networks Crossword Puzzles
Capillary Exchange & Special Circulations 2025-04-24
Across
- Osmotic pressure from plasma proteins
- Venous networks storing blood (e.g., liver/spleen)
- Pores in fenestrated capillaries
- Movement of substances between blood/tissues
- Fluid movement into capillaries
- Blood flow through tissues
- Arterial sites for pulse measurement
Down
- Force pushing fluid out of vessels
- Force pulling fluid into vessels
- Prevent backflow in veins
- Capillary network connecting gut/liver
- Detected by touch (e.g., pulse points)
- Balance of hydrostatic/osmotic pressures
- Fluid movement out of capillaries
- Rhythmic artery expansion from heartbeats
15 Clues: Prevent backflow in veins • Blood flow through tissues • Fluid movement into capillaries • Force pulling fluid into vessels • Pores in fenestrated capillaries • Fluid movement out of capillaries • Force pushing fluid out of vessels • Arterial sites for pulse measurement • Osmotic pressure from plasma proteins • Capillary network connecting gut/liver • ...
Computer number system and Internet 2025-05-29
Across
- Number system that consists of 16 digits
- Also known as unethical hackers
- Using illegal methods to get money
- Code that a computer only understands
- A popular antivirus software
- Harming using information technology in a deliberate manner
- Attacked first and then forced to pay money to stop attacks
Down
- Number system that consists of 8 digits
- Illegal entry into a computer system
- Number system consisting of 10 digits
- A program that disrupts the normal functioning
- Program designed to protect networks and computers
- Misusing someone's personal information
- Hoaxing or misleading a person
- To conduct terrorism through computers and internet
15 Clues: A popular antivirus software • Hoaxing or misleading a person • Also known as unethical hackers • Using illegal methods to get money • Illegal entry into a computer system • Number system consisting of 10 digits • Code that a computer only understands • Number system that consists of 8 digits • Misusing someone's personal information • ...
Networking concept 2025-05-21
Across
- Network topology where devices are connected to a single cable
- Type of wireless networking technology
- Computer that provides services to other computers
- Type of networking cable
- Card that enables network connectivity
- Network topology where devices are connected in a circular configuration
- Metropolitan Area Network
Down
- Device that connects multiple devices in a network
- Computer that requests services from a server
- Network topology where devices are connected to a central device
- Device that connects multiple networks
- Type of network topology
- Device that forwards data packets
- Device that connects to the internet
- Local Area Network
15 Clues: Local Area Network • Type of network topology • Type of networking cable • Metropolitan Area Network • Device that forwards data packets • Device that connects to the internet • Type of wireless networking technology • Device that connects multiple networks • Card that enables network connectivity • Computer that requests services from a server • ...
pronoun crosswords 2022-03-03
Across
- an underground electric railroad.
- networks that exist 'between' each other.
- talk about with another person or group of people.
- the wall of a fruit
Down
- designed to detect and destroy computer viruses.
- predict or estimate
- detect and remove concealed microphones from
- include as a necessary part or result.
- occupy, attract, or involve
9 Clues: predict or estimate • the wall of a fruit • occupy, attract, or involve • an underground electric railroad. • include as a necessary part or result. • networks that exist 'between' each other. • detect and remove concealed microphones from • designed to detect and destroy computer viruses. • talk about with another person or group of people.
Crossword of Evan, Clément and Abel 2022-03-09
Across
- : (with a hyphen) Instagram, Snapchat, etc...
- : A journalist interviewing a person
- : (with a hyphen) Presenter of Late Night Show
- : unfortunate effect on public opinion
Down
- : The biggest media in England
- : act of informing the public
- : (with news) wrong information
- : 45th President of the United States
- : person who writes news articles
9 Clues: : act of informing the public • : The biggest media in England • : (with news) wrong information • : person who writes news articles • : A journalist interviewing a person • : 45th President of the United States • : unfortunate effect on public opinion • : (with a hyphen) Instagram, Snapchat, etc... • : (with a hyphen) Presenter of Late Night Show
Crossword of Evan, Clément and Abel 2022-03-09
Across
- : unfortunate effect on public opinion
- : 45th President of the United States
- : (with a hyphen) wrong information
- : person who writes news articles
Down
- : The biggest media in England
- : act of informing the public
- : (with a hyphen) Instagram, Snapchat, etc...
- : (with a hyphen) Presenter of Late Night Show
- : A journalist interviewing a person
9 Clues: : act of informing the public • : The biggest media in England • : person who writes news articles • : (with a hyphen) wrong information • : A journalist interviewing a person • : 45th President of the United States • : unfortunate effect on public opinion • : (with a hyphen) Instagram, Snapchat, etc... • : (with a hyphen) Presenter of Late Night Show
CRACKING THE CODE! 2025-08-17
Across
- Connections among people or systems.
- Information collected or stored.
- Exchange of actions or communication.
Down
- Video sharing and streaming platform.
- App for sharing temporary photos and videos.
- Social media for connecting and sharing with friends
- Photo and video sharing app.
- Connected to or using the internet.
- Platform for short messages and updates.
9 Clues: Photo and video sharing app. • Information collected or stored. • Connected to or using the internet. • Connections among people or systems. • Video sharing and streaming platform. • Exchange of actions or communication. • Platform for short messages and updates. • App for sharing temporary photos and videos. • Social media for connecting and sharing with friends
5.3 5.7 2020-04-14
Across
- outsourcing outside the home country
- enables the organization to focus on its core activity.Could help cut costs
- Existing transport networks for people and products
- the ones that are competing with you
- space needed
- simply to get started
- Skilled VS unskilled workers
- money that you pay to the government
- people who are not working
Down
- expand and follow the market
- , health and safety regulations
- when a business is round the world
- producing large quantities of a physical product
- what a business needs for raw materials
- the amount of money you have
- people that work on a company
- the amount it is needed or forced to pay
- payment workers receive
18 Clues: space needed • simply to get started • payment workers receive • people who are not working • expand and follow the market • the amount of money you have • Skilled VS unskilled workers • people that work on a company • , health and safety regulations • when a business is round the world • outsourcing outside the home country • the ones that are competing with you • ...
Sense Of Self 2014-02-18
Across
- Picking on someone
- Something imparted, interchanged or transmitted
- Mechanisms An adaptation to environmental stress that enhances control over behaviour
- The ability to effect other people
- Different from what it was before
- Connection between people
- Seeking or enjoying companionship of others
- The act of disturbing someone repeatedly
- Someone that is related to you
Down
- Friendly feeling or disposition
- to make defamatory statements about
- Associated with or related to others
- No like or equal
- Separates something
- Something that challenges
- Networks A group of people who provide emotional and practical help to someone in serious difficulty
- Character or nature, as belonging to or distinguishing a thing
- Confident, tending to assert yourself
18 Clues: No like or equal • Picking on someone • Separates something • Something that challenges • Connection between people • Someone that is related to you • Friendly feeling or disposition • Different from what it was before • The ability to effect other people • to make defamatory statements about • Associated with or related to others • Confident, tending to assert yourself • ...
inter- 2022-11-07
Across
- Andromeda v. Milky Way.
- To communicate and react to the people you're involved with.
- UO v. OSU.
- Money paid regularly at a particular rate for the use of money lent.
- Post-Act1 leg stretching time.
- Connection between networks.
- Insert words into a text, numbers into a chart...etc.
- Relating to a question.
Down
- To seize something before it gets to its destination.
- took an __________ flight to Spain.
- To twist together
- Translate language between to people.
- Trespass
- Please don't ________________ me while I'm studying.
- Hollywood and Vine.
- Having all parts linked.
- Between two or more offices.
- Gibbons v. Ogden dealt with this kind of commerce.
18 Clues: Trespass • UO v. OSU. • To twist together • Hollywood and Vine. • Andromeda v. Milky Way. • Relating to a question. • Having all parts linked. • Between two or more offices. • Connection between networks. • Post-Act1 leg stretching time. • took an __________ flight to Spain. • Translate language between to people. • Gibbons v. Ogden dealt with this kind of commerce. • ...
Networks and the Internet 2022-10-27
Across
- Is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network
- A computer that sits between different networks or applications
- a combination transmitter/receiver in a single package
- A type of computer network device that provides interconnection with other bridge networks that use the same protocol
Down
- a device that connects a computer to an integrated services digital network
- connects devices such as computers, printers, wireless access points in a network to each other
- A standard that defines the way in which Internet communications and other advanced services are provided on wireless mobile devices
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
8 Clues: a combination transmitter/receiver in a single package • A computer that sits between different networks or applications • a device that connects a computer to an integrated services digital network • connects devices such as computers, printers, wireless access points in a network to each other • ...
Social Changes 2023-05-09
Across
- a conversational style website that enables you to publish messages, news, knowledge or any other kind of information on the world wide web for everyone to see.
- one in which one spouse works full time and the other works at least part time.
- can be used for many different purposes, including to push products and services, spread news, raise brand awareness or to deliver a message to the masses.
- a great tool for quick informal chats or group chats. Social networks such as Google Hangouts and WhatsApp.
- refers to any significant alteration over time in behavior patterns, cultural values and norms.
- Private messaging through social networks
- he process whereby older people account for a proportionally larger share of the total population.
Down
- instantly allows both parties to hear the tones and emotions of the other caller and is one of the most commonly used communication tools.
- key to building relationships
- people of different ethnicities, sexual orientations, socioeconomic statuses, ages, genders, religions and other ways in which humans innately differ.
- traveling some distance between one's home and place of work on a regular basis.
- small bits of information that can be received and replied to at the recipient’s own leisure.
- enables both parties to see each other, allowing you to be able to read body language and facial expressions.
- the most popular way of communicating between businesses
14 Clues: key to building relationships • Private messaging through social networks • the most popular way of communicating between businesses • one in which one spouse works full time and the other works at least part time. • traveling some distance between one's home and place of work on a regular basis. • ...
Wellness Words 2022-05-11
Across
- something that effects you in the past that you still think of to this day
- stabilizes mood, well being and happiness
- blockage of blood supply to the brain
- regulators created by glands
- example of a anxiety disorder
- disease that reduces brain mass
- brought on by an immediate event
- networks in your brain changing
Down
- sleep cycle regulator
- what nervous system is Spinal Cord and Brain in
- a weakness in a blood vessel in the brain
- there are 5 stages of it
- saddened mood that impairs daily life
- fear of missing out
- putting yourself in their shoes
15 Clues: fear of missing out • sleep cycle regulator • there are 5 stages of it • regulators created by glands • example of a anxiety disorder • disease that reduces brain mass • putting yourself in their shoes • networks in your brain changing • brought on by an immediate event • blockage of blood supply to the brain • saddened mood that impairs daily life • ...
Unit 6 Personal Information Management Program 2019-12-02
Across
- Operating a business along or in a specific group
- Communication and data reception
- section Accepting input or longing information
- Appointements in person or in groups
Down
- Unit Data processing
- Reminder of data stored
- Networks that use communication and search for information
- Unit Data display or results display
- Searching the information on the internet
9 Clues: Reminder of data stored • Communication and data reception • Unit Data processing • Appointements in person or in groups • Searching the information on the internet • Operating a business along or in a specific group • Unit Data display or results display • Networks that use communication and search for information • ...
Digital World 2024-10-14
Across
- Someone who breaks into systems
- Abbreviation for Technology Integration Center
- A defensive measure against malicious traffic
- Software as a Service, often abbreviated
- A protective barrier for networks
Down
- Categories of individuals who hack
- Storage accessed via the internet
- THEFT A common type of cybercrime involving stealing personal info (13)
- Securitysoftware that scans for malware
9 Clues: Someone who breaks into systems • Storage accessed via the internet • A protective barrier for networks • Categories of individuals who hack • Securitysoftware that scans for malware • Software as a Service, often abbreviated • A defensive measure against malicious traffic • Abbreviation for Technology Integration Center • ...
Unit 1 Review puzzle 2025-04-30
Across
- the ability for the brain to change neural networks through growth and recorganization
- periodic, natural loss of consciousness
- gurt:
- upper; excites neural activity
- downer; dampens neural activity
Down
- Nervous System that connects nerves to
- nervous system that includes brain and spinal cord
- brain cell that transmits nerve signals
- hear,smell,touch,taste,sight
9 Clues: gurt: • hear,smell,touch,taste,sight • upper; excites neural activity • downer; dampens neural activity • Nervous System that connects nerves to • brain cell that transmits nerve signals • periodic, natural loss of consciousness • nervous system that includes brain and spinal cord • the ability for the brain to change neural networks through growth and recorganization
Chapter One Vocabulary 2017-11-29
Across
- Work in a new version.
- Multiple CPUs working on different tasks.
- The study of the technology.
- Writes computer code.
- Results similar to reality.
- Design the hardware used in computer systems.
- Writes the specifications for software.
- Protects computer networks.
- Based on the digits 0 through 9.
- A group of 8 Bits.
- The memory location in a CPU.
Down
- based on two digits.
- Predicts reality.
- The software in a computer.
- Otherwise known as Artificial Intelligence.
- Instructions that tell the hardware what to do.
- The physical parts of a computer.
- Short for binary digit.
18 Clues: Predicts reality. • A group of 8 Bits. • based on two digits. • Writes computer code. • Work in a new version. • Short for binary digit. • Results similar to reality. • The software in a computer. • Protects computer networks. • The study of the technology. • The memory location in a CPU. • Based on the digits 0 through 9. • The physical parts of a computer. • ...
Key Terms by Paul Tantillo 2013-09-20
Across
- someone who posts on a blog
- another web browser
- File Transfer _______
- program a program where you can email people
- selling items online
- Messaging also known as IM
- Address another name or set of numbers for your PC or a website. ex: 192.xxx.xxx
- software a user uses to access the internet
- yet, another browser.
Down
- personal website
- etiquette for the net
- a web browser
- world wide collection of networks
- list of favorite webpages
- :), :(, ;c, c;
- room room where people can chat
- name a special name that you type in for a website ex: www.NAME.com
- page page that loads up when you open your browser(default or voluntarily)
18 Clues: a web browser • :), :(, ;c, c; • personal website • another web browser • selling items online • etiquette for the net • File Transfer _______ • yet, another browser. • list of favorite webpages • Messaging also known as IM • someone who posts on a blog • room room where people can chat • world wide collection of networks • software a user uses to access the internet • ...
ict_crossword1 2015-09-15
Across
- to check files for a computer virus
- free antivirus software
- version ???????
- a collection of computer programs
- to isolate a virus-infected file
- Microsoft’s presentation software
- not free antivirus software
- another name (genus) for Japanese Keyaki tree
Down
- example: to email a copy of your presentation file
- presentation ??? by Garr Reynolds
- a moving pointer that indicates a position on a computer screen
- a group of 2 or more computers connected to each other electronically
- Apple’s browser software
- Command (⌘)-Shift-3
- Mac OS X 10.10.x software
- 1727GHJ-S is an example of this type of network
- a collection of computer networks connected together worldwide.
- 1000 megabytes
18 Clues: 1000 megabytes • version ??????? • Command (⌘)-Shift-3 • free antivirus software • Apple’s browser software • Mac OS X 10.10.x software • not free antivirus software • to isolate a virus-infected file • presentation ??? by Garr Reynolds • a collection of computer programs • Microsoft’s presentation software • to check files for a computer virus • ...
MP 2023-01-10
Across
- people that are grouped into project
- responsible for results
- technology building communications networks
- business operations channel
- to participate/involve
- to raise/uplift
- right to sell a good or service within a market
- the link between an employee's goal setting & performance
- stretch goal
Down
- scoring system designed to help employers measure employee satisfaction
- company's ability to profit from resources to achieve objectives
- the process of moving communication downward
- to become larger or greater over a period of time
- 2020 H2H Winners
- a person or business that buys & sell goods & services
- written agreement
- business of promoting or selling products & services
- number of employees who are assigned to a manager
18 Clues: stretch goal • to raise/uplift • 2020 H2H Winners • written agreement • to participate/involve • responsible for results • business operations channel • people that are grouped into project • technology building communications networks • the process of moving communication downward • right to sell a good or service within a market • ...
Emmas Technology crossword game. 2019-09-15
Across
- to generate a product
- connection with cords
- the smallest unit of data in a computer
- ability to share files and talk without face to face
- to question or search
- a physical or virtual appliance that passes information between two or more packet-switched computer networks
- display pictures and videos on devices using three colours
- the language only computers use which is a two digit system
- to work on a creation
Down
- something larger than a phone or tablet
- the ability to create and decorate
- connection without cords
- being able to work
- displaying digits
- to make or create
15 Clues: displaying digits • to make or create • being able to work • to generate a product • connection with cords • to question or search • to work on a creation • connection without cords • the ability to create and decorate • something larger than a phone or tablet • the smallest unit of data in a computer • ability to share files and talk without face to face • ...
Ethical hacking cross word puzzle 2025-10-31
Across
- Extracting detailed information from a target
- Malicious code that replicates itself
- Person who finds and exploits system vulnerabilities
- Security barrier between network and internet
- Gathering information about a target system
- Manipulating people to reveal confidential info
Down
- Code or method used to take advantage of a vulnerability
- Software designed to harm or exploit systems
- Weakness that can be exploited
- Fake emails used to steal information
- Process of converting data into unreadable code
- Software that secretly monitors user activity
- Identifying active hosts and open ports
- Attack that makes a system unavailable
- Self-replicating malware spreading through networks
15 Clues: Weakness that can be exploited • Fake emails used to steal information • Malicious code that replicates itself • Attack that makes a system unavailable • Identifying active hosts and open ports • Gathering information about a target system • Software designed to harm or exploit systems • Software that secretly monitors user activity • ...
World Wide Web 2016-02-24
9 Clues: No more than 5 images • A group of information • No more than 30 seconds • The main technology for LANs • Code used to create web pages • One of the four types of cache • Files that can be embedded in web pages • Sending and receiving occur at different • Networks that are not geographically close
Outcome 4 & 5 2013-02-25
Across
- electronic information that cant be sent from one computer to another
- gives information on travel details
- an advantage of the internet, readily available
Down
- slides giving information using Powerpoint
- faster meathod of travel over train
- travelling by car
- linkd to a server
- needed to claim on expences
- wriiten instruction for a bank to transfer money
9 Clues: travelling by car • linkd to a server • needed to claim on expences • faster meathod of travel over train • gives information on travel details • slides giving information using Powerpoint • an advantage of the internet, readily available • wriiten instruction for a bank to transfer money • electronic information that cant be sent from one computer to another
Bonus Distribution Crossword #1 2025-12-03
6 Clues: Temporary Endeavor • To take responsibility • Group working together • Standard of Excellence • The top priority at work • Abbreviation for Networks, Integration & Automation
Peer-to-peer server networks 2024-11-28
13 Clues: lisa- • tõhus • võrdne • jagatud • pakkuma • võimaldama • lähenemisviis • tekstitöötlemine • toetuma millelegi • pühendunud, pühendatud • kavandama, projekteerima • täielikult välja arendatud • sel ajal kui, samal ajal kui
Computer Homework! 2024-01-15
Across
- Transfer from different devices.
- Connects devices without a wire.
- A system of rules that must be followed in the correct order.
- A device that links computers together.
- A device that connects packet-switched networks.
- Transmission Control Protocol.
- Cables that connect to the internet.
- Someone's address.
- small segments of a larger message.
Down
- A computer program that provides service to devices.
- To interconnect computer devices.
- Electronic devices required for communication.
- Maximum data transmitted in a certain time.
- A vast network that connects different devices around the world.
- A cable that connects computers to the internet.
- A communication method.
16 Clues: Someone's address. • A communication method. • Transmission Control Protocol. • Transfer from different devices. • Connects devices without a wire. • To interconnect computer devices. • small segments of a larger message. • Cables that connect to the internet. • A device that links computers together. • Maximum data transmitted in a certain time. • ...
Science & Technological Progress 2025-11-27
Across
- reality – Technology that overlays digital images onto the real world.
- engineer(ing) – Modifying genes to change biological traits.
- – Conducting tests to discover something new.
- – A new idea, method, or device.
- – A major scientific discovery.
- – Science at the level of atoms and molecules.
- reality – A computer-generated 3D environment.
- – Protecting computer networks from attacks.
Down
- – Using machines to perform tasks without human input.
- – Technology dealing with robot design and use.
- exploration – Study and travel beyond Earth.
- – Highly advanced; modern.
- concerns – Moral issues linked to new technology.
- – Information used for analysis.
- – Technology applied to living organisms.
- (Artificial intelligence) – Machines that can think or learn.
16 Clues: – Highly advanced; modern. • – A major scientific discovery. • – Information used for analysis. • – A new idea, method, or device. • – Technology applied to living organisms. • exploration – Study and travel beyond Earth. • – Protecting computer networks from attacks. • – Conducting tests to discover something new. • – Science at the level of atoms and molecules. • ...
Cyber Bullying and Cyber safety 2024-08-20
6 Clues: - Bullying online • - Against bullies • - Being safe online • - Supporting bullies • - Connected computers share resources • - Sites that are accessed using a web brower
Internet and Network 2023-04-04
7 Clues: Wide area network • Local area network • Network of networks • Communication at the distance • First satallite launched by USSr • The first network created by US military • Modualte analog to digital signals to digital signals
ICT SYSTEMS JOLA 2023-11-09
8 Clues: DATA IS STORED • OPERATORS, USERS, MANAGERS • SPREADSHEETS, DATABASES, DPT • DATA IS CHANGED OR MANIPULATED • COMPUTERS, PRINTERS, DIGITAL CAMERAS • RADIO HAS ALSO ADOPTED THE DIGITAL TECHNOLOGY • A GLOBAL SYSTEM OF NETWORKS OF INTEGRATED SERVICES • A DEVICE USED TO SEND AND RECEIVE EXACT COPIES OF DOCUMENTS
Recap 2025-04-03
8 Clues: a type of learning • virtual influencer • AI that defeated Lee Sedol in GO • the foundation for AI transformation • Machine learning with neural networks • A supervised machine learning technique • tecnique used for grouping similar items • the process of preparing the data before feeding an ML model
Tech tuesday #3624 2024-06-17
Across
- Error in a program
- High-level programming language for web development
- Popular programming language known for its readability
- Standard markup language for creating web pages
- Network security system
Down
- Distributed version control system
- Stores data for quick access
- Device that forwards data packets between computer networks
8 Clues: Error in a program • Network security system • Stores data for quick access • Distributed version control system • Standard markup language for creating web pages • High-level programming language for web development • Popular programming language known for its readability • Device that forwards data packets between computer networks
Immigration and Urbanization 2023-11-29
Across
- Sociologist Barry _____ points out that our networks in school, work, and online now define our communities as much as our residential neighborhoods
- For the first time in human history, more than half of the world’s population lives in _____ areas
- Practice of outlining in red any sections of a city that were considered “risky” and rejecting loan applications in that area
- Chicago New York, and ______ have the highest levels of segregation between Black and white people
- The largest number of new immigrants come from India, Mexico, the Philippines, El Salvador, and ______
- Type of violence experienced by immigrants as a result of immigration policies.
- Migration of Whites out of central city neighborhoods and into suburban communities (2 words)
- The Great ______: Movement of millions of African Americans, from 1900 to 1970, into cities outside the south
Down
- Urban areas with at least 10 million people.
- A group that hold values and engage in activities that separate them from wider society
- Unique ways of life found in cities.
- Movement of products, services, and information across national and continental boundaries
- _____ Capital: Tight connections that people form with each other through organizations, civic life, and strong social ties
- Sociologist Claude ______ argues that cities generate new forms of community, such as subcultures
- Ethnic ______: Section of a city where the local culture and labor market are dominated by a single ethnic group
- More than ___ million African Americans left the south between 1900-1970
- Social _____: Various types of connections that individuals form with other people, no matter where they’re located (also a very good movie)
- _____ Cities: Major urban areas that serve as nodes for the worldwide network of economic activity
18 Clues: Unique ways of life found in cities. • Urban areas with at least 10 million people. • More than ___ million African Americans left the south between 1900-1970 • Type of violence experienced by immigrants as a result of immigration policies. • A group that hold values and engage in activities that separate them from wider society • ...
Computer Network Lingo 2024-10-15
Across
- A network that links computers/devices within a person's immediate vicinity.
- Network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
- Measures taken to protect a computer system against unauthorized access or attack.
- Connected to the Internet using signals transmitted by radio waves rather than over wires.
- Transmits data over a high-speed, high-bandwidth communication network.
- A measurement indicating the maximum capacity of the data transfer rate or capacity of a given network.
- Wireless Fidelity. A wireless networking technology that uses radio waves to provide wireless high-speed Internet.
- Basic unit of data that's grouped together and transferred over a computer network.
- A link between a plug or connector into a port or jack.
- Network that is wireless and spread over land areas called cells, each served by at least one tower.
Down
- A network that connects computer networks and computer facilities around the world.
- Connected to the Internet using a wire.
- Any data transmitted over a network that is for human interpretation.
- A way of scrambling data so that only authorized parties can understand the information.
- Open Systems Interconnection Model. A conceptual framework (7 layers) that describes how different computer systems communicate with each other inside a network.
- The act of identifying and then exploiting weaknesses in a network to gain unauthorized access to data.
- A computer network that extends over a large geographic area, usually connecting multiple local area networks (LANs).
- A collection of devices connected together in one physical location, such as a building, office, or home.
18 Clues: Connected to the Internet using a wire. • A link between a plug or connector into a port or jack. • Any data transmitted over a network that is for human interpretation. • Transmits data over a high-speed, high-bandwidth communication network. • A network that links computers/devices within a person's immediate vicinity. • ...
movie 2020-11-18
Across
- A performance index that counts the processed I/Os per second.
- Which establishes VPN tunnels between Spokes with dynamically variable public addresses in the Hub-Spoke model.
- If protected objects in the production center are unavailable due to disasters or faults, these protected objects can be quickly restored in the DR center by performing fault recovery.
- Serial Attached Small Computer System Interface
- two storage systems to process services simultaneously, establishing a mutual backup relationship.
- A protocol that defines how communication is implemented between an access point (AP) and an access controller (AC) and provides a universal encapsulation and transmission mechanism for the interoperation between the AP and the AC.
- An extensible markup language (XML) based network configuration and management protocol.
- Huawei-proprietary technology used to collect statistics about network traffic and export the statistics.
Down
- one kind of CPU architecture design, mainly used by Intel
- A technology that adds another layer of IEEE 802.1Q tag to the 802.1Q tagged packets entering the network.
- an intelligent data cache feature developed by Huawei
- Which are transmitted between two devices, and the device can judge the validity status of the peer device.
- The most commonly used QoS model on IP networks.
- A technology that allows a STA to move from an AP to another AP in the same ESS on a WLAN network with nonstop service transmission.
- A link layer protocol that transmits PPP datagrams through PPP sessions established over point-to-point connections on Ethernet networks.
15 Clues: Serial Attached Small Computer System Interface • The most commonly used QoS model on IP networks. • an intelligent data cache feature developed by Huawei • one kind of CPU architecture design, mainly used by Intel • A performance index that counts the processed I/Os per second. • ...
Business communications 2022-06-02
Across
- unprepared speaking
- socially accepted principle to follow made by society
- examples are words like “always” “never”
- people remember the last thing you do
- ends a sentence
- listening where you don’t process what they’re saying
- a set of words that completed a thought or fact
- people you have connections with
Down
- sentence that does not have punctuation
- social communication rules
- people remember the first thing you do
- listening where you processes what they’re saying
- listener has to draw a conclusion from what the speaker is saying
- used to join words
- sentence that doesn’t finish a whole thought properly
- Different words have different meanings for different people
- four zones of space
- denotes a pause
- avoid giving direct answers
19 Clues: ends a sentence • denotes a pause • used to join words • unprepared speaking • four zones of space • social communication rules • avoid giving direct answers • people you have connections with • people remember the last thing you do • people remember the first thing you do • sentence that does not have punctuation • examples are words like “always” “never” • ...
Wireless Networking(JG) 2023-03-28
Across
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Two Buildings need to connect to the same network, What type of wireless connection are they using?
- introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
- The First A in AAA protocols.
- The Last A in AAA protocols.
- A communication method that uses radio waves to transmit data from small circuit boards.
Down
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel. This results in slightly more than double the bandwidth.
- Wireless authentication method that uses a passphrase to authenticate users.
- implementation name for wireless security that adheres to the 802.11i specifications. It was introduced in 2004 and is still heavily used in today's networks
- A system is described by the number of sending and receiving antennas. The 802.11n specifications allow up to four sending and four receiving antennas.
- Encryption protocol used on most wireless networks today.
- The Second A in AAA protocols.
- was developed at MIT and is a key component of Windows Active Directory.It has three main components.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- has no authentication. It allows anyone to connect to the network.
18 Clues: The Last A in AAA protocols. • The First A in AAA protocols. • The Second A in AAA protocols. • Encryption protocol used on most wireless networks today. • has no authentication. It allows anyone to connect to the network. • Wireless authentication method that uses a passphrase to authenticate users. • ...
Singapore City Gallery Puzzle By NSFC 2025-05-17
Across
- ______ increases Singapore's land area and enhances costal and waterfront environments for housing, leisure, and recreation.
- Due to Singapore's land ___________, we often need to plan and decide between competing land uses.
- We can enhance ____________ in Singapore by conserving natural habitats to protect native flora and fauna in urban areas.
- Incinerating our _____ helps to reduce its volume by 90% and generates 2-3% of Singapore's electricity supply.
- A working city has an 'engine' comprising hidden infrastructural networks and ___ systems to meet essential needs of its residents
- Singapore aims to reduce ______ emissions to achieve net zero by around mid-century.
- City planners need to balance environment, economic and ______ considerations to create a sustainable Singapore.
- Conserving Singapore's built ____ is an important part of Singapore's present and future development and urban planning.
Down
- ____ and experts are invited to participate in focus groups and workshops to review the initial plans; their insights help us develop effective urban solutions together
- Singapore carries out two plan reviews regularly: the Long-Term Plan Review and the ______ Plan Review.
- ____ gardens give residents greater sense of ownership in their neighborhoods
- Singapore will be reclaiming 'Long Island' to protect Singapore against the impact of climate change such as ______ sea levels.
- Expanding the ____ networks by building _____ paths encourages active mobility and reduces carbon emissions
- Smart Nation harnesses ____ technologies to empower citizens and communities.
- By integrating ________ into our buildings, we are turning Singapore into a "City in Nature".
- Co-locating _______ nodes with other facilities and going underground enable seamless mobility while saving land.
- Desalination meets 30% of our _____ needs.
- Singapore is using cleaner ______ sources such as liquified natural gas, solar and even our waste.
18 Clues: Desalination meets 30% of our _____ needs. • ____ gardens give residents greater sense of ownership in their neighborhoods • Smart Nation harnesses ____ technologies to empower citizens and communities. • Singapore aims to reduce ______ emissions to achieve net zero by around mid-century. • ...
Owl Pellet 2023-02-28
7 Clues: Living • Non-Living • Multiple Communities • Networks in a food Web • The home or environment of an organism • One benefits one neither benefits nor harm • A animal or plant that a parasite or organism lives
Organelles 2020-08-21
Across
- green pigment
- organelles that are filled with digestive enzymes removes waste and invading bacteria
- extensive networks of membranes
- fluid filled organelle enclosed by a membrane
- captures light and energy
- largest organelle and houses the genetic information
- clear-like gel fluid inside cell suspends all organelles
- found in prokaryotic used for
Down
- rigid wall outside the plasma membrane
- make energy in form of ATP
- sorts proteins made by ribosomes
- them to needed places
- makes proteins made through “factories”
- found inside the nucleus; ribosomes are made here
- organelles that store things such as food
- stores food, sugar, water, waste products
16 Clues: green pigment • them to needed places • captures light and energy • make energy in form of ATP • found in prokaryotic used for • extensive networks of membranes • sorts proteins made by ribosomes • rigid wall outside the plasma membrane • makes proteins made through “factories” • organelles that store things such as food • stores food, sugar, water, waste products • ...
Topic 11 Islamic World 2023-05-19
Across
- Muslim house of worship
- Tradition of Muhammad
- Woven fabric
- Islamic code
- rulers of Muslim states
- A person many Buddhists believe to have reached enlightenment
- A person who moves from place to place without a permanent home
- Dedication,loyalty
Down
- A person believed to be chosen by God as a messenger
- sea-related trading networks
- Rulers who led the Muslim community and empire
- an Islamic lifestyle that stresses controlling ones desire
- The art of decorative writing
- Islam's holy book
- A place in the desert where water can be found
- A member of an Islamic religious group that supported Abu Bakr
16 Clues: Woven fabric • Islamic code • Islam's holy book • Dedication,loyalty • Tradition of Muhammad • Muslim house of worship • rulers of Muslim states • sea-related trading networks • The art of decorative writing • Rulers who led the Muslim community and empire • A place in the desert where water can be found • A person believed to be chosen by God as a messenger • ...
CSP Review BD 2025-05-02
Across
- from sender to receiver
- type of error when bits cannot handle the math
- type of error that's usually a boolean error
- set rules that specify behavior
- rich people have more access to technology
- not guaranteed to find optimal solution
- hiding details
- using arrays or lists to handle complex code
Down
- runs in a reasonable amount of time
- encryption techniques
- extra components used to alleviate failures
- finding best solution
- type of computing where the program is split into multiple computing operations
- unsanctioned access to secure networks through a wireless network
- max amount of data in a set time
- tasks being completed one after another
16 Clues: hiding details • encryption techniques • finding best solution • from sender to receiver • set rules that specify behavior • max amount of data in a set time • runs in a reasonable amount of time • not guaranteed to find optimal solution • tasks being completed one after another • rich people have more access to technology • extra components used to alleviate failures • ...
movie 2020-11-18
Across
- A performance index that counts the processed I/Os per second.
- Which establishes VPN tunnels between Spokes with dynamically variable public addresses in the Hub-Spoke model.
- If protected objects in the production center are unavailable due to disasters or faults, these protected objects can be quickly restored in the DR center by performing fault recovery.
- Serial Attached Small Computer System Interface
- two storage systems to process services simultaneously, establishing a mutual backup relationship.
- A protocol that defines how communication is implemented between an access point (AP) and an access controller (AC) and provides a universal encapsulation and transmission mechanism for the interoperation between the AP and the AC.
- An extensible markup language (XML) based network configuration and management protocol.
- Huawei-proprietary technology used to collect statistics about network traffic and export the statistics.
Down
- one kind of CPU architecture design, mainly used by Intel
- A technology that adds another layer of IEEE 802.1Q tag to the 802.1Q tagged packets entering the network.
- an intelligent data cache feature developed by Huawei
- Which are transmitted between two devices, and the device can judge the validity status of the peer device.
- The most commonly used QoS model on IP networks.
- A technology that allows a STA to move from an AP to another AP in the same ESS on a WLAN network with nonstop service transmission.
- A link layer protocol that transmits PPP datagrams through PPP sessions established over point-to-point connections on Ethernet networks.
15 Clues: Serial Attached Small Computer System Interface • The most commonly used QoS model on IP networks. • an intelligent data cache feature developed by Huawei • one kind of CPU architecture design, mainly used by Intel • A performance index that counts the processed I/Os per second. • ...
cyber ethics and security 2025-06-06
Across
- It is a law under which the owners are granted certain exclusive rights to ensure that the creator's hardwork is safe and protected from unauthorized copying and piracy.
- It is a wireless technology used to interconnect mobile phones, computers and printers.
- It refers to an illegal intrusion into a computer system or network.
- It is a combination of two terms, net and etiquette.
- You purchased a single licensed copy of the software and load it into several computers contrary to the license's terms.
- It refers to unwanted bulk emails that come from unknown sources.
- It connects two or more computers located at distant places.
- It is the criminal practice of using social influences over the telephone system, most often using VoIP.
Down
- This device connects two different types of networks with each other.
- It refers to criminal activities that involve the use of computers, networks and the internet connection with the intent to cause harm to individuals or their digital devices.
- It refers to a computer network restricted to an organization.
- These are unethical people who are experts in breaking into systems to steal important data.
- It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc. are connected and communicate with each other.
- It refers to the act of using or imitating the language and thoughts of another person as one's original work.
- It enables you to connect your computer to the available internet connection over the existing telephone lines.
15 Clues: It is a combination of two terms, net and etiquette. • It connects two or more computers located at distant places. • It refers to a computer network restricted to an organization. • It refers to unwanted bulk emails that come from unknown sources. • It refers to an illegal intrusion into a computer system or network. • ...
11 2020-11-18
Across
- A performance index that counts the processed I/Os per second.
- Which establishes VPN tunnels between Spokes with dynamically variable public addresses in the Hub-Spoke model.
- If protected objects in the production center are unavailable due to disasters or faults, these protected objects can be quickly restored in the DR center by performing fault recovery.
- Serial Attached Small Computer System Interface
- two storage systems to process services simultaneously, establishing a mutual backup relationship.
- A protocol that defines how communication is implemented between an access point (AP) and an access controller (AC) and provides a universal encapsulation and transmission mechanism for the interoperation between the AP and the AC.
- An extensible markup language (XML) based network configuration and management protocol.
- Huawei-proprietary technology used to collect statistics about network traffic and export the statistics.
Down
- one kind of CPU architecture design, mainly used by Intel
- A technology that adds another layer of IEEE 802.1Q tag to the 802.1Q tagged packets entering the network.
- an intelligent data cache feature developed by Huawei
- Which are transmitted between two devices, and the device can judge the validity status of the peer device.
- The most commonly used QoS model on IP networks.
- A technology that allows a STA to move from an AP to another AP in the same ESS on a WLAN network with nonstop service transmission.
- A link layer protocol that transmits PPP datagrams through PPP sessions established over point-to-point connections on Ethernet networks.
15 Clues: Serial Attached Small Computer System Interface • The most commonly used QoS model on IP networks. • an intelligent data cache feature developed by Huawei • one kind of CPU architecture design, mainly used by Intel • A performance index that counts the processed I/Os per second. • ...
Computer Crossword 2023-05-04
Across
- A panel of keys that operate a computer or typewriter.
- A loudspeaker is an electroacoustic transducer that converts an electrical audio signal into a corresponding sound.
- a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- A device having or operating with the aid of many small components, especially microchips and transistors, that control and direct an electric current
- A standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
- Facts and statistics collected together for reference or analysis.
- The programs and other operating information used by a computer.
- A small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions.
Down
- If a computer or a user is connected to the Internet, it is said to be "online".
- A value in a program that can change
- A computer monitor is an output device that displays information in pictorial or textual form.
- Sound, especially when recorded, transmitted, or reproduced.
- In computer networks, download means to receive data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar system.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
15 Clues: A value in a program that can change • A panel of keys that operate a computer or typewriter. • Sound, especially when recorded, transmitted, or reproduced. • The programs and other operating information used by a computer. • Facts and statistics collected together for reference or analysis. • ...
Unit 2: Global Networks and Interconnections 2020-09-21
Across
- the way new ideas, values and products are exposed to people
- higher grade iron ore
- The process of interaction and integration among people, companies and governments
- tinto company in the news recently
- care comment ms shepherd said to a member of staff that she shouldn't have
- the year of "Mabo"
Down
- encompasses the three pillars
- the most important factor for a business
- mass movement of goods on ships
- weeks left of year 11 (as of week 10)
- originally thought to be the animal of origin of COVID-19
- a word to describe ms shepherd
- current leader of COVID-19 deaths
- current pandemic
- industrialised countries which control and benefit from the global market
- a concept of business that is not formal but expected
- "Native Title Act (year)"
17 Clues: current pandemic • the year of "Mabo" • higher grade iron ore • "Native Title Act (year)" • encompasses the three pillars • a word to describe ms shepherd • mass movement of goods on ships • current leader of COVID-19 deaths • tinto company in the news recently • weeks left of year 11 (as of week 10) • the most important factor for a business • ...
English corssword 2023-11-20
Across
- A circuit board that contains components of a computer
- Synonymous of intelligence
- A program that protects your computer of malwares
- A type of software that allows users to access and view websites
- A form of communication to other humans
Down
- Physical components of a computer
- Superlative of good
- A device that displays images and text
- A system of interconnected computer networks
- "A gorilla is ________ than a mouse"
- A device that scans documents
11 Clues: Superlative of good • Synonymous of intelligence • A device that scans documents • Physical components of a computer • "A gorilla is ________ than a mouse" • A device that displays images and text • A form of communication to other humans • A system of interconnected computer networks • A program that protects your computer of malwares • ...
DEPARTMENT OF COMPUTER APPLICATIONS IN ASSOCIATION WITH IT CLUB (TECHIE TRIBE) IT WEEK CROSSWORD 2025-04-12
Across
- Collection of data stored in rows and columns.
- Binary digit.
- The brain of the computer.
- Network of networks.
- A mistake in a program's code.
- A sequence of instructions for a computer to execute.
- Device used to input text.
Down
- One of the most popular programming languages, known for simplicity and readability.
- The process of finding and fixing errors in programs.
- Language primarily used for web styling.
- Non-volatile storage device in computers.
11 Clues: Binary digit. • Network of networks. • The brain of the computer. • Device used to input text. • A mistake in a program's code. • Language primarily used for web styling. • Non-volatile storage device in computers. • Collection of data stored in rows and columns. • The process of finding and fixing errors in programs. • ...
Nature and Development of Information systems 2020-06-25
Across
- World Wide Web was created by ____ Berners-Lee
- These systems make use of information technology to help managers ensure a smooth and efficient running of the organization.
- raw,unorganized facts
- a network operating like the World Wide Web (www)
- Physical computer equipments and associate device, machines and media
- organized collection of facts of information
- ________Second Era
- the most important elements of computer-based information systems
Down
- First Era
- is a group of data that collectively carry a logical meaning
- called the Computing-Tabulating-Recording Company.
- communications media and network support
- programs and procedures
- ______ COmputing, Fourth Era
- __________COMPUTING, Fifth era
- ________cards Joseph Marie Charles Jacquard
16 Clues: First Era • ________Second Era • raw,unorganized facts • programs and procedures • ______ COmputing, Fourth Era • __________COMPUTING, Fifth era • communications media and network support • ________cards Joseph Marie Charles Jacquard • organized collection of facts of information • World Wide Web was created by ____ Berners-Lee • ...
Topic 11 Islamic World 2023-05-19
Across
- Muslim house of worship
- Tradition of Muhammad
- Woven fabric
- Islamic code
- rulers of Muslim states
- A person many Buddhists believe to have reached enlightenment
- A person who moves from place to place without a permanent home
- Dedication,loyalty
Down
- A person believed to be chosen by God as a messenger
- sea-related trading networks
- Rulers who led the Muslim community and empire
- an Islamic lifestyle that stresses controlling ones desire
- The art of decorative writing
- Islam's holy book
- A place in the desert where water can be found
- A member of an Islamic religious group that supported Abu Bakr
16 Clues: Woven fabric • Islamic code • Islam's holy book • Dedication,loyalty • Tradition of Muhammad • Muslim house of worship • rulers of Muslim states • sea-related trading networks • The art of decorative writing • Rulers who led the Muslim community and empire • A place in the desert where water can be found • A person believed to be chosen by God as a messenger • ...
ICT game 2021-11-25
Across
- the parts of a computer you can touch
- blocks that make up an image
- a commonly used electronic device
- making sure you are protected from harm or danger
- it has to be converted into digital in oder to be saved on a computer
- an image format that uses pixels
- connecting to the internet
- when someone gains a young persons trust with the intention of violating them
Down
- and image format used for clipart
- a complicated system
- displaying signals or data
- when things work together
- you can listen to it
- the programing of a computer
- using numbers to represent data
- another name for a picture
16 Clues: a complicated system • you can listen to it • when things work together • displaying signals or data • another name for a picture • connecting to the internet • blocks that make up an image • the programing of a computer • using numbers to represent data • an image format that uses pixels • and image format used for clipart • a commonly used electronic device • ...
ai jargon 2025-09-23
Across
- A system trained on data
- Software layer connecting GPU to system
- A deep learning framework in Python
- A unit of text used in language models
- A group of samples processed together
- When many values in a model are zero
- Operation in convolutional networks
- Sequence of tasks handled by a GPU
Down
- Extra values added to standardize input sizes
- A level of computation in a neural net
- Field of AI focused on images
- One full pass of training data
- A learned parameter in a neural network
- Grid of numbers used in computation
- Random variation added to data
- To cut away unnecessary connections in a network
16 Clues: A system trained on data • Field of AI focused on images • One full pass of training data • Random variation added to data • Sequence of tasks handled by a GPU • A deep learning framework in Python • Grid of numbers used in computation • Operation in convolutional networks • When many values in a model are zero • A group of samples processed together • ...
Wireless 2023-03-28
Across
- is an open standard protocol used to authenticate users onto a network.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Secure authentication method for wired and wireless networks.
- multiple-output An enhancement that allows multiple antennas to use the same radio frequency.
- IEEE designation for all wireless networking standards.
- Wireless authentication method that uses a passphrase to authenticate users.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- A method that combines channels into one to increase bandwidth.
- Wireless network that requires no authentication.
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
Down
- was developed by Cisco to address security concerns in RADIUS.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
- s a key component of Windows Active Directory. has three main components:
- was introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies. Instead of using the pre-shared key, WPA3 implements the Simultaneous Authentication of Equals (SAE) standard.
18 Clues: Wireless network that requires no authentication. • IEEE designation for all wireless networking standards. • Secure authentication method for wired and wireless networks. • was developed by Cisco to address security concerns in RADIUS. • A method that combines channels into one to increase bandwidth. • ...
Wireless Networking(JG) 2023-03-28
Across
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Two Buildings need to connect to the same network, What type of wireless connection are they using?
- introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
- The First A in AAA protocols.
- The Last A in AAA protocols.
- A communication method that uses radio waves to transmit data from small circuit boards.
Down
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel. This results in slightly more than double the bandwidth.
- Wireless authentication method that uses a passphrase to authenticate users.
- implementation name for wireless security that adheres to the 802.11i specifications. It was introduced in 2004 and is still heavily used in today's networks
- A system is described by the number of sending and receiving antennas. The 802.11n specifications allow up to four sending and four receiving antennas.
- Encryption protocol used on most wireless networks today.
- The Second A in AAA protocols.
- was developed at MIT and is a key component of Windows Active Directory.It has three main components.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- has no authentication. It allows anyone to connect to the network.
18 Clues: The Last A in AAA protocols. • The First A in AAA protocols. • The Second A in AAA protocols. • Encryption protocol used on most wireless networks today. • has no authentication. It allows anyone to connect to the network. • Wireless authentication method that uses a passphrase to authenticate users. • ...
5-3 B, C 2023-04-20
Across
- The objective of this step is the closing of security gaps.
- The assessment of critical servers, which may be vulnerable to attacks if not adequately tested or not generated from a tested machine image.
- are software packages used on information systems or networks to scan looking for weaknesses like open port exploitations, weak passwords, and security configuration errors leading to potential misuse and abuse.
- It performs configuration scans of servers, network devices and databases to test for specific policy settings and can check internal security policy compliance. Nessus® can perform scans of ports, firewall configurations, network devices (i.e. routers, switches, etc.), and provides reports back to the system administrator.
- The identifying of security vulnerabilities in web applications and their source code by automated scans on the front-end or static/dynamic analysis of source code.
- Monitors the network in real-time, continuously looking for new hosts, applications and new vulnerabilities without requiring the need for active scanning.
- The objective of this step is the prioritizing of vulnerabilities
- provides network administrators and security personnel with mechanisms to prevent, detect, track, report, and remediate malicious computer-related activities and incidents across all Department of Defense (DoD) networks and information systems.
Down
- The assessment of policies and practices to prevent unauthorized access to private or public networks and network-accessible resources.
- The objective of this step is to identify the source and root cause of the vulnerabilities identified in step one.
- The assessment of databases or big data systems for vulnerabilities and misconfigurations, identifying rogue databases or insecure dev/test environments, and classifying sensitive data across an organization’s infrastructure.
- tool automatically identifies configuration vulnerabilities threatening the security of the DoD's computer systems
- is designed to support a faster pace of system updating and patch management for our network connected Windows devices. Quick and efficient delivery of high and critical security updates will ensure that you meet your compliance deadlines for TCNO and MTO’s.
- Single console access used by ACAS managing Nessus® scans at the enterprise network level. Security Center provides real-time detection of network anomalies and is scalable, meaning it can grow to accommodate as many scanners as needed to cover the entire network
- A DoD information system used to record, track, and disseminate critical vulnerability information throughout the DoD Enterprise network.
- The objective of this step is to draft a comprehensive list of an application’s vulnerabilities.
16 Clues: The objective of this step is the closing of security gaps. • The objective of this step is the prioritizing of vulnerabilities • The objective of this step is to draft a comprehensive list of an application’s vulnerabilities. • The objective of this step is to identify the source and root cause of the vulnerabilities identified in step one. • ...
Inter prefix words 2024-01-11
8 Clues: - between nations • - connected networks • - to move between cities • - to move between galaxies • - overlapping or fitting together • - relate or connect to one another • - act in such a way as to have an effect on each other. • - coming between two things in time, place, character, etc
Lesson 2 2022-09-09
Across
- Change their way of life
- 70,000 years ago when thick sheets of ice spread across large regions of Earth
- A closely interconnected group of people or things
- The place early humans originated from
- Having many related parts, not simple
Down
- Modern human
- When people leave their homeland to live somewhere else
- First hominin to bury their dead.
- A way early people killed animals for food.
- Surroundings
10 Clues: Modern human • Surroundings • Change their way of life • First hominin to bury their dead. • Having many related parts, not simple • The place early humans originated from • A way early people killed animals for food. • A closely interconnected group of people or things • When people leave their homeland to live somewhere else • ...
mypuzz 2018-02-21
Across
- Is an example of hardware assisted virtualization
- memory migration uses
- Upper level of abstraction of virtualization is
Down
- are interconnected by virtual private networks
- Intel performs Memory virtualization using
- Needs to modify the guest operating systems
- Is an example of deployment model
- How many types of dimensions exists in Cloud Cube Model?
- Is an open source hypervisor program.
- In Paravirtualization guest OS runs at
10 Clues: memory migration uses • Is an example of deployment model • Is an open source hypervisor program. • In Paravirtualization guest OS runs at • Intel performs Memory virtualization using • Needs to modify the guest operating systems • are interconnected by virtual private networks • Upper level of abstraction of virtualization is • ...
Population and phone lines 2023-09-26
Across
- Tools, systems, and methods used to solve problems
- Arrangement of something across space
- Number of people living in a place
- Telephone lines that run through underground cables
- Ability to obtain or make use of something
Down
- Portable telephones that use cellular networks
- Telecommunication lines linking two or more points
- Process of sharing information
- Compactness of population in a place
- Arrangements of objects across space
10 Clues: Process of sharing information • Number of people living in a place • Compactness of population in a place • Arrangements of objects across space • Arrangement of something across space • Ability to obtain or make use of something • Portable telephones that use cellular networks • Telecommunication lines linking two or more points • ...
Cyber Security 2024-10-08
Across
- Digital systems and the online world
- Process of identifying a user's identity
- Technology allows us to access files through IE
- Used by hackers to obtain sensitive information
Down
- Limits access to private networks
- Method of protecting sensitive information
- Copy of a system or the network to protect data
- Software designed to detect malware infections
- Causes damaged on computers
- Small files stored on a computer
10 Clues: Causes damaged on computers • Small files stored on a computer • Limits access to private networks • Digital systems and the online world • Process of identifying a user's identity • Method of protecting sensitive information • Software designed to detect malware infections • Copy of a system or the network to protect data • Technology allows us to access files through IE • ...
Network Architecture B 2019-03-12
Across
- Logic Link Control
- ring communication protocol for LAN's
- Network System switches data among physical layer protocols
- connects two or more networks
- Memory Access Responsible for transferring data to/from the link adapter
- Transmission control protocol
- Layer Presentation of exchanged data in formats that can be consumed by the application layer
- switches data among stacks at the transport layer
Down
- switches data among stacks at the DLC Layer
- Unit For storing information including network packets
- Local Area Network
- requirements characteristics of the network overall
- layer end to end communication
- requirements characteristics of network applications and services
- Protocol Define communication methods
- Internet Protocol
- System specialized support
- Media Access Control
- Link Control establishes point to point communication
19 Clues: Internet Protocol • Logic Link Control • Local Area Network • Media Access Control • System specialized support • connects two or more networks • Transmission control protocol • layer end to end communication • ring communication protocol for LAN's • Protocol Define communication methods • switches data among stacks at the DLC Layer • ...
computer science 2019-03-07
Across
- Address Every device on the internet has one
- Poor network performance can come out of this
- A computer networking protocol
- Network that uses radio waves to transmit data
- Optic Transmits data through light
- The measure of capacity of a communications channel
- Lengths of wires that transfer signals and data
Down
- rate Amount of which a packet is resent
- Used to transmit data over networks
- Data sent simultaneously from different computers
- An agreed method of communication used within the network
- URL of a particular website
12 Clues: URL of a particular website • A computer networking protocol • Optic Transmits data through light • Used to transmit data over networks • rate Amount of which a packet is resent • Address Every device on the internet has one • Poor network performance can come out of this • Network that uses radio waves to transmit data • Lengths of wires that transfer signals and data • ...
computer science 2019-09-12
Across
- digital devices that takes a single pictures
- a copy of a file or set of files
- is like the brain of the pc
- you can connect a device
- one dot on a screen
Down
- main memory violated memory that is erased when the power is turned off
- place in a computer case to put drives and other devices
- it turns on the computer
- connects several networks
- its for if you have a older printer
- part that reads dics
- it connects printers
12 Clues: one dot on a screen • part that reads dics • it connects printers • it turns on the computer • you can connect a device • connects several networks • is like the brain of the pc • a copy of a file or set of files • its for if you have a older printer • digital devices that takes a single pictures • place in a computer case to put drives and other devices • ...
Computer Parts 2022-03-31
Across
- computer's hardware that processes and compares data
- display screen
- receives and sends data on computer networks
- the physical parts of a computer
- the system that allows hardware to communicate with software
- Most commonly used type of secondary storage
Down
- servers where data can be stored
- main circuit board inside a computer
- Programs that tell a computer what to do
- program designed to destroy computer data
- Stands Stores data and instructions while the computer is working
- wireless technology that uses radio waves
12 Clues: display screen • servers where data can be stored • the physical parts of a computer • main circuit board inside a computer • Programs that tell a computer what to do • program designed to destroy computer data • wireless technology that uses radio waves • receives and sends data on computer networks • Most commonly used type of secondary storage • ...
Tier 3 words 2025-11-16
Across
- Check or prove if it's correct
- A end or resolution reached after thoughts
- Steps to follow to solve the question
- something to pass on from one person to a another
- An idea of the amount, number or value
- A system on the computer, ipad or phone.
- Share or exchange information, news or ideas
Down
- A order to follow a list
- Operated by a large vehicle
- Relating to a particular or arts craft
- Facts collected together
- A process of building something
12 Clues: A order to follow a list • Facts collected together • Operated by a large vehicle • Check or prove if it's correct • A process of building something • Steps to follow to solve the question • Relating to a particular or arts craft • An idea of the amount, number or value • A system on the computer, ipad or phone. • A end or resolution reached after thoughts • ...
E-Commerce - Technologies required for an e-commerce system 2013-08-18
6 Clues: A handshake • Website language • A compnany that does • A company that doesnt • A collection of networks connected • A collection of connected computers
Unit 2: Global Networks and Interconnections 2020-09-21
Across
- industrialised countries which control and benefit from the global market
- The process of interaction and integration among people, companies and governments
- a word to describe ms shepherd
- weeks left of year 11 (as of week 10)
- encompasses the three pillars
- company in the news recently
- the year of "Mabo"
Down
- mass movement of goods on ships
- comment ms shepherd said to a member of staff that she shouldn't have
- current leader of COVID-19 deaths
- higher grade iron ore
- the most important factor for a business
- originally thought to be the animal of origin of COVID-19
- the way new ideas, values and products are exposed to people
- current pandemic
- a concept of business that is not formal but expected
- "Native Title Act (year)"
17 Clues: current pandemic • the year of "Mabo" • higher grade iron ore • "Native Title Act (year)" • company in the news recently • encompasses the three pillars • a word to describe ms shepherd • mass movement of goods on ships • current leader of COVID-19 deaths • weeks left of year 11 (as of week 10) • the most important factor for a business • ...
The Internet and Education 2021-06-04
7 Clues: Secretiv country • This network of networks • Traditional transmission signal • network that covers a limited area • A form of communication at a distance • A device that modulates and demodulates • a pool of computer connected to each other
peer-to-peer 2023-02-13
7 Clues: computer in a p2p network • all peers same permissions • difficult to recover on p2p • not needed in a p2p network • advantage of no central server • something p2p networks can lack • can be transferred between peers
The Internet!🖥 2023-09-21
7 Clues: machinery • World Wide Web • Medical imaging • Provides Input, Output, or both. • Provides resources, data, and services. • Allows 2 or more devices to communicate with each other • Device that connects two or more packet-switched networks
Shelley Shepherd 2014-03-31
Across
- duplicate of content on a storage medium
- complete power failure
- any application that combines text with media
- internet-capable phone
- prolonged undervoltage
- restore a file to its original form
- equal to approximately one million characters
- joins a cable to a port
Down
- electronic document on the web
- access media content while it downloads
- the amount of data that can travel over a network
- tool that removes a program
- process of encoding data
- a small text file that a web server stores on your computer
- someone who accesses computers or networks illegally with malicious intent
- online or internet-based illegal acts
16 Clues: complete power failure • internet-capable phone • prolonged undervoltage • joins a cable to a port • process of encoding data • tool that removes a program • electronic document on the web • restore a file to its original form • online or internet-based illegal acts • access media content while it downloads • duplicate of content on a storage medium • ...
Topic 11 Islamic World 2023-05-19
Across
- Muslim house of worship
- Tradition of Muhammad
- Woven fabric
- Islamic code
- rulers of Muslim states
- A person many Buddhists believe to have reached enlightenment
- A person who moves from place to place without a permanent home
- Dedication,loyalty
Down
- A person believed to be chosen by God as a messenger
- sea-related trading networks
- Rulers who led the Muslim community and empire
- an Islamic lifestyle that stresses controlling ones desire
- The art of decorative writing
- Islam's holy book
- A place in the desert where water can be found
- A member of an Islamic religious group that supported Abu Bakr
16 Clues: Woven fabric • Islamic code • Islam's holy book • Dedication,loyalty • Tradition of Muhammad • Muslim house of worship • rulers of Muslim states • sea-related trading networks • The art of decorative writing • Rulers who led the Muslim community and empire • A place in the desert where water can be found • A person believed to be chosen by God as a messenger • ...
CTP - Crossword The Puzzle! 2025-10-23
Across
- Redundant copy kept for recovery
- Deceptive lure to steal credentials
- Converts readable data into cipher text
- Code that leverages a flaw to gain access
- Unplanned event that disrupts normal operations
- Malicious software that harms systems
- Malware that encrypts files for payment
- Scientific analysis of evidence after an event
- Weakness that an attacker can exploit
- Highest-privileged user role
Down
- Process that verifies a user’s claimed identity
- Network of hijacked machines under one controller
- Network barrier that filters unwanted traffic
- Malware that secretly harvests user data
- Malicious program disguised as legitimate
- On-demand remote computing environment
- Login method with two-plus factors (abbr.)
- Proof of identity used to log in
- Traffic-filtering barrier between networks
- Encrypted tunnel over public networks (abbr.)
20 Clues: Highest-privileged user role • Redundant copy kept for recovery • Proof of identity used to log in • Deceptive lure to steal credentials • Malicious software that harms systems • Weakness that an attacker can exploit • On-demand remote computing environment • Converts readable data into cipher text • Malware that encrypts files for payment • ...
computers networks Unit-1 2014-06-12
Across
- Terminators are used in ______ topology.
- Network cable lies on _____ layer.
- If a computer on the network shares resources for others to use, it is called ____
- In OSI network architecture, the routing is performed by ………….. layer
Down
- What is the central device in star topology?
- Print server uses ________ which is a buffer that holds data before it is send to the printer.
- In OSI network architecture, the dialogue control and token management are responsibility of ………….. layer
- In _____ topology, if a computer’s network cable is broken, whole network goes down.
- For large networks, _______ topology is used.
9 Clues: Network cable lies on _____ layer. • Terminators are used in ______ topology. • What is the central device in star topology? • For large networks, _______ topology is used. • In OSI network architecture, the routing is performed by ………….. layer • If a computer on the network shares resources for others to use, it is called ____ • ...
Training 2020-05-15
Across
- New proxy environment
- component needed to go to access.statestreet.com
- Tool in which each agent must claim their weekly hours for the current wee
- is a program or software installed on a compute
- environment that we must access to work
- application similar to whatsApp that ibm employees use
- First time installations, new requests
Down
- Computer hasn't connected to the networks in 3+ days
- chat application
- Detects suspicious drive activity
- runs commands
11 Clues: runs commands • chat application • New proxy environment • Detects suspicious drive activity • environment that we must access to work • First time installations, new requests • is a program or software installed on a compute • component needed to go to access.statestreet.com • Computer hasn't connected to the networks in 3+ days • ...
Remote Learning Crossword 2020-10-30
Across
- A program that causes harm to your device
- A shortened form of a word or phrase
- The correct way to communicate online
- Programs used by a device
Down
- To solve a problem
- Bullying someone online
- Wireless connection to the internet
- The link between the internet and a network
- Intended for one person or group and no one else
- To install software on your device
- The worldwide system of computer networks
11 Clues: To solve a problem • Bullying someone online • Programs used by a device • To install software on your device • Wireless connection to the internet • A shortened form of a word or phrase • The correct way to communicate online • A program that causes harm to your device • The worldwide system of computer networks • The link between the internet and a network • ...
Chasing vermeer #3 2022-05-05
Across
- forget or not notice things
- a organization that's ofen educational
- copying something
- a thing that has five squares that make up a polygon
- a mood that is mostly romance or mystery
Down
- finishing something instantly
- a maze of complicated networks of tunnels and paths
- a accusation that someone is guilty of something
- makes a lot of sense
- try to impress someone by making yourself seem more important
- to many to count
11 Clues: to many to count • copying something • makes a lot of sense • forget or not notice things • finishing something instantly • a organization that's ofen educational • a mood that is mostly romance or mystery • a accusation that someone is guilty of something • a maze of complicated networks of tunnels and paths • a thing that has five squares that make up a polygon • ...
Chasing vermeer #3 2022-05-05
Across
- forget or not notice things
- a organization that's ofen educational
- copying something
- a thing that has five squares that make up a polygon
- a mood that is mostly romance or mystery
Down
- finishing something instantly
- a maze of complicated networks of tunnels and paths
- a accusation that someone is guilty of something
- makes a lot of sense
- try to impress someone by making yourself seem more important
- to many to count
11 Clues: to many to count • copying something • makes a lot of sense • forget or not notice things • finishing something instantly • a organization that's ofen educational • a mood that is mostly romance or mystery • a accusation that someone is guilty of something • a maze of complicated networks of tunnels and paths • a thing that has five squares that make up a polygon • ...
Unit 5 Lab 2021-10-25
Across
- Vessels that return blood to the heart
- Abbreviation for blood
- Networks of small vessels that perfuse Tissues
- also known as high blood pressure
- also referred to as an E.K.G.
- Brings air into the blood stream
- Test A diagnostic tool that requires exercise
- Abbreviation for Chest X-Ray
- Attack Sudden and sometimes fatal occurrence of coronary thrombosis
- Vessels that delivers blood to tissues
- Abbreviation for Congestive Heart Failure
- Inflammation of the heart muscle
Down
- Inflammation on the inner lining of the chambers and valves
- Removal of tissue to examine for disease
- Abbreviation for Coronary Pressure
- Cancer Variations of this disease includes small cells and big cells
- Pumps blood through the system.
- Abbreviation for electrocardiogram
- Imaging using sound waves
- X-ray Imaging using radiation
20 Clues: Abbreviation for blood • Imaging using sound waves • Abbreviation for Chest X-Ray • also referred to as an E.K.G. • X-ray Imaging using radiation • Pumps blood through the system. • Brings air into the blood stream • Inflammation of the heart muscle • also known as high blood pressure • Abbreviation for Coronary Pressure • Abbreviation for electrocardiogram • ...
CROSSWORD 2025-10-21
Across
- Element used to make semiconductor devices
- Ratio of output to input power, measured in log scale
- Device that isolates networks
- Process of combining signal with carrier
- System that allows embedded devices to communicate via the Internet
- Wireless communication standard after 4G
- Software embedded in hardware
- Scientist who formulated electromagnetic theory
- Amplifier type using optical gain
- Range of frequencies available for data transfer
- Material with high dielectric strength
Down
- Converts signal from one form to another
- The smallest unit of digital information
- Instrument used to view waveform signals
- Scientist who invented radio
- Fiber optic testing instrument
- A two-terminal variable resistor
- Logical circuit implementing basic Boolean functions
- Device that allows current only in one direction
19 Clues: Scientist who invented radio • Device that isolates networks • Software embedded in hardware • Fiber optic testing instrument • A two-terminal variable resistor • Amplifier type using optical gain • Material with high dielectric strength • Converts signal from one form to another • The smallest unit of digital information • Instrument used to view waveform signals • ...
Recap-session6 2025-04-03
8 Clues: a type of learning • virtual influencer • AI that defeated Lee Sedol in GO • the foundation for AI transformation • Machine learning with neural networks • A supervised machine learning technique • tecnique used for grouping similar items • the process of preparing the data before feeding a model
Complete the crossword puzzle below 2021-11-12
Across
- groups files together
- a machine that prints onto a paper
- a person who has access to the Internet
- a computer paper that has text
- a portable computer
Down
- a device that controls the operations on the PC
- a device which operates the PC by keys
- a network connecting smaller networks everywhere
- a group of pages that give some information
- a screen that shows pictures/other information
10 Clues: a portable computer • groups files together • a computer paper that has text • a machine that prints onto a paper • a device which operates the PC by keys • a person who has access to the Internet • a group of pages that give some information • a screen that shows pictures/other information • a device that controls the operations on the PC • ...
Developing Network Security Strategies and Network Management Strategies 2021-12-18
Across
- A protocol that identify devices and monitor their performance
- There is how many network management components?
- Management process that keep track of the network used by department
- Is asset important in network security?
- Protocol used for remote authentication
Down
- How many components of security policies exist ?
- Encryption often used for vpn
- Performance metric
- Short form of remote monitoring
- Enforces security policies at the boundary between networks
10 Clues: Performance metric • Encryption often used for vpn • Short form of remote monitoring • Is asset important in network security? • Protocol used for remote authentication • How many components of security policies exist ? • There is how many network management components? • Enforces security policies at the boundary between networks • ...
Compute Networking 2021-05-06
Across
- what does ‘L’ represent in LAN?
- What does ‘D’ represent in CSMA/CD?
- What does ‘s’ represent in CSMA?
- What does ‘c’ represent in CSMA?
- What does ‘M’ represent in CSMA?
- a............ connects two dissimilar computer networks.
Down
- What is meaning of ALOHA in hawai?
- one who access data from server is called.....
- What does ‘A’ represent in CSMA?
- what does ‘i’ represent in IEEE?
10 Clues: what does ‘L’ represent in LAN? • What does ‘A’ represent in CSMA? • what does ‘i’ represent in IEEE? • What does ‘s’ represent in CSMA? • What does ‘c’ represent in CSMA? • What does ‘M’ represent in CSMA? • What is meaning of ALOHA in hawai? • What does ‘D’ represent in CSMA/CD? • one who access data from server is called..... • ...
Concept of Routing: The Crossword Puzzle 2016-01-13
Across
- Station in a computer network
- Computer network: electronic pathway
- Layer in which router is used
- Building maps and giving directions
- Agreement between two parties as to how information is to be transmitted
- Moving packets between interfaces according to the “directions”
- Physical connection that allows two computers to communicate
Down
- Device that forwards data between computer networks
- Routers which exchange routing information
- Computer-network connection
- Routing in which routes change more quickly
- Routing in which routes change slowly over time
12 Clues: Computer-network connection • Station in a computer network • Layer in which router is used • Building maps and giving directions • Computer network: electronic pathway • Routers which exchange routing information • Routing in which routes change more quickly • Routing in which routes change slowly over time • Device that forwards data between computer networks • ...
IT Keywords 2019-07-10
Across
- is another word for information
- to project music or sound
- shows what is happening on the computer
- used to connect devices in a LAN
- you type on it
- an electrical line to help connect things
Down
- outer shell of the motherboard. usb ports.
- it likes cheese and squeaks
- you use it to capture photos
- sends data between computers on the same network
- sends data networks and is needed to connect things
11 Clues: you type on it • to project music or sound • it likes cheese and squeaks • you use it to capture photos • is another word for information • used to connect devices in a LAN • shows what is happening on the computer • an electrical line to help connect things • outer shell of the motherboard. usb ports. • sends data between computers on the same network • ...
CYSIAM Crossword 2025-08-05
Across
- Malicious software
- A network of infected devices
- Type of attack where services are overwhelmed (abbreviation)
- Hides data from unauthorised users
- Unauthorised access to systems or networks
- Encrypted communication channel (abbreviation)
Down
- Code flaw that can be exploited
- A secret word or phrase used to gain access
- The practice of protecting systems and data
- A program that replicates itself and spreads
- A scam where attackers trick users into giving up information
11 Clues: Malicious software • A network of infected devices • Code flaw that can be exploited • Hides data from unauthorised users • Unauthorised access to systems or networks • A secret word or phrase used to gain access • The practice of protecting systems and data • A program that replicates itself and spreads • Encrypted communication channel (abbreviation) • ...
Malicious Programs 2022-03-17
Across
- copying itself and spreads to other computers
- holds comp. captive demanding ransom
- short for advertising supported software
- horse disguises itself as a normal file
- spreads over networks by exploiting op. systems
- created to automatically perform specific operations
Down
- electronic sending of mass unsolicited messages
- spying on user activity without their knowledge
- remotely access or control without being detected
- broad term refers to variety of malicious prog.
- flaw produces an undesired outcome
11 Clues: flaw produces an undesired outcome • holds comp. captive demanding ransom • horse disguises itself as a normal file • short for advertising supported software • copying itself and spreads to other computers • electronic sending of mass unsolicited messages • spying on user activity without their knowledge • broad term refers to variety of malicious prog. • ...
Concept of Routing: The Crossword Puzzle 2016-01-13
Across
- Routing in which routes change more quickly
- Routers which exchange routing information
- Agreement between two parties as to how information is to be transmitted
- Computer network: electronic pathway
- Device that forwards data between computer networks
- Layer in which router is used
- Station in a computer network
Down
- Physical connection that allows two computers to communicate
- Computer-network connection
- Moving packets between interfaces according to the “directions”
- Routing in which routes change slowly over time
- Building maps and giving directions
12 Clues: Computer-network connection • Layer in which router is used • Station in a computer network • Building maps and giving directions • Computer network: electronic pathway • Routers which exchange routing information • Routing in which routes change more quickly • Routing in which routes change slowly over time • Device that forwards data between computer networks • ...
History of the Internet 2024-09-29
Across
- The inventor of the web.
- What does www stand for?
- Messages sent over the internet.
- The language used to build websites.
- A way to connect computers together.
Down
- A device that sends data between networks.
- The address of a website.
- A website that helps you find information.
- A device that connects your computer to the internet.
- A network that led to the internet
- One of the first web browsers.
11 Clues: The inventor of the web. • What does www stand for? • The address of a website. • One of the first web browsers. • Messages sent over the internet. • A network that led to the internet • The language used to build websites. • A way to connect computers together. • A device that sends data between networks. • A website that helps you find information. • ...
Chasing vermeer #3 2022-05-05
Across
- forget or not notice things
- a organization that's ofen educational
- copying something
- a thing that has five squares that make up a polygon
- a mood that is mostly romance or mystery
Down
- finishing something instantly
- a maze of complicated networks of tunnels and paths
- a accusation that someone is guilty of something
- makes a lot of sense
- try to impress someone by making yourself seem more important
- to many to count
11 Clues: to many to count • copying something • makes a lot of sense • forget or not notice things • finishing something instantly • a organization that's ofen educational • a mood that is mostly romance or mystery • a accusation that someone is guilty of something • a maze of complicated networks of tunnels and paths • a thing that has five squares that make up a polygon • ...
The Insight Grid 2025-08-17
Across
- Measure of spread in a dataset.
- Model performs well on training but poorly on unseen data.
- Data point that is significantly different from others.
- Internet-based storage and analytics.
- AI for human text/speech.
- Step-by-step method for problem solving.
Down
- Predictive modeling for continuous outcomes
- Simulation of human intelligence by machines.
- Data visualization and dashboarding tool.
- A subset of ML using neural networks with many layers.
- Google's deep learning framework
11 Clues: AI for human text/speech. • Measure of spread in a dataset. • Google's deep learning framework • Internet-based storage and analytics. • Step-by-step method for problem solving. • Data visualization and dashboarding tool. • Predictive modeling for continuous outcomes • Simulation of human intelligence by machines. • A subset of ML using neural networks with many layers. • ...
STRATEGY ANALYSIS - SOLUTION SCOPE & GAP ANALYSIS 2017-06-04
Across
- CATEGORY OF SOLUTION SCOPE. RELATED COMPONENTS- KNOWLEDGE AND SKILLS
- POLDAT (GAP ANALYSIS) ____ AND INFORMATION
- CATEGORY OF SOLUTION SCOPE. RELATED COMPONENTS- WORKFLOWS, EVENTS, SEQUENCES
- POLDAT (GAP ANALYSIS) TECHNOLOGY _______
- POLDAT (GAP ANALYSIS) _____ SYSTEMS
- POLDAT (GAP ANALYSIS) WAYS OF DOING THINGS
Down
- BUSINESS _____ CATEGORY OF SOLUTION SCOPE. RELATED COMPONENTS- BUSINESS LOGIC AND BUSINESS DECISIONS
- POLDAT (GAP ANALYSIS) WHEREABOUTS
- _____ STRUCTURESCATEGORY OF SOLUTION SCOPE. RELATED COMPONENTS- LOCATIONS, MARKETS AND MOTIVATIONS
- POLDAT (GAP ANALYSIS) ORGANIZATION ____.
- CATEGORY OF SOLUTION SCOPE. RELATED COMPONENTS- FUNCTIONS
- CATEGORY OF SOLUTION SCOPE. RELATED COMPONENTS- NETWORKS
12 Clues: POLDAT (GAP ANALYSIS) WHEREABOUTS • POLDAT (GAP ANALYSIS) _____ SYSTEMS • POLDAT (GAP ANALYSIS) ORGANIZATION ____. • POLDAT (GAP ANALYSIS) TECHNOLOGY _______ • POLDAT (GAP ANALYSIS) ____ AND INFORMATION • POLDAT (GAP ANALYSIS) WAYS OF DOING THINGS • CATEGORY OF SOLUTION SCOPE. RELATED COMPONENTS- NETWORKS • CATEGORY OF SOLUTION SCOPE. RELATED COMPONENTS- FUNCTIONS • ...
computer science 2019-03-07
Across
- Network that uses radio waves to transmit data
- A computer networking protocol
- Used to transmit data over networks
- The measure of capacity of a communications channel
- Data sent simultaneously from different computers
- An agreed method of communication used within the network
- Lengths of wires that transfer signals and data
Down
- rate Amount of which a packet is resent
- Optic Transmits data through light
- URL of a particular website
- Address Every device on the internet has one
- Poor network performance can come out of this
12 Clues: URL of a particular website • A computer networking protocol • Optic Transmits data through light • Used to transmit data over networks • rate Amount of which a packet is resent • Address Every device on the internet has one • Poor network performance can come out of this • Network that uses radio waves to transmit data • Lengths of wires that transfer signals and data • ...
The Renaissance Puzzle 2024-05-17
Across
- a person who supports money, gifts or efforts
- relating to or measured from the center of the Sun
- florentine sculptor painter and architect
- an Italian explorer of the late 13th and early 14th centuries
- standard, classic
- a wealthy and powerful family with Italian bankers and merchants
- relating to worldly things
Down
- a way of thinking about and understanding something
- a philosophy of life
- a German printer of the 15th century
- rebirth
- a series of ancient trade networks
12 Clues: rebirth • standard, classic • a philosophy of life • relating to worldly things • a series of ancient trade networks • a German printer of the 15th century • florentine sculptor painter and architect • a person who supports money, gifts or efforts • relating to or measured from the center of the Sun • a way of thinking about and understanding something • ...
Crossword-1 2025-07-20
Across
- A sudden disruption in normal service
- A development loop used in Agile or Scrum
- Delay before a network transfer begins
- To move code from development to production
- Step-by-step problem-solving process
Down
- Period when service is unavailable
- Reverting to a previous version in production
- Protecting data by converting it into unreadable format
- A system that blocks unauthorized access to networks
- Process of moving an issue to a higher support level
- Performing tasks without manual intervention
- Agreement on service response time
12 Clues: Period when service is unavailable • Agreement on service response time • Step-by-step problem-solving process • A sudden disruption in normal service • Delay before a network transfer begins • A development loop used in Agile or Scrum • To move code from development to production • Performing tasks without manual intervention • ...
Literacy Network Components 2022-06-13
Across
- a device connecting multiple devices in a LAN
- a signal used in TV remotes
- a network creating a LAN over internet
- cable made of glass or plastic
- another name for twisted pair cable
Down
- a high frequency signal for internet communication
- an acronym for network of networks
- a computer providing resources
- copper wire surrounded by an insulator
- an acronym for local area network
- a device connecting a LAN to internet
- An acronym for a card found in devices to connect to internet
12 Clues: a signal used in TV remotes • a computer providing resources • cable made of glass or plastic • an acronym for local area network • an acronym for network of networks • another name for twisted pair cable • a device connecting a LAN to internet • copper wire surrounded by an insulator • a network creating a LAN over internet • a device connecting multiple devices in a LAN • ...
allconnect 2019-05-29
Across
- Moving or capable of moving at high speed
- Superhero that uses a shield; Steve Rogers
- Bruce Wayne
- Possession of the qualities (especially mental qualities) required to do something or get something done
- Wears a powered suit of armor, Tony Stark
- Allconnect can help you save...
- The Man of Steel
- Self-assured
- A worldwide network of computer networks
- A member of a partnership especially in a business
- Fearless and daring
Down
- A fictional hero having extraordinary or superhuman powers
- Allconnect slogan
- Diana Prince
- Possessing or showing courage or determination
- Not deterred by danger or pain; brave
- Move to another service; change to another place
- Has spidey senses;Peter Parker
- Possessing outstanding qualities
19 Clues: Bruce Wayne • Diana Prince • Self-assured • The Man of Steel • Allconnect slogan • Fearless and daring • Has spidey senses;Peter Parker • Allconnect can help you save... • Possessing outstanding qualities • Not deterred by danger or pain; brave • A worldwide network of computer networks • Moving or capable of moving at high speed • Wears a powered suit of armor, Tony Stark • ...
