networks Crossword Puzzles
Cybersecurity 2024-04-03
Across
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- Software designed to detect, prevent, and remove malicious software from computers.
- A malware that spreads through networks without human interaction.
Down
- A cybersecurity specialist who uses their skills to find and fix vulnerabilities in computer systems.
- A cyber-attack that floods a network or website with excessive traffic to disrupt service.
- A barrier that monitors and controls network traffic based on security rules.
- An online scam involving the impersonation of reputable entities to obtain sensitive personal information.
- A technology that secures connections over the internet, providing secure access to private networks.
8 Clues: A malware that spreads through networks without human interaction. • A barrier that monitors and controls network traffic based on security rules. • Software designed to detect, prevent, and remove malicious software from computers. • A cyber-attack that floods a network or website with excessive traffic to disrupt service. • ...
mental health 2022-12-20
Across
- The ability of neural networks in the brain to change through growth and reorganization
- extream mood swings
- things that make you stressed
- felling afraid
- felling sad all the time
- Psychotic Disorder
Down
- a type of dementia
- one of the 5 stages of grief
- fears
- obsesive compulsive disorder
- fear of missing out
- The study of how your behaviors and environment can cause changes that affect the way your genes work.
- brain detireorateing
- has 5 stages
- The ability of neural networks in the brain to change through growth and reorganization
15 Clues: fears • has 5 stages • felling afraid • a type of dementia • Psychotic Disorder • fear of missing out • extream mood swings • brain detireorateing • felling sad all the time • one of the 5 stages of grief • obsesive compulsive disorder • things that make you stressed • The ability of neural networks in the brain to change through growth and reorganization • ...
Unit 2: Computer Users 2021-03-14
Across
- Internet Relay Chat
- Copying from a client to the server
- sound
- World Wide Web
- files attach to email text messages.
- a typewriter device to input the data
- electronic mail
- example of peripherals
- File Transfer Protocol
Down
- Copying data from a larger server to a client
- ready-drawn graphic images that can be inserted into documents
- harmful programs
- move from webpage to webpage using a Web browser program
- The connection of networks throughout the world
14 Clues: sound • World Wide Web • electronic mail • harmful programs • Internet Relay Chat • example of peripherals • File Transfer Protocol • Copying from a client to the server • files attach to email text messages. • a typewriter device to input the data • Copying data from a larger server to a client • The connection of networks throughout the world • ...
Globalisation Berkand Henry 2013-11-22
Across
- complex prouction and trade systems
- All flows, networks make the world...
- place where you can switch between multiple scales of transport
- distribution of global products to a local scale
- exchange
- international investment
Down
- US *relocation* China
- process of saving time and money, containers
- general idea of relocating
- Paris London
10 Clues: exchange • Paris London • US *relocation* China • international investment • general idea of relocating • complex prouction and trade systems • All flows, networks make the world... • process of saving time and money, containers • distribution of global products to a local scale • place where you can switch between multiple scales of transport
Quality 2023-04-03
10 Clues: Catch forty winks • Greenish blue hue • CAT scan alternative • A golf course has 18 • what 5280 feet equals • Basic unit of all forms of life • Interruptions during TV programs • Final letter in the Greek alphabet • Board games has it in black and white • prefix involving computers or computer networks
Raman amplifier 2025-10-15
Across
- Common application in networks
- The effect used in Raman amplifier
- Noise generated in Raman amplifier
- Main advantage of Raman amplifier
- Type of Raman amplifier at discrete point
Down
- Type of amplification provided
- Raman gain depends on this parameter
- Source providing pump power
- Type of amplification used
- Medium used for amplification
10 Clues: Type of amplification used • Source providing pump power • Medium used for amplification • Common application in networks • Type of amplification provided • Main advantage of Raman amplifier • The effect used in Raman amplifier • Noise generated in Raman amplifier • Raman gain depends on this parameter • Type of Raman amplifier at discrete point
Azure Networking 2022-06-15
Across
- A virtual network's address space is divided into one or more of these
- Directly connects two Azure virtual networks together
- Encrypted connection between two endpoints allowing secure private communication over the public internet
Down
- Designed to distribute traffic to one or more resources based on rules
- A direct connection to the Microsoft network from an on-premises location
- Endpoint in Azure used to connect to other networks outside of Azure using private networking
- A tool to filter traffic to or from virtual machines and other resources based on ports and IP addresses
- Resource attached to a virtual machine to provide connectivity to a virtual network
8 Clues: Directly connects two Azure virtual networks together • Designed to distribute traffic to one or more resources based on rules • A virtual network's address space is divided into one or more of these • A direct connection to the Microsoft network from an on-premises location • Resource attached to a virtual machine to provide connectivity to a virtual network • ...
Seflie crosswords 2022-11-30
Across
- To identify someone on a picture
- A synonym for "search"
- A synonym for "subscriber"
- A synonym for "show off"
- A picture or painting you make of yourself
- An antonym for "more"
- A synonym for "looks"
- A synonym for "weird"
- When something is everywhere
Down
- When something happens very fast, instantly
- A synonym for "modify"
- An antonym for "real"
- A link with another person
- A synonym for "post online"
- Good opinion about yourself
- A positive opinion on social networks
- A synonym for "superficial"
- A synonym for "increase"
18 Clues: An antonym for "real" • An antonym for "more" • A synonym for "looks" • A synonym for "weird" • A synonym for "modify" • A synonym for "search" • A synonym for "show off" • A synonym for "increase" • A link with another person • A synonym for "subscriber" • A synonym for "post online" • Good opinion about yourself • A synonym for "superficial" • When something is everywhere • ...
Networking: Chapter 1 2020-09-15
Across
- cable that has glass or plastic core
- is the computer's name
- device attached to the network capable of processing data
- this cable is made with plastic or synthetic insulation
- 2 or more lans connected within same geographical area
- in a peer to peer network computers are considered _____
- routes data packages using TCP/IP
- provides communication between different operating systems
- set of rules governing communication between devices
- uses centralized administration
- interconnected collection of computer/equipment
- large number of networks in many geographical areas
- 2 or more star topologies connected together by a common backbone
- losing access to files when network is down
- this is one advantage of network
- cables running from each node to connect to a single point
- controls network traffic
- each node is connected to every other node
Down
- a server used for one thing only
- provides internet communication
- consists of a single cable that runs continuously from node to node
- requires driver to communicate with other computer hardware
- person in charge of network access
- is a unique identifier of a network interface card
- peer to peer networks are often referred to as _______
- uses decentralized administration
- example of network equipment
- improves data delivery speed
- data is divided into smaller _____
- network usually confined to a single building
- this network has no designated server
- example of a wide area network
- uses a single cable or conductor to connect all nodes
- this converter connects ethernet copper core cable to fiber optic cables
- name for a centralized computer
- provides multiple duties like access to files
36 Clues: is the computer's name • controls network traffic • example of network equipment • improves data delivery speed • example of a wide area network • provides internet communication • uses centralized administration • name for a centralized computer • a server used for one thing only • this is one advantage of network • uses decentralized administration • ...
crossword 2023-08-30
Across
- Area Network (WAN):A network type that covers a large geographical area, often spanning cities or countries.
- Topology;The practice of distributing network traffic across multiple servers to improve performance
- Topology :A network topology where devices are connected in a circular chain.
- network protocol that allows you to remotely log into another computer.
- The maximum amount of data that can be transmitted over a network in a given time.
- (Post Office Protocol 3):A network protocol used for viewing web pages on the interne
- Mesh Topology:A network requirement that prevents unauthorized access to sensitive data
- A network topology that's suitable for large-scale networks due to its scalability.
- Topology:A network requirement that ensures data is accessible to authorized users when needed.
- process of converting data into a secret code to protect it during transmission
- device that connects multiple networks together and directs data traffic between them
Down
- network requirement that guarantees data arrives at its intended destination
- measure of how much data can be transmitted over a network connection with minimal delay
- practice of designing a network to handle potential future growth in terms of users or data..
- process of breaking down data into smaller packets for transmission.
- network topology where devices are connected in a random, non-hierarchical arrangement
- : The maximum amount of data that can be transmitted over a network in a given time
- maximum amount of data that can be transmitted over a network in a given time
- Address:The unique address assigned to each device on a network.
- network type that uses wireless signals for communication.
20 Clues: network type that uses wireless signals for communication. • Address:The unique address assigned to each device on a network. • process of breaking down data into smaller packets for transmission. • network protocol that allows you to remotely log into another computer. • network requirement that guarantees data arrives at its intended destination • ...
The Global Politics of Drug Trafficking 2024-11-20
Across
- Process of turning people into property and denying them bodily autonomy
- Stereotypical traits include being authoritative, violent, loyal, and emotionless
- Colombian drug lord known as “La Madrina” (The Godmother)
- Taking land by force or manipulation to hide illicit activities and maximize profits
- Core motive behind illicit markets
- Most common and preferred currency by drug traffickers
- Capitalism driven by the illicit drug trade
- “____ of coercion” are contexts where multiple power structures (including states and cartels) jointly control coercion and regulate social order.
- Illicit drug trade involving organized crime networks
- The process of making new borders or territories
- Most trafficked drug from Latin America
- Indigenous networks of cooperation beyond local communities to deter narcos
- Political identity that is created through colonization and the denial of sovereignty
- Transportation routes over ungoverned, less regulated areas, often exploited for illicit trade
Down
- U.S. government campaign against drug trafficking that started in the 1980s
- Political and economic philosophy favoring privatization
- Alternative systems of governance created by criminal organizations that function alongside the states
- Criminal organizations utilize existing ____, including military organizations, banks, and ports.
- Laws that forbid the production and possession of certain commodities
- To possess the authority to establish rules and the exceptions to them
- A feeling people desire that can motivate involvement in cartels, sports teams, political groups, etc
- Country that is the largest cocaine exporter
- Infamous leader of the Sinaloa Cartel
- Most notorious drug lord who was listed in Forbes’ top 10 richest people in the 1980s
- Mexican music genre that tells stories of drug traffickers
25 Clues: Core motive behind illicit markets • Infamous leader of the Sinaloa Cartel • Most trafficked drug from Latin America • Capitalism driven by the illicit drug trade • Country that is the largest cocaine exporter • The process of making new borders or territories • Illicit drug trade involving organized crime networks • ...
electronics 2024-08-22
Across
- Cryogenically cooled transistor.
- Adaptive optical signal path.
- Nanoscale grid for precise measurements.
- Error-correcting code for superconducting circuits.
Down
- Edge computing unit in fog networks.
- Brain-inspired neuromorphic architecture.
- Metamaterial-based advanced antenna.
- Electron spin wave for data transfer.
- Unpredictable signal phase shifts.
- A multi-state quantum information unit.
10 Clues: Adaptive optical signal path. • Cryogenically cooled transistor. • Unpredictable signal phase shifts. • Edge computing unit in fog networks. • Metamaterial-based advanced antenna. • Electron spin wave for data transfer. • A multi-state quantum information unit. • Nanoscale grid for precise measurements. • Brain-inspired neuromorphic architecture. • ...
FAKE NEWS, ΠΝΕΥΜΑΤΙΚΑ ΔΙΚΑΙΩΜΑΤΑ & ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΎ 2025-03-31
Across
- Η πνευματική ιδιοκτησία
- να απτοελουν προπαγάνδα
- Η εγκατάσταση παράνομου λογισμικού
- Έτσι ονομάζεται το το δικαίωμα
Down
- Τα ομότιμα δίκτυα διαμοιρασμού αρχείων
- Οι ψευδείς πληροφορίες που
- το κακόβουλο λογισμικό ονομάζετε...
- διαδίκτυο δεν είναι...
- αποκτά κάποιος σε ένα πρωτότυπο δημιούργημά
- Όλες οι πληροφορίες που καταχωρίζονται
10 Clues: διαδίκτυο δεν είναι... • Η πνευματική ιδιοκτησία • να απτοελουν προπαγάνδα • Οι ψευδείς πληροφορίες που • Έτσι ονομάζεται το το δικαίωμα • Η εγκατάσταση παράνομου λογισμικού • το κακόβουλο λογισμικό ονομάζετε... • Τα ομότιμα δίκτυα διαμοιρασμού αρχείων • Όλες οι πληροφορίες που καταχωρίζονται • αποκτά κάποιος σε ένα πρωτότυπο δημιούργημά
CROSSWORD 2023-04-08
Across
- the Virtual assistant created by Amazon and launched in 2015.
- technology that uses machine learning algorithms to identify and match human faces in images and videos.
- brand known for their autonomous vehicle research
- use of telecommunications technology to provide medical care at a distance.
- term used to describe large and complex datasets that are difficult to manage and analyze using traditional data processing methods
- use of game design elements, such as points, badges, and leaderboards, to enhance engagement and motivation in learning.
- driver assist system
Down
- refers to the use of technology to improve and automate financial services.
- vehicle that can operate without human intervention, also known as a self-driving car.
- is a device module, or system used in electronic gadgets and materials to detect events and changes.
- practice of protecting computer systems and networks from unauthorized access, theft, and damage
- sequencing process of determining the complete DNA sequence of an individual's genome.
- a company that crated the virtual assistant called Cortana
- a virtual assistant created by Apple
- a subfield of machine learning concerned with algorithms inspired by the structure and function of the brain called artificial neural networks.
15 Clues: driver assist system • a virtual assistant created by Apple • brand known for their autonomous vehicle research • a company that crated the virtual assistant called Cortana • the Virtual assistant created by Amazon and launched in 2015. • refers to the use of technology to improve and automate financial services. • ...
Technology words 2023-05-08
Across
- the strength and vitality required for sustained physical or mental activity.
- A ____ is a finite sequence of rigorous instructions
- A _____ is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically
- A group of two or more devices or nodes that can communicate
- includes the physical parts of a computer
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- a set of computer programs associated documentaton and data.
- used to protect data from being stolen, changed, or compromised
- major focuses on computer programming, embedded systems, networks, telecommunications, computer systems, computer investigations and cyber operations.
- an interdisciplinary branch of computer science and engineering
- an online video game developed by Epic Games and released in 2017.
Down
- a computer system designed to make decisions and perform actions autonomously.
- expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.
- an engineering discipline concerned with the study, design, and application of equipment, devices, and systems which use electricity, electronics, and electromagnetism.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
15 Clues: includes the physical parts of a computer • A ____ is a finite sequence of rigorous instructions • A group of two or more devices or nodes that can communicate • a set of computer programs associated documentaton and data. • used to protect data from being stolen, changed, or compromised • an interdisciplinary branch of computer science and engineering • ...
Cyber Ethics,Class 8 2025-06-14
Across
- When someone lies or tricks others to get money, property, or an unfair advantage.
- A set of rules and proper behavior expected from individuals when interacting with other users online.
- Tye act of using someone else's words, ideas, or work without giving proper credit.
- Harmful software designed to damage, disrupt, or gain unauthorized access to computers, networks, or data.
- A cyber attack that tricks people into sharing personal information by pretending to be a trusted source.
- When someone takes a website name that belongs to someone else.
- Any illegal activity that involves a digital device to harm, steal, or disrupt.
Down
- The act of using digital platforms to harass, threaten, or intentionally harm someone emotionally or socially.
- Individual pieces of information.
- A cyber attack that takes users to fake websites to steal personal information.
- Keeping digital systems, data, and online activities safe from threats like hacking, viruses, or theft.
- When someone uses technical skills to get into a system or network without permission, often to control, steal, or disrupt data.
- The right to keep your personal information, actions, or space protected from others' access or interference.
- A type of malicious software that spreads itself through networks without needing to attach to other programs.
- A global network that connects computers and allows people to share information and communicate.
15 Clues: Individual pieces of information. • When someone takes a website name that belongs to someone else. • A cyber attack that takes users to fake websites to steal personal information. • Any illegal activity that involves a digital device to harm, steal, or disrupt. • When someone lies or tricks others to get money, property, or an unfair advantage. • ...
Company Organization 2023-12-10
10 Clues: charity • job losses • the top executive • group of directors • part of a larger company • working for himself/herself • you can buy shares in this company • someone who has invested in a company • something to do with computers and networks • another name for the Human Resources department
puzzle 2024-08-23
Across
- - Error-correcting code for superconducting circuits.
- - Nanoscale grid for precise measurements.
- - Edge computing unit in fog networks.
- - A multi-state quantum information unit.
- - Cryogenically cooled transistor.
- - Unpredictable signal phase shifts.
Down
- - Brain-inspired neuromorphic architecture.
- - Metamaterial-based advanced antenna.
- - Electron spin wave for data transfer.
- - Adaptive optical signal path.
10 Clues: - Adaptive optical signal path. • - Cryogenically cooled transistor. • - Unpredictable signal phase shifts. • - Metamaterial-based advanced antenna. • - Edge computing unit in fog networks. • - Electron spin wave for data transfer. • - A multi-state quantum information unit. • - Nanoscale grid for precise measurements. • - Brain-inspired neuromorphic architecture. • ...
Akatsuki 2025-01-16
Across
- Processes instructions in a computer
- Styles web page layouts and designs
- Renders graphics and images
- Wired network connection
- Protects networks from unauthorized access
Down
- Temporary storage for quick data retrieval
- Directs network traffic between devices
- Markup language for web pages
- Temporary memory for fast data access
- Interface for software communication
10 Clues: Wired network connection • Renders graphics and images • Markup language for web pages • Styles web page layouts and designs • Processes instructions in a computer • Interface for software communication • Temporary memory for fast data access • Directs network traffic between devices • Temporary storage for quick data retrieval • Protects networks from unauthorized access
Data Communication 2024-07-18
9 Clues: Data protection • Format of the data • Network of networks • One way communication • Information to be transferred • Set of rules for data transfer • To connect two or more subnets • Network for an office or laboratory • Device for connecting multiple devices
xg productions/fox alternative entertainment 2021-05-15
Across
- epstein productions/columbia pictures television
- channel/itvs/black public media/wnet thirteen/pbs
- special projects
- studios
- productions/fuzzy door productions/20th century fox television
- goodson productions/lbs communications
- utah/pbs/world channel
- media/northern california public media
- ink/20th television/fxp/fx networks
- story up/maceo lyn/soundspeedz productions/hbo
Down
- films/hbo
- pictures/sonar entertainment
- productions/fox alternative entertainment
- pictures/skyemac productions/tall baby/cbs studios/warner bros television
- tristar international distribution
- productions/fuzzy door productions/20th century fox television
- east
- television/sony pictures television international
- media distribution/bell media studios original programming
19 Clues: east • studios • films/hbo • special projects • utah/pbs/world channel • pictures/sonar entertainment • tristar international distribution • ink/20th television/fxp/fx networks • goodson productions/lbs communications • media/northern california public media • productions/fox alternative entertainment • story up/maceo lyn/soundspeedz productions/hbo • ...
Cross Word Puzzle 2025-10-15
Across
- -A person who breaks into computer systems
- -Performance metric
- -Database Query Language
- – Deriving a new class from an existing one
- -secret word for access
- -connects different networks
- -Starting function in C
- -conversational program
Down
- -filters network traffic
- -Wide Area Network
- - A named location in memory used to store data
- -Converting data into code
- – Tool used to find and fix programming errors
- -Popular open source programming language, version 3.13 released in 2025
- -Microsoft Operating System
- – Step by step logical procedure to solve a problem
- -Nasty software that harms your device
- -Microsoft’s AI Assistant
18 Clues: -Wide Area Network • -Performance metric • -secret word for access • -Starting function in C • -conversational program • -filters network traffic • -Database Query Language • -Microsoft’s AI Assistant • -Converting data into code • -Microsoft Operating System • -connects different networks • -Nasty software that harms your device • -A person who breaks into computer systems • ...
mental health 2022-12-20
Across
- The ability of neural networks in the brain to change through growth and reorganization
- extream mood swings
- things that make you stressed
- felling afraid
- felling sad all the time
- Psychotic Disorder
Down
- a type of dementia
- one of the 5 stages of grief
- fears
- obsesive compulsive disorder
- fear of missing out
- The study of how your behaviors and environment can cause changes that affect the way your genes work.
- brain detireorateing
- has 5 stages
- The ability of neural networks in the brain to change through growth and reorganization
15 Clues: fears • has 5 stages • felling afraid • a type of dementia • Psychotic Disorder • fear of missing out • extream mood swings • brain detireorateing • felling sad all the time • one of the 5 stages of grief • obsesive compulsive disorder • things that make you stressed • The ability of neural networks in the brain to change through growth and reorganization • ...
Tech. Words... from Clint 2012-04-02
Across
- Has part of the word "pirate" in it
- What the romans used to trick troy
- It's getting hot in here
- For example, Myspace
- "Fishing for credit cards"
- You have to have good etiquette, even online
- something you can eat
- A terrible tasting meat
Down
- Totally free cloths that you can wear
- Likes tunneling in dirt
- cough, hack... twitter...
- Can make something sick
12 Clues: For example, Myspace • something you can eat • Likes tunneling in dirt • Can make something sick • A terrible tasting meat • It's getting hot in here • cough, hack... twitter... • "Fishing for credit cards" • What the romans used to trick troy • Has part of the word "pirate" in it • Totally free cloths that you can wear • You have to have good etiquette, even online
2013 to be great for English students (2nd January, 2013) 2013-01-09
Across
- Formal determination, will or goal
- online world of networks and especially the Internet
- an increase in amount, magnitude, or degree
- small of its kind or in amount
Down
- toward a decline in business and economic activity
- to be uncertain
- to feel curiosity
- predictors
- to release, catapult, or put in operation
- to expand
- to to hold to something firmly
- to free of excess matter
12 Clues: to expand • predictors • to be uncertain • to feel curiosity • to free of excess matter • small of its kind or in amount • to to hold to something firmly • Formal determination, will or goal • to release, catapult, or put in operation • an increase in amount, magnitude, or degree • toward a decline in business and economic activity • ...
The 1920's 2013-02-27
Across
- Lifestyle for women in the 1920's
- Armstrong
- Motors
- Hughes
- A time when Alcohol was banned
- The right to vote
Down
- Important Invention that helped to store food
- One of the first Major radio networks
- White Supremacist Group
- The fear of a rise of Communism
- favored status for certain established inhabitants of a nation
- First automobile company to introduce an 8-hour workday
12 Clues: Motors • Hughes • Armstrong • The right to vote • White Supremacist Group • A time when Alcohol was banned • The fear of a rise of Communism • Lifestyle for women in the 1920's • One of the first Major radio networks • Important Invention that helped to store food • First automobile company to introduce an 8-hour workday • ...
Tier 3 words - Crossword 2025-11-14
Across
- process uses machines to do the work instead of people.
- proccess of making a decision
- to assess
- talking
- a system with interconnected people or items
- numbers and statstics
Down
- a way to solve a multiplication question
- ordered list
- claim something is true
- scientific
- are sent from one place to another, using wires, radio waves, or satellites
11 Clues: talking • to assess • scientific • ordered list • numbers and statstics • claim something is true • proccess of making a decision • a way to solve a multiplication question • a system with interconnected people or items • process uses machines to do the work instead of people. • are sent from one place to another, using wires, radio waves, or satellites
Operating Systems and Networks 1B 2023-11-09
Across
- Three ways that computers can be ___ together are WiFi, Wired, and 3G/4G.
- ____files can help you find them quickly and efficiently.
- File _____is a file management application used for accessing and organizing files.
- An __ system is software that manages how hardware and software work together and talk to each other.
- The ____ is the largest WAN in the world.
- A ___covers a much larger area than a Local Area Network.
- A ___ is a computer that is dedicated to provide a certain service and manage resources.
- A file ____ tells the computer what type of program it needs to open, view, print, or edit a particular file.
Down
- A _____ network is a network of computers that share resources but also share equal control over resources.
- crispacademy.com is an example of a ___ name.
- _____are workstations that are connected to a network.
- The device that serves as a gateway to transfer data between networks is called a ____.
- In a ___ computers are located close together.
- A ___is a group of computers that are connected together in order to share resources and information quickly and efficiently.
- An example of an ___ is 69.147.76.876
15 Clues: An example of an ___ is 69.147.76.876 • The ____ is the largest WAN in the world. • crispacademy.com is an example of a ___ name. • In a ___ computers are located close together. • _____are workstations that are connected to a network. • ____files can help you find them quickly and efficiently. • A ___covers a much larger area than a Local Area Network. • ...
U03 - LO1 - Keywords - 1 2024-01-26
Across
- A method of gaining unauthorised access to a computer system/network.
- (5,4,3,6) the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.
- (6,6) An individual who uses existing computer scripts or codes to hack into computer systems. They do not have the expertise to write their own code.
- (6,11) Hackers use this non-technical method to access computer systems/networks without authorisation. It involves fooling people into breaking normal security procedures, such as guarding their passwords and relies on manipulating the good nature of individuals.
- Individuals or organisations that target computer systems/networks illegally.
Down
- Is a weakness in a computer system/network that can be exploited by a threat, for example, out of date anti-malware software can result in the threat of a malware attack. If a computer system/network’s vulnerabilities can be found and dealt with, this will help to minimize threats and risks.
- An individual who gains unauthorised access to computer system/network for social or political purposes.
- (5,8) An individual who commits illegal activities using computers and the Internet.
- (5,8) Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.
9 Clues: A method of gaining unauthorised access to a computer system/network. • Individuals or organisations that target computer systems/networks illegally. • (5,8) An individual who commits illegal activities using computers and the Internet. • An individual who gains unauthorised access to computer system/network for social or political purposes. • ...
Digital Literacy and Responsibility 2014-10-21
Across
- Using technology to harm others through deliberate, repeated, and hostile attacks
- Computer or network has been broken into without permission
- Service that allows for sending media through a cell phone
- Use of letters and punctuation in a message that indicates an emotion
- Website that acts as a journal
- Software created for particular task
- Providing the specific source of the material
- Address of numbers indicating the location of a computer service
- Software designed to harm a computer
- One present but not taking part in a situation or event
- Addiction to dependence on the use of cell phone, computers, and internet
- Area which a service provider offers it communication service
- Personal jugement préjudice
- Electronic mail sent between computer networks
- zone Area where there is no cell phone service
Down
- package What your service pervader charges you for using internet
- Global network which links smaller computer networks together
- Program used to display information (ex. slideshow)
- Something you can add to a software application to enhance its abilities
- Property created from an original thought or idea
- Computer system that stores enormous amounts of data
- Act of sending inappropriate sexual material
- Carries out the functions in a computer
- Receiving data from a server or computer system
- Computer software that displays advertisements
- Physical parts of a computer
- Exclusive rights given to someone who creates original work
- Offering reason to be believed
- Device or program used for reading electronic books
- name Type of internet address for such as .gov, .edu, .com
30 Clues: Personal jugement préjudice • Physical parts of a computer • Website that acts as a journal • Offering reason to be believed • Software created for particular task • Software designed to harm a computer • Carries out the functions in a computer • Act of sending inappropriate sexual material • Providing the specific source of the material • ...
Concepts in Network Requirements 2024-08-15
Across
- a computer or system that provides resources, data, or services to other computers, known as clients, over network
- a type of network that extends over large geographical areas, such as cities or countries
- a network device that connects multiple devices and filters and forwards data to its destination
- an acronym for the hardware component that connects a computer to a network
- the basic communication protocol of the internet that allows devices to connect and communicate
- a device that forwards data packets between computer networks
- the process of converting information into a code to prevent unauthorised access
- a private network that extends across a public network, allowing users to send and receive data securely
- the time delay in transmitting data across a network
- a smaller, segmented piece of a larger network
- a type of network that operates within a small geographical area, like a building or a campus
- the physical or logical arrangement of a networks components
- the ability of a network to consistently perform its functions without failure
Down
- the inclusion of extra components in a network to ensure continued operation in case of failure
- the maximum rate at which data can be transmitted over a network
- the ability of a network to handle growth without sacrificing performance
- the actual rate at which data is successfully transmitted over a network
- the ability of different systems and devices to work together within a network
- a network security device that monitors and controls incoming and ongoing network traffic
- abbreviation for a system that prioritises certain types of network traffic
20 Clues: a smaller, segmented piece of a larger network • the time delay in transmitting data across a network • the physical or logical arrangement of a networks components • a device that forwards data packets between computer networks • the maximum rate at which data can be transmitted over a network • ...
tech terms 2023-05-03
Across
- portable document format
- a printed circuit board containing the principles of the system.
- copy of data to another computer
- a set of programs that helps to communicate with the entire server.
- the address that every device on the internet is given
- a method of which information is turned into secret code.
- a type of computer system that stores permanent information that can only be read to not written too
- to start or restart
- defines the meaning of structure of the web
- something that contains information on a computer
- the computer simulation that is a 3 dimensional environment that is interactable with
- system of computer networks
Down
- eight bits
- creations of mind/intentions.
- something that proteccts against harmful software
- pieces of data
- a million bytes
- all the public websites and pages
- harmful software
- turns domain names into ip addresses
- a computer or computer program that manages centralized resources.
- small piece of data
- short term memory where data is stored as the processorROM:a type of computer system that stores permanent information that can only be read to not written too
- manages traffic between networks
- something that supports the functions of the computer
- computer language that consist of binary or hexigonal instructions
- provides you with interent access
- something that connect computer to a server
- a website that is updated regularly by the person of the site.
- person information or personally identifiable information related to that person.
- the address given to a device that goes on the internet
31 Clues: eight bits • pieces of data • a million bytes • harmful software • small piece of data • to start or restart • portable document format • system of computer networks • creations of mind/intentions. • copy of data to another computer • manages traffic between networks • all the public websites and pages • provides you with interent access • turns domain names into ip addresses • ...
crossword 2023-08-30
Across
- Area Network (WAN):A network type that covers a large geographical area, often spanning cities or countries.
- Topology;The practice of distributing network traffic across multiple servers to improve performance
- Topology :A network topology where devices are connected in a circular chain.
- network protocol that allows you to remotely log into another computer.
- The maximum amount of data that can be transmitted over a network in a given time.
- (Post Office Protocol 3):A network protocol used for viewing web pages on the interne
- Mesh Topology:A network requirement that prevents unauthorized access to sensitive data
- A network topology that's suitable for large-scale networks due to its scalability.
- Topology:A network requirement that ensures data is accessible to authorized users when needed.
- process of converting data into a secret code to protect it during transmission
- device that connects multiple networks together and directs data traffic between them
Down
- network requirement that guarantees data arrives at its intended destination
- measure of how much data can be transmitted over a network connection with minimal delay
- practice of designing a network to handle potential future growth in terms of users or data..
- process of breaking down data into smaller packets for transmission.
- network topology where devices are connected in a random, non-hierarchical arrangement
- : The maximum amount of data that can be transmitted over a network in a given time
- maximum amount of data that can be transmitted over a network in a given time
- Address:The unique address assigned to each device on a network.
- network type that uses wireless signals for communication.
20 Clues: network type that uses wireless signals for communication. • Address:The unique address assigned to each device on a network. • process of breaking down data into smaller packets for transmission. • network protocol that allows you to remotely log into another computer. • network requirement that guarantees data arrives at its intended destination • ...
Module 6 Puzzle 2021-09-29
Across
- Do this to all unneeded programs/software
- Hackers who hack only for legal/ethical purposes
- This should be done to large networks to break them up into more manageable networks.
- The six Ps of security are: ports, patch, _____, probe, policies, & physical
- The process to look for vulnerabilites on a network
- One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
- A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
- Using interpersonal skills to extract information about a computer system and its security
- preferred location for storing backups
- To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
Down
- one of the most prestigious certifications for networking professionals
- A numerical designation for a connection point on a computer
- Someone who attempts to compromise a system to assess its vulnerability
- A reference to how long a user has used a password
- Searching through trash looking for information that might be useful in hacking or identity theft
- checking a target machine to see what ports are open
- The minimum frequency for system probing and audits
- A hacker who hacks into systems to accomplish some goal that they feel is valid and legal
- Perform system patches, probe for flaws, check logs, and review policies
- The most basic rule of computer security is to install these as soon as they are available
20 Clues: preferred location for storing backups • Do this to all unneeded programs/software • Hackers who hack only for legal/ethical purposes • A reference to how long a user has used a password • The minimum frequency for system probing and audits • The process to look for vulnerabilites on a network • checking a target machine to see what ports are open • ...
Chapter 9 - Securing Network Media and Devices 2025-05-21
Across
- Interference from radio signals that affect network performance.
- A wireless attack that forces devices off a network by spoofing disconnect signals.
- Marking physical locations to indicate open wireless networks.
- The name that identifies a wireless network to users.
- A strong encryption standard widely used to secure wireless and data communication.
- An unauthorized wireless access point connected to a secure network.
- A type of attack that exploits weaknesses in WEP’s initialization vectors.
- A wireless security protocol designed to replace WEP.
- An outdated and insecure wireless encryption protocol.
- A fake wireless access point set up to mimic a legitimate one for spying.
- Sending unsolicited messages over Bluetooth to nearby devices.
- A shared password used to access a secured wireless network.
- An initial user profile with preset credentials, often a security risk if unchanged.
Down
- An enclosure that blocks electromagnetic signals from entering or leaving.
- A setting that prevents wireless clients from communicating with each other.
- Gaining higher access rights than originally permitted to perform unauthorized actions.
- A hidden way to bypass normal authentication and gain access to a system.
- Intercepting phone or network communication without permission.
- A method of allowing or denying devices based on their MAC addresses.
- Leaked electromagnetic signals that could be captured and exploited.
- An older encryption protocol used with WPA that adds per-packet key mixing.
- Interference caused by electromagnetic signals that disrupt data transmission.
- Illegally accessing data from a Bluetooth-enabled device without permission.
- Driving around to detect unsecured wireless networks.
- A secure method for transmitting classified information through a network.
25 Clues: The name that identifies a wireless network to users. • A wireless security protocol designed to replace WEP. • Driving around to detect unsecured wireless networks. • An outdated and insecure wireless encryption protocol. • A shared password used to access a secured wireless network. • Marking physical locations to indicate open wireless networks. • ...
Technovation -Play & Conquer 2025-08-20
Across
- Numerical identifier uniquely assigned to each device in a network
- ML technique grouping data points with similar properties
- Statistical technique modeling relationships between dependent and independent variables
- Iterative approach to adaptive software development
- Integration of software development and IT operations practices
- Cyberattack where attackers trick users into revealing sensitive information
- Protocol for secure authorization in web applications
- ML method for testing model performance using multiple train-test splits
- NLP process of splitting text into smaller meaningful units like words or phrases
- NLP process of reducing words to base form using vocabulary and grammar
- Ensemble learning algorithm using multiple decision trees for classification
- Self-replicating malware that spreads across networks
- NLP technique reducing words to their root form (e.g., running → run)
- Network security system that monitors and controls traffic
- Device that forwards data packets between networks
Down
- On-demand availability of computing resources over the internet
- Malicious software that secretly monitors user activity
- Lightweight data-interchange format widely used in web APIs
- Extremely large datasets requiring advanced analysis techniques
- Malware disguised as legitimate software but performing harmful actions
- ML condition where a model is too simple to capture patterns in data
- Ensemble ML technique combining weak learners into strong predictors
- Hierarchical system mapping human-readable names to IP addresses
- ML paradigm where an agent learns through trial and reward feedback
- Process of discovering hidden patterns in large datasets
- Open-source library widely used for deep learning and ML applications
- Distributed and immutable ledger enabling secure transactions
27 Clues: Device that forwards data packets between networks • Iterative approach to adaptive software development • Protocol for secure authorization in web applications • Self-replicating malware that spreads across networks • Malicious software that secretly monitors user activity • Process of discovering hidden patterns in large datasets • ...
crossword 2021-09-01
10 Clues: rebooting a device • domain name system • what does ap stand for • where you connect a device • plain old telephone service • also known as a web browser • a device that networks traffic • smallest part of a graphic image • device that blocks unauthorized users • restarting a computer that is turned on
world history 2.1, 2.2, 2.3 2023-10-05
Across
- networks for transportation
- general with absolute power
- a person who seeks knowledge of God through devotion or meditation
- the physical geography of a place
Down
- a regional variation in language
- money in circulation
- a wealthy landowner
- the characteristics of a particular population
- noble warriors (vassals)
- a lower class citizen
10 Clues: a wealthy landowner • money in circulation • a lower class citizen • noble warriors (vassals) • networks for transportation • general with absolute power • a regional variation in language • the physical geography of a place • the characteristics of a particular population • a person who seeks knowledge of God through devotion or meditation
Company Organisation 2024-09-19
10 Clues: charity • job losses • the top executive • a group of directors • working for yourself • a level of the company • a person working in a company • a company controlled by another company • someone who has invested in the company • something to do with computers and networks
mental health 2022-12-20
Across
- The ability of neural networks in the brain to change through growth and reorganization
- extream mood swings
- things that make you stressed
- felling afraid
- felling sad all the time
- Psychotic Disorder
Down
- a type of dementia
- one of the 5 stages of grief
- fears
- obsesive compulsive disorder
- fear of missing out
- The study of how your behaviors and environment can cause changes that affect the way your genes work.
- brain detireorateing
- has 5 stages
- The ability of neural networks in the brain to change through growth and reorganization
15 Clues: fears • has 5 stages • felling afraid • a type of dementia • Psychotic Disorder • fear of missing out • extream mood swings • brain detireorateing • felling sad all the time • one of the 5 stages of grief • obsesive compulsive disorder • things that make you stressed • The ability of neural networks in the brain to change through growth and reorganization • ...
Bullying 2023-10-01
Across
- threatening or insulting someone using smartphones and social networks
- a person who has been attacked or hurt
- opposite of send a text message
- call names
- someone who witnesses bullying but doesn’t react
- nasty
Down
- freak
- can be physical, verbal or social
- make fun of
- a knife or a gun
- shove
- menace, intimidate
- someone who always fails
- someone who makes fun of others, calls them names or hits them on a regular basis
14 Clues: freak • shove • nasty • call names • make fun of • a knife or a gun • menace, intimidate • someone who always fails • opposite of send a text message • can be physical, verbal or social • a person who has been attacked or hurt • someone who witnesses bullying but doesn’t react • threatening or insulting someone using smartphones and social networks • ...
computer and social networks 2013-05-28
11 Clues: Verify • Publish • Switch on • Divide and receive • Relations between people • Give the latest information • Group related in a community • Programing electronic machine • Personal description of someone • Transfer data or programs to a computer • Website containing the writer's experience
Networks and The Internet 2022-10-03
Across
- short for "Modulator-Demodulator." It is a hardware component that allows a computer or another device, such as a router or switch, to connect to the Internet.
- is a hardware device that directs traffic between networks and devices.
- is a device, such as a wireless router, that allows wireless devices to connect to a network.
- is a component that provides networking capabilities for a computer.
- It is similar to a Local Area Network (LAN), but it's a lot bigger. Unlike LANs, WANs are not limited to a single location.
- is a hardware device that directs traffic between networks and devices.
Down
- is a computer system that hosts websites.
- is a network of connected devices that exist within a specific location.
- is a series of Wi-Fi routers that work together to create a single wireless network.
- One central node is connected to each of the other nodes on a network. Similar to a hub connected to the spokes in a wheel.
- is used to network multiple computers together.
- is more of a filter than a wall, allowing trusted data to flow through it.
12 Clues: is a computer system that hosts websites. • is used to network multiple computers together. • is a component that provides networking capabilities for a computer. • is a hardware device that directs traffic between networks and devices. • is a hardware device that directs traffic between networks and devices. • ...
Network Basics Vocabulary 2013-03-12
Across
- Uses a central network device to connect all systems. If the central device fails all systems will go down.
- In this topology all devices are connected using one cable and a terminator at each end.
- Allows to connect to the internet anyplace and at anytime without wires.
- All systems connected to a circle of cable.
- Connects to the internet using cable. Usually heavy coaxial cabling.
- Retransmits received data through all ports. Connects the computers using the "Star" topology.
- Connects networks in a larger area like Texas.
- Allows for internet connection wireless within a local area network through the use of a router.
- Connects networks on a smaller local scale.
- In this network type resources are controlled by the file server and made available to the clients.
Down
- Used to describe network speeds.
- A device that provides a central connection point for cables from workstations, servers, and peripherals. Creates internal connections between systems.
- Filters traffic into and out a private network. Acts as a protector of private network and blocks malevolent hackers.
- Is a descriptor for the way a network systems are physically connecte. There are 5 that are widely used.
- Known as network gateways and traffic directors that determine the shortest path to a destination.
15 Clues: Used to describe network speeds. • All systems connected to a circle of cable. • Connects networks on a smaller local scale. • Connects networks in a larger area like Texas. • Connects to the internet using cable. Usually heavy coaxial cabling. • Allows to connect to the internet anyplace and at anytime without wires. • ...
Technology Crossword 2023-08-03
Across
- the total amount of users who visit a website
- the term referring to all the physical parts in a computer system
- a set of computer programs and associated documentation and data
- individual with a presence on social media who uses their platform to affect group opinions and behavior
- CPU stands for "Central ____________ Unit"
- HTML stands for "HyperText Markup __________"
- a video that becomes popular through a process of Internet sharing is a _________ video
Down
- a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer, digital camera, etc
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- word or phrase commonly used in search engines to look for online content
- CTA stands for "Call to ___________"
- the global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices
- device used to connect personal computers to the internet via a service provider like cable or DSL
- the intelligence of machines or software, as opposed to the intelligence of human beings or animals is _________ intelligence
- coding mistakes or unwanted pieces of code that keep a website or program from working properly
15 Clues: CTA stands for "Call to ___________" • CPU stands for "Central ____________ Unit" • the total amount of users who visit a website • HTML stands for "HyperText Markup __________" • a set of computer programs and associated documentation and data • the term referring to all the physical parts in a computer system • ...
Networking Concepts. 2025-05-20
Across
- A____ is a network device that is used to connect all the computers in a network with each other.
- A_____ is a device that connects two different types of networks with each other.
- ______________ refers to a layout in which the various component of a network,like nodes,links,pheripherals,etc.,are connected and communicate with each other.
- ______ is a computer network created for an individual person.
- A ______ is used to physically attach a computer to a network so that it can participate in network communication.
- Network Card ____________is the most commonly used network card.
- In___,two or more computers and pheripheral devices are connected within a small area.
- Each computer in a network is called a____.
- In _____________,each device is connected to a central computer using a point-to-point connection.
Down
- A______is a wireless technology used to interconnect mobile phones,computers,and printers using short range wireless connection.
- A____enables you to connect your computer to the available internet connection over the existing telephone lines.
- Wi-Fi stands for______.
- ______ are certain sets of rules that determine how data should be transferred over networks,compressed,prsented on the screen and so on.
- What can be defined as group of computers and other peripheral devices?
- In _____________, all the nodes in the network are connected in a circular manner.
15 Clues: Wi-Fi stands for______. • Each computer in a network is called a____. • ______ is a computer network created for an individual person. • Network Card ____________is the most commonly used network card. • What can be defined as group of computers and other peripheral devices? • A_____ is a device that connects two different types of networks with each other. • ...
Internet in the Workplace 2025-02-26
Across
- Software designed to damage, destroy, or steal data.
- The use of remote servers to store and access data over the internet instead of relying solely on a personal computer. Often used by remote companies but poses security risks, including hacking threats.
- A program designed to negatively impact a computer system by infecting files.
- Jobs that are completely work from home.
- Similar to Trojan horses but with the ability to spread and infect other devices and computers.
- The practice of examining and blocking or deleting online content considered inappropriate.
- A set of rules that explains what is and is not acceptable use of company-owned and company-operated equipment and networks. Similar policies exist for school laptops.
- Prevent unauthorized Internet surfing or access to specific websites during working hours.
- The use of fraudulent emails and fake websites to trick individuals into providing sensitive data.
Down
- A unique number used to identify an electronic device connected to the Internet.
- Jobs that are partially remote, with some work done from home and some in an office.
- Software that secretly monitors a user’s computer activity.
- Bits of data stored on a computer that record website activity.
- Malware disguised as useful or common applications to trick users into downloading it.
- Illegally accessing or altering digital devices, software, or networks
15 Clues: Jobs that are completely work from home. • Software designed to damage, destroy, or steal data. • Software that secretly monitors a user’s computer activity. • Bits of data stored on a computer that record website activity. • Illegally accessing or altering digital devices, software, or networks • ...
Workplace Technology Vocabulary 2019-09-12
Across
- / connections among computers to facilitate communication and sharing of resources
- / wireless networking technology using radio waves to transport Internet signals
- Software / computer software which provides platforms and instructions for specific tasks
- / global system of computer networks
- / global network of remote servers which operate though the Internet
- Machine / device for sending and receiving printed documents over telephone lines
- / equipment and systems developed by applying scientific knowledge for practical purposes
- / output device which produces physical versions of computer documents and images using paper and ink
- Software / computer software which has restrictions on its use and source code is kept secret
- Phone System / multiline, interconnected telephone system which allows for specialized features and may involve Internet connection
Down
- Application / application software which operate and can be accessed through the World Wide Web
- / machine which makes exact duplicates of documents
- Wide Web / public information system on the Internet which connects billions of documents known as web pages
- / private networks typically used by organizations for the sharing of company news, policies, documents and other information
- Software / computer software which can be used without paying a license fee and can be modified to add capabilities not realized by its originators
- Software / instructions which guide how computer hardware operates, what tasks are performed and how those tasks are performed
- / input device which transfers information and images from physical documents to computer files
- Software / computer software which provides instructions for basic operation of computer hardware
18 Clues: / global system of computer networks • / machine which makes exact duplicates of documents • / global network of remote servers which operate though the Internet • / wireless networking technology using radio waves to transport Internet signals • Machine / device for sending and receiving printed documents over telephone lines • ...
Ch 4 Network Access 2017-06-09
Across
- The amount of time, to include delays, for data to travel from one given point to another.
- Indicates the source and destination nodes on the media.
- Regulates the placement of data frames onto the media.
- Contention- based technology for 802.11 networks.
- The way a network transfers frames from one node to the next.
- Cables are normally used to connect hubs to hubs or switches to switches, but they can also be used to directly connect two hosts to create a simple network.
- The physical layer must generate the electrical, optical, or wireless signals that represent the "1" and "0" on the media. This is called ___________.
- The measure of usable data transferred over a given period of time.
Down
- LLC connects to Layer.
- An arrangement of the nodes and the physical connections between them.
- Contention- based technology for 802.3 networks.
- The larger the pipe, more water that can flow through it. The capacity of a medium to carry data.
- Allows multiple paths for light.
- A method of converting a stream of data bits into a predefined "code”.
- MAC connects to Layer.
- Used to determine if the frame arrived without error.
- As a valve is opened, more water flows through. The measure of the transfer of bits across the media over a given period of time.
- Cable connect a workstation’s serial port t to a router’s console port, using an adapter.
18 Clues: LLC connects to Layer. • MAC connects to Layer. • Allows multiple paths for light. • Contention- based technology for 802.3 networks. • Contention- based technology for 802.11 networks. • Used to determine if the frame arrived without error. • Regulates the placement of data frames onto the media. • Indicates the source and destination nodes on the media. • ...
inter- and intra- 2022-04-10
Across
- the time between one event and another
- your relationship with yourself
- between nations
- within the layers of the skin
- between states
- a face-to-face meeting between people
- linked between; linked to each other
- networks that exist between each other
Down
- within a cell or cells
- within the boundaries of a state
- within the veins
- a prefix meaning "within"
- a prefix meaning "between" or "among"
- involving students from within the same school
14 Clues: between states • between nations • within the veins • within a cell or cells • a prefix meaning "within" • within the layers of the skin • your relationship with yourself • within the boundaries of a state • linked between; linked to each other • a face-to-face meeting between people • a prefix meaning "between" or "among" • the time between one event and another • ...
mental health 2022-12-20
Across
- The ability of neural networks in the brain to change through growth and reorganization
- extream mood swings
- things that make you stressed
- felling afraid
- felling sad all the time
- Psychotic Disorder
Down
- a type of dementia
- one of the 5 stages of grief
- fears
- obsesive compulsive disorder
- fear of missing out
- The study of how your behaviors and environment can cause changes that affect the way your genes work.
- brain detireorateing
- has 5 stages
- The ability of neural networks in the brain to change through growth and reorganization
15 Clues: fears • has 5 stages • felling afraid • a type of dementia • Psychotic Disorder • fear of missing out • extream mood swings • brain detireorateing • felling sad all the time • one of the 5 stages of grief • obsesive compulsive disorder • things that make you stressed • The ability of neural networks in the brain to change through growth and reorganization • ...
Business Technology 2022-03-19
7 Clues: electronic networks • business technology • computer aided design • automatic teller machine • videoconferencing system • automated banking machine • information communication technology
VIKTORIIN 2022-01-30
Across
- the indian multinational IT company whose headquarters is based in Bangalore
- fastest computer in the world
- A non-physical world in which individuals can interact virtually through different technologies
- virtual assistant developed by Samsung Electronics
- a device that routes traffic between virtual local area networks
- oldest programming language still in use
- a private network that is contained within an organisation
- is a network security device that monitors and filters network traffic
- a text editor for code markup and prose
- the oops concept that provides an object with the ability to take on many forms.
- protocol used to send mails
- Fastest memory in the computer
- the satellite network developed by SpaceX
- programming language is used to create programs like applets
Down
- the computers startup program responsible for booting up the system
- a network of networks
- It is a data structure that follows FIFO principle
- scripting language used in web development
- the requesting program or user in a client/server relationship
- instead of bits quantum computing uses
- the physical aspect of computers, telecommunications, and other devices
- a program in execution
- Ms office’s personal info manager
- first robot to get citizenship
- a software that allows the interaction between the operating system and hardware
- remove something from your computer
- private public community and hybrid are the deployment models of
- one of the ides used for java
- the first fully supported 64-bit operating system
- code hosting platform for software development and version control
30 Clues: a network of networks • a program in execution • protocol used to send mails • fastest computer in the world • one of the ides used for java • first robot to get citizenship • Fastest memory in the computer • Ms office’s personal info manager • remove something from your computer • instead of bits quantum computing uses • a text editor for code markup and prose • ...
Digital Literacy and Responsibility 2014-10-21
Across
- Physical parts of a computer
- Website that acts as a journal
- Using technology to harm others through deliberate, repeated, and hostile attacks
- Use of letters and punctuation in a message that indicates an emotion
- Computer or network has been broken into without permission
- Software designed to harm a computer
- zone Area where there is no cell phone service
- Exclusive rights given to someone who creates original work
- Software created for particular task
- Computer system that stores enormous amounts of data
- One present but not taking part in a situation or event
- Computer software that displays advertisements
- Global network which links smaller computer networks together
- package What your service pervader charges you for using internet
Down
- Addiction to dependence on the use of cell phone, computers, and internet
- Offering reason to be believed
- Something you can add to a software application to enhance its abilities
- Program used to display information (ex. slideshow)
- Carries out the functions in a computer
- Property created from an original thought or idea
- Receiving data from a server or computer system
- Area which a service provider offers it communication service
- Service that allows for sending media through a cell phone
- Act of sending inappropriate sexual material
- Address of numbers indicating the location of a computer service
- Providing the specific source of the material
- name Type of internet address for such as .gov, .edu, .com
- Device or program used for reading electronic books
- Personal jugement préjudice
- Electronic mail sent between computer networks
30 Clues: Personal jugement préjudice • Physical parts of a computer • Offering reason to be believed • Website that acts as a journal • Software designed to harm a computer • Software created for particular task • Carries out the functions in a computer • Act of sending inappropriate sexual material • Providing the specific source of the material • ...
Tech Xword January 2024 2024-01-17
Across
- a technology that allows computers and other devices to communicate via a wireless signal
- a measure of computer processor storage and real and virtual memory, equal to 2 to the 20th power bytes
- the method by which users access and save or "pull down" software or other files to their own computer or device
- any illegal activity that is undertaken (or relies heavily) on a computer
- a collection of information that is easily accessible by computers
- a type of data storage that makes data items quickly accessible
- a computer's instructions that tell it how to function
- a set of interconnected networks that allows computers in different locations to exchange information
- A coding error that interferes with the normal operation of a programme
- a device that users mover to navigate the cursor on a screen
- a document that is sent with an email
Down
- a security device that monitors network traffic and prevents unauthorised access
- short term for malicious software
- a remote data centre that houses date and application which are accessible from any location or device using the Internet
- a device that connects two local area networks
- unsolicited email messages sent for marketing purposes
- portable document format - a file type that can be read by many free software applications
- a set of instructions for a programme
- a conventional method for transmitting data
- a group of computers and/or other devices
- the maximum amount of that can travel a communications path in a given time
- software that's programmed to complete tasks that were traditionally accomplished by people
22 Clues: short term for malicious software • a set of instructions for a programme • a document that is sent with an email • a group of computers and/or other devices • a conventional method for transmitting data • a device that connects two local area networks • unsolicited email messages sent for marketing purposes • a computer's instructions that tell it how to function • ...
WSN UNIT - 5 Sensor Network Tool (AWSN) Ad Hoc Wireless Sensor Network 2023-10-14
Across
- Which software tier in WSNs specifically caters to the unique needs and constraints of individual sensor nodes?
- In WSNs, what kind of challenges emerge due to limited computational resources and power?
- A subset of WSN nodes that operate based on their physical locations.
- A mechanism in WSNs to quickly react to external signals or events.
- These constraints, especially in energy and memory, pose primary challenges in WSNs.
- A popular operating system tailored for WSNs.
- The primary programming language used for TinyOS.
- A TinyOS application that oversees certain environmental parameters.
- This term refers to sensor nodes working in unison to achieve a common objective.
- A representation in simulations that defines a sensor's behavior and capabilities.
- A WSN programming approach for networks with unchanging, fixed topologies.
Down
- In WSN research and development, which tools mimic the behavior and interactions of sensor nodes in a network?
- What term describes the process of collecting data from the environment using sensors in a wireless network?
- The foundational software layer on a sensor node.
- A framework acronym that evaluates factors like Performance, Information quality, and Scalability in WSNs.
- This simulates how data is transmitted between nodes in a WSN.
- A simulator specifically designed for TinyOS applications.
- An open-source operating system for the Internet of Things devices.
- What is the enhanced version of a renowned network simulator used for studying both wired and wireless networks?
- What mechanism in WSNs ensures timely reactions to instantaneous events or signals?
- The simulator associated with ContikiOS.
21 Clues: The simulator associated with ContikiOS. • A popular operating system tailored for WSNs. • The foundational software layer on a sensor node. • The primary programming language used for TinyOS. • A simulator specifically designed for TinyOS applications. • This simulates how data is transmitted between nodes in a WSN. • ...
HA SIKERÜL ÜGYES VAGY 2025-02-20
Across
- What does Global System Mobile stand for?
- What system divides the coverage area into smaller sections using base stations and antennas?
- What process involves investing money in stocks through an online broker?
- What do you need in addition to a computer to use online banking?
- What kind of number list is used as a second password in some banking systems?
- What kind of signals did 1G phones use for communication?
- What type of small smart card is used in mobile phones to store user information?
- What wireless technology allows mobile phones to connect to other devices over short distances?
- What type of device, besides a phone, can be used for wireless banking?
- What unique number is given to an internet banking user for identification?
- What does Universal Mobile Telecommunications System stand for in mobile networks?
- What is the name of the next generation of mobile phones after 3G, focusing on multimedia?
- What feature allows banks to send notifications via email or mobile phone?
Down
- What is the name of a service where you can schedule your bill payments online?
- What technology uses physical characteristics like fingerprints for authentication?
- What is the name of the first-generation mobile communication technology introduced in the 1990s?
- What is the general term for performing banking transactions through electronic communications?
- What kind of banking allows access to financial institutions using wireless networks?
- What is the name of the stations that help mobile phones connect to the network?
- What is the name of the second-generation mobile communication technology introduced in the 1990s?
20 Clues: What does Global System Mobile stand for? • What kind of signals did 1G phones use for communication? • What do you need in addition to a computer to use online banking? • What type of device, besides a phone, can be used for wireless banking? • What process involves investing money in stocks through an online broker? • ...
תשבץ - מדיה ברכיבי רשת 2024-07-12
Across
- What is the term describing the ability of a medium to transmit in both directions simultaneously?
- What is the term describing the strength of a signal?
- What type of cable is common in home and office networks?
- What is the term that describes the ability of media to transmit in one direction only?
- What is the term describing the amount of information that can be transferred per unit of time?
- What type of media is used in wireless networks?
- What is the term describing the ability of a medium to transmit in both directions, but not simultaneously?
- What is the term describing the time it takes for a signal to travel from source to destination?
Down
- What is the term describing the ability of a medium to carry multiple signals simultaneously?
- Which type of media provides the highest speed for data transfer?
- What is the name of the technology used to transfer data using light?
- What is the term describing the weakening of a signal along a medium?
- What is the term describing interference between adjacent cables?
- What is the term describing the ability of a cable to transfer data?
- What is the term describing the maximum distance a signal can travel without amplification?
15 Clues: What type of media is used in wireless networks? • What is the term describing the strength of a signal? • What type of cable is common in home and office networks? • Which type of media provides the highest speed for data transfer? • What is the term describing interference between adjacent cables? • ...
Crossword 2: Network and Telecommunication 2024-05-01
Across
- The physical layout or arrangement of computers and devices in a network.
- A network that covers a small area, such as a room, building, or campus.
- An intelligent network device that connects different networks and determines the best route for data transmission.
- A wireless network that provides short-range connectivity using high-frequency radio waves.
- The network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity to exchange data over the internet.
- A company or organization that provides internet services to users.
- A network organized by an individual for personal use, typically connecting personal devices such as smartphones, tablets, and laptops.
- Software used to access and display web pages on the internet.
- A network that covers an entire city or district.
Down
- A network that connects multiple intranets together to share resources with external parties.
- A unique address that specifies the location of a resource on the internet. Consists of the protocol, server name, path, and file name.
- A network device that connects two dissimilar types of networks.
- A private computer network owned by a company or organization, accessible only to employees.
- A collection of web pages accessible through a specific domain name.
- A network that extends over a large geographical area, such as a country or the entire world.
15 Clues: A network that covers an entire city or district. • Software used to access and display web pages on the internet. • A network device that connects two dissimilar types of networks. • A company or organization that provides internet services to users. • A collection of web pages accessible through a specific domain name. • ...
E-COMMERCE TRANSACTION 2025-05-20
Across
- Secure internet connection
- Fast but less reliable data transfer
- Sending data across a network
- Small data chunk sent over a network
- Forwards data between networks
Down
- Unique device number on a network
- Rules for network communication
- Verifying user or device identity
- Connects devices in a network
- Coding data to keep it secure
- Controls network traffic
11 Clues: Controls network traffic • Secure internet connection • Sending data across a network • Connects devices in a network • Coding data to keep it secure • Forwards data between networks • Rules for network communication • Unique device number on a network • Verifying user or device identity • Fast but less reliable data transfer • Small data chunk sent over a network
Lesson 25: Network Fundamentals 2018-09-13
Across
- Network device that uses existing cable television lines to send and receive data.
- Type of fiber optic telephone line that can transmit voice and data at the same time.
- Network device that directs the flow of data from a LAN.
- Computer that connects networks using different communications protocols; passing information from one network to another.
- International collection of interconnected voice-based public telephone networks.
- Address for communications on the physical network segment.
- Unique identifier applied to each device on a network.
- Most common type of cable used to connect devices in a local network.
- Computer that accesses the shared resources.
- network service that enables remote users to use a public network.
- Common carrier network that provides connection among public users.
- Network device that makes the electrical and electronic connections between a computer and a network.
- Network device that enables a computer to transmit over telephone lines.
Down
- Maintains a directory of domain names and their correlated IP addresses.
- A modem that uses an internet connection technology that transfers info to a computer at high speed bandwidth over copper phone lines.
- Rules computers must follow to facilitate device identification and data transfer.
- Computer that provides network services such as sharing files and folders.
- Splits data into manageable packets allowing a more efficient flow in the transmission of data.
- Network device that joins all the devices of a network together.
- Network device that performs the same tasks as a hub.
- Identifies the host device and network to which it belongs.
21 Clues: Computer that accesses the shared resources. • Network device that performs the same tasks as a hub. • Unique identifier applied to each device on a network. • Network device that directs the flow of data from a LAN. • Address for communications on the physical network segment. • Identifies the host device and network to which it belongs. • ...
"Julius Stockton - Crossword - 3rd Period 2016-10-24
Across
- This is a cellular telephone with an interpreted computer built into it.
- It is a possible threat that could interfere with a computer normal work.
- This is a device that forwards data packets along different types of networks.
- This is when you do good or bad things on the internet.
- Allows certain files and folders to be shared with specific people.
- This is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
- Allows devices to connect to network.
- Software that's free but has advertisements.
Down
- This is used to run a computer's applications and hardware.
- This is a connection point for devices included in a network.
- A computer program that multiplies itself and destroys data.
- The technology involving the development, maintenance, and use of computer systems that use software and networks for the processing and distribution of data.
- A system of wires used to connect computers so they can work together.
- This is a message that could hurt people's feelings and could get you in trouble.
- This is a program or group of programs designed for end users and includes data base programs.
- Designed to mess with a computer's normal, functioning.
- This is used to connect to computers, printers, and servers.
- A portable computer with a protective case for traveling.
- An area for a person to complete his/her job.
- When a person is tricked into telling a person their personal info.
20 Clues: Allows devices to connect to network. • Software that's free but has advertisements. • An area for a person to complete his/her job. • This is when you do good or bad things on the internet. • Designed to mess with a computer's normal, functioning. • A portable computer with a protective case for traveling. • ...
Part 1 Activities 2016-02-22
Across
- area network (LAN) is when computers are geographically close.
- for websites can be used to help build content for a website.
- text decreases the word count
- is composed of HTML tags and multimedia files.
- is the property of the author.
- Markup Language, or HTML, is the language used to describe the structure of content on the web
- computer requests services.
- is used to define the characteristics of an HTML element and is placed inside the element's opening tag.
- commutation occurs at different times such as an email being sent, received and replied to.
- the page is what 79% of users do and do not read every word on the page.
- cache is uses caching servers closer to the end user.
Down
- domain is free for anyone to use
- cache is memory available in RAN used by applications that contain recently used files.
- is the main technology for local area networks and connects computers in a building or lab.
- language is using neutral rather than subjective language. When writing for a webpage.
- mechanism is what you agree to in UT policy that users will not interfere with security.
- tells the computer what program to use to open the file.
- of UT policy may result in termination of access or disciplinary review.
- communication is when the sender and the receiver are active at the same time.
- is a collection of wide area networks (WAN).
- cache stores visited web pages on your hard drive.
- defines information about the document
22 Clues: computer requests services. • text decreases the word count • is the property of the author. • domain is free for anyone to use • defines information about the document • is a collection of wide area networks (WAN). • is composed of HTML tags and multimedia files. • cache stores visited web pages on your hard drive. • cache is uses caching servers closer to the end user. • ...
Computer Science 2019-05-20
Across
- : Dynamic random access memory
- : Wireless application protocol
- Memory : a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
- : Uniform Resource Locator
- : A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices on a computer network by using packet switching to receive, process, and forward data to the destination device.
- : Petabyte
- : A router is a networking device that forwards data packets between computer networks. ... A packet is typically forwarded from one router to another router through the networks that constitute an internetwork (e.g. the Internet) until it reaches its destination node.
- : network interface card
- Memory : physical memory that is internal to the computer.
- hardware : The collection of physical parts of a computer system
- : metropolitan area network
Down
- : There are four types of computer cable connections to a monitor: VGA, DVI, HDMI and DisplayPort.
- : Internet service provider
- : Wi-Fi is defined as an abbreviation for wireless fidelity, meaning you can access or connect to a network using radio waves, without needing to use wires.
- Memory : is computer storage that only maintains its data while the device is powered.
- : Terabyte
- : personal computer
- : static RAM
- : wide area network
- : local area network
- Address : Internet Protocol address
- : To store data locally in order to speed up subsequent retrievals
- : Stands for random access memory
- : Universal Serial Bus
- : Stands for read-only memory
- : Domain Name System
26 Clues: : Terabyte • : Petabyte • : static RAM • : personal computer • : wide area network • : local area network • : Domain Name System • : Universal Serial Bus • : network interface card • : Uniform Resource Locator • : Internet service provider • : metropolitan area network • : Stands for read-only memory • : Dynamic random access memory • : Wireless application protocol • ...
Computer Systems 2019-05-20
Across
- : A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices on a computer network by using packet switching to receive, process, and forward data to the destination device.
- : metropolitan area network
- : Terabyte
- : To store data locally in order to speed up subsequent retrievals
- : Wi-Fi is defined as an abbreviation for wireless fidelity, meaning you can access or connect to a network using radio waves, without needing to use wires.
- Address : Internet Protocol address
- Memory : is computer storage that only maintains its data while the device is powered.
- : Domain Name System
- : personal computer
- : A router is a networking device that forwards data packets between computer networks. ... A packet is typically forwarded from one router to another router through the networks that constitute an internetwork (e.g. the Internet) until it reaches its destination node.
- : static RAM
- : Stands for read-only memory
- : local area network
Down
- : wide area network
- : Universal Serial Bus
- Memory : a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
- hardware : The collection of physical parts of a computer system
- : network interface card
- Memory : physical memory that is internal to the computer.
- : There are four types of computer cable connections to a monitor: VGA, DVI, HDMI and DisplayPort.
- : Wireless application protocol
- : Internet service provider
- : Dynamic random access memory
- : Stands for random access memory
- : Uniform Resource Locator
- : Petabyte
26 Clues: : Terabyte • : Petabyte • : static RAM • : wide area network • : personal computer • : Domain Name System • : local area network • : Universal Serial Bus • : network interface card • : Uniform Resource Locator • : metropolitan area network • : Internet service provider • : Stands for read-only memory • : Dynamic random access memory • : Wireless application protocol • ...
TechSphere Crossword puzzle 2024-01-29
Across
- Process of encoding information to make it secure.
- Study and practice of techniques for secure communication in the presence of third parties.
- Authentication techniques based on unique biological characteristics such as fingerprints or retinal scans.
- Practice of protecting systems, networks, and programs from digital attacks.
- Secret code used to gain access to a computer, network, or service.
- Malicious software that encrypts files and demands payment for their release.
- Process of confirming the truth of an attribute of a single piece of data.
- Software update designed to fix problems with, or improve a computer program or its supporting data.
- Malicious software that replicates itself and spreads to other computers.
Down
- Incident where sensitive, protected, or confidential information is accessed or disclosed without authorization.
- Weakness in a system's defenses that can be exploited by a threat.
- Network of private computers infected with malicious software and controlled as a group.
- Person who uses technical knowledge to gain unauthorized access to computer systems.
- Security system designed to prevent unauthorized access to or from a private network.
- Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
- Malicious software disguised as legitimate software.
- Software intended to damage or disable computers and computer systems.
- Software designed to detect and remove computer viruses and other malicious software.
- Attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
- Secure network connection that allows users to access the internet privately.
- Interconnected group of computers and other devices capable of exchanging data.
- Unsolicited or undesired electronic messages, typically advertising.
22 Clues: Process of encoding information to make it secure. • Malicious software disguised as legitimate software. • Weakness in a system's defenses that can be exploited by a threat. • Secret code used to gain access to a computer, network, or service. • Unsolicited or undesired electronic messages, typically advertising. • ...
Round - 3 2024-02-16
Across
- Interconnected parts working together.(word)
- The process of repeating a set of instructions a specified number of times or until a condition is met.
- A broad field covering specialties like computer, mechanical, and civil engineering, offering diverse career paths and opportunities for innovation and problem-solving.
- Finding and fixing issues in a device or system.
- Popular platform for version control and collaboration in software development.
- Security wall for computer networks (to avoid high level hacking).
- A named store location in memory whose value can change during program execution.
- Measures taken to protect computer systems and data from unauthorized access or attacks.(word)
- A programming construct that repeats a block of code until a certain condition is met.
- Rules that define the structure of statements in a programming language.
Down
- A data structure that stores a collection of elements, accessed by indexing.
- Programs and operating information used by a computer.(word)
- The process of designing and writing computer programs.
- The component of a computer that stores data and instructions for processing.
- Software that translates high-level programming languages into machine code.
- A widely used networking technology for local area networks (LANs) that defines wiring and signaling standards.
- Physical components of a computer system.(word)
- In Programming Languages refers to the specific category or kind of data that a variable can hold or represent.
- A self-contained block of code that performs a specific task.
- A multinational technology company known for its web portal and popular search engine.
20 Clues: Interconnected parts working together.(word) • Physical components of a computer system.(word) • Finding and fixing issues in a device or system. • The process of designing and writing computer programs. • Programs and operating information used by a computer.(word) • A self-contained block of code that performs a specific task. • ...
Workplace Technology Crossword 2021-09-08
Across
- multiline, the interconnected telephone system which allows for specialized features and may involve an Internet connection
- machine which makes exact duplicates of documents
- private networks typically used by organizations for the sharing of company news, policies, documents and other information
- programmable machine for storing, processing, and retrieving data; includes desktops, laptops, tablets, and smartphones
- device for sending and receiving printed documents over telephone lines
- instructions which guide how computer hardware operates, what tasks are performed, and how those tasks are performed
- computer software which provides instructions for basic operation of computer
- wireless networking technology using radio waves to transport Internet signals
- connections among computers to facilitate communication and sharing of resources
Down
- input device which transfers information and images from physical documents to computer files
- computer software which provides platforms and instructions for specific tasks
- application software which operates and can be accessed through the World Wide Web
- computer software which can be used without paying a license fee and can be modified to add capabilities not realized by its originators
- public information system on the Internet which connects billions of documents known as web pages
- computer software which has restrictions on its use and source code is kept secret
- equipment and systems developed by applying scientific knowledge for practical purposes
- physical elements of a computer and all separate physical elements which support computer functionality
- global systems of computer networks
- output device which produces physical versions of computer documents and images using paper and ink
- global network of remote servers which operate though the Internet
20 Clues: global systems of computer networks • machine which makes exact duplicates of documents • global network of remote servers which operate though the Internet • device for sending and receiving printed documents over telephone lines • computer software which provides instructions for basic operation of computer • ...
AI 2025-10-12
Across
- The first artificial neuron model that could learn simple patterns.
- One of the earliest programming languages.
- Early approach using rules and symbols instead of data-driven learning.
- Controls how much a neuron “fires.”
- Settings that guide how a model learns.
- The challenge of keeping AI’s goals human-friendly.
- Strength of a neuron’s output.
- Time when AI funding and optimism ran cold.
- Layered networks that power modern AI systems.
- The data used to check an AI’s learning.
- Trick image that confuses an AI.
- Central idea in Hofstadter and Mitchell’s theory of intelligence.
- The horse that “solved” math problems by reading cues.
- The 1956 workshop that officially launched the field of AI.
- Early program that tried to model human reasoning.
Down
- Idea that true intelligence needs a body.
- Learning from rewards and punishments.
- The examples used to teach an AI.
- How neural networks adjust their connections.
- A period of renewed optimism and funding for AI after years of stagnation, often tied to breakthroughs in deep learning.
- Models inspired by how the brain processes vision.
- Company known for creating AlphaGo.
- The point when AI surpasses human intelligence.
- IBM’s computer that beat chess champion Garry Kasparov.
- Massive labeled image dataset that revolutionized computer vision and helped spark the deep learning boom.
- An early, cross-disciplinary field linking biology and engineering, emphasizing feedback loops that inspired later AI research.
- The 2012 network that started the deep learning boom.
- Hofstadter’s idea for self-awareness.
- Hofstadter’s computer model of analogy-making.
29 Clues: Strength of a neuron’s output. • Trick image that confuses an AI. • The examples used to teach an AI. • Controls how much a neuron “fires.” • Company known for creating AlphaGo. • Hofstadter’s idea for self-awareness. • Learning from rewards and punishments. • Settings that guide how a model learns. • The data used to check an AI’s learning. • ...
Christopher Fraga's Internet Crossword Puzzle 2013-09-13
Across
- Harms your computer
- Copying the same exact words
- A person who changes or steals really importent stuff
- A place to find information
- A private network
- To say what you are doing
Down
- Bullying Online
- A website where information can be changed and edited
- Stealing something without their permission
- Networks Online communities like Facebook
- To reload
- A thing used to block unauthorized access
12 Clues: To reload • Bullying Online • A private network • Harms your computer • To say what you are doing • A place to find information • Copying the same exact words • Networks Online communities like Facebook • A thing used to block unauthorized access • Stealing something without their permission • A website where information can be changed and edited • ...
Legal By Default v.01 2024-01-31
Across
- Data handler according to GDPR
- A top level domain
- Affirmation for tracking
- Boxes data is shared on
- Frustrating error
- You might use this for accessing illegal websites
Down
- One should not accept these when offered by third parties
- Forwards data between networks
- Identity of devices
- A web browser
- Text based interface which can be used for executing commands
- "Shining" programming language
12 Clues: A web browser • Frustrating error • A top level domain • Identity of devices • Boxes data is shared on • Affirmation for tracking • Forwards data between networks • Data handler according to GDPR • "Shining" programming language • You might use this for accessing illegal websites • One should not accept these when offered by third parties • ...
GLOBALISATION 2013-02-20
Across
- a natural body that revolves around a planet; a moon.
- the process or act of migrating.
- the quality in a person or society that arises from a concern for what is regarded as excellent in arts, letters, manners, scholarly pursuits, etc.
- the act of globalizing, or extending to other or all parts of the world
- a person or organization that uses a commodity or service.
- the basic, underlying framework or features of a system or organization
- going beyond national boundaries or interests
Down
- an act or instance of combining into an integral whole.
- the investing of money or capital in order to gain profitable returns, as interest, income, or appreciation in value.
- to convey (cargo) in standard-sized containers
- the quality or state of being sovereign.
- a vast computer network linking smaller computer networks worldwide (usually preceded by the ). The Internet includes commercial, educational, governmental, and other networks, all of which use the same set of communications protocols.
- a privilege of a public nature conferred on an individual, group, or company by a government
- the act or process of buying, selling, or exchanging commodities, at either wholesale or retail, within a country or between countries
- thrifty management; frugality in the expenditure or consumption of money, materials, etc
15 Clues: the process or act of migrating. • the quality or state of being sovereign. • going beyond national boundaries or interests • to convey (cargo) in standard-sized containers • a natural body that revolves around a planet; a moon. • an act or instance of combining into an integral whole. • a person or organization that uses a commodity or service. • ...
Components/Characteristics of Computing Networks 2023-02-27
Across
- device that sends data to intended device
- protocol that defines where data is sent & broken down
- Protocols that allow different network tech to work together
- sets up communication between host(uses TCP/IP)
- adds recipients and routes packets across a network
Down
- Device to convert digital signal to a network
- set of rules on how to communicate data
- network device that connects computers to broadcast data
- protocols used by applications
- used to identify a network connection
- connection between your house & the internet
- Device that improves LAN coverage
- connection between your modem & wireless devices
- uniquely identify assigned to a hardware device
- Translates domain names to IP addresses so browsers can load Internet resources
15 Clues: protocols used by applications • Device that improves LAN coverage • used to identify a network connection • set of rules on how to communicate data • device that sends data to intended device • connection between your house & the internet • Device to convert digital signal to a network • uniquely identify assigned to a hardware device • ...
Life Skill 2023-07-20
8 Clues: very useful • use time wisely • bad for your health • the way it is organised • involving computer networks • path in which a person going • manners respecting each other • exchanging information between two people
Chat Support 2019-01-24
Across
- Troubleshooting repair tree?
- Out latest platform to have STVA compatibility
- What is the fastest speeds Spectrum offers?
- Watch TV everywhere
- GOAT
- Troubleshooting/Billing tool?
- Includes Nomorobo
- What cable is used for the best possible picture on a TV?
Down
- What Does STA stand for?
- Includes 125+ Channels
- How many recording can the Cloud store?
- Uses the nation's largest LTE network
- Includes the full lineup of premium networks
- Only available with our world box.
14 Clues: GOAT • Includes Nomorobo • Watch TV everywhere • Includes 125+ Channels • What Does STA stand for? • Troubleshooting repair tree? • Troubleshooting/Billing tool? • Only available with our world box. • Uses the nation's largest LTE network • How many recording can the Cloud store? • What is the fastest speeds Spectrum offers? • Includes the full lineup of premium networks • ...
Sense of self crossword 2013-03-26
Across
- a call to engage in contest
- something imparted or transmitted
- a friendly relation
- to speak ill of;defame;slander
- networks/a website ect. designed to support people
- a person exerts _____.
- anything that obstructs progress
Down
- limited in presents to a person
- connection between two people by blood or marriage
- a overbearing person who intimidates smaller people
- having a connection
- the act of troubling repeatedly
- to transform or convert
- enjoying the presents of others
- a distinctive characteristic
- the spouse and children of someone
16 Clues: having a connection • a friendly relation • a person exerts _____. • to transform or convert • a call to engage in contest • a distinctive characteristic • to speak ill of;defame;slander • the act of troubling repeatedly • enjoying the presents of others • limited in presents to a person • anything that obstructs progress • something imparted or transmitted • ...
Dane Eisenach & Dominic Mezarina 2024-01-09
Across
- Losing Data to transmit
- Runs using user input
- Binary Digit (0 or 1)
- <, >, <=
- AND, OR, BUT
- Pack of data divided from large data
- Interconnected Networks
Down
- Executes different code based on value of the Boolean Expression
- Distribute Copyrighted work
- A system of devices that send data
- Eliminating unnecessary data to create a smaller more relevant subset
- Doesn't completely reflect the entire study population
- Individuals contributing data across large areas
- Data program uses
- Obtaining data from large amount of people
- Relationships found in data
16 Clues: <, >, <= • AND, OR, BUT • Data program uses • Runs using user input • Binary Digit (0 or 1) • Losing Data to transmit • Interconnected Networks • Distribute Copyrighted work • Relationships found in data • A system of devices that send data • Pack of data divided from large data • Obtaining data from large amount of people • Individuals contributing data across large areas • ...
Networking Concepts and Cyber Ethics puzzle 2025-06-12
Across
- : A harmful program that replicates itself
- : Used to protect digital accounts
- : Online harassment or bullying
- : Moral principles guiding behavior
- : Protects the network from unauthorized access
- : A set of rules for communication
- : A wide area network
Down
- : A computer that provides services to other computers
- : Fake emails to steal information
- : Right to control your personal data
- : Directs traffic between networks
- : Securing data by converting it to code
- : Device that connects your computer to the internet
- : Connects devices within a network
- : Unauthorized access to data
- : A local area network
16 Clues: : A wide area network • : A local area network • : Unauthorized access to data • : Online harassment or bullying • : Fake emails to steal information • : Used to protect digital accounts • : Directs traffic between networks • : A set of rules for communication • : Moral principles guiding behavior • : Connects devices within a network • : Right to control your personal data • ...
Networks and the Internet 2024-07-09
Across
- A piece of network hardware that directs/manages traffic on a network
- Where one or more computers/devices are connected together
- Cable that uses twisted copper, usually prone to latency
- A type of network that allows you to be mobile while you use devices
- A network that covers a large geographical area
- A piece of network hardware commonly used on a LAN
Down
- A network topology that requires each node/client to have a connection to each other
- A type of network that is more expensive to set up
- Cable with fast data transfer using light
- A network that covers a smaller geographical area
- A network topology that connects clients through a central hub/switch
11 Clues: Cable with fast data transfer using light • A network that covers a large geographical area • A network that covers a smaller geographical area • A type of network that is more expensive to set up • A piece of network hardware commonly used on a LAN • Cable that uses twisted copper, usually prone to latency • ...
duc/duc(e), pro-, inter- 2023-07-25
Across
- to lead forward
- to be in between and stop something from going from one place to another
- part of speech which stands in place for a noun
- to lead within
- to depend among one another
Down
- to lead forth in knowledge
- step forward
- between nations
- networks that communicate between each other
- send an intention or plan forward
- to lead away
- to lead back
12 Clues: step forward • to lead away • to lead back • to lead within • to lead forward • between nations • to lead forth in knowledge • to depend among one another • send an intention or plan forward • networks that communicate between each other • part of speech which stands in place for a noun • to be in between and stop something from going from one place to another
Sparklight September 2023 2023-08-22
Across
- Transmit data using light.
- Boise executive level over sees overall operations.
- Foundational technology for wired networking
- Central processing unit
- Converting digital signal for communication networks.
Down
- A critical part of computers
- Transmit signals to television and internet.
- Physical components of a computer system.
- Regular publication distributed within a workplace.
- Global network of interconnected to computers and servers.
- Storage devices
- Rugged tablet computers
12 Clues: Storage devices • Rugged tablet computers • Central processing unit • Transmit data using light. • A critical part of computers • Physical components of a computer system. • Transmit signals to television and internet. • Foundational technology for wired networking • Regular publication distributed within a workplace. • Boise executive level over sees overall operations. • ...
Jake’s ultra mega fun crossword puzzle of doom, (very scary) 2024-05-09
Across
- a computer capable of getting information from a server
- Converting information
- Rules explaining conduct and procedures
- Characters identifying each computer
- a networks data transmission capacity
- Wireless network
- A harbour
Down
- a collection of devices interconnected
- Parts are interrelated or arranged
- Interconnected devices
- Someone responsible for the daily goings on of a business or organisation (the girl from TF2)
- Protects people from hackers
12 Clues: A harbour • Wireless network • Converting information • Interconnected devices • Protects people from hackers • Parts are interrelated or arranged • Characters identifying each computer • a networks data transmission capacity • a collection of devices interconnected • Rules explaining conduct and procedures • a computer capable of getting information from a server • ...
Workplace Technology Vocabulary 2019-09-12
Across
- / machine which makes exact duplicates of documents
- / output device which produces physical versions of computer documents and images using paper and ink
- Software / instructions which guide how computer hardware operates, what tasks are performed and how those tasks are performed
- / equipment and systems developed by applying scientific knowledge for practical purposes
- Machine / device for sending and receiving printed documents over telephone lines
- / global system of computer networks
- Software / computer software which can be used without paying a license fee and can be modified to add capabilities not realized by its originators
- / wireless networking technology using radio waves to transport Internet signals
- / input device which transfers information and images from physical documents to computer files
- Software / computer software which provides instructions for basic operation of computer hardware
- Wide Web / public information system on the Internet which connects billions of documents known as web pages
Down
- / private networks typically used by organizations for the sharing of company news, policies, documents and other information
- Software / computer software which has restrictions on its use and source code is kept secret
- Application / application software which operate and can be accessed through the World Wide Web
- Software / computer software which provides platforms and instructions for specific tasks
- / connections among computers to facilitate communication and sharing of resources
- Phone System / multiline, interconnected telephone system which allows for specialized features and may involve Internet connection
- / global network of remote servers which operate though the Internet
18 Clues: / global system of computer networks • / machine which makes exact duplicates of documents • / global network of remote servers which operate though the Internet • / wireless networking technology using radio waves to transport Internet signals • Machine / device for sending and receiving printed documents over telephone lines • ...
Network Design 2021-07-14
Across
- Local Area Network. A network which only covers a single site.
- A network topology in which all devices are connected to a single backbone cable
- Wide Area Network. A network which connects networks in different geographical locations
- A type of network topology where all devices are connected to a central switch or server which controls the network
- How the devices in a network are connected together
- A network topology where every device is directly or indirectly connected to every other without a central switch
- A network topology where the devices are connected in a circle, with data moving in one direction
Down
- A network is two or more computers (or other electronic devices) that are connected together, usually by cables or Wi-Fi.
- Connects devices together on a LAN and directs frames of data to the correct device
- A piece of hardware responsible for transmitting data between networks
10 Clues: How the devices in a network are connected together • Local Area Network. A network which only covers a single site. • A piece of hardware responsible for transmitting data between networks • A network topology in which all devices are connected to a single backbone cable • Connects devices together on a LAN and directs frames of data to the correct device • ...
Data Transmission 2022-07-19
Across
- The actual data being carried in a data packet
- A verification method used to check if data transferred has been altered or corrupted
- Encrypted data that is the result of putting a plaintext message through an encryption algorithm.
- Stages in a network that can receive and transmit data packets; routers are nodes in communication networks
- The time interval allowed to elapse before an acknowledgement is received (in the ARQ error detection method)
- Data that can be sent on one direction only
- A device that enables data packets to be moved between different networks, for example to join a LAN to a WAN
Down
- The original text/message before it is put through an encryption algorithm
- Data that arrives at the destination with the bits no longer synchronised
- Another name fir a hacker who intercepts data being transmitted on a wired or wireless network
10 Clues: Data that can be sent on one direction only • The actual data being carried in a data packet • Data that arrives at the destination with the bits no longer synchronised • The original text/message before it is put through an encryption algorithm • A verification method used to check if data transferred has been altered or corrupted • ...
Data Transmission 2022-07-13
Across
- - data that can be sent in both directions but not at the same time.
- Data that can be sent in one direction only
- the transmission of data over a network for live events where data is sent as soon as it is received or generated.
Down
- an error checking method by which all the 1 bit in the data packet payload are added.
- sending data one bit/wire at a time.
- - stages in a network that can receive and transmit data packets; routers are ____ in communication networks.
- trailer- The part of a message that indicates the end of the data packet and cylic reduncy check error check.
- the actual data being carried in a data packet.
- data that can be sent in both directions and at the same time (simultaneously)
- a device that enables data packets to be moved between different networks, for example, to join a LAN to a WAN.
10 Clues: sending data one bit/wire at a time. • Data that can be sent in one direction only • the actual data being carried in a data packet. • - data that can be sent in both directions but not at the same time. • data that can be sent in both directions and at the same time (simultaneously) • ...
Networking Fundamentals -- 2025-11-20
Across
- A networking device that connects devices on a network and forwards data packets between them.
- A networking device that connects multiple networks together and forwards data packets between them.
- A general term describing multiple networks connected together
- A security device or software that monitors and controls incoming and outgoing network traffic, based on a set of predefined security rules.
Down
- A collection of interconnected devices, such as computers, printers, and servers, that can communicate with each other.
- unique numerical identifier assigned to each device on a network, used to identify and communicate with other devices.
- A personal device connected to a network.
- A set of rules and standards that define how devices on a network communicate with each other.
- A network that connects devices within a limited geographical area, such as a home, office, or building.
- A network that connects devices over a large geographical area, such as multiple offices in different cities or countries.
10 Clues: A personal device connected to a network. • A general term describing multiple networks connected together • A networking device that connects devices on a network and forwards data packets between them. • A set of rules and standards that define how devices on a network communicate with each other. • ...
Computer networking 2012-03-24
Across
- topology in which all computers are connected to a central node
- uses a table to lookup recipient address
- a computer network that can cover large regions, over long distances
- computer that provides shared resources to end user
- a measure of available or consumed data communication resources
- network interface controller
- a computer network that interconnects computers in a limited area
- the method a network system uses to physically connect workstations
- computer networking technology for LANs
- creates internal connections which allow all systems to get full bandwidth
- fellow workstation
Down
- _5; twisted pair cable used for carrying signals in computer network
- a site that offers internet access over a wireless network
- widely used data hierarchical structure showing connections of root node to all child nodes
- a topology in which all systems are connected to a circle of cable
- a device or set of devices or software designed to permit/deny network transmissions
- a computer network that usually spans a city or a large campus
- part of computer network infrastructure that interconnects various pieces
- a structure which may contain a value, condition or representation of another data structure
- connects computers in a star via series of ports
- workstation that typically accesses resources on a server
- simple topology used for smaller networks; each system connected with single cable
- the set of allowed values for a variable
- a technology that allows an electronic device to exchange data wirelessly
- a computer network used for communication among personal computerized devices
- _45; registered jack connector and wiring pattern for phone networks
26 Clues: fellow workstation • network interface controller • computer networking technology for LANs • uses a table to lookup recipient address • the set of allowed values for a variable • connects computers in a star via series of ports • computer that provides shared resources to end user • workstation that typically accesses resources on a server • ...
Seminar 1 Crossword 2013-07-09
Across
- The protocol used to translate a web address into an IP address
- Layer of the OSI model that relieves the application layer of concern regarding syntactical differences in data
- A device that connects networks together
- A series of four values separated by periods that designate a device's location on a network
- Layer of the OSI model that describes the physical properties of media
- The protocol used to convert IP addresses into MAC addresses
- Simply put, it is the chopping up of networks in to smaller pieces
- Command typed at a windows command line that displays IP information
- Layer of the OSI model that manages dialogue between end-user application processes.
- Protocol that uses ports 20 and 21 to transfer files between computers
Down
- The unique address for a network interface card
- Layer of the OSI model that routes information through a network
- In data transmission, this is a certain number of bytes divided into a header and a body
- Layer of the OSI model that interfaces directly to applications
- Layer of the OSI model that provides end-to-end communications control
- Layer of the OSI model that is split into two sublayers: MAC and LLC
- The different types of network communications
- Command typed at a windows command line that sends a test packet to a machine to find out if it is reachable
- Command typed at a windows command line that tells you how many hops it took to reach your destination
- An intelligent hub
20 Clues: An intelligent hub • A device that connects networks together • The different types of network communications • The unique address for a network interface card • The protocol used to convert IP addresses into MAC addresses • The protocol used to translate a web address into an IP address • Layer of the OSI model that interfaces directly to applications • ...
11/10 Fndts Vocab 2021-11-10
Across
- The background of the project where the Actors are placed
- Hackers ethical hackers use skills for good, ethical and legal purposes to compromise networks/systems to discover network vulnerabilities in order to be fixed by developers
- stops character from leaving a trial
- Persistent Threat a continuous computer hack that occurs under the radar against a specific object
- uses quotations marks at the beginning and end of this data; not recognized by the programming software
- The order in which steps or events happen
- determines how quickly an object will move through commands
- A set of known actions that the computer can perform
- A Tynker character or object that can talk and interact with others
- this code is used to move objects forward
Down
- Hackers individuals who commit crimes and unethical things, not for personal gain or damage, but to allow the affected organization to know of compromised or weakness in networks
- uses a hashtag to begin the text that is unrecognized by the programming software used for informational purposes only
- has character start drawing a trail
- Broker grey hat hackers: attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
- Warning Systems provide information about potential attacks
- The language that tells a computer what to do
- A specific action or instruction that tells the computer to do something
- Moves Tracy to a specified coordinate
- Domains an area to be protected may be limited by a logical or physical boundary
- Hackers unethical criminals that violate computer/network security
20 Clues: has character start drawing a trail • stops character from leaving a trial • Moves Tracy to a specified coordinate • The order in which steps or events happen • this code is used to move objects forward • The language that tells a computer what to do • A set of known actions that the computer can perform • The background of the project where the Actors are placed • ...
Data Science 2021-06-28
Across
- The fundamental software that support application software* (2)
- A regularization technique for neural networks that prevents overfitting, also a PhD program's nightmare* (7)
- Conceived in 1980, this programming language's name is a tribute to a famous British comedy troupe* (6)
- AI function that imitates the workings of the human brain in processing data and creating patterns for use in decision making* (4,8)
- __________-learning, learning based on example input-output pairs (10)
- Interfaces for programming applications abbr.* (4)
- This is the title given to a small number of open-source developers who retain the final say in disputes, typically project founders abbr.* (4)
- A test that asks 'Can machines think?', famous person* (6)
- AI chatbot by Microsoft taken down for learning and tweeting racist tweets (3)
- The degree of relative correspondence, as between two sets of data* (11)
Down
- Fisher-Yates _______, used by Spotify (7)
- Which is the best Max Planck Institute (12)
- Is attributed the conception of modern data science, or associated to cavaliers (9)
- A more modern term for data dredging or data fishing, initially used as a negative connotation* (6)
- A Python library for data manipulation popular among data scientists, a word play on 'Python Data Analysis'* (6)
- secret_____ (an info that a programmer keeps to himself while writing a software)* (5)
- Knowledge discovery in data abbr.* (3)
- Small Eurasian non-migratory bird with blue, yellow, white and green feathers (4,3)
- Inspired by the synapses in animal brains* (6)
- Synonym for a function, used in Mathematics and Neural Networks (3)
20 Clues: Knowledge discovery in data abbr.* (3) • Fisher-Yates _______, used by Spotify (7) • Which is the best Max Planck Institute (12) • Inspired by the synapses in animal brains* (6) • Interfaces for programming applications abbr.* (4) • A test that asks 'Can machines think?', famous person* (6) • The fundamental software that support application software* (2) • ...
Science's Revolutionary Advancements 2021-05-08
Across
- The aim of medical workers to create a method of gene therapy based on a person's genetic makeup.
- the internet changed the ways people communicate their ideas, pictures, posts, events, and interests
- a competition between two leading countries to develop new technologies to explore
- A development that focuses on how genetic diseases develop and progress
- Rapid exchange of information over networks fundamental to economic activity that this period of history has come to be known as.
- the expansion of rooms and station’s life support and environmental control systems on board
- The transmission of information electronically to remote locations allowed people to work from home by staying connected to a certain network
- The reason doctors use medical imaging for injuries, tumors, or collecting other medical information.
- an attempt to increase food production using new technologies
- A compacted small, multipurpose advancement with a microchip and transistor and integrated circuit
- creation of copying chemical chains of genes
- These factors have improved quality of life, making life easier, healthier, and more accessible
Down
- The starting space shuttle program that began in 1981
- an orbiting object that records images of things many millions of light-years away
- the first people to send an international crew into space
- This country has the highest percentage of Internet users
- technology used to modify genes of living cells for medical or industrial use
- a linkage of networks that enables people to connect, exchange information, communicate and learn
- Risks taken in attempts of increasing food production can cause these things
- The common goal of colleagues working towards on the ISS.
20 Clues: creation of copying chemical chains of genes • The starting space shuttle program that began in 1981 • the first people to send an international crew into space • This country has the highest percentage of Internet users • The common goal of colleagues working towards on the ISS. • an attempt to increase food production using new technologies • ...
computer clues 2024-12-10
Across
- is a document that describes the rules governing access to an organization’s
- Password Authentication Protocol
- The most widely used method for encrypting data is IP Security
- backs up any files that have changed since the last full or incremental backup
- can also be secured with encryption to prevent someone who has gained physical access to a computer from being able to use the data
- A common tool used by many Linux administrators
- creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- creates a barrier between two entities
- what the user knows (username/password)
- what the user has (smart card or key)
Down
- used in a Windows domain environment and provides mutual authentication
- creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- backs up the disk sector by sector to create an exact image of the disk’s contents
- is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- requires a user to supply two or more types of authentication
- what the user is; a unique biometric identifying trait(fingerprint,retina scan, or voice pattern)
- a framework for other protocols that provide encryption and authentication
- involve a certification authority (CA)
- prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
20 Clues: Password Authentication Protocol • what the user has (smart card or key) • involve a certification authority (CA) • creates a barrier between two entities • what the user knows (username/password) • A common tool used by many Linux administrators • requires a user to supply two or more types of authentication • ...
WHL Day 1 Onboarding 2023-02-14
Across
- Report driver issues
- AB is a Wholesale_____
- Assists with missing totes
- Where you go to access Workday & LMS
- Animal Healthcare within __
- A Distributor of Chemotherapy medication
- Communication tool used throughout the company
Down
- Program to store notes and access links
- We all impact the customer
- Dept that handles phone calls and emails
- View Pay statements
- Specialty distributor within AB
- Industry standard price account
- Group purchasing Org member account
- DC team handling controlled Substance Concerns
- Daily tool that you must sign in daily to access networks
16 Clues: View Pay statements • Report driver issues • AB is a Wholesale_____ • We all impact the customer • Assists with missing totes • Animal Healthcare within __ • Specialty distributor within AB • Industry standard price account • Group purchasing Org member account • Where you go to access Workday & LMS • Program to store notes and access links • ...
Anything 2023-11-16
Across
- My current teacher
- Baked cheddar cheesy snack
- My favorite sitcom
- Wizard from lord of the rings
- Basketball player with the initials ad
Down
- Developer of the theory of gravity
- red fruit
- Deadliest land animal
- hydration drink created by logan paul
- tallest land animal
- Verb Synonym for sprinting
- Water ________
- set of seven geometric shapes made up of five triangles (two small triangles, one medium triangle, and two large triangles), a square, and a parallelogram
- one of the three original Tv networks
- 5th smallest planet
- citrus fruit
16 Clues: red fruit • citrus fruit • Water ________ • My current teacher • My favorite sitcom • tallest land animal • 5th smallest planet • Deadliest land animal • Baked cheddar cheesy snack • Verb Synonym for sprinting • Wizard from lord of the rings • Developer of the theory of gravity • hydration drink created by logan paul • one of the three original Tv networks • ...
Networking Terms 2015-03-30
Across
- Borrowed from the telephone industry, this is the standard connector for unshielded twisted pair cabling.
- The physical layer of the network that focuses on hardware elements.
- Used to transmit data only to the intended recipient’s port and create internal connections between systems
- A network that is confined to a small area and generally limited to a geographic area.
- Network topology connecting each system using a BNC T-connector
- Network topology where all systems are connected to a circle of cable.
- Connects networks in larger geographic areas such as states or countries.
- Computer that provide shared resources to network users.
Down
- Topology combining characteristics of linear bus and star topologies.
- Uses rules to filter traffic into and out of the private network, to protect the private network users and data from malevolent hackers.
- Describes the way that network systems are physically connected to each other by media and devices.
- Connect computers in a “star” topology with a series of ports accept network cables.
- Converts “packets” from systems into electrical signals to be sent over the media.
- Topology that utilizes a central network device and all systems plug directly into the device.
- Device that determines the shortest path to a destination and used in between networks using the same protocols
15 Clues: Computer that provide shared resources to network users. • Network topology connecting each system using a BNC T-connector • The physical layer of the network that focuses on hardware elements. • Topology combining characteristics of linear bus and star topologies. • Network topology where all systems are connected to a circle of cable. • ...
Crossword 1 : Network and Telecommunication 2024-05-01
Across
- The entity that receives the message in a communication system.
- A continuously changing signal that represents changes in physical phenomena such as light, sound, pressure, or temperature.
- The entity that creates the message to be transferred in a communication system.
- The process of communicating or transferring data over long distances using devices such as telephones, radios, and TVs.
- The physical or virtual channel through which the message is carried in a communication system.
- A network device that amplifies weak signals to increase the length of a network.
- The amount of data that can travel through a given transmission medium.
Down
- A data transmission mode where data travels in only one direction at a time.
- Devices used to connect various components of computer networks.
- A network device that connects two similar types of networks or LANs together.
- The process of sharing ideas, views, and information with other individuals or machines.
- Instructions or information to be carried out or transmitted.
- Rules and standards that govern the transmission and reception of data in a communication system.
- A signal that takes a limited number of values at discrete intervals of time, typically represented by binary digits (0s and 1s).
- The smallest unit of measurement for data in a computer system, representing binary digits.
15 Clues: Instructions or information to be carried out or transmitted. • The entity that receives the message in a communication system. • Devices used to connect various components of computer networks. • The amount of data that can travel through a given transmission medium. • A data transmission mode where data travels in only one direction at a time. • ...
Networking Concepts. 2025-05-20
Across
- A____ is a network device that is used to connect all the computers in a network with each other.
- A_____ is a device that connects two different types of networks with each other.
- ______________ refers to a layout in which the various component of a network,like nodes,links,pheripherals,etc.,are connected and communicate with each other.
- ______ is a computer network created for an individual person.
- A ______ is used to physically attach a computer to a network so that it can participate in network communication.
- Network Card ____________is the most commonly used network card.
- In___,two or more computers and pheripheral devices are connected within a small area.
- Each computer in a network is called a____.
- In _____________,each device is connected to a central computer using a point-to-point connection.
Down
- A______is a wireless technology used to interconnect mobile phones,computers,and printers using short range wireless connection.
- A____enables you to connect your computer to the available internet connection over the existing telephone lines.
- Wi-Fi stands for______.
- ______ are certain sets of rules that determine how data should be transferred over networks,compressed,prsented on the screen and so on.
- What can be defined as group of computers and other peripheral devices?
- In _____________, all the nodes in the network are connected in a circular manner.
15 Clues: Wi-Fi stands for______. • Each computer in a network is called a____. • ______ is a computer network created for an individual person. • Network Card ____________is the most commonly used network card. • What can be defined as group of computers and other peripheral devices? • A_____ is a device that connects two different types of networks with each other. • ...
Muscle fiber crossword 2024-01-17
Across
- Another name for anerobic respiration
- Gives a quick burst of ATP
- Shortens to SO
- Someone who works out may experience this
- Makes your muscles sore
- Losing something do to age not work ethic
Down
- Shortens to FG
- Process in witch capillary networks form
- Oxygen required after intense exercise
- Muscle that helps you move
- Shortens to FO
- Use of air for energy and breathing
- Muscle we can not control
- Lazy person may experience this
- Muscle in the heart
- Process to create ATP
16 Clues: Shortens to FG • Shortens to FO • Shortens to SO • Muscle in the heart • Process to create ATP • Makes your muscles sore • Muscle we can not control • Muscle that helps you move • Gives a quick burst of ATP • Lazy person may experience this • Use of air for energy and breathing • Another name for anerobic respiration • Oxygen required after intense exercise • ...
francisco's crossword puzzle 2024-03-22
Across
- - inflammation of myocardium
- - chest
- - radiograph test to take pictures of the blood flow
- - vessels that deliver blood to tissue
- - pump blood through the system
- - diseased heart muscle
- - networks of small vessels that perfuse tissues
- - sac that encloses the heart
- - peripheral blood flow is insufficient to return blood to the heart for normal function
Down
- - vessels that return blood to the heart
- - disease from reduced blood flow from the heart
- - one who takes action or does something
- - without
- - plaque buildup in the arteries
- - chemical compound
- - blockage
16 Clues: - chest • - without • - blockage • - chemical compound • - diseased heart muscle • - inflammation of myocardium • - sac that encloses the heart • - pump blood through the system • - plaque buildup in the arteries • - vessels that deliver blood to tissue • - vessels that return blood to the heart • - one who takes action or does something • ...
