networks Crossword Puzzles
Computer networks and internet 2020-10-21
Across
- WAN stands for ____ area network
- device to connect to the internet
- a list of website that have been visited recently
Down
- collection of interconnected networks
- a single document viewable through a web browser
- network without cables
- key on the top left of the keyboard
- a programming language used for creating a webpage
8 Clues: network without cables • WAN stands for ____ area network • device to connect to the internet • key on the top left of the keyboard • collection of interconnected networks • a single document viewable through a web browser • a list of website that have been visited recently • a programming language used for creating a webpage
What is Computer Science? 2022-10-27
Across
- systems are the machines that run programs
- technology affects the way we live and think
- organizing, describing, and understanding data
- a list of steps or instructions to finish a task
Down
- someone who uses something
- a group of connected devices
- a set of instructions for a computer to understand
- raw, unorganized facts
8 Clues: raw, unorganized facts • someone who uses something • a group of connected devices • systems are the machines that run programs • technology affects the way we live and think • organizing, describing, and understanding data • a list of steps or instructions to finish a task • a set of instructions for a computer to understand
SENOE Austin CSW 2024 2024-10-07
Across
- Instructions for a computer
- Initials of the president, whose library is located downtown.
- Newest Set top box(STB) released in 2023.
- Forwards data packets between networks
- Data transfer rate limit
- Spectrum HQ City
Down
- Process of identifying and resolving software issues
- Renowned park in downtown Austin, known for hosting numerous events
- Pre-release evaluation by external users
- Network topology, where all devices connect to a central hub
- Emerge at twilight from beneath the Congress Avenue Bridge
11 Clues: Spectrum HQ City • Data transfer rate limit • Instructions for a computer • Forwards data packets between networks • Pre-release evaluation by external users • Newest Set top box(STB) released in 2023. • Process of identifying and resolving software issues • Emerge at twilight from beneath the Congress Avenue Bridge • ...
Safety Crossword Puzzle 2017-04-25
6 Clues: electronic mail • a personal computer • a site with information • ups advertising and ads • computer networks electronic and wireless • bullying on the intrnet that involves using electronics
Hadlee internet crossword puzzle 2 2014-04-04
Across
- full website address
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- the name for a way to display information on websites.
Down
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- networks online communities where people meet, socialize,exchanged digital files, etc.
- a collaborative website which can be directly edited by anyone with access to it
- the unauthorized use,reproduction, distribution, or transmission of copyrighted material.
- network etiquette;online manners; following rules of conduct fro online or internet users, being a good digital citizen.
- The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- software that searches and gathers and identifies information from a database based on keywords,titles, and text
- Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
- a piece of writing that has been copied from someone else and is presented as being your own work.
- a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network
13 Clues: full website address • the name for a way to display information on websites. • a collaborative website which can be directly edited by anyone with access to it • networks online communities where people meet, socialize,exchanged digital files, etc. • the unauthorized use,reproduction, distribution, or transmission of copyrighted material. • ...
Departments & Roles 2025-04-19
Across
- Works for a company
- The top of a company
- Organises internal and external communication
- Employee relations like hiring staff etc.
- Maintains a good public image of the company
- Ensures all systems and networks are working
- Buys goods and raw materials
- Ensures the smooth day-to-day running of a company
Down
- Looking into and making future products for the company
- Manages the financial activities of a company
- Helps management in all kinds of roles
- Deal with money matters from paying bills to projecting sales
- Hires people
- Makes sure company's contracts and activities are legal
- Selling finished products to the outside market
- Promotes products
- Ensures manufacturing runs smoothly
- Responsible for overall working of a company
18 Clues: Hires people • Promotes products • Works for a company • The top of a company • Buys goods and raw materials • Ensures manufacturing runs smoothly • Helps management in all kinds of roles • Employee relations like hiring staff etc. • Maintains a good public image of the company • Ensures all systems and networks are working • Responsible for overall working of a company • ...
TEJ2O1 - Security and Ethics - D. French 2024-07-26
Across
- You should regularly make a ____ of your data/photos.
- Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
- If you download software, ____ it before running it.
- Emails can spread malware, most often when you click links or open ____.
- People might feel more comfortable committing crimes on a computer because they feel like they are ____.
- Blocks your access to your computer and files, asking you to pay a ransom to get it back.
- Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
- Keep your operating system secure by running all the latest.
- Malware that damages files on your computer or stops your computer from running properly.
- If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
Down
- Avoid making financial transactions on ____ networks or computers.
- Tries to open security holes in your computer so a hacker can gain access.
- When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
- To protect your device from malware, you should install reputable ____ software and run frequent scans.
- Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
- Make sure you use a different ____ for different sites and keep them long and complex.
- Computer activities often leave a digital ____ that leads back to the offender.
- When you copy sections of someone else's work and claim it is your own.
- When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
- A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
20 Clues: If you download software, ____ it before running it. • You should regularly make a ____ of your data/photos. • Keep your operating system secure by running all the latest. • Avoid making financial transactions on ____ networks or computers. • When you copy sections of someone else's work and claim it is your own. • ...
INTERNET PRINCIPLES OF OPERATION 2015-04-28
Across
- THE INTERNET CONSISTS OF MANY LINKED
- DEFINES WHAT YOU WILL FORMAT IN HTML
- DEFINES HOW YOU WILL FORMAT CONTENT IN HTML
- HTML
- YOUR OWN UNIQUE ID FOR A WEBSITE
Down
- COMPUTER WHICH STORES WEBSITES
- NAME PART OF A URL WHICH MUST BE UNIQUE
- COMPUTER CONNECTED TO A NETWORK
- ORG, COM, ACC, GOV
- WWW
- ADDRESS A UNIQUE NUMBER WHICH IDENTIFIES A NETWORK INTERFACE CARD
- COLOURS, FONT, SIZE OF A WEBPAGE
- PLACEMENT OF CONTENT ON A WEBPAGE
- APPLICATION WHICH ALLOWS YOUR TO SURF INTERNET
- SENT FROM THE BROWSER TO GET A WEBSITE
- SET OF RULES WHICH DEFINE HOW DEVICES COMMUNICATE
- A HARDWARE DEVICE WITH A NUMBER ASSIGNED TO IT
- ADDRESS OF A WEBSITE
18 Clues: WWW • HTML • ORG, COM, ACC, GOV • ADDRESS OF A WEBSITE • COMPUTER WHICH STORES WEBSITES • COMPUTER CONNECTED TO A NETWORK • COLOURS, FONT, SIZE OF A WEBPAGE • YOUR OWN UNIQUE ID FOR A WEBSITE • PLACEMENT OF CONTENT ON A WEBPAGE • THE INTERNET CONSISTS OF MANY LINKED • DEFINES WHAT YOU WILL FORMAT IN HTML • SENT FROM THE BROWSER TO GET A WEBSITE • ...
JWIN Query Fun 2024-07-09
Across
- NCIC wants and warrants only?
- Type of agency can enter information in NCIC?
- A positive response to a NCIC query
- Abbreviation for DOJ Criminal Justice Information Network
- A hit response in 1 hour
- Hit confirmation request
- Driver License check
- Abbreviation for International Justice and Public Safety Networks
- A stolen vehicle query?
Down
- A query for NCIC W/W and CCH but only done at officer request?
- Type of agency that can only query NCIC?
- CJIS CSO ensure each agency designates a what?
- Abbreviation for National Crime Information Center
- Query for vehicle registration
- A hit response in 10 minutes
- Hit confirmation response
- Query for Criminal History Rap Sheet
- A State Warrant Query
18 Clues: Driver License check • A State Warrant Query • A stolen vehicle query? • A hit response in 1 hour • Hit confirmation request • Hit confirmation response • A hit response in 10 minutes • NCIC wants and warrants only? • Query for vehicle registration • A positive response to a NCIC query • Query for Criminal History Rap Sheet • Type of agency that can only query NCIC? • ...
vocabulary 2022-11-15
Across
- brain of a computer
- a device used to input and output information into the computer
- a small device that plugs into the USB port on your computer
- wide area network, private or public network
- intellectual property
- store the short term data
- the act of copying other people's works or words ,and publish as your own work
- storage device
- allows copying for limited purpose
Down
- identify parts of a large program or construction
- rules of the internet communication
- a security system that control the networks
- Local area network, private network
- uses to connect the computer peripheral
- able to let you save files in your computer
- protect the network
- brings virus into your computer
- junk mail
18 Clues: junk mail • storage device • brain of a computer • protect the network • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
Technology Crossword Assignment 2018-04-04
Across
- the computing part of the computer...
- a small text file created by a website...
- an in-house website that serves employees only...
- data stored locally to speed up subsequent retrievals...
- picture element...
- a large network made of smaller networks...
- machinery and equipment...
- Uniform Resource Locator...
Down
- instructions for the computer...
- a scam to steal valuable information...
- an organization that provides access to the internet...
- computer people say "there is not enough_______ to complete this"
- a method for keeping your computer safe from intruders...
- to make a video about your day and what is going on and then posting it online...
- Universal Serial Bus
15 Clues: picture element... • Universal Serial Bus • machinery and equipment... • Uniform Resource Locator... • instructions for the computer... • the computing part of the computer... • a scam to steal valuable information... • a small text file created by a website... • a large network made of smaller networks... • an in-house website that serves employees only... • ...
TECHNOLOGY VOCABULARY 2021-07-26
Across
- set up for a particular purpose
- a set of related records kept together
- an organized body of related information
- page the opening page of a web site
- locate and correct errors in a computer program code
- a program used to view HTML documents
- crime committed using a computer and the internet
- the exclusive right to sell a work
Down
- a worldwide network of computer networks
- any small compartment
- a data transmission rate for modems
- software that is provided without charge
- transfer out of a database or document
- a listing of the computer files stored in memory
- a unit of measurement of information
15 Clues: any small compartment • set up for a particular purpose • the exclusive right to sell a work • a data transmission rate for modems • page the opening page of a web site • a unit of measurement of information • a program used to view HTML documents • a set of related records kept together • transfer out of a database or document • a worldwide network of computer networks • ...
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
IT CAN BE DONE SPOTLIGHT CROSSWORD PUZZLE 2023-02-16
Across
- We sell these - popular add-on for notebooks
- Our website for all that we do
- _____ State Drive We use these to speed up your computer
- Part of our slogan / our point of difference
- We design, sell and maintain these
- We offer this type of Recovery Service
- We also service here
Down
- One of most popular services - keep your data safe
- We sell these devices to share internet access
- We sell these - including portable ones
- We sell & service these
- We sell & service these
- We service here
- We sell this consumable for Inkjet printers
- We sell these - for phones, laptops & cars
- We sell this consumable for Laser printers
16 Clues: We service here • We also service here • We sell & service these • We sell & service these • Our website for all that we do • We design, sell and maintain these • We offer this type of Recovery Service • We sell these - including portable ones • We sell these - for phones, laptops & cars • We sell this consumable for Laser printers • We sell this consumable for Inkjet printers • ...
TWJ - chapter 5 - lesson 1 2022-06-05
Across
- *contribution of money
- *had enough money
- Steven shared the surveying duties with (blank)
- the individual most responsible for the northern specific
- built by the great northern railroad company
- owned rail lines plus railcars and 44 million acres of land
Down
- made trade with foreign countries easier
- James Hill's neighbor
- *share in a company
- Washington's first territorial governor
- WA became part of the (blank) in the year 1883
- the amount of acres Hill sold his neighbor for $5.4 million
- pacific railroad survey authorized exploration of potential (blank) railroad
- companies encouraged (blank) from Europe and Asia
- railroads provided (blank) networks
15 Clues: *had enough money • *share in a company • James Hill's neighbor • *contribution of money • railroads provided (blank) networks • Washington's first territorial governor • made trade with foreign countries easier • built by the great northern railroad company • WA became part of the (blank) in the year 1883 • Steven shared the surveying duties with (blank) • ...
Second Semeste 2025-05-26
Across
- — Reproductive organs that produce gametes.
- — An incomplete bone fracture common in children; written as one word.
- — Interconnected systems; plural form.
- — A superficial injury caused by scraping or rubbing.
- — To evaluate or carefully examine.
- — Small inflamed bumps on the skin, common in acne.
- — Endoscopic examination of the colon; compound word without spaces.
- — Sexual relations; compound word written as one.
- — Hormone that regulates sleep.
- — Injuries caused by heat, chemicals, or radiation.
Down
- — Spongy tissue inside bones where blood cells form.
- — Blood cells that help with clotting.
- — Prescribed amount of medication to take.
- — Blood formations that stop bleeding.
- — Irregular cuts or tears in the skin.
15 Clues: — Hormone that regulates sleep. • — To evaluate or carefully examine. • — Blood cells that help with clotting. • — Blood formations that stop bleeding. • — Interconnected systems; plural form. • — Irregular cuts or tears in the skin. • — Prescribed amount of medication to take. • — Reproductive organs that produce gametes. • ...
AI 2025-07-23
Across
- Ability to interpret sensory information
- Using technology to perform tasks without human intervention
- Computational model inspired by the human brain
- Learning algorithm for training neural networks
- Ability to learn, understand, and apply knowledge
- Model's ability to perform well on unseen data
- Type of learning without labeled data
Down
- Process of categorizing data into groups
- Imitating a real-world process or system
- Learning method based on rewards and penalties
- Step-by-step procedure for solving a problem
- Predicting continuous values in machine learning
- Process of improving a model's performance
- Forecasting future outcomes based on data
- Type of learning with labeled data
15 Clues: Type of learning with labeled data • Type of learning without labeled data • Process of categorizing data into groups • Imitating a real-world process or system • Ability to interpret sensory information • Forecasting future outcomes based on data • Process of improving a model's performance • Step-by-step procedure for solving a problem • ...
Cyber Basics & Common Threats 2025-10-07
Across
- Software designed to harm or exploit a system
- Network of infected computers controlled remotely
- Malware that locks data and demands payment
- Software that secretly collects user data
- Process of converting information into code
- Software update to fix vulnerabilities
- Malware designed to hide other malicious software
Down
- A secret string of characters used for authentication
- Self-replicating malicious program
- Malicious software disguised as legitimate
- A security barrier between trusted and untrusted networks
- Taking advantage of a vulnerability
- Hidden entry point into a system
- Software that detects and removes malicious code
- Fraudulent attempt to steal sensitive data via fake email
15 Clues: Hidden entry point into a system • Self-replicating malicious program • Taking advantage of a vulnerability • Software update to fix vulnerabilities • Software that secretly collects user data • Malicious software disguised as legitimate • Malware that locks data and demands payment • Process of converting information into code • ...
Safety Crossword Puzzle 2017-04-25
6 Clues: electronic mail • a personal computer • a site with information • ups advertising and ads • computer networks electronic and wireless • bullying on the intrnet that involves using electronics
Network Word Search 2014-03-22
Across
- fully or partially connected network in which each of the nodes is connected to each other.
- point where lines intersect or terminate
- geographically dispersed collection of LAN'S
- prevents unauthorized access to or from a private network
- easiest way to add more computers into network
- family of computer networking technologies for LANs
- connects to internet using microwaves
- Bus message-based protocol designed for automotive applications/used in aerospace, maritime, industrial automation & medical equipment
- arrangement of the various elements of a computer network
- computer network used for data transmission among devices
- access without a direct connection
- computer hardware or software, accesses a service made available by a server
- network topology based on a hierarchy of nodes
- one of the most common computer network topologies
- common connection point for devices in a network
Down
- LAN/each node connected to single cable
- interconnects computers withing a limited or smaller geographic area
- Larger than LAN withing same city
- combination of topologies/resulting network does not exhibit one of the standard topologies
- distance of access of Wi-Fi networks
- router/provides greater range for signal & strength of overall signal
- interconnects various pieces of network, provides path for exchange of info
- system (software and hardware)/responds to requests to provide network services
- simplest topology/permanent link between two endpoints
- network topology travels in one direction/each device is a repeater
- measurement of bit-rate of available or consumed data
- expansion board (card) installed so computer can be connected to a network
- decentralized and distributed network architecture/individual nodes act as both suppliers & consumers of resources
- any location where Wi-Fi access is publicly available
- forwards data packets between computer networks
- connect devices together on a computer network
- twisted pair cable for carrying signals
- modular connector for computer network (Ethernet) cables
33 Clues: Larger than LAN withing same city • access without a direct connection • distance of access of Wi-Fi networks • connects to internet using microwaves • LAN/each node connected to single cable • twisted pair cable for carrying signals • point where lines intersect or terminate • geographically dispersed collection of LAN'S • easiest way to add more computers into network • ...
E- Ethics Vocabulary 2021-01-25
Across
- Name - first portion of a web name; often “www.”
- - computer user who attempts to acquire unauthorized entry to servers and computer systems
- Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
- tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
- - two or more computers linked together which share and exchange information
- Media - websites used to share, post and exchange information in an informal format through several differing channels
- - collection of web pages which have a common theme or focus
- Virus - computer program which replicates and spreads itself from one computer to another
- Service Providers (ISP) - companies which provide Internet connections for a fee
- History - list of websites visited
- Name - middle portion of a web name; unique to the web name
- page - single web document which opens in a browser
Down
- - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
- - worldwide collection of networks which allow people to communicate and share information quickly and easily
- Network - networks or websites which require a password or security code to gain access
- Address - combination of words and symbols unique to each web page
- Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
- - words, phrases or graphics in a web page which targets another location
- or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
- - allows equipment such as fax machines, printers and files to be served to multiple computers
- - web page which automatically opens when the web browser is opened
- (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
- Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
- Browser - software program retrieving and presenting data using the Internet
24 Clues: History - list of websites visited • Name - first portion of a web name; often “www.” • page - single web document which opens in a browser • Name - middle portion of a web name; unique to the web name • - collection of web pages which have a common theme or focus • Address - combination of words and symbols unique to each web page • ...
Computer 2022-11-24
Across
- a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium or over a loudspeaker
- the technology that connects your offices, data centers, cloud applications, and cloud storage together
- a device with a screen that shows a rendered electronic image
- accelerate graphics rendering
- which allow for easy use of a computer's processing power, as well as applications
- short term memory where data is stored as the processor needs it
- a piece of data from a website that is stored within a web browser that the website can retrieve at a later time
- for putting information including letters, words and numbers into your computer
- a type of data storage device that is used in laptops and desktop computers
Down
- the circuit board that connects all of your hardware to your processor
- a worldwide system of computer networks
- an electronic game in which players control images on a video screen
- consists of a series of computers linked together to form a network in a circumscribed location
- tell everything from your graphics processing unit (GPU) to your disk drives and screens what to do
- a small, movable device that lets you control a range of things on a computer
- managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection
- to offer audio output for the listener
- program that provides a way to look at and interact with all the information on the World Wide Web
- circulates air through the radiator so it can release engine heat into the surrounding air
- an item like a word or button that points to another location
- electronic machinery that carries out instructions from programs that allows a computer or other device to perform its tasks
21 Clues: accelerate graphics rendering • to offer audio output for the listener • a worldwide system of computer networks • a device with a screen that shows a rendered electronic image • an item like a word or button that points to another location • short term memory where data is stored as the processor needs it • ...
NNDL 2023-11-25
Across
- What type of neural network is used for unsupervised learning and aims to encode input data into a lower-dimensional representation?
- What optimization algorithm combines the benefits of both momentum and RMSprop?
- What approach involves using a pre-trained model as the starting point for a new model?
- What is the technique for representing categorical variables as binary vectors?
- What technique is used to assess a model's performance by splitting the dataset into multiple subsets?
- What is the representation of categorical variables as continuous vectors in neural networks?
- What is the technique for initializing neural network weights to prevent vanishing or exploding gradients?
- What type of neural network is designed for processing structured grid data, such as images?
- What metric combines precision and recall for evaluating the performance of a classification model?
Down
- The activation function commonly used in the output layer for multiclass classification.
- What downsampling technique in convolutional neural networks selects the maximum value from a set of values?
- What is the phenomenon where the gradient becomes extremely small during training?
- What is the process of artificially increasing the size of a dataset by applying transformations to the existing data?
- What technique is used to prevent overfitting by adding a penalty term to the loss function based on the magnitude of weights?
- What is the iterative optimization algorithm used to minimize the loss function?
- What is the activation function that replaces all negative values in the input with zero?
- What technique involves normalizing inputs in a neural network to improve training stability?
- What is the process of finding the best hyperparameter values for a machine learning model?
- What is the technique of gradually reducing the learning rate during training to converge more effectively?
- What activation function is commonly used in the output layer for multiclass classification?
- What technique involves randomly dropping out some neurons during training to prevent overfitting?
21 Clues: What optimization algorithm combines the benefits of both momentum and RMSprop? • What is the technique for representing categorical variables as binary vectors? • What is the iterative optimization algorithm used to minimize the loss function? • What is the phenomenon where the gradient becomes extremely small during training? • ...
Unit 3 Jerzee 2024-04-15
Across
- a crucial tool for UX/UI Designers for prototyping, collaboration, and maintaining brand consistency.
- an area of territory owned or controlled by a ruler or government
- to encourage people to like, buy, use, do, or support something
- to become filled with surprise, wonder, or amazed curiosity.
- plan and direct the route or course of a ship, aircraft, or other form of transportation, especially by using instruments or maps.
- create, share, and test designs for websites, mobile apps, and other digital products and experiJes
- an app to create your own professional website
- a wireless, portable personal computer with a touchscreen interface.
- collecting of webpages
- a person who uses or operates something, especially a computer or other machine.
- is a data structure supporting some pre-specified set of queries and updates to a database while consuming space
- a person who receives or entertains other people as guests.
- the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- a user interface design tool for creating wireframes.
- allows you to easily create and test tomorrow's digital experiences across a range of devices, including smartphones, desktops, TVs, and car dashboard screens.
- a set of options presented to the user of a computer application to help them find information or execute a function.
- being able to react quickly
Down
- (of a place) able to be reached or entered.
- the activity or business of promoting and selling products or services, including market research and advertising.
- an ability or willingness to change to suit different conditions.
- provides tools to ideate, prototype, document, and also, build design systems.
- someone who prepares content for the Web
- a physically disabled person
- a way to organize and structure content within your main domain.
- able to move or be moved freely or easily.
- an all-encompassing online wireframing and product design tool designed to bring software ideas to life visually.
26 Clues: collecting of webpages • being able to react quickly • a physically disabled person • someone who prepares content for the Web • able to move or be moved freely or easily. • (of a place) able to be reached or entered. • an app to create your own professional website • a user interface design tool for creating wireframes. • ...
RU ITEC411 Chapter 5 Crime and Security 2024-11-16
Across
- Early packet switching network, seen as the predecessor for modern internet.
- Software intentionally designed to cause disruption.
- Use of cyber-attacks against a state, causing comparable harm to warfare.
- A destructive computer worm that spread rapidly through email attachments.
- Cyberattack where malicious actors redirect internet users to a fake website, designed to mimic a legitimate one.
- Overwhelming targeted systems with a flood of traffic, rendering it inaccessible.
- Malware that disguises itself as legitimate software to gain unauthorized access to a computer system.
- A short-range wireless technology that allows electronic devices to communicate.
- Measurement and analysis of unique physical or behavioral characteristics of an individual, used for verification purposes.
Down
- Ethical hacking of a computer system to evaluate security weaknesses and address them.
- A mass-mailing macro virus released in 1999, that targeted Microsoft Word and Outlook-based systems, causing significant network traffic and disruption.
- Use of computer hacking to promote political agenda or social change.
- A self-replicating malware that spreads through networks, exploiting vulnerabilities to infect multiple devices without human interaction.
- An open-source library that provides secure communication between computer networks.
- A non-profit organization focused on improving cybersecurity, by conducting research on software bugs that impact internet security.
- A vulnerability found in OpenSSL allowing attackers to steal sensitive information.
- Created by Robert Tappan Morris, to spread across the internet by exploiting vulnerabilities in Unix systems.
- Cyberattack where attackers use deceptive tactics to trick individuals into revealing sensitive information.
- Malicious software that encrypts a victim's files, making them inaccessible, unless a fine is paid.
- Malware that replicates itself by attaching to other programs or files, requiring a host to run it.
- Network of computers or other internet-connected devices that have been infected with malware and are under the control of a single attacker.
21 Clues: Software intentionally designed to cause disruption. • Use of computer hacking to promote political agenda or social change. • Use of cyber-attacks against a state, causing comparable harm to warfare. • A destructive computer worm that spread rapidly through email attachments. • Early packet switching network, seen as the predecessor for modern internet. • ...
Joshua Street 2020-04-27
Across
- most effective when all contributors are clear, direct, and respectful.
- Distracting environment
- feeling or belief that one can rely on someone or
- Questions that can be answered yes/no or in a short answer.
- expressed through body language, facial expression, or other means.
Down
- trust.
- the transmission of messages over communications networks.
- gives time to respond
- The listener focuses attention on the speaker.
- A musical or vocal sound with reference to it's pitch
- Spoken or written
11 Clues: trust. • Spoken or written • gives time to respond • Distracting environment • The listener focuses attention on the speaker. • feeling or belief that one can rely on someone or • A musical or vocal sound with reference to it's pitch • the transmission of messages over communications networks. • Questions that can be answered yes/no or in a short answer. • ...
Review of Internet & Domain Names 2012-11-12
Across
- traffic jam at router (begins w/a "B")
- Small packages or bits of information are called this
- Address or URL of a website (begins w/a "d")
- A device that forwards information over the internet
- Government URL website
Down
- Military URL website
- Business URL website
- Worldwide network made up of smaller networks connected together
- non-profit URL website
- Button in photostory we used to record our voice
10 Clues: Military URL website • Business URL website • non-profit URL website • Government URL website • traffic jam at router (begins w/a "B") • Address or URL of a website (begins w/a "d") • Button in photostory we used to record our voice • A device that forwards information over the internet • Small packages or bits of information are called this • ...
Spelling Test B October 31 2014-10-30
Across
- software detects viruses
- using computer unrelated to the job
- protects computers from power surges
Down
- appears as pop-up ad box
- prevents unauthorized access to computers or networks
- encoding so only authorized individuals can view
- using personal information about someone else
- sending e-mail to lure users into revealing personal information
- gathers information on computer about you without your knowledge
- travels between systems through a network to spread infections
10 Clues: appears as pop-up ad box • software detects viruses • using computer unrelated to the job • protects computers from power surges • using personal information about someone else • encoding so only authorized individuals can view • prevents unauthorized access to computers or networks • travels between systems through a network to spread infections • ...
Computer Systems Crossword Puzzle 2024-08-12
Across
- External device connected to a computer
- Computer that provides data to other computers
- Computer that requests data from a server
- Programs and operating information used by a computer
Down
- Translates domain names to IP addresses
- Security system that monitors and controls incoming and outgoing network traffic
- The people who work for a company
- Physical parts of a computer
- Group of interconnected devices
- Hardware device that routes data between networks
10 Clues: Physical parts of a computer • Group of interconnected devices • The people who work for a company • External device connected to a computer • Computer that requests data from a server • Translates domain names to IP addresses • Computer that provides data to other computers • Programs and operating information used by a computer • ...
Transformers 2024-12-09
Across
- encoding***Adds positional information to input embeddings
- heads***Multiple attention mechanisms in parallel
- output sequence
- input sequence
- layer***Maps input tokens to dense vectors
Down
- for weighting input tokens
- network***Neural network layer applied to each token independently
- layers***Stacked layers of self-attention and feed-forward networks
- dot-product attention***Common attention mechanism in transformers
- key, value***Components of self-attention mechanism
10 Clues: input sequence • output sequence • for weighting input tokens • layer***Maps input tokens to dense vectors • heads***Multiple attention mechanisms in parallel • key, value***Components of self-attention mechanism • encoding***Adds positional information to input embeddings • network***Neural network layer applied to each token independently • ...
Transformers 2024-12-09
Across
- encoding***Adds positional information to input embeddings
- heads***Multiple attention mechanisms in parallel
- output sequence
- input sequence
- layer***Maps input tokens to dense vectors
Down
- for weighting input tokens
- network***Neural network layer applied to each token independently
- layers***Stacked layers of self-attention and feed-forward networks
- dot-product attention***Common attention mechanism in transformers
- key, value***Components of self-attention mechanism
10 Clues: input sequence • output sequence • for weighting input tokens • layer***Maps input tokens to dense vectors • heads***Multiple attention mechanisms in parallel • key, value***Components of self-attention mechanism • encoding***Adds positional information to input embeddings • network***Neural network layer applied to each token independently • ...
Technology 2025-03-31
Across
- The process of converting information into a digital format
- A popular search engine
- A program used to access and view websites
- A wireless networking technology
- Physical components of a computer system.
- Wireless communication technology used for short-range data transfer
Down
- Operating system by Microsoft
- A device used to input text and commands into a computer.
- Software that performs specific tasks for users
- The global system of interconnected computer networks
10 Clues: A popular search engine • Operating system by Microsoft • A wireless networking technology • Physical components of a computer system. • A program used to access and view websites • Software that performs specific tasks for users • The global system of interconnected computer networks • A device used to input text and commands into a computer. • ...
Tech Crossword Puzzle 2025-06-28
Across
- Malware that can harm your computer.
- A digital document stored on a computer.
- Programs and operating systems used by a computer.
- Global network that connects computers.
- An input device with keys.
Down
- Device used to produce physical copies of documents.
- Device that forwards data between computer networks.
- Electronic method of sending messages.
- A device used to control the pointer on the screen.
- The screen that displays the computer output.
10 Clues: An input device with keys. • Malware that can harm your computer. • Electronic method of sending messages. • Global network that connects computers. • A digital document stored on a computer. • The screen that displays the computer output. • Programs and operating systems used by a computer. • A device used to control the pointer on the screen. • ...
E-Ethics Vocab 2021-01-25
Across
- - web page which automatically opens when the web browser is opened
- - collection of web pages which have a common theme or focus
- Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
- page - single web document which opens in a browser
- Name - first portion of a web name; often “www.”
- History - list of websites visited
- - allows equipment such as fax machines, printers and files to be served to multiple computers
- - computer user who attempts to acquire unauthorized entry to servers and computer systems
- or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
- Virus - computer program which replicates and spreads itself from one computer to another
- Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
- Wide Web (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
Down
- Network - networks or websites which require a password or security code to gain access
- Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
- Browser - software program retrieving and presenting data using the Internet
- tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
- - words, phrases or graphics in a web page which targets another location
- - worldwide collection of networks which allow people to communicate and share information quickly and easily
- - two or more computers linked together which share and exchange information
- Service Providers (ISP) - companies which provide Internet connections for a fee
- Address - combination of words and symbols unique to each web page
- Media - websites used to share, post and exchange information in an informal format through several differing channels
- - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
- Name - middle portion of a web name; unique to the web name
24 Clues: History - list of websites visited • Name - first portion of a web name; often “www.” • page - single web document which opens in a browser • Name - middle portion of a web name; unique to the web name • - collection of web pages which have a common theme or focus • Address - combination of words and symbols unique to each web page • ...
Internet Basics vocabulary 2021-01-25
Across
- Name - first portion of a web name; often “www.”
- - computer user who attempts to acquire unauthorized entry to servers and computer systems
- Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
- tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
- - two or more computers linked together which share and exchange information
- Media - websites used to share, post and exchange information in an informal format through several differing channels
- - collection of web pages which have a common theme or focus
- Virus - computer program which replicates and spreads itself from one computer to another
- Service Providers (ISP) - companies which provide Internet connections for a fee
- History - list of websites visited
- Name - middle portion of a web name; unique to the web name
- page - single web document which opens in a browser
Down
- - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
- - worldwide collection of networks which allow people to communicate and share information quickly and easily
- Network - networks or websites which require a password or security code to gain access
- Address - combination of words and symbols unique to each web page
- Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
- - words, phrases or graphics in a web page which targets another location
- or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
- - allows equipment such as fax machines, printers and files to be served to multiple computers
- - web page which automatically opens when the web browser is opened
- (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
- Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
- Browser - software program retrieving and presenting data using the Internet
24 Clues: History - list of websites visited • Name - first portion of a web name; often “www.” • page - single web document which opens in a browser • Name - middle portion of a web name; unique to the web name • - collection of web pages which have a common theme or focus • Address - combination of words and symbols unique to each web page • ...
SMM-Marketing Omoev Arlen 2020-04-18
Across
- Product _____. Getting customers to buy a product for the first time
- efers to techniques that target social networks and applications to spread brand awareness or promote particular products
- what platform of smm marketing is the most famous in USA
- Paid-for communication, aimed at informing or persuading
- This targeting is based on a certain location and can be as broad as a country or region, or as specific as a city or neighborhood.
- Marketing (also known as emarketing, web marketing, or digital marketing) is an all-inclusive term for marketing products and/or services online – and like many all-inclusive terms, internet marketing means different things to different people.
- Any recognizable name, logo or symbol that identifies a product
- The group of consumers or customers aimed at by a business
- These targets are based on age, gender, ethnicity, race, income, education, religion, economic status and more, and are extremely commonly used in all types of marketing.
- A brand that is owned and promoted by retailers rather than manufacturers
Down
- Research designed to provide information about opinions, attitudes and behaviours
- what platform of smm marketing is the most famous in CIS (Commonwealth of Independent States)
- The marketing combination of product, price, promotion and place
- Distribution __________. How a business gets its products to the end
- also known as multisegment marketing, is a marketing strategy that involves identifying specific personas or markets for specific content.
- Surveying a small group of a population to gain research insights
- Marketing promotion that relies on word-of-mouth or online networks to spread the message
- Goods or services produced by a business
- The part of the marketing mix that focuses on where a firm’s products are sold
- Product or brand with a high share of a mature or declining market
20 Clues: Goods or services produced by a business • what platform of smm marketing is the most famous in USA • Paid-for communication, aimed at informing or persuading • The group of consumers or customers aimed at by a business • Any recognizable name, logo or symbol that identifies a product • The marketing combination of product, price, promotion and place • ...
Ryan Jones-Crossword-2nd Period 2016-10-24
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- send the same message indiscriminately to (large numbers of recipients) on the Internet.
- portable computer
- A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.
- study/use of systems for storing, retrieving, and sending info.
- a cellular phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
- computer networking device that connects devices together on a computer network
- gives instructions the computer needs to operate
- software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- lets the user to complete tasks such as create documents , Spreadsheets, databases, and publications
- common connection point for devices in a network
Down
- a summary
- Partitions are drives meaning it shows up as one drive on the windows
- networking device that forwards data packets between computer networks
- To open a list of keyboard shortcuts in Google Docs, press Ctrl + / (Windows, Chrome OS) or ⌘ + / (Mac). You can also use menu accesskeys.
- created when two or more PCs are connected and share resources without going through a separate server computer
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- connects to local systems and controls the passing info.
- Point networking hardware allows Wi-Fi compliant device to connect to a wired network
- desktop computer terminal, more powerful than personal computer
20 Clues: a summary • portable computer • gives instructions the computer needs to operate • common connection point for devices in a network • connects to local systems and controls the passing info. • study/use of systems for storing, retrieving, and sending info. • desktop computer terminal, more powerful than personal computer • ...
Chapter 36 2014-04-30
Across
- were the industries that include financial services?
- where did manufacturing jobs move out of?
- what were the names of the general people who left their country to move to safety in 2005?
- what is the creation of plants or animals that are genetically identical to an existing plant or animal?
- what was created in 2002 to coordinate national efforts against terrorism
- what is the type of terrorism that involves politically motivated attacksion informatic systems such as hacking into computer networks?
- what is the abbreviation for European Economic community?
- what includes all financial interactions that cross international borders?
- what is the abbreviation for the North Atlantic Treaty Organization?
- since that late 1960s, more than 14,000 terrorist attacks have occurred where?
- in the late 1950s a new style of music emerged called what?
Down
- president Bush an anti-terrorism bill called what?
- access to TV, radio, and phones are known as
- what is a spread of nuclear weapons to other nations called?
- what is the working laboratory for experiments in space?
- who was one of the greatest champions of human rights that established the order of the missionaries of charity?
- what is the voluntary linkage of computer networks around the world?
- what is the 20th century attempt to increase food resources worldwide using economic processes?
- cultural elements that reflect groups of people with common backgrounds and interests?
- what is a major goal for globalization?
- the transferring of genes from one living thing to another in order to produce an organism with new traits?
- what is the use of violence, on people, or property
- the western mind set of placing a high value on acquiring material possessions is what?
- what is the greatest global health issue(disease) that was first discovered in the 1980s?
24 Clues: what is a major goal for globalization? • where did manufacturing jobs move out of? • access to TV, radio, and phones are known as • president Bush an anti-terrorism bill called what? • what is the use of violence, on people, or property • were the industries that include financial services? • what is the working laboratory for experiments in space? • ...
Wireless/Bluetooth 2023-03-28
Across
- 5 GHz Frequency, max speed 3.46 Gbps, 300 Ft range, 802.11b/g/n backwards compatibility
- 2.4 GHz Frequency, max speed 54 Mbps, 150 Ft range, 11 channels, 802.11b backwards compatibility
- 2.4 GHz Frequency, max speed 11 Mbps, 150 Ft range, 11 channels, no backwards compatibility
- 2.4 or 5 GHz Frequency, max speed 600 Mbps, 1200 Ft range, 2.4 GHz: 11 Channels 5GHz: 23 channels, 802.11a/b/g depending on implementation backwards compatibility
- A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
- A method that combines channels into one to increase bandwidth.
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- An enhancement that allows multiple antennas to use the same radio frequency.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
Down
- authentication Secure authentication method for wired and wireless networks.
- IEEE designation for all wireless networking standards.
- 5 GHz Frequency, max speed 54 Mbps, 100 Ft range, 23 channels, no backwards compatibility
- 2.4 or 5 GHz Frequency, max speed 14 Gbps, 300 Ft range, 802.11b/g/n/ac backwards compatibility
- Wireless network that requires no authentication.
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Wireless authentication method that uses a passphrase to authenticate users.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
20 Clues: Wireless network that requires no authentication. • IEEE designation for all wireless networking standards. • A method that combines channels into one to increase bandwidth. • authentication Secure authentication method for wired and wireless networks. • Wireless authentication method that uses a passphrase to authenticate users. • ...
CIE 5 (crossword) 2025-04-28
Across
- AI-generated videos made to look real are called
- Which deep learning framework is known for dynamic computation graphs and developed by Meta?
- Real-time speech recognition tool by Google
- Google’s AI framework that supports TPUs
- Computer vision library with C++ and Python support
- Type of AI that focuses on making AI decisions transparent to humans
- TensorFlow tool used for visualizing model performance
- Python library mainly used for statistical plots like violin plot, box plot
- Graphical representation to show data distribution
- Field of AI focused on processing and understanding human language
- Massive datasets processed and analyzed by AI platforms
- Google service for tracking app and website performance
- Machine learning library that integrates with OpenCV
Down
- Content creation tool using GPT for marketing and writing
- Which open-source framework by Google is used for deep learning and machine learning?
- The process of analyzing data sets to summarize main characteristics
- AI field that trains agents through rewards and penalties
- Which Python library is used to create static, animated, and interactive visualizations?
- TensorFlow feature for using pre-trained models automatically
- Neural networks commonly used for image data processing
- Type of graph to show bars for categorical data comparison
- Google AI service combining machine learning with computer vision
- Visualization type in Seaborn showing variable distribution as smoothed curve
- Platform that offers free GPU access for training AI models online
- A business report format created using Matplotlib for insights
- The act of imitating real-world processes using computer models
- Python library that works with Seaborn for data visualization
- Lightweight framework in TensorFlow for building neural networks
- Platform commonly used for coding and data visualization with Matplotlib
- AI model developed by OpenAI to generate human-like text responses
- Google’s multimodal AI model supporting text, images, and code
31 Clues: Google’s AI framework that supports TPUs • Real-time speech recognition tool by Google • AI-generated videos made to look real are called • Graphical representation to show data distribution • Computer vision library with C++ and Python support • Machine learning library that integrates with OpenCV • TensorFlow tool used for visualizing model performance • ...
Network Topologies and Technologies 2025-03-03
Across
- What occurs when devices transmit simultaneously using CSMA/CD?
- Which signaling method uses the entire bandwidth to send data as pulses?
- What topology creates a temporary connection between two devices whenever data is sent?
- What is the name given to the 802.11 series of standards for wireless LANs?
- What is the term for a device that connects two networks wirelessly, typically used to link two buildings or extend an existing network?
- What type of antenna focuses signals in a single direction?
- What is another name for a logical bus topology, where all devices share the bandwidth?
- What wireless mode has no central device and allows data to travel directly between devices?
Down
- In a physical star topology, what is the central device that connects all the computers in a LAN?
- What ratio measures the amount of valid signal compared to noise in a transmission?
- physical bus traveling across the medium is called?
- The term used when electricity bounces off the end of a cable and back in the other direction is called
- What topology connects only two devices directly?
- In a point-to-point topology, what is the main advantage of having a dedicated link between two devices?
- What logical topology is used in both Ethernet and wireless LANs, where data is received by all devices?
- In a physical ring topology, what type of device connects the local area networks (LANs) of buildings A, B, and C to form the ring?
- What topology connects each device to every other device, providing redundancy and fault tolerance?
- Term refers to the extra information in a network transmission that isn't part of the application data?
- What topology passes data from one device to the next in a circle until it reaches the destination?
- What topology describes how data travels between devices?
20 Clues: What topology connects only two devices directly? • physical bus traveling across the medium is called? • What topology describes how data travels between devices? • What type of antenna focuses signals in a single direction? • What occurs when devices transmit simultaneously using CSMA/CD? • ...
Awesome Privacy Week Crossword 2025-01-07
Across
- Malicious software designed to harm or exploit computers and networks
- A set of rules that organizations must follow to protect sensitive health information in the U.S.
- The European Union's data protection regulation implemented in 2018
- A widely used AI model trained on large datasets for text generation and understanding
- A technique that hides details of individuals in a dataset while preserving overall patterns
- A privacy framework aimed at protecting children’s online data in the U.S.
- A set of policies and technologies designed to secure sensitive data in a cloud
- A weakness in a system that can be exploited by cybercriminals
- A breach of this can result in stolen data, identity theft, and reputational damage
- A mechanism that lets users decide whether their data can be collected or shared
- A feature that allows users to browse the internet without saving cookies or search history
- A type of attack where criminals demand payment to release encrypted files
- The principle that organizations should collect only the data necessary for a specific purpose
Down
- Unauthorized access or damage to computer systems and networks
- The act of removing or disguising personal identifiers from datasets
- A key document that explains how an individual's data is stored, used, and shared
- The legal right of individuals to control how their personal data is collected, used, and shared
- AI system component designed to process vast amounts of data quickly
- A document that outlines how organizations collect, use, and protect data
- The science of making computers understand and generate human language
- A person designated to oversee compliance with data protection laws and practices
- A protocol used to ensure secure communication over a computer network
- The process of encoding information to prevent unauthorized access
- A U.S. state law that grants residents the right to know what personal data companies collect about them
24 Clues: Unauthorized access or damage to computer systems and networks • A weakness in a system that can be exploited by cybercriminals • The process of encoding information to prevent unauthorized access • The European Union's data protection regulation implemented in 2018 • The act of removing or disguising personal identifiers from datasets • ...
internet 2025-09-19
Across
- A physical medium for linking systems.
- A collection of several web pages managed by the same owner.
- A way in which networks can be interconnected.
- The quality of J.C. Licklider for understanding the potential of computers.
- A visionary who formulated the first ideas for the global network.
- The research center where Tim Berners-Lee developed ENQUIRE and the World Wide Web.
- A person who uses a network service, often with an account and username.
- The screen that shows computer information to the user.
- A system invented by Tim Berners-Lee for researchers to share documents.
- A set of devices that can process, store, and input data.
- War, The period in which the fear of a nuclear war motivated the creation of a network.
- A programming language for creating web pages.
- Graphics (icons, images) that can be clicked to access linked information.
- A network of networks that allows access to information from different computers.
- A form of writing in which there is no specific order to follow.
- An application for accessing and viewing web information.
- An invisible area where a hyperlink is activated by clicking.
- page, A document for the World Wide Web identified by a URL.
Down
- A network developed by the U.S. Department of Defense to link computers at the Pentagon.
- Activities of consuming internet content.
- A satellite launched by the Soviet Union during the Cold War.
- A global information system for storing and finding resources.
- Multiple systems interconnected to share information.
- The medium initially used to link computers at the Pentagon.
- A combination of different forms of content, such as text, images, and videos.
- The name of the 8-ton computer from 1951.
- The building of the U.S. Department of Defense.
- A unique identifier for a web page.
- How well the software responds to user actions.
- Words that become clickable to access linked information.
30 Clues: A unique identifier for a web page. • A physical medium for linking systems. • Activities of consuming internet content. • The name of the 8-ton computer from 1951. • A way in which networks can be interconnected. • A programming language for creating web pages. • The building of the U.S. Department of Defense. • How well the software responds to user actions. • ...
Computer Terms 2018-04-05
Across
- To store data locally in order to speed up subsequent retrievals
- organization that provides access to the Internet
- large network made up of smaller networks
- The computing part of the computer
- Instructions for the computer
- The address that defines the route to a file on an Internet server
- computer term for capability and time
- To write and post an entry, visual
Down
- small text file
- Machinery and equipment
- keeps the computer secure
- An inhouse website that serves employees only, and most medium-sized and large companies have one
- a scam to steal valuable information
- for attaching peripherals to a computer
- bitmapped image
15 Clues: small text file • bitmapped image • Machinery and equipment • keeps the computer secure • Instructions for the computer • The computing part of the computer • To write and post an entry, visual • a scam to steal valuable information • computer term for capability and time • for attaching peripherals to a computer • large network made up of smaller networks • ...
Technology Crossword Assignment 2018-04-04
Across
- a scam to steal valuable information...
- instructions for the computer...
- machinery and equipment...
- a small text file created by a website...
- Uniform Resource Locator...
- computer people say "there is not enough_______ to complete this"
- the computing part of the computer...
Down
- a method for keeping your computer safe from intruders...
- an in-house website that serves employees only...
- picture element...
- a large network made of smaller networks...
- data stored locally to speed up subsequent retrievals...
- to make a video about your day and what is going on and then posting it online...
- an organization that provides access to the internet...
- Universal Serial Bus
15 Clues: picture element... • Universal Serial Bus • machinery and equipment... • Uniform Resource Locator... • instructions for the computer... • the computing part of the computer... • a scam to steal valuable information... • a small text file created by a website... • a large network made of smaller networks... • an in-house website that serves employees only... • ...
COMPUTER PARTS 2022-10-21
Across
- PART OF COMPUTER THAT IS LIKE YOUR SHORT-TERM MEMORY
- DISPLAYS INFORMATION FOR THE USER E.G SCREEN
- HOW THE USER TELLS THE COMPUTER WHAT TO DO E.G KEYBOARD
- LIKE THE HEART OF THE COMPUTER
- 8 BITS
- to accelerate the creation of images in a frame
- LIKE LONG TERM MEMORY IN A COMPUTER
- KEEPS HOLD OF DATA FOREVER
Down
- Exchange information and form networks
- IN A computing system this means using to exchange information
- ONLY STAYS WHEN SYSTEM IS ON
- 1 BINARY DIGIT
- STAYS FORVER
- PART OF COMPUTER THAT ACTS LIKE A SKELETON
- PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN
15 Clues: 8 BITS • STAYS FORVER • 1 BINARY DIGIT • KEEPS HOLD OF DATA FOREVER • ONLY STAYS WHEN SYSTEM IS ON • LIKE THE HEART OF THE COMPUTER • LIKE LONG TERM MEMORY IN A COMPUTER • Exchange information and form networks • PART OF COMPUTER THAT ACTS LIKE A SKELETON • DISPLAYS INFORMATION FOR THE USER E.G SCREEN • PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN • ...
Technology Crossword Puzzle 2017-12-08
Across
- A way to steal personal information.
- a number of people who use computers.
- A small file created by a website.
- Instructions for the computer.
- A way to keep a computer safe from intruders.
- a way to speed up retrievals.
- An organization that provides access to the internet.
- The address that defines the route to a file.
Down
- A way to share information.
- A device to store information.
- A website that serves the use of employees only.
- A large network made up of smaller networks.
- Machinery and equipment.
- The fundamental display element of an electronic.
- A computing part of a computer.
15 Clues: Machinery and equipment. • A way to share information. • a way to speed up retrievals. • A device to store information. • Instructions for the computer. • A computing part of a computer. • A small file created by a website. • A way to steal personal information. • a number of people who use computers. • A large network made up of smaller networks. • ...
Digital Citizenship 2018-01-26
Across
- networks where you participate in social networking
- the stuff that is looked up or researched
- your trail of data online
- being safe online
- using someones similar or exact words without permission
- used to protect information
Down
- regulates how online tools collect personal information
- a photo or image that is not allowed to be used other than its original purpose
- only acceptable in very few situations
- online form of harassment
- acceptable way of communicating online
- someone who is unknown to you
- your or someone else's personal information
- having permission to use someone else's work or image or some kind
- the rules of being online
15 Clues: being safe online • online form of harassment • your trail of data online • the rules of being online • used to protect information • someone who is unknown to you • only acceptable in very few situations • acceptable way of communicating online • the stuff that is looked up or researched • your or someone else's personal information • ...
tut-4 2018-09-10
Across
- cloud supply chain managment
- A commercial building for storage of goods.
- An exploting weakness of mobile devices
- Producter of goods and items
- Protect your networks against external and internal attack.
- most used OS of moblie system
- That allows systems and services to be easily accessible to the general public.
Down
- A template of sample secrity policies
- Online security firm
- Widely used mobile standard
- Mixture of public and private cloud.
- Final stage of SCM
- The tasks can be performed on-site or off-site.
- India ranks in terms of the highest number of internet users in the world
- Organized hacking
15 Clues: Organized hacking • Final stage of SCM • Online security firm • Widely used mobile standard • cloud supply chain managment • Producter of goods and items • most used OS of moblie system • Mixture of public and private cloud. • A template of sample secrity policies • An exploting weakness of mobile devices • A commercial building for storage of goods. • ...
Emma Gunter Muscle Fiber Crossword 2024-01-17
Across
- converts glucose to pyruvic acid
- use anaerobic glycolysis to contract quickly
- powerhouse of the cell
- the compound that provides the body with energy
- use aerobic respiration to contract slowly
- when muscle tissue disintegrates from disuse
- use aerobic respiration to contract quickly
- when structural proteins are added to muscle fibers
- muscles that are involuntary and line organs
Down
- formation of new capillary networks around a muscle fiber
- muscles that are trainable
- age related muscle atrophy
- a native compound that people take supplements for; legal but sketchy
- causes soreness in muscles due to lactic acid buildup
- only found in the heart
15 Clues: powerhouse of the cell • only found in the heart • muscles that are trainable • age related muscle atrophy • converts glucose to pyruvic acid • use aerobic respiration to contract slowly • use aerobic respiration to contract quickly • use anaerobic glycolysis to contract quickly • when muscle tissue disintegrates from disuse • muscles that are involuntary and line organs • ...
Xact 2025-05-14
Across
- Common AI tool for natural language processing
- Product metric indicating user loyalty
- Cross-functional method in Agile for time-boxed delivery
- Role responsible for defining features and prioritizing
- Daily team meeting in Agile
- _______ learning – subset of AI based on neural networks
- AI + Agile = better _______ making
- Non-human conversational interface powered by AI
Down
- A meeting to reflect and improve after a sprint
- A key mindset in product management—build, measure, ______
- A prioritized list of work for the development team
- Key visual tool in Agile to track task progress
- Empirical process framework for product delivery
- Smallest testable product version in Agile
- Actionable insight derived from user behavior
- Framework of continuous product improvement
16 Clues: Daily team meeting in Agile • AI + Agile = better _______ making • Product metric indicating user loyalty • Smallest testable product version in Agile • Framework of continuous product improvement • Actionable insight derived from user behavior • Common AI tool for natural language processing • A meeting to reflect and improve after a sprint • ...
Xact 2025-05-14
Across
- Common AI tool for natural language processing
- Product metric indicating user loyalty
- Cross-functional method in Agile for time-boxed delivery
- Role responsible for defining features and prioritizing
- Daily team meeting in Agile
- _______ learning – subset of AI based on neural networks
- AI + Agile = better _______ making
- Non-human conversational interface powered by AI
Down
- A meeting to reflect and improve after a sprint
- A key mindset in product management—build, measure, ______
- A prioritized list of work for the development team
- Key visual tool in Agile to track task progress
- Empirical process framework for product delivery
- Smallest testable product version in Agile
- Actionable insight derived from user behavior
- Framework of continuous product improvement
16 Clues: Daily team meeting in Agile • AI + Agile = better _______ making • Product metric indicating user loyalty • Smallest testable product version in Agile • Framework of continuous product improvement • Actionable insight derived from user behavior • Common AI tool for natural language processing • A meeting to reflect and improve after a sprint • ...
cw1 2025-11-05
Across
- Technique to run multiple OS on a single machine
- Algorithm used in training neural networks
- Concurrent execution of multiple threads
- AI system inspired by human brain structure
- OOP feature allowing one interface, many forms
- CPU technique for parallel instruction execution
- Science of secure communication
Down
- Network security system monitoring traffic
- Database process reducing redundancy
- AI model learns training data too well
- Step-by-step procedure for solving a problem
- State where processes wait indefinitely for each other
- Process of securing data by converting it to code
- Program that converts code into machine language
- Software that creates and manages virtual machines
15 Clues: Science of secure communication • Database process reducing redundancy • AI model learns training data too well • Concurrent execution of multiple threads • Network security system monitoring traffic • Algorithm used in training neural networks • AI system inspired by human brain structure • Step-by-step procedure for solving a problem • ...
cw1 2025-11-05
Across
- Program that converts code into machine language
- Network security system monitoring traffic
- Process of securing data by converting it to code
- Step-by-step procedure for solving a problem
- State where processes wait indefinitely for each other
- Algorithm used in training neural networks
- Technique to run multiple OS on a single machine
- Science of secure communication
- Concurrent execution of multiple threads
Down
- AI system inspired by human brain structure
- Software that creates and manages virtual machines
- Database process reducing redundancy
- CPU technique for parallel instruction execution
- OOP feature allowing one interface, many forms
- AI model learns training data too well
15 Clues: Science of secure communication • Database process reducing redundancy • AI model learns training data too well • Concurrent execution of multiple threads • Network security system monitoring traffic • Algorithm used in training neural networks • AI system inspired by human brain structure • Step-by-step procedure for solving a problem • ...
vocabulary 2022-11-15
Across
- brain of a computer
- a device used to input and output information into the computer
- a small device that plugs into the USB port on your computer
- wide area network, private or public network
- intellectual property
- store the short term data
- the act of copying other people's works or words ,and publish as your own work
- storage device
- allows copying for limited purpose
Down
- identify parts of a large program or construction
- rules of the internet communication
- a security system that control the networks
- Local area network, private network
- uses to connect the computer peripheral
- able to let you save files in your computer
- protect the network
- brings virus into your computer
- junk mail
18 Clues: junk mail • storage device • brain of a computer • protect the network • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
vocabulary 2022-11-15
Across
- brain of a computer
- a device used to input and output information into the computer
- a small device that plugs into the USB port on your computer
- wide area network, private or public network
- intellectual property
- store the short term data
- the act of copying other people's works or words ,and publish as your own work
- storage device
- allows copying for limited purpose
Down
- identify parts of a large program or construction
- rules of the internet communication
- a security system that control the networks
- Local area network, private network
- uses to connect the computer peripheral
- able to let you save files in your computer
- protect the network
- brings virus into your computer
- junk mail
18 Clues: junk mail • storage device • brain of a computer • protect the network • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
computer vocabulary 2022-11-22
Across
- a security system that control the networks
- intellectual property
- uses to connect the computer peripheral
- allows copying for limited purpose
- identify parts of a large program or construction
- brain of a computer
- a device used to input and output information into the computer
- wide area network, private or public network
- storage device
Down
- protect the network
- a small device that plugs into the USB port on your computer
- rules of the internet communication
- brings virus into your computer
- junk mail
- Local area network, private network
- the act of copying other people's works or words ,and publish as your own work
- store the short term data
- able to let you save files in your computer
18 Clues: junk mail • storage device • protect the network • brain of a computer • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
computer vocabulary 2022-11-22
Across
- a security system that control the networks
- intellectual property
- uses to connect the computer peripheral
- allows copying for limited purpose
- identify parts of a large program or construction
- brain of a computer
- a device used to input and output information into the computer
- wide area network, private or public network
- storage device
Down
- protect the network
- a small device that plugs into the USB port on your computer
- rules of the internet communication
- brings virus into your computer
- junk mail
- Local area network, private network
- the act of copying other people's works or words ,and publish as your own work
- store the short term data
- able to let you save files in your computer
18 Clues: junk mail • storage device • protect the network • brain of a computer • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
Digital Literacy 2025-10-29
Across
- The software that runs a computer
- Computer thinking
- External devices(mouse,printer,headset)
- fake emails or texts to share data
- Random Access Memory, a type of processing computer memory
- Behaving responsibly and ethically online
- Result
- A software application used to access and navigate the internet
- Locks files until ransom is paid
Down
- Software designed to harm devices or steal info
- The practice of protecting computer systems and networks from theft, damage, or unauthorized access
- Programs that tell hardware what to do
- Working with others in a digital environment
- The trail of data a person leaves behind
- Data entered
- Physical parts of the computer
- unauthorized access to private data
- Unsolicited bulk electronic messages
18 Clues: Result • Data entered • Computer thinking • Physical parts of the computer • Locks files until ransom is paid • The software that runs a computer • fake emails or texts to share data • unauthorized access to private data • Unsolicited bulk electronic messages • Programs that tell hardware what to do • External devices(mouse,printer,headset) • ...
The Internet 2014-11-13
Across
- Distributed denial-of-service aka...
- Advanced Research Projects Agency Network
- Clobal system of interconnected computer networks is the...
- History of...
- What code/file you can generate with Key-Gen?
Down
- In what month was Internet first connected?
- What can stop viruses inflecting files in your computer?
- Bot in other words
8 Clues: History of... • Bot in other words • Distributed denial-of-service aka... • Advanced Research Projects Agency Network • In what month was Internet first connected? • What code/file you can generate with Key-Gen? • What can stop viruses inflecting files in your computer? • Clobal system of interconnected computer networks is the...
Computer 2017-12-08
Across
- A small text file created by a website.
- The address that defines the route to a file on an Internet server.
- A series of instructions that performs a particular task.
- Machinery and equipment.
- Not enough staff or time.
- display element of an electronic screen.
Down
- store data locally.
- The computing part of the computer.
- Large network made up of smaller networks.
- To write and post an entry.
- Inhouse website that serves employees only.
- A scam to steal valuable information.
- Computer secure from intruders.
- The most widely used hardware interface for attaching peripherals to a computer.
- An organization that provides access to the Internet.
15 Clues: store data locally. • Machinery and equipment. • Not enough staff or time. • To write and post an entry. • Computer secure from intruders. • The computing part of the computer. • A scam to steal valuable information. • A small text file created by a website. • display element of an electronic screen. • Large network made up of smaller networks. • ...
TWJ - chapter 5 - lesson 1 2022-06-05
Across
- WA became part of the (blank) in the year 1883
- owned rail lines plus railcars and 44 million acres of land
- built by the great northern railroad company
- *had enough money
- *contribution of money
- the amount of acres Hill sold his neighbor for $5.4 million
- railroads provided (blank) networks
- made trade with foreign countries easier
Down
- James Hill's neighbor
- companies encouraged (blank) from Europe and Asia
- *share in a company
- Steven shared the surveying duties with (blank)
- Washington's first territorial governor
- the individual most responsible for the northern specific
- pacific railroad survey authorized exploration of potential (blank) railroad
15 Clues: *had enough money • *share in a company • James Hill's neighbor • *contribution of money • railroads provided (blank) networks • Washington's first territorial governor • made trade with foreign countries easier • built by the great northern railroad company • WA became part of the (blank) in the year 1883 • Steven shared the surveying duties with (blank) • ...
TWJ - chapter 5 - lesson 2 2022-06-05
Across
- the individual most responsible for the northern specific
- built by the great northern railroad company
- Steven shared the surveying duties with (blank)
- pacific railroad survey authorized exploration of potential (blank) railroad
- *share in a company
- James Hill's neighbor
- owned rail lines plus railcars and 44 million acres of land
Down
- WA became part of the (blank) in the year 1883
- the amount of acres Hill sold his neighbor for $5.4 million
- railroads provided (blank) networks
- made trade with foreign countries easier
- companies encouraged (blank) from Europe and Asia
- Washington's first territorial governor
- *contribution of money
- *had enough money
15 Clues: *had enough money • *share in a company • James Hill's neighbor • *contribution of money • railroads provided (blank) networks • Washington's first territorial governor • made trade with foreign countries easier • built by the great northern railroad company • WA became part of the (blank) in the year 1883 • Steven shared the surveying duties with (blank) • ...
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
unit 3 networks (Ali Abokhalil 7B) 2025-01-06
Across
- the name of a website address
- a label made up of numbers
- the last part of the url
- the hardware device that connects a network to the internet
- data being scrambled into secret code
- lets the devices swap information so they can communicate
- is a type of wireless network that connects over short distances
- it allows the device to communicate over a wireless network
- the whole of a wave from the top of one wave to the top of the next
Down
- data getting errors
- a server that stores the ip addresses and urls
- the language of computers
- the middle part of the url
- the first part of the url
- how many cycles there are in a second
- is a type of wireless network that uses radio waves to connect devices together
16 Clues: data getting errors • the last part of the url • the language of computers • the first part of the url • a label made up of numbers • the middle part of the url • the name of a website address • how many cycles there are in a second • data being scrambled into secret code • a server that stores the ip addresses and urls • ...
Delicious 2024-12-22
7 Clues: Your Favorite child • Can't live without it • Decorate it for festive cheer • You can't do your job without it • Popular sport played by tall people • Igneous rock commonly found east of here • Your husband is paid handsomely to manage these
Inter- prefix 2022-03-16
Across
- operating as a unit
- make a break in
- concerning or belonging to two or more countries
- a point where lines meet
- do something together or with others
Down
- of relations between individual divisions of a country
- seize, interrupt, or stop something on its way
- a break during which an activity or event is paused
- used of competition or cooperation between secondary schools
- a worldwide network of computer networks
10 Clues: make a break in • operating as a unit • a point where lines meet • do something together or with others • a worldwide network of computer networks • seize, interrupt, or stop something on its way • concerning or belonging to two or more countries • a break during which an activity or event is paused • of relations between individual divisions of a country • ...
Spelling Test A October 31 2014-10-30
Across
- detects viruses
- gathers information on computer about you without your knowledge
- using personal information about someone else
- prevents unauthorized access to computers or networks
- sending e-mail to lure users into revealing personal information
Down
- appears as pop-up ad box
- protects computers from power surges
- travels between systems through a network to spread infections
- encoding so only authorized individuals can view
- using computer unrelated to the job
10 Clues: detects viruses • appears as pop-up ad box • using computer unrelated to the job • protects computers from power surges • using personal information about someone else • encoding so only authorized individuals can view • prevents unauthorized access to computers or networks • travels between systems through a network to spread infections • ...
Fahim 8R 2021-07-26
Across
- what do you call your computer screen?
- similar word to museum or galary
- everyone can take healthy amounts of food
- an impressive display
- treating people equally
- person who speaks in support of an individual
Down
- media digitized content that can be transmitted over the internet or computer networks
- a set goal to reach
- description of a theory
- someone who is in an event but does not take part
10 Clues: a set goal to reach • an impressive display • description of a theory • treating people equally • similar word to museum or galary • what do you call your computer screen? • everyone can take healthy amounts of food • person who speaks in support of an individual • someone who is in an event but does not take part • ...
crossword! 2024-02-03
Across
- Usually consists of 8 bits
- Invisible barrier for women advancing in the workplace
- left no crumbs
- Mentor applications are due on the _
- Film about under-recognized Black women at NASA who were a key part of its success
- Most commonly-used programming language
Down
- practice of protecting systems, networks, and programs from digital attacks
- Purdue's first women-centric hackathon ;)
- When women are generally paid less than men
- women in _
10 Clues: women in _ • left no crumbs • Usually consists of 8 bits • Mentor applications are due on the _ • Most commonly-used programming language • Purdue's first women-centric hackathon ;) • When women are generally paid less than men • Invisible barrier for women advancing in the workplace • practice of protecting systems, networks, and programs from digital attacks • ...
My dream job 2024-05-03
Across
- who works for himself
- who likes to trade and is in commerce field
- maybe owner of successful companies
- always build networks and relationship with people
- always take risk and adapt to each market situation
Down
- are really good at negotiating
- have useful skills in finance and achieve their goals
- have strong leaderships which motivates their teams also
- make decision based on market analysis
- contribute a lot in economic growth
10 Clues: who works for himself • are really good at negotiating • maybe owner of successful companies • contribute a lot in economic growth • make decision based on market analysis • who likes to trade and is in commerce field • always build networks and relationship with people • always take risk and adapt to each market situation • ...
Learning Activities and or Games for CTE and Computer Science 2025-07-15
Across
- It is a device that provides a service to other computers over a network
- Not software
- Computer Language that is used in many places
- The systematic study of materials
- The ability of machines to perform simple tasks
Down
- The arrangement of words or phrases
- Worldwide system of interconnected networks
- An electronic device for storing and processing information through an input and output
- Facts or statistics
- The exchange of information
10 Clues: Not software • Facts or statistics • The exchange of information • The systematic study of materials • The arrangement of words or phrases • Worldwide system of interconnected networks • Computer Language that is used in many places • The ability of machines to perform simple tasks • It is a device that provides a service to other computers over a network • ...
Edu in Tech puzzle 2025-09-08
Across
- Learning theory emphasizing networks and connections
- Study of knowledge and justified belief
- Market dominated by a few powerful companies
- Online courses open to anyone, often free
- Current era characterized by digital technologies
Down
- Learning theory focusing on mental processes and knowledge
- Custom tailoring of skills to an individual's needs
- Learning theory based on observable behavior changes
- Society transformed by digital technologies
- Vehicles that drive themselves without human input
10 Clues: Study of knowledge and justified belief • Online courses open to anyone, often free • Society transformed by digital technologies • Market dominated by a few powerful companies • Current era characterized by digital technologies • Vehicles that drive themselves without human input • Custom tailoring of skills to an individual's needs • ...
Team Auton crossword 2021-05-14
Across
- This enables customers to keep their account active while they are away from home at a reduced monthly rate for a minimum of two months and up to nine months.
- a portal tool that has various tabs to assist with account handling for all customers, except Ordering for ICOMS accounts.
- a secure and streamlined authentication method using just the sound of a voice to authenticate callers.
- a web-based application that manages work schedules, schedule changes, shift swaps, and vacation time.
Down
- a networking device that forwards data packets between computer networks
- Tool that we use in order to review our scorecard
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
7 Clues: Tool that we use in order to review our scorecard • a networking device that forwards data packets between computer networks • a web-based application that manages work schedules, schedule changes, shift swaps, and vacation time. • a secure and streamlined authentication method using just the sound of a voice to authenticate callers. • ...
Technology vania 2022-02-16
Across
- Computer portable
- Wireless fidelity
- Global Positioning System
- Switching device for networks
- machine for printing text or pictures onto paper
- a video camera that inputs to a computer connected to the internet
Down
- it’s everything you can touch
- uses light beam to scan codes, text,etc
- a system for connecting a number of computer systems to form a local area network
- the instructions that control what a computer does
10 Clues: Computer portable • Wireless fidelity • Global Positioning System • it’s everything you can touch • Switching device for networks • uses light beam to scan codes, text,etc • machine for printing text or pictures onto paper • the instructions that control what a computer does • a video camera that inputs to a computer connected to the internet • ...
Unit C By, Justin Howard 2015-10-22
Across
- a portable computer
- a phonograph record
- a connected group of pages on the World Wide Web
- electronic device
Down
- output device that produces a paper copy of alphanumeric or graphic data
- a set of keys
- portion of a terminal or monitor upon which information is displayed
- pictorial computer output produced on a display screen, plotter, or printer
- vast computer network linking smaller computer networks worldwide
- pointing device
10 Clues: a set of keys • pointing device • electronic device • a portable computer • a phonograph record • a connected group of pages on the World Wide Web • vast computer network linking smaller computer networks worldwide • portion of a terminal or monitor upon which information is displayed • output device that produces a paper copy of alphanumeric or graphic data • ...
Spelling Test A October 31 2014-10-30
Across
- using computer unrelated to the job
- prevents unauthorized access to computers or networks
- using personal information about someone else
- detects viruses
- sending e-mail to lure users into revealing personal information
Down
- appears as pop-up ad box
- protects computers from power surges
- gathers information on computer about you without your knowledge
- travels between systems through a network to spread infections
- encoding so only authorized individuals can view
10 Clues: detects viruses • appears as pop-up ad box • using computer unrelated to the job • protects computers from power surges • using personal information about someone else • encoding so only authorized individuals can view • prevents unauthorized access to computers or networks • travels between systems through a network to spread infections • ...
Networking Concepts 2025-06-04
Across
- In this topology, device are connected to main cable
- This topology connects each device to all other devices
- Connects network across a town or city
- Connects computers and sends data to destination computer
- Connects network in a small area like school or office
Down
- To exchange information
- Arrangement of devices
- Connects different networks together and facilitates communication
- Computer in a network
- Converts digital signals into analog signals
- Connect computers and sends data to all of them
11 Clues: Computer in a network • Arrangement of devices • To exchange information • Connects network across a town or city • Converts digital signals into analog signals • Connect computers and sends data to all of them • In this topology, device are connected to main cable • Connects network in a small area like school or office • ...
CIW CROSSWORD 2017-05-10
Across
- / unsolicited e-mail sent to multiple users and is often made to appear as if it came from a trusted source.
- server / listens on a specific port and allows clients to connect
- transfer protocol / allows the transfer of files between two computers, or one server and one computer
- / an unethical practice in which the perpetrator (i.e., typosquatter) capitalizes on typing mistakes that users make when entering the URL of a Web site into a browser.
- source / a development methodology that makes an application's source code available to anyone
- command / used to display your system's IP configuration
- group / A group of users that subscribes to a mailing list
- / The screen that contains the Web page you are viewing.
- / Web page cookies and related data stored locally on the hard drive, unless the browser's privacy mode has been invoked.
- / any file or collection of software tools that resolves system liabilities and improves software performance
Down
- command / determine the path between a source and a destination system
- / small text files placed on Web site visitors' computers
- networks / each computer has both client and server capabilities
- saver / displays images or animation on your monitor when no keystrokes or mouse actions have occurred for a specified duration
- / An instruction from a running application that executes a particular task.
- command / tests connectivity between source and destination systems.
- / a file of programming code that is inserted into an existing executable program to fix a known problem, or bug
- / An application that adds extra capabilities to your Web browser
- / a security barrier that prevents unauthorized access to or from private networks
- / ny word, slogan, symbol, name, package design or device (or any combination thereof) that marks and distinguishes a product from other products in a trade
- server / enhance the corporate network's security and increase its Internet access speed by providing caching server functions for frequently used documents
21 Clues: / small text files placed on Web site visitors' computers • / The screen that contains the Web page you are viewing. • command / used to display your system's IP configuration • group / A group of users that subscribes to a mailing list • networks / each computer has both client and server capabilities • ...
Clone of MISM5306 4-5 2015-09-15
Across
- redundant array of independent disks
- transforms data into a scrambled form call ciphertext
- a type of Trojan program used to release a virus, worm, or other destructive code
- short for modulator-demodulator
- a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet
- travels from computer to computer in a network, but id does not usually erase data.
- a self-propagating program code that is triggered by a specified time or event
- contains code intended to disrupt a computer, network or Web site, and is usually hidden in a popular program
- means that computers and networks are operating and authorized users can access the information they need
- designed to protect systems from unauthorized access in order to preserve data integrity
- sending fraudulent e-mails that seem to come from a legitimate source
- the aount of data that can be transferred from one point to another in a certain time period
- attempt to gain access to a network by posing as an authorized user
Down
- this attack floods a network or server with service requests to prevent legitimate users access to the system.
- a programming routine built into a system by its designer or programmer
- rules that govern data communication
- secure tunnel through the internet
- network connection device containing software the connects network systems and controls traffic flow between them
- capturing and recording network traffic
- loss of power in a signal as it travels from the sending device to the receiving device
- the address that allows network traffic to be routed to your desktop
- issued $5 billion in check to identity thieves
- an inexpensive way to secure a computer to a desktop or counter
- this card enables computers to communicate over a network
- a type of router
- can protect against both external and internal access
26 Clues: a type of router • short for modulator-demodulator • secure tunnel through the internet • redundant array of independent disks • rules that govern data communication • capturing and recording network traffic • issued $5 billion in check to identity thieves • transforms data into a scrambled form call ciphertext • can protect against both external and internal access • ...
Introduction to Cyber Security 2023-09-10
Across
- A sort of cyber assault in which attackers use fraudulent emails or websites to dupe people into disclosing sensitive information, such as login passwords.
- A component of a computer system that prevents unauthorized data access.
- a system for establishing a secure connection between a computing equipment and a computer network, or between two networks, through the use of an unsecured communication medium like as the public Internet.
- A software update or repair published by developers to correct security flaws or enhance system performance.
- When a person is tormented and harassed as a result of technological technologies like texting and social media platforms
- unwanted email messages
- Computer program that is used to provide customized adverts
- a field in which computers and networks are employed
- An authentication mechanism that requires users to produce two pieces of identity in order to get access to an account or system.
Down
- To imitate a character, users exploit internet platforms to acquire access or personal information.
- Manipulation used to obtain unauthorized access to a computer system
- software that is secretly installed on a user's device in order to acquire confidential information
- a breach of security in which sensitive, protected, or confidential material is copied, transferred, viewed, stolen, altered, or utilized by someone who is not allowed to do so.
- A program can run entirely via the network without requiring any software to be installed on the endpoint device that is running it.
- An unauthorized effort to gain access to a computer
- Malware that prevents an organization from accessing a file system.
- avoiding an organization's existing security mechanisms
- software used with the goal of destroying, disrupting, or gaining unauthorized access to a computer
- The process of protecting digital information over its full life cycle.
- A collection of personal computers used to infect malicious software.
20 Clues: unwanted email messages • An unauthorized effort to gain access to a computer • a field in which computers and networks are employed • avoiding an organization's existing security mechanisms • Computer program that is used to provide customized adverts • Malware that prevents an organization from accessing a file system. • ...
Internet Basics 2020-02-07
Across
- single web document which opens in a browser
- descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
- list of websites visted
- first portion of a web name; often “www.” domain
- collection of web pages which have a common theme or focus
- computer program which replicates and spreads itself from one computer to another
- software program which searches the Internet for words or phrases and returns a list as to where each is located
- middle portion of a web name; unique to the web name top-level
- allows equipment such as fax machines, printers and files to be served to multiple computers
- networks or websites which require a password or security code to gain access
- hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
- websites used to share, post and exchange information in an informal format through several differing channels web
- companies which provide Internet connections for a fee social
Down
- combination of words and symbols unique to each web page host
- last portion of a web name; includes examples such as “.com”, “.org” or “.net”
- adult Internet user who uses social networking sites,chat rooms or other cyberspace to approach and eventually hurt other people
- software program retrieving and presenting data using the Internet
- feature which can be used to store and organize a list of web pages which can be revisited easily
- portion of the Internet consisting of computer sites containing billions of documents called web pages web
- worldwide collection of networks which allow people to communicate and share information quickly and easily
- two or more computers linked together which share and exchange information
- words, phrases or graphics in a web page which targets another location
- web page which automatically opens when the web browser is opened web
- computer user who attempts to acquire unauthorized entry to servers and computer systems
24 Clues: list of websites visted • single web document which opens in a browser • first portion of a web name; often “www.” domain • collection of web pages which have a common theme or focus • combination of words and symbols unique to each web page host • companies which provide Internet connections for a fee social • ...
computer Christopher Dunn 2020-10-01
Across
- a peripheral device which makes a persistent representation of graphics or text, usually on paper
- Local Area Networks
- an American online video-sharing platform headquartered in San Bruno, California.
- Random Access Memory
- is an electrical cable that temporarily connects an appliance to the mains electricity supply via a wall socket or extension cord
- software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user
- standalone malware computer program that replicates itself in order to spread to other computers
- output how computer tells you things input tell your computer things
- the physical parts of a computer
- wireless internet card
- manly used for gamers to talk to each other during games
- how computer tells you things
- Wide Area Networks
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
Down
- Read Only Memory
- Long term data storage
- Responsible for carrying out instructions of a program
- how your computer talks to other computers
- attached to, a computer case used for active cooling
- Where the processor & memory live
- an electro-mechanical data storage device that uses magnetic storage to store and retrieve digital data using one or more rigid rapidly rotating platters coated with magnetic material
- Operating system
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- A video card is an expansion card which generates visuals for the display
- tell your computer things
- , water cooling or liquid cooling is a system used to reduce the temperature of its hardware
27 Clues: Read Only Memory • Operating system • Wide Area Networks • Local Area Networks • Random Access Memory • Long term data storage • wireless internet card • tell your computer things • how computer tells you things • the physical parts of a computer • Where the processor & memory live • how your computer talks to other computers • attached to, a computer case used for active cooling • ...
Computer Security and Ethics 2024-08-23
Across
- Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
- Make sure you use a different ____ for different sites and keep them long and complex.
- Computer activities often leave a digital ____ that leads back to the offender.
- You should regularly make a ____ of your data/photos.
- Blocks your access to your computer and files, asking you to pay a ransom to get it back.
- When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
- A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
- If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
- To protect your device from malware, you should install reputable ____ software and run frequent scans.
- If you download software, ____ it before running it.
Down
- Malware that damages files on your computer or stops your computer from running properly.
- Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
- When you copy sections of someone else's work and claim it is your own.
- Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
- Emails can spread malware, most often when you click links or open ____.
- People might feel more comfortable committing crimes on a computer because they feel like they are ____.
- When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
- Keep your operating system secure by running all the latest.
- Avoid making financial transactions on ____ networks or computers.
- Tries to open security holes in your computer so a hacker can gain access.
20 Clues: If you download software, ____ it before running it. • You should regularly make a ____ of your data/photos. • Keep your operating system secure by running all the latest. • Avoid making financial transactions on ____ networks or computers. • When you copy sections of someone else's work and claim it is your own. • ...
Tech Terms 2023-04-27
Across
- Central processing unit
- a unit of data that is eight binary digits long
- the system that your computer uses to operate all of its user base functions
- Search engine
- internet box
- a website designed to make it easy for users to create entries in chronological order
- random access memory
- a computer-generated environment
- Open-source software
- portable document format
- turns domain names into IP addresses
- the gulf between those who have ready access to computers and the internet and those who do not
- computer code or program that is protected by law against copying
- Input device
- Output device
- malicious software
- An internet cord
- programs and operating systems that need to be installed
- a binary digit the smallest increment of data on a computer
- Copy (data) from one computer system to another, typically over the internet.
- provides a service to another computer program and its user
- hyper text markup language
Down
- CTRL C
- back up information on computer
- 1000 kilobytes
- server based pieces of data ion websites
- the process of protecting information using mathematical models
- Search engine
- ties the computer's components together at one spot and allows them to talk to each other.
- Back up information on computer
- Personally Identifiable Information
- A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
- CTRL V
- Machine language
- a selective wall that lets certain ip addresses go through and blocks out viruses
- A global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
- Address Internet protocol address
- An information system enabling documents and other web resources to be accessed over the Internet.
- Turn on
- Control P
- keyboard, monitor, and speakers
- makes wifi
- Read-only memory
43 Clues: CTRL V • CTRL C • Turn on • Control P • makes wifi • internet box • Input device • Search engine • Search engine • Output device • 1000 kilobytes • Machine language • An internet cord • Read-only memory • malicious software • random access memory • Open-source software • Central processing unit • portable document format • hyper text markup language • back up information on computer • ...
Module 5 Vocabulary Crossword Puzzle 2025-01-31
Across
- A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.
- Make a copy of a file, program, or media.
- Hardware and/or software that protects a network’s resources from intrusion by users on another network, such as the Internet.
- The unauthorized and illegal duplication of copyrighted software.
- An object that can be tapped or clicked — such as a button, image, or link — on a website, pop-up ad, pop-under ad, or in an email message or text message contains a malicious program.
- An attack whose goal ranges from disabling a government’s computer network to crippling a country.
- The process of decoding encrypted data.
- A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
- A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
- A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
- Creates software registration numbers and sometimes activation codes.
- The discovery, collection, and analysis of evidence found on computers and networks. See also cyberforensics
Down
- The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
- A small text file that a web server stores on your computer.
- Destructive event or prank
- Someone who accesses a computer or network illegally.
- Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
- Someone who demands payment to stop an attack on an organization’s technology infrastructure.
- A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
- The encrypted (scrambled) data
20 Clues: Destructive event or prank • The encrypted (scrambled) data • The process of decoding encrypted data. • Make a copy of a file, program, or media. • Someone who accesses a computer or network illegally. • A small text file that a web server stores on your computer. • The unauthorized and illegal duplication of copyrighted software. • ...
Networking 3 Dante 2025-03-02
Across
- signals are focused in a single direction, which makes them ideal for placement at one end of long, narrow spaces or to cover distances between buildings
- the path data travels between computers on a network is considered the network’s
- sometimes called “peer-to-peer mode,” is a wireless mode of operation typically used only in small or temporary installations
- uses the token-passing media access method and dual rings for redundancy
- The extra 5 MB comes in the form of packet and frame headers, acknowledgments, and retransmissions, collectively known as
- which allows 802.11ac APs to send data to multiple client stations simultaneously
- In most towns, you can usually find a public Wi-Fi network, called a
- which is essentially the throughput minus the protocol headers that don’t contain application data.
Down
- So, although there’s no escaping noise on a Wi-Fi network, what’s important is the amount of noise compared with the signal strength, which is called the
- Ethernet standard works over Cat5e and Cat6 cabling
- Ethernet, released as the IEEE 802.3ab standard, supports 1000 Mbps Ethernet
- operates only in full-duplex mode, so there is no such thing as a 10 Gbps hub
- Wi-Fi signals can pass through solid objects, such as walls and trees, but they don’t get through unscathed. Solid objects absorb radio signals, causing them to
- (often called simply “100BaseT”)
- the signals radiate out from the antenna with equal strength in all directions.
- The 1997 802.11 wireless networking standard, also referred to as
- Wi-Fi networks can operate in one of two modes: infrastructure and ad hoc. Most Wi-Fi networks operate in
- The actual amount of data transferred, not counting errors and acknowledgments, is called
- network technology provides reliable transport of data, although it’s slow by current standards.
- Signals arriving at different times (referred to as “out of phase”) are called
20 Clues: (often called simply “100BaseT”) • Ethernet standard works over Cat5e and Cat6 cabling • The 1997 802.11 wireless networking standard, also referred to as • In most towns, you can usually find a public Wi-Fi network, called a • uses the token-passing media access method and dual rings for redundancy • ...
Foundations of Cyber Security I 2025-02-13
Across
- The act of making sure every individual working with an information system has specific responsibilities for information assurance.
- A process that gives a user permission to do certain things.
- A three-pronged system of cybersecurity.
- Ciphers that break down information into fixed-size blocks before encrypting it.
- Software that displays unwanted advertising while running an application on your computer.
- A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
- A guarantee of reliable access to information.
- A device that helps join two separate computer networks together to allow for communication.
- A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
- A security technique used to regulate who or what can utilize the resources of a computer system.
- Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
- A process that measures how much information has been accessed or the amount of time spent on a session.
- The governance, development, and maintenance of computer programs.
- A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
- The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
- One that is physically isolated from the internet and only able to pass data along via removable media.
- A process or set of rules.
- The use of human characteristics to distinctly identify individuals as themselves.
- A process that keeps a system secure by physically isolating it from all unsecured networks.
- An orderly search for nonvolatile data storage to load the OS.
20 Clues: A process or set of rules. • A three-pronged system of cybersecurity. • A guarantee of reliable access to information. • A process that gives a user permission to do certain things. • An orderly search for nonvolatile data storage to load the OS. • The governance, development, and maintenance of computer programs. • ...
Marketing & Technologies 2013-07-10
Across
- Set of activities that control how materials and products move from the initial source to the end user
- Company's interaction with customers
- Bid for product and services over the internet
- Electronic interpretation of information
- Efficient handling of information and resources within a commercial organization
Down
- Personalization of high volumes
- Global system of interconnected computer networks
- Anything related to computing technology
- Commerce conducted electronically
9 Clues: Personalization of high volumes • Commerce conducted electronically • Company's interaction with customers • Anything related to computing technology • Electronic interpretation of information • Bid for product and services over the internet • Global system of interconnected computer networks • ...
Network Topologies 2018-10-15
Across
- a network that has one hub/switch
- Network _________ is a way to connect multiple computers
- Thing that connects everything
Down
- network that uses one big cable
- network in the shape of a circle
- a device that redirects data
- network that has many routers and doesn't matter if one breaks
- a small local network
- big network that is made of many smaller networks
9 Clues: a small local network • a device that redirects data • Thing that connects everything • network that uses one big cable • network in the shape of a circle • a network that has one hub/switch • big network that is made of many smaller networks • Network _________ is a way to connect multiple computers • network that has many routers and doesn't matter if one breaks
Tech terms 2024-11-06
Across
- centurial processing unit
- Physical parts of a computer
- eight binary digits
- Worldwide system of interconnected computer networks and electronic devices that communicate using established set of protocols
Down
- Transmission from one computer to another network
- lowest level of programing language
- Store all digital content
- The address of unique resource on the internet
- 1 means its on and 0 means its off
9 Clues: eight binary digits • Store all digital content • centurial processing unit • Physical parts of a computer • 1 means its on and 0 means its off • lowest level of programing language • The address of unique resource on the internet • Transmission from one computer to another network • ...
crossword that Mr. Randall made us do... 2018-04-05
Across
- The computing part of the computer.
- a scam to steal valuable information
- method for keeping a computer secure from intruders.
- website that serves employees only
- most widely used hardware interface
- To store data
- A small text file (up to 4KB)
- (CPUs, drives, keyboards, printers, scanners, cables, etc.)
Down
- provides access to the Internet
- display element of an electronic screen
- a large network made up of smaller networks
- series of instructions that performs a particular task
- may use the term for capability and time
- contains text entries in reverse chronological order
- address that defines the route to a file on an Internet server
15 Clues: To store data • A small text file (up to 4KB) • provides access to the Internet • website that serves employees only • The computing part of the computer. • most widely used hardware interface • a scam to steal valuable information • display element of an electronic screen • may use the term for capability and time • a large network made up of smaller networks • ...
COMPUTER PARTS 2022-10-21
Across
- STAYS FORVER
- Exchange information and form networks
- PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN
- KEEPS HOLD OF DATA FOREVER
- IN A computing system this means using to exchange information
- LIKE LONG TERM MEMORY IN A COMPUTER
- 8 BITS
Down
- to accelerate the creation of images in a frame
- DISPLAYS INFORMATION FOR THE USER E.G SCREEN
- ONLY STAYS WHEN SYSTEM IS ON
- HOW THE USER TELLS THE COMPUTER WHAT TO DO E.G KEYBOARD
- LIKE THE HEART OF THE COMPUTER
- PART OF COMPUTER THAT IS LIKE YOUR SHORT-TERM MEMORY
- PART OF COMPUTER THAT ACTS LIKE A SKELETON
- 1 BINARY DIGIT
15 Clues: 8 BITS • STAYS FORVER • 1 BINARY DIGIT • KEEPS HOLD OF DATA FOREVER • ONLY STAYS WHEN SYSTEM IS ON • LIKE THE HEART OF THE COMPUTER • LIKE LONG TERM MEMORY IN A COMPUTER • Exchange information and form networks • PART OF COMPUTER THAT ACTS LIKE A SKELETON • DISPLAYS INFORMATION FOR THE USER E.G SCREEN • PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN • ...
Cybersecurity 2024-01-19
Across
- Malware that attaches itself to other software.
- A way to protect a network from incoming and outgoing attacks.
- Keeping secret things secret.
- An attack that takes place through digital means.
- Government agency responsible for Cybersecurity and Infrastructure Security
- The national organization which sets standards for technology
- Malware that can self-replicate and spread on its own.
- A way to secure an account; Something you know.
Down
- The right to access systems or networks.
- Maintaining access to key technologies.
- Verifying someone is who they say they are.
- A malicious software
- Monitoring who accesses what.
- Keeping systems secure and complete.
- A cybersecurity competition
15 Clues: A malicious software • A cybersecurity competition • Monitoring who accesses what. • Keeping secret things secret. • Keeping systems secure and complete. • Maintaining access to key technologies. • The right to access systems or networks. • Verifying someone is who they say they are. • Malware that attaches itself to other software. • ...
balls 2023-10-20
Across
- A common theme addressed in hip-hop.
- Lyrics often used to convey social messages.
- Promotion of social or political change.
- Hip-hop's role in inspiring change.
- Use of hip-hop to express social dissent.
- Elevating marginalized voices through hip-hop.
Down
- Refusal to accept societal injustices.
- Hip-hop's role in raising social consciousness.
- Unity within hip-hop communities.
- Skillful wordplay to convey powerful messages.
- A goal advocated for in hip-hop songs.
- Building networks for social impact.
- Call for societal change in hip-hop music.
- Tool used to amplify hip-hop's social voice.
- Hip-hop artists' involvement in social causes.
15 Clues: Unity within hip-hop communities. • Hip-hop's role in inspiring change. • A common theme addressed in hip-hop. • Building networks for social impact. • Refusal to accept societal injustices. • A goal advocated for in hip-hop songs. • Promotion of social or political change. • Use of hip-hop to express social dissent. • Call for societal change in hip-hop music. • ...
cw1 2025-11-05
Across
- Technique to run multiple OS on a single machine
- Algorithm used in training neural networks
- Concurrent execution of multiple threads
- AI system inspired by human brain structure
- OOP feature allowing one interface, many forms
- CPU technique for parallel instruction execution
- Science of secure communication
Down
- Network security system monitoring traffic
- Database process reducing redundancy
- AI model learns training data too well
- Step-by-step procedure for solving a problem
- State where processes wait indefinitely for each other
- Process of securing data by converting it to code
- Program that converts code into machine language
- Software that creates and manages virtual machines
15 Clues: Science of secure communication • Database process reducing redundancy • AI model learns training data too well • Concurrent execution of multiple threads • Network security system monitoring traffic • Algorithm used in training neural networks • AI system inspired by human brain structure • Step-by-step procedure for solving a problem • ...
Guanxi (Unit 3 - 10 words) 2021-01-27
Across
- A former student of a school
- S.one who acts like a person they want to be
- Quick at seeing what to do in a situation
- Important and needing immediate attention
Down
- Trying often to achieve something hard
- The quality of being faithful
- Starting to exist, appearing, becoming known
- Connected group of people that exchange info
- Having particular knowledge of something
- A former male student of a school
10 Clues: A former student of a school • The quality of being faithful • A former male student of a school • Trying often to achieve something hard • Having particular knowledge of something • Quick at seeing what to do in a situation • Important and needing immediate attention • Starting to exist, appearing, becoming known • S.one who acts like a person they want to be • ...
CLIMATE CHANGE 2024-08-12
Across
- Gases trapping heat in the atmosphere
- Contamination of air, water, or land
- Release of harmful gases into the atmosphere
Down
- Complex networks of living organisms and their environment
- Main component of greenhouse gas causing global warming
- Actions that meet present needs without compromising future
- Energy sources that can be replenished
- Widespread climate change affecting the entire planet
- Increase in Earth's average temperature
- Fuels formed from ancient organisms
10 Clues: Fuels formed from ancient organisms • Contamination of air, water, or land • Gases trapping heat in the atmosphere • Energy sources that can be replenished • Increase in Earth's average temperature • Release of harmful gases into the atmosphere • Widespread climate change affecting the entire planet • Main component of greenhouse gas causing global warming • ...
CompTIA Network+ (009) Ch. 13 2025-04-04
Across
- Secured intermediary device for remote admin access.
- Encrypts the full IP packet in IPSec.
- Protocol to set up secure keys in IPSec VPNs.
- Connects geographically dispersed networks.
- Secure protocol for command-line remote access.
- Uses a browser instead of client software.
Down
- Sends only some traffic through the VPN.
- Connects a user to internal network remotely.
- Protocol suite for securing IP communications.
- Dedicated line offering 1.544 Mbps bandwidth.
10 Clues: Encrypts the full IP packet in IPSec. • Sends only some traffic through the VPN. • Uses a browser instead of client software. • Connects geographically dispersed networks. • Connects a user to internal network remotely. • Protocol to set up secure keys in IPSec VPNs. • Dedicated line offering 1.544 Mbps bandwidth. • Protocol suite for securing IP communications. • ...
Chapter 2 vocab. The French in north America 2024-10-29
Across
- Self-governing and independent of external powers
- A francophone farm New France
- A francophone citizen of Acadia
- Networks of colonies
- only 1 company is allowed to sell or trade items
Down
- Most powerful member of the sovereign council
- Extending its control over other countries often using economic or military means
- missionaries who came to North America
- The second most important figure of the sovereign council
- Head of Church
10 Clues: Head of Church • Networks of colonies • A francophone farm New France • A francophone citizen of Acadia • missionaries who came to North America • Most powerful member of the sovereign council • only 1 company is allowed to sell or trade items • Self-governing and independent of external powers • The second most important figure of the sovereign council • ...
