networks Crossword Puzzles
Comp I Semester Test 2023 2023-05-09
Across
- what the speed of a computer is measured in.
- read only memory.
- a unit of digital information that consists of 8 bits.
- known as volatile memory.
- a global network of computing devices communicating with each other in some way, whether they're sending emails, downloading files, or sharing websites.
- stores either the value 0 or 1.
- a protocol that uniquely identify devices using IP addresses and provides a routing strategy to send data to a destination IP address.
- a protocol used to convert a domain name into an IP address.
- compression algorithms that reduce the size of files without losing any information in the file.
- networks connected using physical connection such as cables.
Down
- the physical components of a computer.
- any group of interconnected computing devices capable of sending or receiving data
- a massive network of webpages, programs, and files that are accessible via URLs.
- shows how much data can be transferred across the communication media in a single second.
- a set of instructions, data, or programs used to operate a computer and execute specific tasks.
- a set of rules that have been agreed so that all devices on a network work in the same way and can understand each other.
- networks that use radio waves to send data through the air.
- 1's and 0's.
- a network that extends over a large geographic area and is composed of many, many LANs.
- compression algorithms that reduce the size of files by discarding the less important information in a file.
- a network that covers a limited area like a house or school.
21 Clues: 1's and 0's. • read only memory. • known as volatile memory. • stores either the value 0 or 1. • the physical components of a computer. • what the speed of a computer is measured in. • a unit of digital information that consists of 8 bits. • networks that use radio waves to send data through the air. • a protocol used to convert a domain name into an IP address. • ...
Security Policy 2024-12-08
Across
- creates a barrier between networks so that potentially harmful packets can't enter or leave protected networks.
- used to encrypt files and folders in windows OSs.
- requires a user to supply two or more types of authentication.
- a document that describes the rules governing access to an organization's information resources, enforcement of these rules, and steps taken if rules are breached.
- a framework for other protocols that provide encryption and authentication.
- is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
- is a common tool used by many Linux administrators.
- prevents people from using eavesdropping technology, such as protocol analyzer, to capture packets.
- is a good secrity enhancement for servers that aren't physically secure and for mobile devices at risk of being lost or stolen.
- An important part for maintaining a system.
- backs up the disk sector by sector to create an exact image of the disk's contents.
- used in a windows domain environment and provides mutual authentication.
Down
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use.
- a server role that makes it possible for administrators to take control of Microsoft product updates.
- the built-in firewall in most linux distributions.
- a Linux files tool that offers a trash can for deleting files permanently.
- backs up any files that changed since the last full or incremental backup.
- creates a barrier between two entities.
- only backs up files that have changed since the last full backup.
- the most widely method for encrypting data.
20 Clues: creates a barrier between two entities. • the most widely method for encrypting data. • An important part for maintaining a system. • used to encrypt files and folders in windows OSs. • the built-in firewall in most linux distributions. • is a common tool used by many Linux administrators. • requires a user to supply two or more types of authentication. • ...
Era 1 - 1.3 - South and Southeast Asia 2025-09-08
Across
- – Thai kingdom known for its adoption of Buddhism and cultural achievements.
- – Language blending Persian, Arabic, and South Asian influences, developed under Delhi Sultanate rule.
- – Hindu social hierarchy that structured society and reinforced rulers’ legitimacy in India.
- – Kingdoms like Srivijaya and Majapahit that gained wealth and power by controlling trade networks at sea.
- – Famous Hindu-Buddhist temple complex built by the Khmer Empire, symbolizing state power and religion.
- – Maritime empire in Sumatra that prospered by controlling Indian Ocean trade and supporting Buddhism.
- – Monument built in Delhi after Islamic conquest, symbolizing Muslim dominance in North India.
- – Hindu devotional movement emphasizing personal connection to a deity, often challenging caste distinctions.
Down
- – States in mainland South/Southeast Asia that relied on agriculture and territorial control for power.
- – Hindu kingdom in southern India that resisted Muslim invasions and promoted Hindu culture.
- – Indian Ocean trade networks linking South and Southeast Asia with Africa, the Middle East, and China.
- – Long-standing South Asian belief system that shaped social order and political legitimacy through the caste system.
- – Religion that spread from India into Southeast Asia, blending with local traditions in places like Srivijaya.
- – Muslim government in northern India (1206–1526) that unified much of the region under Islamic power.
- – Act of spreading a religion to new followers; Muslims in South and Southeast Asia often used this approach.
- – Powerful empire in Cambodia that built Angkor Wat and blended Hindu-Buddhist influences.
- – Religion that spread to South and Southeast Asia through trade and conquest, influencing politics and culture.
- – Mystical form of Islam that appealed to many in South Asia through tolerance and emotional devotion.
- – Buddhist kingdom in Sri Lanka known for irrigation systems and monastic support of the state.
- – Maritime empire in Indonesia that controlled trade routes and resisted Mongol expansion.
20 Clues: – Thai kingdom known for its adoption of Buddhism and cultural achievements. • – Powerful empire in Cambodia that built Angkor Wat and blended Hindu-Buddhist influences. • – Maritime empire in Indonesia that controlled trade routes and resisted Mongol expansion. • – Hindu kingdom in southern India that resisted Muslim invasions and promoted Hindu culture. • ...
Chapter 3.2 Crossword 2026-02-24
Across
- Information a company needs to keep private to protect from theft.
- Illegally accessing or altering digital devices, software, or networks.
- Prevents your browser from showing ads that can contain malware.
- Work created by company employees on the job that is owned by that company.
- Malware disguised to appear as a useful or common application.
- Appropriate behavior in a business setting, such as respecting property and time.
- Bits of data stored on your computer that record visited websites.
- Identifies the manner in which employees should behave while at work.
- A number used to identify an electronic device connected to the Internet.
- Tools that prevent unauthorized Internet surfing or visiting selected websites.
- Software that spies on a computer to capture private info like passwords.
- Overstating features and benefits of products or making false claims.
- Rules and standards for using company-owned equipment and networks.
- Stealing physical mail to commit identity theft.
Down
- Applying ethics to messages to make sure all communication is honest.
- Use of fraudulent emails to trick people into providing private data.
- Software programs intended to damage, destroy, or steal data.
- Software referred to as antivirus or antimalware.
- Malware similar to Trojans that can self-replicate to infect other devices.
- A document that dictates how business should be conducted.
- Specific information about a company is never shared without clearance.
- Stealing personal information to commit theft or fraud.
- Behaving with sensitivity to social, environmental, and economic issues.
- Program designed to negatively impact a system by infecting other files.
- Examining and blocking or deleting material considered inappropriate.
25 Clues: Stealing physical mail to commit identity theft. • Software referred to as antivirus or antimalware. • Stealing personal information to commit theft or fraud. • A document that dictates how business should be conducted. • Software programs intended to damage, destroy, or steal data. • Malware disguised to appear as a useful or common application. • ...
Vocab Te 2026-03-05
Across
- A service that encrypts your online activity and makes your connection appear to come from another location.
- A major internet backbone provider that connects directly with one another without paying for transit.
- Protective software that scans for and removes harmful programs from a system.
- A phishing scheme aimed specifically at high-level officials or executives.
- A digital barrier that filters traffic entering and leaving a network based on security rules.
- A machine that supplies information or services to other devices connected to it.
- Breaking into a computer system or network without permission.
- Online content that is hidden from search engine results but is usually legal and password-protected.
- Sending fake messages that look real in order to trick someone into giving personal information.
- Quietly collecting information about a system without directly engaging with it.
- Using psychological tricks to persuade someone to share private details.
Down
- The final stretch of the network that delivers internet service from a provider to your location.
- A massive global system that links computers and devices together so they can exchange information.
- The publicly viewable part of the internet that search engines can list and display.
- Secretly rerouting someone to a counterfeit website to capture their private data
- An agreed-upon communication standards that control how data moves across networks.
- A security method that requires two or more types of verification.
- Internet providers that rely on higher-level backbone networks for global access.
- A concealed section of the internet accessed through special tools, designed to keep users anonymous.
- A protected facility filled with computer equipment that stores and manages digital information.
20 Clues: Breaking into a computer system or network without permission. • A security method that requires two or more types of verification. • Using psychological tricks to persuade someone to share private details. • A phishing scheme aimed specifically at high-level officials or executives. • ...
IPTV Times Table 2 2012-11-16
Across
- Short for Media Gateway Control Protocol
- A method of transmission in which all bits of a character are sent simultaneously over separate lines to a high speed printer or other locally attached peripheral
- Data transmission over a circuit capable of transmitting in one preassigned direction only
- An application that enables a desktop, laptop or workstation computer to function as a telephone via VOIP
- A communications channel or medium having a bandwidth sufficient to carry multiple voice/video or data signals simultaneously
- A device that allows user to send commands to a computer that is somewhere else
- A group of bits, including address, data and control elements, that are switched and transmitted together
- A single device capable of both sending and receiving information
- Used in IP networks to break up larger networks into smaller networks
- A connection-oriented protocol that employs the virtual circuit approach
- Provides broadband access network over traditional twisted copper pair and faster than ADSL
- Television programming that requires payment upfront usually on a monthly basis as a subscription fee
- TCP flow control process used to control the number of unacknowledged data segments that are sent between transmissions
- Provides a standard method for transporting multi-protocol datagrams over point-to-point links
- Unreliable and connectionless
Down
- One of the three basic modulations of adding information to a sine wave signal in which its phase is varied to impose information on it
- Information which travels from the user to the internet or to a central office or headend
- A technique for combining many signals on a single circuit by interleaving bits or bytes of data from successive channels
- The range of electromagnetic radio frequencies used in transmission of voice, data and television
- Any common carrier network that provides circuit switching between public users
- Transmission in which the data character and bits are transmitted at a fixed rate with the transmitter and receiver being synchronized
- A functional unit of a node through which data can enter or leave a data network
- Plastic cards the viewer can insert in the set-top box
- Application layer signaling protocol
- The length of an electromagnetic waveform as measured from any point on one wave to the corresponding point on an adjacent wave
- A specific set of rules, procedures or conventions that two data devices must accept and use to be able to communicate
- A type of scanning that may result in a screen flicker
- Used to manage the membership of Internet Protocol multicast groups
- Telecommunications companies that sell internet access
- The device which enables anyone to compute, word process, or perform more complicated functions
30 Clues: Unreliable and connectionless • Application layer signaling protocol • Short for Media Gateway Control Protocol • Plastic cards the viewer can insert in the set-top box • A type of scanning that may result in a screen flicker • Telecommunications companies that sell internet access • A single device capable of both sending and receiving information • ...
Computer Acronyms 2024-09-06
Across
- A standard interface designed for IBM PC-compatible computers.
- An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
- A type of non-volatile memory used in computers and other electronic devices.
- A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
- A proprietary journaling file system developed by Microsoft in the 1990s.
- An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
- A small economy car made by the British Motor Corporation.
- Used to interact with computer programs with text-based commands.
- The most important processor in a given computer.
- A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
- Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
- A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
- A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
- A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
- A video display interface developed by the Digital Display Working Group.
- A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
- A video display controller and accompanying de facto graphics standard.
- A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
- A solid-state storage device.
- A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
- A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
- A computer hardware component that connects a computer to a computer network.
- An industry standard that allows data exchange and delivery of power between many types of electronics.
- A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.
25 Clues: A solid-state storage device. • The most important processor in a given computer. • A small economy car made by the British Motor Corporation. • A standard interface designed for IBM PC-compatible computers. • Used to interact with computer programs with text-based commands. • A video display controller and accompanying de facto graphics standard. • ...
Technology 2023-04-17
Across
- - Solid-State Drive, storage device that uses flash memory
- - Mobile device with a touch screen interface
- - Machine designed to perform tasks automatically
- - Wireless networking technology for local area networks
- - Automated device that performs tasks
- HEADSET - Virtual reality head-mounted display
- - Security system that controls access to a computer network
- - Video or audio content delivered over the internet in real-time
- - Mobile device that can perform various tasks
- - Reality technology that overlays digital information onto the real world
- - Display that can sense and respond to touch input
- - Technology that uses radio waves for communication
- - Person who uses their technical skills to gain unauthorized access to computer systems
- - Software that manages computer hardware and software resources
- - Process of creating computer software
- - Intelligence created by computer systems
- - Digital ledger used for secure transactions
- - Playing electronic games
- - Fifth generation wireless technology for mobile networks
- - Electronic mail system for sending and receiving messages
- - Physical components of a computer system
- - Science and engineering of manipulating matter on a tiny scale
- - Video camera that streams or records video
Down
- - Collection of data that can be accessed, managed, and updated
- - Additive manufacturing process of creating three-dimensional objects
- - Output device used to create hard copies of documents
- - Buying and selling goods
- - Global computer network
- - Wireless technology used for short-range communication
- - Malicious software that can harm computer systems
- - Input device used for typing
- - Funding a project through small contributions from many people
- - Software used to access the internet and view websites
- - Output device used to produce sound
- - Input device used to capture audio
- - High-Definition Multimedia Interface, digital audio and video interface
- - Programs and data used by a computer
- - Reality technology that simulates a three-dimensional environment
- - Neural networks used for machine learning
- - Digital or virtual currency that uses cryptography for security
- - Photography using electronic sensors to capture images
- - Portable computer that can be used on the go
- - Computer system that provides services to other computers over a network
- - Step-by-step procedure for solving a problem
- - Writing computer code to create software
- CODE - Two-dimensional barcode used for storing information
- - Universal Serial Bus, standard interface for connecting computer peripherals
- - Input device used to control a computer
- - Device that converts digital signals to analog signals for transmission over phone lines
- - Input device used to digitize documents
- - Internet of Things, network of interconnected devices and appliances
- - Networking device used to connect multiple devices to a network
- - Network of remote servers used for storing and managing data
53 Clues: - Global computer network • - Buying and selling goods • - Playing electronic games • - Input device used for typing • - Input device used to capture audio • - Output device used to produce sound • - Automated device that performs tasks • - Programs and data used by a computer • - Process of creating computer software • - Input device used to control a computer • ...
ISCC - Chapter 4 2025-11-27
Across
- — Open record maintained by the community for verifying transactions
- — Services triggered by a user’s real-time geographic position
- — Generation that learns, reacts, and thinks differently due to lifelong hyper-connectivity
- — AI branch that captures, stores, and processes images
- — Products delivered electronically with no physical form
- — Digital platform where supply directly meets demand
- — Technology that enables people to form interest-based communities online
- — Technology that simulates reasoning, perception, and problem-solving
- — Information system that embeds AI in its decision-making
- — Information system that supports content sharing among user communities
- — Network-based business model seamless across devices and platforms
- — Innovation that reshapes industries and behaviours in society
- — Digital platform that connects drivers and riders for transport services
- — System enabling real-time reservations and digital payments
- — Facility enabling fast shipping for digital retail operations
- — Technique enabling secure transfer of digital funds between parties
- — AI system that stores knowledge and makes inferences like a human specialist
- — Online buying and selling supported by integrated inventory and fulfilment networks
- — A community transformed by integration of advanced technologies
- — Secret cryptographic credential used to authorise digital transactions
- — Insights from business intelligence showing future trends
- — Digital money secured by cryptography and resistant to counterfeiting
Down
- — Organization built entirely on digital platforms and networks
- — The key digital-money flaw where a single token could be duplicated
- — Describes Generation Z’s constant immersion in digital communication
- — Technologies providing historical, current, and predictive business insights
- — Digital model where services are requested and delivered instantly
- — Next-generation commerce integrating apps, supply chain, and data
- — Economic model built on digital intermediaries and user networks
- — Digital services enhanced with AI and continuous data learning
- — Digital financial transactions conducted through smartphone apps
- — Technology that subtly influences behaviour and decision-making
- — Computing system designed to mimic the human brain’s processing
- — Chain of cryptographically linked blocks storing immutable transaction records
- — First cryptocurrency created to solve the double-spend problem
- — The act of publishing and distributing digital media online
- — Behaviour and thinking shaped by technology and the internet
- — Providers, users, and groups that shape SMIS interactions
- — Group of users connected by shared interests on social platforms
- — Digital process that reduces or removes the need for human intervention
- — AI that adjusts behaviour based on past outcomes
- — Mechanical systems capable of performing high-precision repetitive tasks
- — Cryptographic identifier shared publicly for receiving digital currency
- — Computer-generated environment reproducing real-world tasks
- — Capability allowing a computer to understand spoken or written human language
45 Clues: — AI that adjusts behaviour based on past outcomes • — Digital platform where supply directly meets demand • — AI branch that captures, stores, and processes images • — Products delivered electronically with no physical form • — Information system that embeds AI in its decision-making • — Providers, users, and groups that shape SMIS interactions • ...
Module 4 Crossword 2019-04-26
Across
- It is short for malicious software.
- Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
- This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
- Encrypted files or encrypted communication is unreadable to ________ viewers.
- Hackers use software known as a packet sniffer to read ________ traffic.
- This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
Down
- This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
- The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
- Process of attempting to reduce or eliminate harmful effects of the breach.
- This is the security principle that protects data from inappropriate modification or corruption.
- An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
- A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
- Antivirus software prevents, ________, and removes viruses.
- This sends traffic from private networks to the Internet and from the Internet to private networks.
- Displaying unwanted advertisements and redirecting web browsers is an example of this.
15 Clues: It is short for malicious software. • Antivirus software prevents, ________, and removes viruses. • Hackers use software known as a packet sniffer to read ________ traffic. • Process of attempting to reduce or eliminate harmful effects of the breach. • Encrypted files or encrypted communication is unreadable to ________ viewers. • ...
Computer Literacy History of the Internet 2022-01-09
Across
- a piece of computer hardware or software that accesses a service made available by a server
- markup language used to make web pages
- he gulf between those who have ready access to computers and the internet, and those who do not.
- The acronym for a web page address
- a program of coordinated, evolving projects sponsored by the National Science Foundation from 1985 to 1995 to promote advanced research and education networking in the United States
- a piece of computer hardware or software that provides functionality for other programs or devices, called "clients".
- the first internet browser
- The computer scientist who is primarily remembered for having championed the creation of ARPANET, an early Internet.
- The set of communications protocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol and the Internet Protocol.
- a computer network that connects smaller networks. They allow localized networks to communicate with one another across great distances.
- (vc) The co-inventor of the TCP/IP protocols and was responsible for originating DARPA's Internet program. Known as one of the “Fathers of the Internet”
- Refers to a website address. This is what users type in a browser's search bar to directly access the website. It is unique and cannot be shared between different sites.
- computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
- Best known as the inventor of the World Wide Web
- a computer program with a graphical user interface for displaying and navigating between web pages.
Down
- a rapid rise in U.S. technology stock equity valuations fueled by investments in Internet-based companies in the late 1990s.
- an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
- the state of political hostility that existed between the Soviet bloc countries and the US-led Western powers from 1945 to 1990.The reason the internet was created
- a mode of data transmission in which a message is broken into a number of parts which are sent independently, over whatever route is optimum
- a common network protocol used on the Internet and also inside a LAN (local network). ... Telnet is one of the simplest ways to exchange data between two computers.
- a set of computers sharing resources located on or provided by nodes. The computers use common communication protocols over digital interconnections to communicate with each other.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- a Unix-based system for transferring data over phone lines via a dial-up connection.
- _________.com, the first and oldest registered web site
- (rk)The co-inventor of the TCP/IP protocols and was responsible for originating DARPA's Internet program. Known as one of the “Fathers of the Internet”
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- The most popular search engine
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- The forerunner of the Internet, was a pioneering long-haul network funded by the U.S. Department of Defense
30 Clues: the first internet browser • The most popular search engine • The acronym for a web page address • markup language used to make web pages • Best known as the inventor of the World Wide Web • _________.com, the first and oldest registered web site • a Unix-based system for transferring data over phone lines via a dial-up connection. • ...
Unit 6 Vocab Crossword 2021-09-28
Across
- offensive maneuver that targets computer information systems, computer networks, infrastructures
- the practice of protecting critical systems and sensitive information from digital attacks
- is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization
- are criminals who break into computer networks with malicious intent.
- slang term used to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems
- the use of computer-based technique such as hacking as a form of civil disobedience
- a relatively unskilled individual who uses scripts or programs
- prevents someone watching your connection from knowing what websites you visit
- parts of the World Wide Web whose contents are not indexed by standard web search-engines.
- is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle
Down
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- allows developers to discover and resolve bugs before the general public is aware of such bug
- a path or means by which an attacker or hacker can gain access to a computer or network server
- the gaining of unauthorized access to data in a system or computer.
- open-source software for enabling anonymous communication.
15 Clues: open-source software for enabling anonymous communication. • a relatively unskilled individual who uses scripts or programs • the gaining of unauthorized access to data in a system or computer. • are criminals who break into computer networks with malicious intent. • prevents someone watching your connection from knowing what websites you visit • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
Module 4 Crossword 2019-04-26
Across
- This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
- It is short for malicious software.
- Displaying unwanted advertisements and redirecting web browsers is an example of this.
- This is the security principle that protects data from inappropriate modification or corruption.
- An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
- Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
- Encrypted files or encrypted communication is unreadable to ________ viewers.
- Hackers use software known as a packet sniffer to read ________ traffic.
Down
- This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
- The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
- This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
- A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
- Process of attempting to reduce or eliminate harmful effects of the breach.
- Antivirus software prevents, ________, and removes viruses.
- This sends traffic from private networks to the Internet and from the Internet to private networks.
15 Clues: It is short for malicious software. • Antivirus software prevents, ________, and removes viruses. • Hackers use software known as a packet sniffer to read ________ traffic. • Process of attempting to reduce or eliminate harmful effects of the breach. • Encrypted files or encrypted communication is unreadable to ________ viewers. • ...
Module 4 Crossword 2019-04-26
Across
- This privacy rule is a set of federal standards written to protect the privacy of patients’ medical records and other health information maintained by covered entities.
- Process of attempting to reduce or eliminate harmful effects of the breach.
- Displaying unwanted advertisements and redirecting web browsers is an example of this.
- This is the security principle that protects data from inappropriate modification or corruption.
- Breaking the data elements into the level of detail desired by the healthcare facility is called ________.
- Hackers use software known as a packet sniffer to read ________ traffic.
- Antivirus software prevents, ________, and removes viruses.
- It is short for malicious software.
Down
- The HIPAA Security rule requires covered entities to guarantee certain safeguards to protect ePHI data. The three are: physical, technical, and ________ safeguards.
- This is an attempt to trick a user into revealing personal information to an attacker so that they can impersonate the user.
- Encrypted files or encrypted communication is unreadable to ________ viewers.
- A programming language that was designed to be used on the Internet and that runs some of the functions of Internet applications.
- An organized collection of data, text, references, or pictures in a standardized format, typically stored in a computer system for multiple applications.
- This sends traffic from private networks to the Internet and from the Internet to private networks.
- This downloads and displays unsolicited ads and is usually installed without the user’s knowledge.
15 Clues: It is short for malicious software. • Antivirus software prevents, ________, and removes viruses. • Hackers use software known as a packet sniffer to read ________ traffic. • Process of attempting to reduce or eliminate harmful effects of the breach. • Encrypted files or encrypted communication is unreadable to ________ viewers. • ...
Syys Sanaristikko :) 2013-10-13
Across
- I am known for my printers.
- I am the second largest non-oil company in Texas.
- An Indian-born IIT (Kanpur) graduate founded me in 1996 and now I'm a $4.36b US company head-quarted in California :)
- I was founded in 2000 as Zepton Networks.
- Over one third of the world's wireless calls travel via networks owned by my customers !!!
- In April 2006, a dispute between Reliance Communications and me over royalty fees cost me approximately $11.7b in market capitalization. In July 2007, Reliance and me decided to settle the matter and agreed to expand the use of CDMA technology in India.
- I generate "traffic generators" :)
- I was founded in 1895 and now bankrupt...IP phones and Secure Routers are my speciality.
Down
- I am the largest telecommunications equipment maker in the world, having overtaken Ericsson in 2012.
- I am an American company that designs and manufactures electronic and bio-analytical measurement instruments and equipment for measurement and evaluation.
- I acquired Renesas Mobile Corporation last month.
- The world's largest ever manual telephone exchange, serving 60,000 lines, was installed by me in Moscow in 1916.
- I was carved out in 2000 from Lucent Technologies.
- My parents kept (the second half of) my birth place as my name :)
- I share my birthday with the auther of this crossword but in the year 1847 at Berlin :) I am famous when I am called with 'Nokia' :)
15 Clues: I am known for my printers. • I generate "traffic generators" :) • I was founded in 2000 as Zepton Networks. • I acquired Renesas Mobile Corporation last month. • I am the second largest non-oil company in Texas. • I was carved out in 2000 from Lucent Technologies. • My parents kept (the second half of) my birth place as my name :) • ...
IT_KD 2023-12-04
Across
- A networking device that directs data traffic between different computer networks.
- A high-level programming language known for its readability and versatility.
- The process of identifying and fixing errors or bugs in software code.
- A widely-used programming language that adds interactivity and dynamic content to web pages.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A structured collection of data organized for efficient retrieval, storage, and management, typically using tables and relationships.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- The delivery of computing services, including storage, processing power, and software, over the internet.
- The standard markup language for creating web pages and web applications.
- A set of rules and tools for building software applications, enabling them to communicate with each other.
- A step-by-step set of instructions or rules to solve a specific problem or perform a particular task.
- A computer or system that provides resources, services, or data to other computers, known as clients, in a network.
- The process of converting information into a code to secure it from unauthorized access or use.
- A pre-built structure or set of tools that provides a foundation for software development, making it easier to create and manage applications.
- Any software intentionally designed to harm or exploit computer systems, including viruses, worms, and ransomware.
15 Clues: The process of identifying and fixing errors or bugs in software code. • The standard markup language for creating web pages and web applications. • A high-level programming language known for its readability and versatility. • A networking device that directs data traffic between different computer networks. • ...
TV Production Terms 2024-03-05
Across
- The person responsible for overseeing the creative aspects of filming and directing actors.
- The real-time transmission of a TV show as it is being filmed or performed.
- A visual representation of the scenes in a TV show, often used in pre-production planning.
- The person or team responsible for managing the overall production process, including budgeting and scheduling.
- The process of selecting and assembling footage to create the final version of a TV show.
- The licensing of a TV show for broadcast by multiple networks or stations.
- The process of adjusting and enhancing the color of footage to achieve a desired look or style.
- The final stage of post-production where all elements of the TV show are combined into a finished product ready for distribution.
Down
- The creation of the storyline, dialogue, and scene directions for a TV show.
- The distribution of the finished TV show to audiences through television networks, streaming platforms, or other channels.
- The art of capturing images on film or digital media, including camera work, lighting, and framing.
- The phase of creating a TV show where filming occurs.
- The phase of production that involves editing, visual effects, sound mixing, and other enhancements after filming is complete.
- The process of selecting actors for roles in a TV show.
- The process of combining and balancing audio elements, including dialogue, music, and sound effects.
- The measurement of audience size and demographics for a TV show, used to determine its popularity and advertising revenue.
16 Clues: The phase of creating a TV show where filming occurs. • The process of selecting actors for roles in a TV show. • The licensing of a TV show for broadcast by multiple networks or stations. • The real-time transmission of a TV show as it is being filmed or performed. • The creation of the storyline, dialogue, and scene directions for a TV show. • ...
puzzle-corner-6 2024-09-22
Across
- The smallest unit of data in a computer, representing a binary value of either 0 or 1.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
- A clickable link in a web page that directs users to another location, such as another web page or resource.
- A step-by-step procedure for solving a problem or completing a task.
- An intermediary server that relays requests from clients seeking resources from other servers.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A storage layer that temporarily holds frequently accessed data to improve retrieval speed.
- A copy of data stored separately to prevent loss in case of failure or corruption.
- The maximum amount of data that can be transmitted over a network in a given time, affecting speed and performance.
- A fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity.
Down
- A new version of a software program that includes improvements, bug fixes, or new features.
- A device that forwards data packets between computer networks, directing traffic on the internet.
- A digital representation or character created to represent a user in virtual environments or online games.
- A device that connects two different networks and allows them to communicate.
- The delivery of computing services over the internet, allowing for on-demand access to storage and applications.
15 Clues: A step-by-step procedure for solving a problem or completing a task. • A device that connects two different networks and allows them to communicate. • A copy of data stored separately to prevent loss in case of failure or corruption. • The smallest unit of data in a computer, representing a binary value of either 0 or 1. • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
Vocabulary Lesson 2 Jenifer S 2017-03-02
Across
- The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations
- The Internet's system for converting alphabetic names into numeric IP addresses.
- a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web
- is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
- means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments
- : a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- the introductory page of a website, typically serving as a table of contents for the site.
- is an input device that scans documents and images, which can be imported into a computer
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
Down
- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
- a person who uses computers to gain unauthorized access to data.
- a unit of information equal to one billion
- is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. ... In computer literature, kilobyte is usually abbreviated as K or KB.
- a common unit of measure for interest rates and other percentages in finance.
- a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- : is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- creates complete applications that may run on a single computer or be distributed among servers and clients in a network
- . It is the global address of documents and other resources on the World Wide Web
- Is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- the way in which something is arranged or set out.
25 Clues: a unit of information equal to one billion • the way in which something is arranged or set out. • a person who uses computers to gain unauthorized access to data. • a common unit of measure for interest rates and other percentages in finance. • The Internet's system for converting alphabetic names into numeric IP addresses. • ...
social networks prochazkova, duskova 2014-05-07
Across
- Most famous social network
- Write something here and read what somebody else wrote
- Something like facebook, but older
Down
- One of Google products
- Social network which shares pictures
- Your own webpage
- Share your videos
- You can talk with your friends via webcam
- Email, news and other interesting things
- You can ask for anything
10 Clues: Your own webpage • Share your videos • One of Google products • You can ask for anything • Most famous social network • Something like facebook, but older • Social network which shares pictures • Email, news and other interesting things • You can talk with your friends via webcam • Write something here and read what somebody else wrote
The Internet and Networks 2024-02-20
Across
- A network device that can connect multiple cabled devices.
- A type of card all devices need to access a network
- A network device that provides wireless connection
- WAN stands for....
- An example of wireless transmission with a range of about 15 metres
Down
- LAN stands for ...
- A unique code for all networked devices
- A system used to address devices that are connected to a specific network
- The largest example of a WAN in the world.
- A type of topology with a central point that all other network devices connect to
10 Clues: LAN stands for ... • WAN stands for.... • A unique code for all networked devices • The largest example of a WAN in the world. • A network device that provides wireless connection • A type of card all devices need to access a network • A network device that can connect multiple cabled devices. • An example of wireless transmission with a range of about 15 metres • ...
Neural and Social Networks 2024-05-05
Across
- it stands for interconnected network.
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- a category of linkages that stretch beyond a shared sense of identity.
- a category of linkages that links to people based on a sense pf common identity.
- a type of linkage where in automation, in which the devices (if any) involved in the condition and action are connected to the same gateway.
Down
- websites and apps that allow users and organizations to connect, communicate, share information and form relationships.
- a computer system modeled on the human brain and nervous system.¹
- links to people of groups further up and down the social ladder.
- a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources.
- a social networking website that was founded in February 2004 by Harvard University students Chris Hughes, Andrew McCollum, Dustin Moskovitz, Eduardo Saverin and Mark Zuckerberg.
10 Clues: it stands for interconnected network. • links to people of groups further up and down the social ladder. • a computer system modeled on the human brain and nervous system.¹ • a category of linkages that stretch beyond a shared sense of identity. • a category of linkages that links to people based on a sense pf common identity. • ...
Power Places and Networks 2025-01-27
Across
- multinational union or association in which member countries cede authority and sovereignty on at least some internal matters to the group
- the investment by a company into the stuctures, equipment or organisations of a foreign country
- A type of intergovernmental agreement, often part of a regional intergovernmental organization, where barriers to trade (tariffs and others) are reduced or eliminated among the participating states.
- a state with a dominant position characterised by its extensive ability to exert influence or project power on a global scale.
Down
- the practice of hiring a party outside a company to perform services or create goods.
- A sum of money sent from one person to another often from immigrants to family members back home
- This phenomenon includes all of the varied economic, social, political, cultural and environmental processes that make up globalisation.
- A multigovernmental organisation that works together to promote economic growth, stability, and improved quality of life worldwide.
- Businesses whose operations are spread across the world.
- can be economic, military, or emergency humanitarian
10 Clues: can be economic, military, or emergency humanitarian • Businesses whose operations are spread across the world. • the practice of hiring a party outside a company to perform services or create goods. • the investment by a company into the stuctures, equipment or organisations of a foreign country • ...
Stay in touch vocabularys 2020-05-05
Across
- Smartphones, PCs and eveything like this is something like that
- An other word for Smartphone
- Borring things aren´t this
- Opposite of nice
- You can... photos on instagram
- They are nasty on social networks
Down
- A place wich is wonderfull
- You can... your friends
- Instagram or TikTok is a...
- You can write it with paper and pen
10 Clues: Opposite of nice • You can... your friends • A place wich is wonderfull • Borring things aren´t this • Instagram or TikTok is a... • An other word for Smartphone • You can... photos on instagram • They are nasty on social networks • You can write it with paper and pen • Smartphones, PCs and eveything like this is something like that
Basic Concepts of Data Communication and Networking 2021-04-01
Across
- Rules that governs data communication
- Two or more networks connected
- More than two devices share link
- Typically uses one type of transmission media
- Data flow in one direction only
Down
- Two or more devices connected
- Topmost OSI layer
- All devices both request and grant resources
- Number of basic network topologies
- Topology with 6 devices and 15 links
10 Clues: Topmost OSI layer • Two or more devices connected • Two or more networks connected • Data flow in one direction only • More than two devices share link • Number of basic network topologies • Topology with 6 devices and 15 links • Rules that governs data communication • All devices both request and grant resources • Typically uses one type of transmission media
artificial intelligence 2024-08-15
Across
- - Popular programming language for AI.
- - Step-by-step problem-solving procedure.
- - AI capability to interpret images.
- - Moral principles guiding AI development.
- - Fundamental unit in AI networks.
Down
- - Multi-dimensional array used in machine learning.
- - Raw information used in AI training.
- - Entity that performs tasks autonomously.
- - Unfair prejudice in AI decisions.
- - Pioneer of computer science and AI.
10 Clues: - Fundamental unit in AI networks. • - Unfair prejudice in AI decisions. • - AI capability to interpret images. • - Pioneer of computer science and AI. • - Popular programming language for AI. • - Raw information used in AI training. • - Step-by-step problem-solving procedure. • - Entity that performs tasks autonomously. • - Moral principles guiding AI development. • ...
Quiz 2023-08-03
Across
- streaming service
- Humanlike chatbot
- Computer generated simulation
- virtual environment that allows acces to interperability of multiple individual
- card responsible for rendering image to monitor
- Main Directory of user interface
Down
- a private network within an organisation
- device that connects two or more networks
- Disguises itself as a safe program to open
- Software used to navigate the internet
10 Clues: streaming service • Humanlike chatbot • Computer generated simulation • Main Directory of user interface • Software used to navigate the internet • a private network within an organisation • device that connects two or more networks • Disguises itself as a safe program to open • card responsible for rendering image to monitor • ...
IPv4 vs IPv6 2021-10-19
Across
- IPv6 feature - ___________ infrastructure
- First version of IP was deployed in the ______ in 1983
- IPv6 is a 128 bit ___________ address
- IPv4 supports _________ Length Subnet Mask
- Most networks combine IP and TCP (________ Control Protocol)
- IPv6 is the next __________ of IP Addresses
Down
- IPv6 feature - ___________ addressing
- IPv6 uses NDP (__________ Discovery Protocol)
- IPv4 uses ARP (Address _________ Protocol)
- IPv4 is a 32 bit __________
10 Clues: IPv4 is a 32 bit __________ • IPv6 feature - ___________ addressing • IPv6 is a 128 bit ___________ address • IPv6 feature - ___________ infrastructure • IPv4 uses ARP (Address _________ Protocol) • IPv4 supports _________ Length Subnet Mask • IPv6 is the next __________ of IP Addresses • IPv6 uses NDP (__________ Discovery Protocol) • ...
byte trail 4 2025-03-05
Across
- A software that helps navigate web pages
- Protocol for transferring files over the internet
- Cryptocurrency ledger technology
- Used to locate resources on the internet
Down
- Processes graphics for display
- Malicious program that replicates itself
- Technology for wired local area networks
- Logical division of a drive
- Tree where each node has up to two children
- Connects software components together
10 Clues: Logical division of a drive • Processes graphics for display • Cryptocurrency ledger technology • Connects software components together • A software that helps navigate web pages • Malicious program that replicates itself • Technology for wired local area networks • Used to locate resources on the internet • Tree where each node has up to two children • ...
Cyber security 2025-07-07
Across
- : Malicious software that replicates itself
- : Scam tricking individuals for personal info
- : Protects against malicious programs
- : Someone who exploits security vulnerabilities to access systems
- : Converting data into secret code
Down
- : Locks system until ransom paid
- : Hidden flaw in software
- : Secretly gathers personal information from computers
- : Malware that appears legitimate
- : Protects networks by filtering incoming and outgoing traffic
10 Clues: : Hidden flaw in software • : Locks system until ransom paid • : Malware that appears legitimate • : Converting data into secret code • : Protects against malicious programs • : Malicious software that replicates itself • : Scam tricking individuals for personal info • : Secretly gathers personal information from computers • ...
Hacker Tools 2022-11-23
Across
- โปรแกรมที่เป็น Open source software ที่ทำงานแบบ web server scanner
- เครื่องมือที่มีความสามารถในการ crack WEP และ WPA/WPA2 ในไม่กี่นาที
- เครื่องมือที่ทำหน้าที่เป็น Digital forensics โดยอาศัยหลักการของ Data mining ในการติดตามแกะรอยข้อมูล
- เครื่องมือที่อยู่ในกลุ่มซอฟต์แวร์ที่ใช้ในการทดสอบการเจาะระบบ
- โปรแกรมกลุ่ม Password Cracking Tool
Down
- เครื่องมือที่ใช้การถอดรหัสแบบ Dictionary Attacks
- เครื่องมือที่ใช้ในการ Scan ports และ Map Networks
- เครื่องมือที่นิยมใช้เพื่อ captures data packet ที่อยู่ใน Network ที่ทำงานแบบ Real time
- เครื่องมือที่เรียกว่าเป็น Web Vulnerability Scanner ตัวหนึ่งที่ได้รับความนิยมมากพอสมควร
- เครื่องมือนี้ทำหน้าที่เป็น Password Cracker/ Password Hacking
10 Clues: โปรแกรมกลุ่ม Password Cracking Tool • เครื่องมือที่ใช้การถอดรหัสแบบ Dictionary Attacks • เครื่องมือที่ใช้ในการ Scan ports และ Map Networks • เครื่องมือที่อยู่ในกลุ่มซอฟต์แวร์ที่ใช้ในการทดสอบการเจาะระบบ • เครื่องมือนี้ทำหน้าที่เป็น Password Cracker/ Password Hacking • โปรแกรมที่เป็น Open source software ที่ทำงานแบบ web server scanner • ...
ecosoc 2025-10-09
Across
- – Opposite of decentralization in crypto networks
- – Wallets can hide transaction ____
- – Crypto exchange that collapsed in 2022
- – Crypto is taxed as ____ in the USA
Down
- – Technology that records all crypto transactions
- – Privacy coin used to hide payments
- – Symbol used for Bitcoin
- – The first and most famous cryptocurrency
- – KYC stands for Know Your ____
- – Global body fighting money laundering
10 Clues: – Symbol used for Bitcoin • – KYC stands for Know Your ____ • – Wallets can hide transaction ____ • – Privacy coin used to hide payments • – Crypto is taxed as ____ in the USA • – Global body fighting money laundering • – Crypto exchange that collapsed in 2022 • – The first and most famous cryptocurrency • – Technology that records all crypto transactions • ...
Electrical and Electronic Roles 2025-09-23
Across
- – Extreme weather impacting Caribbean power systems.
- – Energy sources like solar, wind, and biomass.
- – Technology for communication networks.
- – Involves circuits, sensors, and embedded systems.
- – Network for distributing electricity.
Down
- – Software embedded in electronic devices.
- – Related to power systems and energy distribution.
- – Device for real-time energy monitoring.
- – Small-scale, localized power network.
- – Keeping systems operational and safe.
10 Clues: – Small-scale, localized power network. • – Keeping systems operational and safe. • – Network for distributing electricity. • – Technology for communication networks. • – Device for real-time energy monitoring. • – Software embedded in electronic devices. • – Energy sources like solar, wind, and biomass. • – Related to power systems and energy distribution. • ...
CS 8 2026-03-24
Across
- A program that scans and detects threats
- Type of virus that locks files for money
- A malicious program that spreads automatically
- A symbol or small picture on screen
Down
- message sent electronically
- A portable computer
- Largest network in the world
- A security system that blocks unauthorized access
- Network covering a large geographical area
- Device used to connect networks
10 Clues: A portable computer • message sent electronically • Largest network in the world • Device used to connect networks • A symbol or small picture on screen • A program that scans and detects threats • Type of virus that locks files for money • Network covering a large geographical area • A malicious program that spreads automatically • ...
Impact 1 Unit 7 Vocabulary 1 Crossword Puzzle 2020-10-03
Across
- to make something go or be taken to a place, especially by post or email.
- an activity that you do to have fun, often one that has rules and that you can win or lose.
- a written message that you can send using a mobile phone.
- describing something that is very difficult to believe or is very good.
- an international computer network connecting other networks and computers from companies, universities, etc.
- to tell other people about your ideas, experiences, and feelings on the internet.
- to talk in a friendly manner, informal way to somebody.
- to look for information in a dictionary or by using a computer.
- a small tool or device that does something useful.
Down
- to join a computer or a mobile device to the internet or to a computer network.
- a mobile phone that also has some of the functions of a computer.
- something might exist or happen.
- able to move or travel around easily.
- an attempt to find somebody or something, especially by looking carefully for it or them.
- a system for connecting to the internet or sending data over computer networks using radio waves instead of wires.
- a small computer that is easy to carry, with a large touch screen and usually without a physical keyboard.
- a piece of software that you can download to a device such as a smartphone or tablet, for example to look up information or to play a game.
- describing something that can help do what you want.
18 Clues: something might exist or happen. • able to move or travel around easily. • a small tool or device that does something useful. • describing something that can help do what you want. • to talk in a friendly manner, informal way to somebody. • a written message that you can send using a mobile phone. • to look for information in a dictionary or by using a computer. • ...
SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Safety and Ethics Puzzle 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Assignment 6 activities 2015-09-21
Across
- hypertext markup language
- both the sender and the receiver are active
- high level programming language
- unauthorized use or attempts of unauthorized use of UT IT resources
- has concise text
- world wide web
- a web page is composed of html tags and multimedia files
Down
- result in termination of access
- can use 30 seconds of media
- wide area networks
- newest form of html
- local area network
- 25% slower than paper
- tag used to fin pages that might use one or severalwords
- text editor for mac
- no more than 5 images from artist
16 Clues: world wide web • has concise text • wide area networks • local area network • newest form of html • text editor for mac • 25% slower than paper • hypertext markup language • can use 30 seconds of media • result in termination of access • high level programming language • no more than 5 images from artist • both the sender and the receiver are active • ...
Bonus Extension 2017-03-14
Across
- Something you cannot touch.
- Network______ Card
- The data is constantly changing.
- You use this to search for things on the internet.
- Something you can touch.
- tapes Used to store large amounts of data.
- The transmission of data.
- Loses contents when the power is turned off.
- This type of storage may be on CD's and DVD's.
Down
- You can take this type of storage with you.
- Brain of the computer.
- Internet : ___________ network of networks.
- Documents that contain links and graphics
- Modern day internet.
- Uniform Resource ____________
- The way computers are organised in a network.
16 Clues: Network______ Card • Modern day internet. • Brain of the computer. • Something you can touch. • The transmission of data. • Something you cannot touch. • Uniform Resource ____________ • The data is constantly changing. • Documents that contain links and graphics • You can take this type of storage with you. • Internet : ___________ network of networks. • ...
Displays and Image Processing 2022-05-20
Across
- coded excitation occurs in the _____
- digital image storage
- creates an element of realism to a 3D image
- smallest amount of digital storage
- any changes after freezing an image
- manipulating data before it is stored
- compounding that averages images from different frequencies
- grainy appearance in tissues
Down
- creates bright and dark highlights around edges
- the force of the beam can tell how dense the tissue is
- temporal compounding is also known as _____
- provides guidelines for imaging networks
- group of 8 bits
- compounding that averages data from different angles
- real world numbers
- smallest element of a picture
16 Clues: group of 8 bits • real world numbers • digital image storage • grainy appearance in tissues • smallest element of a picture • smallest amount of digital storage • any changes after freezing an image • coded excitation occurs in the _____ • manipulating data before it is stored • provides guidelines for imaging networks • temporal compounding is also known as _____ • ...
US Technology Holiday Crossword 2025-12-11
Across
- John Hancock's wellness program name
- Longer. Healthier ...
- Historic document bearing John Hancock's famous signature
- Kryptorian hero with an "S" on his chest
- Programming language named after a snake
- Term for a program that self-replicates across networks
- Festival of lights that lasts eight nights
- Manulife's logo color
Down
- Popular holiday ballet
- Famous local symphony that plays every holiday season
- Candle holder used during Kwanzaa
- AI assistant from microsoft
- He brings presents down the chimney
- Word meaning "Christmas" in Spanish
- Manulife's stock exchange abbreviation
- Term for a flaw in software security
16 Clues: Longer. Healthier ... • Manulife's logo color • Popular holiday ballet • AI assistant from microsoft • Candle holder used during Kwanzaa • He brings presents down the chimney • Word meaning "Christmas" in Spanish • John Hancock's wellness program name • Term for a flaw in software security • Manulife's stock exchange abbreviation • Kryptorian hero with an "S" on his chest • ...
Pueblo Economics 2025-12-09
Across
- The Italians adopted this plant and put it on pizza!
- This member of the Three Sisters was also grown by the Pueblo.
- A type of bead whose name translates to 'shell' in the Keres language.
- Another member of the Three Sisters grown by the Pueblo.
- Proof of the Chaco valley's trade networks, this sweet treat is proof of how far the Pueblo traded.
- After the Pueblo introduced this plant to Europeans, they would farm it on an industrial scale... with slaves.
- Networks of these were constructed to link communities, and sometimes for religious purposes.
- It's hot, spicy, and comes in green, orange, red, and black varieties!
Down
- Field beds consisted of lines of these, and seeds were planted in them to ensure water collected - helping ensure farms survived.
- Their forebearers were named after this, a common trade good woven of sumac, willow, or yucca.
- It's not a pancake, but similar! Also the name of Pueblo gardens, due to the shape and layout of their holes.
- Systems of canals designed to alter the flow of water and help with large-scale farming.
- Impossible to find in the desert, but common where we live; the fancier and more colourful the better, these were traded for thousands of kilometers, and used in jewelry.
- Due to less rain, the Pueblo _________ farmlands across areas, so if one failed, the others might not.
- This animal, often domesticated for companionship, was also a source of food.
- This Pueblo staple is descended from Maize.
- One of several animals the Pueblo hunted.
- What bird did the Pueblo tame?
18 Clues: What bird did the Pueblo tame? • One of several animals the Pueblo hunted. • This Pueblo staple is descended from Maize. • The Italians adopted this plant and put it on pizza! • Another member of the Three Sisters grown by the Pueblo. • This member of the Three Sisters was also grown by the Pueblo. • ...
IPTV Times Table 2 2012-11-16
Across
- Plastic cards the viewer can insert in the set-top box
- An application that enables a desktop, laptop or workstation computer to function as a telephone via VOIP
- One of the three basic modulations of adding information to a sine wave signal in which its phase is varied to impose information on it
- Data transmission over a circuit capable of transmitting in one preassigned direction only
- A single device capable of both sending and receiving information
- Television programming that requires payment upfront usually on a monthly basis as a subscription fee
- Telecommunications companies that sell internet access
- A type of scanning that may result in a screen flicker
- A technique for combining many signals on a single circuit by interleaving bits or bytes of data from successive channels
- Provides broadband access network over traditional twisted copper pair and faster than ADSL
- A connection-oriented protocol that employs the virtual circuit approach
- TCP flow control process used to control the number of unacknowledged data segments that are sent between transmissions
- Provides a standard method for transporting multi-protocol datagrams over point-to-point links
- Information which travels from the user to the internet or to a central office or headend
- A group of bits, including address, data and control elements, that are switched and transmitted together
Down
- Short for Media Gateway Control Protocol
- Transmission in which the data character and bits are transmitted at a fixed rate with the transmitter and receiver being synchronized
- Application layer signaling protocol
- The range of electromagnetic radio frequencies used in transmission of voice, data and television
- A device that allows user to send commands to a computer that is somewhere else
- The length of an electromagnetic waveform as measured from any point on one wave to the corresponding point on an adjacent wave
- The device which enables anyone to compute, word process, or perform more complicated functions
- A specific set of rules, procedures or conventions that two data devices must accept and use to be able to communicate
- Used in IP networks to break up larger networks into smaller networks
- A functional unit of a node through which data can enter or leave a data network
- Unreliable and connectionless
- Any common carrier network that provides circuit switching between public users
- Used to manage the membership of Internet Protocol multicast groups
- A communications channel or medium having a bandwidth sufficient to carry multiple voice/video or data signals simultaneously
- A method of transmission in which all bits of a character are sent simultaneously over separate lines to a high speed printer or other locally attached peripheral
30 Clues: Unreliable and connectionless • Application layer signaling protocol • Short for Media Gateway Control Protocol • Plastic cards the viewer can insert in the set-top box • Telecommunications companies that sell internet access • A type of scanning that may result in a screen flicker • A single device capable of both sending and receiving information • ...
Ch 13 2023-01-17
Across
- a type of encryption that requires the use of two keys, one for encryption and the other for decryption
- a powerful magnet that must be held over hard drive platters to destroy the data contained on the drive
- a format method that creates the boot sector and file allocation table on a drive
- an access model that enables access through all ports, except those explicitly denied
- also called message digest, a fixed length value generated by applying a mathematical function to an arbitrary length text
- a malware that encrypts files on the target and then demands that a fee be paid in order to decrypt the files
- malware that is packaged with legitimate software and is activated when a user installs the legitimate application
- the name of the wireless network
- a type of encryption that uses the same key to encrypt and decrypt the data
- a format method that creates the tracks on a hard disk and is usually performed at the factory
- a Windows feature that encrypts a removable drive
Down
- a Windows feature that encrypts data and is directly linked to a specific user account
- software tools used to perform a secure erase and that is designed to overwrite existing data multiple times, rendering the data unreadable
- an access model that allow access to configured ports, and for which access to any ports not explicitly permitted is denied
- malware that requires human action to spread and infect other hosts
- a specialized chip installed on the motherboard and whose function is required when using BitLocker
- malware that exploits network applications to consume bandwidth, crash the device, or install other malware
- a dedicated device or a software service that protects computers and networks by preventing undesirable traffic from entering internal networks
- a term to describe malicious software
- malware that uses keyloggers to monitor user activity and sends information to cybercriminals
- malware that displays unsolicited advertising using pop-up web browser windows, new toolbars, or redirects to a different website
- a Windows feature that encrypts an entire hard drive
- malware that is used by cybercriminals to gain administrator-account level access to a computer and control it remotely
- a subnetwork in an organization that provides services to untrusted networks such as a website open to the internet
- a small room with two doors, one of which must be closed before the other can be opened
- a set of security objectives that ensure the security of a network, the data, and the computer systems in an organization
26 Clues: the name of the wireless network • a term to describe malicious software • a Windows feature that encrypts a removable drive • a Windows feature that encrypts an entire hard drive • malware that requires human action to spread and infect other hosts • a type of encryption that uses the same key to encrypt and decrypt the data • ...
ISCC chapter 4 2025-11-27
Across
- — Open record maintained by the community for verifying transactions
- — Services triggered by a user’s real-time geographic position
- — Generation that learns, reacts, and thinks differently due to lifelong hyper-connectivity
- — AI branch that captures, stores, and processes images
- — Products delivered electronically with no physical form
- — Digital platform where supply directly meets demand
- — Technology that enables people to form interest-based communities online
- — Technology that simulates reasoning, perception, and problem-solving
- — Information system that embeds AI in its decision-making
- — Information system that supports content sharing among user communities
- — Network-based business model seamless across devices and platforms
- — Innovation that reshapes industries and behaviours in society
- — Digital platform that connects drivers and riders for transport services
- — System enabling real-time reservations and digital payments
- — Facility enabling fast shipping for digital retail operations
- — Technique enabling secure transfer of digital funds between parties
- — AI system that stores knowledge and makes inferences like a human specialist
- — Online buying and selling supported by integrated inventory and fulfilment networks
- — A community transformed by integration of advanced technologies
- — Secret cryptographic credential used to authorise digital transactions
- — Insights from business intelligence showing future trends
- — Digital money secured by cryptography and resistant to counterfeiting
Down
- — Organization built entirely on digital platforms and networks
- — The key digital-money flaw where a single token could be duplicated
- — Describes Generation Z’s constant immersion in digital communication
- — Technologies providing historical, current, and predictive business insights
- — Digital model where services are requested and delivered instantly
- — Next-generation commerce integrating apps, supply chain, and data
- — Economic model built on digital intermediaries and user networks
- — Digital services enhanced with AI and continuous data learning
- — Digital financial transactions conducted through smartphone apps
- — Technology that subtly influences behaviour and decision-making
- — Computing system designed to mimic the human brain’s processing
- — Chain of cryptographically linked blocks storing immutable transaction records
- — First cryptocurrency created to solve the double-spend problem
- — The act of publishing and distributing digital media online
- — Behaviour and thinking shaped by technology and the internet
- — Providers, users, and groups that shape SMIS interactions
- — Group of users connected by shared interests on social platforms
- — Digital process that reduces or removes the need for human intervention
- — AI that adjusts behaviour based on past outcomes
- — Mechanical systems capable of performing high-precision repetitive tasks
- — Cryptographic identifier shared publicly for receiving digital currency
- — Computer-generated environment reproducing real-world tasks
- — Capability allowing a computer to understand spoken or written human language
45 Clues: — AI that adjusts behaviour based on past outcomes • — Digital platform where supply directly meets demand • — AI branch that captures, stores, and processes images • — Products delivered electronically with no physical form • — Information system that embeds AI in its decision-making • — Providers, users, and groups that shape SMIS interactions • ...
5G 2021-04-07
Across
- Emission of energy
- Link between devices and networks
- A synonim for pure and clean
- Storing data while streaming
Down
- A rural area
- To damage something/hurt someone
- Distance between the waves of a radiation
- To turn something into ions (chemical process)
- A word used to define something that decline or fall down
- To observe secretly someone/something
10 Clues: A rural area • Emission of energy • A synonim for pure and clean • Storing data while streaming • To damage something/hurt someone • Link between devices and networks • To observe secretly someone/something • Distance between the waves of a radiation • To turn something into ions (chemical process) • A word used to define something that decline or fall down
Non-linear waveform shaping circuits 2022-07-16
Across
- implemented as a piecewise linear curve
- also known as dc restorers
- Clipping circuit other name
- two-port networks is being used in __shaping
- ____-segment sine-wave shaper
Down
- Remove the part of a signal
- clipper connected across the load terminals
- emitter__resistance convert sine to triangle
- ___can be used for removing the distortions
- measure of goodness
10 Clues: measure of goodness • also known as dc restorers • Remove the part of a signal • Clipping circuit other name • ____-segment sine-wave shaper • implemented as a piecewise linear curve • clipper connected across the load terminals • ___can be used for removing the distortions • emitter__resistance convert sine to triangle • two-port networks is being used in __shaping
Vocabulary 2022-11-13
Across
- something obligatory
- to produce something for the first time
- something involved in high technology
- titles conferred by colleges and universities
- a worldwide system of computer networks
Down
- to publish something
- extend over a large or increasing area
- have a portion of something with others
- money received especially on a regular basis
- synonym of help
10 Clues: synonym of help • to publish something • something obligatory • something involved in high technology • extend over a large or increasing area • have a portion of something with others • to produce something for the first time • a worldwide system of computer networks • money received especially on a regular basis • titles conferred by colleges and universities
Technology crossword 2018-06-10
Across
- We use it to move the cursor.
- Different images and texts are displayed on it.
- We use it to search for information.
- Machine programmable by a computer.
Down
- Type of malicious software program.
- Portable computer.
- The person who creates computer programs.
- Global system of interconnected computer networks.
- Most popular social network.
- We can see them on the desktop.
10 Clues: Portable computer. • Most popular social network. • We use it to move the cursor. • We can see them on the desktop. • Type of malicious software program. • Machine programmable by a computer. • We use it to search for information. • The person who creates computer programs. • Different images and texts are displayed on it. • Global system of interconnected computer networks.
Chapter 5 AGRON 342 Crossword 2023-10-23
Across
- Shape of a food that can be useful to describe certain economics
- A reduction in quantity
- The Ability to do work
- Equal Opportunity
- Process of adding acid to something
Down
- System to Help Connect Components
- To improve something
- A measure of how diverse an ecosystem is
- Introduction of Harmful Objects into the Environment
- Measure of Monetary Function
10 Clues: Equal Opportunity • To improve something • The Ability to do work • A reduction in quantity • Measure of Monetary Function • System to Help Connect Components • Process of adding acid to something • A measure of how diverse an ecosystem is • Introduction of Harmful Objects into the Environment • Shape of a food that can be useful to describe certain economics
byte trail 3 2025-03-05
Across
- Secures data by converting it to a coded form
- Software managing hardware and software resources
- Smallest unit of data in computing
- Storing data over the internet
- Device that connects multiple networks
Down
- Virtual representation of physical hardware
- High-level programming language
- Protecting data from unauthorized access
- A column in a table
- Set of vertices connected by edges
10 Clues: A column in a table • Storing data over the internet • High-level programming language • Set of vertices connected by edges • Smallest unit of data in computing • Device that connects multiple networks • Protecting data from unauthorized access • Virtual representation of physical hardware • Secures data by converting it to a coded form • ...
Dorians Digital Delema 2025-08-26
Across
- what a computer is like
- usbdrive
- turns off but powers on right away
- saves power but keeps running
- a service that allows you to save your digital data
Down
- alt
- a free cloud-based file storage
- something or someone gaining unauthorized access to computer systems, networks, or data
- applications you store your work in
- everything is off
10 Clues: alt • usbdrive • everything is off • what a computer is like • saves power but keeps running • a free cloud-based file storage • turns off but powers on right away • applications you store your work in • a service that allows you to save your digital data • something or someone gaining unauthorized access to computer systems, networks, or data
basics of deep learning 2026-01-20
Across
- – Measures how well the network predicts
- – Algorithm to update weights
- – Extra parameter to shift activation
- – Phase where the network learns from data
- – Parameter multiplied by input
- – Basic building block of neural networks
Down
- – A group of neurons at the same level
- – Final prediction of the network
- – Function applied to a neuron’s output
- – Data fed into the network
10 Clues: – Data fed into the network • – Algorithm to update weights • – Parameter multiplied by input • – Final prediction of the network • – Extra parameter to shift activation • – A group of neurons at the same level • – Function applied to a neuron’s output • – Measures how well the network predicts • – Basic building block of neural networks • ...
Businesses 2024-10-02
Across
- sends you outerspace
- can't be used to describe Apple or Tesla
- yours will affect people's perception of you
- can define culture or spirit
- very annoying but worms' favourite activity
- enjoys power and wealth
- no hands on the wheel
- when you choose to leave your job
Down
- going up and up
- using your brain but with a little help
- better not have the minimum
- going down and down
- hardware, software, networks and co
- Toulouse champion employer
- when you don't choose to leave your job
- you'll get one if you don't comply with the law
16 Clues: going up and up • going down and down • sends you outerspace • no hands on the wheel • enjoys power and wealth • Toulouse champion employer • better not have the minimum • can define culture or spirit • when you choose to leave your job • hardware, software, networks and co • using your brain but with a little help • when you don't choose to leave your job • ...
CampusQuest 2024-09-07
Across
- Home of lectures and naps
- Low price to gain market share
- Framework of strengths, weaknesses,opportunities,threats
- Celebration center for events
- Strategy to make a product unique
Down
- Studying on online consumer behavior
- Creating a unique name for a product
- Using neuroscience to study consumer behavior
- Point Bonding over smokes, creating networks
- The most silent place at campus
10 Clues: Home of lectures and naps • Celebration center for events • Low price to gain market share • The most silent place at campus • Strategy to make a product unique • Studying on online consumer behavior • Creating a unique name for a product • Point Bonding over smokes, creating networks • Using neuroscience to study consumer behavior • ...
Doughnut Economics 2025-04-08
Across
- Ecological ____ that we must stay under
- Social needs are not met
- Essential shelter in a just economy
- Life variety within ecological ceiling
- Sign of overshoot; chemical or air
- ____ layer that protects Earth from UV radiation
Down
- Exceeded planetary boundaries
- Social or ecological connections
- Builds knowledge; inner ring of doughnut
- Inner ring of Doughnut economics: Social ______
10 Clues: Social needs are not met • Exceeded planetary boundaries • Social or ecological connections • Sign of overshoot; chemical or air • Essential shelter in a just economy • Life variety within ecological ceiling • Ecological ____ that we must stay under • Builds knowledge; inner ring of doughnut • Inner ring of Doughnut economics: Social ______ • ...
cyber 2025-06-16
Across
- - Scrambling data to protect it
- - Moral rules that guide behavior
- - To inform someone about bad behavior online
- - Crime involving computers or networks
- - Acting wisely and safely online
Down
- - Extra step for account security
- - Asking before using others’ work or info
- - Good manners on the internet
- - False information shared online
- - To stop communication from a person or site
10 Clues: - Good manners on the internet • - Scrambling data to protect it • - Extra step for account security • - Moral rules that guide behavior • - False information shared online • - Acting wisely and safely online • - Crime involving computers or networks • - Asking before using others’ work or info • - To inform someone about bad behavior online • ...
Electrical and Electronic Roles 2025-09-23
Across
- – Extreme weather impacting Caribbean power systems.
- – Energy sources like solar, wind, and biomass.
- – Technology for communication networks.
- – Involves circuits, sensors, and embedded systems.
- – Network for distributing electricity.
Down
- – Software embedded in electronic devices.
- – Related to power systems and energy distribution.
- – Device for real-time energy monitoring.
- – Small-scale, localized power network.
- – Keeping systems operational and safe.
10 Clues: – Small-scale, localized power network. • – Keeping systems operational and safe. • – Network for distributing electricity. • – Technology for communication networks. • – Device for real-time energy monitoring. • – Software embedded in electronic devices. • – Energy sources like solar, wind, and biomass. • – Related to power systems and energy distribution. • ...
Ceasers English lesson 3 2025-09-04
Across
- what means a task not complete
- what has the definition of half
- the definition of this word is together
- the road between states
Down
- a writing symbole that has the stem semi
- what means networks that exist between each other
- some amounts are unequal
- to send away
- what word means between
- when two people stand apart
10 Clues: to send away • what word means between • the road between states • some amounts are unequal • when two people stand apart • what means a task not complete • what has the definition of half • the definition of this word is together • a writing symbole that has the stem semi • what means networks that exist between each other
Omics 2025-10-08
Across
- Complete set of metabolites in a system
- Study of RNA transcripts
- Study of metabolites
- Study of cellular lipid networks
- Integrative study of various omics data
Down
- Study of proteins
- Traits that make up a phenotype
- Study of heritable changes not in DNA sequence
- Study of carbohydrates and glycan
- Study of the entire set of genes in an organism
10 Clues: Study of proteins • Study of metabolites • Study of RNA transcripts • Traits that make up a phenotype • Study of cellular lipid networks • Study of carbohydrates and glycan • Complete set of metabolites in a system • Integrative study of various omics data • Study of heritable changes not in DNA sequence • Study of the entire set of genes in an organism
Spelling Words - Week 2 2020-02-02
Across
- the part of your body between your chest and legs
- Doing what you are told to do
- Unclear, confusing or not certain
- Large networks of paths or passages
- A party
- A mode of transportation
- A very drive, eager or motivated person
- the scientific study of the brain and nervous system
- An numeric order
Down
- A place to put your clothes and shoes
- An instrument used to measure weather
- Explaining what a thing looks like
- Better than good
- Using two things together
- A Place to borrow books
- to follow instructions
16 Clues: A party • Better than good • An numeric order • to follow instructions • A Place to borrow books • A mode of transportation • Using two things together • Doing what you are told to do • Unclear, confusing or not certain • Explaining what a thing looks like • Large networks of paths or passages • A place to put your clothes and shoes • An instrument used to measure weather • ...
C4: Revising Business Messages 2021-04-19
Across
- familiar phrases that contain expendable parts
- overused expressions
- shape of text characters
- correcting grammar, spelling, punctuation, format, and mechanics
- empty space on the page
- a line or stroke attached to the end of a letter
- informal words with changed meanings
- white space on the left, right, top, and bottom of a page
- verbs needlessly coverted to wordy noun expressions
- without
Down
- expressions that repeat meaning or include unnecessary words
- process of analyzing whether your message achieves its purpose
- unnecessary introductory words
- improving the content and sentence structure
- short messages exchanged on social media networks
- stale expressions
16 Clues: without • stale expressions • overused expressions • empty space on the page • shape of text characters • unnecessary introductory words • informal words with changed meanings • improving the content and sentence structure • familiar phrases that contain expendable parts • a line or stroke attached to the end of a letter • short messages exchanged on social media networks • ...
Enhanced Vocabulary - Section C 2022-02-10
Across
- Having a world view, worldly
- (of an argument, story, or sentence) extremely complex and difficult to follow
- a minor dispute or disagreement,an unexpected and unfortunate occurrence.
- The world of the computers and the networks that connect them together
- believable
- the process of releasing, and thereby providing relief from, strong or repressed emotions.
- having a meaning that is mysterious or obscure
- An error to be corrected
Down
- The science of freezing
- contemplation
- cowardly, fainthearted
- concealed, hidden
- uncritical satisfaction with oneself or one's achievements
- The blow of mercy
- Guilty
- nerve, gall, extreme self-confidence
16 Clues: Guilty • believable • contemplation • concealed, hidden • The blow of mercy • cowardly, fainthearted • The science of freezing • An error to be corrected • Having a world view, worldly • nerve, gall, extreme self-confidence • having a meaning that is mysterious or obscure • uncritical satisfaction with oneself or one's achievements • ...
Who is DNCR? 2022-03-10
Across
- law enforcement officer that also educates and maintains trails
- creates programs and resources to help people learn
- doctor for animals
- studies and writes about past
- cares for plants and flowers
- tracks spending and maintains financial records
- preserves original materials and records
- maintains computer systems and networks
Down
- studies human history with artifacts and remains
- studies past life through fossils
- studies stars and planets
- restores and preserved art and artifacts
- cares for animals
- visual communicator that creates exhibits and brochures
- cares for aquatic animals
- coordinates overall collection of items or animals
16 Clues: cares for animals • doctor for animals • studies stars and planets • cares for aquatic animals • cares for plants and flowers • studies and writes about past • studies past life through fossils • maintains computer systems and networks • restores and preserved art and artifacts • preserves original materials and records • tracks spending and maintains financial records • ...
Assignment 6 activities 2015-09-21
Across
- text editor for mac
- newest form of html
- both the sender and the receiver are active
- can use 30 seconds of media
- has concise text
- wide area networks
Down
- a web page is composed of html tags and multimedia files
- result in termination of access
- 25% slower than paper
- unauthorized use or attempts of unauthorized use of UT IT resources
- hypertext markup language
- local area network
- high level programming language
- tag used to fin pages that might use one or severalwords
- world wide web
- no more than 5 images from artist
16 Clues: world wide web • has concise text • local area network • wide area networks • text editor for mac • newest form of html • 25% slower than paper • hypertext markup language • can use 30 seconds of media • result in termination of access • high level programming language • no more than 5 images from artist • both the sender and the receiver are active • ...
networking concepts 2025-06-13
Across
- multipoint topology
- in star topology, central controller
- another name of nodes
- that covers security, robust& eliminates traffic factor
- WWW stands for
- a communication pathway that transfers data
- object that increases signal strength
- a device that forwards data packets between computer networks
Down
- in bus topology, device linking all nodes in network
- newest evolution in LAN
- term that refers to structure and format of data
- network providing high speed connectivity
- star topology is used in
- LANs stand for
- can cause software to freeze or quit entirely
- internetworking protocol
16 Clues: WWW stands for • LANs stand for • multipoint topology • another name of nodes • newest evolution in LAN • star topology is used in • internetworking protocol • in star topology, central controller • object that increases signal strength • network providing high speed connectivity • a communication pathway that transfers data • can cause software to freeze or quit entirely • ...
Wireless Networks 2020-12-28
Computer networks 2025-04-19
5 Clues: Includes IP and TCP • Central device in a star topology • Data is broken into this before transmission • Popular protocol for uploading and downloading files • Every device needs this to communicate on the internet
G11 Communication 2025-04-10
Across
- Home’s data traffic cop. 家里的数据交警。
- Spans countries, connects ATMs. 覆盖国家,连接ATM。
- Solo worker, like a laptop. 独立工作者,如笔记本。
- One cable links all, old-school style. 单电缆连所有,老式风格。
- Amazon’s way: servers feed clients. 亚马逊模式:服务器供客户端。
- Network for a small space, like an office. 小范围网络,如办公室用。
Down
- Hub-centered, office favorite. 以集线器为中心,办公室最爱。
- Cable-bound, fast but fixed. 电缆束缚,快但固定。
- Weak device leans on server. 弱设备依赖服务器。
- Google Drive’s shared sky. 谷歌云盘的共享天空。
- Web-like links, internet’s backbone. 网状连接,互联网支柱。
- Equal sharing, no boss server. 平等共享,无主服务器。
- Wi-Fi freedom, interference risk. Wi-Fi自由,干扰风险。
- Firm’s own secure data haven. 公司自有的安全数据港。
- Mixed setup for hotel chains. 酒店连锁的混合结构。
15 Clues: Home’s data traffic cop. 家里的数据交警。 • Google Drive’s shared sky. 谷歌云盘的共享天空。 • Weak device leans on server. 弱设备依赖服务器。 • Cable-bound, fast but fixed. 电缆束缚,快但固定。 • Solo worker, like a laptop. 独立工作者,如笔记本。 • Mixed setup for hotel chains. 酒店连锁的混合结构。 • Firm’s own secure data haven. 公司自有的安全数据港。 • Equal sharing, no boss server. 平等共享,无主服务器。 • ...
AI Unit1 Vocab 2024-10-23
Across
- a supervised learning task that involves predicting a continuous output variable based on input features
- a separate subset of data used to assess the performance of a trained machine learning model
- a subset of AI that enables systems to learn from data and improve their performance over time without being explicitly programmed
- an unsupervised learning technique that groups similar data points together based on their characteristics
- techniques that use statistical algorithms and machine learning to identify the likelihood of future outcomes based on historical data
- a subset of data used to train a machine learning model
- a subset of data used to tune the parameters of a machine learning model and prevent overfitting
- specialized form of machine learning involving neural networks with many layers that can learn complex patterns in large amounts of data
Down
- a modeling error that occurs when a machine learning model learns the training data too well
- the process of analyzing large datasets to discover patterns and extract meaningful information
- the process of assessing how well a machine learning model performs
- the process of selecting, modifying, or creating variables to improve the performance of ML models
- a supervised learning task where the goal is to assign input data into predefined categories
- the simulation of human intelligence processes by machines
- a computational model inspired by the way biological neural networks in the human brain work
15 Clues: a subset of data used to train a machine learning model • the simulation of human intelligence processes by machines • the process of assessing how well a machine learning model performs • a modeling error that occurs when a machine learning model learns the training data too well • ...
NETWORKING CONCEPTS AND CYBER ETHICS 2025-05-17
Across
- an illegal intrusion into a computer system or network
- it is an act of harming or harassing a person through information technology in a deliberate manner
- two or more computers and peripheral devices are connected within a small area
- a computer network that is mainly created for an individual person
- it is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
- it enables you to connect your computers to the available internet connection over the existing telephone lines
- unwanted bulk emails that come from unknown sources
- a device that connects two different types of networks with each other
Down
- a program or a set of programs that disrupts the normal functioning of a computer
- a network device that is used to connect all the computers in a network with each other
- this kind of network connects two or more computers located at distant places
- criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals or their digital devices
- a larger network than Lan and is spread across the city
- being aware of ethical practices and behaving responsibly and appropriately while using the internet
- the act of using or imitating the language and thoughts of another person as one's original work
15 Clues: unwanted bulk emails that come from unknown sources • an illegal intrusion into a computer system or network • a larger network than Lan and is spread across the city • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
ICT Quiz 2026-01-20
Across
- what is virus
- temporary wireless network where devices connect directly to each other without a central router or access point
- disguised as legitimate software, tricking users into installing it to gain unauthorized access to their device to cause damage, steal data, or disrupt system operations by inserting its code and altering how the computer functions
Down
- computer security expert who operates in a middle ground between ethical and malicious
- uses hacking skills legally and with permission to find and fix security vulnerabilities in systems
- an individual who gains unauthorized access to computer systems and networks with malicious intent
- a global computer network providing a variety of information and communication facilities
- self-replicating malware that spreads across networks by exploiting software vulnerabilities, allowing it to spread automatically
8 Clues: what is virus • computer security expert who operates in a middle ground between ethical and malicious • a global computer network providing a variety of information and communication facilities • an individual who gains unauthorized access to computer systems and networks with malicious intent • ...
Computer network - key words 2024-01-08
8 Clues: Wireless network technology • security barrier on a network • Unique identifier for devices • Common wired network technology • set of rules about exchanging data • extensive network covering large areas • device directing data between networks • small network in one geographical location
CPU SCI Terms 2015-09-28
Across
- visits sites on the internet, discovering web pages and building an index to the web’s content based on keywords
- networks that are not geographically close
- detest this when making a good web page ex. Hottest ever
- networks that are geographically close
- Mac users can use this type of text editor when making a web page
- technique used to access unauthorized computers and sends a false IP address and can falsely take advantage of the user's identity
- orders links by relevance to user; relevance is computed by counting the links to a page
- can be increased by high quality graphics, good handwriting, and outbound hypertext links
- use a computer to gain unauthorized access to data in a system
- a group of information on a computer that can be software programs or data
- Window users can use this type of text editor when making a web page
Down
- the information that is on the websites, one of the divisions for large websites
- URL has three main parts: server’s computer name, page’s pathname, and ______
- can be embedded in web pages and displayed by a browser as pictures, mo0vies, and graphics
- up to this percentage of the work but no more than 30 seconds of the music can be used from someone else’s work
- no more than this number of images can be used from one artist or photographer
- translates the hierarchical, human-readable names into the four-number IP address
- hardware that operates the sites, one of the divisions for large websites
18 Clues: networks that are geographically close • networks that are not geographically close • detest this when making a good web page ex. Hottest ever • use a computer to gain unauthorized access to data in a system • Mac users can use this type of text editor when making a web page • Window users can use this type of text editor when making a web page • ...
Olympus CAN Awareness Week 2021-04-19
9 Clues: Core Value • "A" in CAN • Core Value • "C" in CAN • "N" in CAN • True to _____ • Where can you learn more about the CANs? • This CAN champions disability-related activities • understanding that each individual is unique, and recognizing our individual differences
Socil Media 2023-07-25
8 Clues: A self portrait • facebook homepage • use this symbol # • private conversation • A message sent on twitter • examples of this are netflix,youtube,etc • image,video, or piece of text that is humorous. • Post that becomes very popular in social networks
ICT crossword 2019-05-17
Privacy in Social Networks and Messengers 2025-10-12
Across
- People who join and use apps.
- Information stored and shared online.
- Control of personal data online.
- A secret code to access an account.
- Type of networks like Facebook and Instagram.
Down
- A system that connects people or computers.
- Technology that protects messages from third parties.
- Popular messenger app with channels and groups.
- App used to send messages.
- Another word for security online.
- Messenger app focused on privacy.
- Encrypted messenger owned by Meta.
12 Clues: App used to send messages. • People who join and use apps. • Control of personal data online. • Another word for security online. • Messenger app focused on privacy. • Encrypted messenger owned by Meta. • A secret code to access an account. • Information stored and shared online. • A system that connects people or computers. • Type of networks like Facebook and Instagram. • ...
invention 1 2024-04-09
Across
- Adhesive notes with a repositionable backing, facilitating temporary notes and reminders.
- Optical device used to read and decode information encoded in barcodes, streamlining inventory management and retail checkout.
- Integrated circuitry containing the functions of a central processing unit, revolutionizing computing and technology.
- Medical imaging technique producing detailed images of internal body structures using magnetic fields and radio waves.
Down
- Portable storage medium consisting of a thin, flexible magnetic disk enclosed in a square or rectangular plastic shell.
- Transmission medium using thin fibers of glass or plastic to transmit data as light pulses, enabling high-speed communication networks.
- Home entertainment device allowing users to record and playback television programs and movies.
- Electronic communication method allowing users to exchange messages over computer networks, revolutionizing correspondence.
8 Clues: Adhesive notes with a repositionable backing, facilitating temporary notes and reminders. • Home entertainment device allowing users to record and playback television programs and movies. • Integrated circuitry containing the functions of a central processing unit, revolutionizing computing and technology. • ...
Information system security 2025-03-24
Across
- security systems that monitor and control incoming and outgoing network traffic, acting as a barrier between a trusted internal network and external threats, such as hackers or malware.
- malicious software designed to secretly monitor and collect information from a device without the user's consent
- ethical hackers who use their skills to identify and fix security vulnerabilities in systems, often working with organizations to improve security and protect against cyber threats.
- a malicious software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices. This includes viruses.
- networks of compromised devices (often called bots or zombies) that are controlled remotely by cybercriminals to carry out malicious activities
Down
- individuals who illegally hack into systems or networks with malicious intent, such as stealing data, spreading malware, or causing damage. They operate outside the law for personal gain or to cause harm
- the process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized parties can decrypt and read the original information.
- a tactic used by cybercriminals to manipulate people into revealing sensitive information by exploiting trust or emotions, rather than using technical methods.
- a type of cyberattack where attackers impersonate legitimate organizations or individuals to deceive people into revealing sensitive information, such as passwords, credit card numbers, or personal details, usually via email, text messages, or fake websites.
- a cyberattack where multiple compromised computers or devices are used to flood a target server, website, or network with excessive traffic, overwhelming it and causing it to become slow, unresponsive, or crash. The goal is to disrupt access to the targeted service.
10 Clues: malicious software designed to secretly monitor and collect information from a device without the user's consent • a malicious software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices. This includes viruses. • ...
Mobile phone anxiety survey says 'nomophobia' on the rise 2019-03-17
8 Clues: link • controlled behaviour • mobile phones softwares • cannot live without something • fear of missing content on a cellphone • feeiling you experience when very stressed • device that helps you connect to social networks • when you cannot forget about something or someone
Networking crossword puzzle 2021-09-14
Across
- brains in the computer
- hardware that connects devices on a network
- a device or cluster that takes requests
- one of the biggest cpu and component companies
- periferal used to type
- device that guides the route
Down
- periferal used to click
- a computer used by one user only
- science that studies complex networks
- the spine of the computer
10 Clues: brains in the computer • periferal used to type • periferal used to click • the spine of the computer • device that guides the route • a computer used by one user only • science that studies complex networks • a device or cluster that takes requests • hardware that connects devices on a network • one of the biggest cpu and component companies
Be Rooted! Set 4 2022-04-20
Across
- The study of nature
- One without light
- A system of geographical networks/lives
- To go against one's self/beliefs
- A place to view animals confined in water
- Placed at the edge or margin
Down
- The area around a circle
- Inflammation of the brain/spinal cord
- Someone who watches the scene on the side
- A medical hand issue
10 Clues: One without light • The study of nature • A medical hand issue • The area around a circle • Placed at the edge or margin • To go against one's self/beliefs • Inflammation of the brain/spinal cord • A system of geographical networks/lives • Someone who watches the scene on the side • A place to view animals confined in water
computing homework 2024-01-14
Across
- / internet that you plug in
- / connects two or more packet networks together
- / device to link computers together
- / where you live
- / internet to plug in
- / smaller segment of a larger message
Down
- / a place where everything is happening over the internet
- / device to exchange data
- / a set of rules
- / you need this to sign up to most things
10 Clues: / a set of rules • / where you live • / internet to plug in • / device to exchange data • / internet that you plug in • / device to link computers together • / you need this to sign up to most things • / smaller segment of a larger message • / connects two or more packet networks together • / a place where everything is happening over the internet
Sam's internet crossword 2023-03-01
Across
- allows user to stream music and videos
- domain name system
- wall a network security system
- directs traffic around a network
- Local area network
- network of computers or devices
Down
- they store and maintain web content
- Internet service provider
- a family of wired computer networking technologies commonly used in local area networks
- Sent using either a wire or wirelessly
10 Clues: domain name system • Local area network • Internet service provider • network of computers or devices • directs traffic around a network • wall a network security system • they store and maintain web content • allows user to stream music and videos • Sent using either a wire or wirelessly • ...
Social News 2023-04-03
Across
- a person who takes part in something
- virtual communities and networks
- the electronic delivery of moving images and sound from a source to a receiver(TV)
- trustworthy, reliable, reasonable
- read up on and investigate
Down
- newspapers, magazines, television, blogs, emails, social media, and radio
- exchanging information
- impact
- Step-by-step method for problem solving
- origin or root of
10 Clues: impact • origin or root of • exchanging information • read up on and investigate • virtual communities and networks • trustworthy, reliable, reasonable • a person who takes part in something • Step-by-step method for problem solving • newspapers, magazines, television, blogs, emails, social media, and radio • ...
ICT SECTORS 2025-06-22
Across
- Writes code to build software applications.
- Provides assistance to users facing technical issues.
- Creates visual content using digital tools.
- Maintains and repairs computer hardware and software.
- Specializes in creating animated visuals.
- Handles customer inquiries over the phone.
Down
- Designs and maintains websites.
- Installs and manages network systems.
- Develops interactive applications for entertainment.
- Ensures the security of computer networks.
10 Clues: Designs and maintains websites. • Installs and manages network systems. • Specializes in creating animated visuals. • Ensures the security of computer networks. • Handles customer inquiries over the phone. • Writes code to build software applications. • Creates visual content using digital tools. • Develops interactive applications for entertainment. • ...
bytetrails7 2025-02-25
Across
- Storing data over the internet
- Protecting data from unauthorized access
- Software managing hardware and software resources
- Virtual representation of physical hardware
Down
- Device that connects multiple networks
- A column in a table
- Secures data by converting it to a coded form
- Smallest unit of data in computing
- High-level programming language
- Set of vertices connected by edges
10 Clues: A column in a table • Storing data over the internet • High-level programming language • Smallest unit of data in computing • Set of vertices connected by edges • Device that connects multiple networks • Protecting data from unauthorized access • Virtual representation of physical hardware • Secures data by converting it to a coded form • ...
Greek and Latin Roots Week 5 - Position 2023-04-03
Across
- to speak ACROSS more than one language
- hints or clues about an event BEFORE it happens
- means BETWEEN the stars
- a CONNECTION between networks
- the name of a PLACE
- happened PRIOR to an event; coming BEFORE in time
- limitless; without END
Down
- system for converying words over DISTANCE through SOUNDS
- when the value of an object is in the MIDDLE
- BEFORE the war
- means BELOW the SEA
- happens at the END
12 Clues: BEFORE the war • happens at the END • means BELOW the SEA • the name of a PLACE • limitless; without END • means BETWEEN the stars • a CONNECTION between networks • to speak ACROSS more than one language • when the value of an object is in the MIDDLE • hints or clues about an event BEFORE it happens • happened PRIOR to an event; coming BEFORE in time • ...
Civil Engineering 2015-10-16
Across
- Drainage systems
- Building design and stress analysis
- Manage work sites and building structures
- Plan, design, and supervise construction of transportation systems, water systems, and communication networks
Down
- Create plans for buildings and
- They chart land elevation
- Traffic operations
- Water and waste management and treatment
- Soil mechanics and dynamics
9 Clues: Drainage systems • Traffic operations • They chart land elevation • Soil mechanics and dynamics • Create plans for buildings and • Building design and stress analysis • Water and waste management and treatment • Manage work sites and building structures • Plan, design, and supervise construction of transportation systems, water systems, and communication networks
Chloes I.T Crossword 2021-10-29
Across
- the smallest part of an image
- Hardware devices that allows a wi-fi device to connect
- Set of rules that computers communicate by
- another name for web address
- Temporary storage device
Down
- Input device
- Interface where a device is connected
- Routes traffic between networks
- text files retained on computers by browsers
9 Clues: Input device • Temporary storage device • another name for web address • the smallest part of an image • Routes traffic between networks • Interface where a device is connected • Set of rules that computers communicate by • text files retained on computers by browsers • Hardware devices that allows a wi-fi device to connect
Future Jobs 2022-01-15
Across
- discontinue a job here and offer it in another country
- a specialist who’s an authority on something
- can continue for a long time
- a plan
- safety
- outdated and old-fashioned
Down
- someone who takes on gig work
- what we expect to happen in the future
- intelligence advanced computer software
- someone who starts a new company
- work temporary work on a specific project
- protecting systems, networks, and programs from digital attacks
12 Clues: a plan • safety • outdated and old-fashioned • can continue for a long time • someone who takes on gig work • someone who starts a new company • what we expect to happen in the future • intelligence advanced computer software • work temporary work on a specific project • a specialist who’s an authority on something • discontinue a job here and offer it in another country • ...
Mystery Word 2022-04-25
Across
- herb used in Mexican, Chinese and Italian dishes
- California's city of roses
- the mystery word
- one of the days of the week
- a person who works for wages or a salary
- technology used in computer networks
- a rapid spread of disease
Down
- Flying ________, the B-17's nickname
- Shirley ________, actress in Terms of Endearment
- mountains between the Black and Caspian Sea
- parts of a TV show
- to feel great worry over something
12 Clues: the mystery word • parts of a TV show • a rapid spread of disease • California's city of roses • one of the days of the week • to feel great worry over something • Flying ________, the B-17's nickname • technology used in computer networks • a person who works for wages or a salary • mountains between the Black and Caspian Sea • Shirley ________, actress in Terms of Endearment • ...
Chapter 10 Vocab 2014-01-27
Across
- distributing products for amusement
- selling a customer additional related products
- a few firms affect but do not control an industry
- method to communicate publically
- costs equal revenue
- rankings of a tv show or radio show
- short term popular trend
Down
- independent broadcaster that contracts with larger networks
- a retail store with a physical building
- organization that focuses on providing a service
- marketing that focuses on a small target
- time free from work
12 Clues: time free from work • costs equal revenue • short term popular trend • method to communicate publically • distributing products for amusement • rankings of a tv show or radio show • a retail store with a physical building • marketing that focuses on a small target • selling a customer additional related products • organization that focuses on providing a service • ...
Social Networks 2020-09-04
Across
- Aplicación usada para subir fotos y videos (boomerangs y selfies son algunos ejemplos).
- Aplicación donde puedes subir fotos, compartir memes y conocer gente de todo el mundo, creada por Mark Zuckerberg
Down
- Aplicación usada para chatear y comunicarse con amigos y familiars de ícono verde
- Aplicación usada para hacer videos breves que pueden ser recetas, coreografías, challenges, entre otros.
- Aplicación en la cual puedes ver videos musicales, tutoriales, reseñas y también puedes subir tus propios videos y hacerte famoso/a por la cantidad de visitas que recibas.
5 Clues: Aplicación usada para chatear y comunicarse con amigos y familiars de ícono verde • Aplicación usada para subir fotos y videos (boomerangs y selfies son algunos ejemplos). • Aplicación usada para hacer videos breves que pueden ser recetas, coreografías, challenges, entre otros. • ...
Informatic 2023-04-20
Across
- Coffee with the addition of hot boiled and very frothy milk
- Intangible part of the computer
- Necklaces, Rings, Bracelets, etc.
- Street Dress
Down
- They are strapped to their feet
- Tangible components external to the computer
- Studies the hardware, data networks and software
- Tangible part of a computer
- Elegant party attire
9 Clues: Street Dress • Elegant party attire • Tangible part of a computer • They are strapped to their feet • Intangible part of the computer • Necklaces, Rings, Bracelets, etc. • Tangible components external to the computer • Studies the hardware, data networks and software • Coffee with the addition of hot boiled and very frothy milk
Library and the Internet 2022-05-25
9 Clues: a known symbol • a picture online • main menu page of a site • connected to the Internet • a unique name to identify a person • a system of computers that are connected • a username with password that allows access • a way of sending messages over the internet • interconnect networks that exchange information
