networks Crossword Puzzles
Transformers 2024-12-08
Across
- encoding***Adds positional information to input embeddings
- heads***Multiple attention mechanisms in parallel
- output sequence
- input sequence
- layer***Maps input tokens to dense vectors
Down
- for weighting input tokens
- network***Neural network layer applied to each token independently
- layers***Stacked layers of self-attention and feed-forward networks
- dot-product attention***Common attention mechanism in transformers
- key, value***Components of self-attention mechanism
10 Clues: input sequence • output sequence • for weighting input tokens • layer***Maps input tokens to dense vectors • heads***Multiple attention mechanisms in parallel • key, value***Components of self-attention mechanism • encoding***Adds positional information to input embeddings • network***Neural network layer applied to each token independently • ...
5G Technology 2025-10-14
Across
- What is the main frequency range used in 5G?
- What type of network connects 5G base stations?
- Which layer of OSI handles transmission?
- What enables ultra-fast downloads?
- What network architecture does 5G use?
Down
- What technology supports faster switching?
- What type of cells are used in 5G networks?
- What generation of mobile network is 5G?
- What replaces cables in 5G transmission?
- What device connects users to the 5G network?
10 Clues: What enables ultra-fast downloads? • What network architecture does 5G use? • What generation of mobile network is 5G? • Which layer of OSI handles transmission? • What replaces cables in 5G transmission? • What technology supports faster switching? • What type of cells are used in 5G networks? • What is the main frequency range used in 5G? • ...
Network Components 2022-10-27
Across
- A computer that sits between different networks or applications
- a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
- Connects devices in a network to each other, and allows them to 'talk' by exchanging data packets.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- A class of network device that's designed to connect networks at OSI Level 2.
Down
- a combination transmitter/receiver in a single package.
- A device used at the customer premises to terminate a dial-up Integrated Services Digital Network (ISDN) line and connect it to a computer or a local area network (LAN).
- Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.
8 Clues: a combination transmitter/receiver in a single package. • A computer that sits between different networks or applications • A class of network device that's designed to connect networks at OSI Level 2. • Connects devices in a network to each other, and allows them to 'talk' by exchanging data packets. • ...
Cybersecurity Fundamentals Chapter 1 2024-06-02
Across
- Identifies and explains various cybersecurity threats that affect individuals, businesses, and organizations. It covers the nature of these threats and their potential impact .
- Involves the collaboration between businesses, government agencies, and countries to share information about serious cyberattacks.
- Professionals dedicated to protecting information systems and networks from cyber threats.
- refers to the broad scope of cybersecurity, which includes understanding the history and evolution of hacking, the role of cyber criminals, and the ongoing need for cybersecurity professionals to protect data and systems .
- The various areas within cybersecurity, such as big data, data analytics, and the responsibilities of businesses to protect data.
Down
- Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals.
- Individuals or groups who use computers, networks, and the internet to commit illegal activities.
- The frameworks and guidelines, such as the ISO 27000 series, that help organizations implement effective cybersecurity measures.
8 Clues: Professionals dedicated to protecting information systems and networks from cyber threats. • Individuals or groups who use computers, networks, and the internet to commit illegal activities. • Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals. • ...
Cyber Security 1 2023-04-23
Across
- Manipulative tactics used by cybercriminals to trick people into divulging sensitive information or performing actions that compromise security.
- The part of the internet not indexed by search engines and accessible only through special software, often associated with illegal activities.
- An incident in which unauthorized individuals gain access to sensitive, protected, or confidential data.
- An additional layer of security that requires a user to provide two separate pieces of evidence for authentication.
- The process of converting data into a code to prevent unauthorized access.
- A trial-and-error method used by attackers to gain access to an account or system by systematically guessing passwords or encryption keys.
- A string of characters used to authenticate a user's identity and grant access to a computer system or account.
Down
- Malicious software designed to infiltrate or damage computer systems, networks, or devices.
- A virtual private network that extends a private network across a public network, allowing users to send and receive data securely and anonymously.
- A type of malicious software that encrypts a victim's files and demands payment for their release.
- The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
- A piece of information used to decrypt or encrypt data, ensuring its confidentiality and integrity.
- A network of compromised computers remotely controlled by a cybercriminal to perform tasks such as launching attacks or sending spam emails.
- A security system that controls incoming and outgoing network traffic based on predetermined rules.
- A cyber attack that attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.
15 Clues: The process of converting data into a code to prevent unauthorized access. • Malicious software designed to infiltrate or damage computer systems, networks, or devices. • A type of malicious software that encrypts a victim's files and demands payment for their release. • ...
Networking devices 2025-03-15
Across
- A device that converts digital signals from a computer into analog signals for transmission over telephone lines or other communication channels.
- Short for Virtual Local Area Network, a logically separate network created within a physical LAN.
- A node or device that serves as an entrance point between two different networks, often translating between protocols.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Short for Wide Area Network, a telecommunications network that spans a large geographic area, connecting multiple LANs.
- A device that connects two separate network segments and forwards data between them based on MAC addresses.
- A device that connects multiple networks and directs data packets to their intended destinations.
- A networking device that manages data flow within a local area network (LAN) by connecting devices together.
Down
- A device used to regenerate signals in order to extend the range of a network connection.
- Short for Local Area Network, a group of computers and devices connected within a limited geographical area.
- A hardware component that enables a computer or device to connect to a network, such as a USB Ethernet adapter.
- Point A wireless networking hardware device that allows Wi-Fi devices to connect to a wired network.
- A server or software application that acts as an intermediary between a client and other servers, providing privacy and caching benefits.
- Stands for Domain Name System, a service that translates human-readable domain names into IP addresses.
- A simple networking device that broadcasts data received from one port to all other ports without filtering or managing the traffic.
15 Clues: A device used to regenerate signals in order to extend the range of a network connection. • Short for Virtual Local Area Network, a logically separate network created within a physical LAN. • A device that connects multiple networks and directs data packets to their intended destinations. • ...
Technology Crossword 2015-02-01
Across
- means memory
- joins two networks together
- Printed circuit board
- what your computer runs on
- What you are using
- allows you to browse the web
- a person who uses computers to gain unauthorised access to data.
- Drive- An optical disc drive that reads and writes all common CD and DVD formats.
Down
- abbreviation for the word Operating System.
- a device used for browsing
- has two buttons and a scroll bar
- numbering system with two unique numbers
- Carries out all the work inside the computer
- allows you to connect to the internet
- Card- is an electronic device that connects a computer to a computer network
- Drive- A data storage device
16 Clues: means memory • What you are using • Printed circuit board • a device used for browsing • what your computer runs on • joins two networks together • allows you to browse the web • Drive- A data storage device • has two buttons and a scroll bar • allows you to connect to the internet • numbering system with two unique numbers • abbreviation for the word Operating System. • ...
NETWORKING CONCEPS PUZZLE 2025-06-07
Across
- Short form of" Local Area Network".
- Common example of WAN.
- Each computers in a network.
- Something similar to Hub.
- Topology where all nodes are connected in a circular manner.
- Short form of 'Wide Area Network".
- Topology that connects devices to central hub or switch.
- Topology that can handle large volume of data traffic.
Down
- Computer network enables two or more computers to share.
- It is the network larger than LAN.
- Topology that requires a single communication line or one main cable.
- Network card used most commonly.
- An address format for communication.
- A computer network created for an individual.
- Network Topologies are categorised into how many types ?
- It connects two different networks.
16 Clues: Common example of WAN. • Something similar to Hub. • Each computers in a network. • Network card used most commonly. • It is the network larger than LAN. • Short form of 'Wide Area Network". • Short form of" Local Area Network". • It connects two different networks. • An address format for communication. • A computer network created for an individual. • ...
Wireless Network 2021-03-02
Across
- Unique number for identifying a device on a mobile network.
- Invisible radio frequencies that wireless signals travel over.
Down
- Describe the protocols for 2G digital cellular networks used by mobile devices.
- digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM.
- Channel access method for shared-medium networks which share the same frequency channel by dividing the signal into different time slots.
5 Clues: Unique number for identifying a device on a mobile network. • Invisible radio frequencies that wireless signals travel over. • Describe the protocols for 2G digital cellular networks used by mobile devices. • digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM. • ...
The Global Network 2024-04-25
6 Clues: President,electons • internet,cellphones,networks • vacations,tourists,travelers • Bollywood,Costumes,McDonald's • the connection of different parts of the world. • a trade route between China and the Mediterranean.
networks 2019-05-17
Emerging Tech Vocab 2023-10-10
Across
- a duplicate of content on a storage medium
- Wireless communication technology
- a series of related instructions
- device, I small device designed to be worn
- sometimes called a host computer
- media, a computer that keeps data,
- creates images using a laser beam
- device, stores data and instructions
- device, allows component you to enter data
Down
- console, A mobile device designed for video games
- Camera, A mobile device to take pictures
- Software that enables a user's connection.
- device, allows you to get results
- tells the computer what tasks to perform.
- A collection of computers
- Process of matching the files on computers
- store instructions waiting to be executed
- drive, Term used to refer collectively to hard disks
- a worldwide collection of computer networks
- program designed to make users more productive.
20 Clues: A collection of computers • a series of related instructions • sometimes called a host computer • Wireless communication technology • device, allows you to get results • creates images using a laser beam • media, a computer that keeps data, • device, stores data and instructions • Camera, A mobile device to take pictures • tells the computer what tasks to perform. • ...
society of Indus 2025-10-15
Across
- urban structure a grid layout with streets intersecting at right angles, standardized brick sizes, and advanced sanitation systems with private and public drains
- supported a large rural population and fed the urban centers
Down
- cities highly organized, grid-patterned cities
- drainage systems covered drains, private toilets, and engineered sewer networks in cities like Mohenjo-daro and Harappa
- management sophisticated sanitation, elaborate drainage networks, and water storage solutions like wells and reservoirs
5 Clues: cities highly organized, grid-patterned cities • supported a large rural population and fed the urban centers • drainage systems covered drains, private toilets, and engineered sewer networks in cities like Mohenjo-daro and Harappa • management sophisticated sanitation, elaborate drainage networks, and water storage solutions like wells and reservoirs • ...
Brain Drain 2021-10-20
6 Clues: People with a job • connection in the world • workers who form a group • parents learn it to child • you must have it to travel • countries connected with ?
Vocabulary Lesson 2 Jenifer S 2017-03-02
Across
- software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
- is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- a unit of information equal to one billion (109) or, strictly, 230 bits.
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
- is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. ... In computer literature, kilobyte is usually abbreviated as K or KB.
- the way in which something is arranged or set out.
- a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- Basis point refers to a common unit of measure for interest rates and other percentages in finance.
- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- Is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- the introductory page of a website, typically serving as a table of contents for the site.
- abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- The Internet's system for converting alphabetic names into numeric IP addresses.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Down
- a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
- The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- Java was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network
- to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.
- is an input device that scans documents and images, which can be imported into a computer
- a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
- dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- a person who uses computers to gain unauthorized access to data.
24 Clues: the way in which something is arranged or set out. • a person who uses computers to gain unauthorized access to data. • a unit of information equal to one billion (109) or, strictly, 230 bits. • The Internet's system for converting alphabetic names into numeric IP addresses. • ...
glossary of terms 2019-09-26
Across
- the address of a web page
- word,phrase or image that can link you to another page or document
- using search engine to search for information
- electronic mail
Down
- virtual computer world in which communication over computer networks occurs
- a program on your computer that allows you to visit websites
- wireless connection
- electronic junk mail or posting
- universal resource locator
9 Clues: electronic mail • wireless connection • the address of a web page • universal resource locator • electronic junk mail or posting • using search engine to search for information • a program on your computer that allows you to visit websites • word,phrase or image that can link you to another page or document • ...
Introduction to 4G 2024-11-19
Across
- Simplified network architecture in LTE
- Component responsible for policy and charging control in EPC
- Gateway forwarding data between base stations and PDN
- Entity managing high-level mobile operations in EPC.
Down
- Card running the USIM application in LTE devices
- Wireless broadband technology succeeding 3G
- Key modulation technique for efficient spectrum use in LTE
- EPC gateway communicating with external networks
- LTE base station acronym
9 Clues: LTE base station acronym • Simplified network architecture in LTE • Wireless broadband technology succeeding 3G • Card running the USIM application in LTE devices • EPC gateway communicating with external networks • Entity managing high-level mobile operations in EPC. • Gateway forwarding data between base stations and PDN • ...
healthcare 2025-06-13
Across
- – Computer ______ helps detect tumors from scans
- – AI helps decode activity in this central organ
- – Networks that mimic brain structure
- – Basic tool AI uses in diagnostics
Down
- – AI can assist in transplant matching of this
- – Used in precision surgeries
- – CT and MRI are examples of these AI-enhanced diagnostics
- – Attached to skin to record body signals
- – AI is used in personalized physical ______ therapy
9 Clues: – Used in precision surgeries • – Basic tool AI uses in diagnostics • – Networks that mimic brain structure • – Attached to skin to record body signals • – AI can assist in transplant matching of this • – Computer ______ helps detect tumors from scans • – AI helps decode activity in this central organ • – AI is used in personalized physical ______ therapy • ...
Industrial Revolution 2019-02-17
7 Clues: productive work • networks of iron rails • artifact by weaving synthetic fibers • communicating by transmitting signals • a system in which society controls production • increase in percentage of people living in urban areas • a branch of socialism that emphasizes exploitation of class
Linux 2024-01-23
7 Clues: used to input command lines • Linux-based operating system • able to be modified by the user • distributes products and software • how users communicate with a computer • has word processing and spreadsheet programs • allows Linux computers to connect to networks
Networks 2019-05-17
luis castillo 2013-03-26
Across
- ENGINE Software that searches and gathers information.
- To bully online.
- Software program that is made to damage files on a computer.
- a global network.
- NETWORKS online thing were people communicate.
Down
- reload a webpage on the internet.
- a person who gains access to computer files.
- to copy someones word.
- A website that can be edited by anyone with access it.
9 Clues: To bully online. • a global network. • to copy someones word. • reload a webpage on the internet. • a person who gains access to computer files. • NETWORKS online thing were people communicate. • ENGINE Software that searches and gathers information. • A website that can be edited by anyone with access it. • Software program that is made to damage files on a computer.
Networking (Ans) 2025-08-01
Across
- Directs traffic between networks
- Table tennis is also called ____-pong
- The energy or mental capacity required to deal with a situation
Down
- A harbour
- A structure carrying a road over obstacle
- "Light ______" by Charlie Puth
- The number of layers in the OSI Model
- A network device that monitors and filters network traffic
- The effective centre of an activity, region, or network
9 Clues: A harbour • "Light ______" by Charlie Puth • Directs traffic between networks • The number of layers in the OSI Model • Table tennis is also called ____-pong • A structure carrying a road over obstacle • The effective centre of an activity, region, or network • A network device that monitors and filters network traffic • ...
Network Components 2022-10-27
Across
- a device used at the customer premises to terminate a dial-up Integrated Services Digital Network line and connect it to a computer or a local area network
- a transmitter and a receiver of signals, such as analog or digital
- a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
- a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals
- is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- networking devices that connect networks
- a network node used in telecommunications that connects two networks with different transmission protocols together
- a hardware component responsible for relaying data from a computer network to the destination endpoint
8 Clues: networking devices that connect networks • a transmitter and a receiver of signals, such as analog or digital • a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals • a hardware component responsible for relaying data from a computer network to the destination endpoint • ...
Quiz 1 Review 2023-09-29
Across
- Information that can be used to identify you.
- A collection of web pages.
- A world wide network.
- Information that cannot be used to identify who you are.
- Software used to view web pages.
- Two or more connected computers.
- A tool used to preform a task.
Down
- All the information about a person that exists on the internet.
- A central computer that serves computers on a network.
- An engine is a software program, that helps users to find information.
- A collection of public websites.
- Internet Service Provider.
- First sent in 1971 by Ray Tomlinson.
- A hypertext document.
- All the activities preformed using the internet.
- Connects two or more networks.
16 Clues: A world wide network. • A hypertext document. • A collection of web pages. • Internet Service Provider. • Connects two or more networks. • A tool used to preform a task. • A collection of public websites. • Software used to view web pages. • Two or more connected computers. • First sent in 1971 by Ray Tomlinson. • Information that can be used to identify you. • ...
Name and Fibers 2021-09-29
Across
- An animal that is used for its fibers
- something that can be turned into a thread
- the plant used to make most clothes and blanket
- The act of moving something from one place to another
- A natural fiber produced from goats
- The animals that produce cashmere
- A species of Flowering plant
- A object that is used to collect fibers
Down
- something made to intimate something natural
- the fiber produced by sheeps
- The fiber made from the thick skin of a coconut
- A naturally occurring fibrous silicate metal
- The Person that created this
- A fiber made from intertwining networks or yarn and thread
- A cloth obtained from SlikWorms
- Something not man made
16 Clues: Something not man made • the fiber produced by sheeps • The Person that created this • A species of Flowering plant • A cloth obtained from SlikWorms • The animals that produce cashmere • A natural fiber produced from goats • An animal that is used for its fibers • A object that is used to collect fibers • something that can be turned into a thread • ...
Computational linguistics 2024-09-25
Across
- The technology driving modern machine translation
- Large datasets that help improve AI and translation.
- Advanced translation method using AI and deep learning.
- Machine learning technique involving neural networks.
- Short form of neural machine translation.
- Adapting a product to meet language and cultural standards.
- Company that provided AI translation at Boao Forum.
- Widely used CAT software.
- Popular online translation tool.
Down
- Forum where AI-based simultaneous interpretation was showcased.
- Connected devices communicating over the internet.
- AI’s ability to learn from data to improve performance.
- Database of previous translations used to assist translators.
- Computing services that support machine translation.
- Abbreviation for computer-assisted translation.
- Google’s neural machine translation system.
16 Clues: Widely used CAT software. • Popular online translation tool. • Short form of neural machine translation. • Google’s neural machine translation system. • Abbreviation for computer-assisted translation. • The technology driving modern machine translation • Connected devices communicating over the internet. • Company that provided AI translation at Boao Forum. • ...
Trade and Transport 2017-05-23
7 Clues: travels on water • carries cargo and other goods • exchange of goods and services • items manufactured in factories • used to transport goods internationally • Goods used that cannot be seen e.g. mobile networks • raw materials used to manufacture goods or services
Muscle Fibers 2024-01-17
7 Clues: only in the heart • causes soreness in muscles • age related muscle atrophy • muscles that are trainable • muscles that are involuntary and line organs • a native compound that people take supplements of • formation of new capillary networks around a muscle fib
Sport and Media 2 2025-04-09
Across
- the gap between those with access to new technologies and those without
- media executives, editors, or reporters who can open or close the “gate” on a particular news story
- the social networks and the reciprocal norms associated with these networks that encourage people to do things for each other
Down
- an argument that the media sets the boundaries of public debate by deciding which issues will receive coverage and which will not
- respected individuals in the community
- a belief that as more people accept common opinions the people who disagree are less likely to voice their views
- a theory that states as new information enters society, wealthy and better-educated members acquire it at a faster that poor and less-educated people
7 Clues: respected individuals in the community • the gap between those with access to new technologies and those without • media executives, editors, or reporters who can open or close the “gate” on a particular news story • a belief that as more people accept common opinions the people who disagree are less likely to voice their views • ...
HSS1101 Crossword 1 2020-09-02
Across
- dimension of health that involves the body
- positive forces that contribute to resiliency
- a benefit of achieving optimal health
- the health that thinks of you
- a predisposing factor that can influence behaviour change
- when you achieve higher levels in each dimension of health
- most common emotional disorder in Canada
- model
- purposely stopping negative thoughts
- dimension of health that involves your job
Down
- traits that protect from threat or harm
- dimension of health that includes social networks
- sense of respect
- this type of prevention includes treatment and rehabilitation
- the first stage of change in the
- careful observation of others
- belief in ability (personal control)
- the health that looks at inner well-being
- this type of prevention stops health problems before they start
19 Clues: model • sense of respect • the health that thinks of you • careful observation of others • the first stage of change in the • belief in ability (personal control) • purposely stopping negative thoughts • a benefit of achieving optimal health • traits that protect from threat or harm • most common emotional disorder in Canada • the health that looks at inner well-being • ...
Computing Support Vocabulary 2 2022-04-09
Across
- data and programs stored on the internet
- main 'brain' of a computer
- a personal, digital address
- click and drag across text to manipulate it
- a network of computer networks
- a document on the internet
- the home screen of the computer
Down
- hide a window from view
- software program used to view websites
- an image used to represent a file or program
- the visuals of texts, graphics and tables
- storage device outside the computer
- central wheel of the mouse for page functions
- data generated by the computer
- data entered into a computer
- position of the mouse pointer over top an icon
- collection of computers that are connected
- a list of options available in a software program
- to point and choose an object on a computer screen
19 Clues: hide a window from view • main 'brain' of a computer • a document on the internet • a personal, digital address • data entered into a computer • data generated by the computer • a network of computer networks • the home screen of the computer • storage device outside the computer • software program used to view websites • data and programs stored on the internet • ...
FAI Crossword 2025-04-28
Across
- Platform hosting pre-trained AI models
- Company behind ChatGPT and DALL-E
- AI program designed for conversation
- Computing system modeled after the brain
- Input given to an AI model
- Field where AI interprets visual data
- Field of study that gives computers the ability to learn
Down
- Subfield of machine learning with neural networks
- AI tool for generating artistic images
- AI system like Siri or Alexa
- Using AI to perform tasks without human help
- Google's open-source machine learning framework
- AI model that creates images from text prompts
- Company behind Stable Diffusion
- Deep learning library by Meta
- OpenAI's powerful language model
- GitHub's AI tool that suggests code
- Google's AI chatbot rival to ChatGPT
- Acronym for large language model
19 Clues: Input given to an AI model • AI system like Siri or Alexa • Deep learning library by Meta • Company behind Stable Diffusion • OpenAI's powerful language model • Acronym for large language model • Company behind ChatGPT and DALL-E • GitHub's AI tool that suggests code • AI program designed for conversation • Google's AI chatbot rival to ChatGPT • ...
TEST 1 2022-02-10
Across
- A security benefit that verifies data is unmodified and therefore original, complete and intact.
- Anything that is used in and is necessary to the completion of a business task.
- An attack focusing on people rather than technology. This type of attack is psychological and aims to either gain access to information or to a logical or physical environment.
Down
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Software that automatically displays or downloads material when a user is offline.
- A social engineering attack that attempts to collect information from victims. This attacks can take place over e-mail, text messages, through social networks or via smart phone apps.
- An error or mistake in software coding or hardware design or construction
- A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.
8 Clues: An error or mistake in software coding or hardware design or construction • Anything that is used in and is necessary to the completion of a business task. • Software that automatically displays or downloads material when a user is offline. • An internet traffic filter meant to stop unauthorized incoming and outgoing traffic. • ...
Network Components 2022-10-27
Across
- A computer that sits between different networks or applications
- a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
- Connects devices in a network to each other, and allows them to 'talk' by exchanging data packets.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- A class of network device that's designed to connect networks at OSI Level 2.
Down
- a combination transmitter/receiver in a single package.
- A device used at the customer premises to terminate a dial-up Integrated Services Digital Network (ISDN) line and connect it to a computer or a local area network (LAN).
- Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.
8 Clues: a combination transmitter/receiver in a single package. • A computer that sits between different networks or applications • A class of network device that's designed to connect networks at OSI Level 2. • Connects devices in a network to each other, and allows them to 'talk' by exchanging data packets. • ...
Data Privacy! 2017-01-23
Across
- Some stores and other locations use this to track movements while you are within range.
- Criminal activities carried out by means of computers or the Internet.
- The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
- Unsolicited commercial e-mail.
- Series of words used as a password
- The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
- Any person other than - (a) the data subject, (b) the data controller, or (c) any data processor or other person authorised to process data for the data controller or processor.
- A small text file stored on a client machine that may later be retrieved by a web server from the machine.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
- Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
- Information collected and maintained by a government entity and available to the general public.
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
- The conversion of digital information into a format unreadable to anyone except those possessing a “key”
- Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
15 Clues: Unsolicited commercial e-mail. • Series of words used as a password • Criminal activities carried out by means of computers or the Internet. • May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out) • Some stores and other locations use this to track movements while you are within range. • ...
Dewey's Tech Review 2022-12-05
Across
- a simulated experience that employs pose tracking and 3D near-eye displays to give the user an immersive feel of a virtual world
- a string of characters that allows access to a computer system or service
- methods, systems, and devices which are the result of scientific knowledge being used for practical purposes.
- allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area
- a computer network that links devices within a building or group of adjacent buildings.
- software used by computers to mimic aspects of human intelligence
Down
- piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- type of security that protects the integrity of a computer network and the data within it.
- branch of technology that deals with the design, construction, operation, and application of robots branch of technology that deals with the design, construction, operation, and application of robots
- any hardware device used to send data from a computer to another device or user
- the type of security that deals with personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage.
- any kind of unwanted, unsolicited digital communication that gets sent out in bulk
- any hardware device that sends data to a computer, allowing you to interact with and control it.
- a computer network that spans a limited geographic area and interconnects multiple local area networks
- type of scan that is 20,000 times more accurate than a fingerprint
15 Clues: software used by computers to mimic aspects of human intelligence • type of scan that is 20,000 times more accurate than a fingerprint • a string of characters that allows access to a computer system or service • any hardware device used to send data from a computer to another device or user • ...
Computer Network Puzzle 2020-08-02
Across
- A company that gives people internet access.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
Down
- A device which controls access to separately stored files, as part of a multi-user system.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- group/system of interconnected people or things.
8 Clues: A company that gives people internet access. • group/system of interconnected people or things. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Computer Revision 2019-11-03
Across
- Networking device used to connect several computers together
- Network created using Bluetooth connection
- Memory that has hardware related instructions
- Computer connects all the computers in a network
- Network device that connects several computers together
- Oldest category of printers
- Memory that saves information as long as the computer is turned ON.
- group of connected computers
Down
- The brain of the computer
- Network established in a floor or a building
- Computers are divided into Software and
- Output device used to reproduce document on papers
- The main purpose of computer networks is to ...... information
- The most economical printer
- Printer that consumes too much ink
- Network extended to several buildings
16 Clues: The brain of the computer • The most economical printer • Oldest category of printers • group of connected computers • Printer that consumes too much ink • Network extended to several buildings • Computers are divided into Software and • Network created using Bluetooth connection • Network established in a floor or a building • Memory that has hardware related instructions • ...
Computer Revision 2019-11-03
Across
- Network device that connects several computers together
- The most economical printer
- Group of connected computers
- Network established in a floor or a building
- Computer connects all the computers in a network
- The main purpose of computer networks is to ...... information
- Computers are divided into Software and
Down
- Network created using Bluetooth connection
- Oldest category of printers
- Printer that consumes too much ink
- The brain of the computer
- Memory that saves information as long as the computer is turned ON.
- Output device used to reproduce document on papers
- Memory that has hardware related instructions
- Networking device used to connect several computers together
- Network extended to several buildings
16 Clues: The brain of the computer • Oldest category of printers • The most economical printer • Group of connected computers • Printer that consumes too much ink • Network extended to several buildings • Computers are divided into Software and • Network created using Bluetooth connection • Network established in a floor or a building • Memory that has hardware related instructions • ...
Data Privacy! 2017-01-23
Across
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- A small text file stored on a client machine that may later be retrieved by a web server from the machine.
- The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
- Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
- The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
- Any person other than - (a) the data subject, (b) the data controller, or (c) any data processor or other person authorised to process data for the data controller or processor.
- Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
- Unsolicited commercial e-mail.
- The conversion of digital information into a format unreadable to anyone except those possessing a “key”
Down
- Criminal activities carried out by means of computers or the Internet.
- Some stores and other locations use this to track movements while you are within range.
- Information collected and maintained by a government entity and available to the general public.
- May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- Series of words used as a password
15 Clues: Unsolicited commercial e-mail. • Series of words used as a password • Criminal activities carried out by means of computers or the Internet. • May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out) • Some stores and other locations use this to track movements while you are within range. • ...
bcs review by kayla murry 2015-11-11
Across
- websites with a fancy word in it
- Information that sends you to another website
- taking objects from the computer and turning it on paper
- a way to show more words in a row.
- and software that hooks up to the computer
- typing with out looking down
- anything that keeps comfort and privacy
- Information on computers
- Something that goes in a sentence
Down
- software that can be used to browse things.
- something that doesn't mix up the letters
- drives objects that save information on tiny objects
- typing with and without looking
- keys to show symbols and signs
- Pages that are on computers that can be viewed
- Things that makes words and sentences
16 Clues: Information on computers • typing with out looking down • keys to show symbols and signs • typing with and without looking • websites with a fancy word in it • Something that goes in a sentence • a way to show more words in a row. • Things that makes words and sentences • anything that keeps comfort and privacy • something that doesn't mix up the letters • ...
Quiz 1 Review 2023-09-29
Across
- Information that can be used to identify you.
- A collection of web pages.
- A world wide network.
- Information that cannot be used to identify who you are.
- Software used to view web pages.
- Two or more connected computers.
- A tool used to preform a task.
Down
- All the information about a person that exists on the internet.
- A central computer that serves computers on a network.
- An engine is a software program, that helps users to find information.
- A collection of public websites.
- Internet Service Provider.
- First sent in 1971 by Ray Tomlinson.
- A hypertext document.
- All the activities preformed using the internet.
- Connects two or more networks.
16 Clues: A world wide network. • A hypertext document. • A collection of web pages. • Internet Service Provider. • Connects two or more networks. • A tool used to preform a task. • A collection of public websites. • Software used to view web pages. • Two or more connected computers. • First sent in 1971 by Ray Tomlinson. • Information that can be used to identify you. • ...
IELTS Science & Tech Vocabulary 2025-09-03
Across
- A sudden and important discovery or development
- The investigation of outer space through tech
- A new method, idea, or product
- Highly advanced and innovative
- Based on or guided by data
- The most advanced or sophisticated version available
- The imitation of intelligent human behavior
- The period characterized by the internet
- The gap between those with and without technology
Down
- Technology dealing with robots
- Involving advanced technological development
- High levels of technological development
- The use of machines to perform tasks without human involvement
- A digital space used for interaction or services
- The practice of protecting systems and networks from attacks
- Easy to understand or use
16 Clues: Easy to understand or use • Based on or guided by data • Technology dealing with robots • A new method, idea, or product • Highly advanced and innovative • High levels of technological development • The period characterized by the internet • The imitation of intelligent human behavior • Involving advanced technological development • ...
Marketing & Technologies 2013-07-10
Across
- commerce conducted electronically
- Personalization of high volumes
- Bid for product and services over the internet
- global system of interconnected computer networks
- Anything related to computing technology
Down
- Efficient handling of information and resources within a commercial organization
- Electronic interpretation of information
- Company's interaction with customers
- Set of activities that control how materials and products move from the initial source to the end user
9 Clues: Personalization of high volumes • commerce conducted electronically • Company's interaction with customers • Electronic interpretation of information • Anything related to computing technology • Bid for product and services over the internet • global system of interconnected computer networks • ...
UNIT DETAILS 2023-09-26
Across
- Someone who conveys messages or information very well.
- A base for launching or supporting something.
- How is it connected to other things?
- Doing what's right based on strong values.
- To evaluate or determine the value or quality of something.
- Systems of interconnected things or people.
Down
- How does it work?
- Why is it like it is?
- The principles of right and wrong behavior.
9 Clues: How does it work? • Why is it like it is? • How is it connected to other things? • Doing what's right based on strong values. • The principles of right and wrong behavior. • Systems of interconnected things or people. • A base for launching or supporting something. • Someone who conveys messages or information very well. • ...
UNIT DETAILS 2023-09-26
Across
- Someone who conveys messages or information very well.
- A base for launching or supporting something.
- How is it connected to other things?
- Doing what's right based on strong values.
- To evaluate or determine the value or quality of something.
- Systems of interconnected things or people.
Down
- How does it work?
- Why is it like it is?
- The principles of right and wrong behavior.
9 Clues: How does it work? • Why is it like it is? • How is it connected to other things? • Doing what's right based on strong values. • The principles of right and wrong behavior. • Systems of interconnected things or people. • A base for launching or supporting something. • Someone who conveys messages or information very well. • ...
Antanaysiah's Engineering Careers Puzzle 2013-08-26
Across
- works with trains, cars, cargo etc.
- work for the federal government
- works with components and systems used to build computers
- Inspector A building inspector
- applies biology chemistry and electrical engineer
- responsible for installation of refrigerators
- Interested in how the stars and planets are born
- Creates detailed designs of buildings, roads, and machinery
- Inspector Managing safety equipment
Down
- Engineer they preform entry level professional engineering
- Engineer To study and solve problems with rocks and soil term geo
- Engineer They use food technology for food science
- deals with converting electrical areas
- Creates and carves objects
- components from drawings to high standard
- Aircraft
- required to operate heavy industrial machines
- Hygienist use aerospace and networks
- they check ton make sure they meet the standards
19 Clues: Aircraft • Creates and carves objects • Inspector A building inspector • work for the federal government • works with trains, cars, cargo etc. • Inspector Managing safety equipment • Hygienist use aerospace and networks • deals with converting electrical areas • components from drawings to high standard • required to operate heavy industrial machines • ...
Functionality and performance of network systems 2024-08-04
Across
- A network security protocol
- Software used to protect a network
- Address A type of network address
- A network protocol for data transmission
- A network connection method
- A network that covers a small geographical area
- A network connection issue
- Address A unique identifier for a network device
- A network device that filters traffic
- The speed at which data can be transferred
- A device that connects multiple networks
Down
- A measure of network reliability
- A measure of network performance
- A network that covers a large geographical area
- A type of network attack
- The physical components of a network
- A type of network cable
- A network device that amplifies signals
- A type of network topology where all devices are connected to a central point
- A network topology where devices are connected in a line
20 Clues: A type of network cable • A type of network attack • A network connection issue • A network security protocol • A network connection method • A measure of network reliability • A measure of network performance • Address A type of network address • Software used to protect a network • The physical components of a network • A network device that filters traffic • ...
HTHSCI 3GG3 - Policy Development (3I+E Model) Crossword 2020-12-04
Across
- The ability to overturn government decisions
- Type of influence which can include engendering an anticipatory reaction and influencing public opinion
- A policy is more likely to be developed if influential interest groups face _____ benefits
- If a governor signed a bill which reduces funding for prenatal care but maintains the core-bargain, then that change can be ______
- Types of pluralist policy networks in which organized interests primarily assume a policy advocacy role, such as the ONA in Ontario
- If citizens invest in a local hospital, and a policy aims to expand access-to-care in the same hospital, then the citizens are considered to be in a ___ effect (hint: Type of interpretive effect)
- A policy is more likely to be developed if influential interest groups face _____ costs
Down
- Part of the 3I+E model that encompasses government structures, policy legacies, and policy networks
- Type of influence which can include money (e.g., political donations) and in-kind benefits (e.g, foot soldiers). Common example with physicians where they can voice their opposition to patients
- Factors that can trigger action towards policy development, examples include political, economical, or technological changes
- A change to the private delivery model of healthcare services in Ontario (core-bargain) would be considered a highly ___ change
- The OMA is considered a ___ pluralist policy network
- ____ cake federalism, where there exists shared powers between the federal and state/provincial government
- _____ cake federalism, where there exists reserved powers delegated to provinces/states
- Encompasses knowledge/beliefs about "what is" and values/mass opinion about "what ought to be"
15 Clues: The ability to overturn government decisions • The OMA is considered a ___ pluralist policy network • _____ cake federalism, where there exists reserved powers delegated to provinces/states • A policy is more likely to be developed if influential interest groups face _____ costs • ...
Systems Chp 4 2013-02-14
Across
- one of the Internet’s high-speed, long-distance communications links.
- an internal corporate network built using Internet and World Wide Web standards and products; used by employees to gain access to corporate information.
- - World Wide Web a collection of tens of thousands of independently owned computers that work together as one in an Internet service
- a telecommunications device that uses the physical device address in each incoming message on the network to determine to which output port it should forward the message to reach another device on the same network
Down
- a collection of interconnected networks, all freely exchanging information
- a telecommunications device that connects one LAN to another LAN that uses the same telecommunications protocol
- a telecommunications device that serves as an entrance to another network.
- a telecommunications device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing
8 Clues: one of the Internet’s high-speed, long-distance communications links. • a collection of interconnected networks, all freely exchanging information • a telecommunications device that serves as an entrance to another network. • a telecommunications device that connects one LAN to another LAN that uses the same telecommunications protocol • ...
Assignment 6 2016-02-22
Across
- using a system attached to resources to capture data packets
- World Wide Web
- local area network
- using neutral rather than subjective language
- computers programmed to send files to browsers running on other computers
- both the sender and the receiver are active at the same time
- sequences of computers
Down
- using all three improvements in writing style together: concise, scannable, objective
- suffix to the name of a computer file
- program used for editing plain text files
- educational domain
- used to view web pages that may contain text, images, videos, and other multimedia
- internet service provider
- Wide-Area networks
- related group of networked computers
- Hypertext Markup Language
16 Clues: World Wide Web • educational domain • local area network • Wide-Area networks • sequences of computers • internet service provider • Hypertext Markup Language • related group of networked computers • suffix to the name of a computer file • program used for editing plain text files • using neutral rather than subjective language • ...
The Values and Ethics Working Group Crossword 2013-04-15
Across
- Values and Ethics Working Group abbreviation
- Electronic Networks' ___ Policy
- The Aurora _____
- Oshawa's basketball team nickname
- Demonstrating positive attributes and behaviours
- Misusing business mail network is NOT an example of this value statement
- Assistant to the Regional Manager on the sitcom "The Office"
Down
- Integrity, Respect, Professionalism and Cooperation make up the ___ statements
- Protect your ____ at all times
- Toronto Blue ___
- Name of the newsletter produced by the Values and Ethics Working Group
- Last name of actor in 'Oceans 11" (2001)
- Cultivating a harmonious work environment through teamwork
- One way to submit issues to the Values and Ethics Working Group
- Being considerate to one another
- Values and ___
16 Clues: Values and ___ • Toronto Blue ___ • The Aurora _____ • Protect your ____ at all times • Electronic Networks' ___ Policy • Being considerate to one another • Oshawa's basketball team nickname • Last name of actor in 'Oceans 11" (2001) • Values and Ethics Working Group abbreviation • Demonstrating positive attributes and behaviours • ...
Under the Hood 2022-01-28
Across
- THE MEASUREMENT RAM USUALLY COMES IN
- AN INPUT DEVICE YOU USE TO CLICK
- WHAT IS THE HEART OF THE COMPUTER?
- WHEN THE DEVICE LOSES POWER, THE DATA IS LOST
- WHAT DOES RAM STAND FOR?
- TYPE OF MAGNETIC STORAGE
- EXAMPLE OF SOLID STATE STORAGE
- A WORLDWIDE NETWORK OF INTERCONNECTED NETWORKS
- WHAT IS THE BRAIN OF THE COMPUTER
Down
- WHO INVENTED THE WORLD WIDE WEB
- WHAT DOES WWW STAND FOR
- CONNECTING EVERYDAY 'THINGS' TO THE INTERNET
- AN OUTPUT DEVICE YOU USE TO SEE THINGS ON A DEVICE
- WHAT DOES CPU STAND FOR?
- EXAMPLE OF OPTICAL STORAGE
- AN OUTPUT DEVICE YOU USE TO LISTEN TO SOUND OUT LOUD
16 Clues: WHAT DOES WWW STAND FOR • WHAT DOES RAM STAND FOR? • WHAT DOES CPU STAND FOR? • TYPE OF MAGNETIC STORAGE • EXAMPLE OF OPTICAL STORAGE • EXAMPLE OF SOLID STATE STORAGE • WHO INVENTED THE WORLD WIDE WEB • AN INPUT DEVICE YOU USE TO CLICK • WHAT IS THE BRAIN OF THE COMPUTER • WHAT IS THE HEART OF THE COMPUTER? • THE MEASUREMENT RAM USUALLY COMES IN • ...
Internet Vocabulary Crossword 2013-03-26
Across
- Domain names come with different extensions of the web address based
- To renew or revitalize; To reload a webpage on the internet.
Down
- An unauthorized person who secretly gains access to computer files.
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN)
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- NETWORKS online communities where people meet, socialize and exchange digitcal files etc.
6 Clues: To renew or revitalize; To reload a webpage on the internet. • An unauthorized person who secretly gains access to computer files. • Domain names come with different extensions of the web address based • NETWORKS online communities where people meet, socialize and exchange digitcal files etc. • ...
Tech terms 1-3 crossword 2025-05-02
Across
- Something you can touch
- An example of a search engine
- A way to back up info on your computer
- The address of a web page
- Transferring data, files, etc, to another storage device
- The keyboard shortcut for printing
- Languages understood by a computer
- The keyboard shortcut for copying
- 8 0s and 1s
- A worldwide system of interconnected computer networks and electronic devices
- An example of an output device
Down
- An example of an input device
- An example of a browser
- A type of internal or external data storage device
- Brains of the computer
- All of the public websites or pages that can be accessed through the internet on a computer
- Something you can't touch
- The keyboard shortcut for pasting
- 0 and 1
19 Clues: 0 and 1 • 8 0s and 1s • Brains of the computer • An example of a browser • Something you can touch • Something you can't touch • The address of a web page • An example of an input device • An example of a search engine • An example of an output device • The keyboard shortcut for pasting • The keyboard shortcut for copying • The keyboard shortcut for printing • ...
Day1-recap 2025-04-16
6 Clues: type of learning • GenAI model for generating text • unsupervised learning technique • technique for predicting discrete values • technique for predicting continuous values • subset of machine learning that uses neural networks
Media: Key Terms 2023-04-20
Across
- A type of increased increasingly popular media coverage focused on political scandals
- Refers to topics that are usually timely, important and consequential, such as politics, international affairs and business news.
- Journalism that is based upon sensationalism and crude exaggeration.
- A law that protects witnesses from revealing certain information, especially in court.
- Defined as information that is primarily entertaining or personally useful.
- Requires broadcasters to treat political candidates equally in terms of air time.
- The term used to describe the revolutionary business tactic of producing newspapers which sold for one cent.Wire Service: A news agency that supplies syndicated news by wire to newspapers, radio, and television stations.
- The process whereby news media highlight, emphasize and give more prominence to a specific aspect of a news story.
- A person who searches for and tries to expose real or alleged corruption, scandal, or other wrongdoing.
Down
- Regulates interstate and international communications through cable, radio, television, satellite and wire
- became concerned that the monopoly audience control of the three main networks, NBC, ABC and CBS, could misuse their broadcast licenses to set a biased public agenda. The Fairness Doctrine mandated broadcast networks devote time to contrasting views on issues of public importance.
- Describes the tendency of the national media to focus on who is winning at any given time during a presidential campaign.
- To distort (information) by rendering it unfaithfully or incompletely, especially in order to reflect a particular viewpoint.
- To appear or happen gradually or to a limited degree: News filtered down to us during the day.
- The means of communication that reach large numbers of people in a short time,
- When news content suggests to news audiences that they ought to use specific issues as benchmarks for evaluating the performance of leaders and governments.
16 Clues: Journalism that is based upon sensationalism and crude exaggeration. • Defined as information that is primarily entertaining or personally useful. • The means of communication that reach large numbers of people in a short time, • Requires broadcasters to treat political candidates equally in terms of air time. • ...
Chapter 3: Business, Physical Activity, and Sport Crossword 2016-05-27
Across
- athletes are members of a workforce in which _________ is the one criterion upon which all members are judged.
- the loyalty of a ___ is the most important asset for a sports franchise.
- the National Hockey League experienced a ________ of players by team owners that lasted from September 2012 to January 2013.
- an ___________ is when an individual in some way promotes the product or service provided by the commercial interest.
- a financial agreement between an organization that hosts an event and the medium that provides coverage of that event to a large audience not physically present at the event venue.
- interaction among people through online networks and in virtual communities that have been established for the purpose of creating, sharing, and exchanging information and ideas.
- the various means of communication through which people are reached widely, including print, radio, television, the Internet and social and news networks.
- a type of athlete that is not paid to compete in sports.
Down
- organized sport in which owners hire players and market their athletes and team to make a return on their investment.
- refers to a team and all of its associated business interests.
- an athlete's career that blends professionalism and amateurism.
- a type of athlete that is paid to compete in sports.
- revenue ________ are the various ways in which a professional sports team can earn money.
- acronym for a Canadian sport funding program that combines sport and academic or working careers while training for world-class performances.
- Sports _______ has almost become an entertainment event in itself.
- a sports ______ represents athletes in all levels of business dealing.
16 Clues: a type of athlete that is paid to compete in sports. • a type of athlete that is not paid to compete in sports. • refers to a team and all of its associated business interests. • an athlete's career that blends professionalism and amateurism. • Sports _______ has almost become an entertainment event in itself. • ...
Data Transmission 2022-07-13
Across
- data sent simultaneously
- ARQ error detection method
- known to all users
- encrypted that is a result of putting a plaintext message through an encryption message
- stages in a network that can receive and transmit data packets
Down
- sent in both directions but not at the same time
- one direction only
- move between different networks; a network
- actual data carried in a data packet
- altered or corrupted; it is a verification method
- the usual text before an encryption algorithm
11 Clues: one direction only • known to all users • data sent simultaneously • ARQ error detection method • actual data carried in a data packet • move between different networks; a network • the usual text before an encryption algorithm • sent in both directions but not at the same time • altered or corrupted; it is a verification method • ...
Week 7 Worksheet 2023-04-19
Across
- are more social-centric and relational
- are much more fluid, self-organizing
- a fixed and prescribed network which reinfroces ego and positional power.
- are the “central nervous system” of an organization
- Different perspectives, backgrounds, and cultures
- a dominant theory in the 1960
Down
- sometimes known as the‘hub and spoke’ system
- the way we perceive/see the world drive habits and behaviors
- helps us to look beyond surface
- Welsh word signifying habitat or place of multiple
- a dominant theory in the 1950s
11 Clues: a dominant theory in the 1960 • a dominant theory in the 1950s • helps us to look beyond surface • are much more fluid, self-organizing • are more social-centric and relational • sometimes known as the‘hub and spoke’ system • Different perspectives, backgrounds, and cultures • Welsh word signifying habitat or place of multiple • ...
digitalfootprint 2016-09-09
Across
- footprint:is a digital trail that you leave
- to chat or comunicate with friends by posting.
- computer networks.
- short form of video sharing that is 6.5 sec long.
- way to get to a website faster and easeir.
Down
- any smartphone or computer to connect to internet.
- connected to the internet
- video sharing and messaging system.
- you post or go on websites.
- social media website where people can post
- something that you use to communicate with people when you don'twi have wifi
11 Clues: computer networks. • connected to the internet • you post or go on websites. • video sharing and messaging system. • social media website where people can post • way to get to a website faster and easeir. • footprint:is a digital trail that you leave • to chat or comunicate with friends by posting. • short form of video sharing that is 6.5 sec long. • ...
Scandiweb Puzzle №7 2021-04-11
Across
- Dangerous situation affecting an individual, group, or all of society
- German shoes multinational corporation
- Food consisting of salt-cured roe of the family Acipenseridae
- Type of law enforcement and law enforcement state activities
- Someone who sells raw fish and seafood
- Community of people formed on the basis of a common language
Down
- genius/video game designer
- Country in East Asia
- American online social media and social networking service
- An infectious disease
- Form of literature that uses aesthetic and often rhythmic qualities of language
- Global system of interconnected computer networks
12 Clues: Country in East Asia • An infectious disease • genius/video game designer • German shoes multinational corporation • Someone who sells raw fish and seafood • Global system of interconnected computer networks • American online social media and social networking service • Type of law enforcement and law enforcement state activities • ...
Alaina Corbitt 2015-05-04
Across
- engine software that identifies info from a database
- an online source for people to communicate with eachother
- a person who gets access to computer files in secret
- a network of other computer networks
- a program created to destroy files on a computer
- copying a piece of work and passing it off as your own
- when someones is bullying someone online
Down
- to reload a internet site
- a list of references
- a website that can be edited by anyone with access to it
- websites about a specific topic
- a web adress
12 Clues: a web adress • a list of references • to reload a internet site • websites about a specific topic • a network of other computer networks • when someones is bullying someone online • a program created to destroy files on a computer • a person who gets access to computer files in secret • engine software that identifies info from a database • ...
Alaina Corbitt 2015-05-04
Across
- a person who gets access to computer files in secret
- engine software that identifies info from a database
- an online source for people to communicate with eachother
- a web adress
- copying a piece of work and passing it off as your own
Down
- a network of other computer networks
- to reload a internet site
- a program created to destroy files on a computer
- a list of references
- when someones is bullying someone online
- websites about a specific topic
- a website that can be edited by anyone with access to it
12 Clues: a web adress • a list of references • to reload a internet site • websites about a specific topic • a network of other computer networks • when someones is bullying someone online • a program created to destroy files on a computer • a person who gets access to computer files in secret • engine software that identifies info from a database • ...
Crypto Crossword#26 2023-11-29
Across
- What is the PayPal stable coin called?
- CryptoPunks is a famous ___ art collection.
- Lido DAO provides ____ infrastructure for multiple blockchain networks.
- What is the name of the new Polygon token
- The consensus mechanism of Fantom blockchain.
- The Crypto Fear and Greed index is based on this.
Down
- The ‘R’ in PoR stands for ___
- A blockchain is secured by ______.
- Which organization is the creator of BNB token?
- Opposite of a crypto whale
- Pax Gold is backed by which precious metal?
- A token hosted on the Ethereum blockchain
12 Clues: Opposite of a crypto whale • The ‘R’ in PoR stands for ___ • A blockchain is secured by ______. • What is the PayPal stable coin called? • What is the name of the new Polygon token • A token hosted on the Ethereum blockchain • CryptoPunks is a famous ___ art collection. • Pax Gold is backed by which precious metal? • The consensus mechanism of Fantom blockchain. • ...
Crypto Crossword#26 2023-11-29
Across
- What is the name of the new Polygon token
- The ‘R’ in PoR stands for ___
- Lido DAO provides ____ infrastructure for multiple blockchain networks.
- A blockchain is secured by ______.
- The consensus mechanism of Fantom blockchain.
- Which organization is the creator of BNB token?
Down
- Pax Gold is backed by which precious metal?
- Opposite of a crypto whale
- What is the PayPal stable coin called?
- A token hosted on the Ethereum blockchain
- The Crypto Fear and Greed index is based on this.
- CryptoPunks is a famous ___ art collection.
12 Clues: Opposite of a crypto whale • The ‘R’ in PoR stands for ___ • A blockchain is secured by ______. • What is the PayPal stable coin called? • What is the name of the new Polygon token • A token hosted on the Ethereum blockchain • Pax Gold is backed by which precious metal? • CryptoPunks is a famous ___ art collection. • The consensus mechanism of Fantom blockchain. • ...
cloud ipa 2024-10-29
Across
- azure .... is used to manage hybrid cloud
- specifies expected downtime for each service
- most expensive support plan is professional ....
- service allows private connections between azure servers
- is a web application firewall
- you should have one firewall for all networks, and for each network you have ...
Down
- cloud providers use ....... type 1
- a jump server
- part of azure windows defender, It constantly checks your cloud setup to find weaknesses
- to prevent all DDOS attacks, you should go from basic to ....
- a group of policies
- a resource should be in a resource ......
12 Clues: a jump server • a group of policies • is a web application firewall • cloud providers use ....... type 1 • azure .... is used to manage hybrid cloud • a resource should be in a resource ...... • specifies expected downtime for each service • most expensive support plan is professional .... • service allows private connections between azure servers • ...
Networking Concepts and Cyber Ethics 2025-06-11
Across
- A scam email that tricks people.
- A basic rule or standard in computer networking.
- A global system of interconnected computers.
- A harmful program like virus or spyware.
- The respectful and responsible use of internet.
- Illegal entry into a computer system
Down
- A word or phrase used to log into your account.
- A large network that covers cities or countries.
- The full form of IP is Internet
- Refers to bullying or harming people online.
- A device that connects your computer to the internet
- A device that connects two networks.
- A network limited to a small area like a house
13 Clues: The full form of IP is Internet • A scam email that tricks people. • A device that connects two networks. • Illegal entry into a computer system • A harmful program like virus or spyware. • Refers to bullying or harming people online. • A global system of interconnected computers. • A network limited to a small area like a house • ...
Test Yourself! 2025-06-24
Across
- Unauthorized access to systems or data
- Malicious software designed to harm or exploit systems
- A fake website or link used to trick people
- messages distributed by electronic means
- Secret sequence of characters used for safety purposes
- Program that appears useful but is harmful
- File extension often used for dangerous attachments
Down
- A flaw or gap in software security
- Practice of protecting systems, networks, and programs
- Type of scam that tricks users via fake emails
- Type of attack where users are locked out unless they pay
- Common malware that replicates through a network
12 Clues: A flaw or gap in software security • Unauthorized access to systems or data • messages distributed by electronic means • Program that appears useful but is harmful • A fake website or link used to trick people • Type of scam that tricks users via fake emails • Common malware that replicates through a network • File extension often used for dangerous attachments • ...
Extreme Offroad Crosswording 2025-10-05
Across
- When somethings strange with your cellular service, who do you call
- If I'm light this is my highway
- Spooky problem when a customer doesn't return your calls
- What do ALLO and Lightning McQueen have in common
- At ALLO our blood runs
- What needs confirmed when a customer calls in
- Arizona does not observe
Down
- Home not built? That's okay we will ____ before install.
- Connect to other networks by using this handy perk.
- Dusk for linear TV
- Little bars that cause big stress
- Alternative to linear Tv
12 Clues: Dusk for linear TV • At ALLO our blood runs • Alternative to linear Tv • Arizona does not observe • If I'm light this is my highway • Little bars that cause big stress • What needs confirmed when a customer calls in • What do ALLO and Lightning McQueen have in common • Connect to other networks by using this handy perk. • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Things you label so you don’t forget
- Rules limiting who can see or do things
- A promise you hold without a receipt
- The shadow you measure before it bites
- Government rule guiding healthcare data protection
- Many little fences inside one yard
- Intent written down so it can’t wander
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Keeping an up-to-date list of tech devices and app
- Be ready to bend and bounce back
- Attacker’s movement sideways inside a system
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Keeping an up-to-date list of tech devices and app
- Attacker’s movement sideways inside a system
- Government rule guiding healthcare data protection
- Things you label so you don’t forget
- Many little fences inside one yard
- A promise you hold without a receipt
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Intent written down so it can’t wander
- Be ready to bend and bounce back
- The shadow you measure before it bites
- Rules limiting who can see or do things
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • Intent written down so it can’t wander • The shadow you measure before it bites • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Information technology 2020-12-07
Across
- piece of software used for calculations.
- computer that manages access to resources or service in network
- networking device that forwards data packets. between computer networks.
- maximum productivity with minimum effort
Down
- old, no longer in use.
- something exposed the possibility of being attacked or exploited.
- easy to use, understand.
- graphical representation of text.
8 Clues: old, no longer in use. • easy to use, understand. • graphical representation of text. • piece of software used for calculations. • maximum productivity with minimum effort • computer that manages access to resources or service in network • something exposed the possibility of being attacked or exploited. • ...
Dialog DET 2024-11-05
Across
- a device or node that connects two networks by translating communication between them
- used to determine traveling of packets across a network
- popular networking vendor
- used to
Down
- used in radio transmission
- dialog is a subsidiary of this group
- a medium used to transport light or data
- Can make rain or store data
8 Clues: used to • popular networking vendor • used in radio transmission • Can make rain or store data • dialog is a subsidiary of this group • a medium used to transport light or data • used to determine traveling of packets across a network • a device or node that connects two networks by translating communication between them
Linux 2025-07-22
7 Clues: used to input command lines • Linux®-based operating system • distributes products and software • how users communicate with a computer • Source able to be modified by the user • has word processing and spreadsheet programs • allows Linux computers to connect to networks
Network Hardware 2021-05-07
6 Clues: storage for files • routers data between networks • allows computer to join network • ethernet, twister pairs, fibre optics • allows to connect to network wirelessly • route informational data to correct user
Crossword 2022-06-02
Across
- A single page in powerpoint
- The most popular operating system
- Horizontal sets of cells
- a movable indicator on a computer screen identifying the point that will be affected by input from the user.
- A collection of related files in windows
Down
- The most popular search engine
- to login using an email you need it
- repeats a piece of code in programming.
- A large collection of networks
- visual programming language for coding.
10 Clues: Horizontal sets of cells • A single page in powerpoint • The most popular search engine • A large collection of networks • The most popular operating system • to login using an email you need it • repeats a piece of code in programming. • visual programming language for coding. • A collection of related files in windows • ...
Power Theft 2020-05-16
Across
- The wattmeters used to measure AC power.
- Voltage boosting in distribution networks the capacitor used is
- Effective use of Resources.
Down
- The examination of company's record.
- The efficiency of such turbines ranges from 35-45%.
- Changing the Characteristic of Energy Meter.
- The eddy Current torque in energy meter is proportional to-
- The efficiency measured in Lumens/watt.
- The monitoring of Energy Management.
- The Load Factor is the ratio of Average to ___Load.
10 Clues: Effective use of Resources. • The examination of company's record. • The monitoring of Energy Management. • The efficiency measured in Lumens/watt. • The wattmeters used to measure AC power. • Changing the Characteristic of Energy Meter. • The efficiency of such turbines ranges from 35-45%. • The Load Factor is the ratio of Average to ___Load. • ...
Mobile technology 2020-08-30
Across
- The moblie ISDN number is stored in
- the base station covers a specific area that is called as
- global system of computer networks is known as
- Acronym of short message service
- in piconet slaves are connected in
Down
- In piconet devices connected with the master is called
- example for piconet
- Network used inside a college campus
- which is the base of most mobile communications?
- Most WALNs are based upon the standard
10 Clues: example for piconet • Acronym of short message service • in piconet slaves are connected in • The moblie ISDN number is stored in • Network used inside a college campus • Most WALNs are based upon the standard • global system of computer networks is known as • which is the base of most mobile communications? • In piconet devices connected with the master is called • ...
Pip's Crossword 2017-10-02
Across
- What does WAN stand for?
- A short for local area network.
- Word,powerpoint,l exel, office, puplisher etc..
- You might go and see one of these at the cinema.
Down
- One of the biggest companies in the world!
- A way of typing with different buttons
- A way of keeping your work secure.
- A way of communicating using networks.
- The I in ICT.
- A box that stores information that transfers onto a screen.
10 Clues: The I in ICT. • What does WAN stand for? • A short for local area network. • A way of keeping your work secure. • A way of typing with different buttons • A way of communicating using networks. • One of the biggest companies in the world! • Word,powerpoint,l exel, office, puplisher etc.. • You might go and see one of these at the cinema. • ...
Technology 2023-07-06
Across
- Identification used by a person with access to a computer
- Another word for the top-notch support that we provide our users.
- A smaller computer that runs on ChromeOS
- A systematic approach to solving a problem
- What kids use to spell bad words
- A person that is learning
Down
- Sound
- Enables storing data and files on the internet
- The practice of protecting systems and networks from digital attacks
- Intelligence demonstrated by computers
10 Clues: Sound • A person that is learning • What kids use to spell bad words • Intelligence demonstrated by computers • A smaller computer that runs on ChromeOS • A systematic approach to solving a problem • Enables storing data and files on the internet • Identification used by a person with access to a computer • Another word for the top-notch support that we provide our users. • ...
Networking Crossword Puzzle 2024-03-21
Across
- secure encryption used for Wi-Fi
- small devices that connect to the internet
- a smart device used at home
- most common used protocol used in voip phones
- allows virtual machines to connect to physical machines
Down
- Device that adds many ports to a network
- separates networks for security
- technology that uses ethernet to connect phones
- Device needed to connect to the internet
- the name of a wifi connection is known as
10 Clues: a smart device used at home • separates networks for security • secure encryption used for Wi-Fi • Device that adds many ports to a network • Device needed to connect to the internet • the name of a wifi connection is known as • small devices that connect to the internet • most common used protocol used in voip phones • technology that uses ethernet to connect phones • ...
YOU AND YOUR DATA 2024-08-04
Across
- - The state of being free from public attention.
- - Permission for something to happen.
- - To look for information on the internet.
- - The information or material available on websites.
Down
- - Related to technology and computers.
- - The global system of interconnected computer networks.
- - A website or application where users can share and interact.
- - The path left by your online activity.
- - A piece of electronic equipment like a phone or computer.
- - Information collected or stored, especially online.
10 Clues: - Permission for something to happen. • - Related to technology and computers. • - The path left by your online activity. • - To look for information on the internet. • - The state of being free from public attention. • - The information or material available on websites. • - Information collected or stored, especially online. • ...
CROSSWORD 2025-12-01
Across
- Software that creates and manages virtual machines
- Process of finding and fixing code errors
- Temporary memory area between producer and consumer
- Store frequently used data for faster access
- Convert data into unreadable form for privacy
Down
- Device that forwards packets between networks
- Network device that connects devices within a LAN
- Hiding sensitive data by replacing or obfuscating it
- Group of linked computers working together as one
- Open-source Unix-like operating system
10 Clues: Open-source Unix-like operating system • Process of finding and fixing code errors • Store frequently used data for faster access • Device that forwards packets between networks • Convert data into unreadable form for privacy • Network device that connects devices within a LAN • Group of linked computers working together as one • ...
REVIEW COMPUTER NETWORK KEY WORDS 2024-08-13
Across
- IP Address is an IP address that is automatically assigned to each connection, or node, of a network like your
- Network Protocols is a formal standards and policies made up of rules, procedures, and formats and defines communication between two or more devices over a network.
- Network is a collection of computers, servers, network devices, peripherals, or other devices connected to allow the sharing of data.
- Switch is a networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
- is any physical device within a network or other tools that can send, receive, or forward information. A personal computer is the most common node.
- Server. It is called static because it does not change.
- desktop PC, or wireless tablet. This automatic assignment of IP Address is a accomplished by what is called a DHCP Server.
- IP Address is an IP address that was manually configured for a device instead of one that was assigned by a
Down
- Connection is a computer network that uses wireless data connections between network nodes.
- Connection is a computer network that requires a physical wire to be pulled to the desired location of the network jack.
- IP Address is a numerical label assigned to each device connected to a computer network that uses the internet protocol
- Server is assigns IP addresses to client computers which are often used in networks to reduce
- is a networking device that forwards data packets between computer networks.
- is a unit of digital information in computing and telecommunications that consists of eight bits.
- communication.
- efforts.
16 Clues: efforts. • communication. • Server. It is called static because it does not change. • is a networking device that forwards data packets between computer networks. • Connection is a computer network that uses wireless data connections between network nodes. • is a unit of digital information in computing and telecommunications that consists of eight bits. • ...
G7CR 2022-09-27
Across
- Azure _____________ is a directory service that enables you to sign in and access both Microsoft cloud applications and cloud applications that you develop.
- According to the shared responsibility model, which cloud service type places the most responsibility on the customer? (IaaS, PaaS, SaaS)
- _______ cloud combines Public and Private clouds to allow applications to run in the most appropriate location.
- All resources and resources groups are part of ___________________s.
- You can purchase Azure access directly from Microsoft by signing up on the Azure website or through a Microsoft representative. (write truee or false)
- You can also allow your employee's phone to become a passwordless authentication method. You may already be using the Microsoft ________ App as a convenient multi-factor authentication option in addition to a password.
- A _________ is the basic building block of Azure. Anything you create, provision, deploy, etc. is a _________. Virtual Machines (VMs), virtual networks, databases, cognitive services, etc. are all considered _________ within Azure.
Down
- Azure _________ is an interactive, authenticated, browser-accessible shell for managing Azure resources.
- Trainer's fav. student name.
- In Azure, Maintaining Physical networks and datacenter is the responsibility of __________
- In ______ cloud hardware must be purchased for start-up and maintenance.
- Azure ___ can manage ___ records for your Azure services and provide ___ for your external resources as well. Azure ___ is integrated in the Azure portal and uses the same credentials, support contract, and billing as your other Azure services.
- When you deploy a resource in Azure, you'll often need to choose the region where you don't want your resource deployed. (write truee or false)
- Two types of Environment in Cloudshell, Powershell and _______
- Cloud ______is the delivery of computing services over the internet, enabling faster innovation, flexible resources, and economies of scale.
- Cloud benefits are High availability, reliability, Predictability and __________.
16 Clues: Trainer's fav. student name. • Two types of Environment in Cloudshell, Powershell and _______ • All resources and resources groups are part of ___________________s. • In ______ cloud hardware must be purchased for start-up and maintenance. • Cloud benefits are High availability, reliability, Predictability and __________. • ...
Social Media Platforms 2023-03-23
7 Clues: Most popular hashtag • Best Network for B2B • Biggest Social Network in the world • Most popular Social Network for Gen-Z • #1 Social Network to interact with a brand • Best way to diversify your digital marketing • Highest engaged content on all Social Networks
Cisco-AIML 2025-06-27
Across
- Architecture that revolutionized NLP with attention
- Basic processing units in artificial neural networks
- ___ search: finding results by understanding context, not just matching words
- Component that generates output in transformer architecture
- Individual units of text processed by language models
- Vector representations that capture word meanings in high-dimensional space
Down
- Mathematical operation central to CNNs
- Mechanism allowing models to focus on relevant parts
- Learnable parameters that determine connection strength
- Component that processes input in transformer architecture
- Input text given to generative AI models
11 Clues: Mathematical operation central to CNNs • Input text given to generative AI models • Architecture that revolutionized NLP with attention • Mechanism allowing models to focus on relevant parts • Basic processing units in artificial neural networks • Individual units of text processed by language models • Learnable parameters that determine connection strength • ...
History of the NCCA Crossword 2024-08-14
7 Clues: a nationality • local government body • building used for Christian worship • a particular system of faith and worship • the action of bringing something into existence • a group or system of interconnected people or things • feel concern or interest in the wellbeing of someone
History of the NCCA Crossword 2024-08-14
7 Clues: a nationality • local government body • building used for Christian worship • a particular system of faith and worship • the action of bringing something into existence • a group or system of interconnected people or things • feel concern or interest in the wellbeing of someone
Podstawy sieci Ethernet 2013-10-28
Across
- Jeden z czynników związanych z sukcesem technologii Ethernet.
- Maksymalna jednostka transmisyjna.
- Najczęstszy błąd w sieci Ethernet.
- Znacznik początku ramki.
- Oznaczenie adresu MAC jako adresu wbudowanego.
- Termin na oznaczenie energii (szumu) wykrywanej w kablu wprowadzony przez firmę Fluke Networks.
Down
- Przykład niedeterministycznej sieci LAN
- Funkcja opcjonalna w większości implementacji technologii Ethernet.
- Jedno z dozwolonych lub wymaganych pól ramki Ethernet 802.3.
- Kolizje w kablu UTP są rozpoznawane tylko wtedy gdy stacja prcuje w trybie ...
- Jednostka w której podaje się długość ramki zgodnie z wymaganiami standardu Ethernet.
- Jedna z trzech rodzajów kolizji w sieci Ethernet.
12 Clues: Znacznik początku ramki. • Maksymalna jednostka transmisyjna. • Najczęstszy błąd w sieci Ethernet. • Przykład niedeterministycznej sieci LAN • Oznaczenie adresu MAC jako adresu wbudowanego. • Jedna z trzech rodzajów kolizji w sieci Ethernet. • Jedno z dozwolonych lub wymaganych pól ramki Ethernet 802.3. • Jeden z czynników związanych z sukcesem technologii Ethernet. • ...
Scandiweb Puzzle №7 2021-04-12
Across
- Dangerous situation affecting an individual, group, or all of society
- German shoes multinational corporation
- Food consisting of salt-cured roe of the family Acipenseridae
- Type of law enforcement and law enforcement state activities
- Someone who sells raw fish and seafood
- Community of people formed on the basis of a common language
Down
- genius/video game designer
- Country in East Asia
- American online social media and social networking service
- An infectious disease
- Form of literature that uses aesthetic and often rhythmic qualities of language
- Global system of interconnected computer networks
12 Clues: Country in East Asia • An infectious disease • genius/video game designer • German shoes multinational corporation • Someone who sells raw fish and seafood • Global system of interconnected computer networks • American online social media and social networking service • Type of law enforcement and law enforcement state activities • ...
Digi-tech crossword 2021-08-11
Across
- to form a local area network is called?
- what is the first thing you type in a computer login?
- a device that routes traffic between networks?
- what does DNS stand for?
- what does the first 'W' in WWW stand for
Down
- what does AP stand for?
- a system used to connect multiple computer
- pressing and holding down the power button
- what game do you play that builds stuff?
- what does 'D' in dos stand for?
- what does WAN stand for?
- a computer will result in a...
12 Clues: what does AP stand for? • what does WAN stand for? • what does DNS stand for? • a computer will result in a... • what does 'D' in dos stand for? • to form a local area network is called? • what game do you play that builds stuff? • what does the first 'W' in WWW stand for • a system used to connect multiple computer • pressing and holding down the power button • ...
4 keyword 2024-11-26
Across
- we use it daily
- when the internet is missing
- Condition of a node in a network that does not interact with others.
- what are the american states
- those that are sent with whatsapp
- what are all the networks between them
Down
- follow these steps to ensure your computer works properly
- Set of ordered instructions for performing a task
- what we use when communicating remotely
- a predefined order that is messy, tells us that it does not have
- the reason why the computer is not working
- everything that gives us advantages
12 Clues: we use it daily • when the internet is missing • what are the american states • those that are sent with whatsapp • everything that gives us advantages • what are all the networks between them • what we use when communicating remotely • the reason why the computer is not working • Set of ordered instructions for performing a task • ...
TECHNOWAYS- FIND IT FIRST 2024-03-13
Across
- Letting machines do the work for you.
- Pocket-sized silicon circuits.
- A way to decode using your unique features.
- The LEGO game of monomer construction to networks.
- Shape your health with science and technology.Encryption - Protecting digital data with secret codes.
- The secret code driving computer logic.
- The humidity detective of the atmosphere.
- Finding your way through the waves.
Down
- Be it hot or cold you need this device to maintain them.
- The surveyor's precise angle finder
- Crude oil : Petrol :: Distillation Feed : ?
- Utilizing fluid power to drive mechanical systems.
12 Clues: Pocket-sized silicon circuits. • The surveyor's precise angle finder • Finding your way through the waves. • Letting machines do the work for you. • The secret code driving computer logic. • The humidity detective of the atmosphere. • Crude oil : Petrol :: Distillation Feed : ? • A way to decode using your unique features. • ...
Ransomware - 2022 2022-11-16
Across
- A software program or hardware device that protects networks by filtering packets
- Old phone hacking technique used to make free calls
- A software designed to help computers stay safe from viruses and avoid them
- A malware that is independent and does not need any host program
- A malware that misleads users of its true intent
Down
- The first computer virus
- Abbreviation for malicious software
- Compromising confidential information
- Unsolicited email sent for commercial purposes
- Lack of access control policy
- The first hacker's conference
- The least strong security encryption
12 Clues: The first computer virus • Lack of access control policy • The first hacker's conference • Abbreviation for malicious software • The least strong security encryption • Compromising confidential information • Unsolicited email sent for commercial purposes • A malware that misleads users of its true intent • Old phone hacking technique used to make free calls • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Things you label so you don’t forget
- Rules limiting who can see or do things
- A promise you hold without a receipt
- The shadow you measure before it bites
- Government rule guiding healthcare data protection
- Many little fences inside one yard
- Intent written down so it can’t wander
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Keeping an up-to-date list of tech devices and app
- Be ready to bend and bounce back
- Attacker’s movement sideways inside a system
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Things you label so you don’t forget
- Rules limiting who can see or do things
- A promise you hold without a receipt
- The shadow you measure before it bites
- Government rule guiding healthcare data protection
- Many little fences inside one yard
- Intent written down so it can’t wander
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Keeping an up-to-date list of tech devices and app
- Be ready to bend and bounce back
- Attacker’s movement sideways inside a system
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Digimath 9 2025-03-05
Across
- – The smallest unit of data in a computer
- – A wireless technology standard used to exchange data between devices over short distances
- – The practice of protecting computers and networks from digital attacks
- – A harmful program that can damage a computer
- – Used to type and input data
- – A screen that displays information
- – Physical parts of a computer
Down
- – A global network connecting millions of computers
- – A wireless connection to the internet
- – The "brain" of the computer
- – Storing data on the internet instead of a local device
- – Programs that run on a computer
- – A pointing device used to control the cursor
13 Clues: – The "brain" of the computer • – Used to type and input data • – Physical parts of a computer • – Programs that run on a computer • – A screen that displays information • – A wireless connection to the internet • – The smallest unit of data in a computer • – A harmful program that can damage a computer • – A pointing device used to control the cursor • ...
