networks Crossword Puzzles

peer-to-peer 2023-02-16

peer-to-peer crossword puzzle
Across
  1. control over all peers (lacked)
  2. all peers have same permissions
  3. computer in a p2p network
Down
  1. something p2p networks can lack
  2. advantage of no central server
  3. not needed in a p2p network
  4. difficult to recover on p2p network
  5. can be transferred between peers
  6. saved when managing permissions isn't needed

9 Clues: computer in a p2p networknot needed in a p2p networkadvantage of no central serversomething p2p networks can lackcontrol over all peers (lacked)all peers have same permissionscan be transferred between peersdifficult to recover on p2p networksaved when managing permissions isn't needed

Assignment 6 2016-02-22

Assignment 6 crossword puzzle
Across
  1. transmitting malicious code
  2. Wide Web Information Superhighway
  3. Underlined, color coordinated, and identifiable
  4. Editor editing plan text files
  5. Text Highlighted Key works and subheadings
  6. codes or tags used to create a website
  7. related group of networked computers
Down
  1. Both the sender and receiver are active at the same time
  2. Domain Name System
  3. location area network
  4. main technology for local area networks
  5. The use of IT resources to transmit abusive, threatening, or harassing material
  6. Use legal doctrine that permits limited use of copyrighted material

13 Clues: Domain Name Systemlocation area networktransmitting malicious codeEditor editing plan text filesWide Web Information Superhighwayrelated group of networked computerscodes or tags used to create a websitemain technology for local area networksText Highlighted Key works and subheadingsUnderlined, color coordinated, and identifiable...

CO-PARENTING 2022-03-21

CO-PARENTING crossword puzzle
Across
  1. shared decision-making
  2. support ______community agencies, family or friends)
  3. contributing to support the child financially
  4. flexibility and willingness to work together
  5. maintain somewhat similar rules, boundaries, and schedules across households
  6. frequency of contact with the child
Down
  1. providing encouragement or emotional help
  2. involved in their children’s lives
  3. Identifying parenting styles that participants may have learned from their own ________
  4. joint efforts of adults who share raising children
  5. court approved time spent with children
  6. firmly fixed
  7. official parental separation through the court system

13 Clues: firmly fixedshared decision-makinginvolved in their children’s livesfrequency of contact with the childcourt approved time spent with childrenproviding encouragement or emotional helpflexibility and willingness to work togethercontributing to support the child financiallyjoint efforts of adults who share raising children...

SOCIAL MEDIA MARKETING 2025-11-16

SOCIAL MEDIA MARKETING crossword puzzle
Across
  1. – A moving visual used in posts.
  2. – Type of media used for marketing.
  3. – What social media helps a business become.
  4. – Something a business sells or shows.
  5. – Promoting products on social networks.
  6. – What companies ask people to give.
  7. – The people a business wants to reach.
  8. – What people do with a post they like.
Down
  1. – People who see your posts.
  2. – Name and image of a company.
  3. – A business that uses social media.
  4. – What a business should do to comments.
  5. – A picture used in a good post.

13 Clues: – People who see your posts.– Name and image of a company.– A moving visual used in posts.– A picture used in a good post.– Type of media used for marketing.– A business that uses social media.– What companies ask people to give.– Something a business sells or shows.– The people a business wants to reach.– What people do with a post they like....

Social Networks and Entertainment: YouTube 2023-09-21

Social Networks and Entertainment: YouTube crossword puzzle
Across
  1. What you consume from the web or apps
  2. Spanish word for people
  3. Spanish word for profile
  4. You are one when you use a web page or app
  5. Opposite to men
  6. Represented by this symbol
  7. Spanish word for Visitors
  8. Spanish word for Internet user
  9. 60 minutes make an ____
Down
  1. Opposite to women
  2. web Spanish word for web page
  3. People who subscribe to a channel
  4. A video in Youtube has v_____
  5. A synonym for "Espectadores" in Spanish

14 Clues: Opposite to menOpposite to womenSpanish word for people60 minutes make an ____Spanish word for profileSpanish word for VisitorsRepresented by this symbolA video in Youtube has v_____Spanish word for Internet userweb Spanish word for web pagePeople who subscribe to a channelWhat you consume from the web or apps...

Networks and the Internet Vocabulary 2024-12-09

Networks and the Internet Vocabulary crossword puzzle
Across
  1. Device a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
  2. the system responsible for translating domain names like example.com into IP addresses
  3. System a group of computing devices and programs working together for a common purpose
  4. the protocol used for transmitting web pages over the Internet
  5. a system of linked pages, programs, and files
  6. A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all
Down
  1. Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.
  2. The inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any two connected devices in a network
  3. the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
  4. An agreed-upon set of rules that specify the behavior of some system
  5. differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
  6. a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
  7. A type of computer that forwards data across a network
  8. Network a group of interconnected computing devices capable of sending or receiving data.
  9. Address The unique number assigned to each device on the Internet
  10. the series of connections between computing devices on a network starting with a sender and ending with a receiver

16 Clues: a system of linked pages, programs, and filesA type of computer that forwards data across a networkthe protocol used for transmitting web pages over the InternetAddress The unique number assigned to each device on the InternetAn agreed-upon set of rules that specify the behavior of some system...

On Screen C2 Module 4a and 4b 2024-12-02

On Screen C2 Module 4a and 4b crossword puzzle
Across
  1. Deserving praise
  2. Informal networks through which information spreads
  3. A dangerous, difficult, or otherwise unfortunate situation
  4. To brag or speak with excessive pride
  5. Certain to happen; unavoidable
  6. Not visited by many people; isolated
  7. In its original, unspoiled condition
  8. Insufficiently strict
Down
  1. A valuable substance obtained from elephant tusks
  2. To envy or resent someone
  3. To make an issue worse
  4. ...cure (An unproven or implausible solution)
  5. Perceptible by touch or measurable
  6. Extremely unpleasant or annoying
  7. To negotiate the price of something
  8. off the...path (Not frequently traveled or visited)
  9. get off one's... (Stop preaching or speaking dogmatically)
  10. Emit forcefully and abundantly
  11. take the ... (Decide to commit fully to something challenging)

19 Clues: Deserving praiseInsufficiently strictTo make an issue worseTo envy or resent someoneCertain to happen; unavoidableEmit forcefully and abundantlyExtremely unpleasant or annoyingPerceptible by touch or measurableTo negotiate the price of somethingNot visited by many people; isolatedIn its original, unspoiled condition...

Objective 4e: Maritime Empires Established 2024-11-15

Objective 4e: Maritime Empires Established crossword puzzle
Across
  1. A Japanese state that implemented isolationist policies to minimize foreign influence during the period 1450-1750.
  2. A key trade port in Ming China where foreign trade was restricted under the dynasty’s isolationist policies.
  3. Competition among European states that drove the establishment of maritime empires and control over trade routes.
  4. A Central African state whose involvement in global trade increased its regional influence.
Down
  1. Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence.
  2. A West African state that gained political and economic power through participation in maritime trade networks.
  3. Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks.
  4. A Chinese dynasty that adopted restrictive trade policies to limit the influence of European trade and culture.

8 Clues: A Central African state whose involvement in global trade increased its regional influence.Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence.Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks....

technology 2015-03-26

technology crossword puzzle
Across
  1. a babies and parents connections
  2. questionnary
  3. small remote controlled plane
  4. a mobile post for going on the internet
  5. a new technology for teens person
Down
  1. for alduts it's a transportation
  2. connected computers
  3. friend of new a generation of humans

8 Clues: questionnaryconnected computerssmall remote controlled planefor alduts it's a transportationa babies and parents connectionsa new technology for teens personfriend of new a generation of humansa mobile post for going on the internet

internet and network 2023-04-04

internet and network crossword puzzle
Across
  1. The first network for military
  2. Communication at a distance
Down
  1. Modulate/demodulate analog to digital signal
  2. First satellite launched by URRS
  3. Wide Area Network
  4. The channel that helps the transmission of data packets
  5. Network of networks
  6. Local area Network

8 Clues: Wide Area NetworkLocal area NetworkNetwork of networksCommunication at a distanceThe first network for militaryFirst satellite launched by URRSModulate/demodulate analog to digital signalThe channel that helps the transmission of data packets

internet vocab crossword 2013-03-26

internet vocab crossword crossword puzzle
Across
  1. A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
  2. NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)\
  3. A bully who operates online, in cyberspace; To bully onlin
  4. software used to view various kinds of Internet resources found on the Web
  5. the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing
  6. An unauthorized person who secretly gains access to computer files.
Down
  1. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
  2. OPERATORS – Using keywords such as AND, OR, NOT in web searches to narrow search results.
  3. USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
  4. To renew or revitalize; To reload a webpage on the internet
  5. Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.

11 Clues: A bully who operates online, in cyberspace; To bully onlinTo renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer files.software used to view various kinds of Internet resources found on the WebOPERATORS – Using keywords such as AND, OR, NOT in web searches to narrow search results....

INTERNET VOCABULARY 2024-02-14

INTERNET VOCABULARY crossword puzzle
Across
  1. An attempt to trick individuals into providing sensitive information, such as usernames, passwords, or credit card details, by posing as a trustworthy entity.
  2. A secret combination of characters used for user authentication and access to secured information.
  3. Measures taken to protect systems, networks, and data from unauthorized access, attacks, or damage.
  4. The process of copying data or files from a remote server or website to a user's device.
  5. A notification or warning about a potential threat, danger, or important event that requires immediate attention.
Down
  1. The right of individuals to keep their personal information and activities confidential and protected from unauthorized disclosure.
  2. A malicious software that can replicate itself and spread to other computers.
  3. Unauthorized access to computer systems or networks with the intention of gathering, altering, or destroying data.
  4. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. A fraudulent scheme performed by a deceitful individual, group, or company to gain money or something else of value.
  6. Software that secretly gathers information about a user's activities without their knowledge and sends it to a third party.

11 Clues: A malicious software that can replicate itself and spread to other computers.The process of copying data or files from a remote server or website to a user's device.A secret combination of characters used for user authentication and access to secured information....

Network Devices and Equipment 2023-04-28

Network Devices and Equipment crossword puzzle
Across
  1. He give us internet
  2. You havet in your home
  3. You have it on your home and play games
  4. He's trying to log into your account
  5. They should be used to interconnect local or
  6. networks
  7. Hes hosting
Down
  1. This is a networking device used to connect
  2. network hosts as well as to do data
  3. It's like the Network Hub
  4. Its a Cable for internet
  5. A router, which is a protocol-dependent device

12 Clues: networksHes hostingHe give us internetYou havet in your homeIts a Cable for internetIt's like the Network Hubnetwork hosts as well as to do dataHe's trying to log into your accountYou have it on your home and play gamesThis is a networking device used to connectThey should be used to interconnect local or...

Internet and the World Wide Web 2023-07-24

Internet and the World Wide Web crossword puzzle
Across
  1. connects hosts together
  2. method by which websites are accessed
  3. a worldwide collection of computer networks
  4. the internet is known as...
  5. 32-bit number or 128-bit number
  6. shortened electronic mail
Down
  1. the storage of data online
  2. a sender or receiver computer
  3. protocolis used to send messages
  4. protocol that identifies different computers connected to the internet
  5. sophisticated devices which data can travel from one host to another
  6. a collection of linked webpages

12 Clues: connects hosts togethershortened electronic mailthe storage of data onlinethe internet is known as...a sender or receiver computera collection of linked webpages32-bit number or 128-bit numberprotocolis used to send messagesmethod by which websites are accesseda worldwide collection of computer networks...

COMPUTER SCIENCE KEY WORDS 2025-10-09

COMPUTER SCIENCE KEY WORDS crossword puzzle
Across
  1. a network built of networks
  2. portable computer
  3. facility allowing portable devices to connect to the internet
  4. a software application for looking at websites
  5. a service on the internet
  6. fake Wi-Fi network used to steal data
Down
  1. the way data is transferred through devices
  2. devices connected for communication
  3. a set of rules on how to communicate
  4. a website that will show links
  5. a remote computer that has a website
  6. a cyber crime

12 Clues: a cyber crimeportable computera service on the interneta network built of networksa website that will show linksdevices connected for communicationa set of rules on how to communicatea remote computer that has a websitefake Wi-Fi network used to steal datathe way data is transferred through devicesa software application for looking at websites...

Y6_Term2 2025-11-24

Y6_Term2 crossword puzzle
Across
  1. two or more computers connected to share resources
  2. example of primary storage
  3. the number of bits in a byte
  4. raw or unorganized facts
  5. it turns data into information
  6. network that connects computers worldwide
  7. technology for wired networks
Down
  1. unit between Kilobyte and Gigabyte
  2. example of a web browser
  3. an example of a search engine
  4. the device that connects computers in a local network
  5. text we use to search online

12 Clues: example of a web browserraw or unorganized factsexample of primary storagethe number of bits in a bytetext we use to search onlinean example of a search enginetechnology for wired networksit turns data into informationunit between Kilobyte and Gigabytenetwork that connects computers worldwidetwo or more computers connected to share resources...

graph neural networks 2022-11-02

graph neural networks crossword puzzle
Across
  1. algebraic representation of graph
  2. vertex in network
  3. method of representing objects in common space
  4. measure of closeness of each 2 nodes in embedding space
Down
  1. operation of connecting embeddings of surrounding nodes
  2. type of graph in which edges indicate a two-way relationship
  3. operation of transfering information from neighboring nodes

7 Clues: vertex in networkalgebraic representation of graphmethod of representing objects in common spaceoperation of connecting embeddings of surrounding nodesmeasure of closeness of each 2 nodes in embedding spaceoperation of transfering information from neighboring nodestype of graph in which edges indicate a two-way relationship

Different Type of Networks 2018-10-15

Different Type of Networks crossword puzzle
Across
  1. could be mistaken with a star
  2. are used to play games together
  3. the abbreviation for a small group of connected computers
  4. the abbreviation for a large group of connected computers
  5. multiple computers connect to this with Ethernet cables
  6. ____________ collision is when computers send _____________ at the same time, causing them to collide
Down
  1. they are 9 meters long in Britain
  2. _____________ cable used to connect a computer to a switch on a wired network
  3. a piece of jewelry
  4. you can find them throughout the galaxy

10 Clues: a piece of jewelrycould be mistaken with a starare used to play games togetherthey are 9 meters long in Britainyou can find them throughout the galaxymultiple computers connect to this with Ethernet cablesthe abbreviation for a small group of connected computersthe abbreviation for a large group of connected computers...

Computer Networks Set 5 2019-02-22

Computer Networks Set 5 crossword puzzle
Across
  1. Transport layer is which layer in OSI model
  2. Congestion control can control traffic entry into a telecommunications network, so to avoid
  3. Security based connection is provided by which layer
  4. What are the functions of the transport layer
  5. Buffer overrun can be reduced by using what
Down
  1. FCP stands for
  2. Which services are provided by transport layer
  3. TCP and UDP are called ________
  4. Transport layer can identify the symptoms of overload nodes using _________
  5. _________ do not provide end to end communication.

10 Clues: FCP stands forTCP and UDP are called ________Transport layer is which layer in OSI modelBuffer overrun can be reduced by using whatWhat are the functions of the transport layerWhich services are provided by transport layer_________ do not provide end to end communication.Security based connection is provided by which layer...

Network Topology 2025-06-11

Network Topology crossword puzzle
Across
  1. Intelligent device that connects network segments
  2. Large-scale network like the Internet
  3. Used to connect networking devices physically
  4. A network layout shaped in a circle
  5. Shared communication line topology
Down
  1. Topology with centralized connection
  2. Connects multiple computers, less intelligent than a switch
  3. Small local network
  4. Device that routes data across networks

9 Clues: Small local networkShared communication line topologyA network layout shaped in a circleTopology with centralized connectionLarge-scale network like the InternetDevice that routes data across networksUsed to connect networking devices physicallyIntelligent device that connects network segments...

Companies Taglines 2020-06-11

Companies Taglines crossword puzzle
Across
  1. "Helps you connect and share with the people in your life"
  2. "There Is No Finish Line" or "Just Do It."
  3. "Hello. Moto"
  4. "Ideas for Life"
  5. "Better Sound Through Research"
  6. "It's finger lickin' good"
  7. "Connecting People"
  8. "I'm Lovin' It"
Down
  1. "The Future of Memory"
  2. "High Performance Delivered"
  3. "Your Potential. Our Passion" or "Where do you want to go today"
  4. "Sense and Simplicity"
  5. "We Make IT Happen"
  6. "… and You’re Done"
  7. "Networks Business Without Boundaries"
  8. "Powered by Intellect Driven by Values"
  9. "Empowering the Internet generation" or "This is the Power of the Network. Now."
  10. "Think Different." or "The power to be your best"
  11. "A Diamond Is Forever"

19 Clues: "Hello. Moto""I'm Lovin' It""Ideas for Life""We Make IT Happen""… and You’re Done""Connecting People""The Future of Memory""Sense and Simplicity""A Diamond Is Forever""It's finger lickin' good""High Performance Delivered""Better Sound Through Research""Networks Business Without Boundaries""Powered by Intellect Driven by Values"...

Basic Concepts in ICT 2023-02-19

Basic Concepts in ICT crossword puzzle
Across
  1. a technology corporation
  2. a popular social networking site
  3. Information and Communication Technology Literacy
  4. an editable website
  5. inquiry-oriented lesson format
  6. a group of several proprietary graphical operating system
  7. an online journal
  8. combination of face-to-face and online classes
  9. a technology company
Down
  1. a video or audio multi-media clip
  2. massive network of networks
  3. a video blog
  4. sequential or simultaneous use of a variety of media formats
  5. a mobile operating system
  6. program control instructions and accompanying documentation
  7. a proprietary videotelephony software program
  8. mix of process and product used in the application of knowledge
  9. also called the Web
  10. a mobile operating system
  11. utilizes a reverse instructional delivery

20 Clues: a video blogan online journalan editable websitealso called the Weba technology companya technology corporationa mobile operating systema mobile operating systemmassive network of networksinquiry-oriented lesson formata popular social networking sitea video or audio multi-media cliputilizes a reverse instructional delivery...

Hatton & Williamson: World Migrations 2013-09-13

Hatton & Williamson: World Migrations crossword puzzle
Across
  1. Decrease the Cost of the Settlement Process
  2. First European Origin
  3. Major Explanation for Migrations
Down
  1. Explains Why Africans Emigrate Less
  2. A Push Factor
  3. Destination in Asia
  4. The Most Popular Destination

7 Clues: A Push FactorDestination in AsiaFirst European OriginThe Most Popular DestinationMajor Explanation for MigrationsExplains Why Africans Emigrate LessDecrease the Cost of the Settlement Process

Internet and Network 2023-04-04

Internet and Network crossword puzzle
Across
  1. Local Area Network
  2. The first network created by military
  3. Communication at a distance
Down
  1. Network of networks
  2. Modulate/demodulate analog to digital
  3. First satellite launched by USSR
  4. Wide Area Network

7 Clues: Wide Area NetworkLocal Area NetworkNetwork of networksCommunication at a distanceFirst satellite launched by USSRModulate/demodulate analog to digitalThe first network created by military

Digital 2021-04-20

Digital crossword puzzle
Across
  1. forest
  2. twin
Down
  1. drone
  2. computing
  3. networks

5 Clues: twindroneforestnetworkscomputing

Vocabulary 1 2019-11-12

Vocabulary 1 crossword puzzle
Across
  1. Xarxes
  2. aixo
  3. Assignatura
Down
  1. Xatejar
  2. Anglès

5 Clues: aixoXarxesAnglèsXatejarAssignatura

Network Basics Crossword Puzzle 2013-03-04

Network Basics Crossword Puzzle crossword puzzle
Across
  1. hard or software that accesses a service
  2. rate of transfer; available or consumed
  3. connects office, school, etc
  4. web, proxy, FTP, online games are types
  5. links network segments or devices
  6. has twisted pair and fiber optic links
  7. a participant
Down
  1. eg. cable or DSL modem
  2. Backbone data routes; interconnected networks and core routers
  3. barrier to prevent unauthorized communication
  4. category 5 patch cable
  5. Network connects network; provides paths for info exchange between LANs
  6. wifi access point
  7. transfers data between components inside a computer
  8. connects businesses, over a large area
  9. uses radio waves over computer network
  10. data structure in computer science

17 Clues: a participantwifi access pointeg. cable or DSL modemcategory 5 patch cableconnects office, school, etclinks network segments or devicesdata structure in computer scienceconnects businesses, over a large areauses radio waves over computer networkhas twisted pair and fiber optic linksrate of transfer; available or consumed...

Viruses - Teddy Miller 2018-11-16

Viruses - Teddy Miller crossword puzzle
Across
  1. what a virus effects
  2. A piece of unwanted software
  3. software that uses networks and security holes to replicate itself
  4. the first email virus
  5. full name of PCs
  6. the controlling software for your computer
  7. a virus that floods the network
  8. protection for your accounts
  9. least likely operating system to get a virus on
  10. what early viruses affected
Down
  1. when a virus is hidden in something else
  2. protection for your computer
  3. a virus that affect the startup directions
  4. something that a virus cannot harm
  5. the original reason for viruses being created
  6. the original disk for viruses
  7. a virus that is imbedded in an email

17 Clues: full name of PCswhat a virus effectsthe first email viruswhat early viruses affectedprotection for your computerA piece of unwanted softwareprotection for your accountsthe original disk for virusesa virus that floods the networksomething that a virus cannot harma virus that is imbedded in an emailwhen a virus is hidden in something else...

Internet and Network 2023-04-04

Internet and Network crossword puzzle
Across
  1. Communication at a distance
  2. Modulate/demodulate analog to digital signal
  3. First network created by military
  4. Wide Area Network
Down
  1. Network of networks
  2. Local Area Network
  3. First satellite launched by USSR

7 Clues: Wide Area NetworkLocal Area NetworkNetwork of networksCommunication at a distanceFirst satellite launched by USSRFirst network created by militaryModulate/demodulate analog to digital signal

Acronym Challenges 2024-03-25

Acronym Challenges crossword puzzle
Across
  1. Not a doctor
  2. Helps with prescription issues
  3. Who keeps a large geographical area running smoothly
  4. One of many ways to look up a patient
  5. You use these when there is poor visibility
  6. This requires a medical justification
  7. Without them Nothing would get done
Down
  1. No follow up is needed
  2. Provides help to more than one person
  3. This keeps systems, networks and procedures secure
  4. A big magnet
  5. We use this so patients aren't surprised
  6. Opposite of "Public Records"

13 Clues: Not a doctorA big magnetNo follow up is neededOpposite of "Public Records"Helps with prescription issuesWithout them Nothing would get doneProvides help to more than one personOne of many ways to look up a patientThis requires a medical justificationWe use this so patients aren't surprisedYou use these when there is poor visibility...

circulatory system 2021-09-01

circulatory system crossword puzzle
Across
  1. a chamber in the heart
  2. carries blood away from the heart
  3. begins at left ventricle of the heart
  4. without oxygen
  5. a muscle used to pump blood around the body
  6. forms a networks throughout body tissues
  7. a protein found in red blood cells
Down
  1. prevents backward flow of blood
  2. the name of a system that pumps blood
  3. with oxygen
  4. a liquid that circulates the human body
  5. creates output to maintain blood flow to other organ systems
  6. carries blood back to the heart

13 Clues: with oxygenwithout oxygena chamber in the heartprevents backward flow of bloodcarries blood back to the heartcarries blood away from the hearta protein found in red blood cellsthe name of a system that pumps bloodbegins at left ventricle of the hearta liquid that circulates the human bodyforms a networks throughout body tissues...

CO-PARENTING 2022-03-21

CO-PARENTING crossword puzzle
Across
  1. shared decision-making
  2. support ______community agencies, family or friends)
  3. contributing to support the child financially
  4. flexibility and willingness to work together
  5. maintain somewhat similar rules, boundaries, and schedules across households
  6. frequency of contact with the child
Down
  1. providing encouragement or emotional help
  2. involved in their children’s lives
  3. Identifying parenting styles that participants may have learned from their own ________
  4. joint efforts of adults who share raising children
  5. court approved time spent with children
  6. firmly fixed
  7. official parental separation through the court system

13 Clues: firmly fixedshared decision-makinginvolved in their children’s livesfrequency of contact with the childcourt approved time spent with childrenproviding encouragement or emotional helpflexibility and willingness to work togethercontributing to support the child financiallyjoint efforts of adults who share raising children...

Chapter 2 Lessons 3 and 4 2022-10-24

Chapter 2 Lessons 3 and 4 crossword puzzle
Across
  1. main foods
  2. network, networks formed so goods could get to faraway places
  3. large round earthen houses
  4. cone shaped tent
  5. sun dried bricks made of clay and straw
  6. a group of leaders who meet to make decisions
Down
  1. extra amounts
  2. celebration to honor a religious or cultural event
  3. a device used to carry goods
  4. in short supply
  5. change or adjust
  6. shelters built by covering a wooden frame with mud or adobe
  7. a layer of soil held together by the roots of grasses

13 Clues: main foodsextra amountsin short supplychange or adjustcone shaped tentlarge round earthen housesa device used to carry goodssun dried bricks made of clay and strawa group of leaders who meet to make decisionscelebration to honor a religious or cultural eventa layer of soil held together by the roots of grasses...

DS breakfast quiz 2025-10-08

DS breakfast quiz crossword puzzle
Across
  1. when you're magnus carlson in training but blunder every move in test
  2. OpenAI's claim to fame
  3. One of the V's describing challenges of "Big Data"
  4. not optimus prime but just as powerful
  5. GPT3/4,Claude...
  6. Neural network self-improvement through error-analysis and
Down
  1. Thanos for the world of neural networks
  2. stands out from the rest
  3. AI masks truth with digital-illusion
  4. All you need
  5. Sometimes it fades, sometimes it explodes
  6. camel-like language model
  7. Unites gamers and data scientists

13 Clues: All you needGPT3/4,Claude...OpenAI's claim to famestands out from the restcamel-like language modelUnites gamers and data scientistsAI masks truth with digital-illusionnot optimus prime but just as powerfulThanos for the world of neural networksSometimes it fades, sometimes it explodesOne of the V's describing challenges of "Big Data"...

Information technology 2021-02-06

Information technology crossword puzzle
Across
  1. the time during which a machine, especially a computer, is not working or is not able to be used
  2. happening without any sudden changes, interruption, or difficulty
  3. old-fashioned and therefore not as good or as fashionable as something modern
  4. the period of time when a computer, system, etc. is being used without any problems
  5. a piece of electronic equipment that connects computer networks to each other, and sends information between networks
  6. a central computer from which other computers get information
  7. working or operating quickly and effectively in an organized way
  8. an advertisement that is shown in a new window in front of the window that you are looking at on a website
  9. a part of a computer to which extra devices such as printers, scanners, and digital cameras can be connected easily:
  10. a set of letters and symbols in a particular design and size
Down
  1. a computer program, used especially in business, that allows you to do financial calculations and plans
  2. a set of wires, covered by plastic, that carries electricity, phone signals, etc.
  3. a copy of information held on a computer that is stored separately from the computer
  4. a measurement of the amount of information that can be sent between computers, through a phone line, etc.
  5. a set of programs that control the way a computer system works, especially how its memory is used and how different programs work together
  6. to be much better than other similar things or people

16 Clues: to be much better than other similar things or peoplea set of letters and symbols in a particular design and sizea central computer from which other computers get informationworking or operating quickly and effectively in an organized wayhappening without any sudden changes, interruption, or difficulty...

Raelyn`s Internet Crossword Puzzle 2013-03-26

Raelyn`s Internet Crossword Puzzle crossword puzzle
Across
  1. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  2. ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
  3. A bully who operates online, in cyberspace; To bully online
  4. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
  5. To renew or revitalize; To reload a webpage on the internet
  6. A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
Down
  1. a piece of writing that has been copied from someone else and is presented as being your own work
  2. NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  3. – An unauthorized person who secretly gains access to computer files.
  4. Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
  5. RESOURCE LOCATOR (URL) Full website address.
  6. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).\

12 Clues: RESOURCE LOCATOR (URL) Full website address.A bully who operates online, in cyberspace; To bully onlineTo renew or revitalize; To reload a webpage on the internet– An unauthorized person who secretly gains access to computer files.a piece of writing that has been copied from someone else and is presented as being your own work...

Codys internet crossword puzzle 2013-12-02

Codys internet crossword puzzle crossword puzzle
Across
  1. Software used to view various kinds of Internet resources found on the W
  2. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  3. Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
  4. NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  5. A bully who operates online, in cyberspace; To bully online
  6. An unauthorized person who secretly gains access to computer files.
Down
  1. a list of citations that appear at the end of a paper, article, chapter or book.
  2. Engine Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
  3. To renew or revitalize; To reload a webpage on the internet
  4. The unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
  5. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  6. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.

12 Clues: To renew or revitalize; To reload a webpage on the internetA bully who operates online, in cyberspace; To bully onlineAn unauthorized person who secretly gains access to computer files.Software used to view various kinds of Internet resources found on the Wa list of citations that appear at the end of a paper, article, chapter or book....

Talahiva 2015-04-30

Talahiva crossword puzzle
Across
  1. a list of citations that appear at the end of a paper, article, chapter or book
  2. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
  3. a piece of writing that has been copied from someone else and is presented as being your own work
  4. online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  5. Using keywords such as AND, OR, NOT in web searches to narrow search results.
Down
  1. Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
  2. the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing
  3. LOCATOR (URL) – Full website address.
  4. An unauthorized person who secretly gains access to computer files.
  5. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  6. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
  7. To renew or revitalize; To reload a webpage on the internet

12 Clues: LOCATOR (URL) – Full website address.To renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer files.Using keywords such as AND, OR, NOT in web searches to narrow search results.a list of citations that appear at the end of a paper, article, chapter or book...

Cybersecurity Fundamental Chapter 1 2023-10-03

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. who rally and protest against different political and social ideas.
  2. unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. collection of technologies that enable the connection of various devices to the Internet.
  4. break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
  5. Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
  6. great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
  1. who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  2. mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  3. Their targets are foreign governments, terrorist groups, and corporations.
  4. hackers who are either self-employed or working for large cybercrime organizations.
  5. may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. result of data sets that are large and complex, making traditional data processing applications inadequate.

12 Clues: who rally and protest against different political and social ideas.Their targets are foreign governments, terrorist groups, and corporations.hackers who are either self-employed or working for large cybercrime organizations.collection of technologies that enable the connection of various devices to the Internet....

Networking concepts and cyber ethics 2025-05-28

Networking concepts and cyber ethics crossword puzzle
Across
  1. name the type of network that is mainly created for an individual person
  2. it works similar to hub
  3. it refers to a computer network restricted to an organisation
  4. it refers to a computer network that allows controlled access to an information source available on the internet
  5. the computers that communicate with each other are called
  6. refers to criminal activities that involve the use of computers, networks and the internet connections with the intent to cause harm to individuals are there digital devices
  7. it refers to the act of using or imitating the language and thoughts of another person as one's original work
Down
  1. it refers to an illegal intrusion into a computer system or network
  2. a network maintained without using wires is called a ____ network
  3. name the network device that is used to connect all the computers in a network with each other
  4. name the type of network which is larger network than LAN and its spread across a city
  5. it is a device that connects two different types of networks with each other
  6. name the type of network that connects two or more computers located at distant places
  7. they are technical people who are experts in Breaking into systems to steal important data such as financial details, passwords, etc
  8. it enables you to connect your computer to the available internet connection over the existing telephone lines
  9. it refers to unwanted bulk emails that come from unknown sources

16 Clues: it works similar to hubthe computers that communicate with each other are calledit refers to a computer network restricted to an organisationit refers to unwanted bulk emails that come from unknown sourcesa network maintained without using wires is called a ____ networkit refers to an illegal intrusion into a computer system or network...

Internet of Things 2025-08-05

Internet  of Things crossword puzzle
Across
  1. A method of wireless communication used for short-range, low-power exchanges between devices in IoT.
  2. A method of addressing that supports large-scale IoT devices and networks.
  3. A type of network specifically designed for small, low-power devices, typically deployed over large areas.
  4. A widely-used type of IoT device that can sense and respond to environmental changes like light, temperature, or pressure.
  5. A protocol used for communication in the application layer of IoT systems, known for its extensibility and flexibility
  6. A key component of IoT that enables physical actions based on data received from sensors.
  7. The protocol used for transferring data in IoT with a resource-constrained environment, typically used in machine-to-machine communications.
  8. A type of network that uses small, low-power devices to monitor physical conditions.
Down
  1. A communication protocol used for lightweight messaging in IoT.
  2. Layer The layer that handles the exchange of information between devices over the internet in IoT.
  3. A communication protocol that allows for the exchange of data in IoT systems, often used in home automation.
  4. The concept that allows IoT devices to interact autonomously, without direct human input.
  5. he algorithm that helps optimize the energy efficiency of wireless sensor networks.
  6. The technology that allows devices to be "smart" by collecting and exchanging data automatically.
  7. Layer The first layer in the IoT architecture responsible for gathering data from physical world sensors and devices.
  8. Devices that detect physical stimuli and convert them into electrical signals for IoT systems.

16 Clues: A communication protocol used for lightweight messaging in IoT.A method of addressing that supports large-scale IoT devices and networks.he algorithm that helps optimize the energy efficiency of wireless sensor networks.A type of network that uses small, low-power devices to monitor physical conditions....

Assignment 6 2016-02-22

Assignment 6 crossword puzzle
Across
  1. Text Highlighted Key works and subheadings
  2. codes or tags used to create a website
  3. related group of networked computers
  4. The use of IT resources to transmit abusive, threatening, or harassing material
  5. Editor editing plan text files
  6. Underlined, color coordinated, and identifiable
Down
  1. transmitting malicious code
  2. Both the sender and receiver are active at the same time
  3. Wide Web Information Superhighway
  4. main technology for local area networks
  5. Use legal doctrine that permits limited use of copyrighted material
  6. location area network
  7. Domain Name System

13 Clues: Domain Name Systemlocation area networktransmitting malicious codeEditor editing plan text filesWide Web Information Superhighwayrelated group of networked computerscodes or tags used to create a websitemain technology for local area networksText Highlighted Key works and subheadingsUnderlined, color coordinated, and identifiable...

Machine learning Fundamentals 2025-05-11

Machine learning Fundamentals crossword puzzle
Across
  1. Simplest ML algorithm, finds closest points.
  2. Process of adjusting weights in neural networks.
  3. Training with labeled data.
  4. Model that separates data using a hyperplane (abbr.).
  5. A model's error on unseen data.
  6. Data feature used for training a model.
Down
  1. Training with unlabeled data.
  2. Mathematical function that reduces error.
  3. Neuron-inspired algorithm for deep learning.
  4. Performance metric: True Positives / (True Positives + False Positives).
  5. Model that uses a tree structure for decisions.
  6. Evaluation metric: (Precision + Recall)/2.
  7. Technique to reduce model variance using multiple learners.

13 Clues: Training with labeled data.Training with unlabeled data.A model's error on unseen data.Data feature used for training a model.Mathematical function that reduces error.Evaluation metric: (Precision + Recall)/2.Simplest ML algorithm, finds closest points.Neuron-inspired algorithm for deep learning.Model that uses a tree structure for decisions....

Create KIM Chart for the following vocabulary words 2025-04-02

Create KIM Chart for the following vocabulary words crossword puzzle
Across
  1. Central Processing Unit
  2. a hand-held pointing device that allows users to control the cursor on a computer screen, enabling them to select items, navigate, and interact with the graphical user interface
  3. a data storage device that uses integrated circuits to store data persistently
  4. a type of non-volatile memory that stores data permanently, meaning the data remains even when power is off, and can only be read, not modified or erased
  5. a person who speaks
  6. a type of non-volatile computer memory storage medium that can be electrically erased and reprogrammed, retaining data even when power is off
  7. external hardware components that connect to a computer to extend its functionality
  8. a computer and networking device that forwards data packets between computer networks
Down
  1. a specialized processor originally designed to accelerate graphics rendering.
  2. an input device that allows you to type letters, numbers, and symbols into your computer or other electronic device
  3. the main printed circuit board within a computer
  4. an output device that displays visual information generated by a computer, like text, images, and videos
  5. a device that converts digital signals from a computer into analog signals for transmission over telephone lines or cable networks, and vice versa, enabling internet access and communication
  6. a computer's short-term memory, where the data the CPU (Central Processing Unit) needs to access quickly is stored, allowing for faster processing and multitasking
  7. main printed circuit board within a computer
  8. allows devices to communicate with each other without cables or wire

16 Clues: a person who speaksCentral Processing Unitmain printed circuit board within a computerthe main printed circuit board within a computerallows devices to communicate with each other without cables or wirea specialized processor originally designed to accelerate graphics rendering....

DATA TRANSMISSION 2022-07-13

DATA TRANSMISSION crossword puzzle
Across
  1. a device that enables data packets to be moved between different networks.
  2. a verification method used to check if data transferred has been altered or corrupted.
  3. data that arrives at the destination with the bits no longer synchronised.
  4. data that can be sent one direction only.
  5. the actual data being carried in a data packet.
  6. a horizontal and vertical parity check on a block of data being transmitted.
Down
  1. stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
  2. an error checking method in which all the 1-bits the data packet payload are added and the total is stored in the packet trailer; the same calculation is repeated at the receiving station.
  3. the part of a data packet that indicates the end of the data packets and cylic redundancy check.
  4. a type of serial data transmission which has become the industry standard for connecting computers via a USB port.
  5. a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.

11 Clues: data that can be sent one direction only.the actual data being carried in a data packet.a device that enables data packets to be moved between different networks.data that arrives at the destination with the bits no longer synchronised.a horizontal and vertical parity check on a block of data being transmitted....

Internet and Network 2023-04-04

Internet and Network crossword puzzle
Across
  1. Communication at a distance
  2. Wide Area Network
  3. Network of networks
Down
  1. First satellite launched by USSR
  2. The first network created by military
  3. Modulate/demodulate analog to digital signals
  4. Local Area Network

7 Clues: Wide Area NetworkLocal Area NetworkNetwork of networksCommunication at a distanceFirst satellite launched by USSRThe first network created by militaryModulate/demodulate analog to digital signals

internet and Network 2023-04-04

internet and Network crossword puzzle
Across
  1. network of networks
  2. communication at a distance
Down
  1. the first network created by military
  2. first satellite launched by USSR
  3. local area network
  4. modulate/demodulate analog to digital signals
  5. wide area network

7 Clues: wide area networklocal area networknetwork of networkscommunication at a distancefirst satellite launched by USSRthe first network created by militarymodulate/demodulate analog to digital signals

FLIPPED CLASSROOM 2025-11-05

FLIPPED CLASSROOM crossword puzzle
Across
  1. A secret combination of characters used to access a system or account.
  2. A program that detects, prevents, and removes malicious software from a computer.
  3. The practice of protecting computers, networks, and data from unauthorized access, attacks, or damage.
Down
  1. A cyberattack that tricks people into revealing personal or financial information through fake messages or websites.
  2. Malicious software designed to damage, disrupt, or steal information from computers or networks.
  3. Security systems that monitor and control network traffic to block unauthorized access.

6 Clues: A secret combination of characters used to access a system or account.A program that detects, prevents, and removes malicious software from a computer.Security systems that monitor and control network traffic to block unauthorized access.Malicious software designed to damage, disrupt, or steal information from computers or networks....

the engglish puzzle 2025-02-06

the engglish puzzle crossword puzzle
Across
  1. these waves are useful for only very short distance communication
  2. transmission media, is a type of transmission media in computer networks which is also known as known as wired or bounded media
  3. cable, these guided transmission media contain an insulation layer that transmits information in baseband mode and brodband mode
  4. fibre cable, these types of transmission media are thin strands of glass that guide linght along their length
Down
  1. its imortant for the transmitter and receiver antena to be aligned
  2. pair cable, in this type of transmission media in computer networks
  3. media, is a system or substance that can mediate the propagation of signals for the purposes of telecommunication
  4. this is a transverse electromagnetic (TEM) type of transmission media in computer network that is built on the inner layers of multi-layers printed circuit boards
  5. transmission media, they help in transmitting electromagnetic signals without using a physical medium
  6. cable, are the electrical cables that come with an add-on layer of insulation and a second conducting sheet

10 Clues: these waves are useful for only very short distance communicationits imortant for the transmitter and receiver antena to be alignedpair cable, in this type of transmission media in computer networkstransmission media, they help in transmitting electromagnetic signals without using a physical medium...

Digital Communications Words 2025-05-08

Digital Communications Words crossword puzzle
Across
  1. A network is a group of devices that share data and resources like internet or files.
  2. A WAN connects networks over long distances, like the internet.
  3. A firewall is a security tool that protects your network by monitoring and blocking harmful or unauthorized internet traffic.
  4. a device that allows wireless devices such as phones and laptops to connect to a network that is wired.
Down
  1. A server is a computer that provides data and services to other devices over a network.
  2. A local area network (LAN) connects devices within a small area, like a home or office.
  3. a wireless router is a device that gives out an internet connection to multiple devices wirelessly.
  4. a device that can connect many devices on a local area network to one another, allowing them to share data and communicate.
  5. A modem connects devices to the internet by converting signals.
  6. a portable mobile device which uses the internet and networks to access features such as web browsing and calling.

10 Clues: A WAN connects networks over long distances, like the internet.A modem connects devices to the internet by converting signals.A network is a group of devices that share data and resources like internet or files.A server is a computer that provides data and services to other devices over a network....

Data Transmission 2022-07-13

Data Transmission crossword puzzle
Across
  1. A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
  2. Data that arrives at the destination with the bits no longer synchronised.
  3. The actual data being carried in a data packet.
  4. Data that can be sent in both direction at the same time(simultaneously).
  5. A horizontal and vertical parity check on a block of data being transmitted. (2 words)
Down
  1. The part of the data that indicates the end of the data packet and cyclic redundancy check error check. (2 words)
  2. The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
  3. Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
  4. Data that can be sent on one direction only.
  5. A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.

10 Clues: Data that can be sent on one direction only.The actual data being carried in a data packet.Data that can be sent in both direction at the same time(simultaneously).Data that arrives at the destination with the bits no longer synchronised.A horizontal and vertical parity check on a block of data being transmitted. (2 words)...

Data Transmission 2022-07-13

Data Transmission crossword puzzle
Across
  1. A horizontal and vertical parity check on a block of data being transmitted. (2 words)
  2. The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
  3. Data that can be sent on one direction only.
  4. Data that can be sent in both direction at the same time(simultaneously).
  5. Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.
Down
  1. The part of the data that indicates the end of the data packet and cyclic redundancy check error check. (2 words)
  2. Data that can be sent in both direction but not at the same time.
  3. Data that arrives at the destination with the bits no longer synchronised.
  4. The actual data being carried in a data packet.
  5. A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
  6. A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.

11 Clues: Data that can be sent on one direction only.The actual data being carried in a data packet.Data that can be sent in both direction but not at the same time.Data that can be sent in both direction at the same time(simultaneously).Data that arrives at the destination with the bits no longer synchronised....

67 2025-10-21

67 crossword puzzle
Across
  1. An application used for sending and receiving electronic messages, typically using protocols like SMTP.
  2. Transmission The maximum rate of data transfer across a given path, measured in bits per second.
  3. A network device that connects multiple devices together in a star topology, broadcasting data to all connected devices.
  4. network A network that uses wireless technology, like Wi-Fi, to connect devices without physical cables.
  5. network The process of sending and receiving data between two or more devices on a network.
  6. A device that connects two or more networks and forwards data packets between them, choosing the most efficient path for the data to travel.
  7. hardware Physical devices that connect computers to a network, such as cables, hubs, routers, and servers.
  8. cable A physical medium, like a twisted-pair Ethernet cable, used to connect devices in a wired network.
Down
  1. Network Two or more computers or devices interconnected for communication and resource sharing.
  2. A global network of interconnected computer networks that use the TCP/IP protocol suite to communicate.
  3. A set of rules that govern how data is transmitted and received between devices on a network.
  4. A computer that provides services, resources, or data to other computers, known as clients, on a network.

12 Clues: network The process of sending and receiving data between two or more devices on a network.A set of rules that govern how data is transmitted and received between devices on a network.Network Two or more computers or devices interconnected for communication and resource sharing....

IT 2023-11-27

IT crossword puzzle
Across
  1. is software created to damage or alter the computer data or its operations
  2. are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks
  3. Due to its anonymity, the Internet also provides the right environment
  4. provides email and access to the Web via a normal TV set plus a high-speed modem
  5. an International computer Network made up of thousands of networks linked together.
  6. are malicious programs disguised as innocent-looking files or embedded within legitimate software.
Down
  1. converts the digital signals stored in the computer into analogue signals that can be transmitted over telephone lines
  2. software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software
  3. orbiting the earth enable your computer to send and receive Internet files
  4. or black-hat hackers, are computer criminals who use technology to perform a variety of crimes: virus propagation, fraud, intellectual property theft, etc.
  5. are programs that spread by attaching themselves to executable files or documents.

11 Clues: Due to its anonymity, the Internet also provides the right environmentis software created to damage or alter the computer data or its operationsorbiting the earth enable your computer to send and receive Internet filesprovides email and access to the Web via a normal TV set plus a high-speed modem...

IoT and smart devices 2024-11-13

IoT and smart devices crossword puzzle
Across
  1. assistant A software program that uses voice recognition to perform tasks, such as Amazon Alexa or Google Assistant.
  2. devices Objects or gadgets equipped with sensors, software, and internet connectivity that allow them to collect and exchange data.
  3. home A home equipped with interconnected devices that can be controlled remotely for convenience, security, and energy efficiency.
  4. The use of technology to perform tasks without human intervention.
  5. technology Electronic devices designed to be worn on the body, such as fitness trackers and smartwatches.
  6. The right to control personal information and protect it from unauthorized access.
Down
  1. of Things A network of devices that are connected and can exchange data over the internet.
  2. Devices that detect and measure physical properties like temperature, motion, or pressure.
  3. measures Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols. Steps taken to protect devices, networks, and data from cyber threats, including encryption and authentication protocols.
  4. breach A security incident in which sensitive information is accessed or disclosed without authorization.
  5. A software application that allows users to interact with smart devices or services on their smartphones or tablets.

11 Clues: The use of technology to perform tasks without human intervention.The right to control personal information and protect it from unauthorized access.Devices that detect and measure physical properties like temperature, motion, or pressure.of Things A network of devices that are connected and can exchange data over the internet....

PF10 Crossword 2025-02-24

PF10 Crossword crossword puzzle
Across
  1. _____ Authentication. Where two different methods are needed to gain access e.g banking apps for an online purchase (4)
  2. Application Planning _________ These allow 2 or more systems to communicate, so long as the customer has authorized payment. (10)
  3. A criminal act that involves some kind of illegal attack on computers and networks. (10)
  4. ______ banking allows customers to securely share their bank and credit card data with trusted third parties (4)
  5. Storage data services via the internet that is uploaded rather than saved on a hard drive allowing easy access from anywhere (5)
Down
  1. software designed to infiltrate computer systems like viruses, worms and trojan horses (7)
  2. Combination of the words ‘financial’ and ‘technology’ to describe technology-enabled innovation (7)
  3. Stealing customers data by pretending to be be someone else to gain trust and get their personal info or log in details (8)
  4. Security on a computer that filters traffic to prevent harmful data (8)
  5. Infiltrating computers by getting unauthorized access to their networks (7)

10 Clues: Security on a computer that filters traffic to prevent harmful data (8)Infiltrating computers by getting unauthorized access to their networks (7)A criminal act that involves some kind of illegal attack on computers and networks. (10)software designed to infiltrate computer systems like viruses, worms and trojan horses (7)...

Cybersecurity Fundamentals Chapter 3 2024-06-03

Cybersecurity Fundamentals Chapter 3 crossword puzzle
Across
  1. A type of malware that attaches itself to a legitimate executable files and requires user initiation to spread and activate.
  2. A program that remains dormant until triggered by a specific event to execute its harmful actions.
  3. Software design to disrupt, damage, or gain unauthorized access to computer systems.
  4. Malware that encrypts a victim's data and demands payment to restore access.
  5. Disguise itself as a legitimate or desired operation, requiring user interaction to execute its malicious payload.
Down
  1. Techniques used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
  2. A weakness in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause damage.
  3. An offensive action targeting computer systems, networks, or devices with the intent to disrupt, damage, or gain unauthorized access.
  4. Malicious software that replicates itself and spreads independently in networks, without needing a host program.

9 Clues: Malware that encrypts a victim's data and demands payment to restore access.Software design to disrupt, damage, or gain unauthorized access to computer systems.A program that remains dormant until triggered by a specific event to execute its harmful actions....

CYBER 2021-03-27

CYBER crossword puzzle
Across
  1. A secret word or phrase that is used to access a computer system or service.
  2. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  3. The method of obtaining user information through fraudulent communications targeted directly at people.
  4. The way in which the identity of a user is confirmed.
  5. security A technique for protecting computers, networks, programs, and
Down
  1. A technique for protecting computers, networks, programs, data from unauthorized access or hackers for exploitation.
  2. Software that automatically displays or downloads material when a user is offline.
  3. are typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, it can piggyback onto programs to corrupt data or expand throughout a network and damage systems across a company.
  4. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice.
  5. A cyber attacker who uses software and social engineering methods to steal data and information. data from unauthorized access or hackers for exploitation.

10 Clues: The way in which the identity of a user is confirmed.security A technique for protecting computers, networks, programs, andA secret word or phrase that is used to access a computer system or service.Software that automatically displays or downloads material when a user is offline....

Artificial intelligence 2019-07-03

Artificial intelligence crossword puzzle
Across
  1. What is the company name which manufactured the full scale humanoid robot?
  2. Founder of Bitcoin
  3. is the task of discovering groups & structures in the data that are in some way or another “similar” without using known structures in data
  4. is the process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics & database systems
  5. is about constructing and analyzing protocols that prevent third parties or the public from reading the private messages
Down
  1. is a revolutionary technology and distributed ledger platform that allows information to be shared but not copied across a series of networks
  2. is a combination of networks, hardware, services , storage, and interfaces that helps in delivering computing as a service
  3. is an application that provides systems the ability to automatically learn and improve from experience without being explicitly programmed
  4. One of the founder of Artificial Intelligence
  5. is a branch of artificial intelligence that helps computers understand, interpret, and manipulate human language

10 Clues: Founder of BitcoinOne of the founder of Artificial IntelligenceWhat is the company name which manufactured the full scale humanoid robot?is a branch of artificial intelligence that helps computers understand, interpret, and manipulate human language...

AI Related Vocabulary 2024-06-19

AI Related Vocabulary crossword puzzle
Across
  1. A step-by-step procedure or formula for solving a problem or performing a task.
  2. A field of AI focused on the interaction between computers and humans using natural language.
  3. A type of artificial intelligence that enables computers to learn and make decisions based on data.
  4. A field of AI that enables computers to interpret and make decisions based on visual data from the world.
Down
  1. A computing system inspired by the biological neural networks of animal brains, used to approximate functions that depend on a large number of inputs.
  2. Extremely large datasets that can be analyzed to reveal patterns, trends, and associations.
  3. The use of technology to perform tasks without human intervention.
  4. The design, construction, and operation of robots, often incorporating AI to perform tasks autonomously.
  5. A computer system modeled on the human brain's network of neurons, used to recognize patterns and solve complex problems.
  6. A subset of machine learning involving neural networks with many layers, capable of learning from vast amounts of data.

10 Clues: The use of technology to perform tasks without human intervention.A step-by-step procedure or formula for solving a problem or performing a task.Extremely large datasets that can be analyzed to reveal patterns, trends, and associations.A field of AI focused on the interaction between computers and humans using natural language....

Data Transmission 2022-07-13

Data Transmission crossword puzzle
Across
  1. A device that enables data packets to be moved between different networks for example to join a LAN to a WAN.
  2. The part of the data that indicates the end of the data packet and cyclic redundancy check error check.
  3. Data that can be sent on one direction only.
  4. The part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets. (2 words)
Down
  1. A horizontal and vertical parity check on a block of data being transmitted. (2 words)
  2. Data that can be sent in both direction at the same time(simultaneously).
  3. The actual data being carried in a data packet.
  4. Data that arrives at the destination with the bits no longer synchronised.
  5. A number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths/routes.
  6. Stages in a network that can receive and transmit data packets; routers are nodes in communication networks.

10 Clues: Data that can be sent on one direction only.The actual data being carried in a data packet.Data that can be sent in both direction at the same time(simultaneously).Data that arrives at the destination with the bits no longer synchronised.A horizontal and vertical parity check on a block of data being transmitted. (2 words)...

Computer network 2024-10-21

Computer network crossword puzzle
Across
  1. electronic devices within a user's immediate area
  2. computer network made up of an interconnection of local area networks
  3. a series of computers linked together to form a network in a circumscribed location
Down
  1. a network that provides connectivity within an area the size of a metropolitan region
  2. to connect their office networks

5 Clues: to connect their office networkselectronic devices within a user's immediate areacomputer network made up of an interconnection of local area networksa series of computers linked together to form a network in a circumscribed locationa network that provides connectivity within an area the size of a metropolitan region

Networks and Databases 2021-10-04

Networks and Databases crossword puzzle
Across
  1. Eintrag
  2. Ausrüstung
  3. Codierung
Down
  1. doppelte Überprüfung
  2. Validierung
  3. empfehlen
  4. sollen

7 Clues: sollenEintragempfehlenCodierungAusrüstungValidierungdoppelte Überprüfung

Viruses - Teddy Miller 2018-11-16

Viruses - Teddy Miller crossword puzzle
Across
  1. the first email virus
  2. a virus that floods the network
  3. full name of PCs
  4. the original reason for viruses being created
  5. what early viruses affected
  6. the controlling software for your computer
  7. A piece of unwanted software
  8. least likely operating system to get a virus on
  9. something that a virus cannot harm
  10. what a virus effects
Down
  1. protection for your computer
  2. protection for your accounts
  3. a virus that affect the startup directions
  4. when a virus is hidden in something else
  5. the original disk for viruses
  6. software that uses networks and security holes to replicate itself
  7. a virus that is imbedded in an email

17 Clues: full name of PCswhat a virus effectsthe first email viruswhat early viruses affectedprotection for your computerprotection for your accountsA piece of unwanted softwarethe original disk for virusesa virus that floods the networksomething that a virus cannot harma virus that is imbedded in an emailwhen a virus is hidden in something else...

Viruses - Teddy Miller 2018-11-16

Viruses - Teddy Miller crossword puzzle
Across
  1. something that a virus cannot harm
  2. when a virus is hidden in something else
  3. the controlling software for your computer
  4. the original reason for viruses being created
  5. A piece of unwanted software
  6. protection for your computer
  7. the original disk for viruses
  8. protection for your accounts
Down
  1. full name of PCs
  2. a virus that affect the startup directions
  3. software that uses networks and security holes to replicate itself
  4. a virus that is imbedded in an email
  5. the first email virus
  6. what a virus effects
  7. what early viruses affected
  8. least likely operating system to get a virus on
  9. a virus that floods the network

17 Clues: full name of PCswhat a virus effectsthe first email viruswhat early viruses affectedA piece of unwanted softwareprotection for your computerprotection for your accountsthe original disk for virusesa virus that floods the networksomething that a virus cannot harma virus that is imbedded in an emailwhen a virus is hidden in something else...

Nology 2024-05-09

Nology crossword puzzle
Across
  1. The place where the connection starts and ends
  2. a range of frequencies sending data
  3. make it hard to crack
  4. Arrangement of telecommunication networks
  5. someone in charge over things
  6. network that connects devices within limited area
Down
  1. the set process for a situation
  2. user, buyer
  3. the place where you'll find political debates and YouTube kids in the same place
  4. a connection Between devices
  5. a virtual room
  6. online label your device uses to communicate
  7. the thing stopping you from being hacked

13 Clues: user, buyera virtual roommake it hard to cracka connection Between devicessomeone in charge over thingsthe set process for a situationa range of frequencies sending datathe thing stopping you from being hackedArrangement of telecommunication networksonline label your device uses to communicateThe place where the connection starts and ends...

network 2024-05-09

network crossword puzzle
Across
  1. maximum amount of data
  2. a way of scrambling data
  3. computer system that provides resources, data,services or programs to other computers
  4. arrangement of the elements of a communication network
  5. interconnection of networks in a limited area
  6. a person responsible for carrying out the administration
Down
  1. standardized set of rules for formatting and processing data
  2. a person or organization using the services
  3. computer network for sharing information
  4. network security device
  5. numerical label
  6. virtual places within an operating system
  7. group of devices interconnected exchaning data

13 Clues: numerical labelmaximum amount of datanetwork security devicea way of scrambling datacomputer network for sharing informationvirtual places within an operating systema person or organization using the servicesinterconnection of networks in a limited areagroup of devices interconnected exchaning data...

Learn by fun -1 [U1:Cellular Network vs Ad hoc network] 2022-09-03

Learn by fun -1              [U1:Cellular Network vs Ad hoc network] crossword puzzle
Across
  1. topology in adhoc network is---------
  2. Do ad hoc network need infrasructure?
  3. time synchronization in adhoc network is-----
  4. cost for adhoc network installation is ------
  5. frequency reuse in cellular network is -------
  6. bandwidth assurance in cellular network is ---
  7. network routing in ad hoc network
  8. host requirement in ad hoc network is ------
Down
  1. frequency reuse in adhoc network is-------
  2. adhoc network is -----------during change in topology
  3. call breaks in ad hoc networks are------
  4. hops in cellular network is -------
  5. deployment time in adhoc network is ----
  6. technology in adhoc network is -------

14 Clues: network routing in ad hoc networkhops in cellular network is -------topology in adhoc network is---------Do ad hoc network need infrasructure?technology in adhoc network is -------deployment time in adhoc network is ----call breaks in ad hoc networks are------frequency reuse in adhoc network is-------host requirement in ad hoc network is ------...

Introduction to Computers Crossword 2022-02-28

Introduction to Computers Crossword crossword puzzle
Across
  1. hardware and software that work together to make a computer run
  2. unorganized facts and statistics
  3. group of associated devices
  4. processing
  5. the parts we can physically see and touch
  6. sound in your headphones
  7. stores, shares, examines mass amounts of data
  8. a kind of computer memory where information can be kept.
Down
  1. hardware used to send information to the computer
  2. set of commands
  3. runs programs
  4. Programs that enable the user to complete tasks.
  5. worldwide network
  6. delivers images, and videos that can be seen on the computer screen.

14 Clues: processingruns programsset of commandsworldwide networksound in your headphonesgroup of associated devicesunorganized facts and statisticsthe parts we can physically see and touchstores, shares, examines mass amounts of dataPrograms that enable the user to complete tasks.hardware used to send information to the computer...

Computer parts 2024-02-06

Computer parts crossword puzzle
Across
  1. computer expansion card that generates a feed of graphics
  2. Power SuppMonitor
  3. Device with a screen used for display
  4. stores all your digital content
  5. hand-held pointing device
  6. enters characters and functions into the computer
  7. worldwide system of computer networks
Down
  1. used to draw cooler air into the case from the outside
  2. device that accepts text and graphic output from a computer and transfers the information to paper
  3. Computer processor
  4. the main printed circuit
  5. contains most of the hardware of a personal computer
  6. random access memory
  7. allows you to use CDs

14 Clues: Power SuppMonitorComputer processorrandom access memoryallows you to use CDsthe main printed circuithand-held pointing devicestores all your digital contentDevice with a screen used for displayworldwide system of computer networksenters characters and functions into the computercontains most of the hardware of a personal computer...

Topic 3 AI & Competition Law 2024-11-15

Topic 3 AI & Competition Law crossword puzzle
Across
  1. Rules governing AI development and implementation
  2. When AI systems independently coordinate to avoid competition
  3. Large technology firms influencing markets
  4. Control by a major player in a market
  5. Internet-based computing and storage services
  6. Technology that mimics human thinking and learning
  7. Moral principles governing behavior
  8. Unfair preference in decision-making
Down
  1. Safeguarding personal information
  2. Charging different prices based on user data
  3. Organization for global trade rules
  4. Ensures fairness and innovation in markets
  5. Clarity in AI decision-making processes
  6. Protecting systems and networks from attacks

14 Clues: Safeguarding personal informationOrganization for global trade rulesMoral principles governing behaviorUnfair preference in decision-makingControl by a major player in a marketClarity in AI decision-making processesLarge technology firms influencing marketsEnsures fairness and innovation in marketsCharging different prices based on user data...

computer hardware 2022-10-03

computer hardware crossword puzzle
Across
  1. in the context of networking, is a high-speed device that receives incoming data packets and redirects them to their destination
  2. is a network of connected devices that exist within a specific location.
  3. consists of multiple devices that communicate with one another.
  4. is a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes.
  5. is a communications protocol that is used for wireless data access through most mobile wireless networks
  6. is a computer system that hosts web
Down
  1. is a wall made of brick, steel, or other inflammable material that prevents the spread of a fire in a building
  2. is a network topology in which each network component is physically connected to a central node such as a router,
  3. It is similar to a Local Area Network (LAN), but it's a lot bigger.
  4. is short for "Modulator-Demodulator." It is a hardware component that allows a computer or another device, such as a router or switch, to connect to the Internet
  5. is a component that provides networking capabilities for a computer
  6. is a hardware device that directs traffic between networks and devices.

12 Clues: is a computer system that hosts webconsists of multiple devices that communicate with one another.It is similar to a Local Area Network (LAN), but it's a lot bigger.is a component that provides networking capabilities for a computeris a hardware device that directs traffic between networks and devices....

Viruses - Teddy Miller 2018-11-16

Viruses - Teddy Miller crossword puzzle
Across
  1. the original disk for viruses
  2. what early viruses affected
  3. the first email virus
  4. when a virus is hidden in something else
  5. the controlling software for your computer
  6. full name of PCs
  7. A piece of unwanted software
  8. protection for your accounts
Down
  1. a virus that affect the startup directions
  2. a virus that floods the network
  3. software that uses networks and security holes to replicate itself
  4. the original reason for viruses being created
  5. what a virus effects
  6. protection for your computer
  7. a virus that is imbedded in an email
  8. something that a virus cannot harm
  9. least likely operating system to get a virus on

17 Clues: full name of PCswhat a virus effectsthe first email viruswhat early viruses affectedprotection for your computerA piece of unwanted softwareprotection for your accountsthe original disk for virusesa virus that floods the networksomething that a virus cannot harma virus that is imbedded in an emailwhen a virus is hidden in something else...

Immigration and Urbanization 2023-11-29

Immigration and Urbanization crossword puzzle
Across
  1. Sociologist Barry _____ points out that our networks in school, work, and online now define our communities as much as our residential neighborhoods
  2. _____ Capital: Tight connections that people form with each other through organizations, civic life, and strong social ties.
  3. Movement of products, services, and information across national and continental boundaries.
  4. Sociologist Claude ______ argues that cities generate new forms of community, such as subcultures
  5. Chicago New York, and ______ have the highest levels of segregation between Black and white people
  6. Ethnic ______: Section of a city where the local culture and labor market are dominated by a single ethnic group.
  7. The largest number of new immigrants come from India, Mexico, the Philippines, El Salvador, and ______
  8. The Great ______: Movement of millions of African Americans, from 1900 to 1970, into cities outside the south.
  9. A group that hold values and engage in activities that separate them from wider society.
  10. Practice of outlining in red any sections of a city that were considered “risky” and rejecting loan applications in that area
Down
  1. Growth in the proportion of a nation’s population living in cities.
  2. Social _____: Various types of connections that individuals form with other people, no matter where they’re located.
  3. More than ___ million African Americans left the south between 1900-1970
  4. _____ Cities: Major urban areas that serve as nodes for the worldwide network of economic activity.
  5. Unique ways of life found in cities.
  6. Urban areas with at least 10 million people.
  7. Type of violence experienced by immigrants as a result of immigration policies.
  8. Migration of Whites out of central city neighborhoods and into suburban communities (2 words)
  9. Chains of densely populated areas that extend over long stretches of space.

19 Clues: Unique ways of life found in cities.Urban areas with at least 10 million people.Growth in the proportion of a nation’s population living in cities.More than ___ million African Americans left the south between 1900-1970Chains of densely populated areas that extend over long stretches of space....

Network Basics Crossword Puzzle 2013-03-04

Network Basics Crossword Puzzle crossword puzzle
Across
  1. eg. cable or DSL modem
  2. rate of transfer; available or consumed
  3. links network segments or devices
  4. transfers data between components inside a computer
  5. connects office, school, etc
  6. connects businesses, over a large area
  7. has twisted pair and fiber optic links
  8. category 5 patch cable
  9. a participant
Down
  1. barrier to prevent unauthorized communication
  2. Network connects network; provides paths for info exchange between LANs
  3. wifi access point
  4. uses radio waves over computer network
  5. hard or software that accesses a service
  6. Backbone data routes; interconnected networks and core routers
  7. web, proxy, FTP, online games are types
  8. data structure in computer science

17 Clues: a participantwifi access pointeg. cable or DSL modemcategory 5 patch cableconnects office, school, etclinks network segments or devicesdata structure in computer scienceuses radio waves over computer networkconnects businesses, over a large areahas twisted pair and fiber optic linksrate of transfer; available or consumed...

VLAN Puzzle 2020-12-09

VLAN Puzzle crossword puzzle
Across
  1. The process of transferring VLAN traffic between two or more switches.
  2. This switch works at Layer 2 and Layer 3 of the OSI model.
  3. A Cisco proprietary protocol that updates a VLAN switch into three states - server, client or transparent
  4. Type of attack allows unauthorized access to VLANs but this is mitigated by changing the native VLAN to an unused one and configuring the trunk
  5. The configuration for when a router interface is connected to multiple VLANs on a switch
  6. If you give an incorrect VLAN ____ to a device, then that device won’t have access to resources it needs.
Down
  1. AAA is vital to switches’ security because it supports port _____, which gives us a way to protect our network from unwanted people trying to access the network.
  2. This special remote access server program allows the server endpoint to function as a network router, which routes IP packets between networks.
  3. This lets you segment a physical network into multiple discrete networks without having to add additional hardware.
  4. These VLANs based on MAC addresses
  5. to tag its native VLAN traffic.
  6. The process of making a router work between two VLANs is called ______ routing.

12 Clues: to tag its native VLAN traffic.These VLANs based on MAC addressesThis switch works at Layer 2 and Layer 3 of the OSI model.The process of transferring VLAN traffic between two or more switches.The process of making a router work between two VLANs is called ______ routing....

CIW Review 2017-05-10

CIW Review crossword puzzle
Across
  1. Can store contact information, help you take notes and keep track of appointments.
  2. Collection of personal thoughts posted on a public Web site.
  3. Security barrier that prevents unauthorized access to or from private networks.
  4. Unethical practice in which the perpetrator capitalizes on typing mistakes that users make when entering the URL of a Web site into a browser.
  5. Software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.
  6. Small text files placed on Web site visitors' computers.
  7. Tool that guides users step-by-step through a software installation process, or assists users of an application in creating documents and/or databases based on styles and templates.
  8. Windows One or more small windows may suddenly open in front of the page you are viewing
  9. List Published list of IP addresses known to be sources of spam
  10. Encourage common sense and politeness, and to establish general rules for Internet etiquette.
  11. Enable users to narrow their Internet search results by requiring or excluding keywords from the search criteria
  12. encyclopedias and reference material that list additional titles. These additional titles can be either primary or secondary sources.
Down
  1. Malicious program designed to damage computer systems, from stand-alone computers to entire networks.
  2. Certificate Proves the identity of an individual or company over the Web.
  3. The process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data.
  4. Computing Person's ability to use technology while "on the go."
  5. URL The full path from the system root to a specific page or resource.
  6. Completely Automated Public Turing Test to Tell Computers and Humans Apart
  7. Junk e-mail that can clutter your Inbox

19 Clues: Junk e-mail that can clutter your InboxSmall text files placed on Web site visitors' computers.Collection of personal thoughts posted on a public Web site.Computing Person's ability to use technology while "on the go."List Published list of IP addresses known to be sources of spam...

27 2024-01-08

27 crossword puzzle
Across
  1. Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device. (Note: Repeated for variety.)
  2. Artificially manipulated media that may depict events that never occurred or present fictionalized versions of real events.
  3. The use of largely automatic equipment in a system of operation. (Note: Repeated for variety.)
  4. The activity of exploiting genetic material experimentally without regard to ethical considerations. (Note: Repeated for variety.)
  5. The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
Down
  1. A virtual reality space where users can interact with a computer-generated environment.
  2. The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
  3. Economy A labor market characterized by the prevalence of short-term, flexible jobs.
  4. A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
  5. Physical or emotional exhaustion, often due to prolonged stress or overwork.
  6. Tech Technology designed to enhance the relationship between citizens and government.
  7. Literacy The ability to use and understand digital technologies, communication tools, and networks.

12 Clues: Physical or emotional exhaustion, often due to prolonged stress or overwork.Economy A labor market characterized by the prevalence of short-term, flexible jobs.Tech Technology designed to enhance the relationship between citizens and government.A virtual reality space where users can interact with a computer-generated environment....

JMoreno - Network Devices 2023-01-03

JMoreno - Network Devices crossword puzzle
Across
  1. all-in-one security appliance, includes all functionality of an IDS/IPS as well as stateful firewall services
  2. Used for larger networks and is configured with VLANS and port security
  3. passively monitor traffic on network
  4. also called Ethernet over Power, that uses existing electrical wiring to connect devices
  5. Also called extenders because they extend the distance a signal can travel
  6. techniques used by firewalls to determine what is permitted or denied access to a network segment
  7. responsible for monitoring all the end devices in your network
  8. Systems that are related to legacy systems and have an embedded microchip dedicated to input and output instructions to specialized device like thermostat
Down
  1. used as a place to collect incoming cables runs from various networking devices
  2. Enter's address into switching table that records the address for each device connected to the switch, and records which switch port can be used to reach a device with a given address.
  3. uses IP addresses to forward traffic to other networks
  4. replaces IDS and is implemented in inline mode, responds quickly, doesn't allow any malicious traffic to pass
  5. protects data and equipment on a network from unauthorized access
  6. This provides the physical connection to the network at the PC or other end device
  7. method for powering devices that do not have battery or access to power outlet and transfers small amounts of DC current over ethernet cable
  8. Systems that are no longer supported but are still in operation
  9. Divides LANS into segments to filter network traffic
  10. provide network access to wireless devices like laptops and tablets
  11. Receive data on one port and then send it out to all other ports

19 Clues: passively monitor traffic on networkDivides LANS into segments to filter network trafficuses IP addresses to forward traffic to other networksresponsible for monitoring all the end devices in your networkSystems that are no longer supported but are still in operationReceive data on one port and then send it out to all other ports...

Module 11 2024-12-10

Module 11 crossword puzzle
Across
  1. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  2. s a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
  3. is the most widely used method for encrypting data
  4. backs up any files that have changed since the last full or incremental backup
  5. creates a barrier between two entities
  6. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  7. a framework for other protocols that provide encryption and authentication
  8. prevents people from using eavesdropping technology, such as a protocol analyzer (packet sniffer), to capture packets
  9. backs up the disk sector by sector to create an exact image of the disk’s contents
Down
  1. all of the disk’s contents are backed up as individual folders and files
  2. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  3. only backs up files that have changed since the last full backup
  4. is used to encrypt files and folders
  5. security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
  6. security features that enable administrators to control who has access to the network and what users can do after they are logged on to the network
  7. document that describes the rules of an organization
  8. used in a Windows domain environment and provides mutual authentication
  9. requires a user to supply two or more types of authentication
  10. an industry-standard client/server protocol that offers centralized control
  11. is a good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen

20 Clues: is used to encrypt files and folderscreates a barrier between two entitiesis the most widely used method for encrypting datadocument that describes the rules of an organizationrequires a user to supply two or more types of authenticationonly backs up files that have changed since the last full backup...

Cyber Security - Chapter 1 2020-02-12

Cyber Security - Chapter 1 crossword puzzle
Across
  1. State Sponsored Hackers
  2. attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
  3. The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
  4. The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
  5. The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
  6. attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  7. is the collection of technologies that enable the connection of various devices to the Internet.
  8. is the result of data sets that are large and complex, making traditional data processing applications inadequate.
  9. attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
  10. Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
  1. Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
  2. Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  3. This group of criminals breaks into computers or networks to gain access for various reasons.
  4. The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
  5. Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.

15 Clues: State Sponsored HackersThis group of criminals breaks into computers or networks to gain access for various reasons.is the collection of technologies that enable the connection of various devices to the Internet.Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards....

packet switching in computer network 2025-05-25

packet switching in computer network crossword puzzle
Across
  1. Unpredictable delay in network delivery
  2. Network communication rules
  3. Method of transmitting data in discrete chunks
  4. Temporary storage used while forwarding packets
Down
  1. Device that connects multiple networks
  2. Opposite of packet switching
  3. A computer connected to a network
  4. Smallest unit of data sent over a network
  5. Internet's addressing system

9 Clues: Network communication rulesOpposite of packet switchingInternet's addressing systemA computer connected to a networkDevice that connects multiple networksUnpredictable delay in network deliverySmallest unit of data sent over a networkMethod of transmitting data in discrete chunksTemporary storage used while forwarding packets

Computing 2020-02-16

Computing crossword puzzle
Across
  1. A device that is used to recharge a battery, e.g. in a mobile phone.
  2. A piece of electronic equipment that connects computer networks to each other and sends information between networks.
  3. A computer screen or a device with a screen on which words or pictures can be shown.
  4. A device with parts that cover each ear through which you can listen to music (plural).
  5. A computer that is small enough to be carried around easily and is designed for use ouside an office.
  6. A piece of electrical equipment through which recorded or broadcast sound can be heard (plural).
  7. A small flat computer that is controlled by touching the screen or by using a special pen.
  8. A small device that you move across a surface in order to move a cursor on your computer screen.
Down
  1. A machine connected to a computer that prints onto paper using ink.
  2. The board with a set of keys on a computer to type information.
  3. An electronic machine thatvis used for storing, organizing and finding words, numbers and pictures.
  4. A brand name for a small piece of equipment that you connect to a computer to copy and store information.
  5. A camera that records moving pictures and sound and allows these to be broadcast on the internet as they happen.

13 Clues: The board with a set of keys on a computer to type information.A machine connected to a computer that prints onto paper using ink.A device that is used to recharge a battery, e.g. in a mobile phone.A computer screen or a device with a screen on which words or pictures can be shown....

Types of Networks 2017-09-25

Types of Networks crossword puzzle
Across
  1. this has no central server to manage the network
  2. a network that is restricted to a small geographical area
  3. a computer on a network which provides resources that can be used by client devices
  4. a set of computers and devices connected together so they can communicate and share resources
Down
  1. Has atleast one server and several clients
  2. a privately owned network that uses client servers
  3. a network that covers a larger geographical area

7 Clues: Has atleast one server and several clientsthis has no central server to manage the networka network that covers a larger geographical areaa privately owned network that uses client serversa network that is restricted to a small geographical areaa computer on a network which provides resources that can be used by client devices...

Networks by Danielle 2015-05-11

Networks by Danielle crossword puzzle
Across
  1. Passes on all data to all of the computers
  2. Does not pass on the data to all parts of the network
  3. Abbreviation of Network Interface Card
  4. Computer instructions or data
Down
  1. Physical components of a computer
  2. Different ways of writing a network together
  3. The title of the crossword

7 Clues: The title of the crosswordComputer instructions or dataPhysical components of a computerAbbreviation of Network Interface CardPasses on all data to all of the computersDifferent ways of writing a network togetherDoes not pass on the data to all parts of the network

Ad - Hoc Networks 2024-09-17

Ad - Hoc Networks crossword puzzle
Across
  1. Ad Hoc networks allow users to access the internet in most ______
  2. ____ wifi is provided in train stations, cafes, etc
  3. A ______ key is needed to access a wireless connection (like a password)
  4. enables a device to connect to an internet connection
Down
  1. You can create a personal _____ to share your internet connection with your friends.
  2. When access a an Ad Hoc network you will not use up your data _________
  3. An ad-hoc network is ______ to set up

7 Clues: An ad-hoc network is ______ to set up____ wifi is provided in train stations, cafes, etcenables a device to connect to an internet connectionAd Hoc networks allow users to access the internet in most ______When access a an Ad Hoc network you will not use up your data _________A ______ key is needed to access a wireless connection (like a password)...

Objective 4e: Political Dimensions of Maritime Empires 2024-11-15

Objective 4e: Political Dimensions of Maritime Empires crossword puzzle
Across
  1. A Japanese state that implemented isolationist policies to minimize foreign influence during the period 1450-1750.
  2. Competition among European states that drove the establishment of maritime empires and control over trade routes.
  3. A trade policy used by the Qing Dynasty to regulate foreign trade, restricting it to the port of Canton (Guangzhou).
Down
  1. Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence.
  2. A West African state that gained political and economic power through participation in maritime trade networks.
  3. Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks.
  4. A Chinese dynasty that continued restrictive trade practices, including the Canton System, to limit European influence.
  5. A Central African state whose involvement in global trade increased its regional influence.
  6. A Chinese dynasty that adopted restrictive trade policies to limit the influence of European trade and culture.

9 Clues: A Central African state whose involvement in global trade increased its regional influence.Trade restrictions adopted by states like Ming China and Tokugawa Japan to limit foreign influence.Coastal trade hubs established by European powers in Africa and Asia to facilitate global trade networks....

technology 2025-10-22

technology crossword puzzle
Across
  1. a hardware device or software program that provides services, data, and resources to other computers or devices, called "clients," over a network.
  2. a small, formatted unit of data transmitted over a computer network
  3. a vast, global network of interconnected computer networks that communicate using a standard set of communication protocols.
  4. a hardware device that forwards data packets between computer networks.
Down
  1. a type of computer network that uses physical cables to connect devices and facilitate the transmission of data.
  2. A system of two or more interconnected computing devices that can communicate with one another to share data, resources and services.
  3. a method of sending and receiving digital messages over a computer network.
  4. a standardized set of rules that governs how electronic devices communicate with each other.
  5. the maximum amount of data that can be transferred over a network connection in a given amount of time

9 Clues: a small, formatted unit of data transmitted over a computer networka hardware device that forwards data packets between computer networks.a method of sending and receiving digital messages over a computer network.a standardized set of rules that governs how electronic devices communicate with each other....

technology 2025-05-14

technology crossword puzzle
Across
  1. Fifth-generation mobile network technology
  2. Distributed ledger technology for cryptocurrencies
  3. Electric car company founded by Elon Musk
  4. Internet-based computing service model
  5. Network of interconnected smart devices
Down
  1. World’s largest search engine
  2. Technology protecting networks from attacks
  3. Computer system mimicking human intelligence

8 Clues: World’s largest search engineInternet-based computing service modelNetwork of interconnected smart devicesElectric car company founded by Elon MuskFifth-generation mobile network technologyTechnology protecting networks from attacksComputer system mimicking human intelligenceDistributed ledger technology for cryptocurrencies

Computer network 2024-10-21

Computer network crossword puzzle
Across
  1. a series of computers linked together to form a network in a circumscribed location
  2. to connect their office networks
  3. computer network made up of an interconnection of local area networks
Down
  1. a network that provides connectivity within an area the size of a metropolitan region
  2. electronic devices within a user's immediate area

5 Clues: to connect their office networkselectronic devices within a user's immediate areacomputer network made up of an interconnection of local area networksa series of computers linked together to form a network in a circumscribed locationa network that provides connectivity within an area the size of a metropolitan region

Belize Adventist College 2021-03-29

Belize Adventist College crossword puzzle
Across
  1. storage
  2. banking
  3. technology
Down
  1. teller machine
  2. networks

5 Clues: storagebankingnetworkstechnologyteller machine

cyber security vocabulary 2023-09-07

cyber security vocabulary crossword puzzle
Across
  1. letter numbers and symbols combined to prevent unauthorized entry
  2. sofware that creates representations of servers, storage and networks
  3. a collection of documents
  4. an illegitimate source, not mainstream
  5. not connected to the internet
  6. software that prevents attacks
  7. handles cpu and high speed ram
  8. an extra layer of security
  9. information on a computer
  10. created on the internet to serve a purpose
  11. preserves the condition of a computer
  12. connection between computers
Down
  1. connects a computer to internet
  2. an attack via email or text in an attempt at information
  3. false information used to obtain information
  4. handles peripherals
  5. physical parts of a computer
  6. an account created to send information
  7. information withheld in exchange for money
  8. an increased use in cpu

20 Clues: handles peripheralsan increased use in cpua collection of documentsinformation on a computeran extra layer of securityphysical parts of a computerconnection between computersnot connected to the internetsoftware that prevents attackshandles cpu and high speed ramconnects a computer to internetpreserves the condition of a computer...

HUSEIN 2024-09-06

HUSEIN crossword puzzle
Across
  1. - Network Interface Card
  2. - Hard Disk Drive
  3. - Vital Information Resource Under Siege
  4. - Random Access Memory
  5. - Basic Input/Output System
  6. - Serial Advanced Technology Attachment
  7. - MultiMediaCard
  8. - Liquid Crystal Display
  9. - Advanced Technology Attachment
  10. - Refers to micro versions of interfaces or devices, such as micro USB
  11. - Graphics Processing Unit
  12. - Refers to mini versions of interfaces or devices, such as mini USB
Down
  1. - Digital Visual Interface
  2. - A family of networking technologies used in local area networks (LANs)
  3. - High-Definition Multimedia Interface
  4. - New Technology File System
  5. - Central Processing Unit
  6. - Video Graphics Array
  7. - Universal Serial Bus
  8. - Read-Only Memory
  9. - Solid-State Drive
  10. - Automatic Frequency Assignment
  11. - Control Unit
  12. - Character User Interface
  13. - Arithmetic Logic Unit
  14. - Redundant Array of Independent Disks

26 Clues: - Control Unit- MultiMediaCard- Hard Disk Drive- Read-Only Memory- Solid-State Drive- Video Graphics Array- Universal Serial Bus- Random Access Memory- Arithmetic Logic Unit- Network Interface Card- Liquid Crystal Display- Central Processing Unit- Digital Visual Interface- Character User Interface- Graphics Processing Unit...

Qué Chévere 2 Unidad 1A #2 (2024-2025) 2024-08-25

Qué Chévere 2 Unidad 1A #2 (2024-2025) crossword puzzle
Across
  1. social networks
  2. information
  3. to do a search
  4. I am going to, you are going to, he/she is going to
  5. to browse
  6. technology
  7. I washed, you washed, he/she washed, they washed
  8. link
  9. I have to charge my cell phone.
  10. I have to, you have to, he/she has to
  11. I am, you are, he/she is
Down
  1. I do, you do, he/she does, we do, they do
  2. I live, you live, he/she lives
  3. Are you going to finish the homework?
  4. program
  5. world
  6. text message
  7. browser
  8. I can, you can, he/she can, we can, they can
  9. to continue

20 Clues: linkworldprogrambrowserto browsetechnologyinformationto continuetext messageto do a searchsocial networksI am, you are, he/she isI live, you live, he/she livesI have to charge my cell phone.Are you going to finish the homework?I have to, you have to, he/she has toI do, you do, he/she does, we do, they doI can, you can, he/she can, we can, they can...

McKenna Rochelle - Crossword - 1st Period 2016-10-24

McKenna Rochelle - Crossword - 1st Period crossword puzzle
Across
  1. A denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files without need for a central server.
  2. It is a networking hardware device that allows a WiFi compliant device to connect to a wired network.
  3. The practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
  4. It is a common connection point for devices in a network.
  5. It helps run games, email, web browsers, and almost everything on your computer or device.
  6. A router is a networking device that forwards data packets between computer networks.
  7. A portable phone that is almost exactly alike to a computer.
  8. A corrupted code that can destroy your computer.
  9. It is software that is made to damage or disable computers.
Down
  1. It is a numbered label that is assigned to each device.
  2. is a type of computer program that is used to run a computer's hardware and application program.
  3. A picture on a video that is used to bring in a audience.
  4. A portable computer that can be used like a normal computer.
  5. it is the study of use of systems for storing, retrieving, or sending information.
  6. A desktop computer terminal, typically networked and more powerful than a personal computer.
  7. When you act responsibly on the internet.
  8. When you post inappropriate messages over, and over again.
  9. It is a system for connecting a number of computer systems to form a local area network.
  10. Used to transfer digital signals over standard telephone lines.

19 Clues: When you act responsibly on the internet.A corrupted code that can destroy your computer.It is a numbered label that is assigned to each device.A picture on a video that is used to bring in a audience.It is a common connection point for devices in a network.When you post inappropriate messages over, and over again....

Computer Network 2023-10-03

Computer Network crossword puzzle
Across
  1. A device connected to several other devices.
  2. intelligent or made in a complicated way and therefore able to do complicated tasks
  3. to listen to someone's private conversation from close by without them knowing
  4. difficult to understand or find an answer to because of having many different parts
  5. a measurement of the amount of information that can be sent between computers, through a phone line, etc.:
  6. to keep something as it is, especially in order to prevent it from decaying or being damaged or destroyed
  7. a machine, system, law, etc. that has been replaced by a new one OR the person who had a particular job or position before someone else
  8. Device that boost electrical signals to restore their strength when they travel long distances in cables.</p>
  9. the way the parts of something are organized or connected:
Down
  1. the quality of being vulnerable (= able to be easily hurt, influenced, or attacked), or something that is vulnerable
  2. a piece of electronic equipment that connects computer networks to each other, and sends information between networks
  3. A device that forwards traffic between network segments based on data link layer information, where the segments share a common network layer address.
  4. an object that contains the controls for a piece of equipment
  5. without someone's official permission to do something or be in a particular place
  6. the outer or furthest point of something:
  7. having many parts that are organized in a way that may be difficult to understand
  8. the way in which all the equipment that makes up a computer system is set to operate
  9. to succeed in doing or dealing with something, especially something difficult
  10. to cover or reach a wider or increasing area, or to make something do this

19 Clues: the outer or furthest point of something:A device connected to several other devices.the way the parts of something are organized or connected:an object that contains the controls for a piece of equipmentto cover or reach a wider or increasing area, or to make something do this...

Computer Network 2023-10-03

Computer Network crossword puzzle
Across
  1. intelligent or made in a complicated way and therefore able to do complicated tasks
  2. the way the parts of something are organized or connected:
  3. A device connected to several other devices.
  4. a measurement of the amount of information that can be sent between computers, through a phone line, etc.:
  5. the quality of being vulnerable (= able to be easily hurt, influenced, or attacked), or something that is vulnerable
  6. difficult to understand or find an answer to because of having many different parts
  7. to listen to someone's private conversation from close by without them knowing
  8. to succeed in doing or dealing with something, especially something difficult
  9. the outer or furthest point of something:
  10. to cover or reach a wider or increasing area, or to make something do this
  11. Device that boost electrical signals to restore their strength when they travel long distances in cables.</p>
Down
  1. the way in which all the equipment that makes up a computer system is set to operate
  2. an object that contains the controls for a piece of equipment
  3. having many parts that are organized in a way that may be difficult to understand
  4. A device that forwards traffic between network segments based on data link layer information, where the segments share a common network layer address.
  5. without someone's official permission to do something or be in a particular place
  6. a machine, system, law, etc. that has been replaced by a new one OR the person who had a particular job or position before someone else
  7. to keep something as it is, especially in order to prevent it from decaying or being damaged or destroyed
  8. a piece of electronic equipment that connects computer networks to each other, and sends information between networks

19 Clues: the outer or furthest point of something:A device connected to several other devices.the way the parts of something are organized or connected:an object that contains the controls for a piece of equipmentto cover or reach a wider or increasing area, or to make something do this...

CISO Crossword Puzzle: 0423 2023-06-03

CISO Crossword Puzzle: 0423 crossword puzzle
Across
  1. A social engineering attack in which the fraudster builds a false sense of trust with the victim
  2. The environment in which communication over computer networks occurs through a widespread interconnected digital technology
  3. Defrauding people over the phone, enticing them to divulge sensitive information
  4. A type of threat where an unauthorized entity gains access to a system by illegitimately posing as an authorized entity
  5. The process of converting information or data into a unreadable code, especially to prevent unauthorized access
Down
  1. An attack method used by fraudsters that focus on people rather than technology
  2. A phishing attack in which fraudsters create a QR code that directs the victim to a fake website controlled by the attacker
  3. A software that blocks access to the victim's computer/data and threatens to publish or delete it until ransom is paid
  4. A secret word or phrase that is used to access a computer system or service
  5. A cyberattack technique that injects malicious code within user's digital advertisements
  6. A program made up of malicious code that replicates and propagates itself from device to device using computer networks
  7. an authorized simulated attack performed on a computer system to evaluate its security

12 Clues: A secret word or phrase that is used to access a computer system or serviceAn attack method used by fraudsters that focus on people rather than technologyDefrauding people over the phone, enticing them to divulge sensitive informationan authorized simulated attack performed on a computer system to evaluate its security...

Training 2020-05-15

Training crossword puzzle
Across
  1. component needed to go to access.statestreet.com
  2. Tool in which each agent must claim their weekly hours
  3. is a program or software installed on a compute
  4. application similar to whatsApp that ibm employees use
  5. chat application for State Street users
  6. Computer hasn't connected to the networks in 3+ days
Down
  1. environment that we must access to work
  2. Detects suspicious drive activity
  3. runs commands
  4. First time installation
  5. New proxy environment

11 Clues: runs commandsNew proxy environmentFirst time installationDetects suspicious drive activityenvironment that we must access to workchat application for State Street usersis a program or software installed on a computecomponent needed to go to access.statestreet.comComputer hasn't connected to the networks in 3+ days...

Training 2020-05-15

Training crossword puzzle
Across
  1. New proxy environment
  2. component needed to go to access.statestreet.com
  3. Tool in which each agent must claim their weekly hours
  4. is a program or software installed on a compute
  5. environment that we must access to work
  6. application used to ask for help
  7. First time installation
Down
  1. Computer hasn't connected to the networks in 3+ days
  2. chat application for State Street users
  3. Detects suspicious drive activity
  4. runs commands

11 Clues: runs commandsNew proxy environmentFirst time installationapplication used to ask for helpDetects suspicious drive activitychat application for State Street usersenvironment that we must access to workis a program or software installed on a computecomponent needed to go to access.statestreet.comComputer hasn't connected to the networks in 3+ days...