networks Crossword Puzzles

Network Topology 2025-06-11

Network Topology crossword puzzle
Across
  1. Intelligent device that connects network segments
  2. Large-scale network like the Internet
  3. Used to connect networking devices physically
  4. A network layout shaped in a circle
  5. Shared communication line topology
Down
  1. Topology with centralized connection
  2. Connects multiple computers, less intelligent than a switch
  3. Small local network
  4. Device that routes data across networks

9 Clues: Small local networkShared communication line topologyA network layout shaped in a circleTopology with centralized connectionLarge-scale network like the InternetDevice that routes data across networksUsed to connect networking devices physicallyIntelligent device that connects network segments...

Different Type of Networks 2018-10-15

Different Type of Networks crossword puzzle
Across
  1. could be mistaken with a star
  2. are used to play games together
  3. the abbreviation for a small group of connected computers
  4. the abbreviation for a large group of connected computers
  5. multiple computers connect to this with Ethernet cables
  6. ____________ collision is when computers send _____________ at the same time, causing them to collide
Down
  1. they are 9 meters long in Britain
  2. _____________ cable used to connect a computer to a switch on a wired network
  3. a piece of jewelry
  4. you can find them throughout the galaxy

10 Clues: a piece of jewelrycould be mistaken with a starare used to play games togetherthey are 9 meters long in Britainyou can find them throughout the galaxymultiple computers connect to this with Ethernet cablesthe abbreviation for a small group of connected computersthe abbreviation for a large group of connected computers...

Computer Networks Set 5 2019-02-22

Computer Networks Set 5 crossword puzzle
Across
  1. Transport layer is which layer in OSI model
  2. Congestion control can control traffic entry into a telecommunications network, so to avoid
  3. Security based connection is provided by which layer
  4. What are the functions of the transport layer
  5. Buffer overrun can be reduced by using what
Down
  1. FCP stands for
  2. Which services are provided by transport layer
  3. TCP and UDP are called ________
  4. Transport layer can identify the symptoms of overload nodes using _________
  5. _________ do not provide end to end communication.

10 Clues: FCP stands forTCP and UDP are called ________Transport layer is which layer in OSI modelBuffer overrun can be reduced by using whatWhat are the functions of the transport layerWhich services are provided by transport layer_________ do not provide end to end communication.Security based connection is provided by which layer...

Hatton & Williamson: World Migrations 2013-09-13

Hatton & Williamson: World Migrations crossword puzzle
Across
  1. Decrease the Cost of the Settlement Process
  2. First European Origin
  3. Major Explanation for Migrations
Down
  1. Explains Why Africans Emigrate Less
  2. A Push Factor
  3. Destination in Asia
  4. The Most Popular Destination

7 Clues: A Push FactorDestination in AsiaFirst European OriginThe Most Popular DestinationMajor Explanation for MigrationsExplains Why Africans Emigrate LessDecrease the Cost of the Settlement Process

Internet and Network 2023-04-04

Internet and Network crossword puzzle
Across
  1. Local Area Network
  2. The first network created by military
  3. Communication at a distance
Down
  1. Network of networks
  2. Modulate/demodulate analog to digital
  3. First satellite launched by USSR
  4. Wide Area Network

7 Clues: Wide Area NetworkLocal Area NetworkNetwork of networksCommunication at a distanceFirst satellite launched by USSRModulate/demodulate analog to digitalThe first network created by military

Internet and Network 2023-04-04

Internet and Network crossword puzzle
Across
  1. Communication at a distance
  2. Modulate/demodulate analog to digital signal
  3. First network created by military
  4. Wide Area Network
Down
  1. Network of networks
  2. Local Area Network
  3. First satellite launched by USSR

7 Clues: Wide Area NetworkLocal Area NetworkNetwork of networksCommunication at a distanceFirst satellite launched by USSRFirst network created by militaryModulate/demodulate analog to digital signal

Acronym Challenges 2024-03-25

Acronym Challenges crossword puzzle
Across
  1. Not a doctor
  2. Helps with prescription issues
  3. Who keeps a large geographical area running smoothly
  4. One of many ways to look up a patient
  5. You use these when there is poor visibility
  6. This requires a medical justification
  7. Without them Nothing would get done
Down
  1. No follow up is needed
  2. Provides help to more than one person
  3. This keeps systems, networks and procedures secure
  4. A big magnet
  5. We use this so patients aren't surprised
  6. Opposite of "Public Records"

13 Clues: Not a doctorA big magnetNo follow up is neededOpposite of "Public Records"Helps with prescription issuesWithout them Nothing would get doneProvides help to more than one personOne of many ways to look up a patientThis requires a medical justificationWe use this so patients aren't surprisedYou use these when there is poor visibility...

circulatory system 2021-09-01

circulatory system crossword puzzle
Across
  1. a chamber in the heart
  2. carries blood away from the heart
  3. begins at left ventricle of the heart
  4. without oxygen
  5. a muscle used to pump blood around the body
  6. forms a networks throughout body tissues
  7. a protein found in red blood cells
Down
  1. prevents backward flow of blood
  2. the name of a system that pumps blood
  3. with oxygen
  4. a liquid that circulates the human body
  5. creates output to maintain blood flow to other organ systems
  6. carries blood back to the heart

13 Clues: with oxygenwithout oxygena chamber in the heartprevents backward flow of bloodcarries blood back to the heartcarries blood away from the hearta protein found in red blood cellsthe name of a system that pumps bloodbegins at left ventricle of the hearta liquid that circulates the human bodyforms a networks throughout body tissues...

CO-PARENTING 2022-03-21

CO-PARENTING crossword puzzle
Across
  1. shared decision-making
  2. support ______community agencies, family or friends)
  3. contributing to support the child financially
  4. flexibility and willingness to work together
  5. maintain somewhat similar rules, boundaries, and schedules across households
  6. frequency of contact with the child
Down
  1. providing encouragement or emotional help
  2. involved in their children’s lives
  3. Identifying parenting styles that participants may have learned from their own ________
  4. joint efforts of adults who share raising children
  5. court approved time spent with children
  6. firmly fixed
  7. official parental separation through the court system

13 Clues: firmly fixedshared decision-makinginvolved in their children’s livesfrequency of contact with the childcourt approved time spent with childrenproviding encouragement or emotional helpflexibility and willingness to work togethercontributing to support the child financiallyjoint efforts of adults who share raising children...

Chapter 2 Lessons 3 and 4 2022-10-24

Chapter 2 Lessons 3 and 4 crossword puzzle
Across
  1. main foods
  2. network, networks formed so goods could get to faraway places
  3. large round earthen houses
  4. cone shaped tent
  5. sun dried bricks made of clay and straw
  6. a group of leaders who meet to make decisions
Down
  1. extra amounts
  2. celebration to honor a religious or cultural event
  3. a device used to carry goods
  4. in short supply
  5. change or adjust
  6. shelters built by covering a wooden frame with mud or adobe
  7. a layer of soil held together by the roots of grasses

13 Clues: main foodsextra amountsin short supplychange or adjustcone shaped tentlarge round earthen housesa device used to carry goodssun dried bricks made of clay and strawa group of leaders who meet to make decisionscelebration to honor a religious or cultural eventa layer of soil held together by the roots of grasses...

DS breakfast quiz 2025-10-08

DS breakfast quiz crossword puzzle
Across
  1. when you're magnus carlson in training but blunder every move in test
  2. OpenAI's claim to fame
  3. One of the V's describing challenges of "Big Data"
  4. not optimus prime but just as powerful
  5. GPT3/4,Claude...
  6. Neural network self-improvement through error-analysis and
Down
  1. Thanos for the world of neural networks
  2. stands out from the rest
  3. AI masks truth with digital-illusion
  4. All you need
  5. Sometimes it fades, sometimes it explodes
  6. camel-like language model
  7. Unites gamers and data scientists

13 Clues: All you needGPT3/4,Claude...OpenAI's claim to famestands out from the restcamel-like language modelUnites gamers and data scientistsAI masks truth with digital-illusionnot optimus prime but just as powerfulThanos for the world of neural networksSometimes it fades, sometimes it explodesOne of the V's describing challenges of "Big Data"...

Companies Taglines 2020-06-11

Companies Taglines crossword puzzle
Across
  1. "Helps you connect and share with the people in your life"
  2. "There Is No Finish Line" or "Just Do It."
  3. "Hello. Moto"
  4. "Ideas for Life"
  5. "Better Sound Through Research"
  6. "It's finger lickin' good"
  7. "Connecting People"
  8. "I'm Lovin' It"
Down
  1. "The Future of Memory"
  2. "High Performance Delivered"
  3. "Your Potential. Our Passion" or "Where do you want to go today"
  4. "Sense and Simplicity"
  5. "We Make IT Happen"
  6. "… and You’re Done"
  7. "Networks Business Without Boundaries"
  8. "Powered by Intellect Driven by Values"
  9. "Empowering the Internet generation" or "This is the Power of the Network. Now."
  10. "Think Different." or "The power to be your best"
  11. "A Diamond Is Forever"

19 Clues: "Hello. Moto""I'm Lovin' It""Ideas for Life""We Make IT Happen""… and You’re Done""Connecting People""The Future of Memory""Sense and Simplicity""A Diamond Is Forever""It's finger lickin' good""High Performance Delivered""Better Sound Through Research""Networks Business Without Boundaries""Powered by Intellect Driven by Values"...

Basic Concepts in ICT 2023-02-19

Basic Concepts in ICT crossword puzzle
Across
  1. a technology corporation
  2. a popular social networking site
  3. Information and Communication Technology Literacy
  4. an editable website
  5. inquiry-oriented lesson format
  6. a group of several proprietary graphical operating system
  7. an online journal
  8. combination of face-to-face and online classes
  9. a technology company
Down
  1. a video or audio multi-media clip
  2. massive network of networks
  3. a video blog
  4. sequential or simultaneous use of a variety of media formats
  5. a mobile operating system
  6. program control instructions and accompanying documentation
  7. a proprietary videotelephony software program
  8. mix of process and product used in the application of knowledge
  9. also called the Web
  10. a mobile operating system
  11. utilizes a reverse instructional delivery

20 Clues: a video blogan online journalan editable websitealso called the Weba technology companya technology corporationa mobile operating systema mobile operating systemmassive network of networksinquiry-oriented lesson formata popular social networking sitea video or audio multi-media cliputilizes a reverse instructional delivery...

Network Basics Crossword Puzzle 2013-03-04

Network Basics Crossword Puzzle crossword puzzle
Across
  1. hard or software that accesses a service
  2. rate of transfer; available or consumed
  3. connects office, school, etc
  4. web, proxy, FTP, online games are types
  5. links network segments or devices
  6. has twisted pair and fiber optic links
  7. a participant
Down
  1. eg. cable or DSL modem
  2. Backbone data routes; interconnected networks and core routers
  3. barrier to prevent unauthorized communication
  4. category 5 patch cable
  5. Network connects network; provides paths for info exchange between LANs
  6. wifi access point
  7. transfers data between components inside a computer
  8. connects businesses, over a large area
  9. uses radio waves over computer network
  10. data structure in computer science

17 Clues: a participantwifi access pointeg. cable or DSL modemcategory 5 patch cableconnects office, school, etclinks network segments or devicesdata structure in computer scienceconnects businesses, over a large areauses radio waves over computer networkhas twisted pair and fiber optic linksrate of transfer; available or consumed...

Viruses - Teddy Miller 2018-11-16

Viruses - Teddy Miller crossword puzzle
Across
  1. what a virus effects
  2. A piece of unwanted software
  3. software that uses networks and security holes to replicate itself
  4. the first email virus
  5. full name of PCs
  6. the controlling software for your computer
  7. a virus that floods the network
  8. protection for your accounts
  9. least likely operating system to get a virus on
  10. what early viruses affected
Down
  1. when a virus is hidden in something else
  2. protection for your computer
  3. a virus that affect the startup directions
  4. something that a virus cannot harm
  5. the original reason for viruses being created
  6. the original disk for viruses
  7. a virus that is imbedded in an email

17 Clues: full name of PCswhat a virus effectsthe first email viruswhat early viruses affectedprotection for your computerA piece of unwanted softwareprotection for your accountsthe original disk for virusesa virus that floods the networksomething that a virus cannot harma virus that is imbedded in an emailwhen a virus is hidden in something else...

Information technology 2021-02-06

Information technology crossword puzzle
Across
  1. the time during which a machine, especially a computer, is not working or is not able to be used
  2. happening without any sudden changes, interruption, or difficulty
  3. old-fashioned and therefore not as good or as fashionable as something modern
  4. the period of time when a computer, system, etc. is being used without any problems
  5. a piece of electronic equipment that connects computer networks to each other, and sends information between networks
  6. a central computer from which other computers get information
  7. working or operating quickly and effectively in an organized way
  8. an advertisement that is shown in a new window in front of the window that you are looking at on a website
  9. a part of a computer to which extra devices such as printers, scanners, and digital cameras can be connected easily:
  10. a set of letters and symbols in a particular design and size
Down
  1. a computer program, used especially in business, that allows you to do financial calculations and plans
  2. a set of wires, covered by plastic, that carries electricity, phone signals, etc.
  3. a copy of information held on a computer that is stored separately from the computer
  4. a measurement of the amount of information that can be sent between computers, through a phone line, etc.
  5. a set of programs that control the way a computer system works, especially how its memory is used and how different programs work together
  6. to be much better than other similar things or people

16 Clues: to be much better than other similar things or peoplea set of letters and symbols in a particular design and sizea central computer from which other computers get informationworking or operating quickly and effectively in an organized wayhappening without any sudden changes, interruption, or difficulty...

graph neural networks 2022-11-02

graph neural networks crossword puzzle
Across
  1. algebraic representation of graph
  2. vertex in network
  3. method of representing objects in common space
  4. measure of closeness of each 2 nodes in embedding space
Down
  1. operation of connecting embeddings of surrounding nodes
  2. type of graph in which edges indicate a two-way relationship
  3. operation of transfering information from neighboring nodes

7 Clues: vertex in networkalgebraic representation of graphmethod of representing objects in common spaceoperation of connecting embeddings of surrounding nodesmeasure of closeness of each 2 nodes in embedding spaceoperation of transfering information from neighboring nodestype of graph in which edges indicate a two-way relationship

Internet and Network 2023-04-04

Internet and Network crossword puzzle
Across
  1. Communication at a distance
  2. Wide Area Network
  3. Network of networks
Down
  1. First satellite launched by USSR
  2. The first network created by military
  3. Modulate/demodulate analog to digital signals
  4. Local Area Network

7 Clues: Wide Area NetworkLocal Area NetworkNetwork of networksCommunication at a distanceFirst satellite launched by USSRThe first network created by militaryModulate/demodulate analog to digital signals

internet and Network 2023-04-04

internet and Network crossword puzzle
Across
  1. network of networks
  2. communication at a distance
Down
  1. the first network created by military
  2. first satellite launched by USSR
  3. local area network
  4. modulate/demodulate analog to digital signals
  5. wide area network

7 Clues: wide area networklocal area networknetwork of networkscommunication at a distancefirst satellite launched by USSRthe first network created by militarymodulate/demodulate analog to digital signals

Raelyn`s Internet Crossword Puzzle 2013-03-26

Raelyn`s Internet Crossword Puzzle crossword puzzle
Across
  1. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  2. ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
  3. A bully who operates online, in cyberspace; To bully online
  4. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
  5. To renew or revitalize; To reload a webpage on the internet
  6. A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
Down
  1. a piece of writing that has been copied from someone else and is presented as being your own work
  2. NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  3. – An unauthorized person who secretly gains access to computer files.
  4. Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
  5. RESOURCE LOCATOR (URL) Full website address.
  6. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).\

12 Clues: RESOURCE LOCATOR (URL) Full website address.A bully who operates online, in cyberspace; To bully onlineTo renew or revitalize; To reload a webpage on the internet– An unauthorized person who secretly gains access to computer files.a piece of writing that has been copied from someone else and is presented as being your own work...

Codys internet crossword puzzle 2013-12-02

Codys internet crossword puzzle crossword puzzle
Across
  1. Software used to view various kinds of Internet resources found on the W
  2. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  3. Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
  4. NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  5. A bully who operates online, in cyberspace; To bully online
  6. An unauthorized person who secretly gains access to computer files.
Down
  1. a list of citations that appear at the end of a paper, article, chapter or book.
  2. Engine Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
  3. To renew or revitalize; To reload a webpage on the internet
  4. The unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
  5. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  6. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.

12 Clues: To renew or revitalize; To reload a webpage on the internetA bully who operates online, in cyberspace; To bully onlineAn unauthorized person who secretly gains access to computer files.Software used to view various kinds of Internet resources found on the Wa list of citations that appear at the end of a paper, article, chapter or book....

Talahiva 2015-04-30

Talahiva crossword puzzle
Across
  1. a list of citations that appear at the end of a paper, article, chapter or book
  2. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
  3. a piece of writing that has been copied from someone else and is presented as being your own work
  4. online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  5. Using keywords such as AND, OR, NOT in web searches to narrow search results.
Down
  1. Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
  2. the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing
  3. LOCATOR (URL) – Full website address.
  4. An unauthorized person who secretly gains access to computer files.
  5. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  6. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
  7. To renew or revitalize; To reload a webpage on the internet

12 Clues: LOCATOR (URL) – Full website address.To renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer files.Using keywords such as AND, OR, NOT in web searches to narrow search results.a list of citations that appear at the end of a paper, article, chapter or book...

Cybersecurity Fundamental Chapter 1 2023-10-03

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. who rally and protest against different political and social ideas.
  2. unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. collection of technologies that enable the connection of various devices to the Internet.
  4. break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
  5. Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
  6. great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
  1. who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  2. mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  3. Their targets are foreign governments, terrorist groups, and corporations.
  4. hackers who are either self-employed or working for large cybercrime organizations.
  5. may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. result of data sets that are large and complex, making traditional data processing applications inadequate.

12 Clues: who rally and protest against different political and social ideas.Their targets are foreign governments, terrorist groups, and corporations.hackers who are either self-employed or working for large cybercrime organizations.collection of technologies that enable the connection of various devices to the Internet....

DATA TRANSMISSION 2022-07-13

DATA TRANSMISSION crossword puzzle
Across
  1. a device that enables data packets to be moved between different networks.
  2. a verification method used to check if data transferred has been altered or corrupted.
  3. data that arrives at the destination with the bits no longer synchronised.
  4. data that can be sent one direction only.
  5. the actual data being carried in a data packet.
  6. a horizontal and vertical parity check on a block of data being transmitted.
Down
  1. stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
  2. an error checking method in which all the 1-bits the data packet payload are added and the total is stored in the packet trailer; the same calculation is repeated at the receiving station.
  3. the part of a data packet that indicates the end of the data packets and cylic redundancy check.
  4. a type of serial data transmission which has become the industry standard for connecting computers via a USB port.
  5. a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.

11 Clues: data that can be sent one direction only.the actual data being carried in a data packet.a device that enables data packets to be moved between different networks.data that arrives at the destination with the bits no longer synchronised.a horizontal and vertical parity check on a block of data being transmitted....

FLIPPED CLASSROOM 2025-11-05

FLIPPED CLASSROOM crossword puzzle
Across
  1. A secret combination of characters used to access a system or account.
  2. A program that detects, prevents, and removes malicious software from a computer.
  3. The practice of protecting computers, networks, and data from unauthorized access, attacks, or damage.
Down
  1. A cyberattack that tricks people into revealing personal or financial information through fake messages or websites.
  2. Malicious software designed to damage, disrupt, or steal information from computers or networks.
  3. Security systems that monitor and control network traffic to block unauthorized access.

6 Clues: A secret combination of characters used to access a system or account.A program that detects, prevents, and removes malicious software from a computer.Security systems that monitor and control network traffic to block unauthorized access.Malicious software designed to damage, disrupt, or steal information from computers or networks....

the engglish puzzle 2025-02-06

the engglish puzzle crossword puzzle
Across
  1. these waves are useful for only very short distance communication
  2. transmission media, is a type of transmission media in computer networks which is also known as known as wired or bounded media
  3. cable, these guided transmission media contain an insulation layer that transmits information in baseband mode and brodband mode
  4. fibre cable, these types of transmission media are thin strands of glass that guide linght along their length
Down
  1. its imortant for the transmitter and receiver antena to be aligned
  2. pair cable, in this type of transmission media in computer networks
  3. media, is a system or substance that can mediate the propagation of signals for the purposes of telecommunication
  4. this is a transverse electromagnetic (TEM) type of transmission media in computer network that is built on the inner layers of multi-layers printed circuit boards
  5. transmission media, they help in transmitting electromagnetic signals without using a physical medium
  6. cable, are the electrical cables that come with an add-on layer of insulation and a second conducting sheet

10 Clues: these waves are useful for only very short distance communicationits imortant for the transmitter and receiver antena to be alignedpair cable, in this type of transmission media in computer networkstransmission media, they help in transmitting electromagnetic signals without using a physical medium...

Digital Communications Words 2025-05-08

Digital Communications Words crossword puzzle
Across
  1. A network is a group of devices that share data and resources like internet or files.
  2. A WAN connects networks over long distances, like the internet.
  3. A firewall is a security tool that protects your network by monitoring and blocking harmful or unauthorized internet traffic.
  4. a device that allows wireless devices such as phones and laptops to connect to a network that is wired.
Down
  1. A server is a computer that provides data and services to other devices over a network.
  2. A local area network (LAN) connects devices within a small area, like a home or office.
  3. a wireless router is a device that gives out an internet connection to multiple devices wirelessly.
  4. a device that can connect many devices on a local area network to one another, allowing them to share data and communicate.
  5. A modem connects devices to the internet by converting signals.
  6. a portable mobile device which uses the internet and networks to access features such as web browsing and calling.

10 Clues: A WAN connects networks over long distances, like the internet.A modem connects devices to the internet by converting signals.A network is a group of devices that share data and resources like internet or files.A server is a computer that provides data and services to other devices over a network....

Data Transmission 2022-07-13

Data Transmission crossword puzzle
Across
  1. A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
  2. Data that arrives at the destination with the bits no longer synchronised.
  3. The actual data being carried in a data packet.
  4. Data that can be sent in both direction at the same time(simultaneously).
  5. A horizontal and vertical parity check on a block of data being transmitted. (2 words)
Down
  1. The part of the data that indicates the end of the data packet and cyclic redundancy check error check. (2 words)
  2. The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
  3. Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
  4. Data that can be sent on one direction only.
  5. A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.

10 Clues: Data that can be sent on one direction only.The actual data being carried in a data packet.Data that can be sent in both direction at the same time(simultaneously).Data that arrives at the destination with the bits no longer synchronised.A horizontal and vertical parity check on a block of data being transmitted. (2 words)...

Networking concepts and cyber ethics 2025-05-28

Networking concepts and cyber ethics crossword puzzle
Across
  1. name the type of network that is mainly created for an individual person
  2. it works similar to hub
  3. it refers to a computer network restricted to an organisation
  4. it refers to a computer network that allows controlled access to an information source available on the internet
  5. the computers that communicate with each other are called
  6. refers to criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals are there digital devices
  7. it refers to the act of using or imitating the language and thoughts of another person as one's original work
Down
  1. it refers to an illegal intrusion into a computer system or network
  2. a network maintained without using wires is called a ____ network
  3. name the network device that is used to connect all the computers in a network with each other
  4. name the type of network which is larger network than LAN and its spread across a city
  5. it is a device that connects two different types of networks with each other
  6. name the type of network that connects two or more computers located at distant places
  7. they are technical people who are experts in Breaking into systems to steal important data such as financial details, passwords, etc
  8. it enables you to connect your computer to the available internet connection over the existing telephone lines
  9. it refers to unwanted bulk emails that come from unknown sources

16 Clues: it works similar to hubthe computers that communicate with each other are calledit refers to a computer network restricted to an organisationit refers to unwanted bulk emails that come from unknown sourcesa network maintained without using wires is called a ____ networkit refers to an illegal intrusion into a computer system or network...

Internet of Things 2025-08-05

Internet  of Things crossword puzzle
Across
  1. A method of wireless communication used for short-range, low-power exchanges between devices in IoT.
  2. A method of addressing that supports large-scale IoT devices and networks.
  3. A type of network specifically designed for small, low-power devices, typically deployed over large areas.
  4. A widely-used type of IoT device that can sense and respond to environmental changes like light, temperature, or pressure.
  5. A protocol used for communication in the application layer of IoT systems, known for its extensibility and flexibility
  6. A key component of IoT that enables physical actions based on data received from sensors.
  7. The protocol used for transferring data in IoT with a resource-constrained environment, typically used in machine-to-machine communications.
  8. A type of network that uses small, low-power devices to monitor physical conditions.
Down
  1. A communication protocol used for lightweight messaging in IoT.
  2. Layer The layer that handles the exchange of information between devices over the internet in IoT.
  3. A communication protocol that allows for the exchange of data in IoT systems, often used in home automation.
  4. The concept that allows IoT devices to interact autonomously, without direct human input.
  5. he algorithm that helps optimize the energy efficiency of wireless sensor networks.
  6. The technology that allows devices to be "smart" by collecting and exchanging data automatically.
  7. Layer The first layer in the IoT architecture responsible for gathering data from physical world sensors and devices.
  8. Devices that detect physical stimuli and convert them into electrical signals for IoT systems.

16 Clues: A communication protocol used for lightweight messaging in IoT.A method of addressing that supports large-scale IoT devices and networks.he algorithm that helps optimize the energy efficiency of wireless sensor networks.A type of network that uses small, low-power devices to monitor physical conditions....

Assignment 6 2016-02-22

Assignment 6 crossword puzzle
Across
  1. Text Highlighted Key works and subheadings
  2. codes or tags used to create a website
  3. related group of networked computers
  4. The use of IT resources to transmit abusive, threatening, or harassing material
  5. Editor editing plan text files
  6. Underlined, color coordinated, and identifiable
Down
  1. transmitting malicious code
  2. Both the sender and receiver are active at the same time
  3. Wide Web Information Superhighway
  4. main technology for local area networks
  5. Use legal doctrine that permits limited use of copyrighted material
  6. location area network
  7. Domain Name System

13 Clues: Domain Name Systemlocation area networktransmitting malicious codeEditor editing plan text filesWide Web Information Superhighwayrelated group of networked computerscodes or tags used to create a websitemain technology for local area networksText Highlighted Key works and subheadingsUnderlined, color coordinated, and identifiable...

Machine learning Fundamentals 2025-05-11

Machine learning Fundamentals crossword puzzle
Across
  1. Simplest ML algorithm, finds closest points.
  2. Process of adjusting weights in neural networks.
  3. Training with labeled data.
  4. Model that separates data using a hyperplane (abbr.).
  5. A model's error on unseen data.
  6. Data feature used for training a model.
Down
  1. Training with unlabeled data.
  2. Mathematical function that reduces error.
  3. Neuron-inspired algorithm for deep learning.
  4. Performance metric: True Positives / (True Positives + False Positives).
  5. Model that uses a tree structure for decisions.
  6. Evaluation metric: (Precision + Recall)/2.
  7. Technique to reduce model variance using multiple learners.

13 Clues: Training with labeled data.Training with unlabeled data.A model's error on unseen data.Data feature used for training a model.Mathematical function that reduces error.Evaluation metric: (Precision + Recall)/2.Simplest ML algorithm, finds closest points.Neuron-inspired algorithm for deep learning.Model that uses a tree structure for decisions....

Computer network 2024-10-21

Computer network crossword puzzle
Across
  1. electronic devices within a user's immediate area
  2. computer network made up of an interconnection of local area networks
  3. a series of computers linked together to form a network in a circumscribed location
Down
  1. a network that provides connectivity within an area the size of a metropolitan region
  2. to connect their office networks

5 Clues: to connect their office networkselectronic devices within a user's immediate areacomputer network made up of an interconnection of local area networksa series of computers linked together to form a network in a circumscribed locationa network that provides connectivity within an area the size of a metropolitan region

Create KIM Chart for the following vocabulary words 2025-04-02

Create KIM Chart for the following vocabulary words crossword puzzle
Across
  1. Central Processing Unit
  2. a hand-held pointing device that allows users to control the cursor on a computer screen, enabling them to select items, navigate, and interact with the graphical user interface
  3. a data storage device that uses integrated circuits to store data persistently
  4. a type of non-volatile memory that stores data permanently, meaning the data remains even when power is off, and can only be read, not modified or erased
  5. a person who speaks
  6. a type of non-volatile computer memory storage medium that can be electrically erased and reprogrammed, retaining data even when power is off
  7. external hardware components that connect to a computer to extend its functionality
  8. a computer and networking device that forwards data packets between computer networks
Down
  1. a specialized processor originally designed to accelerate graphics rendering.
  2. an input device that allows you to type letters, numbers, and symbols into your computer or other electronic device
  3. the main printed circuit board within a computer
  4. an output device that displays visual information generated by a computer, like text, images, and videos
  5. a device that converts digital signals from a computer into analog signals for transmission over telephone lines or cable networks, and vice versa, enabling internet access and communication
  6. a computer's short-term memory, where the data the CPU (Central Processing Unit) needs to access quickly is stored, allowing for faster processing and multitasking
  7. main printed circuit board within a computer
  8. allows devices to communicate with each other without cables or wire

16 Clues: a person who speaksCentral Processing Unitmain printed circuit board within a computerthe main printed circuit board within a computerallows devices to communicate with each other without cables or wirea specialized processor originally designed to accelerate graphics rendering....

Data Transmission 2022-07-13

Data Transmission crossword puzzle
Across
  1. A horizontal and vertical parity check on a block of data being transmitted. (2 words)
  2. The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
  3. Data that can be sent on one direction only.
  4. Data that can be sent in both direction at the same time(simultaneously).
  5. Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
Down
  1. The part of the data that indicates the end of the data packet and cyclic redundancy check error check. (2 words)
  2. Data that can be sent in both direction but not at the same time.
  3. Data that arrives at the destination with the bits no longer synchronised.
  4. The actual data being carried in a data packet.
  5. A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
  6. A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.

11 Clues: Data that can be sent on one direction only.The actual data being carried in a data packet.Data that can be sent in both direction but not at the same time.Data that can be sent in both direction at the same time(simultaneously).Data that arrives at the destination with the bits no longer synchronised....

67 2025-10-21

67 crossword puzzle
Across
  1. An application used for sending and receiving electronic messages, typically using protocols like SMTP.
  2. Transmission The maximum rate of data transfer across a given path, measured in bits per second.
  3. A network device that connects multiple devices together in a star topology, broadcasting data to all connected devices.
  4. network A network that uses wireless technology, like Wi-Fi, to connect devices without physical cables.
  5. network The process of sending and receiving data between two or more devices on a network.
  6. A device that connects two or more networks and forwards data packets between them, choosing the most efficient path for the data to travel.
  7. hardware Physical devices that connect computers to a network, such as cables, hubs, routers, and servers.
  8. cable A physical medium, like a twisted-pair Ethernet cable, used to connect devices in a wired network.
Down
  1. Network Two or more computers or devices interconnected for communication and resource sharing.
  2. A global network of interconnected computer networks that use the TCP/IP protocol suite to communicate.
  3. A set of rules that govern how data is transmitted and received between devices on a network.
  4. A computer that provides services, resources, or data to other computers, known as clients, on a network.

12 Clues: network The process of sending and receiving data between two or more devices on a network.A set of rules that govern how data is transmitted and received between devices on a network.Network Two or more computers or devices interconnected for communication and resource sharing....

Cybersecurity Fundamentals Chapter 3 2024-06-03

Cybersecurity Fundamentals Chapter 3 crossword puzzle
Across
  1. A type of malware that attaches itself to a legitimate executable files and requires user initiation to spread and activate.
  2. A program that remains dormant until triggered by a specific event to execute its harmful actions.
  3. Software design to disrupt, damage, or gain unauthorized access to computer systems.
  4. Malware that encrypts a victim's data and demands payment to restore access.
  5. Disguise itself as a legitimate or desired operation, requiring user interaction to execute its malicious payload.
Down
  1. Techniques used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
  2. A weakness in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause damage.
  3. An offensive action targeting computer systems, networks, or devices with the intent to disrupt, damage, or gain unauthorized access.
  4. Malicious software that replicates itself and spreads independently in networks, without needing a host program.

9 Clues: Malware that encrypts a victim's data and demands payment to restore access.Software design to disrupt, damage, or gain unauthorized access to computer systems.A program that remains dormant until triggered by a specific event to execute its harmful actions....

IoT and smart devices 2024-11-13

IoT and smart devices crossword puzzle
Across
  1. assistant A software program that uses voice recognition to perform tasks, such as Amazon Alexa or Google Assistant.
  2. devices Objects or gadgets equipped with sensors, software, and internet connectivity that allow them to collect and exchange data.
  3. home A home equipped with interconnected devices that can be controlled remotely for convenience, security, and energy efficiency.
  4. The use of technology to perform tasks without human intervention.
  5. technology Electronic devices designed to be worn on the body, such as fitness trackers and smartwatches.
  6. The right to control personal information and protect it from unauthorized access.
Down
  1. of Things A network of devices that are connected and can exchange data over the internet.
  2. Devices that detect and measure physical properties like temperature, motion, or pressure.
  3. measures Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols. Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols.
  4. breach A security incident in which sensitive information is accessed or disclosed without authorization.
  5. A software application that allows users to interact with smart devices or services on their smartphones or tablets.

11 Clues: The use of technology to perform tasks without human intervention.The right to control personal information and protect it from unauthorized access.Devices that detect and measure physical properties like temperature, motion, or pressure.of Things A network of devices that are connected and can exchange data over the internet....

PF10 Crossword 2025-02-24

PF10 Crossword crossword puzzle
Across
  1. _____ Authentication. Where two different methods are needed to gain access e.g banking apps for an online purchase (4)
  2. Application Planning _________ These allow 2 or more systems to communicate, so long as the customer has authorized payment. (10)
  3. A criminal act that involves some kind of illegal attack on computers and networks. (10)
  4. ______ banking allows customers to securely share their bank and credit card data with trusted third parties (4)
  5. Storage data services via the internet that is uploaded rather than saved on a hard drive allowing easy access from anywhere (5)
Down
  1. software designed to infiltrate computer systems like viruses, worms and trojan horses (7)
  2. Combination of the words ‘financial’ and ‘technology’ to describe technology-enabled innovation (7)
  3. Stealing customers data by pretending to be be someone else to gain trust and get their personal info or log in details (8)
  4. Security on a computer that filters traffic to prevent harmful data (8)
  5. Infiltrating computers by getting unauthorized access to their networks (7)

10 Clues: Security on a computer that filters traffic to prevent harmful data (8)Infiltrating computers by getting unauthorized access to their networks (7)A criminal act that involves some kind of illegal attack on computers and networks. (10)software designed to infiltrate computer systems like viruses, worms and trojan horses (7)...

IT 2023-11-27

IT crossword puzzle
Across
  1. is software created to damage or alter the computer data or its operations
  2. are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks
  3. Due to its anonymity, the Internet also provides the right environment
  4. provides email and access to the Web via a normal TV set plus a high-speed modem
  5. an International computer Network made up of thousands of networks linked together.
  6. are malicious programs disguised as innocent-looking files or embedded within legitimate software.
Down
  1. converts the digital signals stored in the computer into analogue signals that can be transmitted over telephone lines
  2. software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software
  3. orbiting the earth enable your computer to send and receive Internet files
  4. or black-hat hackers, are computer criminals who use technology to perform a variety of crimes: virus propagation, fraud, intellectual property theft, etc.
  5. are programs that spread by attaching themselves to executable files or documents.

11 Clues: Due to its anonymity, the Internet also provides the right environmentis software created to damage or alter the computer data or its operationsorbiting the earth enable your computer to send and receive Internet filesprovides email and access to the Web via a normal TV set plus a high-speed modem...

Viruses - Teddy Miller 2018-11-16

Viruses - Teddy Miller crossword puzzle
Across
  1. the first email virus
  2. a virus that floods the network
  3. full name of PCs
  4. the original reason for viruses being created
  5. what early viruses affected
  6. the controlling software for your computer
  7. A piece of unwanted software
  8. least likely operating system to get a virus on
  9. something that a virus cannot harm
  10. what a virus effects
Down
  1. protection for your computer
  2. protection for your accounts
  3. a virus that affect the startup directions
  4. when a virus is hidden in something else
  5. the original disk for viruses
  6. software that uses networks and security holes to replicate itself
  7. a virus that is imbedded in an email

17 Clues: full name of PCswhat a virus effectsthe first email viruswhat early viruses affectedprotection for your computerprotection for your accountsA piece of unwanted softwarethe original disk for virusesa virus that floods the networksomething that a virus cannot harma virus that is imbedded in an emailwhen a virus is hidden in something else...

Viruses - Teddy Miller 2018-11-16

Viruses - Teddy Miller crossword puzzle
Across
  1. something that a virus cannot harm
  2. when a virus is hidden in something else
  3. the controlling software for your computer
  4. the original reason for viruses being created
  5. A piece of unwanted software
  6. protection for your computer
  7. the original disk for viruses
  8. protection for your accounts
Down
  1. full name of PCs
  2. a virus that affect the startup directions
  3. software that uses networks and security holes to replicate itself
  4. a virus that is imbedded in an email
  5. the first email virus
  6. what a virus effects
  7. what early viruses affected
  8. least likely operating system to get a virus on
  9. a virus that floods the network

17 Clues: full name of PCswhat a virus effectsthe first email viruswhat early viruses affectedA piece of unwanted softwareprotection for your computerprotection for your accountsthe original disk for virusesa virus that floods the networksomething that a virus cannot harma virus that is imbedded in an emailwhen a virus is hidden in something else...

CYBER 2021-03-27

CYBER crossword puzzle
Across
  1. A secret word or phrase that is used to access a computer system or service.
  2. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  3. The method of obtaining user information through fraudulent communications targeted directly at people.
  4. The way in which the identity of a user is confirmed.
  5. security A technique for protecting computers, networks, programs, and
Down
  1. A technique for protecting computers, networks, programs, data from unauthorized access or hackers for exploitation.
  2. Software that automatically displays or downloads material when a user is offline.
  3. are typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, it can piggyback onto programs to corrupt data or expand throughout a network and damage systems across a company.
  4. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice.
  5. A cyber attacker who uses software and social engineering methods to steal data and information. data from unauthorized access or hackers for exploitation.

10 Clues: The way in which the identity of a user is confirmed.security A technique for protecting computers, networks, programs, andA secret word or phrase that is used to access a computer system or service.Software that automatically displays or downloads material when a user is offline....

Artificial intelligence 2019-07-03

Artificial intelligence crossword puzzle
Across
  1. What is the company name which manufactured the full scale humanoid robot?
  2. Founder of Bitcoin
  3. is the task of discovering groups & structures in the data that are in some way or another “similar” without using known structures in data
  4. is the process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics & database systems
  5. is about constructing and analyzing protocols that prevent third parties or the public from reading the private messages
Down
  1. is a revolutionary technology and distributed ledger platform that allows information to be shared but not copied across a series of networks
  2. is a combination of networks, hardware, services , storage, and interfaces that helps in delivering computing as a service
  3. is an application that provides systems the ability to automatically learn and improve from experience without being explicitly programmed
  4. One of the founder of Artificial Intelligence
  5. is a branch of artificial intelligence that helps computers understand, interpret, and manipulate human language

10 Clues: Founder of BitcoinOne of the founder of Artificial IntelligenceWhat is the company name which manufactured the full scale humanoid robot?is a branch of artificial intelligence that helps computers understand, interpret, and manipulate human language...

AI Related Vocabulary 2024-06-19

AI Related Vocabulary crossword puzzle
Across
  1. A step-by-step procedure or formula for solving a problem or performing a task.
  2. A field of AI focused on the interaction between computers and humans using natural language.
  3. A type of artificial intelligence that enables computers to learn and make decisions based on data.
  4. A field of AI that enables computers to interpret and make decisions based on visual data from the world.
Down
  1. A computing system inspired by the biological neural networks of animal brains, used to approximate functions that depend on a large number of inputs.
  2. Extremely large datasets that can be analyzed to reveal patterns, trends, and associations.
  3. The use of technology to perform tasks without human intervention.
  4. The design, construction, and operation of robots, often incorporating AI to perform tasks autonomously.
  5. A computer system modeled on the human brain's network of neurons, used to recognize patterns and solve complex problems.
  6. A subset of machine learning involving neural networks with many layers, capable of learning from vast amounts of data.

10 Clues: The use of technology to perform tasks without human intervention.A step-by-step procedure or formula for solving a problem or performing a task.Extremely large datasets that can be analyzed to reveal patterns, trends, and associations.A field of AI focused on the interaction between computers and humans using natural language....

Data Transmission 2022-07-13

Data Transmission crossword puzzle
Across
  1. A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.
  2. The part of the data that indicates the end of the data packet and cyclic redundancy check error check.
  3. Data that can be sent on one direction only.
  4. The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
Down
  1. A horizontal and vertical parity check on a block of data being transmitted. (2 words)
  2. Data that can be sent in both direction at the same time(simultaneously).
  3. The actual data being carried in a data packet.
  4. Data that arrives at the destination with the bits no longer synchronised.
  5. A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
  6. Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.

10 Clues: Data that can be sent on one direction only.The actual data being carried in a data packet.Data that can be sent in both direction at the same time(simultaneously).Data that arrives at the destination with the bits no longer synchronised.A horizontal and vertical parity check on a block of data being transmitted. (2 words)...

Networks and Databases 2021-10-04

Networks and Databases crossword puzzle
Across
  1. Eintrag
  2. Ausrüstung
  3. Codierung
Down
  1. doppelte Überprüfung
  2. Validierung
  3. empfehlen
  4. sollen

7 Clues: sollenEintragempfehlenCodierungAusrüstungValidierungdoppelte Überprüfung

Nology 2024-05-09

Nology crossword puzzle
Across
  1. The place where the connection starts and ends
  2. a range of frequencies sending data
  3. make it hard to crack
  4. Arrangement of telecommunication networks
  5. someone in charge over things
  6. network that connects devices within limited area
Down
  1. the set process for a situation
  2. user, buyer
  3. the place where you'll find political debates and YouTube kids in the same place
  4. a connection Between devices
  5. a virtual room
  6. online label your device uses to communicate
  7. the thing stopping you from being hacked

13 Clues: user, buyera virtual roommake it hard to cracka connection Between devicessomeone in charge over thingsthe set process for a situationa range of frequencies sending datathe thing stopping you from being hackedArrangement of telecommunication networksonline label your device uses to communicateThe place where the connection starts and ends...

network 2024-05-09

network crossword puzzle
Across
  1. maximum amount of data
  2. a way of scrambling data
  3. computer system that provides resources, data,services or programs to other computers
  4. arrangement of the elements of a communication network
  5. interconnection of networks in a limited area
  6. a person responsible for carrying out the administration
Down
  1. standardized set of rules for formatting and processing data
  2. a person or organization using the services
  3. computer network for sharing information
  4. network security device
  5. numerical label
  6. virtual places within an operating system
  7. group of devices interconnected exchaning data

13 Clues: numerical labelmaximum amount of datanetwork security devicea way of scrambling datacomputer network for sharing informationvirtual places within an operating systema person or organization using the servicesinterconnection of networks in a limited areagroup of devices interconnected exchaning data...

computer hardware 2022-10-03

computer hardware crossword puzzle
Across
  1. in the context of networking, is a high-speed device that receives incoming data packets and redirects them to their destination
  2. is a network of connected devices that exist within a specific location.
  3. consists of multiple devices that communicate with one another.
  4. is a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes.
  5. is a communications protocol that is used for wireless data access through most mobile wireless networks
  6. is a computer system that hosts web
Down
  1. is a wall made of brick, steel, or other inflammable material that prevents the spread of a fire in a building
  2. is a network topology in which each network component is physically connected to a central node such as a router,
  3. It is similar to a Local Area Network (LAN), but it's a lot bigger.
  4. is short for "Modulator-Demodulator." It is a hardware component that allows a computer or another device, such as a router or switch, to connect to the Internet
  5. is a component that provides networking capabilities for a computer
  6. is a hardware device that directs traffic between networks and devices.

12 Clues: is a computer system that hosts webconsists of multiple devices that communicate with one another.It is similar to a Local Area Network (LAN), but it's a lot bigger.is a component that provides networking capabilities for a computeris a hardware device that directs traffic between networks and devices....

Learn by fun -1 [U1:Cellular Network vs Ad hoc network] 2022-09-03

Learn by fun -1              [U1:Cellular Network vs Ad hoc network] crossword puzzle
Across
  1. topology in adhoc network is---------
  2. Do ad hoc network need infrasructure?
  3. time synchronization in adhoc network is-----
  4. cost for adhoc network installation is ------
  5. frequency reuse in cellular network is -------
  6. bandwidth assurance in cellular network is ---
  7. network routing in ad hoc network
  8. host requirement in ad hoc network is ------
Down
  1. frequency reuse in adhoc network is-------
  2. adhoc network is -----------during change in topology
  3. call breaks in ad hoc networks are------
  4. hops in cellular network is -------
  5. deployment time in adhoc network is ----
  6. technology in adhoc network is -------

14 Clues: network routing in ad hoc networkhops in cellular network is -------topology in adhoc network is---------Do ad hoc network need infrasructure?technology in adhoc network is -------deployment time in adhoc network is ----call breaks in ad hoc networks are------frequency reuse in adhoc network is-------host requirement in ad hoc network is ------...

Introduction to Computers Crossword 2022-02-28

Introduction to Computers Crossword crossword puzzle
Across
  1. hardware and software that work together to make a computer run
  2. unorganized facts and statistics
  3. group of associated devices
  4. processing
  5. the parts we can physically see and touch
  6. sound in your headphones
  7. stores, shares, examines mass amounts of data
  8. a kind of computer memory where information can be kept.
Down
  1. hardware used to send information to the computer
  2. set of commands
  3. runs programs
  4. Programs that enable the user to complete tasks.
  5. worldwide network
  6. delivers images, and videos that can be seen on the computer screen.

14 Clues: processingruns programsset of commandsworldwide networksound in your headphonesgroup of associated devicesunorganized facts and statisticsthe parts we can physically see and touchstores, shares, examines mass amounts of dataPrograms that enable the user to complete tasks.hardware used to send information to the computer...

Computer parts 2024-02-06

Computer parts crossword puzzle
Across
  1. computer expansion card that generates a feed of graphics
  2. Power SuppMonitor
  3. Device with a screen used for display
  4. stores all your digital content
  5. hand-held pointing device
  6. enters characters and functions into the computer
  7. worldwide system of computer networks
Down
  1. used to draw cooler air into the case from the outside
  2. device that accepts text and graphic output from a computer and transfers the information to paper
  3. Computer processor
  4. the main printed circuit
  5. contains most of the hardware of a personal computer
  6. random access memory
  7. allows you to use CDs

14 Clues: Power SuppMonitorComputer processorrandom access memoryallows you to use CDsthe main printed circuithand-held pointing devicestores all your digital contentDevice with a screen used for displayworldwide system of computer networksenters characters and functions into the computercontains most of the hardware of a personal computer...

Topic 3 AI & Competition Law 2024-11-15

Topic 3 AI & Competition Law crossword puzzle
Across
  1. Rules governing AI development and implementation
  2. When AI systems independently coordinate to avoid competition
  3. Large technology firms influencing markets
  4. Control by a major player in a market
  5. Internet-based computing and storage services
  6. Technology that mimics human thinking and learning
  7. Moral principles governing behavior
  8. Unfair preference in decision-making
Down
  1. Safeguarding personal information
  2. Charging different prices based on user data
  3. Organization for global trade rules
  4. Ensures fairness and innovation in markets
  5. Clarity in AI decision-making processes
  6. Protecting systems and networks from attacks

14 Clues: Safeguarding personal informationOrganization for global trade rulesMoral principles governing behaviorUnfair preference in decision-makingControl by a major player in a marketClarity in AI decision-making processesLarge technology firms influencing marketsEnsures fairness and innovation in marketsCharging different prices based on user data...

Immigration and Urbanization 2023-11-29

Immigration and Urbanization crossword puzzle
Across
  1. Sociologist Barry _____ points out that our networks in school, work, and online now define our communities as much as our residential neighborhoods
  2. _____ Capital: Tight connections that people form with each other through organizations, civic life, and strong social ties.
  3. Movement of products, services, and information across national and continental boundaries.
  4. Sociologist Claude ______ argues that cities generate new forms of community, such as subcultures
  5. Chicago New York, and ______ have the highest levels of segregation between Black and white people
  6. Ethnic ______: Section of a city where the local culture and labor market are dominated by a single ethnic group.
  7. The largest number of new immigrants come from India, Mexico, the Philippines, El Salvador, and ______
  8. The Great ______: Movement of millions of African Americans, from 1900 to 1970, into cities outside the south.
  9. A group that hold values and engage in activities that separate them from wider society.
  10. Practice of outlining in red any sections of a city that were considered “risky” and rejecting loan applications in that area
Down
  1. Growth in the proportion of a nation’s population living in cities.
  2. Social _____: Various types of connections that individuals form with other people, no matter where they’re located.
  3. More than ___ million African Americans left the south between 1900-1970
  4. _____ Cities: Major urban areas that serve as nodes for the worldwide network of economic activity.
  5. Unique ways of life found in cities.
  6. Urban areas with at least 10 million people.
  7. Type of violence experienced by immigrants as a result of immigration policies.
  8. Migration of Whites out of central city neighborhoods and into suburban communities (2 words)
  9. Chains of densely populated areas that extend over long stretches of space.

19 Clues: Unique ways of life found in cities.Urban areas with at least 10 million people.Growth in the proportion of a nation’s population living in cities.More than ___ million African Americans left the south between 1900-1970Chains of densely populated areas that extend over long stretches of space....

Viruses - Teddy Miller 2018-11-16

Viruses - Teddy Miller crossword puzzle
Across
  1. the original disk for viruses
  2. what early viruses affected
  3. the first email virus
  4. when a virus is hidden in something else
  5. the controlling software for your computer
  6. full name of PCs
  7. A piece of unwanted software
  8. protection for your accounts
Down
  1. a virus that affect the startup directions
  2. a virus that floods the network
  3. software that uses networks and security holes to replicate itself
  4. the original reason for viruses being created
  5. what a virus effects
  6. protection for your computer
  7. a virus that is imbedded in an email
  8. something that a virus cannot harm
  9. least likely operating system to get a virus on

17 Clues: full name of PCswhat a virus effectsthe first email viruswhat early viruses affectedprotection for your computerA piece of unwanted softwareprotection for your accountsthe original disk for virusesa virus that floods the networksomething that a virus cannot harma virus that is imbedded in an emailwhen a virus is hidden in something else...

Network Basics Crossword Puzzle 2013-03-04

Network Basics Crossword Puzzle crossword puzzle
Across
  1. eg. cable or DSL modem
  2. rate of transfer; available or consumed
  3. links network segments or devices
  4. transfers data between components inside a computer
  5. connects office, school, etc
  6. connects businesses, over a large area
  7. has twisted pair and fiber optic links
  8. category 5 patch cable
  9. a participant
Down
  1. barrier to prevent unauthorized communication
  2. Network connects network; provides paths for info exchange between LANs
  3. wifi access point
  4. uses radio waves over computer network
  5. hard or software that accesses a service
  6. Backbone data routes; interconnected networks and core routers
  7. web, proxy, FTP, online games are types
  8. data structure in computer science

17 Clues: a participantwifi access pointeg. cable or DSL modemcategory 5 patch cableconnects office, school, etclinks network segments or devicesdata structure in computer scienceuses radio waves over computer networkconnects businesses, over a large areahas twisted pair and fiber optic linksrate of transfer; available or consumed...

Belize Adventist College 2021-03-29

Belize Adventist College crossword puzzle
Across
  1. storage
  2. banking
  3. technology
Down
  1. teller machine
  2. networks

5 Clues: storagebankingnetworkstechnologyteller machine

VLAN Puzzle 2020-12-09

VLAN Puzzle crossword puzzle
Across
  1. The process of transferring VLAN traffic between two or more switches.
  2. This switch works at Layer 2 and Layer 3 of the OSI model.
  3. A Cisco proprietary protocol that updates a VLAN switch into three states - server, client or transparent
  4. Type of attack allows unauthorized access to VLANs but this is mitigated by changing the native VLAN to an unused one and configuring the trunk
  5. The configuration for when a router interface is connected to multiple VLANs on a switch
  6. If you give an incorrect VLAN ____ to a device, then that device won’t have access to resources it needs.
Down
  1. AAA is vital to switches’ security because it supports port _____, which gives us a way to protect our network from unwanted people trying to access the network.
  2. This special remote access server program allows the server endpoint to function as a network router, which routes IP packets between networks.
  3. This lets you segment a physical network into multiple discrete networks without having to add additional hardware.
  4. These VLANs based on MAC addresses
  5. to tag its native VLAN traffic.
  6. The process of making a router work between two VLANs is called ______ routing.

12 Clues: to tag its native VLAN traffic.These VLANs based on MAC addressesThis switch works at Layer 2 and Layer 3 of the OSI model.The process of transferring VLAN traffic between two or more switches.The process of making a router work between two VLANs is called ______ routing....

packet switching in computer network 2025-05-25

packet switching in computer network crossword puzzle
Across
  1. Unpredictable delay in network delivery
  2. Network communication rules
  3. Method of transmitting data in discrete chunks
  4. Temporary storage used while forwarding packets
Down
  1. Device that connects multiple networks
  2. Opposite of packet switching
  3. A computer connected to a network
  4. Smallest unit of data sent over a network
  5. Internet's addressing system

9 Clues: Network communication rulesOpposite of packet switchingInternet's addressing systemA computer connected to a networkDevice that connects multiple networksUnpredictable delay in network deliverySmallest unit of data sent over a networkMethod of transmitting data in discrete chunksTemporary storage used while forwarding packets

CIW Review 2017-05-10

CIW Review crossword puzzle
Across
  1. Can store contact information, help you take notes and keep track of appointments.
  2. Collection of personal thoughts posted on a public Web site.
  3. Security barrier that prevents unauthorized access to or from private networks.
  4. Unethical practice in which the perpetrator capitalizes on typing mistakes that users make when entering the URL of a Web site into a browser.
  5. Software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.
  6. Small text files placed on Web site visitors' computers.
  7. Tool that guides users step-by-step through a software installation process, or assists users of an application in creating documents and/or databases based on styles and templates.
  8. Windows One or more small windows may suddenly open in front of the page you are viewing
  9. List Published list of IP addresses known to be sources of spam
  10. Encourage common sense and politeness, and to establish general rules for Internet etiquette.
  11. Enable users to narrow their Internet search results by requiring or excluding keywords from the search criteria
  12. encyclopedias and reference material that list additional titles. These additional titles can be either primary or secondary sources.
Down
  1. Malicious program designed to damage computer systems, from stand-alone computers to entire networks.
  2. Certificate Proves the identity of an individual or company over the Web.
  3. The process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data.
  4. Computing Person's ability to use technology while "on the go."
  5. URL The full path from the system root to a specific page or resource.
  6. Completely Automated Public Turing Test to Tell Computers and Humans Apart
  7. Junk e-mail that can clutter your Inbox

19 Clues: Junk e-mail that can clutter your InboxSmall text files placed on Web site visitors' computers.Collection of personal thoughts posted on a public Web site.Computing Person's ability to use technology while "on the go."List Published list of IP addresses known to be sources of spam...

Objective 4e: Political Dimensions of Maritime Empires 2024-11-15

Objective 4e: Political Dimensions of Maritime Empires crossword puzzle
Across
  1. A Japanese state that implemented isolationist policies to minimize foreign influence during the period 1450-1750.
  2. Competition among European states that drove the establishment of maritime empires and control over trade routes.
  3. A trade policy used by the Qing Dynasty to regulate foreign trade, restricting it to the port of Canton (Guangzhou).
Down
  1. Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence.
  2. A West African state that gained political and economic power through participation in maritime trade networks.
  3. Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks.
  4. A Chinese dynasty that continued restrictive trade practices, including the Canton System, to limit European influence.
  5. A Central African state whose involvement in global trade increased its regional influence.
  6. A Chinese dynasty that adopted restrictive trade policies to limit the influence of European trade and culture.

9 Clues: A Central African state whose involvement in global trade increased its regional influence.Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence.Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks....

technology 2025-10-22

technology crossword puzzle
Across
  1. a hardware device or software program that provides services, data, and resources to other computers or devices, called "clients," over a network.
  2. a small, formatted unit of data transmitted over a computer network
  3. a vast, global network of interconnected computer networks that communicate using a standard set of communication protocols.
  4. a hardware device that forwards data packets between computer networks.
Down
  1. a type of computer network that uses physical cables to connect devices and facilitate the transmission of data.
  2. A system of two or more interconnected computing devices that can communicate with one another to share data, resources and services.
  3. a method of sending and receiving digital messages over a computer network.
  4. a standardized set of rules that governs how electronic devices communicate with each other.
  5. the maximum amount of data that can be transferred over a network connection in a given amount of time

9 Clues: a small, formatted unit of data transmitted over a computer networka hardware device that forwards data packets between computer networks.a method of sending and receiving digital messages over a computer network.a standardized set of rules that governs how electronic devices communicate with each other....

27 2024-01-08

27 crossword puzzle
Across
  1. Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device. (Note: Repeated for variety.)
  2. Artificially manipulated media that may depict events that never occurred or present fictionalized versions of real events.
  3. The use of largely automatic equipment in a system of operation. (Note: Repeated for variety.)
  4. The activity of exploiting genetic material experimentally without regard to ethical considerations. (Note: Repeated for variety.)
  5. The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
Down
  1. A virtual reality space where users can interact with a computer-generated environment.
  2. The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
  3. Economy A labor market characterized by the prevalence of short-term, flexible jobs.
  4. A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
  5. Physical or emotional exhaustion, often due to prolonged stress or overwork.
  6. Tech Technology designed to enhance the relationship between citizens and government.
  7. Literacy The ability to use and understand digital technologies, communication tools, and networks.

12 Clues: Physical or emotional exhaustion, often due to prolonged stress or overwork.Economy A labor market characterized by the prevalence of short-term, flexible jobs.Tech Technology designed to enhance the relationship between citizens and government.A virtual reality space where users can interact with a computer-generated environment....

Computer network 2024-10-21

Computer network crossword puzzle
Across
  1. a series of computers linked together to form a network in a circumscribed location
  2. to connect their office networks
  3. computer network made up of an interconnection of local area networks
Down
  1. a network that provides connectivity within an area the size of a metropolitan region
  2. electronic devices within a user's immediate area

5 Clues: to connect their office networkselectronic devices within a user's immediate areacomputer network made up of an interconnection of local area networksa series of computers linked together to form a network in a circumscribed locationa network that provides connectivity within an area the size of a metropolitan region

Types of Networks 2017-09-25

Types of Networks crossword puzzle
Across
  1. this has no central server to manage the network
  2. a network that is restricted to a small geographical area
  3. a computer on a network which provides resources that can be used by client devices
  4. a set of computers and devices connected together so they can communicate and share resources
Down
  1. Has atleast one server and several clients
  2. a privately owned network that uses client servers
  3. a network that covers a larger geographical area

7 Clues: Has atleast one server and several clientsthis has no central server to manage the networka network that covers a larger geographical areaa privately owned network that uses client serversa network that is restricted to a small geographical areaa computer on a network which provides resources that can be used by client devices...

Networks by Danielle 2015-05-11

Networks by Danielle crossword puzzle
Across
  1. Passes on all data to all of the computers
  2. Does not pass on the data to all parts of the network
  3. Abbreviation of Network Interface Card
  4. Computer instructions or data
Down
  1. Physical components of a computer
  2. Different ways of writing a network together
  3. The title of the crossword

7 Clues: The title of the crosswordComputer instructions or dataPhysical components of a computerAbbreviation of Network Interface CardPasses on all data to all of the computersDifferent ways of writing a network togetherDoes not pass on the data to all parts of the network

Ad - Hoc Networks 2024-09-17

Ad - Hoc Networks crossword puzzle
Across
  1. Ad Hoc networks allow users to access the internet in most ______
  2. ____ wifi is provided in train stations, cafes, etc
  3. A ______ key is needed to access a wireless connection (like a password)
  4. enables a device to connect to an internet connection
Down
  1. You can create a personal _____ to share your internet connection with your friends.
  2. When access a an Ad Hoc network you will not use up your data _________
  3. An ad-hoc network is ______ to set up

7 Clues: An ad-hoc network is ______ to set up____ wifi is provided in train stations, cafes, etcenables a device to connect to an internet connectionAd Hoc networks allow users to access the internet in most ______When access a an Ad Hoc network you will not use up your data _________A ______ key is needed to access a wireless connection (like a password)...

Computing 2020-02-16

Computing crossword puzzle
Across
  1. A device that is used to recharge a battery, e.g. in a mobile phone.
  2. A piece of electronic equipment that connects computer networks to each other and sends information between networks.
  3. A computer screen or a device with a screen on which words or pictures can be shown.
  4. A device with parts that cover each ear through which you can listen to music (plural).
  5. A computer that is small enough to be carried around easily and is designed for use ouside an office.
  6. A piece of electrical equipment through which recorded or broadcast sound can be heard (plural).
  7. A small flat computer that is controlled by touching the screen or by using a special pen.
  8. A small device that you move across a surface in order to move a cursor on your computer screen.
Down
  1. A machine connected to a computer that prints onto paper using ink.
  2. The board with a set of keys on a computer to type information.
  3. An electronic machine thatvis used for storing, organizing and finding words, numbers and pictures.
  4. A brand name for a small piece of equipment that you connect to a computer to copy and store information.
  5. A camera that records moving pictures and sound and allows these to be broadcast on the internet as they happen.

13 Clues: The board with a set of keys on a computer to type information.A machine connected to a computer that prints onto paper using ink.A device that is used to recharge a battery, e.g. in a mobile phone.A computer screen or a device with a screen on which words or pictures can be shown....

technology 2025-05-14

technology crossword puzzle
Across
  1. Fifth-generation mobile network technology
  2. Distributed ledger technology for cryptocurrencies
  3. Electric car company founded by Elon Musk
  4. Internet-based computing service model
  5. Network of interconnected smart devices
Down
  1. World’s largest search engine
  2. Technology protecting networks from attacks
  3. Computer system mimicking human intelligence

8 Clues: World’s largest search engineInternet-based computing service modelNetwork of interconnected smart devicesElectric car company founded by Elon MuskFifth-generation mobile network technologyTechnology protecting networks from attacksComputer system mimicking human intelligenceDistributed ledger technology for cryptocurrencies

JMoreno - Network Devices 2023-01-03

JMoreno - Network Devices crossword puzzle
Across
  1. all-in-one security appliance, includes all functionality of an IDS/IPS as well as stateful firewall services
  2. Used for larger networks and is configured with VLANS and port security
  3. passively monitor traffic on network
  4. also called Ethernet over Power, that uses existing electrical wiring to connect devices
  5. Also called extenders because they extend the distance a signal can travel
  6. techniques used by firewalls to determine what is permitted or denied access to a network segment
  7. responsible for monitoring all the end devices in your network
  8. Systems that are related to legacy systems and have an embedded microchip dedicated to input and output instructions to specialized device like thermostat
Down
  1. used as a place to collect incoming cables runs from various networking devices
  2. Enter's address into switching table that records the address for each device connected to the switch, and records which switch port can be used to reach a device with a given address.
  3. uses IP addresses to forward traffic to other networks
  4. replaces IDS and is implemented in inline mode, responds quickly, doesn't allow any malicious traffic to pass
  5. protects data and equipment on a network from unauthorized access
  6. This provides the physical connection to the network at the PC or other end device
  7. method for powering devices that do not have battery or access to power outlet and transfers small amounts of DC current over ethernet cable
  8. Systems that are no longer supported but are still in operation
  9. Divides LANS into segments to filter network traffic
  10. provide network access to wireless devices like laptops and tablets
  11. Receive data on one port and then send it out to all other ports

19 Clues: passively monitor traffic on networkDivides LANS into segments to filter network trafficuses IP addresses to forward traffic to other networksresponsible for monitoring all the end devices in your networkSystems that are no longer supported but are still in operationReceive data on one port and then send it out to all other ports...

Module 11 2024-12-10

Module 11 crossword puzzle
Across
  1. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  2. s a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
  3. is the most widely used method for encrypting data
  4. backs up any files that have changed since the last full or incremental backup
  5. creates a barrier between two entities
  6. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  7. a framework for other protocols that provide encryption and authentication
  8. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
  9. backs up the disk sector by sector to create an exact image of the disk’s contents
Down
  1. all of the disk’s contents are backed up as individual folders and files
  2. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  3. only backs up files that have changed since the last full backup
  4. is used to encrypt files and folders
  5. security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
  6. security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
  7. document that describes the rules of an organization
  8. used in a Windows domain environment and provides mutual authentication
  9. requires a user to supply two or more types of authentication
  10. an industry-standard client/server protocol that offers centralized control
  11. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen

20 Clues: is used to encrypt files and folderscreates a barrier between two entitiesis the most widely used method for encrypting datadocument that describes the rules of an organizationrequires a user to supply two or more types of authenticationonly backs up files that have changed since the last full backup...

Cyber Security - Chapter 1 2020-02-12

Cyber Security - Chapter 1 crossword puzzle
Across
  1. State Sponsored Hackers
  2. attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
  4. The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
  5. The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
  6. attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  7. is the collection of technologies that enable the connection of various devices to the Internet.
  8. is the result of data sets that are large and complex, making traditional data processing applications inadequate.
  9. attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
  10. Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
  1. Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
  2. Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  3. This group of criminals breaks into computers or networks to gain access for various reasons.
  4. The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
  5. Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.

15 Clues: State Sponsored HackersThis group of criminals breaks into computers or networks to gain access for various reasons.is the collection of technologies that enable the connection of various devices to the Internet.Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards....

cyber security vocabulary 2023-09-07

cyber security vocabulary crossword puzzle
Across
  1. letter numbers and symbols combined to prevent unauthorized entry
  2. sofware that creates representations of servers, storage and networks
  3. a collection of documents
  4. an illegitimate source, not mainstream
  5. not connected to the internet
  6. software that prevents attacks
  7. handles cpu and high speed ram
  8. an extra layer of security
  9. information on a computer
  10. created on the internet to serve a purpose
  11. preserves the condition of a computer
  12. connection between computers
Down
  1. connects a computer to internet
  2. an attack via email or text in an attempt at information
  3. false information used to obtain information
  4. handles peripherals
  5. physical parts of a computer
  6. an account created to send information
  7. information withheld in exchange for money
  8. an increased use in cpu

20 Clues: handles peripheralsan increased use in cpua collection of documentsinformation on a computeran extra layer of securityphysical parts of a computerconnection between computersnot connected to the internetsoftware that prevents attackshandles cpu and high speed ramconnects a computer to internetpreserves the condition of a computer...

HUSEIN 2024-09-06

HUSEIN crossword puzzle
Across
  1. - Network Interface Card
  2. - Hard Disk Drive
  3. - Vital Information Resource Under Siege
  4. - Random Access Memory
  5. - Basic Input/Output System
  6. - Serial Advanced Technology Attachment
  7. - MultiMediaCard
  8. - Liquid Crystal Display
  9. - Advanced Technology Attachment
  10. - Refers to micro versions of interfaces or devices, such as micro USB
  11. - Graphics Processing Unit
  12. - Refers to mini versions of interfaces or devices, such as mini USB
Down
  1. - Digital Visual Interface
  2. - A family of networking technologies used in local area networks (LANs)
  3. - High-Definition Multimedia Interface
  4. - New Technology File System
  5. - Central Processing Unit
  6. - Video Graphics Array
  7. - Universal Serial Bus
  8. - Read-Only Memory
  9. - Solid-State Drive
  10. - Automatic Frequency Assignment
  11. - Control Unit
  12. - Character User Interface
  13. - Arithmetic Logic Unit
  14. - Redundant Array of Independent Disks

26 Clues: - Control Unit- MultiMediaCard- Hard Disk Drive- Read-Only Memory- Solid-State Drive- Video Graphics Array- Universal Serial Bus- Random Access Memory- Arithmetic Logic Unit- Network Interface Card- Liquid Crystal Display- Central Processing Unit- Digital Visual Interface- Character User Interface- Graphics Processing Unit...

Qué Chévere 2 Unidad 1A #2 (2024-2025) 2024-08-25

Qué Chévere 2 Unidad 1A #2 (2024-2025) crossword puzzle
Across
  1. social networks
  2. information
  3. to do a search
  4. I am going to, you are going to, he/she is going to
  5. to browse
  6. technology
  7. I washed, you washed, he/she washed, they washed
  8. link
  9. I have to charge my cell phone.
  10. I have to, you have to, he/she has to
  11. I am, you are, he/she is
Down
  1. I do, you do, he/she does, we do, they do
  2. I live, you live, he/she lives
  3. Are you going to finish the homework?
  4. program
  5. world
  6. text message
  7. browser
  8. I can, you can, he/she can, we can, they can
  9. to continue

20 Clues: linkworldprogrambrowserto browsetechnologyinformationto continuetext messageto do a searchsocial networksI am, you are, he/she isI live, you live, he/she livesI have to charge my cell phone.Are you going to finish the homework?I have to, you have to, he/she has toI do, you do, he/she does, we do, they doI can, you can, he/she can, we can, they can...

Training 2020-05-15

Training crossword puzzle
Across
  1. component needed to go to access.statestreet.com
  2. Tool in which each agent must claim their weekly hours
  3. is a program or software installed on a compute
  4. application similar to whatsApp that ibm employees use
  5. chat application for State Street users
  6. Computer hasn't connected to the networks in 3+ days
Down
  1. environment that we must access to work
  2. Detects suspicious drive activity
  3. runs commands
  4. First time installation
  5. New proxy environment

11 Clues: runs commandsNew proxy environmentFirst time installationDetects suspicious drive activityenvironment that we must access to workchat application for State Street usersis a program or software installed on a computecomponent needed to go to access.statestreet.comComputer hasn't connected to the networks in 3+ days...

Training 2020-05-15

Training crossword puzzle
Across
  1. New proxy environment
  2. component needed to go to access.statestreet.com
  3. Tool in which each agent must claim their weekly hours
  4. is a program or software installed on a compute
  5. environment that we must access to work
  6. application used to ask for help
  7. First time installation
Down
  1. Computer hasn't connected to the networks in 3+ days
  2. chat application for State Street users
  3. Detects suspicious drive activity
  4. runs commands

11 Clues: runs commandsNew proxy environmentFirst time installationapplication used to ask for helpDetects suspicious drive activitychat application for State Street usersenvironment that we must access to workis a program or software installed on a computecomponent needed to go to access.statestreet.comComputer hasn't connected to the networks in 3+ days...

IoT Phrases 2017-10-29

IoT Phrases crossword puzzle
Across
  1. Digital data is converted to Analog data
  2. reduce power consumption, traffic congestion, and to increase network lifetime and data accuracy
  3. Node/Device
  4. Eyes & Ears
Down
  1. Cellular
  2. Big Data
  3. Programming is flying; no borders anymore
  4. Network links between Edges (subnetworks) and main Backbone network
  5. it is not really cloudy yet
  6. generate information
  7. wireless technology to address the unique needs of low-cost, low-power wireless M2M and IoT networks

11 Clues: CellularBig DataNode/DeviceEyes & Earsgenerate informationit is not really cloudy yetDigital data is converted to Analog dataProgramming is flying; no borders anymoreNetwork links between Edges (subnetworks) and main Backbone networkreduce power consumption, traffic congestion, and to increase network lifetime and data accuracy...

Chapter 15 Globalism: Information, Communication, and The Digital Revolution 2024-12-10

Chapter 15 Globalism: Information, Communication, and The Digital Revolution crossword puzzle
Across
  1. Devices used for computing and connecting online.
  2. Method for delivering messages electronically.
  3. Process of converting data into a secure code.
  4. Storing data on remote servers accessed via the Internet.
  5. Portable electronic device for accessing information.
  6. Software that performs malicious activities.
  7. Online platform for social interaction.
Down
  1. Digital means of connecting people worldwide.
  2. Measure to protect networks and systems.
  3. Global system for mobile communication.
  4. Widespread sharing of digital media.

11 Clues: Widespread sharing of digital media.Global system for mobile communication.Online platform for social interaction.Measure to protect networks and systems.Software that performs malicious activities.Digital means of connecting people worldwide.Method for delivering messages electronically.Process of converting data into a secure code....

CISO Crossword Puzzle: 0423 2023-06-03

CISO Crossword Puzzle: 0423 crossword puzzle
Across
  1. A social engineering attack in which the fraudster builds a false sense of trust with the victim
  2. The environment in which communication over computer networks occurs through a widespread interconnected digital technology
  3. Defrauding people over the phone, enticing them to divulge sensitive information
  4. A type of threat where an unauthorized entity gains access to a system by illegitimately posing as an authorized entity
  5. The process of converting information or data into a unreadable code, especially to prevent unauthorized access
Down
  1. An attack method used by fraudsters that focus on people rather than technology
  2. A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
  3. A software that blocks access to the victim's computer/data and threatens to publish or delete it until ransom is paid
  4. A secret word or phrase that is used to access a computer system or service
  5. A cyberattack technique that injects malicious code within user's digital advertisements
  6. A program made up of malicious code that replicates and propagates itself from device to device using computer networks
  7. an authorized simulated attack performed on a computer system to evaluate its security

12 Clues: A secret word or phrase that is used to access a computer system or serviceAn attack method used by fraudsters that focus on people rather than technologyDefrauding people over the phone, enticing them to divulge sensitive informationan authorized simulated attack performed on a computer system to evaluate its security...

Aurora Indonesia Crossword Quiz 2022-11-29

Aurora Indonesia Crossword Quiz crossword puzzle
Across
  1. Lend and Borrow dApps
  2. Marketplace on NEAR and AURORA
  3. Lending & Stableswap
  4. Has unlocked the new features
Down
  1. Free Transaction & Referral Program
  2. Move tokens between the three of networks
  3. Dex on NEAR

7 Clues: Dex on NEARLending & StableswapLend and Borrow dAppsHas unlocked the new featuresMarketplace on NEAR and AURORAFree Transaction & Referral ProgramMove tokens between the three of networks

McKenna Rochelle - Crossword - 1st Period 2016-10-24

McKenna Rochelle - Crossword - 1st Period crossword puzzle
Across
  1. A denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files without need for a central server.
  2. It is a networking hardware device that allows a WiFi compliant device to connect to a wired network.
  3. The practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
  4. It is a common connection point for devices in a network.
  5. It helps run games, email, web browsers, and almost everything on your computer or device.
  6. A router is a networking device that forwards data packets between computer networks.
  7. A portable phone that is almost exactly alike to a computer.
  8. A corrupted code that can destroy your computer.
  9. It is software that is made to damage or disable computers.
Down
  1. It is a numbered label that is assigned to each device.
  2. is a type of computer program that is used to run a computer's hardware and application program.
  3. A picture on a video that is used to bring in a audience.
  4. A portable computer that can be used like a normal computer.
  5. it is the study of use of systems for storing, retrieving, or sending information.
  6. A desktop computer terminal, typically networked and more powerful than a personal computer.
  7. When you act responsibly on the internet.
  8. When you post inappropriate messages over, and over again.
  9. It is a system for connecting a number of computer systems to form a local area network.
  10. Used to transfer digital signals over standard telephone lines.

19 Clues: When you act responsibly on the internet.A corrupted code that can destroy your computer.It is a numbered label that is assigned to each device.A picture on a video that is used to bring in a audience.It is a common connection point for devices in a network.When you post inappropriate messages over, and over again....

Computer Network 2023-10-03

Computer Network crossword puzzle
Across
  1. A device connected to several other devices.
  2. intelligent or made in a complicated way and therefore able to do complicated tasks
  3. to listen to someone's private conversation from close by without them knowing
  4. difficult to understand or find an answer to because of having many different parts
  5. a measurement of the amount of information that can be sent between computers, through a phone line, etc.:
  6. to keep something as it is, especially in order to prevent it from decaying or being damaged or destroyed
  7. a machine, system, law, etc. that has been replaced by a new one OR the person who had a particular job or position before someone else
  8. Device that boost electrical signals to restore their strength when they travel long distances in cables.</p>
  9. the way the parts of something are organized or connected:
Down
  1. the quality of being vulnerable (= able to be easily hurt, influenced, or attacked), or something that is vulnerable
  2. a piece of electronic equipment that connects computer networks to each other, and sends information between networks
  3. A device that forwards traffic between network segments based on data link layer information, where the segments share a common network layer address.
  4. an object that contains the controls for a piece of equipment
  5. without someone's official permission to do something or be in a particular place
  6. the outer or furthest point of something:
  7. having many parts that are organized in a way that may be difficult to understand
  8. the way in which all the equipment that makes up a computer system is set to operate
  9. to succeed in doing or dealing with something, especially something difficult
  10. to cover or reach a wider or increasing area, or to make something do this

19 Clues: the outer or furthest point of something:A device connected to several other devices.the way the parts of something are organized or connected:an object that contains the controls for a piece of equipmentto cover or reach a wider or increasing area, or to make something do this...

Computer Network 2023-10-03

Computer Network crossword puzzle
Across
  1. intelligent or made in a complicated way and therefore able to do complicated tasks
  2. the way the parts of something are organized or connected:
  3. A device connected to several other devices.
  4. a measurement of the amount of information that can be sent between computers, through a phone line, etc.:
  5. the quality of being vulnerable (= able to be easily hurt, influenced, or attacked), or something that is vulnerable
  6. difficult to understand or find an answer to because of having many different parts
  7. to listen to someone's private conversation from close by without them knowing
  8. to succeed in doing or dealing with something, especially something difficult
  9. the outer or furthest point of something:
  10. to cover or reach a wider or increasing area, or to make something do this
  11. Device that boost electrical signals to restore their strength when they travel long distances in cables.</p>
Down
  1. the way in which all the equipment that makes up a computer system is set to operate
  2. an object that contains the controls for a piece of equipment
  3. having many parts that are organized in a way that may be difficult to understand
  4. A device that forwards traffic between network segments based on data link layer information, where the segments share a common network layer address.
  5. without someone's official permission to do something or be in a particular place
  6. a machine, system, law, etc. that has been replaced by a new one OR the person who had a particular job or position before someone else
  7. to keep something as it is, especially in order to prevent it from decaying or being damaged or destroyed
  8. a piece of electronic equipment that connects computer networks to each other, and sends information between networks

19 Clues: the outer or furthest point of something:A device connected to several other devices.the way the parts of something are organized or connected:an object that contains the controls for a piece of equipmentto cover or reach a wider or increasing area, or to make something do this...

Crossword puzzle Wes 2021-07-30

Crossword puzzle Wes crossword puzzle
Across
  1. Computer has a system that its calculate space size
  2. Re-booting a device either with a cold or warm boot
  3. What does DNS Mean?
Down
  1. Block unauthorized access
  2. A local or restricted communications network
  3. A device that routes traffic between networks
  4. A one-to-one connection
  5. Plain Old Telephone Service
  6. Lightweight Directory Access Protoco
  7. Address Each network interface has a mediaaccesscontroladdress

10 Clues: What does DNS Mean?A one-to-one connectionBlock unauthorized accessPlain Old Telephone ServiceLightweight Directory Access ProtocoA local or restricted communications networkA device that routes traffic between networksComputer has a system that its calculate space sizeRe-booting a device either with a cold or warm boot...

technology 2023-08-08

technology crossword puzzle
Across
  1. - modern and recently developed
  2. - easy use
  3. - being provided with amusement or enjoyment.
  4. - an electronic device for storing and processing data
  5. - relating to society or its organization
Down
  1. -a worldwide system of computer networks
  2. - connected to, served by, or available through a system
  3. - to build up, grow, or improve gradually over time.
  4. - conformance to specifications.
  5. - a large amount of cost

10 Clues: - easy use- a large amount of cost- modern and recently developed- conformance to specifications.-a worldwide system of computer networks- relating to society or its organization- being provided with amusement or enjoyment.- to build up, grow, or improve gradually over time.- an electronic device for storing and processing data...

Famous Technological Advances 2024-09-19

Famous Technological Advances crossword puzzle
Across
  1. – Invention providing artificial lighting
  2. – Portable device combining phone, computer, and internet functions
  3. – Appliance for preserving food by cooling
  4. – Global system of interconnected computer networks
Down
  1. – Appliance for heating food using microwave radiation
  2. – Machine for processing data and performing calculations
  3. – Device for capturing photographs and videos
  4. – Aircraft for powered flight
  5. – Device for receiving and displaying broadcast images
  6. – Vehicle for personal transportation

10 Clues: – Aircraft for powered flight– Vehicle for personal transportation– Invention providing artificial lighting– Appliance for preserving food by cooling– Device for capturing photographs and videos– Global system of interconnected computer networks– Appliance for heating food using microwave radiation...

Information Technology 2025-07-04

Information Technology crossword puzzle
Across
  1. – Low-level software embedded in a device. (8)
  2. – Small unit of data transmission. (6)
  3. – Maximum data transfer capacity. (9)
  4. – Initial code to start the OS. (10)
  5. – Centralized Windows settings store. (8)
  6. – Bridge between two networks. (7)
  7. – Interface between OS and hardware. (6)
Down
  1. – Network barrier against unauthorized access. (8)
  2. – Compressed collection of files. (7)
  3. – Reorganize data for faster disk access. (10)

10 Clues: – Bridge between two networks. (7)– Initial code to start the OS. (10)– Compressed collection of files. (7)– Maximum data transfer capacity. (9)– Small unit of data transmission. (6)– Interface between OS and hardware. (6)– Centralized Windows settings store. (8)– Low-level software embedded in a device. (8)...

Information technology 2021-02-04

Information technology crossword puzzle
Across
  1. Used to connect multiple computer networks remotely.
  2. Easy to use.
  3. You can use this software to create and manage www sites.
  4. In other words obsolete, old.
Down
  1. Not heavy.
  2. You can create it in excel.
  3. Fast, does it job well.
  4. .... games

8 Clues: Not heavy..... gamesEasy to use.Fast, does it job well.You can create it in excel.In other words obsolete, old.Used to connect multiple computer networks remotely.You can use this software to create and manage www sites.

Olympus CAN Awareness Week 2021-04-19

Olympus CAN Awareness Week crossword puzzle
Across
  1. True to _____
  2. Understanding that each individual is unique, and recognizing our individual differences
  3. "A" meaning in CAN
  4. Where can you learn more about the CANs?
  5. Core Value
Down
  1. "C" meaning in CAN
  2. Core Value
  3. This CAN champions disability-related activities
  4. "N" meaning in CAN

9 Clues: Core ValueCore ValueTrue to _____"C" meaning in CAN"N" meaning in CAN"A" meaning in CANWhere can you learn more about the CANs?This CAN champions disability-related activitiesUnderstanding that each individual is unique, and recognizing our individual differences

Activity 1 2015-09-28

Activity 1 crossword puzzle
Across
  1. up to 10% or no more than 30 seconds
  2. sender and receiver active at the same time
  3. easy-consistent-location in site
  4. type of program used for editing plain text files
  5. google,yahoo,ask
  6. orders links by relevance to user
  7. related group of networked computers
  8. pictures/movies/graphics
Down
  1. underlined-identifiable-color coordinated
  2. composed of HTML tags and multimedia files
  3. sending and receiving occur at different times
  4. up to 10% or 2,500 fields or cell entries
  5. main technology for local area networks
  6. local area network

14 Clues: google,yahoo,asklocal area networkpictures/movies/graphicseasy-consistent-location in siteorders links by relevance to userup to 10% or no more than 30 secondsrelated group of networked computersmain technology for local area networksunderlined-identifiable-color coordinatedup to 10% or 2,500 fields or cell entries...

Digital Communications 2022-11-01

Digital Communications crossword puzzle
Across
  1. Arrangement of opposite elements
  2. Message transmission over communication networks
  3. Channels through which information moves
  4. Blank or unused portions of a page
  5. Any document before it is printed
  6. Unplanned static or interruption
  7. Wording in any written or printed document
Down
  1. To draw a viewer's eye in a direction
  2. Location of items in relation to each other
  3. How lines, shapes, or colors are arranged
  4. Receiver's response to the original sender
  5. Allows wireless connection to internet
  6. Information being sent and communicated
  7. Person or party sending a message

14 Clues: Arrangement of opposite elementsUnplanned static or interruptionAny document before it is printedPerson or party sending a messageBlank or unused portions of a pageTo draw a viewer's eye in a directionAllows wireless connection to internetInformation being sent and communicatedChannels through which information moves...

Ancient Egypt 2024-11-25

Ancient Egypt crossword puzzle
Across
  1. people of wealth and power
  2. Goods bought from other regions
  3. networks A system or people in different lands who trade goods
  4. The title used by a ruler in Egypt
  5. The period of Egyptian history
  6. life after death
  7. The period in which Egypt reached power and glory
Down
  1. A government ruled by religious authorities
  2. series of rulers
  3. The period of order and and stability which lasted until 1750Bc
  4. Items sent to other regions
  5. A rich and powerful person
  6. A kingdom located along the Criteria
  7. Egyptian writing system

14 Clues: series of rulerslife after deathEgyptian writing systempeople of wealth and powerA rich and powerful personItems sent to other regionsThe period of Egyptian historyGoods bought from other regionsThe title used by a ruler in EgyptA kingdom located along the CriteriaA government ruled by religious authorities...

treasure hunt 8 2025-04-24

treasure hunt 8 crossword puzzle
Across
  1. how do pirates say hello
  2. disk that uses magnetic storage
  3. unique address of a device on a network
  4. where does the parrot sit on a pirate
  5. a signal that come into a computer
  6. connects all the hardware components in a computer
  7. structured collection of data
  8. which checks each element one by one
Down
  1. a string is the same forwards and backwards
  2. used to prove the identity of the website
  3. most widely used mobile os
  4. a term for network of networks
  5. symbol on a pirates flag
  6. a witches dress is called

14 Clues: how do pirates say hellosymbol on a pirates flaga witches dress is calledmost widely used mobile osstructured collection of dataa term for network of networksdisk that uses magnetic storagea signal that come into a computerwhich checks each element one by onewhere does the parrot sit on a pirateunique address of a device on a network...

Types of Marketing 2025-11-14

Types of Marketing crossword puzzle
Across
  1. Marketing targeted to smartphone users
  2. Marketing through TV, radio, print media
  3. Marketing based on commission for referred sales
  4. Marketer actively reaching out to customers
  5. Marketing products in international markets
Down
  1. Marketing through direct communication with customers
  2. Fast-spreading promotional content across the internet
  3. Marketing via social media networks
  4. Marketing activities done through online platforms
  5. Attracting customers through valuable content
  6. Sending promotional messages to users' inboxes
  7. One-to-one, individualized marketing approach
  8. Creating valuable materials to attract customers
  9. Building and managing the image of a company

14 Clues: Marketing via social media networksMarketing targeted to smartphone usersMarketing through TV, radio, print mediaMarketer actively reaching out to customersMarketing products in international marketsBuilding and managing the image of a companyAttracting customers through valuable contentOne-to-one, individualized marketing approach...

Computer 2020-10-18

Computer crossword puzzle
Across
  1. technique used to redirect a legitimate website
  2. Allows you to recover the file
  3. users love to watch webisodes
  4. Do not visit anything but the social networks
  5. use internet to find music and new bands
  6. they use internet to read news paper and comment in political forum
  7. Instant message scam
  8. Electronic device that processes information
Down
  1. they live on IM, video chat and email
  2. contains date and time and shortcut to application
  3. intentionally malicious software
  4. Designed to infect a computer
  5. The heaviest users
  6. Refers to the computer users

14 Clues: The heaviest usersInstant message scamRefers to the computer usersDesigned to infect a computerusers love to watch webisodesAllows you to recover the fileintentionally malicious softwarethey live on IM, video chat and emailuse internet to find music and new bandsElectronic device that processes information...

Tactical Data Links 2021-08-02

Tactical Data Links crossword puzzle
Across
  1. document that outlines data link parameters
  2. Manages flow of information on Link 11
  3. JREAPA transmission medium
  4. Manages flow of information on Link 16
  5. JREAPB transmission medium
  6. Link 16 participants use this message format
Down
  1. principle that allocates time slots among participants
  2. gateway between SADL and Link 16
  3. JREAPC transmission medium
  4. uses a gateway to transfer data between networks
  5. Half Duplex/Secure not jam resistant
  6. Link 11 participants use this message format
  7. polling technique used to manage Link 11 information flow
  8. tactical router that sends data via JREAPs

14 Clues: JREAPC transmission mediumJREAPA transmission mediumJREAPB transmission mediumgateway between SADL and Link 16Half Duplex/Secure not jam resistantManages flow of information on Link 11Manages flow of information on Link 16tactical router that sends data via JREAPsdocument that outlines data link parameters...

Digital Citizenship 2016-09-08

Digital Citizenship crossword puzzle
Across
  1. a thing that is connected to the internet
  2. information full name, address, school name
  3. a device that you use to look up stuff
  4. mass communication
  5. information
  6. putting something up on a website
  7. a symbol used to make posts
  8. internet use when you don't have wifi
Down
  1. playing nice in the online world
  2. is a global system that inconnects with networks
  3. media websites or apps that you post on
  4. cordless internet
  5. phones, ipads, computers
  6. phone a celluar phone that helps you connect to people

14 Clues: informationcordless internetmass communicationphones, ipads, computersa symbol used to make postsplaying nice in the online worldputting something up on a websiteinternet use when you don't have wifia device that you use to look up stuffmedia websites or apps that you post ona thing that is connected to the internet...

Texas In The 20th century 2023-05-01

Texas In The 20th century crossword puzzle
Across
  1. taxes on imports and exports
  2. able to carry easily from place to place
  3. over crowded
  4. the science of travel trough air
  5. education beyond high school
  6. fluent in two languages
  7. a gas used in light bulbs
  8. one of six international awards given for outstanding work
Down
  1. special transportation service for people with disabilities
  2. an agreement to depend on one another
  3. a worldwide system of computer networks
  4. a newspaper that gives an opinion on a topic
  5. a short phrase used in advertising
  6. a gas that can be cooled to keep food fresh

14 Clues: over crowdedfluent in two languagesa gas used in light bulbstaxes on imports and exportseducation beyond high schoolthe science of travel trough aira short phrase used in advertisingan agreement to depend on one anothera worldwide system of computer networksable to carry easily from place to placea gas that can be cooled to keep food fresh...