networks Crossword Puzzles

Computer networks and internet 2020-10-21

Computer networks and internet crossword puzzle
Across
  1. WAN stands for ____ area network
  2. device to connect to the internet
  3. a list of website that have been visited recently
Down
  1. collection of interconnected networks
  2. a single document viewable through a web browser
  3. network without cables
  4. key on the top left of the keyboard
  5. a programming language used for creating a webpage

8 Clues: network without cablesWAN stands for ____ area networkdevice to connect to the internetkey on the top left of the keyboardcollection of interconnected networksa single document viewable through a web browsera list of website that have been visited recentlya programming language used for creating a webpage

What is Computer Science? 2022-10-27

What is Computer Science? crossword puzzle
Across
  1. systems are the machines that run programs
  2. technology affects the way we live and think
  3. organizing, describing, and understanding data
  4. a list of steps or instructions to finish a task
Down
  1. someone who uses something
  2. a group of connected devices
  3. a set of instructions for a computer to understand
  4. raw, unorganized facts

8 Clues: raw, unorganized factssomeone who uses somethinga group of connected devicessystems are the machines that run programstechnology affects the way we live and thinkorganizing, describing, and understanding dataa list of steps or instructions to finish a taska set of instructions for a computer to understand

SENOE Austin CSW 2024 2024-10-07

SENOE Austin CSW 2024 crossword puzzle
Across
  1. Instructions for a computer
  2. Initials of the president, whose library is located downtown.
  3. Newest Set top box(STB) released in 2023.
  4. Forwards data packets between networks
  5. Data transfer rate limit
  6. Spectrum HQ City
Down
  1. Process of identifying and resolving software issues
  2. Renowned park in downtown Austin, known for hosting numerous events
  3. Pre-release evaluation by external users
  4. Network topology, where all devices connect to a central hub
  5. Emerge at twilight from beneath the Congress Avenue Bridge

11 Clues: Spectrum HQ CityData transfer rate limitInstructions for a computerForwards data packets between networksPre-release evaluation by external usersNewest Set top box(STB) released in 2023.Process of identifying and resolving software issuesEmerge at twilight from beneath the Congress Avenue Bridge...

Safety Crossword Puzzle 2017-04-25

Safety Crossword Puzzle crossword puzzle
Across
  1. computer networks electronic and wireless
  2. a personal computer
Down
  1. electronic mail
  2. bullying on the intrnet that involves using electronics
  3. a site with information
  4. ups advertising and ads

6 Clues: electronic maila personal computera site with informationups advertising and adscomputer networks electronic and wirelessbullying on the intrnet that involves using electronics

Hadlee internet crossword puzzle 2 2014-04-04

Hadlee internet crossword puzzle 2 crossword puzzle
Across
  1. full website address
  2. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
  3. the name for a way to display information on websites.
Down
  1. Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
  2. networks online communities where people meet, socialize,exchanged digital files, etc.
  3. a collaborative website which can be directly edited by anyone with access to it
  4. the unauthorized use,reproduction, distribution, or transmission of copyrighted material.
  5. network etiquette;online manners; following rules of conduct fro online or internet users, being a good digital citizen.
  6. The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
  7. software that searches and gathers and identifies information from a database based on keywords,titles, and text
  8. Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
  9. a piece of writing that has been copied from someone else and is presented as being your own work.
  10. a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network

13 Clues: full website addressthe name for a way to display information on websites.a collaborative website which can be directly edited by anyone with access to itnetworks online communities where people meet, socialize,exchanged digital files, etc.the unauthorized use,reproduction, distribution, or transmission of copyrighted material....

Departments & Roles 2025-04-19

Departments & Roles crossword puzzle
Across
  1. Works for a company
  2. The top of a company
  3. Organises internal and external communication
  4. Employee relations like hiring staff etc.
  5. Maintains a good public image of the company
  6. Ensures all systems and networks are working
  7. Buys goods and raw materials
  8. Ensures the smooth day-to-day running of a company
Down
  1. Looking into and making future products for the company
  2. Manages the financial activities of a company
  3. Helps management in all kinds of roles
  4. Deal with money matters from paying bills to projecting sales
  5. Hires people
  6. Makes sure company's contracts and activities are legal
  7. Selling finished products to the outside market
  8. Promotes products
  9. Ensures manufacturing runs smoothly
  10. Responsible for overall working of a company

18 Clues: Hires peoplePromotes productsWorks for a companyThe top of a companyBuys goods and raw materialsEnsures manufacturing runs smoothlyHelps management in all kinds of rolesEmployee relations like hiring staff etc.Maintains a good public image of the companyEnsures all systems and networks are workingResponsible for overall working of a company...

TEJ2O1 - Security and Ethics - D. French 2024-07-26

TEJ2O1 - Security and Ethics - D. French crossword puzzle
Across
  1. You should regularly make a ____ of your data/photos.
  2. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
  3. If you download software, ____ it before running it.
  4. Emails can spread malware, most often when you click links or open ____.
  5. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
  6. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
  7. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
  8. Keep your operating system secure by running all the latest.
  9. Malware that damages files on your computer or stops your computer from running properly.
  10. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
Down
  1. Avoid making financial transactions on ____ networks or computers.
  2. Tries to open security holes in your computer so a hacker can gain access.
  3. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
  4. To protect your device from malware, you should install reputable ____ software and run frequent scans.
  5. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
  6. Make sure you use a different ____ for different sites and keep them long and complex.
  7. Computer activities often leave a digital ____ that leads back to the offender.
  8. When you copy sections of someone else's work and claim it is your own.
  9. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
  10. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.

20 Clues: If you download software, ____ it before running it.You should regularly make a ____ of your data/photos.Keep your operating system secure by running all the latest.Avoid making financial transactions on ____ networks or computers.When you copy sections of someone else's work and claim it is your own....

INTERNET PRINCIPLES OF OPERATION 2015-04-28

INTERNET PRINCIPLES OF OPERATION crossword puzzle
Across
  1. THE INTERNET CONSISTS OF MANY LINKED
  2. DEFINES WHAT YOU WILL FORMAT IN HTML
  3. DEFINES HOW YOU WILL FORMAT CONTENT IN HTML
  4. HTML
  5. YOUR OWN UNIQUE ID FOR A WEBSITE
Down
  1. COMPUTER WHICH STORES WEBSITES
  2. NAME PART OF A URL WHICH MUST BE UNIQUE
  3. COMPUTER CONNECTED TO A NETWORK
  4. ORG, COM, ACC, GOV
  5. WWW
  6. ADDRESS A UNIQUE NUMBER WHICH IDENTIFIES A NETWORK INTERFACE CARD
  7. COLOURS, FONT, SIZE OF A WEBPAGE
  8. PLACEMENT OF CONTENT ON A WEBPAGE
  9. APPLICATION WHICH ALLOWS YOUR TO SURF INTERNET
  10. SENT FROM THE BROWSER TO GET A WEBSITE
  11. SET OF RULES WHICH DEFINE HOW DEVICES COMMUNICATE
  12. A HARDWARE DEVICE WITH A NUMBER ASSIGNED TO IT
  13. ADDRESS OF A WEBSITE

18 Clues: WWWHTMLORG, COM, ACC, GOVADDRESS OF A WEBSITECOMPUTER WHICH STORES WEBSITESCOMPUTER CONNECTED TO A NETWORKCOLOURS, FONT, SIZE OF A WEBPAGEYOUR OWN UNIQUE ID FOR A WEBSITEPLACEMENT OF CONTENT ON A WEBPAGETHE INTERNET CONSISTS OF MANY LINKEDDEFINES WHAT YOU WILL FORMAT IN HTMLSENT FROM THE BROWSER TO GET A WEBSITE...

JWIN Query Fun 2024-07-09

JWIN Query Fun crossword puzzle
Across
  1. NCIC wants and warrants only?
  2. Type of agency can enter information in NCIC?
  3. A positive response to a NCIC query
  4. Abbreviation for DOJ Criminal Justice Information Network
  5. A hit response in 1 hour
  6. Hit confirmation request
  7. Driver License check
  8. Abbreviation for International Justice and Public Safety Networks
  9. A stolen vehicle query?
Down
  1. A query for NCIC W/W and CCH but only done at officer request?
  2. Type of agency that can only query NCIC?
  3. CJIS CSO ensure each agency designates a what?
  4. Abbreviation for National Crime Information Center
  5. Query for vehicle registration
  6. A hit response in 10 minutes
  7. Hit confirmation response
  8. Query for Criminal History Rap Sheet
  9. A State Warrant Query

18 Clues: Driver License checkA State Warrant QueryA stolen vehicle query?A hit response in 1 hourHit confirmation requestHit confirmation responseA hit response in 10 minutesNCIC wants and warrants only?Query for vehicle registrationA positive response to a NCIC queryQuery for Criminal History Rap SheetType of agency that can only query NCIC?...

vocabulary 2022-11-15

vocabulary crossword puzzle
Across
  1. brain of a computer
  2. a device used to input and output information into the computer
  3. a small device that plugs into the USB port on your computer
  4. wide area network, private or public network
  5. intellectual property
  6. store the short term data
  7. the act of copying other people's works or words ,and publish as your own work
  8. storage device
  9. allows copying for limited purpose
Down
  1. identify parts of a large program or construction
  2. rules of the internet communication
  3. a security system that control the networks
  4. Local area network, private network
  5. uses to connect the computer peripheral
  6. able to let you save files in your computer
  7. protect the network
  8. brings virus into your computer
  9. junk mail

18 Clues: junk mailstorage devicebrain of a computerprotect the networkintellectual propertystore the short term databrings virus into your computerallows copying for limited purposerules of the internet communicationLocal area network, private networkuses to connect the computer peripherala security system that control the networks...

Technology Crossword Assignment 2018-04-04

Technology Crossword Assignment crossword puzzle
Across
  1. the computing part of the computer...
  2. a small text file created by a website...
  3. an in-house website that serves employees only...
  4. data stored locally to speed up subsequent retrievals...
  5. picture element...
  6. a large network made of smaller networks...
  7. machinery and equipment...
  8. Uniform Resource Locator...
Down
  1. instructions for the computer...
  2. a scam to steal valuable information...
  3. an organization that provides access to the internet...
  4. computer people say "there is not enough_______ to complete this"
  5. a method for keeping your computer safe from intruders...
  6. to make a video about your day and what is going on and then posting it online...
  7. Universal Serial Bus

15 Clues: picture element...Universal Serial Busmachinery and equipment...Uniform Resource Locator...instructions for the computer...the computing part of the computer...a scam to steal valuable information...a small text file created by a website...a large network made of smaller networks...an in-house website that serves employees only......

TECHNOLOGY VOCABULARY 2021-07-26

TECHNOLOGY VOCABULARY crossword puzzle
Across
  1. set up for a particular purpose
  2. a set of related records kept together
  3. an organized body of related information
  4. page the opening page of a web site
  5. locate and correct errors in a computer program code
  6. a program used to view HTML documents
  7. crime committed using a computer and the internet
  8. the exclusive right to sell a work
Down
  1. a worldwide network of computer networks
  2. any small compartment
  3. a data transmission rate for modems
  4. software that is provided without charge
  5. transfer out of a database or document
  6. a listing of the computer files stored in memory
  7. a unit of measurement of information

15 Clues: any small compartmentset up for a particular purposethe exclusive right to sell a worka data transmission rate for modemspage the opening page of a web sitea unit of measurement of informationa program used to view HTML documentsa set of related records kept togethertransfer out of a database or documenta worldwide network of computer networks...

mari 2024-05-20

mari crossword puzzle
Across
  1. a decentralized digital currency
  2. the application of conceptual knowledge for
  3. a wide range of criminal activity that are
  4. providing the appearance of smth without reality
  5. practice and study of techniques for secure
  6. the process of writing computer software code
Down
  1. study and experimentation of algorithmic process
  2. a public distributed ledger of lists of records
  3. protection of computer systems and networks
  4. collection of accounts in which accounting
  5. a potential for vulnerabilities to turn into
  6. a digital currency designated to work as
  7. a device that can make and receive calls over
  8. the minimum amount of any physical entity involved
  9. the opposite of natural

15 Clues: the opposite of naturala decentralized digital currencya digital currency designated to work ascollection of accounts in which accountinga wide range of criminal activity that areprotection of computer systems and networksthe application of conceptual knowledge forpractice and study of techniques for secure...

IT CAN BE DONE SPOTLIGHT CROSSWORD PUZZLE 2023-02-16

IT CAN BE DONE SPOTLIGHT CROSSWORD PUZZLE crossword puzzle
Across
  1. We sell these - popular add-on for notebooks
  2. Our website for all that we do
  3. _____ State Drive We use these to speed up your computer
  4. Part of our slogan / our point of difference
  5. We design, sell and maintain these
  6. We offer this type of Recovery Service
  7. We also service here
Down
  1. One of most popular services - keep your data safe
  2. We sell these devices to share internet access
  3. We sell these - including portable ones
  4. We sell & service these
  5. We sell & service these
  6. We service here
  7. We sell this consumable for Inkjet printers
  8. We sell these - for phones, laptops & cars
  9. We sell this consumable for Laser printers

16 Clues: We service hereWe also service hereWe sell & service theseWe sell & service theseOur website for all that we doWe design, sell and maintain theseWe offer this type of Recovery ServiceWe sell these - including portable onesWe sell these - for phones, laptops & carsWe sell this consumable for Laser printersWe sell this consumable for Inkjet printers...

TWJ - chapter 5 - lesson 1 2022-06-05

TWJ - chapter 5 - lesson 1 crossword puzzle
Across
  1. *contribution of money
  2. *had enough money
  3. Steven shared the surveying duties with (blank)
  4. the individual most responsible for the northern specific
  5. built by the great northern railroad company
  6. owned rail lines plus railcars and 44 million acres of land
Down
  1. made trade with foreign countries easier
  2. James Hill's neighbor
  3. *share in a company
  4. Washington's first territorial governor
  5. WA became part of the (blank) in the year 1883
  6. the amount of acres Hill sold his neighbor for $5.4 million
  7. pacific railroad survey authorized exploration of potential (blank) railroad
  8. companies encouraged (blank) from Europe and Asia
  9. railroads provided (blank) networks

15 Clues: *had enough money*share in a companyJames Hill's neighbor*contribution of moneyrailroads provided (blank) networksWashington's first territorial governormade trade with foreign countries easierbuilt by the great northern railroad companyWA became part of the (blank) in the year 1883Steven shared the surveying duties with (blank)...

Second Semeste 2025-05-26

Second Semeste crossword puzzle
Across
  1. — Reproductive organs that produce gametes.
  2. — An incomplete bone fracture common in children; written as one word.
  3. — Interconnected systems; plural form.
  4. — A superficial injury caused by scraping or rubbing.
  5. — To evaluate or carefully examine.
  6. — Small inflamed bumps on the skin, common in acne.
  7. — Endoscopic examination of the colon; compound word without spaces.
  8. — Sexual relations; compound word written as one.
  9. — Hormone that regulates sleep.
  10. — Injuries caused by heat, chemicals, or radiation.
Down
  1. — Spongy tissue inside bones where blood cells form.
  2. — Blood cells that help with clotting.
  3. — Prescribed amount of medication to take.
  4. — Blood formations that stop bleeding.
  5. — Irregular cuts or tears in the skin.

15 Clues: — Hormone that regulates sleep.— To evaluate or carefully examine.— Blood cells that help with clotting.— Blood formations that stop bleeding.— Interconnected systems; plural form.— Irregular cuts or tears in the skin.— Prescribed amount of medication to take.— Reproductive organs that produce gametes....

AI 2025-07-23

AI crossword puzzle
Across
  1. Ability to interpret sensory information
  2. Using technology to perform tasks without human intervention
  3. Computational model inspired by the human brain
  4. Learning algorithm for training neural networks
  5. Ability to learn, understand, and apply knowledge
  6. Model's ability to perform well on unseen data
  7. Type of learning without labeled data
Down
  1. Process of categorizing data into groups
  2. Imitating a real-world process or system
  3. Learning method based on rewards and penalties
  4. Step-by-step procedure for solving a problem
  5. Predicting continuous values in machine learning
  6. Process of improving a model's performance
  7. Forecasting future outcomes based on data
  8. Type of learning with labeled data

15 Clues: Type of learning with labeled dataType of learning without labeled dataProcess of categorizing data into groupsImitating a real-world process or systemAbility to interpret sensory informationForecasting future outcomes based on dataProcess of improving a model's performanceStep-by-step procedure for solving a problem...

Cyber Basics & Common Threats 2025-10-07

Cyber Basics & Common Threats crossword puzzle
Across
  1. Software designed to harm or exploit a system
  2. Network of infected computers controlled remotely
  3. Malware that locks data and demands payment
  4. Software that secretly collects user data
  5. Process of converting information into code
  6. Software update to fix vulnerabilities
  7. Malware designed to hide other malicious software
Down
  1. A secret string of characters used for authentication
  2. Self-replicating malicious program
  3. Malicious software disguised as legitimate
  4. A security barrier between trusted and untrusted networks
  5. Taking advantage of a vulnerability
  6. Hidden entry point into a system
  7. Software that detects and removes malicious code
  8. Fraudulent attempt to steal sensitive data via fake email

15 Clues: Hidden entry point into a systemSelf-replicating malicious programTaking advantage of a vulnerabilitySoftware update to fix vulnerabilitiesSoftware that secretly collects user dataMalicious software disguised as legitimateMalware that locks data and demands paymentProcess of converting information into code...

Safety Crossword Puzzle 2017-04-25

Safety Crossword Puzzle crossword puzzle
Across
  1. computer networks electronic and wireless
  2. a personal computer
  3. electronic mail
Down
  1. bullying on the intrnet that involves using electronics
  2. a site with information
  3. ups advertising and ads

6 Clues: electronic maila personal computera site with informationups advertising and adscomputer networks electronic and wirelessbullying on the intrnet that involves using electronics

Network Word Search 2014-03-22

Network Word Search crossword puzzle
Across
  1. fully or partially connected network in which each of the nodes is connected to each other.
  2. point where lines intersect or terminate
  3. geographically dispersed collection of LAN'S
  4. prevents unauthorized access to or from a private network
  5. easiest way to add more computers into network
  6. family of computer networking technologies for LANs
  7. connects to internet using microwaves
  8. Bus message-based protocol designed for automotive applications/used in aerospace, maritime, industrial automation & medical equipment
  9. arrangement of the various elements of a computer network
  10. computer network used for data transmission among devices
  11. access without a direct connection
  12. computer hardware or software, accesses a service made available by a server
  13. network topology based on a hierarchy of nodes
  14. one of the most common computer network topologies
  15. common connection point for devices in a network
Down
  1. LAN/each node connected to single cable
  2. interconnects computers withing a limited or smaller geographic area
  3. Larger than LAN withing same city
  4. combination of topologies/resulting network does not exhibit one of the standard topologies
  5. distance of access of Wi-Fi networks
  6. router/provides greater range for signal & strength of overall signal
  7. interconnects various pieces of network, provides path for exchange of info
  8. system (software and hardware)/responds to requests to provide network services
  9. simplest topology/permanent link between two endpoints
  10. network topology travels in one direction/each device is a repeater
  11. measurement of bit-rate of available or consumed data
  12. expansion board (card) installed so computer can be connected to a network
  13. decentralized and distributed network architecture/individual nodes act as both suppliers & consumers of resources
  14. any location where Wi-Fi access is publicly available
  15. forwards data packets between computer networks
  16. connect devices together on a computer network
  17. twisted pair cable for carrying signals
  18. modular connector for computer network (Ethernet) cables

33 Clues: Larger than LAN withing same cityaccess without a direct connectiondistance of access of Wi-Fi networksconnects to internet using microwavesLAN/each node connected to single cabletwisted pair cable for carrying signalspoint where lines intersect or terminategeographically dispersed collection of LAN'Seasiest way to add more computers into network...

E- Ethics Vocabulary 2021-01-25

E- Ethics Vocabulary crossword puzzle
Across
  1. Name - first portion of a web name; often “www.”
  2. - computer user who attempts to acquire unauthorized entry to servers and computer systems
  3. Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
  4. tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
  5. - two or more computers linked together which share and exchange information
  6. Media - websites used to share, post and exchange information in an informal format through several differing channels
  7. - collection of web pages which have a common theme or focus
  8. Virus - computer program which replicates and spreads itself from one computer to another
  9. Service Providers (ISP) - companies which provide Internet connections for a fee
  10. History - list of websites visited
  11. Name - middle portion of a web name; unique to the web name
  12. page - single web document which opens in a browser
Down
  1. - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
  2. - worldwide collection of networks which allow people to communicate and share information quickly and easily
  3. Network - networks or websites which require a password or security code to gain access
  4. Address - combination of words and symbols unique to each web page
  5. Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
  6. - words, phrases or graphics in a web page which targets another location
  7. or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
  8. - allows equipment such as fax machines, printers and files to be served to multiple computers
  9. - web page which automatically opens when the web browser is opened
  10. (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
  11. Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
  12. Browser - software program retrieving and presenting data using the Internet

24 Clues: History - list of websites visitedName - first portion of a web name; often “www.”page - single web document which opens in a browserName - middle portion of a web name; unique to the web name- collection of web pages which have a common theme or focusAddress - combination of words and symbols unique to each web page...

Computer 2022-11-24

Computer crossword puzzle
Across
  1. a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium or over a loudspeaker
  2. the technology that connects your offices, data centers, cloud applications, and cloud storage together
  3. a device with a screen that shows a rendered electronic image
  4. accelerate graphics rendering
  5. which allow for easy use of a computer's processing power, as well as applications
  6. short term memory where data is stored as the processor needs it
  7. a piece of data from a website that is stored within a web browser that the website can retrieve at a later time
  8. for putting information including letters, words and numbers into your computer
  9. a type of data storage device that is used in laptops and desktop computers
Down
  1. the circuit board that connects all of your hardware to your processor
  2. a worldwide system of computer networks
  3. an electronic game in which players control images on a video screen
  4. consists of a series of computers linked together to form a network in a circumscribed location
  5. tell everything from your graphics processing unit (GPU) to your disk drives and screens what to do
  6. a small, movable device that lets you control a range of things on a computer
  7. managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection
  8. to offer audio output for the listener
  9. program that provides a way to look at and interact with all the information on the World Wide Web
  10. circulates air through the radiator so it can release engine heat into the surrounding air
  11. an item like a word or button that points to another location
  12. electronic machinery that carries out instructions from programs that allows a computer or other device to perform its tasks

21 Clues: accelerate graphics renderingto offer audio output for the listenera worldwide system of computer networksa device with a screen that shows a rendered electronic imagean item like a word or button that points to another locationshort term memory where data is stored as the processor needs it...

NNDL 2023-11-25

NNDL crossword puzzle
Across
  1. What type of neural network is used for unsupervised learning and aims to encode input data into a lower-dimensional representation?
  2. What optimization algorithm combines the benefits of both momentum and RMSprop?
  3. What approach involves using a pre-trained model as the starting point for a new model?
  4. What is the technique for representing categorical variables as binary vectors?
  5. What technique is used to assess a model's performance by splitting the dataset into multiple subsets?
  6. What is the representation of categorical variables as continuous vectors in neural networks?
  7. What is the technique for initializing neural network weights to prevent vanishing or exploding gradients?
  8. What type of neural network is designed for processing structured grid data, such as images?
  9. What metric combines precision and recall for evaluating the performance of a classification model?
Down
  1. The activation function commonly used in the output layer for multiclass classification.
  2. What downsampling technique in convolutional neural networks selects the maximum value from a set of values?
  3. What is the phenomenon where the gradient becomes extremely small during training?
  4. What is the process of artificially increasing the size of a dataset by applying transformations to the existing data?
  5. What technique is used to prevent overfitting by adding a penalty term to the loss function based on the magnitude of weights?
  6. What is the iterative optimization algorithm used to minimize the loss function?
  7. What is the activation function that replaces all negative values in the input with zero?
  8. What technique involves normalizing inputs in a neural network to improve training stability?
  9. What is the process of finding the best hyperparameter values for a machine learning model?
  10. What is the technique of gradually reducing the learning rate during training to converge more effectively?
  11. What activation function is commonly used in the output layer for multiclass classification?
  12. What technique involves randomly dropping out some neurons during training to prevent overfitting?

21 Clues: What optimization algorithm combines the benefits of both momentum and RMSprop?What is the technique for representing categorical variables as binary vectors?What is the iterative optimization algorithm used to minimize the loss function?What is the phenomenon where the gradient becomes extremely small during training?...

Unit 3 Jerzee 2024-04-15

Unit 3 Jerzee crossword puzzle
Across
  1. a crucial tool for UX/UI Designers for prototyping, collaboration, and maintaining brand consistency.
  2. an area of territory owned or controlled by a ruler or government
  3. to encourage people to like, buy, use, do, or support something
  4. to become filled with surprise, wonder, or amazed curiosity.
  5. plan and direct the route or course of a ship, aircraft, or other form of transportation, especially by using instruments or maps.
  6. create, share, and test designs for websites, mobile apps, and other digital products and experiJes
  7. an app to create your own professional website
  8. a wireless, portable personal computer with a touchscreen interface.
  9. collecting of webpages
  10. a person who uses or operates something, especially a computer or other machine.
  11. is a data structure supporting some pre-specified set of queries and updates to a database while consuming space
  12. a person who receives or entertains other people as guests.
  13. the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
  14. a user interface design tool for creating wireframes.
  15. allows you to easily create and test tomorrow's digital experiences across a range of devices, including smartphones, desktops, TVs, and car dashboard screens.
  16. a set of options presented to the user of a computer application to help them find information or execute a function.
  17. being able to react quickly
Down
  1. (of a place) able to be reached or entered.
  2. the activity or business of promoting and selling products or services, including market research and advertising.
  3. an ability or willingness to change to suit different conditions.
  4. provides tools to ideate, prototype, document, and also, build design systems.
  5. someone who prepares content for the Web
  6. a physically disabled person
  7. a way to organize and structure content within your main domain.
  8. able to move or be moved freely or easily.
  9. an all-encompassing online wireframing and product design tool designed to bring software ideas to life visually.

26 Clues: collecting of webpagesbeing able to react quicklya physically disabled personsomeone who prepares content for the Webable to move or be moved freely or easily.(of a place) able to be reached or entered.an app to create your own professional websitea user interface design tool for creating wireframes....

RU ITEC411 Chapter 5 Crime and Security 2024-11-16

RU ITEC411 Chapter 5 Crime and Security crossword puzzle
Across
  1. Early packet switching network, seen as the predecessor for modern internet.
  2. Software intentionally designed to cause disruption.
  3. Use of cyber-attacks against a state, causing comparable harm to warfare.
  4. A destructive computer worm that spread rapidly through email attachments.
  5. Cyberattack where malicious actors redirect internet users to a fake website, designed to mimic a legitimate one.
  6. Overwhelming targeted systems with a flood of traffic, rendering it inaccessible.
  7. Malware that disguises itself as legitimate software to gain unauthorized access to a computer system.
  8. A short-range wireless technology that allows electronic devices to communicate.
  9. Measurement and analysis of unique physical or behavioral characteristics of an individual, used for verification purposes.
Down
  1. Ethical hacking of a computer system to evaluate security weaknesses and address them.
  2. A mass-mailing macro virus released in 1999, that targeted Microsoft Word and Outlook-based systems, causing significant network traffic and disruption.
  3. Use of computer hacking to promote political agenda or social change.
  4. A self-replicating malware that spreads through networks, exploiting vulnerabilities to infect multiple devices without human interaction.
  5. An open-source library that provides secure communication between computer networks.
  6. A non-profit organization focused on improving cybersecurity, by conducting research on software bugs that impact internet security.
  7. A vulnerability found in OpenSSL allowing attackers to steal sensitive information.
  8. Created by Robert Tappan Morris, to spread across the internet by exploiting vulnerabilities in Unix systems.
  9. Cyberattack where attackers use deceptive tactics to trick individuals into revealing sensitive information.
  10. Malicious software that encrypts a victim's files, making them inaccessible, unless a fine is paid.
  11. Malware that replicates itself by attaching to other programs or files, requiring a host to run it.
  12. Network of computers or other internet-connected devices that have been infected with malware and are under the control of a single attacker.

21 Clues: Software intentionally designed to cause disruption.Use of computer hacking to promote political agenda or social change.Use of cyber-attacks against a state, causing comparable harm to warfare.A destructive computer worm that spread rapidly through email attachments.Early packet switching network, seen as the predecessor for modern internet....

Joshua Street 2020-04-27

Joshua Street crossword puzzle
Across
  1. most effective when all contributors are clear, direct, and respectful.
  2. Distracting environment
  3. feeling or belief that one can rely on someone or
  4. Questions that can be answered yes/no or in a short answer.
  5. expressed through body language, facial expression, or other means.
Down
  1. trust.
  2. the transmission of messages over communications networks.
  3. gives time to respond
  4. The listener focuses attention on the speaker.
  5. A musical or vocal sound with reference to it's pitch
  6. Spoken or written

11 Clues: trust.Spoken or writtengives time to respondDistracting environmentThe listener focuses attention on the speaker.feeling or belief that one can rely on someone orA musical or vocal sound with reference to it's pitchthe transmission of messages over communications networks.Questions that can be answered yes/no or in a short answer....

Review of Internet & Domain Names 2012-11-12

Review of Internet & Domain Names crossword puzzle
Across
  1. traffic jam at router (begins w/a "B")
  2. Small packages or bits of information are called this
  3. Address or URL of a website (begins w/a "d")
  4. A device that forwards information over the internet
  5. Government URL website
Down
  1. Military URL website
  2. Business URL website
  3. Worldwide network made up of smaller networks connected together
  4. non-profit URL website
  5. Button in photostory we used to record our voice

10 Clues: Military URL websiteBusiness URL websitenon-profit URL websiteGovernment URL websitetraffic jam at router (begins w/a "B")Address or URL of a website (begins w/a "d")Button in photostory we used to record our voiceA device that forwards information over the internetSmall packages or bits of information are called this...

Spelling Test B October 31 2014-10-30

Spelling Test B                 October 31 crossword puzzle
Across
  1. software detects viruses
  2. using computer unrelated to the job
  3. protects computers from power surges
Down
  1. appears as pop-up ad box
  2. prevents unauthorized access to computers or networks
  3. encoding so only authorized individuals can view
  4. using personal information about someone else
  5. sending e-mail to lure users into revealing personal information
  6. gathers information on computer about you without your knowledge
  7. travels between systems through a network to spread infections

10 Clues: appears as pop-up ad boxsoftware detects virusesusing computer unrelated to the jobprotects computers from power surgesusing personal information about someone elseencoding so only authorized individuals can viewprevents unauthorized access to computers or networkstravels between systems through a network to spread infections...

Computer Systems Crossword Puzzle 2024-08-12

Computer Systems Crossword Puzzle crossword puzzle
Across
  1. External device connected to a computer
  2. Computer that provides data to other computers
  3. Computer that requests data from a server
  4. Programs and operating information used by a computer
Down
  1. Translates domain names to IP addresses
  2. Security system that monitors and controls incoming and outgoing network traffic
  3. The people who work for a company
  4. Physical parts of a computer
  5. Group of interconnected devices
  6. Hardware device that routes data between networks

10 Clues: Physical parts of a computerGroup of interconnected devicesThe people who work for a companyExternal device connected to a computerComputer that requests data from a serverTranslates domain names to IP addressesComputer that provides data to other computersPrograms and operating information used by a computer...

Transformers 2024-12-09

Transformers crossword puzzle
Across
  1. encoding***Adds positional information to input embeddings
  2. heads***Multiple attention mechanisms in parallel
  3. output sequence
  4. input sequence
  5. layer***Maps input tokens to dense vectors
Down
  1. for weighting input tokens
  2. network***Neural network layer applied to each token independently
  3. layers***Stacked layers of self-attention and feed-forward networks
  4. dot-product attention***Common attention mechanism in transformers
  5. key, value***Components of self-attention mechanism

10 Clues: input sequenceoutput sequencefor weighting input tokenslayer***Maps input tokens to dense vectorsheads***Multiple attention mechanisms in parallelkey, value***Components of self-attention mechanismencoding***Adds positional information to input embeddingsnetwork***Neural network layer applied to each token independently...

Transformers 2024-12-09

Transformers crossword puzzle
Across
  1. encoding***Adds positional information to input embeddings
  2. heads***Multiple attention mechanisms in parallel
  3. output sequence
  4. input sequence
  5. layer***Maps input tokens to dense vectors
Down
  1. for weighting input tokens
  2. network***Neural network layer applied to each token independently
  3. layers***Stacked layers of self-attention and feed-forward networks
  4. dot-product attention***Common attention mechanism in transformers
  5. key, value***Components of self-attention mechanism

10 Clues: input sequenceoutput sequencefor weighting input tokenslayer***Maps input tokens to dense vectorsheads***Multiple attention mechanisms in parallelkey, value***Components of self-attention mechanismencoding***Adds positional information to input embeddingsnetwork***Neural network layer applied to each token independently...

Technology 2025-03-31

Technology crossword puzzle
Across
  1. The process of converting information into a digital format
  2. A popular search engine
  3. A program used to access and view websites
  4. A wireless networking technology
  5. Physical components of a computer system.
  6. Wireless communication technology used for short-range data transfer
Down
  1. Operating system by Microsoft
  2. A device used to input text and commands into a computer.
  3. Software that performs specific tasks for users
  4. The global system of interconnected computer networks

10 Clues: A popular search engineOperating system by MicrosoftA wireless networking technologyPhysical components of a computer system.A program used to access and view websitesSoftware that performs specific tasks for usersThe global system of interconnected computer networksA device used to input text and commands into a computer....

Tech Crossword Puzzle 2025-06-28

Tech Crossword Puzzle crossword puzzle
Across
  1. Malware that can harm your computer.
  2. A digital document stored on a computer.
  3. Programs and operating systems used by a computer.
  4. Global network that connects computers.
  5. An input device with keys.
Down
  1. Device used to produce physical copies of documents.
  2. Device that forwards data between computer networks.
  3. Electronic method of sending messages.
  4. A device used to control the pointer on the screen.
  5. The screen that displays the computer output.

10 Clues: An input device with keys.Malware that can harm your computer.Electronic method of sending messages.Global network that connects computers.A digital document stored on a computer.The screen that displays the computer output.Programs and operating systems used by a computer.A device used to control the pointer on the screen....

E-Ethics Vocab 2021-01-25

E-Ethics Vocab crossword puzzle
Across
  1. - web page which automatically opens when the web browser is opened
  2. - collection of web pages which have a common theme or focus
  3. Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
  4. page - single web document which opens in a browser
  5. Name - first portion of a web name; often “www.”
  6. History - list of websites visited
  7. - allows equipment such as fax machines, printers and files to be served to multiple computers
  8. - computer user who attempts to acquire unauthorized entry to servers and computer systems
  9. or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
  10. Virus - computer program which replicates and spreads itself from one computer to another
  11. Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
  12. Wide Web (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
Down
  1. Network - networks or websites which require a password or security code to gain access
  2. Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
  3. Browser - software program retrieving and presenting data using the Internet
  4. tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
  5. - words, phrases or graphics in a web page which targets another location
  6. - worldwide collection of networks which allow people to communicate and share information quickly and easily
  7. - two or more computers linked together which share and exchange information
  8. Service Providers (ISP) - companies which provide Internet connections for a fee
  9. Address - combination of words and symbols unique to each web page
  10. Media - websites used to share, post and exchange information in an informal format through several differing channels
  11. - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
  12. Name - middle portion of a web name; unique to the web name

24 Clues: History - list of websites visitedName - first portion of a web name; often “www.”page - single web document which opens in a browserName - middle portion of a web name; unique to the web name- collection of web pages which have a common theme or focusAddress - combination of words and symbols unique to each web page...

Internet Basics vocabulary 2021-01-25

Internet Basics vocabulary crossword puzzle
Across
  1. Name - first portion of a web name; often “www.”
  2. - computer user who attempts to acquire unauthorized entry to servers and computer systems
  3. Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
  4. tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
  5. - two or more computers linked together which share and exchange information
  6. Media - websites used to share, post and exchange information in an informal format through several differing channels
  7. - collection of web pages which have a common theme or focus
  8. Virus - computer program which replicates and spreads itself from one computer to another
  9. Service Providers (ISP) - companies which provide Internet connections for a fee
  10. History - list of websites visited
  11. Name - middle portion of a web name; unique to the web name
  12. page - single web document which opens in a browser
Down
  1. - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
  2. - worldwide collection of networks which allow people to communicate and share information quickly and easily
  3. Network - networks or websites which require a password or security code to gain access
  4. Address - combination of words and symbols unique to each web page
  5. Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
  6. - words, phrases or graphics in a web page which targets another location
  7. or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
  8. - allows equipment such as fax machines, printers and files to be served to multiple computers
  9. - web page which automatically opens when the web browser is opened
  10. (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
  11. Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
  12. Browser - software program retrieving and presenting data using the Internet

24 Clues: History - list of websites visitedName - first portion of a web name; often “www.”page - single web document which opens in a browserName - middle portion of a web name; unique to the web name- collection of web pages which have a common theme or focusAddress - combination of words and symbols unique to each web page...

SMM-Marketing Omoev Arlen 2020-04-18

SMM-Marketing Omoev Arlen crossword puzzle
Across
  1. Product _____. Getting customers to buy a product for the first time
  2. efers to techniques that target social networks and applications to spread brand awareness or promote particular products
  3. what platform of smm marketing is the most famous in USA
  4. Paid-for communication, aimed at informing or persuading
  5. This targeting is based on a certain location and can be as broad as a country or region, or as specific as a city or neighborhood.
  6. Marketing (also known as emarketing, web marketing, or digital marketing) is an all-inclusive term for marketing products and/or services online – and like many all-inclusive terms, internet marketing means different things to different people.
  7. Any recognizable name, logo or symbol that identifies a product
  8. The group of consumers or customers aimed at by a business
  9. These targets are based on age, gender, ethnicity, race, income, education, religion, economic status and more, and are extremely commonly used in all types of marketing.
  10. A brand that is owned and promoted by retailers rather than manufacturers
Down
  1. Research designed to provide information about opinions, attitudes and behaviours
  2. what platform of smm marketing is the most famous in CIS (Commonwealth of Independent States)
  3. The marketing combination of product, price, promotion and place
  4. Distribution __________. How a business gets its products to the end
  5. also known as multisegment marketing, is a marketing strategy that involves identifying specific personas or markets for specific content.
  6. Surveying a small group of a population to gain research insights
  7. Marketing promotion that relies on word-of-mouth or online networks to spread the message
  8. Goods or services produced by a business
  9. The part of the marketing mix that focuses on where a firm’s products are sold
  10. Product or brand with a high share of a mature or declining market

20 Clues: Goods or services produced by a businesswhat platform of smm marketing is the most famous in USAPaid-for communication, aimed at informing or persuadingThe group of consumers or customers aimed at by a businessAny recognizable name, logo or symbol that identifies a productThe marketing combination of product, price, promotion and place...

Ryan Jones-Crossword-2nd Period 2016-10-24

Ryan Jones-Crossword-2nd Period crossword puzzle
Across
  1. the activity of defrauding an online account holder of financial information by posing as a legitimate company.
  2. send the same message indiscriminately to (large numbers of recipients) on the Internet.
  3. portable computer
  4. A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.
  5. study/use of systems for storing, retrieving, and sending info.
  6. a cellular phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
  7. computer networking device that connects devices together on a computer network
  8. gives instructions the computer needs to operate
  9. software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  10. lets the user to complete tasks such as create documents , Spreadsheets, databases, and publications
  11. common connection point for devices in a network
Down
  1. a summary
  2. Partitions are drives meaning it shows up as one drive on the windows
  3. networking device that forwards data packets between computer networks
  4. To open a list of keyboard shortcuts in Google Docs, press Ctrl + / (Windows, Chrome OS) or ⌘ + / (Mac). You can also use menu accesskeys.
  5. created when two or more PCs are connected and share resources without going through a separate server computer
  6. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  7. connects to local systems and controls the passing info.
  8. Point networking hardware allows Wi-Fi compliant device to connect to a wired network
  9. desktop computer terminal, more powerful than personal computer

20 Clues: a summaryportable computergives instructions the computer needs to operatecommon connection point for devices in a networkconnects to local systems and controls the passing info.study/use of systems for storing, retrieving, and sending info.desktop computer terminal, more powerful than personal computer...

Chapter 36 2014-04-30

Chapter 36 crossword puzzle
Across
  1. were the industries that include financial services?
  2. where did manufacturing jobs move out of?
  3. what were the names of the general people who left their country to move to safety in 2005?
  4. what is the creation of plants or animals that are genetically identical to an existing plant or animal?
  5. what was created in 2002 to coordinate national efforts against terrorism
  6. what is the type of terrorism that involves politically motivated attacksion informatic systems such as hacking into computer networks?
  7. what is the abbreviation for European Economic community?
  8. what includes all financial interactions that cross international borders?
  9. what is the abbreviation for the North Atlantic Treaty Organization?
  10. since that late 1960s, more than 14,000 terrorist attacks have occurred where?
  11. in the late 1950s a new style of music emerged called what?
Down
  1. president Bush an anti-terrorism bill called what?
  2. access to TV, radio, and phones are known as
  3. what is a spread of nuclear weapons to other nations called?
  4. what is the working laboratory for experiments in space?
  5. who was one of the greatest champions of human rights that established the order of the missionaries of charity?
  6. what is the voluntary linkage of computer networks around the world?
  7. what is the 20th century attempt to increase food resources worldwide using economic processes?
  8. cultural elements that reflect groups of people with common backgrounds and interests?
  9. what is a major goal for globalization?
  10. the transferring of genes from one living thing to another in order to produce an organism with new traits?
  11. what is the use of violence, on people, or property
  12. the western mind set of placing a high value on acquiring material possessions is what?
  13. what is the greatest global health issue(disease) that was first discovered in the 1980s?

24 Clues: what is a major goal for globalization?where did manufacturing jobs move out of?access to TV, radio, and phones are known aspresident Bush an anti-terrorism bill called what?what is the use of violence, on people, or propertywere the industries that include financial services?what is the working laboratory for experiments in space?...

Wireless/Bluetooth 2023-03-28

Wireless/Bluetooth crossword puzzle
Across
  1. 5 GHz Frequency, max speed 3.46 Gbps, 300 Ft range, 802.11b/g/n backwards compatibility
  2. 2.4 GHz Frequency, max speed 54 Mbps, 150 Ft range, 11 channels, 802.11b backwards compatibility
  3. 2.4 GHz Frequency, max speed 11 Mbps, 150 Ft range, 11 channels, no backwards compatibility
  4. 2.4 or 5 GHz Frequency, max speed 600 Mbps, 1200 Ft range, 2.4 GHz: 11 Channels 5GHz: 23 channels, 802.11a/b/g depending on implementation backwards compatibility
  5. A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
  6. A method that combines channels into one to increase bandwidth.
  7. Wireless authentication method that allows for automatic connection between a device and the wireless access point.
  8. An enhancement that allows multiple antennas to use the same radio frequency.
  9. A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
  10. Wireless communication technology that allows two devices to connect to each other over a short distance.
Down
  1. authentication Secure authentication method for wired and wireless networks.
  2. IEEE designation for all wireless networking standards.
  3. 5 GHz Frequency, max speed 54 Mbps, 100 Ft range, 23 channels, no backwards compatibility
  4. 2.4 or 5 GHz Frequency, max speed 14 Gbps, 300 Ft range, 802.11b/g/n/ac backwards compatibility
  5. Wireless network that requires no authentication.
  6. Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
  7. Wireless authentication method that uses a passphrase to authenticate users.
  8. A communication method that allows two-way communication between two devices within a few centimeters of each other.
  9. Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
  10. An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.

20 Clues: Wireless network that requires no authentication.IEEE designation for all wireless networking standards.A method that combines channels into one to increase bandwidth.authentication Secure authentication method for wired and wireless networks.Wireless authentication method that uses a passphrase to authenticate users....

CIE 5 (crossword) 2025-04-28

CIE 5 (crossword) crossword puzzle
Across
  1. AI-generated videos made to look real are called
  2. Which deep learning framework is known for dynamic computation graphs and developed by Meta?
  3. Real-time speech recognition tool by Google
  4. Google’s AI framework that supports TPUs
  5. Computer vision library with C++ and Python support
  6. Type of AI that focuses on making AI decisions transparent to humans
  7. TensorFlow tool used for visualizing model performance
  8. Python library mainly used for statistical plots like violin plot, box plot
  9. Graphical representation to show data distribution
  10. Field of AI focused on processing and understanding human language
  11. Massive datasets processed and analyzed by AI platforms
  12. Google service for tracking app and website performance
  13. Machine learning library that integrates with OpenCV
Down
  1. Content creation tool using GPT for marketing and writing
  2. Which open-source framework by Google is used for deep learning and machine learning?
  3. The process of analyzing data sets to summarize main characteristics
  4. AI field that trains agents through rewards and penalties
  5. Which Python library is used to create static, animated, and interactive visualizations?
  6. TensorFlow feature for using pre-trained models automatically
  7. Neural networks commonly used for image data processing
  8. Type of graph to show bars for categorical data comparison
  9. Google AI service combining machine learning with computer vision
  10. Visualization type in Seaborn showing variable distribution as smoothed curve
  11. Platform that offers free GPU access for training AI models online
  12. A business report format created using Matplotlib for insights
  13. The act of imitating real-world processes using computer models
  14. Python library that works with Seaborn for data visualization
  15. Lightweight framework in TensorFlow for building neural networks
  16. Platform commonly used for coding and data visualization with Matplotlib
  17. AI model developed by OpenAI to generate human-like text responses
  18. Google’s multimodal AI model supporting text, images, and code

31 Clues: Google’s AI framework that supports TPUsReal-time speech recognition tool by GoogleAI-generated videos made to look real are calledGraphical representation to show data distributionComputer vision library with C++ and Python supportMachine learning library that integrates with OpenCVTensorFlow tool used for visualizing model performance...

Network Topologies and Technologies 2025-03-03

Network Topologies and Technologies crossword puzzle
Across
  1. What occurs when devices transmit simultaneously using CSMA/CD?
  2. Which signaling method uses the entire bandwidth to send data as pulses?
  3. What topology creates a temporary connection between two devices whenever data is sent?
  4. What is the name given to the 802.11 series of standards for wireless LANs?
  5. What is the term for a device that connects two networks wirelessly, typically used to link two buildings or extend an existing network?
  6. What type of antenna focuses signals in a single direction?
  7. What is another name for a logical bus topology, where all devices share the bandwidth?
  8. What wireless mode has no central device and allows data to travel directly between devices?
Down
  1. In a physical star topology, what is the central device that connects all the computers in a LAN?
  2. What ratio measures the amount of valid signal compared to noise in a transmission?
  3. physical bus traveling across the medium is called?
  4. The term used when electricity bounces off the end of a cable and back in the other direction is called
  5. What topology connects only two devices directly?
  6. In a point-to-point topology, what is the main advantage of having a dedicated link between two devices?
  7. What logical topology is used in both Ethernet and wireless LANs, where data is received by all devices?
  8. In a physical ring topology, what type of device connects the local area networks (LANs) of buildings A, B, and C to form the ring?
  9. What topology connects each device to every other device, providing redundancy and fault tolerance?
  10. Term refers to the extra information in a network transmission that isn't part of the application data?
  11. What topology passes data from one device to the next in a circle until it reaches the destination?
  12. What topology describes how data travels between devices?

20 Clues: What topology connects only two devices directly?physical bus traveling across the medium is called?What topology describes how data travels between devices?What type of antenna focuses signals in a single direction?What occurs when devices transmit simultaneously using CSMA/CD?...

Awesome Privacy Week Crossword 2025-01-07

Awesome Privacy Week Crossword crossword puzzle
Across
  1. Malicious software designed to harm or exploit computers and networks
  2. A set of rules that organizations must follow to protect sensitive health information in the U.S.
  3. The European Union's data protection regulation implemented in 2018
  4. A widely used AI model trained on large datasets for text generation and understanding
  5. A technique that hides details of individuals in a dataset while preserving overall patterns
  6. A privacy framework aimed at protecting children’s online data in the U.S.
  7. A set of policies and technologies designed to secure sensitive data in a cloud
  8. A weakness in a system that can be exploited by cybercriminals
  9. A breach of this can result in stolen data, identity theft, and reputational damage
  10. A mechanism that lets users decide whether their data can be collected or shared
  11. A feature that allows users to browse the internet without saving cookies or search history
  12. A type of attack where criminals demand payment to release encrypted files
  13. The principle that organizations should collect only the data necessary for a specific purpose
Down
  1. Unauthorized access or damage to computer systems and networks
  2. The act of removing or disguising personal identifiers from datasets
  3. A key document that explains how an individual's data is stored, used, and shared
  4. The legal right of individuals to control how their personal data is collected, used, and shared
  5. AI system component designed to process vast amounts of data quickly
  6. A document that outlines how organizations collect, use, and protect data
  7. The science of making computers understand and generate human language
  8. A person designated to oversee compliance with data protection laws and practices
  9. A protocol used to ensure secure communication over a computer network
  10. The process of encoding information to prevent unauthorized access
  11. A U.S. state law that grants residents the right to know what personal data companies collect about them

24 Clues: Unauthorized access or damage to computer systems and networksA weakness in a system that can be exploited by cybercriminalsThe process of encoding information to prevent unauthorized accessThe European Union's data protection regulation implemented in 2018The act of removing or disguising personal identifiers from datasets...

internet 2025-09-19

internet crossword puzzle
Across
  1. A physical medium for linking systems.
  2. A collection of several web pages managed by the same owner.
  3. A way in which networks can be interconnected.
  4. The quality of J.C. Licklider for understanding the potential of computers.
  5. A visionary who formulated the first ideas for the global network.
  6. The research center where Tim Berners-Lee developed ENQUIRE and the World Wide Web.
  7. A person who uses a network service, often with an account and username.
  8. The screen that shows computer information to the user.
  9. A system invented by Tim Berners-Lee for researchers to share documents.
  10. A set of devices that can process, store, and input data.
  11. War, The period in which the fear of a nuclear war motivated the creation of a network.
  12. A programming language for creating web pages.
  13. Graphics (icons, images) that can be clicked to access linked information.
  14. A network of networks that allows access to information from different computers.
  15. A form of writing in which there is no specific order to follow.
  16. An application for accessing and viewing web information.
  17. An invisible area where a hyperlink is activated by clicking.
  18. page, A document for the World Wide Web identified by a URL.
Down
  1. A network developed by the U.S. Department of Defense to link computers at the Pentagon.
  2. Activities of consuming internet content.
  3. A satellite launched by the Soviet Union during the Cold War.
  4. A global information system for storing and finding resources.
  5. Multiple systems interconnected to share information.
  6. The medium initially used to link computers at the Pentagon.
  7. A combination of different forms of content, such as text, images, and videos.
  8. The name of the 8-ton computer from 1951.
  9. The building of the U.S. Department of Defense.
  10. A unique identifier for a web page.
  11. How well the software responds to user actions.
  12. Words that become clickable to access linked information.

30 Clues: A unique identifier for a web page.A physical medium for linking systems.Activities of consuming internet content.The name of the 8-ton computer from 1951.A way in which networks can be interconnected.A programming language for creating web pages.The building of the U.S. Department of Defense.How well the software responds to user actions....

Computer Terms 2018-04-05

Computer Terms crossword puzzle
Across
  1. To store data locally in order to speed up subsequent retrievals
  2. organization that provides access to the Internet
  3. large network made up of smaller networks
  4. The computing part of the computer
  5. Instructions for the computer
  6. The address that defines the route to a file on an Internet server
  7. computer term for capability and time
  8. To write and post an entry, visual
Down
  1. small text file
  2. Machinery and equipment
  3. keeps the computer secure
  4. An inhouse website that serves employees only, and most medium-sized and large companies have one
  5. a scam to steal valuable information
  6. for attaching peripherals to a computer
  7. bitmapped image

15 Clues: small text filebitmapped imageMachinery and equipmentkeeps the computer secureInstructions for the computerThe computing part of the computerTo write and post an entry, visuala scam to steal valuable informationcomputer term for capability and timefor attaching peripherals to a computerlarge network made up of smaller networks...

Technology Crossword Assignment 2018-04-04

Technology Crossword Assignment crossword puzzle
Across
  1. a scam to steal valuable information...
  2. instructions for the computer...
  3. machinery and equipment...
  4. a small text file created by a website...
  5. Uniform Resource Locator...
  6. computer people say "there is not enough_______ to complete this"
  7. the computing part of the computer...
Down
  1. a method for keeping your computer safe from intruders...
  2. an in-house website that serves employees only...
  3. picture element...
  4. a large network made of smaller networks...
  5. data stored locally to speed up subsequent retrievals...
  6. to make a video about your day and what is going on and then posting it online...
  7. an organization that provides access to the internet...
  8. Universal Serial Bus

15 Clues: picture element...Universal Serial Busmachinery and equipment...Uniform Resource Locator...instructions for the computer...the computing part of the computer...a scam to steal valuable information...a small text file created by a website...a large network made of smaller networks...an in-house website that serves employees only......

COMPUTER PARTS 2022-10-21

COMPUTER PARTS crossword puzzle
Across
  1. PART OF COMPUTER THAT IS LIKE YOUR SHORT-TERM MEMORY
  2. DISPLAYS INFORMATION FOR THE USER E.G SCREEN
  3. HOW THE USER TELLS THE COMPUTER WHAT TO DO E.G KEYBOARD
  4. LIKE THE HEART OF THE COMPUTER
  5. 8 BITS
  6. to accelerate the creation of images in a frame
  7. LIKE LONG TERM MEMORY IN A COMPUTER
  8. KEEPS HOLD OF DATA FOREVER
Down
  1. Exchange information and form networks
  2. IN A computing system this means using to exchange information
  3. ONLY STAYS WHEN SYSTEM IS ON
  4. 1 BINARY DIGIT
  5. STAYS FORVER
  6. PART OF COMPUTER THAT ACTS LIKE A SKELETON
  7. PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN

15 Clues: 8 BITSSTAYS FORVER1 BINARY DIGITKEEPS HOLD OF DATA FOREVERONLY STAYS WHEN SYSTEM IS ONLIKE THE HEART OF THE COMPUTERLIKE LONG TERM MEMORY IN A COMPUTERExchange information and form networksPART OF COMPUTER THAT ACTS LIKE A SKELETONDISPLAYS INFORMATION FOR THE USER E.G SCREENPART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN...

Technology Crossword Puzzle 2017-12-08

Technology Crossword Puzzle crossword puzzle
Across
  1. A way to steal personal information.
  2. a number of people who use computers.
  3. A small file created by a website.
  4. Instructions for the computer.
  5. A way to keep a computer safe from intruders.
  6. a way to speed up retrievals.
  7. An organization that provides access to the internet.
  8. The address that defines the route to a file.
Down
  1. A way to share information.
  2. A device to store information.
  3. A website that serves the use of employees only.
  4. A large network made up of smaller networks.
  5. Machinery and equipment.
  6. The fundamental display element of an electronic.
  7. A computing part of a computer.

15 Clues: Machinery and equipment.A way to share information.a way to speed up retrievals.A device to store information.Instructions for the computer.A computing part of a computer.A small file created by a website.A way to steal personal information.a number of people who use computers.A large network made up of smaller networks....

Digital Citizenship 2018-01-26

Digital Citizenship crossword puzzle
Across
  1. networks where you participate in social networking
  2. the stuff that is looked up or researched
  3. your trail of data online
  4. being safe online
  5. using someones similar or exact words without permission
  6. used to protect information
Down
  1. regulates how online tools collect personal information
  2. a photo or image that is not allowed to be used other than its original purpose
  3. only acceptable in very few situations
  4. online form of harassment
  5. acceptable way of communicating online
  6. someone who is unknown to you
  7. your or someone else's personal information
  8. having permission to use someone else's work or image or some kind
  9. the rules of being online

15 Clues: being safe onlineonline form of harassmentyour trail of data onlinethe rules of being onlineused to protect informationsomeone who is unknown to youonly acceptable in very few situationsacceptable way of communicating onlinethe stuff that is looked up or researchedyour or someone else's personal information...

tut-4 2018-09-10

tut-4 crossword puzzle
Across
  1. cloud supply chain managment
  2. A commercial building for storage of goods.
  3. An exploting weakness of mobile devices
  4. Producter of goods and items
  5. Protect your networks against external and internal attack.
  6. most used OS of moblie system
  7. That allows systems and services to be easily accessible to the general public.
Down
  1. A template of sample secrity policies
  2. Online security firm
  3. Widely used mobile standard
  4. Mixture of public and private cloud.
  5. Final stage of SCM
  6. The tasks can be performed on-site or off-site.
  7. India ranks in terms of the highest number of internet users in the world
  8. Organized hacking

15 Clues: Organized hackingFinal stage of SCMOnline security firmWidely used mobile standardcloud supply chain managmentProducter of goods and itemsmost used OS of moblie systemMixture of public and private cloud.A template of sample secrity policiesAn exploting weakness of mobile devicesA commercial building for storage of goods....

Emma Gunter Muscle Fiber Crossword 2024-01-17

Emma Gunter Muscle Fiber Crossword crossword puzzle
Across
  1. converts glucose to pyruvic acid
  2. use anaerobic glycolysis to contract quickly
  3. powerhouse of the cell
  4. the compound that provides the body with energy
  5. use aerobic respiration to contract slowly
  6. when muscle tissue disintegrates from disuse
  7. use aerobic respiration to contract quickly
  8. when structural proteins are added to muscle fibers
  9. muscles that are involuntary and line organs
Down
  1. formation of new capillary networks around a muscle fiber
  2. muscles that are trainable
  3. age related muscle atrophy
  4. a native compound that people take supplements for; legal but sketchy
  5. causes soreness in muscles due to lactic acid buildup
  6. only found in the heart

15 Clues: powerhouse of the cellonly found in the heartmuscles that are trainableage related muscle atrophyconverts glucose to pyruvic aciduse aerobic respiration to contract slowlyuse aerobic respiration to contract quicklyuse anaerobic glycolysis to contract quicklywhen muscle tissue disintegrates from disusemuscles that are involuntary and line organs...

Xact 2025-05-14

Xact crossword puzzle
Across
  1. Common AI tool for natural language processing
  2. Product metric indicating user loyalty
  3. Cross-functional method in Agile for time-boxed delivery
  4. Role responsible for defining features and prioritizing
  5. Daily team meeting in Agile
  6. _______ learning – subset of AI based on neural networks
  7. AI + Agile = better _______ making
  8. Non-human conversational interface powered by AI
Down
  1. A meeting to reflect and improve after a sprint
  2. A key mindset in product management—build, measure, ______
  3. A prioritized list of work for the development team
  4. Key visual tool in Agile to track task progress
  5. Empirical process framework for product delivery
  6. Smallest testable product version in Agile
  7. Actionable insight derived from user behavior
  8. Framework of continuous product improvement

16 Clues: Daily team meeting in AgileAI + Agile = better _______ makingProduct metric indicating user loyaltySmallest testable product version in AgileFramework of continuous product improvementActionable insight derived from user behaviorCommon AI tool for natural language processingA meeting to reflect and improve after a sprint...

Xact 2025-05-14

Xact crossword puzzle
Across
  1. Common AI tool for natural language processing
  2. Product metric indicating user loyalty
  3. Cross-functional method in Agile for time-boxed delivery
  4. Role responsible for defining features and prioritizing
  5. Daily team meeting in Agile
  6. _______ learning – subset of AI based on neural networks
  7. AI + Agile = better _______ making
  8. Non-human conversational interface powered by AI
Down
  1. A meeting to reflect and improve after a sprint
  2. A key mindset in product management—build, measure, ______
  3. A prioritized list of work for the development team
  4. Key visual tool in Agile to track task progress
  5. Empirical process framework for product delivery
  6. Smallest testable product version in Agile
  7. Actionable insight derived from user behavior
  8. Framework of continuous product improvement

16 Clues: Daily team meeting in AgileAI + Agile = better _______ makingProduct metric indicating user loyaltySmallest testable product version in AgileFramework of continuous product improvementActionable insight derived from user behaviorCommon AI tool for natural language processingA meeting to reflect and improve after a sprint...

cw1 2025-11-05

cw1 crossword puzzle
Across
  1. Technique to run multiple OS on a single machine
  2. Algorithm used in training neural networks
  3. Concurrent execution of multiple threads
  4. AI system inspired by human brain structure
  5. OOP feature allowing one interface, many forms
  6. CPU technique for parallel instruction execution
  7. Science of secure communication
Down
  1. Network security system monitoring traffic
  2. Database process reducing redundancy
  3. AI model learns training data too well
  4. Step-by-step procedure for solving a problem
  5. State where processes wait indefinitely for each other
  6. Process of securing data by converting it to code
  7. Program that converts code into machine language
  8. Software that creates and manages virtual machines

15 Clues: Science of secure communicationDatabase process reducing redundancyAI model learns training data too wellConcurrent execution of multiple threadsNetwork security system monitoring trafficAlgorithm used in training neural networksAI system inspired by human brain structureStep-by-step procedure for solving a problem...

cw1 2025-11-05

cw1 crossword puzzle
Across
  1. Program that converts code into machine language
  2. Network security system monitoring traffic
  3. Process of securing data by converting it to code
  4. Step-by-step procedure for solving a problem
  5. State where processes wait indefinitely for each other
  6. Algorithm used in training neural networks
  7. Technique to run multiple OS on a single machine
  8. Science of secure communication
  9. Concurrent execution of multiple threads
Down
  1. AI system inspired by human brain structure
  2. Software that creates and manages virtual machines
  3. Database process reducing redundancy
  4. CPU technique for parallel instruction execution
  5. OOP feature allowing one interface, many forms
  6. AI model learns training data too well

15 Clues: Science of secure communicationDatabase process reducing redundancyAI model learns training data too wellConcurrent execution of multiple threadsNetwork security system monitoring trafficAlgorithm used in training neural networksAI system inspired by human brain structureStep-by-step procedure for solving a problem...

vocabulary 2022-11-15

vocabulary crossword puzzle
Across
  1. brain of a computer
  2. a device used to input and output information into the computer
  3. a small device that plugs into the USB port on your computer
  4. wide area network, private or public network
  5. intellectual property
  6. store the short term data
  7. the act of copying other people's works or words ,and publish as your own work
  8. storage device
  9. allows copying for limited purpose
Down
  1. identify parts of a large program or construction
  2. rules of the internet communication
  3. a security system that control the networks
  4. Local area network, private network
  5. uses to connect the computer peripheral
  6. able to let you save files in your computer
  7. protect the network
  8. brings virus into your computer
  9. junk mail

18 Clues: junk mailstorage devicebrain of a computerprotect the networkintellectual propertystore the short term databrings virus into your computerallows copying for limited purposerules of the internet communicationLocal area network, private networkuses to connect the computer peripherala security system that control the networks...

vocabulary 2022-11-15

vocabulary crossword puzzle
Across
  1. brain of a computer
  2. a device used to input and output information into the computer
  3. a small device that plugs into the USB port on your computer
  4. wide area network, private or public network
  5. intellectual property
  6. store the short term data
  7. the act of copying other people's works or words ,and publish as your own work
  8. storage device
  9. allows copying for limited purpose
Down
  1. identify parts of a large program or construction
  2. rules of the internet communication
  3. a security system that control the networks
  4. Local area network, private network
  5. uses to connect the computer peripheral
  6. able to let you save files in your computer
  7. protect the network
  8. brings virus into your computer
  9. junk mail

18 Clues: junk mailstorage devicebrain of a computerprotect the networkintellectual propertystore the short term databrings virus into your computerallows copying for limited purposerules of the internet communicationLocal area network, private networkuses to connect the computer peripherala security system that control the networks...

computer vocabulary 2022-11-22

computer vocabulary crossword puzzle
Across
  1. a security system that control the networks
  2. intellectual property
  3. uses to connect the computer peripheral
  4. allows copying for limited purpose
  5. identify parts of a large program or construction
  6. brain of a computer
  7. a device used to input and output information into the computer
  8. wide area network, private or public network
  9. storage device
Down
  1. protect the network
  2. a small device that plugs into the USB port on your computer
  3. rules of the internet communication
  4. brings virus into your computer
  5. junk mail
  6. Local area network, private network
  7. the act of copying other people's works or words ,and publish as your own work
  8. store the short term data
  9. able to let you save files in your computer

18 Clues: junk mailstorage deviceprotect the networkbrain of a computerintellectual propertystore the short term databrings virus into your computerallows copying for limited purposerules of the internet communicationLocal area network, private networkuses to connect the computer peripherala security system that control the networks...

computer vocabulary 2022-11-22

computer vocabulary crossword puzzle
Across
  1. a security system that control the networks
  2. intellectual property
  3. uses to connect the computer peripheral
  4. allows copying for limited purpose
  5. identify parts of a large program or construction
  6. brain of a computer
  7. a device used to input and output information into the computer
  8. wide area network, private or public network
  9. storage device
Down
  1. protect the network
  2. a small device that plugs into the USB port on your computer
  3. rules of the internet communication
  4. brings virus into your computer
  5. junk mail
  6. Local area network, private network
  7. the act of copying other people's works or words ,and publish as your own work
  8. store the short term data
  9. able to let you save files in your computer

18 Clues: junk mailstorage deviceprotect the networkbrain of a computerintellectual propertystore the short term databrings virus into your computerallows copying for limited purposerules of the internet communicationLocal area network, private networkuses to connect the computer peripherala security system that control the networks...

Digital Literacy 2025-10-29

Digital Literacy crossword puzzle
Across
  1. The software that runs a computer
  2. Computer thinking
  3. External devices(mouse,printer,headset)
  4. fake emails or texts to share data
  5. Random Access Memory, a type of processing computer memory
  6. Behaving responsibly and ethically online
  7. Result
  8. A software application used to access and navigate the internet
  9. Locks files until ransom is paid
Down
  1. Software designed to harm devices or steal info
  2. The practice of protecting computer systems and networks from theft, damage, or unauthorized access
  3. Programs that tell hardware what to do
  4. Working with others in a digital environment
  5. The trail of data a person leaves behind
  6. Data entered
  7. Physical parts of the computer
  8. unauthorized access to private data
  9. Unsolicited bulk electronic messages

18 Clues: ResultData enteredComputer thinkingPhysical parts of the computerLocks files until ransom is paidThe software that runs a computerfake emails or texts to share dataunauthorized access to private dataUnsolicited bulk electronic messagesPrograms that tell hardware what to doExternal devices(mouse,printer,headset)...

The Internet 2014-11-13

The Internet crossword puzzle
Across
  1. Distributed denial-of-service aka...
  2. Advanced Research Projects Agency Network
  3. Clobal system of interconnected computer networks is the...
  4. History of...
  5. What code/file you can generate with Key-Gen?
Down
  1. In what month was Internet first connected?
  2. What can stop viruses inflecting files in your computer?
  3. Bot in other words

8 Clues: History of...Bot in other wordsDistributed denial-of-service aka...Advanced Research Projects Agency NetworkIn what month was Internet first connected?What code/file you can generate with Key-Gen?What can stop viruses inflecting files in your computer?Clobal system of interconnected computer networks is the...

Computer 2017-12-08

Computer crossword puzzle
Across
  1. A small text file created by a website.
  2. The address that defines the route to a file on an Internet server.
  3. A series of instructions that performs a particular task.
  4. Machinery and equipment.
  5. Not enough staff or time.
  6. display element of an electronic screen.
Down
  1. store data locally.
  2. The computing part of the computer.
  3. Large network made up of smaller networks.
  4. To write and post an entry.
  5. Inhouse website that serves employees only.
  6. A scam to steal valuable information.
  7. Computer secure from intruders.
  8. The most widely used hardware interface for attaching peripherals to a computer.
  9. An organization that provides access to the Internet.

15 Clues: store data locally.Machinery and equipment.Not enough staff or time.To write and post an entry.Computer secure from intruders.The computing part of the computer.A scam to steal valuable information.A small text file created by a website.display element of an electronic screen.Large network made up of smaller networks....

TWJ - chapter 5 - lesson 1 2022-06-05

TWJ - chapter 5 - lesson 1 crossword puzzle
Across
  1. WA became part of the (blank) in the year 1883
  2. owned rail lines plus railcars and 44 million acres of land
  3. built by the great northern railroad company
  4. *had enough money
  5. *contribution of money
  6. the amount of acres Hill sold his neighbor for $5.4 million
  7. railroads provided (blank) networks
  8. made trade with foreign countries easier
Down
  1. James Hill's neighbor
  2. companies encouraged (blank) from Europe and Asia
  3. *share in a company
  4. Steven shared the surveying duties with (blank)
  5. Washington's first territorial governor
  6. the individual most responsible for the northern specific
  7. pacific railroad survey authorized exploration of potential (blank) railroad

15 Clues: *had enough money*share in a companyJames Hill's neighbor*contribution of moneyrailroads provided (blank) networksWashington's first territorial governormade trade with foreign countries easierbuilt by the great northern railroad companyWA became part of the (blank) in the year 1883Steven shared the surveying duties with (blank)...

TWJ - chapter 5 - lesson 2 2022-06-05

TWJ - chapter 5 - lesson 2 crossword puzzle
Across
  1. the individual most responsible for the northern specific
  2. built by the great northern railroad company
  3. Steven shared the surveying duties with (blank)
  4. pacific railroad survey authorized exploration of potential (blank) railroad
  5. *share in a company
  6. James Hill's neighbor
  7. owned rail lines plus railcars and 44 million acres of land
Down
  1. WA became part of the (blank) in the year 1883
  2. the amount of acres Hill sold his neighbor for $5.4 million
  3. railroads provided (blank) networks
  4. made trade with foreign countries easier
  5. companies encouraged (blank) from Europe and Asia
  6. Washington's first territorial governor
  7. *contribution of money
  8. *had enough money

15 Clues: *had enough money*share in a companyJames Hill's neighbor*contribution of moneyrailroads provided (blank) networksWashington's first territorial governormade trade with foreign countries easierbuilt by the great northern railroad companyWA became part of the (blank) in the year 1883Steven shared the surveying duties with (blank)...

mari 2024-05-20

mari crossword puzzle
Across
  1. a decentralized digital currency
  2. the application of conceptual knowledge for
  3. a wide range of criminal activity that are
  4. providing the appearance of smth without reality
  5. practice and study of techniques for secure
  6. the process of writing computer software code
Down
  1. study and experimentation of algorithmic process
  2. a public distributed ledger of lists of records
  3. protection of computer systems and networks
  4. collection of accounts in which accounting
  5. a potential for vulnerabilities to turn into
  6. a digital currency designated to work as
  7. a device that can make and receive calls over
  8. the minimum amount of any physical entity involved
  9. the opposite of natural

15 Clues: the opposite of naturala decentralized digital currencya digital currency designated to work ascollection of accounts in which accountinga wide range of criminal activity that areprotection of computer systems and networksthe application of conceptual knowledge forpractice and study of techniques for secure...

unit 3 networks (Ali Abokhalil 7B) 2025-01-06

unit 3 networks (Ali Abokhalil 7B) crossword puzzle
Across
  1. the name of a website address
  2. a label made up of numbers
  3. the last part of the url
  4. the hardware device that connects a network to the internet
  5. data being scrambled into secret code
  6. lets the devices swap information so they can communicate
  7. is a type of wireless network that connects over short distances
  8. it allows the device to communicate over a wireless network
  9. the whole of a wave from the top of one wave to the top of the next
Down
  1. data getting errors
  2. a server that stores the ip addresses and urls
  3. the language of computers
  4. the middle part of the url
  5. the first part of the url
  6. how many cycles there are in a second
  7. is a type of wireless network that uses radio waves to connect devices together

16 Clues: data getting errorsthe last part of the urlthe language of computersthe first part of the urla label made up of numbersthe middle part of the urlthe name of a website addresshow many cycles there are in a seconddata being scrambled into secret codea server that stores the ip addresses and urls...

Delicious 2024-12-22

Delicious crossword puzzle
Across
  1. You can't do your job without it
  2. Your Favorite child
  3. Can't live without it
  4. Popular sport played by tall people
Down
  1. Igneous rock commonly found east of here
  2. Your husband is paid handsomely to manage these
  3. Decorate it for festive cheer

7 Clues: Your Favorite childCan't live without itDecorate it for festive cheerYou can't do your job without itPopular sport played by tall peopleIgneous rock commonly found east of hereYour husband is paid handsomely to manage these

Inter- prefix 2022-03-16

Inter- prefix crossword puzzle
Across
  1. operating as a unit
  2. make a break in
  3. concerning or belonging to two or more countries
  4. a point where lines meet
  5. do something together or with others
Down
  1. of relations between individual divisions of a country
  2. seize, interrupt, or stop something on its way
  3. a break during which an activity or event is paused
  4. used of competition or cooperation between secondary schools
  5. a worldwide network of computer networks

10 Clues: make a break inoperating as a unita point where lines meetdo something together or with othersa worldwide network of computer networksseize, interrupt, or stop something on its wayconcerning or belonging to two or more countriesa break during which an activity or event is pausedof relations between individual divisions of a country...

Spelling Test A October 31 2014-10-30

Spelling Test A                         October 31 crossword puzzle
Across
  1. detects viruses
  2. gathers information on computer about you without your knowledge
  3. using personal information about someone else
  4. prevents unauthorized access to computers or networks
  5. sending e-mail to lure users into revealing personal information
Down
  1. appears as pop-up ad box
  2. protects computers from power surges
  3. travels between systems through a network to spread infections
  4. encoding so only authorized individuals can view
  5. using computer unrelated to the job

10 Clues: detects virusesappears as pop-up ad boxusing computer unrelated to the jobprotects computers from power surgesusing personal information about someone elseencoding so only authorized individuals can viewprevents unauthorized access to computers or networkstravels between systems through a network to spread infections...

Fahim 8R 2021-07-26

Fahim 8R crossword puzzle
Across
  1. what do you call your computer screen?
  2. similar word to museum or galary
  3. everyone can take healthy amounts of food
  4. an impressive display
  5. treating people equally
  6. person who speaks in support of an individual
Down
  1. media digitized content that can be transmitted over the internet or computer networks
  2. a set goal to reach
  3. description of a theory
  4. someone who is in an event but does not take part

10 Clues: a set goal to reachan impressive displaydescription of a theorytreating people equallysimilar word to museum or galarywhat do you call your computer screen?everyone can take healthy amounts of foodperson who speaks in support of an individualsomeone who is in an event but does not take part...

crossword! 2024-02-03

crossword! crossword puzzle
Across
  1. Usually consists of 8 bits
  2. Invisible barrier for women advancing in the workplace
  3. left no crumbs
  4. Mentor applications are due on the _
  5. Film about under-recognized Black women at NASA who were a key part of its success
  6. Most commonly-used programming language
Down
  1. practice of protecting systems, networks, and programs from digital attacks
  2. Purdue's first women-centric hackathon ;)
  3. When women are generally paid less than men
  4. women in _

10 Clues: women in _left no crumbsUsually consists of 8 bitsMentor applications are due on the _Most commonly-used programming languagePurdue's first women-centric hackathon ;)When women are generally paid less than menInvisible barrier for women advancing in the workplacepractice of protecting systems, networks, and programs from digital attacks...

My dream job 2024-05-03

My dream job crossword puzzle
Across
  1. who works for himself
  2. who likes to trade and is in commerce field
  3. maybe owner of successful companies
  4. always build networks and relationship with people
  5. always take risk and adapt to each market situation
Down
  1. are really good at negotiating
  2. have useful skills in finance and achieve their goals
  3. have strong leaderships which motivates their teams also
  4. make decision based on market analysis
  5. contribute a lot in economic growth

10 Clues: who works for himselfare really good at negotiatingmaybe owner of successful companiescontribute a lot in economic growthmake decision based on market analysiswho likes to trade and is in commerce fieldalways build networks and relationship with peoplealways take risk and adapt to each market situation...

Learning Activities and or Games for CTE and Computer Science 2025-07-15

Learning Activities and or Games for CTE and Computer Science crossword puzzle
Across
  1. It is a device that provides a service to other computers over a network
  2. Not software
  3. Computer Language that is used in many places
  4. The systematic study of materials
  5. The ability of machines to perform simple tasks
Down
  1. The arrangement of words or phrases
  2. Worldwide system of interconnected networks
  3. An electronic device for storing and processing information through an input and output
  4. Facts or statistics
  5. The exchange of information

10 Clues: Not softwareFacts or statisticsThe exchange of informationThe systematic study of materialsThe arrangement of words or phrasesWorldwide system of interconnected networksComputer Language that is used in many placesThe ability of machines to perform simple tasksIt is a device that provides a service to other computers over a network...

Edu in Tech puzzle 2025-09-08

Edu in Tech puzzle crossword puzzle
Across
  1. Learning theory emphasizing networks and connections
  2. Study of knowledge and justified belief
  3. Market dominated by a few powerful companies
  4. Online courses open to anyone, often free
  5. Current era characterized by digital technologies
Down
  1. Learning theory focusing on mental processes and knowledge
  2. Custom tailoring of skills to an individual's needs
  3. Learning theory based on observable behavior changes
  4. Society transformed by digital technologies
  5. Vehicles that drive themselves without human input

10 Clues: Study of knowledge and justified beliefOnline courses open to anyone, often freeSociety transformed by digital technologiesMarket dominated by a few powerful companiesCurrent era characterized by digital technologiesVehicles that drive themselves without human inputCustom tailoring of skills to an individual's needs...

Team Auton crossword 2021-05-14

Team Auton crossword crossword puzzle
Across
  1. This enables customers to keep their account active while they are away from home at a reduced monthly rate for a minimum of two months and up to nine months.
  2. a portal tool that has various tabs to assist with account handling for all customers, except Ordering for ICOMS accounts.
  3. a secure and streamlined authentication method using just the sound of a voice to authenticate callers.
  4. a web-based application that manages work schedules, schedule changes, shift swaps, and vacation time.
Down
  1. a networking device that forwards data packets between computer networks
  2. Tool that we use in order to review our scorecard
  3. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols

7 Clues: Tool that we use in order to review our scorecarda networking device that forwards data packets between computer networksa web-based application that manages work schedules, schedule changes, shift swaps, and vacation time.a secure and streamlined authentication method using just the sound of a voice to authenticate callers....

Technology vania 2022-02-16

Technology vania crossword puzzle
Across
  1. Computer portable
  2. Wireless fidelity
  3. Global Positioning System
  4. Switching device for networks
  5. machine for printing text or pictures onto paper
  6. a video camera that inputs to a computer connected to the internet
Down
  1. it’s everything you can touch
  2. uses light beam to scan codes, text,etc
  3. a system for connecting a number of computer systems to form a local area network
  4. the instructions that control what a computer does

10 Clues: Computer portableWireless fidelityGlobal Positioning Systemit’s everything you can touchSwitching device for networksuses light beam to scan codes, text,etcmachine for printing text or pictures onto paperthe instructions that control what a computer doesa video camera that inputs to a computer connected to the internet...

Unit C By, Justin Howard 2015-10-22

Unit C By, Justin Howard crossword puzzle
Across
  1. a portable computer
  2. a phonograph record
  3. a connected group of pages on the World Wide Web
  4. electronic device
Down
  1. output device that produces a paper copy of alphanumeric or graphic data
  2. a set of keys
  3. portion of a terminal or monitor upon which information is displayed
  4. pictorial computer output produced on a display screen, plotter, or printer
  5. vast computer network linking smaller computer networks worldwide
  6. pointing device

10 Clues: a set of keyspointing deviceelectronic devicea portable computera phonograph recorda connected group of pages on the World Wide Webvast computer network linking smaller computer networks worldwideportion of a terminal or monitor upon which information is displayedoutput device that produces a paper copy of alphanumeric or graphic data...

Spelling Test A October 31 2014-10-30

Spelling Test A                October 31 crossword puzzle
Across
  1. using computer unrelated to the job
  2. prevents unauthorized access to computers or networks
  3. using personal information about someone else
  4. detects viruses
  5. sending e-mail to lure users into revealing personal information
Down
  1. appears as pop-up ad box
  2. protects computers from power surges
  3. gathers information on computer about you without your knowledge
  4. travels between systems through a network to spread infections
  5. encoding so only authorized individuals can view

10 Clues: detects virusesappears as pop-up ad boxusing computer unrelated to the jobprotects computers from power surgesusing personal information about someone elseencoding so only authorized individuals can viewprevents unauthorized access to computers or networkstravels between systems through a network to spread infections...

Networking Concepts 2025-06-04

Networking Concepts crossword puzzle
Across
  1. In this topology, device are connected to main cable
  2. This topology connects each device to all other devices
  3. Connects network across a town or city
  4. Connects computers and sends data to destination computer
  5. Connects network in a small area like school or office
Down
  1. To exchange information
  2. Arrangement of devices
  3. Connects different networks together and facilitates communication
  4. Computer in a network
  5. Converts digital signals into analog signals
  6. Connect computers and sends data to all of them

11 Clues: Computer in a networkArrangement of devicesTo exchange informationConnects network across a town or cityConverts digital signals into analog signalsConnect computers and sends data to all of themIn this topology, device are connected to main cableConnects network in a small area like school or office...

CIW CROSSWORD 2017-05-10

CIW CROSSWORD crossword puzzle
Across
  1. / unsolicited e-mail sent to multiple users and is often made to appear as if it came from a trusted source.
  2. server / listens on a specific port and allows clients to connect
  3. transfer protocol / allows the transfer of files between two computers, or one server and one computer
  4. / an unethical practice in which the perpetrator (i.e., typosquatter) capitalizes on typing mistakes that users make when entering the URL of a Web site into a browser.
  5. source / a development methodology that makes an application's source code available to anyone
  6. command / used to display your system's IP configuration
  7. group / A group of users that subscribes to a mailing list
  8. / The screen that contains the Web page you are viewing.
  9. / Web page cookies and related data stored locally on the hard drive, unless the browser's privacy mode has been invoked.
  10. / any file or collection of software tools that resolves system liabilities and improves software performance
Down
  1. command / determine the path between a source and a destination system
  2. / small text files placed on Web site visitors' computers
  3. networks / each computer has both client and server capabilities
  4. saver / displays images or animation on your monitor when no keystrokes or mouse actions have occurred for a specified duration
  5. / An instruction from a running application that executes a particular task.
  6. command / tests connectivity between source and destination systems.
  7. / a file of programming code that is inserted into an existing executable program to fix a known problem, or bug
  8. / An application that adds extra capabilities to your Web browser
  9. / a security barrier that prevents unauthorized access to or from private networks
  10. / ny word, slogan, symbol, name, package design or device (or any combination thereof) that marks and distinguishes a product from other products in a trade
  11. server / enhance the corporate network's security and increase its Internet access speed by providing caching server functions for frequently used documents

21 Clues: / small text files placed on Web site visitors' computers/ The screen that contains the Web page you are viewing.command / used to display your system's IP configurationgroup / A group of users that subscribes to a mailing listnetworks / each computer has both client and server capabilities...

Clone of MISM5306 4-5 2015-09-15

Clone of MISM5306 4-5 crossword puzzle
Across
  1. redundant array of independent disks
  2. transforms data into a scrambled form call ciphertext
  3. a type of Trojan program used to release a virus, worm, or other destructive code
  4. short for modulator-demodulator
  5. a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet
  6. travels from computer to computer in a network, but id does not usually erase data.
  7. a self-propagating program code that is triggered by a specified time or event
  8. contains code intended to disrupt a computer, network or Web site, and is usually hidden in a popular program
  9. means that computers and networks are operating and authorized users can access the information they need
  10. designed to protect systems from unauthorized access in order to preserve data integrity
  11. sending fraudulent e-mails that seem to come from a legitimate source
  12. the aount of data that can be transferred from one point to another in a certain time period
  13. attempt to gain access to a network by posing as an authorized user
Down
  1. this attack floods a network or server with service requests to prevent legitimate users access to the system.
  2. a programming routine built into a system by its designer or programmer
  3. rules that govern data communication
  4. secure tunnel through the internet
  5. network connection device containing software the connects network systems and controls traffic flow between them
  6. capturing and recording network traffic
  7. loss of power in a signal as it travels from the sending device to the receiving device
  8. the address that allows network traffic to be routed to your desktop
  9. issued $5 billion in check to identity thieves
  10. an inexpensive way to secure a computer to a desktop or counter
  11. this card enables computers to communicate over a network
  12. a type of router
  13. can protect against both external and internal access

26 Clues: a type of routershort for modulator-demodulatorsecure tunnel through the internetredundant array of independent disksrules that govern data communicationcapturing and recording network trafficissued $5 billion in check to identity thievestransforms data into a scrambled form call ciphertextcan protect against both external and internal access...

Introduction to Cyber Security 2023-09-10

Introduction to Cyber Security crossword puzzle
Across
  1. A sort of cyber assault in which attackers use fraudulent emails or websites to dupe people into disclosing sensitive information, such as login passwords.
  2. A component of a computer system that prevents unauthorized data access.
  3. a system for establishing a secure connection between a computing equipment and a computer network, or between two networks, through the use of an unsecured communication medium like as the public Internet.
  4. A software update or repair published by developers to correct security flaws or enhance system performance.
  5. When a person is tormented and harassed as a result of technological technologies like texting and social media platforms
  6. unwanted email messages
  7. Computer program that is used to provide customized adverts
  8. a field in which computers and networks are employed
  9. An authentication mechanism that requires users to produce two pieces of identity in order to get access to an account or system.
Down
  1. To imitate a character, users exploit internet platforms to acquire access or personal information.
  2. Manipulation used to obtain unauthorized access to a computer system
  3. software that is secretly installed on a user's device in order to acquire confidential information
  4. a breach of security in which sensitive, protected, or confidential material is copied, transferred, viewed, stolen, altered, or utilized by someone who is not allowed to do so.
  5. A program can run entirely via the network without requiring any software to be installed on the endpoint device that is running it.
  6. An unauthorized effort to gain access to a computer
  7. Malware that prevents an organization from accessing a file system.
  8. avoiding an organization's existing security mechanisms
  9. software used with the goal of destroying, disrupting, or gaining unauthorized access to a computer
  10. The process of protecting digital information over its full life cycle.
  11. A collection of personal computers used to infect malicious software.

20 Clues: unwanted email messagesAn unauthorized effort to gain access to a computera field in which computers and networks are employedavoiding an organization's existing security mechanismsComputer program that is used to provide customized advertsMalware that prevents an organization from accessing a file system....

Internet Basics 2020-02-07

Internet Basics crossword puzzle
Across
  1. single web document which opens in a browser
  2. descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
  3. list of websites visted
  4. first portion of a web name; often “www.” domain
  5. collection of web pages which have a common theme or focus
  6. computer program which replicates and spreads itself from one computer to another
  7. software program which searches the Internet for words or phrases and returns a list as to where each is located
  8. middle portion of a web name; unique to the web name top-level
  9. allows equipment such as fax machines, printers and files to be served to multiple computers
  10. networks or websites which require a password or security code to gain access
  11. hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
  12. websites used to share, post and exchange information in an informal format through several differing channels web
  13. companies which provide Internet connections for a fee social
Down
  1. combination of words and symbols unique to each web page host
  2. last portion of a web name; includes examples such as “.com”, “.org” or “.net”
  3. adult Internet user who uses social networking sites,chat rooms or other cyberspace to approach and eventually hurt other people
  4. software program retrieving and presenting data using the Internet
  5. feature which can be used to store and organize a list of web pages which can be revisited easily
  6. portion of the Internet consisting of computer sites containing billions of documents called web pages web
  7. worldwide collection of networks which allow people to communicate and share information quickly and easily
  8. two or more computers linked together which share and exchange information
  9. words, phrases or graphics in a web page which targets another location
  10. web page which automatically opens when the web browser is opened web
  11. computer user who attempts to acquire unauthorized entry to servers and computer systems

24 Clues: list of websites vistedsingle web document which opens in a browserfirst portion of a web name; often “www.” domaincollection of web pages which have a common theme or focuscombination of words and symbols unique to each web page hostcompanies which provide Internet connections for a fee social...

computer Christopher Dunn 2020-10-01

computer Christopher Dunn crossword puzzle
Across
  1. a peripheral device which makes a persistent representation of graphics or text, usually on paper
  2. Local Area Networks
  3. an American online video-sharing platform headquartered in San Bruno, California.
  4. Random Access Memory
  5. is an electrical cable that temporarily connects an appliance to the mains electricity supply via a wall socket or extension cord
  6. software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user
  7. standalone malware computer program that replicates itself in order to spread to other computers
  8. output how computer tells you things input tell your computer things
  9. the physical parts of a computer
  10. wireless internet card
  11. manly used for gamers to talk to each other during games
  12. how computer tells you things
  13. Wide Area Networks
  14. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  15. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
Down
  1. Read Only Memory
  2. Long term data storage
  3. Responsible for carrying out instructions of a program
  4. how your computer talks to other computers
  5. attached to, a computer case used for active cooling
  6. Where the processor & memory live
  7. an electro-mechanical data storage device that uses magnetic storage to store and retrieve digital data using one or more rigid rapidly rotating platters coated with magnetic material
  8. Operating system
  9. a hand-held pointing device that detects two-dimensional motion relative to a surface
  10. A video card is an expansion card which generates visuals for the display
  11. tell your computer things
  12. , water cooling or liquid cooling is a system used to reduce the temperature of its hardware

27 Clues: Read Only MemoryOperating systemWide Area NetworksLocal Area NetworksRandom Access MemoryLong term data storagewireless internet cardtell your computer thingshow computer tells you thingsthe physical parts of a computerWhere the processor & memory livehow your computer talks to other computersattached to, a computer case used for active cooling...

Computer Security and Ethics 2024-08-23

Computer Security and Ethics crossword puzzle
Across
  1. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
  2. Make sure you use a different ____ for different sites and keep them long and complex.
  3. Computer activities often leave a digital ____ that leads back to the offender.
  4. You should regularly make a ____ of your data/photos.
  5. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
  6. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
  7. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
  8. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
  9. To protect your device from malware, you should install reputable ____ software and run frequent scans.
  10. If you download software, ____ it before running it.
Down
  1. Malware that damages files on your computer or stops your computer from running properly.
  2. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
  3. When you copy sections of someone else's work and claim it is your own.
  4. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
  5. Emails can spread malware, most often when you click links or open ____.
  6. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
  7. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
  8. Keep your operating system secure by running all the latest.
  9. Avoid making financial transactions on ____ networks or computers.
  10. Tries to open security holes in your computer so a hacker can gain access.

20 Clues: If you download software, ____ it before running it.You should regularly make a ____ of your data/photos.Keep your operating system secure by running all the latest.Avoid making financial transactions on ____ networks or computers.When you copy sections of someone else's work and claim it is your own....

Tech Terms 2023-04-27

Tech Terms crossword puzzle
Across
  1. Central processing unit
  2. a unit of data that is eight binary digits long
  3. the system that your computer uses to operate all of its user base functions
  4. Search engine
  5. internet box
  6. a website designed to make it easy for users to create entries in chronological order
  7. random access memory
  8. a computer-generated environment
  9. Open-source software
  10. portable document format
  11. turns domain names into IP addresses
  12. the gulf between those who have ready access to computers and the internet and those who do not
  13. computer code or program that is protected by law against copying
  14. Input device
  15. Output device
  16. malicious software
  17. An internet cord
  18. programs and operating systems that need to be installed
  19. a binary digit the smallest increment of data on a computer
  20. Copy (data) from one computer system to another, typically over the internet.
  21. provides a service to another computer program and its user
  22. hyper text markup language
Down
  1. CTRL C
  2. back up information on computer
  3. 1000 kilobytes
  4. server based pieces of data ion websites
  5. the process of protecting information using mathematical models
  6. Search engine
  7. ties the computer's components together at one spot and allows them to talk to each other.
  8. Back up information on computer
  9. Personally Identifiable Information
  10. A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
  11. CTRL V
  12. Machine language
  13. a selective wall that lets certain ip addresses go through and blocks out viruses
  14. A global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
  15. Address Internet protocol address
  16. An information system enabling documents and other web resources to be accessed over the Internet.
  17. Turn on
  18. Control P
  19. keyboard, monitor, and speakers
  20. makes wifi
  21. Read-only memory

43 Clues: CTRL VCTRL CTurn onControl Pmakes wifiinternet boxInput deviceSearch engineSearch engineOutput device1000 kilobytesMachine languageAn internet cordRead-only memorymalicious softwarerandom access memoryOpen-source softwareCentral processing unitportable document formathyper text markup languageback up information on computer...

Module 5 Vocabulary Crossword Puzzle 2025-01-31

Module 5 Vocabulary Crossword Puzzle crossword puzzle
Across
  1. A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.
  2. Make a copy of a file, program, or media.
  3. Hardware and/or software that protects a network’s resources from intrusion by users on another network, such as the Internet.
  4. The unauthorized and illegal duplication of copyrighted software.
  5. An object that can be tapped or clicked — such as a button, image, or link — on a website, pop-up ad, pop-under ad, or in an email message or text message contains a malicious program.
  6. An attack whose goal ranges from disabling a government’s computer network to crippling a country.
  7. The process of decoding encrypted data.
  8. A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
  9. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  10. A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
  11. Creates software registration numbers and sometimes activation codes.
  12. The discovery, collection, and analysis of evidence found on computers and networks. See also cyberforensics
Down
  1. The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
  2. A small text file that a web server stores on your computer.
  3. Destructive event or prank
  4. Someone who accesses a computer or network illegally.
  5. Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
  6. Someone who demands payment to stop an attack on an organization’s technology infrastructure.
  7. A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
  8. The encrypted (scrambled) data

20 Clues: Destructive event or prankThe encrypted (scrambled) dataThe process of decoding encrypted data.Make a copy of a file, program, or media.Someone who accesses a computer or network illegally.A small text file that a web server stores on your computer.The unauthorized and illegal duplication of copyrighted software....

Networking 3 Dante 2025-03-02

Networking 3 Dante crossword puzzle
Across
  1. signals are focused in a single direction, which makes them ideal for placement at one end of long, narrow spaces or to cover distances between buildings
  2. the path data travels between computers on a network is considered the network’s
  3. sometimes called “peer-to-peer mode,” is a wireless mode of operation typically used only in small or temporary installations
  4. uses the token-passing media access method and dual rings for redundancy
  5. The extra 5 MB comes in the form of packet and frame headers, acknowledgments, and retransmissions, collectively known as
  6. which allows 802.11ac APs to send data to multiple client stations simultaneously
  7. In most towns, you can usually find a public Wi-Fi network, called a
  8. which is essentially the throughput minus the protocol headers that don’t contain application data.
Down
  1. So, although there’s no escaping noise on a Wi-Fi network, what’s important is the amount of noise compared with the signal strength, which is called the
  2. Ethernet standard works over Cat5e and Cat6 cabling
  3. Ethernet, released as the IEEE 802.3ab standard, supports 1000 Mbps Ethernet
  4. operates only in full-duplex mode, so there is no such thing as a 10 Gbps hub
  5. Wi-Fi signals can pass through solid objects, such as walls and trees, but they don’t get through unscathed. Solid objects absorb radio signals, causing them to
  6. (often called simply “100BaseT”)
  7. the signals radiate out from the antenna with equal strength in all directions.
  8. The 1997 802.11 wireless networking standard, also referred to as
  9. Wi-Fi networks can operate in one of two modes: infrastructure and ad hoc. Most Wi-Fi networks operate in
  10. The actual amount of data transferred, not counting errors and acknowledgments, is called
  11. network technology provides reliable transport of data, although it’s slow by current standards.
  12. Signals arriving at different times (referred to as “out of phase”) are called

20 Clues: (often called simply “100BaseT”)Ethernet standard works over Cat5e and Cat6 cablingThe 1997 802.11 wireless networking standard, also referred to asIn most towns, you can usually find a public Wi-Fi network, called auses the token-passing media access method and dual rings for redundancy...

Foundations of Cyber Security I 2025-02-13

Foundations of Cyber Security I crossword puzzle
Across
  1. The act of making sure every individual working with an information system has specific responsibilities for information assurance.
  2. A process that gives a user permission to do certain things.
  3. A three-pronged system of cybersecurity.
  4. Ciphers that break down information into fixed-size blocks before encrypting it.
  5. Software that displays unwanted advertising while running an application on your computer.
  6. A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
  7. A guarantee of reliable access to information.
  8. A device that helps join two separate computer networks together to allow for communication.
  9. A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
  1. A security technique used to regulate who or what can utilize the resources of a computer system.
  2. Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
  3. A process that measures how much information has been accessed or the amount of time spent on a session.
  4. The governance, development, and maintenance of computer programs.
  5. A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
  6. The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
  7. One that is physically isolated from the internet and only able to pass data along via removable media.
  8. A process or set of rules.
  9. The use of human characteristics to distinctly identify individuals as themselves.
  10. A process that keeps a system secure by physically isolating it from all unsecured networks.
  11. An orderly search for nonvolatile data storage to load the OS.

20 Clues: A process or set of rules.A three-pronged system of cybersecurity.A guarantee of reliable access to information.A process that gives a user permission to do certain things.An orderly search for nonvolatile data storage to load the OS.The governance, development, and maintenance of computer programs....

Marketing & Technologies 2013-07-10

Marketing & Technologies crossword puzzle
Across
  1. Set of activities that control how materials and products move from the initial source to the end user
  2. Company's interaction with customers
  3. Bid for product and services over the internet
  4. Electronic interpretation of information
  5. Efficient handling of information and resources within a commercial organization
Down
  1. Personalization of high volumes
  2. Global system of interconnected computer networks
  3. Anything related to computing technology
  4. Commerce conducted electronically

9 Clues: Personalization of high volumesCommerce conducted electronicallyCompany's interaction with customersAnything related to computing technologyElectronic interpretation of informationBid for product and services over the internetGlobal system of interconnected computer networks...

Network Topologies 2018-10-15

Network Topologies crossword puzzle
Across
  1. a network that has one hub/switch
  2. Network _________ is a way to connect multiple computers
  3. Thing that connects everything
Down
  1. network that uses one big cable
  2. network in the shape of a circle
  3. a device that redirects data
  4. network that has many routers and doesn't matter if one breaks
  5. a small local network
  6. big network that is made of many smaller networks

9 Clues: a small local networka device that redirects dataThing that connects everythingnetwork that uses one big cablenetwork in the shape of a circlea network that has one hub/switchbig network that is made of many smaller networksNetwork _________ is a way to connect multiple computersnetwork that has many routers and doesn't matter if one breaks

Tech terms 2024-11-06

Tech terms crossword puzzle
Across
  1. centurial processing unit
  2. Physical parts of a computer
  3. eight binary digits
  4. Worldwide system of interconnected computer networks and electronic devices that communicate using established set of protocols
Down
  1. Transmission from one computer to another network
  2. lowest level of programing language
  3. Store all digital content
  4. The address of unique resource on the internet
  5. 1 means its on and 0 means its off

9 Clues: eight binary digitsStore all digital contentcenturial processing unitPhysical parts of a computer1 means its on and 0 means its offlowest level of programing languageThe address of unique resource on the internetTransmission from one computer to another network...

crossword that Mr. Randall made us do... 2018-04-05

crossword that Mr. Randall made us do... crossword puzzle
Across
  1. The computing part of the computer.
  2. a scam to steal valuable information
  3. method for keeping a computer secure from intruders.
  4. website that serves employees only
  5. most widely used hardware interface
  6. To store data
  7. A small text file (up to 4KB)
  8. (CPUs, drives, keyboards, printers, scanners, cables, etc.)
Down
  1. provides access to the Internet
  2. display element of an electronic screen
  3. a large network made up of smaller networks
  4. series of instructions that performs a particular task
  5. may use the term for capability and time
  6. contains text entries in reverse chronological order
  7. address that defines the route to a file on an Internet server

15 Clues: To store dataA small text file (up to 4KB)provides access to the Internetwebsite that serves employees onlyThe computing part of the computer.most widely used hardware interfacea scam to steal valuable informationdisplay element of an electronic screenmay use the term for capability and timea large network made up of smaller networks...

COMPUTER PARTS 2022-10-21

COMPUTER PARTS crossword puzzle
Across
  1. STAYS FORVER
  2. Exchange information and form networks
  3. PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN
  4. KEEPS HOLD OF DATA FOREVER
  5. IN A computing system this means using to exchange information
  6. LIKE LONG TERM MEMORY IN A COMPUTER
  7. 8 BITS
Down
  1. to accelerate the creation of images in a frame
  2. DISPLAYS INFORMATION FOR THE USER E.G SCREEN
  3. ONLY STAYS WHEN SYSTEM IS ON
  4. HOW THE USER TELLS THE COMPUTER WHAT TO DO E.G KEYBOARD
  5. LIKE THE HEART OF THE COMPUTER
  6. PART OF COMPUTER THAT IS LIKE YOUR SHORT-TERM MEMORY
  7. PART OF COMPUTER THAT ACTS LIKE A SKELETON
  8. 1 BINARY DIGIT

15 Clues: 8 BITSSTAYS FORVER1 BINARY DIGITKEEPS HOLD OF DATA FOREVERONLY STAYS WHEN SYSTEM IS ONLIKE THE HEART OF THE COMPUTERLIKE LONG TERM MEMORY IN A COMPUTERExchange information and form networksPART OF COMPUTER THAT ACTS LIKE A SKELETONDISPLAYS INFORMATION FOR THE USER E.G SCREENPART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN...

Cybersecurity 2024-01-19

Cybersecurity crossword puzzle
Across
  1. Malware that attaches itself to other software.
  2. A way to protect a network from incoming and outgoing attacks.
  3. Keeping secret things secret.
  4. An attack that takes place through digital means.
  5. Government agency responsible for Cybersecurity and Infrastructure Security
  6. The national organization which sets standards for technology
  7. Malware that can self-replicate and spread on its own.
  8. A way to secure an account; Something you know.
Down
  1. The right to access systems or networks.
  2. Maintaining access to key technologies.
  3. Verifying someone is who they say they are.
  4. A malicious software
  5. Monitoring who accesses what.
  6. Keeping systems secure and complete.
  7. A cybersecurity competition

15 Clues: A malicious softwareA cybersecurity competitionMonitoring who accesses what.Keeping secret things secret.Keeping systems secure and complete.Maintaining access to key technologies.The right to access systems or networks.Verifying someone is who they say they are.Malware that attaches itself to other software....

balls 2023-10-20

balls crossword puzzle
Across
  1. A common theme addressed in hip-hop.
  2. Lyrics often used to convey social messages.
  3. Promotion of social or political change.
  4. Hip-hop's role in inspiring change.
  5. Use of hip-hop to express social dissent.
  6. Elevating marginalized voices through hip-hop.
Down
  1. Refusal to accept societal injustices.
  2. Hip-hop's role in raising social consciousness.
  3. Unity within hip-hop communities.
  4. Skillful wordplay to convey powerful messages.
  5. A goal advocated for in hip-hop songs.
  6. Building networks for social impact.
  7. Call for societal change in hip-hop music.
  8. Tool used to amplify hip-hop's social voice.
  9. Hip-hop artists' involvement in social causes.

15 Clues: Unity within hip-hop communities.Hip-hop's role in inspiring change.A common theme addressed in hip-hop.Building networks for social impact.Refusal to accept societal injustices.A goal advocated for in hip-hop songs.Promotion of social or political change.Use of hip-hop to express social dissent.Call for societal change in hip-hop music....

cw1 2025-11-05

cw1 crossword puzzle
Across
  1. Technique to run multiple OS on a single machine
  2. Algorithm used in training neural networks
  3. Concurrent execution of multiple threads
  4. AI system inspired by human brain structure
  5. OOP feature allowing one interface, many forms
  6. CPU technique for parallel instruction execution
  7. Science of secure communication
Down
  1. Network security system monitoring traffic
  2. Database process reducing redundancy
  3. AI model learns training data too well
  4. Step-by-step procedure for solving a problem
  5. State where processes wait indefinitely for each other
  6. Process of securing data by converting it to code
  7. Program that converts code into machine language
  8. Software that creates and manages virtual machines

15 Clues: Science of secure communicationDatabase process reducing redundancyAI model learns training data too wellConcurrent execution of multiple threadsNetwork security system monitoring trafficAlgorithm used in training neural networksAI system inspired by human brain structureStep-by-step procedure for solving a problem...

Guanxi (Unit 3 - 10 words) 2021-01-27

Guanxi (Unit 3 - 10 words) crossword puzzle
Across
  1. A former student of a school
  2. S.one who acts like a person they want to be
  3. Quick at seeing what to do in a situation
  4. Important and needing immediate attention
Down
  1. Trying often to achieve something hard
  2. The quality of being faithful
  3. Starting to exist, appearing, becoming known
  4. Connected group of people that exchange info
  5. Having particular knowledge of something
  6. A former male student of a school

10 Clues: A former student of a schoolThe quality of being faithfulA former male student of a schoolTrying often to achieve something hardHaving particular knowledge of somethingQuick at seeing what to do in a situationImportant and needing immediate attentionStarting to exist, appearing, becoming knownS.one who acts like a person they want to be...

CLIMATE CHANGE 2024-08-12

CLIMATE CHANGE crossword puzzle
Across
  1. Gases trapping heat in the atmosphere
  2. Contamination of air, water, or land
  3. Release of harmful gases into the atmosphere
Down
  1. Complex networks of living organisms and their environment
  2. Main component of greenhouse gas causing global warming
  3. Actions that meet present needs without compromising future
  4. Energy sources that can be replenished
  5. Widespread climate change affecting the entire planet
  6. Increase in Earth's average temperature
  7. Fuels formed from ancient organisms

10 Clues: Fuels formed from ancient organismsContamination of air, water, or landGases trapping heat in the atmosphereEnergy sources that can be replenishedIncrease in Earth's average temperatureRelease of harmful gases into the atmosphereWidespread climate change affecting the entire planetMain component of greenhouse gas causing global warming...

CompTIA Network+ (009) Ch. 13 2025-04-04

CompTIA Network+ (009) Ch. 13 crossword puzzle
Across
  1. Secured intermediary device for remote admin access.
  2. Encrypts the full IP packet in IPSec.
  3. Protocol to set up secure keys in IPSec VPNs.
  4. Connects geographically dispersed networks.
  5. Secure protocol for command-line remote access.
  6. Uses a browser instead of client software.
Down
  1. Sends only some traffic through the VPN.
  2. Connects a user to internal network remotely.
  3. Protocol suite for securing IP communications.
  4. Dedicated line offering 1.544 Mbps bandwidth.

10 Clues: Encrypts the full IP packet in IPSec.Sends only some traffic through the VPN.Uses a browser instead of client software.Connects geographically dispersed networks.Connects a user to internal network remotely.Protocol to set up secure keys in IPSec VPNs.Dedicated line offering 1.544 Mbps bandwidth.Protocol suite for securing IP communications....

Chapter 2 vocab. The French in north America 2024-10-29

Chapter 2 vocab. The French in north America crossword puzzle
Across
  1. Self-governing and independent of external powers
  2. A francophone farm New France
  3. A francophone citizen of Acadia
  4. Networks of colonies
  5. only 1 company is allowed to sell or trade items
Down
  1. Most powerful member of the sovereign council
  2. Extending its control over other countries often using economic or military means
  3. missionaries who came to North America
  4. The second most important figure of the sovereign council
  5. Head of Church

10 Clues: Head of ChurchNetworks of coloniesA francophone farm New FranceA francophone citizen of Acadiamissionaries who came to North AmericaMost powerful member of the sovereign councilonly 1 company is allowed to sell or trade itemsSelf-governing and independent of external powersThe second most important figure of the sovereign council...