networks Crossword Puzzles
teka teki silang 2024-10-22
Internet Business Associate Lesson 3 Part 1 2019-07-26
Across
- The acronym for an independent agency of the U.S. government that promotes the advancement of science and engineering.
- The acronym for the international organization responsible for allocation of IP addresses. Part of the Internet Corporation for Assigned Names and Numbers (ICANN).
- The acronym for an integrated services digital network communication standard for sending voice, video or data over digital telephone lines.
- A ______ subscriber line is a high-speed direct Internet connection that uses all-digital networks.
- The data transmission standard for the Internet. Every computer connected to the Internet has its own IP address, which enables a packet of data to be delivered to a specific computer.
- The acronym for the protocol that resides on an incoming mail server. Similar to POP, but is more powerful. Allows sharing of mailboxes and multiple mail server access. The current version is IMAP4.
- An IP address represented in words.
- An organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.
- A group of computers connected within a confined geographic area.
- A base-16 number system that allows large numbers to be displayed by fewer characters than if the number were displayed in the regular base-10 system. In hexadecimal, the number 10 is represented as the letter A, 15 is represented as F, and 16 is represented as 10.
- The acronym for the computer agency network, funded by ARPA, that served as the basis for early networking research and was the backbone during the development of the Internet.
- A computer that other computers can use to gain information. In network architecture, a host is a client or workstation.
- link Highlighted or underlined text in a Webpage that, when clicked, links the user to another location or Webpage.
Down
- An Internet protocol used to transfer files between computers; allows file transfer without corruption or alteration.
- The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.
- An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.
- The protocol for transporting HTML documents across the Internet.
- A server that resolves domain names into IP addresses.
- A U.S. Department of Defense projects agency that created the first global computer network.
- mobile hotspot A device that connects a wireless local area network to a wireless phone network at broadband speeds.
- A worldwide network of interconnected networks.
- A system that maps uniquely hierarchical names to specific Internet addresses.
- Abbreviation for modulator/demodulator. An analog device that enables computers to communicate over telephone lines by translating digital data into audio/ analog signals (on the sending computer) and then back into digital form (on the receiving computer).
- The highest level in the computer network hierarchy, to which smaller networks typically connect.
- A node on a network that serves as a portal to other networks.
25 Clues: An IP address represented in words. • A worldwide network of interconnected networks. • A server that resolves domain names into IP addresses. • A node on a network that serves as a portal to other networks. • The protocol for transporting HTML documents across the Internet. • A group of computers connected within a confined geographic area. • ...
3강 4번 2024-12-12
Across
- - What gardening activity, also used metaphorically for neural maintenance, involves removing unnecessary parts for healthy growth?
- - Who tends to plants in a garden, or metaphorically maintains the brain’s neural health?
- - What is the spiritual or immaterial part of a person, often linked to emotions or character?
- - What term describes interconnected systems, like the pathways in the brain?
- - What are the basic building blocks of all living organisms, including those forming neural networks?
Down
- - What process removes unwanted elements, in a garden or a neural network?
- - What are the tree-like extensions of neurons that receive signals from other neurons?
- - What figure of speech compares two things without using "like" or "as"?
- - What term describes fostering growth or improving something with care and effort?
- - What word refers to a person’s individual identity or essence?
- - What are the rules or principles, such as the mathematical ones governing growth in neurons and plants?
11 Clues: - What word refers to a person’s individual identity or essence? • - What figure of speech compares two things without using "like" or "as"? • - What process removes unwanted elements, in a garden or a neural network? • - What term describes interconnected systems, like the pathways in the brain? • ...
NNDL assignment 2023-11-24
Across
- A type of learning where the model learns from labeled data
- Layer functioning as FCNN in VGG16
- Technique of creating new training examples by applying transformations
- Strategy for setting initial values in a neural network
- Table used to assess the performance of a classification model
- A hyperparameter tuning process
- No. of trainable parameters in GRU
- Neural network designed for sequential data
- Google's pretrained ML model
- Backpropagation algorithm for updating weights in an RNN
- Another name for True Negative Rate in Confusion matrix
- One complete pass through the entire training dataset
- Activation function used in the output layer for classification
- A pooling operation that computes the average value in each region
- Evaluation of a model on a separate dataset to tune hyperparameters
- Activation function similar to sigmoid, ranges from -1 to 1
- An algorithm used to update the weights in a neural network
- Model performs well on training data but poorly on new data
- Controls the size of steps in gradient descent
- Training algorithm for updating weights in a neural network
- Error Square algorithm for updating weights in neural networks
- A pooling operation that selects the maximum value in each region
- A pretrained Model with 13 CNN and 3 Dense Layers
- Issue where gradients become very small during training
- A layer to convert a multi-dimensional tensor into a 1D vector
- A classification problem where each sample can belong to one of two classes
- Technique to prevent overfitting nodes in neural networks
- Architecture where information flows in one direction
- A technique to stop training when the validation loss stops improving
- Optimization algorithm that accumulates past gradients to accelerate learning
- Basic building block of a neural network
- Adaptive Linear Neuron, a single-layer neural network
- Determines the output of a node in a neural network
- Key operation in Convolutional Neural Networks (CNNs)
- A technique to fine-tune a pre-trained model for a new task
- Technique to prevent exploding gradients in RNN
Down
- Optimization algorithm for finding the minimum
- A type of Neural Network handling sequential data
- Optimization algorithm using one example at a time
- Process of selecting and representing relevant information from input data
- Standard version of a neural network or algorithm
- Categorical Loss function in CNN
- Adapts a pre-trained model for a new task
- Also known as recall or TPR
- a CNN Layer where dimensions of the input are reduced
- Configuration setting parameters to the model
- No. of trainable parameters in LSTM
- A set of data samples used in one iteration of training
- Popular activation function introducing non-linearity
- A type of learning where the model learns from unlabeled data
- Simplest form of a neural network, single-layer binary classifier
- Additional parameter representing an offset in neural networks
- An unsupervised Learning rule
- A loss function used in regression problems in CNN
- Non-linear transformation applied to a neuron's output
- Linearly inseparable logic gate
- Model with high bias and low variance
- a type of recurrent neural network cell with memory like operation
- Adding extra pixels or values around the edges of an image in CNN
- Another name for Kernel to reduce dimensions in CNNs
- The number of pixels to slide the kernel across the input
- A type of recurrent neural network with memory cell
62 Clues: Also known as recall or TPR • Google's pretrained ML model • An unsupervised Learning rule • A hyperparameter tuning process • Linearly inseparable logic gate • Categorical Loss function in CNN • Layer functioning as FCNN in VGG16 • No. of trainable parameters in GRU • No. of trainable parameters in LSTM • Model with high bias and low variance • ...
Internet 2025-03-26
Across
- The process of transferring data from a local device to the Internet.
- A person who posts provocative or offensive content online.
- A basic networking device that connects multiple computers or devices in a network and transmits data to all connected devices, without filtering or directing traffic.
- A storage location for frequently used internet data.
- The process of transferring data from the Internet to a local device.
- A network of remote servers used to store data online.
- Software designed to harm or exploit computers.
- The practice of protecting computers and networks from attacks.
- A software application used to access the internet.
- A type of online scam used to steal personal information.
- A software add-on that extends the functionality of a program or browser.
- A global network that connects millions of private, public, academic, business, and government networks.
- A collaborative website that allows users to edit and share content.
- Small digital icons used to express emotions in messages.
- The delay between a user's action and the response from a network or server.
- A facility that houses computer systems and related components, such as servers and storage, used to process, store, and distribute data.
- A collection of web pages under a single domain name.
- A small file stored on a computer that tracks online activity.
- A clickable link that directs users to another web page.
Down
- A set of rules and conventions that determine how data is transmitted and received over a network, ensuring that devices can communicate effectively and understand each other.
- A word or phrase preceded by "#" used to categorize content on social media.
- A security system that protects a network from unauthorized access.
- The main or introductory page of a website.
- A digital audio file available for streaming or download.
- Sensationalist headlines designed to attract clicks.
- A networking device that forwards data packets between computer networks, directing traffic and enabling communication between different networks, such as connecting a home network to the internet.
- A networking device that connects multiple devices within a local area network (LAN) and directs data to its intended destination based on MAC addresses.
- A process of looking for information online.
- A humorous image, video, or text spread online.
- The process of converting data into a secure format.
- A service that provides space to store websites online.
- The amount of data that can be transmitted over an internet connection.
- A test to prove a user is human.
- Unwanted or unsolicited email messages.
- A device or point in a network that can send, receive, or forward data. Examples of nodes include computers, printers, routers, and servers.
- The rate at which data is transferred or processed, typically measured in bits per second (bps) or megabits per second (Mbps), reflecting how fast information can travel across a network or be processed by a device.
- An automated program that performs repetitive tasks on the Internet.
- An online discussion board.
- A hidden part of the internet used for anonymous activities.
- A computer or system that provides resources and services to other devices on a network.
40 Clues: An online discussion board. • A test to prove a user is human. • Unwanted or unsolicited email messages. • The main or introductory page of a website. • A process of looking for information online. • Software designed to harm or exploit computers. • A humorous image, video, or text spread online. • A software application used to access the internet. • ...
Glossary Crossword 2025-05-13
Across
- A company that provides networking and cybersecurity solutions, including routers, switches, firewalls, and cloud services, designed to help businesses build secure, high-performance networks.
- Protective tube or duct used to house and route communication cables such as fiber optics or copper wires to prevent damage and ensure efficient data transmission.
- A device that allows computers, smartphones, tablets, and other devices to connect to the internet. It does this by converting digital signals from these devices into analog signals that can be transmitted over telephone lines or cable networks.
- Software that is permanently stored on a device, typically responsible for its basic operations, such as on a router or modem.
- A list or line of tasks, requests, or calls waiting to be processed, often used in customer service or technical support.
- A type of signal or technology that transmits data in continuous waves typically used for older phone systems and TV signals.
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and provides rules that allow network-connected devices to talk to one another without talking over each other.
- The delay in network communication. It shows the time that data takes to transfer across the network. Networks with a longer delay or lag have high latency, while those with fast response times have low latency.
- A short-range beam of light that carries a command and requires a clear line of sight to the device, commonly used in remote controls.
- Networking hardware or software that helps different networks or systems talk to each other and share information.
- Cloud-based network management platform that service providers use to monitor, configure, and optimize GigaSpire devices remotely. It allows for real-time diagnostics, troubleshooting, and performance improvements.
Down
- Malicious software (malware) that encrypts a victim's data or locks their system, demanding payment (a ransom) to restore access.
- The amount of time a system, service, or device is operational and available, usually measured as a percentage of time over a certain period.
- A service that connects all emergency responders the instant a call is received.
- A longer, more secure version of a password, typically made up of multiple words or a sentence. Passphrases are often used for added security in systems like encryption and authentication.
- Point at which the public switched telephone network ends and connects with the customer's personal network or the private network of an organization or business.
- The physical cable that connects the main broadband network to an individual building.
- Occurs when a customer’s long distance service is switched from one long distance company to another without the customer’s permission.
- A high speed internet connection that's always on allowing for faster data transmission than dial-up connections.
- A tool that shows the path that data takes to travel from your computer to a website.
- A system of interconnected devices or systems that communicate with each other, such as the internet, local area network (LAN), or a company’s internal network.
- A company that makes networking equipment like routers, modems, and switches. Their products are often used for home and small business internet setups, especially for Wi-Fi and broadband connections.
- A state in which a device or system is not connected to the internet or a network, meaning it is not able to send or receive data.
23 Clues: A service that connects all emergency responders the instant a call is received. • A tool that shows the path that data takes to travel from your computer to a website. • The physical cable that connects the main broadband network to an individual building. • ...
Unit 1 History 2022-09-01
10 Clues: wanderer • to agree with • a way of living • Online networks • The study of the past • Ancient relics of the past • a vast departure of a group • Commandments from the bible • Fossils consisting of human genes • A network of people in the same area
CyberAIQON 2024-09-05
Across
- Method of gaining access to accounts by systematically trying all possible password combinations.
- Update to software that fixes vulnerabilities or bugs to improve security and performance.
- Security process requiring two different forms of identification for access. (sigla)
- Vulnerability in software that is exploited before the developer has a chance to fix it.
- Provides secure, encrypted connections over less secure networks.
- Software designed to detect and remove malware from computers.
- Software that secretly monitors and collects information about users without their knowledge.
- System that monitors network traffic for suspicious activities or policy violations.
- General term for any software designed to harm, exploit, or otherwise compromise devices and networks.
- Software or hardware that records every keystroke made on a computer.
Down
- Attack that overloads a system, making it unavailable to legitimate users.
- The process of converting data into a coded form to prevent unauthorized access.
- Hidden way to bypass normal authentication to gain unauthorized access to a system.
- Type of malware that encrypts data and demands a ransom for its release.
- Software or hardware that monitors and controls incoming and outgoing network traffic.
- Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Network of infected computers that can be remotely controlled by a cybercriminal.
- Malware disguised as legitimate software but allows unauthorized access to a user’s system.
18 Clues: Software designed to detect and remove malware from computers. • Provides secure, encrypted connections over less secure networks. • Software or hardware that records every keystroke made on a computer. • Type of malware that encrypts data and demands a ransom for its release. • Attack that overloads a system, making it unavailable to legitimate users. • ...
11.5 Testout Crossword 2023-03-28
Across
- uses radio waves to transmit data from small circuit boards
- the standard mechanism to dynamically assign IP addresses within a network
- a triple-A protocol
- an encrypted security protocol that protects internet traffic on wireless networks.
- electromagnetic radiation with wavelengths longer than those of visible light and shorter than radio waves
- developed at MIT and is a key component of Windows Active Directory
- a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.
- a file-level storage architecture that makes stored data more accessible to networked devices
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
- Internet Protocol Address
- is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs
- a symmetric block cipher chosen by the U.S. government to protect classified information.
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
- a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups
- a new WFA security standard for personal and enterprise networks
- network that uses wireless data connections between network nodes.
- Characters that give wifi a unique name
- allows the antennae to divide streams between multiple devices.
18 Clues: a triple-A protocol • Internet Protocol Address • Characters that give wifi a unique name • uses radio waves to transmit data from small circuit boards • allows the antennae to divide streams between multiple devices. • a new WFA security standard for personal and enterprise networks • network that uses wireless data connections between network nodes. • ...
IST 2013-02-06
Across
- collection of academic, government, business and individual networks linked around the world via many communication channels
- electronic mail
- agreed set of rules for exchange of messages
- subdivision of a message which is separately transmitted and reassembled at the destination
Down
- private network of information, usually accessible by staff of an organisation to display appropriate information
- Computer software application that interprets the scripting language HTML
- hardware or software used to block unauthorised access, usually from the internet into private networks
- small text file that stores temporary information about the user and is accessed by a website to uniquely identify that user
8 Clues: electronic mail • agreed set of rules for exchange of messages • Computer software application that interprets the scripting language HTML • subdivision of a message which is separately transmitted and reassembled at the destination • hardware or software used to block unauthorised access, usually from the internet into private networks • ...
CyberSecurity 1 2025-02-05
Across
- A type of attack where a hacker overloads a server with traffic to make it crash.
- A type of malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- A method of encoding data to protect its confidentiality.
- A security method that requires two forms of identification, such as a password and a fingerprint.
- A commonly used firewall bypass technique that hides the source IP address.
Down
- The practice of defending systems and networks from digital attacks.
- A system that detects and prevents unauthorized access to computer networks.
- The act of impersonating a legitimate entity to steal sensitive information.
8 Clues: A method of encoding data to protect its confidentiality. • The practice of defending systems and networks from digital attacks. • A commonly used firewall bypass technique that hides the source IP address. • A system that detects and prevents unauthorized access to computer networks. • ...
Ethical and Social Issues in ICT 2024-06-16
Across
- A form of bullying that occurs through digital devices
- The set of moral principles for using the computer and internet
- A trial of data you create while using the Internet
- A type of intellectual property law that grants creators of original works exclusive rights
- The set of technologies that facilitate the sharing of ideas, thoughts, and information through virtual networks and communities
- Refers to the responsible use of technology by anyone who uses digital tools
Down
- An illegal and criminal activity done by using computer and internet technology
- The social issue referring to the differing amount of information between those who have access to the Internet and those who do not
- The laws that prevent cybercrime, legalize electronic transactions, and punish cyber criminals
- The responsible use of technology by anyone who uses computers, the internet, and digital devices
- A type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work
- Unauthorized access to computer systems or networks to manipulate or exploit them
12 Clues: A trial of data you create while using the Internet • A form of bullying that occurs through digital devices • The set of moral principles for using the computer and internet • Refers to the responsible use of technology by anyone who uses digital tools • An illegal and criminal activity done by using computer and internet technology • ...
Computer Hardware Words 2022-10-03
Across
- a device, such as a wireless router, that allows wireless devices to connect to a network.
- central node is connected to each of the other nodes on a network. Similar to a hub connected to the spokes in a wheel.
- a barrier between a trusted system or network and outside connections, such as the Internet.
- a hardware component that allows a computer or another device, such as a router or switch, to connect to the Internet.
- used to network multiple computers together.
- a hardware device that directs traffic between networks and devices.
Down
- a computer system that hosts websites.
- a component that provides networking capabilities for a computer.
- Many wide area networks span long distances via telephone lines, fiber optic cables, or satellite links
- a network of connected devices that exist within a specific location.
- a series of Wi-Fi routers that work together to create a single wireless network.
- multiple devices that communicate with one another.
12 Clues: a computer system that hosts websites. • used to network multiple computers together. • multiple devices that communicate with one another. • a component that provides networking capabilities for a computer. • a hardware device that directs traffic between networks and devices. • a network of connected devices that exist within a specific location. • ...
Thinking in Circuits 2025-06-03
Across
- Unsupervised grouping of similar data.
- Foundation of modern language models.
- AI generates false information.
- Classic measure of machine intelligence.
- Generative method for image synthesis.
- Vector representation of meaning.
- Neural network training algorithm.
- Hypothetical runaway AI intelligence.
Down
- Moral considerations in AI deployment.
- Learning via trial and reward.
- Directing generative model behavior.
- Hidden variables in a model.
- Model captures noise, not signal.
- Making model decisions understandable.
- Learned parameters in neural networks.
15 Clues: Hidden variables in a model. • Learning via trial and reward. • AI generates false information. • Model captures noise, not signal. • Vector representation of meaning. • Neural network training algorithm. • Directing generative model behavior. • Foundation of modern language models. • Hypothetical runaway AI intelligence. • Moral considerations in AI deployment. • ...
Deep Deterministic Uncertainty: A Simple Baseline 2022-11-17
Across
- the n-dimensions where your variables live
- short form of out of distribution
- short form of in distribution
- the uncertainty of the model due to a lack of training data.
- a normalization technique used for generative adversarial networks, used to stabilize training of the discriminator
- a statistical model where you use probability to represent all uncertainty within the model, both the uncertainty regarding the output but also the uncertainty regarding the input
Down
- function f such that |f(x)-f(y)|<=C|x-y| for all x and y, where C is a constant independent of x and y. Its inverse also is this function.
- ensemble of neural networks which average the models probability outputs
- Modified National Institute of Standards and Technology database
- the data's inherent randomness that cannot be explained away
- a mathematical function that converts a vector of numbers into a vector of probabilities
- short form of Deep Deterministic Uncertainty
12 Clues: short form of in distribution • short form of out of distribution • the n-dimensions where your variables live • short form of Deep Deterministic Uncertainty • the uncertainty of the model due to a lack of training data. • the data's inherent randomness that cannot be explained away • Modified National Institute of Standards and Technology database • ...
Security Bytes - March 2024 2024-02-28
Across
- A person who uses computers to gain unauthorised access to data.
- A network device that forwards data packets between computer networks
- Security techniques that use biological data for authentication.
- An encryption-based Internet security protocol
- A number of internet connected devices each of which is running one or more bots
Down
- a piece of software designed to update a computer program or its supporting data to fix or improve it.
- No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
- Software designed to detect and destroy computer viruses
- A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
- Highlighted policy in march security bytes newsletter
- A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
- The practice of protecting systems, networks and programs from digital attacks
12 Clues: An encryption-based Internet security protocol • Highlighted policy in march security bytes newsletter • Software designed to detect and destroy computer viruses • A person who uses computers to gain unauthorised access to data. • Security techniques that use biological data for authentication. • ...
Unit 3 2022-02-04
Andres Reyes 2014-09-09
Across
- -Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work
- - a system of connected computers that allows the sharing of files and equipment there are tow types of networks local area network and wide area network
- a part of computer system or network that is designed to block unauthorized access while permitting outward communication
- -the unauthorized use, reproduction distribution ,or transmission
Down
- -a reference to published unpublished source.
- -Originally knows as Web log. Blogs are websites that contains dated text entries, generally listed in reserves chronological order about a particular topic
- - a bully who operates online in cyberspace to bully online
- - a restricted computer network; a private network created using World Wide Web software.
- -software used to view various kinds of internet resources found on the web
- - an unauthorized person who secretly gains access to computer file.
- -to renew or revitalize to reload a webpage on the internet
- networks - online communities where people meet socialize, exchange digital files
12 Clues: -a reference to published unpublished source. • - a bully who operates online in cyberspace to bully online • -to renew or revitalize to reload a webpage on the internet • -the unauthorized use, reproduction distribution ,or transmission • - an unauthorized person who secretly gains access to computer file. • ...
computer hardware 2022-10-03
Across
- a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes.
- a hardware component that allows a computer or another device, such as a router or switch, to connect to the Internet
- used to network multiple computers together.
- network a type of network which more than one computer is connected to a switch or router in the middle
- acts as a barrier between a trusted system or network and outside connections, such as the Internet
Down
- a hardware device that directs traffic between networks and devices.
- multiple devices that communicate with one another.
- similar to a Local Area Network (LAN), but it's a lot bigger.
- a computer system that hosts websites. It runs Web server software, such as Apache or Microsoft IIS,
- a component that provides networking capabilities for a computer.
- a communications protocol that is used for wireless data access through most mobile wireless networks
- a network of connected devices that exist within a specific location.
12 Clues: used to network multiple computers together. • multiple devices that communicate with one another. • similar to a Local Area Network (LAN), but it's a lot bigger. • a component that provides networking capabilities for a computer. • a hardware device that directs traffic between networks and devices. • ...
Social media KEYWORDS 2021-09-14
Across
- to sign in asocial network you need a … and a password
- online harassment
- the act of giving wrong information about something
- Facebook and Instagram are social …
- impolite
- publish on a blog, on social networks
- a person who uses negative and critical
- emotionally touched
- friends can give you … to help you in difficult situations
- delete
Down
- a person who uses their strength or power to frighten or hurt weaker people
- reliable
- malevolent
- informatioin
- shocking
15 Clues: delete • reliable • impolite • shocking • malevolent • informatioin • online harassment • emotionally touched • Facebook and Instagram are social … • publish on a blog, on social networks • a person who uses negative and critical • the act of giving wrong information about something • to sign in asocial network you need a … and a password • ...
Throughout Conversations 2019-07-30
Across
- He makes funny noises when mistaken
- How people perceive themselves.
- People cannot live with out them nowadays.
- Likes to chase mice
- Mental illness
- Creator and owner of the most popular networks
- Person that treats bad others
Down
- She has awesome abilities for power point presentations
- Terrifying consequence of mental illnesses.
- Picturing oneself
- Online pages to socialize
- The most popular social network
- She laughs a lot
- Man's best friend
- Action of mistreating another person
15 Clues: Mental illness • She laughs a lot • Picturing oneself • Man's best friend • Likes to chase mice • Online pages to socialize • Person that treats bad others • How people perceive themselves. • The most popular social network • He makes funny noises when mistaken • Action of mistreating another person • People cannot live with out them nowadays. • ...
IT Quiz_SET-3 2026-01-03
Across
- Software used to browse the web
- High-level programming language
- Data transferred over a network
- A table row in DBMS
- Volatile memory type
- Software development life cycle phase
- Unwanted emails
Down
- Private network within an organization
- Program that manages hardware
- Device used to connect networks
- Object-oriented concept for data security
- Key used to uniquely identify records
- Language used to style web pages
- Error occurring during program execution
- Brain of the computer
15 Clues: Unwanted emails • A table row in DBMS • Volatile memory type • Brain of the computer • Program that manages hardware • Software used to browse the web • Device used to connect networks • High-level programming language • Data transferred over a network • Language used to style web pages • Key used to uniquely identify records • Software development life cycle phase • ...
IT1571-Introduction to Computer Networks 2022-08-15
Across
- In which of the Data transfer method Data will be transferred in one direction only?
- It is a small physical device that operate at the network layer to join multiple networks together.
- The main functionality of the transmission media is to carry the information in the form of ____ through LAN
- It is a measure of the thickness of the wire
- This topology is an arrangement of the network in which every node is connected to the central hub, switch or a central computer
- This topology can be formed by using the formula: Number of cables = (n*(n-1))/2
- It is an ISO standard developed from the Synchronous Data Link Control (SDLC) standard proposed by IBM in the 1970's.
- It means the loss of energy, i.e., the strength of the signal decreases with increasing the distance which causes the loss of energy
- This OSI model layer is responsible for Bit Synchronization,Bit rate control,Physical Topologies
Down
- How many layers available in Open Systems Interconnection (OSI) model
- It is an wireless transmission and it is unidirectional, when an antenna transmits microwaves they can be narrowly focused. This means that the sending and receiving antennas need to be aligned
- It is an eight-wire connector used commonly to connect computers onto a local-area networks (LAN)
- acknowledgment (of the received data) is hooked on the data frame (to be sent) instead of sending a separate frame.
- This topology can be formed by using the formula: Number of cables = (n*(n-1))/2
- It is a physical layer networking device which is used to connect multiple devices in a network. They are generally used to connect computers in a LAN.
- This technology is an arrangement of the network in which computers are interconnected with each other through various redundant connections
- This type of MAC address means one-to-all communication. A frame with a destination _______ address is sent to all entities in the link
- defines the structure of the network of how all the components are interconnected to each other
18 Clues: It is a measure of the thickness of the wire • How many layers available in Open Systems Interconnection (OSI) model • This topology can be formed by using the formula: Number of cables = (n*(n-1))/2 • This topology can be formed by using the formula: Number of cables = (n*(n-1))/2 • ...
Networks and the Internet Vocabulary 2024-12-09
Across
- a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
- a group of computing devices and programs working together for a common purpose
- a group of interconnected computing devices capable of sending or receiving data.
- Address The unique number assigned to each device on the Internet
- A type of computer that forwards data across a network
- the system responsible for translating domain names like example.com into IP addresses
Down
- An agreed-upon set of rules that specify the behavior of some system
- the protocol used for transmitting web pages over the Internet
- a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- a system of linked pages, programs, and files
- A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all
- differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
- Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
16 Clues: a system of linked pages, programs, and files • A type of computer that forwards data across a network • the protocol used for transmitting web pages over the Internet • Address The unique number assigned to each device on the Internet • An agreed-upon set of rules that specify the behavior of some system • ...
Are you addicted to your mobile phone? 2024-08-25
7 Clues: behaviour • dependance • formal notice • off: switch off • mobile device to communicate • communication between people • media: communication networks
AWATIF CROSSWORD 2018-10-10
Across
- Printing the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- a set of computers connected together for the purpose of sharing resources.
- a unit of memory or data equal to 1,024 (210) bytes.
- most often used to measure data transfer rates of local networks and I/O connections.
- known as page and Web page.
- a software application used to locate, retrieve and display content on the World Wide Web, including webpages, images, video and other files.
Down
- a device that forwards data packets along networks.
- "having no wires".
- program instructions.
- arrange or put into a format.
- a person who uses computers to gain unauthorized access to data.
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
12 Clues: "having no wires". • program instructions. • known as page and Web page. • arrange or put into a format. • a device that forwards data packets along networks. • a unit of memory or data equal to 1,024 (210) bytes. • a person who uses computers to gain unauthorized access to data. • a set of computers connected together for the purpose of sharing resources. • ...
Multiserver Network topology 2015-12-20
Ishaan Singhs puzzle 2025-06-15
Across
- This topology uses a single communication line to which all the nodes are directly connected
- Security system that prevents unauthorized people from entering your system or network
- unwanted bulk emails that come from unknown sources
- Converts the encrypted information into a readable form
- Spam attackers send bulk mails till the mail server gets full
- Means of communication that uses low powered radio waves to transmit the data between devices
- Purchase of a single licensed copy of the software and load it onto several computers contrary to the licenses terms
Down
- Criminal activities that involve the use of computer ,networks ,and the internet connections with the intent to cause harm to individuals or their digital devices
- Transmits the message from the source computer to the destination computer using only the physical address
- The act of imitating the language or using thoughts of another person as ones own work
- 2 or more computers are connected at distant places
- Used to connect all computers in a network with each other
- Enables you to connect you to your computer to the available internet connection over the existing telephone lines
- Illegal illustration of a computer system or network
- 2 or more computers are connected within a small area
- Device that connects 2 different networks with each other
16 Clues: unwanted bulk emails that come from unknown sources • 2 or more computers are connected at distant places • Illegal illustration of a computer system or network • 2 or more computers are connected within a small area • Converts the encrypted information into a readable form • Device that connects 2 different networks with each other • ...
COMPUTER IT 2024-01-16
Across
- a range of frequencies within a band
- network, cables to connect devices
- cable, used to connect one network to another
- network, interconnected device
- transmissions, transfer of data
- system of rules
- a small part of a large message
- provides a service to another
Down
- network, wireless data to connect networks
- Links multiple computers
- a global computer network
- Electronic messages
- exchange messages over a network
- address, rules for formal data
- hardware, equipment or computer devices
- forwards data
16 Clues: forwards data • system of rules • Electronic messages • Links multiple computers • a global computer network • provides a service to another • address, rules for formal data • network, interconnected device • transmissions, transfer of data • a small part of a large message • exchange messages over a network • network, cables to connect devices • a range of frequencies within a band • ...
Inventions 2024-08-21
Across
- Compact disc for digital music storage
- Type of camera technology ___ Camera
- Mobile phone technology ___ Phone
- Network of networks ___ Protocol
- Popular gaming console ___ Entertainment System
- Popular rechargeable battery ___ Tool
- Video cassette recorder ___ Tape
- Early computer storage disk ___ Disk
Down
- Genetic research breakthrough ___ Fingerprinting
- Operating system introduced by ___ Windows
- Type of display technology ___ Monitor
- Single-use camera ___ Camera
- Technology for precise cutting and scanning ___ Printer
- Digital messaging system ___ Service
- Satellite navigation system ___ Technology
15 Clues: Single-use camera ___ Camera • Network of networks ___ Protocol • Video cassette recorder ___ Tape • Mobile phone technology ___ Phone • Type of camera technology ___ Camera • Digital messaging system ___ Service • Early computer storage disk ___ Disk • Popular rechargeable battery ___ Tool • Compact disc for digital music storage • Type of display technology ___ Monitor • ...
Introduction to Data Communciation Networks 2019-07-23
Across
- combination of regular types of topology's.
- number of cables are required to connect 6 computers in mesh topology
- another name for information
- one of the type of connection that allows sharing of channel or bandwidth
- one of the component defining set of rules
- a topology variant of star topology
- type of topology that provides redundant paths for data communication
- one of the type of topology that supports multipoint type of connections.
Down
- type of connection that carries traffic only between two devices connected.
- image is composed of set of matrix of dots
- one of the key elements of the transport layer
- which type of network supports mesh topology?
- one of the type of communication that represents the flow of data in one direction only.
- ticket required to capture by source to send some information to destination.
- cable TV network is an example of which type of network
- central component that broadcast the data transmission
16 Clues: another name for information • a topology variant of star topology • image is composed of set of matrix of dots • one of the component defining set of rules • combination of regular types of topology's. • which type of network supports mesh topology? • one of the key elements of the transport layer • central component that broadcast the data transmission • ...
Networking concept 1 2025-05-23
5 Clues: packets of data across networks. • devices, shares data over distances. • how devices communicate in networks. • address uniquely identifies devices online. • secure communication through encrypted channels.
Entangle. Liquidity resolved. 2023-08-29
Across
- Cryptocurrency unit used for transactions.
- Solution for obtaining data in blockchain.
- Depend on scripts in cryptocurrency.
- Abbreviation for decentralized finance.
- Strategy involving cryptocurrency assets.
- Crossword for "chain."
- Interaction between different blockchains.
- Fee paid for transactions on a blockchain.
- Part of borrowing protocols.
- Virtual machine for executing smart contracts.
- Increasing usage of cryptocurrency.
- Person who interacts with cryptocurrency.
Down
- Incentive for participating in blockchain networks.
- Part of "Liquid Vaults."
- Participant in blockchain consensus.
- Describes cryptocurrency transactions.
- Cryptocurrency company with a vision.
- Ensuring safety in cryptocurrency transactions.
- Decentralized applications running on blockchain.
19 Clues: Crossword for "chain." • Part of "Liquid Vaults." • Part of borrowing protocols. • Increasing usage of cryptocurrency. • Participant in blockchain consensus. • Depend on scripts in cryptocurrency. • Cryptocurrency company with a vision. • Describes cryptocurrency transactions. • Abbreviation for decentralized finance. • Strategy involving cryptocurrency assets. • ...
Cyberbullying 2018-10-28
9 Clues: cause pain • false information • opposite of download • send to other people • similar to cruel, bad • a popular social network • a person who perpetuates bullying • write opinions on social networks • popular social network for young people
3.6 Fundamentals of Networks Part 2 2021-11-22
Across
- When organisations employ specialists to simulate potential attacks on their system. It is used to identify possible weaknesses in their cyber security.
- Uses parts of a person to identify them and allow them access.
- When hackers send emails or texts to people claiming to be from a well-known business.
- Can see what a user is doing and sends that info back to the hacker.
- When someone pretends to be someone else to persuade the victim to share information.
- Sends an email to verify a users identity.
- What term is used for protecting networks, data, programs and computers against damage cyber attacks and unauthorised access.
- Simulates an external cyber attack. The person carrying out the attack will not be given any credentials, but they will have to carry out the attack in any way they can.
- A method of hacking where a user is directed to a fake version of a website.
Down
- The term used when data is transferred into a code that cannot be hacked.
- Watching over someones shoulder.
- Engineering Using people to gain private information or access to networks.
- Simulates a malicious insider who has knowledge of the system.
- USB drive or SD card
- Common way of preventing hackers accessing information.
- Simulates a person who has access to the target.
16 Clues: USB drive or SD card • Watching over someones shoulder. • Sends an email to verify a users identity. • Simulates a person who has access to the target. • Common way of preventing hackers accessing information. • Uses parts of a person to identify them and allow them access. • Simulates a malicious insider who has knowledge of the system. • ...
Networking Concepts and Cyber Ethics 2025-06-04
Across
- A network device that is used to connect all the computers in a network with each other
- Refers to criminal activities that involve the use of computers,networks etc
- A program or set of programs that disrupts the normal functioning of the computer
- A process of transforming data into unreadable code
- Refers to an illegal intrusion into a computer system or network
- Refers to unwanted bulk emails that come from unknown sources
- Two or more computers and peripheral devices are connected within a small area,such as room etc
- Refers to a computer network that allows controlled access to an information source available on the internet
Down
- A legal right granted by the law to the creator for his original work
- A process that converts the encrypted information into a readable form
- A wireless technology used to interconnect mobile phones,computers etc using short range wireless connection
- A device that connects two different types of networks with each other
- A security system that prevents unauthorised people from accessing your system or network
- A computer network that is mainly created for an individual person
- A kind of network connects two or more computers located at distant places
- Refers to a computer network restricted to an organisation
16 Clues: A process of transforming data into unreadable code • Refers to a computer network restricted to an organisation • Refers to unwanted bulk emails that come from unknown sources • Refers to an illegal intrusion into a computer system or network • A computer network that is mainly created for an individual person • ...
2TA Labs 2023-02-08
Across
- image representing a brand
- to be strong
- which leads to the same result.
- way of living
- phenomenon present mainly on social networks
- product set
- brand that has filed a patent
Down
- photo attached in the nursery
- Appear abruptly when rising, when exiting
- expensive, lavish character
- Who respects the environment
- anticipation of a phenomenon
- All the processes and techniques used for the transmission of images
- out of town
14 Clues: product set • out of town • to be strong • way of living • image representing a brand • expensive, lavish character • Who respects the environment • anticipation of a phenomenon • photo attached in the nursery • brand that has filed a patent • which leads to the same result. • Appear abruptly when rising, when exiting • phenomenon present mainly on social networks • ...
Vocabulary Choiceboard 3H Week1 Part 1 2025-08-23
Across
- tarea homework
- /colgar fotos to upload photos
- redes sociales social networks
- los muebles to dust the furniture
- ordenador computer (Spain)
- to chat online
- la mesa to set the table
- la basura to take out the trash
Down
- bien to have a good time
- la mesa to clear the table
- por internet to surf the internet
- la compra to do the shopping
- la ropa to wash the clothes
- pupitres student desks
- móvil cell phone
15 Clues: tarea homework • to chat online • móvil cell phone • pupitres student desks • bien to have a good time • la mesa to set the table • la mesa to clear the table • ordenador computer (Spain) • la ropa to wash the clothes • la compra to do the shopping • /colgar fotos to upload photos • redes sociales social networks • la basura to take out the trash • por internet to surf the internet • ...
Science and Technology Terms 2023-05-05
Across
- - A type of AI that allows machines to learn and improve from experience without being explicitly programmed.
- - Facts or statistics gathered for analysis or reference.
- - The branch of technology that deals with the design, construction, operation, and application of robots.
- - Global system of interconnected computer networks.
- - The process of converting information or data into a code to prevent unauthorized access.
- - A system of signals, letters, or symbols used to represent information.
- - The use of living organisms, cells, or biological processes to develop products or services.
- - Relating to or based on quantum mechanics.
Down
- - A computer-generated simulation of a 3D environment that can be interacted with in a seemingly real way.
- - The study and application of extremely small things.
- - The delivery of computing services—including servers, storage, databases, networking, software, and analytics—over the Internet.
- - The practice of protecting computer systems and networks from digital attacks.
- - A set of rules or procedures used for solving a problem or accomplishing a task.
- - Large sets of structured and unstructured data that can be analyzed to reveal patterns, trends, and associations.
- - The standard markup language used for creating web pages and web applications.
- - A system that uses satellite signals to determine the precise location of a device.
16 Clues: - Relating to or based on quantum mechanics. • - Global system of interconnected computer networks. • - The study and application of extremely small things. • - Facts or statistics gathered for analysis or reference. • - A system of signals, letters, or symbols used to represent information. • ...
Student-Created Vocabulary Crossword 2022-11-15
9 Clues: link • main page • ENGINE world wide web • identity theft online • secret word or phrase • writers make this online • add, delete, revise content • rules that apply over computer networks • protocol for specifying addresses on the internet
Cyberbullying 2018-10-28
9 Clues: cause pain • false information • opposite of download • send to other people • similar to cruel, bad • a popular social network • a person who perpetuates bullying • popular social network for young people • comments write opinions on social networks
Luxury brands 2021-11-29
Across
- A muse
- A brand who collaborated with Off-White
- The platform where models walks
- Group of people who follow personnalities' activity on social networks.
- A style
Down
- what followers are looking for
- A Jacquemus fashion show
- The main communication channel used by ther young designers
- A bag
- Jacquemus' favorite season
- Virgil Abloh's birthplace
11 Clues: A bag • A muse • A style • A Jacquemus fashion show • Virgil Abloh's birthplace • Jacquemus' favorite season • what followers are looking for • The platform where models walks • A brand who collaborated with Off-White • The main communication channel used by ther young designers • Group of people who follow personnalities' activity on social networks.
Pharmacology in the criminal justice system 2025-03-24
11 Clues: Bad Guy • In jail • another word for job • Permitted by the law • Something people receive • Something we have to abide by • A series of networks combined • Someone who fights for others • Not good for you if used wrong • Legal drug distribution network • When have something for a purpose, you are ___ it
It quiz 2025-10-06
Across
- data to identify patterns and
- predictions without being
- new content, such as text,
- patterns.
- programmed.
- multi-layered neural networks
Down
- learning A subset of AI where systems learn
- AI An emerging field of AI that can
- process complex data and
- learning A more advanced form of ML that
- or audio, from trained data.
11 Clues: patterns. • programmed. • process complex data and • predictions without being • new content, such as text, • or audio, from trained data. • data to identify patterns and • multi-layered neural networks • AI An emerging field of AI that can • learning A subset of AI where systems learn • learning A more advanced form of ML that
Theories and Roles in Sport 2025-01-24
Across
- leisure activity for enjoyment
- highlights power struggles and inequality
- organizing governing sports
- promoting fitness through sports
- multiple billion dollar sports industry
Down
- Examines personal interactions in sports
- Studies social relationships and networks
- Emphasizes social cohesion and stability
- spectators primary primary purpose
- analyzes social and cultural contexts
- foundation of athletic skill
- lasting impact of sports events
12 Clues: organizing governing sports • foundation of athletic skill • leisure activity for enjoyment • lasting impact of sports events • promoting fitness through sports • spectators primary primary purpose • analyzes social and cultural contexts • multiple billion dollar sports industry • Examines personal interactions in sports • Emphasizes social cohesion and stability • ...
Vocabulary Week #13 - Thomari Samuels 2021-11-29
10 Clues: to confuse • a list or plan • rough and noisy • obeying or complying • first public appearance • to give up possession of • money earned before deduction • extra time, space, or freedom • confusing networks, paths or routes • a supporter of a person, group, party or cause
Mis Actividades Diarias 2023-09-25
10 Clues: to take • to go to • to offer • to lose/to miss • to know (facts) • to leave/to go out • to play an instrument • to return/to come back • to use social media/networks • to know/to be acquainted with
CS&A CSP VOCAB 2022-05-23
Across
- a group of items
- hiding the details and showing only the functionality
- a node in an HTML document
- control z
- windows and period
- getting something to repeat for efficiency
- a typo
- a set of characters
Down
- a set of statements that perform a task
- decimal or fractional numbers
- people who work to keep networks operating smoothly
- control V
- a universal data submission button
- a place holder
- control y
- test and edit as you go
- rythm
- data that has exclusively whole numbers negative and positive
- email confirmation
19 Clues: rythm • a typo • control V • control y • control z • a place holder • a group of items • windows and period • email confirmation • a set of characters • test and edit as you go • a node in an HTML document • decimal or fractional numbers • a universal data submission button • a set of statements that perform a task • getting something to repeat for efficiency • ...
Cyberbullying 2018-10-28
9 Clues: cause pain • false information • opposite of download • send to other people • similar to cruel, bad • a popular social network • write opinions on social networks • a person who perpetuates bullying • popular social network for young people
Computing Systems 2021-04-19
Across
- Apple QuickTime Movie
- a group of computers connected together
- Image file format
- tells computers what to do
- the workstations connected to a network
- Microsoft Excel document
- the largest WAN in the world
- sends information to the computer
- any invention, including: machines, and power
Down
- Wi-Fi
- is an electronic device to help complete tasks
- a device that transfers data between networks
- uses input data to get meaningful results
- stands for Wide area network
- Compressed files
- the brains of the computer
- makes life easier and more comfortable
- stands for Local area network
18 Clues: Wi-Fi • Compressed files • Image file format • Apple QuickTime Movie • Microsoft Excel document • tells computers what to do • the brains of the computer • stands for Wide area network • the largest WAN in the world • stands for Local area network • sends information to the computer • makes life easier and more comfortable • a group of computers connected together • ...
Networking Crossword 2013-03-26
Across
- connection point that is attached to a network, and is capable of sending, receiving, or forwarding information over a communications channel.
- arrangement of the various elements of a computer network.
- set of clients connected via a shared communication line.
- computer designed to process requests and deliver data to other client computers over a local network or the Internet.
- part of computer network infrastructure that interconnects various pieces of network.
- computer networking device that links network devices.
- type of cable is used in structured cabling for computer networks such as Ethernet.
- technology that allows a device to exchange data wirelessly.
- computer network covering a small area.
- type of network topology in which one central "root" node is connected to other nodes one level down on the hierarchy.
Down
- computer network organized around an individual person.
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information.
- device that forwards data packets between computer networks.
- network configuration consisting of one central switch, hub, or computer which acts as a conduit to transmit messages.
- device for connecting multiple Ethernet devices together and making them act as a single network segment.
- modular connector using 8 conductors.
- computer network spanning a city or large campus.
- computer network covering a broad area linking regional boundaries.
- computer or computer program that initiates contact with a server in order to make use of a resource.
19 Clues: modular connector using 8 conductors. • computer network covering a small area. • computer network spanning a city or large campus. • computer networking device that links network devices. • computer network organized around an individual person. • set of clients connected via a shared communication line. • arrangement of the various elements of a computer network. • ...
Contemporary Marketing Ch. 4 2025-03-17
Across
- A high-tech scam that uses e-mail or pop-up messages that claim to be from familiar businesses such as banks, Internet service providers, or even government agencies.
- The process of encoding data for security purposes.
- The buying and selling of products online.
- The percentage of visitors to a website who make a purchase.
- Secure internal networks that help companies share information among employees, no matter the number or location.
- How much time users spend on site and which pages they visit.
- Using the Internet to provide services to customers and communicate with employees and business partners.
- Business conducted directly between the business and a consumer.
- Website strategies designed to increase the size of each customer transaction and encourage repeat visits by the customer.
Down
- The process of marketing goods and services over the Internet by utilizing digital tools.
- Conflicts among producers, wholesalers, and retailers.
- The overall experience customers have when visiting a website.
- The number of individuals who visit a website.
- The total cost of each sale.
- Delivering more relevant marketing messages to customers based on event triggers.
- The percentage of users that click on an ad.
- A secure website where a company and its suppliers share all types of data, from product design through order delivery.
- Transactions that happen between organizations.
- Secure networks used for e-business and accessible through the firm’s website by external customers, suppliers, or other authorized users.
19 Clues: The total cost of each sale. • The buying and selling of products online. • The percentage of users that click on an ad. • The number of individuals who visit a website. • Transactions that happen between organizations. • The process of encoding data for security purposes. • Conflicts among producers, wholesalers, and retailers. • ...
BTT Unit 2 Crossword Review 2023-10-15
Across
- ______AI focuses on a single task like correcting your grammar mistakes.
- Algorithm _____ occurs when systematic and unfair discrimination becomes a part of a computer model's decision-making process.
- A malicious program that disguises itself as legitimate software.
- A set of rules or processes for solving a problem or completing a task.
- A web design technique that loads content continuously so the user is constantly engaged.
- A situation in which one's beliefs are reinforced because the same information is read over and over again.
- In neural networks, it's the _________layer that is between input and output and where the "magic" happens.
- A subset of machine learning involving neural networks with many layers.
Down
- False information spread with the intent to deceive.
- A type of malware that can replicate itself (without human action) to spread to other computers.
- A tracking tool that allows a company to follow a user's online behaviour across different websites.
- These things can increase a user's dopamine as they constantly check their social media.
- A sequence of instructions that repeats until a certain condition is met.
13 Clues: False information spread with the intent to deceive. • A malicious program that disguises itself as legitimate software. • A set of rules or processes for solving a problem or completing a task. • ______AI focuses on a single task like correcting your grammar mistakes. • A subset of machine learning involving neural networks with many layers. • ...
U03 - CSE-CH7 2024-03-20
Across
- (4-5,8) is a program that runs on a computer to allow or deny traffic between the computer and other connected computers. It applies a set of rules to data transmissions through inspection and filtering of data packets.
- is hardware or software solutions that enforce network security policies. This can filters unauthorized or potentially dangerous traffic from entering the network.
- (6,5) is a protocol that provides a secure (encrypted) management connection to a remote device.
- (9,9,6) A host intrusion detection system is software that runs on a host computer that monitors suspicious activity.
- This is code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack.
- can provide a way to group devices within a LAN and on individual switches. They use logical connections instead of physical connections.
- (8,5) An administrator should look at every service to verify its necessity and evaluate its risk. Remove any unnecessary services.
Down
- (6,14) also called two-way authentication, is a process or technology in which both entities in a communications link authenticate to each other.
- (2-2,9,6) was the computer industry’s response to the weakness of the previous WEP standard. The WPA2 standard provided several security improvements.
- (4,6) “freezes” the hard drive partition. When a user restarts the system, the system reverts to its frozen configuration. The system does not save any changes that the user makes.
- (5,6) In most networks that use Windows computers, an administrator configures these to ensure groups and setting policy at a group level i.e. access to USB devices
- these form the backbone of the Internet and communications between different networks. They communicate with one another to identify the best possible path to deliver traffic to different networks.
- (7,7,7) A private network that connects remote sites or users together over a public network, like the Internet.
- (4,7) copies the contents of the computer’s hard disk to an image file.
14 Clues: (4,7) copies the contents of the computer’s hard disk to an image file. • (6,5) is a protocol that provides a secure (encrypted) management connection to a remote device. • (7,7,7) A private network that connects remote sites or users together over a public network, like the Internet. • ...
tech terms 2023-12-05
Across
- A computer program managing access to different networks
- Personally identifiable information
- Hyper Text Markup Language
- 0's and 1's
- The address of a web page
- Copy data from one computer system to another
- restart the computer
Down
- Conversion of information into code
- A regularly updated website
- stores data
- Portable Document Format
- start up the computer
- A group of 1’s and 0’s
- Open source software
14 Clues: stores data • 0's and 1's • restart the computer • Open source software • start up the computer • A group of 1’s and 0’s • Portable Document Format • The address of a web page • Hyper Text Markup Language • A regularly updated website • Conversion of information into code • Personally identifiable information • Copy data from one computer system to another • ...
Part 1 Week 1 Spanish 3H 2025-08-23
Across
- pupitres student desks
- bien to have a good time
- la mesa to clear the table
- la compra to do the shoppin
- ordenador computer (Spain)
- la basura to take out the trash
- to chat online
Down
- la mesa to set the table
- tarea homework
- /colgar fotos to upload photos
- los muebles to dust the furniture
- por internet to surf the internet
- móvil cell phone
- la ropa to wash the clothes
- redes sociales social networks
15 Clues: tarea homework • to chat online • móvil cell phone • pupitres student desks • la mesa to set the table • bien to have a good time • la mesa to clear the table • ordenador computer (Spain) • la compra to do the shoppin • la ropa to wash the clothes • /colgar fotos to upload photos • redes sociales social networks • la basura to take out the trash • los muebles to dust the furniture • ...
school project crossword 2014-02-24
Across
- unparalleled
- call to fight or account
- declare strongly
- attributes
- connection between blood or marriage
- to worry or torment
- to speak badly about someone
- united, linked or joined
- group of allied objects
Down
- one who hurts or intimidates weaker people
- to have high regard of someone
- a fence or obstruction
- means of exchanging messages
- alter,make or become different
- mechanisms something that copy's or imitates the original design
- power to effect people or events
- networks something that connects people over the internet[example:facebook,twitter
17 Clues: attributes • unparalleled • declare strongly • to worry or torment • a fence or obstruction • group of allied objects • call to fight or account • united, linked or joined • means of exchanging messages • to speak badly about someone • to have high regard of someone • alter,make or become different • power to effect people or events • connection between blood or marriage • ...
Networking 2022-08-22
Across
- The unique languange of the internet
- address resolution protolol
- A connection of many networks
- two twisted cables without a ground
- open systems interconnection
- Network within a buildingN
- Software defined Wide Area Network
- unwanted signals between channels
- City of Dallas network
- How a network is wired
Down
- A private network for external users
- two twisted cables with a ground
- communication between network hosts
- Dallas ISD network
- Number assigne to each device on the network
- A private network usually within a business
- How messages are sent
17 Clues: Dallas ISD network • How messages are sent • City of Dallas network • How a network is wired • Network within a buildingN • address resolution protolol • open systems interconnection • A connection of many networks • two twisted cables with a ground • unwanted signals between channels • Software defined Wide Area Network • communication between network hosts • ...
Chemical Bonds Crossword Puzzle 2021-12-02
Across
- Two or more atoms held together by covalent bonds.
- In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
- The bond that can hold atoms together in large networks or small groups.
- bonds that transfer electrons
Down
- A substance made of atoms of two or more elements.
- bonds that share electrons
- bond The bond that can hold atoms together in large networks or small groups.
- formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
8 Clues: bonds that share electrons • bonds that transfer electrons • Two or more atoms held together by covalent bonds. • A substance made of atoms of two or more elements. • The bond that can hold atoms together in large networks or small groups. • bond The bond that can hold atoms together in large networks or small groups. • ...
Data Transmission 2022-07-13
Across
- a horizontal and vertical parity check on a block of data being transmitted
- a device that enables data packets to be moved to be moved between different networks, for example to join a LAN to a WAN
- the actual data being carried in a data packet
- data that can be sent in both directions at the same time(simultaneously)
- sending datadown one channel/wire one bit at a time
- data that can be sent on one direction only
Down
- data that can be sent in both directions but not at the same time
- stages in an network that can receive and transmit
- a small part of a message/data that is transmitted over a network; after transmission all the data packets are reassembled to form the original message/data
- packets; routers are nodes in communication networks
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in an network that can receive and transmit • sending datadown one channel/wire one bit at a time • packets; routers are nodes in communication networks • data that can be sent in both directions but not at the same time • ...
Networking + 2023-02-07
Across
- networking allows a company to replace physical devices with cloud-based virtual devices.
- protocol wraps data for secure transmission over point-to-point or VPNs
- Query Language (SQL) Server runs on port 1433
- process of distributing infrastructure as code to multiple locations
Down
- (NTP) server is responsible for syncing time with a reputable time source
- switching is common in corporate networks and datacenters.
- server information and default gateway information, which are necessary for client devices to be able to see external networks, can be configured and assigned through DHCP.
- devices are set up for dynamic IP address assignments
- forwarding can be used to send data from a log system from one subnet to one or more destinations outside of the subnet
- and Devices should only be allowed to connect to switches on the access layer
- Virtual machines & network components fall under infrastructure as a service (IaaS)
11 Clues: Query Language (SQL) Server runs on port 1433 • devices are set up for dynamic IP address assignments • switching is common in corporate networks and datacenters. • process of distributing infrastructure as code to multiple locations • protocol wraps data for secure transmission over point-to-point or VPNs • ...
Crossword-5 2013-08-27
Across
- Protocol that provides extended routing, flow control, segmentation, connection-orientation, and error correction facilities in Signaling System 7 telecommunications networks.
- Call control protocol used between serving nodes to support the ISDN services
- Protocol to provide Authentication, Authorization and Accounting (AAA)
- Acts as the trigger point for further services to be invoked during a call.
- The first 3G service was launched in this country.
Down
- An Element in a GSM network responsible for the delivery of short messages
- Architecture that enables pieces of programs, called objects, to communicate with one another regardless of what programming language they were written in or what operating system they're running on.
- It is used for network troubleshooting, analysis and communications protocol development.
- MTP Level 3 (MTP3) User Adaptation Layer
- Protocol used in TCP/IP networks to facilitate the exchange of management information between network devices
10 Clues: MTP Level 3 (MTP3) User Adaptation Layer • The first 3G service was launched in this country. • Protocol to provide Authentication, Authorization and Accounting (AAA) • An Element in a GSM network responsible for the delivery of short messages • Acts as the trigger point for further services to be invoked during a call. • ...
Tressure Hunt Crossword Set1 2025-09-17
Across
- video display functionality, likely showing video feed from a camera or sensor at the front door.
- A network system that connects and manages digital services within an aircraft cabin.
- A network device that connects multiple devices and directs data to the correct destination.
- A company known for its wireless networking solutions and enterprise Wi-Fi products.
- A smart server unit that manages wireless applications and communications efficiently for QTR configuration.
- The process of checking or proving that something is accurate, true, or meets specified requirements.
Down
- A communication network that provides digital data transmission services.
- A widely used technology for local area networks (LAN) that connects devices using cables.
- A network device that connects different networks and translates data between them.
- A software program designed to be loaded and executed on a system, often used in avionics applications.
10 Clues: A communication network that provides digital data transmission services. • A network device that connects different networks and translates data between them. • A company known for its wireless networking solutions and enterprise Wi-Fi products. • A network system that connects and manages digital services within an aircraft cabin. • ...
fench 2024-10-30
10 Clues: a religion • a trade mark • plant or mean • head of church • networks of colonies • a powerful a officiant • counsel to govern the colony • mixed European and Indigenous ancestry • a territory controlled by annuler colony • are the descendants of 17th and 18th century French settlers
the black death 2023-12-13
ADSI Lizette Paola Rosso 2022-06-10
Across
- The use of a network of remote servers connected to the Internet to store, manage and process data, servers, databases, networks and software.
- It is a personal computer that can be easily transported. Many of them are designed to support software and files just as robust as those processed by a desktop computer.
- The person in charge of creating resources that allow the operating system of a computer to manage programs and applications, with which the user performs different tasks.
- the graphical window of a program that is interacted with on a device. Whether it is a computer, cell phone or television.
- It is a general purpose software application for the creation of diagrams.
- It is a statement that can be used to quickly and easily delete a table from a database.
Down
- It is a graphical language for visualizing, specifying, building and documenting a system.
- It is a programmable digital electronic machine that executes a series of commands to process the input data, conveniently obtaining information that is then sent to the output units.
- Are geometric designs that are made with the objective of graphically representing ideas, processes, solutions, mechanisms or phenomena to facilitate their understanding
- It is a decentralized set of interconnected communications networks, using the TCP/IP family of protocols, which ensures that the heterogeneous physical networks that comprise it constitute a single logical network with global reach.
- The use of a network of remote servers connected to the Internet to store, manage and process data, servers, databases, networks and software.
- is the logical support to the formal system of a computer system, comprising all the necessary logical components that make it possible to perform specific tasks, as opposed to the physical components that are called hardware.
- It is a Bitcoin block scanning service, as well as a cryptocurrency wallet and cryptocurrency exchange that supports Bitcoin, Bitcoin Cash and Ethereum.
- It is a set of data that may belong to the same context, which are stored for later use.
- is a sequence of instructions, written to perform a specific task on a computer.
15 Clues: It is a general purpose software application for the creation of diagrams. • is a sequence of instructions, written to perform a specific task on a computer. • It is a set of data that may belong to the same context, which are stored for later use. • It is a statement that can be used to quickly and easily delete a table from a database. • ...
tech terms 2023-12-05
Across
- A computer program managing access to different networks
- Personally identifiable information
- Hyper Text Markup Language
- 0's and 1's
- The address of a web page
- Copy data from one computer system to another
- restart the computer
Down
- Conversion of information into code
- A regularly updated website
- stores data
- Portable Document Format
- start up the computer
- A group of 1’s and 0’s
- Open source software
14 Clues: stores data • 0's and 1's • restart the computer • Open source software • start up the computer • A group of 1’s and 0’s • Portable Document Format • The address of a web page • Hyper Text Markup Language • A regularly updated website • Conversion of information into code • Personally identifiable information • Copy data from one computer system to another • ...
2TA Labs 2023-02-08
Across
- image representing a brand
- to be strong
- which leads to the same result.
- way of living
- phenomenon present mainly on social networks
- product set
- brand that has filed a patent
Down
- photo attached in the nursery
- Appear abruptly when rising, when exiting
- expensive, lavish character
- Who respects the environment
- anticipation of a phenomenon
- All the processes and techniques used for the transmission of images
- out of town
14 Clues: product set • out of town • to be strong • way of living • image representing a brand • expensive, lavish character • Who respects the environment • anticipation of a phenomenon • photo attached in the nursery • brand that has filed a patent • which leads to the same result. • Appear abruptly when rising, when exiting • phenomenon present mainly on social networks • ...
Mixed 2021-11-06
Across
- created by computer technology and appearing to exist but not existing in the physical world
- a situation in which different elements are equal or in the correct proportions
- Used to describe something very unique
- barrier that acts as a security system to protect computer systems and networks from outside connections and untrusted networks
Down
- An expression to show surprise, disgust, anger
- the central principle or part of a policy, system,etc, which other things depend on
- to add to something in a way that improves it or makes it more attractive
- to make a record of the address of a web page on your computer so that you can find it again easily
- unable to think about or pay attention to something;unable to concentrate
9 Clues: Used to describe something very unique • An expression to show surprise, disgust, anger • to add to something in a way that improves it or makes it more attractive • unable to think about or pay attention to something;unable to concentrate • a situation in which different elements are equal or in the correct proportions • ...
Ishaan Singh's Puzzle 2025-05-19
Across
- connects two or more computers located at distant places they are linked by communication facilities like telecommunication or satellite signals.
- Certain sets of rules determining how data should be transferred over networks.
- topologies the layout in which the various components of a network like nodes, links peripherals, etc are connected and communicate with each other.
- Device that connects to different types of networks with each other.
- Network device that is used to connect all computers in a network with each other.
Down
- Transmits the message from the source computer to the destination Computer only by using the physical address.
- Wireless technology used to connect mobile phones, computers and printers.
- computer network that is mainly created for an individual person.
- Each computer in a network.
9 Clues: Each computer in a network. • computer network that is mainly created for an individual person. • Device that connects to different types of networks with each other. • Wireless technology used to connect mobile phones, computers and printers. • Certain sets of rules determining how data should be transferred over networks. • ...
It 2 2024-10-17
Across
- A software application used to access and view websites on the Internet.
- A technology that allows electronic devices to connect to a wireless local area network.
- Citizen A person who uses the Internet regularly and effectively, engaging in online activities responsibly.
- Literacy The ability to effectively find, evaluate, create, and communicate information in various digital formats.
- A group of interconnected computers and devices that can communicate and share resources.
- A device that forwards data packets between computer networks, directing traffic on the Internet.
Down
- Intelligence The simulation of human intelligence processes by machines, especially computer systems.
- Engine A program that searches for and identifies items in a database that correspond to keywords.
- A software application designed to simulate conversation with human users, especially over the Internet.
- A global network connecting millions of private, public, academic, business, and government networks.
10 Clues: A software application used to access and view websites on the Internet. • A technology that allows electronic devices to connect to a wireless local area network. • A group of interconnected computers and devices that can communicate and share resources. • A device that forwards data packets between computer networks, directing traffic on the Internet. • ...
SA Power Networks - CSW Crossword 2016-09-27
Across
- / Dana...
- / the third word of CSW 2016's motto
- / David
- / CSW is celebrated...
- / the second word of CSW 2016's motto
- / Social
Down
- / At my place
- / General...
- / Sean
- / the first word of CSW 2016's Motto
- / As part of our strategic plan, we should 'think ...'
- / The Ombudsman
- / Street
- / This week abreviated is...
- / Paul...
- / Who were we
16 Clues: / Sean • / David • / Street • / Social • / Dana... • / Paul... • / General... • / At my place • / Who were we • / The Ombudsman • / CSW is celebrated... • / This week abreviated is... • / the first word of CSW 2016's Motto • / the third word of CSW 2016's motto • / the second word of CSW 2016's motto • / As part of our strategic plan, we should 'think ...'
Cybersecurity Unit 1 Lesson 2 2022-12-02
Across
- Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
- A small local area network of computers and devices.
- Software that can stop malware from entering a network, computer, or device.
- Stores data that is in use.
- Software that runs on your computer, looking for many different types of malware from many different sources.
- Small text-based bits of information about your browser that a web server saves.
- Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
- All data on a computer.
- The arrangement of the various elements of a network.
- Executable files that are run by users.
- The systematic way to find specific web addresses and web pages.
Down
- A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
- A weakness in a system that allows an attacker to gain unauthorized access.
- A special kind of file that contains other files.
- A file that contains a collection of other files.
- Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
- Computer shared by multiple users across a network.
- An application file that is currently executing (also called running) in the operating system.
- An agreed-upon method for communication.
19 Clues: All data on a computer. • Stores data that is in use. • Executable files that are run by users. • An agreed-upon method for communication. • A special kind of file that contains other files. • A file that contains a collection of other files. • Computer shared by multiple users across a network. • A small local area network of computers and devices. • ...
V-Hospitality 2021-07-29
Across
- A device that allows wireless-equipped computers and other devices to communicate with a wired network.
- A small piece of information you may be asked to accept when connecting to certain servers via a web browser.
- The hardware address of a device connected to a shared network.
Down
- A device used for connecting two Local Area Networks (LANs)
- A con that scammers use to electronically collect personal information from unsuspecting users.
- A set of files saved on your hard disk that help your browser display pages you have already visited more quickly.
- a device that routes traffic between networks
- A database where information common to a particular topic
- A device that enables a computer to send and receive information over a normal telephone line
- a numerical address that corresponds to your computer on a network.
10 Clues: a device that routes traffic between networks • A database where information common to a particular topic • A device used for connecting two Local Area Networks (LANs) • The hardware address of a device connected to a shared network. • a numerical address that corresponds to your computer on a network. • ...
It 2 2024-10-17
Across
- The ability to effectively find, evaluate, create, and communicate information in various digital formats.
- A group of interconnected computers and devices that can communicate and share resources.
- A person who uses the Internet regularly and effectively, engaging in online activities responsibly.
- A device that forwards data packets between computer networks, directing traffic on the Internet.
Down
- A software application used to access and view websites on the Internet.
- A program that searches for and identifies items in a database that correspond to keywords.
- The simulation of human intelligence processes by machines, especially computer systems.
- A technology that allows electronic devices to connect to a wireless local area network.
- A global network connecting millions of private, public, academic, business, and government networks.
- A software application designed to simulate conversation with human users, especially over the Internet.
10 Clues: A software application used to access and view websites on the Internet. • The simulation of human intelligence processes by machines, especially computer systems. • A technology that allows electronic devices to connect to a wireless local area network. • A group of interconnected computers and devices that can communicate and share resources. • ...
Data Transmission 2022-07-13
Across
- a horizontal and vertical parity check on a block of data being transmitted
- a device that enables data packets to be moved to be moved between different networks, for example to join a LAN to a WAN
- the actual data being carried in a data packet
- data that can be sent in both directions at the same time(simultaneously)
- sending datadown one channel/wire one bit at a time
- data that can be sent on one direction only
Down
- data that can be sent in both directions but not at the same time
- stages in an network that can receive and transmit
- a small part of a message/data that is transmitted over a network; after transmission all the data packets are reassembled to form the original message/data
- packets; routers are nodes in communication networks
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in an network that can receive and transmit • sending datadown one channel/wire one bit at a time • packets; routers are nodes in communication networks • data that can be sent in both directions but not at the same time • ...
Digital Citizenship and Cyber Hygiene Vocabulary 2022-09-20
Across
- How companies use your data
- Identity theft, stealing money, stealing private information, controlling private computers.
- A type of cyber-attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- Attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.
Down
- Protection of computer systems, networks, and data from digital attacks.
- The information about a particular person that exists on the Internet as a result of their online activity.
- A computer security specialist who breaks into protected systems and networks to test and assess their security
- The use of electronic communication to bully a person
- Legal document outlining how a company can collect and use your data
10 Clues: How companies use your data • The use of electronic communication to bully a person • Legal document outlining how a company can collect and use your data • Protection of computer systems, networks, and data from digital attacks. • Identity theft, stealing money, stealing private information, controlling private computers. • ...
Tressure Hunt Crossword Set 3 Answers 2025-09-17
Across
- The process of checking or proving that something is accurate, true, or meets specified requirements.
- A network device that connects multiple devices and directs data to the correct destination.
- A company known for its wireless networking solutions and enterprise Wi-Fi products.
Down
- A communication network that provides digital data transmission services.
- A network system that connects and manages digital services within an aircraft cabin.
- A network device that connects different networks and translates data between them.
- video display functionality, likely showing video feed from a camera or sensor at the front door.
- A smart server unit that manages wireless applications and communications efficiently for QTR configuration.
- A widely used technology for local area networks (LAN) that connects devices using cables.
- A software program designed to be loaded and executed on a system, often used in avionics applications.
10 Clues: A communication network that provides digital data transmission services. • A network device that connects different networks and translates data between them. • A company known for its wireless networking solutions and enterprise Wi-Fi products. • A network system that connects and manages digital services within an aircraft cabin. • ...
Physical Networking - who am I 2022-05-09
Across
- I convert digital data signals into modulated analog signals suitable for transmission over analog telecommunication circuits. I'm what's used to get you internet with an internet service provider. Who am I?
- I don't need a keyboard or mouse.... all I need is the touch of a finger to work. I have many applications and I've very light weight and portable. I connect people via wireless connection.
- I'm a cable containing glass coated in plastic to send data by pulses of light. Who am I?
- I'm a technology for high-speed network or internet access over voice lines. I have various types to include asymmetric, high-bit-rate, symmetric, and very-high-bit-rate. Who am I?
- I'm a piece of computer hardware or software that provides functionality for other programs or devices, called "clients". I live to serve. Who am I?
- I connect people to the internet. I'm a machine or device that performs calculations and operations based on instructions provided by software or hardware program. My body parts consist of CPU, Motherboard, RAM, storage device, and a power supply. Who am I?
Down
- I can be a physical or virtual appliance that passes information between two or more packet-switched computer networks. I inspect a given data packet's destination IP address and calculate the best way for it to reach it's destination and then forward it accordingly. Who am I?
- I'm a high-speed device that receives incoming data packets and redirects them to their destination on a local area network (LAN). Who am I?
- I'm a node that broadcasts data to every computer or ethernet-based device connected to me. I'm not your friend if you want to keep secrets. Who am I?
- I'm a type of computer network device that provides interconnection between networks that use the same protocol. I work in the data link layer of the OSI model, connecting two different networks together and providing communication between them. The golden gate and I have the same last name. Who am I?
- I'm a company that provides connections and services to individuals and organizations in order for them to connect to the internet. Who am I?
- I'm a very popular type of cable that is used for wired networks. I'm used to connect devices located on a local area network, such as routers, PCs and switches. Who am I?
- I'm compact and portable. I connect people to the internet via wireless connection. I have a built in keyboard, mouse, and monitor. Who am I?
13 Clues: I'm a cable containing glass coated in plastic to send data by pulses of light. Who am I? • I'm a high-speed device that receives incoming data packets and redirects them to their destination on a local area network (LAN). Who am I? • ...
Chemical Bonds Crossword Puzzle 2021-12-02
Across
- Two or more atoms held together by covalent bonds.
- In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
- The bond that can hold atoms together in large networks or small groups.
- bonds that transfer electrons
Down
- A substance made of atoms of two or more elements.
- bonds that share electrons
- bond The bond that can hold atoms together in large networks or small groups.
- formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
8 Clues: bonds that share electrons • bonds that transfer electrons • Two or more atoms held together by covalent bonds. • A substance made of atoms of two or more elements. • The bond that can hold atoms together in large networks or small groups. • bond The bond that can hold atoms together in large networks or small groups. • ...
Chemical Bonds Crossword Puzzle 2021-12-02
Across
- Two or more atoms held together by covalent bonds.
- In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
- The bond that can hold atoms together in large networks or small groups.
- bonds that transfer electrons
Down
- A substance made of atoms of two or more elements.
- bonds that share electrons
- bond The bond that can hold atoms together in large networks or small groups.
- formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
8 Clues: bonds that share electrons • bonds that transfer electrons • Two or more atoms held together by covalent bonds. • A substance made of atoms of two or more elements. • The bond that can hold atoms together in large networks or small groups. • bond The bond that can hold atoms together in large networks or small groups. • ...
Chemical Bonds Crossword Puzzle 2021-12-02
Across
- Two or more atoms held together by covalent bonds.
- In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
- The bond that can hold atoms together in large networks or small groups.
- bonds that transfer electrons
Down
- A substance made of atoms of two or more elements.
- bonds that share electrons
- bond The bond that can hold atoms together in large networks or small groups.
- formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
8 Clues: bonds that share electrons • bonds that transfer electrons • Two or more atoms held together by covalent bonds. • A substance made of atoms of two or more elements. • The bond that can hold atoms together in large networks or small groups. • bond The bond that can hold atoms together in large networks or small groups. • ...
SCSU 2023-04-12
Across
- How many types of architecture is involved in cloud implementation?
- _____ transaction refers to any transaction that uses electronic medium.
- Out of the following, which cloud service offers virtual servers, storage disks and networks?
Down
- How many types of categories exist for digital wallets?
- A ________ network connects devices to the Internet or other networks using cables.
- Ransomware and Rootkit are:
- Apart from the Lock option, what other option can be used to lock your PC when you want to leave your device for a little while?
7 Clues: Ransomware and Rootkit are: • How many types of categories exist for digital wallets? • How many types of architecture is involved in cloud implementation? • _____ transaction refers to any transaction that uses electronic medium. • A ________ network connects devices to the Internet or other networks using cables. • ...
Eytomology Prefixs 2022-04-12
Across
- effect which throughly follows
- to give advance thought
- one who watches ove others
- a written agreement
- arrange for something to take place after time
Down
- to remove water from
- the distace around something
- feeling of hate or disapproval
- act of sending through a request
- something that carries across
- to get ready
- networks that exist between each other
12 Clues: to get ready • a written agreement • to remove water from • to give advance thought • one who watches ove others • the distace around something • something that carries across • feeling of hate or disapproval • effect which throughly follows • act of sending through a request • networks that exist between each other • arrange for something to take place after time
CompTIA Cloud+ Ch. 10 2025-01-06
Across
- Keeping cloud workloads separated for security.
- Giving users only the access they need.
- Unauthorized access to a system.
- Dividing networks to improve security.
- Security extensions for DNS.
Down
- Duplicate data stored for recovery.
- Recording events in a system.
- Web Application Firewall.
- Watching for suspicious activity.
- Rights granted to a user or role.
- Permissions to use resources.
- Isolated environment for testing.
12 Clues: Web Application Firewall. • Security extensions for DNS. • Recording events in a system. • Permissions to use resources. • Unauthorized access to a system. • Watching for suspicious activity. • Rights granted to a user or role. • Isolated environment for testing. • Duplicate data stored for recovery. • Dividing networks to improve security. • ...
Digital Tech Crossword 2021-10-12
Across
- a computer's memory that stores information used by programs
- a saved link to a web page
- using signals or information represented by a continuously variable physical quantity
- the process of converting electronic data to a unrecognizable form
- the processing unit that is responsible for preforming calculations and tasks that make programs work
- a extension that can be attached to a device for it to preform a function
- a type of program to be used for coding
Down
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks
- the part of a computer system or application that is not directly accessed by the user, typically responsible for storing and manipulating data.
- technology assistive, adaptive, and rehabilitative devices for people with disabilities
- a device that you can connect to other devices
- a system that connects computers and other devices that share a common communications line and wireless link
- a microprocessor that performs functions and calculations that makes your computer run
- a piece of code or data that is created from a web server and is stored on a user's computer
- to extract and decompress compressed files
- a range of frequencies within a given band, in particular that used for transmitting a signal
- data that is temporarily stored on your computer
17 Clues: a saved link to a web page • a type of program to be used for coding • to extract and decompress compressed files • a device that you can connect to other devices • data that is temporarily stored on your computer • a computer's memory that stores information used by programs • the process of converting electronic data to a unrecognizable form • ...
lio internet crossword puzzel 2013-03-26
Across
- page or another place on the same page.. INTERNETA global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- granting a legal right to a copyright holder or author which requires their
- a restricted computer network; a private network created using World Wide Web
- part of a computer system or network that is designed to block unauthorize
- USE The fair use doctrine provides educators with the right to make reasonable copies
- (HOST)Domain names come with different extensions of the web address based
Down
- person who secretly gains access to computer files.
- a reference to a published or unpublished source
- unauthorized use, reproduction, distribution, or transmission of copyrighted
- piece of writing that has been copied from someone else and is presented as SOCIAL NETWORKS online communities where people meet, socialize, exchange digital
10 Clues: a reference to a published or unpublished source • person who secretly gains access to computer files. • part of a computer system or network that is designed to block unauthorize • (HOST)Domain names come with different extensions of the web address based • granting a legal right to a copyright holder or author which requires their • ...
Cyber crossword 2022-12-06
Across
- The arrangement of the various elements (computers, routers, switches, etc) of a network.
- Analyze something without interfering or affecting it.
- A computer, typically one on a network.
- A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
Down
- The way an organization structures and organizes the information that is required by their employees and/or customers.
- An agreed-upon method for communication.
- Typically, the last two elements of a URL. With domain names, organizations can build URLs.
- ervice can have two meanings in computer terminology:
- A computer that delivers files forming web pages across a network to requesting clients.
- A starting point for data analysis. It is the initial data set used in later comparisons.
10 Clues: A computer, typically one on a network. • An agreed-upon method for communication. • ervice can have two meanings in computer terminology: • Analyze something without interfering or affecting it. • A computer that delivers files forming web pages across a network to requesting clients. • ...
Data Communication and Networking Terminologies 2023-02-06
Across
- designated resource manager of the network
- category of network with coaxial cable
- topology with redundancy
- topology with broadcast link
- 2 or more networks connected
- governs the way data is communicated
Down
- 2 or more devices connected for communication
- largest internetwork
- broadcast link
- one way data flow
10 Clues: broadcast link • one way data flow • largest internetwork • topology with redundancy • topology with broadcast link • 2 or more networks connected • governs the way data is communicated • category of network with coaxial cable • designated resource manager of the network • 2 or more devices connected for communication
ADSI Terms Sebastian Salazar 2022-02-11
Across
- A system of words, letters, or signs used to create programs, apps or web pages.
- person who writes computer programs.
- The rules that programming languages have for typing their codes right.
- collection of instructions that connect the hardware and tell a computer how to work.
- is the global system of interconnected computer networks.
- the part of an application that performs an essential task not apparent to the user.
Down
- Is the application of processes and controls with technologies to protect systems, networks, programs, devices and data from crackers or bad hackers.
- An image or set of images which displays the functional elements of a website, information system or an app.
- an organized collection of structured information, or data, typically stored electronically in a computer system.
- A computer program designed to help people perform an activity.
10 Clues: person who writes computer programs. • is the global system of interconnected computer networks. • A computer program designed to help people perform an activity. • The rules that programming languages have for typing their codes right. • A system of words, letters, or signs used to create programs, apps or web pages. • ...
ecommerce 1 2019-10-21
Across
- / worldwide network of computer networks built on common standards
- / Business model that offers users powerful search tools as well as an integrated package of content and services all in one place
- / Revenue model where a company provides a forum for advertisements and receives fees from advertisers
- / the discrete units into which digital messages are sliced for transmission over the Internet
- / involves using the Internet to enable individuals to collectively contribute money to support a project
Down
- / ___Provider. Business model that distributes information content, such as digital news, music, photos, video, and artwork
- / Value____. defines how a company’s product or service fulfills the needs of customers
- / ____ commerce. A means for consumers to sell to each other
- / phase in e-commerce evolution where mobile digital platform & social networks arise
- / unique features that allows for two-way communication between merchant and consumer
10 Clues: / ____ commerce. A means for consumers to sell to each other • / worldwide network of computer networks built on common standards • / phase in e-commerce evolution where mobile digital platform & social networks arise • / unique features that allows for two-way communication between merchant and consumer • ...
cy-rite crossword 2025-11-10
Across
- Response The process of identifying, managing, and recovering from a cybersecurity breach.
- Software that secretly collects user information without consent.
- Intelligence Information about potential or current attacks that helps organizations prepare for or respond to cyber threats.
- Malware disguised as legitimate software, used to trick users into installing it.
Down
- The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
- The process of converting encrypted data back into its original readable form.
- A method of guessing passwords or encryption keys by trying all possible combinations.
- A type of malware that attaches itself to a legitimate program or file and spreads to other systems.
- Breach An event where sensitive or confidential data is accessed, disclosed, or stolen without authorization.
- A self-replicating program that spreads through networks without user action.
10 Clues: Software that secretly collects user information without consent. • A self-replicating program that spreads through networks without user action. • The process of converting encrypted data back into its original readable form. • Malware disguised as legitimate software, used to trick users into installing it. • ...
Courtney Gilbert 2014-03-25
Across
- Personal Computer
- Collaborative website
- Programs designed to make users more productive
- Visual representation of nontext information
- room Permits users to chat online
- Worldwide collection of electronic documents
Down
- Informal website of time-stamped articles
- forum Message board
- Worldwide collection of networks that connects
- Notebook Computer
10 Clues: Personal Computer • Notebook Computer • forum Message board • Collaborative website • room Permits users to chat online • Informal website of time-stamped articles • Visual representation of nontext information • Worldwide collection of electronic documents • Worldwide collection of networks that connects • Programs designed to make users more productive
OWilkinson-Network Devices 2023-01-03
Across
- what filters network traffic between lan segments
- what device monitors all end devices to make sure they are compliant with all requirements end devices include laptops desktops servers and tablets
- what extends or regenerates weak data signals
- what switches are used in larger networks to configure VLAN and port security
- what connects end devices to the network
- what connects network devices like router and switches but also regenerate electrical signals
- what operation allows for malicious traffic to pass before it is addressed
- what system has Special purpose microchips that are programmed to carry out specific functions
- what device uses radio waves to communicate with wireless devices such as laptops and iPhones
- what determines if data is allowed access to a network segment
- what is a device that allows administrators to remotely manage many devices through one dashboard interface
Down
- What form of Ethernet Sends low voltage electricity down a networking cable to power devices
- what has all the power of wireless access points and switches but also uses IP addresses to send traffic to other networks
- what device is a collection point for cable runs from networking devices
- what system is no longer support but is still in use
- what device send specific data to only the necessary device
- what device combines the use of ids, idp and a firewall
- what form of Ethernet Sends data down power lines to networked devices
- what operation stops malicious traffic immediately
19 Clues: what connects end devices to the network • what extends or regenerates weak data signals • what filters network traffic between lan segments • what operation stops malicious traffic immediately • what system is no longer support but is still in use • what device combines the use of ids, idp and a firewall • what device send specific data to only the necessary device • ...
Computer network 2023-02-03
Across
- Network cables is a networking hardware used to connect one network device to other one or to connect two or more computers to share devices.
- A system placed to prevent any hackers , viruses and more. This is here to protect your computer.
- A network device that connects various networks.
- Messages being sent by an online resource from one electronic device to another.
- A server is a computer program or device
- A router is a physical or virtual appliance that passes information between two or more computer networks.
Down
- A wired network uses a cable to form the connections between different networked devices.
- Computers sharing resources located on or provided by network sources.
- A system of rules created to be followed in formal situations.
9 Clues: A server is a computer program or device • A network device that connects various networks. • A system of rules created to be followed in formal situations. • Computers sharing resources located on or provided by network sources. • Messages being sent by an online resource from one electronic device to another. • ...
Ishaan Singh's Puzzle 2025-05-19
Across
- connects two or more computers located at distant places they are linked by communication facilities like telecommunication or satellite signals.
- Certain sets of rules determining how data should be transferred over networks.
- topologies the layout in which the various components of a network like nodes, links peripherals, etc are connected and communicate with each other.
- Device that connects to different types of networks with each other.
- Network device that is used to connect all computers in a network with each other.
Down
- Transmits the message from the source computer to the destination Computer only by using the physical address.
- Wireless technology used to connect mobile phones, computers and printers.
- computer network that is mainly created for an individual person.
- Each computer in a network.
9 Clues: Each computer in a network. • computer network that is mainly created for an individual person. • Device that connects to different types of networks with each other. • Wireless technology used to connect mobile phones, computers and printers. • Certain sets of rules determining how data should be transferred over networks. • ...
Racunalne mreze 2021-03-18
9 Clues: Bežične mreže • Wide Area Network • Local Area Network • Personal Area Network • line communication PLC • Metropolitan Area Networks • Simple Mail Transfer Protoco • Transport Control Protocol/Internet • računalna arhitektura u kojoj su svi članovi mreže ravnopravni
mental health 2022-12-20
Across
- Obsessive Compulsive Disorder
- what people get stressed by
- Psychotic Disorder
- a complex set of emotions that makes you different
- how people feel
- one of the 5 stages of grief
- The ability of neural networks in the brain to change through growth and reorganization
Down
- felling sad all the time
- how people feel in certan situations
- extreme mood swings
- felling anxious all the time
- brain diteriorating
- how people cope with death and has 5 stages
- fear of missing out
- fears
15 Clues: fears • how people feel • Psychotic Disorder • extreme mood swings • brain diteriorating • fear of missing out • felling sad all the time • what people get stressed by • felling anxious all the time • one of the 5 stages of grief • Obsessive Compulsive Disorder • how people feel in certan situations • how people cope with death and has 5 stages • ...
Information Technology Era 2021-05-11
Across
- Connector that can transmit data to and from devices
- Knowledge obtained from reading
- Powerful multi-user computer
- Set of instructions and operations
- Automated assistant
- Performs millions of instructions per second
- Worldwide collection of networks
- Collection of data used for automated systems
- Delivers instructions using electronic devices
Down
- Program that executes instructions
- Collection of related web pages
- Network that uses radio signals
- Holds data, instructions, information
- Guidelines that govern online behavior
- Uses radio waves to connect to other devices
15 Clues: Automated assistant • Powerful multi-user computer • Collection of related web pages • Network that uses radio signals • Knowledge obtained from reading • Worldwide collection of networks • Program that executes instructions • Set of instructions and operations • Holds data, instructions, information • Guidelines that govern online behavior • ...
Ben 2014-11-10
Across
- all the things you can touch on a computer
- putting some thing from a website to a hard drive
- program such as safari
- a longer connection to people
- a measure of quality
- a the 1st page of a website
- being connected
Down
- Putting something from a drive to a website
- how good a picture looks
- Internet manners
- a group of connections
- box a box full of words
- a huge connections of networks
- machine instructions
- a connection to the internet
15 Clues: being connected • Internet manners • machine instructions • a measure of quality • a group of connections • program such as safari • box a box full of words • how good a picture looks • a the 1st page of a website • a connection to the internet • a longer connection to people • a huge connections of networks • all the things you can touch on a computer • ...
