networks Crossword Puzzles
artificial intelligence 2024-08-15
Across
- - Popular programming language for AI.
- - Step-by-step problem-solving procedure.
- - AI capability to interpret images.
- - Moral principles guiding AI development.
- - Fundamental unit in AI networks.
Down
- - Multi-dimensional array used in machine learning.
- - Raw information used in AI training.
- - Entity that performs tasks autonomously.
- - Unfair prejudice in AI decisions.
- - Pioneer of computer science and AI.
10 Clues: - Fundamental unit in AI networks. • - Unfair prejudice in AI decisions. • - AI capability to interpret images. • - Pioneer of computer science and AI. • - Popular programming language for AI. • - Raw information used in AI training. • - Step-by-step problem-solving procedure. • - Entity that performs tasks autonomously. • - Moral principles guiding AI development. • ...
Quiz 2023-08-03
Across
- streaming service
- Humanlike chatbot
- Computer generated simulation
- virtual environment that allows acces to interperability of multiple individual
- card responsible for rendering image to monitor
- Main Directory of user interface
Down
- a private network within an organisation
- device that connects two or more networks
- Disguises itself as a safe program to open
- Software used to navigate the internet
10 Clues: streaming service • Humanlike chatbot • Computer generated simulation • Main Directory of user interface • Software used to navigate the internet • a private network within an organisation • device that connects two or more networks • Disguises itself as a safe program to open • card responsible for rendering image to monitor • ...
IPv4 vs IPv6 2021-10-19
Across
- IPv6 feature - ___________ infrastructure
- First version of IP was deployed in the ______ in 1983
- IPv6 is a 128 bit ___________ address
- IPv4 supports _________ Length Subnet Mask
- Most networks combine IP and TCP (________ Control Protocol)
- IPv6 is the next __________ of IP Addresses
Down
- IPv6 feature - ___________ addressing
- IPv6 uses NDP (__________ Discovery Protocol)
- IPv4 uses ARP (Address _________ Protocol)
- IPv4 is a 32 bit __________
10 Clues: IPv4 is a 32 bit __________ • IPv6 feature - ___________ addressing • IPv6 is a 128 bit ___________ address • IPv6 feature - ___________ infrastructure • IPv4 uses ARP (Address _________ Protocol) • IPv4 supports _________ Length Subnet Mask • IPv6 is the next __________ of IP Addresses • IPv6 uses NDP (__________ Discovery Protocol) • ...
byte trail 4 2025-03-05
Across
- A software that helps navigate web pages
- Protocol for transferring files over the internet
- Cryptocurrency ledger technology
- Used to locate resources on the internet
Down
- Processes graphics for display
- Malicious program that replicates itself
- Technology for wired local area networks
- Logical division of a drive
- Tree where each node has up to two children
- Connects software components together
10 Clues: Logical division of a drive • Processes graphics for display • Cryptocurrency ledger technology • Connects software components together • A software that helps navigate web pages • Malicious program that replicates itself • Technology for wired local area networks • Used to locate resources on the internet • Tree where each node has up to two children • ...
Cyber security 2025-07-07
Across
- : Malicious software that replicates itself
- : Scam tricking individuals for personal info
- : Protects against malicious programs
- : Someone who exploits security vulnerabilities to access systems
- : Converting data into secret code
Down
- : Locks system until ransom paid
- : Hidden flaw in software
- : Secretly gathers personal information from computers
- : Malware that appears legitimate
- : Protects networks by filtering incoming and outgoing traffic
10 Clues: : Hidden flaw in software • : Locks system until ransom paid • : Malware that appears legitimate • : Converting data into secret code • : Protects against malicious programs • : Malicious software that replicates itself • : Scam tricking individuals for personal info • : Secretly gathers personal information from computers • ...
Hacker Tools 2022-11-23
Across
- โปรแกรมที่เป็น Open source software ที่ทำงานแบบ web server scanner
- เครื่องมือที่มีความสามารถในการ crack WEP และ WPA/WPA2 ในไม่กี่นาที
- เครื่องมือที่ทำหน้าที่เป็น Digital forensics โดยอาศัยหลักการของ Data mining ในการติดตามแกะรอยข้อมูล
- เครื่องมือที่อยู่ในกลุ่มซอฟต์แวร์ที่ใช้ในการทดสอบการเจาะระบบ
- โปรแกรมกลุ่ม Password Cracking Tool
Down
- เครื่องมือที่ใช้การถอดรหัสแบบ Dictionary Attacks
- เครื่องมือที่ใช้ในการ Scan ports และ Map Networks
- เครื่องมือที่นิยมใช้เพื่อ captures data packet ที่อยู่ใน Network ที่ทำงานแบบ Real time
- เครื่องมือที่เรียกว่าเป็น Web Vulnerability Scanner ตัวหนึ่งที่ได้รับความนิยมมากพอสมควร
- เครื่องมือนี้ทำหน้าที่เป็น Password Cracker/ Password Hacking
10 Clues: โปรแกรมกลุ่ม Password Cracking Tool • เครื่องมือที่ใช้การถอดรหัสแบบ Dictionary Attacks • เครื่องมือที่ใช้ในการ Scan ports และ Map Networks • เครื่องมือที่อยู่ในกลุ่มซอฟต์แวร์ที่ใช้ในการทดสอบการเจาะระบบ • เครื่องมือนี้ทำหน้าที่เป็น Password Cracker/ Password Hacking • โปรแกรมที่เป็น Open source software ที่ทำงานแบบ web server scanner • ...
ecosoc 2025-10-09
Across
- – Opposite of decentralization in crypto networks
- – Wallets can hide transaction ____
- – Crypto exchange that collapsed in 2022
- – Crypto is taxed as ____ in the USA
Down
- – Technology that records all crypto transactions
- – Privacy coin used to hide payments
- – Symbol used for Bitcoin
- – The first and most famous cryptocurrency
- – KYC stands for Know Your ____
- – Global body fighting money laundering
10 Clues: – Symbol used for Bitcoin • – KYC stands for Know Your ____ • – Wallets can hide transaction ____ • – Privacy coin used to hide payments • – Crypto is taxed as ____ in the USA • – Global body fighting money laundering • – Crypto exchange that collapsed in 2022 • – The first and most famous cryptocurrency • – Technology that records all crypto transactions • ...
Electrical and Electronic Roles 2025-09-23
Across
- – Extreme weather impacting Caribbean power systems.
- – Energy sources like solar, wind, and biomass.
- – Technology for communication networks.
- – Involves circuits, sensors, and embedded systems.
- – Network for distributing electricity.
Down
- – Software embedded in electronic devices.
- – Related to power systems and energy distribution.
- – Device for real-time energy monitoring.
- – Small-scale, localized power network.
- – Keeping systems operational and safe.
10 Clues: – Small-scale, localized power network. • – Keeping systems operational and safe. • – Network for distributing electricity. • – Technology for communication networks. • – Device for real-time energy monitoring. • – Software embedded in electronic devices. • – Energy sources like solar, wind, and biomass. • – Related to power systems and energy distribution. • ...
Assignment 6 activities 2015-09-21
Across
- hypertext markup language
- both the sender and the receiver are active
- high level programming language
- unauthorized use or attempts of unauthorized use of UT IT resources
- has concise text
- world wide web
- a web page is composed of html tags and multimedia files
Down
- result in termination of access
- can use 30 seconds of media
- wide area networks
- newest form of html
- local area network
- 25% slower than paper
- tag used to fin pages that might use one or severalwords
- text editor for mac
- no more than 5 images from artist
16 Clues: world wide web • has concise text • wide area networks • local area network • newest form of html • text editor for mac • 25% slower than paper • hypertext markup language • can use 30 seconds of media • result in termination of access • high level programming language • no more than 5 images from artist • both the sender and the receiver are active • ...
Bonus Extension 2017-03-14
Across
- Something you cannot touch.
- Network______ Card
- The data is constantly changing.
- You use this to search for things on the internet.
- Something you can touch.
- tapes Used to store large amounts of data.
- The transmission of data.
- Loses contents when the power is turned off.
- This type of storage may be on CD's and DVD's.
Down
- You can take this type of storage with you.
- Brain of the computer.
- Internet : ___________ network of networks.
- Documents that contain links and graphics
- Modern day internet.
- Uniform Resource ____________
- The way computers are organised in a network.
16 Clues: Network______ Card • Modern day internet. • Brain of the computer. • Something you can touch. • The transmission of data. • Something you cannot touch. • Uniform Resource ____________ • The data is constantly changing. • Documents that contain links and graphics • You can take this type of storage with you. • Internet : ___________ network of networks. • ...
Displays and Image Processing 2022-05-20
Across
- coded excitation occurs in the _____
- digital image storage
- creates an element of realism to a 3D image
- smallest amount of digital storage
- any changes after freezing an image
- manipulating data before it is stored
- compounding that averages images from different frequencies
- grainy appearance in tissues
Down
- creates bright and dark highlights around edges
- the force of the beam can tell how dense the tissue is
- temporal compounding is also known as _____
- provides guidelines for imaging networks
- group of 8 bits
- compounding that averages data from different angles
- real world numbers
- smallest element of a picture
16 Clues: group of 8 bits • real world numbers • digital image storage • grainy appearance in tissues • smallest element of a picture • smallest amount of digital storage • any changes after freezing an image • coded excitation occurs in the _____ • manipulating data before it is stored • provides guidelines for imaging networks • temporal compounding is also known as _____ • ...
US Technology Holiday Crossword 2025-12-11
Across
- John Hancock's wellness program name
- Longer. Healthier ...
- Historic document bearing John Hancock's famous signature
- Kryptorian hero with an "S" on his chest
- Programming language named after a snake
- Term for a program that self-replicates across networks
- Festival of lights that lasts eight nights
- Manulife's logo color
Down
- Popular holiday ballet
- Famous local symphony that plays every holiday season
- Candle holder used during Kwanzaa
- AI assistant from microsoft
- He brings presents down the chimney
- Word meaning "Christmas" in Spanish
- Manulife's stock exchange abbreviation
- Term for a flaw in software security
16 Clues: Longer. Healthier ... • Manulife's logo color • Popular holiday ballet • AI assistant from microsoft • Candle holder used during Kwanzaa • He brings presents down the chimney • Word meaning "Christmas" in Spanish • John Hancock's wellness program name • Term for a flaw in software security • Manulife's stock exchange abbreviation • Kryptorian hero with an "S" on his chest • ...
Module 4 Crossword 2019-04-26
Across
- This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
- It is short for malicious software.
- Displaying unwanted advertisements and redirecting web browsers is an example of this.
- This is the security principle that protects data from inappropriate modification or corruption.
- An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
- Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
- Encrypted files or encrypted communication is unreadable to ________ viewers.
- Hackers use software known as a packet sniffer to read ________ traffic.
Down
- This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
- The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
- This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
- A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
- Process of attempting to reduce or eliminate harmful effects of the breach.
- Antivirus software prevents, ________, and removes viruses.
- This sends traffic from private networks to the Internet and from the Internet to private networks.
15 Clues: It is short for malicious software. • Antivirus software prevents, ________, and removes viruses. • Hackers use software known as a packet sniffer to read ________ traffic. • Process of attempting to reduce or eliminate harmful effects of the breach. • Encrypted files or encrypted communication is unreadable to ________ viewers. • ...
Module 4 Crossword 2019-04-26
Across
- This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
- Process of attempting to reduce or eliminate harmful effects of the breach.
- Displaying unwanted advertisements and redirecting web browsers is an example of this.
- This is the security principle that protects data from inappropriate modification or corruption.
- Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
- Hackers use software known as a packet sniffer to read ________ traffic.
- Antivirus software prevents, ________, and removes viruses.
- It is short for malicious software.
Down
- The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
- This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
- Encrypted files or encrypted communication is unreadable to ________ viewers.
- A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
- An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
- This sends traffic from private networks to the Internet and from the Internet to private networks.
- This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
15 Clues: It is short for malicious software. • Antivirus software prevents, ________, and removes viruses. • Hackers use software known as a packet sniffer to read ________ traffic. • Process of attempting to reduce or eliminate harmful effects of the breach. • Encrypted files or encrypted communication is unreadable to ________ viewers. • ...
Syys Sanaristikko :) 2013-10-13
Across
- I am known for my printers.
- I am the second largest non-oil company in Texas.
- An Indian-born IIT (Kanpur) graduate founded me in 1996 and now I'm a $4.36b US company head-quarted in California :)
- I was founded in 2000 as Zepton Networks.
- Over one third of the world's wireless calls travel via networks owned by my customers !!!
- In April 2006, a dispute between Reliance Communications and me over royalty fees cost me approximately $11.7b in market capitalization. In July 2007, Reliance and me decided to settle the matter and agreed to expand the use of CDMA technology in India.
- I generate "traffic generators" :)
- I was founded in 1895 and now bankrupt...IP phones and Secure Routers are my speciality.
Down
- I am the largest telecommunications equipment maker in the world, having overtaken Ericsson in 2012.
- I am an American company that designs and manufactures electronic and bio-analytical measurement instruments and equipment for measurement and evaluation.
- I acquired Renesas Mobile Corporation last month.
- The world's largest ever manual telephone exchange, serving 60,000 lines, was installed by me in Moscow in 1916.
- I was carved out in 2000 from Lucent Technologies.
- My parents kept (the second half of) my birth place as my name :)
- I share my birthday with the auther of this crossword but in the year 1847 at Berlin :) I am famous when I am called with 'Nokia' :)
15 Clues: I am known for my printers. • I generate "traffic generators" :) • I was founded in 2000 as Zepton Networks. • I acquired Renesas Mobile Corporation last month. • I am the second largest non-oil company in Texas. • I was carved out in 2000 from Lucent Technologies. • My parents kept (the second half of) my birth place as my name :) • ...
IT_KD 2023-12-04
Across
- A networking device that directs data traffic between different computer networks.
- A high-level programming language known for its readability and versatility.
- The process of identifying and fixing errors or bugs in software code.
- A widely-used programming language that adds interactivity and dynamic content to web pages.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A structured collection of data organized for efficient retrieval, storage, and management, typically using tables and relationships.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- The delivery of computing services, including storage, processing power, and software, over the internet.
- The standard markup language for creating web pages and web applications.
- A set of rules and tools for building software applications, enabling them to communicate with each other.
- A step-by-step set of instructions or rules to solve a specific problem or perform a particular task.
- A computer or system that provides resources, services, or data to other computers, known as clients, in a network.
- The process of converting information into a code to secure it from unauthorized access or use.
- A pre-built structure or set of tools that provides a foundation for software development, making it easier to create and manage applications.
- Any software intentionally designed to harm or exploit computer systems, including viruses, worms, and ransomware.
15 Clues: The process of identifying and fixing errors or bugs in software code. • The standard markup language for creating web pages and web applications. • A high-level programming language known for its readability and versatility. • A networking device that directs data traffic between different computer networks. • ...
TV Production Terms 2024-03-05
Across
- The person responsible for overseeing the creative aspects of filming and directing actors.
- The real-time transmission of a TV show as it is being filmed or performed.
- A visual representation of the scenes in a TV show, often used in pre-production planning.
- The person or team responsible for managing the overall production process, including budgeting and scheduling.
- The process of selecting and assembling footage to create the final version of a TV show.
- The licensing of a TV show for broadcast by multiple networks or stations.
- The process of adjusting and enhancing the color of footage to achieve a desired look or style.
- The final stage of post-production where all elements of the TV show are combined into a finished product ready for distribution.
Down
- The creation of the storyline, dialogue, and scene directions for a TV show.
- The distribution of the finished TV show to audiences through television networks, streaming platforms, or other channels.
- The art of capturing images on film or digital media, including camera work, lighting, and framing.
- The phase of creating a TV show where filming occurs.
- The phase of production that involves editing, visual effects, sound mixing, and other enhancements after filming is complete.
- The process of selecting actors for roles in a TV show.
- The process of combining and balancing audio elements, including dialogue, music, and sound effects.
- The measurement of audience size and demographics for a TV show, used to determine its popularity and advertising revenue.
16 Clues: The phase of creating a TV show where filming occurs. • The process of selecting actors for roles in a TV show. • The licensing of a TV show for broadcast by multiple networks or stations. • The real-time transmission of a TV show as it is being filmed or performed. • The creation of the storyline, dialogue, and scene directions for a TV show. • ...
puzzle-corner-6 2024-09-22
Across
- The smallest unit of data in a computer, representing a binary value of either 0 or 1.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
- A clickable link in a web page that directs users to another location, such as another web page or resource.
- A step-by-step procedure for solving a problem or completing a task.
- An intermediary server that relays requests from clients seeking resources from other servers.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A storage layer that temporarily holds frequently accessed data to improve retrieval speed.
- A copy of data stored separately to prevent loss in case of failure or corruption.
- The maximum amount of data that can be transmitted over a network in a given time, affecting speed and performance.
- A fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity.
Down
- A new version of a software program that includes improvements, bug fixes, or new features.
- A device that forwards data packets between computer networks, directing traffic on the internet.
- A digital representation or character created to represent a user in virtual environments or online games.
- A device that connects two different networks and allows them to communicate.
- The delivery of computing services over the internet, allowing for on-demand access to storage and applications.
15 Clues: A step-by-step procedure for solving a problem or completing a task. • A device that connects two different networks and allows them to communicate. • A copy of data stored separately to prevent loss in case of failure or corruption. • The smallest unit of data in a computer, representing a binary value of either 0 or 1. • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
Vocabulary Lesson 2 Jenifer S 2017-03-02
Across
- The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations
- The Internet's system for converting alphabetic names into numeric IP addresses.
- a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web
- is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
- means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments
- : a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- the introductory page of a website, typically serving as a table of contents for the site.
- is an input device that scans documents and images, which can be imported into a computer
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
Down
- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
- a person who uses computers to gain unauthorized access to data.
- a unit of information equal to one billion
- is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. ... In computer literature, kilobyte is usually abbreviated as K or KB.
- a common unit of measure for interest rates and other percentages in finance.
- a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- : is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- creates complete applications that may run on a single computer or be distributed among servers and clients in a network
- . It is the global address of documents and other resources on the World Wide Web
- Is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- the way in which something is arranged or set out.
25 Clues: a unit of information equal to one billion • the way in which something is arranged or set out. • a person who uses computers to gain unauthorized access to data. • a common unit of measure for interest rates and other percentages in finance. • The Internet's system for converting alphabetic names into numeric IP addresses. • ...
Impact 1 Unit 7 Vocabulary 1 Crossword Puzzle 2020-10-03
Across
- to make something go or be taken to a place, especially by post or email.
- an activity that you do to have fun, often one that has rules and that you can win or lose.
- a written message that you can send using a mobile phone.
- describing something that is very difficult to believe or is very good.
- an international computer network connecting other networks and computers from companies, universities, etc.
- to tell other people about your ideas, experiences, and feelings on the internet.
- to talk in a friendly manner, informal way to somebody.
- to look for information in a dictionary or by using a computer.
- a small tool or device that does something useful.
Down
- to join a computer or a mobile device to the internet or to a computer network.
- a mobile phone that also has some of the functions of a computer.
- something might exist or happen.
- able to move or travel around easily.
- an attempt to find somebody or something, especially by looking carefully for it or them.
- a system for connecting to the internet or sending data over computer networks using radio waves instead of wires.
- a small computer that is easy to carry, with a large touch screen and usually without a physical keyboard.
- a piece of software that you can download to a device such as a smartphone or tablet, for example to look up information or to play a game.
- describing something that can help do what you want.
18 Clues: something might exist or happen. • able to move or travel around easily. • a small tool or device that does something useful. • describing something that can help do what you want. • to talk in a friendly manner, informal way to somebody. • a written message that you can send using a mobile phone. • to look for information in a dictionary or by using a computer. • ...
SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Safety and Ethics Puzzle 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
5G 2021-04-07
Across
- Emission of energy
- Link between devices and networks
- A synonim for pure and clean
- Storing data while streaming
Down
- A rural area
- To damage something/hurt someone
- Distance between the waves of a radiation
- To turn something into ions (chemical process)
- A word used to define something that decline or fall down
- To observe secretly someone/something
10 Clues: A rural area • Emission of energy • A synonim for pure and clean • Storing data while streaming • To damage something/hurt someone • Link between devices and networks • To observe secretly someone/something • Distance between the waves of a radiation • To turn something into ions (chemical process) • A word used to define something that decline or fall down
Non-linear waveform shaping circuits 2022-07-16
Across
- implemented as a piecewise linear curve
- also known as dc restorers
- Clipping circuit other name
- two-port networks is being used in __shaping
- ____-segment sine-wave shaper
Down
- Remove the part of a signal
- clipper connected across the load terminals
- emitter__resistance convert sine to triangle
- ___can be used for removing the distortions
- measure of goodness
10 Clues: measure of goodness • also known as dc restorers • Remove the part of a signal • Clipping circuit other name • ____-segment sine-wave shaper • implemented as a piecewise linear curve • clipper connected across the load terminals • ___can be used for removing the distortions • emitter__resistance convert sine to triangle • two-port networks is being used in __shaping
Vocabulary 2022-11-13
Across
- something obligatory
- to produce something for the first time
- something involved in high technology
- titles conferred by colleges and universities
- a worldwide system of computer networks
Down
- to publish something
- extend over a large or increasing area
- have a portion of something with others
- money received especially on a regular basis
- synonym of help
10 Clues: synonym of help • to publish something • something obligatory • something involved in high technology • extend over a large or increasing area • have a portion of something with others • to produce something for the first time • a worldwide system of computer networks • money received especially on a regular basis • titles conferred by colleges and universities
Technology crossword 2018-06-10
Across
- We use it to move the cursor.
- Different images and texts are displayed on it.
- We use it to search for information.
- Machine programmable by a computer.
Down
- Type of malicious software program.
- Portable computer.
- The person who creates computer programs.
- Global system of interconnected computer networks.
- Most popular social network.
- We can see them on the desktop.
10 Clues: Portable computer. • Most popular social network. • We use it to move the cursor. • We can see them on the desktop. • Type of malicious software program. • Machine programmable by a computer. • We use it to search for information. • The person who creates computer programs. • Different images and texts are displayed on it. • Global system of interconnected computer networks.
Chapter 5 AGRON 342 Crossword 2023-10-23
Across
- Shape of a food that can be useful to describe certain economics
- A reduction in quantity
- The Ability to do work
- Equal Opportunity
- Process of adding acid to something
Down
- System to Help Connect Components
- To improve something
- A measure of how diverse an ecosystem is
- Introduction of Harmful Objects into the Environment
- Measure of Monetary Function
10 Clues: Equal Opportunity • To improve something • The Ability to do work • A reduction in quantity • Measure of Monetary Function • System to Help Connect Components • Process of adding acid to something • A measure of how diverse an ecosystem is • Introduction of Harmful Objects into the Environment • Shape of a food that can be useful to describe certain economics
byte trail 3 2025-03-05
Across
- Secures data by converting it to a coded form
- Software managing hardware and software resources
- Smallest unit of data in computing
- Storing data over the internet
- Device that connects multiple networks
Down
- Virtual representation of physical hardware
- High-level programming language
- Protecting data from unauthorized access
- A column in a table
- Set of vertices connected by edges
10 Clues: A column in a table • Storing data over the internet • High-level programming language • Set of vertices connected by edges • Smallest unit of data in computing • Device that connects multiple networks • Protecting data from unauthorized access • Virtual representation of physical hardware • Secures data by converting it to a coded form • ...
Dorians Digital Delema 2025-08-26
Across
- what a computer is like
- usbdrive
- turns off but powers on right away
- saves power but keeps running
- a service that allows you to save your digital data
Down
- alt
- a free cloud-based file storage
- something or someone gaining unauthorized access to computer systems, networks, or data
- applications you store your work in
- everything is off
10 Clues: alt • usbdrive • everything is off • what a computer is like • saves power but keeps running • a free cloud-based file storage • turns off but powers on right away • applications you store your work in • a service that allows you to save your digital data • something or someone gaining unauthorized access to computer systems, networks, or data
IPTV Times Table 2 2012-11-16
Across
- Plastic cards the viewer can insert in the set-top box
- An application that enables a desktop, laptop or workstation computer to function as a telephone via VOIP
- One of the three basic modulations of adding information to a sine wave signal in which its phase is varied to impose information on it
- Data transmission over a circuit capable of transmitting in one preassigned direction only
- A single device capable of both sending and receiving information
- Television programming that requires payment upfront usually on a monthly basis as a subscription fee
- Telecommunications companies that sell internet access
- A type of scanning that may result in a screen flicker
- A technique for combining many signals on a single circuit by interleaving bits or bytes of data from successive channels
- Provides broadband access network over traditional twisted copper pair and faster than ADSL
- A connection-oriented protocol that employs the virtual circuit approach
- TCP flow control process used to control the number of unacknowledged data segments that are sent between transmissions
- Provides a standard method for transporting multi-protocol datagrams over point-to-point links
- Information which travels from the user to the internet or to a central office or headend
- A group of bits, including address, data and control elements, that are switched and transmitted together
Down
- Short for Media Gateway Control Protocol
- Transmission in which the data character and bits are transmitted at a fixed rate with the transmitter and receiver being synchronized
- Application layer signaling protocol
- The range of electromagnetic radio frequencies used in transmission of voice, data and television
- A device that allows user to send commands to a computer that is somewhere else
- The length of an electromagnetic waveform as measured from any point on one wave to the corresponding point on an adjacent wave
- The device which enables anyone to compute, word process, or perform more complicated functions
- A specific set of rules, procedures or conventions that two data devices must accept and use to be able to communicate
- Used in IP networks to break up larger networks into smaller networks
- A functional unit of a node through which data can enter or leave a data network
- Unreliable and connectionless
- Any common carrier network that provides circuit switching between public users
- Used to manage the membership of Internet Protocol multicast groups
- A communications channel or medium having a bandwidth sufficient to carry multiple voice/video or data signals simultaneously
- A method of transmission in which all bits of a character are sent simultaneously over separate lines to a high speed printer or other locally attached peripheral
30 Clues: Unreliable and connectionless • Application layer signaling protocol • Short for Media Gateway Control Protocol • Plastic cards the viewer can insert in the set-top box • Telecommunications companies that sell internet access • A type of scanning that may result in a screen flicker • A single device capable of both sending and receiving information • ...
Ch 13 2023-01-17
Across
- a type of encryption that requires the use of two keys, one for encryption and the other for decryption
- a powerful magnet that must be held over hard drive platters to destroy the data contained on the drive
- a format method that creates the boot sector and file allocation table on a drive
- an access model that enables access through all ports, except those explicitly denied
- also called message digest, a fixed length value generated by applying a mathematical function to an arbitrary length text
- a malware that encrypts files on the target and then demands that a fee be paid in order to decrypt the files
- malware that is packaged with legitimate software and is activated when a user installs the legitimate application
- the name of the wireless network
- a type of encryption that uses the same key to encrypt and decrypt the data
- a format method that creates the tracks on a hard disk and is usually performed at the factory
- a Windows feature that encrypts a removable drive
Down
- a Windows feature that encrypts data and is directly linked to a specific user account
- software tools used to perform a secure erase and that is designed to overwrite existing data multiple times, rendering the data unreadable
- an access model that allow access to configured ports, and for which access to any ports not explicitly permitted is denied
- malware that requires human action to spread and infect other hosts
- a specialized chip installed on the motherboard and whose function is required when using BitLocker
- malware that exploits network applications to consume bandwidth, crash the device, or install other malware
- a dedicated device or a software service that protects computers and networks by preventing undesirable traffic from entering internal networks
- a term to describe malicious software
- malware that uses keyloggers to monitor user activity and sends information to cybercriminals
- malware that displays unsolicited advertising using pop-up web browser windows, new toolbars, or redirects to a different website
- a Windows feature that encrypts an entire hard drive
- malware that is used by cybercriminals to gain administrator-account level access to a computer and control it remotely
- a subnetwork in an organization that provides services to untrusted networks such as a website open to the internet
- a small room with two doors, one of which must be closed before the other can be opened
- a set of security objectives that ensure the security of a network, the data, and the computer systems in an organization
26 Clues: the name of the wireless network • a term to describe malicious software • a Windows feature that encrypts a removable drive • a Windows feature that encrypts an entire hard drive • malware that requires human action to spread and infect other hosts • a type of encryption that uses the same key to encrypt and decrypt the data • ...
ISCC chapter 4 2025-11-27
Across
- — Open record maintained by the community for verifying transactions
- — Services triggered by a user’s real-time geographic position
- — Generation that learns, reacts, and thinks differently due to lifelong hyper-connectivity
- — AI branch that captures, stores, and processes images
- — Products delivered electronically with no physical form
- — Digital platform where supply directly meets demand
- — Technology that enables people to form interest-based communities online
- — Technology that simulates reasoning, perception, and problem-solving
- — Information system that embeds AI in its decision-making
- — Information system that supports content sharing among user communities
- — Network-based business model seamless across devices and platforms
- — Innovation that reshapes industries and behaviours in society
- — Digital platform that connects drivers and riders for transport services
- — System enabling real-time reservations and digital payments
- — Facility enabling fast shipping for digital retail operations
- — Technique enabling secure transfer of digital funds between parties
- — AI system that stores knowledge and makes inferences like a human specialist
- — Online buying and selling supported by integrated inventory and fulfilment networks
- — A community transformed by integration of advanced technologies
- — Secret cryptographic credential used to authorise digital transactions
- — Insights from business intelligence showing future trends
- — Digital money secured by cryptography and resistant to counterfeiting
Down
- — Organization built entirely on digital platforms and networks
- — The key digital-money flaw where a single token could be duplicated
- — Describes Generation Z’s constant immersion in digital communication
- — Technologies providing historical, current, and predictive business insights
- — Digital model where services are requested and delivered instantly
- — Next-generation commerce integrating apps, supply chain, and data
- — Economic model built on digital intermediaries and user networks
- — Digital services enhanced with AI and continuous data learning
- — Digital financial transactions conducted through smartphone apps
- — Technology that subtly influences behaviour and decision-making
- — Computing system designed to mimic the human brain’s processing
- — Chain of cryptographically linked blocks storing immutable transaction records
- — First cryptocurrency created to solve the double-spend problem
- — The act of publishing and distributing digital media online
- — Behaviour and thinking shaped by technology and the internet
- — Providers, users, and groups that shape SMIS interactions
- — Group of users connected by shared interests on social platforms
- — Digital process that reduces or removes the need for human intervention
- — AI that adjusts behaviour based on past outcomes
- — Mechanical systems capable of performing high-precision repetitive tasks
- — Cryptographic identifier shared publicly for receiving digital currency
- — Computer-generated environment reproducing real-world tasks
- — Capability allowing a computer to understand spoken or written human language
45 Clues: — AI that adjusts behaviour based on past outcomes • — Digital platform where supply directly meets demand • — AI branch that captures, stores, and processes images • — Products delivered electronically with no physical form • — Information system that embeds AI in its decision-making • — Providers, users, and groups that shape SMIS interactions • ...
Pueblo Economics 2025-12-09
Across
- The Italians adopted this plant and put it on pizza!
- This member of the Three Sisters was also grown by the Pueblo.
- A type of bead whose name translates to 'shell' in the Keres language.
- Another member of the Three Sisters grown by the Pueblo.
- Proof of the Chaco valley's trade networks, this sweet treat is proof of how far the Pueblo traded.
- After the Pueblo introduced this plant to Europeans, they would farm it on an industrial scale... with slaves.
- Networks of these were constructed to link communities, and sometimes for religious purposes.
- It's hot, spicy, and comes in green, orange, red, and black varieties!
Down
- Field beds consisted of lines of these, and seeds were planted in them to ensure water collected - helping ensure farms survived.
- Their forebearers were named after this, a common trade good woven of sumac, willow, or yucca.
- It's not a pancake, but similar! Also the name of Pueblo gardens, due to the shape and layout of their holes.
- Systems of canals designed to alter the flow of water and help with large-scale farming.
- Impossible to find in the desert, but common where we live; the fancier and more colourful the better, these were traded for thousands of kilometers, and used in jewelry.
- Due to less rain, the Pueblo _________ farmlands across areas, so if one failed, the others might not.
- This animal, often domesticated for companionship, was also a source of food.
- This Pueblo staple is descended from Maize.
- One of several animals the Pueblo hunted.
- What bird did the Pueblo tame?
18 Clues: What bird did the Pueblo tame? • One of several animals the Pueblo hunted. • This Pueblo staple is descended from Maize. • The Italians adopted this plant and put it on pizza! • Another member of the Three Sisters grown by the Pueblo. • This member of the Three Sisters was also grown by the Pueblo. • ...
Businesses 2024-10-02
Across
- sends you outerspace
- can't be used to describe Apple or Tesla
- yours will affect people's perception of you
- can define culture or spirit
- very annoying but worms' favourite activity
- enjoys power and wealth
- no hands on the wheel
- when you choose to leave your job
Down
- going up and up
- using your brain but with a little help
- better not have the minimum
- going down and down
- hardware, software, networks and co
- Toulouse champion employer
- when you don't choose to leave your job
- you'll get one if you don't comply with the law
16 Clues: going up and up • going down and down • sends you outerspace • no hands on the wheel • enjoys power and wealth • Toulouse champion employer • better not have the minimum • can define culture or spirit • when you choose to leave your job • hardware, software, networks and co • using your brain but with a little help • when you don't choose to leave your job • ...
CampusQuest 2024-09-07
Across
- Home of lectures and naps
- Low price to gain market share
- Framework of strengths, weaknesses,opportunities,threats
- Celebration center for events
- Strategy to make a product unique
Down
- Studying on online consumer behavior
- Creating a unique name for a product
- Using neuroscience to study consumer behavior
- Point Bonding over smokes, creating networks
- The most silent place at campus
10 Clues: Home of lectures and naps • Celebration center for events • Low price to gain market share • The most silent place at campus • Strategy to make a product unique • Studying on online consumer behavior • Creating a unique name for a product • Point Bonding over smokes, creating networks • Using neuroscience to study consumer behavior • ...
Doughnut Economics 2025-04-08
Across
- Ecological ____ that we must stay under
- Social needs are not met
- Essential shelter in a just economy
- Life variety within ecological ceiling
- Sign of overshoot; chemical or air
- ____ layer that protects Earth from UV radiation
Down
- Exceeded planetary boundaries
- Social or ecological connections
- Builds knowledge; inner ring of doughnut
- Inner ring of Doughnut economics: Social ______
10 Clues: Social needs are not met • Exceeded planetary boundaries • Social or ecological connections • Sign of overshoot; chemical or air • Essential shelter in a just economy • Life variety within ecological ceiling • Ecological ____ that we must stay under • Builds knowledge; inner ring of doughnut • Inner ring of Doughnut economics: Social ______ • ...
cyber 2025-06-16
Across
- - Scrambling data to protect it
- - Moral rules that guide behavior
- - To inform someone about bad behavior online
- - Crime involving computers or networks
- - Acting wisely and safely online
Down
- - Extra step for account security
- - Asking before using others’ work or info
- - Good manners on the internet
- - False information shared online
- - To stop communication from a person or site
10 Clues: - Good manners on the internet • - Scrambling data to protect it • - Extra step for account security • - Moral rules that guide behavior • - False information shared online • - Acting wisely and safely online • - Crime involving computers or networks • - Asking before using others’ work or info • - To inform someone about bad behavior online • ...
Electrical and Electronic Roles 2025-09-23
Across
- – Extreme weather impacting Caribbean power systems.
- – Energy sources like solar, wind, and biomass.
- – Technology for communication networks.
- – Involves circuits, sensors, and embedded systems.
- – Network for distributing electricity.
Down
- – Software embedded in electronic devices.
- – Related to power systems and energy distribution.
- – Device for real-time energy monitoring.
- – Small-scale, localized power network.
- – Keeping systems operational and safe.
10 Clues: – Small-scale, localized power network. • – Keeping systems operational and safe. • – Network for distributing electricity. • – Technology for communication networks. • – Device for real-time energy monitoring. • – Software embedded in electronic devices. • – Energy sources like solar, wind, and biomass. • – Related to power systems and energy distribution. • ...
Ceasers English lesson 3 2025-09-04
Across
- what means a task not complete
- what has the definition of half
- the definition of this word is together
- the road between states
Down
- a writing symbole that has the stem semi
- what means networks that exist between each other
- some amounts are unequal
- to send away
- what word means between
- when two people stand apart
10 Clues: to send away • what word means between • the road between states • some amounts are unequal • when two people stand apart • what means a task not complete • what has the definition of half • the definition of this word is together • a writing symbole that has the stem semi • what means networks that exist between each other
Omics 2025-10-08
Across
- Complete set of metabolites in a system
- Study of RNA transcripts
- Study of metabolites
- Study of cellular lipid networks
- Integrative study of various omics data
Down
- Study of proteins
- Traits that make up a phenotype
- Study of heritable changes not in DNA sequence
- Study of carbohydrates and glycan
- Study of the entire set of genes in an organism
10 Clues: Study of proteins • Study of metabolites • Study of RNA transcripts • Traits that make up a phenotype • Study of cellular lipid networks • Study of carbohydrates and glycan • Complete set of metabolites in a system • Integrative study of various omics data • Study of heritable changes not in DNA sequence • Study of the entire set of genes in an organism
Computer network - key words 2024-01-08
8 Clues: Wireless network technology • security barrier on a network • Unique identifier for devices • Common wired network technology • set of rules about exchanging data • extensive network covering large areas • device directing data between networks • small network in one geographical location
Spelling Words - Week 2 2020-02-02
Across
- the part of your body between your chest and legs
- Doing what you are told to do
- Unclear, confusing or not certain
- Large networks of paths or passages
- A party
- A mode of transportation
- A very drive, eager or motivated person
- the scientific study of the brain and nervous system
- An numeric order
Down
- A place to put your clothes and shoes
- An instrument used to measure weather
- Explaining what a thing looks like
- Better than good
- Using two things together
- A Place to borrow books
- to follow instructions
16 Clues: A party • Better than good • An numeric order • to follow instructions • A Place to borrow books • A mode of transportation • Using two things together • Doing what you are told to do • Unclear, confusing or not certain • Explaining what a thing looks like • Large networks of paths or passages • A place to put your clothes and shoes • An instrument used to measure weather • ...
C4: Revising Business Messages 2021-04-19
Across
- familiar phrases that contain expendable parts
- overused expressions
- shape of text characters
- correcting grammar, spelling, punctuation, format, and mechanics
- empty space on the page
- a line or stroke attached to the end of a letter
- informal words with changed meanings
- white space on the left, right, top, and bottom of a page
- verbs needlessly coverted to wordy noun expressions
- without
Down
- expressions that repeat meaning or include unnecessary words
- process of analyzing whether your message achieves its purpose
- unnecessary introductory words
- improving the content and sentence structure
- short messages exchanged on social media networks
- stale expressions
16 Clues: without • stale expressions • overused expressions • empty space on the page • shape of text characters • unnecessary introductory words • informal words with changed meanings • improving the content and sentence structure • familiar phrases that contain expendable parts • a line or stroke attached to the end of a letter • short messages exchanged on social media networks • ...
Enhanced Vocabulary - Section C 2022-02-10
Across
- Having a world view, worldly
- (of an argument, story, or sentence) extremely complex and difficult to follow
- a minor dispute or disagreement,an unexpected and unfortunate occurrence.
- The world of the computers and the networks that connect them together
- believable
- the process of releasing, and thereby providing relief from, strong or repressed emotions.
- having a meaning that is mysterious or obscure
- An error to be corrected
Down
- The science of freezing
- contemplation
- cowardly, fainthearted
- concealed, hidden
- uncritical satisfaction with oneself or one's achievements
- The blow of mercy
- Guilty
- nerve, gall, extreme self-confidence
16 Clues: Guilty • believable • contemplation • concealed, hidden • The blow of mercy • cowardly, fainthearted • The science of freezing • An error to be corrected • Having a world view, worldly • nerve, gall, extreme self-confidence • having a meaning that is mysterious or obscure • uncritical satisfaction with oneself or one's achievements • ...
Who is DNCR? 2022-03-10
Across
- law enforcement officer that also educates and maintains trails
- creates programs and resources to help people learn
- doctor for animals
- studies and writes about past
- cares for plants and flowers
- tracks spending and maintains financial records
- preserves original materials and records
- maintains computer systems and networks
Down
- studies human history with artifacts and remains
- studies past life through fossils
- studies stars and planets
- restores and preserved art and artifacts
- cares for animals
- visual communicator that creates exhibits and brochures
- cares for aquatic animals
- coordinates overall collection of items or animals
16 Clues: cares for animals • doctor for animals • studies stars and planets • cares for aquatic animals • cares for plants and flowers • studies and writes about past • studies past life through fossils • maintains computer systems and networks • restores and preserved art and artifacts • preserves original materials and records • tracks spending and maintains financial records • ...
Assignment 6 activities 2015-09-21
Across
- text editor for mac
- newest form of html
- both the sender and the receiver are active
- can use 30 seconds of media
- has concise text
- wide area networks
Down
- a web page is composed of html tags and multimedia files
- result in termination of access
- 25% slower than paper
- unauthorized use or attempts of unauthorized use of UT IT resources
- hypertext markup language
- local area network
- high level programming language
- tag used to fin pages that might use one or severalwords
- world wide web
- no more than 5 images from artist
16 Clues: world wide web • has concise text • local area network • wide area networks • text editor for mac • newest form of html • 25% slower than paper • hypertext markup language • can use 30 seconds of media • result in termination of access • high level programming language • no more than 5 images from artist • both the sender and the receiver are active • ...
networking concepts 2025-06-13
Across
- multipoint topology
- in star topology, central controller
- another name of nodes
- that covers security, robust& eliminates traffic factor
- WWW stands for
- a communication pathway that transfers data
- object that increases signal strength
- a device that forwards data packets between computer networks
Down
- in bus topology, device linking all nodes in network
- newest evolution in LAN
- term that refers to structure and format of data
- network providing high speed connectivity
- star topology is used in
- LANs stand for
- can cause software to freeze or quit entirely
- internetworking protocol
16 Clues: WWW stands for • LANs stand for • multipoint topology • another name of nodes • newest evolution in LAN • star topology is used in • internetworking protocol • in star topology, central controller • object that increases signal strength • network providing high speed connectivity • a communication pathway that transfers data • can cause software to freeze or quit entirely • ...
Wireless Networks 2020-12-28
Computer networks 2025-04-19
5 Clues: Includes IP and TCP • Central device in a star topology • Data is broken into this before transmission • Popular protocol for uploading and downloading files • Every device needs this to communicate on the internet
G11 Communication 2025-04-10
Across
- Home’s data traffic cop. 家里的数据交警。
- Spans countries, connects ATMs. 覆盖国家,连接ATM。
- Solo worker, like a laptop. 独立工作者,如笔记本。
- One cable links all, old-school style. 单电缆连所有,老式风格。
- Amazon’s way: servers feed clients. 亚马逊模式:服务器供客户端。
- Network for a small space, like an office. 小范围网络,如办公室用。
Down
- Hub-centered, office favorite. 以集线器为中心,办公室最爱。
- Cable-bound, fast but fixed. 电缆束缚,快但固定。
- Weak device leans on server. 弱设备依赖服务器。
- Google Drive’s shared sky. 谷歌云盘的共享天空。
- Web-like links, internet’s backbone. 网状连接,互联网支柱。
- Equal sharing, no boss server. 平等共享,无主服务器。
- Wi-Fi freedom, interference risk. Wi-Fi自由,干扰风险。
- Firm’s own secure data haven. 公司自有的安全数据港。
- Mixed setup for hotel chains. 酒店连锁的混合结构。
15 Clues: Home’s data traffic cop. 家里的数据交警。 • Google Drive’s shared sky. 谷歌云盘的共享天空。 • Weak device leans on server. 弱设备依赖服务器。 • Cable-bound, fast but fixed. 电缆束缚,快但固定。 • Solo worker, like a laptop. 独立工作者,如笔记本。 • Mixed setup for hotel chains. 酒店连锁的混合结构。 • Firm’s own secure data haven. 公司自有的安全数据港。 • Equal sharing, no boss server. 平等共享,无主服务器。 • ...
AI Unit1 Vocab 2024-10-23
Across
- a supervised learning task that involves predicting a continuous output variable based on input features
- a separate subset of data used to assess the performance of a trained machine learning model
- a subset of AI that enables systems to learn from data and improve their performance over time without being explicitly programmed
- an unsupervised learning technique that groups similar data points together based on their characteristics
- techniques that use statistical algorithms and machine learning to identify the likelihood of future outcomes based on historical data
- a subset of data used to train a machine learning model
- a subset of data used to tune the parameters of a machine learning model and prevent overfitting
- specialized form of machine learning involving neural networks with many layers that can learn complex patterns in large amounts of data
Down
- a modeling error that occurs when a machine learning model learns the training data too well
- the process of analyzing large datasets to discover patterns and extract meaningful information
- the process of assessing how well a machine learning model performs
- the process of selecting, modifying, or creating variables to improve the performance of ML models
- a supervised learning task where the goal is to assign input data into predefined categories
- the simulation of human intelligence processes by machines
- a computational model inspired by the way biological neural networks in the human brain work
15 Clues: a subset of data used to train a machine learning model • the simulation of human intelligence processes by machines • the process of assessing how well a machine learning model performs • a modeling error that occurs when a machine learning model learns the training data too well • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
social networks prochazkova, duskova 2014-05-07
Across
- Most famous social network
- Write something here and read what somebody else wrote
- Something like facebook, but older
Down
- One of Google products
- Social network which shares pictures
- Your own webpage
- Share your videos
- You can talk with your friends via webcam
- Email, news and other interesting things
- You can ask for anything
10 Clues: Your own webpage • Share your videos • One of Google products • You can ask for anything • Most famous social network • Something like facebook, but older • Social network which shares pictures • Email, news and other interesting things • You can talk with your friends via webcam • Write something here and read what somebody else wrote
The Internet and Networks 2024-02-20
Across
- A network device that can connect multiple cabled devices.
- A type of card all devices need to access a network
- A network device that provides wireless connection
- WAN stands for....
- An example of wireless transmission with a range of about 15 metres
Down
- LAN stands for ...
- A unique code for all networked devices
- A system used to address devices that are connected to a specific network
- The largest example of a WAN in the world.
- A type of topology with a central point that all other network devices connect to
10 Clues: LAN stands for ... • WAN stands for.... • A unique code for all networked devices • The largest example of a WAN in the world. • A network device that provides wireless connection • A type of card all devices need to access a network • A network device that can connect multiple cabled devices. • An example of wireless transmission with a range of about 15 metres • ...
Neural and Social Networks 2024-05-05
Across
- it stands for interconnected network.
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- a category of linkages that stretch beyond a shared sense of identity.
- a category of linkages that links to people based on a sense pf common identity.
- a type of linkage where in automation, in which the devices (if any) involved in the condition and action are connected to the same gateway.
Down
- websites and apps that allow users and organizations to connect, communicate, share information and form relationships.
- a computer system modeled on the human brain and nervous system.¹
- links to people of groups further up and down the social ladder.
- a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources.
- a social networking website that was founded in February 2004 by Harvard University students Chris Hughes, Andrew McCollum, Dustin Moskovitz, Eduardo Saverin and Mark Zuckerberg.
10 Clues: it stands for interconnected network. • links to people of groups further up and down the social ladder. • a computer system modeled on the human brain and nervous system.¹ • a category of linkages that stretch beyond a shared sense of identity. • a category of linkages that links to people based on a sense pf common identity. • ...
Power Places and Networks 2025-01-27
Across
- multinational union or association in which member countries cede authority and sovereignty on at least some internal matters to the group
- the investment by a company into the stuctures, equipment or organisations of a foreign country
- A type of intergovernmental agreement, often part of a regional intergovernmental organization, where barriers to trade (tariffs and others) are reduced or eliminated among the participating states.
- a state with a dominant position characterised by its extensive ability to exert influence or project power on a global scale.
Down
- the practice of hiring a party outside a company to perform services or create goods.
- A sum of money sent from one person to another often from immigrants to family members back home
- This phenomenon includes all of the varied economic, social, political, cultural and environmental processes that make up globalisation.
- A multigovernmental organisation that works together to promote economic growth, stability, and improved quality of life worldwide.
- Businesses whose operations are spread across the world.
- can be economic, military, or emergency humanitarian
10 Clues: can be economic, military, or emergency humanitarian • Businesses whose operations are spread across the world. • the practice of hiring a party outside a company to perform services or create goods. • the investment by a company into the stuctures, equipment or organisations of a foreign country • ...
ICT crossword 2019-05-17
Privacy in Social Networks and Messengers 2025-10-12
Across
- People who join and use apps.
- Information stored and shared online.
- Control of personal data online.
- A secret code to access an account.
- Type of networks like Facebook and Instagram.
Down
- A system that connects people or computers.
- Technology that protects messages from third parties.
- Popular messenger app with channels and groups.
- App used to send messages.
- Another word for security online.
- Messenger app focused on privacy.
- Encrypted messenger owned by Meta.
12 Clues: App used to send messages. • People who join and use apps. • Control of personal data online. • Another word for security online. • Messenger app focused on privacy. • Encrypted messenger owned by Meta. • A secret code to access an account. • Information stored and shared online. • A system that connects people or computers. • Type of networks like Facebook and Instagram. • ...
Olympus CAN Awareness Week 2021-04-19
9 Clues: Core Value • "A" in CAN • Core Value • "C" in CAN • "N" in CAN • True to _____ • Where can you learn more about the CANs? • This CAN champions disability-related activities • understanding that each individual is unique, and recognizing our individual differences
Socil Media 2023-07-25
8 Clues: A self portrait • facebook homepage • use this symbol # • private conversation • A message sent on twitter • examples of this are netflix,youtube,etc • image,video, or piece of text that is humorous. • Post that becomes very popular in social networks
CPU SCI Terms 2015-09-28
Across
- visits sites on the internet, discovering web pages and building an index to the web’s content based on keywords
- networks that are not geographically close
- detest this when making a good web page ex. Hottest ever
- networks that are geographically close
- Mac users can use this type of text editor when making a web page
- technique used to access unauthorized computers and sends a false IP address and can falsely take advantage of the user's identity
- orders links by relevance to user; relevance is computed by counting the links to a page
- can be increased by high quality graphics, good handwriting, and outbound hypertext links
- use a computer to gain unauthorized access to data in a system
- a group of information on a computer that can be software programs or data
- Window users can use this type of text editor when making a web page
Down
- the information that is on the websites, one of the divisions for large websites
- URL has three main parts: server’s computer name, page’s pathname, and ______
- can be embedded in web pages and displayed by a browser as pictures, mo0vies, and graphics
- up to this percentage of the work but no more than 30 seconds of the music can be used from someone else’s work
- no more than this number of images can be used from one artist or photographer
- translates the hierarchical, human-readable names into the four-number IP address
- hardware that operates the sites, one of the divisions for large websites
18 Clues: networks that are geographically close • networks that are not geographically close • detest this when making a good web page ex. Hottest ever • use a computer to gain unauthorized access to data in a system • Mac users can use this type of text editor when making a web page • Window users can use this type of text editor when making a web page • ...
Civil Engineering 2015-10-16
Across
- Drainage systems
- Building design and stress analysis
- Manage work sites and building structures
- Plan, design, and supervise construction of transportation systems, water systems, and communication networks
Down
- Create plans for buildings and
- They chart land elevation
- Traffic operations
- Water and waste management and treatment
- Soil mechanics and dynamics
9 Clues: Drainage systems • Traffic operations • They chart land elevation • Soil mechanics and dynamics • Create plans for buildings and • Building design and stress analysis • Water and waste management and treatment • Manage work sites and building structures • Plan, design, and supervise construction of transportation systems, water systems, and communication networks
Chloes I.T Crossword 2021-10-29
Across
- the smallest part of an image
- Hardware devices that allows a wi-fi device to connect
- Set of rules that computers communicate by
- another name for web address
- Temporary storage device
Down
- Input device
- Interface where a device is connected
- Routes traffic between networks
- text files retained on computers by browsers
9 Clues: Input device • Temporary storage device • another name for web address • the smallest part of an image • Routes traffic between networks • Interface where a device is connected • Set of rules that computers communicate by • text files retained on computers by browsers • Hardware devices that allows a wi-fi device to connect
Mobile phone anxiety survey says 'nomophobia' on the rise 2019-03-17
8 Clues: link • controlled behaviour • mobile phones softwares • cannot live without something • fear of missing content on a cellphone • feeiling you experience when very stressed • device that helps you connect to social networks • when you cannot forget about something or someone
Networking crossword puzzle 2021-09-14
Across
- brains in the computer
- hardware that connects devices on a network
- a device or cluster that takes requests
- one of the biggest cpu and component companies
- periferal used to type
- device that guides the route
Down
- periferal used to click
- a computer used by one user only
- science that studies complex networks
- the spine of the computer
10 Clues: brains in the computer • periferal used to type • periferal used to click • the spine of the computer • device that guides the route • a computer used by one user only • science that studies complex networks • a device or cluster that takes requests • hardware that connects devices on a network • one of the biggest cpu and component companies
Be Rooted! Set 4 2022-04-20
Across
- The study of nature
- One without light
- A system of geographical networks/lives
- To go against one's self/beliefs
- A place to view animals confined in water
- Placed at the edge or margin
Down
- The area around a circle
- Inflammation of the brain/spinal cord
- Someone who watches the scene on the side
- A medical hand issue
10 Clues: One without light • The study of nature • A medical hand issue • The area around a circle • Placed at the edge or margin • To go against one's self/beliefs • Inflammation of the brain/spinal cord • A system of geographical networks/lives • Someone who watches the scene on the side • A place to view animals confined in water
computing homework 2024-01-14
Across
- / internet that you plug in
- / connects two or more packet networks together
- / device to link computers together
- / where you live
- / internet to plug in
- / smaller segment of a larger message
Down
- / a place where everything is happening over the internet
- / device to exchange data
- / a set of rules
- / you need this to sign up to most things
10 Clues: / a set of rules • / where you live • / internet to plug in • / device to exchange data • / internet that you plug in • / device to link computers together • / you need this to sign up to most things • / smaller segment of a larger message • / connects two or more packet networks together • / a place where everything is happening over the internet
Sam's internet crossword 2023-03-01
Across
- allows user to stream music and videos
- domain name system
- wall a network security system
- directs traffic around a network
- Local area network
- network of computers or devices
Down
- they store and maintain web content
- Internet service provider
- a family of wired computer networking technologies commonly used in local area networks
- Sent using either a wire or wirelessly
10 Clues: domain name system • Local area network • Internet service provider • network of computers or devices • directs traffic around a network • wall a network security system • they store and maintain web content • allows user to stream music and videos • Sent using either a wire or wirelessly • ...
Social News 2023-04-03
Across
- a person who takes part in something
- virtual communities and networks
- the electronic delivery of moving images and sound from a source to a receiver(TV)
- trustworthy, reliable, reasonable
- read up on and investigate
Down
- newspapers, magazines, television, blogs, emails, social media, and radio
- exchanging information
- impact
- Step-by-step method for problem solving
- origin or root of
10 Clues: impact • origin or root of • exchanging information • read up on and investigate • virtual communities and networks • trustworthy, reliable, reasonable • a person who takes part in something • Step-by-step method for problem solving • newspapers, magazines, television, blogs, emails, social media, and radio • ...
ICT SECTORS 2025-06-22
Across
- Writes code to build software applications.
- Provides assistance to users facing technical issues.
- Creates visual content using digital tools.
- Maintains and repairs computer hardware and software.
- Specializes in creating animated visuals.
- Handles customer inquiries over the phone.
Down
- Designs and maintains websites.
- Installs and manages network systems.
- Develops interactive applications for entertainment.
- Ensures the security of computer networks.
10 Clues: Designs and maintains websites. • Installs and manages network systems. • Specializes in creating animated visuals. • Ensures the security of computer networks. • Handles customer inquiries over the phone. • Writes code to build software applications. • Creates visual content using digital tools. • Develops interactive applications for entertainment. • ...
bytetrails7 2025-02-25
Across
- Storing data over the internet
- Protecting data from unauthorized access
- Software managing hardware and software resources
- Virtual representation of physical hardware
Down
- Device that connects multiple networks
- A column in a table
- Secures data by converting it to a coded form
- Smallest unit of data in computing
- High-level programming language
- Set of vertices connected by edges
10 Clues: A column in a table • Storing data over the internet • High-level programming language • Smallest unit of data in computing • Set of vertices connected by edges • Device that connects multiple networks • Protecting data from unauthorized access • Virtual representation of physical hardware • Secures data by converting it to a coded form • ...
Information system security 2025-03-24
Across
- security systems that monitor and control incoming and outgoing network traffic, acting as a barrier between a trusted internal network and external threats, such as hackers or malware.
- malicious software designed to secretly monitor and collect information from a device without the user's consent
- ethical hackers who use their skills to identify and fix security vulnerabilities in systems, often working with organizations to improve security and protect against cyber threats.
- a malicious software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices. This includes viruses.
- networks of compromised devices (often called bots or zombies) that are controlled remotely by cybercriminals to carry out malicious activities
Down
- individuals who illegally hack into systems or networks with malicious intent, such as stealing data, spreading malware, or causing damage. They operate outside the law for personal gain or to cause harm
- the process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized parties can decrypt and read the original information.
- a tactic used by cybercriminals to manipulate people into revealing sensitive information by exploiting trust or emotions, rather than using technical methods.
- a type of cyberattack where attackers impersonate legitimate organizations or individuals to deceive people into revealing sensitive information, such as passwords, credit card numbers, or personal details, usually via email, text messages, or fake websites.
- a cyberattack where multiple compromised computers or devices are used to flood a target server, website, or network with excessive traffic, overwhelming it and causing it to become slow, unresponsive, or crash. The goal is to disrupt access to the targeted service.
10 Clues: malicious software designed to secretly monitor and collect information from a device without the user's consent • a malicious software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices. This includes viruses. • ...
invention 1 2024-04-09
Across
- Adhesive notes with a repositionable backing, facilitating temporary notes and reminders.
- Optical device used to read and decode information encoded in barcodes, streamlining inventory management and retail checkout.
- Integrated circuitry containing the functions of a central processing unit, revolutionizing computing and technology.
- Medical imaging technique producing detailed images of internal body structures using magnetic fields and radio waves.
Down
- Portable storage medium consisting of a thin, flexible magnetic disk enclosed in a square or rectangular plastic shell.
- Transmission medium using thin fibers of glass or plastic to transmit data as light pulses, enabling high-speed communication networks.
- Home entertainment device allowing users to record and playback television programs and movies.
- Electronic communication method allowing users to exchange messages over computer networks, revolutionizing correspondence.
8 Clues: Adhesive notes with a repositionable backing, facilitating temporary notes and reminders. • Home entertainment device allowing users to record and playback television programs and movies. • Integrated circuitry containing the functions of a central processing unit, revolutionizing computing and technology. • ...
Greek and Latin Roots Week 5 - Position 2023-04-03
Across
- to speak ACROSS more than one language
- hints or clues about an event BEFORE it happens
- means BETWEEN the stars
- a CONNECTION between networks
- the name of a PLACE
- happened PRIOR to an event; coming BEFORE in time
- limitless; without END
Down
- system for converying words over DISTANCE through SOUNDS
- when the value of an object is in the MIDDLE
- BEFORE the war
- means BELOW the SEA
- happens at the END
12 Clues: BEFORE the war • happens at the END • means BELOW the SEA • the name of a PLACE • limitless; without END • means BETWEEN the stars • a CONNECTION between networks • to speak ACROSS more than one language • when the value of an object is in the MIDDLE • hints or clues about an event BEFORE it happens • happened PRIOR to an event; coming BEFORE in time • ...
Social Networks 2020-09-04
Across
- Aplicación usada para subir fotos y videos (boomerangs y selfies son algunos ejemplos).
- Aplicación donde puedes subir fotos, compartir memes y conocer gente de todo el mundo, creada por Mark Zuckerberg
Down
- Aplicación usada para chatear y comunicarse con amigos y familiars de ícono verde
- Aplicación usada para hacer videos breves que pueden ser recetas, coreografías, challenges, entre otros.
- Aplicación en la cual puedes ver videos musicales, tutoriales, reseñas y también puedes subir tus propios videos y hacerte famoso/a por la cantidad de visitas que recibas.
5 Clues: Aplicación usada para chatear y comunicarse con amigos y familiars de ícono verde • Aplicación usada para subir fotos y videos (boomerangs y selfies son algunos ejemplos). • Aplicación usada para hacer videos breves que pueden ser recetas, coreografías, challenges, entre otros. • ...
Informatic 2023-04-20
Across
- Coffee with the addition of hot boiled and very frothy milk
- Intangible part of the computer
- Necklaces, Rings, Bracelets, etc.
- Street Dress
Down
- They are strapped to their feet
- Tangible components external to the computer
- Studies the hardware, data networks and software
- Tangible part of a computer
- Elegant party attire
9 Clues: Street Dress • Elegant party attire • Tangible part of a computer • They are strapped to their feet • Intangible part of the computer • Necklaces, Rings, Bracelets, etc. • Tangible components external to the computer • Studies the hardware, data networks and software • Coffee with the addition of hot boiled and very frothy milk
Library and the Internet 2022-05-25
9 Clues: a known symbol • a picture online • main menu page of a site • connected to the Internet • a unique name to identify a person • a system of computers that are connected • a username with password that allows access • a way of sending messages over the internet • interconnect networks that exchange information
Future Jobs 2022-01-15
Across
- discontinue a job here and offer it in another country
- a specialist who’s an authority on something
- can continue for a long time
- a plan
- safety
- outdated and old-fashioned
Down
- someone who takes on gig work
- what we expect to happen in the future
- intelligence advanced computer software
- someone who starts a new company
- work temporary work on a specific project
- protecting systems, networks, and programs from digital attacks
12 Clues: a plan • safety • outdated and old-fashioned • can continue for a long time • someone who takes on gig work • someone who starts a new company • what we expect to happen in the future • intelligence advanced computer software • work temporary work on a specific project • a specialist who’s an authority on something • discontinue a job here and offer it in another country • ...
Mystery Word 2022-04-25
Across
- herb used in Mexican, Chinese and Italian dishes
- California's city of roses
- the mystery word
- one of the days of the week
- a person who works for wages or a salary
- technology used in computer networks
- a rapid spread of disease
Down
- Flying ________, the B-17's nickname
- Shirley ________, actress in Terms of Endearment
- mountains between the Black and Caspian Sea
- parts of a TV show
- to feel great worry over something
12 Clues: the mystery word • parts of a TV show • a rapid spread of disease • California's city of roses • one of the days of the week • to feel great worry over something • Flying ________, the B-17's nickname • technology used in computer networks • a person who works for wages or a salary • mountains between the Black and Caspian Sea • Shirley ________, actress in Terms of Endearment • ...
Chapter 10 Vocab 2014-01-27
Across
- distributing products for amusement
- selling a customer additional related products
- a few firms affect but do not control an industry
- method to communicate publically
- costs equal revenue
- rankings of a tv show or radio show
- short term popular trend
Down
- independent broadcaster that contracts with larger networks
- a retail store with a physical building
- organization that focuses on providing a service
- marketing that focuses on a small target
- time free from work
12 Clues: time free from work • costs equal revenue • short term popular trend • method to communicate publically • distributing products for amusement • rankings of a tv show or radio show • a retail store with a physical building • marketing that focuses on a small target • selling a customer additional related products • organization that focuses on providing a service • ...
Assignment 6 2016-02-22
Across
- transmitting malicious code
- Wide Web Information Superhighway
- Underlined, color coordinated, and identifiable
- Editor editing plan text files
- Text Highlighted Key works and subheadings
- codes or tags used to create a website
- related group of networked computers
Down
- Both the sender and receiver are active at the same time
- Domain Name System
- location area network
- main technology for local area networks
- The use of IT resources to transmit abusive, threatening, or harassing material
- Use legal doctrine that permits limited use of copyrighted material
13 Clues: Domain Name System • location area network • transmitting malicious code • Editor editing plan text files • Wide Web Information Superhighway • related group of networked computers • codes or tags used to create a website • main technology for local area networks • Text Highlighted Key works and subheadings • Underlined, color coordinated, and identifiable • ...
CO-PARENTING 2022-03-21
Across
- shared decision-making
- support ______community agencies, family or friends)
- contributing to support the child financially
- flexibility and willingness to work together
- maintain somewhat similar rules, boundaries, and schedules across households
- frequency of contact with the child
Down
- providing encouragement or emotional help
- involved in their children’s lives
- Identifying parenting styles that participants may have learned from their own ________
- joint efforts of adults who share raising children
- court approved time spent with children
- firmly fixed
- official parental separation through the court system
13 Clues: firmly fixed • shared decision-making • involved in their children’s lives • frequency of contact with the child • court approved time spent with children • providing encouragement or emotional help • flexibility and willingness to work together • contributing to support the child financially • joint efforts of adults who share raising children • ...
SOCIAL MEDIA MARKETING 2025-11-16
Across
- – A moving visual used in posts.
- – Type of media used for marketing.
- – What social media helps a business become.
- – Something a business sells or shows.
- – Promoting products on social networks.
- – What companies ask people to give.
- – The people a business wants to reach.
- – What people do with a post they like.
Down
- – People who see your posts.
- – Name and image of a company.
- – A business that uses social media.
- – What a business should do to comments.
- – A picture used in a good post.
13 Clues: – People who see your posts. • – Name and image of a company. • – A moving visual used in posts. • – A picture used in a good post. • – Type of media used for marketing. • – A business that uses social media. • – What companies ask people to give. • – Something a business sells or shows. • – The people a business wants to reach. • – What people do with a post they like. • ...
peer-to-peer 2023-02-16
9 Clues: computer in a p2p network • not needed in a p2p network • advantage of no central server • something p2p networks can lack • control over all peers (lacked) • all peers have same permissions • can be transferred between peers • difficult to recover on p2p network • saved when managing permissions isn't needed
Social Networks and Entertainment: YouTube 2023-09-21
Across
- What you consume from the web or apps
- Spanish word for people
- Spanish word for profile
- You are one when you use a web page or app
- Opposite to men
- Represented by this symbol
- Spanish word for Visitors
- Spanish word for Internet user
- 60 minutes make an ____
Down
- Opposite to women
- web Spanish word for web page
- People who subscribe to a channel
- A video in Youtube has v_____
- A synonym for "Espectadores" in Spanish
14 Clues: Opposite to men • Opposite to women • Spanish word for people • 60 minutes make an ____ • Spanish word for profile • Spanish word for Visitors • Represented by this symbol • A video in Youtube has v_____ • Spanish word for Internet user • web Spanish word for web page • People who subscribe to a channel • What you consume from the web or apps • ...
Networks and the Internet Vocabulary 2024-12-09
Across
- Device a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- the system responsible for translating domain names like example.com into IP addresses
- System a group of computing devices and programs working together for a common purpose
- the protocol used for transmitting web pages over the Internet
- a system of linked pages, programs, and files
- A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all
Down
- Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
- The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- An agreed-upon set of rules that specify the behavior of some system
- differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
- a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- A type of computer that forwards data across a network
- Network a group of interconnected computing devices capable of sending or receiving data.
- Address The unique number assigned to each device on the Internet
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
16 Clues: a system of linked pages, programs, and files • A type of computer that forwards data across a network • the protocol used for transmitting web pages over the Internet • Address The unique number assigned to each device on the Internet • An agreed-upon set of rules that specify the behavior of some system • ...
technology 2015-03-26
8 Clues: questionnary • connected computers • small remote controlled plane • for alduts it's a transportation • a babies and parents connections • a new technology for teens person • friend of new a generation of humans • a mobile post for going on the internet
internet and network 2023-04-04
8 Clues: Wide Area Network • Local area Network • Network of networks • Communication at a distance • The first network for military • First satellite launched by URRS • Modulate/demodulate analog to digital signal • The channel that helps the transmission of data packets
Objective 4e: Maritime Empires Established 2024-11-15
Across
- A Japanese state that implemented isolationist policies to minimize foreign influence during the period 1450-1750.
- A key trade port in Ming China where foreign trade was restricted under the dynasty’s isolationist policies.
- Competition among European states that drove the establishment of maritime empires and control over trade routes.
- A Central African state whose involvement in global trade increased its regional influence.
Down
- Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence.
- A West African state that gained political and economic power through participation in maritime trade networks.
- Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks.
- A Chinese dynasty that adopted restrictive trade policies to limit the influence of European trade and culture.
8 Clues: A Central African state whose involvement in global trade increased its regional influence. • Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence. • Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks. • ...
On Screen C2 Module 4a and 4b 2024-12-02
Across
- Deserving praise
- Informal networks through which information spreads
- A dangerous, difficult, or otherwise unfortunate situation
- To brag or speak with excessive pride
- Certain to happen; unavoidable
- Not visited by many people; isolated
- In its original, unspoiled condition
- Insufficiently strict
Down
- A valuable substance obtained from elephant tusks
- To envy or resent someone
- To make an issue worse
- ...cure (An unproven or implausible solution)
- Perceptible by touch or measurable
- Extremely unpleasant or annoying
- To negotiate the price of something
- off the...path (Not frequently traveled or visited)
- get off one's... (Stop preaching or speaking dogmatically)
- Emit forcefully and abundantly
- take the ... (Decide to commit fully to something challenging)
19 Clues: Deserving praise • Insufficiently strict • To make an issue worse • To envy or resent someone • Certain to happen; unavoidable • Emit forcefully and abundantly • Extremely unpleasant or annoying • Perceptible by touch or measurable • To negotiate the price of something • Not visited by many people; isolated • In its original, unspoiled condition • ...
internet vocab crossword 2013-03-26
Across
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)\
- A bully who operates online, in cyberspace; To bully onlin
- software used to view various kinds of Internet resources found on the Web
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing
- An unauthorized person who secretly gains access to computer files.
Down
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- OPERATORS – Using keywords such as AND, OR, NOT in web searches to narrow search results.
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- To renew or revitalize; To reload a webpage on the internet
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
11 Clues: A bully who operates online, in cyberspace; To bully onlin • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web • OPERATORS – Using keywords such as AND, OR, NOT in web searches to narrow search results. • ...
INTERNET VOCABULARY 2024-02-14
Across
- An attempt to trick individuals into providing sensitive information, such as usernames, passwords, or credit card details, by posing as a trustworthy entity.
- A secret combination of characters used for user authentication and access to secured information.
- Measures taken to protect systems, networks, and data from unauthorized access, attacks, or damage.
- The process of copying data or files from a remote server or website to a user's device.
- A notification or warning about a potential threat, danger, or important event that requires immediate attention.
Down
- The right of individuals to keep their personal information and activities confidential and protected from unauthorized disclosure.
- A malicious software that can replicate itself and spread to other computers.
- Unauthorized access to computer systems or networks with the intention of gathering, altering, or destroying data.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A fraudulent scheme performed by a deceitful individual, group, or company to gain money or something else of value.
- Software that secretly gathers information about a user's activities without their knowledge and sends it to a third party.
11 Clues: A malicious software that can replicate itself and spread to other computers. • The process of copying data or files from a remote server or website to a user's device. • A secret combination of characters used for user authentication and access to secured information. • ...
Network Devices and Equipment 2023-04-28
Across
- He give us internet
- You havet in your home
- You have it on your home and play games
- He's trying to log into your account
- They should be used to interconnect local or
- networks
- Hes hosting
Down
- This is a networking device used to connect
- network hosts as well as to do data
- It's like the Network Hub
- Its a Cable for internet
- A router, which is a protocol-dependent device
12 Clues: networks • Hes hosting • He give us internet • You havet in your home • Its a Cable for internet • It's like the Network Hub • network hosts as well as to do data • He's trying to log into your account • You have it on your home and play games • This is a networking device used to connect • They should be used to interconnect local or • ...
Internet and the World Wide Web 2023-07-24
Across
- connects hosts together
- method by which websites are accessed
- a worldwide collection of computer networks
- the internet is known as...
- 32-bit number or 128-bit number
- shortened electronic mail
Down
- the storage of data online
- a sender or receiver computer
- protocolis used to send messages
- protocol that identifies different computers connected to the internet
- sophisticated devices which data can travel from one host to another
- a collection of linked webpages
12 Clues: connects hosts together • shortened electronic mail • the storage of data online • the internet is known as... • a sender or receiver computer • a collection of linked webpages • 32-bit number or 128-bit number • protocolis used to send messages • method by which websites are accessed • a worldwide collection of computer networks • ...
COMPUTER SCIENCE KEY WORDS 2025-10-09
Across
- a network built of networks
- portable computer
- facility allowing portable devices to connect to the internet
- a software application for looking at websites
- a service on the internet
- fake Wi-Fi network used to steal data
Down
- the way data is transferred through devices
- devices connected for communication
- a set of rules on how to communicate
- a website that will show links
- a remote computer that has a website
- a cyber crime
12 Clues: a cyber crime • portable computer • a service on the internet • a network built of networks • a website that will show links • devices connected for communication • a set of rules on how to communicate • a remote computer that has a website • fake Wi-Fi network used to steal data • the way data is transferred through devices • a software application for looking at websites • ...
Y6_Term2 2025-11-24
Across
- two or more computers connected to share resources
- example of primary storage
- the number of bits in a byte
- raw or unorganized facts
- it turns data into information
- network that connects computers worldwide
- technology for wired networks
Down
- unit between Kilobyte and Gigabyte
- example of a web browser
- an example of a search engine
- the device that connects computers in a local network
- text we use to search online
12 Clues: example of a web browser • raw or unorganized facts • example of primary storage • the number of bits in a byte • text we use to search online • an example of a search engine • technology for wired networks • it turns data into information • unit between Kilobyte and Gigabyte • network that connects computers worldwide • two or more computers connected to share resources • ...
