networks Crossword Puzzles
Wc Vocab 2016-01-08
Across
- / a projection of land that is surrounded by water on all but one side
- / when a country that was divided into two or more parts joins back together to create one larger country
- Economy / the government controls all or most of the economy
- Corridor / tracts of land that contain highways, roads, railways, canals, etc
- / suppression of speech or other forms of public communication
- / acceptance by the dominant culture of individuals retaining their culture as long as it does not interfere with integration into society
- / cutting down and clearing the trees and plant life in a forest
- / trade agreement between Canada, Mexico, and the United States in which the three countries agreed to reduce tariffs on goods to encourage and increase trade
- / areas that are in cities. It is the opposite of rural
- / areas that are in the countryside and not in the city
Down
- / the value of all the goods and production in an economy for a given year
- / basic parts or systems that support a place or economy, including items such as electrical grid, transportation networks, communication networks, hospitals, and schools
- of Living / the level or degree of access to wealth, necessities, comfort, and material goods in a society
- Exchange / widespread exchange of products and resources, such as plants, animals, diseases, and ideas, between the Western (New World) and Eastern (Old World) hemispheres that resulted after the European discovery of the Americas
- / the ability to read and write
- / a country takes control of land (a colony) and often sends its people there to live there
- / the condition of not having the financial abilities to support a minimal standard of living, often involving low wages, poor educational opportunities, poor housing, and limited access to healthcare
17 Clues: / the ability to read and write • / areas that are in the countryside and not in the city • / areas that are in cities. It is the opposite of rural • Economy / the government controls all or most of the economy • / suppression of speech or other forms of public communication • / cutting down and clearing the trees and plant life in a forest • ...
Media: Key Terms 2023-04-20
Across
- A law that protects witnesses from revealing certain information, especially in court.
- The process whereby news media highlight, emphasize and give more prominence to a specific aspect of a news story.
- The term used to describe the revolutionary business tactic of producing newspapers which sold for one cent.
- Refers to topics that are usually timely, important and consequential, such as politics, international affairs and business news.
- Regulates interstate and international communications through cable, radio, television, satellite and wire
- Describes the tendency of the national media to focus on who is winning at any given time during a presidential campaign.
- A person who searches for and tries to expose real or alleged corruption, scandal, or other wrongdoing.
- Requires broadcasters to treat political candidates equally in terms of air time.
- To distort (information) by rendering it unfaithfully or incompletely, especially in order to reflect a particular viewpoint.
Down
- became concerned that the monopoly audience control of the three main networks, NBC, ABC and CBS, could misuse their broadcast licenses to set a biased public agenda. The Fairness Doctrine mandated broadcast networks devote time to contrasting views on issues of public importance.
- Defined as information that is primarily entertaining or personally useful.
- To appear or happen gradually or to a limited degree: News filtered down to us during the day.
- A type of increased increasingly popular media coverage focused on political scandals
- Journalism that is based upon sensationalism and crude exaggeration.
- When news content suggests to news audiences that they ought to use specific issues as benchmarks for evaluating the performance of leaders and governments.
- Service: A news agency that supplies syndicated news by wire to newspapers, radio, and television stations.
- The means of communication that reach large numbers of people in a short time,
17 Clues: Journalism that is based upon sensationalism and crude exaggeration. • Defined as information that is primarily entertaining or personally useful. • The means of communication that reach large numbers of people in a short time, • Requires broadcasters to treat political candidates equally in terms of air time. • ...
Tiger aspect productions/moonage pictures/sky vision/spectrum originals 2021-05-08
Across
- entertainment/th!nkfilm/city lights pictures
- one
- Simpson/jerry bruckheimer films/the brandons/green eggs and Pam productions/Sony pictures television studios/spectrum originals
- films/millennium media/passage pictures
- story up/maceo lyn/soundspeedz productions/hbo
- enemy inc./kuzui enterprises/sandollar television/20th television
- Simpson/jerry bruckheimer films/green eggs and Pam productions/the Brandons/Sony pictures television studios/spectrum originals
Down
- Bert/CBBC
- Simpson/jerry bruckheimer films/green eggs and Pam productions/the brandons/Sony pictures television/spectrum originals
- one/food network
- bank pictures/amc networks/ITV/Sony pictures television
- entertainment/David a Palmer productions/Aqua pacific
- masius productions/nbc studios/mgm worldwide television distribution
- elite entertainment/lionsgate
14 Clues: one • Bert/CBBC • one/food network • elite entertainment/lionsgate • films/millennium media/passage pictures • entertainment/th!nkfilm/city lights pictures • story up/maceo lyn/soundspeedz productions/hbo • entertainment/David a Palmer productions/Aqua pacific • bank pictures/amc networks/ITV/Sony pictures television • ...
Tysons Audit Clients 2023-12-15
Across
- Satellites and terrestrial networks
- Aerospace and defense company
- Sounds like a high school math class; machine & 3D printing
- Freddie Mac's wife; mortgage financing and affordable housing company
- Real Estate Investment Trust; Marriott is an example
Down
- Blood donation
- American History Museum, African American History Museum, amongst others
- Full service and hotel resource REIT; team travels to Florida frequently for site visits
- SMALL Artificial intelligence company; business intelligence
- Domain Naming System; online signature company
- Education loan management company
11 Clues: Blood donation • Aerospace and defense company • Education loan management company • Satellites and terrestrial networks • Domain Naming System; online signature company • Real Estate Investment Trust; Marriott is an example • Sounds like a high school math class; machine & 3D printing • SMALL Artificial intelligence company; business intelligence • ...
The Media 2024-11-13
Across
- Various communication channels for distributing news and information
- Professional who researches and reports news stories
- Large corporation that owns multiple media companies
- Type of media platforms like Facebook and Twitter
- Local station associated with a national network
- Group of interconnected television or radio stations
Down
- Global system of interconnected computer networks
- Term describing media that reach a large audience
- Professional who researches and reports news stories
- Accessible via the Internet
- Current events reported by journalists
- Television system that transmits via wires rather than airwaves
12 Clues: Accessible via the Internet • Current events reported by journalists • Local station associated with a national network • Global system of interconnected computer networks • Term describing media that reach a large audience • Type of media platforms like Facebook and Twitter • Professional who researches and reports news stories • ...
Total Defence Crossword Puzzle 2025-02-15
Across
- The state of being safe from harm.
- The country that practices Total Defence.
- A serious situation that needs immediate action.
- People who serve in the army to protect the country.
- Living together peacefully despite differences.
- Protection against threats or danger.
Down
- Protecting computers and networks from attacks.
- Working together to achieve a common goal.
- Being prepared for any situation.
- The quality of being strong, physically or mentally.
- The ability to recover from challenges or difficulties.
11 Clues: Being prepared for any situation. • The state of being safe from harm. • Protection against threats or danger. • The country that practices Total Defence. • Working together to achieve a common goal. • Protecting computers and networks from attacks. • Living together peacefully despite differences. • A serious situation that needs immediate action. • ...
Networking Concepts 2025-06-04
Across
- In this topology, device are connected to main cable
- This topology connects each device to all other devices
- Connects network across a town or city
- Connects computers and sends data to destination computer
- Connects network in a small area like school or office
Down
- To exchange information
- Arrangement of devices
- Connects different networks together and facilitates communication
- Computer in a network
- Converts digital signals into analog signals
- Connect computers and sends data to all of them
11 Clues: Computer in a network • Arrangement of devices • To exchange information • Connects network across a town or city • Converts digital signals into analog signals • Connect computers and sends data to all of them • In this topology, device are connected to main cable • Connects network in a small area like school or office • ...
Crossword 2018-04-05
Across
- To store data locally
- (Internet Service Provider
- The method for keeping a computer secure from intruders.
- Central Processing Unit
- the operating system and other control programs
- To write and post an entry in a Weblog.
- Computer people may use the term for capability and time.
- A small text file (up to 4KB)
Down
- Machinery and equipment
- the fundamental display element of an electronic screen
- a large network made up of smaller networks.
- Resource Locator
- Universal Serial Bus or Short for "USB flash drive" or "USB port
- its a scam to steal valuable information such as credit card
14 Clues: Resource Locator • To store data locally • Machinery and equipment • Central Processing Unit • (Internet Service Provider • A small text file (up to 4KB) • To write and post an entry in a Weblog. • a large network made up of smaller networks. • the operating system and other control programs • the fundamental display element of an electronic screen • ...
STEM Quest: Discovering Careers and Concepts at Idaho National Laboratory 2025-07-18
Across
- Type of engineer that designs and builds machines
- A person who designs buildings, roads, and bridges
- Tiny basic building block of all matter
- Where is INL located?
- Process of splitting an atom to create nuclear power
- A person who writes computer programs
Down
- Person who analyzes experiments in science at INL
- Energy released in a reactor
- First atomic-powered town in 1951
- Science, Technology, Engineering, and Math
- (Advanced Test Reactor) A unique reactor at INL used for testing materials
- The L in INL
- Protecting computers and networks from attacks
- Scientists use these to test their ideas
14 Clues: The L in INL • Where is INL located? • Energy released in a reactor • First atomic-powered town in 1951 • A person who writes computer programs • Tiny basic building block of all matter • Scientists use these to test their ideas • Science, Technology, Engineering, and Math • Protecting computers and networks from attacks • Person who analyzes experiments in science at INL • ...
TTL 1 Prefinal 2023-05-25
Across
- symbols that are words, codes, and formulae
- execution of skills
- experiences that provides substitutes
- literacy that serves as one's ability to critically read information or content
- displays that can be viewed and sometimes manipulated
- reconstructed experiences
- redesigning a lesson
- literacy that serves as one's ability to select and use digital devices
Down
- using technology as an alternate to the regular item use
- direct ________ experiences uses the senses
- ____ and collaboration is one's ability to participate in digital networks
- symbols that are abstract representation of concepts
- literacy that serves as one's ability to locate information from the web
- ____ trips or visual visits
- television and ___ pictures
15 Clues: execution of skills • redesigning a lesson • reconstructed experiences • ____ trips or visual visits • television and ___ pictures • experiences that provides substitutes • direct ________ experiences uses the senses • symbols that are words, codes, and formulae • symbols that are abstract representation of concepts • displays that can be viewed and sometimes manipulated • ...
5 2018-03-06
Across
- case in which framing pulses mark the boundary between packets
- lower speed non-sonet streams below STS-1 rate are mapped
- used to manage all the transmission facilities in the central office
- generic framing procedure
- path protection
Down
- SDH uses for the accommodation of lower- speed of non-SDH signals
- error monitoring in SDH
- virtual concatenation
- by which switches have relatively poor throughput
- asynchronous digital hierarchy
- packet destination information from header
- one of the functions of router
- process of aligning two signal streams in time
- optical networks that capable of providing packet switched service at the optical layer
- connection verification
15 Clues: path protection • virtual concatenation • error monitoring in SDH • connection verification • generic framing procedure • asynchronous digital hierarchy • one of the functions of router • packet destination information from header • process of aligning two signal streams in time • by which switches have relatively poor throughput • ...
5 2018-03-06
Across
- connection verification
- process of aligning two signal streams in time
- path protection
- lower speed non-sonet streams below STS-1 rate are mapped
- SDH uses for the accommodation of lower- speed of non-SDH signals
- optical networks that capable of providing packet switched service at the optical layer
- used to manage all the transmission facilities in the central office
- one of the functions of router
Down
- case in which framing pulses mark the boundary between packets
- error monitoring in SDH
- virtual concatenation
- packet destination information from header
- by which switches have relatively poor throughput
- asynchronous digital hierarchy
- generic framing procedure
15 Clues: path protection • virtual concatenation • connection verification • error monitoring in SDH • generic framing procedure • asynchronous digital hierarchy • one of the functions of router • packet destination information from header • process of aligning two signal streams in time • by which switches have relatively poor throughput • ...
crossword that Mr. Randall made us do... 2018-04-05
Across
- most widely used hardware interface
- display element of an electronic screen
- method for keeping a computer secure from intruders.
- contains text entries in reverse chronological order
- website that serves employees only
- A small text file (up to 4KB)
- (CPUs, drives, keyboards, printers, scanners, cables, etc.)
Down
- provides access to the Internet
- address that defines the route to a file on an Internet server
- a large network made up of smaller networks
- series of instructions that performs a particular task
- a scam to steal valuable information
- may use the term for capability and time
- To store data
- The computing part of the computer.
15 Clues: To store data • A small text file (up to 4KB) • provides access to the Internet • website that serves employees only • most widely used hardware interface • The computing part of the computer. • a scam to steal valuable information • display element of an electronic screen • may use the term for capability and time • a large network made up of smaller networks • ...
Jordan's Crossword puzzle 2018-11-18
Across
- demanding money for information
- let's attacker to secretly control the users infected computer
- small piece of software that corrupts devices
- the programs and other operating info used by a computer
- a type of software intended to damage or destroy
Down
- a necessity when hacking putting in a virus
- uses computer networks to duplicate itself
- it claims to be a game
- trying to get someone to reveal personal information
- denial of service
- attacks online
- repeatedly showing up on your screen
- kids can't fill this gap if it's too large
- attacks personal information; also the name of king of gods
- uses email addresses to replicate itself
15 Clues: attacks online • denial of service • it claims to be a game • demanding money for information • repeatedly showing up on your screen • uses email addresses to replicate itself • uses computer networks to duplicate itself • kids can't fill this gap if it's too large • a necessity when hacking putting in a virus • small piece of software that corrupts devices • ...
IT 7.3 2024-01-13
Across
- transmission capacity of a computer network
- a computer or computer program which manages access to a centralized resource
- network a set of computers sharing resources
- address Internet Protocol address
- cable cable that connect devices to networks
- a system of rules
- A networking devices that forwards data between computer networks
- transmission the process of sending digital or analogue data
Down
- a global computer network
- electronic messages
- central part where there is most activity
- hardware essential device for communication
- network computer network that uses wireless data connections between network nodes
- Transmission Control Protocol
- a small segment of a larger message
- network type of network that uses physical cables to connect devices and computer systems.
16 Clues: a system of rules • electronic messages • a global computer network • Transmission Control Protocol • address Internet Protocol address • a small segment of a larger message • central part where there is most activity • transmission capacity of a computer network • hardware essential device for communication • network a set of computers sharing resources • ...
Unit - 3 2024-10-17
Across
- Point-to-point protocol for WAN links
- Standard protocol for data-link control
- Layer Responsible for framing, error control, flow control
- Detects and avoids collisions in Ethernet
- Transmits randomly, waits for acknowledgment
- Window Sends multiple frames before acknowledgment
- Codes Corrects single-bit errors in data
- Ring Passes a token to control network access
Down
- Adds up binary values for error detection
- Check Simple error detection using extra bit
- Error detection using polynomial division
- Common LAN protocol using CSMA/CD
- Avoids collisions in wireless networks
- Retransmits lost data (error control)
- Window ARQ Combines error control and flow control
- and Wait Sends one frame, waits for acknowledgment
16 Clues: Common LAN protocol using CSMA/CD • Point-to-point protocol for WAN links • Retransmits lost data (error control) • Avoids collisions in wireless networks • Standard protocol for data-link control • Codes Corrects single-bit errors in data • Adds up binary values for error detection • Error detection using polynomial division • Detects and avoids collisions in Ethernet • ...
vocabulary 2022-11-15
Across
- brain of a computer
- a device used to input and output information into the computer
- a small device that plugs into the USB port on your computer
- wide area network, private or public network
- intellectual property
- store the short term data
- the act of copying other people's works or words ,and publish as your own work
- storage device
- allows copying for limited purpose
Down
- identify parts of a large program or construction
- rules of the internet communication
- a security system that control the networks
- Local area network, private network
- uses to connect the computer peripheral
- able to let you save files in your computer
- protect the network
- brings virus into your computer
- junk mail
18 Clues: junk mail • storage device • brain of a computer • protect the network • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
ETech 2022-10-27
Across
- This operating system is used by apple devices such as iPhone.
- it’s the size of elements in relation to one another.
- This feature of Web 2.0 allows users to categorize information through tagging.
- What external material is best to use if you want to present the data on how stock market price changes over time?
- is the leading professional image editing program, released by Adobe.
- Marco used bullets and short sentences in his presentation. What tip in creating an effective presentation did he apply?
- deals with the parts of a design that are meant to stand out.
- This media is designed to help people who have visual and reading impairments.
- a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)
Down
- is the acronym for What You See Is What You Get. This means that whatever you type, insert, draw, place, rearrange, and everything you do on a page is what the audience will see.
- are used to represent information, statistical data, or knowledge in a graphical manner usually done in a creative way to attract the viewer’s attention.
- are computer-mediated tools that allow people, companies and other organizations to create, share, or exchange information, career interests,
- is a file format used for lossless image compression.
- an unwanted email mostly from bots or advertisers. It can be used to send malware.
- Raffy is using a technique that tries to take information from the user. He commonly takes things like credit cards, usernames, passwords, and home address. What type of threat is depicted in the scenario?
- and pictures/videos in virtual communities and networks.
- a transformation taking the points of one space into the points of the same or another space.
17 Clues: it’s the size of elements in relation to one another. • is a file format used for lossless image compression. • and pictures/videos in virtual communities and networks. • deals with the parts of a design that are meant to stand out. • This operating system is used by apple devices such as iPhone. • ...
ITINET1372D - Crossword Puzzle 2020-12-13
Across
- it results in unauthorized access to data
- the physical parts of a computer
- arrange or put together in a particular form
- the protection of computer systems and networks
- a basic data structure
Down
- someone that you do repeat business with
- official permission or permit to do/use/own
- the programs used by a computer
- providing information/support to computer users
- replacement with a newer or better version
10 Clues: a basic data structure • the programs used by a computer • the physical parts of a computer • someone that you do repeat business with • it results in unauthorized access to data • replacement with a newer or better version • official permission or permit to do/use/own • arrange or put together in a particular form • providing information/support to computer users • ...
Smart People Can Do This.... PS only 10% of people can do this 2021-05-06
Across
- -What does .org stand for?
- -What does .com stand for?
- -A talented programmer that can breach cyber security, usually to steal data
- -A device that routes traffic between networks
- -What is an AD
- -what is an ISP
Down
- -A facility used to house computer systems and associated components, such as telecommunications and storage systems
- -What does CD stand for?
- -What does WWW mean?
- -What is an AP
10 Clues: -What is an AP • -What is an AD • -what is an ISP • -What does WWW mean? • -What does CD stand for? • -What does .org stand for? • -What does .com stand for? • -A device that routes traffic between networks • -A talented programmer that can breach cyber security, usually to steal data • ...
Transformers 2024-12-09
Across
- encoding***Adds positional information to input embeddings
- heads***Multiple attention mechanisms in parallel
- output sequence
- input sequence
- layer***Maps input tokens to dense vectors
Down
- for weighting input tokens
- network***Neural network layer applied to each token independently
- layers***Stacked layers of self-attention and feed-forward networks
- dot-product attention***Common attention mechanism in transformers
- key, value***Components of self-attention mechanism
10 Clues: input sequence • output sequence • for weighting input tokens • layer***Maps input tokens to dense vectors • heads***Multiple attention mechanisms in parallel • key, value***Components of self-attention mechanism • encoding***Adds positional information to input embeddings • network***Neural network layer applied to each token independently • ...
Transformers 2024-12-09
Across
- encoding***Adds positional information to input embeddings
- heads***Multiple attention mechanisms in parallel
- output sequence
- input sequence
- layer***Maps input tokens to dense vectors
Down
- for weighting input tokens
- network***Neural network layer applied to each token independently
- layers***Stacked layers of self-attention and feed-forward networks
- dot-product attention***Common attention mechanism in transformers
- key, value***Components of self-attention mechanism
10 Clues: input sequence • output sequence • for weighting input tokens • layer***Maps input tokens to dense vectors • heads***Multiple attention mechanisms in parallel • key, value***Components of self-attention mechanism • encoding***Adds positional information to input embeddings • network***Neural network layer applied to each token independently • ...
CompTIA Network+ (009) Ch. 12 2025-04-04
Across
- Technology using multiple antennas for Wi-Fi.
- Visual map of Wi-Fi signal strength.
- Improved Wi-Fi security standard with forward secrecy.
- Interference from adjacent Wi-Fi channels.
- MAC address of a wireless access point.
- Pushes clients to less crowded Wi-Fi bands.
Down
- Unauthorized wireless access point.
- Disconnects users by exploiting Wi-Fi management frames.
- Security protocol for wireless networks using AES.
- Name identifying a wireless network.
10 Clues: Unauthorized wireless access point. • Visual map of Wi-Fi signal strength. • Name identifying a wireless network. • MAC address of a wireless access point. • Interference from adjacent Wi-Fi channels. • Pushes clients to less crowded Wi-Fi bands. • Technology using multiple antennas for Wi-Fi. • Security protocol for wireless networks using AES. • ...
Technology 2024-07-01
Across
- - Relating to electronic technology (7)
- - Physical components of a computer system (8)
- - Programs and applications used on a computer (8)
- - Mobile phone with advanced features (11)
- - Programmable machine capable of performing tasks (5)
- - Electronic device for processing data (8)
Down
- - Step-by-step procedure for solving a problem (9)
- - Organized collection of data (8)
- - Global system of interconnected computer networks (8)
- - System of interconnected computers or devices (7)
10 Clues: - Organized collection of data (8) • - Relating to electronic technology (7) • - Mobile phone with advanced features (11) • - Electronic device for processing data (8) • - Physical components of a computer system (8) • - Step-by-step procedure for solving a problem (9) • - Programs and applications used on a computer (8) • ...
Chapter 2 vocab. The French in north America 2024-10-29
Across
- Self-governing and independent of external powers
- A francophone farm New France
- A francophone citizen of Acadia
- Networks of colonies
- only 1 company is allowed to sell or trade items
Down
- Most powerful member of the sovereign council
- Extending its control over other countries often using economic or military means
- missionaries who came to North America
- The second most important figure of the sovereign council
- Head of Church
10 Clues: Head of Church • Networks of colonies • A francophone farm New France • A francophone citizen of Acadia • missionaries who came to North America • Most powerful member of the sovereign council • only 1 company is allowed to sell or trade items • Self-governing and independent of external powers • The second most important figure of the sovereign council • ...
Technology 2026-03-02
Across
- Wireless internet connection.
- A program used to surf the Internet.
- To copy something from the Internet to your device.
- The name you use to log into an account.
- A document stored on a computer.
- Online storage for data.
Down
- Harmful software that can damage your computer.
- A machine that prints documents on paper.
- A device that connects networks.
- To send something from your device to the Internet.
10 Clues: Online storage for data. • Wireless internet connection. • A device that connects networks. • A document stored on a computer. • A program used to surf the Internet. • The name you use to log into an account. • A machine that prints documents on paper. • Harmful software that can damage your computer. • To copy something from the Internet to your device. • ...
PAT vocab words 2025-10-23
Across
- (MOdulator-DEModulator) - A device that converts digital data from your computer into an analog signal for transmission over phone lines, cable lines, or other media, and then converts the incoming analog signal back into digital data. It is the device that connects your home or office network to your Internet Service Provider (ISP), A device that's job is to convert digital data from on your computer to an analog signal that can be transmitted on phone lines so that information can be spread and when it reaches the destination it coverts back to digital data and this device connects to your Internet.
- arrangement of devices on a communication network that describes the physical or logical layout that the network is arranged in Star is all devices are individual connected to a hub that is the central device, the bus is all devices connected to a single central cable that is reliant for all, a ring is each device is connected to two other devices forming a path where it can survive if one goes down, Mesh is devices being connected to multiple other devices and it being full is being connected to all other devices
- - The most common technology used for wired local area networks (LANs). It defines the rules and standards for how network devices transmit data over a physical cable (typically an Ethernet or Cat cable), It is common in LAN networks that uses a cable instead of wireless to comminate data for the internet making it faster and more reliable.
- / Client - a client is a device or software that requests a service, while a server is a powerful machine or application that provides that service, a client puts in a request for a needed service, and a server is machine that provides the client's service.
- - a system of interconnected computing devices that communicate and share resources like data, printers, and internet access, A group of computers that are connected and share information between one another.
- All devices are connected to a single, central cable (the "bus"). A break in the main cable can disrupt the entire network.
- A networking device that connects multiple devices (like computers, printers, and servers) within the same local area network (LAN). A switch is "smart" because it learns the address of each connected device and forwards data packets only to the intended recipient, which increases network efficiency, A network device that connects a variety of devices together in a LAN which gains acsesss to the address of each device that is connected and is able to send the information packet to the required destination
- Address (Internet Protocol Address) - A unique numerical label assigned to every device connected to a computer network that uses the Internet Protocol for communication. It serves two main functions: host or network interface identification and location addressing. It's essentially the mailing address for your device on the internet, An IP address is a string of unique numbers that is assigned to a device which is used for communication to locate and identify a device and is the internet's mailing address for a device
- - The arrangement of elements (links, nodes, etc.) in a communication network. It describes the physical or logical layout of a network
Down
- - any device or data point connected to a network that can send, receive, or redistribute information, A point that is connected to a network that gets information then gives it out to the required place outside the network
- (Local Area Network) - Local Area Network, is a group of computers and other devices connected in a small, confined area, A LAN is a connection of computers that is in a geographically small area
- (Domain Name System) - The internet phonebook. It translates human-readable domain names (like google.com) into the numerical IP Addresses that computers and networking equipment use to locate and connect to each other, A DNS is a service that makes domain names with readable wordls to an IP address that computers and networks can find each other with.
- Devices are connected to multiple other devices. A full mesh connects every device to every other device, providing high redundancy and reliability.
- All devices are individually connected to a single central device (a hub or switch). If one device or cable fails, only that device is affected.
- Each device is connected to exactly two other devices, forming a single circular path for data.
- - a networking device that directs data packets between computer networks, allowing multiple devices to share a single internet connection and enabling them to communicate with each other, is a network device that directs data packets for networks so many devices share a signal for the internet.
- - A technology that uses radio waves to provide high-speed wireless internet and network connections. It allows devices to connect to a network access point without a physical cable, Wireless communication through radio waves that communicate internet and network connections and allow devices to connect to a network’s access point without having to plug in a cable
- - A small unit of data transmitted over a network. All data sent across the internet (such as an email, a web page, or a video) is broken down into these small segments. Each packet contains a portion of the data plus control information (like the source IP, destination IP, and sequence number) that helps it get routed and reassembled at the destination, A small piece of data that is sent of a network across the internet that is broken up into smaller pieces where each piece contains a portion of the data and control information which helps get it to its destination.
- (Wide Area Network) - Wide Area Network, a network that connects computers and smaller networks over a large geographical area, A WAN is a connection of computers that is in a geographically large area
19 Clues: Each device is connected to exactly two other devices, forming a single circular path for data. • All devices are connected to a single, central cable (the "bus"). A break in the main cable can disrupt the entire network. • ...
The Internet 2016-01-25
Across
- This is when part of an intranet is made accessible to customers, partners, suppliers or others outside a respective company.
- This is the largest computer network system in the world. It is consists of many smaller networks connected together by a global public network.
- this consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
- This is a program that allows users to view and explore information on the World Wide Web.
- It allows you to send, receive and manage electronic messages all over the world.
Down
- the Acronym "URL" stands for
- This is a private network that belongs to an organisation and is designed to be accessible by the organisation’s members, employees or others with authorization.
- Page This is a document on the World Wide Web consisting of an HTML file and any related files for scripts and graphics and often hyperlinked to other Web pages.
- Each page on the World Wide Web has a unique address and this is called
9 Clues: the Acronym "URL" stands for • Each page on the World Wide Web has a unique address and this is called • It allows you to send, receive and manage electronic messages all over the world. • This is a program that allows users to view and explore information on the World Wide Web. • ...
ITs and Information crossword 2023-04-28
Across
- To transmit (a programme or some information) by radio or television.
- A person born or brought up during the age of digital technology and so familiar with computers and the internet from an early age.
- A set of related web pages located under a single domain name, typically produced by a single person or organization.
- the period in modern history characterized by computer use and development and its effects on all aspects of life.
- To copy (data) from one computer system to another, typically over the internet.
Down
- The main means of mass communication, such as broadcasting, publishing, and the internet, considered collectively.
- It is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer.
- It accelerates the dissemination of information.
- A record of news, people's opinions, photos, and videos about a particular subject that someone puts on the internet and adds information.
9 Clues: It accelerates the dissemination of information. • To transmit (a programme or some information) by radio or television. • To copy (data) from one computer system to another, typically over the internet. • The main means of mass communication, such as broadcasting, publishing, and the internet, considered collectively. • ...
The Internet 2014-11-26
Across
- Distributed denial-of-service aka...
- Advanced Research Projects Agency Network in shorter way...
- What can stop viruses inflecting files in your computer?
- In what month was Internet first connected?
- What type of file you can execute/launch?
Down
- History of...
- Global system of interconnected computer networks is the...
- Bot in other words
8 Clues: History of... • Bot in other words • Distributed denial-of-service aka... • What type of file you can execute/launch? • In what month was Internet first connected? • What can stop viruses inflecting files in your computer? • Advanced Research Projects Agency Network in shorter way... • Global system of interconnected computer networks is the...
The Internet 2014-11-30
Across
- Advanced Research Projects Agency Network in shorter way...
- In what month was Internet first connected?
- Clobal system of interconnected computer networks is the...
- History of...
Down
- Distributed denial-of-service aka...
- What can stop viruses inflecting files in your computer?
- What type of file can you execute/launch?
- Bot in other words
8 Clues: History of... • Bot in other words • Distributed denial-of-service aka... • What type of file can you execute/launch? • In what month was Internet first connected? • What can stop viruses inflecting files in your computer? • Advanced Research Projects Agency Network in shorter way... • Clobal system of interconnected computer networks is the...
UID 2022-02-22
Across
- we have to Organize Menu from
- Menu Networks of all the menus interconnected is Called
- keyboard equivalents are represented by
Down
- principle of User Interface Design provide
- shortcut for Keyboard Accelerator
- direct Manipulation in Graphic System provide
- Designate and Item is active or inactive
- user should be provide with
8 Clues: user should be provide with • we have to Organize Menu from • shortcut for Keyboard Accelerator • keyboard equivalents are represented by • Designate and Item is active or inactive • principle of User Interface Design provide • direct Manipulation in Graphic System provide • Menu Networks of all the menus interconnected is Called
I.E.C.E 2022-08-21
8 Clues: rasa clean slate • low teacher-child ratios • children 4-6 year class. • networks working together • fitting to the development of a child • care, education, supervision of anothers child. • the quality or state of being able to read and write • behaviors and beliefs of those who engage regularly in media.
Technology Terminology 2022-09-26
Across
- Imaginary creatures that cause unexplained technology problems
- IT protection.
- Computer that manages access to centralized resource.
Down
- American multinational technology corporation based in Washington.
- Location of multiple centralized IT resources.
- Tool used to send and receive data across shared or public networks.
- Data "rains" from here.
- Interconnected people or technology.
8 Clues: IT protection. • Data "rains" from here. • Interconnected people or technology. • Location of multiple centralized IT resources. • Computer that manages access to centralized resource. • Imaginary creatures that cause unexplained technology problems • American multinational technology corporation based in Washington. • ...
Departments & Roles 2025-04-19
Across
- Works for a company
- The top of a company
- Organises internal and external communication
- Employee relations like hiring staff etc.
- Maintains a good public image of the company
- Ensures all systems and networks are working
- Buys goods and raw materials
- Ensures the smooth day-to-day running of a company
Down
- Looking into and making future products for the company
- Manages the financial activities of a company
- Helps management in all kinds of roles
- Deal with money matters from paying bills to projecting sales
- Hires people
- Makes sure company's contracts and activities are legal
- Selling finished products to the outside market
- Promotes products
- Ensures manufacturing runs smoothly
- Responsible for overall working of a company
18 Clues: Hires people • Promotes products • Works for a company • The top of a company • Buys goods and raw materials • Ensures manufacturing runs smoothly • Helps management in all kinds of roles • Employee relations like hiring staff etc. • Maintains a good public image of the company • Ensures all systems and networks are working • Responsible for overall working of a company • ...
Hadlee internet crossword puzzle 2 2014-04-04
Across
- full website address
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- the name for a way to display information on websites.
Down
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- networks online communities where people meet, socialize,exchanged digital files, etc.
- a collaborative website which can be directly edited by anyone with access to it
- the unauthorized use,reproduction, distribution, or transmission of copyrighted material.
- network etiquette;online manners; following rules of conduct fro online or internet users, being a good digital citizen.
- The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- software that searches and gathers and identifies information from a database based on keywords,titles, and text
- Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
- a piece of writing that has been copied from someone else and is presented as being your own work.
- a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network
13 Clues: full website address • the name for a way to display information on websites. • a collaborative website which can be directly edited by anyone with access to it • networks online communities where people meet, socialize,exchanged digital files, etc. • the unauthorized use,reproduction, distribution, or transmission of copyrighted material. • ...
INTERNET PRINCIPLES OF OPERATION 2015-04-28
Across
- THE INTERNET CONSISTS OF MANY LINKED
- DEFINES WHAT YOU WILL FORMAT IN HTML
- DEFINES HOW YOU WILL FORMAT CONTENT IN HTML
- HTML
- YOUR OWN UNIQUE ID FOR A WEBSITE
Down
- COMPUTER WHICH STORES WEBSITES
- NAME PART OF A URL WHICH MUST BE UNIQUE
- COMPUTER CONNECTED TO A NETWORK
- ORG, COM, ACC, GOV
- WWW
- ADDRESS A UNIQUE NUMBER WHICH IDENTIFIES A NETWORK INTERFACE CARD
- COLOURS, FONT, SIZE OF A WEBPAGE
- PLACEMENT OF CONTENT ON A WEBPAGE
- APPLICATION WHICH ALLOWS YOUR TO SURF INTERNET
- SENT FROM THE BROWSER TO GET A WEBSITE
- SET OF RULES WHICH DEFINE HOW DEVICES COMMUNICATE
- A HARDWARE DEVICE WITH A NUMBER ASSIGNED TO IT
- ADDRESS OF A WEBSITE
18 Clues: WWW • HTML • ORG, COM, ACC, GOV • ADDRESS OF A WEBSITE • COMPUTER WHICH STORES WEBSITES • COMPUTER CONNECTED TO A NETWORK • COLOURS, FONT, SIZE OF A WEBPAGE • YOUR OWN UNIQUE ID FOR A WEBSITE • PLACEMENT OF CONTENT ON A WEBPAGE • THE INTERNET CONSISTS OF MANY LINKED • DEFINES WHAT YOU WILL FORMAT IN HTML • SENT FROM THE BROWSER TO GET A WEBSITE • ...
JWIN Query Fun 2024-07-09
Across
- NCIC wants and warrants only?
- Type of agency can enter information in NCIC?
- A positive response to a NCIC query
- Abbreviation for DOJ Criminal Justice Information Network
- A hit response in 1 hour
- Hit confirmation request
- Driver License check
- Abbreviation for International Justice and Public Safety Networks
- A stolen vehicle query?
Down
- A query for NCIC W/W and CCH but only done at officer request?
- Type of agency that can only query NCIC?
- CJIS CSO ensure each agency designates a what?
- Abbreviation for National Crime Information Center
- Query for vehicle registration
- A hit response in 10 minutes
- Hit confirmation response
- Query for Criminal History Rap Sheet
- A State Warrant Query
18 Clues: Driver License check • A State Warrant Query • A stolen vehicle query? • A hit response in 1 hour • Hit confirmation request • Hit confirmation response • A hit response in 10 minutes • NCIC wants and warrants only? • Query for vehicle registration • A positive response to a NCIC query • Query for Criminal History Rap Sheet • Type of agency that can only query NCIC? • ...
vocabulary 2022-11-15
Across
- brain of a computer
- a device used to input and output information into the computer
- a small device that plugs into the USB port on your computer
- wide area network, private or public network
- intellectual property
- store the short term data
- the act of copying other people's works or words ,and publish as your own work
- storage device
- allows copying for limited purpose
Down
- identify parts of a large program or construction
- rules of the internet communication
- a security system that control the networks
- Local area network, private network
- uses to connect the computer peripheral
- able to let you save files in your computer
- protect the network
- brings virus into your computer
- junk mail
18 Clues: junk mail • storage device • brain of a computer • protect the network • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
TEJ2O1 - Security and Ethics - D. French 2024-07-26
Across
- You should regularly make a ____ of your data/photos.
- Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
- If you download software, ____ it before running it.
- Emails can spread malware, most often when you click links or open ____.
- People might feel more comfortable committing crimes on a computer because they feel like they are ____.
- Blocks your access to your computer and files, asking you to pay a ransom to get it back.
- Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
- Keep your operating system secure by running all the latest.
- Malware that damages files on your computer or stops your computer from running properly.
- If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
Down
- Avoid making financial transactions on ____ networks or computers.
- Tries to open security holes in your computer so a hacker can gain access.
- When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
- To protect your device from malware, you should install reputable ____ software and run frequent scans.
- Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
- Make sure you use a different ____ for different sites and keep them long and complex.
- Computer activities often leave a digital ____ that leads back to the offender.
- When you copy sections of someone else's work and claim it is your own.
- When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
- A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
20 Clues: If you download software, ____ it before running it. • You should regularly make a ____ of your data/photos. • Keep your operating system secure by running all the latest. • Avoid making financial transactions on ____ networks or computers. • When you copy sections of someone else's work and claim it is your own. • ...
Cybersecurity unit 8 and 9 vocabulary 2026-03-26
Across
- A cyber attack where a hacker alters DNS records to redirect users to a fraudulent website.
- small portions of data used to remember user preferences on websites.
- A security tool where a password requires multiple different applications all using one time codes to log in.
- Standard programming language for communicating with networks.
- A security tool to distinguish between humans and bots.
- A precise step by step set of instructions or rules to achieve a task or solve a problem.
- A one way algorithm that converts data of any size into a fixed-length string of characters, used in cryptography.
- A cyberattack where an intruder places themselves in between networks to intercept whatever travels through the network.
- A cyberattack where criminals use bots to test stolen username and password pairs on different websites to gain unauthorized access.
Down
- A cybersecurity attack where hackers use a list of words and phrases to guess passwords.
- A deliberate, unauthorized action to exploit flaws in a network in order to steal or modify data.
- Security tool that uses unique traits of a user’s body to grant authentication such as fingerprints or retina.
- A technique where a hacker sends data with a falsified source IP to bypass security measures such as firewalls.
- A cybersecurity attack where hackers use automated programs to guess every possible combination of characters to guess passwords.
- An attempt to exploit vulnerabilities in applications, code, or operating systems to steal data or gain unauthorized access.
- A character set comprising both letters and numbers.
- A command written in SQL used to communicate with and manipulate data in a database.
- A secure, temporary, alphanumerical code used for authentication that only works one time.
- A malicious SQL code injected into a database to allow attackers to view or modify data in a database without authorization.
- A standardized, structured collection of data.
20 Clues: A standardized, structured collection of data. • A character set comprising both letters and numbers. • A security tool to distinguish between humans and bots. • Standard programming language for communicating with networks. • small portions of data used to remember user preferences on websites. • ...
Vocabulary 2022-04-14
8 Clues: excited, happy • (2 words)part-time job • best or most important • (abbreviation) hit me up, text me • (2 words) very attractive or noticeable • Interacting with users on social networks • (abbreviation) hugs and kisses (usually in the end) • (3 words) think of a plan, an idea, or a solution to a problem
Technology Terminology 2022-09-26
Across
- Imaginary creatures that cause unexplained technology problems
- IT protection.
- Computer that manages access to centralized resource.
Down
- American multinational technology corporation based in Washington.
- Location of multiple centralized IT resources.
- Tool used to send and receive data across shared or public networks.
- Data "rains" from here.
- Interconnected people or technology.
8 Clues: IT protection. • Data "rains" from here. • Interconnected people or technology. • Location of multiple centralized IT resources. • Computer that manages access to centralized resource. • Imaginary creatures that cause unexplained technology problems • American multinational technology corporation based in Washington. • ...
Computer networks and internet 2020-10-21
Across
- WAN stands for ____ area network
- device to connect to the internet
- a list of website that have been visited recently
Down
- collection of interconnected networks
- a single document viewable through a web browser
- network without cables
- key on the top left of the keyboard
- a programming language used for creating a webpage
8 Clues: network without cables • WAN stands for ____ area network • device to connect to the internet • key on the top left of the keyboard • collection of interconnected networks • a single document viewable through a web browser • a list of website that have been visited recently • a programming language used for creating a webpage
What is Computer Science? 2022-10-27
Across
- systems are the machines that run programs
- technology affects the way we live and think
- organizing, describing, and understanding data
- a list of steps or instructions to finish a task
Down
- someone who uses something
- a group of connected devices
- a set of instructions for a computer to understand
- raw, unorganized facts
8 Clues: raw, unorganized facts • someone who uses something • a group of connected devices • systems are the machines that run programs • technology affects the way we live and think • organizing, describing, and understanding data • a list of steps or instructions to finish a task • a set of instructions for a computer to understand
SENOE Austin CSW 2024 2024-10-07
Across
- Instructions for a computer
- Initials of the president, whose library is located downtown.
- Newest Set top box(STB) released in 2023.
- Forwards data packets between networks
- Data transfer rate limit
- Spectrum HQ City
Down
- Process of identifying and resolving software issues
- Renowned park in downtown Austin, known for hosting numerous events
- Pre-release evaluation by external users
- Network topology, where all devices connect to a central hub
- Emerge at twilight from beneath the Congress Avenue Bridge
11 Clues: Spectrum HQ City • Data transfer rate limit • Instructions for a computer • Forwards data packets between networks • Pre-release evaluation by external users • Newest Set top box(STB) released in 2023. • Process of identifying and resolving software issues • Emerge at twilight from beneath the Congress Avenue Bridge • ...
IT WEEK!! 2026-01-29
Across
- An output device that displays information
- A pointing device used to control the cursor
- Raw facts or information processed by a computer
- Software used to access websites
- Physical parts of a computer you can touch
- A global system of interconnected networks
Down
- An input device used to type text
- A computer that provides data to other computers
- A group of connected computers that share information
- Programs and applications used by a computer
- Wireless technology for network connection
11 Clues: Software used to access websites • An input device used to type text • An output device that displays information • Physical parts of a computer you can touch • Wireless technology for network connection • A global system of interconnected networks • A pointing device used to control the cursor • Programs and applications used by a computer • ...
Network Word Search 2014-03-22
Across
- fully or partially connected network in which each of the nodes is connected to each other.
- point where lines intersect or terminate
- geographically dispersed collection of LAN'S
- prevents unauthorized access to or from a private network
- easiest way to add more computers into network
- family of computer networking technologies for LANs
- connects to internet using microwaves
- Bus message-based protocol designed for automotive applications/used in aerospace, maritime, industrial automation & medical equipment
- arrangement of the various elements of a computer network
- computer network used for data transmission among devices
- access without a direct connection
- computer hardware or software, accesses a service made available by a server
- network topology based on a hierarchy of nodes
- one of the most common computer network topologies
- common connection point for devices in a network
Down
- LAN/each node connected to single cable
- interconnects computers withing a limited or smaller geographic area
- Larger than LAN withing same city
- combination of topologies/resulting network does not exhibit one of the standard topologies
- distance of access of Wi-Fi networks
- router/provides greater range for signal & strength of overall signal
- interconnects various pieces of network, provides path for exchange of info
- system (software and hardware)/responds to requests to provide network services
- simplest topology/permanent link between two endpoints
- network topology travels in one direction/each device is a repeater
- measurement of bit-rate of available or consumed data
- expansion board (card) installed so computer can be connected to a network
- decentralized and distributed network architecture/individual nodes act as both suppliers & consumers of resources
- any location where Wi-Fi access is publicly available
- forwards data packets between computer networks
- connect devices together on a computer network
- twisted pair cable for carrying signals
- modular connector for computer network (Ethernet) cables
33 Clues: Larger than LAN withing same city • access without a direct connection • distance of access of Wi-Fi networks • connects to internet using microwaves • LAN/each node connected to single cable • twisted pair cable for carrying signals • point where lines intersect or terminate • geographically dispersed collection of LAN'S • easiest way to add more computers into network • ...
E- Ethics Vocabulary 2021-01-25
Across
- Name - first portion of a web name; often “www.”
- - computer user who attempts to acquire unauthorized entry to servers and computer systems
- Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
- tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
- - two or more computers linked together which share and exchange information
- Media - websites used to share, post and exchange information in an informal format through several differing channels
- - collection of web pages which have a common theme or focus
- Virus - computer program which replicates and spreads itself from one computer to another
- Service Providers (ISP) - companies which provide Internet connections for a fee
- History - list of websites visited
- Name - middle portion of a web name; unique to the web name
- page - single web document which opens in a browser
Down
- - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
- - worldwide collection of networks which allow people to communicate and share information quickly and easily
- Network - networks or websites which require a password or security code to gain access
- Address - combination of words and symbols unique to each web page
- Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
- - words, phrases or graphics in a web page which targets another location
- or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
- - allows equipment such as fax machines, printers and files to be served to multiple computers
- - web page which automatically opens when the web browser is opened
- (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
- Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
- Browser - software program retrieving and presenting data using the Internet
24 Clues: History - list of websites visited • Name - first portion of a web name; often “www.” • page - single web document which opens in a browser • Name - middle portion of a web name; unique to the web name • - collection of web pages which have a common theme or focus • Address - combination of words and symbols unique to each web page • ...
Computer 2022-11-24
Across
- a device that translates sound vibrations in the air into electronic signals and scribes them to a recording medium or over a loudspeaker
- the technology that connects your offices, data centers, cloud applications, and cloud storage together
- a device with a screen that shows a rendered electronic image
- accelerate graphics rendering
- which allow for easy use of a computer's processing power, as well as applications
- short term memory where data is stored as the processor needs it
- a piece of data from a website that is stored within a web browser that the website can retrieve at a later time
- for putting information including letters, words and numbers into your computer
- a type of data storage device that is used in laptops and desktop computers
Down
- the circuit board that connects all of your hardware to your processor
- a worldwide system of computer networks
- an electronic game in which players control images on a video screen
- consists of a series of computers linked together to form a network in a circumscribed location
- tell everything from your graphics processing unit (GPU) to your disk drives and screens what to do
- a small, movable device that lets you control a range of things on a computer
- managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection
- to offer audio output for the listener
- program that provides a way to look at and interact with all the information on the World Wide Web
- circulates air through the radiator so it can release engine heat into the surrounding air
- an item like a word or button that points to another location
- electronic machinery that carries out instructions from programs that allows a computer or other device to perform its tasks
21 Clues: accelerate graphics rendering • to offer audio output for the listener • a worldwide system of computer networks • a device with a screen that shows a rendered electronic image • an item like a word or button that points to another location • short term memory where data is stored as the processor needs it • ...
NNDL 2023-11-25
Across
- What type of neural network is used for unsupervised learning and aims to encode input data into a lower-dimensional representation?
- What optimization algorithm combines the benefits of both momentum and RMSprop?
- What approach involves using a pre-trained model as the starting point for a new model?
- What is the technique for representing categorical variables as binary vectors?
- What technique is used to assess a model's performance by splitting the dataset into multiple subsets?
- What is the representation of categorical variables as continuous vectors in neural networks?
- What is the technique for initializing neural network weights to prevent vanishing or exploding gradients?
- What type of neural network is designed for processing structured grid data, such as images?
- What metric combines precision and recall for evaluating the performance of a classification model?
Down
- The activation function commonly used in the output layer for multiclass classification.
- What downsampling technique in convolutional neural networks selects the maximum value from a set of values?
- What is the phenomenon where the gradient becomes extremely small during training?
- What is the process of artificially increasing the size of a dataset by applying transformations to the existing data?
- What technique is used to prevent overfitting by adding a penalty term to the loss function based on the magnitude of weights?
- What is the iterative optimization algorithm used to minimize the loss function?
- What is the activation function that replaces all negative values in the input with zero?
- What technique involves normalizing inputs in a neural network to improve training stability?
- What is the process of finding the best hyperparameter values for a machine learning model?
- What is the technique of gradually reducing the learning rate during training to converge more effectively?
- What activation function is commonly used in the output layer for multiclass classification?
- What technique involves randomly dropping out some neurons during training to prevent overfitting?
21 Clues: What optimization algorithm combines the benefits of both momentum and RMSprop? • What is the technique for representing categorical variables as binary vectors? • What is the iterative optimization algorithm used to minimize the loss function? • What is the phenomenon where the gradient becomes extremely small during training? • ...
Unit 3 Jerzee 2024-04-15
Across
- a crucial tool for UX/UI Designers for prototyping, collaboration, and maintaining brand consistency.
- an area of territory owned or controlled by a ruler or government
- to encourage people to like, buy, use, do, or support something
- to become filled with surprise, wonder, or amazed curiosity.
- plan and direct the route or course of a ship, aircraft, or other form of transportation, especially by using instruments or maps.
- create, share, and test designs for websites, mobile apps, and other digital products and experiJes
- an app to create your own professional website
- a wireless, portable personal computer with a touchscreen interface.
- collecting of webpages
- a person who uses or operates something, especially a computer or other machine.
- is a data structure supporting some pre-specified set of queries and updates to a database while consuming space
- a person who receives or entertains other people as guests.
- the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- a user interface design tool for creating wireframes.
- allows you to easily create and test tomorrow's digital experiences across a range of devices, including smartphones, desktops, TVs, and car dashboard screens.
- a set of options presented to the user of a computer application to help them find information or execute a function.
- being able to react quickly
Down
- (of a place) able to be reached or entered.
- the activity or business of promoting and selling products or services, including market research and advertising.
- an ability or willingness to change to suit different conditions.
- provides tools to ideate, prototype, document, and also, build design systems.
- someone who prepares content for the Web
- a physically disabled person
- a way to organize and structure content within your main domain.
- able to move or be moved freely or easily.
- an all-encompassing online wireframing and product design tool designed to bring software ideas to life visually.
26 Clues: collecting of webpages • being able to react quickly • a physically disabled person • someone who prepares content for the Web • able to move or be moved freely or easily. • (of a place) able to be reached or entered. • an app to create your own professional website • a user interface design tool for creating wireframes. • ...
RU ITEC411 Chapter 5 Crime and Security 2024-11-16
Across
- Early packet switching network, seen as the predecessor for modern internet.
- Software intentionally designed to cause disruption.
- Use of cyber-attacks against a state, causing comparable harm to warfare.
- A destructive computer worm that spread rapidly through email attachments.
- Cyberattack where malicious actors redirect internet users to a fake website, designed to mimic a legitimate one.
- Overwhelming targeted systems with a flood of traffic, rendering it inaccessible.
- Malware that disguises itself as legitimate software to gain unauthorized access to a computer system.
- A short-range wireless technology that allows electronic devices to communicate.
- Measurement and analysis of unique physical or behavioral characteristics of an individual, used for verification purposes.
Down
- Ethical hacking of a computer system to evaluate security weaknesses and address them.
- A mass-mailing macro virus released in 1999, that targeted Microsoft Word and Outlook-based systems, causing significant network traffic and disruption.
- Use of computer hacking to promote political agenda or social change.
- A self-replicating malware that spreads through networks, exploiting vulnerabilities to infect multiple devices without human interaction.
- An open-source library that provides secure communication between computer networks.
- A non-profit organization focused on improving cybersecurity, by conducting research on software bugs that impact internet security.
- A vulnerability found in OpenSSL allowing attackers to steal sensitive information.
- Created by Robert Tappan Morris, to spread across the internet by exploiting vulnerabilities in Unix systems.
- Cyberattack where attackers use deceptive tactics to trick individuals into revealing sensitive information.
- Malicious software that encrypts a victim's files, making them inaccessible, unless a fine is paid.
- Malware that replicates itself by attaching to other programs or files, requiring a host to run it.
- Network of computers or other internet-connected devices that have been infected with malware and are under the control of a single attacker.
21 Clues: Software intentionally designed to cause disruption. • Use of computer hacking to promote political agenda or social change. • Use of cyber-attacks against a state, causing comparable harm to warfare. • A destructive computer worm that spread rapidly through email attachments. • Early packet switching network, seen as the predecessor for modern internet. • ...
Safety Crossword Puzzle 2017-04-25
6 Clues: electronic mail • a personal computer • a site with information • ups advertising and ads • computer networks electronic and wireless • bullying on the intrnet that involves using electronics
E-Ethics Vocab 2021-01-25
Across
- - web page which automatically opens when the web browser is opened
- - collection of web pages which have a common theme or focus
- Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
- page - single web document which opens in a browser
- Name - first portion of a web name; often “www.”
- History - list of websites visited
- - allows equipment such as fax machines, printers and files to be served to multiple computers
- - computer user who attempts to acquire unauthorized entry to servers and computer systems
- or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
- Virus - computer program which replicates and spreads itself from one computer to another
- Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
- Wide Web (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
Down
- Network - networks or websites which require a password or security code to gain access
- Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
- Browser - software program retrieving and presenting data using the Internet
- tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
- - words, phrases or graphics in a web page which targets another location
- - worldwide collection of networks which allow people to communicate and share information quickly and easily
- - two or more computers linked together which share and exchange information
- Service Providers (ISP) - companies which provide Internet connections for a fee
- Address - combination of words and symbols unique to each web page
- Media - websites used to share, post and exchange information in an informal format through several differing channels
- - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
- Name - middle portion of a web name; unique to the web name
24 Clues: History - list of websites visited • Name - first portion of a web name; often “www.” • page - single web document which opens in a browser • Name - middle portion of a web name; unique to the web name • - collection of web pages which have a common theme or focus • Address - combination of words and symbols unique to each web page • ...
Internet Basics vocabulary 2021-01-25
Across
- Name - first portion of a web name; often “www.”
- - computer user who attempts to acquire unauthorized entry to servers and computer systems
- Domain - last portion of a web name; includes examples such as “.com”, “.org” or “.net”
- tags - descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
- - two or more computers linked together which share and exchange information
- Media - websites used to share, post and exchange information in an informal format through several differing channels
- - collection of web pages which have a common theme or focus
- Virus - computer program which replicates and spreads itself from one computer to another
- Service Providers (ISP) - companies which provide Internet connections for a fee
- History - list of websites visited
- Name - middle portion of a web name; unique to the web name
- page - single web document which opens in a browser
Down
- - hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
- - worldwide collection of networks which allow people to communicate and share information quickly and easily
- Network - networks or websites which require a password or security code to gain access
- Address - combination of words and symbols unique to each web page
- Predator - adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people
- - words, phrases or graphics in a web page which targets another location
- or Bookmarks - feature which can be used to store and organize a list of web pages which can be revisited easily
- - allows equipment such as fax machines, printers and files to be served to multiple computers
- - web page which automatically opens when the web browser is opened
- (www) - portion of the Internet consisting of computer sites containing billions of documents called web pages
- Engine - software program which searches the Internet for words or phrases and returns a list as to where each is located
- Browser - software program retrieving and presenting data using the Internet
24 Clues: History - list of websites visited • Name - first portion of a web name; often “www.” • page - single web document which opens in a browser • Name - middle portion of a web name; unique to the web name • - collection of web pages which have a common theme or focus • Address - combination of words and symbols unique to each web page • ...
SMM-Marketing Omoev Arlen 2020-04-18
Across
- Product _____. Getting customers to buy a product for the first time
- efers to techniques that target social networks and applications to spread brand awareness or promote particular products
- what platform of smm marketing is the most famous in USA
- Paid-for communication, aimed at informing or persuading
- This targeting is based on a certain location and can be as broad as a country or region, or as specific as a city or neighborhood.
- Marketing (also known as emarketing, web marketing, or digital marketing) is an all-inclusive term for marketing products and/or services online – and like many all-inclusive terms, internet marketing means different things to different people.
- Any recognizable name, logo or symbol that identifies a product
- The group of consumers or customers aimed at by a business
- These targets are based on age, gender, ethnicity, race, income, education, religion, economic status and more, and are extremely commonly used in all types of marketing.
- A brand that is owned and promoted by retailers rather than manufacturers
Down
- Research designed to provide information about opinions, attitudes and behaviours
- what platform of smm marketing is the most famous in CIS (Commonwealth of Independent States)
- The marketing combination of product, price, promotion and place
- Distribution __________. How a business gets its products to the end
- also known as multisegment marketing, is a marketing strategy that involves identifying specific personas or markets for specific content.
- Surveying a small group of a population to gain research insights
- Marketing promotion that relies on word-of-mouth or online networks to spread the message
- Goods or services produced by a business
- The part of the marketing mix that focuses on where a firm’s products are sold
- Product or brand with a high share of a mature or declining market
20 Clues: Goods or services produced by a business • what platform of smm marketing is the most famous in USA • Paid-for communication, aimed at informing or persuading • The group of consumers or customers aimed at by a business • Any recognizable name, logo or symbol that identifies a product • The marketing combination of product, price, promotion and place • ...
Ryan Jones-Crossword-2nd Period 2016-10-24
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- send the same message indiscriminately to (large numbers of recipients) on the Internet.
- portable computer
- A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.
- study/use of systems for storing, retrieving, and sending info.
- a cellular phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
- computer networking device that connects devices together on a computer network
- gives instructions the computer needs to operate
- software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- lets the user to complete tasks such as create documents , Spreadsheets, databases, and publications
- common connection point for devices in a network
Down
- a summary
- Partitions are drives meaning it shows up as one drive on the windows
- networking device that forwards data packets between computer networks
- To open a list of keyboard shortcuts in Google Docs, press Ctrl + / (Windows, Chrome OS) or ⌘ + / (Mac). You can also use menu accesskeys.
- created when two or more PCs are connected and share resources without going through a separate server computer
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- connects to local systems and controls the passing info.
- Point networking hardware allows Wi-Fi compliant device to connect to a wired network
- desktop computer terminal, more powerful than personal computer
20 Clues: a summary • portable computer • gives instructions the computer needs to operate • common connection point for devices in a network • connects to local systems and controls the passing info. • study/use of systems for storing, retrieving, and sending info. • desktop computer terminal, more powerful than personal computer • ...
Chapter 36 2014-04-30
Across
- were the industries that include financial services?
- where did manufacturing jobs move out of?
- what were the names of the general people who left their country to move to safety in 2005?
- what is the creation of plants or animals that are genetically identical to an existing plant or animal?
- what was created in 2002 to coordinate national efforts against terrorism
- what is the type of terrorism that involves politically motivated attacksion informatic systems such as hacking into computer networks?
- what is the abbreviation for European Economic community?
- what includes all financial interactions that cross international borders?
- what is the abbreviation for the North Atlantic Treaty Organization?
- since that late 1960s, more than 14,000 terrorist attacks have occurred where?
- in the late 1950s a new style of music emerged called what?
Down
- president Bush an anti-terrorism bill called what?
- access to TV, radio, and phones are known as
- what is a spread of nuclear weapons to other nations called?
- what is the working laboratory for experiments in space?
- who was one of the greatest champions of human rights that established the order of the missionaries of charity?
- what is the voluntary linkage of computer networks around the world?
- what is the 20th century attempt to increase food resources worldwide using economic processes?
- cultural elements that reflect groups of people with common backgrounds and interests?
- what is a major goal for globalization?
- the transferring of genes from one living thing to another in order to produce an organism with new traits?
- what is the use of violence, on people, or property
- the western mind set of placing a high value on acquiring material possessions is what?
- what is the greatest global health issue(disease) that was first discovered in the 1980s?
24 Clues: what is a major goal for globalization? • where did manufacturing jobs move out of? • access to TV, radio, and phones are known as • president Bush an anti-terrorism bill called what? • what is the use of violence, on people, or property • were the industries that include financial services? • what is the working laboratory for experiments in space? • ...
Wireless/Bluetooth 2023-03-28
Across
- 5 GHz Frequency, max speed 3.46 Gbps, 300 Ft range, 802.11b/g/n backwards compatibility
- 2.4 GHz Frequency, max speed 54 Mbps, 150 Ft range, 11 channels, 802.11b backwards compatibility
- 2.4 GHz Frequency, max speed 11 Mbps, 150 Ft range, 11 channels, no backwards compatibility
- 2.4 or 5 GHz Frequency, max speed 600 Mbps, 1200 Ft range, 2.4 GHz: 11 Channels 5GHz: 23 channels, 802.11a/b/g depending on implementation backwards compatibility
- A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
- A method that combines channels into one to increase bandwidth.
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- An enhancement that allows multiple antennas to use the same radio frequency.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
Down
- authentication Secure authentication method for wired and wireless networks.
- IEEE designation for all wireless networking standards.
- 5 GHz Frequency, max speed 54 Mbps, 100 Ft range, 23 channels, no backwards compatibility
- 2.4 or 5 GHz Frequency, max speed 14 Gbps, 300 Ft range, 802.11b/g/n/ac backwards compatibility
- Wireless network that requires no authentication.
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Wireless authentication method that uses a passphrase to authenticate users.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
20 Clues: Wireless network that requires no authentication. • IEEE designation for all wireless networking standards. • A method that combines channels into one to increase bandwidth. • authentication Secure authentication method for wired and wireless networks. • Wireless authentication method that uses a passphrase to authenticate users. • ...
CIE 5 (crossword) 2025-04-28
Across
- AI-generated videos made to look real are called
- Which deep learning framework is known for dynamic computation graphs and developed by Meta?
- Real-time speech recognition tool by Google
- Google’s AI framework that supports TPUs
- Computer vision library with C++ and Python support
- Type of AI that focuses on making AI decisions transparent to humans
- TensorFlow tool used for visualizing model performance
- Python library mainly used for statistical plots like violin plot, box plot
- Graphical representation to show data distribution
- Field of AI focused on processing and understanding human language
- Massive datasets processed and analyzed by AI platforms
- Google service for tracking app and website performance
- Machine learning library that integrates with OpenCV
Down
- Content creation tool using GPT for marketing and writing
- Which open-source framework by Google is used for deep learning and machine learning?
- The process of analyzing data sets to summarize main characteristics
- AI field that trains agents through rewards and penalties
- Which Python library is used to create static, animated, and interactive visualizations?
- TensorFlow feature for using pre-trained models automatically
- Neural networks commonly used for image data processing
- Type of graph to show bars for categorical data comparison
- Google AI service combining machine learning with computer vision
- Visualization type in Seaborn showing variable distribution as smoothed curve
- Platform that offers free GPU access for training AI models online
- A business report format created using Matplotlib for insights
- The act of imitating real-world processes using computer models
- Python library that works with Seaborn for data visualization
- Lightweight framework in TensorFlow for building neural networks
- Platform commonly used for coding and data visualization with Matplotlib
- AI model developed by OpenAI to generate human-like text responses
- Google’s multimodal AI model supporting text, images, and code
31 Clues: Google’s AI framework that supports TPUs • Real-time speech recognition tool by Google • AI-generated videos made to look real are called • Graphical representation to show data distribution • Computer vision library with C++ and Python support • Machine learning library that integrates with OpenCV • TensorFlow tool used for visualizing model performance • ...
Network Topologies and Technologies 2025-03-03
Across
- What occurs when devices transmit simultaneously using CSMA/CD?
- Which signaling method uses the entire bandwidth to send data as pulses?
- What topology creates a temporary connection between two devices whenever data is sent?
- What is the name given to the 802.11 series of standards for wireless LANs?
- What is the term for a device that connects two networks wirelessly, typically used to link two buildings or extend an existing network?
- What type of antenna focuses signals in a single direction?
- What is another name for a logical bus topology, where all devices share the bandwidth?
- What wireless mode has no central device and allows data to travel directly between devices?
Down
- In a physical star topology, what is the central device that connects all the computers in a LAN?
- What ratio measures the amount of valid signal compared to noise in a transmission?
- physical bus traveling across the medium is called?
- The term used when electricity bounces off the end of a cable and back in the other direction is called
- What topology connects only two devices directly?
- In a point-to-point topology, what is the main advantage of having a dedicated link between two devices?
- What logical topology is used in both Ethernet and wireless LANs, where data is received by all devices?
- In a physical ring topology, what type of device connects the local area networks (LANs) of buildings A, B, and C to form the ring?
- What topology connects each device to every other device, providing redundancy and fault tolerance?
- Term refers to the extra information in a network transmission that isn't part of the application data?
- What topology passes data from one device to the next in a circle until it reaches the destination?
- What topology describes how data travels between devices?
20 Clues: What topology connects only two devices directly? • physical bus traveling across the medium is called? • What topology describes how data travels between devices? • What type of antenna focuses signals in a single direction? • What occurs when devices transmit simultaneously using CSMA/CD? • ...
Awesome Privacy Week Crossword 2025-01-07
Across
- Malicious software designed to harm or exploit computers and networks
- A set of rules that organizations must follow to protect sensitive health information in the U.S.
- The European Union's data protection regulation implemented in 2018
- A widely used AI model trained on large datasets for text generation and understanding
- A technique that hides details of individuals in a dataset while preserving overall patterns
- A privacy framework aimed at protecting children’s online data in the U.S.
- A set of policies and technologies designed to secure sensitive data in a cloud
- A weakness in a system that can be exploited by cybercriminals
- A breach of this can result in stolen data, identity theft, and reputational damage
- A mechanism that lets users decide whether their data can be collected or shared
- A feature that allows users to browse the internet without saving cookies or search history
- A type of attack where criminals demand payment to release encrypted files
- The principle that organizations should collect only the data necessary for a specific purpose
Down
- Unauthorized access or damage to computer systems and networks
- The act of removing or disguising personal identifiers from datasets
- A key document that explains how an individual's data is stored, used, and shared
- The legal right of individuals to control how their personal data is collected, used, and shared
- AI system component designed to process vast amounts of data quickly
- A document that outlines how organizations collect, use, and protect data
- The science of making computers understand and generate human language
- A person designated to oversee compliance with data protection laws and practices
- A protocol used to ensure secure communication over a computer network
- The process of encoding information to prevent unauthorized access
- A U.S. state law that grants residents the right to know what personal data companies collect about them
24 Clues: Unauthorized access or damage to computer systems and networks • A weakness in a system that can be exploited by cybercriminals • The process of encoding information to prevent unauthorized access • The European Union's data protection regulation implemented in 2018 • The act of removing or disguising personal identifiers from datasets • ...
internet 2025-09-19
Across
- A physical medium for linking systems.
- A collection of several web pages managed by the same owner.
- A way in which networks can be interconnected.
- The quality of J.C. Licklider for understanding the potential of computers.
- A visionary who formulated the first ideas for the global network.
- The research center where Tim Berners-Lee developed ENQUIRE and the World Wide Web.
- A person who uses a network service, often with an account and username.
- The screen that shows computer information to the user.
- A system invented by Tim Berners-Lee for researchers to share documents.
- A set of devices that can process, store, and input data.
- War, The period in which the fear of a nuclear war motivated the creation of a network.
- A programming language for creating web pages.
- Graphics (icons, images) that can be clicked to access linked information.
- A network of networks that allows access to information from different computers.
- A form of writing in which there is no specific order to follow.
- An application for accessing and viewing web information.
- An invisible area where a hyperlink is activated by clicking.
- page, A document for the World Wide Web identified by a URL.
Down
- A network developed by the U.S. Department of Defense to link computers at the Pentagon.
- Activities of consuming internet content.
- A satellite launched by the Soviet Union during the Cold War.
- A global information system for storing and finding resources.
- Multiple systems interconnected to share information.
- The medium initially used to link computers at the Pentagon.
- A combination of different forms of content, such as text, images, and videos.
- The name of the 8-ton computer from 1951.
- The building of the U.S. Department of Defense.
- A unique identifier for a web page.
- How well the software responds to user actions.
- Words that become clickable to access linked information.
30 Clues: A unique identifier for a web page. • A physical medium for linking systems. • Activities of consuming internet content. • The name of the 8-ton computer from 1951. • A way in which networks can be interconnected. • A programming language for creating web pages. • The building of the U.S. Department of Defense. • How well the software responds to user actions. • ...
Technology Crossword Assignment 2018-04-04
Across
- the computing part of the computer...
- a small text file created by a website...
- an in-house website that serves employees only...
- data stored locally to speed up subsequent retrievals...
- picture element...
- a large network made of smaller networks...
- machinery and equipment...
- Uniform Resource Locator...
Down
- instructions for the computer...
- a scam to steal valuable information...
- an organization that provides access to the internet...
- computer people say "there is not enough_______ to complete this"
- a method for keeping your computer safe from intruders...
- to make a video about your day and what is going on and then posting it online...
- Universal Serial Bus
15 Clues: picture element... • Universal Serial Bus • machinery and equipment... • Uniform Resource Locator... • instructions for the computer... • the computing part of the computer... • a scam to steal valuable information... • a small text file created by a website... • a large network made of smaller networks... • an in-house website that serves employees only... • ...
TECHNOLOGY VOCABULARY 2021-07-26
Across
- set up for a particular purpose
- a set of related records kept together
- an organized body of related information
- page the opening page of a web site
- locate and correct errors in a computer program code
- a program used to view HTML documents
- crime committed using a computer and the internet
- the exclusive right to sell a work
Down
- a worldwide network of computer networks
- any small compartment
- a data transmission rate for modems
- software that is provided without charge
- transfer out of a database or document
- a listing of the computer files stored in memory
- a unit of measurement of information
15 Clues: any small compartment • set up for a particular purpose • the exclusive right to sell a work • a data transmission rate for modems • page the opening page of a web site • a unit of measurement of information • a program used to view HTML documents • a set of related records kept together • transfer out of a database or document • a worldwide network of computer networks • ...
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
IT CAN BE DONE SPOTLIGHT CROSSWORD PUZZLE 2023-02-16
Across
- We sell these - popular add-on for notebooks
- Our website for all that we do
- _____ State Drive We use these to speed up your computer
- Part of our slogan / our point of difference
- We design, sell and maintain these
- We offer this type of Recovery Service
- We also service here
Down
- One of most popular services - keep your data safe
- We sell these devices to share internet access
- We sell these - including portable ones
- We sell & service these
- We sell & service these
- We service here
- We sell this consumable for Inkjet printers
- We sell these - for phones, laptops & cars
- We sell this consumable for Laser printers
16 Clues: We service here • We also service here • We sell & service these • We sell & service these • Our website for all that we do • We design, sell and maintain these • We offer this type of Recovery Service • We sell these - including portable ones • We sell these - for phones, laptops & cars • We sell this consumable for Laser printers • We sell this consumable for Inkjet printers • ...
TWJ - chapter 5 - lesson 1 2022-06-05
Across
- *contribution of money
- *had enough money
- Steven shared the surveying duties with (blank)
- the individual most responsible for the northern specific
- built by the great northern railroad company
- owned rail lines plus railcars and 44 million acres of land
Down
- made trade with foreign countries easier
- James Hill's neighbor
- *share in a company
- Washington's first territorial governor
- WA became part of the (blank) in the year 1883
- the amount of acres Hill sold his neighbor for $5.4 million
- pacific railroad survey authorized exploration of potential (blank) railroad
- companies encouraged (blank) from Europe and Asia
- railroads provided (blank) networks
15 Clues: *had enough money • *share in a company • James Hill's neighbor • *contribution of money • railroads provided (blank) networks • Washington's first territorial governor • made trade with foreign countries easier • built by the great northern railroad company • WA became part of the (blank) in the year 1883 • Steven shared the surveying duties with (blank) • ...
Second Semeste 2025-05-26
Across
- — Reproductive organs that produce gametes.
- — An incomplete bone fracture common in children; written as one word.
- — Interconnected systems; plural form.
- — A superficial injury caused by scraping or rubbing.
- — To evaluate or carefully examine.
- — Small inflamed bumps on the skin, common in acne.
- — Endoscopic examination of the colon; compound word without spaces.
- — Sexual relations; compound word written as one.
- — Hormone that regulates sleep.
- — Injuries caused by heat, chemicals, or radiation.
Down
- — Spongy tissue inside bones where blood cells form.
- — Blood cells that help with clotting.
- — Prescribed amount of medication to take.
- — Blood formations that stop bleeding.
- — Irregular cuts or tears in the skin.
15 Clues: — Hormone that regulates sleep. • — To evaluate or carefully examine. • — Blood cells that help with clotting. • — Blood formations that stop bleeding. • — Interconnected systems; plural form. • — Irregular cuts or tears in the skin. • — Prescribed amount of medication to take. • — Reproductive organs that produce gametes. • ...
AI 2025-07-23
Across
- Ability to interpret sensory information
- Using technology to perform tasks without human intervention
- Computational model inspired by the human brain
- Learning algorithm for training neural networks
- Ability to learn, understand, and apply knowledge
- Model's ability to perform well on unseen data
- Type of learning without labeled data
Down
- Process of categorizing data into groups
- Imitating a real-world process or system
- Learning method based on rewards and penalties
- Step-by-step procedure for solving a problem
- Predicting continuous values in machine learning
- Process of improving a model's performance
- Forecasting future outcomes based on data
- Type of learning with labeled data
15 Clues: Type of learning with labeled data • Type of learning without labeled data • Process of categorizing data into groups • Imitating a real-world process or system • Ability to interpret sensory information • Forecasting future outcomes based on data • Process of improving a model's performance • Step-by-step procedure for solving a problem • ...
Cyber Basics & Common Threats 2025-10-07
Across
- Software designed to harm or exploit a system
- Network of infected computers controlled remotely
- Malware that locks data and demands payment
- Software that secretly collects user data
- Process of converting information into code
- Software update to fix vulnerabilities
- Malware designed to hide other malicious software
Down
- A secret string of characters used for authentication
- Self-replicating malicious program
- Malicious software disguised as legitimate
- A security barrier between trusted and untrusted networks
- Taking advantage of a vulnerability
- Hidden entry point into a system
- Software that detects and removes malicious code
- Fraudulent attempt to steal sensitive data via fake email
15 Clues: Hidden entry point into a system • Self-replicating malicious program • Taking advantage of a vulnerability • Software update to fix vulnerabilities • Software that secretly collects user data • Malicious software disguised as legitimate • Malware that locks data and demands payment • Process of converting information into code • ...
unit 3 networks (Ali Abokhalil 7B) 2025-01-06
Across
- the name of a website address
- a label made up of numbers
- the last part of the url
- the hardware device that connects a network to the internet
- data being scrambled into secret code
- lets the devices swap information so they can communicate
- is a type of wireless network that connects over short distances
- it allows the device to communicate over a wireless network
- the whole of a wave from the top of one wave to the top of the next
Down
- data getting errors
- a server that stores the ip addresses and urls
- the language of computers
- the middle part of the url
- the first part of the url
- how many cycles there are in a second
- is a type of wireless network that uses radio waves to connect devices together
16 Clues: data getting errors • the last part of the url • the language of computers • the first part of the url • a label made up of numbers • the middle part of the url • the name of a website address • how many cycles there are in a second • data being scrambled into secret code • a server that stores the ip addresses and urls • ...
Joshua Street 2020-04-27
Across
- most effective when all contributors are clear, direct, and respectful.
- Distracting environment
- feeling or belief that one can rely on someone or
- Questions that can be answered yes/no or in a short answer.
- expressed through body language, facial expression, or other means.
Down
- trust.
- the transmission of messages over communications networks.
- gives time to respond
- The listener focuses attention on the speaker.
- A musical or vocal sound with reference to it's pitch
- Spoken or written
11 Clues: trust. • Spoken or written • gives time to respond • Distracting environment • The listener focuses attention on the speaker. • feeling or belief that one can rely on someone or • A musical or vocal sound with reference to it's pitch • the transmission of messages over communications networks. • Questions that can be answered yes/no or in a short answer. • ...
Safety Crossword Puzzle 2017-04-25
6 Clues: electronic mail • a personal computer • a site with information • ups advertising and ads • computer networks electronic and wireless • bullying on the intrnet that involves using electronics
Computer Terms 2018-04-05
Across
- To store data locally in order to speed up subsequent retrievals
- organization that provides access to the Internet
- large network made up of smaller networks
- The computing part of the computer
- Instructions for the computer
- The address that defines the route to a file on an Internet server
- computer term for capability and time
- To write and post an entry, visual
Down
- small text file
- Machinery and equipment
- keeps the computer secure
- An inhouse website that serves employees only, and most medium-sized and large companies have one
- a scam to steal valuable information
- for attaching peripherals to a computer
- bitmapped image
15 Clues: small text file • bitmapped image • Machinery and equipment • keeps the computer secure • Instructions for the computer • The computing part of the computer • To write and post an entry, visual • a scam to steal valuable information • computer term for capability and time • for attaching peripherals to a computer • large network made up of smaller networks • ...
Technology Crossword Assignment 2018-04-04
Across
- a scam to steal valuable information...
- instructions for the computer...
- machinery and equipment...
- a small text file created by a website...
- Uniform Resource Locator...
- computer people say "there is not enough_______ to complete this"
- the computing part of the computer...
Down
- a method for keeping your computer safe from intruders...
- an in-house website that serves employees only...
- picture element...
- a large network made of smaller networks...
- data stored locally to speed up subsequent retrievals...
- to make a video about your day and what is going on and then posting it online...
- an organization that provides access to the internet...
- Universal Serial Bus
15 Clues: picture element... • Universal Serial Bus • machinery and equipment... • Uniform Resource Locator... • instructions for the computer... • the computing part of the computer... • a scam to steal valuable information... • a small text file created by a website... • a large network made of smaller networks... • an in-house website that serves employees only... • ...
COMPUTER PARTS 2022-10-21
Across
- PART OF COMPUTER THAT IS LIKE YOUR SHORT-TERM MEMORY
- DISPLAYS INFORMATION FOR THE USER E.G SCREEN
- HOW THE USER TELLS THE COMPUTER WHAT TO DO E.G KEYBOARD
- LIKE THE HEART OF THE COMPUTER
- 8 BITS
- to accelerate the creation of images in a frame
- LIKE LONG TERM MEMORY IN A COMPUTER
- KEEPS HOLD OF DATA FOREVER
Down
- Exchange information and form networks
- IN A computing system this means using to exchange information
- ONLY STAYS WHEN SYSTEM IS ON
- 1 BINARY DIGIT
- STAYS FORVER
- PART OF COMPUTER THAT ACTS LIKE A SKELETON
- PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN
15 Clues: 8 BITS • STAYS FORVER • 1 BINARY DIGIT • KEEPS HOLD OF DATA FOREVER • ONLY STAYS WHEN SYSTEM IS ON • LIKE THE HEART OF THE COMPUTER • LIKE LONG TERM MEMORY IN A COMPUTER • Exchange information and form networks • PART OF COMPUTER THAT ACTS LIKE A SKELETON • DISPLAYS INFORMATION FOR THE USER E.G SCREEN • PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN • ...
Technology Crossword Puzzle 2017-12-08
Across
- A way to steal personal information.
- a number of people who use computers.
- A small file created by a website.
- Instructions for the computer.
- A way to keep a computer safe from intruders.
- a way to speed up retrievals.
- An organization that provides access to the internet.
- The address that defines the route to a file.
Down
- A way to share information.
- A device to store information.
- A website that serves the use of employees only.
- A large network made up of smaller networks.
- Machinery and equipment.
- The fundamental display element of an electronic.
- A computing part of a computer.
15 Clues: Machinery and equipment. • A way to share information. • a way to speed up retrievals. • A device to store information. • Instructions for the computer. • A computing part of a computer. • A small file created by a website. • A way to steal personal information. • a number of people who use computers. • A large network made up of smaller networks. • ...
Digital Citizenship 2018-01-26
Across
- networks where you participate in social networking
- the stuff that is looked up or researched
- your trail of data online
- being safe online
- using someones similar or exact words without permission
- used to protect information
Down
- regulates how online tools collect personal information
- a photo or image that is not allowed to be used other than its original purpose
- only acceptable in very few situations
- online form of harassment
- acceptable way of communicating online
- someone who is unknown to you
- your or someone else's personal information
- having permission to use someone else's work or image or some kind
- the rules of being online
15 Clues: being safe online • online form of harassment • your trail of data online • the rules of being online • used to protect information • someone who is unknown to you • only acceptable in very few situations • acceptable way of communicating online • the stuff that is looked up or researched • your or someone else's personal information • ...
tut-4 2018-09-10
Across
- cloud supply chain managment
- A commercial building for storage of goods.
- An exploting weakness of mobile devices
- Producter of goods and items
- Protect your networks against external and internal attack.
- most used OS of moblie system
- That allows systems and services to be easily accessible to the general public.
Down
- A template of sample secrity policies
- Online security firm
- Widely used mobile standard
- Mixture of public and private cloud.
- Final stage of SCM
- The tasks can be performed on-site or off-site.
- India ranks in terms of the highest number of internet users in the world
- Organized hacking
15 Clues: Organized hacking • Final stage of SCM • Online security firm • Widely used mobile standard • cloud supply chain managment • Producter of goods and items • most used OS of moblie system • Mixture of public and private cloud. • A template of sample secrity policies • An exploting weakness of mobile devices • A commercial building for storage of goods. • ...
Emma Gunter Muscle Fiber Crossword 2024-01-17
Across
- converts glucose to pyruvic acid
- use anaerobic glycolysis to contract quickly
- powerhouse of the cell
- the compound that provides the body with energy
- use aerobic respiration to contract slowly
- when muscle tissue disintegrates from disuse
- use aerobic respiration to contract quickly
- when structural proteins are added to muscle fibers
- muscles that are involuntary and line organs
Down
- formation of new capillary networks around a muscle fiber
- muscles that are trainable
- age related muscle atrophy
- a native compound that people take supplements for; legal but sketchy
- causes soreness in muscles due to lactic acid buildup
- only found in the heart
15 Clues: powerhouse of the cell • only found in the heart • muscles that are trainable • age related muscle atrophy • converts glucose to pyruvic acid • use aerobic respiration to contract slowly • use aerobic respiration to contract quickly • use anaerobic glycolysis to contract quickly • when muscle tissue disintegrates from disuse • muscles that are involuntary and line organs • ...
Xact 2025-05-14
Across
- Common AI tool for natural language processing
- Product metric indicating user loyalty
- Cross-functional method in Agile for time-boxed delivery
- Role responsible for defining features and prioritizing
- Daily team meeting in Agile
- _______ learning – subset of AI based on neural networks
- AI + Agile = better _______ making
- Non-human conversational interface powered by AI
Down
- A meeting to reflect and improve after a sprint
- A key mindset in product management—build, measure, ______
- A prioritized list of work for the development team
- Key visual tool in Agile to track task progress
- Empirical process framework for product delivery
- Smallest testable product version in Agile
- Actionable insight derived from user behavior
- Framework of continuous product improvement
16 Clues: Daily team meeting in Agile • AI + Agile = better _______ making • Product metric indicating user loyalty • Smallest testable product version in Agile • Framework of continuous product improvement • Actionable insight derived from user behavior • Common AI tool for natural language processing • A meeting to reflect and improve after a sprint • ...
Xact 2025-05-14
Across
- Common AI tool for natural language processing
- Product metric indicating user loyalty
- Cross-functional method in Agile for time-boxed delivery
- Role responsible for defining features and prioritizing
- Daily team meeting in Agile
- _______ learning – subset of AI based on neural networks
- AI + Agile = better _______ making
- Non-human conversational interface powered by AI
Down
- A meeting to reflect and improve after a sprint
- A key mindset in product management—build, measure, ______
- A prioritized list of work for the development team
- Key visual tool in Agile to track task progress
- Empirical process framework for product delivery
- Smallest testable product version in Agile
- Actionable insight derived from user behavior
- Framework of continuous product improvement
16 Clues: Daily team meeting in Agile • AI + Agile = better _______ making • Product metric indicating user loyalty • Smallest testable product version in Agile • Framework of continuous product improvement • Actionable insight derived from user behavior • Common AI tool for natural language processing • A meeting to reflect and improve after a sprint • ...
cw1 2025-11-05
Across
- Technique to run multiple OS on a single machine
- Algorithm used in training neural networks
- Concurrent execution of multiple threads
- AI system inspired by human brain structure
- OOP feature allowing one interface, many forms
- CPU technique for parallel instruction execution
- Science of secure communication
Down
- Network security system monitoring traffic
- Database process reducing redundancy
- AI model learns training data too well
- Step-by-step procedure for solving a problem
- State where processes wait indefinitely for each other
- Process of securing data by converting it to code
- Program that converts code into machine language
- Software that creates and manages virtual machines
15 Clues: Science of secure communication • Database process reducing redundancy • AI model learns training data too well • Concurrent execution of multiple threads • Network security system monitoring traffic • Algorithm used in training neural networks • AI system inspired by human brain structure • Step-by-step procedure for solving a problem • ...
cw1 2025-11-05
Across
- Program that converts code into machine language
- Network security system monitoring traffic
- Process of securing data by converting it to code
- Step-by-step procedure for solving a problem
- State where processes wait indefinitely for each other
- Algorithm used in training neural networks
- Technique to run multiple OS on a single machine
- Science of secure communication
- Concurrent execution of multiple threads
Down
- AI system inspired by human brain structure
- Software that creates and manages virtual machines
- Database process reducing redundancy
- CPU technique for parallel instruction execution
- OOP feature allowing one interface, many forms
- AI model learns training data too well
15 Clues: Science of secure communication • Database process reducing redundancy • AI model learns training data too well • Concurrent execution of multiple threads • Network security system monitoring traffic • Algorithm used in training neural networks • AI system inspired by human brain structure • Step-by-step procedure for solving a problem • ...
NETWORK 2026-03-04
Across
- Process of verifying user identity
- Process of removing headers from received data
- Communication using radio signals instead of cables
- Process of converting domain names into IP addresses
- Physical path that carries network signals
- Process of adding protocol headers to data
- Hardware component enabling network connectivity
- Technology used for wired local networks
- Process of determining the best path for packets
Down
- Service that stores websites on a server
- DNS server that holds official domain records
- Human-readable address used instead of IP numbers
- Collection of related web pages under one domain
- Single HTML document on the web
- Highest level domain such as com org or net
15 Clues: Single HTML document on the web • Process of verifying user identity • Service that stores websites on a server • Technology used for wired local networks • Physical path that carries network signals • Process of adding protocol headers to data • Highest level domain such as com org or net • DNS server that holds official domain records • ...
AIML 2026-04-03
Across
- What machines do from data.
- the future based on past data.
- that can think and learn like humans.
- A system trained using data to make predictions.
- that helps computers “see” images.
- AI that understands spoken words.
- to brain-like networks in AI.
Down
- Data given to a computer.
- instructions to solve a problem.
- collected for learning or analysis.
- a machine using data.
- that can think and act intelligently.
- machine that can do tasks automatically.
- written for a computer.
- program that talks with humans (like me!).
15 Clues: a machine using data. • written for a computer. • Data given to a computer. • What machines do from data. • to brain-like networks in AI. • the future based on past data. • instructions to solve a problem. • AI that understands spoken words. • that helps computers “see” images. • collected for learning or analysis. • that can think and learn like humans. • ...
Internetworking Tech 1 Review 2026-01-07
Across
- A device that connects multiple devices in a computer network, acting as a gatekeeper to either complete a connection or break it.
- A device used by people to send or receive data on a network, such as computers, phones, printers, and servers.
- A network that connects devices in a small geographic area, such as a classroom, school, or building.
- A device that connects end devices and directs data across the network, such as routers, switches, and wireless access points.
- A worldwide network that connects millions of smaller networks and allows global communication.
- A computer that provides services, data, or resources (such as files or websites) to other computers on a network.
- A diagram that shows how data flows through a network, regardless of physical connections.
Down
- A device that requests and uses services or resources provided by a server.
- A diagram that shows how devices are physically connected with cables and hardware.
- The physical or wireless path that data travels through, such as Ethernet cables, fiber-optic cables, or radio waves.
- A connection point on a network device that sends and receives data; it can be physical (Ethernet port) or logical (software-based).
- A network that connects LANs over large geographic distances, such as cities or countries.
- A network designed to continue working even if one or more components fail.
- A networking device that connects multiple computer networks, such as your home's local area network (LAN) to the internet
14 Clues: A device that requests and uses services or resources provided by a server. • A network designed to continue working even if one or more components fail. • A diagram that shows how devices are physically connected with cables and hardware. • A network that connects LANs over large geographic distances, such as cities or countries. • ...
vocabulary 2022-11-15
Across
- brain of a computer
- a device used to input and output information into the computer
- a small device that plugs into the USB port on your computer
- wide area network, private or public network
- intellectual property
- store the short term data
- the act of copying other people's works or words ,and publish as your own work
- storage device
- allows copying for limited purpose
Down
- identify parts of a large program or construction
- rules of the internet communication
- a security system that control the networks
- Local area network, private network
- uses to connect the computer peripheral
- able to let you save files in your computer
- protect the network
- brings virus into your computer
- junk mail
18 Clues: junk mail • storage device • brain of a computer • protect the network • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
vocabulary 2022-11-15
Across
- brain of a computer
- a device used to input and output information into the computer
- a small device that plugs into the USB port on your computer
- wide area network, private or public network
- intellectual property
- store the short term data
- the act of copying other people's works or words ,and publish as your own work
- storage device
- allows copying for limited purpose
Down
- identify parts of a large program or construction
- rules of the internet communication
- a security system that control the networks
- Local area network, private network
- uses to connect the computer peripheral
- able to let you save files in your computer
- protect the network
- brings virus into your computer
- junk mail
18 Clues: junk mail • storage device • brain of a computer • protect the network • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
computer vocabulary 2022-11-22
Across
- a security system that control the networks
- intellectual property
- uses to connect the computer peripheral
- allows copying for limited purpose
- identify parts of a large program or construction
- brain of a computer
- a device used to input and output information into the computer
- wide area network, private or public network
- storage device
Down
- protect the network
- a small device that plugs into the USB port on your computer
- rules of the internet communication
- brings virus into your computer
- junk mail
- Local area network, private network
- the act of copying other people's works or words ,and publish as your own work
- store the short term data
- able to let you save files in your computer
18 Clues: junk mail • storage device • protect the network • brain of a computer • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
computer vocabulary 2022-11-22
Across
- a security system that control the networks
- intellectual property
- uses to connect the computer peripheral
- allows copying for limited purpose
- identify parts of a large program or construction
- brain of a computer
- a device used to input and output information into the computer
- wide area network, private or public network
- storage device
Down
- protect the network
- a small device that plugs into the USB port on your computer
- rules of the internet communication
- brings virus into your computer
- junk mail
- Local area network, private network
- the act of copying other people's works or words ,and publish as your own work
- store the short term data
- able to let you save files in your computer
18 Clues: junk mail • storage device • protect the network • brain of a computer • intellectual property • store the short term data • brings virus into your computer • allows copying for limited purpose • rules of the internet communication • Local area network, private network • uses to connect the computer peripheral • a security system that control the networks • ...
Digital Literacy 2025-10-29
Across
- The software that runs a computer
- Computer thinking
- External devices(mouse,printer,headset)
- fake emails or texts to share data
- Random Access Memory, a type of processing computer memory
- Behaving responsibly and ethically online
- Result
- A software application used to access and navigate the internet
- Locks files until ransom is paid
Down
- Software designed to harm devices or steal info
- The practice of protecting computer systems and networks from theft, damage, or unauthorized access
- Programs that tell hardware what to do
- Working with others in a digital environment
- The trail of data a person leaves behind
- Data entered
- Physical parts of the computer
- unauthorized access to private data
- Unsolicited bulk electronic messages
18 Clues: Result • Data entered • Computer thinking • Physical parts of the computer • Locks files until ransom is paid • The software that runs a computer • fake emails or texts to share data • unauthorized access to private data • Unsolicited bulk electronic messages • Programs that tell hardware what to do • External devices(mouse,printer,headset) • ...
Computer 2017-12-08
Across
- A small text file created by a website.
- The address that defines the route to a file on an Internet server.
- A series of instructions that performs a particular task.
- Machinery and equipment.
- Not enough staff or time.
- display element of an electronic screen.
Down
- store data locally.
- The computing part of the computer.
- Large network made up of smaller networks.
- To write and post an entry.
- Inhouse website that serves employees only.
- A scam to steal valuable information.
- Computer secure from intruders.
- The most widely used hardware interface for attaching peripherals to a computer.
- An organization that provides access to the Internet.
15 Clues: store data locally. • Machinery and equipment. • Not enough staff or time. • To write and post an entry. • Computer secure from intruders. • The computing part of the computer. • A scam to steal valuable information. • A small text file created by a website. • display element of an electronic screen. • Large network made up of smaller networks. • ...
TWJ - chapter 5 - lesson 1 2022-06-05
Across
- WA became part of the (blank) in the year 1883
- owned rail lines plus railcars and 44 million acres of land
- built by the great northern railroad company
- *had enough money
- *contribution of money
- the amount of acres Hill sold his neighbor for $5.4 million
- railroads provided (blank) networks
- made trade with foreign countries easier
Down
- James Hill's neighbor
- companies encouraged (blank) from Europe and Asia
- *share in a company
- Steven shared the surveying duties with (blank)
- Washington's first territorial governor
- the individual most responsible for the northern specific
- pacific railroad survey authorized exploration of potential (blank) railroad
15 Clues: *had enough money • *share in a company • James Hill's neighbor • *contribution of money • railroads provided (blank) networks • Washington's first territorial governor • made trade with foreign countries easier • built by the great northern railroad company • WA became part of the (blank) in the year 1883 • Steven shared the surveying duties with (blank) • ...
TWJ - chapter 5 - lesson 2 2022-06-05
Across
- the individual most responsible for the northern specific
- built by the great northern railroad company
- Steven shared the surveying duties with (blank)
- pacific railroad survey authorized exploration of potential (blank) railroad
- *share in a company
- James Hill's neighbor
- owned rail lines plus railcars and 44 million acres of land
Down
- WA became part of the (blank) in the year 1883
- the amount of acres Hill sold his neighbor for $5.4 million
- railroads provided (blank) networks
- made trade with foreign countries easier
- companies encouraged (blank) from Europe and Asia
- Washington's first territorial governor
- *contribution of money
- *had enough money
15 Clues: *had enough money • *share in a company • James Hill's neighbor • *contribution of money • railroads provided (blank) networks • Washington's first territorial governor • made trade with foreign countries easier • built by the great northern railroad company • WA became part of the (blank) in the year 1883 • Steven shared the surveying duties with (blank) • ...
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
Review of Internet & Domain Names 2012-11-12
Across
- traffic jam at router (begins w/a "B")
- Small packages or bits of information are called this
- Address or URL of a website (begins w/a "d")
- A device that forwards information over the internet
- Government URL website
Down
- Military URL website
- Business URL website
- Worldwide network made up of smaller networks connected together
- non-profit URL website
- Button in photostory we used to record our voice
10 Clues: Military URL website • Business URL website • non-profit URL website • Government URL website • traffic jam at router (begins w/a "B") • Address or URL of a website (begins w/a "d") • Button in photostory we used to record our voice • A device that forwards information over the internet • Small packages or bits of information are called this • ...
Spelling Test B October 31 2014-10-30
Across
- software detects viruses
- using computer unrelated to the job
- protects computers from power surges
Down
- appears as pop-up ad box
- prevents unauthorized access to computers or networks
- encoding so only authorized individuals can view
- using personal information about someone else
- sending e-mail to lure users into revealing personal information
- gathers information on computer about you without your knowledge
- travels between systems through a network to spread infections
10 Clues: appears as pop-up ad box • software detects viruses • using computer unrelated to the job • protects computers from power surges • using personal information about someone else • encoding so only authorized individuals can view • prevents unauthorized access to computers or networks • travels between systems through a network to spread infections • ...
