networks Crossword Puzzles

Comp I Semester Test 2023 2023-05-09

Comp I Semester Test 2023 crossword puzzle
Across
  1. what the speed of a computer is measured in.
  2. read only memory.
  3. a unit of digital information that consists of 8 bits.
  4. known as volatile memory.
  5. a global network of computing devices communicating with each other in some way, whether they're sending emails, downloading files, or sharing websites.
  6. stores either the value 0 or 1.
  7. a protocol that uniquely identify devices using IP addresses and provides a routing strategy to send data to a destination IP address.
  8. a protocol used to convert a domain name into an IP address.
  9. compression algorithms that reduce the size of files without losing any information in the file.
  10. networks connected using physical connection such as cables.
Down
  1. the physical components of a computer.
  2. any group of interconnected computing devices capable of sending or receiving data
  3. a massive network of webpages, programs, and files that are accessible via URLs.
  4. shows how much data can be transferred across the communication media in a single second.
  5. a set of instructions, data, or programs used to operate a computer and execute specific tasks.
  6. a set of rules that have been agreed so that all devices on a network work in the same way and can understand each other.
  7. networks that use radio waves to send data through the air.
  8. 1's and 0's.
  9. a network that extends over a large geographic area and is composed of many, many LANs.
  10. compression algorithms that reduce the size of files by discarding the less important information in a file.
  11. a network that covers a limited area like a house or school.

21 Clues: 1's and 0's.read only memory.known as volatile memory.stores either the value 0 or 1.the physical components of a computer.what the speed of a computer is measured in.a unit of digital information that consists of 8 bits.networks that use radio waves to send data through the air.a protocol used to convert a domain name into an IP address....

Security Policy 2024-12-08

Security Policy crossword puzzle
Across
  1. creates a barrier between networks so that potentially harmful packets can't enter or leave protected networks.
  2. used to encrypt files and folders in windows OSs.
  3. requires a user to supply two or more types of authentication.
  4. a document that describes the rules governing access to an organization's information resources, enforcement of these rules, and steps taken if rules are breached.
  5. a framework for other protocols that provide encryption and authentication.
  6. is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
  7. is a common tool used by many Linux administrators.
  8. prevents people from using eavesdropping technology, such as protocol analyzer, to capture packets.
  9. is a good secrity enhancement for servers that aren't physically secure and for mobile devices at risk of being lost or stolen.
  10. An important part for maintaining a system.
  11. backs up the disk sector by sector to create an exact image of the disk's contents.
  12. used in a windows domain environment and provides mutual authentication.
Down
  1. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use.
  2. a server role that makes it possible for administrators to take control of Microsoft product updates.
  3. the built-in firewall in most linux distributions.
  4. a Linux files tool that offers a trash can for deleting files permanently.
  5. backs up any files that changed since the last full or incremental backup.
  6. creates a barrier between two entities.
  7. only backs up files that have changed since the last full backup.
  8. the most widely method for encrypting data.

20 Clues: creates a barrier between two entities.the most widely method for encrypting data.An important part for maintaining a system.used to encrypt files and folders in windows OSs.the built-in firewall in most linux distributions.is a common tool used by many Linux administrators.requires a user to supply two or more types of authentication....

Era 1 - 1.3 - South and Southeast Asia 2025-09-08

Era 1 - 1.3 - South and Southeast Asia crossword puzzle
Across
  1. – Thai kingdom known for its adoption of Buddhism and cultural achievements.
  2. – Language blending Persian, Arabic, and South Asian influences, developed under Delhi Sultanate rule.
  3. – Hindu social hierarchy that structured society and reinforced rulers’ legitimacy in India.
  4. – Kingdoms like Srivijaya and Majapahit that gained wealth and power by controlling trade networks at sea.
  5. – Famous Hindu-Buddhist temple complex built by the Khmer Empire, symbolizing state power and religion.
  6. – Maritime empire in Sumatra that prospered by controlling Indian Ocean trade and supporting Buddhism.
  7. – Monument built in Delhi after Islamic conquest, symbolizing Muslim dominance in North India.
  8. – Hindu devotional movement emphasizing personal connection to a deity, often challenging caste distinctions.
Down
  1. – States in mainland South/Southeast Asia that relied on agriculture and territorial control for power.
  2. – Hindu kingdom in southern India that resisted Muslim invasions and promoted Hindu culture.
  3. – Indian Ocean trade networks linking South and Southeast Asia with Africa, the Middle East, and China.
  4. – Long-standing South Asian belief system that shaped social order and political legitimacy through the caste system.
  5. – Religion that spread from India into Southeast Asia, blending with local traditions in places like Srivijaya.
  6. – Muslim government in northern India (1206–1526) that unified much of the region under Islamic power.
  7. – Act of spreading a religion to new followers; Muslims in South and Southeast Asia often used this approach.
  8. – Powerful empire in Cambodia that built Angkor Wat and blended Hindu-Buddhist influences.
  9. – Religion that spread to South and Southeast Asia through trade and conquest, influencing politics and culture.
  10. – Mystical form of Islam that appealed to many in South Asia through tolerance and emotional devotion.
  11. – Buddhist kingdom in Sri Lanka known for irrigation systems and monastic support of the state.
  12. – Maritime empire in Indonesia that controlled trade routes and resisted Mongol expansion.

20 Clues: – Thai kingdom known for its adoption of Buddhism and cultural achievements.– Powerful empire in Cambodia that built Angkor Wat and blended Hindu-Buddhist influences.– Maritime empire in Indonesia that controlled trade routes and resisted Mongol expansion.– Hindu kingdom in southern India that resisted Muslim invasions and promoted Hindu culture....

Chapter 3.2 Crossword 2026-02-24

Chapter 3.2 Crossword crossword puzzle
Across
  1. Information a company needs to keep private to protect from theft.
  2. Illegally accessing or altering digital devices, software, or networks.
  3. Prevents your browser from showing ads that can contain malware.
  4. Work created by company employees on the job that is owned by that company.
  5. Malware disguised to appear as a useful or common application.
  6. Appropriate behavior in a business setting, such as respecting property and time.
  7. Bits of data stored on your computer that record visited websites.
  8. Identifies the manner in which employees should behave while at work.
  9. A number used to identify an electronic device connected to the Internet.
  10. Tools that prevent unauthorized Internet surfing or visiting selected websites.
  11. Software that spies on a computer to capture private info like passwords.
  12. Overstating features and benefits of products or making false claims.
  13. Rules and standards for using company-owned equipment and networks.
  14. Stealing physical mail to commit identity theft.
Down
  1. Applying ethics to messages to make sure all communication is honest.
  2. Use of fraudulent emails to trick people into providing private data.
  3. Software programs intended to damage, destroy, or steal data.
  4. Software referred to as antivirus or antimalware.
  5. Malware similar to Trojans that can self-replicate to infect other devices.
  6. A document that dictates how business should be conducted.
  7. Specific information about a company is never shared without clearance.
  8. Stealing personal information to commit theft or fraud.
  9. Behaving with sensitivity to social, environmental, and economic issues.
  10. Program designed to negatively impact a system by infecting other files.
  11. Examining and blocking or deleting material considered inappropriate.

25 Clues: Stealing physical mail to commit identity theft.Software referred to as antivirus or antimalware.Stealing personal information to commit theft or fraud.A document that dictates how business should be conducted.Software programs intended to damage, destroy, or steal data.Malware disguised to appear as a useful or common application....

Vocab Te 2026-03-05

Vocab Te crossword puzzle
Across
  1. A service that encrypts your online activity and makes your connection appear to come from another location.
  2. A major internet backbone provider that connects directly with one another without paying for transit.
  3. Protective software that scans for and removes harmful programs from a system.
  4. A phishing scheme aimed specifically at high-level officials or executives.
  5. A digital barrier that filters traffic entering and leaving a network based on security rules.
  6. A machine that supplies information or services to other devices connected to it.
  7. Breaking into a computer system or network without permission.
  8. Online content that is hidden from search engine results but is usually legal and password-protected.
  9. Sending fake messages that look real in order to trick someone into giving personal information.
  10. Quietly collecting information about a system without directly engaging with it.
  11. Using psychological tricks to persuade someone to share private details.
Down
  1. The final stretch of the network that delivers internet service from a provider to your location.
  2. A massive global system that links computers and devices together so they can exchange information.
  3. The publicly viewable part of the internet that search engines can list and display.
  4. Secretly rerouting someone to a counterfeit website to capture their private data
  5. An agreed-upon communication standards that control how data moves across networks.
  6. A security method that requires two or more types of verification.
  7. Internet providers that rely on higher-level backbone networks for global access.
  8. A concealed section of the internet accessed through special tools, designed to keep users anonymous.
  9. A protected facility filled with computer equipment that stores and manages digital information.

20 Clues: Breaking into a computer system or network without permission.A security method that requires two or more types of verification.Using psychological tricks to persuade someone to share private details.A phishing scheme aimed specifically at high-level officials or executives....

IPTV Times Table 2 2012-11-16

IPTV Times Table 2 crossword puzzle
Across
  1. Short for Media Gateway Control Protocol
  2. A method of transmission in which all bits of a character are sent simultaneously over separate lines to a high speed printer or other locally attached peripheral
  3. Data transmission over a circuit capable of transmitting in one preassigned direction only
  4. An application that enables a desktop, laptop or workstation computer to function as a telephone via VOIP
  5. A communications channel or medium having a bandwidth sufficient to carry multiple voice/video or data signals simultaneously
  6. A device that allows user to send commands to a computer that is somewhere else
  7. A group of bits, including address, data and control elements, that are switched and transmitted together
  8. A single device capable of both sending and receiving information
  9. Used in IP networks to break up larger networks into smaller networks
  10. A connection-oriented protocol that employs the virtual circuit approach
  11. Provides broadband access network over traditional twisted copper pair and faster than ADSL
  12. Television programming that requires payment upfront usually on a monthly basis as a subscription fee
  13. TCP flow control process used to control the number of unacknowledged data segments that are sent between transmissions
  14. Provides a standard method for transporting multi-protocol datagrams over point-to-point links
  15. Unreliable and connectionless
Down
  1. One of the three basic modulations of adding information to a sine wave signal in which its phase is varied to impose information on it
  2. Information which travels from the user to the internet or to a central office or headend
  3. A technique for combining many signals on a single circuit by interleaving bits or bytes of data from successive channels
  4. The range of electromagnetic radio frequencies used in transmission of voice, data and television
  5. Any common carrier network that provides circuit switching between public users
  6. Transmission in which the data character and bits are transmitted at a fixed rate with the transmitter and receiver being synchronized
  7. A functional unit of a node through which data can enter or leave a data network
  8. Plastic cards the viewer can insert in the set-top box
  9. Application layer signaling protocol
  10. The length of an electromagnetic waveform as measured from any point on one wave to the corresponding point on an adjacent wave
  11. A specific set of rules, procedures or conventions that two data devices must accept and use to be able to communicate
  12. A type of scanning that may result in a screen flicker
  13. Used to manage the membership of Internet Protocol multicast groups
  14. Telecommunications companies that sell internet access
  15. The device which enables anyone to compute, word process, or perform more complicated functions

30 Clues: Unreliable and connectionlessApplication layer signaling protocolShort for Media Gateway Control ProtocolPlastic cards the viewer can insert in the set-top boxA type of scanning that may result in a screen flickerTelecommunications companies that sell internet accessA single device capable of both sending and receiving information...

Computer Acronyms 2024-09-06

Computer Acronyms crossword puzzle
Across
  1. A standard interface designed for IBM PC-compatible computers.
  2. An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
  3. A type of non-volatile memory used in computers and other electronic devices.
  4. A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  5. A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
  6. A proprietary journaling file system developed by Microsoft in the 1990s.
  7. An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
  8. A small economy car made by the British Motor Corporation.
  9. Used to interact with computer programs with text-based commands.
  10. The most important processor in a given computer.
  11. A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
  12. Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
  13. A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
  1. A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
  2. A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
  3. A video display interface developed by the Digital Display Working Group.
  4. A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
  5. A video display controller and accompanying de facto graphics standard.
  6. A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
  7. A solid-state storage device.
  8. A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
  9. A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
  10. A computer hardware component that connects a computer to a computer network.
  11. An industry standard that allows data exchange and delivery of power between many types of electronics.
  12. A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.

25 Clues: A solid-state storage device.The most important processor in a given computer.A small economy car made by the British Motor Corporation.A standard interface designed for IBM PC-compatible computers.Used to interact with computer programs with text-based commands.A video display controller and accompanying de facto graphics standard....

Technology 2023-04-17

Technology crossword puzzle
Across
  1. - Solid-State Drive, storage device that uses flash memory
  2. - Mobile device with a touch screen interface
  3. - Machine designed to perform tasks automatically
  4. - Wireless networking technology for local area networks
  5. - Automated device that performs tasks
  6. HEADSET - Virtual reality head-mounted display
  7. - Security system that controls access to a computer network
  8. - Video or audio content delivered over the internet in real-time
  9. - Mobile device that can perform various tasks
  10. - Reality technology that overlays digital information onto the real world
  11. - Display that can sense and respond to touch input
  12. - Technology that uses radio waves for communication
  13. - Person who uses their technical skills to gain unauthorized access to computer systems
  14. - Software that manages computer hardware and software resources
  15. - Process of creating computer software
  16. - Intelligence created by computer systems
  17. - Digital ledger used for secure transactions
  18. - Playing electronic games
  19. - Fifth generation wireless technology for mobile networks
  20. - Electronic mail system for sending and receiving messages
  21. - Physical components of a computer system
  22. - Science and engineering of manipulating matter on a tiny scale
  23. - Video camera that streams or records video
Down
  1. - Collection of data that can be accessed, managed, and updated
  2. - Additive manufacturing process of creating three-dimensional objects
  3. - Output device used to create hard copies of documents
  4. - Buying and selling goods
  5. - Global computer network
  6. - Wireless technology used for short-range communication
  7. - Malicious software that can harm computer systems
  8. - Input device used for typing
  9. - Funding a project through small contributions from many people
  10. - Software used to access the internet and view websites
  11. - Output device used to produce sound
  12. - Input device used to capture audio
  13. - High-Definition Multimedia Interface, digital audio and video interface
  14. - Programs and data used by a computer
  15. - Reality technology that simulates a three-dimensional environment
  16. - Neural networks used for machine learning
  17. - Digital or virtual currency that uses cryptography for security
  18. - Photography using electronic sensors to capture images
  19. - Portable computer that can be used on the go
  20. - Computer system that provides services to other computers over a network
  21. - Step-by-step procedure for solving a problem
  22. - Writing computer code to create software
  23. CODE - Two-dimensional barcode used for storing information
  24. - Universal Serial Bus, standard interface for connecting computer peripherals
  25. - Input device used to control a computer
  26. - Device that converts digital signals to analog signals for transmission over phone lines
  27. - Input device used to digitize documents
  28. - Internet of Things, network of interconnected devices and appliances
  29. - Networking device used to connect multiple devices to a network
  30. - Network of remote servers used for storing and managing data

53 Clues: - Global computer network- Buying and selling goods- Playing electronic games- Input device used for typing- Input device used to capture audio- Output device used to produce sound- Automated device that performs tasks- Programs and data used by a computer- Process of creating computer software- Input device used to control a computer...

ISCC - Chapter 4 2025-11-27

ISCC - Chapter 4 crossword puzzle
Across
  1. — Open record maintained by the community for verifying transactions
  2. — Services triggered by a user’s real-time geographic position
  3. — Generation that learns, reacts, and thinks differently due to lifelong hyper-connectivity
  4. — AI branch that captures, stores, and processes images
  5. — Products delivered electronically with no physical form
  6. — Digital platform where supply directly meets demand
  7. — Technology that enables people to form interest-based communities online
  8. — Technology that simulates reasoning, perception, and problem-solving
  9. — Information system that embeds AI in its decision-making
  10. — Information system that supports content sharing among user communities
  11. — Network-based business model seamless across devices and platforms
  12. — Innovation that reshapes industries and behaviours in society
  13. — Digital platform that connects drivers and riders for transport services
  14. — System enabling real-time reservations and digital payments
  15. — Facility enabling fast shipping for digital retail operations
  16. — Technique enabling secure transfer of digital funds between parties
  17. — AI system that stores knowledge and makes inferences like a human specialist
  18. — Online buying and selling supported by integrated inventory and fulfilment networks
  19. — A community transformed by integration of advanced technologies
  20. — Secret cryptographic credential used to authorise digital transactions
  21. — Insights from business intelligence showing future trends
  22. — Digital money secured by cryptography and resistant to counterfeiting
Down
  1. — Organization built entirely on digital platforms and networks
  2. — The key digital-money flaw where a single token could be duplicated
  3. — Describes Generation Z’s constant immersion in digital communication
  4. — Technologies providing historical, current, and predictive business insights
  5. — Digital model where services are requested and delivered instantly
  6. — Next-generation commerce integrating apps, supply chain, and data
  7. — Economic model built on digital intermediaries and user networks
  8. — Digital services enhanced with AI and continuous data learning
  9. — Digital financial transactions conducted through smartphone apps
  10. — Technology that subtly influences behaviour and decision-making
  11. — Computing system designed to mimic the human brain’s processing
  12. — Chain of cryptographically linked blocks storing immutable transaction records
  13. — First cryptocurrency created to solve the double-spend problem
  14. — The act of publishing and distributing digital media online
  15. — Behaviour and thinking shaped by technology and the internet
  16. — Providers, users, and groups that shape SMIS interactions
  17. — Group of users connected by shared interests on social platforms
  18. — Digital process that reduces or removes the need for human intervention
  19. — AI that adjusts behaviour based on past outcomes
  20. — Mechanical systems capable of performing high-precision repetitive tasks
  21. — Cryptographic identifier shared publicly for receiving digital currency
  22. — Computer-generated environment reproducing real-world tasks
  23. — Capability allowing a computer to understand spoken or written human language

45 Clues: — AI that adjusts behaviour based on past outcomes— Digital platform where supply directly meets demand— AI branch that captures, stores, and processes images— Products delivered electronically with no physical form— Information system that embeds AI in its decision-making— Providers, users, and groups that shape SMIS interactions...

Module 4 Crossword 2019-04-26

Module 4 Crossword crossword puzzle
Across
  1. It is short for malicious software.
  2. Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
  3. This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
  4. Encrypted files or encrypted communication is unreadable to ________ viewers.
  5. Hackers use software known as a packet sniffer to read ________ traffic.
  6. This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
Down
  1. This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
  2. The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
  3. Process of attempting to reduce or eliminate harmful effects of the breach.
  4. This is the security principle that protects data from inappropriate modification or corruption.
  5. An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
  6. A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
  7. Antivirus software prevents, ________, and removes viruses.
  8. This sends traffic from private networks to the Internet and from the Internet to private networks.
  9. Displaying unwanted advertisements and redirecting web browsers is an example of this.

15 Clues: It is short for malicious software.Antivirus software prevents, ________, and removes viruses.Hackers use software known as a packet sniffer to read ________ traffic.Process of attempting to reduce or eliminate harmful effects of the breach.Encrypted files or encrypted communication is unreadable to ________ viewers....

Computer Literacy History of the Internet 2022-01-09

Computer Literacy History of the Internet crossword puzzle
Across
  1. a piece of computer hardware or software that accesses a service made available by a server
  2. markup language used to make web pages
  3. he gulf between those who have ready access to computers and the internet, and those who do not.
  4. The acronym for a web page address
  5. a program of coordinated, evolving projects sponsored by the National Science Foundation from 1985 to 1995 to promote advanced research and education networking in the United States
  6. a piece of computer hardware or software that provides functionality for other programs or devices, called "clients".
  7. the first internet browser
  8. The computer scientist who is primarily remembered for having championed the creation of ARPANET, an early Internet.
  9. The set of communications protocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol and the Internet Protocol.
  10. a computer network that connects smaller networks. They allow localized networks to communicate with one another across great distances.
  11. (vc) The co-inventor of the TCP/IP protocols and was responsible for originating DARPA's Internet program. Known as one of the “Fathers of the Internet”
  12. Refers to a website address. This is what users type in a browser's search bar to directly access the website. It is unique and cannot be shared between different sites.
  13. computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
  14. Best known as the inventor of the World Wide Web
  15. a computer program with a graphical user interface for displaying and navigating between web pages.
Down
  1. a rapid rise in U.S. technology stock equity valuations fueled by investments in Internet-based companies in the late 1990s.
  2. an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
  3. the state of political hostility that existed between the Soviet bloc countries and the US-led Western powers from 1945 to 1990.The reason the internet was created
  4. a mode of data transmission in which a message is broken into a number of parts which are sent independently, over whatever route is optimum
  5. a common network protocol used on the Internet and also inside a LAN (local network). ... Telnet is one of the simplest ways to exchange data between two computers.
  6. a set of computers sharing resources located on or provided by nodes. The computers use common communication protocols over digital interconnections to communicate with each other.
  7. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  8. a Unix-based system for transferring data over phone lines via a dial-up connection.
  9. _________.com, the first and oldest registered web site
  10. (rk)The co-inventor of the TCP/IP protocols and was responsible for originating DARPA's Internet program. Known as one of the “Fathers of the Internet”
  11. a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
  12. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  13. The most popular search engine
  14. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  15. The forerunner of the Internet, was a pioneering long-haul network funded by the U.S. Department of Defense

30 Clues: the first internet browserThe most popular search engineThe acronym for a web page addressmarkup language used to make web pagesBest known as the inventor of the World Wide Web_________.com, the first and oldest registered web sitea Unix-based system for transferring data over phone lines via a dial-up connection....

Unit 6 Vocab Crossword 2021-09-28

Unit 6 Vocab Crossword crossword puzzle
Across
  1. offensive maneuver that targets computer information systems, computer networks, infrastructures
  2. the practice of protecting critical systems and sensitive information from digital attacks
  3. is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization
  4. are criminals who break into computer networks with malicious intent.
  5. slang term used to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems
  6. the use of computer-based technique such as hacking as a form of civil disobedience
  7. a relatively unskilled individual who uses scripts or programs
  8. prevents someone watching your connection from knowing what websites you visit
  9. parts of the World Wide Web whose contents are not indexed by standard web search-engines.
  10. is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle
Down
  1. a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  2. allows developers to discover and resolve bugs before the general public is aware of such bug
  3. a path or means by which an attacker or hacker can gain access to a computer or network server
  4. the gaining of unauthorized access to data in a system or computer.
  5. open-source software for enabling anonymous communication.

15 Clues: open-source software for enabling anonymous communication.a relatively unskilled individual who uses scripts or programsthe gaining of unauthorized access to data in a system or computer.are criminals who break into computer networks with malicious intent.prevents someone watching your connection from knowing what websites you visit...

NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17

NETWORKING CONCEPTS AND CYBER ETHICS crossword puzzle
Across
  1. an illegal intrusion into a computer system or network
  2. it is an act of harming or harassing a person through information technology in a deliberate manner
  3. two or more computers and peripheral devices are connected within a small area
  4. a computer network that is mainly created for an individual person
  5. it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
  6. it enables you to connect your computers to the available internet connection over the existing telephone lines
  7. unwanted bulk emails that come from unknown sources
  8. a device that connects two different types of networks with each other
Down
  1. a program or a set of programs that disrupts the normal functioning of a computer
  2. a network device that is used to connect all the computers in a network with each other
  3. this kind of network connects two or more computers located at distant places
  4. criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
  5. a larger network than Lan and is spread across the city
  6. being aware of ethical practices and behaving responsibly and appropriately while using the internet
  7. the act of using or imitating the language and thoughts of another person as one's original work

15 Clues: unwanted bulk emails that come from unknown sourcesan illegal intrusion into a computer system or networka larger network than Lan and is spread across the citya computer network that is mainly created for an individual persona device that connects two different types of networks with each other...

Module 4 Crossword 2019-04-26

Module 4 Crossword crossword puzzle
Across
  1. This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
  2. It is short for malicious software.
  3. Displaying unwanted advertisements and redirecting web browsers is an example of this.
  4. This is the security principle that protects data from inappropriate modification or corruption.
  5. An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
  6. Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
  7. Encrypted files or encrypted communication is unreadable to ________ viewers.
  8. Hackers use software known as a packet sniffer to read ________ traffic.
Down
  1. This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
  2. The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
  3. This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
  4. A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
  5. Process of attempting to reduce or eliminate harmful effects of the breach.
  6. Antivirus software prevents, ________, and removes viruses.
  7. This sends traffic from private networks to the Internet and from the Internet to private networks.

15 Clues: It is short for malicious software.Antivirus software prevents, ________, and removes viruses.Hackers use software known as a packet sniffer to read ________ traffic.Process of attempting to reduce or eliminate harmful effects of the breach.Encrypted files or encrypted communication is unreadable to ________ viewers....

Module 4 Crossword 2019-04-26

Module 4 Crossword crossword puzzle
Across
  1. This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
  2. Process of attempting to reduce or eliminate harmful effects of the breach.
  3. Displaying unwanted advertisements and redirecting web browsers is an example of this.
  4. This is the security principle that protects data from inappropriate modification or corruption.
  5. Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
  6. Hackers use software known as a packet sniffer to read ________ traffic.
  7. Antivirus software prevents, ________, and removes viruses.
  8. It is short for malicious software.
Down
  1. The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
  2. This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
  3. Encrypted files or encrypted communication is unreadable to ________ viewers.
  4. A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
  5. An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
  6. This sends traffic from private networks to the Internet and from the Internet to private networks.
  7. This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.

15 Clues: It is short for malicious software.Antivirus software prevents, ________, and removes viruses.Hackers use software known as a packet sniffer to read ________ traffic.Process of attempting to reduce or eliminate harmful effects of the breach.Encrypted files or encrypted communication is unreadable to ________ viewers....

Syys Sanaristikko :) 2013-10-13

Syys Sanaristikko :) crossword puzzle
Across
  1. I am known for my printers.
  2. I am the second largest non-oil company in Texas.
  3. An Indian-born IIT (Kanpur) graduate founded me in 1996 and now I'm a $4.36b US company head-quarted in California :)
  4. I was founded in 2000 as Zepton Networks.
  5. Over one third of the world's wireless calls travel via networks owned by my customers !!!
  6. In April 2006, a dispute between Reliance Communications and me over royalty fees cost me approximately $11.7b in market capitalization. In July 2007, Reliance and me decided to settle the matter and agreed to expand the use of CDMA technology in India.
  7. I generate "traffic generators" :)
  8. I was founded in 1895 and now bankrupt...IP phones and Secure Routers are my speciality.
Down
  1. I am the largest telecommunications equipment maker in the world, having overtaken Ericsson in 2012.
  2. I am an American company that designs and manufactures electronic and bio-analytical measurement instruments and equipment for measurement and evaluation.
  3. I acquired Renesas Mobile Corporation last month.
  4. The world's largest ever manual telephone exchange, serving 60,000 lines, was installed by me in Moscow in 1916.
  5. I was carved out in 2000 from Lucent Technologies.
  6. My parents kept (the second half of) my birth place as my name :)
  7. I share my birthday with the auther of this crossword but in the year 1847 at Berlin :) I am famous when I am called with 'Nokia' :)

15 Clues: I am known for my printers.I generate "traffic generators" :)I was founded in 2000 as Zepton Networks.I acquired Renesas Mobile Corporation last month.I am the second largest non-oil company in Texas.I was carved out in 2000 from Lucent Technologies.My parents kept (the second half of) my birth place as my name :)...

IT_KD 2023-12-04

IT_KD crossword puzzle
Across
  1. A networking device that directs data traffic between different computer networks.
  2. A high-level programming language known for its readability and versatility.
  3. The process of identifying and fixing errors or bugs in software code.
  4. A widely-used programming language that adds interactivity and dynamic content to web pages.
  5. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  6. A structured collection of data organized for efficient retrieval, storage, and management, typically using tables and relationships.
  7. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. The delivery of computing services, including storage, processing power, and software, over the internet.
  2. The standard markup language for creating web pages and web applications.
  3. A set of rules and tools for building software applications, enabling them to communicate with each other.
  4. A step-by-step set of instructions or rules to solve a specific problem or perform a particular task.
  5. A computer or system that provides resources, services, or data to other computers, known as clients, in a network.
  6. The process of converting information into a code to secure it from unauthorized access or use.
  7. A pre-built structure or set of tools that provides a foundation for software development, making it easier to create and manage applications.
  8. Any software intentionally designed to harm or exploit computer systems, including viruses, worms, and ransomware.

15 Clues: The process of identifying and fixing errors or bugs in software code.The standard markup language for creating web pages and web applications.A high-level programming language known for its readability and versatility.A networking device that directs data traffic between different computer networks....

TV Production Terms 2024-03-05

TV Production Terms crossword puzzle
Across
  1. The person responsible for overseeing the creative aspects of filming and directing actors.
  2. The real-time transmission of a TV show as it is being filmed or performed.
  3. A visual representation of the scenes in a TV show, often used in pre-production planning.
  4. The person or team responsible for managing the overall production process, including budgeting and scheduling.
  5. The process of selecting and assembling footage to create the final version of a TV show.
  6. The licensing of a TV show for broadcast by multiple networks or stations.
  7. The process of adjusting and enhancing the color of footage to achieve a desired look or style.
  8. The final stage of post-production where all elements of the TV show are combined into a finished product ready for distribution.
Down
  1. The creation of the storyline, dialogue, and scene directions for a TV show.
  2. The distribution of the finished TV show to audiences through television networks, streaming platforms, or other channels.
  3. The art of capturing images on film or digital media, including camera work, lighting, and framing.
  4. The phase of creating a TV show where filming occurs.
  5. The phase of production that involves editing, visual effects, sound mixing, and other enhancements after filming is complete.
  6. The process of selecting actors for roles in a TV show.
  7. The process of combining and balancing audio elements, including dialogue, music, and sound effects.
  8. The measurement of audience size and demographics for a TV show, used to determine its popularity and advertising revenue.

16 Clues: The phase of creating a TV show where filming occurs.The process of selecting actors for roles in a TV show.The licensing of a TV show for broadcast by multiple networks or stations.The real-time transmission of a TV show as it is being filmed or performed.The creation of the storyline, dialogue, and scene directions for a TV show....

puzzle-corner-6 2024-09-22

puzzle-corner-6 crossword puzzle
Across
  1. The smallest unit of data in a computer, representing a binary value of either 0 or 1.
  2. A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
  3. A clickable link in a web page that directs users to another location, such as another web page or resource.
  4. A step-by-step procedure for solving a problem or completing a task.
  5. An intermediary server that relays requests from clients seeking resources from other servers.
  6. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  7. A storage layer that temporarily holds frequently accessed data to improve retrieval speed.
  8. A copy of data stored separately to prevent loss in case of failure or corruption.
  9. The maximum amount of data that can be transmitted over a network in a given time, affecting speed and performance.
  10. A fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity.
Down
  1. A new version of a software program that includes improvements, bug fixes, or new features.
  2. A device that forwards data packets between computer networks, directing traffic on the internet.
  3. A digital representation or character created to represent a user in virtual environments or online games.
  4. A device that connects two different networks and allows them to communicate.
  5. The delivery of computing services over the internet, allowing for on-demand access to storage and applications.

15 Clues: A step-by-step procedure for solving a problem or completing a task.A device that connects two different networks and allows them to communicate.A copy of data stored separately to prevent loss in case of failure or corruption.The smallest unit of data in a computer, representing a binary value of either 0 or 1....

NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17

NETWORKING CONCEPTS AND CYBER ETHICS crossword puzzle
Across
  1. an illegal intrusion into a computer system or network
  2. it is an act of harming or harassing a person through information technology in a deliberate manner
  3. two or more computers and peripheral devices are connected within a small area
  4. a computer network that is mainly created for an individual person
  5. it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
  6. it enables you to connect your computers to the available internet connection over the existing telephone lines
  7. unwanted bulk emails that come from unknown sources
  8. a device that connects two different types of networks with each other
Down
  1. a program or a set of programs that disrupts the normal functioning of a computer
  2. a network device that is used to connect all the computers in a network with each other
  3. this kind of network connects two or more computers located at distant places
  4. criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
  5. a larger network than Lan and is spread across the city
  6. being aware of ethical practices and behaving responsibly and appropriately while using the internet
  7. the act of using or imitating the language and thoughts of another person as one's original work

15 Clues: unwanted bulk emails that come from unknown sourcesan illegal intrusion into a computer system or networka larger network than Lan and is spread across the citya computer network that is mainly created for an individual persona device that connects two different types of networks with each other...

NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17

NETWORKING CONCEPTS AND CYBER ETHICS crossword puzzle
Across
  1. an illegal intrusion into a computer system or network
  2. it is an act of harming or harassing a person through information technology in a deliberate manner
  3. two or more computers and peripheral devices are connected within a small area
  4. a computer network that is mainly created for an individual person
  5. it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
  6. it enables you to connect your computers to the available internet connection over the existing telephone lines
  7. unwanted bulk emails that come from unknown sources
  8. a device that connects two different types of networks with each other
Down
  1. a program or a set of programs that disrupts the normal functioning of a computer
  2. a network device that is used to connect all the computers in a network with each other
  3. this kind of network connects two or more computers located at distant places
  4. criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
  5. a larger network than Lan and is spread across the city
  6. being aware of ethical practices and behaving responsibly and appropriately while using the internet
  7. the act of using or imitating the language and thoughts of another person as one's original work

15 Clues: unwanted bulk emails that come from unknown sourcesan illegal intrusion into a computer system or networka larger network than Lan and is spread across the citya computer network that is mainly created for an individual persona device that connects two different types of networks with each other...

Vocabulary Lesson 2 Jenifer S 2017-03-02

Vocabulary Lesson 2 Jenifer S crossword puzzle
Across
  1. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
  2. software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations
  3. The Internet's system for converting alphabetic names into numeric IP addresses.
  4. a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
  5. a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web
  6. is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
  7. means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments
  8. : a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  9. the introductory page of a website, typically serving as a table of contents for the site.
  10. is an input device that scans documents and images, which can be imported into a computer
  11. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
Down
  1. the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
  2. the process of converting information or data into a code, especially to prevent unauthorized access.
  3. A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
  4. a person who uses computers to gain unauthorized access to data.
  5. a unit of information equal to one billion
  6. is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. ... In computer literature, kilobyte is usually abbreviated as K or KB.
  7. a common unit of measure for interest rates and other percentages in finance.
  8. a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  9. : is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
  10. is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
  11. creates complete applications that may run on a single computer or be distributed among servers and clients in a network
  12. . It is the global address of documents and other resources on the World Wide Web
  13. Is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
  14. the way in which something is arranged or set out.

25 Clues: a unit of information equal to one billionthe way in which something is arranged or set out.a person who uses computers to gain unauthorized access to data.a common unit of measure for interest rates and other percentages in finance.The Internet's system for converting alphabetic names into numeric IP addresses....

social networks prochazkova, duskova 2014-05-07

social networks prochazkova, duskova crossword puzzle
Across
  1. Most famous social network
  2. Write something here and read what somebody else wrote
  3. Something like facebook, but older
Down
  1. One of Google products
  2. Social network which shares pictures
  3. Your own webpage
  4. Share your videos
  5. You can talk with your friends via webcam
  6. Email, news and other interesting things
  7. You can ask for anything

10 Clues: Your own webpageShare your videosOne of Google productsYou can ask for anythingMost famous social networkSomething like facebook, but olderSocial network which shares picturesEmail, news and other interesting thingsYou can talk with your friends via webcamWrite something here and read what somebody else wrote

The Internet and Networks 2024-02-20

The Internet and Networks crossword puzzle
Across
  1. A network device that can connect multiple cabled devices.
  2. A type of card all devices need to access a network
  3. A network device that provides wireless connection
  4. WAN stands for....
  5. An example of wireless transmission with a range of about 15 metres
Down
  1. LAN stands for ...
  2. A unique code for all networked devices
  3. A system used to address devices that are connected to a specific network
  4. The largest example of a WAN in the world.
  5. A type of topology with a central point that all other network devices connect to

10 Clues: LAN stands for ...WAN stands for....A unique code for all networked devicesThe largest example of a WAN in the world.A network device that provides wireless connectionA type of card all devices need to access a networkA network device that can connect multiple cabled devices.An example of wireless transmission with a range of about 15 metres...

Neural and Social Networks 2024-05-05

Neural and Social Networks crossword puzzle
Across
  1. it stands for interconnected network.
  2. the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
  3. a category of linkages that stretch beyond a shared sense of identity.
  4. a category of linkages that links to people based on a sense pf common identity.
  5. a type of linkage where in automation, in which the devices (if any) involved in the condition and action are connected to the same gateway.
Down
  1. websites and apps that allow users and organizations to connect, communicate, share information and form relationships.
  2. a computer system modeled on the human brain and nervous system.¹
  3. links to people of groups further up and down the social ladder.
  4. a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources.
  5. a social networking website that was founded in February 2004 by Harvard University students Chris Hughes, Andrew McCollum, Dustin Moskovitz, Eduardo Saverin and Mark Zuckerberg.

10 Clues: it stands for interconnected network.links to people of groups further up and down the social ladder.a computer system modeled on the human brain and nervous system.¹a category of linkages that stretch beyond a shared sense of identity.a category of linkages that links to people based on a sense pf common identity....

Power Places and Networks 2025-01-27

Power Places and Networks crossword puzzle
Across
  1. multinational union or association in which member countries cede authority and sovereignty on at least some internal matters to the group
  2. the investment by a company into the stuctures, equipment or organisations of a foreign country
  3. A type of intergovernmental agreement, often part of a regional intergovernmental organization, where barriers to trade (tariffs and others) are reduced or eliminated among the participating states.
  4. a state with a dominant position characterised by its extensive ability to exert influence or project power on a global scale.
Down
  1. the practice of hiring a party outside a company to perform services or create goods.
  2. A sum of money sent from one person to another often from immigrants to family members back home
  3. This phenomenon includes all of the varied economic, social, political, cultural and environmental processes that make up globalisation.
  4. A multigovernmental organisation that works together to promote economic growth, stability, and improved quality of life worldwide.
  5. Businesses whose operations are spread across the world.
  6. can be economic, military, or emergency humanitarian

10 Clues: can be economic, military, or emergency humanitarianBusinesses whose operations are spread across the world.the practice of hiring a party outside a company to perform services or create goods.the investment by a company into the stuctures, equipment or organisations of a foreign country...

Stay in touch vocabularys 2020-05-05

Stay in touch vocabularys crossword puzzle
Across
  1. Smartphones, PCs and eveything like this is something like that
  2. An other word for Smartphone
  3. Borring things aren´t this
  4. Opposite of nice
  5. You can... photos on instagram
  6. They are nasty on social networks
Down
  1. A place wich is wonderfull
  2. You can... your friends
  3. Instagram or TikTok is a...
  4. You can write it with paper and pen

10 Clues: Opposite of niceYou can... your friendsA place wich is wonderfullBorring things aren´t thisInstagram or TikTok is a...An other word for SmartphoneYou can... photos on instagramThey are nasty on social networksYou can write it with paper and penSmartphones, PCs and eveything like this is something like that

Basic Concepts of Data Communication and Networking 2021-04-01

Basic Concepts of Data Communication and Networking crossword puzzle
Across
  1. Rules that governs data communication
  2. Two or more networks connected
  3. More than two devices share link
  4. Typically uses one type of transmission media
  5. Data flow in one direction only
Down
  1. Two or more devices connected
  2. Topmost OSI layer
  3. All devices both request and grant resources
  4. Number of basic network topologies
  5. Topology with 6 devices and 15 links

10 Clues: Topmost OSI layerTwo or more devices connectedTwo or more networks connectedData flow in one direction onlyMore than two devices share linkNumber of basic network topologiesTopology with 6 devices and 15 linksRules that governs data communicationAll devices both request and grant resourcesTypically uses one type of transmission media

artificial intelligence 2024-08-15

artificial intelligence crossword puzzle
Across
  1. - Popular programming language for AI.
  2. - Step-by-step problem-solving procedure.
  3. - AI capability to interpret images.
  4. - Moral principles guiding AI development.
  5. - Fundamental unit in AI networks.
Down
  1. - Multi-dimensional array used in machine learning.
  2. - Raw information used in AI training.
  3. - Entity that performs tasks autonomously.
  4. - Unfair prejudice in AI decisions.
  5. - Pioneer of computer science and AI.

10 Clues: - Fundamental unit in AI networks.- Unfair prejudice in AI decisions.- AI capability to interpret images.- Pioneer of computer science and AI.- Popular programming language for AI.- Raw information used in AI training.- Step-by-step problem-solving procedure.- Entity that performs tasks autonomously.- Moral principles guiding AI development....

Quiz 2023-08-03

Quiz crossword puzzle
Across
  1. streaming service
  2. Humanlike chatbot
  3. Computer generated simulation
  4. virtual environment that allows acces to interperability of multiple individual
  5. card responsible for rendering image to monitor
  6. Main Directory of user interface
Down
  1. a private network within an organisation
  2. device that connects two or more networks
  3. Disguises itself as a safe program to open
  4. Software used to navigate the internet

10 Clues: streaming serviceHumanlike chatbotComputer generated simulationMain Directory of user interfaceSoftware used to navigate the interneta private network within an organisationdevice that connects two or more networksDisguises itself as a safe program to opencard responsible for rendering image to monitor...

IPv4 vs IPv6 2021-10-19

IPv4 vs IPv6 crossword puzzle
Across
  1. IPv6 feature - ___________ infrastructure
  2. First version of IP was deployed in the ______ in 1983
  3. IPv6 is a 128 bit ___________ address
  4. IPv4 supports _________ Length Subnet Mask
  5. Most networks combine IP and TCP (________ Control Protocol)
  6. IPv6 is the next __________ of IP Addresses
Down
  1. IPv6 feature - ___________ addressing
  2. IPv6 uses NDP (__________ Discovery Protocol)
  3. IPv4 uses ARP (Address _________ Protocol)
  4. IPv4 is a 32 bit __________

10 Clues: IPv4 is a 32 bit __________IPv6 feature - ___________ addressingIPv6 is a 128 bit ___________ addressIPv6 feature - ___________ infrastructureIPv4 uses ARP (Address _________ Protocol)IPv4 supports _________ Length Subnet MaskIPv6 is the next __________ of IP AddressesIPv6 uses NDP (__________ Discovery Protocol)...

byte trail 4 2025-03-05

byte trail 4 crossword puzzle
Across
  1. A software that helps navigate web pages
  2. Protocol for transferring files over the internet
  3. Cryptocurrency ledger technology
  4. Used to locate resources on the internet
Down
  1. Processes graphics for display
  2. Malicious program that replicates itself
  3. Technology for wired local area networks
  4. Logical division of a drive
  5. Tree where each node has up to two children
  6. Connects software components together

10 Clues: Logical division of a driveProcesses graphics for displayCryptocurrency ledger technologyConnects software components togetherA software that helps navigate web pagesMalicious program that replicates itselfTechnology for wired local area networksUsed to locate resources on the internetTree where each node has up to two children...

Cyber security 2025-07-07

Cyber security crossword puzzle
Across
  1. : Malicious software that replicates itself
  2. : Scam tricking individuals for personal info
  3. : Protects against malicious programs
  4. : Someone who exploits security vulnerabilities to access systems
  5. : Converting data into secret code
Down
  1. : Locks system until ransom paid
  2. : Hidden flaw in software
  3. : Secretly gathers personal information from computers
  4. : Malware that appears legitimate
  5. : Protects networks by filtering incoming and outgoing traffic

10 Clues: : Hidden flaw in software: Locks system until ransom paid: Malware that appears legitimate: Converting data into secret code: Protects against malicious programs: Malicious software that replicates itself: Scam tricking individuals for personal info: Secretly gathers personal information from computers...

Hacker Tools 2022-11-23

Hacker Tools crossword puzzle
Across
  1. โปรแกรมที่เป็น Open source software ที่ทำงานแบบ web server scanner
  2. เครื่องมือที่มีความสามารถในการ crack WEP และ WPA/WPA2 ในไม่กี่นาที
  3. เครื่องมือที่ทำหน้าที่เป็น Digital forensics โดยอาศัยหลักการของ Data mining ในการติดตามแกะรอยข้อมูล
  4. เครื่องมือที่อยู่ในกลุ่มซอฟต์แวร์ที่ใช้ในการทดสอบการเจาะระบบ
  5. โปรแกรมกลุ่ม Password Cracking Tool
Down
  1. เครื่องมือที่ใช้การถอดรหัสแบบ Dictionary Attacks
  2. เครื่องมือที่ใช้ในการ Scan ports และ Map Networks
  3. เครื่องมือที่นิยมใช้เพื่อ captures data packet ที่อยู่ใน Network ที่ทำงานแบบ Real time
  4. เครื่องมือที่เรียกว่าเป็น Web Vulnerability Scanner ตัวหนึ่งที่ได้รับความนิยมมากพอสมควร
  5. เครื่องมือนี้ทำหน้าที่เป็น Password Cracker/ Password Hacking

10 Clues: โปรแกรมกลุ่ม Password Cracking Toolเครื่องมือที่ใช้การถอดรหัสแบบ Dictionary Attacksเครื่องมือที่ใช้ในการ Scan ports และ Map Networksเครื่องมือที่อยู่ในกลุ่มซอฟต์แวร์ที่ใช้ในการทดสอบการเจาะระบบเครื่องมือนี้ทำหน้าที่เป็น Password Cracker/ Password Hackingโปรแกรมที่เป็น Open source software ที่ทำงานแบบ web server scanner...

ecosoc 2025-10-09

ecosoc crossword puzzle
Across
  1. – Opposite of decentralization in crypto networks
  2. – Wallets can hide transaction ____
  3. – Crypto exchange that collapsed in 2022
  4. – Crypto is taxed as ____ in the USA
Down
  1. – Technology that records all crypto transactions
  2. – Privacy coin used to hide payments
  3. – Symbol used for Bitcoin
  4. – The first and most famous cryptocurrency
  5. – KYC stands for Know Your ____
  6. – Global body fighting money laundering

10 Clues: – Symbol used for Bitcoin– KYC stands for Know Your ____– Wallets can hide transaction ____– Privacy coin used to hide payments– Crypto is taxed as ____ in the USA– Global body fighting money laundering– Crypto exchange that collapsed in 2022– The first and most famous cryptocurrency– Technology that records all crypto transactions...

Electrical and Electronic Roles 2025-09-23

Electrical and Electronic Roles crossword puzzle
Across
  1. – Extreme weather impacting Caribbean power systems.
  2. – Energy sources like solar, wind, and biomass.
  3. – Technology for communication networks.
  4. – Involves circuits, sensors, and embedded systems.
  5. – Network for distributing electricity.
Down
  1. – Software embedded in electronic devices.
  2. – Related to power systems and energy distribution.
  3. – Device for real-time energy monitoring.
  4. – Small-scale, localized power network.
  5. – Keeping systems operational and safe.

10 Clues: – Small-scale, localized power network.– Keeping systems operational and safe.– Network for distributing electricity.– Technology for communication networks.– Device for real-time energy monitoring.– Software embedded in electronic devices.– Energy sources like solar, wind, and biomass.– Related to power systems and energy distribution....

CS 8 2026-03-24

CS 8 crossword puzzle
Across
  1. A program that scans and detects threats
  2. Type of virus that locks files for money
  3. A malicious program that spreads automatically
  4. A symbol or small picture on screen
Down
  1. message sent electronically
  2. A portable computer
  3. Largest network in the world
  4. A security system that blocks unauthorized access
  5. Network covering a large geographical area
  6. Device used to connect networks

10 Clues: A portable computermessage sent electronicallyLargest network in the worldDevice used to connect networksA symbol or small picture on screenA program that scans and detects threatsType of virus that locks files for moneyNetwork covering a large geographical areaA malicious program that spreads automatically...

Impact 1 Unit 7 Vocabulary 1 Crossword Puzzle 2020-10-03

Impact 1 Unit 7 Vocabulary 1 Crossword Puzzle crossword puzzle
Across
  1. to make something go or be taken to a place, especially by post or email.
  2. an activity that you do to have fun, often one that has rules and that you can win or lose.
  3. a written message that you can send using a mobile phone.
  4. describing something that is very difficult to believe or is very good.
  5. an international computer network connecting other networks and computers from companies, universities, etc.
  6. to tell other people about your ideas, experiences, and feelings on the internet.
  7. to talk in a friendly manner, informal way to somebody.
  8. to look for information in a dictionary or by using a computer.
  9. a small tool or device that does something useful.
Down
  1. to join a computer or a mobile device to the internet or to a computer network.
  2. a mobile phone that also has some of the functions of a computer.
  3. something might exist or happen.
  4. able to move or travel around easily.
  5. an attempt to find somebody or something, especially by looking carefully for it or them.
  6. a system for connecting to the internet or sending data over computer networks using radio waves instead of wires.
  7. a small computer that is easy to carry, with a large touch screen and usually without a physical keyboard.
  8. a piece of software that you can download to a device such as a smartphone or tablet, for example to look up information or to play a game.
  9. describing something that can help do what you want.

18 Clues: something might exist or happen.able to move or travel around easily.a small tool or device that does something useful.describing something that can help do what you want.to talk in a friendly manner, informal way to somebody.a written message that you can send using a mobile phone.to look for information in a dictionary or by using a computer....

SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10

SAFETY AND ETHICS CROSSWORD PUZZLE crossword puzzle
Across
  1. a set of data that describes and gives information about other data.
  2. The information about a particular person that exists on the Internet as a result of their online activity
  3. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
  4. domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
  5. attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  6. the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
  7. the use of electronic communication to bully a person
  8. Protection of computer systems, networks, and data from digital attacks.
  9. The protection of information from people who are not authorized to view it.
Down
  1. a computer security specialist who breaks into protected systems and networks to test and assess their security
  2. A widely-accepted security measure that should be guaranteed in every secure system
  3. having the ability to find information, evaluate information credibility, and use information effectively
  4. is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  5. protecting your data online
  6. Identity theft, stealing money, stealing private information, controlling private computers.
  7. how company’s use your data
  8. The assurance that systems and data are accessible by authorized users when and where needed
  9. Aims at ensuring that information is protected from unauthorized or unintentional alteration

18 Clues: protecting your data onlinehow company’s use your datathe use of electronic communication to bully a persona set of data that describes and gives information about other data.Protection of computer systems, networks, and data from digital attacks.The protection of information from people who are not authorized to view it....

Safety and Ethics Puzzle 2024-01-10

Safety and Ethics Puzzle crossword puzzle
Across
  1. a set of data that describes and gives information about other data.
  2. The information about a particular person that exists on the Internet as a result of their online activity
  3. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
  4. domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
  5. attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  6. the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
  7. the use of electronic communication to bully a person
  8. Protection of computer systems, networks, and data from digital attacks.
  9. The protection of information from people who are not authorized to view it.
Down
  1. a computer security specialist who breaks into protected systems and networks to test and assess their security
  2. A widely-accepted security measure that should be guaranteed in every secure system
  3. having the ability to find information, evaluate information credibility, and use information effectively
  4. is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  5. protecting your data online
  6. Identity theft, stealing money, stealing private information, controlling private computers.
  7. how company’s use your data
  8. The assurance that systems and data are accessible by authorized users when and where needed
  9. Aims at ensuring that information is protected from unauthorized or unintentional alteration

18 Clues: protecting your data onlinehow company’s use your datathe use of electronic communication to bully a persona set of data that describes and gives information about other data.Protection of computer systems, networks, and data from digital attacks.The protection of information from people who are not authorized to view it....

Assignment 6 activities 2015-09-21

Assignment 6 activities crossword puzzle
Across
  1. hypertext markup language
  2. both the sender and the receiver are active
  3. high level programming language
  4. unauthorized use or attempts of unauthorized use of UT IT resources
  5. has concise text
  6. world wide web
  7. a web page is composed of html tags and multimedia files
Down
  1. result in termination of access
  2. can use 30 seconds of media
  3. wide area networks
  4. newest form of html
  5. local area network
  6. 25% slower than paper
  7. tag used to fin pages that might use one or severalwords
  8. text editor for mac
  9. no more than 5 images from artist

16 Clues: world wide webhas concise textwide area networkslocal area networknewest form of htmltext editor for mac25% slower than paperhypertext markup languagecan use 30 seconds of mediaresult in termination of accesshigh level programming languageno more than 5 images from artistboth the sender and the receiver are active...

Bonus Extension 2017-03-14

Bonus Extension crossword puzzle
Across
  1. Something you cannot touch.
  2. Network______ Card
  3. The data is constantly changing.
  4. You use this to search for things on the internet.
  5. Something you can touch.
  6. tapes Used to store large amounts of data.
  7. The transmission of data.
  8. Loses contents when the power is turned off.
  9. This type of storage may be on CD's and DVD's.
Down
  1. You can take this type of storage with you.
  2. Brain of the computer.
  3. Internet : ___________ network of networks.
  4. Documents that contain links and graphics
  5. Modern day internet.
  6. Uniform Resource ____________
  7. The way computers are organised in a network.

16 Clues: Network______ CardModern day internet.Brain of the computer.Something you can touch.The transmission of data.Something you cannot touch.Uniform Resource ____________The data is constantly changing.Documents that contain links and graphicsYou can take this type of storage with you.Internet : ___________ network of networks....

Displays and Image Processing 2022-05-20

Displays and Image Processing crossword puzzle
Across
  1. coded excitation occurs in the _____
  2. digital image storage
  3. creates an element of realism to a 3D image
  4. smallest amount of digital storage
  5. any changes after freezing an image
  6. manipulating data before it is stored
  7. compounding that averages images from different frequencies
  8. grainy appearance in tissues
Down
  1. creates bright and dark highlights around edges
  2. the force of the beam can tell how dense the tissue is
  3. temporal compounding is also known as _____
  4. provides guidelines for imaging networks
  5. group of 8 bits
  6. compounding that averages data from different angles
  7. real world numbers
  8. smallest element of a picture

16 Clues: group of 8 bitsreal world numbersdigital image storagegrainy appearance in tissuessmallest element of a picturesmallest amount of digital storageany changes after freezing an imagecoded excitation occurs in the _____manipulating data before it is storedprovides guidelines for imaging networkstemporal compounding is also known as _____...

US Technology Holiday Crossword 2025-12-11

US Technology Holiday Crossword crossword puzzle
Across
  1. John Hancock's wellness program name
  2. Longer. Healthier ...
  3. Historic document bearing John Hancock's famous signature
  4. Kryptorian hero with an "S" on his chest
  5. Programming language named after a snake
  6. Term for a program that self-replicates across networks
  7. Festival of lights that lasts eight nights
  8. Manulife's logo color
Down
  1. Popular holiday ballet
  2. Famous local symphony that plays every holiday season
  3. Candle holder used during Kwanzaa
  4. AI assistant from microsoft
  5. He brings presents down the chimney
  6. Word meaning "Christmas" in Spanish
  7. Manulife's stock exchange abbreviation
  8. Term for a flaw in software security

16 Clues: Longer. Healthier ...Manulife's logo colorPopular holiday balletAI assistant from microsoftCandle holder used during KwanzaaHe brings presents down the chimneyWord meaning "Christmas" in SpanishJohn Hancock's wellness program nameTerm for a flaw in software securityManulife's stock exchange abbreviationKryptorian hero with an "S" on his chest...

Pueblo Economics 2025-12-09

Pueblo Economics crossword puzzle
Across
  1. The Italians adopted this plant and put it on pizza!
  2. This member of the Three Sisters was also grown by the Pueblo.
  3. A type of bead whose name translates to 'shell' in the Keres language.
  4. Another member of the Three Sisters grown by the Pueblo.
  5. Proof of the Chaco valley's trade networks, this sweet treat is proof of how far the Pueblo traded.
  6. After the Pueblo introduced this plant to Europeans, they would farm it on an industrial scale... with slaves.
  7. Networks of these were constructed to link communities, and sometimes for religious purposes.
  8. It's hot, spicy, and comes in green, orange, red, and black varieties!
Down
  1. Field beds consisted of lines of these, and seeds were planted in them to ensure water collected - helping ensure farms survived.
  2. Their forebearers were named after this, a common trade good woven of sumac, willow, or yucca.
  3. It's not a pancake, but similar! Also the name of Pueblo gardens, due to the shape and layout of their holes.
  4. Systems of canals designed to alter the flow of water and help with large-scale farming.
  5. Impossible to find in the desert, but common where we live; the fancier and more colourful the better, these were traded for thousands of kilometers, and used in jewelry.
  6. Due to less rain, the Pueblo _________ farmlands across areas, so if one failed, the others might not.
  7. This animal, often domesticated for companionship, was also a source of food.
  8. This Pueblo staple is descended from Maize.
  9. One of several animals the Pueblo hunted.
  10. What bird did the Pueblo tame?

18 Clues: What bird did the Pueblo tame?One of several animals the Pueblo hunted.This Pueblo staple is descended from Maize.The Italians adopted this plant and put it on pizza!Another member of the Three Sisters grown by the Pueblo.This member of the Three Sisters was also grown by the Pueblo....

IPTV Times Table 2 2012-11-16

IPTV Times Table 2 crossword puzzle
Across
  1. Plastic cards the viewer can insert in the set-top box
  2. An application that enables a desktop, laptop or workstation computer to function as a telephone via VOIP
  3. One of the three basic modulations of adding information to a sine wave signal in which its phase is varied to impose information on it
  4. Data transmission over a circuit capable of transmitting in one preassigned direction only
  5. A single device capable of both sending and receiving information
  6. Television programming that requires payment upfront usually on a monthly basis as a subscription fee
  7. Telecommunications companies that sell internet access
  8. A type of scanning that may result in a screen flicker
  9. A technique for combining many signals on a single circuit by interleaving bits or bytes of data from successive channels
  10. Provides broadband access network over traditional twisted copper pair and faster than ADSL
  11. A connection-oriented protocol that employs the virtual circuit approach
  12. TCP flow control process used to control the number of unacknowledged data segments that are sent between transmissions
  13. Provides a standard method for transporting multi-protocol datagrams over point-to-point links
  14. Information which travels from the user to the internet or to a central office or headend
  15. A group of bits, including address, data and control elements, that are switched and transmitted together
Down
  1. Short for Media Gateway Control Protocol
  2. Transmission in which the data character and bits are transmitted at a fixed rate with the transmitter and receiver being synchronized
  3. Application layer signaling protocol
  4. The range of electromagnetic radio frequencies used in transmission of voice, data and television
  5. A device that allows user to send commands to a computer that is somewhere else
  6. The length of an electromagnetic waveform as measured from any point on one wave to the corresponding point on an adjacent wave
  7. The device which enables anyone to compute, word process, or perform more complicated functions
  8. A specific set of rules, procedures or conventions that two data devices must accept and use to be able to communicate
  9. Used in IP networks to break up larger networks into smaller networks
  10. A functional unit of a node through which data can enter or leave a data network
  11. Unreliable and connectionless
  12. Any common carrier network that provides circuit switching between public users
  13. Used to manage the membership of Internet Protocol multicast groups
  14. A communications channel or medium having a bandwidth sufficient to carry multiple voice/video or data signals simultaneously
  15. A method of transmission in which all bits of a character are sent simultaneously over separate lines to a high speed printer or other locally attached peripheral

30 Clues: Unreliable and connectionlessApplication layer signaling protocolShort for Media Gateway Control ProtocolPlastic cards the viewer can insert in the set-top boxTelecommunications companies that sell internet accessA type of scanning that may result in a screen flickerA single device capable of both sending and receiving information...

Ch 13 2023-01-17

Ch 13 crossword puzzle
Across
  1. a type of encryption that requires the use of two keys, one for encryption and the other for decryption
  2. a powerful magnet that must be held over hard drive platters to destroy the data contained on the drive
  3. a format method that creates the boot sector and file allocation table on a drive
  4. an access model that enables access through all ports, except those explicitly denied
  5. also called message digest, a fixed length value generated by applying a mathematical function to an arbitrary length text
  6. a malware that encrypts files on the target and then demands that a fee be paid in order to decrypt the files
  7. malware that is packaged with legitimate software and is activated when a user installs the legitimate application
  8. the name of the wireless network
  9. a type of encryption that uses the same key to encrypt and decrypt the data
  10. a format method that creates the tracks on a hard disk and is usually performed at the factory
  11. a Windows feature that encrypts a removable drive
Down
  1. a Windows feature that encrypts data and is directly linked to a specific user account
  2. software tools used to perform a secure erase and that is designed to overwrite existing data multiple times, rendering the data unreadable
  3. an access model that allow access to configured ports, and for which access to any ports not explicitly permitted is denied
  4. malware that requires human action to spread and infect other hosts
  5. a specialized chip installed on the motherboard and whose function is required when using BitLocker
  6. malware that exploits network applications to consume bandwidth, crash the device, or install other malware
  7. a dedicated device or a software service that protects computers and networks by preventing undesirable traffic from entering internal networks
  8. a term to describe malicious software
  9. malware that uses keyloggers to monitor user activity and sends information to cybercriminals
  10. malware that displays unsolicited advertising using pop-up web browser windows, new toolbars, or redirects to a different website
  11. a Windows feature that encrypts an entire hard drive
  12. malware that is used by cybercriminals to gain administrator-account level access to a computer and control it remotely
  13. a subnetwork in an organization that provides services to untrusted networks such as a website open to the internet
  14. a small room with two doors, one of which must be closed before the other can be opened
  15. a set of security objectives that ensure the security of a network, the data, and the computer systems in an organization

26 Clues: the name of the wireless networka term to describe malicious softwarea Windows feature that encrypts a removable drivea Windows feature that encrypts an entire hard drivemalware that requires human action to spread and infect other hostsa type of encryption that uses the same key to encrypt and decrypt the data...

ISCC chapter 4 2025-11-27

ISCC chapter 4 crossword puzzle
Across
  1. — Open record maintained by the community for verifying transactions
  2. — Services triggered by a user’s real-time geographic position
  3. — Generation that learns, reacts, and thinks differently due to lifelong hyper-connectivity
  4. — AI branch that captures, stores, and processes images
  5. — Products delivered electronically with no physical form
  6. — Digital platform where supply directly meets demand
  7. — Technology that enables people to form interest-based communities online
  8. — Technology that simulates reasoning, perception, and problem-solving
  9. — Information system that embeds AI in its decision-making
  10. — Information system that supports content sharing among user communities
  11. — Network-based business model seamless across devices and platforms
  12. — Innovation that reshapes industries and behaviours in society
  13. — Digital platform that connects drivers and riders for transport services
  14. — System enabling real-time reservations and digital payments
  15. — Facility enabling fast shipping for digital retail operations
  16. — Technique enabling secure transfer of digital funds between parties
  17. — AI system that stores knowledge and makes inferences like a human specialist
  18. — Online buying and selling supported by integrated inventory and fulfilment networks
  19. — A community transformed by integration of advanced technologies
  20. — Secret cryptographic credential used to authorise digital transactions
  21. — Insights from business intelligence showing future trends
  22. — Digital money secured by cryptography and resistant to counterfeiting
Down
  1. — Organization built entirely on digital platforms and networks
  2. — The key digital-money flaw where a single token could be duplicated
  3. — Describes Generation Z’s constant immersion in digital communication
  4. — Technologies providing historical, current, and predictive business insights
  5. — Digital model where services are requested and delivered instantly
  6. — Next-generation commerce integrating apps, supply chain, and data
  7. — Economic model built on digital intermediaries and user networks
  8. — Digital services enhanced with AI and continuous data learning
  9. — Digital financial transactions conducted through smartphone apps
  10. — Technology that subtly influences behaviour and decision-making
  11. — Computing system designed to mimic the human brain’s processing
  12. — Chain of cryptographically linked blocks storing immutable transaction records
  13. — First cryptocurrency created to solve the double-spend problem
  14. — The act of publishing and distributing digital media online
  15. — Behaviour and thinking shaped by technology and the internet
  16. — Providers, users, and groups that shape SMIS interactions
  17. — Group of users connected by shared interests on social platforms
  18. — Digital process that reduces or removes the need for human intervention
  19. — AI that adjusts behaviour based on past outcomes
  20. — Mechanical systems capable of performing high-precision repetitive tasks
  21. — Cryptographic identifier shared publicly for receiving digital currency
  22. — Computer-generated environment reproducing real-world tasks
  23. — Capability allowing a computer to understand spoken or written human language

45 Clues: — AI that adjusts behaviour based on past outcomes— Digital platform where supply directly meets demand— AI branch that captures, stores, and processes images— Products delivered electronically with no physical form— Information system that embeds AI in its decision-making— Providers, users, and groups that shape SMIS interactions...

5G 2021-04-07

5G crossword puzzle
Across
  1. Emission of energy
  2. Link between devices and networks
  3. A synonim for pure and clean
  4. Storing data while streaming
Down
  1. A rural area
  2. To damage something/hurt someone
  3. Distance between the waves of a radiation
  4. To turn something into ions (chemical process)
  5. A word used to define something that decline or fall down
  6. To observe secretly someone/something

10 Clues: A rural areaEmission of energyA synonim for pure and cleanStoring data while streamingTo damage something/hurt someoneLink between devices and networksTo observe secretly someone/somethingDistance between the waves of a radiationTo turn something into ions (chemical process)A word used to define something that decline or fall down

Non-linear waveform shaping circuits 2022-07-16

Non-linear waveform shaping circuits crossword puzzle
Across
  1. implemented as a piecewise linear curve
  2. also known as dc restorers
  3. Clipping circuit other name
  4. two-port networks is being used in __shaping
  5. ____-segment sine-wave shaper
Down
  1. Remove the part of a signal
  2. clipper connected across the load terminals
  3. emitter__resistance convert sine to triangle
  4. ___can be used for removing the distortions
  5. measure of goodness

10 Clues: measure of goodnessalso known as dc restorersRemove the part of a signalClipping circuit other name____-segment sine-wave shaperimplemented as a piecewise linear curveclipper connected across the load terminals___can be used for removing the distortionsemitter__resistance convert sine to triangletwo-port networks is being used in __shaping

Vocabulary 2022-11-13

Vocabulary crossword puzzle
Across
  1. something obligatory
  2. to produce something for the first time
  3. something involved in high technology
  4. titles conferred by colleges and universities
  5. a worldwide system of computer networks
Down
  1. to publish something
  2. extend over a large or increasing area
  3. have a portion of something with others
  4. money received especially on a regular basis
  5. synonym of help

10 Clues: synonym of helpto publish somethingsomething obligatorysomething involved in high technologyextend over a large or increasing areahave a portion of something with othersto produce something for the first timea worldwide system of computer networksmoney received especially on a regular basistitles conferred by colleges and universities

Technology crossword 2018-06-10

Technology crossword crossword puzzle
Across
  1. We use it to move the cursor.
  2. Different images and texts are displayed on it.
  3. We use it to search for information.
  4. Machine programmable by a computer.
Down
  1. Type of malicious software program.
  2. Portable computer.
  3. The person who creates computer programs.
  4. Global system of interconnected computer networks.
  5. Most popular social network.
  6. We can see them on the desktop.

10 Clues: Portable computer.Most popular social network.We use it to move the cursor.We can see them on the desktop.Type of malicious software program.Machine programmable by a computer.We use it to search for information.The person who creates computer programs.Different images and texts are displayed on it.Global system of interconnected computer networks.

Chapter 5 AGRON 342 Crossword 2023-10-23

Chapter 5 AGRON 342 Crossword crossword puzzle
Across
  1. Shape of a food that can be useful to describe certain economics
  2. A reduction in quantity
  3. The Ability to do work
  4. Equal Opportunity
  5. Process of adding acid to something
Down
  1. System to Help Connect Components
  2. To improve something
  3. A measure of how diverse an ecosystem is
  4. Introduction of Harmful Objects into the Environment
  5. Measure of Monetary Function

10 Clues: Equal OpportunityTo improve somethingThe Ability to do workA reduction in quantityMeasure of Monetary FunctionSystem to Help Connect ComponentsProcess of adding acid to somethingA measure of how diverse an ecosystem isIntroduction of Harmful Objects into the EnvironmentShape of a food that can be useful to describe certain economics

byte trail 3 2025-03-05

byte trail 3 crossword puzzle
Across
  1. Secures data by converting it to a coded form
  2. Software managing hardware and software resources
  3. Smallest unit of data in computing
  4. Storing data over the internet
  5. Device that connects multiple networks
Down
  1. Virtual representation of physical hardware
  2. High-level programming language
  3. Protecting data from unauthorized access
  4. A column in a table
  5. Set of vertices connected by edges

10 Clues: A column in a tableStoring data over the internetHigh-level programming languageSet of vertices connected by edgesSmallest unit of data in computingDevice that connects multiple networksProtecting data from unauthorized accessVirtual representation of physical hardwareSecures data by converting it to a coded form...

Dorians Digital Delema 2025-08-26

Dorians Digital Delema crossword puzzle
Across
  1. what a computer is like
  2. usbdrive
  3. turns off but powers on right away
  4. saves power but keeps running
  5. a service that allows you to save your digital data
Down
  1. alt
  2. a free cloud-based file storage
  3. something or someone gaining unauthorized access to computer systems, networks, or data
  4. applications you store your work in
  5. everything is off

10 Clues: altusbdriveeverything is offwhat a computer is likesaves power but keeps runninga free cloud-based file storageturns off but powers on right awayapplications you store your work ina service that allows you to save your digital datasomething or someone gaining unauthorized access to computer systems, networks, or data

basics of deep learning 2026-01-20

basics of deep learning crossword puzzle
Across
  1. – Measures how well the network predicts
  2. – Algorithm to update weights
  3. – Extra parameter to shift activation
  4. – Phase where the network learns from data
  5. – Parameter multiplied by input
  6. – Basic building block of neural networks
Down
  1. – A group of neurons at the same level
  2. – Final prediction of the network
  3. – Function applied to a neuron’s output
  4. – Data fed into the network

10 Clues: – Data fed into the network– Algorithm to update weights– Parameter multiplied by input– Final prediction of the network– Extra parameter to shift activation– A group of neurons at the same level– Function applied to a neuron’s output– Measures how well the network predicts– Basic building block of neural networks...

Businesses 2024-10-02

Businesses crossword puzzle
Across
  1. sends you outerspace
  2. can't be used to describe Apple or Tesla
  3. yours will affect people's perception of you
  4. can define culture or spirit
  5. very annoying but worms' favourite activity
  6. enjoys power and wealth
  7. no hands on the wheel
  8. when you choose to leave your job
Down
  1. going up and up
  2. using your brain but with a little help
  3. better not have the minimum
  4. going down and down
  5. hardware, software, networks and co
  6. Toulouse champion employer
  7. when you don't choose to leave your job
  8. you'll get one if you don't comply with the law

16 Clues: going up and upgoing down and downsends you outerspaceno hands on the wheelenjoys power and wealthToulouse champion employerbetter not have the minimumcan define culture or spiritwhen you choose to leave your jobhardware, software, networks and cousing your brain but with a little helpwhen you don't choose to leave your job...

CampusQuest 2024-09-07

CampusQuest crossword puzzle
Across
  1. Home of lectures and naps
  2. Low price to gain market share
  3. Framework of strengths, weaknesses,opportunities,threats
  4. Celebration center for events
  5. Strategy to make a product unique
Down
  1. Studying on online consumer behavior
  2. Creating a unique name for a product
  3. Using neuroscience to study consumer behavior
  4. Point Bonding over smokes, creating networks
  5. The most silent place at campus

10 Clues: Home of lectures and napsCelebration center for eventsLow price to gain market shareThe most silent place at campusStrategy to make a product uniqueStudying on online consumer behaviorCreating a unique name for a productPoint Bonding over smokes, creating networksUsing neuroscience to study consumer behavior...

Doughnut Economics 2025-04-08

Doughnut Economics crossword puzzle
Across
  1. Ecological ____ that we must stay under
  2. Social needs are not met
  3. Essential shelter in a just economy
  4. Life variety within ecological ceiling
  5. Sign of overshoot; chemical or air
  6. ____ layer that protects Earth from UV radiation
Down
  1. Exceeded planetary boundaries
  2. Social or ecological connections
  3. Builds knowledge; inner ring of doughnut
  4. Inner ring of Doughnut economics: Social ______

10 Clues: Social needs are not metExceeded planetary boundariesSocial or ecological connectionsSign of overshoot; chemical or airEssential shelter in a just economyLife variety within ecological ceilingEcological ____ that we must stay underBuilds knowledge; inner ring of doughnutInner ring of Doughnut economics: Social ______...

cyber 2025-06-16

cyber crossword puzzle
Across
  1. - Scrambling data to protect it
  2. - Moral rules that guide behavior
  3. - To inform someone about bad behavior online
  4. - Crime involving computers or networks
  5. - Acting wisely and safely online
Down
  1. - Extra step for account security
  2. - Asking before using others’ work or info
  3. - Good manners on the internet
  4. - False information shared online
  5. - To stop communication from a person or site

10 Clues: - Good manners on the internet- Scrambling data to protect it- Extra step for account security- Moral rules that guide behavior- False information shared online- Acting wisely and safely online- Crime involving computers or networks- Asking before using others’ work or info- To inform someone about bad behavior online...

Electrical and Electronic Roles 2025-09-23

Electrical and Electronic Roles crossword puzzle
Across
  1. – Extreme weather impacting Caribbean power systems.
  2. – Energy sources like solar, wind, and biomass.
  3. – Technology for communication networks.
  4. – Involves circuits, sensors, and embedded systems.
  5. – Network for distributing electricity.
Down
  1. – Software embedded in electronic devices.
  2. – Related to power systems and energy distribution.
  3. – Device for real-time energy monitoring.
  4. – Small-scale, localized power network.
  5. – Keeping systems operational and safe.

10 Clues: – Small-scale, localized power network.– Keeping systems operational and safe.– Network for distributing electricity.– Technology for communication networks.– Device for real-time energy monitoring.– Software embedded in electronic devices.– Energy sources like solar, wind, and biomass.– Related to power systems and energy distribution....

Ceasers English lesson 3 2025-09-04

Ceasers  English lesson 3 crossword puzzle
Across
  1. what means a task not complete
  2. what has the definition of half
  3. the definition of this word is together
  4. the road between states
Down
  1. a writing symbole that has the stem semi
  2. what means networks that exist between each other
  3. some amounts are unequal
  4. to send away
  5. what word means between
  6. when two people stand apart

10 Clues: to send awaywhat word means betweenthe road between statessome amounts are unequalwhen two people stand apartwhat means a task not completewhat has the definition of halfthe definition of this word is togethera writing symbole that has the stem semiwhat means networks that exist between each other

Omics 2025-10-08

Omics crossword puzzle
Across
  1. Complete set of metabolites in a system
  2. Study of RNA transcripts
  3. Study of metabolites
  4. Study of cellular lipid networks
  5. Integrative study of various omics data
Down
  1. Study of proteins
  2. Traits that make up a phenotype
  3. Study of heritable changes not in DNA sequence
  4. Study of carbohydrates and glycan
  5. Study of the entire set of genes in an organism

10 Clues: Study of proteinsStudy of metabolitesStudy of RNA transcriptsTraits that make up a phenotypeStudy of cellular lipid networksStudy of carbohydrates and glycanComplete set of metabolites in a systemIntegrative study of various omics dataStudy of heritable changes not in DNA sequenceStudy of the entire set of genes in an organism

Spelling Words - Week 2 2020-02-02

Spelling Words - Week 2 crossword puzzle
Across
  1. the part of your body between your chest and legs
  2. Doing what you are told to do
  3. Unclear, confusing or not certain
  4. Large networks of paths or passages
  5. A party
  6. A mode of transportation
  7. A very drive, eager or motivated person
  8. the scientific study of the brain and nervous system
  9. An numeric order
Down
  1. A place to put your clothes and shoes
  2. An instrument used to measure weather
  3. Explaining what a thing looks like
  4. Better than good
  5. Using two things together
  6. A Place to borrow books
  7. to follow instructions

16 Clues: A partyBetter than goodAn numeric orderto follow instructionsA Place to borrow booksA mode of transportationUsing two things togetherDoing what you are told to doUnclear, confusing or not certainExplaining what a thing looks likeLarge networks of paths or passagesA place to put your clothes and shoesAn instrument used to measure weather...

C4: Revising Business Messages 2021-04-19

C4: Revising Business Messages crossword puzzle
Across
  1. familiar phrases that contain expendable parts
  2. overused expressions
  3. shape of text characters
  4. correcting grammar, spelling, punctuation, format, and mechanics
  5. empty space on the page
  6. a line or stroke attached to the end of a letter
  7. informal words with changed meanings
  8. white space on the left, right, top, and bottom of a page
  9. verbs needlessly coverted to wordy noun expressions
  10. without
Down
  1. expressions that repeat meaning or include unnecessary words
  2. process of analyzing whether your message achieves its purpose
  3. unnecessary introductory words
  4. improving the content and sentence structure
  5. short messages exchanged on social media networks
  6. stale expressions

16 Clues: withoutstale expressionsoverused expressionsempty space on the pageshape of text charactersunnecessary introductory wordsinformal words with changed meaningsimproving the content and sentence structurefamiliar phrases that contain expendable partsa line or stroke attached to the end of a lettershort messages exchanged on social media networks...

Enhanced Vocabulary - Section C 2022-02-10

Enhanced Vocabulary - Section C crossword puzzle
Across
  1. Having a world view, worldly
  2. (of an argument, story, or sentence) extremely complex and difficult to follow
  3. a minor dispute or disagreement,an unexpected and unfortunate occurrence.
  4. The world of the computers and the networks that connect them together
  5. believable
  6. the process of releasing, and thereby providing relief from, strong or repressed emotions.
  7. having a meaning that is mysterious or obscure
  8. An error to be corrected
Down
  1. The science of freezing
  2. contemplation
  3. cowardly, fainthearted
  4. concealed, hidden
  5. uncritical satisfaction with oneself or one's achievements
  6. The blow of mercy
  7. Guilty
  8. nerve, gall, extreme self-confidence

16 Clues: Guiltybelievablecontemplationconcealed, hiddenThe blow of mercycowardly, faintheartedThe science of freezingAn error to be correctedHaving a world view, worldlynerve, gall, extreme self-confidencehaving a meaning that is mysterious or obscureuncritical satisfaction with oneself or one's achievements...

Who is DNCR? 2022-03-10

Who is DNCR? crossword puzzle
Across
  1. law enforcement officer that also educates and maintains trails
  2. creates programs and resources to help people learn
  3. doctor for animals
  4. studies and writes about past
  5. cares for plants and flowers
  6. tracks spending and maintains financial records
  7. preserves original materials and records
  8. maintains computer systems and networks
Down
  1. studies human history with artifacts and remains
  2. studies past life through fossils
  3. studies stars and planets
  4. restores and preserved art and artifacts
  5. cares for animals
  6. visual communicator that creates exhibits and brochures
  7. cares for aquatic animals
  8. coordinates overall collection of items or animals

16 Clues: cares for animalsdoctor for animalsstudies stars and planetscares for aquatic animalscares for plants and flowersstudies and writes about paststudies past life through fossilsmaintains computer systems and networksrestores and preserved art and artifactspreserves original materials and recordstracks spending and maintains financial records...

Assignment 6 activities 2015-09-21

Assignment 6 activities crossword puzzle
Across
  1. text editor for mac
  2. newest form of html
  3. both the sender and the receiver are active
  4. can use 30 seconds of media
  5. has concise text
  6. wide area networks
Down
  1. a web page is composed of html tags and multimedia files
  2. result in termination of access
  3. 25% slower than paper
  4. unauthorized use or attempts of unauthorized use of UT IT resources
  5. hypertext markup language
  6. local area network
  7. high level programming language
  8. tag used to fin pages that might use one or severalwords
  9. world wide web
  10. no more than 5 images from artist

16 Clues: world wide webhas concise textlocal area networkwide area networkstext editor for macnewest form of html25% slower than paperhypertext markup languagecan use 30 seconds of mediaresult in termination of accesshigh level programming languageno more than 5 images from artistboth the sender and the receiver are active...

networking concepts 2025-06-13

networking concepts crossword puzzle
Across
  1. multipoint topology
  2. in star topology, central controller
  3. another name of nodes
  4. that covers security, robust& eliminates traffic factor
  5. WWW stands for
  6. a communication pathway that transfers data
  7. object that increases signal strength
  8. a device that forwards data packets between computer networks
Down
  1. in bus topology, device linking all nodes in network
  2. newest evolution in LAN
  3. term that refers to structure and format of data
  4. network providing high speed connectivity
  5. star topology is used in
  6. LANs stand for
  7. can cause software to freeze or quit entirely
  8. internetworking protocol

16 Clues: WWW stands forLANs stand formultipoint topologyanother name of nodesnewest evolution in LANstar topology is used ininternetworking protocolin star topology, central controllerobject that increases signal strengthnetwork providing high speed connectivitya communication pathway that transfers datacan cause software to freeze or quit entirely...

Wireless Networks 2020-12-28

Wireless Networks crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Computer networks 2025-04-19

Computer networks crossword puzzle
Across
  1. Data is broken into this before transmission
  2. Central device in a star topology
Down
  1. Every device needs this to communicate on the internet
  2. Includes IP and TCP
  3. Popular protocol for uploading and downloading files

5 Clues: Includes IP and TCPCentral device in a star topologyData is broken into this before transmissionPopular protocol for uploading and downloading filesEvery device needs this to communicate on the internet

G11 Communication 2025-04-10

G11 Communication crossword puzzle
Across
  1. Home’s data traffic cop. 家里的数据交警。
  2. Spans countries, connects ATMs. 覆盖国家,连接ATM。
  3. Solo worker, like a laptop. 独立工作者,如笔记本。
  4. One cable links all, old-school style. 单电缆连所有,老式风格。
  5. Amazon’s way: servers feed clients. 亚马逊模式:服务器供客户端。
  6. Network for a small space, like an office. 小范围网络,如办公室用。
Down
  1. Hub-centered, office favorite. 以集线器为中心,办公室最爱。
  2. Cable-bound, fast but fixed. 电缆束缚,快但固定。
  3. Weak device leans on server. 弱设备依赖服务器。
  4. Google Drive’s shared sky. 谷歌云盘的共享天空。
  5. Web-like links, internet’s backbone. 网状连接,互联网支柱。
  6. Equal sharing, no boss server. 平等共享,无主服务器。
  7. Wi-Fi freedom, interference risk. Wi-Fi自由,干扰风险。
  8. Firm’s own secure data haven. 公司自有的安全数据港。
  9. Mixed setup for hotel chains. 酒店连锁的混合结构。

15 Clues: Home’s data traffic cop. 家里的数据交警。Google Drive’s shared sky. 谷歌云盘的共享天空。Weak device leans on server. 弱设备依赖服务器。Cable-bound, fast but fixed. 电缆束缚,快但固定。Solo worker, like a laptop. 独立工作者,如笔记本。Mixed setup for hotel chains. 酒店连锁的混合结构。Firm’s own secure data haven. 公司自有的安全数据港。Equal sharing, no boss server. 平等共享,无主服务器。...

AI Unit1 Vocab 2024-10-23

AI Unit1 Vocab crossword puzzle
Across
  1. a supervised learning task that involves predicting a continuous output variable based on input features
  2. a separate subset of data used to assess the performance of a trained machine learning model
  3. a subset of AI that enables systems to learn from data and improve their performance over time without being explicitly programmed
  4. an unsupervised learning technique that groups similar data points together based on their characteristics
  5. techniques that use statistical algorithms and machine learning to identify the likelihood of future outcomes based on historical data
  6. a subset of data used to train a machine learning model
  7. a subset of data used to tune the parameters of a machine learning model and prevent overfitting
  8. specialized form of machine learning involving neural networks with many layers that can learn complex patterns in large amounts of data
Down
  1. a modeling error that occurs when a machine learning model learns the training data too well
  2. the process of analyzing large datasets to discover patterns and extract meaningful information
  3. the process of assessing how well a machine learning model performs
  4. the process of selecting, modifying, or creating variables to improve the performance of ML models
  5. a supervised learning task where the goal is to assign input data into predefined categories
  6. the simulation of human intelligence processes by machines
  7. a computational model inspired by the way biological neural networks in the human brain work

15 Clues: a subset of data used to train a machine learning modelthe simulation of human intelligence processes by machinesthe process of assessing how well a machine learning model performsa modeling error that occurs when a machine learning model learns the training data too well...

NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17

NETWORKING CONCEPTS AND CYBER ETHICS crossword puzzle
Across
  1. an illegal intrusion into a computer system or network
  2. it is an act of harming or harassing a person through information technology in a deliberate manner
  3. two or more computers and peripheral devices are connected within a small area
  4. a computer network that is mainly created for an individual person
  5. it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
  6. it enables you to connect your computers to the available internet connection over the existing telephone lines
  7. unwanted bulk emails that come from unknown sources
  8. a device that connects two different types of networks with each other
Down
  1. a program or a set of programs that disrupts the normal functioning of a computer
  2. a network device that is used to connect all the computers in a network with each other
  3. this kind of network connects two or more computers located at distant places
  4. criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
  5. a larger network than Lan and is spread across the city
  6. being aware of ethical practices and behaving responsibly and appropriately while using the internet
  7. the act of using or imitating the language and thoughts of another person as one's original work

15 Clues: unwanted bulk emails that come from unknown sourcesan illegal intrusion into a computer system or networka larger network than Lan and is spread across the citya computer network that is mainly created for an individual persona device that connects two different types of networks with each other...

ICT Quiz 2026-01-20

ICT Quiz crossword puzzle
Across
  1. what is virus
  2. temporary wireless network where devices connect directly to each other without a central router or access point
  3. disguised as legitimate software, tricking users into installing it to gain unauthorized access to their device to cause damage, steal data, or disrupt system operations by inserting its code and altering how the computer functions
Down
  1. computer security expert who operates in a middle ground between ethical and malicious
  2. uses hacking skills legally and with permission to find and fix security vulnerabilities in systems
  3. an individual who gains unauthorized access to computer systems and networks with malicious intent
  4. a global computer network providing a variety of information and communication facilities
  5. self-replicating malware that spreads across networks by exploiting software vulnerabilities, allowing it to spread automatically

8 Clues: what is viruscomputer security expert who operates in a middle ground between ethical and maliciousa global computer network providing a variety of information and communication facilitiesan individual who gains unauthorized access to computer systems and networks with malicious intent...

Computer network - key words 2024-01-08

Computer network - key words crossword puzzle
Across
  1. small network in one geographical location
  2. Wireless network technology
  3. set of rules about exchanging data
  4. Unique identifier for devices
Down
  1. Common wired network technology
  2. extensive network covering large areas
  3. security barrier on a network
  4. device directing data between networks

8 Clues: Wireless network technologysecurity barrier on a networkUnique identifier for devicesCommon wired network technologyset of rules about exchanging dataextensive network covering large areasdevice directing data between networkssmall network in one geographical location

CPU SCI Terms 2015-09-28

CPU SCI Terms crossword puzzle
Across
  1. visits sites on the internet, discovering web pages and building an index to the web’s content based on keywords
  2. networks that are not geographically close
  3. detest this when making a good web page ex. Hottest ever
  4. networks that are geographically close
  5. Mac users can use this type of text editor when making a web page
  6. technique used to access unauthorized computers and sends a false IP address and can falsely take advantage of the user's identity
  7. orders links by relevance to user; relevance is computed by counting the links to a page
  8. can be increased by high quality graphics, good handwriting, and outbound hypertext links
  9. use a computer to gain unauthorized access to data in a system
  10. a group of information on a computer that can be software programs or data
  11. Window users can use this type of text editor when making a web page
Down
  1. the information that is on the websites, one of the divisions for large websites
  2. URL has three main parts: server’s computer name, page’s pathname, and ______
  3. can be embedded in web pages and displayed by a browser as pictures, mo0vies, and graphics
  4. up to this percentage of the work but no more than 30 seconds of the music can be used from someone else’s work
  5. no more than this number of images can be used from one artist or photographer
  6. translates the hierarchical, human-readable names into the four-number IP address
  7. hardware that operates the sites, one of the divisions for large websites

18 Clues: networks that are geographically closenetworks that are not geographically closedetest this when making a good web page ex. Hottest everuse a computer to gain unauthorized access to data in a systemMac users can use this type of text editor when making a web pageWindow users can use this type of text editor when making a web page...

Olympus CAN Awareness Week 2021-04-19

Olympus CAN Awareness Week crossword puzzle
Across
  1. Core Value
  2. understanding that each individual is unique, and recognizing our individual differences
  3. "N" in CAN
  4. Where can you learn more about the CANs?
Down
  1. This CAN champions disability-related activities
  2. "A" in CAN
  3. True to _____
  4. Core Value
  5. "C" in CAN

9 Clues: Core Value"A" in CANCore Value"C" in CAN"N" in CANTrue to _____Where can you learn more about the CANs?This CAN champions disability-related activitiesunderstanding that each individual is unique, and recognizing our individual differences

Socil Media 2023-07-25

Socil Media crossword puzzle
Across
  1. examples of this are netflix,youtube,etc
  2. use this symbol #
  3. private conversation
Down
  1. A message sent on twitter
  2. facebook homepage
  3. Post that becomes very popular in social networks
  4. image,video, or piece of text that is humorous.
  5. A self portrait

8 Clues: A self portraitfacebook homepageuse this symbol #private conversationA message sent on twitterexamples of this are netflix,youtube,etcimage,video, or piece of text that is humorous.Post that becomes very popular in social networks

ICT crossword 2019-05-17

ICT crossword crossword puzzle
Across
  1. bhogdq - 1
  2. don't touch it, its hot
Down
  1. to pieces
  2. a functional net
  3. keep it secret
  4. local only

6 Clues: to piecesbhogdq - 1local onlykeep it secreta functional netdon't touch it, its hot

Privacy in Social Networks and Messengers 2025-10-12

Privacy in Social Networks and Messengers crossword puzzle
Across
  1. People who join and use apps.
  2. Information stored and shared online.
  3. Control of personal data online.
  4. A secret code to access an account.
  5. Type of networks like Facebook and Instagram.
Down
  1. A system that connects people or computers.
  2. Technology that protects messages from third parties.
  3. Popular messenger app with channels and groups.
  4. App used to send messages.
  5. Another word for security online.
  6. Messenger app focused on privacy.
  7. Encrypted messenger owned by Meta.

12 Clues: App used to send messages.People who join and use apps.Control of personal data online.Another word for security online.Messenger app focused on privacy.Encrypted messenger owned by Meta.A secret code to access an account.Information stored and shared online.A system that connects people or computers.Type of networks like Facebook and Instagram....

invention 1 2024-04-09

invention 1 crossword puzzle
Across
  1. Adhesive notes with a repositionable backing, facilitating temporary notes and reminders.
  2. Optical device used to read and decode information encoded in barcodes, streamlining inventory management and retail checkout.
  3. Integrated circuitry containing the functions of a central processing unit, revolutionizing computing and technology.
  4. Medical imaging technique producing detailed images of internal body structures using magnetic fields and radio waves.
Down
  1. Portable storage medium consisting of a thin, flexible magnetic disk enclosed in a square or rectangular plastic shell.
  2. Transmission medium using thin fibers of glass or plastic to transmit data as light pulses, enabling high-speed communication networks.
  3. Home entertainment device allowing users to record and playback television programs and movies.
  4. Electronic communication method allowing users to exchange messages over computer networks, revolutionizing correspondence.

8 Clues: Adhesive notes with a repositionable backing, facilitating temporary notes and reminders.Home entertainment device allowing users to record and playback television programs and movies.Integrated circuitry containing the functions of a central processing unit, revolutionizing computing and technology....

Information system security 2025-03-24

Information system security crossword puzzle
Across
  1. security systems that monitor and control incoming and outgoing network traffic, acting as a barrier between a trusted internal network and external threats, such as hackers or malware.
  2. malicious software designed to secretly monitor and collect information from a device without the user's consent
  3. ethical hackers who use their skills to identify and fix security vulnerabilities in systems, often working with organizations to improve security and protect against cyber threats.
  4. a malicious software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices. This includes viruses.
  5. networks of compromised devices (often called bots or zombies) that are controlled remotely by cybercriminals to carry out malicious activities
Down
  1. individuals who illegally hack into systems or networks with malicious intent, such as stealing data, spreading malware, or causing damage. They operate outside the law for personal gain or to cause harm
  2. the process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized parties can decrypt and read the original information.
  3. a tactic used by cybercriminals to manipulate people into revealing sensitive information by exploiting trust or emotions, rather than using technical methods.
  4. a type of cyberattack where attackers impersonate legitimate organizations or individuals to deceive people into revealing sensitive information, such as passwords, credit card numbers, or personal details, usually via email, text messages, or fake websites.
  5. a cyberattack where multiple compromised computers or devices are used to flood a target server, website, or network with excessive traffic, overwhelming it and causing it to become slow, unresponsive, or crash. The goal is to disrupt access to the targeted service.

10 Clues: malicious software designed to secretly monitor and collect information from a device without the user's consenta malicious software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices. This includes viruses....

Mobile phone anxiety survey says 'nomophobia' on the rise 2019-03-17

Mobile phone anxiety survey says 'nomophobia' on the rise crossword puzzle
Across
  1. feeiling you experience when very stressed
  2. mobile phones softwares
  3. link
  4. device that helps you connect to social networks
  5. when you cannot forget about something or someone
Down
  1. controlled behaviour
  2. cannot live without something
  3. fear of missing content on a cellphone

8 Clues: linkcontrolled behaviourmobile phones softwarescannot live without somethingfear of missing content on a cellphonefeeiling you experience when very stresseddevice that helps you connect to social networkswhen you cannot forget about something or someone

Networking crossword puzzle 2021-09-14

Networking crossword puzzle crossword puzzle
Across
  1. brains in the computer
  2. hardware that connects devices on a network
  3. a device or cluster that takes requests
  4. one of the biggest cpu and component companies
  5. periferal used to type
  6. device that guides the route
Down
  1. periferal used to click
  2. a computer used by one user only
  3. science that studies complex networks
  4. the spine of the computer

10 Clues: brains in the computerperiferal used to typeperiferal used to clickthe spine of the computerdevice that guides the routea computer used by one user onlyscience that studies complex networksa device or cluster that takes requestshardware that connects devices on a networkone of the biggest cpu and component companies

Be Rooted! Set 4 2022-04-20

Be Rooted! Set 4 crossword puzzle
Across
  1. The study of nature
  2. One without light
  3. A system of geographical networks/lives
  4. To go against one's self/beliefs
  5. A place to view animals confined in water
  6. Placed at the edge or margin
Down
  1. The area around a circle
  2. Inflammation of the brain/spinal cord
  3. Someone who watches the scene on the side
  4. A medical hand issue

10 Clues: One without lightThe study of natureA medical hand issueThe area around a circlePlaced at the edge or marginTo go against one's self/beliefsInflammation of the brain/spinal cordA system of geographical networks/livesSomeone who watches the scene on the sideA place to view animals confined in water

computing homework 2024-01-14

computing homework crossword puzzle
Across
  1. / internet that you plug in
  2. / connects two or more packet networks together
  3. / device to link computers together
  4. / where you live
  5. / internet to plug in
  6. / smaller segment of a larger message
Down
  1. / a place where everything is happening over the internet
  2. / device to exchange data
  3. / a set of rules
  4. / you need this to sign up to most things

10 Clues: / a set of rules/ where you live/ internet to plug in/ device to exchange data/ internet that you plug in/ device to link computers together/ you need this to sign up to most things/ smaller segment of a larger message/ connects two or more packet networks together/ a place where everything is happening over the internet

Sam's internet crossword 2023-03-01

Sam's internet crossword crossword puzzle
Across
  1. allows user to stream music and videos
  2. domain name system
  3. wall a network security system
  4. directs traffic around a network
  5. Local area network
  6. network of computers or devices
Down
  1. they store and maintain web content
  2. Internet service provider
  3. a family of wired computer networking technologies commonly used in local area networks
  4. Sent using either a wire or wirelessly

10 Clues: domain name systemLocal area networkInternet service providernetwork of computers or devicesdirects traffic around a networkwall a network security systemthey store and maintain web contentallows user to stream music and videosSent using either a wire or wirelessly...

Social News 2023-04-03

Social News crossword puzzle
Across
  1. a person who takes part in something
  2. virtual communities and networks
  3. the electronic delivery of moving images and sound from a source to a receiver(TV)
  4. trustworthy, reliable, reasonable
  5. read up on and investigate
Down
  1. newspapers, magazines, television, blogs, emails, social media, and radio
  2. exchanging information
  3. impact
  4. Step-by-step method for problem solving
  5. origin or root of

10 Clues: impactorigin or root ofexchanging informationread up on and investigatevirtual communities and networkstrustworthy, reliable, reasonablea person who takes part in somethingStep-by-step method for problem solvingnewspapers, magazines, television, blogs, emails, social media, and radio...

ICT SECTORS 2025-06-22

ICT SECTORS crossword puzzle
Across
  1. Writes code to build software applications.
  2. Provides assistance to users facing technical issues.
  3. Creates visual content using digital tools.
  4. Maintains and repairs computer hardware and software.
  5. Specializes in creating animated visuals.
  6. Handles customer inquiries over the phone.
Down
  1. Designs and maintains websites.
  2. Installs and manages network systems.
  3. Develops interactive applications for entertainment.
  4. Ensures the security of computer networks.

10 Clues: Designs and maintains websites.Installs and manages network systems.Specializes in creating animated visuals.Ensures the security of computer networks.Handles customer inquiries over the phone.Writes code to build software applications.Creates visual content using digital tools.Develops interactive applications for entertainment....

bytetrails7 2025-02-25

bytetrails7 crossword puzzle
Across
  1. Storing data over the internet
  2. Protecting data from unauthorized access
  3. Software managing hardware and software resources
  4. Virtual representation of physical hardware
Down
  1. Device that connects multiple networks
  2. A column in a table
  3. Secures data by converting it to a coded form
  4. Smallest unit of data in computing
  5. High-level programming language
  6. Set of vertices connected by edges

10 Clues: A column in a tableStoring data over the internetHigh-level programming languageSmallest unit of data in computingSet of vertices connected by edgesDevice that connects multiple networksProtecting data from unauthorized accessVirtual representation of physical hardwareSecures data by converting it to a coded form...

Greek and Latin Roots Week 5 - Position 2023-04-03

Greek and Latin Roots Week 5 - Position crossword puzzle
Across
  1. to speak ACROSS more than one language
  2. hints or clues about an event BEFORE it happens
  3. means BETWEEN the stars
  4. a CONNECTION between networks
  5. the name of a PLACE
  6. happened PRIOR to an event; coming BEFORE in time
  7. limitless; without END
Down
  1. system for converying words over DISTANCE through SOUNDS
  2. when the value of an object is in the MIDDLE
  3. BEFORE the war
  4. means BELOW the SEA
  5. happens at the END

12 Clues: BEFORE the warhappens at the ENDmeans BELOW the SEAthe name of a PLACElimitless; without ENDmeans BETWEEN the starsa CONNECTION between networksto speak ACROSS more than one languagewhen the value of an object is in the MIDDLEhints or clues about an event BEFORE it happenshappened PRIOR to an event; coming BEFORE in time...

Civil Engineering 2015-10-16

Civil Engineering crossword puzzle
Across
  1. Drainage systems
  2. Building design and stress analysis
  3. Manage work sites and building structures
  4. Plan, design, and supervise construction of transportation systems, water systems, and communication networks
Down
  1. Create plans for buildings and
  2. They chart land elevation
  3. Traffic operations
  4. Water and waste management and treatment
  5. Soil mechanics and dynamics

9 Clues: Drainage systemsTraffic operationsThey chart land elevationSoil mechanics and dynamicsCreate plans for buildings andBuilding design and stress analysisWater and waste management and treatmentManage work sites and building structuresPlan, design, and supervise construction of transportation systems, water systems, and communication networks

Chloes I.T Crossword 2021-10-29

Chloes I.T Crossword crossword puzzle
Across
  1. the smallest part of an image
  2. Hardware devices that allows a wi-fi device to connect
  3. Set of rules that computers communicate by
  4. another name for web address
  5. Temporary storage device
Down
  1. Input device
  2. Interface where a device is connected
  3. Routes traffic between networks
  4. text files retained on computers by browsers

9 Clues: Input deviceTemporary storage deviceanother name for web addressthe smallest part of an imageRoutes traffic between networksInterface where a device is connectedSet of rules that computers communicate bytext files retained on computers by browsersHardware devices that allows a wi-fi device to connect

Future Jobs 2022-01-15

Future Jobs crossword puzzle
Across
  1. discontinue a job here and offer it in another country
  2. a specialist who’s an authority on something
  3. can continue for a long time
  4. a plan
  5. safety
  6. outdated and old-fashioned
Down
  1. someone who takes on gig work
  2. what we expect to happen in the future
  3. intelligence advanced computer software
  4. someone who starts a new company
  5. work temporary work on a specific project
  6. protecting systems, networks, and programs from digital attacks

12 Clues: a plansafetyoutdated and old-fashionedcan continue for a long timesomeone who takes on gig worksomeone who starts a new companywhat we expect to happen in the futureintelligence advanced computer softwarework temporary work on a specific projecta specialist who’s an authority on somethingdiscontinue a job here and offer it in another country...

Mystery Word 2022-04-25

Mystery Word crossword puzzle
Across
  1. herb used in Mexican, Chinese and Italian dishes
  2. California's city of roses
  3. the mystery word
  4. one of the days of the week
  5. a person who works for wages or a salary
  6. technology used in computer networks
  7. a rapid spread of disease
Down
  1. Flying ________, the B-17's nickname
  2. Shirley ________, actress in Terms of Endearment
  3. mountains between the Black and Caspian Sea
  4. parts of a TV show
  5. to feel great worry over something

12 Clues: the mystery wordparts of a TV showa rapid spread of diseaseCalifornia's city of rosesone of the days of the weekto feel great worry over somethingFlying ________, the B-17's nicknametechnology used in computer networksa person who works for wages or a salarymountains between the Black and Caspian SeaShirley ________, actress in Terms of Endearment...

Chapter 10 Vocab 2014-01-27

Chapter 10 Vocab crossword puzzle
Across
  1. distributing products for amusement
  2. selling a customer additional related products
  3. a few firms affect but do not control an industry
  4. method to communicate publically
  5. costs equal revenue
  6. rankings of a tv show or radio show
  7. short term popular trend
Down
  1. independent broadcaster that contracts with larger networks
  2. a retail store with a physical building
  3. organization that focuses on providing a service
  4. marketing that focuses on a small target
  5. time free from work

12 Clues: time free from workcosts equal revenueshort term popular trendmethod to communicate publicallydistributing products for amusementrankings of a tv show or radio showa retail store with a physical buildingmarketing that focuses on a small targetselling a customer additional related productsorganization that focuses on providing a service...

Social Networks 2020-09-04

Social Networks crossword puzzle
Across
  1. Aplicación usada para subir fotos y videos (boomerangs y selfies son algunos ejemplos).
  2. Aplicación donde puedes subir fotos, compartir memes y conocer gente de todo el mundo, creada por Mark Zuckerberg
Down
  1. Aplicación usada para chatear y comunicarse con amigos y familiars de ícono verde
  2. Aplicación usada para hacer videos breves que pueden ser recetas, coreografías, challenges, entre otros.
  3. Aplicación en la cual puedes ver videos musicales, tutoriales, reseñas y también puedes subir tus propios videos y hacerte famoso/a por la cantidad de visitas que recibas.

5 Clues: Aplicación usada para chatear y comunicarse con amigos y familiars de ícono verdeAplicación usada para subir fotos y videos (boomerangs y selfies son algunos ejemplos).Aplicación usada para hacer videos breves que pueden ser recetas, coreografías, challenges, entre otros....

Informatic 2023-04-20

Informatic crossword puzzle
Across
  1. Coffee with the addition of hot boiled and very frothy milk
  2. Intangible part of the computer
  3. Necklaces, Rings, Bracelets, etc.
  4. Street Dress
Down
  1. They are strapped to their feet
  2. Tangible components external to the computer
  3. Studies the hardware, data networks and software
  4. Tangible part of a computer
  5. Elegant party attire

9 Clues: Street DressElegant party attireTangible part of a computerThey are strapped to their feetIntangible part of the computerNecklaces, Rings, Bracelets, etc.Tangible components external to the computerStudies the hardware, data networks and softwareCoffee with the addition of hot boiled and very frothy milk

Library and the Internet 2022-05-25

Library and the Internet crossword puzzle
Across
  1. connected to the Internet
  2. a picture online
  3. a username with password that allows access
  4. a way of sending messages over the internet
  5. a system of computers that are connected
Down
  1. a unique name to identify a person
  2. main menu page of a site
  3. interconnect networks that exchange information
  4. a known symbol

9 Clues: a known symbola picture onlinemain menu page of a siteconnected to the Interneta unique name to identify a persona system of computers that are connecteda username with password that allows accessa way of sending messages over the internetinterconnect networks that exchange information