networks Crossword Puzzles
IS unit 3 2022-11-18
Across
- validates data was sent from sender
- detailed steps to meet IS standards
- preventing data to be read
- ensuring that data has not been altered
- strategy to provide protection
- outline of overall IS strategy
- consists of multiple firewalls
Down
- regulates incoming and outgoing traffic
- preventing failure of system from comprising security
- secure private network over public network
- quality IS program
- forwards data packets between computer networks
- state of being responsible for something
- statements of what to be done to comply with policy
- state of being viable
15 Clues: quality IS program • state of being viable • preventing data to be read • strategy to provide protection • outline of overall IS strategy • consists of multiple firewalls • validates data was sent from sender • detailed steps to meet IS standards • regulates incoming and outgoing traffic • ensuring that data has not been altered • state of being responsible for something • ...
ICT 2024-10-10
Across
- Connects electronic devices close to the user, such as a wireless mouse, a keyboard, and a computer.
- An intelligent device that receives, processes, and transmits data from one network to another.
- A 12-digit hexadecimal number assigned to each device connected to the network.
- A device in a computer network that connects other devices together.
- A network node used in telecommunications that connects two networks with different transmission protocols together.
Down
- An identifying number that is associated with a specific computer or computer network.
- A network security device that separates a trusted internal network from an external network deemed untrustworthy
- Electronic devices that convert digital data signals into modulated analog signals suitable for transmission over analog telecommunications circuits.
- A device that connects two or more packet-switched networks or subnetworks.
- A collection of devices connected together in one physical location, such as a building, office, or home.
- A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
- A large network of information that is not tied to a single location.
- A device that links multiple computers and devices together.
- Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.
14 Clues: A device that links multiple computers and devices together. • A device in a computer network that connects other devices together. • A large network of information that is not tied to a single location. • A device that connects two or more packet-switched networks or subnetworks. • ...
Computer Holiday Homework 2025-06-01
Across
- - a kind of network which connects two or more computer located as distant places.
- - a topology in which all the notes are connected in a circular manner.
- - an impression or information about the person that exist on the internet because of his online activity.
- - device that enables you to connect your computer to the available internet connection over the existing telephone
- - computer network in which two or more computer and peripheral devices are connected within a small area.
- - hacking which is done for a good cause.
- - a topology in which each node is connected to every other node in the network.
- - a means of communication that uses low powered radio waves to transmit the data between devices.
- - a computer network that is mainly created for an individual person.
Down
- - it refers to an illegal intrusion into computer system of network.
- - it refers to criminal activities that involve the use of computers, networks, and the internet connection with the intent to cause harm to individuals or the digital devices.
- - when software is copied and distributed illegally.
- - a device that connects two different types of networks with each other.
- - a term is a combination of two terms, 'net' and 'etiquette'.
- - network device that is used to connect all computers in a network with each other.
- - it refers to the act of using or imitating the language and thoughts of another person as one's original work.
- - it refers to unwanted bulk emails that come from unknown sourcess.
17 Clues: - hacking which is done for a good cause. • - when software is copied and distributed illegally. • - a term is a combination of two terms, 'net' and 'etiquette'. • - it refers to an illegal intrusion into computer system of network. • - it refers to unwanted bulk emails that come from unknown sourcess. • ...
DIT Lesson 9 Vocabulary 2023-02-08
Across
- A collection of data that is not easily organized into a tidy structure
- The term implies that when a friend of your friend is also your friend
- The comparison of overlapping between networks for two individuals
- The equivalence which examines the similarity between individuals within several networks
- A theory that measures how consistent individuals are in assigning a status to their network of friends
- The term defines how important a person is in a social network
- The assignment of credit for a conversion or business outcome to a particular source, called a touchpoint
Down
- A theory that examines consistency in a network, based on friend/foe relationships between people in the network
- The process of representing, analyzing, and extracting patterns from collections of social media data to gain knowledge
- The business metrics used to measure and evaluate if the business is achieving key business objectives
- A collection of data that is organized into a series of columns and rows
- A data whose structure comes from a series of tag and semantic elements to create a hierarchy of record and field
- The items that have sensors to collect or track data that are connected to the Internet
- The term implies that when a person becomes your friend, you become their friend as well
14 Clues: The term defines how important a person is in a social network • The comparison of overlapping between networks for two individuals • The term implies that when a friend of your friend is also your friend • A collection of data that is not easily organized into a tidy structure • A collection of data that is organized into a series of columns and rows • ...
Internet of Things 2025-08-05
Across
- A communication protocol that allows for the exchange of data in IoT systems, often used in home automation.
- A widely-used type of IoT device that can sense and respond to environmental changes like light, temperature, or pressure.
- he algorithm that helps optimize the energy efficiency of wireless sensor networks.
- A key component of IoT that enables physical actions based on data received from sensors.
- A protocol used for communication in the application layer of IoT systems, known for its extensibility and flexibility
- Layer The layer that handles the exchange of information between devices over the internet in IoT.
Down
- Devices that detect physical stimuli and convert them into electrical signals for IoT systems.
- A method of addressing that supports large-scale IoT devices and networks.
- A method of wireless communication used for short-range, low-power exchanges between devices in IoT.
- A type of network that uses small, low-power devices to monitor physical conditions.
- The protocol used for transferring data in IoT with a resource-constrained environment, typically used in machine-to-machine communications.
- A type of network specifically designed for small, low-power devices, typically deployed over large areas.
- A communication protocol used for lightweight messaging in IoT.
- The technology that allows devices to be "smart" by collecting and exchanging data automatically.
14 Clues: A communication protocol used for lightweight messaging in IoT. • A method of addressing that supports large-scale IoT devices and networks. • he algorithm that helps optimize the energy efficiency of wireless sensor networks. • A type of network that uses small, low-power devices to monitor physical conditions. • ...
kaid ali crossword 2022-01-14
Across
- people linked by culture religion etc
- deputy of the prophet
- shared language of muslims
- rightly guided caliphs
- period expanded old trade networks
- larger opinion over others
- uthman's family
- those wanted ali
- a person pr proclaimer of the will of god
- the muslim community
- striving to encourage
- kept it together
Down
- tries to resolve the conflict
- the spread of something
- muhammad's son in law
- when muslims celebrate after fasting
- the international city
- when the muslims fast for 30 days
- muhammad's friend and a military leader
- those who supported abu-bakr
- ali's son
- what muhammad's did not have alo another word for son
22 Clues: ali's son • uthman's family • those wanted ali • kept it together • the muslim community • deputy of the prophet • muhammad's son in law • striving to encourage • the international city • rightly guided caliphs • the spread of something • larger opinion over others • shared language of muslims • those who supported abu-bakr • tries to resolve the conflict • when the muslims fast for 30 days • ...
Cybersecurity Crossword Puzzle 2023-01-25
Across
- acquiring user info through deception
- faking transmissions to gain access
- software that provides unwanted ads
- process to identify user identity
- uses external verification to login
- unauthorized transfer of information
- software for spying on users
- risk-reduction controls on a system
- collection of compromised systems
- capability to limit network traffic
- distributed attack on a network
- unwanted advertising/unsolicited emails
- everyday objects connected to internet
Down
- malicious program you pay to unlock
- unencrypted information
- cypher used to protect information
- intrusive or malicious computer software
- software used to protect systems
- capture of data over networks
- test to verify if human
- process of decoding cyphers
21 Clues: unencrypted information • test to verify if human • process of decoding cyphers • software for spying on users • capture of data over networks • distributed attack on a network • software used to protect systems • process to identify user identity • collection of compromised systems • cypher used to protect information • malicious program you pay to unlock • ...
Computer Puzzle 2025-06-06
Across
- A global network of computers
- Legal protection for original work
- Network covering a large geographic area
- Illegally accessing computer data
- Collection of connected computers
- Unique address assigned to each computer
- Connection without cables
- Hardware device to access the internet
- Rules that control communication in a network
- Network that covers a small area
- Strong secret word to protect account
- Device that connects multiple networks
Down
- Ethical use of computers
- Crime done using a computer or internet
- Trick users by pretending to be trustworthy
- Accessing someone's account without permission
- Protects a network from unauthorized access
- A program that harms computers
- Keeps user identity private
- Device that connects different network segments
20 Clues: Ethical use of computers • Connection without cables • Keeps user identity private • A global network of computers • A program that harms computers • Network that covers a small area • Illegally accessing computer data • Collection of connected computers • Legal protection for original work • Strong secret word to protect account • Hardware device to access the internet • ...
Future of Technology 2025-11-17
Across
- Next generation mobile network after 5G
- Protection of computers and networks
- Technology enabling space travel and exploration
- Group of autonomous robots or drones working together
- Discarded electronic devices
- Digital currency and related technologies
- Decentralized digital ledger technology
- Study of genes and DNA manipulation
- Machines that perform tasks autonomously
- Securing data by encoding information
Down
- Immersive computer-generated environment
- A city enhanced with IoT technology
- Augmented reality technology
- Technology using extremely small particles
- Popular cryptocurrency abbreviation
- AI systems that learn from data
- Advanced computing using qubits
- Study of biological systems used in future medicine
- Brain–computer interface technology
- Energy from sustainable sources
20 Clues: Augmented reality technology • Discarded electronic devices • AI systems that learn from data • Advanced computing using qubits • Energy from sustainable sources • A city enhanced with IoT technology • Popular cryptocurrency abbreviation • Study of genes and DNA manipulation • Brain–computer interface technology • Protection of computers and networks • ...
Latin Prefixes and Roots 2026-01-16
Across
- not made up stories (true stories)
- doesn't stop
- across the Atlantic Ocean
- carried out
- not legal
- not correct
- connection between two people or systems
- shape again
- not mature
- not responsible
- one who carries
- to give shape to knowledge
Down
- misshapen
- carried in
- doesn't stick
- easily carried
- networks that exist between each other
- between nations
- between states
- making a big, complete change in how something looks, acts, or is built
- having one shape or characteristic
- copying something from one way (sound, shorthand, music) to another (written text, new notes)
- do or complete a piece of business, like buying or selling something
23 Clues: misshapen • not legal • carried in • not mature • carried out • not correct • shape again • doesn't stop • doesn't stick • easily carried • between states • between nations • not responsible • one who carries • across the Atlantic Ocean • to give shape to knowledge • not made up stories (true stories) • having one shape or characteristic • networks that exist between each other • ...
Vocabulary Choiceboard 3H Week1 2025-08-23
Across
- capable
- la mesa to clear the table
- to chat online
- móvil cell phone
- los muebles to dust the furniture
- ordenador computer (Spain)
- la ropa to wash the clothes
- never
- melancólica melancholic
- always
- abierta open-minded
- pupitres student desks
- comprometida committedexigente challenging, demanding
- /colgar fotos to upload photos
Down
- la basura to take out the trash
- pizarra whiteboard/blackboard
- persistent
- la compra to do the shopping
- juguetona playful
- tarea homework
- veces often, many times
- lively
- to think
- por internet to surf the internet
- redes sociales social networks
- apasionada passionate
- bien to have a good time
- orgullosa proud
- la mesa to set the table
29 Clues: never • lively • always • capable • to think • persistent • to chat online • tarea homework • orgullosa proud • móvil cell phone • juguetona playful • abierta open-minded • apasionada passionate • pupitres student desks • veces often, many times • melancólica melancholic • bien to have a good time • la mesa to set the table • la mesa to clear the table • ordenador computer (Spain) • ...
ML Associate Study Puzzle 2025-10-02
Across
- Scaling features to a standard range
- A characteristic of a dataset
- Row-based format
- Systematic error in model predictions
- Subset of ML using multiple layers of neural networks
- Used to predict numerical values
- Model's prediction
- 2D array of values
- Anomaly detection algorithm
- Random variation in data
Down
- When a model learns training data too well, making it perform poorly on new unseen data
- dimensionality reduction technique
- Learning through rewards
- One complete pass through the training dataset
- Group of training samples
- Single unit in neural network
- Performance visualization curve
- Categorizing inputs into discrete classes
- Hardware that speeds up ML training
- Columnar format
20 Clues: Columnar format • Row-based format • Model's prediction • 2D array of values • Learning through rewards • Random variation in data • Group of training samples • Anomaly detection algorithm • Single unit in neural network • A characteristic of a dataset • Performance visualization curve • Used to predict numerical values • dimensionality reduction technique • ...
Da crossword 2013-05-01
Across
- A self-replicating program that is harmful to networks
- Acronym for several closely related operating systems.
- Neither clearly good nor clearly bad.
- Virus affets the...
- tool An interpreted computer programming language
- engineer Manipulating people into performing actions
- Practically a worm
Down
- When someone enters you mail
- An antivirus is a
- The illegal use of your email address by a stranger
- Use again
- Sent by attackers
- Is the basic communication language or protocol of the Internet.
13 Clues: Use again • An antivirus is a • Sent by attackers • Practically a worm • Virus affets the... • When someone enters you mail • Neither clearly good nor clearly bad. • tool An interpreted computer programming language • The illegal use of your email address by a stranger • engineer Manipulating people into performing actions • ...
Fake News 2021-01-01
9 Clues: a click trap • all social networks • something that is wrong • action that shows others • to be convinced of a truth • actions to influence a population • what we can hear on the radio, TV ... • something on the internet (an article ...) • verified idea, announced by recognized authorities
Supervise work 2012-11-06
Across
- provide personal support,friendship
- tell you your rate of pay
- entitlement you are entitled to when you are sick
- can be formal or informal
- introduces employees to workplace
- what does it stand for
- employees pay 9%
- is used in goal setting
- helps a new employee
Down
- provides information about the clients levels of satisfaction
- Protects rights of clients
- question when asked should receive a long answer
- agreements outlines conditions which people are employed
- voice a WA union
- Awards are an important part of the IR system
15 Clues: employees pay 9% • voice a WA union • helps a new employee • what does it stand for • is used in goal setting • tell you your rate of pay • can be formal or informal • Protects rights of clients • introduces employees to workplace • provide personal support,friendship • Awards are an important part of the IR system • question when asked should receive a long answer • ...
Computer Virus (RB) 2017-11-27
Across
- Virus that overtakes a network
- Virus discovered in 1991
- A destructive code that destroys computers
- Programs and other operating information used by computers
- Virus that affected 3.6 million computers
- Opposite of frontdoor
- worm Virus that you could not get rid of
- Virus that spreads through mail programs and networks
Down
- Virus on the Top10 most dangerous list
- Creator of the Codered virus
- First email virus
- ivy Virus named after a poison plant
- ------horse
- virus that was named after a Mt. Dew beverage
- Virus that replicates itself
15 Clues: ------horse • First email virus • Opposite of frontdoor • Virus discovered in 1991 • Creator of the Codered virus • Virus that replicates itself • Virus that overtakes a network • ivy Virus named after a poison plant • Virus on the Top10 most dangerous list • worm Virus that you could not get rid of • Virus that affected 3.6 million computers • ...
tunnit66 2019-11-11
Across
- .... Perimeter is secured boundary between the private and locally managed side of a network.
- network topology
- Internet Protocol
- communication endpoint
- Global network of computers
- Network aka Extranet
- Intrusion Prevention System
- Extranet is implemented as a ....?
Down
- Secure way of sharing information within an organisation.
- System of computers through which particular organizations communicate with each other and share information.
- ....... firewall is a firewall installed between a private network and other public networks.
- wireless wide area network
- network service
- Intrusion detection System
- Transmission Control Protocol
15 Clues: network service • network topology • Internet Protocol • Network aka Extranet • communication endpoint • wireless wide area network • Intrusion detection System • Global network of computers • Intrusion Prevention System • Transmission Control Protocol • Extranet is implemented as a ....? • Secure way of sharing information within an organisation. • ...
Information system 2023-08-15
Across
- Distributed computing model.
- Method of slicing digital messages into parcels.
- Collection of related files containing records on people, places or things
- known as Green technology.
- Transmission Control Protocol.
- Discovery and analysis of useful patterns and information from the web.
- Non-Relational Databases.
- Input text, numbers, and symbols into device.
Down
- Denial-of-service attacks.
- Combination of hardware and software that prevents unauthorized users from accessing private networks.
- Enterprice resouce planning systems.
- Supply chain______systems(execute).
- malicious software.
- Supply chain______systems(plan).
- Output information in pictorial or textual form.
15 Clues: malicious software. • Non-Relational Databases. • Denial-of-service attacks. • known as Green technology. • Distributed computing model. • Transmission Control Protocol. • Supply chain______systems(plan). • Supply chain______systems(execute). • Enterprice resouce planning systems. • Input text, numbers, and symbols into device. • Method of slicing digital messages into parcels. • ...
The City of the Future-chapter 6 2021-08-24
Mesh Wi-Fi Networking 2020-05-13
Across
- can include a series of nodes placed strategically throughout a home to optimize network coverage. mesh wifi networks offer customers customized wifi solutions for any size home.
- the device that an ISP (Internet Service Provider) uses to connect a home to the web. Some Mesh Wi-Fi Networks include a modem and router with the system
- A network node can include any device that transmits and/receives a wireless signal. In Mesh wifi networks, nodes are placed throughout a home to provide a wireless signal to your devices
Down
- a node that duplicates the available wireless signal from a router across a wider range.
- connected to a modem, routers broadcast the internet signal from the modem to the wireless devices within a home. Some routers may include a built-in modem for both traditional and Mesh Wi-Fi Networks
5 Clues: a node that duplicates the available wireless signal from a router across a wider range. • the device that an ISP (Internet Service Provider) uses to connect a home to the web. Some Mesh Wi-Fi Networks include a modem and router with the system • ...
Structure of the Internet 2021-06-20
Across
- The full address of an Internet resource. (7,8,7)
- A network of networks set up to allow computers to communicate with one another. (8)
- A hierarchical naming system for computers, services, or other resources connected to the Internet. (6,4,6)
- An organization that provides a services for accessing, using, or participating in the Internet. (8,7,8)
- Application software for accessing the World Wide Web. (3,7)
- A collection of web pages that reside on the computers connected to the Internet. (5,4,3)
- A software system that is designed to carry out web searches. (6,6)
- A network that relies on 3rd party carriers or connections such as those provided by BT. (4,4,7)
- A network which has a central node (which may be a switch or a computer) which acts as a router to transmits messages. (4)
Down
- Have worldwide databases that hold records of all the domain names currently issued to individuals and companies.
- A network that consists of a number of computing devices on a single site or in a single building.
- The city in which CERN is located. (6)
- These devices are used to connect at least two networks commonly two WANs or LANs together.
- Refers to a specific layout of a local area network. (8)
- Developed the concept of the world wide web.(3,3,7,3)
- A domain name that includes the host server name. (5,9)
- Created by a US defence project in the 1960s. (7)
- A network where all computers are connected to a single cable. (3)
- Hold records of existing website names and the details of those domains that are currently available to purchase. (8,10)
- Identifies the area of domain that an internet resource resides in.
- A unique address that is assigned to a network device. (8,8)
21 Clues: The city in which CERN is located. (6) • The full address of an Internet resource. (7,8,7) • Created by a US defence project in the 1960s. (7) • Developed the concept of the world wide web.(3,3,7,3) • A domain name that includes the host server name. (5,9) • Refers to a specific layout of a local area network. (8) • ...
Computer Science 2 Vocabulary 2020-03-31
Across
- these conditions represent unusual but valid data values
- leads a team of individuals to complete one or more projects
- statement that you believe to be true at a certain point in your code
- topology where each computer is connected to exactly 2 other computers and they all form a circle
- added to source code as an explanation
- writes code as a part of a software project
- the first method of connecting to a network with a "hard-wired" cable
- verifies that the program meets the requirements and design and that it handles error conditions
- this testing ensures multiple objects work together as expected
- a device designed to pass information between multiple networks
- series of steps you can take to complete a task
- a place where 2 or more networks connect
Down
- networked computers within a single home, school, or small office
- utility will turn specially formatted source code comments into HTML documentation
- designs software programs at a high level
- topology where all computers are connected through a single central cable
- connects computers together in a network
- provides information resources, services and applications to users or other computers on the network
- topology where each computer is connected to a hub or switch
- linking 2 or more computing devices together for sharing data
- can be a physical computer or software program and provides specific services to clients
- this type of writer creates internal or external documentation to explain how to install, run or use a program
- this testing re-verifies previously passed test cases after each code change
- contains many different ports where computers can connect
- networked computers across cities or states
25 Clues: added to source code as an explanation • connects computers together in a network • a place where 2 or more networks connect • designs software programs at a high level • writes code as a part of a software project • networked computers across cities or states • series of steps you can take to complete a task • these conditions represent unusual but valid data values • ...
ITS2210 Module 6 Crossword 2019-04-02
Across
- Using interpersonal skills to extract information about a computer system and its security
- Perform system patches, probe for flaws, check logs, and review policies
- the most basic rule of computer security is to install these
- The minimum frequency for system probing and audits
- A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
- One who hacks into systems to accomplish some goal that they feel is ethically valid
- The most prestigious certification for networking professionals
- The process to search through trash looking for information that might be useful in hacking (particularly social engineering) or identity theft
- this should be done to large networks to break them up into more manageable networks
- A reference to how long a user has used a password
Down
- Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities
- preferred location for storing backups
- Hackers who hack only for legal/ethical purposes
- To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
- The process to scan a network looking for vulnerabilities
- One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
- A numerical designation for a connection point on a computer
- Someone who attempts to compromise a system to assess its vulnerability
- this should be done to all unneeded programs/software on a server
- the six Ps of security are: ports, patch, _____, probe, policies, physical
20 Clues: preferred location for storing backups • Hackers who hack only for legal/ethical purposes • A reference to how long a user has used a password • The minimum frequency for system probing and audits • The process to scan a network looking for vulnerabilities • the most basic rule of computer security is to install these • ...
Computers Computers Computers 2020-04-01
Across
- A set of interconnected web pages
- Used for storing files that are related top each other.
- A set of keys that allows you to type and enter information on the computer
- a unit of a computer that preserves data for retrieval
- a device for connecting two computers by a telephone line
- a copy of a program or file that is stored separately from the original.
- a picture on a screen that represents a specific file or program.
- Millions of computer networks that communicate together
- A program which transmits itself between computers via, often causing damage to systems and data.
- a device that lets printed material to converted into a form that can be stored in a computer.
- a program that accesses and displays files and other data available on the Internet and other networks.
- Software used to keep unauthorised users from accessing parts of a network or computer.
Down
- a collection of related data or program records stored as a unit with a single name.
- Eight binary digits
- Used for short-range wireless connection of mobile phones, computers, and other electronic devices.
- the physical used in computing
- an error in the code of a program.
- Random Access Memory.
- Describes a device, such as a printer, modem, or storage system, that works in conjunction with a computer.
- this stands for central processing unit, the most important part of a computer.
- a fundamental unit of information having just two possible values, as either of the binary digits 0 or 1.
- a piece of software that lets a computer communicate with a peripheral device.
- a device that allows text or graphics to appear on paper.
- A message sent or received from one computer to another
24 Clues: Eight binary digits • Random Access Memory. • the physical used in computing • A set of interconnected web pages • an error in the code of a program. • a unit of a computer that preserves data for retrieval • Used for storing files that are related top each other. • Millions of computer networks that communicate together • ...
Chapter 5 2013-11-27
Across
- A simple personal communication device for short messages.
- Incoming calls can be transferred to another number if the person is away from the office.
- The numbers can be dialed automatically by simply dialing one digit.
- This lists the names and phone numbers of private individuals,companies,schools,government organisation.
- These are also known as Manual Exchanges.
- These are commonly known as Automatic switchboard.
- Is made when the chargers are billed to the called telephone number.
- This type of call connects the caller to a number overseas. The caller dials the number directly without the aid of an operator.
Down
- This type of call is made when the caller wants to speak with a particular person.
- The exchange of brief written messages between mobile phones over cellular networks.
- Charges are billed after the event.
- Captures and directs a caller through a menu of options.
- A computer based voice storage system.
- An alternative means being offered by some companies. This reduced the telephone bills to a great extent.
- machines These allow customers to extend the credit on their mobile phones instantaneously.
- Most businesses have more than one telephone and probably more than one telephone number. The telephones are usually connected to a ________.
- These are all calls made inland, whether domestic or commercial. Equipment often billed a month in advance.
- A directory which gives the names and extension numbers of departments and officials.
- This is interactive communication among people at two or more locations using telecommunication.
- Is the general term for family of transmission technologies for delivery of voice communications over IP networks such as the internet.
20 Clues: Charges are billed after the event. • A computer based voice storage system. • These are also known as Manual Exchanges. • These are commonly known as Automatic switchboard. • Captures and directs a caller through a menu of options. • A simple personal communication device for short messages. • The numbers can be dialed automatically by simply dialing one digit. • ...
MAHIM SIKDER-Cybersecurity Crossword 2023-09-07
Across
- a client/server protocol that automatically provides an IP host with its IP address, subnet mask and default gateway.
- a process that verifies a user's identity and ensures that they have authorization, before providing them with access to information.
- a copy of data that is used if original data is unavailable.
- a scheme that takes money or other valuables from an unsuspecting victim.
- a process in which data is converted to code, in order to prevent unauthorized access.
- a malware that denies users access to their files. The attacker demands money from the user, in order for them to get their information back.
- process of copying data from the internet to your computer.
- a communication method that electronic devices use to deliver and receive messages electronically.
- software that hackers use to steal data,damage or destroy computers/computer systems.
Down
- protection of networks,data and devices from criminal use.
- a software used to detect and destroy viruses.
- A number used to track someones financial information.(EVERYONE GETS THIS NUMBER AT BIRTH).
- this word is short for organization(s) that provides access to the Internet.
- string of characters used to access authorization.
- a set of instructions, data or programs used by computers to operate and execute specific tasks.
- known as the address of a web page.
- a system that changes domain name into IP-addresses.
- advertisement that promote product or services to the user. Sometimes this can lead to malicious websites.
- a device that connects two or more packet-switched networks. Uses ip-Addresses.
- authentication method that requires the user to provide more than one verification information.
20 Clues: known as the address of a web page. • a software used to detect and destroy viruses. • string of characters used to access authorization. • a system that changes domain name into IP-addresses. • protection of networks,data and devices from criminal use. • process of copying data from the internet to your computer. • ...
Lesson 2 2025-02-18
Across
- A mostly obsolete device that may be found in older networks, that’s name is also used to refer to multiport repeaters
- The amount of data that can be transferred on a network over a specific time interval
- A list of MAC addresses and their corresponding port numbers kept by the Switch on a network
- The equivalent of a hub but for wireless networks (full words)
- The route a router uses when sending packets whose destination is not on the network
- Term for a repeater containing several ports, with some even having 24 or more.
- “Type” of frame that is meant to be processed by the entire network
- “_ _ _ _ _ to send” is a message the AP sends to the computer saying it is all clear to start data transmission
- The main “building block” of a Network
Down
- “Mode” where a NIC processes every frame possible
- “Type” of frame that is meant for a single computer
- “_ _ _ _ _ _ _ to send” is a message from a computer to an AP to get perimission to transmit data
- “_ _ _ _-Duplex Mode” is when a device can send and receieve data simultaneously
- Component or “card” that houses ethernet ports and interprets wi-fi signals (abbreviation)
- The “name” of a wireless network (abbreviation)
- Most hubs will have these on the device to indicate things such as power, link status, network activity, and colissions
- “_ _ _ _-Duplex Mode” is when a device cannot send and receieve data simultaneously
- An old method of networking where devices are connected to each other rather than a central hub
- Connecting two devices (such as switches) to expand a network
- “Amplifies” signals from NICs into the network, compared to a microphone in the text
20 Clues: The main “building block” of a Network • The “name” of a wireless network (abbreviation) • “Mode” where a NIC processes every frame possible • “Type” of frame that is meant for a single computer • Connecting two devices (such as switches) to expand a network • The equivalent of a hub but for wireless networks (full words) • ...
Technology concepts 2025-09-04
Across
- The physical components of a computer system, such as the CPU, memory, and storage devices.
- Software Programs designed for end-users, such as word processors, web browsers, and mobile apps.
- Devices Hardware that displays or outputs data from a computer, such as monitors, printers, or speakers.
- A computer that provides services, resources, or data to other devices on a network.
- Programs and applications that run on a computer and perform specific tasks for the user.
- Computing The delivery of services like storage, software, and processing power over the internet.
- (SSD) A type of storage device that uses flash memory for faster performance compared to traditional hard drives.
- A global network that connects millions of computers, enabling communication and information sharing.
- Technology that allows machines to simulate human intelligence, such as learning and decision-making.
- Devices Hardware used to enter data into a computer, such as a keyboard, mouse, or scanner.
- System The system software that manages computer hardware, software, and resources (e.g., Windows, macOS, Linux).
Down
- (AR) Technology that overlays digital information on the real world, often using smartphones or AR glasses.
- (VR) A simulated digital environment that immerses users through special gadgets like VR headsets.
- An organized collection of data stored electronically and accessed by specialized software.
- A device that forwards data between networks and provides internet connectivity.
- The practice of protecting systems, networks, and data from digital attacks or unauthorized access.
- (GPU) A specialized computer component that handles rendering images, videos, and graphics.
- An electronic device that processes information and performs tasks according to instructions.
- (Internet of Things) A network of everyday objects embedded with sensors and software to exchange data (e.g., smartwatches, smart home devices).
- A system of interconnected devices that communicate and share resources.
20 Clues: A system of interconnected devices that communicate and share resources. • A device that forwards data between networks and provides internet connectivity. • A computer that provides services, resources, or data to other devices on a network. • Programs and applications that run on a computer and perform specific tasks for the user. • ...
ж2 2025-11-24
Across
- – Process to reduce risk.
- – Risk of not being able to meet short-term obligations.
- – Risk of damage to a company’s public image.
- – Prefix for risks related to computers and networks.
- – Measure to manage or reduce risk.
Down
- – Adhering to laws and regulations.
- – Formal examination of financial records.
- – An event that disrupts normal operations.
- – Protection against financial risk.
- – Risk of borrower default.
- – Penalty for non-compliance.
- – Deceptive act for personal gain.
- – Financial damage or disadvantage.
13 Clues: – Process to reduce risk. • – Risk of borrower default. • – Penalty for non-compliance. • – Deceptive act for personal gain. • – Adhering to laws and regulations. • – Measure to manage or reduce risk. • – Financial damage or disadvantage. • – Protection against financial risk. • – Formal examination of financial records. • – An event that disrupts normal operations. • ...
Brain drain 2019-05-24
8 Clues: Make better • Very difficult • Be an example or a proof • Attracting or persuading • success gained with hard work • Organisations connected together • Be able to do well something that you learned • Information you get with education or experience
Weekly Vocabulary Review 2025-10-24
Across
- describe a place with lots of visitors
- a narrow street between buildings
- illegally dumping waste or rubbish
- grey, boring, uninspiring
- a perfect world
- describing heavy traffic
- verb used to describe when an object is reused with a different function
- British English for subway
- something unique and unusual
- a house not connected to utility networks
Down
- necessary facilities in a city
- idea of being new
- full of life, bright
- American English for city centre
- a place or area in need of repair
- a place with no people
- a beautiful place, often photographed
- describing a place with too many people
18 Clues: a perfect world • idea of being new • full of life, bright • a place with no people • describing heavy traffic • grey, boring, uninspiring • British English for subway • something unique and unusual • necessary facilities in a city • American English for city centre • a narrow street between buildings • a place or area in need of repair • illegally dumping waste or rubbish • ...
A crossword for my friend Lily 2021-08-14
Across
- Your name as a fish
- Monday night domination
- Not real math
- Home of the ___
- I have a ______ for you on my bedside table
- What belongs in a box?
- Elite excursion location
- Gold medal for L. Nguyen in _____ _______ at the Summer Olympics
- What is definitely not allowed at ACMI?
Down
- My favourite of your songs
- A lovely drink from Chatime
- My favourite clothing item of yours
- Best game to play in History
- The best name on Among Us
- Gold medal for L. Nguyen in ___ _______ at the Winter Olympics
- Your arch-enemy
- Something you should remember to keep
- President of the State Duma
18 Clues: Not real math • Home of the ___ • Your arch-enemy • Your name as a fish • What belongs in a box? • Monday night domination • Elite excursion location • The best name on Among Us • My favourite of your songs • A lovely drink from Chatime • President of the State Duma • Best game to play in History • My favourite clothing item of yours • Something you should remember to keep • ...
My crossword 2022-09-30
Across
- a communications protocol that is used for wireless data access through most mobile wireless networks.
- Networking hardware that connects devices on a computer network.
- Device that connects two or more packet-switched networks or subnetworks.
- a network security device that monitors and filters incoming and outgoing network traffic.
Down
- a computer system capable of delivering web content to end users over the internet via a web browser.
- a computer hardware component that allows a computer to connect to a network. NICs may be used for both wired and wireless connections.
- a hardware device that connects a computer or router to a broadband network.
7 Clues: Networking hardware that connects devices on a computer network. • Device that connects two or more packet-switched networks or subnetworks. • a hardware device that connects a computer or router to a broadband network. • a network security device that monitors and filters incoming and outgoing network traffic. • ...
Task 3 2025-06-05
Across
- Formal request to buy supplies.
- flash drive Small portable storage device.
- Reads/writes discs using light.
- List of items in stock.
- Fast temporary computer memory.
- Portable storage outside the computer.
- The main circuit board connecting parts.
Down
- The brain of the computer.
- Device connecting devices on a network.
- Device for permanent data storage.
- A screen for computer images.
- Device boosting weak network signals.
- Plan for income and spending.
- Device directing data between networks.
- Device connecting to the internet.
15 Clues: List of items in stock. • The brain of the computer. • A screen for computer images. • Plan for income and spending. • Formal request to buy supplies. • Reads/writes discs using light. • Fast temporary computer memory. • Device for permanent data storage. • Device connecting to the internet. • Device boosting weak network signals. • Portable storage outside the computer. • ...
Development crossword 2025-09-22
Across
- Useful guidance from the DFE
- Development is affected by these
- An ability present at birth
- The removal of networks in the brain
- How development is measured and tracked
- Lobe of the brain linked to reasoning
- Area of development concerned with thinking
- Personal, social, and --------- development
Down
- Gross and fine motor movements
- Process that allows for faster responses
- Brain development can be affected by -------
- Set out at the end of the EYFS
- Five of these feed information to the brain
- Growth across all areas of development
- Name for brain cells
15 Clues: Name for brain cells • An ability present at birth • Useful guidance from the DFE • Gross and fine motor movements • Set out at the end of the EYFS • Development is affected by these • The removal of networks in the brain • Lobe of the brain linked to reasoning • Growth across all areas of development • How development is measured and tracked • ...
Technical Puzzle 2025-10-30
Across
- Temporary storage for quick access
- Finding and fixing code errors
- Core part of an operating system
- Set of rules for data communication
- Security barrier between networks
- Exists in software, not physically
- Structured collection of related information
- Data that describes other data
- Converts plain data into unreadable form
Down
- Converts source code to machine code
- Amount of data a network can carry
- Step-by-step method to solve a problem
- Add-on that extends software features
- Point where user meets the system
- Delay before data transfer begins
15 Clues: Finding and fixing code errors • Data that describes other data • Core part of an operating system • Security barrier between networks • Point where user meets the system • Delay before data transfer begins • Temporary storage for quick access • Amount of data a network can carry • Exists in software, not physically • Set of rules for data communication • ...
network security 2022-09-27
7 Clues: networks resistance • removes malware from system • encrypted files, secret code • permission to access facilities • prevents unauthorized connections • protection of personal data, physical • collections characters, authentication
Unit 2 Root Words 2025-02-12
Across
- collective of judges
- an organism that does not change in shape during growth
- depend on each other
- triangle having two equal sides
- inner parts
- a unit of explosive power equivalent to 1,000 tons of TNT
- two or more forms of the same element
Down
- a crustacean
- decision of the court
- to connect or link two things together
- networks that exist between each other
- sugar occurring in milk
- an instrument for measuring the density of milk
13 Clues: inner parts • a crustacean • collective of judges • depend on each other • decision of the court • sugar occurring in milk • triangle having two equal sides • two or more forms of the same element • to connect or link two things together • networks that exist between each other • an instrument for measuring the density of milk • ...
Round 3 2025-09-19
Across
- – Opposition to magnetic flux
- – Converts DC to AC
- – Reciprocal of impedance
- – Equivalent circuit theorem
- – Material with conductivity between conductor & insulator
- – Law relating currents and voltages in networks
Down
- – Ability of material to support magnetic flux
- – Relationship between current and magnetism
- – Type of motor/generator with constant speed
- – Opposition to AC due to capacitance/inductance
- – Transfers electrical energy between circuits by induction
- – Motor principle (rotor current without contact)
- – Equivalent circuit theorem (parallel current source + resistance)
13 Clues: – Converts DC to AC • – Reciprocal of impedance • – Equivalent circuit theorem • – Opposition to magnetic flux • – Relationship between current and magnetism • – Type of motor/generator with constant speed • – Ability of material to support magnetic flux • – Opposition to AC due to capacitance/inductance • – Law relating currents and voltages in networks • ...
The 1920s 2026-03-12
Across
- The design of aircrafts
- A device for producing sound
- Americans An American racial group that experienced racism
- A person who belongs to another different country
- A cultural artistic movement
- The system that people produce and exchange goods
Down
- Coolidge President 1923-1929
- technology that broadcasts sound
- A private economic system
- A style of dressing
- The movement of people
- A district in Los Angeles California
- A collection of connected communication to exchange information
13 Clues: A style of dressing • The movement of people • The design of aircrafts • A private economic system • A device for producing sound • A cultural artistic movement • Coolidge President 1923-1929 • technology that broadcasts sound • A district in Los Angeles California • A person who belongs to another different country • The system that people produce and exchange goods • ...
Chapter 18 AI 2024-12-17
Across
- A parameter that influences the importance of an input in artificial neural networks.
- A learning approach where an agent improves its performance by interacting with an environment and receiving feedback.
- (3Words) A collection of neurons in an artificial neural network that performs specific computations on input data.
- A machine learning approach where the model identifies patterns in unlabeled data.
- (2Words) A subset of AI that allows systems to learn and improve from experience without explicit programming.
- The connection between two nodes in a graph.
- (2Words)A technique where the model interacts with an oracle (e.g., human expert) to obtain specific data points.
- A statistical method used in machine learning to predict continuous outputs based on input variables.
- When a model is too simple to capture the underlying patterns in data.
- A structure consisting of nodes and edges used to model pairwise relationships.
- (2Words) The dataset used to train machine learning models.
- (2Words) A function in a neural network that decides whether a neuron should activate or not.
- (3Words) A computational model inspired by the human brain, used for tasks like pattern recognition and classification.
- A scenario where a model learns the training data too well, including noise, reducing its performance on unseen data.
- (2Words) The minimum route between two nodes in a graph, calculated by algorithms like Dijkstra's.
- (2Words) A branch of machine learning that uses multi-layered neural networks to analyze data.
- A single pass through the entire training dataset during the learning process.
- (2Words)Data used to evaluate the performance of a machine learning model after training.
Down
- A type of machine learning where the model is trained on labeled data.
- A machine learning technique that assigns input data to predefined categories.
- A practical approach to problem-solving that uses trial and error or educated guesses.
- (2Words)An optimization algorithm used in machine learning to minimize errors by adjusting model parameters.
- A process in AI that determines the shortest route between two locations.
- A fundamental unit in a graph where edges meet.
- (2Words) A method in machine learning for training artificial neural networks by propagating errors backward.
- (2Words) A branch of computer science that focuses on creating systems capable of performing tasks that require human intelligence.
- The dataset used to tune hyperparameters and ensure model accuracy.
- (2Words)A hyperparameter that determines the step size during gradient descent optimization.
- (2Words) A shortest path algorithm that finds the minimum distance between nodes or vertices in a graph.
- An improved version of Dijkstra's algorithm that uses heuristics to find the shortest path more efficiently.
30 Clues: The connection between two nodes in a graph. • A fundamental unit in a graph where edges meet. • (2Words) The dataset used to train machine learning models. • The dataset used to tune hyperparameters and ensure model accuracy. • A type of machine learning where the model is trained on labeled data. • ...
APWH Unit 2: Networks of Exchange 2021-09-28
Across
- Founder of the Mongol Empire
- Chinese dynasty under Mongol rule
- Trade route connecting Middle East to West Africa
- Language based on Bantu and Arabic
- Nomadic conqueror of Central Asia
- Major trade good found in Mali
- Used to cross the Saharan Desert
- Major trade good found in East Africa
- Mongol government ruling over Central Asia
- Mongol group in control of Russia
- Groups of merchants traveling together
- Major trade good made in China
Down
- Moroccan merchant and explorer
- Communities living outside their homeland
- Known as the "Black Death"
- Mongol government in charge of Persia
- Major maritime trade route
- Seasonal winds used for navigation
- Italian merchant who traveled to China
- Trade route connecting East Asia to Europe
20 Clues: Known as the "Black Death" • Major maritime trade route • Founder of the Mongol Empire • Moroccan merchant and explorer • Major trade good found in Mali • Major trade good made in China • Used to cross the Saharan Desert • Chinese dynasty under Mongol rule • Nomadic conqueror of Central Asia • Mongol group in control of Russia • Language based on Bantu and Arabic • ...
Unit 2: Networks of Exchange Review 2022-11-15
Across
- Developed in China, made for simpler and more advanced economic development
- Mongol territories
- Western African kingdom that conquered Mali
- Western African kingdom, ruled at one point by Mansa Musa
- Military tools used to conquer
- winds merchants and sailors relied on to carry them across the indian ocean basin
- Center of spice trade in SE Asia
- United the Mongols and began the Mongol Empire
- lighter to carry on travels than coins or gold
- A Muslim explorer who's travels are well documented in Africa and Asia
- A sail that was triangular shaped and helped ships sail faster
- used to make camels more comfortable and able to carry more goods
- Western African center of trade and Islamic learning
- A community of people who have settled far from their home territories
- Another name for the plague
- located in a desert area, there was water and access to food
- Chinese ship
- a leader of of the Mongol tribes
- Navigational tech for steering ships
- System of payment that involved paper instead of cowery shells or salt
- Chinese Muslim General who travelled with treasure ships
- Trading City-states on the Eastern coast of Africa
- Richest man in the world..ever
- largest land empire ever
- A trade city on the coast of India
- The Islamic Mongol territories
- navigational tool used to map the sky and travel long distances
- institution that insured the money economy
- Capital city of the Byzantine Empire
Down
- Herds of animals eat too much
- Silk Road trading city in Western China
- A time of peace and prosperity in the Mongol Empire
- Traveler's rest stop or inn
- Capital city in China
- Removing too much of the trees in an area to maintain the environment
- A society that developed to over throw the Yuan dynasty in China
- Became a rich trading nation on the coast of India
- League of Northern European countries
- over farming without letting the land recover
- Silk Road trading city in modern day Uzbekistan
- document legally promising a traveler payment
- Syncretic form of writing. Persian influenced, Hindi language, Arabic Characters
- Navigational technology for direction using magnetic north
- began the Yuan Dynasty in China
- Weapon used to attack from a distance with projectile
- A special type of rice that grows quickly and is drought resistant
- She travelled from Europe along the Silk Road
- alphabet used by the Mongols
- Another name for the plague
- Italian explorer who spent time in China and other Asian territories
- Dynasty that replaced the Yuan in China
51 Clues: Chinese ship • Mongol territories • Capital city in China • largest land empire ever • Traveler's rest stop or inn • Another name for the plague • Another name for the plague • alphabet used by the Mongols • Herds of animals eat too much • Military tools used to conquer • Richest man in the world..ever • The Islamic Mongol territories • began the Yuan Dynasty in China • ...
Objective 2K: Environmental Effects of Trade Routes 2024-11-15
Across
- Illnesses like the bubonic plague that spread across Afro-Eurasia, disrupting societies and economies.
- Pathways that facilitated the exchange of goods, crops, and diseases, including the Silk Roads and Indian Ocean networks.
- The spread of agricultural products like bananas, new rice varieties, citrus fruits, and sugarcane along trade routes.
- A crop spread through trade routes that became a key commodity, leading to the development of plantations and driving demand in interregional trade.
Down
- A devastating epidemic that spread along trade routes, causing widespread population decline in Afro-Eurasia.
- High-yield rice strains in East Asia that increased agricultural productivity and supported population growth.
- Crops that spread to the Mediterranean, enriching diets and becoming valuable trade goods.
- A crop introduced to Africa that supported population growth and transformed agricultural systems.
- Diseases that spread through trade networks, significantly impacting populations and economies.
9 Clues: Crops that spread to the Mediterranean, enriching diets and becoming valuable trade goods. • Diseases that spread through trade networks, significantly impacting populations and economies. • A crop introduced to Africa that supported population growth and transformed agricultural systems. • ...
Grade 8 IT 2024-01-29
9 Clues: Another word for URL • Connection of networks • Safari is an example of a • ____text Transfer Protocols • Rules governing the internet • Www.google.com is an example of • Most commonly used search engine • Emails are divided into this amount • This has a protocol, domain name and a path
Networking concepts and Cyber Ethics Puzzle 2025-06-12
Across
- Address: Unique number assigned to each device
- Moral principles guiding behavior
- Online harassment or bullying
- Device that connects your computer to the internet
- Unauthorized access to data
- A local area network
- Protects the network from unauthorized access
- A wide area network
- Connects devices within a network
Down
- Used to protect digital accounts
- Right to control your personal data
- Directs traffic between networks
- A set of rules for communication
- A harmful program that replicates itself
- A computer that provides services to other computers
- Fake emails to steal information
- Securing data by converting it to code
- Malicious software
18 Clues: Malicious software • A wide area network • A local area network • Unauthorized access to data • Online harassment or bullying • Used to protect digital accounts • Directs traffic between networks • A set of rules for communication • Fake emails to steal information • Moral principles guiding behavior • Connects devices within a network • Right to control your personal data • ...
Digital Cross Words 2012-09-24
Across
- network A future of the internet; Where large enterprise intrests fail to maximise the social and economic potential of a shared, global set of richly connected networks
- media content A term that refers to attractive/engaging images, interactive elements, video, or animations
- pool An idea for the future of the internet; Where the public create the news/content
- These are transmitted between computers through a network
- A proposition or premise held as true
- Aka storyboard
- Connection between mainframe computers and user terminals
- Evaluation based on a person's beliefs, values, ethics, and morals
- and drawbridges A futuire of the internet;Where the government controls the computer networks; Least likely of the four scenarios
Down
- map An image that has been divided into sections
- page The first page that appears when you go to a website
- Web services that exist apart from the internet
- navigation Toolbar which contains buttons you use when you are on Live view in Dreamweaver
- Hyper text markup language
- A program used to make websites
- structure Refeers to the way the menu bars/ther internal links are used on web pages
- service providers ISPs;Provide space on their servers for customers to publish websites
- A program that is used to edit/enhace photos
- Uninfluenced by beliefs, values, ethics, and morals
- server A computer that is connected to the Internet with an IP address
- folder Stores all non-HTML files;Stores the websites images
- questioning Examining ideas, questions, and answers that form the basis of human belief
- inspector Lets you view/change the properties of a selected object on dreamweaver
- A practice, belief, or value that guide public action for mutual benefit
24 Clues: Aka storyboard • Hyper text markup language • A program used to make websites • A proposition or premise held as true • A program that is used to edit/enhace photos • Web services that exist apart from the internet • map An image that has been divided into sections • Uninfluenced by beliefs, values, ethics, and morals • ...
Chapter 5 2013-11-27
Across
- A simple personal communication device for short messages.
- Incoming calls can be transferred to another number if the person is away from the office.
- The numbers can be dialed automatically by simply dialing one digit.
- This lists the names and phone numbers of private individuals,companies,schools,government organisation.
- These are also known as Manual Exchanges.
- These are commonly known as Automatic switchboard.
- Is made when the chargers are billed to the called telephone number.
- This type of call connects the caller to a number overseas. The caller dials the number directly without the aid of an operator.
Down
- This type of call is made when the caller wants to speak with a particular person.
- The exchange of brief written messages between mobile phones over cellular networks.
- Charges are billed after the event.
- Captures and directs a caller through a menu of options.
- A computer based voice storage system.
- An alternative means being offered by some companies. This reduced the telephone bills to a great extent.
- machines These allow customers to extend the credit on their mobile phones instantaneously.
- Most businesses have more than one telephone and probably more than one telephone number. The telephones are usually connected to a ________.
- These are all calls made inland, whether domestic or commercial. Equipment often billed a month in advance.
- A directory which gives the names and extension numbers of departments and officials.
- This is interactive communication among people at two or more locations using telecommunication.
- Is the general term for family of transmission technologies for delivery of voice communications over IP networks such as the internet.
20 Clues: Charges are billed after the event. • A computer based voice storage system. • These are also known as Manual Exchanges. • These are commonly known as Automatic switchboard. • Captures and directs a caller through a menu of options. • A simple personal communication device for short messages. • The numbers can be dialed automatically by simply dialing one digit. • ...
Nerd's Network Knowledge 2014-03-19
Across
- Type of network topology you can use on your wedding day
- Describes the physical or logical layout of devices on a network
- Computer that serves up data and provides network services
- Abbreviation for a network that connects your personal devices
- The main route for carrying data in a network between sub-networks
- Type of network topology where squirrels live
- Abbreviation for a network that covers a room, building or campus
- Barrier that protects a trusted network from an untrusted network
- How far a wireless network can transmit or a place where buffalo roam
- Word that describes a WiFi network that operates on two frequencies
- Device that connects networks and forwards data, creating an internet
- Extends the physical layer of an Ethernet network within the same network segment
- High-speed network device that separates collision domains
- Common twisted pair network cable standard before six
- Abbreviation for the circuit board that connects a node to a network
- Abbreviation for a network that covers a large area such as a country
Down
- An active electronic device attached to a network
- Network protocol based on IEEE 802.3
- A place with open access to a wireless network
- Term that expresses the maximum amount of data a medium can handle
- Network topology you can ride downtown
- Type of network topology that sounds like a place to park boats
- Network technology that connects the nodes without wires
- Abbreviation for a network that covers an area such as a city
- Connector at the end of a twisted pair network cable
- Network topology you can see at night
- Wireless network based on IEEE 802.11
- Computer on a network that receives data or accesses network services
28 Clues: Network protocol based on IEEE 802.3 • Network topology you can see at night • Wireless network based on IEEE 802.11 • Network topology you can ride downtown • Type of network topology where squirrels live • A place with open access to a wireless network • An active electronic device attached to a network • Connector at the end of a twisted pair network cable • ...
Career Prep 2014-10-21
Across
- called "world wide web" or simply "the web," it is a portion of the internet that can be used though a web browser
- a type of malware that replicates itself and spreads to other computers
- a personal and sometimes unreasoned judgement or prejudice
- computer software that displays advertisements
- a video camera for computers typically used to provide real-time video footage
- the address of a website
- electronic mail sent between computer networks
- a vast global computer network which links smaller computer networks together
- a computer application that simulates a paper accounting worksheet
- the extension of service or coverage in a wireless telecommunications system
- refers to careers in science, technology, engineering, and mathematics
- an abbreviation for secure sockets layer, it is a protocol that provides security when communicating
Down
- a website that allows users to add and edit interlinking web pages
- a computer or series of computers that link other computers together and often store important information
- a group of computer programs that give instructions to a computer so that it functions
- computer software designed to harm a computer
- one present but not taking part in a situation or event
- receiving data, such as a music/video file, from a server or another computer system
- the physical parts of a computer
- carries out the functions in a computer
- an act of quoting providing the specific source of the material
- a highly portable computer shaped like slate or pad of paper, featuring a touch screen
- a type of malware that unknowingly collects information from a computer
- aka short message service; it is a text message
- a common audio format for playback and storage of music on digital audio players
25 Clues: the address of a website • the physical parts of a computer • carries out the functions in a computer • computer software designed to harm a computer • computer software that displays advertisements • electronic mail sent between computer networks • aka short message service; it is a text message • one present but not taking part in a situation or event • ...
Computers Computers Computers 2020-03-31
Across
- A set of interconnected web pages
- Used for storing files that are related top each other.
- A set of keys that allows you to type and enter information on the computer
- a unit of a computer that preserves data for retrieval
- a device for connecting two computers by a telephone line
- a copy of a program or file that is stored separately from the original.
- a picture on a screen that represents a specific file or program.
- Millions of computer networks that communicate together
- A program which transmits itself between computers via, often causing damage to systems and data.
- a device that lets printed material to converted into a form that can be stored in a computer.
- a program that accesses and displays files and other data available on the Internet and other networks.
- Software used to keep unauthorised users from accessing parts of a network or computer.
Down
- a collection of related data or program records stored as a unit with a single name.
- Eight binary digits
- Used for short-range wireless connection of mobile phones, computers, and other electronic devices.
- the physical used in computing
- an error in the code of a program.
- Random Access Memory.
- Describes a device, such as a printer, modem, or storage system, that works in conjunction with a computer.
- this stands for central processing unit, the most important part of a computer.
- a fundamental unit of information having just two possible values, as either of the binary digits 0 or 1.
- a piece of software that lets a computer communicate with a peripheral device.
- a device that allows text or graphics to appear on paper.
- A message sent or received from one computer to another
24 Clues: Eight binary digits • Random Access Memory. • the physical used in computing • A set of interconnected web pages • an error in the code of a program. • a unit of a computer that preserves data for retrieval • Used for storing files that are related top each other. • Millions of computer networks that communicate together • ...
Malicious Software 2023-07-23
Across
- software that contains advertisements
- software desguised as legitimate but contains another bit of software that is installed without your concent.
- when online users deliberately causes trouble with other online users
- computer that was compromised by malware
- online harassment, ridiculing or threatening messages
- attempting to gather someone's personal details through the use of convincing messages persuading them to reveal this information
- acquiring someone's personal information such as usernames and passwords
- an application that tracks the keystrokes of computer
- registering a domain name without the intend to actually use it.
- self-replicating malicious software found on networks
- divulging of personal or confidential information, looks like the email is from a legitimate company
- unwanted program installed with a downloaded application
- using software without purchasing it.
Down
- process whereby access to a computer system is gained by circumventing security restriction on the system.
- tricking users into visiting a fake site that looks like a legitimate site
- tactic used to get someon to reveal confidentail information unwittingly through a series of question or manipulation
- decoy computer that attract hackers to analyze how they hack networks
- posting offensive content online on social networking groups
- a network of compromised computers
- spreading of untrue information via emails and social media platforms
- disinformation published online
- when a number of infected computers bombared a website to make it crash
- manipulating videos and images through the use of AI to seem legitimate
- masking IP addressess to appear as legitimate websites
- impersonating someone else online
- type of phising related to people in important positions
- unsolicited bulk email messages
- software installed without users knowledge to monitor users actions on the computer.
28 Clues: disinformation published online • unsolicited bulk email messages • impersonating someone else online • a network of compromised computers • software that contains advertisements • using software without purchasing it. • computer that was compromised by malware • online harassment, ridiculing or threatening messages • an application that tracks the keystrokes of computer • ...
Network and Security 2024-07-24
Across
- Refers to several types of malicious computer programs that are created to harm computer systems and their users.
- A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
- Any step you take to ward off a threat is called a
- The capacity to provide increasing amounts of computing power, storage, and/or software.
- A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
- Involves luring individuals into entering personal information into a website controlled by the hacker.
- Used to share some of a company’s intranet resources with people outside the organization
- A type of scam that tricks users into following a thief’s orders, such as downloading a fake anti-malware.
- A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
- Speed of data that can be transmitted over a given amount of time.
Down
- Process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered.
- A type of malware that self-replicates and spreads through computers and networks.
- Weakness that has not been protected against threats.
- Fundamental building block for the storage, retrieval, and analysis of a company’s data.
- The most widely-used standard for local area networks.
- Layout of the cables and devices that connect the nodes of the network
- designed to report activity on your computer to another party.
- Anything that can cause harm.
- Internal version of the internet containing a company's private information
- Communication system physically connected using cables or wireless media.
20 Clues: Anything that can cause harm. • Any step you take to ward off a threat is called a • Weakness that has not been protected against threats. • The most widely-used standard for local area networks. • designed to report activity on your computer to another party. • Speed of data that can be transmitted over a given amount of time. • ...
Early Encounters 2023-05-23
Across
- a government system where one person (such as a queen or king) is the leader
- a lot of valuable material possessions or resources
- plan and direct the route or course of a ship, aircraft, or other form of transportation, especially by using instruments or maps
- a country or area under the full or partial political control of another country, typically a distant one, and occupied by settlers from that country.
- to travel over or through a place in order to learn more about it or to find something
- overcome and take control of
- human beings together (collective, the sum of their social networks and power networks)
- to change your behavior so that it is easier to live in a particular place or situation.
- to differ in sentiment or opinion, especially from the majority
- originating or occurring naturally in a particular place
- a set of lands or regions that are ruled by an emperor
- characteristics that society instinctively attributes to groups of people to classify them according to age, weight, occupation, skin color, gender, etc
Down
- a way to create immunity to (protection from) some diseases
- one born or reared in a particular place
- to make someone) a slave; cause someone to lose their freedom of choice or action
- of or relating to a government or the conduct of government
- the act of dividing a period of time into shorter periods
- inner beliefs about what is right and what is wrong that make one choose the path of right behavior
- a situation in which people or organizations fight against something or refuse to accept or be changed by something
- relating to trade, industry, or money
- the action of people coming together to live in an area
21 Clues: overcome and take control of • relating to trade, industry, or money • one born or reared in a particular place • a lot of valuable material possessions or resources • a set of lands or regions that are ruled by an emperor • the action of people coming together to live in an area • originating or occurring naturally in a particular place • ...
Web Safety Tools 2023-08-22
Across
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
- wireless networking technology that uses radio waves to provide wireless high-speed Internet access
- irrelevant or inappropriate messages sent on the internet to a large number of recipients
- computer programing system
- use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions
- random-access memory
- somebody who gets into your computer and gets your personal information
- good hacker
- network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- a person who looks for other people in order to use, control, or harm them in some way
- interconnected computing devices that can exchange data and share resources with each other
- when somebody gets all your personal information and starts acting like you
- program that can copy itself and infect a computer without permission or knowledge of the user
- facts and statistics collected together for reference or analysis
Down
- the practice of taking someone else's work or ideas and passing them off as one's own.
- microcomputer and software
- bad hacker
- being mean to somebody on the internet
- protects your computer
- secret codes for personal information log in
- inappropriate communication between people
- the programs and other operating information used by a computer.
- a gateway that passes data between one or more local area networks (LANs)
- keeps people from using there stuff or they will get in trouble
- computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
25 Clues: bad hacker • good hacker • random-access memory • protects your computer • microcomputer and software • computer programing system • being mean to somebody on the internet • inappropriate communication between people • secret codes for personal information log in • keeps people from using there stuff or they will get in trouble • ...
Workplace Technology Vocabulary 2024-11-07
Across
- input device which transfers information and images from physical documents to computer files
- output device which produces physical versions of computer documents and images using paper and ink
- public information system on the internet which connects billions of documents known as web pages
- computer software which provides platforms and instructions for specific tasks
- global network of remote servers which operate through the internet
- instructions which guide how computer hardware operates, what tasks are performed and how those tasks are performed
- device for sending and receiving printed documents over telephone lines
- connections among computers to facilitate communication and sharing of resources
- computer software which provides instructions for basic operation of computer hardware
Down
- global system of computer networks
- machine which makes exact duplicates of documents
- equipment and systems developed by applying scientific knowledge for practical purposes
- physical elements of a computer and all separate physical elements which support computer functionality
- application software which operate and can be accessed through the World Wide Web
- computer software which has restrictions on its use and source code is kept secret
- wireless networking technology using radio waves to transport internet signals
- computer software which can be used without paying a license fee and can be modified to add capabilities not realized by its originators
- multiline, interconnected telephone system which allows for specialized features and may involve internet connection
- programmable machine for storing, processing and retrieving data; includes desktops, laptops, tablets and smartphones
- private networks typically used by organizations for the sharing of company news, policies, documents and other information
20 Clues: global system of computer networks • machine which makes exact duplicates of documents • global network of remote servers which operate through the internet • device for sending and receiving printed documents over telephone lines • wireless networking technology using radio waves to transport internet signals • ...
Chapter 4 Quiz 2025-03-20
Across
- short cable for connecting a computer to an RJ-45 wall jack or connecting a patch-panel port to a switch or hub
- Standard patch cables are called ...
- specifies how cabling should be organized, regardless of the media type or network architecture
- wireless networks use infrared light beams to send signals between pairs of devices
- hold network equipment such as routers and switches, plus patch panels and rack-mounted servers
- mitigates the effect of crosstalk and noise on the cable
- A TC that houses the cabling and devices for work area computers
- runs from the work area’s wall jack to the telecommunication closet
- houses servers, routers, switches, and other major network equipment and serves as a connection point for backbone cabling
- used to terminate long runs of cable from where the computers are to the wiring closet
Down
- the location of the cabling and equipment that connects a corporate network to a third-party telecommunications provider
- point where corporate LAN equipment ends and a third-party provider’s equipment and cabling begins
- use 568A standard on one side of the cable and 568B standard on the other side
- maximum length of cable between two network devices
- interference one wire generates on another wire when both wires are in a bundle
- Motors, transformers, fluorescent lights and other sources of intense electrical activity can emit both RFI and ...
- An equipment room that’s the connection point between IDFs
- [blank] can also affect wireless networks if the frequencies are in the same range
- A factor determining bandwidth is how bit signals are represented on the medium
- where workstations and other user devices are located
20 Clues: Standard patch cables are called ... • maximum length of cable between two network devices • where workstations and other user devices are located • mitigates the effect of crosstalk and noise on the cable • An equipment room that’s the connection point between IDFs • A TC that houses the cabling and devices for work area computers • ...
Unit 2 Vocab 2022-11-30
Across
- A psychological phenomenon that says "Others are doing it, so I should be too"
- The specific group of people companies want their marketing message to reach
- The process used to optimize a website's technical configuration, content relevance, and link popularity
- The extent to which customers are familiar with the distinctive qualities or image of a particular brand of goods or services
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, typically via the internet
- Someone who supports one's brand on social media
- The use of social media networks to manage and grow an organization's message and online presence
- Filtering through all the interesting content across the web and sharing the best content on one's social channels
- A marketing strategy that leverages a businesses' employees' networks to increase bran awareness and their branded content's organic reach
- An internet advertising model used to drive traffic to websites
- A person who has subscribed to receive updates from a specific user on social media
Down
- Any marketing methods conducted through electronic devices
- A user on social media who has established credibility in a specific industry
- A business methodology that attracts customers by creating valuable content and experiences tailored to them
- This represents how many people looked at one's post
- Luring someone into a relationship through means of a fictional online persona
- Arby's, we have the meats!
- The use of electronic communication to bully a person
- The number of times one's content is displayed, no matter if it was clicked or not
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles
20 Clues: Arby's, we have the meats! • Someone who supports one's brand on social media • This represents how many people looked at one's post • The use of electronic communication to bully a person • Any marketing methods conducted through electronic devices • An internet advertising model used to drive traffic to websites • ...
PIXEL PERFECT PUZZLES 2025-05-18
Across
- It refers to criminal activities that involve the use of computers , networks , and the internet connections with the intent to harm someone or their digital devices
- It refers to unwanted bulk that comes from unauthorized sources
- This refers to an act of stealing and misusing someone's personal information
- It is a malicious technique of tricking a web user into clicking on something different from what the user perceives or clicking on
- It means protecting the data and resources from any unauthorized access
- It refers of being aware of the ethical practices and behaving responsibly while using internet
- A synonym of digital footprint
- It can be defined as the legal rules and restrictions imposed on online users
Down
- A practice of sending bulk mails by a spam attacker till the mail server gets full
- This is an equivalent term of hacking
- It is a device that connects different types of networks with each other
- It is used to connect a computer to the available internet connection over the existing telephones lines.
- It refers to a computer network restricted to an organization
- It is program or a set of programs that disrupt the normal functioning of a computer
- The process of transforming data into unreadable code
- It is an security system that prevents unauthorized people from accessing your system and network
- A computer network created for an individual person
- It is a wireless technology used to interconnect mobiles , computer using short range wireless connection
- The term is a combination of "Voice" and "Phishing"
- It refers to an illegal intrusion into a computer system or network
20 Clues: A synonym of digital footprint • This is an equivalent term of hacking • A computer network created for an individual person • The term is a combination of "Voice" and "Phishing" • The process of transforming data into unreadable code • It refers to a computer network restricted to an organization • It refers to unwanted bulk that comes from unauthorized sources • ...
Networking Concepts and Cyber Ethics 2025-06-05
Across
- It is one of the most common network setups that consists of a group of star figured workstations .
- It is a malicious technique of tricking a web user into clicking on something what user perceives.
- It is a device that connects two different types of networks with each other.
- It is a topology uses a single communication line to which all the nodes are directly connected.
- Each computer in a network.
- It refers to being aware of the ethical practices and behaving responsibly while using the internet.
- It refers to a computer network restricted to an organisation .
- It is an act of sending email to an user misleading him to believe that is a trusted person .
- It refers to an illegal intrusion into a computer system.
- It is a set of programs that disrupts the normal functioning of a computer.
- It is a topology that is connected to a central computer using a point to point connection.
- It is a type of security system .
Down
- It is the process of transforming data into unreadable code.
- It is a wireless technology used to interconnect mobile phones,etc.
- It refers to criminal activity that involve the use of computer,networks.
- It enables you to connect your computer to the available internet connection over the existing telephone lines.
- It is a larger network than LAN .
- It stands for Wireless Fidelity.
- It refers to the act of using the language and thoughts of another person as ones original work.
- It is a network device that is used to connect all the computers.
- Purchasing a single licensed copy of a software and load on to several computers.
21 Clues: Each computer in a network. • It stands for Wireless Fidelity. • It is a larger network than LAN . • It is a type of security system . • It refers to an illegal intrusion into a computer system. • It is the process of transforming data into unreadable code. • It refers to a computer network restricted to an organisation . • ...
IoT 2025-10-01
Across
- Low-power wireless communication protocol for IoT networks
- Graphical representation of IoT data for analysis
- Layer where data is processed close to IoT devices before reaching the cloud
- Behavior-centric extension of IoT focusing on human actions
- Example: Smart home, smart city, agriculture, healthcare
- Low-cost microcontroller with built-in Wi-Fi and Bluetooth used in IoT
- Constrained Application Protocol for IoT communication
- Centralized repository to store large volumes of raw IoT data
- Short-range wireless communication protocol used in IoT
- Microcontroller board commonly used for IoT projects
- Wide-area network protocol designed for low-power IoT devices
- Long-range wireless communication protocol for IoT devices
- A device that detects and responds to physical conditions in IoT systems
- Advanced Message Queuing Protocol for IoT data transfer
- IoT application that monitors environmental quality
- Device that converts electrical signals into physical action in IoT
- Protocol enabling full-duplex communication between client and server
Down
- IoT applied in industries for automation and monitoring
- Popular hardware platform used for IoT prototyping
- Visualization interface for IoT data analytics
- Intermediate layer between edge and cloud for IoT data processing
- IoT application that monitors and reports weather conditions
- Object with sensing, processing, and communication capabilities
- Adaptation layer enabling IPv6 over low-power wireless networks
- Network of interconnected smart devices sharing data over the internet
- IoT application used in urban mobility management
- Process of extracting insights from IoT data
- Cisco-defined standardized reference architecture for IoT
- Technology that uses electromagnetic fields for automatic identification
- Short-range communication technology often used for contactless payments
- Lightweight publish-subscribe messaging protocol used in IoT
31 Clues: Process of extracting insights from IoT data • Visualization interface for IoT data analytics • Graphical representation of IoT data for analysis • IoT application used in urban mobility management • Popular hardware platform used for IoT prototyping • IoT application that monitors environmental quality • Microcontroller board commonly used for IoT projects • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
Internet of Things 2025-08-05
Across
- A protocol used for communication in the application layer of IoT systems, known for its extensibility and flexibility
- A method of wireless communication used for short-range, low-power exchanges between devices in IoT.
- A widely-used type of IoT device that can sense and respond to environmental changes like light, temperature, or pressure.
- he algorithm that helps optimize the energy efficiency of wireless sensor networks.
- Layer The layer that handles the exchange of information between devices over the internet in IoT.
- The technology that allows devices to be "smart" by collecting and exchanging data automatically.
- A method of addressing that supports large-scale IoT devices and networks.
Down
- A communication protocol that allows for the exchange of data in IoT systems, often used in home automation.
- Devices that detect physical stimuli and convert them into electrical signals for IoT systems.
- A key component of IoT that enables physical actions based on data received from sensors.
- A communication protocol used for lightweight messaging in IoT.
- A type of network specifically designed for small, low-power devices, typically deployed over large areas.
- A type of network that uses small, low-power devices to monitor physical conditions.
- The concept that allows IoT devices to interact autonomously, without direct human input.
- The protocol used for transferring data in IoT with a resource-constrained environment, typically used in machine-to-machine communications.
15 Clues: A communication protocol used for lightweight messaging in IoT. • A method of addressing that supports large-scale IoT devices and networks. • he algorithm that helps optimize the energy efficiency of wireless sensor networks. • A type of network that uses small, low-power devices to monitor physical conditions. • ...
computing comunications 2025-10-10
8 Clues: a cyber crime. • a network has it • a message is split into... • fastest transmission medium. • a large network of networks. • is a slow transmission medium • a phishing email may contain... • every computer has its own unique one.
MTA Vocabulary 2020-09-08
Across
- allows you to play back music and video files and view photos.
- a new Microsoft lightweight web browser with a layout engine built around web standards designed to replace Internet Explorer as the default web browser.
- masquerading to hide an entire address space behind a single IP address.
- a platform-independent, distributed, object oriented system for creating software components.
- text stored by user's browser
- utility provided by Microsoft or a third party that’s accessible through a common interface.
- Data kept in a primary location is synchronized with data in another location.
- Opens a command window useful for IT professionals.
- when you have two copies of a file stored in different locations that have both changed since the last sync.
- Enables you to import and export XML files containing InPrivate filters.
- allow you to keep track of websites that you visit frequently so that you can visit them quickly in the future.
Down
- Microsoft implementation of Web-Based Enterprise Management (WBEM) that allows accessing management information in an enterprise environment.
- industry standard to represent systems, applications, networks, devices, and other managed components.
- a cryptographic system that uses two keys—one key to encrypt the data and another key to decrypt the data.
- Allows you to capture, annotate and save screenshots.
- a server-client application that allows you to securely connect to a remote PowerShell host and run script interactively.
- a server that acts as an intermediary for clients seeking resources outside their networks.
- Allows you to sync any folder in your computer with a folder on an external drive connected to your computer or a network drive.
- Data is transferred in both directions.
- a snapshot of whatever is displayed on the computer screen.
20 Clues: text stored by user's browser • Data is transferred in both directions. • Opens a command window useful for IT professionals. • Allows you to capture, annotate and save screenshots. • a snapshot of whatever is displayed on the computer screen. • allows you to play back music and video files and view photos. • ...
Immigration and Urbanization 2023-11-29
Across
- A group that hold values and engage in activities that separate them from wider society.
- Movement of products, services, and information across national and continental boundaries.
- Migration of Whites out of central city neighborhoods and into suburban communities (2 words)
- Practice of outlining in red any sections of a city that were considered “risky” and rejecting loan applications in that area
- More than ___ million African Americans left the south between 1900-1970
- Social _____: Various types of connections that individuals form with other people, no matter where they’re located.
- _____ Capital: Tight connections that people form with each other through organizations, civic life, and strong social ties.
- Chains of densely populated areas that extend over long stretches of space.
- _____ Cities: Major urban areas that serve as nodes for the worldwide network of economic activity.
Down
- Sociologist Barry _____ points out that our networks in school, work, and online now define our communities as much as our residential neighborhoods
- Unique ways of life found in cities.
- Urban areas with at least 10 million people.
- Growth in the proportion of a nation’s population living in cities.
- Chicago New York, and ______ have the highest levels of segregation between Black and white people
- The Great ______: Movement of millions of African Americans, from 1900 to 1970, into cities outside the south.
- For the first time in human history, more than half of the world’s population lives in _____ areas
- The largest number of new immigrants come from India, Mexico, the Philippines, El Salvador, and ______
- Type of violence experienced by immigrants as a result of immigration policies.
- Sociologist Claude ______ argues that cities generate new forms of community, such as subcultures
- Ethnic ______: Section of a city where the local culture and labor market are dominated by a single ethnic group.
20 Clues: Unique ways of life found in cities. • Urban areas with at least 10 million people. • Growth in the proportion of a nation’s population living in cities. • More than ___ million African Americans left the south between 1900-1970 • Chains of densely populated areas that extend over long stretches of space. • ...
TECH TERMS 2024-07-26
Across
- A node that serves as an access point to another network
- The software that supports a computer's basic functions
- A numbering system that uses only two digits, 0 and 1
- The process of converting information or data into a code to prevent unauthorized access
- A group of interconnected devices that can share data and resources
- A markup language that defines a set of rules for encoding documents in a format readable by humans and machines
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- A hardware or software component that stores data so future requests can be served faster
- An organized collection of structured information, typically stored electronically
- A device or program that enables a user to communicate with a computer.
- A device that forwards data packets between computer networks.
Down
- A form of communication that does not require cables or physical connections
- To bring something more current by adding new information or features
- A request for information from a database
- The core component of an operating system, managing system resources
- A step-by-step procedure for solving a problem or accomplishing a task.
- A term used in programming to pause and resume a function.
- A set of rules governing the exchange or transmission of data between devices
- The physical components of a computer system
- A global network connecting millions of private, public, academic, business, and government networks
- A network security system that monitors and controls incoming and outgoing network traffic
- The programs and other operating information used by a computer.
- A programming language commonly used in web development
23 Clues: A request for information from a database • The physical components of a computer system • A numbering system that uses only two digits, 0 and 1 • The software that supports a computer's basic functions • A programming language commonly used in web development • A node that serves as an access point to another network • ...
OSI Model 2024-12-01
Across
- a small computer network that connects electronic devices within a person's workspace
- smallest unit of data transmitted over a network
- created the WIFI standards for data transmission
- a computer network that connects users and computer resources within a geographic area, typically a city or metropolitan area
- First layer of OSI model and transmits data in the fomr of 0s and 1s
- Contains information that allows a network to transmit a packet.
- a conceptual framework that describes how networking systems communicate and send data:
- a protocol that recalls the data in a computer system to prevent errors
- a group of interconnected devices
- also known as tailor, provides proof if data has been tampered over transmission
- a universal language that uses only the numbers 0 and 1 to represent information in computers.
Down
- Contains the actual data being transmitted over the network
- Second layer that handles transmission errors and transmission protocols
- a computer network that connects multiple local area networks (LANs) within a limited geographical area
- a high-speed networking standard that transmits data in fixed-size cells, typically 53 bytes.
- Physical chord used in both the first layer and second layer of the OSI model
- connects devices within a network (often a local area network, or LAN*) and forwards data packets to and from those devices.
- Uses virtual circuits to enable a single router to link many faraway locations.
- Transmits data packets over radio frequency
- device that allows your computers, smartphones, tablets, and other devices to connect to the internet
- device that connects two or more packet-switched networks or subnetworks
21 Clues: a group of interconnected devices • Transmits data packets over radio frequency • smallest unit of data transmitted over a network • created the WIFI standards for data transmission • Contains the actual data being transmitted over the network • Contains information that allows a network to transmit a packet. • ...
Importance of translation 2020-10-09
Across
- /It is very important that the translator later review the final document, to avoid last minute mistakes.
- /it is necessary that professionals have the necessary time to carry out their work
- /Translation is the act of changing the language in which the document was written
- /The first thing that comes to mind is a translator or interpreter at a conference with a speaker from another language.
- /Many people confuse the word translate with interpret.
- /now there are many automatic translators online.
- /The professional translator who does a good job is the one who is able to adapt a message that is expressed in the source language to a target language that is full of a totally different culture.
- /the translation also helps you communicate
- /The work carried out by translators requires a lot of preparation and discipline
- / When a document is translated, it does not mean that it will be literally translated word for word.
Down
- /speaking another language can help you understand other people
- /Part of a translator's job is to translate documents
- /bilingualism is fully embedded in our daily life
- /Translation is done in a text or documents. Interpretation is oral translation.
- /Anyone who knows two languages can translate a text more or less from one language to another
- /Translators are very necessary for the globalized culture in which we live.
- /We also find it on social networks like Facebook, which are world phenomena.
- /Cada idioma es diferente y por eso la traducción literal no funciona en este caso.
- /it is necessary to have people who can understand two languages and convey ideas clearly.
- /in a speech we can use to translate from one language to another
- /Interés por la investigación
21 Clues: /Interés por la investigación • /the translation also helps you communicate • /bilingualism is fully embedded in our daily life • /now there are many automatic translators online. • /Part of a translator's job is to translate documents • /Many people confuse the word translate with interpret. • /speaking another language can help you understand other people • ...
Networking Terms 2013-02-13
Across
- networks that are far apart such as cities or towns
- ____ Topology is like a bus network, rings have the nodes daisy-chained.
- Pair Cable A type of cable that consists of two independently insulated wires twisted around one another.
- common connection point for devices in a network
- Access Control This is the physical address of any device
- Network defined as "having no wires".
- a cable rack that interconnects and manages the telecommunications wiring between an MDF and workstation devices
- in which each computer or process on the network is either a client or a server.
- An agreed-upon format for transmitting data between two devices.
- allows diffrent nodes of a network to communicate directly with one another smoothly
- Optic A technology that uses glass (or plastic) threads (fibers) to transmit data.
Down
- ____Topology each node is connected to a central device called a hub.
- are often called datagrams
- anything that is connected to the network
- Cable A type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire.
- a type of networking which each workstation has equivalent capabilities and responsibilities
- Topology where each node is connected one after the other
- cable rack that interconnects and manages the telecommunications wiring between itself and any number ofIDFs
- Token acts like a ticket, enabling its owner to send a message across the network.
- Network a group of computers connected together in a way that allows information to be exchanged between the computers
- Address an identifier for a computer or a device on a TCP/IP network.
- ____ Topology consists of groups of star-configured workstations connected to a linear bus backbone cable
- networks that are in the same general are
23 Clues: are often called datagrams • Network defined as "having no wires". • anything that is connected to the network • networks that are in the same general are • common connection point for devices in a network • networks that are far apart such as cities or towns • Topology where each node is connected one after the other • ...
crossword-rthomp49 2015-09-28
Across
- one of the most common search engines; uses popularity factor in ranking websites.
- company that is the dominant media and marketing company in the food, home travel, and entertainment brands based out of Knoxville.
- networks that ARE NOT geographically close.
- part of search engines that is constantly browsing the web.
- networks that ARE geographically close.
- The codes or tags that browsers use to create web pages.
- type of communication in which the sending and receiving occur with only one active user at a time.
- strategy to make data easier and quicker to get ahold of.
- A group pf information on a computer that can be software programs or data.
- default text editor on mac
- computers programmed to send files to browsers running on other computers connected to the internet.
Down
- a permanently fixed original work which can be seen or heard.
- these are sent and received between computers and servers when information is requested across the web.
- type of communication in which both sender and receiver are active at the same time.
- work here is free for anyone to use.
- critical component of Large websites that handle high traffic; refers to ability to keep the site up
- style of language which remains neutral rather than being subjective, boastful, or exaggerated language.
- Pictures/Movies/Graphics
- style of text displayed on web pages in which the word count is approximately half that of the control condition.
- limitation or exception to the exclusive right granted to an author by copyright law.
- type of processor that gets keywords from the user and looks them up in the index.
21 Clues: Pictures/Movies/Graphics • default text editor on mac • work here is free for anyone to use. • networks that ARE geographically close. • networks that ARE NOT geographically close. • The codes or tags that browsers use to create web pages. • strategy to make data easier and quicker to get ahold of. • part of search engines that is constantly browsing the web. • ...
Key Terms 2014-10-21
Across
- Computer software designed to harm a computer
- A type of malware that replicates itself and spreads to other computers
- Getting hacked means that your computer network has been broken into without your permission
- A video camera for computers typically used to provide real-time video footage
- A types of malware that unknowingly collects information from a computer
- A device or computer program used for reading electronic books
- An act of quoting providing the specific source of the material
- One present but not taking part in a situation or event
- A vast global computer network which links smaller computer networks together
- A group of computer programs that give instructions to a computer so that in functions
- A standard display design used in blogs to provide a structure for information to be viewed
- Electronic mail sent between computer networks
Down
- The address of a website
- A personal and sometimes unreasoned judgment or prejudice
- The physical parts of a computer
- An object or pattern that is quickly replicated and shared
- Offering reason to be believed
- Another term for the CPU of a computer- the central processing unit that runs computer programs
- Computer software that displays advertisements
- A computer system that stores enormous amount of data
- Something you can add to a software application to enhance its abilities
- A website that allows uses to add and edit interlinking web pages
- The extension of service or coverage in a wireless and telecommunications system
- A common audio format for payback and storage of music on digital audio players
- REfers to cancer in science, technology, engineering, and mathematics
25 Clues: The address of a website • Offering reason to be believed • The physical parts of a computer • Computer software designed to harm a computer • Computer software that displays advertisements • Electronic mail sent between computer networks • A computer system that stores enormous amount of data • One present but not taking part in a situation or event • ...
Web Disign 2024-04-15
Across
- the activity or business of promoting and selling products or services, including market research and advertising.
- the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- the internet as accessed via smartphones or other mobile devices, especially when regarded as a market sector.
- the quality of reacting quickly and positively.
- a subdivision of a domain.
- a hypertext document on the World Wide Web.
- a computer suitable for use at an ordinary desk.
- an online design and visual communication platform
- an all-encompassing online wireframing and product design tool designed to bring software ideas to life visually
- a rough or unfinished drawing or painting, often made to assist in making a more finished picture.
- a powerful, no code website builder
- for people to create, share, and test designs for websites, mobile apps, and other digital
- a wireless device that's smaller than a laptop and bigger than a smartphone
- a list of commands or options, especially one displayed on screen.
Down
- an area of territory owned or controlled by a ruler or government.
- be filled with wonder or astonishment.
- further the progress of (something, especially a cause, venture, or aim); support or actively encourage.
- a set of related web pages located under a single domain name, typically produced by a single person or organization.
- a set of related web pages located under a single domain name, typically produced by a single person or organization.
- the quality of being able to adjust to new conditions.
- GNU Image Manipulation Program
- a means of approaching or entering a place.
- plan and direct the route or course of a ship, aircraft, or other form of transportation, especially by using instruments or maps.
- a user interface design tool for creating wireframes
- a person who uses or operates something, especially a computer or other machine.
25 Clues: a subdivision of a domain. • GNU Image Manipulation Program • a powerful, no code website builder • be filled with wonder or astonishment. • a hypertext document on the World Wide Web. • a means of approaching or entering a place. • the quality of reacting quickly and positively. • a computer suitable for use at an ordinary desk. • ...
Data Protection 2022-09-19
Across
- To gather compromised information and/or defense secrets
- Individuals who want to attack computers yet lack the knowledge
- Following a victim with authorized credentials through a door or other secure building access point
- Data at rest
- Visually capturing logins or passwords or other sensitive information over someone's ______ while using a computer.
- Designed to hold a computer system or the data it contains captive until a payment
- A security breach can have a negative long-term impact on an organization’s _________
- More targeted version of the phishing
- Employees, contract staff or trusted partners
- Telling a computer to perform some task using CLI
- Cyberwarfare can destabilize a nation
Down
- an attacker establishes trust with their victim by impersonating persons who have right-to-know authority
- Preventing unwanted changes or alteration
- Network, Devices, Power Grid, Roads
- Data traveling between information systems
- A broad range of malicious activities accomplished through psychological manipulation of people into performing actions or divulging confidential information.
- Core Principles of Cybersecurity
- Get victims to click on links to malicious websites, open attachments that contain malware or reveal sensitive information.
- Using technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services
- Amateurs or skilled attackers outside of the organization
- Data developed around the user without their express input, usually generated based on search histories, content consumption, purchases, and social media activity
- Breaks into networks or computer systems to identify and improve any weaknesses
- Technique used on unshredded documents
- Make political statements in order to raise awareness about issues
- Using a false promise to gain a victim’s interest to lure them into a trap that steals their personal information or infects their systems
25 Clues: Data at rest • Core Principles of Cybersecurity • Network, Devices, Power Grid, Roads • More targeted version of the phishing • Cyberwarfare can destabilize a nation • Technique used on unshredded documents • Preventing unwanted changes or alteration • Data traveling between information systems • Employees, contract staff or trusted partners • ...
C 2023-09-25
Across
- A process for reducing the number of bits needed to represent something without losing info
- Used to send short messages called datagrams
- The capacity for a system to grow in size to meet demand
- A programmer hides all but the relevant data
- A unit of data that is * bits long
- A numerical label assigned to each device connected to a computer network.
- A group of computing devices and programs working together for a common purpose
- A minute area of illumination
- A small chunk of any kind of data
- A machine that can run a program
- A suite of communiction protocols used to interconnect network devices on the internet
- The background of a project
- A numbering system, 0 and 1
- A device that fowards data packets along networks.
Down
- Puzzle piece shapes that are used to create code in snap!
- A group of interconnected computer devices capable of sending or receiving data
- Differing access to the internet based on characteristics.
- The series of connections between computing devices on a network
- The property that enables a system to continue operating properly in the event of failure
- A character encoding standard for electonic communication
- A worldwide system of networks
- The duplication of critical components or functions of a system.
- Different types of blocks linked together in snap!
- An object in snap! Performs functions
- A process for reducing number of bits,info is lost
- Colors used on a computer display
- The smallest unit of data in a computer
- the group of methods and communications protocols confined to the lonk that a host is physically connected to.
- Data that describes data
29 Clues: Data that describes data • The background of a project • A numbering system, 0 and 1 • A minute area of illumination • A worldwide system of networks • A machine that can run a program • Colors used on a computer display • A small chunk of any kind of data • A unit of data that is * bits long • An object in snap! Performs functions • The smallest unit of data in a computer • ...
Chapter 2 IT246 Spring 2025-02-26
Across
- A frame with a destination MAC address composed of all binary 1s or in hexidecimal.
- it is in a computers IP address settings and must be set to the address of a router.
- what is used to interconnect multiple computers so that they can communicate with one another.
- tells a router where to send a packet with a destination network that can’t be found in its routing table.
- cards that create and mediate the connection
- Messages letting the requesti
- a mode turns off the gatekeeper functions and enables the NIC to process all frames it sees.
- What is the amount of data that can be transferred on a network during a specific interval?
- reads the destination IP address and compares it with the list of networks in its routing table
Down
- can handle several computers conversations at one time, thereby allowing each device the full network bandwidth.
- A designated MAC address intended for a single computer.
- The name assigned to a wireless network is called a?
- Has indicator lights for power, link status, network activity, and collisions.
- Sends a request to send message to let the AP know it intends to transmit data
- They are central devices in wireless networks and perform similar functions to hubs
- When a data can send and recieve data simultaneously.
- uses switching tables to determine the Mac address
- takes incoming bit signals and repeat them at their original strength out all connected ports
- the transmission of data from a lower-level device to a higher-level device
- Dozens of computers transferring large files and accessing network applications and databases.
20 Clues: Messages letting the requesti • cards that create and mediate the connection • uses switching tables to determine the Mac address • The name assigned to a wireless network is called a? • When a data can send and recieve data simultaneously. • A designated MAC address intended for a single computer. • ...
Abdoulaye's word puzzle 2025-02-27
Across
- talk in a friendly and informal way.
- (short for weblog) Blog is an abbreviation of “weblog”
- Flame trolling is the posting of a provocative or offensive message, known as flamebait
- shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
- the intentional video-recorded assault of individuals which are then posted on the Internet for entertainment purposes.
- an animal that naturally preys on others.
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- Typing in all CAPPPSSS!!!!!!.
- Theft identity theft can sometimes be a component of impersonation
- using the Internet, email, or other electronic communications to stalk someone.
Down
- the unique trail of data that a person or business creates while using the internet
- sending,posting, or sharing negative, harmful, false, or mean content about someone else.
- the correct or acceptable way of communicating on the internet.
- unauthorized reproduction or distribution of someone's intellectual property without their consent.
- small text files that websites store on your computer to remember information about you and your browsing activity
- the practice of protecting systems, networks, and programs from digital attacks.
- the practice of preparing or training someone for a particular purpose or activity.
- to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
- Settings controls available on many websites and apps to limit who can access your profile and what information visitors can see.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
20 Clues: Typing in all CAPPPSSS!!!!!!. • talk in a friendly and informal way. • an animal that naturally preys on others. • (short for weblog) Blog is an abbreviation of “weblog” • the correct or acceptable way of communicating on the internet. • Theft identity theft can sometimes be a component of impersonation • ...
Impact of States on Asian Trade Networks 2025-10-02
Across
- – Deadly plague that spread along Mongol trade routes, devastating populations across Eurasia.
- – Mystical branch of Islam that spread into South and Southeast Asia through merchants and missionaries.
- – Religion that spread via South Asian trade and legitimized rulers in Southeast Asian states.
- – Javanese maritime empire that dominated sea routes and profited from the spice trade.
- – Mongol dynasty in China that fostered Silk Road trade and integrated diverse cultures.
- – Monumental Khmer temple that reflected Hindu and Buddhist influences tied to regional exchange.
- – Trade routes revitalized under Mongol protection, linking China, the Middle East, and Europe.
- – Muslim-ruled state in India that connected South Asia more fully into Indian Ocean trade.
- – Mongol policy of welcoming diverse faiths, which encouraged merchants, missionaries, and scholars.
- – Exchange of cloves, nutmeg, cinnamon, and other coveted goods central to Southeast Asian commerce.
- – Narrow waterway that became a key crossroads for Asian maritime commerce.
- – Mongol leader who united steppe tribes and expanded Eurasian trade networks.
Down
- – Mongol ruler of China who founded the Yuan Dynasty and promoted Silk Road commerce.
- – Maritime empire based in Indonesia that controlled choke points and taxed Indian Ocean trade.
- – Roadside inns that flourished under Mongol stability, supporting merchants along the Silk Roads.
- – Venetian traveler whose writings about Yuan China increased European interest in Asian goods.
- – Mainland Southeast Asian power that relied on irrigation and religion to legitimize rule and participate in trade.
- – Religion that spread through South and Southeast Asia via maritime networks, shaping art and kingship.
- – Period of Mongol peace that secured and expanded trade across Eurasia.
- – Mongol relay station network that facilitated communication and trade across their empire.
20 Clues: – Period of Mongol peace that secured and expanded trade across Eurasia. • – Narrow waterway that became a key crossroads for Asian maritime commerce. • – Mongol leader who united steppe tribes and expanded Eurasian trade networks. • – Mongol ruler of China who founded the Yuan Dynasty and promoted Silk Road commerce. • ...
IST Final Crosswords Part 2 2025-10-01
Across
- Lightweight virtualization that packages applications with their dependencies
- Compact expansion slot often used for SSDs and WiFi modules
- Firmware that initializes hardware before the OS loads
- Delay experienced during data transmission
- Internet addressing system using 128 bits
- Modern firmware interface replacing BIOS with enhanced features
- Malware disguised as legitimate software
- Integrated circuits on the motherboard that manage communication between CPU RAM and peripherals
- Background process running continuously in an operating system
- High speed storage interface standard for SSDs
- Text based interface for interacting with an operating system
- Set of rules governing data communication between devices
- Small unit of data transmitted over a network
- Device that connects devices in a LAN and forwards data based on MAC addresses
- Processor designed for rendering graphics and parallel computations
Down
- Saved state of a virtual machine at a point in time
- Self replicating malware spreading through networks
- Security system controlling incoming and outgoing network traffic
- System that translates domain names into IP addresses
- Maximum amount of data that can travel through a communication channel
- Basic networking device that broadcasts data to all connected devices
- Secure communication tunnel over the Internet
- Device that forwards data packets between networks
- Device that performs physical actions in response to control signals
- Device that converts real world data into electrical signals
- Internet addressing system using 32 bits
- Program that interprets and executes user commands
- Number of cycles per second executed by the CPU measured in GHz
- Network of physical devices connected to the Internet
- Cyberattack where attackers trick users into revealing sensitive information
30 Clues: Malware disguised as legitimate software • Internet addressing system using 32 bits • Internet addressing system using 128 bits • Delay experienced during data transmission • Secure communication tunnel over the Internet • Small unit of data transmitted over a network • High speed storage interface standard for SSDs • Device that forwards data packets between networks • ...
computing science 2019-11-06
7 Clues: wireless networks • local area network • joins Lans together • personal area network • cleared when not checked • holds the first instructions • immediate memory the processor has access to these
Day 1 Factors Redefining Management 2024-08-25
Across
- This is the result of increasing numbers of organizations extending past national borders, creating more competition
- The heterogeneous mix of people in an organization is called its workplace _____
- the nature of communication among and between managers and employees is changing due to data _____
- This term refers to the presence of digital transformation, focus on sustainability, gigs/service economy, emphasis on ethical behaviour, and the rise of stakeholder capitalism
- driven The rise of buying and selling of information about individuals and groups is called _____-_____ decision-making
- These result from changes in the business cycle as well as international problems
- Automation and _____ can take away some jobs but create others
Down
- With customer-_____, customers and clients have more and increasing access to information such as reviews and warnings, empowering their decision-making
- Reliance on data networks can leave organizations vulnerable to political and natural disasters
- When consumers expect businesses to keep up with the latest technology, organizations must emphasize _____
- Generational differences also bring _____ in values and expectations to the workplace
- Economic pressures arise when an organization is struggling with its _____.
- managers need to be agile and adaptable in times of _____
- Customer-centricity is also affected by the new _____ economy causing changes in buyer trends
- Sometimes competing means _____ for cheap labour
- Employees don't set aside their _____ values and lifestyle preferences when they go to work
- To compete internationally, Canadian businesses have had to reduce _____, increase productivity, improve quality, and even merge with others
- Algorithms and _____ have impacted marketing and increased buyer suspicion
18 Clues: Sometimes competing means _____ for cheap labour • managers need to be agile and adaptable in times of _____ • Automation and _____ can take away some jobs but create others • Algorithms and _____ have impacted marketing and increased buyer suspicion • Economic pressures arise when an organization is struggling with its _____. • ...
Inventors and Inventions 2024-06-09
Across
- is the electronic delivery of moving images and sound from a source to a receiver
- a social media and social networking service owned by the American technology conglomerate Meta
- It's an instrument designed for the simultaneous transmission and reception of the human voice
- It's used for a wide range of tasks, from basic calculations to complex operations involving artificial intelligence.
Down
- a digital reality that combines aspects of social networks, online gaming, virtual reality (VR)
- global system of interconnected computer networks that uses the Internet protocol suite
- It was invented by Thomas Edison and Joseph Swan in the 1880s
7 Clues: It was invented by Thomas Edison and Joseph Swan in the 1880s • is the electronic delivery of moving images and sound from a source to a receiver • global system of interconnected computer networks that uses the Internet protocol suite • It's an instrument designed for the simultaneous transmission and reception of the human voice • ...
Pathways Reading 1 Unit 6 vocabulary 2022-11-28
Across
- friendly to people
- to change in order to deal with something
- what you like or don't like
- able to understand and learn things
- scientific knowledge or skill
Down
- keep somewhere for future use
- to connect
- say what will happen in the future
- system of connected communication lines
- give people ideas about what they should do
10 Clues: to connect • friendly to people • what you like or don't like • keep somewhere for future use • scientific knowledge or skill • say what will happen in the future • able to understand and learn things • system of connected communication lines • to change in order to deal with something • give people ideas about what they should do
Ai game crossword 2026-01-13
Across
- Hypothetical AI with human-level broad intelligence (not yet achieved)
- Step-by-step instructions for AI.
- Artificial Intelligence
- ML using multi-layered neural networks to find complex patterns.
- Creates new content (text, images, etc.).
Down
- Ml
- AI for conversational interfaces.
- Autonomous AI agents acting on goals.
- User.input
- AI trained on vast text data, like GPT models
10 Clues: Ml • User.input • Artificial Intelligence • AI for conversational interfaces. • Step-by-step instructions for AI. • Autonomous AI agents acting on goals. • Creates new content (text, images, etc.). • AI trained on vast text data, like GPT models • ML using multi-layered neural networks to find complex patterns. • ...
SDG 9 2026-02-05
Across
- Coming up with new ideas
- Scientific investigation to discover new knowledge
- Development for present needs without harming the future
- Use of science and tools to solve problems
Down
- The basic physical systems of a country
- Economic activity involving production of goods
- Basic transport networks
- Web that connects computers
- Where goods are produced
- Powering with the sun
10 Clues: Powering with the sun • Basic transport networks • Where goods are produced • Coming up with new ideas • Web that connects computers • The basic physical systems of a country • Use of science and tools to solve problems • Economic activity involving production of goods • Scientific investigation to discover new knowledge • ...
Cybersecurity Crossword 2026-03-20
Across
- A virus that spreads itself across networks
- Software that protects against malware
- Attack that locks data for payment
Down
- Weakness in a system
- Secret code used to protect data
- Secure login method using two steps
- Fake emails used to trick users
- Malicious software
- Hidden software used to spy on users
- Person who breaks into systems
10 Clues: Malicious software • Weakness in a system • Person who breaks into systems • Fake emails used to trick users • Secret code used to protect data • Attack that locks data for payment • Secure login method using two steps • Hidden software used to spy on users • Software that protects against malware • A virus that spreads itself across networks
Social networks 2021-03-21
Across
- an app that enables you to post tweets to convey your message to the world
- the largest social networking site in the world
- a unique social networking platform that was completely based on sharing photos and videos
Down
- the world's largest video-sharing social networking site that enables users to upload and share videos, view them, comment on them and like them
- an app with a calling option for communicating with people around the world without spending money
5 Clues: the largest social networking site in the world • an app that enables you to post tweets to convey your message to the world • a unique social networking platform that was completely based on sharing photos and videos • an app with a calling option for communicating with people around the world without spending money • ...
Local Networks 2022-05-17
Across
- it is an ability that tests a variety of hypotheses
- cover those related to technological innovation as well as their positive and negative impacts on the organization.
- external factors that can contribute to the attainment of its objectives and priorities.
Down
- internal attributes of the organization that can contribute to the attainment of its objectives and priorities.
- it is a kind of analysis that surveys bigger environment where the organization operates
5 Clues: it is an ability that tests a variety of hypotheses • it is a kind of analysis that surveys bigger environment where the organization operates • external factors that can contribute to the attainment of its objectives and priorities. • internal attributes of the organization that can contribute to the attainment of its objectives and priorities. • ...
Networks -Josh 2019-05-17
5 Clues: -Flames • -Colour • -What crisps come in • -Getting into a computer without authorisation • -A device for connecting computers and other devices together to make a network
Networks crossword 2023-11-24
Across
- – Cheap but if many computers are attached, the amount of data flowing causes the network to slow down.
- – Easy To Install and expand but expensive
Down
- – A system of interconnected devices
- - The physical and logical arrangement of nodes in a network
- - If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.
5 Clues: – A system of interconnected devices • – Easy To Install and expand but expensive • - The physical and logical arrangement of nodes in a network • - If any of the nodes fail then the ring is broken and data cannot be transmitted successfully. • – Cheap but if many computers are attached, the amount of data flowing causes the network to slow down.
Computer Acronyms 2024-09-06
Across
- A standard interface designed for IBM PC-compatible computers.
- An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
- A type of non-volatile memory used in computers and other electronic devices.
- A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
- A proprietary journaling file system developed by Microsoft in the 1990s.
- An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
- A small economy car made by the British Motor Corporation.
- Used to interact with computer programs with text-based commands.
- The most important processor in a given computer.
- A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
- Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
- A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
- A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
- A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
- A video display interface developed by the Digital Display Working Group.
- A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
- A video display controller and accompanying de facto graphics standard.
- A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
- A solid-state storage device.
- A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
- A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
- A computer hardware component that connects a computer to a computer network.
- An industry standard that allows data exchange and delivery of power between many types of electronics.
- A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.
25 Clues: A solid-state storage device. • The most important processor in a given computer. • A small economy car made by the British Motor Corporation. • A standard interface designed for IBM PC-compatible computers. • Used to interact with computer programs with text-based commands. • A video display controller and accompanying de facto graphics standard. • ...
Cyber Awareness 2023-05-05
Across
- Using technology to bully or harass someone online
- A secret code that you use to protect your online accounts
- A person who uses their computer skills to gain unauthorized access to systems or networks
- A type of malware that can harm your computer and steal your personal information
Down
- The practice of protecting computers, networks, and online systems from unauthorized access or attack
- Unsolicited emails or messages that are sent to a large number of people
6 Clues: Using technology to bully or harass someone online • A secret code that you use to protect your online accounts • Unsolicited emails or messages that are sent to a large number of people • A type of malware that can harm your computer and steal your personal information • ...
Computer Jargon 2018-02-24
Across
- A peripheral device used to point to items on a monitor
- to put data on somewhere.
- A screen in a software program that permits the user to view several programs at one time.
- the solid parts of a computer, like monitors, fans, CPU, etc.
- a way to connect to a network wirelessly.
- to copy data from somewhere.
- people who search flaws in the way computers work. They can use their knowledge for evil, too.
- is a wireless communications technology intended to replace cables. It allows short-range connections between two or more compatible devices such as mobile phones, tablets, headsets or medical equipment.
- is a wireless LAN (local area network) node that provides Internet connection and virtual private network (VPN) access from a given location
- an act or function of updating the display on a screen.
Down
- It is a method of exchanging messages between people using electronic.
- A small picture used to represent a file or program in a GUI interface
- the brain of the computer; controls the other elements of the computer.
- A peripheral used to input data by pressing keys.
- A peripheral device that converts output from a computer into a printed image.
- information stored on a computer.
- Complete, self-contained programs that perform a specific function (ie. spreadsheets, databases)
- is a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- drive refer to the same thing, which is a small data storage device that uses flash memory and has a built-in USB connection.
- A program used to view World Wide Web pages, such as Netscape Navigator or Internet Explorer
20 Clues: to put data on somewhere. • to copy data from somewhere. • information stored on a computer. • a way to connect to a network wirelessly. • A peripheral used to input data by pressing keys. • A peripheral device used to point to items on a monitor • an act or function of updating the display on a screen. • the solid parts of a computer, like monitors, fans, CPU, etc. • ...
Chapter 5 2013-11-27
Across
- A simple personal communication device for short messages.
- directory: A directory which gives the names and extension numbers of departments and officials.
- This type of call connects the caller to a number overseas. The caller dials the number directly without the aid of an operator.
- dialing: The numbers can be dialed automatically by simply dialing one digit.
- top-up machines: These allow customers to extend the credit on their mobile phones instantaneously.
- Most businesses have more than one telephone and probably more than one telephone number. The telephones are usually connected to a ________.
- calls: These are all calls made inland, whether domestic or commercial. Equipment often billed a month in advance.
- These are also known as Manual Exchanges.
- conference: This is interactive communication among people at two or more locations using telecommunication.
Down
- Is the general term for family of transmission technologies for delivery of voice communications over IP networks such as the internet.
- distance: Charges are billed after the event.
- switchboard: Captures and directs a caller through a menu of options.
- This type of call is made when the caller wants to speak with a particular person.
- forwarding: Incoming calls can be transferred to another number if the person is away from the office.
- These are commonly known as Automatic switchboard.
- mail: A computer based voice storage system.
- messaging: The exchange of brief written messages between mobile phones over cellular networks.
- calls: Is made when the chargers are billed to the called telephone number.
- An alternative means being offered by some companies. This reduced the telephone bills to a great extent.
- Directories: This lists the names and phone numbers of private individuals,companies,schools,government organisation.
20 Clues: These are also known as Manual Exchanges. • mail: A computer based voice storage system. • distance: Charges are billed after the event. • These are commonly known as Automatic switchboard. • A simple personal communication device for short messages. • switchboard: Captures and directs a caller through a menu of options. • ...
Digital Literacy and Responsibility 2014-10-21
Across
- offering reason to be believed
- computer software designed to harm a computer
- the act of sending inappropriate sexual material, usually text or images, between cell phones
- a personal and sometimes unreasoned judgment or prejudice
- a computer application that simulates a paper accounting worksheet
- a common audio format for playback and storage of music on digital audio players
- the extension of service or coverage in a wireless telecommunications system
- a computer or series of computers that link other computer together and often store important information
- one present but not taking part in a situation or event
- the physical parts of a computer
- am abbreviation for secure sockets layer; it's a protocol that provides security when communicating on the internet
Down
- refers to careers in science, technology, engineering, and mathematics
- representing the language or thoughts of an author as your own, without indicating where the information is from
- content and media that combines deferent content forms, such as text, audio, animation, and still images
- another term for the CPU of a computer- the central processing unit that runs computer programs
- a type of malware that unknowingly collects information from a computer
- refers to any disruption to alteration of a signal in a cell phones
- a vast global computer network which links smaller computer networks together
- e-mail that's sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses
- also known as short message service; it is a text messaging service for cell phones
- electronic mail sent between computer networks
- computer software that displays advertisements
22 Clues: offering reason to be believed • the physical parts of a computer • computer software designed to harm a computer • electronic mail sent between computer networks • computer software that displays advertisements • one present but not taking part in a situation or event • a personal and sometimes unreasoned judgment or prejudice • ...
Module 1 Puzzle 2021-09-29
Across
- A small file containing information from a Web site
- A binary piece of data prepared for transmission over a network
- A check of systems security. This usually includes a review of documents, procedures, and system configurations
- A device that separates/connects networks
- Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling
- Any software that has a malicious purpose, such as a virus or trojan horse
- A subsection of a network
- A protocol that is part of the TCP/IP suite of protocols, which is
- A hacker term for a person who claims much greater hacking skill than he actually has
- A seven-layer model describing network connnectivity, devices,and protocols
- An Internet address, such as www.facebook.com
Down
- Hackers who hack only for legal/ethical purposes
- A device or software that provides a barrier between your machine or network and the rest of the world
- Confidentiality, Integrity, and Availability
- The process to verify that a user is authorized to access a given resource. This is part of the logon system
- A utility that provides extensive information about a computer’s network connection
- A protocol used to send data over the Internet; part of the TCP/IP suite of protocols
- A machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
- The central Internet connection to which Internet Service Providers must ultimately connect
- foundation for most networking and all Internet
- A protocol critical for securing virtual private networks
21 Clues: A subsection of a network • A device that separates/connects networks • Confidentiality, Integrity, and Availability • An Internet address, such as www.facebook.com • foundation for most networking and all Internet • Hackers who hack only for legal/ethical purposes • A small file containing information from a Web site • ...
ITS2210 Module 1 Crossword 2019-04-02
Across
- The central Internet connection to which Internet Service Providers must ultimately connect
- A seven-layer model describing network connectivity, devices, and protocols
- Any software that has a malicious purpose, such as a virus or Trojan horse
- A hacker term for a person who claims much greater hacking skill than he actually has
- Hackers who hack only for legal/ethical purposes
- A device that separates networks
- A protocol critical for securing virtual private networks
- Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling
- A check of systems security. This usually includes a review of documents, procedures, and system configurations
- A subsection of a network
- A protocol used to send data over the Internet; part of the TCP/IP suite of protocols
- A protocol that is part of the TCP/IP suite of protocols, which is the foundation for most networking and all Internet communications
Down
- An Internet address, such as www.facebook.com
- A binary piece of data prepared for transmission over a network
- Confidentiality, Integrity, and Availability
- The process to verify that a user is authorized to access a given resource. This is part of the logon system
- A machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
- A small file containing information from a Web site
- A device or software that provides a barrier between your machine or network and the rest of the world
- A utility that provides extensive information about a computer’s network connection
20 Clues: A subsection of a network • A device that separates networks • Confidentiality, Integrity, and Availability • An Internet address, such as www.facebook.com • Hackers who hack only for legal/ethical purposes • A small file containing information from a Web site • A protocol critical for securing virtual private networks • ...
MTA Lesson 3 - Crossword 2020-09-10
Across
- allow you to keep track of websites that you visit frequently so that you can visit them quickly in the future
- for clients seeking resources outside their networks
- Data kept in a primary location is synchronized with data in another location
- the traditional Microsoft browser that offers a number of features to protect your security and privacy while you browse the web
- things such as extra toolbars, animated mouse pointers, stock tickers, and pop-up blockers
- a way to run outdated sites
- fraudulent technique based on social engineering to get views to visit a site that appears trust worthy
- provides a platform-independent, distributed, objectoriented system for creating software components
- server-client application that allows you to securely connect to a remote PowerShell host and run script interactively
Down
- used with masquerading to hide an entire address space behind a single IP address
- helps prevent anyone who might be using your computer from seeing where you visited and what you looked at on the web
- industry standard to represent systems, applications, networks, devices, and other managed components
- prevents sites from installing and using ActiveX applications
- and technology that protects your computer as you browse the internet with Internet Explorer
- new Microsoft lightweight web browser with a layout engine built around web standards designed to replace Internet Explorer as the default web browser
- set of
- a server that acts as an
- Manages local or remote computers by using a single, consolidated desktop tool
- can be used to suppress some or all pop-ups
- small applications that allow websites to provide content such as videos and games
- native commands available in Windows PowerShell
- text stored by a user’s web browser
22 Clues: set of • a server that acts as an • a way to run outdated sites • text stored by a user’s web browser • can be used to suppress some or all pop-ups • native commands available in Windows PowerShell • for clients seeking resources outside their networks • prevents sites from installing and using ActiveX applications • ...
MTA Lesson 3 - Crossword 2020-09-11
Across
- Data kept in a primary location is synchronized with data in another location
- a way to run outdated sites
- allow you to keep track of websites that you visit frequently so that you can visit them quickly in the future
- native commands available in Windows PowerShell
- text stored by a user’s web browser
- and technology that protects your computer as you browse the internet with Internet Explorer
- fraudulent technique based on social engineering to get views to visit a site that appears trust worthy
- server-client application that allows you to securely connect to a remote PowerShell host and run script interactively
- can be used to suppress some or all pop-ups
- industry standard to represent systems, applications, networks, devices, and other managed components
- small applications that allow websites to provide content such as videos and games
- new Microsoft lightweight web browser with a layout engine built around web standards designed to replace Internet Explorer as the default web browser
- used with masquerading to hide an entire address space behind a single IP address
Down
- set of
- provides a platform-independent, distributed, objectoriented system for creating software components
- the traditional Microsoft browser that offers a number of features to protect your security and privacy while you browse the web
- helps prevent anyone who might be using your computer from seeing where you visited and what you looked at on the web
- things such as extra toolbars, animated mouse pointers, stock tickers, and pop-up blockers
- Manages local or remote computers by using a single, consolidated desktop tool
- prevents sites from installing and using ActiveX applications
- for clients seeking resources outside their networks
- a server that acts as an
22 Clues: set of • a server that acts as an • a way to run outdated sites • text stored by a user’s web browser • can be used to suppress some or all pop-ups • native commands available in Windows PowerShell • for clients seeking resources outside their networks • prevents sites from installing and using ActiveX applications • ...
