networks Crossword Puzzles
Network Topology 2025-06-11
Across
- Intelligent device that connects network segments
- Large-scale network like the Internet
- Used to connect networking devices physically
- A network layout shaped in a circle
- Shared communication line topology
Down
- Topology with centralized connection
- Connects multiple computers, less intelligent than a switch
- Small local network
- Device that routes data across networks
9 Clues: Small local network • Shared communication line topology • A network layout shaped in a circle • Topology with centralized connection • Large-scale network like the Internet • Device that routes data across networks • Used to connect networking devices physically • Intelligent device that connects network segments • ...
Different Type of Networks 2018-10-15
Across
- could be mistaken with a star
- are used to play games together
- the abbreviation for a small group of connected computers
- the abbreviation for a large group of connected computers
- multiple computers connect to this with Ethernet cables
- ____________ collision is when computers send _____________ at the same time, causing them to collide
Down
- they are 9 meters long in Britain
- _____________ cable used to connect a computer to a switch on a wired network
- a piece of jewelry
- you can find them throughout the galaxy
10 Clues: a piece of jewelry • could be mistaken with a star • are used to play games together • they are 9 meters long in Britain • you can find them throughout the galaxy • multiple computers connect to this with Ethernet cables • the abbreviation for a small group of connected computers • the abbreviation for a large group of connected computers • ...
Computer Networks Set 5 2019-02-22
Across
- Transport layer is which layer in OSI model
- Congestion control can control traffic entry into a telecommunications network, so to avoid
- Security based connection is provided by which layer
- What are the functions of the transport layer
- Buffer overrun can be reduced by using what
Down
- FCP stands for
- Which services are provided by transport layer
- TCP and UDP are called ________
- Transport layer can identify the symptoms of overload nodes using _________
- _________ do not provide end to end communication.
10 Clues: FCP stands for • TCP and UDP are called ________ • Transport layer is which layer in OSI model • Buffer overrun can be reduced by using what • What are the functions of the transport layer • Which services are provided by transport layer • _________ do not provide end to end communication. • Security based connection is provided by which layer • ...
Hatton & Williamson: World Migrations 2013-09-13
7 Clues: A Push Factor • Destination in Asia • First European Origin • The Most Popular Destination • Major Explanation for Migrations • Explains Why Africans Emigrate Less • Decrease the Cost of the Settlement Process
Internet and Network 2023-04-04
7 Clues: Wide Area Network • Local Area Network • Network of networks • Communication at a distance • First satellite launched by USSR • Modulate/demodulate analog to digital • The first network created by military
Internet and Network 2023-04-04
7 Clues: Wide Area Network • Local Area Network • Network of networks • Communication at a distance • First satellite launched by USSR • First network created by military • Modulate/demodulate analog to digital signal
Acronym Challenges 2024-03-25
Across
- Not a doctor
- Helps with prescription issues
- Who keeps a large geographical area running smoothly
- One of many ways to look up a patient
- You use these when there is poor visibility
- This requires a medical justification
- Without them Nothing would get done
Down
- No follow up is needed
- Provides help to more than one person
- This keeps systems, networks and procedures secure
- A big magnet
- We use this so patients aren't surprised
- Opposite of "Public Records"
13 Clues: Not a doctor • A big magnet • No follow up is needed • Opposite of "Public Records" • Helps with prescription issues • Without them Nothing would get done • Provides help to more than one person • One of many ways to look up a patient • This requires a medical justification • We use this so patients aren't surprised • You use these when there is poor visibility • ...
circulatory system 2021-09-01
Across
- a chamber in the heart
- carries blood away from the heart
- begins at left ventricle of the heart
- without oxygen
- a muscle used to pump blood around the body
- forms a networks throughout body tissues
- a protein found in red blood cells
Down
- prevents backward flow of blood
- the name of a system that pumps blood
- with oxygen
- a liquid that circulates the human body
- creates output to maintain blood flow to other organ systems
- carries blood back to the heart
13 Clues: with oxygen • without oxygen • a chamber in the heart • prevents backward flow of blood • carries blood back to the heart • carries blood away from the heart • a protein found in red blood cells • the name of a system that pumps blood • begins at left ventricle of the heart • a liquid that circulates the human body • forms a networks throughout body tissues • ...
CO-PARENTING 2022-03-21
Across
- shared decision-making
- support ______community agencies, family or friends)
- contributing to support the child financially
- flexibility and willingness to work together
- maintain somewhat similar rules, boundaries, and schedules across households
- frequency of contact with the child
Down
- providing encouragement or emotional help
- involved in their children’s lives
- Identifying parenting styles that participants may have learned from their own ________
- joint efforts of adults who share raising children
- court approved time spent with children
- firmly fixed
- official parental separation through the court system
13 Clues: firmly fixed • shared decision-making • involved in their children’s lives • frequency of contact with the child • court approved time spent with children • providing encouragement or emotional help • flexibility and willingness to work together • contributing to support the child financially • joint efforts of adults who share raising children • ...
Chapter 2 Lessons 3 and 4 2022-10-24
Across
- main foods
- network, networks formed so goods could get to faraway places
- large round earthen houses
- cone shaped tent
- sun dried bricks made of clay and straw
- a group of leaders who meet to make decisions
Down
- extra amounts
- celebration to honor a religious or cultural event
- a device used to carry goods
- in short supply
- change or adjust
- shelters built by covering a wooden frame with mud or adobe
- a layer of soil held together by the roots of grasses
13 Clues: main foods • extra amounts • in short supply • change or adjust • cone shaped tent • large round earthen houses • a device used to carry goods • sun dried bricks made of clay and straw • a group of leaders who meet to make decisions • celebration to honor a religious or cultural event • a layer of soil held together by the roots of grasses • ...
DS breakfast quiz 2025-10-08
Across
- when you're magnus carlson in training but blunder every move in test
- OpenAI's claim to fame
- One of the V's describing challenges of "Big Data"
- not optimus prime but just as powerful
- GPT3/4,Claude...
- Neural network self-improvement through error-analysis and
Down
- Thanos for the world of neural networks
- stands out from the rest
- AI masks truth with digital-illusion
- All you need
- Sometimes it fades, sometimes it explodes
- camel-like language model
- Unites gamers and data scientists
13 Clues: All you need • GPT3/4,Claude... • OpenAI's claim to fame • stands out from the rest • camel-like language model • Unites gamers and data scientists • AI masks truth with digital-illusion • not optimus prime but just as powerful • Thanos for the world of neural networks • Sometimes it fades, sometimes it explodes • One of the V's describing challenges of "Big Data" • ...
Companies Taglines 2020-06-11
Across
- "Helps you connect and share with the people in your life"
- "There Is No Finish Line" or "Just Do It."
- "Hello. Moto"
- "Ideas for Life"
- "Better Sound Through Research"
- "It's finger lickin' good"
- "Connecting People"
- "I'm Lovin' It"
Down
- "The Future of Memory"
- "High Performance Delivered"
- "Your Potential. Our Passion" or "Where do you want to go today"
- "Sense and Simplicity"
- "We Make IT Happen"
- "… and You’re Done"
- "Networks Business Without Boundaries"
- "Powered by Intellect Driven by Values"
- "Empowering the Internet generation" or "This is the Power of the Network. Now."
- "Think Different." or "The power to be your best"
- "A Diamond Is Forever"
19 Clues: "Hello. Moto" • "I'm Lovin' It" • "Ideas for Life" • "We Make IT Happen" • "… and You’re Done" • "Connecting People" • "The Future of Memory" • "Sense and Simplicity" • "A Diamond Is Forever" • "It's finger lickin' good" • "High Performance Delivered" • "Better Sound Through Research" • "Networks Business Without Boundaries" • "Powered by Intellect Driven by Values" • ...
Basic Concepts in ICT 2023-02-19
Across
- a technology corporation
- a popular social networking site
- Information and Communication Technology Literacy
- an editable website
- inquiry-oriented lesson format
- a group of several proprietary graphical operating system
- an online journal
- combination of face-to-face and online classes
- a technology company
Down
- a video or audio multi-media clip
- massive network of networks
- a video blog
- sequential or simultaneous use of a variety of media formats
- a mobile operating system
- program control instructions and accompanying documentation
- a proprietary videotelephony software program
- mix of process and product used in the application of knowledge
- also called the Web
- a mobile operating system
- utilizes a reverse instructional delivery
20 Clues: a video blog • an online journal • an editable website • also called the Web • a technology company • a technology corporation • a mobile operating system • a mobile operating system • massive network of networks • inquiry-oriented lesson format • a popular social networking site • a video or audio multi-media clip • utilizes a reverse instructional delivery • ...
Network Basics Crossword Puzzle 2013-03-04
Across
- hard or software that accesses a service
- rate of transfer; available or consumed
- connects office, school, etc
- web, proxy, FTP, online games are types
- links network segments or devices
- has twisted pair and fiber optic links
- a participant
Down
- eg. cable or DSL modem
- Backbone data routes; interconnected networks and core routers
- barrier to prevent unauthorized communication
- category 5 patch cable
- Network connects network; provides paths for info exchange between LANs
- wifi access point
- transfers data between components inside a computer
- connects businesses, over a large area
- uses radio waves over computer network
- data structure in computer science
17 Clues: a participant • wifi access point • eg. cable or DSL modem • category 5 patch cable • connects office, school, etc • links network segments or devices • data structure in computer science • connects businesses, over a large area • uses radio waves over computer network • has twisted pair and fiber optic links • rate of transfer; available or consumed • ...
Viruses - Teddy Miller 2018-11-16
Across
- what a virus effects
- A piece of unwanted software
- software that uses networks and security holes to replicate itself
- the first email virus
- full name of PCs
- the controlling software for your computer
- a virus that floods the network
- protection for your accounts
- least likely operating system to get a virus on
- what early viruses affected
Down
- when a virus is hidden in something else
- protection for your computer
- a virus that affect the startup directions
- something that a virus cannot harm
- the original reason for viruses being created
- the original disk for viruses
- a virus that is imbedded in an email
17 Clues: full name of PCs • what a virus effects • the first email virus • what early viruses affected • protection for your computer • A piece of unwanted software • protection for your accounts • the original disk for viruses • a virus that floods the network • something that a virus cannot harm • a virus that is imbedded in an email • when a virus is hidden in something else • ...
Information technology 2021-02-06
Across
- the time during which a machine, especially a computer, is not working or is not able to be used
- happening without any sudden changes, interruption, or difficulty
- old-fashioned and therefore not as good or as fashionable as something modern
- the period of time when a computer, system, etc. is being used without any problems
- a piece of electronic equipment that connects computer networks to each other, and sends information between networks
- a central computer from which other computers get information
- working or operating quickly and effectively in an organized way
- an advertisement that is shown in a new window in front of the window that you are looking at on a website
- a part of a computer to which extra devices such as printers, scanners, and digital cameras can be connected easily:
- a set of letters and symbols in a particular design and size
Down
- a computer program, used especially in business, that allows you to do financial calculations and plans
- a set of wires, covered by plastic, that carries electricity, phone signals, etc.
- a copy of information held on a computer that is stored separately from the computer
- a measurement of the amount of information that can be sent between computers, through a phone line, etc.
- a set of programs that control the way a computer system works, especially how its memory is used and how different programs work together
- to be much better than other similar things or people
16 Clues: to be much better than other similar things or people • a set of letters and symbols in a particular design and size • a central computer from which other computers get information • working or operating quickly and effectively in an organized way • happening without any sudden changes, interruption, or difficulty • ...
graph neural networks 2022-11-02
Across
- algebraic representation of graph
- vertex in network
- method of representing objects in common space
- measure of closeness of each 2 nodes in embedding space
Down
- operation of connecting embeddings of surrounding nodes
- type of graph in which edges indicate a two-way relationship
- operation of transfering information from neighboring nodes
7 Clues: vertex in network • algebraic representation of graph • method of representing objects in common space • operation of connecting embeddings of surrounding nodes • measure of closeness of each 2 nodes in embedding space • operation of transfering information from neighboring nodes • type of graph in which edges indicate a two-way relationship
Internet and Network 2023-04-04
7 Clues: Wide Area Network • Local Area Network • Network of networks • Communication at a distance • First satellite launched by USSR • The first network created by military • Modulate/demodulate analog to digital signals
internet and Network 2023-04-04
7 Clues: wide area network • local area network • network of networks • communication at a distance • first satellite launched by USSR • the first network created by military • modulate/demodulate analog to digital signals
Raelyn`s Internet Crossword Puzzle 2013-03-26
Across
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- A bully who operates online, in cyberspace; To bully online
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- To renew or revitalize; To reload a webpage on the internet
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
Down
- a piece of writing that has been copied from someone else and is presented as being your own work
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- – An unauthorized person who secretly gains access to computer files.
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- RESOURCE LOCATOR (URL) Full website address.
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).\
12 Clues: RESOURCE LOCATOR (URL) Full website address. • A bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • – An unauthorized person who secretly gains access to computer files. • a piece of writing that has been copied from someone else and is presented as being your own work • ...
Codys internet crossword puzzle 2013-12-02
Across
- Software used to view various kinds of Internet resources found on the W
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- A bully who operates online, in cyberspace; To bully online
- An unauthorized person who secretly gains access to computer files.
Down
- a list of citations that appear at the end of a paper, article, chapter or book.
- Engine Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- To renew or revitalize; To reload a webpage on the internet
- The unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
12 Clues: To renew or revitalize; To reload a webpage on the internet • A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer files. • Software used to view various kinds of Internet resources found on the W • a list of citations that appear at the end of a paper, article, chapter or book. • ...
Talahiva 2015-04-30
Across
- a list of citations that appear at the end of a paper, article, chapter or book
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- a piece of writing that has been copied from someone else and is presented as being your own work
- online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- Using keywords such as AND, OR, NOT in web searches to narrow search results.
Down
- Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing
- LOCATOR (URL) – Full website address.
- An unauthorized person who secretly gains access to computer files.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- To renew or revitalize; To reload a webpage on the internet
12 Clues: LOCATOR (URL) – Full website address. • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • Using keywords such as AND, OR, NOT in web searches to narrow search results. • a list of citations that appear at the end of a paper, article, chapter or book • ...
Cybersecurity Fundamental Chapter 1 2023-10-03
Across
- who rally and protest against different political and social ideas.
- unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- collection of technologies that enable the connection of various devices to the Internet.
- break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
- Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
- great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
- who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- Their targets are foreign governments, terrorist groups, and corporations.
- hackers who are either self-employed or working for large cybercrime organizations.
- may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- result of data sets that are large and complex, making traditional data processing applications inadequate.
12 Clues: who rally and protest against different political and social ideas. • Their targets are foreign governments, terrorist groups, and corporations. • hackers who are either self-employed or working for large cybercrime organizations. • collection of technologies that enable the connection of various devices to the Internet. • ...
DATA TRANSMISSION 2022-07-13
Across
- a device that enables data packets to be moved between different networks.
- a verification method used to check if data transferred has been altered or corrupted.
- data that arrives at the destination with the bits no longer synchronised.
- data that can be sent one direction only.
- the actual data being carried in a data packet.
- a horizontal and vertical parity check on a block of data being transmitted.
Down
- stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
- an error checking method in which all the 1-bits the data packet payload are added and the total is stored in the packet trailer; the same calculation is repeated at the receiving station.
- the part of a data packet that indicates the end of the data packets and cylic redundancy check.
- a type of serial data transmission which has become the industry standard for connecting computers via a USB port.
- a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
11 Clues: data that can be sent one direction only. • the actual data being carried in a data packet. • a device that enables data packets to be moved between different networks. • data that arrives at the destination with the bits no longer synchronised. • a horizontal and vertical parity check on a block of data being transmitted. • ...
FLIPPED CLASSROOM 2025-11-05
Across
- A secret combination of characters used to access a system or account.
- A program that detects, prevents, and removes malicious software from a computer.
- The practice of protecting computers, networks, and data from unauthorized access, attacks, or damage.
Down
- A cyberattack that tricks people into revealing personal or financial information through fake messages or websites.
- Malicious software designed to damage, disrupt, or steal information from computers or networks.
- Security systems that monitor and control network traffic to block unauthorized access.
6 Clues: A secret combination of characters used to access a system or account. • A program that detects, prevents, and removes malicious software from a computer. • Security systems that monitor and control network traffic to block unauthorized access. • Malicious software designed to damage, disrupt, or steal information from computers or networks. • ...
the engglish puzzle 2025-02-06
Across
- these waves are useful for only very short distance communication
- transmission media, is a type of transmission media in computer networks which is also known as known as wired or bounded media
- cable, these guided transmission media contain an insulation layer that transmits information in baseband mode and brodband mode
- fibre cable, these types of transmission media are thin strands of glass that guide linght along their length
Down
- its imortant for the transmitter and receiver antena to be aligned
- pair cable, in this type of transmission media in computer networks
- media, is a system or substance that can mediate the propagation of signals for the purposes of telecommunication
- this is a transverse electromagnetic (TEM) type of transmission media in computer network that is built on the inner layers of multi-layers printed circuit boards
- transmission media, they help in transmitting electromagnetic signals without using a physical medium
- cable, are the electrical cables that come with an add-on layer of insulation and a second conducting sheet
10 Clues: these waves are useful for only very short distance communication • its imortant for the transmitter and receiver antena to be aligned • pair cable, in this type of transmission media in computer networks • transmission media, they help in transmitting electromagnetic signals without using a physical medium • ...
Digital Communications Words 2025-05-08
Across
- A network is a group of devices that share data and resources like internet or files.
- A WAN connects networks over long distances, like the internet.
- A firewall is a security tool that protects your network by monitoring and blocking harmful or unauthorized internet traffic.
- a device that allows wireless devices such as phones and laptops to connect to a network that is wired.
Down
- A server is a computer that provides data and services to other devices over a network.
- A local area network (LAN) connects devices within a small area, like a home or office.
- a wireless router is a device that gives out an internet connection to multiple devices wirelessly.
- a device that can connect many devices on a local area network to one another, allowing them to share data and communicate.
- A modem connects devices to the internet by converting signals.
- a portable mobile device which uses the internet and networks to access features such as web browsing and calling.
10 Clues: A WAN connects networks over long distances, like the internet. • A modem connects devices to the internet by converting signals. • A network is a group of devices that share data and resources like internet or files. • A server is a computer that provides data and services to other devices over a network. • ...
Data Transmission 2022-07-13
Across
- A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
- Data that arrives at the destination with the bits no longer synchronised.
- The actual data being carried in a data packet.
- Data that can be sent in both direction at the same time(simultaneously).
- A horizontal and vertical parity check on a block of data being transmitted. (2 words)
Down
- The part of the data that indicates the end of the data packet and cyclic redundancy check error check. (2 words)
- The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
- Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
- Data that can be sent on one direction only.
- A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.
10 Clues: Data that can be sent on one direction only. • The actual data being carried in a data packet. • Data that can be sent in both direction at the same time(simultaneously). • Data that arrives at the destination with the bits no longer synchronised. • A horizontal and vertical parity check on a block of data being transmitted. (2 words) • ...
Networking concepts and cyber ethics 2025-05-28
Across
- name the type of network that is mainly created for an individual person
- it works similar to hub
- it refers to a computer network restricted to an organisation
- it refers to a computer network that allows controlled access to an information source available on the internet
- the computers that communicate with each other are called
- refers to criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals are there digital devices
- it refers to the act of using or imitating the language and thoughts of another person as one's original work
Down
- it refers to an illegal intrusion into a computer system or network
- a network maintained without using wires is called a ____ network
- name the network device that is used to connect all the computers in a network with each other
- name the type of network which is larger network than LAN and its spread across a city
- it is a device that connects two different types of networks with each other
- name the type of network that connects two or more computers located at distant places
- they are technical people who are experts in Breaking into systems to steal important data such as financial details, passwords, etc
- it enables you to connect your computer to the available internet connection over the existing telephone lines
- it refers to unwanted bulk emails that come from unknown sources
16 Clues: it works similar to hub • the computers that communicate with each other are called • it refers to a computer network restricted to an organisation • it refers to unwanted bulk emails that come from unknown sources • a network maintained without using wires is called a ____ network • it refers to an illegal intrusion into a computer system or network • ...
Internet of Things 2025-08-05
Across
- A method of wireless communication used for short-range, low-power exchanges between devices in IoT.
- A method of addressing that supports large-scale IoT devices and networks.
- A type of network specifically designed for small, low-power devices, typically deployed over large areas.
- A widely-used type of IoT device that can sense and respond to environmental changes like light, temperature, or pressure.
- A protocol used for communication in the application layer of IoT systems, known for its extensibility and flexibility
- A key component of IoT that enables physical actions based on data received from sensors.
- The protocol used for transferring data in IoT with a resource-constrained environment, typically used in machine-to-machine communications.
- A type of network that uses small, low-power devices to monitor physical conditions.
Down
- A communication protocol used for lightweight messaging in IoT.
- Layer The layer that handles the exchange of information between devices over the internet in IoT.
- A communication protocol that allows for the exchange of data in IoT systems, often used in home automation.
- The concept that allows IoT devices to interact autonomously, without direct human input.
- he algorithm that helps optimize the energy efficiency of wireless sensor networks.
- The technology that allows devices to be "smart" by collecting and exchanging data automatically.
- Layer The first layer in the IoT architecture responsible for gathering data from physical world sensors and devices.
- Devices that detect physical stimuli and convert them into electrical signals for IoT systems.
16 Clues: A communication protocol used for lightweight messaging in IoT. • A method of addressing that supports large-scale IoT devices and networks. • he algorithm that helps optimize the energy efficiency of wireless sensor networks. • A type of network that uses small, low-power devices to monitor physical conditions. • ...
Assignment 6 2016-02-22
Across
- Text Highlighted Key works and subheadings
- codes or tags used to create a website
- related group of networked computers
- The use of IT resources to transmit abusive, threatening, or harassing material
- Editor editing plan text files
- Underlined, color coordinated, and identifiable
Down
- transmitting malicious code
- Both the sender and receiver are active at the same time
- Wide Web Information Superhighway
- main technology for local area networks
- Use legal doctrine that permits limited use of copyrighted material
- location area network
- Domain Name System
13 Clues: Domain Name System • location area network • transmitting malicious code • Editor editing plan text files • Wide Web Information Superhighway • related group of networked computers • codes or tags used to create a website • main technology for local area networks • Text Highlighted Key works and subheadings • Underlined, color coordinated, and identifiable • ...
Machine learning Fundamentals 2025-05-11
Across
- Simplest ML algorithm, finds closest points.
- Process of adjusting weights in neural networks.
- Training with labeled data.
- Model that separates data using a hyperplane (abbr.).
- A model's error on unseen data.
- Data feature used for training a model.
Down
- Training with unlabeled data.
- Mathematical function that reduces error.
- Neuron-inspired algorithm for deep learning.
- Performance metric: True Positives / (True Positives + False Positives).
- Model that uses a tree structure for decisions.
- Evaluation metric: (Precision + Recall)/2.
- Technique to reduce model variance using multiple learners.
13 Clues: Training with labeled data. • Training with unlabeled data. • A model's error on unseen data. • Data feature used for training a model. • Mathematical function that reduces error. • Evaluation metric: (Precision + Recall)/2. • Simplest ML algorithm, finds closest points. • Neuron-inspired algorithm for deep learning. • Model that uses a tree structure for decisions. • ...
Computer network 2024-10-21
Across
- electronic devices within a user's immediate area
- computer network made up of an interconnection of local area networks
- a series of computers linked together to form a network in a circumscribed location
Down
- a network that provides connectivity within an area the size of a metropolitan region
- to connect their office networks
5 Clues: to connect their office networks • electronic devices within a user's immediate area • computer network made up of an interconnection of local area networks • a series of computers linked together to form a network in a circumscribed location • a network that provides connectivity within an area the size of a metropolitan region
Create KIM Chart for the following vocabulary words 2025-04-02
Across
- Central Processing Unit
- a hand-held pointing device that allows users to control the cursor on a computer screen, enabling them to select items, navigate, and interact with the graphical user interface
- a data storage device that uses integrated circuits to store data persistently
- a type of non-volatile memory that stores data permanently, meaning the data remains even when power is off, and can only be read, not modified or erased
- a person who speaks
- a type of non-volatile computer memory storage medium that can be electrically erased and reprogrammed, retaining data even when power is off
- external hardware components that connect to a computer to extend its functionality
- a computer and networking device that forwards data packets between computer networks
Down
- a specialized processor originally designed to accelerate graphics rendering.
- an input device that allows you to type letters, numbers, and symbols into your computer or other electronic device
- the main printed circuit board within a computer
- an output device that displays visual information generated by a computer, like text, images, and videos
- a device that converts digital signals from a computer into analog signals for transmission over telephone lines or cable networks, and vice versa, enabling internet access and communication
- a computer's short-term memory, where the data the CPU (Central Processing Unit) needs to access quickly is stored, allowing for faster processing and multitasking
- main printed circuit board within a computer
- allows devices to communicate with each other without cables or wire
16 Clues: a person who speaks • Central Processing Unit • main printed circuit board within a computer • the main printed circuit board within a computer • allows devices to communicate with each other without cables or wire • a specialized processor originally designed to accelerate graphics rendering. • ...
Data Transmission 2022-07-13
Across
- A horizontal and vertical parity check on a block of data being transmitted. (2 words)
- The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
- Data that can be sent on one direction only.
- Data that can be sent in both direction at the same time(simultaneously).
- Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
Down
- The part of the data that indicates the end of the data packet and cyclic redundancy check error check. (2 words)
- Data that can be sent in both direction but not at the same time.
- Data that arrives at the destination with the bits no longer synchronised.
- The actual data being carried in a data packet.
- A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
- A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.
11 Clues: Data that can be sent on one direction only. • The actual data being carried in a data packet. • Data that can be sent in both direction but not at the same time. • Data that can be sent in both direction at the same time(simultaneously). • Data that arrives at the destination with the bits no longer synchronised. • ...
67 2025-10-21
Across
- An application used for sending and receiving electronic messages, typically using protocols like SMTP.
- Transmission The maximum rate of data transfer across a given path, measured in bits per second.
- A network device that connects multiple devices together in a star topology, broadcasting data to all connected devices.
- network A network that uses wireless technology, like Wi-Fi, to connect devices without physical cables.
- network The process of sending and receiving data between two or more devices on a network.
- A device that connects two or more networks and forwards data packets between them, choosing the most efficient path for the data to travel.
- hardware Physical devices that connect computers to a network, such as cables, hubs, routers, and servers.
- cable A physical medium, like a twisted-pair Ethernet cable, used to connect devices in a wired network.
Down
- Network Two or more computers or devices interconnected for communication and resource sharing.
- A global network of interconnected computer networks that use the TCP/IP protocol suite to communicate.
- A set of rules that govern how data is transmitted and received between devices on a network.
- A computer that provides services, resources, or data to other computers, known as clients, on a network.
12 Clues: network The process of sending and receiving data between two or more devices on a network. • A set of rules that govern how data is transmitted and received between devices on a network. • Network Two or more computers or devices interconnected for communication and resource sharing. • ...
Cybersecurity Fundamentals Chapter 3 2024-06-03
Across
- A type of malware that attaches itself to a legitimate executable files and requires user initiation to spread and activate.
- A program that remains dormant until triggered by a specific event to execute its harmful actions.
- Software design to disrupt, damage, or gain unauthorized access to computer systems.
- Malware that encrypts a victim's data and demands payment to restore access.
- Disguise itself as a legitimate or desired operation, requiring user interaction to execute its malicious payload.
Down
- Techniques used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
- A weakness in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause damage.
- An offensive action targeting computer systems, networks, or devices with the intent to disrupt, damage, or gain unauthorized access.
- Malicious software that replicates itself and spreads independently in networks, without needing a host program.
9 Clues: Malware that encrypts a victim's data and demands payment to restore access. • Software design to disrupt, damage, or gain unauthorized access to computer systems. • A program that remains dormant until triggered by a specific event to execute its harmful actions. • ...
IoT and smart devices 2024-11-13
Across
- assistant A software program that uses voice recognition to perform tasks, such as Amazon Alexa or Google Assistant.
- devices Objects or gadgets equipped with sensors, software, and internet connectivity that allow them to collect and exchange data.
- home A home equipped with interconnected devices that can be controlled remotely for convenience, security, and energy efficiency.
- The use of technology to perform tasks without human intervention.
- technology Electronic devices designed to be worn on the body, such as fitness trackers and smartwatches.
- The right to control personal information and protect it from unauthorized access.
Down
- of Things A network of devices that are connected and can exchange data over the internet.
- Devices that detect and measure physical properties like temperature, motion, or pressure.
- measures Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols. Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols.
- breach A security incident in which sensitive information is accessed or disclosed without authorization.
- A software application that allows users to interact with smart devices or services on their smartphones or tablets.
11 Clues: The use of technology to perform tasks without human intervention. • The right to control personal information and protect it from unauthorized access. • Devices that detect and measure physical properties like temperature, motion, or pressure. • of Things A network of devices that are connected and can exchange data over the internet. • ...
PF10 Crossword 2025-02-24
Across
- _____ Authentication. Where two different methods are needed to gain access e.g banking apps for an online purchase (4)
- Application Planning _________ These allow 2 or more systems to communicate, so long as the customer has authorized payment. (10)
- A criminal act that involves some kind of illegal attack on computers and networks. (10)
- ______ banking allows customers to securely share their bank and credit card data with trusted third parties (4)
- Storage data services via the internet that is uploaded rather than saved on a hard drive allowing easy access from anywhere (5)
Down
- software designed to infiltrate computer systems like viruses, worms and trojan horses (7)
- Combination of the words ‘financial’ and ‘technology’ to describe technology-enabled innovation (7)
- Stealing customers data by pretending to be be someone else to gain trust and get their personal info or log in details (8)
- Security on a computer that filters traffic to prevent harmful data (8)
- Infiltrating computers by getting unauthorized access to their networks (7)
10 Clues: Security on a computer that filters traffic to prevent harmful data (8) • Infiltrating computers by getting unauthorized access to their networks (7) • A criminal act that involves some kind of illegal attack on computers and networks. (10) • software designed to infiltrate computer systems like viruses, worms and trojan horses (7) • ...
IT 2023-11-27
Across
- is software created to damage or alter the computer data or its operations
- are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks
- Due to its anonymity, the Internet also provides the right environment
- provides email and access to the Web via a normal TV set plus a high-speed modem
- an International computer Network made up of thousands of networks linked together.
- are malicious programs disguised as innocent-looking files or embedded within legitimate software.
Down
- converts the digital signals stored in the computer into analogue signals that can be transmitted over telephone lines
- software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software
- orbiting the earth enable your computer to send and receive Internet files
- or black-hat hackers, are computer criminals who use technology to perform a variety of crimes: virus propagation, fraud, intellectual property theft, etc.
- are programs that spread by attaching themselves to executable files or documents.
11 Clues: Due to its anonymity, the Internet also provides the right environment • is software created to damage or alter the computer data or its operations • orbiting the earth enable your computer to send and receive Internet files • provides email and access to the Web via a normal TV set plus a high-speed modem • ...
Viruses - Teddy Miller 2018-11-16
Across
- the first email virus
- a virus that floods the network
- full name of PCs
- the original reason for viruses being created
- what early viruses affected
- the controlling software for your computer
- A piece of unwanted software
- least likely operating system to get a virus on
- something that a virus cannot harm
- what a virus effects
Down
- protection for your computer
- protection for your accounts
- a virus that affect the startup directions
- when a virus is hidden in something else
- the original disk for viruses
- software that uses networks and security holes to replicate itself
- a virus that is imbedded in an email
17 Clues: full name of PCs • what a virus effects • the first email virus • what early viruses affected • protection for your computer • protection for your accounts • A piece of unwanted software • the original disk for viruses • a virus that floods the network • something that a virus cannot harm • a virus that is imbedded in an email • when a virus is hidden in something else • ...
Viruses - Teddy Miller 2018-11-16
Across
- something that a virus cannot harm
- when a virus is hidden in something else
- the controlling software for your computer
- the original reason for viruses being created
- A piece of unwanted software
- protection for your computer
- the original disk for viruses
- protection for your accounts
Down
- full name of PCs
- a virus that affect the startup directions
- software that uses networks and security holes to replicate itself
- a virus that is imbedded in an email
- the first email virus
- what a virus effects
- what early viruses affected
- least likely operating system to get a virus on
- a virus that floods the network
17 Clues: full name of PCs • what a virus effects • the first email virus • what early viruses affected • A piece of unwanted software • protection for your computer • protection for your accounts • the original disk for viruses • a virus that floods the network • something that a virus cannot harm • a virus that is imbedded in an email • when a virus is hidden in something else • ...
CYBER 2021-03-27
Across
- A secret word or phrase that is used to access a computer system or service.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- The method of obtaining user information through fraudulent communications targeted directly at people.
- The way in which the identity of a user is confirmed.
- security A technique for protecting computers, networks, programs, and
Down
- A technique for protecting computers, networks, programs, data from unauthorized access or hackers for exploitation.
- Software that automatically displays or downloads material when a user is offline.
- are typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, it can piggyback onto programs to corrupt data or expand throughout a network and damage systems across a company.
- Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice.
- A cyber attacker who uses software and social engineering methods to steal data and information. data from unauthorized access or hackers for exploitation.
10 Clues: The way in which the identity of a user is confirmed. • security A technique for protecting computers, networks, programs, and • A secret word or phrase that is used to access a computer system or service. • Software that automatically displays or downloads material when a user is offline. • ...
Artificial intelligence 2019-07-03
Across
- What is the company name which manufactured the full scale humanoid robot?
- Founder of Bitcoin
- is the task of discovering groups & structures in the data that are in some way or another “similar” without using known structures in data
- is the process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics & database systems
- is about constructing and analyzing protocols that prevent third parties or the public from reading the private messages
Down
- is a revolutionary technology and distributed ledger platform that allows information to be shared but not copied across a series of networks
- is a combination of networks, hardware, services , storage, and interfaces that helps in delivering computing as a service
- is an application that provides systems the ability to automatically learn and improve from experience without being explicitly programmed
- One of the founder of Artificial Intelligence
- is a branch of artificial intelligence that helps computers understand, interpret, and manipulate human language
10 Clues: Founder of Bitcoin • One of the founder of Artificial Intelligence • What is the company name which manufactured the full scale humanoid robot? • is a branch of artificial intelligence that helps computers understand, interpret, and manipulate human language • ...
AI Related Vocabulary 2024-06-19
Across
- A step-by-step procedure or formula for solving a problem or performing a task.
- A field of AI focused on the interaction between computers and humans using natural language.
- A type of artificial intelligence that enables computers to learn and make decisions based on data.
- A field of AI that enables computers to interpret and make decisions based on visual data from the world.
Down
- A computing system inspired by the biological neural networks of animal brains, used to approximate functions that depend on a large number of inputs.
- Extremely large datasets that can be analyzed to reveal patterns, trends, and associations.
- The use of technology to perform tasks without human intervention.
- The design, construction, and operation of robots, often incorporating AI to perform tasks autonomously.
- A computer system modeled on the human brain's network of neurons, used to recognize patterns and solve complex problems.
- A subset of machine learning involving neural networks with many layers, capable of learning from vast amounts of data.
10 Clues: The use of technology to perform tasks without human intervention. • A step-by-step procedure or formula for solving a problem or performing a task. • Extremely large datasets that can be analyzed to reveal patterns, trends, and associations. • A field of AI focused on the interaction between computers and humans using natural language. • ...
Data Transmission 2022-07-13
Across
- A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.
- The part of the data that indicates the end of the data packet and cyclic redundancy check error check.
- Data that can be sent on one direction only.
- The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
Down
- A horizontal and vertical parity check on a block of data being transmitted. (2 words)
- Data that can be sent in both direction at the same time(simultaneously).
- The actual data being carried in a data packet.
- Data that arrives at the destination with the bits no longer synchronised.
- A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
- Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
10 Clues: Data that can be sent on one direction only. • The actual data being carried in a data packet. • Data that can be sent in both direction at the same time(simultaneously). • Data that arrives at the destination with the bits no longer synchronised. • A horizontal and vertical parity check on a block of data being transmitted. (2 words) • ...
Networks and Databases 2021-10-04
Nology 2024-05-09
Across
- The place where the connection starts and ends
- a range of frequencies sending data
- make it hard to crack
- Arrangement of telecommunication networks
- someone in charge over things
- network that connects devices within limited area
Down
- the set process for a situation
- user, buyer
- the place where you'll find political debates and YouTube kids in the same place
- a connection Between devices
- a virtual room
- online label your device uses to communicate
- the thing stopping you from being hacked
13 Clues: user, buyer • a virtual room • make it hard to crack • a connection Between devices • someone in charge over things • the set process for a situation • a range of frequencies sending data • the thing stopping you from being hacked • Arrangement of telecommunication networks • online label your device uses to communicate • The place where the connection starts and ends • ...
network 2024-05-09
Across
- maximum amount of data
- a way of scrambling data
- computer system that provides resources, data,services or programs to other computers
- arrangement of the elements of a communication network
- interconnection of networks in a limited area
- a person responsible for carrying out the administration
Down
- standardized set of rules for formatting and processing data
- a person or organization using the services
- computer network for sharing information
- network security device
- numerical label
- virtual places within an operating system
- group of devices interconnected exchaning data
13 Clues: numerical label • maximum amount of data • network security device • a way of scrambling data • computer network for sharing information • virtual places within an operating system • a person or organization using the services • interconnection of networks in a limited area • group of devices interconnected exchaning data • ...
computer hardware 2022-10-03
Across
- in the context of networking, is a high-speed device that receives incoming data packets and redirects them to their destination
- is a network of connected devices that exist within a specific location.
- consists of multiple devices that communicate with one another.
- is a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes.
- is a communications protocol that is used for wireless data access through most mobile wireless networks
- is a computer system that hosts web
Down
- is a wall made of brick, steel, or other inflammable material that prevents the spread of a fire in a building
- is a network topology in which each network component is physically connected to a central node such as a router,
- It is similar to a Local Area Network (LAN), but it's a lot bigger.
- is short for "Modulator-Demodulator." It is a hardware component that allows a computer or another device, such as a router or switch, to connect to the Internet
- is a component that provides networking capabilities for a computer
- is a hardware device that directs traffic between networks and devices.
12 Clues: is a computer system that hosts web • consists of multiple devices that communicate with one another. • It is similar to a Local Area Network (LAN), but it's a lot bigger. • is a component that provides networking capabilities for a computer • is a hardware device that directs traffic between networks and devices. • ...
Learn by fun -1 [U1:Cellular Network vs Ad hoc network] 2022-09-03
Across
- topology in adhoc network is---------
- Do ad hoc network need infrasructure?
- time synchronization in adhoc network is-----
- cost for adhoc network installation is ------
- frequency reuse in cellular network is -------
- bandwidth assurance in cellular network is ---
- network routing in ad hoc network
- host requirement in ad hoc network is ------
Down
- frequency reuse in adhoc network is-------
- adhoc network is -----------during change in topology
- call breaks in ad hoc networks are------
- hops in cellular network is -------
- deployment time in adhoc network is ----
- technology in adhoc network is -------
14 Clues: network routing in ad hoc network • hops in cellular network is ------- • topology in adhoc network is--------- • Do ad hoc network need infrasructure? • technology in adhoc network is ------- • deployment time in adhoc network is ---- • call breaks in ad hoc networks are------ • frequency reuse in adhoc network is------- • host requirement in ad hoc network is ------ • ...
Introduction to Computers Crossword 2022-02-28
Across
- hardware and software that work together to make a computer run
- unorganized facts and statistics
- group of associated devices
- processing
- the parts we can physically see and touch
- sound in your headphones
- stores, shares, examines mass amounts of data
- a kind of computer memory where information can be kept.
Down
- hardware used to send information to the computer
- set of commands
- runs programs
- Programs that enable the user to complete tasks.
- worldwide network
- delivers images, and videos that can be seen on the computer screen.
14 Clues: processing • runs programs • set of commands • worldwide network • sound in your headphones • group of associated devices • unorganized facts and statistics • the parts we can physically see and touch • stores, shares, examines mass amounts of data • Programs that enable the user to complete tasks. • hardware used to send information to the computer • ...
Computer parts 2024-02-06
Across
- computer expansion card that generates a feed of graphics
- Power SuppMonitor
- Device with a screen used for display
- stores all your digital content
- hand-held pointing device
- enters characters and functions into the computer
- worldwide system of computer networks
Down
- used to draw cooler air into the case from the outside
- device that accepts text and graphic output from a computer and transfers the information to paper
- Computer processor
- the main printed circuit
- contains most of the hardware of a personal computer
- random access memory
- allows you to use CDs
14 Clues: Power SuppMonitor • Computer processor • random access memory • allows you to use CDs • the main printed circuit • hand-held pointing device • stores all your digital content • Device with a screen used for display • worldwide system of computer networks • enters characters and functions into the computer • contains most of the hardware of a personal computer • ...
Topic 3 AI & Competition Law 2024-11-15
Across
- Rules governing AI development and implementation
- When AI systems independently coordinate to avoid competition
- Large technology firms influencing markets
- Control by a major player in a market
- Internet-based computing and storage services
- Technology that mimics human thinking and learning
- Moral principles governing behavior
- Unfair preference in decision-making
Down
- Safeguarding personal information
- Charging different prices based on user data
- Organization for global trade rules
- Ensures fairness and innovation in markets
- Clarity in AI decision-making processes
- Protecting systems and networks from attacks
14 Clues: Safeguarding personal information • Organization for global trade rules • Moral principles governing behavior • Unfair preference in decision-making • Control by a major player in a market • Clarity in AI decision-making processes • Large technology firms influencing markets • Ensures fairness and innovation in markets • Charging different prices based on user data • ...
Immigration and Urbanization 2023-11-29
Across
- Sociologist Barry _____ points out that our networks in school, work, and online now define our communities as much as our residential neighborhoods
- _____ Capital: Tight connections that people form with each other through organizations, civic life, and strong social ties.
- Movement of products, services, and information across national and continental boundaries.
- Sociologist Claude ______ argues that cities generate new forms of community, such as subcultures
- Chicago New York, and ______ have the highest levels of segregation between Black and white people
- Ethnic ______: Section of a city where the local culture and labor market are dominated by a single ethnic group.
- The largest number of new immigrants come from India, Mexico, the Philippines, El Salvador, and ______
- The Great ______: Movement of millions of African Americans, from 1900 to 1970, into cities outside the south.
- A group that hold values and engage in activities that separate them from wider society.
- Practice of outlining in red any sections of a city that were considered “risky” and rejecting loan applications in that area
Down
- Growth in the proportion of a nation’s population living in cities.
- Social _____: Various types of connections that individuals form with other people, no matter where they’re located.
- More than ___ million African Americans left the south between 1900-1970
- _____ Cities: Major urban areas that serve as nodes for the worldwide network of economic activity.
- Unique ways of life found in cities.
- Urban areas with at least 10 million people.
- Type of violence experienced by immigrants as a result of immigration policies.
- Migration of Whites out of central city neighborhoods and into suburban communities (2 words)
- Chains of densely populated areas that extend over long stretches of space.
19 Clues: Unique ways of life found in cities. • Urban areas with at least 10 million people. • Growth in the proportion of a nation’s population living in cities. • More than ___ million African Americans left the south between 1900-1970 • Chains of densely populated areas that extend over long stretches of space. • ...
Viruses - Teddy Miller 2018-11-16
Across
- the original disk for viruses
- what early viruses affected
- the first email virus
- when a virus is hidden in something else
- the controlling software for your computer
- full name of PCs
- A piece of unwanted software
- protection for your accounts
Down
- a virus that affect the startup directions
- a virus that floods the network
- software that uses networks and security holes to replicate itself
- the original reason for viruses being created
- what a virus effects
- protection for your computer
- a virus that is imbedded in an email
- something that a virus cannot harm
- least likely operating system to get a virus on
17 Clues: full name of PCs • what a virus effects • the first email virus • what early viruses affected • protection for your computer • A piece of unwanted software • protection for your accounts • the original disk for viruses • a virus that floods the network • something that a virus cannot harm • a virus that is imbedded in an email • when a virus is hidden in something else • ...
Network Basics Crossword Puzzle 2013-03-04
Across
- eg. cable or DSL modem
- rate of transfer; available or consumed
- links network segments or devices
- transfers data between components inside a computer
- connects office, school, etc
- connects businesses, over a large area
- has twisted pair and fiber optic links
- category 5 patch cable
- a participant
Down
- barrier to prevent unauthorized communication
- Network connects network; provides paths for info exchange between LANs
- wifi access point
- uses radio waves over computer network
- hard or software that accesses a service
- Backbone data routes; interconnected networks and core routers
- web, proxy, FTP, online games are types
- data structure in computer science
17 Clues: a participant • wifi access point • eg. cable or DSL modem • category 5 patch cable • connects office, school, etc • links network segments or devices • data structure in computer science • uses radio waves over computer network • connects businesses, over a large area • has twisted pair and fiber optic links • rate of transfer; available or consumed • ...
Belize Adventist College 2021-03-29
VLAN Puzzle 2020-12-09
Across
- The process of transferring VLAN traffic between two or more switches.
- This switch works at Layer 2 and Layer 3 of the OSI model.
- A Cisco proprietary protocol that updates a VLAN switch into three states - server, client or transparent
- Type of attack allows unauthorized access to VLANs but this is mitigated by changing the native VLAN to an unused one and configuring the trunk
- The configuration for when a router interface is connected to multiple VLANs on a switch
- If you give an incorrect VLAN ____ to a device, then that device won’t have access to resources it needs.
Down
- AAA is vital to switches’ security because it supports port _____, which gives us a way to protect our network from unwanted people trying to access the network.
- This special remote access server program allows the server endpoint to function as a network router, which routes IP packets between networks.
- This lets you segment a physical network into multiple discrete networks without having to add additional hardware.
- These VLANs based on MAC addresses
- to tag its native VLAN traffic.
- The process of making a router work between two VLANs is called ______ routing.
12 Clues: to tag its native VLAN traffic. • These VLANs based on MAC addresses • This switch works at Layer 2 and Layer 3 of the OSI model. • The process of transferring VLAN traffic between two or more switches. • The process of making a router work between two VLANs is called ______ routing. • ...
packet switching in computer network 2025-05-25
Across
- Unpredictable delay in network delivery
- Network communication rules
- Method of transmitting data in discrete chunks
- Temporary storage used while forwarding packets
Down
- Device that connects multiple networks
- Opposite of packet switching
- A computer connected to a network
- Smallest unit of data sent over a network
- Internet's addressing system
9 Clues: Network communication rules • Opposite of packet switching • Internet's addressing system • A computer connected to a network • Device that connects multiple networks • Unpredictable delay in network delivery • Smallest unit of data sent over a network • Method of transmitting data in discrete chunks • Temporary storage used while forwarding packets
CIW Review 2017-05-10
Across
- Can store contact information, help you take notes and keep track of appointments.
- Collection of personal thoughts posted on a public Web site.
- Security barrier that prevents unauthorized access to or from private networks.
- Unethical practice in which the perpetrator capitalizes on typing mistakes that users make when entering the URL of a Web site into a browser.
- Software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.
- Small text files placed on Web site visitors' computers.
- Tool that guides users step-by-step through a software installation process, or assists users of an application in creating documents and/or databases based on styles and templates.
- Windows One or more small windows may suddenly open in front of the page you are viewing
- List Published list of IP addresses known to be sources of spam
- Encourage common sense and politeness, and to establish general rules for Internet etiquette.
- Enable users to narrow their Internet search results by requiring or excluding keywords from the search criteria
- encyclopedias and reference material that list additional titles. These additional titles can be either primary or secondary sources.
Down
- Malicious program designed to damage computer systems, from stand-alone computers to entire networks.
- Certificate Proves the identity of an individual or company over the Web.
- The process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data.
- Computing Person's ability to use technology while "on the go."
- URL The full path from the system root to a specific page or resource.
- Completely Automated Public Turing Test to Tell Computers and Humans Apart
- Junk e-mail that can clutter your Inbox
19 Clues: Junk e-mail that can clutter your Inbox • Small text files placed on Web site visitors' computers. • Collection of personal thoughts posted on a public Web site. • Computing Person's ability to use technology while "on the go." • List Published list of IP addresses known to be sources of spam • ...
Objective 4e: Political Dimensions of Maritime Empires 2024-11-15
Across
- A Japanese state that implemented isolationist policies to minimize foreign influence during the period 1450-1750.
- Competition among European states that drove the establishment of maritime empires and control over trade routes.
- A trade policy used by the Qing Dynasty to regulate foreign trade, restricting it to the port of Canton (Guangzhou).
Down
- Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence.
- A West African state that gained political and economic power through participation in maritime trade networks.
- Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks.
- A Chinese dynasty that continued restrictive trade practices, including the Canton System, to limit European influence.
- A Central African state whose involvement in global trade increased its regional influence.
- A Chinese dynasty that adopted restrictive trade policies to limit the influence of European trade and culture.
9 Clues: A Central African state whose involvement in global trade increased its regional influence. • Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence. • Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks. • ...
technology 2025-10-22
Across
- a hardware device or software program that provides services, data, and resources to other computers or devices, called "clients," over a network.
- a small, formatted unit of data transmitted over a computer network
- a vast, global network of interconnected computer networks that communicate using a standard set of communication protocols.
- a hardware device that forwards data packets between computer networks.
Down
- a type of computer network that uses physical cables to connect devices and facilitate the transmission of data.
- A system of two or more interconnected computing devices that can communicate with one another to share data, resources and services.
- a method of sending and receiving digital messages over a computer network.
- a standardized set of rules that governs how electronic devices communicate with each other.
- the maximum amount of data that can be transferred over a network connection in a given amount of time
9 Clues: a small, formatted unit of data transmitted over a computer network • a hardware device that forwards data packets between computer networks. • a method of sending and receiving digital messages over a computer network. • a standardized set of rules that governs how electronic devices communicate with each other. • ...
27 2024-01-08
Across
- Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device. (Note: Repeated for variety.)
- Artificially manipulated media that may depict events that never occurred or present fictionalized versions of real events.
- The use of largely automatic equipment in a system of operation. (Note: Repeated for variety.)
- The activity of exploiting genetic material experimentally without regard to ethical considerations. (Note: Repeated for variety.)
- The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
Down
- A virtual reality space where users can interact with a computer-generated environment.
- The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
- Economy A labor market characterized by the prevalence of short-term, flexible jobs.
- A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
- Physical or emotional exhaustion, often due to prolonged stress or overwork.
- Tech Technology designed to enhance the relationship between citizens and government.
- Literacy The ability to use and understand digital technologies, communication tools, and networks.
12 Clues: Physical or emotional exhaustion, often due to prolonged stress or overwork. • Economy A labor market characterized by the prevalence of short-term, flexible jobs. • Tech Technology designed to enhance the relationship between citizens and government. • A virtual reality space where users can interact with a computer-generated environment. • ...
Computer network 2024-10-21
Across
- a series of computers linked together to form a network in a circumscribed location
- to connect their office networks
- computer network made up of an interconnection of local area networks
Down
- a network that provides connectivity within an area the size of a metropolitan region
- electronic devices within a user's immediate area
5 Clues: to connect their office networks • electronic devices within a user's immediate area • computer network made up of an interconnection of local area networks • a series of computers linked together to form a network in a circumscribed location • a network that provides connectivity within an area the size of a metropolitan region
Types of Networks 2017-09-25
Across
- this has no central server to manage the network
- a network that is restricted to a small geographical area
- a computer on a network which provides resources that can be used by client devices
- a set of computers and devices connected together so they can communicate and share resources
Down
- Has atleast one server and several clients
- a privately owned network that uses client servers
- a network that covers a larger geographical area
7 Clues: Has atleast one server and several clients • this has no central server to manage the network • a network that covers a larger geographical area • a privately owned network that uses client servers • a network that is restricted to a small geographical area • a computer on a network which provides resources that can be used by client devices • ...
Networks by Danielle 2015-05-11
7 Clues: The title of the crossword • Computer instructions or data • Physical components of a computer • Abbreviation of Network Interface Card • Passes on all data to all of the computers • Different ways of writing a network together • Does not pass on the data to all parts of the network
Ad - Hoc Networks 2024-09-17
Across
- Ad Hoc networks allow users to access the internet in most ______
- ____ wifi is provided in train stations, cafes, etc
- A ______ key is needed to access a wireless connection (like a password)
- enables a device to connect to an internet connection
Down
- You can create a personal _____ to share your internet connection with your friends.
- When access a an Ad Hoc network you will not use up your data _________
- An ad-hoc network is ______ to set up
7 Clues: An ad-hoc network is ______ to set up • ____ wifi is provided in train stations, cafes, etc • enables a device to connect to an internet connection • Ad Hoc networks allow users to access the internet in most ______ • When access a an Ad Hoc network you will not use up your data _________ • A ______ key is needed to access a wireless connection (like a password) • ...
Computing 2020-02-16
Across
- A device that is used to recharge a battery, e.g. in a mobile phone.
- A piece of electronic equipment that connects computer networks to each other and sends information between networks.
- A computer screen or a device with a screen on which words or pictures can be shown.
- A device with parts that cover each ear through which you can listen to music (plural).
- A computer that is small enough to be carried around easily and is designed for use ouside an office.
- A piece of electrical equipment through which recorded or broadcast sound can be heard (plural).
- A small flat computer that is controlled by touching the screen or by using a special pen.
- A small device that you move across a surface in order to move a cursor on your computer screen.
Down
- A machine connected to a computer that prints onto paper using ink.
- The board with a set of keys on a computer to type information.
- An electronic machine thatvis used for storing, organizing and finding words, numbers and pictures.
- A brand name for a small piece of equipment that you connect to a computer to copy and store information.
- A camera that records moving pictures and sound and allows these to be broadcast on the internet as they happen.
13 Clues: The board with a set of keys on a computer to type information. • A machine connected to a computer that prints onto paper using ink. • A device that is used to recharge a battery, e.g. in a mobile phone. • A computer screen or a device with a screen on which words or pictures can be shown. • ...
technology 2025-05-14
Across
- Fifth-generation mobile network technology
- Distributed ledger technology for cryptocurrencies
- Electric car company founded by Elon Musk
- Internet-based computing service model
- Network of interconnected smart devices
Down
- World’s largest search engine
- Technology protecting networks from attacks
- Computer system mimicking human intelligence
8 Clues: World’s largest search engine • Internet-based computing service model • Network of interconnected smart devices • Electric car company founded by Elon Musk • Fifth-generation mobile network technology • Technology protecting networks from attacks • Computer system mimicking human intelligence • Distributed ledger technology for cryptocurrencies
JMoreno - Network Devices 2023-01-03
Across
- all-in-one security appliance, includes all functionality of an IDS/IPS as well as stateful firewall services
- Used for larger networks and is configured with VLANS and port security
- passively monitor traffic on network
- also called Ethernet over Power, that uses existing electrical wiring to connect devices
- Also called extenders because they extend the distance a signal can travel
- techniques used by firewalls to determine what is permitted or denied access to a network segment
- responsible for monitoring all the end devices in your network
- Systems that are related to legacy systems and have an embedded microchip dedicated to input and output instructions to specialized device like thermostat
Down
- used as a place to collect incoming cables runs from various networking devices
- Enter's address into switching table that records the address for each device connected to the switch, and records which switch port can be used to reach a device with a given address.
- uses IP addresses to forward traffic to other networks
- replaces IDS and is implemented in inline mode, responds quickly, doesn't allow any malicious traffic to pass
- protects data and equipment on a network from unauthorized access
- This provides the physical connection to the network at the PC or other end device
- method for powering devices that do not have battery or access to power outlet and transfers small amounts of DC current over ethernet cable
- Systems that are no longer supported but are still in operation
- Divides LANS into segments to filter network traffic
- provide network access to wireless devices like laptops and tablets
- Receive data on one port and then send it out to all other ports
19 Clues: passively monitor traffic on network • Divides LANS into segments to filter network traffic • uses IP addresses to forward traffic to other networks • responsible for monitoring all the end devices in your network • Systems that are no longer supported but are still in operation • Receive data on one port and then send it out to all other ports • ...
Module 11 2024-12-10
Across
- creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
- s a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
- is the most widely used method for encrypting data
- backs up any files that have changed since the last full or incremental backup
- creates a barrier between two entities
- creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
- a framework for other protocols that provide encryption and authentication
- prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
- backs up the disk sector by sector to create an exact image of the disk’s contents
Down
- all of the disk’s contents are backed up as individual folders and files
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- only backs up files that have changed since the last full backup
- is used to encrypt files and folders
- security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
- security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
- document that describes the rules of an organization
- used in a Windows domain environment and provides mutual authentication
- requires a user to supply two or more types of authentication
- an industry-standard client/server protocol that offers centralized control
- is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
20 Clues: is used to encrypt files and folders • creates a barrier between two entities • is the most widely used method for encrypting data • document that describes the rules of an organization • requires a user to supply two or more types of authentication • only backs up files that have changed since the last full backup • ...
Cyber Security - Chapter 1 2020-02-12
Across
- State Sponsored Hackers
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
- The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
- The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- is the collection of technologies that enable the connection of various devices to the Internet.
- is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
- Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
- Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
15 Clues: State Sponsored Hackers • This group of criminals breaks into computers or networks to gain access for various reasons. • is the collection of technologies that enable the connection of various devices to the Internet. • Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards. • ...
cyber security vocabulary 2023-09-07
Across
- letter numbers and symbols combined to prevent unauthorized entry
- sofware that creates representations of servers, storage and networks
- a collection of documents
- an illegitimate source, not mainstream
- not connected to the internet
- software that prevents attacks
- handles cpu and high speed ram
- an extra layer of security
- information on a computer
- created on the internet to serve a purpose
- preserves the condition of a computer
- connection between computers
Down
- connects a computer to internet
- an attack via email or text in an attempt at information
- false information used to obtain information
- handles peripherals
- physical parts of a computer
- an account created to send information
- information withheld in exchange for money
- an increased use in cpu
20 Clues: handles peripherals • an increased use in cpu • a collection of documents • information on a computer • an extra layer of security • physical parts of a computer • connection between computers • not connected to the internet • software that prevents attacks • handles cpu and high speed ram • connects a computer to internet • preserves the condition of a computer • ...
HUSEIN 2024-09-06
Across
- - Network Interface Card
- - Hard Disk Drive
- - Vital Information Resource Under Siege
- - Random Access Memory
- - Basic Input/Output System
- - Serial Advanced Technology Attachment
- - MultiMediaCard
- - Liquid Crystal Display
- - Advanced Technology Attachment
- - Refers to micro versions of interfaces or devices, such as micro USB
- - Graphics Processing Unit
- - Refers to mini versions of interfaces or devices, such as mini USB
Down
- - Digital Visual Interface
- - A family of networking technologies used in local area networks (LANs)
- - High-Definition Multimedia Interface
- - New Technology File System
- - Central Processing Unit
- - Video Graphics Array
- - Universal Serial Bus
- - Read-Only Memory
- - Solid-State Drive
- - Automatic Frequency Assignment
- - Control Unit
- - Character User Interface
- - Arithmetic Logic Unit
- - Redundant Array of Independent Disks
26 Clues: - Control Unit • - MultiMediaCard • - Hard Disk Drive • - Read-Only Memory • - Solid-State Drive • - Video Graphics Array • - Universal Serial Bus • - Random Access Memory • - Arithmetic Logic Unit • - Network Interface Card • - Liquid Crystal Display • - Central Processing Unit • - Digital Visual Interface • - Character User Interface • - Graphics Processing Unit • ...
Qué Chévere 2 Unidad 1A #2 (2024-2025) 2024-08-25
Across
- social networks
- information
- to do a search
- I am going to, you are going to, he/she is going to
- to browse
- technology
- I washed, you washed, he/she washed, they washed
- link
- I have to charge my cell phone.
- I have to, you have to, he/she has to
- I am, you are, he/she is
Down
- I do, you do, he/she does, we do, they do
- I live, you live, he/she lives
- Are you going to finish the homework?
- program
- world
- text message
- browser
- I can, you can, he/she can, we can, they can
- to continue
20 Clues: link • world • program • browser • to browse • technology • information • to continue • text message • to do a search • social networks • I am, you are, he/she is • I live, you live, he/she lives • I have to charge my cell phone. • Are you going to finish the homework? • I have to, you have to, he/she has to • I do, you do, he/she does, we do, they do • I can, you can, he/she can, we can, they can • ...
Training 2020-05-15
Across
- component needed to go to access.statestreet.com
- Tool in which each agent must claim their weekly hours
- is a program or software installed on a compute
- application similar to whatsApp that ibm employees use
- chat application for State Street users
- Computer hasn't connected to the networks in 3+ days
Down
- environment that we must access to work
- Detects suspicious drive activity
- runs commands
- First time installation
- New proxy environment
11 Clues: runs commands • New proxy environment • First time installation • Detects suspicious drive activity • environment that we must access to work • chat application for State Street users • is a program or software installed on a compute • component needed to go to access.statestreet.com • Computer hasn't connected to the networks in 3+ days • ...
Training 2020-05-15
Across
- New proxy environment
- component needed to go to access.statestreet.com
- Tool in which each agent must claim their weekly hours
- is a program or software installed on a compute
- environment that we must access to work
- application used to ask for help
- First time installation
Down
- Computer hasn't connected to the networks in 3+ days
- chat application for State Street users
- Detects suspicious drive activity
- runs commands
11 Clues: runs commands • New proxy environment • First time installation • application used to ask for help • Detects suspicious drive activity • chat application for State Street users • environment that we must access to work • is a program or software installed on a compute • component needed to go to access.statestreet.com • Computer hasn't connected to the networks in 3+ days • ...
IoT Phrases 2017-10-29
Across
- Digital data is converted to Analog data
- reduce power consumption, traffic congestion, and to increase network lifetime and data accuracy
- Node/Device
- Eyes & Ears
Down
- Cellular
- Big Data
- Programming is flying; no borders anymore
- Network links between Edges (subnetworks) and main Backbone network
- it is not really cloudy yet
- generate information
- wireless technology to address the unique needs of low-cost, low-power wireless M2M and IoT networks
11 Clues: Cellular • Big Data • Node/Device • Eyes & Ears • generate information • it is not really cloudy yet • Digital data is converted to Analog data • Programming is flying; no borders anymore • Network links between Edges (subnetworks) and main Backbone network • reduce power consumption, traffic congestion, and to increase network lifetime and data accuracy • ...
Chapter 15 Globalism: Information, Communication, and The Digital Revolution 2024-12-10
Across
- Devices used for computing and connecting online.
- Method for delivering messages electronically.
- Process of converting data into a secure code.
- Storing data on remote servers accessed via the Internet.
- Portable electronic device for accessing information.
- Software that performs malicious activities.
- Online platform for social interaction.
Down
- Digital means of connecting people worldwide.
- Measure to protect networks and systems.
- Global system for mobile communication.
- Widespread sharing of digital media.
11 Clues: Widespread sharing of digital media. • Global system for mobile communication. • Online platform for social interaction. • Measure to protect networks and systems. • Software that performs malicious activities. • Digital means of connecting people worldwide. • Method for delivering messages electronically. • Process of converting data into a secure code. • ...
CISO Crossword Puzzle: 0423 2023-06-03
Across
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- The environment in which communication over computer networks occurs through a widespread interconnected digital technology
- Defrauding people over the phone, enticing them to divulge sensitive information
- A type of threat where an unauthorized entity gains access to a system by illegitimately posing as an authorized entity
- The process of converting information or data into a unreadable code, especially to prevent unauthorized access
Down
- An attack method used by fraudsters that focus on people rather than technology
- A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
- A software that blocks access to the victim's computer/data and threatens to publish or delete it until ransom is paid
- A secret word or phrase that is used to access a computer system or service
- A cyberattack technique that injects malicious code within user's digital advertisements
- A program made up of malicious code that replicates and propagates itself from device to device using computer networks
- an authorized simulated attack performed on a computer system to evaluate its security
12 Clues: A secret word or phrase that is used to access a computer system or service • An attack method used by fraudsters that focus on people rather than technology • Defrauding people over the phone, enticing them to divulge sensitive information • an authorized simulated attack performed on a computer system to evaluate its security • ...
Aurora Indonesia Crossword Quiz 2022-11-29
7 Clues: Dex on NEAR • Lending & Stableswap • Lend and Borrow dApps • Has unlocked the new features • Marketplace on NEAR and AURORA • Free Transaction & Referral Program • Move tokens between the three of networks
McKenna Rochelle - Crossword - 1st Period 2016-10-24
Across
- A denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files without need for a central server.
- It is a networking hardware device that allows a WiFi compliant device to connect to a wired network.
- The practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
- It is a common connection point for devices in a network.
- It helps run games, email, web browsers, and almost everything on your computer or device.
- A router is a networking device that forwards data packets between computer networks.
- A portable phone that is almost exactly alike to a computer.
- A corrupted code that can destroy your computer.
- It is software that is made to damage or disable computers.
Down
- It is a numbered label that is assigned to each device.
- is a type of computer program that is used to run a computer's hardware and application program.
- A picture on a video that is used to bring in a audience.
- A portable computer that can be used like a normal computer.
- it is the study of use of systems for storing, retrieving, or sending information.
- A desktop computer terminal, typically networked and more powerful than a personal computer.
- When you act responsibly on the internet.
- When you post inappropriate messages over, and over again.
- It is a system for connecting a number of computer systems to form a local area network.
- Used to transfer digital signals over standard telephone lines.
19 Clues: When you act responsibly on the internet. • A corrupted code that can destroy your computer. • It is a numbered label that is assigned to each device. • A picture on a video that is used to bring in a audience. • It is a common connection point for devices in a network. • When you post inappropriate messages over, and over again. • ...
Computer Network 2023-10-03
Across
- A device connected to several other devices.
- intelligent or made in a complicated way and therefore able to do complicated tasks
- to listen to someone's private conversation from close by without them knowing
- difficult to understand or find an answer to because of having many different parts
- a measurement of the amount of information that can be sent between computers, through a phone line, etc.:
- to keep something as it is, especially in order to prevent it from decaying or being damaged or destroyed
- a machine, system, law, etc. that has been replaced by a new one OR the person who had a particular job or position before someone else
- Device that boost electrical signals to restore their strength when they travel long distances in cables.</p>
- the way the parts of something are organized or connected:
Down
- the quality of being vulnerable (= able to be easily hurt, influenced, or attacked), or something that is vulnerable
- a piece of electronic equipment that connects computer networks to each other, and sends information between networks
- A device that forwards traffic between network segments based on data link layer information, where the segments share a common network layer address.
- an object that contains the controls for a piece of equipment
- without someone's official permission to do something or be in a particular place
- the outer or furthest point of something:
- having many parts that are organized in a way that may be difficult to understand
- the way in which all the equipment that makes up a computer system is set to operate
- to succeed in doing or dealing with something, especially something difficult
- to cover or reach a wider or increasing area, or to make something do this
19 Clues: the outer or furthest point of something: • A device connected to several other devices. • the way the parts of something are organized or connected: • an object that contains the controls for a piece of equipment • to cover or reach a wider or increasing area, or to make something do this • ...
Computer Network 2023-10-03
Across
- intelligent or made in a complicated way and therefore able to do complicated tasks
- the way the parts of something are organized or connected:
- A device connected to several other devices.
- a measurement of the amount of information that can be sent between computers, through a phone line, etc.:
- the quality of being vulnerable (= able to be easily hurt, influenced, or attacked), or something that is vulnerable
- difficult to understand or find an answer to because of having many different parts
- to listen to someone's private conversation from close by without them knowing
- to succeed in doing or dealing with something, especially something difficult
- the outer or furthest point of something:
- to cover or reach a wider or increasing area, or to make something do this
- Device that boost electrical signals to restore their strength when they travel long distances in cables.</p>
Down
- the way in which all the equipment that makes up a computer system is set to operate
- an object that contains the controls for a piece of equipment
- having many parts that are organized in a way that may be difficult to understand
- A device that forwards traffic between network segments based on data link layer information, where the segments share a common network layer address.
- without someone's official permission to do something or be in a particular place
- a machine, system, law, etc. that has been replaced by a new one OR the person who had a particular job or position before someone else
- to keep something as it is, especially in order to prevent it from decaying or being damaged or destroyed
- a piece of electronic equipment that connects computer networks to each other, and sends information between networks
19 Clues: the outer or furthest point of something: • A device connected to several other devices. • the way the parts of something are organized or connected: • an object that contains the controls for a piece of equipment • to cover or reach a wider or increasing area, or to make something do this • ...
Crossword puzzle Wes 2021-07-30
Across
- Computer has a system that its calculate space size
- Re-booting a device either with a cold or warm boot
- What does DNS Mean?
Down
- Block unauthorized access
- A local or restricted communications network
- A device that routes traffic between networks
- A one-to-one connection
- Plain Old Telephone Service
- Lightweight Directory Access Protoco
- Address Each network interface has a mediaaccesscontroladdress
10 Clues: What does DNS Mean? • A one-to-one connection • Block unauthorized access • Plain Old Telephone Service • Lightweight Directory Access Protoco • A local or restricted communications network • A device that routes traffic between networks • Computer has a system that its calculate space size • Re-booting a device either with a cold or warm boot • ...
technology 2023-08-08
Across
- - modern and recently developed
- - easy use
- - being provided with amusement or enjoyment.
- - an electronic device for storing and processing data
- - relating to society or its organization
Down
- -a worldwide system of computer networks
- - connected to, served by, or available through a system
- - to build up, grow, or improve gradually over time.
- - conformance to specifications.
- - a large amount of cost
10 Clues: - easy use • - a large amount of cost • - modern and recently developed • - conformance to specifications. • -a worldwide system of computer networks • - relating to society or its organization • - being provided with amusement or enjoyment. • - to build up, grow, or improve gradually over time. • - an electronic device for storing and processing data • ...
Famous Technological Advances 2024-09-19
Across
- – Invention providing artificial lighting
- – Portable device combining phone, computer, and internet functions
- – Appliance for preserving food by cooling
- – Global system of interconnected computer networks
Down
- – Appliance for heating food using microwave radiation
- – Machine for processing data and performing calculations
- – Device for capturing photographs and videos
- – Aircraft for powered flight
- – Device for receiving and displaying broadcast images
- – Vehicle for personal transportation
10 Clues: – Aircraft for powered flight • – Vehicle for personal transportation • – Invention providing artificial lighting • – Appliance for preserving food by cooling • – Device for capturing photographs and videos • – Global system of interconnected computer networks • – Appliance for heating food using microwave radiation • ...
Information Technology 2025-07-04
Across
- – Low-level software embedded in a device. (8)
- – Small unit of data transmission. (6)
- – Maximum data transfer capacity. (9)
- – Initial code to start the OS. (10)
- – Centralized Windows settings store. (8)
- – Bridge between two networks. (7)
- – Interface between OS and hardware. (6)
Down
- – Network barrier against unauthorized access. (8)
- – Compressed collection of files. (7)
- – Reorganize data for faster disk access. (10)
10 Clues: – Bridge between two networks. (7) • – Initial code to start the OS. (10) • – Compressed collection of files. (7) • – Maximum data transfer capacity. (9) • – Small unit of data transmission. (6) • – Interface between OS and hardware. (6) • – Centralized Windows settings store. (8) • – Low-level software embedded in a device. (8) • ...
Information technology 2021-02-04
8 Clues: Not heavy. • .... games • Easy to use. • Fast, does it job well. • You can create it in excel. • In other words obsolete, old. • Used to connect multiple computer networks remotely. • You can use this software to create and manage www sites.
Olympus CAN Awareness Week 2021-04-19
9 Clues: Core Value • Core Value • True to _____ • "C" meaning in CAN • "N" meaning in CAN • "A" meaning in CAN • Where can you learn more about the CANs? • This CAN champions disability-related activities • Understanding that each individual is unique, and recognizing our individual differences
Activity 1 2015-09-28
Across
- up to 10% or no more than 30 seconds
- sender and receiver active at the same time
- easy-consistent-location in site
- type of program used for editing plain text files
- google,yahoo,ask
- orders links by relevance to user
- related group of networked computers
- pictures/movies/graphics
Down
- underlined-identifiable-color coordinated
- composed of HTML tags and multimedia files
- sending and receiving occur at different times
- up to 10% or 2,500 fields or cell entries
- main technology for local area networks
- local area network
14 Clues: google,yahoo,ask • local area network • pictures/movies/graphics • easy-consistent-location in site • orders links by relevance to user • up to 10% or no more than 30 seconds • related group of networked computers • main technology for local area networks • underlined-identifiable-color coordinated • up to 10% or 2,500 fields or cell entries • ...
Digital Communications 2022-11-01
Across
- Arrangement of opposite elements
- Message transmission over communication networks
- Channels through which information moves
- Blank or unused portions of a page
- Any document before it is printed
- Unplanned static or interruption
- Wording in any written or printed document
Down
- To draw a viewer's eye in a direction
- Location of items in relation to each other
- How lines, shapes, or colors are arranged
- Receiver's response to the original sender
- Allows wireless connection to internet
- Information being sent and communicated
- Person or party sending a message
14 Clues: Arrangement of opposite elements • Unplanned static or interruption • Any document before it is printed • Person or party sending a message • Blank or unused portions of a page • To draw a viewer's eye in a direction • Allows wireless connection to internet • Information being sent and communicated • Channels through which information moves • ...
Ancient Egypt 2024-11-25
Across
- people of wealth and power
- Goods bought from other regions
- networks A system or people in different lands who trade goods
- The title used by a ruler in Egypt
- The period of Egyptian history
- life after death
- The period in which Egypt reached power and glory
Down
- A government ruled by religious authorities
- series of rulers
- The period of order and and stability which lasted until 1750Bc
- Items sent to other regions
- A rich and powerful person
- A kingdom located along the Criteria
- Egyptian writing system
14 Clues: series of rulers • life after death • Egyptian writing system • people of wealth and power • A rich and powerful person • Items sent to other regions • The period of Egyptian history • Goods bought from other regions • The title used by a ruler in Egypt • A kingdom located along the Criteria • A government ruled by religious authorities • ...
treasure hunt 8 2025-04-24
Across
- how do pirates say hello
- disk that uses magnetic storage
- unique address of a device on a network
- where does the parrot sit on a pirate
- a signal that come into a computer
- connects all the hardware components in a computer
- structured collection of data
- which checks each element one by one
Down
- a string is the same forwards and backwards
- used to prove the identity of the website
- most widely used mobile os
- a term for network of networks
- symbol on a pirates flag
- a witches dress is called
14 Clues: how do pirates say hello • symbol on a pirates flag • a witches dress is called • most widely used mobile os • structured collection of data • a term for network of networks • disk that uses magnetic storage • a signal that come into a computer • which checks each element one by one • where does the parrot sit on a pirate • unique address of a device on a network • ...
Types of Marketing 2025-11-14
Across
- Marketing targeted to smartphone users
- Marketing through TV, radio, print media
- Marketing based on commission for referred sales
- Marketer actively reaching out to customers
- Marketing products in international markets
Down
- Marketing through direct communication with customers
- Fast-spreading promotional content across the internet
- Marketing via social media networks
- Marketing activities done through online platforms
- Attracting customers through valuable content
- Sending promotional messages to users' inboxes
- One-to-one, individualized marketing approach
- Creating valuable materials to attract customers
- Building and managing the image of a company
14 Clues: Marketing via social media networks • Marketing targeted to smartphone users • Marketing through TV, radio, print media • Marketer actively reaching out to customers • Marketing products in international markets • Building and managing the image of a company • Attracting customers through valuable content • One-to-one, individualized marketing approach • ...
Computer 2020-10-18
Across
- technique used to redirect a legitimate website
- Allows you to recover the file
- users love to watch webisodes
- Do not visit anything but the social networks
- use internet to find music and new bands
- they use internet to read news paper and comment in political forum
- Instant message scam
- Electronic device that processes information
Down
- they live on IM, video chat and email
- contains date and time and shortcut to application
- intentionally malicious software
- Designed to infect a computer
- The heaviest users
- Refers to the computer users
14 Clues: The heaviest users • Instant message scam • Refers to the computer users • Designed to infect a computer • users love to watch webisodes • Allows you to recover the file • intentionally malicious software • they live on IM, video chat and email • use internet to find music and new bands • Electronic device that processes information • ...
Tactical Data Links 2021-08-02
Across
- document that outlines data link parameters
- Manages flow of information on Link 11
- JREAPA transmission medium
- Manages flow of information on Link 16
- JREAPB transmission medium
- Link 16 participants use this message format
Down
- principle that allocates time slots among participants
- gateway between SADL and Link 16
- JREAPC transmission medium
- uses a gateway to transfer data between networks
- Half Duplex/Secure not jam resistant
- Link 11 participants use this message format
- polling technique used to manage Link 11 information flow
- tactical router that sends data via JREAPs
14 Clues: JREAPC transmission medium • JREAPA transmission medium • JREAPB transmission medium • gateway between SADL and Link 16 • Half Duplex/Secure not jam resistant • Manages flow of information on Link 11 • Manages flow of information on Link 16 • tactical router that sends data via JREAPs • document that outlines data link parameters • ...
Digital Citizenship 2016-09-08
Across
- a thing that is connected to the internet
- information full name, address, school name
- a device that you use to look up stuff
- mass communication
- information
- putting something up on a website
- a symbol used to make posts
- internet use when you don't have wifi
Down
- playing nice in the online world
- is a global system that inconnects with networks
- media websites or apps that you post on
- cordless internet
- phones, ipads, computers
- phone a celluar phone that helps you connect to people
14 Clues: information • cordless internet • mass communication • phones, ipads, computers • a symbol used to make posts • playing nice in the online world • putting something up on a website • internet use when you don't have wifi • a device that you use to look up stuff • media websites or apps that you post on • a thing that is connected to the internet • ...
Texas In The 20th century 2023-05-01
Across
- taxes on imports and exports
- able to carry easily from place to place
- over crowded
- the science of travel trough air
- education beyond high school
- fluent in two languages
- a gas used in light bulbs
- one of six international awards given for outstanding work
Down
- special transportation service for people with disabilities
- an agreement to depend on one another
- a worldwide system of computer networks
- a newspaper that gives an opinion on a topic
- a short phrase used in advertising
- a gas that can be cooled to keep food fresh
14 Clues: over crowded • fluent in two languages • a gas used in light bulbs • taxes on imports and exports • education beyond high school • the science of travel trough air • a short phrase used in advertising • an agreement to depend on one another • a worldwide system of computer networks • able to carry easily from place to place • a gas that can be cooled to keep food fresh • ...
