Activity computer becoming infected by Malware • ...
Networking concepts 2025-06-05
Across
- used for communication / Protocol
- a network problem / Troubleshooting
- between networks / Bridge
- of connected computers / Network
- that connects computers / Router
- storage in a network / Server
- that transmits Wi-Fi / Modem
Down
- to access certain websites / Firewall
- trying to access data illegally / Hacker
- network of computers / Internet
- sent over a network / Packet
- files between computers / FileSharing
- address for a device / IP Address
- that transfers data between networks / Switch
14 Clues: between networks / Bridge • sent over a network / Packet • that transmits Wi-Fi / Modem • storage in a network / Server • network of computers / Internet • of connected computers / Network • that connects computers / Router • used for communication / Protocol • address for a device / IP Address • a network problem / Troubleshooting • to access certain websites / Firewall • ...
In- im-il-ir, inter 2022-07-26
Across
- many networks working together
- to connect with each other
- to be rude or cruel
- against the law
- not complete
- to stop one's destination
- not clearly thinking
- to take part without an invite
- not being able to get another one
Down
- unable to meet the expectations set forth
- having mental illness
- unable to do on your own
- lacking the knowledge of what is right and wrong
- to happen without consistency
- not able to act one's age
- unable to read
16 Clues: not complete • unable to read • against the law • to be rude or cruel • not clearly thinking • having mental illness • unable to do on your own • to stop one's destination • not able to act one's age • to connect with each other • to happen without consistency • many networks working together • to take part without an invite • not being able to get another one • ...
PC internals 2019-09-12
12 Clues: turns on pc • stores data • coverd in heatsink • one dot on the screen • holds the graphics card • record a file to storage • connects several networks • this button resets the pc • integrated into motherboard • power supply comes from here • it is like the brain of the PC • you could plug in your phone here
cyber security crossword (designed:the awesome Xiaoyu) 2015-12-31
Across
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- to choose options in order to create a custom system
- a bridge between two computer networks
- A capability to limit network traffic between networks and/or information systems
Down
- the process of attempting to acquire sensitive information used for identity theft
- software installed on a network of computers without the owner’s knowledge
- The process of translating plaintext into ciphertext
- software that records everything you type, then sends it off to whomever installed the software.
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
10 Clues: a bridge between two computer networks • The process of translating plaintext into ciphertext • to choose options in order to create a custom system • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
COMPUTING 2023-10-24
Across
- A person who has expert computer skills and knowledge.
- It is a data processing method which describes the processing of data by a computer in an IT environment.
- The first person to send an email in 1971.
- refers to etiquette on the internet.
Down
- Online processing is also known as _______ processing.
- It is the 4th stage of data processing, where data is inputted to the computer in the previous stage is actually processed for interpretation
- It is a A computer program that when installed, will collect info or take over computer without the users’ knowledge
- It is a networks of networks of a global communication system.
- Batch processing is a mode of processing that requires no human _____.
- J.C.R Licklider called his concept of a network of connected computers as _______ Network.
10 Clues: refers to etiquette on the internet. • The first person to send an email in 1971. • A person who has expert computer skills and knowledge. • Online processing is also known as _______ processing. • It is a networks of networks of a global communication system. • Batch processing is a mode of processing that requires no human _____. • ...
DEEP LEARNING CO3 2024-10-09
Across
- A regularization technique used in neural networks to prevent overfitting by randomly disabling neurons.
- Technique used to stabilize learning by normalizing layer inputs during training.
- The method of adapting a pre-trained model to a new task.
- The first well-known deep learning architecture that won the ImageNet competition in 2012.
Down
- that introduce non-linearity into neural networks, such as ReLU or sigmoid.
- A model known for its innovative use of multiple convolutional filter sizes within the same layer.
- The operation that extracts features from input data by applying filters.
- A deep learning architecture known for its use of small convolutional filters and a simple, stacked design.
- Architecture that introduced skip connections to mitigate the vanishing gradient problem.
- The main elements detected by convolutional layers in a network.
10 Clues: The method of adapting a pre-trained model to a new task. • The main elements detected by convolutional layers in a network. • The operation that extracts features from input data by applying filters. • that introduce non-linearity into neural networks, such as ReLU or sigmoid. • Technique used to stabilize learning by normalizing layer inputs during training. • ...
Data Transmission 2022-07-07
Across
- the time interval allowed to elapse before an acknowledgement is received.
- a type of encryption in which the same encryption key is used both to encrypt and decrypt a message.
- a device that enables data packets to be moved between different networks.
- stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
Down
- another name for a hacker who intercepts data being transmitted on a wired or wireless network.
- data that can be sent in one direction only.
- a type of encryption key that is known to all users.
- the original text/message before it is put through an encryption algorithm.
- data that arrives at the destination with the bits no longer synchronized.
- the actual data being carried in a data packet
10 Clues: data that can be sent in one direction only. • the actual data being carried in a data packet • a type of encryption key that is known to all users. • the time interval allowed to elapse before an acknowledgement is received. • data that arrives at the destination with the bits no longer synchronized. • ...
ByteCross 2024-07-18
Across
- A sequence of steps that an AI system follows to solve a problem.
- A statistical model used to make predictions or decisions without being explicitly programmed to perform the task
- An AI planning problem involving an agent navigating a cave to avoid pits and a dangerous creature
- A popular programming language for data analysis and machine learning
- The process of extracting useful information from large datasets
- The ability of a machine to imitate intelligent human behavior
- A subset of AI that involves neural networks with many layers
Down
- A problem-solving method used by AI to find solutions in a large search space.
- A set of inputs and outputs used to train an AI model.
- A software tool used for data visualization and analysis in R.
- A type of network inspired by the human brain, used in deep learning
- The process of cleaning, transforming, and modeling data to discover useful information
- The branch of AI that deals with the simulation of intelligent behavior in computers
- A framework or tool used for developing and training machine learning models
- The practice of protecting systems and networks from digital attacks
15 Clues: A set of inputs and outputs used to train an AI model. • A subset of AI that involves neural networks with many layers • A software tool used for data visualization and analysis in R. • The ability of a machine to imitate intelligent human behavior • The process of extracting useful information from large datasets • ...
Browsing safely 2025-06-14
Across
- he practice of protecting networks, applications, sensitive information, and users from cyber attacks
- repeated harmed through the use of computers, cell phones, and other electronic devices
- a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
- type of computer program that's designed to seek out and remove computer viruses that have infected
- data that directly follow either by clicking
- when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
- text files with small data
- a threat that involves sending email messages with a fake sender address
Down
- the process of befriending someone online and make them do a physical meeting and physically harm them
- unauthorized users who gain access to computers in order to steal, alter, or delete data
- appears when an application wants you to pay attention.
- software that spreads between computers and causes damage to data and software.
- illegal activities involving computers, networks, or the internet as a tool to commit attacks.
- deceive people into revealing sensitive information or installing malware
- Web pages, links in one domain
15 Clues: text files with small data • Web pages, links in one domain • data that directly follow either by clicking • appears when an application wants you to pay attention. • a threat that involves sending email messages with a fake sender address • deceive people into revealing sensitive information or installing malware • ...
Browsing safely 2025-06-14
Across
- he practice of protecting networks, applications, sensitive information, and users from cyber attacks
- repeated harmed through the use of computers, cell phones, and other electronic devices
- a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
- type of computer program that's designed to seek out and remove computer viruses that have infected
- data that directly follow either by clicking
- when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
- text files with small data
- a threat that involves sending email messages with a fake sender address
Down
- the process of befriending someone online and make them do a physical meeting and physically harm them
- unauthorized users who gain access to computers in order to steal, alter, or delete data
- appears when an application wants you to pay attention.
- software that spreads between computers and causes damage to data and software.
- illegal activities involving computers, networks, or the internet as a tool to commit attacks.
- deceive people into revealing sensitive information or installing malware
- Web pages, links in one domain
15 Clues: text files with small data • Web pages, links in one domain • data that directly follow either by clicking • appears when an application wants you to pay attention. • a threat that involves sending email messages with a fake sender address • deceive people into revealing sensitive information or installing malware • ...
Connections, Communication and The Cloud 2025-08-11
Across
- Securing individual assets rather than relying one single network perimeter
- A security enhancement that requires users to provide more than one form of identification to access an account or system
- Digital world where users, represented by avatars, can interact with each other and digital environments, often through virtual reality (VR) or augmented reality (AR)
- A multidisciplinary field comprising aspects of computer science, physics, and mathematics that utilizes quantum mechanics to solve complex problems faster than on classical computers
- The concept of automating everything in an organization that can be automated
- The delivery of various IT solutions, applications, and infrastructure as a service over the internet
- technologies that enhance or replace our view of the world
- A process used to identify weaknesses in systems, applications, or networks that could be exploited by attackers
Down
- Covers the cost of losses and damages related to IT and networks
- A computer capable of completing tasks humans typically require intelligence for
- A cybersecurity technology that continuously monitors and responds to suspicious activities on endpoints like computers, servers, and mobile devices
- Securing individual assets rather than relying one single network perimeter
- A set of practices and technology
- Managed by one provider but in many different locations
- Technology designed to minimise negative environmental impact
- Various ways
16 Clues: Various ways • A set of practices and technology • Managed by one provider but in many different locations • technologies that enhance or replace our view of the world • Technology designed to minimise negative environmental impact • Covers the cost of losses and damages related to IT and networks • ...
CSS 10 CROSSWORD PUZZLE 2025-07-13
Across
- The "brain" of the computer, responsible for executing instructions.
- A component often found inside a computer case or attached to a heatsink, used for cooling.
- Basic Input/Output System, firmware on a motherboard responsible for booting.
- Common wired networking technology used for local area networks (LANs).
- Abbreviation for the software that manages computer hardware and software resources.
- Software that enables an operating system to communicate with a specific hardware device.
- A collection of interconnected computers and devices that can share resources and information.
- Modern storage device that uses integrated circuit assemblies instead of spinning platters to store data.
Down
- To install newer versions of software or drivers to improve performance, add features, or fix bugs.
- A physical medium, like Cat5 or HDMI, used to transmit data or power.
- A networking device that forwards data packets between computer networks.
- Abbreviation for a traditional magnetic storage device.
- Volatile memory used by the CPU for temporary data storage.
- A connection point or interface on a computer for connecting external or internal devices.
- A type of malicious software program that replicates itself and inserts its own code into other programs.
15 Clues: Abbreviation for a traditional magnetic storage device. • Volatile memory used by the CPU for temporary data storage. • The "brain" of the computer, responsible for executing instructions. • A physical medium, like Cat5 or HDMI, used to transmit data or power. • Common wired networking technology used for local area networks (LANs). • ...
CSS 10 CROSSWORD PUZZLE 2025-07-13
Across
- Abbreviation for a traditional magnetic storage device.
- Volatile memory used by the CPU for temporary data storage.
- Basic Input/Output System, firmware on a motherboard responsible for booting.
- Common wired networking technology used for local area networks (LANs).
- The "brain" of the computer, responsible for executing instructions.
- Abbreviation for the software that manages computer hardware and software resources.
- A networking device that forwards data packets between computer networks.
- A component often found inside a computer case or attached to a heatsink, used for cooling.
Down
- Modern storage device that uses integrated circuit assemblies instead of spinning platters to store data.
- A type of malicious software program that replicates itself and inserts its own code into other programs.
- Software that enables an operating system to communicate with a specific hardware device.
- A physical medium, like Cat5 or HDMI, used to transmit data or power.
- A collection of interconnected computers and devices that can share resources and information.
- A connection point or interface on a computer for connecting external or internal devices.
- To install newer versions of software or drivers to improve performance, add features, or fix bugs.
15 Clues: Abbreviation for a traditional magnetic storage device. • Volatile memory used by the CPU for temporary data storage. • The "brain" of the computer, responsible for executing instructions. • A physical medium, like Cat5 or HDMI, used to transmit data or power. • Common wired networking technology used for local area networks (LANs). • ...
The Internet - Social Networks 2015-11-05
Across
- Site that allows you to upload, share and view videos.
- Site that allows you to search for many things (you usually look up your homework there).
- Social network, previously known as "Windows Life".
- Main entrance to a site.
- An expert in technology who usually performs technical alterations without consent.
- A webpage, generally describing things about yourself.
- Online platform that allows you to share your personal status (Related with an animal).
Down
- The meaning of the lettes "WWW".
- Spanish term of "send".
- Allows you to make free calls and videochat.
- Platform that allows you to make and answer questions.
- Pages that can be edited by the user. They usually contain a lot of information about a certain topic.
12 Clues: Spanish term of "send". • Main entrance to a site. • The meaning of the lettes "WWW". • Allows you to make free calls and videochat. • Social network, previously known as "Windows Life". • Site that allows you to upload, share and view videos. • Platform that allows you to make and answer questions. • A webpage, generally describing things about yourself. • ...
Fundamentals 2014-05-14
9 Clues: Stores IOS • Frame relay address • Enter privilege mode • disables an interface • Connects distant networks • breaks up collision domains • Link state routing protocol • encrypted Frame relay authentication • point between your network and the service provider
Modern Inventions 2024-07-21
Across
- - Simulation of human intelligence
- - Mobile device with advanced features
- - Medical imaging technology
- - Wireless networking technology
- - Device that converts sunlight into electricity
Down
- - Printing three-dimensional objects
- - Vehicle powered by electricity
- - Global system of interconnected computer networks
- - Global Positioning System
- - Wireless technology
10 Clues: - Wireless technology • - Global Positioning System • - Medical imaging technology • - Vehicle powered by electricity • - Wireless networking technology • - Simulation of human intelligence • - Printing three-dimensional objects • - Mobile device with advanced features • - Device that converts sunlight into electricity • - Global system of interconnected computer networks
module1 2024-07-28
Across
- Transmission is achieved by converting the electrical signals into light pulses.
- Each group of eight bits, such as the representations of letters and numbers
- abbreviation of a technology that uses radio waves to passively identify a tagged object, usually it is being used in an ID Card
- abbreviation of networks installed in small offices, or homes and home offices
- a network of networks
- Transmission is achieved by representing data as electrical pulses on copper wire
Down
- terms of things that could actually connect to internet using special methods
- A basic unit of information that represents one of two discrete states is known as a
- Transmission is achieved by using infrared, microwave, or radio waves through the air.
9 Clues: a network of networks • Each group of eight bits, such as the representations of letters and numbers • terms of things that could actually connect to internet using special methods • abbreviation of networks installed in small offices, or homes and home offices • Transmission is achieved by converting the electrical signals into light pulses. • ...
module1 2024-07-28
Across
- Transmission is achieved by converting the electrical signals into light pulses.
- Each group of eight bits, such as the representations of letters and numbers
- abbreviation of a technology that uses radio waves to passively identify a tagged object, usually it is being used in an ID Card
- abbreviation of networks installed in small offices, or homes and home offices
- a network of networks
- Transmission is achieved by representing data as electrical pulses on copper wire
Down
- terms of things that could actually connect to internet using special methods
- A basic unit of information that represents one of two discrete states is known as a
- Transmission is achieved by using infrared, microwave, or radio waves through the air.
9 Clues: a network of networks • Each group of eight bits, such as the representations of letters and numbers • terms of things that could actually connect to internet using special methods • abbreviation of networks installed in small offices, or homes and home offices • Transmission is achieved by converting the electrical signals into light pulses. • ...
Sa 2017-11-28
Across
- The branch of logic dealing with analysis.
- Is a program that, when installed on your computer, enables unauthorized people to access it and sometimes to send spam from it.
- Security against electronic attacks.
- Is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
- One who uses programming skills to gain illegal access to a computer network or file.
- Is the small amount of information that a website copies to the hard drive, which helps that website identify you the next time you visit.
- The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.
Down
- An expression of an intention to inflict pain, injury or evil.
- Crime committed using computer networks.
- Is a public, worldwide network of computers and computer networks. It facilitates the World Wide Web, email, instant messaging, chat rooms, and many online services such as banking.
- Relating to or resembling a digit.
- Is set to protect access to personal or professional info.
- To set upon with violent force.
- A personal identification number - commonly assigned to bank customers.
- Web page address.
15 Clues: Web page address. • To set upon with violent force. • Relating to or resembling a digit. • Security against electronic attacks. • Crime committed using computer networks. • The branch of logic dealing with analysis. • Is set to protect access to personal or professional info. • An expression of an intention to inflict pain, injury or evil. • ...
techbyte 2024-07-18
Across
- A problem-solving method used by AI to find solutions in a large search space.
- The process of cleaning, transforming, and modeling data to discover useful information
- A type of network inspired by the human brain, used in deep learning
- A framework or tool used for developing and training machine learning models
- The practice of protecting systems and networks from digital attacks
- The ability of a machine to imitate intelligent human behavior
Down
- A subset of AI that involves neural networks with many layers
- A popular programming language for data analysis and machine learning
- A statistical model used to make predictions or decisions without being explicitly programmed to perform the task
- A software tool used for data visualization and analysis in R.
- The branch of AI that deals with the simulation of intelligent behavior in computers
- An AI planning problem involving an agent navigating a cave to avoid pits and a dangerous creature
- The process of extracting useful information from large datasets
- A set of inputs and outputs used to train an AI model.
- A sequence of steps that an AI system follows to solve a problem.
15 Clues: A set of inputs and outputs used to train an AI model. • A subset of AI that involves neural networks with many layers • A software tool used for data visualization and analysis in R. • The ability of a machine to imitate intelligent human behavior • The process of extracting useful information from large datasets • ...
Crossword Puzzle: Cyber Ethics & Networking Concepts 2025-05-23
Across
- Each computer in a network.
- Wireless technology used to interconnect mobile phones, computers and printers using short-range wireless connection.
- Criminal practice of using social influence over the telephone system to gain access to sensitive information.
- Malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- Being aware of the ethical practices, and behaving responsibly and appropriately while using the internet.
- Illegal intrusion into a computer system or network.
- Device that connects two different types of networks with each other.
- Enables to connect the computer to the available internet connection over the existing telephone lines.
Down
- Purchasing a single licensed copy of the software and loading it on several computers contrary to the licenses terms.
- Certain sets or rules determining how data should be transferred, compressed, and so on.
- Computer network allowing controlled access to an information source.
- Computer network restricted to an organization.
- Unwanted bulk emails coming from unknown sources.
- Criminal activities involving computers, internet connections, networks with intent to cause harm.
- Network device used to connect all the computers in a network with each other.
15 Clues: Each computer in a network. • Computer network restricted to an organization. • Unwanted bulk emails coming from unknown sources. • Illegal intrusion into a computer system or network. • Computer network allowing controlled access to an information source. • Device that connects two different types of networks with each other. • ...
CSS 10 CROSSWORD PUZZLE 2025-07-13
Across
- Abbreviation for a traditional magnetic storage device.
- Volatile memory used by the CPU for temporary data storage.
- Basic Input/Output System, firmware on a motherboard responsible for booting.
- Common wired networking technology used for local area networks (LANs).
- The "brain" of the computer, responsible for executing instructions.
- Abbreviation for the software that manages computer hardware and software resources.
- A networking device that forwards data packets between computer networks.
- A component often found inside a computer case or attached to a heatsink, used for cooling.
Down
- Modern storage device that uses integrated circuit assemblies instead of spinning platters to store data.
- A type of malicious software program that replicates itself and inserts its own code into other programs.
- Software that enables an operating system to communicate with a specific hardware device.
- A physical medium, like Cat5 or HDMI, used to transmit data or power.
- A collection of interconnected computers and devices that can share resources and information.
- A connection point or interface on a computer for connecting external or internal devices.
- To install newer versions of software or drivers to improve performance, add features, or fix bugs.
15 Clues: Abbreviation for a traditional magnetic storage device. • Volatile memory used by the CPU for temporary data storage. • The "brain" of the computer, responsible for executing instructions. • A physical medium, like Cat5 or HDMI, used to transmit data or power. • Common wired networking technology used for local area networks (LANs). • ...
CSS 10 CROSSWORD PUZZLE 2025-07-13
Across
- A type of malicious software program that replicates itself and inserts its own code into other programs.
- To install newer versions of software or drivers to improve performance, add features, or fix bugs.
- A component often found inside a computer case or attached to a heatsink, used for cooling.
- A networking device that forwards data packets between computer networks.
- Common wired networking technology used for local area networks (LANs).
- Basic Input/Output System, firmware on a motherboard responsible for booting.
Down
- Software that enables an operating system to communicate with a specific hardware device.
- Modern storage device that uses integrated circuit assemblies instead of spinning platters to store data.
- A physical medium, like Cat5 or HDMI, used to transmit data or power.
- The "brain" of the computer, responsible for executing instructions.
- Abbreviation for a traditional magnetic storage device.
- A connection point or interface on a computer for connecting external or internal devices.
- A collection of interconnected computers and devices that can share resources and information.
- Abbreviation for the software that manages computer hardware and software resources.
- Volatile memory used by the CPU for temporary data storage.
15 Clues: Abbreviation for a traditional magnetic storage device. • Volatile memory used by the CPU for temporary data storage. • The "brain" of the computer, responsible for executing instructions. • A physical medium, like Cat5 or HDMI, used to transmit data or power. • Common wired networking technology used for local area networks (LANs). • ...
CSS 10 CROSSWORD PUZZLE 2025-07-13
Across
- Abbreviation for a traditional magnetic storage device.
- Volatile memory used by the CPU for temporary data storage.
- Basic Input/Output System, firmware on a motherboard responsible for booting.
- Common wired networking technology used for local area networks (LANs).
- The "brain" of the computer, responsible for executing instructions.
- Abbreviation for the software that manages computer hardware and software resources.
- A networking device that forwards data packets between computer networks.
- A component often found inside a computer case or attached to a heatsink, used for cooling.
Down
- Modern storage device that uses integrated circuit assemblies instead of spinning platters to store data.
- A type of malicious software program that replicates itself and inserts its own code into other programs.
- Software that enables an operating system to communicate with a specific hardware device.
- A physical medium, like Cat5 or HDMI, used to transmit data or power.
- A collection of interconnected computers and devices that can share resources and information.
- A connection point or interface on a computer for connecting external or internal devices.
- To install newer versions of software or drivers to improve performance, add features, or fix bugs.
15 Clues: Abbreviation for a traditional magnetic storage device. • Volatile memory used by the CPU for temporary data storage. • The "brain" of the computer, responsible for executing instructions. • A physical medium, like Cat5 or HDMI, used to transmit data or power. • Common wired networking technology used for local area networks (LANs). • ...
Chapter 1 Terms 2021-09-12
Across
- one company hiring another company to fulfill certain tasks in production
- the process by which political decisions and actions are becoming increasingly international (2 words no space)
- the free trade agreement between Canada, United States, and Mexico
Down
- a corporation that operates in two or more countries
- the process of expanding world trading networks (2 words no space)
- the process by which people's lifestyles spread over global networks (2 words no space)
- a person who buys goods or services for personal use
- the process by which the world's citizens are becoming increasingly connected to and dependent on one another
- the basic phusical systems of a community, including roads, utilities, water, sewage, and so on
- the different ways of delivering mass communication, such as newspapers, radio, and television
10 Clues: a corporation that operates in two or more countries • a person who buys goods or services for personal use • the process of expanding world trading networks (2 words no space) • the free trade agreement between Canada, United States, and Mexico • one company hiring another company to fulfill certain tasks in production • ...
Network Access 2023-12-23
Across
- ________ twisted-pair (UTP) is the most common type of cable for Ethernet networks, consisting of pairs of wires twisted together to reduce interference.
- Carrier Sense Multiple Access/Collision ________ (CSMA/CA) is a method used in wireless networks to avoid collisions, where devices use a randomized backoff mechanism before transmitting.
- _______ Link Control (LLC) is the upper sublayer of the Data Link layer, responsible for managing communication between network devices.
- _____________ interference (EMI) is unwanted electrical or magnetic energy that can interfere with signal transmission.
- ________ cable (coax) is a type of cable with a central conductor surrounded by a shield and insulation, used for high-speed data and video transmission.
- ________ topology is the way data flows between devices on a network, independent of the physical layout.
- ________ topology is the physical layout of devices and cables in a network (e.g., bus, star, ring).
- The rate of usable data delivered to the application layer, factoring in protocol overhead and retransmissions.
- ________ circuit is a logical connection between two devices on a network that appears as a dedicated link, even though it may share physical resources with other connections.
- ________-optic cable is a cable that transmits data using light signals through thin glass or plastic fibers, offering high bandwidth and immunity to EMI.
Down
- ________ twisted-pair (STP) is a type of cable with additional shielding to further reduce interference, often used in environments with high EMI.
- The capacity of a communication channel to transmit data, measured in bits per second (bps).
- The actual rate of data transfer over a network, often lower than bandwidth due to overhead and network conditions.
- ________ encoding is a method of encoding digital data for transmission, where a transition (high-to-low or low-to-high) is used to represent each bit.
- Unwanted coupling of signals from one wire or circuit to another.
- Carrier Sense Multiple Access/Collision ________ (CSMA/CD) is a method used in Ethernet networks to manage access to the shared medium, where devices listen for network traffic before transmitting and detect collisions.
- _______ Access Control (MAC) is the lower sublayer of the Data Link layer, responsible for controlling access to the physical medium and addressing devices on a network.
- ______ frequency interference (RFI) is a type of EMI specifically in the radio frequency spectrum.
- ______-duplex is communication in which data can flow in both directions simultaneously.
- ______ -duplex is communication in which data can flow in only one direction at a time.
20 Clues: Unwanted coupling of signals from one wire or circuit to another. • ______ -duplex is communication in which data can flow in only one direction at a time. • ______-duplex is communication in which data can flow in both directions simultaneously. • The capacity of a communication channel to transmit data, measured in bits per second (bps). • ...
TELECOMMUNICATIONS, INTERNET & WIRELESS NETWORK 2016-04-06
Across
- A communication processor that used to route packets of data through different networks
- Transforming telephone and computer networks into a single digital network
- ______ area network is designed to connect personal computers and other digital devices within a half-mile or 500-meter radius.
- the largest implementation of client/server computing
- Fiber-optic cable is suitable for transmission large quantities of data in high-speed because it uses ______ signal to transmit the data.
- stands for modulator-demodulator
Down
- Have more "intelligence" and efficiently used than Hubs.
- A ____________ is a set of rules and procedures governing transmission of information between two points in a network
- What is the measurement of the ability of an electronic communication device or system to send and receive information?
- speaker on computer is one of most common _________ devices.
10 Clues: stands for modulator-demodulator • the largest implementation of client/server computing • Have more "intelligence" and efficiently used than Hubs. • speaker on computer is one of most common _________ devices. • Transforming telephone and computer networks into a single digital network • ...
Group 5 - CHAPTER 11 Crossword puzzle 2024-06-10
Across
- It is any broadcast domain that is partitioned and isolated in a computer network at the data link layer.
- Hardware that operates in a network.
- It is a network protocol that builds a loop-free logical topology for Ethernet networks.
- It is the transfer of information between two or more points without the use of cables.
Down
- It forward packets and allow multiple devices to use the same Internet connection.
- At what layer of the OSI model do routers operate?
- It is a web-enabled hardware device that serves as either the source or destination of data transferred through a network.
- It is another word for a Wi-Fi network name.
- Which device uses MAC addresses to determine the exit port?
- It is a routing protocol for Internet Protocol (IP) networks.
10 Clues: Hardware that operates in a network. • It is another word for a Wi-Fi network name. • At what layer of the OSI model do routers operate? • Which device uses MAC addresses to determine the exit port? • It is a routing protocol for Internet Protocol (IP) networks. • It forward packets and allow multiple devices to use the same Internet connection. • ...
Puzzle 2024-06-26
OSSD 2023-12-13
9 Clues: Our Division Name • Our Business Unit • Our Department Name • Jingle Bell, Jingle Bell • Very "Automatic" platform • Very "SMoD"y OSSD platform • Very "Wrong" OSSD platform • Very "Intelligent" OSSD platform • Very "Standing Out" OSSD platform
Emily Franco 2013-03-26
Across
- Networks online communities where people socialize
- a global network on the computer
- websites text entries
- copying someone else's work
- website that can be edited by anyone
Down
- like pirates-stealing
- online Bully
- renew/reload
- system of connected computers
- legal right for copying someone's work
- software used to search internet resources
- software programs that damage files
12 Clues: online Bully • renew/reload • like pirates-stealing • websites text entries • copying someone else's work • system of connected computers • a global network on the computer • software programs that damage files • website that can be edited by anyone • legal right for copying someone's work • software used to search internet resources • ...
FITDVocab.TS 2013-05-15
Across
- a presentation creator
- A portable electronic device
- the place where you plug in your flash drive
- geo=world
- an online server that stores files and documents
- brain of your computer
- something that holds your data on your computer
- Internet service provider
- the way you behave online
- A dedicated computer set up for one or more purposes
- protection of information and networks
- promoting your product
- the computer screen or monitor
- A hardware input device
- The place on your computer where you put in CDs
- a device connected to the computer
- used to enter instructions into a computer
- electronic
- computer wiring
- online or having to do with the internet
- putting data into a computer
- service set identifier
- 3g 4g
- commonly used to connect to local networks
- Data sent out of the computer
Down
- wireless fidelity
- legally owning something
- Mountain Lion OSX
- heart of the computer
- guidelines for a document
- smartphone screen
- encoded computer instructions
- 8 of them equal a byte
- Computer apps
- restart your computer to refresh it
- a brief history of your background
- getting people to by your product
- 1000 bytes
- the place where you plug in your headphones
- extension cord
- short term memory
- a small object that stores all of your data
- DSL Cable
- long term memory
- a hands free communicating device
45 Clues: 3g 4g • geo=world • DSL Cable • 1000 bytes • electronic • Computer apps • extension cord • computer wiring • long term memory • wireless fidelity • Mountain Lion OSX • smartphone screen • short term memory • heart of the computer • a presentation creator • brain of your computer • 8 of them equal a byte • promoting your product • service set identifier • A hardware input device • legally owning something • ...
CROSSOWORD 2017-10-04
Across
- ___________is a type of mouse for physically handicapped people.
- It is set of rules that the computers connected in a network have to follow.
- This software provides all the editing features for your images, pictures etc.
- This translator compiles the program line by line.
- These buttons are used to link slides to other slides or web pages
- A temporary storage area used generally for cut/copied of text or graphics.
- The unit of speed used for supercomputer
- This device is used to connect multiple networks.
Down
- Vishal Sikka is the former CEO and MD of _________________IT company.
- This supercomputer is developed by the Indian scientists.
- This is an input device to give audio input to the computer
- These programs are written with the intention of damaging data in a computer.
- AzimPremji Software tycoon and better known as India’s “Bill Gates” • Founder and the chairman of ______________Technologies
- It is a worldwide computer network made up of multiple small networks.
- He is IT personality who invented the Compact Disc.
- The term used to refer to horizontal page orientation.
- It is a process by which a file is sent to a remote computer
- Sashi Reddi is associated with the world’s largest software testing and quality management company named ________________, he is founder and executive chairman of this company.
- The process of copying songs from your computer to CD.
- Narayan Murthy is _______________of Information Technology .
20 Clues: The unit of speed used for supercomputer • This device is used to connect multiple networks. • This translator compiles the program line by line. • He is IT personality who invented the Compact Disc. • The term used to refer to horizontal page orientation. • The process of copying songs from your computer to CD. • ...
Cicso Chapter 1 2020-09-25
Across
- Protect devices from malicious spyware
- LAN's provide ______ speed bandwidth
- Digital subscriber lines abbreviation
- One way to communicate in real-time between two people
- theft, Steal another's identity
- Wide area network
- multiple networks interconnected
- Expand quickly for new users without performance loss
- Networks come in all...
- device, Connects end devices to the network
- networks, Capable of data, voice and video in one
- port, Connector or port
- Local area network
- What a communication on a network is carried with?
- Provide services for people where usually no service is provided
- _______ is what television service providers use
- Small business owners use to connect o the Internet
- Another name for end device
- How many different clouds are there?
- date is encoded into __________ impulses
Down
- Physical connection to network abbreviation
- Someone who gets into someone else's computer
- Bring your own device
- Secure connection for people of organizations at home
- Packet switching ______ traffic into packets
- Private connections to LAN's and WAN's
- Virtual private network
- The largest network
- Wireless lan
- Usually administrated by a ____________ organization (LAN)
- Diagrams often use ___________
- Up, Only Mrs. Smith knows this... hint... telephone
- Malicious spyware, bad code
- Webpage that people can edit together
- device, Source or destination of a message over a network
- Of Service, QoS meaning
- Internet is short for what?
- Usually administrated by __________ organizations (WAN)
- WAN's provide _________ speeds than LAN's;)
- Block unauthorized access to network
40 Clues: Wireless lan • Wide area network • Local area network • The largest network • Bring your own device • Virtual private network • Networks come in all... • Of Service, QoS meaning • port, Connector or port • Malicious spyware, bad code • Internet is short for what? • Another name for end device • Diagrams often use ___________ • theft, Steal another's identity • ...
Data Communication 2021-03-20
Across
- ________ switching breaks messages into smaller units that travel to a destination along possibly different paths
- An interface that enables two dissimilar networks to communicate
- transmission of data as O and 1 bits
- A communications medium consisting of wire strands twisted in sets of two and bound into a cable
- A global "network of networks"
- A collection of procedures to establish, maintain, and terminate transmissions between devices.
- Data transmission in which each bit in a byte follows its own path simultaneously
- The computer to computer counterpart for the postal service
- Used by individuals to access news, weather, financial, travel, entertainment and shopping information
- The process of transferring a file from a remote computer to a local computer over a network.
Down
- A device that interleaves the messages of several low-speed devices and sends them along a single, high-speed path
- A local network without a host computer.
- Transmission of data as continuous-wave patterns
- used to convert signals between analog and digital enabling transmission over a phone line
- A type of transmission in which messages may travel in two directions simultaneously.
- Data transmission in which every bit in a byte must travel down the same path in succession
- An electromagnetic wave in the high frequency rage
- A network that spans a large geographic area
- A computer that manages shared devices such as printers and hard disks
- The difference between the highest and lowest frequencies that a transmission medium can accommodate
20 Clues: A global "network of networks" • transmission of data as O and 1 bits • A local network without a host computer. • A network that spans a large geographic area • Transmission of data as continuous-wave patterns • An electromagnetic wave in the high frequency rage • The computer to computer counterpart for the postal service • ...
Networking Vocabulary Crossword-Juan Appleton and Edward González 2024-05-28
Across
- -Network technology that allows to connect devices and connect LANs.
- - Used to load webpages
- -Local Area Network
- -Time elapsed from when data is sent a response is received
- - Protocol used to send and receive data
- -Label that identifies an interface
- -Allows to interconnect two or more similar to a bridge
- -Program that allows a user to test and verify if an IP address exist
- - Protocol that used to automate the process of configuration in IP networks
- - A technique that allows multiple devices on a private network
- -Local network that doesn't need to have all participants physically
Down
- -Unique identifier that a network assigns to a device in a LAN
- -Physical location where two or more networks build a connection from one place to the rest of the internet
- -Determines how many users can be connected to a network
- - A LAN that is logical created within a network with different network segments as if they were on the same physical network
- - Used for reporting errors and perform network diagnostics
- -Hardware that allow devices to connect to a network in a wireless form
- -Converts readable data into unreadable
- -Protects computer from threats
- -Node that acts an entry and exit for a computer network.
- -Enables efficient and secure communication between devices on a network
- -Wide Area Network
- -Standardized set of rules
- -Device that allow device to connect to the internet
- -Arrangement of various devices on a computer network
25 Clues: -Wide Area Network • -Local Area Network • - Used to load webpages • -Standardized set of rules • -Protects computer from threats • -Label that identifies an interface • -Converts readable data into unreadable • - Protocol used to send and receive data • -Device that allow device to connect to the internet • -Arrangement of various devices on a computer network • ...
Grade 5 2024-10-21
Across
- Websites where you can watch videos or listen to music.
- Finding out if information is false.
- A process or set of rules for solving a problem.
- The process of converting information into a code to keep it safe.
- Tricking people into giving personal information.
- Controlling the information you leave online.
- Checking if someone is really who they say they are.
- Online accounts pretending to be someone else.
- When information is stolen from a company or website.
Down
- Tools to work with others over the internet.
- Spending too much time on social media.
- Responsible use of technology and the internet.
- Managing how long you use a device.
- Rules you agree to before using a website.
- A security step that uses two methods to log in.
- A trick to get you to share personal information.
- A system to block unauthorized access to a network.
- Protecting devices and networks from attacks.
- A tool to keep your internet activity private.
- Items bought within an app.
- Passwords that are hard to guess.
- Dangers of using Wi-Fi networks that are not secure.
- Being online without sharing your identity.
- Small files saved on your computer to track websites you visit.
- A tool to stop ads from showing on websites.
25 Clues: Items bought within an app. • Passwords that are hard to guess. • Managing how long you use a device. • Finding out if information is false. • Spending too much time on social media. • Rules you agree to before using a website. • Being online without sharing your identity. • Tools to work with others over the internet. • A tool to stop ads from showing on websites. • ...
WORKPLACE TECHNOLOGY 2025-09-15
Across
- device which transfers information and images from physical documents to computer files
- software which provides instructions for basic operation of computer hardware
- network of remote servers which operate through the internet
- and systems developed by applying scientific knowledge for practical purposes
- which makes exact duplicates of documents
- software which provides platforms and instructions for specific tasks
- system of computer networks
Down
- software which has restrictions on its use and source code is kept secret
- interconnected telephone system which allows for specialized features and may involve internet connection
- software which operate and can be accessed through the World Wide Web
- which guide how computer hardware operates, what tasks are performed and how those tasks are performed
- for sending and receiving printed documents over telephone lines
- elements of a computer and all separate physical elements which support computer functionality
- networks typically used by organizations for the sharing of company news, policies, documents and other information
- machine for storing, processing and retrieving data; includes desktops, laptops, tablets and smartphones
- among computers to facilitate communication and sharing of resources
- networking technology using radio waves to transport internet signals
- device which produces physical versions of computer documents and images using paper and ink
- software which can be used without paying a license fee and can be modified to add capabilities not realized by its originators
- information system on the internet which connects billions of documents known as web pages
20 Clues: system of computer networks • which makes exact duplicates of documents • network of remote servers which operate through the internet • for sending and receiving printed documents over telephone lines • among computers to facilitate communication and sharing of resources • software which operate and can be accessed through the World Wide Web • ...
Name: _______________________ 2025-09-30
Across
- An attempt by hackers to damage or gain unauthorized access to your computer or network.
- The process of proving who you are, like using a password or fingerprint.
- A program you use to access the internet (like Chrome or Safari).
- A copy of important data stored separately to protect against data loss.
- Software that helps protect your computer from viruses by detecting and removing them.
- _________ AUTHENTICATION - A security process that requires two or more forms of identification to access data.
- (2 words) A tool that helps you create and store strong passwords securely.
- (2 words)When sensitive information is accessed without permission.
Down
- The practice of protecting computers, networks, and data from unauthorized access or attacks.
- (2 words)When someone steals your personal information to commit fraud.
- (2 words)Tricks used by hackers to manipulate people into giving away confidential information.
- : The method of converting information into a code to prevent unauthorized access.
- Malware that locks your files and demands payment to unlock them.
- : A scam where attackers send fake emails to trick you into providing personal information.
- : Someone who tries to gain unauthorized access to computers or networks.
- Malicious software designed to harm or exploit computers.
- Small data files stored on your computer by websites to remember your preferences.
- : A secret word or phrase used to access a computer or service.
- : A security system that controls incoming and outgoing network traffic.
- : Unwanted or junk email.
20 Clues: : Unwanted or junk email. • Malicious software designed to harm or exploit computers. • : A secret word or phrase used to access a computer or service. • A program you use to access the internet (like Chrome or Safari). • Malware that locks your files and demands payment to unlock them. • (2 words)When sensitive information is accessed without permission. • ...
Jesse Silva 2014-12-08
Across
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- A collaborative website which can be directly edited by anyone with access to it;
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area networkFAIR USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
- or revitalize; To reload a webpage on the internet
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
Down
- An unauthorized person who secretly gains access to computer files.
- Originally known as Web Log. Blogs are websites that contains dated text entrie
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- software used to view various kinds of Internet resources found on the Web.
- ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
12 Clues: or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • Originally known as Web Log. Blogs are websites that contains dated text entrie • ...
Unit Deux 2013-04-25
Across
- Connects computers to allow data exchange
- Electronic point of sale
- Raw facts and fields
- Abbreviated to tcp
- Networking in a world-wide area
- the cow of the sea
- Software that is intended to damage or disable computers and computer systems
- What are you on right now?
- most commonly used type of interface
Down
- Abbreviated to ip
- Abbreviated to dtp
- Abbreviated to WWW
- Forwards data packets between computer networks
- Our lord and savior
- Processed data
- Networking in a local area
16 Clues: Processed data • Abbreviated to ip • Abbreviated to dtp • Abbreviated to WWW • Abbreviated to tcp • the cow of the sea • Our lord and savior • Raw facts and fields • Electronic point of sale • Networking in a local area • What are you on right now? • Networking in a world-wide area • most commonly used type of interface • Connects computers to allow data exchange • ...
NNDL Assignment 2023-11-25
Across
- A model performs well on training data but poorly on new data.
- A technique to normalize the inputs of a layer.
- A type of neural network architecture with nested layers.
- A basic building block of a neural network.
- A technique to ignore certain timesteps in a sequence.
- One complete pass through the entire training dataset.
- A type of neural network architecture with residual connections.
- A key operation in Convolutional Neural Networks (CNNs).
- A pooling operation that selects the maximum value in each region.
- A technique to stop training when the validation loss stops improving.
- A type of learning where the model learns from unlabeled data.
- A type of neural network architecture with parallel branches.
- A layer where all nodes are connected to all nodes in the previous layer.
- A CNN Layer where dimensions of the input are reduced.
- A type of neural network architecture with self-attention.
- The simplest form of a neural network, single-layer binary classifier.
- A technique to normalize the inputs of a layer.
- Adapts a pre-trained model for a new task.
- Determines the output of a node in a neural network.
- A popular activation function introducing non-linearity.
- A layer to learn a low-dimensional representation of categorical data.
- A type of operation that preserves the spatial dimensions of the input.
- A type of neural network architecture with small convolutional filters.
- A mechanism to attend to different parts of the same input.
- Adding extra pixels to the input to preserve its dimensions.
- A technique to prevent overfitting in neural networks.
- A configuration setting parameters to the model.
- A mechanism to focus on important parts of the input.
- A technique to fine-tune a pre-trained model for a new task.
Down
- A neural network designed for sequential data.
- A training algorithm for updating weights in a neural network.
- A strategy for setting initial values in a neural network.
- An activation function similar to sigmoid, ranges from -1 to 1.
- A technique to prevent overfitting nodes in neural networks.
- A type of learning where the model learns from labeled data.
- Controls the size of steps in gradient descent.
- A layer to concatenate multiple tensors along a specific axis.
- A type of recurrent neural network with memory cell.
- A pooling operation that computes the average value in each region.
- A type of neural network architecture for unsupervised learning.
- A technique to prevent overfitting in neural networks.
- A type of connection that bypasses one or more layers.
- Number of samples processed before
- An additional parameter representing an offset in neural networks.
- A type of operation that preserves the temporal dimensions of the input.
- A mechanism to attend to multiple parts of the input.
- A layer to convert a multi-dimensional tensor into a vector.
- An architecture where information flows in one direction.
- A type of neural network architecture with local response normalization.
- An activation function used in the output layer for classification.
- An issue where gradients become very small during training.
- A technique to artificially increase the size of the training dataset.
- An optimization algorithm for finding the minimum.
- The number of pixels to slide the kernel across the input.
- A type of neural network architecture for generative modeling.
- A matrix used for convolution operation.
- A type of neural network architecture with gates.
- A type of encoding for sequential data.
- A type of Neural Network handling sequential data.
59 Clues: Number of samples processed before • A type of encoding for sequential data. • A matrix used for convolution operation. • Adapts a pre-trained model for a new task. • A basic building block of a neural network. • A neural network designed for sequential data. • A technique to normalize the inputs of a layer. • Controls the size of steps in gradient descent. • ...
Railroad Trivia 2022-03-18
Across
- known for higher speeds round bends, TILTRONIX
- railway still in operation, MIDDLETON
- eco-friendly alternative to short-distance air travel by reducing emissions
- generations marking 30 years of high-speed rail, ICE
- railway tunnel, GOTTHARD
- rail system, NETWORK
- More than one type of transportation mode for transporting goods or passengers,
- stop on the Siberian Railway, VLADIVOSTOK
- offers travelers an alternative to dealing with this frustration and delay, BOTTLENECKS
- track, signals, and stations needing upkeep, INFRASTRUCTURE
- train mode between Paris and Amsterdam, THALYS
- train station in the world, SHINJUKU
- Economic stimulus package enacted by the 111th United States Congress
- faster the train, the greater the force, CENTRIFUGAL
- York’s Central Railroad, Track 61 is above what hotel, WALDORF
- of metropolitan regions with shared economies, MEGAREGION
Down
- underground Station, PICCADILLY
- best way to travel between London from Amsterdam, Brussels or Paris, EUROSTAR
- HSR carrying more than twice as many passengers as its domestic airlines
- Tunneling connecting the French and Italian networks,
- express in the world, GLACIER
- cities often rely on this system, METRO
- beyond urban areas, they connect you to the suburbs, REGIONALS
- highest railway point above sea level, TANGGULA
- Operable in 1964
- oldest operating railroad, STRASBURG
- railway bridge crosses over this river, CHENAB
- train travels from Madrid to the southern cities of Algeciras, Granada, Cartagena and Murcia, ALTARIA
- forming the backbone of this transport network, BRITAIN
- rail operator planning to have a station in Ybor City by 2028, BRIGHTLINE
- HSR efficiencies
31 Clues: Operable in 1964 • HSR efficiencies • rail system, NETWORK • railway tunnel, GOTTHARD • express in the world, GLACIER • underground Station, PICCADILLY • oldest operating railroad, STRASBURG • train station in the world, SHINJUKU • railway still in operation, MIDDLETON • cities often rely on this system, METRO • stop on the Siberian Railway, VLADIVOSTOK • ...
network systems 2015-10-09
Across
- • A computer with the software capabilities that provides services for other computer programs and their users
- • Preforms the function of a modulator and a demodulator
- • Allows to send information
- • Joins wireless clients to wired Ethernet network
- • A device that links multiple computers telephones cameras alarms or networks on the same data connection
- • A private network that facilitates communication between departments of an organization or business
- •Enables computers to interpret data received from
- • A network created for a home or other small geographic area
- • a network that allows limited access from outside a private network associated with a company
- • Cable specifically designed for carrying an electronic signal two variations – thin net and thick net
- • A device that is either the source or the destination of a packet on a network
Down
- • The method of delivering video and voice communications over a computer network
- • A network created around an individual’s personal workspace
- A digital camera connected to a computer network that allows the users to record video
- • A printer that allows for multiple to use from remote locations of the networks
- • A device is a component used to connect used to connect computers or other electronic
- • Cable made up of super thin filaments of glass or other transparent materials that can carry beams of lights \
- network
- together so they can share files or resources
- administrator • Is responsible for configuring a network system and managing its operations
20 Clues: network • • Allows to send information • together so they can share files or resources • • Joins wireless clients to wired Ethernet network • •Enables computers to interpret data received from • • Preforms the function of a modulator and a demodulator • • A network created around an individual’s personal workspace • ...
apprentice crossword (electrical new regs 2021) 2021-04-16
Across
- a kwh meter with two dials on it(day and night)
- the word given to a product absorbing moisture such as MICC cable
- the membership body for electrical contractors
- are covered in section 534 of the IS10101 and are now required on circuits to protect against overvoltage
- the depth cable must be buried in cultivated ground
- switch required in an installation where a generator is to be installed
- appliance used by networks to step down the voltage to feed your installation
- the minimum number of rcd's on lighting circuits in a domestic installation
Down
- refers to the resistances making up the total load
- a term given to connecting an earth cable across water pipes
- an applicance used to provide an alternative source of energy to an installation
- the word used to describe the fuse nearest the fault blowing first
- arc fault detection devices are now required under section 421of IS10101
- is used to dissapated heat in electronic components like transistors
- describes a rcd and an mcb combined in one
- a test to esure connections are connected to the correct conductor
- is the term given to stray connections one of the tests we need to do when testing anelectrical installation
- paper filled up for a new connection to Networks
- size of mcb on a 2.5 square lighting circuit
- the size of mcb on a 1.5sq lighting circuit
- the new title of CIT
21 Clues: the new title of CIT • describes a rcd and an mcb combined in one • the size of mcb on a 1.5sq lighting circuit • size of mcb on a 2.5 square lighting circuit • the membership body for electrical contractors • a kwh meter with two dials on it(day and night) • paper filled up for a new connection to Networks • refers to the resistances making up the total load • ...
ISTE standards 2024-12-10
Across
- - Students engage in positive, safe, legal, and ethical online behavior.",
- - Students collaborate globally to broaden perspectives.",
- - Students identify patterns and trends in data.",
- - Students demonstrate creativity in designing solutions.",
- - Students demonstrate responsible online behavior.",
- - Students manage their digital identity and reputation.",
- - Students use feedback to improve their learning.",
- - Students use a design process to solve problems.",
- - Students understand and respect diverse cultural perspectives.",
- - Students analyze and visualize data effectively.",
- - Students use technology to achieve learning goals.",
- - Students build networks to support their learning.",
- - Students respect intellectual property and copyright laws.",
Down
- - Students use digital tools to collaborate effectively."
- - Students critically analyze information for validity and relevance.",
- - Students test and refine prototypes.",
- - Students adapt communication for different audiences.",
- - Students create original digital content.",
- - Students choose appropriate digital tools for tasks.",
- - Students articulate and set personal learning goals.",
- - Students break down complex problems into manageable parts.",
- - Students develop algorithms for problem-solving.",
- - Students exhibit tolerance for ambiguity and open-ended problems.",
- - Students use tools to clearly articulate ideas.",
- - Students evaluate the credibility of digital resources.",
- - Students construct meaningful knowledge using digital tools.",
- - Students curate digital resources using tools and strategies.",
- - Students work with others to achieve shared objectives.",
28 Clues: - Students test and refine prototypes.", • - Students create original digital content.", • - Students identify patterns and trends in data.", • - Students use tools to clearly articulate ideas.", • - Students develop algorithms for problem-solving.", • - Students use feedback to improve their learning.", • - Students use a design process to solve problems.", • ...
PTP Quiz 3 2025-03-04
Across
- Point-to-point point topologies are also used with wireless networks in what is called a ________
- The details of how data travels from computer to computer in a physical star depend on the type of __________
- By far the simplest topology
- ___ is the most common media type in LANs
- FDDI was most often used as a reliable and fast ______
- Physical ring topology stands for
- A ___ topology is an arrangement in which a central device communicates with two or more other devices
- Term used when electricity bounces off the end of a cable and back in the other direction
- The _______ uses a central device to interconnect computers in a LAN
- An electrical component called a “resistor” that absorbs the signal
- The arrangement of cabling and how cables connect one device to another in a network
Down
- The ____ transmission method sends digital signals in which each bit of data is represented by a pulse of electricity
- The _______ is the most widely used topology in networks, containing more than just a few computers
- This traveling across the medium is called
- As its name implies, a _________ topology is a direct link between two devices
- The path data travels between computers on a network
- An unterminated bus results in signal bounce and data __________
- A _________ connects each device to every other device in a network
- Multistation access units stands for
- The set of rules for each networking technology is referred to as its ___
20 Clues: By far the simplest topology • Physical ring topology stands for • Multistation access units stands for • ___ is the most common media type in LANs • This traveling across the medium is called • The path data travels between computers on a network • FDDI was most often used as a reliable and fast ______ • An unterminated bus results in signal bounce and data __________ • ...
10-1 Social Unit 1 Vocabulary 2025-02-20
Across
- taking an aspect of a culture & trying to make it your own for your benefit
- enables people to express individual & cultural identities that are different from exciting ones
- The process by which people’s lifestyles spread over international networks
- change as the result of contact with other cultural groups, but it is not forced
- a process through which unique cultures regain a sense of identity
- this society respects and values the diversity of individual & collective opinions and identities
- the incorporation of diverse minority groups into mainstream society
- traits that make up a person's sense of self
- the combination of beliefs, values, view of history & language of a group of people
Down
- The process by which government decisions and actions are becoming increasing influenced by international events
- the production by media TNCs of the majority of media content
- seeks to acquire a knowledge & understanding of another culture
- a trend towards uniformity
- The process by which the world’s citizens are becoming increasingly connected to and dependent on one another
- the absorption of a minority group by a dominant group
- complete separation between matters of state and religion
- media TNCs own many smaller media outlets wholly or in part
- groups that hold little political or economic power within a society
- The process of expanding world trading networks
- an inclusive approach that allows religious or ethnic groups to maintain their distinctive cultures in society
20 Clues: a trend towards uniformity • traits that make up a person's sense of self • The process of expanding world trading networks • the absorption of a minority group by a dominant group • complete separation between matters of state and religion • media TNCs own many smaller media outlets wholly or in part • the production by media TNCs of the majority of media content • ...
Networks and the internet 2023-01-13
Across
- - a widely agreed upon set of rules that standardize communication between machines .
- - a philosophy of making information and knowledge open and accessible to ALL .
- used to translate domain names into IP addresses
- the capacity of data transfer in a system . measured by bitrate
- - a group of 2 or more computer systems linked together
- when multiple paths exist between two points
Down
- -science that harnesses the power of many individuals to solve hard , complex problems.
- the amount of data ( in bits ) that can be sent in a fixed amount of time .
- the process of sending data between two computers on the internet . the data is sent through routers that determine the route .
- the latency of a system is the time it takes for a. it to travel from sender to receiver .
- - a protocol that defines the structure of and Internet address and assigns a unique address to every device on the internet .
- -able to send bits from router across long distances , but they are very expensive .
12 Clues: when multiple paths exist between two points • used to translate domain names into IP addresses • - a group of 2 or more computer systems linked together • the capacity of data transfer in a system . measured by bitrate • the amount of data ( in bits ) that can be sent in a fixed amount of time . • ...
Networks revision 1 - Y7 2022-04-26
Across
- ‘Things’ connected to the Internet eg smart light bulb, fridge, heating
- Software used to view information on the Internet
- Examples of this type of website are Google and Bing
- Server located on the internet that holds website web pages
- Every device on the internet has a unique IP ______.
Down
- Amount of data that can be moved from one point to another in given time
- A worldwide network of computers
- Part of the Internet that contains websites and webpages
- Rules in place in order to pass on the message successfully
- When data arrives slower that it is being processed
- Networks send/receive messages in these units
- Programming language used to wrote webpages
12 Clues: A worldwide network of computers • Programming language used to wrote webpages • Networks send/receive messages in these units • Software used to view information on the Internet • When data arrives slower that it is being processed • Examples of this type of website are Google and Bing • Every device on the internet has a unique IP ______. • ...
cyber security 2015-12-31
Across
- The process of translating plaintext into ciphertext
- software that records everything you type, then sends it off to whomever installed the software.
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- software installed on a network of computers without the owner’s knowledge
Down
- a bridge between two computer networks
- the process of attempting to acquire sensitive information used for identity theft
- to choose options in order to create a custom system
- A capability to limit network traffic between networks and/or information systems
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
10 Clues: a bridge between two computer networks • The process of translating plaintext into ciphertext • to choose options in order to create a custom system • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
cyber security crossword designed by awesome Xiaoyu 2015-12-31
Across
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- software that records everything you type, then sends it off to whomever installed the software.
- to choose options in order to create a custom system
- the process of attempting to acquire sensitive information used for identity theft
- a bridge between two computer networks
Down
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
- The process of translating plaintext into ciphertext
- A capability to limit network traffic between networks and/or information systems
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- software installed on a network of computers without the owner’s knowledge
10 Clues: a bridge between two computer networks • The process of translating plaintext into ciphertext • to choose options in order to create a custom system • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
Survival Game 2020-12-30
Across
- To browse the Internet
- Set of security policies to screen incoming and outgoing messages
- computer Industries are an example of ---------- manufacturing
- A program that accesses and displays files and other data available on the internet and other networks
- refers to equipment that is operated through the use of digital information rather than human input
Down
- Moving certain operations to another county, either by relocating affected operations to facilities in another country or by outsourcing the operations to a foreign supplier.
- Reorganising a business to reduce capacity and increase efficiency
- The term implies that disparate computers, information databases, and communications networks are integrated
- A measure of the success of an operation in converting inputs to outputs.
- to implement an appropriate level of cybersecurity across the supply chain of the defense industrial base
10 Clues: To browse the Internet • Set of security policies to screen incoming and outgoing messages • Reorganising a business to reduce capacity and increase efficiency • computer Industries are an example of ---------- manufacturing • A measure of the success of an operation in converting inputs to outputs. • ...
IDK 2025-11-10
Across
- A potential for violation of security
- A collection of host computers together that can communicate with each other
- A term to describe connecting multiple separate networks together.
- identity usurpation to get access to some personal data
Down
- any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
- A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
- Advanced Research Projects Agency Network, a pioneer packet-switched network that was built in the early 1970s under contract to the US Government, led to the development of today's Internet, and was decommissioned in June 1990.
- A network point that acts as an entrance to another network.
- something that's protecting you frome virus
- a tool that monitors network traffic as it received in a network interface.
- a service who allow you to access to some foreign content
11 Clues: A potential for violation of security • something that's protecting you frome virus • identity usurpation to get access to some personal data • a service who allow you to access to some foreign content • A network point that acts as an entrance to another network. • A term to describe connecting multiple separate networks together. • ...
PDI+ Chapter 2.1 Network Basics 2013-02-22
Across
- wiring standard which enables the direct connection of the same type of network device.
- Large core optical fibre using an LED light source.
- A set of rules enabling systems to communicate.
- aka 802.3
- The O in NOS.
- Number of wires in a Cat5 cable.
- Typical indoor range of 802.11a, in metres.
- Uses port 389
- Alternative name for RJ-45 connectors
- Unique ID for each device (network adapter) at the datalink layer expressed in hexadecimal.
- Layer 4 of the OSI model.
- Category of cable which supports both Gigabit and 10G ethernet networks.
- Wireless connection type that requires line of sight.
- Uses port 23.
Down
- A word used to described the ability of network equipment to transmit data in both directions either at once or one direction at a time.
- Protocol used for sending email.
- The effect of this on network performance is reduced by using switches instead of hubs.
- Part or unit of a larger network linked by a connectivity device.
- The main characteristic of network media, also called data rate.
- Most commonly used network topology where each device is connected to a central hub or switch.
- The first layer of the OSI model.
- Wireless security protocol which uses AES encryption.
- Layer of the OSI model with 2 distinct sublayers.
- 169.254.x.y
- Wireless network name.
- item added to a message at each layer of the OSI model.
- Common cable type for Ethernet networks.
27 Clues: aka 802.3 • 169.254.x.y • The O in NOS. • Uses port 389 • Uses port 23. • Wireless network name. • Layer 4 of the OSI model. • Protocol used for sending email. • Number of wires in a Cat5 cable. • The first layer of the OSI model. • Alternative name for RJ-45 connectors • Common cable type for Ethernet networks. • Typical indoor range of 802.11a, in metres. • ...
ComputerTerms 2014-10-23
Across
- the breaking into a computer or network without permission
- that is reguraly updated and operates like a journal with writing
- abbreviation for multi media messaging service
- email sent to a large group of people who didnt sign up to receive it.
- package- what a cellphone company charges for use of internet on the phone
- personal and sometimes unreasoned judgement
- recieving data such as music or a video file
- use- limitation and exception to the exclusive right granted by copywright law
- vast global computer network that links smaller networks together
- area where a cellphone does not receive a signal
- system group of software systems that provide instruction
- act of quoting or providing the source of information
- area-the area in which a service provider offers its communication service
- computer software that displays advertisements
- a website that allows users to add and edit interlinking web pages
Down
- common audio format for playback and storage of music
- act of sending innapropriate sexual material between cell phones
- present but not taking part
- electronic mail sent between computer networks
- property- property created from an original thought or idea
- farm- cluster of computer servers used when there is need for larger service capacity
- offering reason to be believed
- unauthorized reproduction of music or video
- source- way in which sofware is developed
- browser- software that allows for navigating the web
25 Clues: present but not taking part • offering reason to be believed • source- way in which sofware is developed • personal and sometimes unreasoned judgement • unauthorized reproduction of music or video • recieving data such as music or a video file • electronic mail sent between computer networks • abbreviation for multi media messaging service • ...
Quiz #1 2025-02-11
Across
- Manipulation of input data by a computer's CPU
- The main circuit board of a computer, housing the CPU, memory, and other essential components
- A network of networks, typically referring to the global Internet
- A basic networking device that connects multiple computers in a LAN, broadcasting data to all connected devices
- The physical or logical arrangement of a network
- Software that allows the operating system to communicate with hardware devices
- Data or signals received by a computer for processing
- A family of networking technologies commonly used in LANs
- The time it takes for data to travel from its source to its destination
Down
- Permanent software programmed into a read-only memory, providing low-level control for a device's specific hardware
- A socket on a motherboard that can hold an expansion card to add functionality to a computer system
- A collection of integrated circuits on a motherboard that manage data flow
- A networking device that forwards data packets between computer networks
- A non-volatile storage device that stores data permanently
- The information produced by a computer after processing
- A unit of data transmitted over a network, containing both control information and user data
- An individual processing unit within a CPU
- The maximum rate of data transfer across a given path
- device that processes data and performs tasks
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
20 Clues: An individual processing unit within a CPU • device that processes data and performs tasks • Manipulation of input data by a computer's CPU • The physical or logical arrangement of a network • The maximum rate of data transfer across a given path • Data or signals received by a computer for processing • The information produced by a computer after processing • ...
Asad Crossword Puzzle 2024-12-08
Across
- hat testers who are paid to probe networks and report vulnerabilities
- Server comes with an update management system called Windows Server Update Services
- is a good security enhancement for servers that aren’t physically
- memory is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- key is a series of letters, numbers, and special characters that twodevices use to authenticate each other’s identity
- firewall creates a barrier between a computer OS and the network sopotential
- and folders are deleted in Linux using the remove (rm) command
- firewall creates a barrier between networks so that potentia
- Password Requirements in a Linux Environment
- policy is a document that describes the rules governing acces
- industry-standard client/server protocol that offers centralized control
Down
- certificates involve a certification authority (CA)
- requires a user to supply two or more types of authentication drawn from these credential categoriesConfiguring Password Requirements in a Linux Environment
- used in a Windows domain environment and provides mutual
- backs up the disk sector by sector to create an exact image of the disk’s contents
- backup only backs up files that have changed since the lastfull backup
- one of the most important ways to keep your OS tuned is by installing system updates
- a framework for other protocols that provide encryption and authentication
- backs up any files that have changed since the last full or incremental backup
- most widely used method for encrypting data
20 Clues: most widely used method for encrypting data • Password Requirements in a Linux Environment • certificates involve a certification authority (CA) • used in a Windows domain environment and provides mutual • firewall creates a barrier between networks so that potentia • policy is a document that describes the rules governing acces • ...
Embedded Networking Protocols Vocabulary 2025-08-21
Across
- The data transfer capacity of a network connection.
- Disruption of signal due to overlapping frequencies or obstacles.
- A power-efficient version of Bluetooth for low-bandwidth use.
- Complexity The ease or difficulty of setting up a network.
- Signal A timing signal used to coordinate data transfer in synchronous
- The actual data transfer rate achieved in a network.
- Device The device that initiates and controls communication in a serial protocol.
- Device The device that responds to commands from the master.
- A communication system that transfers data between components.
- A wireless networking technology that provides high-speed internet access.
- Network A network that uses physical cables to connect devices.
- Protection of networks and data from unauthorized access.
Down
- The maximum distance over which a wireless signal can travel.
- Strength A measure of how strong a wireless signal is.
- A low-power RF protocol used in smart home and IoT devices.
- A wired networking technology for local area networks (LANs).
- Network A network that uses radio signals to connect devices without cables.
- Communication Data transmission one bit at a time over a communication channel.
- The time delay between data request and delivery.
- Rate The rate at which data is transmitted in a communication channel
- Consistency and stability of a network connection.
- A low-energy RF protocol primarily used for home automation.
- A short-range wireless protocol for exchanging data between devices.
23 Clues: The time delay between data request and delivery. • Consistency and stability of a network connection. • The data transfer capacity of a network connection. • The actual data transfer rate achieved in a network. • Strength A measure of how strong a wireless signal is. • Protection of networks and data from unauthorized access. • ...
Data communication and computer networking 2025-11-24
Across
- Logical segmentation of a switch network
- Protocol that automatically assigns IP addresses
- Connection-oriented transport protocol that guarantees delivery
- Maximum data transfer capacity of a network link
- Common wired LAN technology (IEEE 802.3)
- Device/software that filters network traffic
- Connectionless transport protocol used for streaming
- Device that modulates and demodulates signals for transmission over telephone lines
- Device that connects networks using different protocols
- Simple multiport repeater that broadcasts incoming signals to all ports
- Protocol that maps IP addresses to MAC addresses on a LAN
- Agreed-upon set of rules for communication
- Network topology where all nodes connect to a central switch or hub
- Smaller network created by subnetting an IP network
- Service that resolves domain names to IP addresses
Down
- Cable with central conductor used historically in networking
- Hardware address burned into network interfaces
- Internet addressing protocol with variants v4 and v6 (abbrev.)
- Unit of data that includes headers and payload for transport
- Data unit at the data link layer that encapsulates packets
- Device or program that requests services from a server
- Actual rate of successful data transfer
- Physical or logical layout of a network
- Device that forwards packets between different networks
- Network device that forwards frames based on MAC addresses
- Topology where nodes are interconnected with multiple paths
- High-speed optical medium
- Network using radio waves instead of cables
- Time delay between sending and receiving data
- Seven-layer reference model for network architecture
30 Clues: High-speed optical medium • Actual rate of successful data transfer • Physical or logical layout of a network • Logical segmentation of a switch network • Common wired LAN technology (IEEE 802.3) • Agreed-upon set of rules for communication • Network using radio waves instead of cables • Device/software that filters network traffic • ...
PNI 2020-06-26
Across
- A BIG FOCUS FOR OUR AUSTIN TEAM
- ... IT IN A BETTER PLACE
- WE HAVE FIVE OF THEM
- OUR #
- ONE OF OUR MANY CLUBS
- A CLUB THAT PROMOTES EQUALITY
- OUR SMALL TEAM DOWN SOUTH
- CONTINUOS IS THE ONLY WAY
Down
- COMBINED WITH DEVELOPMENT AND YOU GET DEVOPS
- HOW MUCH TIME DO YOU SPEND WAITING
- THE TEAM THAT BUILDS OUR RUNWAY
- OUR PARENTS
- A 4TH FLOOR TEAM
- FUELLED BY ... AND FUN
- THE N OF PNI
- PIZZA IS SO POPULAR
16 Clues: OUR # • OUR PARENTS • THE N OF PNI • A 4TH FLOOR TEAM • PIZZA IS SO POPULAR • WE HAVE FIVE OF THEM • ONE OF OUR MANY CLUBS • FUELLED BY ... AND FUN • ... IT IN A BETTER PLACE • OUR SMALL TEAM DOWN SOUTH • CONTINUOS IS THE ONLY WAY • A CLUB THAT PROMOTES EQUALITY • A BIG FOCUS FOR OUR AUSTIN TEAM • THE TEAM THAT BUILDS OUR RUNWAY • HOW MUCH TIME DO YOU SPEND WAITING • ...
Online Scams 2025-07-10
Across
- Freedom from public attention
- Demanding money with a threat
- State of being free from danger or threat
- Unwanted, aggressive behavior
- Communication or direct involvement with someone or something
- Without a name or identity
- Relationships or networks
Down
- Group with shared interests
- Incorrect or misleading information
- A society's way of life
- Sensational headline designed to lure clicks
- Act of stealing
- Fraudulent scheme
- Malicious computer program
- State of being easy to use
- Gossip or unverified reports
16 Clues: Act of stealing • Fraudulent scheme • A society's way of life • Relationships or networks • Malicious computer program • State of being easy to use • Without a name or identity • Group with shared interests • Gossip or unverified reports • Freedom from public attention • Demanding money with a threat • Unwanted, aggressive behavior • Incorrect or misleading information • ...
CONNESSI & SICURI 2021-04-12
Across
- they are faces with various expressions
- internet Activities of those who, illegally obtaining access to information networks and computer data archives, copy programs or confidential data
- is a device widely used to send messages, watch funny videos, turn on social media etc .....
- It is used to harm teenagers for various social networks through insults
Down
- it's like a letter but it comes right away
- Network of computer connections on a planetary level that allows connection and communication
- very experienced operator in particular sectors of the subject
- Internet site through which a group of users can exchange messages or share texts, images, videos, etc
8 Clues: they are faces with various expressions • it's like a letter but it comes right away • very experienced operator in particular sectors of the subject • It is used to harm teenagers for various social networks through insults • is a device widely used to send messages, watch funny videos, turn on social media etc ..... • ...
Crossword on OSI Network Layer and Routing 2025-02-18
Across
- A device that connects multiple networks and directs data packets based on their IP addresses.
- The protocol responsible for logical addressing and routing at the network layer.
- A protocol used to report network errors and diagnostics, often used in ping.
Down
- The third layer of the OSI model, responsible for packet forwarding.
- A network protocol used for dynamic routing, which determines the shortest path.
- The process of determining the best path for data to travel between networks.
- A protocol that maps IP addresses to MAC addresses within a local network.
- A unique address assigned to a device's network interface for local communication.
8 Clues: The third layer of the OSI model, responsible for packet forwarding. • A protocol that maps IP addresses to MAC addresses within a local network. • The process of determining the best path for data to travel between networks. • A protocol used to report network errors and diagnostics, often used in ping. • ...
ML crossword#6 2020-03-28
Across
- dedicated silicon that is designed for processing computer vision media including images and video
- a regularization technique for Neural Networks that prevents overfitting
- a deep learning framework developed by Berkeley AI Research
- Python library that allows you to define, optimize, and evaluate mathematical expressions
Down
- an unsupervised learning algorithm for obtaining vector representations (embeddings) for words
- invented to prevent the vanishing gradient problem in Recurrent Neural Networks by using a memory gating mechanism
- a software library that specializes in real-time computer vision algorithms
- a gradient descent based learning algorithm that adapts the learning rate per parameter over time
- an algorithm and tool to learn word embeddings by trying to predict the context of words in a document
- used to convert a vector of raw scores into class probabilities at the output layer of a Neural Network used for classification
- perhaps most commonly used Image Recognition dataset
11 Clues: perhaps most commonly used Image Recognition dataset • a deep learning framework developed by Berkeley AI Research • a regularization technique for Neural Networks that prevents overfitting • a software library that specializes in real-time computer vision algorithms • Python library that allows you to define, optimize, and evaluate mathematical expressions • ...
Security and Ethical IT Challenges in Healthcare 2013-12-09
Across
- Doctors can consult with patients via this method.
- Software that is specifically intended to protect a particular machine or network from the intrusion of software-based viruses.
- Process of bringing together smaller subsystems into one system and ensuring that the subsystems function together as a system
- The goal of HIPAA
- Electronically stored information about individuals
- A digital version of a patient's paper chart.
Down
- Federal law that governs the use and disclosure of health information.
- is hardware, software, telecommunications, database management and other information processing technologies used in computer based information systems.
- Granted access to data warehouses full of patient-care and insurance records.
- Provides clinicians, staff and patients with the filtered knowledge and person-specific information.
- Computers , communications processors and software that protect computer networks from intrusions by screening all network traffic and serving as a safe transfer point for access to and from other networks.
11 Clues: The goal of HIPAA • A digital version of a patient's paper chart. • Doctors can consult with patients via this method. • Electronically stored information about individuals • Federal law that governs the use and disclosure of health information. • Granted access to data warehouses full of patient-care and insurance records. • ...
TJ-IT-Crossword 2020-11-12
Across
- Graphics Processing Unit
- hardware component that stores digital data
- collection of web pages
- Central Processing Unit
- RAM
- Operating....
- typewriter-style device
- is a unit of digital information
Down
- IT
- a secret word for loging into an account
- a networking device that forwards data packets between computer networks
- smallest controllable element represented on the screen
- software application for accessing information on the world wide web
- 1000 megabytes
- a specific collection of information provided by a website
- Popular Operating System
16 Clues: IT • RAM • Operating.... • 1000 megabytes • collection of web pages • Central Processing Unit • typewriter-style device • Graphics Processing Unit • Popular Operating System • is a unit of digital information • a secret word for loging into an account • hardware component that stores digital data • smallest controllable element represented on the screen • ...
Cyber Crimes 2024-06-13
Across
- Bullying in the workplace
- Blackmail with sensitive content
- Recording about attacks to humiliate
- publication of sexual videos of adults
- Sending photos or videos of erotic content
- Harassment in networks with rumors
- Publication of personal data
- Adult who wants to attack a minor
Down
- Sensitive photo exhibition
- About exposure that generates bullying
- Hidden recording of sensitive situations
- Harmful programs
- code words for requesting photos of minors
- others you
- Harassment between minors with different methods
- Cloud mining program
16 Clues: others you • Harmful programs • Cloud mining program • Bullying in the workplace • Sensitive photo exhibition • Publication of personal data • Blackmail with sensitive content • Adult who wants to attack a minor • Harassment in networks with rumors • Recording about attacks to humiliate • About exposure that generates bullying • publication of sexual videos of adults • ...
Mental Health Crossword Puzzle 2022-05-11
Across
- Main Chemical of pleasure
- Alarm system
- Memories that are subconsciously blocked by the brain
- re-enter reality
- Stressors that put strain on body
- Spiritual Exercise
- Largest part of the brain
Down
- Progressive disease that reduces memory function
- Main stress hormone
- Good stress
- Refusal to believe in reality
- Deals and promises
- Neural networks in the brain to change through growth and reorganization
- Bring Harmony between mind and body
- Short term stress
- Understand what another person is going through
16 Clues: Good stress • Alarm system • re-enter reality • Short term stress • Deals and promises • Spiritual Exercise • Main stress hormone • Main Chemical of pleasure • Largest part of the brain • Refusal to believe in reality • Stressors that put strain on body • Bring Harmony between mind and body • Understand what another person is going through • ...
Computer Fundamental 2025-06-19
Across
- A reusable block of code
- Programs that run on a computer
- An error in a program
- A whole number
- Organized collection of data
- Physical components of a computer
Down
- Global network of networks
- Central Processing Unit, the brain of the computer
- Text
- How a user interacts with a computer
- Instructions written in a programming language
- A storage location for data
- Base-2 number system
- Where data is stored
- A collection of elements
- Information Processed by a computer
16 Clues: Text • A whole number • Base-2 number system • Where data is stored • An error in a program • A reusable block of code • A collection of elements • Global network of networks • A storage location for data • Organized collection of data • Programs that run on a computer • Physical components of a computer • Information Processed by a computer • How a user interacts with a computer • ...
teka teki silang 2024-10-22
CN 2024-10-15
Across
- A protocol that provides automatic IP address configuration
- The unique identifier for a device on a network
- A device that connects multiple networks and forwards packets
Down
- A protocol used for sending error messages and operational information
- A protocol that divides messages into smaller packets for transmission
- The process of directing data between different networks
6 Clues: The unique identifier for a device on a network • The process of directing data between different networks • A protocol that provides automatic IP address configuration • A device that connects multiple networks and forwards packets • A protocol used for sending error messages and operational information • ...
CHAPTER 18 TERMS 2020-09-10
Across
- detects unwanted attempts to manipulate network systems and/or environments
- most popular form of TCP scanning
- a device that test the speed of data transfer in the network.
- is a computer security device that monitors network and/or system activities for any strange or malicious behavior
- used for sniffing wireless networks
- scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
- a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
Down
- a powerful enterprise (large corporate environment) network intrusion and prevention system.
- looks inside every packet on a network segment.
- the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
- displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
- a software tool designed to search a host for open ports.
12 Clues: most popular form of TCP scanning • used for sniffing wireless networks • looks inside every packet on a network segment. • a software tool designed to search a host for open ports. • a device that test the speed of data transfer in the network. • detects unwanted attempts to manipulate network systems and/or environments • ...
Code Word 2021-12-02
Across
- The process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company
- Measures designed to protect your computer, device or network from cybercrime.
- It refers to unsolicited email messages sent for marketing purposes
- Any type of illegal activity that is undertaken (or relies heavily) on a computer.
- A software program that allows you to surf the web.
Down
- Reduction of the size of a file.
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- It is responsible for performing calculations and tasks that make programs work.
- A set of computers on a network that are managed as a unit.
- Wireless communications technology intended to replace cables
- A piece of code or data created by a web server and stored on a user's computer.
12 Clues: Reduction of the size of a file. • A software program that allows you to surf the web. • A set of computers on a network that are managed as a unit. • Wireless communications technology intended to replace cables • It refers to unsolicited email messages sent for marketing purposes • Measures designed to protect your computer, device or network from cybercrime. • ...
