networks Crossword Puzzles
francisco's crossword puzzle 2024-03-22
Across
- - inflammation of myocardium
- - chest
- - radiograph test to take pictures of the blood flow
- - vessels that deliver blood to tissue
- - pump blood through the system
- - diseased heart muscle
- - networks of small vessels that perfuse tissues
- - sac that encloses the heart
- - peripheral blood flow is insufficient to return blood to the heart for normal function
Down
- - vessels that return blood to the heart
- - disease from reduced blood flow from the heart
- - one who takes action or does something
- - without
- - plaque buildup in the arteries
- - chemical compound
- - blockage
16 Clues: - chest • - without • - blockage • - chemical compound • - diseased heart muscle • - inflammation of myocardium • - sac that encloses the heart • - pump blood through the system • - plaque buildup in the arteries • - vessels that deliver blood to tissue • - vessels that return blood to the heart • - one who takes action or does something • ...
Tech Talk 2024-03-23
Across
- Machine mimicking human intelligence
- Machines that work like humans
- Global network of computers
- A place you can visit without leaving your chair
- Math behind problem-solving
- Can be plug in many devices
- The brain of a computer
- Protects your computer from attacks
Down
- A field that protect computer systems,networks from digital attacks.
- Graphics processor unit
- Physical parts of a computer
- Getting a file from the internet
- A collection of data
- Malicious software
- The programs of computer
- Needs a mouse and keyboard
16 Clues: Malicious software • A collection of data • Graphics processor unit • The brain of a computer • The programs of computer • Needs a mouse and keyboard • Global network of computers • Math behind problem-solving • Can be plug in many devices • Physical parts of a computer • Machines that work like humans • Getting a file from the internet • Protects your computer from attacks • ...
Electronic Media 2014-01-23
Across
- A set of interconnected web pages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.
- A virtual container in a computer's file system, in which files and other folders may be stored
- A set of keys that allows you to type and enter information on the computer.
- The process of transferring software/information from a server to a computer (the opposite is upload)
- An aggregation of data on a storage device, identified by a name
Down
- A program which can covertly transmit itself between computers via networks (especially the Internet) or removable storage such as CDs, USB drives, floppy disks, etc., often causing damage to systems and data
- Millions of computer networks that communicate together
- Abbreviation of Hypertext Markup Language.
- An application used to keep unauthorized users from accessing parts of a network or computer
- prepare a mass storage medium for initial use, erasing any existing data in the process.
- Frequently Asked Questions
11 Clues: Frequently Asked Questions • Abbreviation of Hypertext Markup Language. • Millions of computer networks that communicate together • An aggregation of data on a storage device, identified by a name • A set of keys that allows you to type and enter information on the computer. • ...
Internet of Things 2025-08-05
Across
- Devices that detect physical stimuli and convert them into electrical signals for IoT systems.
- Layer The layer that handles the exchange of information between devices over the internet in IoT.
- he algorithm that helps optimize the energy efficiency of wireless sensor networks.
- A communication protocol used for lightweight messaging in IoT.
- A method of addressing that supports large-scale IoT devices and networks.
Down
- A key component of IoT that enables physical actions based on data received from sensors.
- A communication protocol that allows for the exchange of data in IoT systems, often used in home automation.
- A method of wireless communication used for short-range, low-power exchanges between devices in IoT.
- A type of network that uses small, low-power devices to monitor physical conditions.
- A protocol used for communication in the application layer of IoT systems, known for its extensibility and flexibility
- The protocol used for transferring data in IoT with a resource-constrained environment, typically used in machine-to-machine communications.
11 Clues: A communication protocol used for lightweight messaging in IoT. • A method of addressing that supports large-scale IoT devices and networks. • he algorithm that helps optimize the energy efficiency of wireless sensor networks. • A type of network that uses small, low-power devices to monitor physical conditions. • ...
Cybersecurity Terminology 2025-06-25
Across
- The process of encoding information in such a way that only authorized parties can access it
- The practice of protecting systems, networks, and programs from digital attacks
- A person who uses computers to gain unauthorized access to data.
- The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network
Down
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Software used to prevent, detect, and remove malicious software
- The process of decoding
- An attempt by hackers to damage or destroy a computer network or system
- This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
11 Clues: The process of decoding • Software used to prevent, detect, and remove malicious software • A person who uses computers to gain unauthorized access to data. • An attempt by hackers to damage or destroy a computer network or system • The practice of protecting systems, networks, and programs from digital attacks • ...
11.5 Wireless Networking 2023-03-28
Across
- An enhancement that allows multiple antennas to use the same radio frequency
- Wireless authentication method that allows for automatic connection between a device and the wireless access point
- Secure authentication method for wired and wireless networks
- Wireless communication technology that allows two devices to connect to each other over a short distance
- Developed by Cisco to address security concerns in RADIUS
- Encryption protocol used on most wireless networks today
- Wireless authentication method that uses a passphrase to authenticate users
- A communication method that allows two-way communication between two devices within a few centimeters of each other
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
- One of the strongest encryption protocols based on the Rijndael algorithm
Down
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices
- Developed to address the security flaws that were prevalent in the Wired Equivalent Privacy (WEP) wireless security standard
- Wireless network that requires no authentication
- IEEE designation for all wireless networking standards
- A method that allows the frequency of the wireless network to be fine-tuned
- A method that combines channels into one to increase bandwidth
- An open standard protocol used to authenticate users onto a network
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network
18 Clues: Wireless network that requires no authentication • IEEE designation for all wireless networking standards • Encryption protocol used on most wireless networks today • Developed by Cisco to address security concerns in RADIUS • Secure authentication method for wired and wireless networks • A method that combines channels into one to increase bandwidth • ...
Attacks on Local Networks 2014-03-26
Across
- Indicates users session
- A popular program for scanning ports
- Machines exchange private data through this process
- Manage traffic in the Internet
- IT division, trying to make Internet more trusted
- Resolves user-friendly names to IP addresses
Down
- An address kept in Switch's CAM table
- The second least popular cause of an IT System failure
- Type of network attacks, where attacker wants to stole some private data
- An ARP protocol based attack
- Logical address of computer in network
11 Clues: Indicates users session • An ARP protocol based attack • Manage traffic in the Internet • A popular program for scanning ports • An address kept in Switch's CAM table • Logical address of computer in network • Resolves user-friendly names to IP addresses • IT division, trying to make Internet more trusted • Machines exchange private data through this process • ...
Networks and internet crossword 2021-06-25
Across
- Data transmission through a network with a high capacity to transport information with a fast internet connect.
- It is a limited form of communication between processes.
- Systematization of wireless communication to minimize wired connections in a local area.
- Set of independent computer systems connected to each other, in such a way that they allow data exchange.
- Device that allows interconnecting computers that work within the framework of a network.
- It is used for the main connection between the distribution panel and the rosette of the workstation.
Down
- Communication occurs through the modulation of electromagnetic waves through space.
- Device designed to send and receive electromagnetic waves.
- A decentralized set of interconnected computer networks that form a single global network.
- Device that converts digital signals to analog and vice versa.
- Computer network that covers an area reduced to a house or apartment.
11 Clues: It is a limited form of communication between processes. • Device designed to send and receive electromagnetic waves. • Device that converts digital signals to analog and vice versa. • Computer network that covers an area reduced to a house or apartment. • Communication occurs through the modulation of electromagnetic waves through space. • ...
Topic 7 Networks (Isaac) 2021-07-01
Across
- Telecommunications, Computers. a system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information.
- is defined as a connected group of computer networks allowing for electronic communication. The networks.
- is a type of Ethernet cable. It supports data transfer rates of up to 100 Mbps, or 12.5 megabytes per second.
- is an electrical or electromagnetic current that is used for carrying data from one device or network to another. It is the key component behind virtually all: Communication. Computing.
- provides high speed internet access via multiple types of technologies including fiber optics, wireless, cable, DSL and satellite.
Down
- is the transfer of information between two or more points that do not use an electrical conductor as a medium by which to perform the transfer. The most common wireless technologies use radio waves. With radio waves.
- A common type of modem is one that turns the digital data of a computer into a modulated electrical signal for transmission over telephone lines, to be demodulated by another modem at the receiver side to recover the digital data.
- is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
- In computer and Internet wireless applications, the most common type of antenna is the dish antenna, used for satellite communications.
- is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building. This gives users the ability to move around within the area and remain connected to the network.
- is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area. A local area network may serve as few as two or three users in a home office or thousands of users in a corporation's central office.
11 Clues: is defined as a connected group of computer networks allowing for electronic communication. The networks. • is a type of Ethernet cable. It supports data transfer rates of up to 100 Mbps, or 12.5 megabytes per second. • provides high speed internet access via multiple types of technologies including fiber optics, wireless, cable, DSL and satellite. • ...
COMPUTERS, OPERATING SIYSTEMS & NETWORKS 2020-12-10
Across
- It is where the power supply is connected, to give power to each of the parts of the motherboard.
- donde ves las cosas que estas haciendo
- is responsible for controlling everything that happens in the computer and the different elements that, together with it, are inside the box
- have one or more ports for the network connection of the computer
- Used to connect video cards.
Down
- integrate their own RAM to avoid consuming the main RAM
- they are used to enter information to the computer, such as the keyboard, mouse or scanner, or output, if through them, the computer returns the information, such as the printer, monitor
- is a printed circuit board to which the components that make up the computer are connected
- lo que utilizas para escribir en un ordenador
- have an integrated circuit to process sound, they also integrate a small RAM memory called "Buffer"
- Used to connect expansion cards (sound, network, more ports, etc.).
11 Clues: Used to connect video cards. • donde ves las cosas que estas haciendo • lo que utilizas para escribir en un ordenador • integrate their own RAM to avoid consuming the main RAM • have one or more ports for the network connection of the computer • Used to connect expansion cards (sound, network, more ports, etc.). • ...
Puzzle #4 2024-05-07
Across
- corrective action/suggestions for improvement
- proof
- process effected by management to provide reasonable assurance
- daily paid union
- an illegal act for financial or personal gain
- protecting sensitive information from unauthorised persons
Down
- monthly paid union
- formal statement of organisation's goal and objectives
- protecting systems, networks, and programs from digital attacks
- proper disclosure of financial information
- competing interest
- highest governing body
- event/action that negatively affects the achievement of objectives
13 Clues: proof • daily paid union • monthly paid union • competing interest • highest governing body • proper disclosure of financial information • corrective action/suggestions for improvement • an illegal act for financial or personal gain • formal statement of organisation's goal and objectives • protecting sensitive information from unauthorised persons • ...
networking concept and cyber ethics 2025-05-29
Across
- Protects computers from hackers
- information Do not share this online
- A network without wires
- ethics Use of computers ethically and legally
- Keeping computer data safe
- Strong way to protect accounts
- Device that joins multiple computers
- Device that connects the network
- addresses Unique addresses for each device
- Type of network that covers a small area
- Wireless technology standard
- Connects LAN to Internet
Down
- Criminal activities using computers
- C Shortcut for copy
- Software to harm or damage a computer
- bullying Sending rude messages online
- Very large network of networks
- Act of accessing a system without permission
- Rules for communication in a network
- network Connects computers together
20 Clues: A network without wires • Connects LAN to Internet • Keeping computer data safe • Wireless technology standard • C Shortcut for copy • Very large network of networks • Strong way to protect accounts • Protects computers from hackers • Device that connects the network • Criminal activities using computers • Device that joins multiple computers • ...
IS-95 CHANNELS 2023-09-26
Across
- Which channel carries voice and data from the base station to the mobile device in IS-95?
- What type of power control in IS-95 helps maintain consistent signal quality?
- What is the main function of the Reverse Traffic Channel in IS-95?
- Which channel instructs the mobile device to adjust its power level in IS-95?
- What is the primary purpose of the Forward Traffic Channel in IS-95?
Down
- What critical role does Power Control play in IS-95 CDMA networks?
- What unit of measurement is typically used for power control adjustments in IS-95?
- Why is power control critically important in IS-95 CDMA networks?
- What channel is used by the mobile device to send data and voice to the base station in IS-95?
- Which channel is exclusively used for initial access and call setup procedures in IS-95?
- How does Power Control in IS-95 help improve system capacity by reducing unwanted radio noise?
11 Clues: Why is power control critically important in IS-95 CDMA networks? • What critical role does Power Control play in IS-95 CDMA networks? • What is the main function of the Reverse Traffic Channel in IS-95? • What is the primary purpose of the Forward Traffic Channel in IS-95? • What type of power control in IS-95 helps maintain consistent signal quality? • ...
Types of measures to counter security threats. Legal bases of information technology security. 2022-05-16
Across
- Methods based on several principles of information security management, each of which serves to solve its own problem
- Measures establishing responsibility for computer crimes, protection of copyright of programmers, improvement of criminal and civil legislation, as well as judicial proceedings.
- The principle of building an information security system, which involves focusing on preventing threats to the most valuable information
- Special mathematical and algorithmic means of protection of information transmitted over communication networks, stored and processed on computers using encryption methods.
Down
- Methods that are based on one principle of information security management
- Methods that are built on the basis of powerful automated intelligent tools with organizational management
- One of the most important methods of analyzing the state of information security
- The principle of building an information security system, which excludes acquaintance of third parties with the means and technology of information protection
- stage that analyzes the possible actions of attackers
- Information transmitted by telecommunication networks
10 Clues: stage that analyzes the possible actions of attackers • Information transmitted by telecommunication networks • Methods that are based on one principle of information security management • One of the most important methods of analyzing the state of information security • ...
IS-95 Channels 2023-10-11
Across
- What critical role does Power Control play in IS-95 CDMA networks?
- Which channel carries voice and data from the base station to the mobile device in IS-95?
- What type of power control in IS-95 helps maintain consistent signal quality?
- What is the primary purpose of the Forward Traffic Channel in IS-95?
- What is the main function of the Reverse Traffic Channel in IS-95?
- Which channel instructs the mobile device to adjust its power level in IS-95?
Down
- How does Power Control in IS-95 help improve system capacity by reducing unwanted radio noise?
- Why is power control critically important in IS-95 CDMA networks?
- What channel is used by the mobile device to send data and voice to the base station in IS-95?
- What unit of measurement is typically used for power control adjustments in IS-95?
- Which channel is exclusively used for initial access and call setup procedures in IS-95?
11 Clues: Why is power control critically important in IS-95 CDMA networks? • What critical role does Power Control play in IS-95 CDMA networks? • What is the main function of the Reverse Traffic Channel in IS-95? • What is the primary purpose of the Forward Traffic Channel in IS-95? • What type of power control in IS-95 helps maintain consistent signal quality? • ...
IT Professions 2024-04-17
Across
- Designs, develops, and maintains software applications or systems.
- Analyzes an organization's IT systems and processes to improve efficiency and functionality through technology solutions.
- Protects computer systems and networks from security breaches, investigates security incidents, and implements security measures to safeguard data.
- Analyzes and interprets complex data sets to extract insights and inform business decisions, using statistical analysis, machine learning, and data visualization techniques.
Down
- Designs and manages cloud computing infrastructure and solutions, including deployment, integration, and optimization of cloud services.
- Manages and maintains an organization's computer networks, including hardware, software, and security protocols.
- Administers, maintains, and secures databases, ensuring data integrity and accessibility.
- Oversees and manages IT projects from initiation to completion, ensuring they are delivered on time, within budget, and meet quality standards.
- Provides technical assistance, troubleshoots hardware and software issues, and assists users with IT-related problems.
- Designs, builds, and maintains websites and web applications using programming languages, frameworks, and technologies.
10 Clues: Designs, develops, and maintains software applications or systems. • Administers, maintains, and secures databases, ensuring data integrity and accessibility. • Manages and maintains an organization's computer networks, including hardware, software, and security protocols. • ...
brodys word cross 2021-06-03
Across
- a wireless communications technology intended to replace cables. It allows short-range connections between two or more compatible devices such as mobile phones, tablets, headsets or medical equipment.
- is a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- part of a string
- the alphabet
Down
- page that an Internet browser first opens up to. It is usually the starting point of an organisation's or individual's website.
- is the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
- to the maximum amount of data that can travel a communications path in a given
- your wifi addresscomputer a machine that uses electronics to input, process and then output data
- page
- a microprocessor that performs many functions and calculations that make your computer run
10 Clues: page • the alphabet • part of a string • to the maximum amount of data that can travel a communications path in a given • a microprocessor that performs many functions and calculations that make your computer run • your wifi addresscomputer a machine that uses electronics to input, process and then output data • ...
Transoceanic Connections 2022-12-05
Across
- frame that deals with groups of people that gather and live together.
- type of source created by hisotrians after an event has concluded usually over 100 years later
- indigenous empire that was located in Central Mexico and invaded by the Spanish
- partial frame paired with production that shows how we share, sell, or trade things within our communities and across networks of interaction
Down
- partial frame paired with distribution that deals with how we make things and within our communities and across networks of interaction
- provides a thorough, well-reasoned argument, based on strong evidence from a trusted person or source
- type of source provided from someone who wtinessed or experienced an event with clear mind
- stories told in class in a comic format that gives insight to average peoples' perspectives in different eras.
- frame that deals with connections of people and communities
- indigenous empire that was located located in South America and invaded by the Spanish
10 Clues: frame that deals with connections of people and communities • frame that deals with groups of people that gather and live together. • indigenous empire that was located in Central Mexico and invaded by the Spanish • indigenous empire that was located located in South America and invaded by the Spanish • ...
Hardware/Equipment Χαρίδης Ευστάθιος 2023-04-28
Across
- An electronic device for connecting a computer to a baseband transmission network so that the computer can transmit and receive signals on the network
- A device or program enabling a user to communicate with a computer.
- An electronic device that amplifies the signal it receives.
- A networking device used to connect multiple network hosts as well as to do data transfers.
- A hardware device that allows a computer to send and receive data over a telephone line, a cable or a satellite connection.
Down
- Like a hub, it is also used to work at the layer of LAN
- A device used to connect two different networks, especially a connection to the internet.
- Used to interconnect local or remote networks in order to centralise network administration.
- A computer program or device that provides a service to another computer program and its user, also known as the client.
- It is a protocol-dependent device that connects multiple devices together.
10 Clues: Like a hub, it is also used to work at the layer of LAN • An electronic device that amplifies the signal it receives. • A device or program enabling a user to communicate with a computer. • It is a protocol-dependent device that connects multiple devices together. • A device used to connect two different networks, especially a connection to the internet. • ...
Voice Mail/Voice Chat 2019-11-12
Across
- It is the type of Electronic Record that is transmitted via an electronic network to the e-mail address of a person.
- It was developed to enable the transmission of multimedia content via text message.
- It is an audio conferencing capability via the Internet.
- It allows you to check your voicemail without having to listen to everything.
Down
- protocol used in sending and receiving e-mail.
- A voice message that a caller leaves when the person called is absent or is busy with another conversation.
- It refers to the process of communicating, interacting and/or exchanging messages over the Internet.
- May refer to any kind of communication over the Internet that offers a real-time transmission of text messages from sender to receiver.
- Is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.
- It is a digital telephone service that uses the Internet for transport, as well as private IP networks.
10 Clues: protocol used in sending and receiving e-mail. • It is an audio conferencing capability via the Internet. • It allows you to check your voicemail without having to listen to everything. • It was developed to enable the transmission of multimedia content via text message. • ...
Network Devices 2024-04-28
Across
- a multiport device that improves network efficiency.
- an internal hardware chip that connects a device to the internet.
- connects two or more hosts or network segments by storing or hosting frames between them.
- connects networks operating on different protocols so data can transfer between destinations.
- an electronic device that works at the physical layer of the OSI model to amplify a received signal. It receives a signal and retransmits it at a higher level or higher power.
Down
- restricts the internet traffic of a private network, controlling what goes in and out.
- connects multiple computer networking devices, working only on the Physical layer of the OSI.
- converts digital signals into analog signals of different frequencies and transmits them to a modem at the receiving location.
- a device that connects two or more packet-switched networks or subnetworks
- a networking device that allows wireless-capable devices to connect to a wired network.
10 Clues: a multiport device that improves network efficiency. • an internal hardware chip that connects a device to the internet. • a device that connects two or more packet-switched networks or subnetworks • restricts the internet traffic of a private network, controlling what goes in and out. • ...
Computer network 2024-09-30
Across
- "A device that directs data packets between networks, enabling internet connectivity."
- (Local Area Network): "This type of network covers a small geographical area, such as an office or building."
- (Metropolitan Area Network): "This network connects users across multiple buildings in a city or campus."
- "In private networks, this aspect is a key concern to protect sensitive data from unauthorized access."
- "A device used in LANs to connect multiple devices and direct data to the correct destination."
Down
- "The amount of data that can be transmitted in a fixed amount of time."
- "The physical or logical layout of a network, such as star or bus in LANs."
- Network: "A secure network where access is restricted to authorized users, often used by businesses."
- (Wide Area Network): "This type of network covers a large geographical area, often spanning cities or countries."
- Network: "A network that is open and accessible to everyone, such as a public Wi-Fi hotspot."
10 Clues: "The amount of data that can be transmitted in a fixed amount of time." • "The physical or logical layout of a network, such as star or bus in LANs." • "A device that directs data packets between networks, enabling internet connectivity." • Network: "A network that is open and accessible to everyone, such as a public Wi-Fi hotspot." • ...
Networking Fundamentals 2025-11-20
Across
- A networking device that connects multiple networks together and forwards data packets between them.
- unique numerical identifier assigned to each device on a network, used to identify and communicate with other devices.
- A set of rules and standards that define how devices on a network communicate with each other.
- A general term describing multiple networks connected together
- A network that connects devices within a limited geographical area, such as a home, office, or building.
Down
- A personal device connected to a network.
- A collection of interconnected devices, such as computers, printers, and servers, that can communicate with each other.
- A networking device that connects devices on a network and forwards data packets between them.
- A security device or software that monitors and controls incoming and outgoing network traffic, based on a set of predefined security rules.
- A network that connects devices over a large geographical area, such as multiple offices in different cities or countries.
10 Clues: A personal device connected to a network. • A general term describing multiple networks connected together • A networking device that connects devices on a network and forwards data packets between them. • A set of rules and standards that define how devices on a network communicate with each other. • ...
DS Crossword 2023-04-21
Across
- Ref: Puzzle 5 - Find the phrase from the clue below
- Ref: Puzzle 2- Enter the number of differences between the two images.
- A metric your algorithm tries to optimize.
- A primary algorithm to perform gradient descent on neural networks.
- There are 1000 wine bottles. One of the bottles contains poisoned wine. A rat dies after one hour of drinking the poisoned wine. Find the minimum number of rats required to find which bottle contains poison in hour.
- a trading discipline employed to evaluate investments and identify trading opportunities in price trends and patterns seen on charts.
- Ref: Puzzle 7 - What is the predicted value of X test = [[10,20,30]]
- Ref: Puzzle 6 - Which car does V own?
Down
- Modeling language for linear programming and mixed-integer linear programming in Python.
- Ref: Puzzle 4 - Find the location
- Python library that allows us to evaluate mathematical operations including multi-dimensional arrays efficiently especially for neural networks.
- Ref: Puzzle 3 - Find the missing number
- A statistical way of comparing two or more techniques typically an incumbent against new rival.
- A large collection of handwritten digits images for training.
- An algorithm for working with a series of events to predict the possibility of an event based on which the other events have happened.
- Ref: Puzzle 1 - When is Rinku’s birthday based on the below dates and statements??
16 Clues: Ref: Puzzle 4 - Find the location • Ref: Puzzle 6 - Which car does V own? • Ref: Puzzle 3 - Find the missing number • A metric your algorithm tries to optimize. • Ref: Puzzle 5 - Find the phrase from the clue below • A large collection of handwritten digits images for training. • A primary algorithm to perform gradient descent on neural networks. • ...
Network Concepts Infrastructures Topologies 2025-02-25
Across
- Typical 127.0.0.1 IP address
- Users can test apps and features on virtual machines to avoid harming their device’s ?.
- IP addresses that start with 10, 172.16 through 172.31, and 192.168 are all [?] IP addresses.
- Active Directory acts as the server piece in a Windows-based ? network.
- A ? switch provides virtual machines with access to the same resources as the host PC. For example, if a PC has internet access, so do its virtual machines.
- Every device on a ? network is responsible for managing access to its own resources.
- Wired LANs typically use [?] cables to connect devices.
- The ? tool allows users to see what someone is doing when connected to a machine.
Down
- In a bus network, every device is connected to a [?] cable.
- A ? hypervisor is installed on a host OS, while a bare-metal hypervisor runs on its own operating system.
- A logical topology describes how [?] flows through a network.
- A virtual LAN connects to another virtual LAN through a [?].
- A [?] is the usual central device for a star network.
- A set of public, private, and perimeter networks that use a single firewall are known as [?]-legged perimeter networks.
- A thermostat programmed remotely using an app is an example of an ? device.
- In a site-to-site connection, two businesses or two locations within a ? are connected to each other.
16 Clues: Typical 127.0.0.1 IP address • A [?] is the usual central device for a star network. • Wired LANs typically use [?] cables to connect devices. • In a bus network, every device is connected to a [?] cable. • A virtual LAN connects to another virtual LAN through a [?]. • A logical topology describes how [?] flows through a network. • ...
Georgina Trevino Internet Crossword Puzzle 2015-04-30
Across
- TABS – the name for a way to display information on websites.
- -- A bully who operates online, in cyberspace; To bully online
- NETWORKS -- online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- – Software program that is designed to damage files on a computer that receives it.
Down
- - a list of citations that appear at the end of a paper, article, chapter or book.
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- – Originally known as Web Log.
- - a piece of writing that has been copied from someone else and is presented as being your own work
- - To renew or revitalize; To reload a webpage on the internet
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- – A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
12 Clues: – Originally known as Web Log. • TABS – the name for a way to display information on websites. • - To renew or revitalize; To reload a webpage on the internet • -- A bully who operates online, in cyberspace; To bully online • - a list of citations that appear at the end of a paper, article, chapter or book. • ...
Router 2023-12-05
Across
- typically refers to a unit of data at the transport layer
- It is one of the oldest and most straightforward routing protocols used in computer networks.
- is a logical subdivision of an IP network
- is a set of rules on a router that controls the traffic allowed or denied
Down
- refers to a connection point on a network device
- is a device or a network node that connects different networks, enabling communication between them
- refers to each segment of a network path that a data packet travels through between the source and the destination
7 Clues: is a logical subdivision of an IP network • refers to a connection point on a network device • typically refers to a unit of data at the transport layer • is a set of rules on a router that controls the traffic allowed or denied • It is one of the oldest and most straightforward routing protocols used in computer networks. • ...
Networking Concepts 2025-06-11
Across
- The computers that communicate with each other
- It represents Wireless Local Area Network. It was developed for mobile, computer devices, but is now used in PCs, video game consoles, smartphones, tablets to exchange data wirelessly over the computer networks
- A computer network created for an individual person
- A device that connects two different types of networks with each other
- it is a Wireless technology used to interconnect mobile phones, computers
- A network maintanted without using wires
Down
- A device which enables you to connect your computer to the available internet connection over the existing telephone lines
- A card used to physically attach a computeretwork so that that it can participate in network communication
- Each device is connected to a central computer using a point-to-point connection. The central server acts as a hub
- each device is connected to a central computer using a point-to-point connection. The central server acts as a hub.
- All nodes in a network are connected in a circular manner
11 Clues: A network maintanted without using wires • The computers that communicate with each other • A computer network created for an individual person • All nodes in a network are connected in a circular manner • A device that connects two different types of networks with each other • it is a Wireless technology used to interconnect mobile phones, computers • ...
technologie 2015-03-26
9 Clues: lungs,heart... • what english for enquete • synonym for "technology" • small remote controlled plane • alterning the ...of the babies • something to connect computers • synonym for "mobile"and "technology" • something with a keyboard and a screen • could create art like picasso in the future
F19 Series 2021-08-30
9 Clues: Large Battery • F19 Pro+ Charger • F19 Pro+ Processor • F19 series tag line • Low Power Processor • Always Stay in Focus • 5% Battery no worry we have • Word's first & Industry leading Video Featrure • Automatically switch between 4G/5G networks according to the environment
AP Human Unit 1 2025-05-16
Across
- is a map
- how over more distance means less likely to interact
- where an innovative idea originated
- shows location
- objects spread over large area
- system for collecting geographic data
- how things are arranged in space
- location relative to other places
- shows data
- physical gap between objects
Down
- geometric arrangement of objects in space
- people being groomed near each other
- the idea that the physical environment limits people
- size of map
- where it is
- how densely people are
- the idea that the environment does not limit people
- how things spread
- interconnected nodes with no center
19 Clues: is a map • shows data • size of map • where it is • shows location • how things spread • how densely people are • physical gap between objects • objects spread over large area • how things are arranged in space • location relative to other places • where an innovative idea originated • interconnected nodes with no center • people being groomed near each other • ...
networking concept and cyber ethics 2025-05-29
Across
- Connects computers together
- A network without wires
- Wireless technology standard
- Unique addresses for each device
- Shortcut for copy
- Keeping computer data safe
- Software to harm or damage a computer
- Connects LAN to Internet
- Device that connects the network
Down
- Rules for communication in a network
- Criminal activities using computers
- information Do not share this online
- Very large network of networks
- Device that joins multiple computers
- Protects computers from hackers
- Act of accessing a system without permission
- Strong way to protect accounts
- ethics Use of computers ethically and legally
- bullying Sending rude messages online
- Type of network that covers a small area
20 Clues: Shortcut for copy • A network without wires • Connects LAN to Internet • Keeping computer data safe • Connects computers together • Wireless technology standard • Very large network of networks • Strong way to protect accounts • Protects computers from hackers • Unique addresses for each device • Device that connects the network • Criminal activities using computers • ...
Security and Viruses 2013-05-01
Across
- a type of grayware, is similar to adware.
- is a program written with malicious intent and sent out by attackers.
- is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
- or malware is a file or program other then a virus that is potentially harmful. Grayware or malware is a file or program other then a virus that is potentially harmful.
Down
- is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- is a self-replicating program that is harmful to networks.
- important in computers and networks
- is a form of attack that prevents users from accessing normal services, such as e-mail and a web server
- of death A series of repeated, larger than normal pings that crash the receiving computer.
- Programming language that allows applets to run within a web browser.
- is a software program that displays advertising on your computer.
11 Clues: important in computers and networks • a type of grayware, is similar to adware. • is a self-replicating program that is harmful to networks. • is a software program that displays advertising on your computer. • is a program written with malicious intent and sent out by attackers. • Programming language that allows applets to run within a web browser. • ...
Life Skill 2023-07-20
8 Clues: very useful • use time wisely • bad for your health • the way it is organised • involving computer networks • path in which a person going • manners respecting each other • exchanging information between two people
Fundamental Concept Related to ICT 2024-09-28
Across
- computing the delivery of computing services (e.g., servers, storage, databases, networking) over the internet ("the cloud")
- Intelligence (AI) the simulation of human intelligence processes by machines, particularly computer systems.
- an organized collection of data that is stored and accessed electronically from a computer system.
- a global system of interconnected computer networks that use the TCP/IP protocol to communicate between devices.
- the physical components of a computer s(e.g., monitor, keyboard, CPU).
- the process of connecting multiple computing devices together to share resources and information.
Down
- programs and applications that run on a computer or other digital devices, instructing them how to perform tasks.
- information that is processed or stored by a computer, often in digital form.
- Literacy the ability to use information and communication technologies to find, evaluate, create, and communicate information.
- the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
10 Clues: the physical components of a computer s(e.g., monitor, keyboard, CPU). • information that is processed or stored by a computer, often in digital form. • the process of connecting multiple computing devices together to share resources and information. • an organized collection of data that is stored and accessed electronically from a computer system. • ...
Set 1 2025-09-17
Across
- A network device that connects different networks and translates data between them.
- video display functionality, likely showing video feed from a camera or sensor at the front door.
- Which system is hosted on the DSN platform, is the primary cargo user interface providing video monitoring and surveillance capabilities through live streams coming from cameras for the purpose of safety and security of airplane and cargo?
- A widely used technology for local area networks (LAN) that connects devices using cables.
- A standard protocol used for data loading and communication in avionics systems.
Down
- The design and organization of a computer's core components and systems.
- A smart server unit that manages wireless applications and communications efficiently for QTR configuration.
- The process of checking or proving that something is accurate, true, or meets specified requirements.
- A network device that connects multiple devices and directs data to the correct destination.
- A communication network that provides digital data transmission services.
10 Clues: The design and organization of a computer's core components and systems. • A communication network that provides digital data transmission services. • A standard protocol used for data loading and communication in avionics systems. • A network device that connects different networks and translates data between them. • ...
Generative Alchemy 2024-02-22
Across
- The type of intelligence that Generative AI aims to achieve, allowing the creation of new data (7 letters)
- The technique in Generative AI that involves generating realistic data by pitting two neural networks against each other (6 letters)
- The space where the model learns to represent data in Generative AI (5 letters)
- The type of intelligence that Generative AI aims to achieve, allowing the creation of new data (7 letters)
- The type of neural network commonly used in Generative AI (7 letters)
Down
- A common issue in Generative AI where the model produces repetitive and limited outputs (11 letters)
- The process of creating new data points in Generative AI (10 letters)
- The individual who introduced the concept of Generative Adversarial Networks (5 letters)
- The type of learning where Generative AI can use reinforcement for training (13 letters)
- The primary goal of a Generative Adversarial Network (3 letters)
10 Clues: The primary goal of a Generative Adversarial Network (3 letters) • The process of creating new data points in Generative AI (10 letters) • The type of neural network commonly used in Generative AI (7 letters) • The space where the model learns to represent data in Generative AI (5 letters) • ...
URBANISATION 2023-04-13
Across
- agricultural or lightly built up areas
- move from city to rural (where there are trees)
- a ratio comparing two spaces
- region that contains Australia
- a city with more than 10million people
- a megacity in India
- a megacity in North America
- support networks that make a city function
- distribution of money in a community
Down
- not very affordable
- population movement from rural to urban
- engineering of natural spaces in urban areas
- natural and technical supplies
- continent contains Chile & Brazil
- our country
- movement from cities to quieter seaside places
- continent that contains France & Germany
- too many people in one area
- locations
19 Clues: locations • our country • not very affordable • a megacity in India • too many people in one area • a megacity in North America • a ratio comparing two spaces • natural and technical supplies • region that contains Australia • continent contains Chile & Brazil • distribution of money in a community • agricultural or lightly built up areas • a city with more than 10million people • ...
Family Partnership Agreements 2022-07-18
Across
- alternate method of completing high school
- higher learning and education
- social connections to peers and community
- collaboration with family
- knowledge gained by living and doing
- beliefs about what a child can achieve
- gaining work experience within a new agency
- new home; classroom; school; community
- 2nd need on Maslow's Hierarchy
- gainful employment
Down
- speak up on behalf of child's life exp.
- permanent nature of a child
- physical place to research information
- skills acquired on raising children
- fixed; regular; adequate
- official paper received for a passing score
- learn English
- social norms and standards groups live by
- outcome of employment
19 Clues: learn English • gainful employment • outcome of employment • fixed; regular; adequate • collaboration with family • permanent nature of a child • higher learning and education • 2nd need on Maslow's Hierarchy • skills acquired on raising children • knowledge gained by living and doing • physical place to research information • beliefs about what a child can achieve • ...
Computer Vocabularies 2022-11-15
Across
- faster, quieter, and more expensive than HDD
- copy others’ work
- it makes sure that no information will be lost
- a network that interconnects with other computers in a large area
- go into other’s personal data
- rules for the internet
- allows information when you search it
- Drive it contains memory for data storage
Down
- large, slow, and expensive
- intellectual property
- unwanted communication
- parts of a large item
- computer memory
- a security system
- powerhouse of a computer
- a network that interconnects with other computers in a certain area
- surface
- Security protection for networks
- used to connect computers
19 Clues: surface • computer memory • a security system • copy others’ work • intellectual property • parts of a large item • unwanted communication • rules for the internet • powerhouse of a computer • used to connect computers • large, slow, and expensive • go into other’s personal data • Security protection for networks • allows information when you search it • ...
Max Roman 3rd hour 2025-02-07
Across
- life after death
- a stream or river
- tomb for pharaohs in old kingdom
- a low triangular shape where water divides into a bigger body of water
- the first peace treaty
- a ruler of ancient egypt
- a large water fall
- process of preserving the body and wrapping it
- series of rulers of the same family
- pharaoh has his tomb in a pyramid
- record keeper
- tomb found almost fully intact
Down
- a form of writing in ancient egypt
- used for paper
- the preservation of a dead body and wrapping them
- changed the religion of ancient egypt
- flooding
- god or goddess
- dry climate
- pharaoh who established trade networks
20 Clues: flooding • dry climate • record keeper • used for paper • god or goddess • life after death • a stream or river • a large water fall • the first peace treaty • a ruler of ancient egypt • tomb found almost fully intact • tomb for pharaohs in old kingdom • pharaoh has his tomb in a pyramid • a form of writing in ancient egypt • series of rulers of the same family • ...
networking concept and cyber ethics 2025-05-29
Across
- Protects computers from hackers
- information Do not share this online
- A network without wires
- ethics Use of computers ethically and legally
- Keeping computer data safe
- Strong way to protect accounts
- Device that joins multiple computers
- Device that connects the network
- addresses Unique addresses for each device
- Type of network that covers a small area
- Wireless technology standard
- Connects LAN to Internet
Down
- Criminal activities using computers
- C Shortcut for copy
- Software to harm or damage a computer
- bullying Sending rude messages online
- Very large network of networks
- Act of accessing a system without permission
- Rules for communication in a network
- network Connects computers together
20 Clues: A network without wires • Connects LAN to Internet • Keeping computer data safe • Wireless technology standard • C Shortcut for copy • Very large network of networks • Strong way to protect accounts • Protects computers from hackers • Device that connects the network • Criminal activities using computers • Device that joins multiple computers • ...
SKIN 2021-10-05
Across
- types of material that animals and plants are made of
- changed into a form that contains keratin
- filled with basophil granules
- pigment
- secretes mucus and lines body cavities
- contains elastic fiber networks
- only cells found in healthy cartilage
- mesothelial tissue
Down
- outer protective layer
- contains bundles of collagen
- bone cell
- membrane that provides cell and tissue support
- specialized connective tissue
- calcified material. flexable but firm connective tissue
- transparent type of cartilage
- tissues that make up different types of muscles
- cell that produces collagen and other fibers
- large phagocytic cell
- funemental unit of compact bone
19 Clues: pigment • bone cell • mesothelial tissue • large phagocytic cell • outer protective layer • contains bundles of collagen • specialized connective tissue • transparent type of cartilage • filled with basophil granules • contains elastic fiber networks • funemental unit of compact bone • only cells found in healthy cartilage • secretes mucus and lines body cavities • ...
Networking concepts and Cyber Ethics Puzzle 2025-06-12
Across
- : Directs traffic between networks
- Fake emails to steal information
- : A computer that provides services to other computers
- : Malicious software
- : Right to control your personal data
- : Moral principles guiding behavior
- : Connects devices within a network
- : A wide area network
- : Online harassment or bullying
- : A harmful program that replicates itself
Down
- : Device that connects your computer to the internet
- Address : Unique number assigned to each device
- : Protects the network from unauthorized access
- : Securing data by converting it to code
- : A set of rules for communication
- Used to protect digital accounts
- : Unauthorized access to data
- : A local area network
- : Data transfer capacity
19 Clues: : Malicious software • : A wide area network • : A local area network • : Data transfer capacity • : Unauthorized access to data • : Online harassment or bullying • Fake emails to steal information • Used to protect digital accounts • : Directs traffic between networks • : A set of rules for communication • : Moral principles guiding behavior • : Connects devices within a network • ...
Computers, Networks and The Internet 2025-05-04
Across
- Permanent storage device.
- A device that connects multiple computers in a network.
- The brain of the computer.
- A wireless technology that allows devices to connect to the network without cables.
- A device that extends the range of a Wi-Fi network.
- A global network of interconnected computers.
- A device that provides internet access by converting digital data into analog signals.
- A device that forwards data between different networks.
Down
- A cable that uses light to transmit data at high speeds over long distances.
- A network that covers a small area like a home or office.
- The programs and operating systems that run on a computer.
- A network that covers a large geographical area.
- The main circuit board in a computer.
- The physical components of a computer.
- Temporary memory used by the computer.
15 Clues: Permanent storage device. • The brain of the computer. • The main circuit board in a computer. • The physical components of a computer. • Temporary memory used by the computer. • A global network of interconnected computers. • A network that covers a large geographical area. • A device that extends the range of a Wi-Fi network. • ...
Electronic Media 2014-01-23
Across
- An aggregation of data on a storage device, identified by a name
- An application used to keep unauthorized users from accessing parts of a network or computer
- prepare a mass storage medium for initial use, erasing any existing data in the process.
- The process of transferring software/information from a server to a computer (the opposite is upload)
- A program which can covertly transmit itself between computers via networks (especially the Internet) or removable storage such as CDs, USB drives, floppy disks, etc., often causing damage to systems and data
Down
- Millions of computer networks that communicate together
- A set of keys that allows you to type and enter information on the computer.
- Abbreviation of Hypertext Markup Language.
- A virtual container in a computer's file system, in which files and other folders may be stored
- Frequently Asked Questions
- A set of interconnected web pages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.
11 Clues: Frequently Asked Questions • Abbreviation of Hypertext Markup Language. • Millions of computer networks that communicate together • An aggregation of data on a storage device, identified by a name • A set of keys that allows you to type and enter information on the computer. • ...
Tech Terms 2022-04-13
Across
- A network that extends a private network across a public network and lets users send and receive information across public networks as if their devices were directly connected to the network
- when someone sends a message designed to make to reveal personal information
- A social network that allows people to send short clips, and photos into the public for people to judge, and private chats with friends
Down
- Unique set of traceable digital activities
- A social network that allows people to send videos to the public, and get feedback on them.
- A bulky device that can access the internet
- Any software designed to cause disruption to a computer
- A social network that allows people to send messages out into the public, and get feedback on them
- Data that provides information on other data
- A network giving you a lot of information and online facilities, consisting of interconnected networks
- A portable device that can access the internet, and connect with others.
11 Clues: Unique set of traceable digital activities • A bulky device that can access the internet • Data that provides information on other data • Any software designed to cause disruption to a computer • A portable device that can access the internet, and connect with others. • when someone sends a message designed to make to reveal personal information • ...
Andrew Shinn 2013-12-02
Across
- software used to to veiw various kinds of internet resourses found on the web
- a bully who operates online, in cyberspace; to bully online
- a global network of thousands of other computer networks that offers email and infomation retrieval servises to millions of people
- a part of a computer system or network that is desighned to block unauthorized access while permitting outward communication
- software program that is desighned to damage files on a computer that recieves it virus replicates (repoduce) and can spread to the other application and operating system software
- an unauthiorized person who secretly gains access to computer files
- a reference to a publish or unpulshed source
Down
- the unauthorized use, reproduction, distubution, or transmission of copyright material
- a list of cititions that appear at the end of tye papaer
- to renew or revitalize;to reload a webpage on the internet
- a collaborative website which can be direcly edited with access to it; www.wikipedia.com
- a system of connected computers that allows the sharing of files and equipment there are two types of networks local area network and world wide network
12 Clues: a reference to a publish or unpulshed source • a list of cititions that appear at the end of tye papaer • to renew or revitalize;to reload a webpage on the internet • a bully who operates online, in cyberspace; to bully online • an unauthiorized person who secretly gains access to computer files • ...
Cross Word Puzzle - Cyber Security 2023-10-12
Across
- the gaining of unauthorised access to data in a system or computer
- a type of software program created to protect information technology systems and individual computers from malicious software or malware
- the practice of protecting systems, networks and programs from digital attacks
- a type of malware that spreads between computers and damages data and software
- a string of characters that allows access to a computer system or service
- software that is specifically designed to disrupt, damage or gain unauthorised access to a computer
- malware that misleads users of its true intent by disguising itself as a standard program
Down
- the protection of personal data from those who should not have access to it
- individuals or teams of people who use technology to commit malicious activities on digital systems or networks
- the actual person or organisation who is directly affected by the hacker's use of stolen data or information
- a security system designed to prevent unauthorised access into or out of a computer network
- a system that connects two or more computer devices for transmitting and sharing information
12 Clues: the gaining of unauthorised access to data in a system or computer • a string of characters that allows access to a computer system or service • the protection of personal data from those who should not have access to it • the practice of protecting systems, networks and programs from digital attacks • ...
Network Security Crossword 2022-07-21
Across
- any piece of software, malicious or not, that displays advertisements on a computer.
- malware that threatens to publish the victims personal data, block access to the computer, unless a ransom is paid.
- malicious software that aims to gather information about a person or organisation.
- a cyberattack that redirects a website’s traffic to another, fake site by installing malware on the computer.
- software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
- A person who gains unauthorised access to computer files or networks in order to further social or political ends.
Down
- The practice of protecting system, networks and programs from digital attacks
- A person who uses computers to gain unauthorised access to data.
- malware that replicates itself in order to spread to other computers.
- logging what keys people have tapped on the keyboard
- programs which users are tricked into installing under the pretence that they are legitimate and useful.
- A computer program which is hidden within another program (the ‘host’ program). the virus code is only run when the host program is executed.
12 Clues: logging what keys people have tapped on the keyboard • A person who uses computers to gain unauthorised access to data. • malware that replicates itself in order to spread to other computers. • The practice of protecting system, networks and programs from digital attacks • malicious software that aims to gather information about a person or organisation. • ...
Cloud Computing Systems 2014-04-29
Across
- requesting program or user
- electronic holding place for instructions or data
- primary text input device
- a computer program
- representing data as numerical values
- worldwide system of computer networks
- operated frome a distance
Down
- primary computer pointing device
- a computer providing services to other computer programs
- a programmable machine
- a simple device having input/output links
- a program that directs operations
- abbreviation for hard disk drive
- the legal right to use a patent owned by another
- capacity or space
- a system of points or nodes interconnected by telecommunication paths
- numerical information
17 Clues: capacity or space • a computer program • numerical information • a programmable machine • primary text input device • operated frome a distance • requesting program or user • primary computer pointing device • abbreviation for hard disk drive • a program that directs operations • representing data as numerical values • worldwide system of computer networks • ...
tech terms 2 2024-11-13
Across
- Small pieces of data stored on a user's computer by web browsers while browsing a website
- HyperText Markup Language
- A unit of digital information equal to 1,024 kilobytes, commonly used to measure the size of files and storage capacity.
Down
- Portable Document Format
- or Reboot: Boot - The process of starting up a computer and loading the operating system. Reboot - Restarting a computer, either through a complete shutdown or by refreshing the operating system without turning off the power.
- Address Internet Protocol Address - A unique string of numbers separated by periods
- Malicious software designed to harm, exploit, or otherwise compromise the integrity of computers and networks.
- systems: Software that manages computer hardware and software resources, providing services for computer programs.
- :A family of networking technologies used for wired local area networks
9 Clues: Portable Document Format • HyperText Markup Language • :A family of networking technologies used for wired local area networks • Address Internet Protocol Address - A unique string of numbers separated by periods • Small pieces of data stored on a user's computer by web browsers while browsing a website • ...
occupations 2018-03-13
Across
- takes money from customers at a store
- designs homes and buildings
- fixes motors
- elected by the people to serve in government
- helps students with their homework
- builds with wood
- sells things at a store
- designs and fixes complicated systems
- fixes teeth
Down
- keeps record and manages money for companies
- cooks and food and manages kitchen
- answers the phones in companies
- guide shows places to tourists
- writes stories
- takes tickets at a movie theatre
- attendant works in an airplane to serve guests
- cares for patients
- technician fixes and builds company computer networks
- designer creates and manages websites
19 Clues: fixes teeth • fixes motors • writes stories • builds with wood • cares for patients • sells things at a store • designs homes and buildings • guide shows places to tourists • answers the phones in companies • takes tickets at a movie theatre • cooks and food and manages kitchen • helps students with their homework • takes money from customers at a store • ...
REPRESENTATION DE SOI ET RAPPORT A AUTRUI VOCABULARY TEST 2019-12-07
Across
- This word means being worried and unhappy
- Synonym for "types"
- Synonym for "pensive"
- Something that doesn't last (durer) long is...
- Image created with a pen or pencil
Down
- Synonym for "represent"
- Synonym for "evident"
- Synonym for "photo"
- All the social media are present on social ...
- Image created with colours and a brush (pinceau)
10 Clues: Synonym for "photo" • Synonym for "types" • Synonym for "evident" • Synonym for "pensive" • Synonym for "represent" • Image created with a pen or pencil • This word means being worried and unhappy • All the social media are present on social ... • Something that doesn't last (durer) long is... • Image created with colours and a brush (pinceau)
Staying Safe Online 2020-03-17
Across
- You shouldn't give ...information.
- You should only download these from verified stores.
- This should be private.
- You should keep this up to date.
- You can always ask for this.
Down
- You need a strong ... connection.
- You need a strong one.
- Use private ... networks.
- Websites may ... you.
- You should install one of these.
10 Clues: Websites may ... you. • You need a strong one. • This should be private. • Use private ... networks. • You can always ask for this. • You should install one of these. • You should keep this up to date. • You need a strong ... connection. • You shouldn't give ...information. • You should only download these from verified stores.
Information Technology Terms 2021-10-27
Across
- To remove an online account
- Abreviation for Plain Old Telephone Service
- Transfer from online to on paper
- Way to type
- Houses computer questions (2 words)
Down
- A web address
- Connection to a wired internet (2 words)
- One-to-one connection
- A device that routes traffic between networks
- Is used for researching
10 Clues: Way to type • A web address • One-to-one connection • Is used for researching • To remove an online account • Transfer from online to on paper • Houses computer questions (2 words) • Connection to a wired internet (2 words) • Abreviation for Plain Old Telephone Service • A device that routes traffic between networks
The World of AI 2017-11-07
Across
- Chinese American computer scientist that founded the Google Brain Deep Learning Project, and is famous for his research on AI and Big Data.
- A computer program that conducts conversations with human users by simulating how humans would behave as a conversational partner.
- ...vision is the science that studies how machines can be made for gaining high-level understanding from digital images or videos.
- A specific set of instructions, contained within a computer program, which determine how that program analyses and uses data to complete its specified task (target function).
- First computer program to defeat a professional human Go player.
- ...learning is a subset of AI and Machine learning in which Neural networks are “layered”, combined with plenty of computing power, and given a large measure of training data to create extremely powerful learning models capable of processing data in new and exciting ways in a number of areas, e.g. advancing the field of computer vision.
Down
- ...neural network is a class of artificial neural networks applied to analyze visual imagery.
- ...neural network is a class of artificial neural networks applicable to tasks such as unsegmented, connected handwriting recognition or speech recognition.
- ...learning is sub-genre of AI in which computer programs and algorithms can be designed to “learn” how to complete a specified task, with increasing efficiency and effectiveness as it develops. Such programs can use past performance data to predict and improve future performance.
- Abbreviation for Advanced Driver Assistance Systems.
10 Clues: Abbreviation for Advanced Driver Assistance Systems. • First computer program to defeat a professional human Go player. • ...neural network is a class of artificial neural networks applied to analyze visual imagery. • A computer program that conducts conversations with human users by simulating how humans would behave as a conversational partner. • ...
Nicholas 2014-04-04
Across
- RESOURCE LOCATOR (URL) – Full website address.
- - a piece of writing that has been copied from someone else and is presented as being your own work
- – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- - To renew or revitalize; To reload a webpage on the internet
- TABS – the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
Down
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system
- - a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network NETIQUETTE – Network etiquette; Online manners; following the rules of conduct for online or internet users, being a good digital citizen.
- ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com SOCIAL NETWORKS -- online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
10 Clues: RESOURCE LOCATOR (URL) – Full website address. • - To renew or revitalize; To reload a webpage on the internet • - a piece of writing that has been copied from someone else and is presented as being your own work • – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing) • ...
Workgroup server 2024-12-16
8 Clues: workgroup servers role • workgroup servers function • small networks central computer • computer that manage network user • workgroup servers operative system • workgroup server's security feature • computer that manages a small network • network device that connects multiple devices
TEST 2025-07-13
8 Clues: fast storage device • remote backup solution • connects different networks • type of network without cables • interface with icons and menus • measure of network data capacity • data tool with cells and formulas • software that protects from malware
ATL Crossword 2023-10-16
Across
- A term for a situation in which a system or network is completely isolated from other networks for security.
- A type of cybersecurity threat that mimics legitimate software but is malicious in nature.
- A group of computers controlled by an attacker to carry out tasks without the user's knowledge.
- A type of malware named after a deceptive ancient Greek tactic.
Down
- A form of authentication that relies on a physical attribute, like a fingerprint or iris scan.
- A set of rules or configurations that dictate which network traffic is allowed or blocked.
- A common form of cyber attack involving massive amounts of traffic to overwhelm a target system.
- A type of malware that can spread autonomously through networks.
8 Clues: A type of malware named after a deceptive ancient Greek tactic. • A type of malware that can spread autonomously through networks. • A set of rules or configurations that dictate which network traffic is allowed or blocked. • A type of cybersecurity threat that mimics legitimate software but is malicious in nature. • ...
ISO/OSI model in communication networks 2022-04-04
Across
- a set of rules formally described that define the communication modalities between two or more entities.
- a small segment of a larger message.
- display in succession.
- the activity performed by the user from the first time he accesses a page of the server side application, until he closes the browser.
- connection between a computer and its peripheral units, or, also, the connection between two or more computers.
- the set of methods and techniques used in the transmission, reception and processing of data and information.
- a written acknowledgment that something of value has been transferred from one party to another.
- a device that originates, or generates, an information transfer to one or more receivers.
- a hardware module or device used to receive signals of different kinds, depending on the context of the application.
- computer on which information is stored which other computers (called clients) can access by means of a connection.
- a system of networking of several computers and users.
- a software installed or a series of software being run on a computer with the purpose and result of making one or more functions possible.
- information that has been translated into a form that is efficient for movement or processing
- transmit data between sender and recipient.
Down
- the process of sending and propagating analog or signals of digital information.
- the organization of programming into separate functional components that interact in some sequential and hierarchical way
- The degree of subordination in a hierarchy in data management structures or communication protocols.
- who provides a standard service or product.
- any hardware device in the system capable of communicating with other devices that are part of the network.
- interconnected computing devices that can exchange data and share resources with each other
- system is a computer system that combines portability and interoperability and uses open software standards.
- is a way of converting the original text into a sequence of letters, numbers and special signs that only those with the correct decryption key can convert back.
- the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.
- an unregulated custom that develops and spreads as if it were. Specifications or styles that are widely accepted by users and adopted by several vendors.
24 Clues: display in succession. • a small segment of a larger message. • who provides a standard service or product. • transmit data between sender and recipient. • a system of networking of several computers and users. • the process of sending and propagating analog or signals of digital information. • ...
Black Death and Trade Networks 2023-03-12
Across
- What is another word for peace? One word.
- Fleas transmitted the bacteria to humans by _______________ into their bloodstream. One word.
- What century did the Bubonic Plague occur? One word.
- What was one thing that came out of the lymph nodes when someone caught the plague? One word.
- New plows forever changed European _______________. One word.
- Who was famous Italian merchant who traveled along the Silk Road? Two words.
- What era or time period started as a result of the Black Death? One word.
Down
- Internal bleeding causes swellings of pus and blood to discolor this bodily organ. One word.
- What was the war-free time that allowed more trade connections to develop all across Afro-Eurasia called? Two words.
- After the plague, wages increased by how many percent? One word.
- What religious group was blamed and later killed for the Black Death? One word.
- Workers used their higher wages to buy these items. Two words.
- In the nineteenth century there was a great outbreak of the plague in this country. One word.
- What was the biggest computer virus in history? Two words.
- Human interactions with _______________ and the environment also helped spread the plague. One word.
15 Clues: What is another word for peace? One word. • What century did the Bubonic Plague occur? One word. • What was the biggest computer virus in history? Two words. • New plows forever changed European _______________. One word. • Workers used their higher wages to buy these items. Two words. • After the plague, wages increased by how many percent? One word. • ...
Operating Systems and Networks 1A 2023-11-08
Across
- An example of an ___ is 69.147.76.876
- The device that serves as a gateway to transfer data between networks is called a ____.
- File _____is a file management application used for accessing and organizing files.
- A _____ network is a network of computers that share resources but also share equal control over resources.
- A ___ is a computer that is dedicated to provide a certain service and manage resources.
- An __ system is software that manages how hardware and software work together and talk to each other.
- _____are workstations that are connected to a network.
- In a ___ computers are located close together.
- A ___covers a much larger area than a Local Area Network.
Down
- The ____ is the largest WAN in the world.
- A file ____ tells the computer what type of program it needs to open, view, print, or edit a particular file.
- Three ways that computers can be ___ together are WiFi, Wired, and 3G/4G.
- ____files can help you find them quickly and efficiently.
- crispacademy.com is an example of a ___ name.
- A ___is a group of computers that are connected together in order to share resources and information quickly and efficiently.
15 Clues: An example of an ___ is 69.147.76.876 • The ____ is the largest WAN in the world. • crispacademy.com is an example of a ___ name. • In a ___ computers are located close together. • _____are workstations that are connected to a network. • ____files can help you find them quickly and efficiently. • A ___covers a much larger area than a Local Area Network. • ...
Definitions 2025-02-13
Across
- One (sound) sample per second;
- A structured/organised set/collection of data // A (persistent) store/file of structured/organised data;
- controls / manages / runs the computer//enables the computer to function//manages the computer hardware / application software//provides a platform for other software / provides a platform to run application software;
- A database with multiple tables; that are linked together // that reference each other;
- (Malware is a blanket/umbrella term for) computer software/program/code; with malicious/hostile/intrusive intent;
- The processes / practices / technologies / measures designed to protect networks / computers / programs / data; from attack / damage / unauthorised access;
- Single point in an image;//Smallest (addressable) part / bit of an image//
- A computer system with a dedicated/specific purpose or function; built in to a physical product/device/machine;
- The number of bits per sample
- A field in one table; that is a primary key in another table;
Down
- retains data when power is lost / does not lose its contents when power is lost;
- Physical / electrical / electronic Component(s) / part(s) / element (of a computer system);
- The art of manipulating people so they give up confidential information.
- program / code / instructions (executed by / controls the operation of the hardware);
- A sequence / series of steps / instructions; (that can be followed) to complete a task / to solve a problem;
- for (end) user tasks;
- (A set of) rules; that allow devices / networks to communicate / transfer data;
- Removing unnecessary detail/information/data from the problem/task;
- a group/collection/number of computers; A. devices (that contain CPUs) connected/linked together;
19 Clues: for (end) user tasks; • The number of bits per sample • One (sound) sample per second; • A field in one table; that is a primary key in another table; • Removing unnecessary detail/information/data from the problem/task; • The art of manipulating people so they give up confidential information. • ...
Data Privacy Crossword! 2017-01-23
Across
- Series of words used as a password
- Information collected and maintained by a government entity and available to the general public.
- A small text file stored on a client machine that may later be retrieved by a web server from the machine.
- The conversion of digital information into a format unreadable to anyone except those possessing a “key”
- Some stores and other locations use this to track movements while you are within range.
- Unsolicited commercial e-mail.
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Down
- Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
- The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
- Criminal activities carried out by means of computers or the Internet.
- Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
- May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
12 Clues: Unsolicited commercial e-mail. • Series of words used as a password • Criminal activities carried out by means of computers or the Internet. • May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out) • Some stores and other locations use this to track movements while you are within range. • ...
Sarah's internet crossword puzzle (2) 2014-04-04
Across
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material.
- NETWORKS- online, instagram, my space, Facebook, twitter, Google +. social networks
- – Network etiquette; Online manners.
- - a restricted computer network, online!!
- TABS – the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
Down
- – A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- - a piece of writing that has been copied from someone else and is presented as being your own work
- ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text.
- to click the arrow on the internet bar
- – A system of connected computers that allows the sharing of files and equipment.
- RESOURCE LOCATOR (URL) – Full website address
12 Clues: – Network etiquette; Online manners. • to click the arrow on the internet bar • - a restricted computer network, online!! • RESOURCE LOCATOR (URL) – Full website address • – A system of connected computers that allows the sharing of files and equipment. • NETWORKS- online, instagram, my space, Facebook, twitter, Google +. social networks • ...
Smartphones 2024-05-09
Across
- persistent urge to use a drug
- individual movile device
- global system of interconnected networks
- act of using resources
- material for sexual arousal
Down
- actions or words intented to hurt people
- age between birth and puberty
- age between puberty and adulthood
- complete lack of social contact
- the way in wich one acts and conducts oneself
10 Clues: act of using resources • individual movile device • material for sexual arousal • age between birth and puberty • persistent urge to use a drug • complete lack of social contact • age between puberty and adulthood • actions or words intented to hurt people • global system of interconnected networks • the way in wich one acts and conducts oneself
Smartphones 2024-05-09
Across
- persistent urge to use a drug
- the way in wich one acts and conducts oneself
- actions or words intented to hurt people
- individual movile device
- global system of interconnected networks
- act of using resources
Down
- age between birth and puberty
- age between puberty and adulthood
- material for sexual arousal
- complete lack of social contact
10 Clues: act of using resources • individual movile device • material for sexual arousal • persistent urge to use a drug • age between birth and puberty • complete lack of social contact • age between puberty and adulthood • actions or words intented to hurt people • global system of interconnected networks • the way in wich one acts and conducts oneself
multimedia 2013-02-10
Across
- HD resolution (720 pixels)
- portable network graphics
- images that are usually vector or bitmap
- blending colours to modify colours or produce new ones
- the network of networks
- the process of transferring one file to another
Down
- a program that allows you to view web documents
- HD resolution (1080 pixels)
- 24 frames per second
- drawn motion files, either in 2-D or 3-D
- software, typically ending in .DRV
- random access memory
- wide area network
- local area network
14 Clues: wide area network • local area network • 24 frames per second • random access memory • the network of networks • portable network graphics • HD resolution (720 pixels) • HD resolution (1080 pixels) • software, typically ending in .DRV • images that are usually vector or bitmap • drawn motion files, either in 2-D or 3-D • a program that allows you to view web documents • ...
Wireless Technology 2024-04-26
Across
- Range of frequencies used for wireless communication.
- Network divided into geographic cells.
- Early wireless security protocol.
- Identifier for wireless networks.
- Network of interconnected nodes.
- Long-distance wireless communication via orbiting objects.
- Latest Wi-Fi security protocol.
- IEEE standard for wireless networking.
- Localized network of devices.
Down
- Transmission of data without physical cables or wires.
- Device connecting multiple devices to the internet.
- Device allowing wireless connection to a wired network.
- Short-range wireless technology.
- Organization that standardized Wi-Fi.
14 Clues: Localized network of devices. • Latest Wi-Fi security protocol. • Short-range wireless technology. • Network of interconnected nodes. • Early wireless security protocol. • Identifier for wireless networks. • Organization that standardized Wi-Fi. • Network divided into geographic cells. • IEEE standard for wireless networking. • ...
homework assignment 2014-02-26
Across
- one who hurts or intimidates weaker people
- to speak badly about somebody
- a fence or obstruction
- united,linked or joined
- group of allied objects
- mechanisms some thing that copy's or imitates the original design
- attributes
- to worry or torment
- power to effect other people or events
- declare strongly
Down
- means of exchanging messages
- unparalleled
- to have high regard of somebody
- connection between blood or marriage
- call to fight or account
- alter,make or become different
- networks some thing that connects people over the internet [example: Facebook or twitter
17 Clues: attributes • unparalleled • declare strongly • to worry or torment • a fence or obstruction • united,linked or joined • group of allied objects • call to fight or account • means of exchanging messages • to speak badly about somebody • alter,make or become different • to have high regard of somebody • connection between blood or marriage • power to effect other people or events • ...
Tech Crossword 2013-11-01
Across
- Runs the computer
- Storing digital info on rapidly moving disks
- Quality
- Numerical label assigned to a device
- Process of encoding info
- Card Generates feed Of output into images
Down
- Device that sends packets forward between networks
- Chunk of data
- Scoring then kissing your bicep in a celebratory fashion
- Getting down on one knee and pray
- Makes up an image
11 Clues: Quality • Chunk of data • Runs the computer • Makes up an image • Process of encoding info • Getting down on one knee and pray • Numerical label assigned to a device • Card Generates feed Of output into images • Storing digital info on rapidly moving disks • Device that sends packets forward between networks • Scoring then kissing your bicep in a celebratory fashion
REPRESENTATION DE SOI ET RAPPORT A AUTRUI - VOCABULARY TEST 2019-12-07
Across
- down Contrary of "stand up"
- Synonym for "pensive"
- Something that doesn't last (durer) long is...
- Image created with a pen or pencil
- Synonym for "evident"
- This word means being worried and unhappy
Down
- Synonym for "represent"
- Synonym for "photo"
- All the social media are present on social ...
- Image created with colours and a brush (pinceau)
- Synonym for "types"
11 Clues: Synonym for "photo" • Synonym for "types" • Synonym for "pensive" • Synonym for "evident" • Synonym for "represent" • down Contrary of "stand up" • Image created with a pen or pencil • This word means being worried and unhappy • All the social media are present on social ... • Something that doesn't last (durer) long is... • Image created with colours and a brush (pinceau)
MOD 1 2021-04-01
Across
- to large network / hundreds or thousands of interconnected computers
- Area Network (LAN) / that interconnects computers within a limited area such as a residence, school, laboratory, university campus, or office building
- architecture / the design of a computer network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as communication protocols used
- device / where a message originates from or where it is received
- / shared boundary across which two or more separate components of a computer system exchange information
- Port / where communication begins or ends on a physical device or unit of equipment
- File Sharing / Networking sharing technology that allows the users to access mainly the multimedia files, also establishes TCP or UDP connections.
- / allows a message to travel from source to destination.
- / computer program or a device that provides functionality for other programs or devices
- topology diagram / illustrate the physical location of intermediary devices and cable installation.
- networks / combines different services together
- Office / Home Office or SOHO / connect a few computers to each other and the Internet
- network / group of computers, each of which acts as a node for sharing files within the group
- / partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely
Down
- / local or restricted communications network, especially a private network created using World Wide Web software
- Service Provider (ISP) / an organization that provides a myriad of services for accessing, using, or participating in the Internet
- topology diagram / illustrate devices, ports, and the addressing scheme of the network.
- / network of networks
- device / interconnects end devices
- Interface Card (NIC) / a computer expansion card for connecting to a network, using an Ethernet cable with an RJ-45 connector
- / computers that send requests to the servers to retrieve information
- Area Network (WAN) / extends over a large geographic area
22 Clues: / network of networks • device / interconnects end devices • networks / combines different services together • / allows a message to travel from source to destination. • Area Network (WAN) / extends over a large geographic area • device / where a message originates from or where it is received • ...
computer basics 3 2023-02-08
Across
- ROM ___ Only Memory
- ___ are used to set margins, tabs and indents.
- ___ is a large public space, network of networks
- ___ files and folders are stored in Recycle bin
- CTRL + C
Down
- ___ is the most commonly used keyboard
- FORTRAN Formula ___
- CTRL + V
- Terminal can send instructions to the ____
- Plotters have 3 designs - Flat bed and ___
10 Clues: CTRL + V • CTRL + C • FORTRAN Formula ___ • ROM ___ Only Memory • ___ is the most commonly used keyboard • Terminal can send instructions to the ____ • Plotters have 3 designs - Flat bed and ___ • ___ are used to set margins, tabs and indents. • ___ files and folders are stored in Recycle bin • ___ is a large public space, network of networks
it puzzle joebob 2021-08-20
Across
- used in a packet switching network
- feeds information to designated printer
- text files saved on visit to websites
- temporary storage system that accessto data
- roots traffics between networks
Down
- uppermost directory in a file system
- rebooting a device
- lowest measurement of space
- generally makes up a monitor
- end of connection in a network line
10 Clues: rebooting a device • lowest measurement of space • generally makes up a monitor • roots traffics between networks • used in a packet switching network • end of connection in a network line • uppermost directory in a file system • text files saved on visit to websites • feeds information to designated printer • temporary storage system that accessto data
ICT Processes and Cybersecurity 2022-11-10
Across
- Makes systems access easier
- ERP module for logging all support tickets
- Verifying the identity of a user
- A type of social engineering
- Log ticket here without ERP credentials
Down
- Secret word or phrase
- Cyber security protects them
- Redirecting unresolved service request
- Type of priority of a service request
- Only for emergency service requests
10 Clues: Secret word or phrase • Makes systems access easier • Cyber security protects them • A type of social engineering • Verifying the identity of a user • Only for emergency service requests • Type of priority of a service request • Redirecting unresolved service request • Log ticket here without ERP credentials • ERP module for logging all support tickets
"Selfie" by ilan and faustin 2022-10-06
10 Clues: social... • opposite of truth • person who makes art • It is a photo of yourself • a device that takes pictures • networks allow us to stay... • to take a lot of photos is to... • so as not to forget the past moments • synonymous with inventive and productive • when you become dependent on something,you are...
Crossword Computer 2024-01-10
Across
- _________________ Control Protocol/Internet Protocol
- Digital _______ - An online payment method
- Divides a network into sub-networks.
- A popular educational App
- Used for developing educational apps
Down
- Rules that define network communication
- Apps developed for specific operating systems
- Virtual ________ use AI to respond to commands
- An AI Programming Language
- _______ AI type surpasses human intelligence
10 Clues: A popular educational App • An AI Programming Language • Divides a network into sub-networks. • Used for developing educational apps • Rules that define network communication • Digital _______ - An online payment method • _______ AI type surpasses human intelligence • Apps developed for specific operating systems • Virtual ________ use AI to respond to commands • ...
test 2023-04-26
Across
- supports the tools and programs you use every day in the home office and the field.
- A way to group conversations together in Slack
- "The ______" refers to servers that are accessed over the Internet
Down
- software that acts as a bridge between an operating system or database and applications, especially on a network
- allows users to access their desktop and applications from anywhere on any kind of endpoint device
- demarcation between the enterprise networks and the service provider networks (Internet) where the ISP connections terminate
- "_____ secutiry":the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Collective term for laptops, headsets, monitors etc.
8 Clues: A way to group conversations together in Slack • Collective term for laptops, headsets, monitors etc. • "The ______" refers to servers that are accessed over the Internet • supports the tools and programs you use every day in the home office and the field. • allows users to access their desktop and applications from anywhere on any kind of endpoint device • ...
Business Crossword - Computer Parts (Shelly) 2022-03-01
Across
- Stores files/information
- Shows output to display screen in form of video
- Basic components of device
- Panel to control touch-screen on a laptop (input)
- Using sound card, it generates sound as an output device
- Permanent memory
- Move with hand, motions on monitor
Down
- To store large amounts of data
- Screen
- Move different system/software to different devices
- To communicate with other devices/networks
- Give instructions to the computer on how to be used
- Brain of the device
- Short-term memory
14 Clues: Screen • Permanent memory • Short-term memory • Brain of the device • Stores files/information • Basic components of device • To store large amounts of data • Move with hand, motions on monitor • To communicate with other devices/networks • Shows output to display screen in form of video • Panel to control touch-screen on a laptop (input) • ...
2006PSY - W1 Content 2023-07-19
Across
- Greek word for ‘to know’
- Measured forgetting and retention.
- Performance impaired in one task but intact in other task.
- Latin word for ‘I think’
- Assumption that brain damage can remove neural pathways but cannot add new pathways.
- Processing multiple task at once.
- Processing one task at a time.
- Assumption of individual modules for specific location
Down
- Measured reaction time.
- Networks that simulate human performance
- Refers to ‘when’
- Refers to ‘where’
- Hidden, cannot be observed directly.
- Area of the brain associated with emotion.
14 Clues: Refers to ‘when’ • Refers to ‘where’ • Measured reaction time. • Greek word for ‘to know’ • Latin word for ‘I think’ • Processing one task at a time. • Processing multiple task at once. • Measured forgetting and retention. • Hidden, cannot be observed directly. • Networks that simulate human performance • Area of the brain associated with emotion. • ...
computer 2024-06-11
Across
- A binary digit
- A programming language known for its snake logo
- The main circuit board in a computer
- Temporary storage used by the CPU
- A device that provides power to the computer
- The brain of the computer
- Computer code that performs a specific task
Down
- Portable computer
- Network of networks
- The smallest unit of data in a computer
- A type of malware that replicates itself
- Non-volatile storage medium
- A pointing device used to interact with a computer
- Physical components of a computer
- A popular operating system by Microsoft
15 Clues: A binary digit • Portable computer • Network of networks • The brain of the computer • Non-volatile storage medium • Physical components of a computer • Temporary storage used by the CPU • The main circuit board in a computer • The smallest unit of data in a computer • A popular operating system by Microsoft • A type of malware that replicates itself • ...
Wireless Technology 2024-04-26
Across
- Device allowing wireless connection to a wired network.
- Network divided into geographic cells.
- Short-range wireless technology.
- Device connecting multiple devices to the internet.
- Network of interconnected nodes.
- Transmission of data without physical cables or wires.
Down
- Long-distance wireless communication via orbiting objects.
- Early wireless security protocol.
- Localized network of devices.
- Range of frequencies used for wireless communication.
- Organization that standardized Wi-Fi.
- Latest Wi-Fi security protocol.
- Identifier for wireless networks.
- IEEE standard for wireless networking.
14 Clues: Localized network of devices. • Latest Wi-Fi security protocol. • Short-range wireless technology. • Network of interconnected nodes. • Early wireless security protocol. • Identifier for wireless networks. • Organization that standardized Wi-Fi. • Network divided into geographic cells. • IEEE standard for wireless networking. • ...
Staying Safe Online 2020-03-17
Across
- You should only download these from verified stores.
- This should be private.
- You need a strong one.
- Use private ... networks.
- You need a strong ... connection.
Down
- Websites may ... you.
- You should keep this up to date.
- You should install one of these.
- You shouldn't give ... information.
- You can always ask for this.
10 Clues: Websites may ... you. • You need a strong one. • This should be private. • Use private ... networks. • You can always ask for this. • You should keep this up to date. • You should install one of these. • You need a strong ... connection. • You shouldn't give ... information. • You should only download these from verified stores.
Word Their Way #28 2022-01-31
10 Clues: A picture • Dance moves • A type of instrument • A type of handwriting • Someone who take pictures • a famous celebrities' signature • Something you use to call someone • a device you use to listen to music • a device that helps amplify your voice • a electronic device that streams various shows and news networks
Smartphones 2024-05-09
Across
- persistent urge to use a drug
- individual movile device
- global system of interconnected networks
- act of using resources
- material for sexual arousal
Down
- actions or words intented to hurt people
- age between birth and puberty
- age between puberty and adulthood
- complete lack of social contact
- the way in wich one acts and conducts oneself
10 Clues: act of using resources • individual movile device • material for sexual arousal • age between birth and puberty • persistent urge to use a drug • complete lack of social contact • age between puberty and adulthood • actions or words intented to hurt people • global system of interconnected networks • the way in wich one acts and conducts oneself
Caesars English 2 2022-12-09
Across
- to not obey orders
- bothering or drawing someone's attention away from something
- feeling pity or sorrow for someone
- not fair
- an image that represents something
Down
- medium in difficulty level
- networks that exist 'between' each other
- to not be aware of your surroundings
- only one-half of a round shape
- occurring twice a year
10 Clues: not fair • to not obey orders • occurring twice a year • medium in difficulty level • only one-half of a round shape • feeling pity or sorrow for someone • an image that represents something • to not be aware of your surroundings • networks that exist 'between' each other • bothering or drawing someone's attention away from something
Crossword 2013-09-15
Across
- Other name for laptop
- Ram,Rom
- physical part of a computer
- allow you to browse the internet
- A device used with a GUI to control cursor or a pointer
- A system allowing computers to connect to networks using wireless communication.
- programs(application)
Down
- Powerful computer
- All the components of the computer connected to this
- Component of a computer that allowed CDs or DVDs to play.
- Everything inside a system unit
- optical storage device
- To work together
- Most common type of keyboard
14 Clues: Ram,Rom • To work together • Powerful computer • Other name for laptop • programs(application) • optical storage device • physical part of a computer • Most common type of keyboard • Everything inside a system unit • allow you to browse the internet • All the components of the computer connected to this • A device used with a GUI to control cursor or a pointer • ...
Privacy Awareness Week 2023-05-03
Across
- violation of a law
- information or an opinion about an individual
- permission
- a 2017 film starring Antonio Banderas
- a fundamental human right
- responsible for meeting NOW Finance privacy requirements
- open sesame
- input fact
- eaten by a monster
Down
- simple, clear and tailored document detailing how NOW Finance deals with information
- assault launched by cybercriminals using one or more computers against a single or multiple computers or networks
- the state or condition of being aware
- two layers of protection
- related to address
14 Clues: permission • input fact • open sesame • violation of a law • related to address • eaten by a monster • two layers of protection • a fundamental human right • the state or condition of being aware • a 2017 film starring Antonio Banderas • information or an opinion about an individual • responsible for meeting NOW Finance privacy requirements • ...
Digital Communication 2022-11-01
Across
- to the arrangement of opposite elements
- receives data constantly
- of items
- of text
- images to stream from one electric device to another
- or production
Down
- of opposite elements
- book before its printed
- To guide a viewer's eye in a particular direction
- event
- individual who initiates a message
- Messages from one cell phone to another
- Allows devices to connect to the internet
- over networks
14 Clues: event • of text • of items • over networks • or production • of opposite elements • book before its printed • receives data constantly • individual who initiates a message • to the arrangement of opposite elements • Messages from one cell phone to another • Allows devices to connect to the internet • To guide a viewer's eye in a particular direction • ...
Ethernet 2025-05-20
Across
- Standard defining Ethernet operation
- Family of networking technologies for LANs
- Older device that connects Ethernet cables
- Directs data between different networks
- Transmitted over Ethernet cables
- Happens when two devices transmit at once
- Unshielded Twisted Pair cable type
Down
- Unique identifier for a network interface
- Connects devices in a local network
- Cable type used for Gigabit Ethernet
- Sending data to all network nodes
- Network structure like star or bus
- Local area network using Ethernet cables
- Technology used in Ethernet to avoid collisions
14 Clues: Transmitted over Ethernet cables • Sending data to all network nodes • Network structure like star or bus • Unshielded Twisted Pair cable type • Connects devices in a local network • Cable type used for Gigabit Ethernet • Standard defining Ethernet operation • Directs data between different networks • Local area network using Ethernet cables • ...
Education in the age of AI 2025-01-21
Across
- The quality of being easily available or reached.
- Controlling something by rules or standards.
- Making a process automatic.
- The ability to act independently and make choices.
- Relating to computers or computer networks.
- Customizing to meet individual needs.
- The state of being free from observation or disturbance.
Down
- False or misleading information.
- Adjusting to new conditions.
- Not excluding anyone.
- A new method, idea, or product.
- Being correct or precise.
- Moral principles guiding behavior or activities.
- The simulation of human intelligence in machines.
14 Clues: Not excluding anyone. • Being correct or precise. • Making a process automatic. • Adjusting to new conditions. • A new method, idea, or product. • False or misleading information. • Customizing to meet individual needs. • Relating to computers or computer networks. • Controlling something by rules or standards. • Moral principles guiding behavior or activities. • ...
E- Commerce 2018-01-07
Across
- Businesses that operate predominantly online such as eBay, Alibaba etc.(1,7)
- Features of e–commerce allowing the businesses to sell their products to consumers residing in almost any part of the world. (6,5)
- Unsolicited and superfluous marketing messages via email.
- Selling of goods and services directly to final customer as orders are placed online through the company’s website. (8,2,8)
- Trading of goods and services via internet, electronic systems and computer networks. ( 1,8)
Down
- It is an e commerce platform that enables customers to trade with each other. (8,2,8)
- A promotional technique that relies on the use of online social networks, such as email, blogs, YouTube and Twitter. (5,9)
- Selling of goods and services to /from other businesses. (8,2,8)
8 Clues: Unsolicited and superfluous marketing messages via email. • Selling of goods and services to /from other businesses. (8,2,8) • Businesses that operate predominantly online such as eBay, Alibaba etc.(1,7) • It is an e commerce platform that enables customers to trade with each other. (8,2,8) • ...
Technology 2021-03-23
Across
- circulated rapidly and widely from one internet user to another.
- use of social media to stay connected with friends, family etc.. (two words)
- software application for accessing the World Wide Web (2 words)
- protecting computer systems and networks from information disclosure, theft of, or damage to hardware or software.
- 3-D image formed by the interference of light beams from a laser or other light source.
- communication over a distance by cable, telegraph, telephone, or broadcasting.
- computer program made to simulate conversation with human users over the internet
- a detection system that uses radio waves to determine the range, angle, or velocity of objects.
- sports competition using video games
- aircraft without a human pilot on board.
Down
- simulation of human intelligence in machines programmed to think like humans and mimic their action (2 words)
- a computer based technology which allows the sharing of ideas, thoughts, and information through virtual networks and communities.(2 words)
- easy to use or understand.
- amplifying device which fits on the ear, worn by a partially deaf person.(2 words)
- a digital currency that can be used to buy goods and services
- a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation.
- home setup where appliances can be controlled remotely from anywhere with an internet connection using a mobile or other networked device. (2 words)
- a person who fears, dislikes, or avoids new technology.
- outdated computer hardware, software, technology, services or practices that are no longer used
19 Clues: easy to use or understand. • sports competition using video games • aircraft without a human pilot on board. • a person who fears, dislikes, or avoids new technology. • a digital currency that can be used to buy goods and services • software application for accessing the World Wide Web (2 words) • circulated rapidly and widely from one internet user to another. • ...
Leadership 2020-10-06
Across
- follows the rules
- Passion for work
- fully trusts their employee
- Ability to control your emotions
- Receives rewards and punishments and gives off feedback
Down
- The "role model"
- Wants to include everybody and wants their input
- Ability to recognize and understand your emotions on others
- takes full responsibility
- Managing to build relationships and networks
- Ability to understand other peoples emotions
11 Clues: The "role model" • Passion for work • follows the rules • takes full responsibility • fully trusts their employee • Ability to control your emotions • Managing to build relationships and networks • Ability to understand other peoples emotions • Wants to include everybody and wants their input • Receives rewards and punishments and gives off feedback • ...
Simple Math Vocab 2025-09-03
Across
- obtained by multiplying
- the same value on both sides of the equation
- a single numeric symbol
- in addition to math, one of the best classes ever
- synonym for subtraction
Down
- opposite of minus
- the complete amount
- horizontal or vertical mark connecting two points
- type of math (abbr.) that uses sin, cos, tan
- combined together
- networks of intersecting vertical and horizontal lines
11 Clues: opposite of minus • combined together • the complete amount • obtained by multiplying • a single numeric symbol • synonym for subtraction • type of math (abbr.) that uses sin, cos, tan • the same value on both sides of the equation • horizontal or vertical mark connecting two points • in addition to math, one of the best classes ever • ...
tier 3 words 2025-11-17
Across
- a group or system of interconnected things
- assess or summarize
- relating to technical aspects
- to check or make sure
- talking or sending signals
- a sequence or action that leads to a result or solution.
- to send out a signal through radio waves
Down
- a series of events or actions
- the ability to make choices.
- information
- not needing human help or assistance
11 Clues: information • assess or summarize • to check or make sure • talking or sending signals • the ability to make choices. • a series of events or actions • relating to technical aspects • not needing human help or assistance • to send out a signal through radio waves • a group or system of interconnected things • a sequence or action that leads to a result or solution.
Cybersecurity Santiago Yeison Cristian Yefferson 2025-06-25
Across
- This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
- Criminal activities carried out using computers or the internet.
- The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The programs and other operating information used by a computer.
- The quality of being trustworthy or of performing consistently well.
- The use of computers and the internet to conduct warfare in cyberspace.
- Software used to prevent, detect, and remove malicious software.
- The process of encoding information in such a way that only authorized parties can access it.
Down
- Criminal activities carried out using computers or the internet.
- The practice of protecting systems, networks, and programs from digital attacks.
- Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
- Characterized by malice; intending or intended to do harm.
- As discussed, malicious software.
- An attempt by hackers to damage or destroy a computer network or system.
- The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
- The process of converting encrypted data back into its original form.
- The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- Permanent software programmed into a read-only memory.
- The practice of protecting systems, networks, and programs from digital attacks.
- Broader than antivirus, it protects against various forms of malware, not just viruses.
- Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.
22 Clues: As discussed, malicious software. • Permanent software programmed into a read-only memory. • Characterized by malice; intending or intended to do harm. • Criminal activities carried out using computers or the internet. • Criminal activities carried out using computers or the internet. • The programs and other operating information used by a computer. • ...
