networks Crossword Puzzles

Cybersecurity Crossword Puzzle 2023-01-25

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. acquiring user info through deception
  2. faking transmissions to gain access
  3. software that provides unwanted ads
  4. process to identify user identity
  5. uses external verification to login
  6. unauthorized transfer of information
  7. software for spying on users
  8. risk-reduction controls on a system
  9. collection of compromised systems
  10. capability to limit network traffic
  11. distributed attack on a network
  12. unwanted advertising/unsolicited emails
  13. everyday objects connected to internet
Down
  1. malicious program you pay to unlock
  2. unencrypted information
  3. cypher used to protect information
  4. intrusive or malicious computer software
  5. software used to protect systems
  6. capture of data over networks
  7. test to verify if human
  8. process of decoding cyphers

21 Clues: unencrypted informationtest to verify if humanprocess of decoding cypherssoftware for spying on userscapture of data over networksdistributed attack on a networksoftware used to protect systemsprocess to identify user identitycollection of compromised systemscypher used to protect informationmalicious program you pay to unlock...

Computer Puzzle 2025-06-06

Computer Puzzle crossword puzzle
Across
  1. A global network of computers
  2. Legal protection for original work
  3. Network covering a large geographic area
  4. Illegally accessing computer data
  5. Collection of connected computers
  6. Unique address assigned to each computer
  7. Connection without cables
  8. Hardware device to access the internet
  9. Rules that control communication in a network
  10. Network that covers a small area
  11. Strong secret word to protect account
  12. Device that connects multiple networks
Down
  1. Ethical use of computers
  2. Crime done using a computer or internet
  3. Trick users by pretending to be trustworthy
  4. Accessing someone's account without permission
  5. Protects a network from unauthorized access
  6. A program that harms computers
  7. Keeps user identity private
  8. Device that connects different network segments

20 Clues: Ethical use of computersConnection without cablesKeeps user identity privateA global network of computersA program that harms computersNetwork that covers a small areaIllegally accessing computer dataCollection of connected computersLegal protection for original workStrong secret word to protect accountHardware device to access the internet...

Vocabulary Choiceboard 3H Week1 2025-08-23

Vocabulary Choiceboard 3H Week1 crossword puzzle
Across
  1. capable
  2. la mesa to clear the table
  3. to chat online
  4. móvil cell phone
  5. los muebles to dust the furniture
  6. ordenador computer (Spain)
  7. la ropa to wash the clothes
  8. never
  9. melancólica melancholic
  10. always
  11. abierta open-minded
  12. pupitres student desks
  13. comprometida committedexigente challenging, demanding
  14. /colgar fotos to upload photos
Down
  1. la basura to take out the trash
  2. pizarra whiteboard/blackboard
  3. persistent
  4. la compra to do the shopping
  5. juguetona playful
  6. tarea homework
  7. veces often, many times
  8. lively
  9. to think
  10. por internet to surf the internet
  11. redes sociales social networks
  12. apasionada passionate
  13. bien to have a good time
  14. orgullosa proud
  15. la mesa to set the table

29 Clues: neverlivelyalwayscapableto thinkpersistentto chat onlinetarea homeworkorgullosa proudmóvil cell phonejuguetona playfulabierta open-mindedapasionada passionatepupitres student desksveces often, many timesmelancólica melancholicbien to have a good timela mesa to set the tablela mesa to clear the tableordenador computer (Spain)...

ML Associate Study Puzzle 2025-10-02

ML Associate Study Puzzle crossword puzzle
Across
  1. Scaling features to a standard range
  2. A characteristic of a dataset
  3. Row-based format
  4. Systematic error in model predictions
  5. Subset of ML using multiple layers of neural networks
  6. Used to predict numerical values
  7. Model's prediction
  8. 2D array of values
  9. Anomaly detection algorithm
  10. Random variation in data
Down
  1. When a model learns training data too well, making it perform poorly on new unseen data
  2. dimensionality reduction technique
  3. Learning through rewards
  4. One complete pass through the training dataset
  5. Group of training samples
  6. Single unit in neural network
  7. Performance visualization curve
  8. Categorizing inputs into discrete classes
  9. Hardware that speeds up ML training
  10. Columnar format

20 Clues: Columnar formatRow-based formatModel's prediction2D array of valuesLearning through rewardsRandom variation in dataGroup of training samplesAnomaly detection algorithmSingle unit in neural networkA characteristic of a datasetPerformance visualization curveUsed to predict numerical valuesdimensionality reduction technique...

Future of Technology 2025-11-17

Future of Technology crossword puzzle
Across
  1. Next generation mobile network after 5G
  2. Protection of computers and networks
  3. Technology enabling space travel and exploration
  4. Group of autonomous robots or drones working together
  5. Discarded electronic devices
  6. Digital currency and related technologies
  7. Decentralized digital ledger technology
  8. Study of genes and DNA manipulation
  9. Machines that perform tasks autonomously
  10. Securing data by encoding information
Down
  1. Immersive computer-generated environment
  2. A city enhanced with IoT technology
  3. Augmented reality technology
  4. Technology using extremely small particles
  5. Popular cryptocurrency abbreviation
  6. AI systems that learn from data
  7. Advanced computing using qubits
  8. Study of biological systems used in future medicine
  9. Brain–computer interface technology
  10. Energy from sustainable sources

20 Clues: Augmented reality technologyDiscarded electronic devicesAI systems that learn from dataAdvanced computing using qubitsEnergy from sustainable sourcesA city enhanced with IoT technologyPopular cryptocurrency abbreviationStudy of genes and DNA manipulationBrain–computer interface technologyProtection of computers and networks...

Supervise work 2012-11-06

Supervise work crossword puzzle
Across
  1. provide personal support,friendship
  2. tell you your rate of pay
  3. entitlement you are entitled to when you are sick
  4. can be formal or informal
  5. introduces employees to workplace
  6. what does it stand for
  7. employees pay 9%
  8. is used in goal setting
  9. helps a new employee
Down
  1. provides information about the clients levels of satisfaction
  2. Protects rights of clients
  3. question when asked should receive a long answer
  4. agreements outlines conditions which people are employed
  5. voice a WA union
  6. Awards are an important part of the IR system

15 Clues: employees pay 9%voice a WA unionhelps a new employeewhat does it stand foris used in goal settingtell you your rate of paycan be formal or informalProtects rights of clientsintroduces employees to workplaceprovide personal support,friendshipAwards are an important part of the IR systemquestion when asked should receive a long answer...

Computer Virus (RB) 2017-11-27

Computer Virus (RB) crossword puzzle
Across
  1. Virus that overtakes a network
  2. Virus discovered in 1991
  3. A destructive code that destroys computers
  4. Programs and other operating information used by computers
  5. Virus that affected 3.6 million computers
  6. Opposite of frontdoor
  7. worm Virus that you could not get rid of
  8. Virus that spreads through mail programs and networks
Down
  1. Virus on the Top10 most dangerous list
  2. Creator of the Codered virus
  3. First email virus
  4. ivy Virus named after a poison plant
  5. ------horse
  6. virus that was named after a Mt. Dew beverage
  7. Virus that replicates itself

15 Clues: ------horseFirst email virusOpposite of frontdoorVirus discovered in 1991Creator of the Codered virusVirus that replicates itselfVirus that overtakes a networkivy Virus named after a poison plantVirus on the Top10 most dangerous listworm Virus that you could not get rid ofVirus that affected 3.6 million computers...

tunnit66 2019-11-11

tunnit66 crossword puzzle
Across
  1. .... Perimeter is secured boundary between the private and locally managed side of a network.
  2. network topology
  3. Internet Protocol
  4. communication endpoint
  5. Global network of computers
  6. Network aka Extranet
  7. Intrusion Prevention System
  8. Extranet is implemented as a ....?
Down
  1. Secure way of sharing information within an organisation.
  2. System of computers through which particular organizations communicate with each other and share information.
  3. ....... firewall is a firewall installed between a private network and other public networks.
  4. wireless wide area network
  5. network service
  6. Intrusion detection System
  7. Transmission Control Protocol

15 Clues: network servicenetwork topologyInternet ProtocolNetwork aka Extranetcommunication endpointwireless wide area networkIntrusion detection SystemGlobal network of computersIntrusion Prevention SystemTransmission Control ProtocolExtranet is implemented as a ....?Secure way of sharing information within an organisation....

DIT Lesson 9 Vocabulary 2023-02-08

DIT Lesson 9 Vocabulary crossword puzzle
Across
  1. A collection of data that is not easily organized into a tidy structure
  2. The term implies that when a friend of your friend is also your friend
  3. The comparison of overlapping between networks for two individuals
  4. The equivalence which examines the similarity between individuals within several networks
  5. A theory that measures how consistent individuals are in assigning a status to their network of friends
  6. The term defines how important a person is in a social network
  7. The assignment of credit for a conversion or business outcome to a particular source, called a touchpoint
Down
  1. A theory that examines consistency in a network, based on friend/foe relationships between people in the network
  2. The process of representing, analyzing, and extracting patterns from collections of social media data to gain knowledge
  3. The business metrics used to measure and evaluate if the business is achieving key business objectives
  4. A collection of data that is organized into a series of columns and rows
  5. A data whose structure comes from a series of tag and semantic elements to create a hierarchy of record and field
  6. The items that have sensors to collect or track data that are connected to the Internet
  7. The term implies that when a person becomes your friend, you become their friend as well

14 Clues: The term defines how important a person is in a social networkThe comparison of overlapping between networks for two individualsThe term implies that when a friend of your friend is also your friendA collection of data that is not easily organized into a tidy structureA collection of data that is organized into a series of columns and rows...

Internet of Things 2025-08-05

Internet  of Things crossword puzzle
Across
  1. A communication protocol that allows for the exchange of data in IoT systems, often used in home automation.
  2. A widely-used type of IoT device that can sense and respond to environmental changes like light, temperature, or pressure.
  3. he algorithm that helps optimize the energy efficiency of wireless sensor networks.
  4. A key component of IoT that enables physical actions based on data received from sensors.
  5. A protocol used for communication in the application layer of IoT systems, known for its extensibility and flexibility
  6. Layer The layer that handles the exchange of information between devices over the internet in IoT.
Down
  1. Devices that detect physical stimuli and convert them into electrical signals for IoT systems.
  2. A method of addressing that supports large-scale IoT devices and networks.
  3. A method of wireless communication used for short-range, low-power exchanges between devices in IoT.
  4. A type of network that uses small, low-power devices to monitor physical conditions.
  5. The protocol used for transferring data in IoT with a resource-constrained environment, typically used in machine-to-machine communications.
  6. A type of network specifically designed for small, low-power devices, typically deployed over large areas.
  7. A communication protocol used for lightweight messaging in IoT.
  8. The technology that allows devices to be "smart" by collecting and exchanging data automatically.

14 Clues: A communication protocol used for lightweight messaging in IoT.A method of addressing that supports large-scale IoT devices and networks.he algorithm that helps optimize the energy efficiency of wireless sensor networks.A type of network that uses small, low-power devices to monitor physical conditions....

Brain drain 2019-05-24

Brain drain crossword puzzle
Across
  1. Be able to do well something that you learned
  2. Be an example or a proof
  3. Organisations connected together
  4. success gained with hard work
  5. Attracting or persuading
Down
  1. Information you get with education or experience
  2. Make better
  3. Very difficult

8 Clues: Make betterVery difficultBe an example or a proofAttracting or persuadingsuccess gained with hard workOrganisations connected togetherBe able to do well something that you learnedInformation you get with education or experience

Information system 2023-08-15

Information system crossword puzzle
Across
  1. Distributed computing model.
  2. Method of slicing digital messages into parcels.
  3. Collection of related files containing records on people, places or things
  4. known as Green technology.
  5. Transmission Control Protocol.
  6. Discovery and analysis of useful patterns and information from the web.
  7. Non-Relational Databases.
  8. Input text, numbers, and symbols into device.
Down
  1. Denial-of-service attacks.
  2. Combination of hardware and software that prevents unauthorized users from accessing private networks.
  3. Enterprice resouce planning systems.
  4. Supply chain______systems(execute).
  5. malicious software.
  6. Supply chain______systems(plan).
  7. Output information in pictorial or textual form.

15 Clues: malicious software.Non-Relational Databases.Denial-of-service attacks.known as Green technology.Distributed computing model.Transmission Control Protocol.Supply chain______systems(plan).Supply chain______systems(execute).Enterprice resouce planning systems.Input text, numbers, and symbols into device.Method of slicing digital messages into parcels....

Structure of the Internet 2021-06-20

Structure of the Internet crossword puzzle
Across
  1. The full address of an Internet resource. (7,8,7)
  2. A network of networks set up to allow computers to communicate with one another. (8)
  3. A hierarchical naming system for computers, services, or other resources connected to the Internet. (6,4,6)
  4. An organization that provides a services for accessing, using, or participating in the Internet. (8,7,8)
  5. Application software for accessing the World Wide Web. (3,7)
  6. A collection of web pages that reside on the computers connected to the Internet. (5,4,3)
  7. A software system that is designed to carry out web searches. (6,6)
  8. A network that relies on 3rd party carriers or connections such as those provided by BT. (4,4,7)
  9. A network which has a central node (which may be a switch or a computer) which acts as a router to transmits messages. (4)
Down
  1. Have worldwide databases that hold records of all the domain names currently issued to individuals and companies.
  2. A network that consists of a number of computing devices on a single site or in a single building.
  3. The city in which CERN is located. (6)
  4. These devices are used to connect at least two networks commonly two WANs or LANs together.
  5. Refers to a specific layout of a local area network. (8)
  6. Developed the concept of the world wide web.(3,3,7,3)
  7. A domain name that includes the host server name. (5,9)
  8. Created by a US defence project in the 1960s. (7)
  9. A network where all computers are connected to a single cable. (3)
  10. Hold records of existing website names and the details of those domains that are currently available to purchase. (8,10)
  11. Identifies the area of domain that an internet resource resides in.
  12. A unique address that is assigned to a network device. (8,8)

21 Clues: The city in which CERN is located. (6)The full address of an Internet resource. (7,8,7)Created by a US defence project in the 1960s. (7)Developed the concept of the world wide web.(3,3,7,3)A domain name that includes the host server name. (5,9)Refers to a specific layout of a local area network. (8)...

Computer Science 2 Vocabulary 2020-03-31

Computer Science 2 Vocabulary crossword puzzle
Across
  1. these conditions represent unusual but valid data values
  2. leads a team of individuals to complete one or more projects
  3. statement that you believe to be true at a certain point in your code
  4. topology where each computer is connected to exactly 2 other computers and they all form a circle
  5. added to source code as an explanation
  6. writes code as a part of a software project
  7. the first method of connecting to a network with a "hard-wired" cable
  8. verifies that the program meets the requirements and design and that it handles error conditions
  9. this testing ensures multiple objects work together as expected
  10. a device designed to pass information between multiple networks
  11. series of steps you can take to complete a task
  12. a place where 2 or more networks connect
Down
  1. networked computers within a single home, school, or small office
  2. utility will turn specially formatted source code comments into HTML documentation
  3. designs software programs at a high level
  4. topology where all computers are connected through a single central cable
  5. connects computers together in a network
  6. provides information resources, services and applications to users or other computers on the network
  7. topology where each computer is connected to a hub or switch
  8. linking 2 or more computing devices together for sharing data
  9. can be a physical computer or software program and provides specific services to clients
  10. this type of writer creates internal or external documentation to explain how to install, run or use a program
  11. this testing re-verifies previously passed test cases after each code change
  12. contains many different ports where computers can connect
  13. networked computers across cities or states

25 Clues: added to source code as an explanationconnects computers together in a networka place where 2 or more networks connectdesigns software programs at a high levelwrites code as a part of a software projectnetworked computers across cities or statesseries of steps you can take to complete a taskthese conditions represent unusual but valid data values...

ITS2210 Module 6 Crossword 2019-04-02

ITS2210 Module 6 Crossword crossword puzzle
Across
  1. Using interpersonal skills to extract information about a computer system and its security
  2. Perform system patches, probe for flaws, check logs, and review policies
  3. the most basic rule of computer security is to install these
  4. The minimum frequency for system probing and audits
  5. A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
  6. One who hacks into systems to accomplish some goal that they feel is ethically valid
  7. The most prestigious certification for networking professionals
  8. The process to search through trash looking for information that might be useful in hacking (particularly social engineering) or identity theft
  9. this should be done to large networks to break them up into more manageable networks
  10. A reference to how long a user has used a password
Down
  1. Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities
  2. preferred location for storing backups
  3. Hackers who hack only for legal/ethical purposes
  4. To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
  5. The process to scan a network looking for vulnerabilities
  6. One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
  7. A numerical designation for a connection point on a computer
  8. Someone who attempts to compromise a system to assess its vulnerability
  9. this should be done to all unneeded programs/software on a server
  10. the six Ps of security are: ports, patch, _____, probe, policies, physical

20 Clues: preferred location for storing backupsHackers who hack only for legal/ethical purposesA reference to how long a user has used a passwordThe minimum frequency for system probing and auditsThe process to scan a network looking for vulnerabilitiesthe most basic rule of computer security is to install these...

Computers Computers Computers 2020-04-01

Computers Computers Computers crossword puzzle
Across
  1. A set of interconnected web pages
  2. Used for storing files that are related top each other.
  3. A set of keys that allows you to type and enter information on the computer
  4. a unit of a computer that preserves data for retrieval
  5. a device for connecting two computers by a telephone line
  6. a copy of a program or file that is stored separately from the original.
  7. a picture on a screen that represents a specific file or program.
  8. Millions of computer networks that communicate together
  9. A program which transmits itself between computers via, often causing damage to systems and data.
  10. a device that lets printed material to converted into a form that can be stored in a computer.
  11. a program that accesses and displays files and other data available on the Internet and other networks.
  12. Software used to keep unauthorised users from accessing parts of a network or computer.
Down
  1. a collection of related data or program records stored as a unit with a single name.
  2. Eight binary digits
  3. Used for short-range wireless connection of mobile phones, computers, and other electronic devices.
  4. the physical used in computing
  5. an error in the code of a program.
  6. Random Access Memory.
  7. Describes a device, such as a printer, modem, or storage system, that works in conjunction with a computer.
  8. this stands for central processing unit, the most important part of a computer.
  9. a fundamental unit of information having just two possible values, as either of the binary digits 0 or 1.
  10. a piece of software that lets a computer communicate with a peripheral device.
  11. a device that allows text or graphics to appear on paper.
  12. A message sent or received from one computer to another

24 Clues: Eight binary digitsRandom Access Memory.the physical used in computingA set of interconnected web pagesan error in the code of a program.a unit of a computer that preserves data for retrievalUsed for storing files that are related top each other.Millions of computer networks that communicate together...

Chapter 5 2013-11-27

Chapter 5 crossword puzzle
Across
  1. A simple personal communication device for short messages.
  2. Incoming calls can be transferred to another number if the person is away from the office.
  3. The numbers can be dialed automatically by simply dialing one digit.
  4. This lists the names and phone numbers of private individuals,companies,schools,government organisation.
  5. These are also known as Manual Exchanges.
  6. These are commonly known as Automatic switchboard.
  7. Is made when the chargers are billed to the called telephone number.
  8. This type of call connects the caller to a number overseas. The caller dials the number directly without the aid of an operator.
Down
  1. This type of call is made when the caller wants to speak with a particular person.
  2. The exchange of brief written messages between mobile phones over cellular networks.
  3. Charges are billed after the event.
  4. Captures and directs a caller through a menu of options.
  5. A computer based voice storage system.
  6. An alternative means being offered by some companies. This reduced the telephone bills to a great extent.
  7. machines These allow customers to extend the credit on their mobile phones instantaneously.
  8. Most businesses have more than one telephone and probably more than one telephone number. The telephones are usually connected to a ________.
  9. These are all calls made inland, whether domestic or commercial. Equipment often billed a month in advance.
  10. A directory which gives the names and extension numbers of departments and officials.
  11. This is interactive communication among people at two or more locations using telecommunication.
  12. Is the general term for family of transmission technologies for delivery of voice communications over IP networks such as the internet.

20 Clues: Charges are billed after the event.A computer based voice storage system.These are also known as Manual Exchanges.These are commonly known as Automatic switchboard.Captures and directs a caller through a menu of options.A simple personal communication device for short messages.The numbers can be dialed automatically by simply dialing one digit....

MAHIM SIKDER-Cybersecurity Crossword 2023-09-07

MAHIM SIKDER-Cybersecurity Crossword crossword puzzle
Across
  1. a client/server protocol that automatically provides an IP host with its IP address, subnet mask and default gateway.
  2. a process that verifies a user's identity and ensures that they have authorization, before providing them with access to information.
  3. a copy of data that is used if original data is unavailable.
  4. a scheme that takes money or other valuables from an unsuspecting victim.
  5. a process in which data is converted to code, in order to prevent unauthorized access.
  6. a malware that denies users access to their files. The attacker demands money from the user, in order for them to get their information back.
  7. process of copying data from the internet to your computer.
  8. a communication method that electronic devices use to deliver and receive messages electronically.
  9. software that hackers use to steal data,damage or destroy computers/computer systems.
Down
  1. protection of networks,data and devices from criminal use.
  2. a software used to detect and destroy viruses.
  3. A number used to track someones financial information.(EVERYONE GETS THIS NUMBER AT BIRTH).
  4. this word is short for organization(s) that provides access to the Internet.
  5. string of characters used to access authorization.
  6. a set of instructions, data or programs used by computers to operate and execute specific tasks.
  7. known as the address of a web page.
  8. a system that changes domain name into IP-addresses.
  9. advertisement that promote product or services to the user. Sometimes this can lead to malicious websites.
  10. a device that connects two or more packet-switched networks. Uses ip-Addresses.
  11. authentication method that requires the user to provide more than one verification information.

20 Clues: known as the address of a web page.a software used to detect and destroy viruses.string of characters used to access authorization.a system that changes domain name into IP-addresses.protection of networks,data and devices from criminal use.process of copying data from the internet to your computer....

Lesson 2 2025-02-18

Lesson 2 crossword puzzle
Across
  1. A mostly obsolete device that may be found in older networks, that’s name is also used to refer to multiport repeaters
  2. The amount of data that can be transferred on a network over a specific time interval
  3. A list of MAC addresses and their corresponding port numbers kept by the Switch on a network
  4. The equivalent of a hub but for wireless networks (full words)
  5. The route a router uses when sending packets whose destination is not on the network
  6. Term for a repeater containing several ports, with some even having 24 or more.
  7. “Type” of frame that is meant to be processed by the entire network
  8. “_ _ _ _ _ to send” is a message the AP sends to the computer saying it is all clear to start data transmission
  9. The main “building block” of a Network
Down
  1. “Mode” where a NIC processes every frame possible
  2. “Type” of frame that is meant for a single computer
  3. “_ _ _ _ _ _ _ to send” is a message from a computer to an AP to get perimission to transmit data
  4. “_ _ _ _-Duplex Mode” is when a device can send and receieve data simultaneously
  5. Component or “card” that houses ethernet ports and interprets wi-fi signals (abbreviation)
  6. The “name” of a wireless network (abbreviation)
  7. Most hubs will have these on the device to indicate things such as power, link status, network activity, and colissions
  8. “_ _ _ _-Duplex Mode” is when a device cannot send and receieve data simultaneously
  9. An old method of networking where devices are connected to each other rather than a central hub
  10. Connecting two devices (such as switches) to expand a network
  11. “Amplifies” signals from NICs into the network, compared to a microphone in the text

20 Clues: The main “building block” of a NetworkThe “name” of a wireless network (abbreviation)“Mode” where a NIC processes every frame possible“Type” of frame that is meant for a single computerConnecting two devices (such as switches) to expand a networkThe equivalent of a hub but for wireless networks (full words)...

Technology concepts 2025-09-04

Technology concepts crossword puzzle
Across
  1. The physical components of a computer system, such as the CPU, memory, and storage devices.
  2. Software Programs designed for end-users, such as word processors, web browsers, and mobile apps.
  3. Devices Hardware that displays or outputs data from a computer, such as monitors, printers, or speakers.
  4. A computer that provides services, resources, or data to other devices on a network.
  5. Programs and applications that run on a computer and perform specific tasks for the user.
  6. Computing The delivery of services like storage, software, and processing power over the internet.
  7. (SSD) A type of storage device that uses flash memory for faster performance compared to traditional hard drives.
  8. A global network that connects millions of computers, enabling communication and information sharing.
  9. Technology that allows machines to simulate human intelligence, such as learning and decision-making.
  10. Devices Hardware used to enter data into a computer, such as a keyboard, mouse, or scanner.
  11. System The system software that manages computer hardware, software, and resources (e.g., Windows, macOS, Linux).
Down
  1. (AR) Technology that overlays digital information on the real world, often using smartphones or AR glasses.
  2. (VR) A simulated digital environment that immerses users through special gadgets like VR headsets.
  3. An organized collection of data stored electronically and accessed by specialized software.
  4. A device that forwards data between networks and provides internet connectivity.
  5. The practice of protecting systems, networks, and data from digital attacks or unauthorized access.
  6. (GPU) A specialized computer component that handles rendering images, videos, and graphics.
  7. An electronic device that processes information and performs tasks according to instructions.
  8. (Internet of Things) A network of everyday objects embedded with sensors and software to exchange data (e.g., smartwatches, smart home devices).
  9. A system of interconnected devices that communicate and share resources.

20 Clues: A system of interconnected devices that communicate and share resources.A device that forwards data between networks and provides internet connectivity.A computer that provides services, resources, or data to other devices on a network.Programs and applications that run on a computer and perform specific tasks for the user....

ж2 2025-11-24

ж2 crossword puzzle
Across
  1. – Process to reduce risk.
  2. – Risk of not being able to meet short-term obligations.
  3. – Risk of damage to a company’s public image.
  4. – Prefix for risks related to computers and networks.
  5. – Measure to manage or reduce risk.
Down
  1. – Adhering to laws and regulations.
  2. – Formal examination of financial records.
  3. – An event that disrupts normal operations.
  4. – Protection against financial risk.
  5. – Risk of borrower default.
  6. – Penalty for non-compliance.
  7. – Deceptive act for personal gain.
  8. – Financial damage or disadvantage.

13 Clues: – Process to reduce risk.– Risk of borrower default.– Penalty for non-compliance.– Deceptive act for personal gain.– Adhering to laws and regulations.– Measure to manage or reduce risk.– Financial damage or disadvantage.– Protection against financial risk.– Formal examination of financial records.– An event that disrupts normal operations....

My crossword 2022-09-30

My crossword crossword puzzle
Across
  1. a communications protocol that is used for wireless data access through most mobile wireless networks.
  2. Networking hardware that connects devices on a computer network.
  3. Device that connects two or more packet-switched networks or subnetworks.
  4. a network security device that monitors and filters incoming and outgoing network traffic.
Down
  1. a computer system capable of delivering web content to end users over the internet via a web browser.
  2. a computer hardware component that allows a computer to connect to a network. NICs may be used for both wired and wireless connections.
  3. a hardware device that connects a computer or router to a broadband network.

7 Clues: Networking hardware that connects devices on a computer network.Device that connects two or more packet-switched networks or subnetworks.a hardware device that connects a computer or router to a broadband network.a network security device that monitors and filters incoming and outgoing network traffic....

Weekly Vocabulary Review 2025-10-24

Weekly Vocabulary Review crossword puzzle
Across
  1. describe a place with lots of visitors
  2. a narrow street between buildings
  3. illegally dumping waste or rubbish
  4. grey, boring, uninspiring
  5. a perfect world
  6. describing heavy traffic
  7. verb used to describe when an object is reused with a different function
  8. British English for subway
  9. something unique and unusual
  10. a house not connected to utility networks
Down
  1. necessary facilities in a city
  2. idea of being new
  3. full of life, bright
  4. American English for city centre
  5. a place or area in need of repair
  6. a place with no people
  7. a beautiful place, often photographed
  8. describing a place with too many people

18 Clues: a perfect worldidea of being newfull of life, brighta place with no peopledescribing heavy trafficgrey, boring, uninspiringBritish English for subwaysomething unique and unusualnecessary facilities in a cityAmerican English for city centrea narrow street between buildingsa place or area in need of repairillegally dumping waste or rubbish...

A crossword for my friend Lily 2021-08-14

A crossword for my friend Lily crossword puzzle
Across
  1. Your name as a fish
  2. Monday night domination
  3. Not real math
  4. Home of the ___
  5. I have a ______ for you on my bedside table
  6. What belongs in a box?
  7. Elite excursion location
  8. Gold medal for L. Nguyen in _____ _______ at the Summer Olympics
  9. What is definitely not allowed at ACMI?
Down
  1. My favourite of your songs
  2. A lovely drink from Chatime
  3. My favourite clothing item of yours
  4. Best game to play in History
  5. The best name on Among Us
  6. Gold medal for L. Nguyen in ___ _______ at the Winter Olympics
  7. Your arch-enemy
  8. Something you should remember to keep
  9. President of the State Duma

18 Clues: Not real mathHome of the ___Your arch-enemyYour name as a fishWhat belongs in a box?Monday night dominationElite excursion locationThe best name on Among UsMy favourite of your songsA lovely drink from ChatimePresident of the State DumaBest game to play in HistoryMy favourite clothing item of yoursSomething you should remember to keep...

network security 2022-09-27

network security crossword puzzle
Across
  1. permission to access facilities
  2. collections characters, authentication
  3. networks resistance
  4. prevents unauthorized connections
Down
  1. protection of personal data, physical
  2. removes malware from system
  3. encrypted files, secret code

7 Clues: networks resistanceremoves malware from systemencrypted files, secret codepermission to access facilitiesprevents unauthorized connectionsprotection of personal data, physicalcollections characters, authentication

Task 3 2025-06-05

Task 3 crossword puzzle
Across
  1. Formal request to buy supplies.
  2. flash drive Small portable storage device.
  3. Reads/writes discs using light.
  4. List of items in stock.
  5. Fast temporary computer memory.
  6. Portable storage outside the computer.
  7. The main circuit board connecting parts.
Down
  1. The brain of the computer.
  2. Device connecting devices on a network.
  3. Device for permanent data storage.
  4. A screen for computer images.
  5. Device boosting weak network signals.
  6. Plan for income and spending.
  7. Device directing data between networks.
  8. Device connecting to the internet.

15 Clues: List of items in stock.The brain of the computer.A screen for computer images.Plan for income and spending.Formal request to buy supplies.Reads/writes discs using light.Fast temporary computer memory.Device for permanent data storage.Device connecting to the internet.Device boosting weak network signals.Portable storage outside the computer....

Development crossword 2025-09-22

Development crossword crossword puzzle
Across
  1. Useful guidance from the DFE
  2. Development is affected by these
  3. An ability present at birth
  4. The removal of networks in the brain
  5. How development is measured and tracked
  6. Lobe of the brain linked to reasoning
  7. Area of development concerned with thinking
  8. Personal, social, and --------- development
Down
  1. Gross and fine motor movements
  2. Process that allows for faster responses
  3. Brain development can be affected by -------
  4. Set out at the end of the EYFS
  5. Five of these feed information to the brain
  6. Growth across all areas of development
  7. Name for brain cells

15 Clues: Name for brain cellsAn ability present at birthUseful guidance from the DFEGross and fine motor movementsSet out at the end of the EYFSDevelopment is affected by theseThe removal of networks in the brainLobe of the brain linked to reasoningGrowth across all areas of developmentHow development is measured and tracked...

Technical Puzzle 2025-10-30

Technical Puzzle crossword puzzle
Across
  1. Temporary storage for quick access
  2. Finding and fixing code errors
  3. Core part of an operating system
  4. Set of rules for data communication
  5. Security barrier between networks
  6. Exists in software, not physically
  7. Structured collection of related information
  8. Data that describes other data
  9. Converts plain data into unreadable form
Down
  1. Converts source code to machine code
  2. Amount of data a network can carry
  3. Step-by-step method to solve a problem
  4. Add-on that extends software features
  5. Point where user meets the system
  6. Delay before data transfer begins

15 Clues: Finding and fixing code errorsData that describes other dataCore part of an operating systemSecurity barrier between networksPoint where user meets the systemDelay before data transfer beginsTemporary storage for quick accessAmount of data a network can carryExists in software, not physicallySet of rules for data communication...

Unit 2 Root Words 2025-02-12

Unit 2 Root Words crossword puzzle
Across
  1. collective of judges
  2. an organism that does not change in shape during growth
  3. depend on each other
  4. triangle having two equal sides
  5. inner parts
  6. a unit of explosive power equivalent to 1,000 tons of TNT
  7. two or more forms of the same element
Down
  1. a crustacean
  2. decision of the court
  3. to connect or link two things together
  4. networks that exist between each other
  5. sugar occurring in milk
  6. an instrument for measuring the density of milk

13 Clues: inner partsa crustaceancollective of judgesdepend on each otherdecision of the courtsugar occurring in milktriangle having two equal sidestwo or more forms of the same elementto connect or link two things togethernetworks that exist between each otheran instrument for measuring the density of milk...

Round 3 2025-09-19

Round 3 crossword puzzle
Across
  1. – Opposition to magnetic flux
  2. – Converts DC to AC
  3. – Reciprocal of impedance
  4. – Equivalent circuit theorem
  5. – Material with conductivity between conductor & insulator
  6. – Law relating currents and voltages in networks
Down
  1. – Ability of material to support magnetic flux
  2. – Relationship between current and magnetism
  3. – Type of motor/generator with constant speed
  4. – Opposition to AC due to capacitance/inductance
  5. – Transfers electrical energy between circuits by induction
  6. – Motor principle (rotor current without contact)
  7. – Equivalent circuit theorem (parallel current source + resistance)

13 Clues: – Converts DC to AC– Reciprocal of impedance– Equivalent circuit theorem– Opposition to magnetic flux– Relationship between current and magnetism– Type of motor/generator with constant speed– Ability of material to support magnetic flux– Opposition to AC due to capacitance/inductance– Law relating currents and voltages in networks...

Grade 8 IT 2024-01-29

Grade 8 IT crossword puzzle
Across
  1. Connection of networks
  2. This has a protocol, domain name and a path
  3. Most commonly used search engine
Down
  1. Safari is an example of a
  2. Www.google.com is an example of
  3. ____text Transfer Protocols
  4. Emails are divided into this amount
  5. Rules governing the internet
  6. Another word for URL

9 Clues: Another word for URLConnection of networksSafari is an example of a____text Transfer ProtocolsRules governing the internetWww.google.com is an example ofMost commonly used search engineEmails are divided into this amountThis has a protocol, domain name and a path

Objective 2K: Environmental Effects of Trade Routes 2024-11-15

Objective 2K: Environmental Effects of Trade Routes crossword puzzle
Across
  1. Illnesses like the bubonic plague that spread across Afro-Eurasia, disrupting societies and economies.
  2. Pathways that facilitated the exchange of goods, crops, and diseases, including the Silk Roads and Indian Ocean networks.
  3. The spread of agricultural products like bananas, new rice varieties, citrus fruits, and sugarcane along trade routes.
  4. A crop spread through trade routes that became a key commodity, leading to the development of plantations and driving demand in interregional trade.
Down
  1. A devastating epidemic that spread along trade routes, causing widespread population decline in Afro-Eurasia.
  2. High-yield rice strains in East Asia that increased agricultural productivity and supported population growth.
  3. Crops that spread to the Mediterranean, enriching diets and becoming valuable trade goods.
  4. A crop introduced to Africa that supported population growth and transformed agricultural systems.
  5. Diseases that spread through trade networks, significantly impacting populations and economies.

9 Clues: Crops that spread to the Mediterranean, enriching diets and becoming valuable trade goods.Diseases that spread through trade networks, significantly impacting populations and economies.A crop introduced to Africa that supported population growth and transformed agricultural systems....

Chapter 18 AI 2024-12-17

Chapter 18 AI crossword puzzle
Across
  1. A parameter that influences the importance of an input in artificial neural networks.
  2. A learning approach where an agent improves its performance by interacting with an environment and receiving feedback.
  3. (3Words) A collection of neurons in an artificial neural network that performs specific computations on input data.
  4. A machine learning approach where the model identifies patterns in unlabeled data.
  5. (2Words) A subset of AI that allows systems to learn and improve from experience without explicit programming.
  6. The connection between two nodes in a graph.
  7. (2Words)A technique where the model interacts with an oracle (e.g., human expert) to obtain specific data points.
  8. A statistical method used in machine learning to predict continuous outputs based on input variables.
  9. When a model is too simple to capture the underlying patterns in data.
  10. A structure consisting of nodes and edges used to model pairwise relationships.
  11. (2Words) The dataset used to train machine learning models.
  12. (2Words) A function in a neural network that decides whether a neuron should activate or not.
  13. (3Words) A computational model inspired by the human brain, used for tasks like pattern recognition and classification.
  14. A scenario where a model learns the training data too well, including noise, reducing its performance on unseen data.
  15. (2Words) The minimum route between two nodes in a graph, calculated by algorithms like Dijkstra's.
  16. (2Words) A branch of machine learning that uses multi-layered neural networks to analyze data.
  17. A single pass through the entire training dataset during the learning process.
  18. (2Words)Data used to evaluate the performance of a machine learning model after training.
Down
  1. A type of machine learning where the model is trained on labeled data.
  2. A machine learning technique that assigns input data to predefined categories.
  3. A practical approach to problem-solving that uses trial and error or educated guesses.
  4. (2Words)An optimization algorithm used in machine learning to minimize errors by adjusting model parameters.
  5. A process in AI that determines the shortest route between two locations.
  6. A fundamental unit in a graph where edges meet.
  7. (2Words) A method in machine learning for training artificial neural networks by propagating errors backward.
  8. (2Words) A branch of computer science that focuses on creating systems capable of performing tasks that require human intelligence.
  9. The dataset used to tune hyperparameters and ensure model accuracy.
  10. (2Words)A hyperparameter that determines the step size during gradient descent optimization.
  11. (2Words) A shortest path algorithm that finds the minimum distance between nodes or vertices in a graph.
  12. An improved version of Dijkstra's algorithm that uses heuristics to find the shortest path more efficiently.

30 Clues: The connection between two nodes in a graph.A fundamental unit in a graph where edges meet.(2Words) The dataset used to train machine learning models.The dataset used to tune hyperparameters and ensure model accuracy.A type of machine learning where the model is trained on labeled data....

APWH Unit 2: Networks of Exchange 2021-09-28

APWH Unit 2: Networks of Exchange crossword puzzle
Across
  1. Founder of the Mongol Empire
  2. Chinese dynasty under Mongol rule
  3. Trade route connecting Middle East to West Africa
  4. Language based on Bantu and Arabic
  5. Nomadic conqueror of Central Asia
  6. Major trade good found in Mali
  7. Used to cross the Saharan Desert
  8. Major trade good found in East Africa
  9. Mongol government ruling over Central Asia
  10. Mongol group in control of Russia
  11. Groups of merchants traveling together
  12. Major trade good made in China
Down
  1. Moroccan merchant and explorer
  2. Communities living outside their homeland
  3. Known as the "Black Death"
  4. Mongol government in charge of Persia
  5. Major maritime trade route
  6. Seasonal winds used for navigation
  7. Italian merchant who traveled to China
  8. Trade route connecting East Asia to Europe

20 Clues: Known as the "Black Death"Major maritime trade routeFounder of the Mongol EmpireMoroccan merchant and explorerMajor trade good found in MaliMajor trade good made in ChinaUsed to cross the Saharan DesertChinese dynasty under Mongol ruleNomadic conqueror of Central AsiaMongol group in control of RussiaLanguage based on Bantu and Arabic...

Unit 2: Networks of Exchange Review 2022-11-15

Unit 2: Networks of Exchange Review crossword puzzle
Across
  1. Developed in China, made for simpler and more advanced economic development
  2. Mongol territories
  3. Western African kingdom that conquered Mali
  4. Western African kingdom, ruled at one point by Mansa Musa
  5. Military tools used to conquer
  6. winds merchants and sailors relied on to carry them across the indian ocean basin
  7. Center of spice trade in SE Asia
  8. United the Mongols and began the Mongol Empire
  9. lighter to carry on travels than coins or gold
  10. A Muslim explorer who's travels are well documented in Africa and Asia
  11. A sail that was triangular shaped and helped ships sail faster
  12. used to make camels more comfortable and able to carry more goods
  13. Western African center of trade and Islamic learning
  14. A community of people who have settled far from their home territories
  15. Another name for the plague
  16. located in a desert area, there was water and access to food
  17. Chinese ship
  18. a leader of of the Mongol tribes
  19. Navigational tech for steering ships
  20. System of payment that involved paper instead of cowery shells or salt
  21. Chinese Muslim General who travelled with treasure ships
  22. Trading City-states on the Eastern coast of Africa
  23. Richest man in the world..ever
  24. largest land empire ever
  25. A trade city on the coast of India
  26. The Islamic Mongol territories
  27. navigational tool used to map the sky and travel long distances
  28. institution that insured the money economy
  29. Capital city of the Byzantine Empire
Down
  1. Herds of animals eat too much
  2. Silk Road trading city in Western China
  3. A time of peace and prosperity in the Mongol Empire
  4. Traveler's rest stop or inn
  5. Capital city in China
  6. Removing too much of the trees in an area to maintain the environment
  7. A society that developed to over throw the Yuan dynasty in China
  8. Became a rich trading nation on the coast of India
  9. League of Northern European countries
  10. over farming without letting the land recover
  11. Silk Road trading city in modern day Uzbekistan
  12. document legally promising a traveler payment
  13. Syncretic form of writing. Persian influenced, Hindi language, Arabic Characters
  14. Navigational technology for direction using magnetic north
  15. began the Yuan Dynasty in China
  16. Weapon used to attack from a distance with projectile
  17. A special type of rice that grows quickly and is drought resistant
  18. She travelled from Europe along the Silk Road
  19. alphabet used by the Mongols
  20. Another name for the plague
  21. Italian explorer who spent time in China and other Asian territories
  22. Dynasty that replaced the Yuan in China

51 Clues: Chinese shipMongol territoriesCapital city in Chinalargest land empire everTraveler's rest stop or innAnother name for the plagueAnother name for the plaguealphabet used by the MongolsHerds of animals eat too muchMilitary tools used to conquerRichest man in the world..everThe Islamic Mongol territoriesbegan the Yuan Dynasty in China...

computing comunications 2025-10-10

computing comunications crossword puzzle
Across
  1. a network has it
  2. is a slow transmission medium
  3. a large network of networks.
  4. a cyber crime.
  5. a message is split into...
Down
  1. fastest transmission medium.
  2. every computer has its own unique one.
  3. a phishing email may contain...

8 Clues: a cyber crime.a network has ita message is split into...fastest transmission medium.a large network of networks.is a slow transmission mediuma phishing email may contain...every computer has its own unique one.

Digital Cross Words 2012-09-24

Digital Cross Words crossword puzzle
Across
  1. network A future of the internet; Where large enterprise intrests fail to maximise the social and economic potential of a shared, global set of richly connected networks
  2. media content A term that refers to attractive/engaging images, interactive elements, video, or animations
  3. pool An idea for the future of the internet; Where the public create the news/content
  4. These are transmitted between computers through a network
  5. A proposition or premise held as true
  6. Aka storyboard
  7. Connection between mainframe computers and user terminals
  8. Evaluation based on a person's beliefs, values, ethics, and morals
  9. and drawbridges A futuire of the internet;Where the government controls the computer networks; Least likely of the four scenarios
Down
  1. map An image that has been divided into sections
  2. page The first page that appears when you go to a website
  3. Web services that exist apart from the internet
  4. navigation Toolbar which contains buttons you use when you are on Live view in Dreamweaver
  5. Hyper text markup language
  6. A program used to make websites
  7. structure Refeers to the way the menu bars/ther internal links are used on web pages
  8. service providers ISPs;Provide space on their servers for customers to publish websites
  9. A program that is used to edit/enhace photos
  10. Uninfluenced by beliefs, values, ethics, and morals
  11. server A computer that is connected to the Internet with an IP address
  12. folder Stores all non-HTML files;Stores the websites images
  13. questioning Examining ideas, questions, and answers that form the basis of human belief
  14. inspector Lets you view/change the properties of a selected object on dreamweaver
  15. A practice, belief, or value that guide public action for mutual benefit

24 Clues: Aka storyboardHyper text markup languageA program used to make websitesA proposition or premise held as trueA program that is used to edit/enhace photosWeb services that exist apart from the internetmap An image that has been divided into sectionsUninfluenced by beliefs, values, ethics, and morals...

Chapter 5 2013-11-27

Chapter 5 crossword puzzle
Across
  1. A simple personal communication device for short messages.
  2. Incoming calls can be transferred to another number if the person is away from the office.
  3. The numbers can be dialed automatically by simply dialing one digit.
  4. This lists the names and phone numbers of private individuals,companies,schools,government organisation.
  5. These are also known as Manual Exchanges.
  6. These are commonly known as Automatic switchboard.
  7. Is made when the chargers are billed to the called telephone number.
  8. This type of call connects the caller to a number overseas. The caller dials the number directly without the aid of an operator.
Down
  1. This type of call is made when the caller wants to speak with a particular person.
  2. The exchange of brief written messages between mobile phones over cellular networks.
  3. Charges are billed after the event.
  4. Captures and directs a caller through a menu of options.
  5. A computer based voice storage system.
  6. An alternative means being offered by some companies. This reduced the telephone bills to a great extent.
  7. machines These allow customers to extend the credit on their mobile phones instantaneously.
  8. Most businesses have more than one telephone and probably more than one telephone number. The telephones are usually connected to a ________.
  9. These are all calls made inland, whether domestic or commercial. Equipment often billed a month in advance.
  10. A directory which gives the names and extension numbers of departments and officials.
  11. This is interactive communication among people at two or more locations using telecommunication.
  12. Is the general term for family of transmission technologies for delivery of voice communications over IP networks such as the internet.

20 Clues: Charges are billed after the event.A computer based voice storage system.These are also known as Manual Exchanges.These are commonly known as Automatic switchboard.Captures and directs a caller through a menu of options.A simple personal communication device for short messages.The numbers can be dialed automatically by simply dialing one digit....

Nerd's Network Knowledge 2014-03-19

Nerd's Network Knowledge crossword puzzle
Across
  1. Type of network topology you can use on your wedding day
  2. Describes the physical or logical layout of devices on a network
  3. Computer that serves up data and provides network services
  4. Abbreviation for a network that connects your personal devices
  5. The main route for carrying data in a network between sub-networks
  6. Type of network topology where squirrels live
  7. Abbreviation for a network that covers a room, building or campus
  8. Barrier that protects a trusted network from an untrusted network
  9. How far a wireless network can transmit or a place where buffalo roam
  10. Word that describes a WiFi network that operates on two frequencies
  11. Device that connects networks and forwards data, creating an internet
  12. Extends the physical layer of an Ethernet network within the same network segment
  13. High-speed network device that separates collision domains
  14. Common twisted pair network cable standard before six
  15. Abbreviation for the circuit board that connects a node to a network
  16. Abbreviation for a network that covers a large area such as a country
Down
  1. An active electronic device attached to a network
  2. Network protocol based on IEEE 802.3
  3. A place with open access to a wireless network
  4. Term that expresses the maximum amount of data a medium can handle
  5. Network topology you can ride downtown
  6. Type of network topology that sounds like a place to park boats
  7. Network technology that connects the nodes without wires
  8. Abbreviation for a network that covers an area such as a city
  9. Connector at the end of a twisted pair network cable
  10. Network topology you can see at night
  11. Wireless network based on IEEE 802.11
  12. Computer on a network that receives data or accesses network services

28 Clues: Network protocol based on IEEE 802.3Network topology you can see at nightWireless network based on IEEE 802.11Network topology you can ride downtownType of network topology where squirrels liveA place with open access to a wireless networkAn active electronic device attached to a networkConnector at the end of a twisted pair network cable...

Career Prep 2014-10-21

Career Prep crossword puzzle
Across
  1. called "world wide web" or simply "the web," it is a portion of the internet that can be used though a web browser
  2. a type of malware that replicates itself and spreads to other computers
  3. a personal and sometimes unreasoned judgement or prejudice
  4. computer software that displays advertisements
  5. a video camera for computers typically used to provide real-time video footage
  6. the address of a website
  7. electronic mail sent between computer networks
  8. a vast global computer network which links smaller computer networks together
  9. a computer application that simulates a paper accounting worksheet
  10. the extension of service or coverage in a wireless telecommunications system
  11. refers to careers in science, technology, engineering, and mathematics
  12. an abbreviation for secure sockets layer, it is a protocol that provides security when communicating
Down
  1. a website that allows users to add and edit interlinking web pages
  2. a computer or series of computers that link other computers together and often store important information
  3. a group of computer programs that give instructions to a computer so that it functions
  4. computer software designed to harm a computer
  5. one present but not taking part in a situation or event
  6. receiving data, such as a music/video file, from a server or another computer system
  7. the physical parts of a computer
  8. carries out the functions in a computer
  9. an act of quoting providing the specific source of the material
  10. a highly portable computer shaped like slate or pad of paper, featuring a touch screen
  11. a type of malware that unknowingly collects information from a computer
  12. aka short message service; it is a text message
  13. a common audio format for playback and storage of music on digital audio players

25 Clues: the address of a websitethe physical parts of a computercarries out the functions in a computercomputer software designed to harm a computercomputer software that displays advertisementselectronic mail sent between computer networksaka short message service; it is a text messageone present but not taking part in a situation or event...

Computers Computers Computers 2020-03-31

Computers Computers Computers crossword puzzle
Across
  1. A set of interconnected web pages
  2. Used for storing files that are related top each other.
  3. A set of keys that allows you to type and enter information on the computer
  4. a unit of a computer that preserves data for retrieval
  5. a device for connecting two computers by a telephone line
  6. a copy of a program or file that is stored separately from the original.
  7. a picture on a screen that represents a specific file or program.
  8. Millions of computer networks that communicate together
  9. A program which transmits itself between computers via, often causing damage to systems and data.
  10. a device that lets printed material to converted into a form that can be stored in a computer.
  11. a program that accesses and displays files and other data available on the Internet and other networks.
  12. Software used to keep unauthorised users from accessing parts of a network or computer.
Down
  1. a collection of related data or program records stored as a unit with a single name.
  2. Eight binary digits
  3. Used for short-range wireless connection of mobile phones, computers, and other electronic devices.
  4. the physical used in computing
  5. an error in the code of a program.
  6. Random Access Memory.
  7. Describes a device, such as a printer, modem, or storage system, that works in conjunction with a computer.
  8. this stands for central processing unit, the most important part of a computer.
  9. a fundamental unit of information having just two possible values, as either of the binary digits 0 or 1.
  10. a piece of software that lets a computer communicate with a peripheral device.
  11. a device that allows text or graphics to appear on paper.
  12. A message sent or received from one computer to another

24 Clues: Eight binary digitsRandom Access Memory.the physical used in computingA set of interconnected web pagesan error in the code of a program.a unit of a computer that preserves data for retrievalUsed for storing files that are related top each other.Millions of computer networks that communicate together...

Malicious Software 2023-07-23

Malicious Software crossword puzzle
Across
  1. software that contains advertisements
  2. software desguised as legitimate but contains another bit of software that is installed without your concent.
  3. when online users deliberately causes trouble with other online users
  4. computer that was compromised by malware
  5. online harassment, ridiculing or threatening messages
  6. attempting to gather someone's personal details through the use of convincing messages persuading them to reveal this information
  7. acquiring someone's personal information such as usernames and passwords
  8. an application that tracks the keystrokes of computer
  9. registering a domain name without the intend to actually use it.
  10. self-replicating malicious software found on networks
  11. divulging of personal or confidential information, looks like the email is from a legitimate company
  12. unwanted program installed with a downloaded application
  13. using software without purchasing it.
Down
  1. process whereby access to a computer system is gained by circumventing security restriction on the system.
  2. tricking users into visiting a fake site that looks like a legitimate site
  3. tactic used to get someon to reveal confidentail information unwittingly through a series of question or manipulation
  4. decoy computer that attract hackers to analyze how they hack networks
  5. posting offensive content online on social networking groups
  6. a network of compromised computers
  7. spreading of untrue information via emails and social media platforms
  8. disinformation published online
  9. when a number of infected computers bombared a website to make it crash
  10. manipulating videos and images through the use of AI to seem legitimate
  11. masking IP addressess to appear as legitimate websites
  12. impersonating someone else online
  13. type of phising related to people in important positions
  14. unsolicited bulk email messages
  15. software installed without users knowledge to monitor users actions on the computer.

28 Clues: disinformation published onlineunsolicited bulk email messagesimpersonating someone else onlinea network of compromised computerssoftware that contains advertisementsusing software without purchasing it.computer that was compromised by malwareonline harassment, ridiculing or threatening messagesan application that tracks the keystrokes of computer...

Network and Security 2024-07-24

Network and Security crossword puzzle
Across
  1. Refers to several types of malicious computer programs that are created to harm computer systems and their users.
  2. A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
  3. Any step you take to ward off a threat is called a
  4. The capacity to provide increasing amounts of computing power, storage, and/or software.
  5. A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
  6. Involves luring individuals into entering personal information into a website controlled by the hacker.
  7. Used to share some of a company’s intranet resources with people outside the organization
  8. A type of scam that tricks users into following a thief’s orders, such as downloading a fake anti-malware.
  9. A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
  10. Speed of data that can be transmitted over a given amount of time.
Down
  1. Process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered.
  2. A type of malware that self-replicates and spreads through computers and networks.
  3. Weakness that has not been protected against threats.
  4. Fundamental building block for the storage, retrieval, and analysis of a company’s data.
  5. The most widely-used standard for local area networks.
  6. Layout of the cables and devices that connect the nodes of the network
  7. designed to report activity on your computer to another party.
  8. Anything that can cause harm.
  9. Internal version of the internet containing a company's private information
  10. Communication system physically connected using cables or wireless media.

20 Clues: Anything that can cause harm.Any step you take to ward off a threat is called aWeakness that has not been protected against threats.The most widely-used standard for local area networks.designed to report activity on your computer to another party.Speed of data that can be transmitted over a given amount of time....

Early Encounters 2023-05-23

Early Encounters crossword puzzle
Across
  1. a government system where one person (such as a queen or king) is the leader
  2. a lot of valuable material possessions or resources
  3. plan and direct the route or course of a ship, aircraft, or other form of transportation, especially by using instruments or maps
  4. a country or area under the full or partial political control of another country, typically a distant one, and occupied by settlers from that country.
  5. to travel over or through a place in order to learn more about it or to find something
  6. overcome and take control of
  7. human beings together (collective, the sum of their social networks and power networks)
  8. to change your behavior so that it is easier to live in a particular place or situation.
  9. to differ in sentiment or opinion, especially from the majority
  10. originating or occurring naturally in a particular place
  11. a set of lands or regions that are ruled by an emperor
  12. characteristics that society instinctively attributes to groups of people to classify them according to age, weight, occupation, skin color, gender, etc
Down
  1. a way to create immunity to (protection from) some diseases
  2. one born or reared in a particular place
  3. to make someone) a slave; cause someone to lose their freedom of choice or action
  4. of or relating to a government or the conduct of government
  5. the act of dividing a period of time into shorter periods
  6. inner beliefs about what is right and what is wrong that make one choose the path of right behavior
  7. a situation in which people or organizations fight against something or refuse to accept or be changed by something
  8. relating to trade, industry, or money
  9. the action of people coming together to live in an area

21 Clues: overcome and take control ofrelating to trade, industry, or moneyone born or reared in a particular placea lot of valuable material possessions or resourcesa set of lands or regions that are ruled by an emperorthe action of people coming together to live in an areaoriginating or occurring naturally in a particular place...

Web Safety Tools 2023-08-22

Web Safety Tools crossword puzzle
Across
  1. the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
  2. wireless networking technology that uses radio waves to provide wireless high-speed Internet access
  3. irrelevant or inappropriate messages sent on the internet to a large number of recipients
  4. computer programing system
  5. use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions
  6. random-access memory
  7. somebody who gets into your computer and gets your personal information
  8. good hacker
  9. network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  10. a person who looks for other people in order to use, control, or harm them in some way
  11. interconnected computing devices that can exchange data and share resources with each other
  12. when somebody gets all your personal information and starts acting like you
  13. program that can copy itself and infect a computer without permission or knowledge of the user
  14. facts and statistics collected together for reference or analysis
Down
  1. the practice of taking someone else's work or ideas and passing them off as one's own.
  2. microcomputer and software
  3. bad hacker
  4. being mean to somebody on the internet
  5. protects your computer
  6. secret codes for personal information log in
  7. inappropriate communication between people
  8. the programs and other operating information used by a computer.
  9. a gateway that passes data between one or more local area networks (LANs)
  10. keeps people from using there stuff or they will get in trouble
  11. computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols

25 Clues: bad hackergood hackerrandom-access memoryprotects your computermicrocomputer and softwarecomputer programing systembeing mean to somebody on the internetinappropriate communication between peoplesecret codes for personal information log inkeeps people from using there stuff or they will get in trouble...

Workplace Technology Vocabulary 2024-11-07

Workplace Technology Vocabulary crossword puzzle
Across
  1. input device which transfers information and images from physical documents to computer files
  2. output device which produces physical versions of computer documents and images using paper and ink
  3. public information system on the internet which connects billions of documents known as web pages
  4. computer software which provides platforms and instructions for specific tasks
  5. global network of remote servers which operate through the internet
  6. instructions which guide how computer hardware operates, what tasks are performed and how those tasks are performed
  7. device for sending and receiving printed documents over telephone lines
  8. connections among computers to facilitate communication and sharing of resources
  9. computer software which provides instructions for basic operation of computer hardware
Down
  1. global system of computer networks
  2. machine which makes exact duplicates of documents
  3. equipment and systems developed by applying scientific knowledge for practical purposes
  4. physical elements of a computer and all separate physical elements which support computer functionality
  5. application software which operate and can be accessed through the World Wide Web
  6. computer software which has restrictions on its use and source code is kept secret
  7. wireless networking technology using radio waves to transport internet signals
  8. computer software which can be used without paying a license fee and can be modified to add capabilities not realized by its originators
  9. multiline, interconnected telephone system which allows for specialized features and may involve internet connection
  10. programmable machine for storing, processing and retrieving data; includes desktops, laptops, tablets and smartphones
  11. private networks typically used by organizations for the sharing of company news, policies, documents and other information

20 Clues: global system of computer networksmachine which makes exact duplicates of documentsglobal network of remote servers which operate through the internetdevice for sending and receiving printed documents over telephone lineswireless networking technology using radio waves to transport internet signals...

Chapter 4 Quiz 2025-03-20

Chapter 4 Quiz crossword puzzle
Across
  1. short cable for connecting a computer to an RJ-45 wall jack or connecting a patch-panel port to a switch or hub​
  2. Standard patch cables are called ...
  3. specifies how cabling should be organized, regardless of the media type or network architecture​
  4. wireless networks use infrared light beams to send signals between pairs of devices​
  5. hold network equipment such as routers and switches, plus patch panels and rack-mounted servers​
  6. mitigates the effect of crosstalk and noise on the cable​
  7. A TC that houses the cabling and devices for work area computers
  8. runs from the work area’s wall jack to the telecommunication closet
  9. houses servers, routers, switches, and other major network equipment and serves as a connection point for backbone cabling
  10. used to terminate long runs of cable from where the computers are to the wiring closet
Down
  1. the location of the cabling and equipment that connects a corporate network to a third-party telecommunications provider​
  2. point where corporate LAN equipment ends and a third-party provider’s equipment and cabling begins
  3. use 568A standard on one side of the cable and 568B standard on the other side​
  4. maximum length of cable between two network devices
  5. interference one wire generates on another wire when both wires are in a bundle​
  6. Motors, transformers, fluorescent lights and other sources of intense electrical activity can emit both RFI and ...
  7. An equipment room that’s the connection point between IDFs
  8. [blank] can also affect wireless networks if the frequencies are in the same range​
  9. A factor determining bandwidth is how bit signals are represented on the medium
  10. where workstations and other user devices are located​

20 Clues: Standard patch cables are called ...maximum length of cable between two network deviceswhere workstations and other user devices are located​mitigates the effect of crosstalk and noise on the cable​An equipment room that’s the connection point between IDFsA TC that houses the cabling and devices for work area computers...

Unit 2 Vocab 2022-11-30

Unit 2 Vocab crossword puzzle
Across
  1. A psychological phenomenon that says "Others are doing it, so I should be too"
  2. The specific group of people companies want their marketing message to reach
  3. The process used to optimize a website's technical configuration, content relevance, and link popularity
  4. The extent to which customers are familiar with the distinctive qualities or image of a particular brand of goods or services
  5. The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, typically via the internet
  6. Someone who supports one's brand on social media
  7. The use of social media networks to manage and grow an organization's message and online presence
  8. Filtering through all the interesting content across the web and sharing the best content on one's social channels
  9. A marketing strategy that leverages a businesses' employees' networks to increase bran awareness and their branded content's organic reach
  10. An internet advertising model used to drive traffic to websites
  11. A person who has subscribed to receive updates from a specific user on social media
Down
  1. Any marketing methods conducted through electronic devices
  2. A user on social media who has established credibility in a specific industry
  3. A business methodology that attracts customers by creating valuable content and experiences tailored to them
  4. This represents how many people looked at one's post
  5. Luring someone into a relationship through means of a fictional online persona
  6. Arby's, we have the meats!
  7. The use of electronic communication to bully a person
  8. The number of times one's content is displayed, no matter if it was clicked or not
  9. A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles

20 Clues: Arby's, we have the meats!Someone who supports one's brand on social mediaThis represents how many people looked at one's postThe use of electronic communication to bully a personAny marketing methods conducted through electronic devicesAn internet advertising model used to drive traffic to websites...

PIXEL PERFECT PUZZLES 2025-05-18

PIXEL PERFECT PUZZLES crossword puzzle
Across
  1. It refers to criminal activities that involve the use of computers , networks , and the internet connections with the intent to harm someone or their digital devices
  2. It refers to unwanted bulk that comes from unauthorized sources
  3. This refers to an act of stealing and misusing someone's personal information
  4. It is a malicious technique of tricking a web user into clicking on something different from what the user perceives or clicking on
  5. It means protecting the data and resources from any unauthorized access
  6. It refers of being aware of the ethical practices and behaving responsibly while using internet
  7. A synonym of digital footprint
  8. It can be defined as the legal rules and restrictions imposed on online users
Down
  1. A practice of sending bulk mails by a spam attacker till the mail server gets full
  2. This is an equivalent term of hacking
  3. It is a device that connects different types of networks with each other
  4. It is used to connect a computer to the available internet connection over the existing telephones lines.
  5. It refers to a computer network restricted to an organization
  6. It is program or a set of programs that disrupt the normal functioning of a computer
  7. The process of transforming data into unreadable code
  8. It is an security system that prevents unauthorized people from accessing your system and network
  9. A computer network created for an individual person
  10. It is a wireless technology used to interconnect mobiles , computer using short range wireless connection
  11. The term is a combination of "Voice" and "Phishing"
  12. It refers to an illegal intrusion into a computer system or network

20 Clues: A synonym of digital footprintThis is an equivalent term of hackingA computer network created for an individual personThe term is a combination of "Voice" and "Phishing"The process of transforming data into unreadable codeIt refers to a computer network restricted to an organizationIt refers to unwanted bulk that comes from unauthorized sources...

Networking Concepts and Cyber Ethics 2025-06-05

Networking Concepts and Cyber Ethics crossword puzzle
Across
  1. It is one of the most common network setups that consists of a group of star figured workstations .
  2. It is a malicious technique of tricking a web user into clicking on something what user perceives.
  3. It is a device that connects two different types of networks with each other.
  4. It is a topology uses a single communication line to which all the nodes are directly connected.
  5. Each computer in a network.
  6. It refers to being aware of the ethical practices and behaving responsibly while using the internet.
  7. It refers to a computer network restricted to an organisation .
  8. It is an act of sending email to an user misleading him to believe that is a trusted person .
  9. It refers to an illegal intrusion into a computer system.
  10. It is a set of programs that disrupts the normal functioning of a computer.
  11. It is a topology that is connected to a central computer using a point to point connection.
  12. It is a type of security system .
Down
  1. It is the process of transforming data into unreadable code.
  2. It is a wireless technology used to interconnect mobile phones,etc.
  3. It refers to criminal activity that involve the use of computer,networks.
  4. It enables you to connect your computer to the available internet connection over the existing telephone lines.
  5. It is a larger network than LAN .
  6. It stands for Wireless Fidelity.
  7. It refers to the act of using the language and thoughts of another person as ones original work.
  8. It is a network device that is used to connect all the computers.
  9. Purchasing a single licensed copy of a software and load on to several computers.

21 Clues: Each computer in a network.It stands for Wireless Fidelity.It is a larger network than LAN .It is a type of security system .It refers to an illegal intrusion into a computer system.It is the process of transforming data into unreadable code.It refers to a computer network restricted to an organisation ....

IoT 2025-10-01

IoT crossword puzzle
Across
  1. Low-power wireless communication protocol for IoT networks
  2. Graphical representation of IoT data for analysis
  3. Layer where data is processed close to IoT devices before reaching the cloud
  4. Behavior-centric extension of IoT focusing on human actions
  5. Example: Smart home, smart city, agriculture, healthcare
  6. Low-cost microcontroller with built-in Wi-Fi and Bluetooth used in IoT
  7. Constrained Application Protocol for IoT communication
  8. Centralized repository to store large volumes of raw IoT data
  9. Short-range wireless communication protocol used in IoT
  10. Microcontroller board commonly used for IoT projects
  11. Wide-area network protocol designed for low-power IoT devices
  12. Long-range wireless communication protocol for IoT devices
  13. A device that detects and responds to physical conditions in IoT systems
  14. Advanced Message Queuing Protocol for IoT data transfer
  15. IoT application that monitors environmental quality
  16. Device that converts electrical signals into physical action in IoT
  17. Protocol enabling full-duplex communication between client and server
Down
  1. IoT applied in industries for automation and monitoring
  2. Popular hardware platform used for IoT prototyping
  3. Visualization interface for IoT data analytics
  4. Intermediate layer between edge and cloud for IoT data processing
  5. IoT application that monitors and reports weather conditions
  6. Object with sensing, processing, and communication capabilities
  7. Adaptation layer enabling IPv6 over low-power wireless networks
  8. Network of interconnected smart devices sharing data over the internet
  9. IoT application used in urban mobility management
  10. Process of extracting insights from IoT data
  11. Cisco-defined standardized reference architecture for IoT
  12. Technology that uses electromagnetic fields for automatic identification
  13. Short-range communication technology often used for contactless payments
  14. Lightweight publish-subscribe messaging protocol used in IoT

31 Clues: Process of extracting insights from IoT dataVisualization interface for IoT data analyticsGraphical representation of IoT data for analysisIoT application used in urban mobility managementPopular hardware platform used for IoT prototypingIoT application that monitors environmental qualityMicrocontroller board commonly used for IoT projects...

Networking concepts and Cyber Ethics Puzzle 2025-06-12

Networking concepts and Cyber Ethics Puzzle crossword puzzle
Across
  1. Address: Unique number assigned to each device
  2. Moral principles guiding behavior
  3. Online harassment or bullying
  4. Device that connects your computer to the internet
  5. Unauthorized access to data
  6. A local area network
  7. Protects the network from unauthorized access
  8. A wide area network
  9. Connects devices within a network
Down
  1. Used to protect digital accounts
  2. Right to control your personal data
  3. Directs traffic between networks
  4. A set of rules for communication
  5. A harmful program that replicates itself
  6. A computer that provides services to other computers
  7. Fake emails to steal information
  8. Securing data by converting it to code
  9. Malicious software

18 Clues: Malicious softwareA wide area networkA local area networkUnauthorized access to dataOnline harassment or bullyingUsed to protect digital accountsDirects traffic between networksA set of rules for communicationFake emails to steal informationMoral principles guiding behaviorConnects devices within a networkRight to control your personal data...

computing science 2019-11-06

computing science crossword puzzle
Across
  1. holds the first instructions
  2. immediate memory the processor has access to these
  3. joins Lans together
  4. local area network
Down
  1. cleared when not checked
  2. wireless networks
  3. personal area network

7 Clues: wireless networkslocal area networkjoins Lans togetherpersonal area networkcleared when not checkedholds the first instructionsimmediate memory the processor has access to these

NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17

NETWORKING CONCEPTS AND CYBER ETHICS crossword puzzle
Across
  1. an illegal intrusion into a computer system or network
  2. it is an act of harming or harassing a person through information technology in a deliberate manner
  3. two or more computers and peripheral devices are connected within a small area
  4. a computer network that is mainly created for an individual person
  5. it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
  6. it enables you to connect your computers to the available internet connection over the existing telephone lines
  7. unwanted bulk emails that come from unknown sources
  8. a device that connects two different types of networks with each other
Down
  1. a program or a set of programs that disrupts the normal functioning of a computer
  2. a network device that is used to connect all the computers in a network with each other
  3. this kind of network connects two or more computers located at distant places
  4. criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
  5. a larger network than Lan and is spread across the city
  6. being aware of ethical practices and behaving responsibly and appropriately while using the internet
  7. the act of using or imitating the language and thoughts of another person as one's original work

15 Clues: unwanted bulk emails that come from unknown sourcesan illegal intrusion into a computer system or networka larger network than Lan and is spread across the citya computer network that is mainly created for an individual persona device that connects two different types of networks with each other...

NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17

NETWORKING CONCEPTS AND CYBER ETHICS crossword puzzle
Across
  1. an illegal intrusion into a computer system or network
  2. it is an act of harming or harassing a person through information technology in a deliberate manner
  3. two or more computers and peripheral devices are connected within a small area
  4. a computer network that is mainly created for an individual person
  5. it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
  6. it enables you to connect your computers to the available internet connection over the existing telephone lines
  7. unwanted bulk emails that come from unknown sources
  8. a device that connects two different types of networks with each other
Down
  1. a program or a set of programs that disrupts the normal functioning of a computer
  2. a network device that is used to connect all the computers in a network with each other
  3. this kind of network connects two or more computers located at distant places
  4. criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
  5. a larger network than Lan and is spread across the city
  6. being aware of ethical practices and behaving responsibly and appropriately while using the internet
  7. the act of using or imitating the language and thoughts of another person as one's original work

15 Clues: unwanted bulk emails that come from unknown sourcesan illegal intrusion into a computer system or networka larger network than Lan and is spread across the citya computer network that is mainly created for an individual persona device that connects two different types of networks with each other...

Internet of Things 2025-08-05

Internet  of Things crossword puzzle
Across
  1. A protocol used for communication in the application layer of IoT systems, known for its extensibility and flexibility
  2. A method of wireless communication used for short-range, low-power exchanges between devices in IoT.
  3. A widely-used type of IoT device that can sense and respond to environmental changes like light, temperature, or pressure.
  4. he algorithm that helps optimize the energy efficiency of wireless sensor networks.
  5. Layer The layer that handles the exchange of information between devices over the internet in IoT.
  6. The technology that allows devices to be "smart" by collecting and exchanging data automatically.
  7. A method of addressing that supports large-scale IoT devices and networks.
Down
  1. A communication protocol that allows for the exchange of data in IoT systems, often used in home automation.
  2. Devices that detect physical stimuli and convert them into electrical signals for IoT systems.
  3. A key component of IoT that enables physical actions based on data received from sensors.
  4. A communication protocol used for lightweight messaging in IoT.
  5. A type of network specifically designed for small, low-power devices, typically deployed over large areas.
  6. A type of network that uses small, low-power devices to monitor physical conditions.
  7. The concept that allows IoT devices to interact autonomously, without direct human input.
  8. The protocol used for transferring data in IoT with a resource-constrained environment, typically used in machine-to-machine communications.

15 Clues: A communication protocol used for lightweight messaging in IoT.A method of addressing that supports large-scale IoT devices and networks.he algorithm that helps optimize the energy efficiency of wireless sensor networks.A type of network that uses small, low-power devices to monitor physical conditions....

MTA Vocabulary 2020-09-08

MTA Vocabulary crossword puzzle
Across
  1. allows you to play back music and video files and view photos.
  2. a new Microsoft lightweight web browser with a layout engine built around web standards designed to replace Internet Explorer as the default web browser.
  3. masquerading to hide an entire address space behind a single IP address.
  4. a platform-independent, distributed, object oriented system for creating software components.
  5. text stored by user's browser
  6. utility provided by Microsoft or a third party that’s accessible through a common interface.
  7. Data kept in a primary location is synchronized with data in another location.
  8. Opens a command window useful for IT professionals.
  9. when you have two copies of a file stored in different locations that have both changed since the last sync.
  10. Enables you to import and export XML files containing InPrivate filters.
  11. allow you to keep track of websites that you visit frequently so that you can visit them quickly in the future.
Down
  1. Microsoft implementation of Web-Based Enterprise Management (WBEM) that allows accessing management information in an enterprise environment.
  2. industry standard to represent systems, applications, networks, devices, and other managed components.
  3. a cryptographic system that uses two keys—one key to encrypt the data and another key to decrypt the data.
  4. Allows you to capture, annotate and save screenshots.
  5. a server-client application that allows you to securely connect to a remote PowerShell host and run script interactively.
  6. a server that acts as an intermediary for clients seeking resources outside their networks.
  7. Allows you to sync any folder in your computer with a folder on an external drive connected to your computer or a network drive.
  8. Data is transferred in both directions.
  9. a snapshot of whatever is displayed on the computer screen.

20 Clues: text stored by user's browserData is transferred in both directions.Opens a command window useful for IT professionals.Allows you to capture, annotate and save screenshots.a snapshot of whatever is displayed on the computer screen.allows you to play back music and video files and view photos....

Immigration and Urbanization 2023-11-29

Immigration and Urbanization crossword puzzle
Across
  1. A group that hold values and engage in activities that separate them from wider society.
  2. Movement of products, services, and information across national and continental boundaries.
  3. Migration of Whites out of central city neighborhoods and into suburban communities (2 words)
  4. Practice of outlining in red any sections of a city that were considered “risky” and rejecting loan applications in that area
  5. More than ___ million African Americans left the south between 1900-1970
  6. Social _____: Various types of connections that individuals form with other people, no matter where they’re located.
  7. _____ Capital: Tight connections that people form with each other through organizations, civic life, and strong social ties.
  8. Chains of densely populated areas that extend over long stretches of space.
  9. _____ Cities: Major urban areas that serve as nodes for the worldwide network of economic activity.
Down
  1. Sociologist Barry _____ points out that our networks in school, work, and online now define our communities as much as our residential neighborhoods
  2. Unique ways of life found in cities.
  3. Urban areas with at least 10 million people.
  4. Growth in the proportion of a nation’s population living in cities.
  5. Chicago New York, and ______ have the highest levels of segregation between Black and white people
  6. The Great ______: Movement of millions of African Americans, from 1900 to 1970, into cities outside the south.
  7. For the first time in human history, more than half of the world’s population lives in _____ areas
  8. The largest number of new immigrants come from India, Mexico, the Philippines, El Salvador, and ______
  9. Type of violence experienced by immigrants as a result of immigration policies.
  10. Sociologist Claude ______ argues that cities generate new forms of community, such as subcultures
  11. Ethnic ______: Section of a city where the local culture and labor market are dominated by a single ethnic group.

20 Clues: Unique ways of life found in cities.Urban areas with at least 10 million people.Growth in the proportion of a nation’s population living in cities.More than ___ million African Americans left the south between 1900-1970Chains of densely populated areas that extend over long stretches of space....

TECH TERMS 2024-07-26

TECH TERMS crossword puzzle
Across
  1. A node that serves as an access point to another network
  2. The software that supports a computer's basic functions
  3. A numbering system that uses only two digits, 0 and 1
  4. The process of converting information or data into a code to prevent unauthorized access
  5. A group of interconnected devices that can share data and resources
  6. A markup language that defines a set of rules for encoding documents in a format readable by humans and machines
  7. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  8. A hardware or software component that stores data so future requests can be served faster
  9. An organized collection of structured information, typically stored electronically
  10. A device or program that enables a user to communicate with a computer.
  11. A device that forwards data packets between computer networks.
Down
  1. A form of communication that does not require cables or physical connections
  2. To bring something more current by adding new information or features
  3. A request for information from a database
  4. The core component of an operating system, managing system resources
  5. A step-by-step procedure for solving a problem or accomplishing a task.
  6. A term used in programming to pause and resume a function.
  7. A set of rules governing the exchange or transmission of data between devices
  8. The physical components of a computer system
  9. A global network connecting millions of private, public, academic, business, and government networks
  10. A network security system that monitors and controls incoming and outgoing network traffic
  11. The programs and other operating information used by a computer.
  12. A programming language commonly used in web development

23 Clues: A request for information from a databaseThe physical components of a computer systemA numbering system that uses only two digits, 0 and 1The software that supports a computer's basic functionsA programming language commonly used in web developmentA node that serves as an access point to another network...

OSI Model 2024-12-01

OSI Model crossword puzzle
Across
  1. a small computer network that connects electronic devices within a person's workspace
  2. smallest unit of data transmitted over a network
  3. created the WIFI standards for data transmission
  4. a computer network that connects users and computer resources within a geographic area, typically a city or metropolitan area
  5. First layer of OSI model and transmits data in the fomr of 0s and 1s
  6. Contains information that allows a network to transmit a packet.
  7. a conceptual framework that describes how networking systems communicate and send data:
  8. a protocol that recalls the data in a computer system to prevent errors
  9. a group of interconnected devices
  10. also known as tailor, provides proof if data has been tampered over transmission
  11. a universal language that uses only the numbers 0 and 1 to represent information in computers.
Down
  1. Contains the actual data being transmitted over the network
  2. Second layer that handles transmission errors and transmission protocols
  3. a computer network that connects multiple local area networks (LANs) within a limited geographical area
  4. a high-speed networking standard that transmits data in fixed-size cells, typically 53 bytes.
  5. Physical chord used in both the first layer and second layer of the OSI model
  6. connects devices within a network (often a local area network, or LAN*) and forwards data packets to and from those devices.
  7. Uses virtual circuits to enable a single router to link many faraway locations.
  8. Transmits data packets over radio frequency
  9. device that allows your computers, smartphones, tablets, and other devices to connect to the internet
  10. device that connects two or more packet-switched networks or subnetworks

21 Clues: a group of interconnected devicesTransmits data packets over radio frequencysmallest unit of data transmitted over a networkcreated the WIFI standards for data transmissionContains the actual data being transmitted over the networkContains information that allows a network to transmit a packet....

Day 1 Factors Redefining Management 2024-08-25

Day 1 Factors Redefining Management crossword puzzle
Across
  1. This is the result of increasing numbers of organizations extending past national borders, creating more competition
  2. The heterogeneous mix of people in an organization is called its workplace _____
  3. the nature of communication among and between managers and employees is changing due to data _____
  4. This term refers to the presence of digital transformation, focus on sustainability, gigs/service economy, emphasis on ethical behaviour, and the rise of stakeholder capitalism
  5. driven The rise of buying and selling of information about individuals and groups is called _____-_____ decision-making
  6. These result from changes in the business cycle as well as international problems
  7. Automation and _____ can take away some jobs but create others
Down
  1. With customer-_____, customers and clients have more and increasing access to information such as reviews and warnings, empowering their decision-making
  2. Reliance on data networks can leave organizations vulnerable to political and natural disasters
  3. When consumers expect businesses to keep up with the latest technology, organizations must emphasize _____
  4. Generational differences also bring _____ in values and expectations to the workplace
  5. Economic pressures arise when an organization is struggling with its _____.
  6. managers need to be agile and adaptable in times of _____
  7. Customer-centricity is also affected by the new _____ economy causing changes in buyer trends
  8. Sometimes competing means _____ for cheap labour
  9. Employees don't set aside their _____ values and lifestyle preferences when they go to work
  10. To compete internationally, Canadian businesses have had to reduce _____, increase productivity, improve quality, and even merge with others
  11. Algorithms and _____ have impacted marketing and increased buyer suspicion

18 Clues: Sometimes competing means _____ for cheap labourmanagers need to be agile and adaptable in times of _____Automation and _____ can take away some jobs but create othersAlgorithms and _____ have impacted marketing and increased buyer suspicionEconomic pressures arise when an organization is struggling with its _____....

Pathways Reading 1 Unit 6 vocabulary 2022-11-28

Pathways Reading 1 Unit 6 vocabulary crossword puzzle
Across
  1. friendly to people
  2. to change in order to deal with something
  3. what you like or don't like
  4. able to understand and learn things
  5. scientific knowledge or skill
Down
  1. keep somewhere for future use
  2. to connect
  3. say what will happen in the future
  4. system of connected communication lines
  5. give people ideas about what they should do

10 Clues: to connectfriendly to peoplewhat you like or don't likekeep somewhere for future usescientific knowledge or skillsay what will happen in the futureable to understand and learn thingssystem of connected communication linesto change in order to deal with somethinggive people ideas about what they should do

Importance of translation 2020-10-09

Importance of translation crossword puzzle
Across
  1. /It is very important that the translator later review the final document, to avoid last minute mistakes.
  2. /it is necessary that professionals have the necessary time to carry out their work
  3. /Translation is the act of changing the language in which the document was written
  4. /The first thing that comes to mind is a translator or interpreter at a conference with a speaker from another language.
  5. /Many people confuse the word translate with interpret.
  6. /now there are many automatic translators online.
  7. /The professional translator who does a good job is the one who is able to adapt a message that is expressed in the source language to a target language that is full of a totally different culture.
  8. /the translation also helps you communicate
  9. /The work carried out by translators requires a lot of preparation and discipline
  10. / When a document is translated, it does not mean that it will be literally translated word for word.
Down
  1. /speaking another language can help you understand other people
  2. /Part of a translator's job is to translate documents
  3. /bilingualism is fully embedded in our daily life
  4. /Translation is done in a text or documents. Interpretation is oral translation.
  5. /Anyone who knows two languages ​​can translate a text more or less from one language to another
  6. /Translators are very necessary for the globalized culture in which we live.
  7. /We also find it on social networks like Facebook, which are world phenomena.
  8. /Cada idioma es diferente y por eso la traducción literal no funciona en este caso.
  9. /it is necessary to have people who can understand two languages ​​and convey ideas clearly.
  10. /in a speech we can use to translate from one language to another
  11. /Interés por la investigación

21 Clues: /Interés por la investigación/the translation also helps you communicate/bilingualism is fully embedded in our daily life/now there are many automatic translators online./Part of a translator's job is to translate documents/Many people confuse the word translate with interpret./speaking another language can help you understand other people...

Networking Terms 2013-02-13

Networking Terms crossword puzzle
Across
  1. networks that are far apart such as cities or towns
  2. ____ Topology is like a bus network, rings have the nodes daisy-chained.
  3. Pair Cable A type of cable that consists of two independently insulated wires twisted around one another.
  4. common connection point for devices in a network
  5. Access Control This is the physical address of any device
  6. Network defined as "having no wires".
  7. a cable rack that interconnects and manages the telecommunications wiring between an MDF and workstation devices
  8. in which each computer or process on the network is either a client or a server.
  9. An agreed-upon format for transmitting data between two devices.
  10. allows diffrent nodes of a network to communicate directly with one another smoothly
  11. Optic A technology that uses glass (or plastic) threads (fibers) to transmit data.
Down
  1. ____Topology each node is connected to a central device called a hub.
  2. are often called datagrams
  3. anything that is connected to the network
  4. Cable A type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire.
  5. a type of networking which each workstation has equivalent capabilities and responsibilities
  6. Topology where each node is connected one after the other
  7. cable rack that interconnects and manages the telecommunications wiring between itself and any number ofIDFs
  8. Token acts like a ticket, enabling its owner to send a message across the network.
  9. Network a group of computers connected together in a way that allows information to be exchanged between the computers
  10. Address an identifier for a computer or a device on a TCP/IP network.
  11. ____ Topology consists of groups of star-configured workstations connected to a linear bus backbone cable
  12. networks that are in the same general are

23 Clues: are often called datagramsNetwork defined as "having no wires".anything that is connected to the networknetworks that are in the same general arecommon connection point for devices in a networknetworks that are far apart such as cities or townsTopology where each node is connected one after the other...

crossword-rthomp49 2015-09-28

crossword-rthomp49 crossword puzzle
Across
  1. one of the most common search engines; uses popularity factor in ranking websites.
  2. company that is the dominant media and marketing company in the food, home travel, and entertainment brands based out of Knoxville.
  3. networks that ARE NOT geographically close.
  4. part of search engines that is constantly browsing the web.
  5. networks that ARE geographically close.
  6. The codes or tags that browsers use to create web pages.
  7. type of communication in which the sending and receiving occur with only one active user at a time.
  8. strategy to make data easier and quicker to get ahold of.
  9. A group pf information on a computer that can be software programs or data.
  10. default text editor on mac
  11. computers programmed to send files to browsers running on other computers connected to the internet.
Down
  1. a permanently fixed original work which can be seen or heard.
  2. these are sent and received between computers and servers when information is requested across the web.
  3. type of communication in which both sender and receiver are active at the same time.
  4. work here is free for anyone to use.
  5. critical component of Large websites that handle high traffic; refers to ability to keep the site up
  6. style of language which remains neutral rather than being subjective, boastful, or exaggerated language.
  7. Pictures/Movies/Graphics
  8. style of text displayed on web pages in which the word count is approximately half that of the control condition.
  9. limitation or exception to the exclusive right granted to an author by copyright law.
  10. type of processor that gets keywords from the user and looks them up in the index.

21 Clues: Pictures/Movies/Graphicsdefault text editor on macwork here is free for anyone to use.networks that ARE geographically close.networks that ARE NOT geographically close.The codes or tags that browsers use to create web pages.strategy to make data easier and quicker to get ahold of.part of search engines that is constantly browsing the web....

Key Terms 2014-10-21

Key Terms crossword puzzle
Across
  1. Computer software designed to harm a computer
  2. A type of malware that replicates itself and spreads to other computers
  3. Getting hacked means that your computer network has been broken into without your permission
  4. A video camera for computers typically used to provide real-time video footage
  5. A types of malware that unknowingly collects information from a computer
  6. A device or computer program used for reading electronic books
  7. An act of quoting providing the specific source of the material
  8. One present but not taking part in a situation or event
  9. A vast global computer network which links smaller computer networks together
  10. A group of computer programs that give instructions to a computer so that in functions
  11. A standard display design used in blogs to provide a structure for information to be viewed
  12. Electronic mail sent between computer networks
Down
  1. The address of a website
  2. A personal and sometimes unreasoned judgment or prejudice
  3. The physical parts of a computer
  4. An object or pattern that is quickly replicated and shared
  5. Offering reason to be believed
  6. Another term for the CPU of a computer- the central processing unit that runs computer programs
  7. Computer software that displays advertisements
  8. A computer system that stores enormous amount of data
  9. Something you can add to a software application to enhance its abilities
  10. A website that allows uses to add and edit interlinking web pages
  11. The extension of service or coverage in a wireless and telecommunications system
  12. A common audio format for payback and storage of music on digital audio players
  13. REfers to cancer in science, technology, engineering, and mathematics

25 Clues: The address of a websiteOffering reason to be believedThe physical parts of a computerComputer software designed to harm a computerComputer software that displays advertisementsElectronic mail sent between computer networksA computer system that stores enormous amount of dataOne present but not taking part in a situation or event...

Web Disign 2024-04-15

Web Disign crossword puzzle
Across
  1. the activity or business of promoting and selling products or services, including market research and advertising.
  2. the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
  3. the internet as accessed via smartphones or other mobile devices, especially when regarded as a market sector.
  4. the quality of reacting quickly and positively.
  5. a subdivision of a domain.
  6. a hypertext document on the World Wide Web.
  7. a computer suitable for use at an ordinary desk.
  8. an online design and visual communication platform
  9. an all-encompassing online wireframing and product design tool designed to bring software ideas to life visually
  10. a rough or unfinished drawing or painting, often made to assist in making a more finished picture.
  11. a powerful, no code website builder
  12. for people to create, share, and test designs for websites, mobile apps, and other digital
  13. a wireless device that's smaller than a laptop and bigger than a smartphone
  14. a list of commands or options, especially one displayed on screen.
Down
  1. an area of territory owned or controlled by a ruler or government.
  2. be filled with wonder or astonishment.
  3. further the progress of (something, especially a cause, venture, or aim); support or actively encourage.
  4. a set of related web pages located under a single domain name, typically produced by a single person or organization.
  5. a set of related web pages located under a single domain name, typically produced by a single person or organization.
  6. the quality of being able to adjust to new conditions.
  7. GNU Image Manipulation Program
  8. a means of approaching or entering a place.
  9. plan and direct the route or course of a ship, aircraft, or other form of transportation, especially by using instruments or maps.
  10. a user interface design tool for creating wireframes
  11. a person who uses or operates something, especially a computer or other machine.

25 Clues: a subdivision of a domain.GNU Image Manipulation Programa powerful, no code website builderbe filled with wonder or astonishment.a hypertext document on the World Wide Web.a means of approaching or entering a place.the quality of reacting quickly and positively.a computer suitable for use at an ordinary desk....

Data Protection 2022-09-19

Data Protection crossword puzzle
Across
  1. To gather compromised information and/or defense secrets
  2. Individuals who want to attack computers yet lack the knowledge
  3. Following a victim with authorized credentials through a door or other secure building access point
  4. Data at rest
  5. Visually capturing logins or passwords or other sensitive information over someone's ______ while using a computer.
  6. Designed to hold a computer system or the data it contains captive until a payment
  7. A security breach can have a negative long-term impact on an organization’s _________
  8. More targeted version of the phishing
  9. Employees, contract staff or trusted partners
  10. Telling a computer to perform some task using CLI
  11. Cyberwarfare can destabilize a nation
Down
  1. an attacker establishes trust with their victim by impersonating persons who have right-to-know authority
  2. Preventing unwanted changes or alteration
  3. Network, Devices, Power Grid, Roads
  4. Data traveling between information systems
  5. A broad range of malicious activities accomplished through psychological manipulation of people into performing actions or divulging confidential information.
  6. Core Principles of Cybersecurity
  7. Get victims to click on links to malicious websites, open attachments that contain malware or reveal sensitive information.
  8. Using technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services
  9. Amateurs or skilled attackers outside of the organization
  10. Data developed around the user without their express input, usually generated based on search histories, content consumption, purchases, and social media activity
  11. Breaks into networks or computer systems to identify and improve any weaknesses
  12. Technique used on unshredded documents
  13. Make political statements in order to raise awareness about issues
  14. Using a false promise to gain a victim’s interest to lure them into a trap that steals their personal information or infects their systems

25 Clues: Data at restCore Principles of CybersecurityNetwork, Devices, Power Grid, RoadsMore targeted version of the phishingCyberwarfare can destabilize a nationTechnique used on unshredded documentsPreventing unwanted changes or alterationData traveling between information systemsEmployees, contract staff or trusted partners...

C 2023-09-25

C crossword puzzle
Across
  1. A process for reducing the number of bits needed to represent something without losing info
  2. Used to send short messages called datagrams
  3. The capacity for a system to grow in size to meet demand
  4. A programmer hides all but the relevant data
  5. A unit of data that is * bits long
  6. A numerical label assigned to each device connected to a computer network.
  7. A group of computing devices and programs working together for a common purpose
  8. A minute area of illumination
  9. A small chunk of any kind of data
  10. A machine that can run a program
  11. A suite of communiction protocols used to interconnect network devices on the internet
  12. The background of a project
  13. A numbering system, 0 and 1
  14. A device that fowards data packets along networks.
Down
  1. Puzzle piece shapes that are used to create code in snap!
  2. A group of interconnected computer devices capable of sending or receiving data
  3. Differing access to the internet based on characteristics.
  4. The series of connections between computing devices on a network
  5. The property that enables a system to continue operating properly in the event of failure
  6. A character encoding standard for electonic communication
  7. A worldwide system of networks
  8. The duplication of critical components or functions of a system.
  9. Different types of blocks linked together in snap!
  10. An object in snap! Performs functions
  11. A process for reducing number of bits,info is lost
  12. Colors used on a computer display
  13. The smallest unit of data in a computer
  14. the group of methods and communications protocols confined to the lonk that a host is physically connected to.
  15. Data that describes data

29 Clues: Data that describes dataThe background of a projectA numbering system, 0 and 1A minute area of illuminationA worldwide system of networksA machine that can run a programColors used on a computer displayA small chunk of any kind of dataA unit of data that is * bits longAn object in snap! Performs functionsThe smallest unit of data in a computer...

Chapter 2 IT246 Spring 2025-02-26

Chapter 2 IT246 Spring crossword puzzle
Across
  1. A frame with a destination MAC address composed of all binary 1s or in hexidecimal.
  2. it is in a computers IP address settings and must be set to the address of a router.
  3. what is used to interconnect multiple computers so that they can communicate with one another.
  4. tells a router where to send a packet with a destination network that can’t be found in its routing table.
  5. cards that create and mediate the connection
  6. Messages letting the requesti
  7. a mode turns off the gatekeeper functions and enables the NIC to process all frames it sees.
  8. What is the amount of data that can be transferred on a network during a specific interval?
  9. reads the destination IP address and compares it with the list of networks in its routing table
Down
  1. can handle several computers conversations at one time, thereby allowing each device the full network bandwidth.
  2. A designated MAC address intended for a single computer.
  3. The name assigned to a wireless network is called a?
  4. Has indicator lights for power, link status, network activity, and collisions.
  5. Sends a request to send message to let the AP know it intends to transmit data
  6. They are central devices in wireless networks and perform similar functions to hubs
  7. When a data can send and recieve data simultaneously.
  8. uses switching tables to determine the Mac address
  9. takes incoming bit signals and repeat them at their original strength out all connected ports
  10. the transmission of data from a lower-level device to a higher-level device
  11. Dozens of computers transferring large files and accessing network applications and databases.

20 Clues: Messages letting the requesticards that create and mediate the connectionuses switching tables to determine the Mac addressThe name assigned to a wireless network is called a?When a data can send and recieve data simultaneously.A designated MAC address intended for a single computer....

Abdoulaye's word puzzle 2025-02-27

Abdoulaye's word puzzle crossword puzzle
Across
  1. talk in a friendly and informal way.
  2. (short for weblog) Blog is an abbreviation of “weblog”
  3. Flame trolling is the posting of a provocative or offensive message, known as flamebait
  4. shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
  5. the intentional video-recorded assault of individuals which are then posted on the Internet for entertainment purposes.
  6. an animal that naturally preys on others.
  7. the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
  8. Typing in all CAPPPSSS!!!!!!.
  9. Theft identity theft can sometimes be a component of impersonation
  10. using the Internet, email, or other electronic communications to stalk someone.
Down
  1. the unique trail of data that a person or business creates while using the internet
  2. sending,posting, or sharing negative, harmful, false, or mean content about someone else.
  3. the correct or acceptable way of communicating on the internet.
  4. unauthorized reproduction or distribution of someone's intellectual property without their consent.
  5. small text files that websites store on your computer to remember information about you and your browsing activity
  6. the practice of protecting systems, networks, and programs from digital attacks.
  7. the practice of preparing or training someone for a particular purpose or activity.
  8. to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
  9. Settings controls available on many websites and apps to limit who can access your profile and what information visitors can see.
  10. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.

20 Clues: Typing in all CAPPPSSS!!!!!!.talk in a friendly and informal way.an animal that naturally preys on others.(short for weblog) Blog is an abbreviation of “weblog”the correct or acceptable way of communicating on the internet.Theft identity theft can sometimes be a component of impersonation...

IST Final Crosswords Part 2 2025-10-01

IST Final Crosswords Part 2 crossword puzzle
Across
  1. Lightweight virtualization that packages applications with their dependencies
  2. Compact expansion slot often used for SSDs and WiFi modules
  3. Firmware that initializes hardware before the OS loads
  4. Delay experienced during data transmission
  5. Internet addressing system using 128 bits
  6. Modern firmware interface replacing BIOS with enhanced features
  7. Malware disguised as legitimate software
  8. Integrated circuits on the motherboard that manage communication between CPU RAM and peripherals
  9. Background process running continuously in an operating system
  10. High speed storage interface standard for SSDs
  11. Text based interface for interacting with an operating system
  12. Set of rules governing data communication between devices
  13. Small unit of data transmitted over a network
  14. Device that connects devices in a LAN and forwards data based on MAC addresses
  15. Processor designed for rendering graphics and parallel computations
Down
  1. Saved state of a virtual machine at a point in time
  2. Self replicating malware spreading through networks
  3. Security system controlling incoming and outgoing network traffic
  4. System that translates domain names into IP addresses
  5. Maximum amount of data that can travel through a communication channel
  6. Basic networking device that broadcasts data to all connected devices
  7. Secure communication tunnel over the Internet
  8. Device that forwards data packets between networks
  9. Device that performs physical actions in response to control signals
  10. Device that converts real world data into electrical signals
  11. Internet addressing system using 32 bits
  12. Program that interprets and executes user commands
  13. Number of cycles per second executed by the CPU measured in GHz
  14. Network of physical devices connected to the Internet
  15. Cyberattack where attackers trick users into revealing sensitive information

30 Clues: Malware disguised as legitimate softwareInternet addressing system using 32 bitsInternet addressing system using 128 bitsDelay experienced during data transmissionSecure communication tunnel over the InternetSmall unit of data transmitted over a networkHigh speed storage interface standard for SSDsDevice that forwards data packets between networks...

Impact of States on Asian Trade Networks 2025-10-02

Impact of States on Asian Trade Networks crossword puzzle
Across
  1. – Deadly plague that spread along Mongol trade routes, devastating populations across Eurasia.
  2. – Mystical branch of Islam that spread into South and Southeast Asia through merchants and missionaries.
  3. – Religion that spread via South Asian trade and legitimized rulers in Southeast Asian states.
  4. – Javanese maritime empire that dominated sea routes and profited from the spice trade.
  5. – Mongol dynasty in China that fostered Silk Road trade and integrated diverse cultures.
  6. – Monumental Khmer temple that reflected Hindu and Buddhist influences tied to regional exchange.
  7. – Trade routes revitalized under Mongol protection, linking China, the Middle East, and Europe.
  8. – Muslim-ruled state in India that connected South Asia more fully into Indian Ocean trade.
  9. – Mongol policy of welcoming diverse faiths, which encouraged merchants, missionaries, and scholars.
  10. – Exchange of cloves, nutmeg, cinnamon, and other coveted goods central to Southeast Asian commerce.
  11. – Narrow waterway that became a key crossroads for Asian maritime commerce.
  12. – Mongol leader who united steppe tribes and expanded Eurasian trade networks.
Down
  1. – Mongol ruler of China who founded the Yuan Dynasty and promoted Silk Road commerce.
  2. – Maritime empire based in Indonesia that controlled choke points and taxed Indian Ocean trade.
  3. – Roadside inns that flourished under Mongol stability, supporting merchants along the Silk Roads.
  4. – Venetian traveler whose writings about Yuan China increased European interest in Asian goods.
  5. – Mainland Southeast Asian power that relied on irrigation and religion to legitimize rule and participate in trade.
  6. – Religion that spread through South and Southeast Asia via maritime networks, shaping art and kingship.
  7. – Period of Mongol peace that secured and expanded trade across Eurasia.
  8. – Mongol relay station network that facilitated communication and trade across their empire.

20 Clues: – Period of Mongol peace that secured and expanded trade across Eurasia.– Narrow waterway that became a key crossroads for Asian maritime commerce.– Mongol leader who united steppe tribes and expanded Eurasian trade networks.– Mongol ruler of China who founded the Yuan Dynasty and promoted Silk Road commerce....

Inventors and Inventions 2024-06-09

Inventors and Inventions crossword puzzle
Across
  1. is the electronic delivery of moving images and sound from a source to a receiver
  2. a social media and social networking service owned by the American technology conglomerate Meta
  3. It's an instrument designed for the simultaneous transmission and reception of the human voice
  4. It's used for a wide range of tasks, from basic calculations to complex operations involving artificial intelligence.
Down
  1. a digital reality that combines aspects of social networks, online gaming, virtual reality (VR)
  2. global system of interconnected computer networks that uses the Internet protocol suite
  3. It was invented by Thomas Edison and Joseph Swan in the 1880s

7 Clues: It was invented by Thomas Edison and Joseph Swan in the 1880sis the electronic delivery of moving images and sound from a source to a receiverglobal system of interconnected computer networks that uses the Internet protocol suiteIt's an instrument designed for the simultaneous transmission and reception of the human voice...

Cyber Awareness 2023-05-05

Cyber Awareness crossword puzzle
Across
  1. Using technology to bully or harass someone online
  2. A secret code that you use to protect your online accounts
  3. A person who uses their computer skills to gain unauthorized access to systems or networks
  4. A type of malware that can harm your computer and steal your personal information
Down
  1. The practice of protecting computers, networks, and online systems from unauthorized access or attack
  2. Unsolicited emails or messages that are sent to a large number of people

6 Clues: Using technology to bully or harass someone onlineA secret code that you use to protect your online accountsUnsolicited emails or messages that are sent to a large number of peopleA type of malware that can harm your computer and steal your personal information...

Computer Acronyms 2024-09-06

Computer Acronyms crossword puzzle
Across
  1. A standard interface designed for IBM PC-compatible computers.
  2. An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
  3. A type of non-volatile memory used in computers and other electronic devices.
  4. A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  5. A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
  6. A proprietary journaling file system developed by Microsoft in the 1990s.
  7. An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
  8. A small economy car made by the British Motor Corporation.
  9. Used to interact with computer programs with text-based commands.
  10. The most important processor in a given computer.
  11. A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
  12. Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
  13. A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
  1. A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
  2. A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
  3. A video display interface developed by the Digital Display Working Group.
  4. A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
  5. A video display controller and accompanying de facto graphics standard.
  6. A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
  7. A solid-state storage device.
  8. A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
  9. A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
  10. A computer hardware component that connects a computer to a computer network.
  11. An industry standard that allows data exchange and delivery of power between many types of electronics.
  12. A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.

25 Clues: A solid-state storage device.The most important processor in a given computer.A small economy car made by the British Motor Corporation.A standard interface designed for IBM PC-compatible computers.Used to interact with computer programs with text-based commands.A video display controller and accompanying de facto graphics standard....

Module 4 Crossword 2019-04-26

Module 4 Crossword crossword puzzle
Across
  1. It is short for malicious software.
  2. Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
  3. This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
  4. Encrypted files or encrypted communication is unreadable to ________ viewers.
  5. Hackers use software known as a packet sniffer to read ________ traffic.
  6. This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
Down
  1. This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
  2. The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
  3. Process of attempting to reduce or eliminate harmful effects of the breach.
  4. This is the security principle that protects data from inappropriate modification or corruption.
  5. An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
  6. A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
  7. Antivirus software prevents, ________, and removes viruses.
  8. This sends traffic from private networks to the Internet and from the Internet to private networks.
  9. Displaying unwanted advertisements and redirecting web browsers is an example of this.

15 Clues: It is short for malicious software.Antivirus software prevents, ________, and removes viruses.Hackers use software known as a packet sniffer to read ________ traffic.Process of attempting to reduce or eliminate harmful effects of the breach.Encrypted files or encrypted communication is unreadable to ________ viewers....

Computer Jargon 2018-02-24

Computer Jargon crossword puzzle
Across
  1. A peripheral device used to point to items on a monitor
  2. to put data on somewhere.
  3. A screen in a software program that permits the user to view several programs at one time.
  4. the solid parts of a computer, like monitors, fans, CPU, etc.
  5. a way to connect to a network wirelessly.
  6. to copy data from somewhere.
  7. people who search flaws in the way computers work. They can use their knowledge for evil, too.
  8. is a wireless communications technology intended to replace cables. It allows short-range connections between two or more compatible devices such as mobile phones, tablets, headsets or medical equipment.
  9. is a wireless LAN (local area network) node that provides Internet connection and virtual private network (VPN) access from a given location
  10. an act or function of updating the display on a screen.
Down
  1. It is a method of exchanging messages between people using electronic.
  2. A small picture used to represent a file or program in a GUI interface
  3. the brain of the computer; controls the other elements of the computer.
  4. A peripheral used to input data by pressing keys.
  5. A peripheral device that converts output from a computer into a printed image.
  6. information stored on a computer.
  7. Complete, self-contained programs that perform a specific function (ie. spreadsheets, databases)
  8. is a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  9. drive refer to the same thing, which is a small data storage device that uses flash memory and has a built-in USB connection.
  10. A program used to view World Wide Web pages, such as Netscape Navigator or Internet Explorer

20 Clues: to put data on somewhere.to copy data from somewhere.information stored on a computer.a way to connect to a network wirelessly.A peripheral used to input data by pressing keys.A peripheral device used to point to items on a monitoran act or function of updating the display on a screen.the solid parts of a computer, like monitors, fans, CPU, etc....

Chapter 5 2013-11-27

Chapter 5 crossword puzzle
Across
  1. A simple personal communication device for short messages.
  2. directory: A directory which gives the names and extension numbers of departments and officials.
  3. This type of call connects the caller to a number overseas. The caller dials the number directly without the aid of an operator.
  4. dialing: The numbers can be dialed automatically by simply dialing one digit.
  5. top-up machines: These allow customers to extend the credit on their mobile phones instantaneously.
  6. Most businesses have more than one telephone and probably more than one telephone number. The telephones are usually connected to a ________.
  7. calls: These are all calls made inland, whether domestic or commercial. Equipment often billed a month in advance.
  8. These are also known as Manual Exchanges.
  9. conference: This is interactive communication among people at two or more locations using telecommunication.
Down
  1. Is the general term for family of transmission technologies for delivery of voice communications over IP networks such as the internet.
  2. distance: Charges are billed after the event.
  3. switchboard: Captures and directs a caller through a menu of options.
  4. This type of call is made when the caller wants to speak with a particular person.
  5. forwarding: Incoming calls can be transferred to another number if the person is away from the office.
  6. These are commonly known as Automatic switchboard.
  7. mail: A computer based voice storage system.
  8. messaging: The exchange of brief written messages between mobile phones over cellular networks.
  9. calls: Is made when the chargers are billed to the called telephone number.
  10. An alternative means being offered by some companies. This reduced the telephone bills to a great extent.
  11. Directories: This lists the names and phone numbers of private individuals,companies,schools,government organisation.

20 Clues: These are also known as Manual Exchanges.mail: A computer based voice storage system.distance: Charges are billed after the event.These are commonly known as Automatic switchboard.A simple personal communication device for short messages.switchboard: Captures and directs a caller through a menu of options....

Digital Literacy and Responsibility 2014-10-21

Digital Literacy and Responsibility crossword puzzle
Across
  1. offering reason to be believed
  2. computer software designed to harm a computer
  3. the act of sending inappropriate sexual material, usually text or images, between cell phones
  4. a personal and sometimes unreasoned judgment or prejudice
  5. a computer application that simulates a paper accounting worksheet
  6. a common audio format for playback and storage of music on digital audio players
  7. the extension of service or coverage in a wireless telecommunications system
  8. a computer or series of computers that link other computer together and often store important information
  9. one present but not taking part in a situation or event
  10. the physical parts of a computer
  11. am abbreviation for secure sockets layer; it's a protocol that provides security when communicating on the internet
Down
  1. refers to careers in science, technology, engineering, and mathematics
  2. representing the language or thoughts of an author as your own, without indicating where the information is from
  3. content and media that combines deferent content forms, such as text, audio, animation, and still images
  4. another term for the CPU of a computer- the central processing unit that runs computer programs
  5. a type of malware that unknowingly collects information from a computer
  6. refers to any disruption to alteration of a signal in a cell phones
  7. a vast global computer network which links smaller computer networks together
  8. e-mail that's sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses
  9. also known as short message service; it is a text messaging service for cell phones
  10. electronic mail sent between computer networks
  11. computer software that displays advertisements

22 Clues: offering reason to be believedthe physical parts of a computercomputer software designed to harm a computerelectronic mail sent between computer networkscomputer software that displays advertisementsone present but not taking part in a situation or eventa personal and sometimes unreasoned judgment or prejudice...

Module 1 Puzzle 2021-09-29

Module 1 Puzzle crossword puzzle
Across
  1. A small file containing information from a Web site
  2. A binary piece of data prepared for transmission over a network
  3. A check of systems security. This usually includes a review of documents, procedures, and system configurations
  4. A device that separates/connects networks
  5. Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling
  6. Any software that has a malicious purpose, such as a virus or trojan horse
  7. A subsection of a network
  8. A protocol that is part of the TCP/IP suite of protocols, which is
  9. A hacker term for a person who claims much greater hacking skill than he actually has
  10. A seven-layer model describing network connnectivity, devices,and protocols
  11. An Internet address, such as www.facebook.com
Down
  1. Hackers who hack only for legal/ethical purposes
  2. A device or software that provides a barrier between your machine or network and the rest of the world
  3. Confidentiality, Integrity, and Availability
  4. The process to verify that a user is authorized to access a given resource. This is part of the logon system
  5. A utility that provides extensive information about a computer’s network connection
  6. A protocol used to send data over the Internet; part of the TCP/IP suite of protocols
  7. A machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
  8. The central Internet connection to which Internet Service Providers must ultimately connect
  9. foundation for most networking and all Internet
  10. A protocol critical for securing virtual private networks

21 Clues: A subsection of a networkA device that separates/connects networksConfidentiality, Integrity, and AvailabilityAn Internet address, such as www.facebook.comfoundation for most networking and all InternetHackers who hack only for legal/ethical purposesA small file containing information from a Web site...

ITS2210 Module 1 Crossword 2019-04-02

ITS2210 Module 1 Crossword crossword puzzle
Across
  1. The central Internet connection to which Internet Service Providers must ultimately connect
  2. A seven-layer model describing network connectivity, devices, and protocols
  3. Any software that has a malicious purpose, such as a virus or Trojan horse
  4. A hacker term for a person who claims much greater hacking skill than he actually has
  5. Hackers who hack only for legal/ethical purposes
  6. A device that separates networks
  7. A protocol critical for securing virtual private networks
  8. Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling
  9. A check of systems security. This usually includes a review of documents, procedures, and system configurations
  10. A subsection of a network
  11. A protocol used to send data over the Internet; part of the TCP/IP suite of protocols
  12. A protocol that is part of the TCP/IP suite of protocols, which is the foundation for most networking and all Internet communications
Down
  1. An Internet address, such as www.facebook.com
  2. A binary piece of data prepared for transmission over a network
  3. Confidentiality, Integrity, and Availability
  4. The process to verify that a user is authorized to access a given resource. This is part of the logon system
  5. A machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
  6. A small file containing information from a Web site
  7. A device or software that provides a barrier between your machine or network and the rest of the world
  8. A utility that provides extensive information about a computer’s network connection

20 Clues: A subsection of a networkA device that separates networksConfidentiality, Integrity, and AvailabilityAn Internet address, such as www.facebook.comHackers who hack only for legal/ethical purposesA small file containing information from a Web siteA protocol critical for securing virtual private networks...

MTA Lesson 3 - Crossword 2020-09-10

MTA Lesson 3 - Crossword crossword puzzle
Across
  1. allow you to keep track of websites that you visit frequently so that you can visit them quickly in the future
  2. for clients seeking resources outside their networks
  3. Data kept in a primary location is synchronized with data in another location
  4. the traditional Microsoft browser that offers a number of features to protect your security and privacy while you browse the web
  5. things such as extra toolbars, animated mouse pointers, stock tickers, and pop-up blockers
  6. a way to run outdated sites
  7. fraudulent technique based on social engineering to get views to visit a site that appears trust worthy
  8. provides a platform-independent, distributed, objectoriented system for creating software components
  9. server-client application that allows you to securely connect to a remote PowerShell host and run script interactively
Down
  1. used with masquerading to hide an entire address space behind a single IP address
  2. helps prevent anyone who might be using your computer from seeing where you visited and what you looked at on the web
  3. industry standard to represent systems, applications, networks, devices, and other managed components
  4. prevents sites from installing and using ActiveX applications
  5. and technology that protects your computer as you browse the internet with Internet Explorer
  6. new Microsoft lightweight web browser with a layout engine built around web standards designed to replace Internet Explorer as the default web browser
  7. set of
  8. a server that acts as an
  9. Manages local or remote computers by using a single, consolidated desktop tool
  10. can be used to suppress some or all pop-ups
  11. small applications that allow websites to provide content such as videos and games
  12. native commands available in Windows PowerShell
  13. text stored by a user’s web browser

22 Clues: set ofa server that acts as ana way to run outdated sitestext stored by a user’s web browsercan be used to suppress some or all pop-upsnative commands available in Windows PowerShellfor clients seeking resources outside their networksprevents sites from installing and using ActiveX applications...

MTA Lesson 3 - Crossword 2020-09-11

MTA Lesson 3 - Crossword crossword puzzle
Across
  1. Data kept in a primary location is synchronized with data in another location
  2. a way to run outdated sites
  3. allow you to keep track of websites that you visit frequently so that you can visit them quickly in the future
  4. native commands available in Windows PowerShell
  5. text stored by a user’s web browser
  6. and technology that protects your computer as you browse the internet with Internet Explorer
  7. fraudulent technique based on social engineering to get views to visit a site that appears trust worthy
  8. server-client application that allows you to securely connect to a remote PowerShell host and run script interactively
  9. can be used to suppress some or all pop-ups
  10. industry standard to represent systems, applications, networks, devices, and other managed components
  11. small applications that allow websites to provide content such as videos and games
  12. new Microsoft lightweight web browser with a layout engine built around web standards designed to replace Internet Explorer as the default web browser
  13. used with masquerading to hide an entire address space behind a single IP address
Down
  1. set of
  2. provides a platform-independent, distributed, objectoriented system for creating software components
  3. the traditional Microsoft browser that offers a number of features to protect your security and privacy while you browse the web
  4. helps prevent anyone who might be using your computer from seeing where you visited and what you looked at on the web
  5. things such as extra toolbars, animated mouse pointers, stock tickers, and pop-up blockers
  6. Manages local or remote computers by using a single, consolidated desktop tool
  7. prevents sites from installing and using ActiveX applications
  8. for clients seeking resources outside their networks
  9. a server that acts as an

22 Clues: set ofa server that acts as ana way to run outdated sitestext stored by a user’s web browsercan be used to suppress some or all pop-upsnative commands available in Windows PowerShellfor clients seeking resources outside their networksprevents sites from installing and using ActiveX applications...

Comp I Semester Test 2023 2023-05-09

Comp I Semester Test 2023 crossword puzzle
Across
  1. what the speed of a computer is measured in.
  2. read only memory.
  3. a unit of digital information that consists of 8 bits.
  4. known as volatile memory.
  5. a global network of computing devices communicating with each other in some way, whether they're sending emails, downloading files, or sharing websites.
  6. stores either the value 0 or 1.
  7. a protocol that uniquely identify devices using IP addresses and provides a routing strategy to send data to a destination IP address.
  8. a protocol used to convert a domain name into an IP address.
  9. compression algorithms that reduce the size of files without losing any information in the file.
  10. networks connected using physical connection such as cables.
Down
  1. the physical components of a computer.
  2. any group of interconnected computing devices capable of sending or receiving data
  3. a massive network of webpages, programs, and files that are accessible via URLs.
  4. shows how much data can be transferred across the communication media in a single second.
  5. a set of instructions, data, or programs used to operate a computer and execute specific tasks.
  6. a set of rules that have been agreed so that all devices on a network work in the same way and can understand each other.
  7. networks that use radio waves to send data through the air.
  8. 1's and 0's.
  9. a network that extends over a large geographic area and is composed of many, many LANs.
  10. compression algorithms that reduce the size of files by discarding the less important information in a file.
  11. a network that covers a limited area like a house or school.

21 Clues: 1's and 0's.read only memory.known as volatile memory.stores either the value 0 or 1.the physical components of a computer.what the speed of a computer is measured in.a unit of digital information that consists of 8 bits.networks that use radio waves to send data through the air.a protocol used to convert a domain name into an IP address....

Security Policy 2024-12-08

Security Policy crossword puzzle
Across
  1. creates a barrier between networks so that potentially harmful packets can't enter or leave protected networks.
  2. used to encrypt files and folders in windows OSs.
  3. requires a user to supply two or more types of authentication.
  4. a document that describes the rules governing access to an organization's information resources, enforcement of these rules, and steps taken if rules are breached.
  5. a framework for other protocols that provide encryption and authentication.
  6. is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
  7. is a common tool used by many Linux administrators.
  8. prevents people from using eavesdropping technology, such as protocol analyzer, to capture packets.
  9. is a good secrity enhancement for servers that aren't physically secure and for mobile devices at risk of being lost or stolen.
  10. An important part for maintaining a system.
  11. backs up the disk sector by sector to create an exact image of the disk's contents.
  12. used in a windows domain environment and provides mutual authentication.
Down
  1. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use.
  2. a server role that makes it possible for administrators to take control of Microsoft product updates.
  3. the built-in firewall in most linux distributions.
  4. a Linux files tool that offers a trash can for deleting files permanently.
  5. backs up any files that changed since the last full or incremental backup.
  6. creates a barrier between two entities.
  7. only backs up files that have changed since the last full backup.
  8. the most widely method for encrypting data.

20 Clues: creates a barrier between two entities.the most widely method for encrypting data.An important part for maintaining a system.used to encrypt files and folders in windows OSs.the built-in firewall in most linux distributions.is a common tool used by many Linux administrators.requires a user to supply two or more types of authentication....

Era 1 - 1.3 - South and Southeast Asia 2025-09-08

Era 1 - 1.3 - South and Southeast Asia crossword puzzle
Across
  1. – Thai kingdom known for its adoption of Buddhism and cultural achievements.
  2. – Language blending Persian, Arabic, and South Asian influences, developed under Delhi Sultanate rule.
  3. – Hindu social hierarchy that structured society and reinforced rulers’ legitimacy in India.
  4. – Kingdoms like Srivijaya and Majapahit that gained wealth and power by controlling trade networks at sea.
  5. – Famous Hindu-Buddhist temple complex built by the Khmer Empire, symbolizing state power and religion.
  6. – Maritime empire in Sumatra that prospered by controlling Indian Ocean trade and supporting Buddhism.
  7. – Monument built in Delhi after Islamic conquest, symbolizing Muslim dominance in North India.
  8. – Hindu devotional movement emphasizing personal connection to a deity, often challenging caste distinctions.
Down
  1. – States in mainland South/Southeast Asia that relied on agriculture and territorial control for power.
  2. – Hindu kingdom in southern India that resisted Muslim invasions and promoted Hindu culture.
  3. – Indian Ocean trade networks linking South and Southeast Asia with Africa, the Middle East, and China.
  4. – Long-standing South Asian belief system that shaped social order and political legitimacy through the caste system.
  5. – Religion that spread from India into Southeast Asia, blending with local traditions in places like Srivijaya.
  6. – Muslim government in northern India (1206–1526) that unified much of the region under Islamic power.
  7. – Act of spreading a religion to new followers; Muslims in South and Southeast Asia often used this approach.
  8. – Powerful empire in Cambodia that built Angkor Wat and blended Hindu-Buddhist influences.
  9. – Religion that spread to South and Southeast Asia through trade and conquest, influencing politics and culture.
  10. – Mystical form of Islam that appealed to many in South Asia through tolerance and emotional devotion.
  11. – Buddhist kingdom in Sri Lanka known for irrigation systems and monastic support of the state.
  12. – Maritime empire in Indonesia that controlled trade routes and resisted Mongol expansion.

20 Clues: – Thai kingdom known for its adoption of Buddhism and cultural achievements.– Powerful empire in Cambodia that built Angkor Wat and blended Hindu-Buddhist influences.– Maritime empire in Indonesia that controlled trade routes and resisted Mongol expansion.– Hindu kingdom in southern India that resisted Muslim invasions and promoted Hindu culture....

Computer Literacy History of the Internet 2022-01-09

Computer Literacy History of the Internet crossword puzzle
Across
  1. a piece of computer hardware or software that accesses a service made available by a server
  2. markup language used to make web pages
  3. he gulf between those who have ready access to computers and the internet, and those who do not.
  4. The acronym for a web page address
  5. a program of coordinated, evolving projects sponsored by the National Science Foundation from 1985 to 1995 to promote advanced research and education networking in the United States
  6. a piece of computer hardware or software that provides functionality for other programs or devices, called "clients".
  7. the first internet browser
  8. The computer scientist who is primarily remembered for having championed the creation of ARPANET, an early Internet.
  9. The set of communications protocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol and the Internet Protocol.
  10. a computer network that connects smaller networks. They allow localized networks to communicate with one another across great distances.
  11. (vc) The co-inventor of the TCP/IP protocols and was responsible for originating DARPA's Internet program. Known as one of the “Fathers of the Internet”
  12. Refers to a website address. This is what users type in a browser's search bar to directly access the website. It is unique and cannot be shared between different sites.
  13. computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
  14. Best known as the inventor of the World Wide Web
  15. a computer program with a graphical user interface for displaying and navigating between web pages.
Down
  1. a rapid rise in U.S. technology stock equity valuations fueled by investments in Internet-based companies in the late 1990s.
  2. an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
  3. the state of political hostility that existed between the Soviet bloc countries and the US-led Western powers from 1945 to 1990.The reason the internet was created
  4. a mode of data transmission in which a message is broken into a number of parts which are sent independently, over whatever route is optimum
  5. a common network protocol used on the Internet and also inside a LAN (local network). ... Telnet is one of the simplest ways to exchange data between two computers.
  6. a set of computers sharing resources located on or provided by nodes. The computers use common communication protocols over digital interconnections to communicate with each other.
  7. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  8. a Unix-based system for transferring data over phone lines via a dial-up connection.
  9. _________.com, the first and oldest registered web site
  10. (rk)The co-inventor of the TCP/IP protocols and was responsible for originating DARPA's Internet program. Known as one of the “Fathers of the Internet”
  11. a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
  12. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  13. The most popular search engine
  14. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  15. The forerunner of the Internet, was a pioneering long-haul network funded by the U.S. Department of Defense

30 Clues: the first internet browserThe most popular search engineThe acronym for a web page addressmarkup language used to make web pagesBest known as the inventor of the World Wide Web_________.com, the first and oldest registered web sitea Unix-based system for transferring data over phone lines via a dial-up connection....

IPTV Times Table 2 2012-11-16

IPTV Times Table 2 crossword puzzle
Across
  1. Short for Media Gateway Control Protocol
  2. A method of transmission in which all bits of a character are sent simultaneously over separate lines to a high speed printer or other locally attached peripheral
  3. Data transmission over a circuit capable of transmitting in one preassigned direction only
  4. An application that enables a desktop, laptop or workstation computer to function as a telephone via VOIP
  5. A communications channel or medium having a bandwidth sufficient to carry multiple voice/video or data signals simultaneously
  6. A device that allows user to send commands to a computer that is somewhere else
  7. A group of bits, including address, data and control elements, that are switched and transmitted together
  8. A single device capable of both sending and receiving information
  9. Used in IP networks to break up larger networks into smaller networks
  10. A connection-oriented protocol that employs the virtual circuit approach
  11. Provides broadband access network over traditional twisted copper pair and faster than ADSL
  12. Television programming that requires payment upfront usually on a monthly basis as a subscription fee
  13. TCP flow control process used to control the number of unacknowledged data segments that are sent between transmissions
  14. Provides a standard method for transporting multi-protocol datagrams over point-to-point links
  15. Unreliable and connectionless
Down
  1. One of the three basic modulations of adding information to a sine wave signal in which its phase is varied to impose information on it
  2. Information which travels from the user to the internet or to a central office or headend
  3. A technique for combining many signals on a single circuit by interleaving bits or bytes of data from successive channels
  4. The range of electromagnetic radio frequencies used in transmission of voice, data and television
  5. Any common carrier network that provides circuit switching between public users
  6. Transmission in which the data character and bits are transmitted at a fixed rate with the transmitter and receiver being synchronized
  7. A functional unit of a node through which data can enter or leave a data network
  8. Plastic cards the viewer can insert in the set-top box
  9. Application layer signaling protocol
  10. The length of an electromagnetic waveform as measured from any point on one wave to the corresponding point on an adjacent wave
  11. A specific set of rules, procedures or conventions that two data devices must accept and use to be able to communicate
  12. A type of scanning that may result in a screen flicker
  13. Used to manage the membership of Internet Protocol multicast groups
  14. Telecommunications companies that sell internet access
  15. The device which enables anyone to compute, word process, or perform more complicated functions

30 Clues: Unreliable and connectionlessApplication layer signaling protocolShort for Media Gateway Control ProtocolPlastic cards the viewer can insert in the set-top boxA type of scanning that may result in a screen flickerTelecommunications companies that sell internet accessA single device capable of both sending and receiving information...

Computer Acronyms 2024-09-06

Computer Acronyms crossword puzzle
Across
  1. A standard interface designed for IBM PC-compatible computers.
  2. An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
  3. A type of non-volatile memory used in computers and other electronic devices.
  4. A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  5. A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
  6. A proprietary journaling file system developed by Microsoft in the 1990s.
  7. An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
  8. A small economy car made by the British Motor Corporation.
  9. Used to interact with computer programs with text-based commands.
  10. The most important processor in a given computer.
  11. A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
  12. Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
  13. A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
  1. A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
  2. A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
  3. A video display interface developed by the Digital Display Working Group.
  4. A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
  5. A video display controller and accompanying de facto graphics standard.
  6. A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
  7. A solid-state storage device.
  8. A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
  9. A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
  10. A computer hardware component that connects a computer to a computer network.
  11. An industry standard that allows data exchange and delivery of power between many types of electronics.
  12. A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.

25 Clues: A solid-state storage device.The most important processor in a given computer.A small economy car made by the British Motor Corporation.A standard interface designed for IBM PC-compatible computers.Used to interact with computer programs with text-based commands.A video display controller and accompanying de facto graphics standard....

Social networks 2021-03-21

Social networks crossword puzzle
Across
  1. an app that enables you to post tweets to convey your message to the world
  2. the largest social networking site in the world
  3. a unique social networking platform that was completely based on sharing photos and videos
Down
  1. the world's largest video-sharing social networking site that enables users to upload and share videos, view them, comment on them and like them
  2. an app with a calling option for communicating with people around the world without spending money

5 Clues: the largest social networking site in the worldan app that enables you to post tweets to convey your message to the worlda unique social networking platform that was completely based on sharing photos and videosan app with a calling option for communicating with people around the world without spending money...

Local Networks 2022-05-17

Local Networks crossword puzzle
Across
  1. it is an ability that tests a variety of hypotheses
  2. cover those related to technological innovation as well as their positive and negative impacts on the organization.
  3. external factors that can contribute to the attainment of its objectives and priorities.
Down
  1. internal attributes of the organization that can contribute to the attainment of its objectives and priorities.
  2. it is a kind of analysis that surveys bigger environment where the organization operates

5 Clues: it is an ability that tests a variety of hypothesesit is a kind of analysis that surveys bigger environment where the organization operatesexternal factors that can contribute to the attainment of its objectives and priorities.internal attributes of the organization that can contribute to the attainment of its objectives and priorities....

Networks -Josh 2019-05-17

Networks -Josh crossword puzzle
Across
  1. -What crisps come in
  2. -Colour
Down
  1. -Flames
  2. -A device for connecting computers and other devices together to make a network
  3. -Getting into a computer without authorisation

5 Clues: -Flames-Colour-What crisps come in-Getting into a computer without authorisation-A device for connecting computers and other devices together to make a network

Networks crossword 2023-11-24

Networks crossword crossword puzzle
Across
  1. – Cheap but if many computers are attached, the amount of data flowing causes the network to slow down.
  2. – Easy To Install and expand but expensive
Down
  1. – A system of interconnected devices
  2. - The physical and logical arrangement of nodes in a network
  3. - If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.

5 Clues: – A system of interconnected devices– Easy To Install and expand but expensive- The physical and logical arrangement of nodes in a network- If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.– Cheap but if many computers are attached, the amount of data flowing causes the network to slow down.

Technology 2023-04-17

Technology crossword puzzle
Across
  1. - Solid-State Drive, storage device that uses flash memory
  2. - Mobile device with a touch screen interface
  3. - Machine designed to perform tasks automatically
  4. - Wireless networking technology for local area networks
  5. - Automated device that performs tasks
  6. HEADSET - Virtual reality head-mounted display
  7. - Security system that controls access to a computer network
  8. - Video or audio content delivered over the internet in real-time
  9. - Mobile device that can perform various tasks
  10. - Reality technology that overlays digital information onto the real world
  11. - Display that can sense and respond to touch input
  12. - Technology that uses radio waves for communication
  13. - Person who uses their technical skills to gain unauthorized access to computer systems
  14. - Software that manages computer hardware and software resources
  15. - Process of creating computer software
  16. - Intelligence created by computer systems
  17. - Digital ledger used for secure transactions
  18. - Playing electronic games
  19. - Fifth generation wireless technology for mobile networks
  20. - Electronic mail system for sending and receiving messages
  21. - Physical components of a computer system
  22. - Science and engineering of manipulating matter on a tiny scale
  23. - Video camera that streams or records video
Down
  1. - Collection of data that can be accessed, managed, and updated
  2. - Additive manufacturing process of creating three-dimensional objects
  3. - Output device used to create hard copies of documents
  4. - Buying and selling goods
  5. - Global computer network
  6. - Wireless technology used for short-range communication
  7. - Malicious software that can harm computer systems
  8. - Input device used for typing
  9. - Funding a project through small contributions from many people
  10. - Software used to access the internet and view websites
  11. - Output device used to produce sound
  12. - Input device used to capture audio
  13. - High-Definition Multimedia Interface, digital audio and video interface
  14. - Programs and data used by a computer
  15. - Reality technology that simulates a three-dimensional environment
  16. - Neural networks used for machine learning
  17. - Digital or virtual currency that uses cryptography for security
  18. - Photography using electronic sensors to capture images
  19. - Portable computer that can be used on the go
  20. - Computer system that provides services to other computers over a network
  21. - Step-by-step procedure for solving a problem
  22. - Writing computer code to create software
  23. CODE - Two-dimensional barcode used for storing information
  24. - Universal Serial Bus, standard interface for connecting computer peripherals
  25. - Input device used to control a computer
  26. - Device that converts digital signals to analog signals for transmission over phone lines
  27. - Input device used to digitize documents
  28. - Internet of Things, network of interconnected devices and appliances
  29. - Networking device used to connect multiple devices to a network
  30. - Network of remote servers used for storing and managing data

53 Clues: - Global computer network- Buying and selling goods- Playing electronic games- Input device used for typing- Input device used to capture audio- Output device used to produce sound- Automated device that performs tasks- Programs and data used by a computer- Process of creating computer software- Input device used to control a computer...

ISCC - Chapter 4 2025-11-27

ISCC - Chapter 4 crossword puzzle
Across
  1. — Open record maintained by the community for verifying transactions
  2. — Services triggered by a user’s real-time geographic position
  3. — Generation that learns, reacts, and thinks differently due to lifelong hyper-connectivity
  4. — AI branch that captures, stores, and processes images
  5. — Products delivered electronically with no physical form
  6. — Digital platform where supply directly meets demand
  7. — Technology that enables people to form interest-based communities online
  8. — Technology that simulates reasoning, perception, and problem-solving
  9. — Information system that embeds AI in its decision-making
  10. — Information system that supports content sharing among user communities
  11. — Network-based business model seamless across devices and platforms
  12. — Innovation that reshapes industries and behaviours in society
  13. — Digital platform that connects drivers and riders for transport services
  14. — System enabling real-time reservations and digital payments
  15. — Facility enabling fast shipping for digital retail operations
  16. — Technique enabling secure transfer of digital funds between parties
  17. — AI system that stores knowledge and makes inferences like a human specialist
  18. — Online buying and selling supported by integrated inventory and fulfilment networks
  19. — A community transformed by integration of advanced technologies
  20. — Secret cryptographic credential used to authorise digital transactions
  21. — Insights from business intelligence showing future trends
  22. — Digital money secured by cryptography and resistant to counterfeiting
Down
  1. — Organization built entirely on digital platforms and networks
  2. — The key digital-money flaw where a single token could be duplicated
  3. — Describes Generation Z’s constant immersion in digital communication
  4. — Technologies providing historical, current, and predictive business insights
  5. — Digital model where services are requested and delivered instantly
  6. — Next-generation commerce integrating apps, supply chain, and data
  7. — Economic model built on digital intermediaries and user networks
  8. — Digital services enhanced with AI and continuous data learning
  9. — Digital financial transactions conducted through smartphone apps
  10. — Technology that subtly influences behaviour and decision-making
  11. — Computing system designed to mimic the human brain’s processing
  12. — Chain of cryptographically linked blocks storing immutable transaction records
  13. — First cryptocurrency created to solve the double-spend problem
  14. — The act of publishing and distributing digital media online
  15. — Behaviour and thinking shaped by technology and the internet
  16. — Providers, users, and groups that shape SMIS interactions
  17. — Group of users connected by shared interests on social platforms
  18. — Digital process that reduces or removes the need for human intervention
  19. — AI that adjusts behaviour based on past outcomes
  20. — Mechanical systems capable of performing high-precision repetitive tasks
  21. — Cryptographic identifier shared publicly for receiving digital currency
  22. — Computer-generated environment reproducing real-world tasks
  23. — Capability allowing a computer to understand spoken or written human language

45 Clues: — AI that adjusts behaviour based on past outcomes— Digital platform where supply directly meets demand— AI branch that captures, stores, and processes images— Products delivered electronically with no physical form— Information system that embeds AI in its decision-making— Providers, users, and groups that shape SMIS interactions...

Unit 6 Vocab Crossword 2021-09-28

Unit 6 Vocab Crossword crossword puzzle
Across
  1. offensive maneuver that targets computer information systems, computer networks, infrastructures
  2. the practice of protecting critical systems and sensitive information from digital attacks
  3. is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization
  4. are criminals who break into computer networks with malicious intent.
  5. slang term used to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems
  6. the use of computer-based technique such as hacking as a form of civil disobedience
  7. a relatively unskilled individual who uses scripts or programs
  8. prevents someone watching your connection from knowing what websites you visit
  9. parts of the World Wide Web whose contents are not indexed by standard web search-engines.
  10. is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle
Down
  1. a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  2. allows developers to discover and resolve bugs before the general public is aware of such bug
  3. a path or means by which an attacker or hacker can gain access to a computer or network server
  4. the gaining of unauthorized access to data in a system or computer.
  5. open-source software for enabling anonymous communication.

15 Clues: open-source software for enabling anonymous communication.a relatively unskilled individual who uses scripts or programsthe gaining of unauthorized access to data in a system or computer.are criminals who break into computer networks with malicious intent.prevents someone watching your connection from knowing what websites you visit...

NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17

NETWORKING CONCEPTS AND CYBER ETHICS crossword puzzle
Across
  1. an illegal intrusion into a computer system or network
  2. it is an act of harming or harassing a person through information technology in a deliberate manner
  3. two or more computers and peripheral devices are connected within a small area
  4. a computer network that is mainly created for an individual person
  5. it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
  6. it enables you to connect your computers to the available internet connection over the existing telephone lines
  7. unwanted bulk emails that come from unknown sources
  8. a device that connects two different types of networks with each other
Down
  1. a program or a set of programs that disrupts the normal functioning of a computer
  2. a network device that is used to connect all the computers in a network with each other
  3. this kind of network connects two or more computers located at distant places
  4. criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
  5. a larger network than Lan and is spread across the city
  6. being aware of ethical practices and behaving responsibly and appropriately while using the internet
  7. the act of using or imitating the language and thoughts of another person as one's original work

15 Clues: unwanted bulk emails that come from unknown sourcesan illegal intrusion into a computer system or networka larger network than Lan and is spread across the citya computer network that is mainly created for an individual persona device that connects two different types of networks with each other...

Stay in touch vocabularys 2020-05-05

Stay in touch vocabularys crossword puzzle
Across
  1. Smartphones, PCs and eveything like this is something like that
  2. An other word for Smartphone
  3. Borring things aren´t this
  4. Opposite of nice
  5. You can... photos on instagram
  6. They are nasty on social networks
Down
  1. A place wich is wonderfull
  2. You can... your friends
  3. Instagram or TikTok is a...
  4. You can write it with paper and pen

10 Clues: Opposite of niceYou can... your friendsA place wich is wonderfullBorring things aren´t thisInstagram or TikTok is a...An other word for SmartphoneYou can... photos on instagramThey are nasty on social networksYou can write it with paper and penSmartphones, PCs and eveything like this is something like that

Basic Concepts of Data Communication and Networking 2021-04-01

Basic Concepts of Data Communication and Networking crossword puzzle
Across
  1. Rules that governs data communication
  2. Two or more networks connected
  3. More than two devices share link
  4. Typically uses one type of transmission media
  5. Data flow in one direction only
Down
  1. Two or more devices connected
  2. Topmost OSI layer
  3. All devices both request and grant resources
  4. Number of basic network topologies
  5. Topology with 6 devices and 15 links

10 Clues: Topmost OSI layerTwo or more devices connectedTwo or more networks connectedData flow in one direction onlyMore than two devices share linkNumber of basic network topologiesTopology with 6 devices and 15 linksRules that governs data communicationAll devices both request and grant resourcesTypically uses one type of transmission media