networks Crossword Puzzles

Computer Systems Crossword Puzzle 2024-08-12

Computer Systems Crossword Puzzle crossword puzzle
Across
  1. External device connected to a computer
  2. Computer that provides data to other computers
  3. Computer that requests data from a server
  4. Programs and operating information used by a computer
Down
  1. Translates domain names to IP addresses
  2. Security system that monitors and controls incoming and outgoing network traffic
  3. The people who work for a company
  4. Physical parts of a computer
  5. Group of interconnected devices
  6. Hardware device that routes data between networks

10 Clues: Physical parts of a computerGroup of interconnected devicesThe people who work for a companyExternal device connected to a computerComputer that requests data from a serverTranslates domain names to IP addressesComputer that provides data to other computersPrograms and operating information used by a computer...

Transformers 2024-12-09

Transformers crossword puzzle
Across
  1. encoding***Adds positional information to input embeddings
  2. heads***Multiple attention mechanisms in parallel
  3. output sequence
  4. input sequence
  5. layer***Maps input tokens to dense vectors
Down
  1. for weighting input tokens
  2. network***Neural network layer applied to each token independently
  3. layers***Stacked layers of self-attention and feed-forward networks
  4. dot-product attention***Common attention mechanism in transformers
  5. key, value***Components of self-attention mechanism

10 Clues: input sequenceoutput sequencefor weighting input tokenslayer***Maps input tokens to dense vectorsheads***Multiple attention mechanisms in parallelkey, value***Components of self-attention mechanismencoding***Adds positional information to input embeddingsnetwork***Neural network layer applied to each token independently...

Transformers 2024-12-09

Transformers crossword puzzle
Across
  1. encoding***Adds positional information to input embeddings
  2. heads***Multiple attention mechanisms in parallel
  3. output sequence
  4. input sequence
  5. layer***Maps input tokens to dense vectors
Down
  1. for weighting input tokens
  2. network***Neural network layer applied to each token independently
  3. layers***Stacked layers of self-attention and feed-forward networks
  4. dot-product attention***Common attention mechanism in transformers
  5. key, value***Components of self-attention mechanism

10 Clues: input sequenceoutput sequencefor weighting input tokenslayer***Maps input tokens to dense vectorsheads***Multiple attention mechanisms in parallelkey, value***Components of self-attention mechanismencoding***Adds positional information to input embeddingsnetwork***Neural network layer applied to each token independently...

Technology 2025-03-31

Technology crossword puzzle
Across
  1. The process of converting information into a digital format
  2. A popular search engine
  3. A program used to access and view websites
  4. A wireless networking technology
  5. Physical components of a computer system.
  6. Wireless communication technology used for short-range data transfer
Down
  1. Operating system by Microsoft
  2. A device used to input text and commands into a computer.
  3. Software that performs specific tasks for users
  4. The global system of interconnected computer networks

10 Clues: A popular search engineOperating system by MicrosoftA wireless networking technologyPhysical components of a computer system.A program used to access and view websitesSoftware that performs specific tasks for usersThe global system of interconnected computer networksA device used to input text and commands into a computer....

Tech Crossword Puzzle 2025-06-28

Tech Crossword Puzzle crossword puzzle
Across
  1. Malware that can harm your computer.
  2. A digital document stored on a computer.
  3. Programs and operating systems used by a computer.
  4. Global network that connects computers.
  5. An input device with keys.
Down
  1. Device used to produce physical copies of documents.
  2. Device that forwards data between computer networks.
  3. Electronic method of sending messages.
  4. A device used to control the pointer on the screen.
  5. The screen that displays the computer output.

10 Clues: An input device with keys.Malware that can harm your computer.Electronic method of sending messages.Global network that connects computers.A digital document stored on a computer.The screen that displays the computer output.Programs and operating systems used by a computer.A device used to control the pointer on the screen....

The Internet 2014-11-13

The Internet crossword puzzle
Across
  1. Distributed denial-of-service aka...
  2. Advanced Research Projects Agency Network
  3. Clobal system of interconnected computer networks is the...
  4. History of...
  5. What code/file you can generate with Key-Gen?
Down
  1. In what month was Internet first connected?
  2. What can stop viruses inflecting files in your computer?
  3. Bot in other words

8 Clues: History of...Bot in other wordsDistributed denial-of-service aka...Advanced Research Projects Agency NetworkIn what month was Internet first connected?What code/file you can generate with Key-Gen?What can stop viruses inflecting files in your computer?Clobal system of interconnected computer networks is the...

Inter- prefix 2022-03-16

Inter- prefix crossword puzzle
Across
  1. operating as a unit
  2. make a break in
  3. concerning or belonging to two or more countries
  4. a point where lines meet
  5. do something together or with others
Down
  1. of relations between individual divisions of a country
  2. seize, interrupt, or stop something on its way
  3. a break during which an activity or event is paused
  4. used of competition or cooperation between secondary schools
  5. a worldwide network of computer networks

10 Clues: make a break inoperating as a unita point where lines meetdo something together or with othersa worldwide network of computer networksseize, interrupt, or stop something on its wayconcerning or belonging to two or more countriesa break during which an activity or event is pausedof relations between individual divisions of a country...

Spelling Test A October 31 2014-10-30

Spelling Test A                         October 31 crossword puzzle
Across
  1. detects viruses
  2. gathers information on computer about you without your knowledge
  3. using personal information about someone else
  4. prevents unauthorized access to computers or networks
  5. sending e-mail to lure users into revealing personal information
Down
  1. appears as pop-up ad box
  2. protects computers from power surges
  3. travels between systems through a network to spread infections
  4. encoding so only authorized individuals can view
  5. using computer unrelated to the job

10 Clues: detects virusesappears as pop-up ad boxusing computer unrelated to the jobprotects computers from power surgesusing personal information about someone elseencoding so only authorized individuals can viewprevents unauthorized access to computers or networkstravels between systems through a network to spread infections...

Fahim 8R 2021-07-26

Fahim 8R crossword puzzle
Across
  1. what do you call your computer screen?
  2. similar word to museum or galary
  3. everyone can take healthy amounts of food
  4. an impressive display
  5. treating people equally
  6. person who speaks in support of an individual
Down
  1. media digitized content that can be transmitted over the internet or computer networks
  2. a set goal to reach
  3. description of a theory
  4. someone who is in an event but does not take part

10 Clues: a set goal to reachan impressive displaydescription of a theorytreating people equallysimilar word to museum or galarywhat do you call your computer screen?everyone can take healthy amounts of foodperson who speaks in support of an individualsomeone who is in an event but does not take part...

crossword! 2024-02-03

crossword! crossword puzzle
Across
  1. Usually consists of 8 bits
  2. Invisible barrier for women advancing in the workplace
  3. left no crumbs
  4. Mentor applications are due on the _
  5. Film about under-recognized Black women at NASA who were a key part of its success
  6. Most commonly-used programming language
Down
  1. practice of protecting systems, networks, and programs from digital attacks
  2. Purdue's first women-centric hackathon ;)
  3. When women are generally paid less than men
  4. women in _

10 Clues: women in _left no crumbsUsually consists of 8 bitsMentor applications are due on the _Most commonly-used programming languagePurdue's first women-centric hackathon ;)When women are generally paid less than menInvisible barrier for women advancing in the workplacepractice of protecting systems, networks, and programs from digital attacks...

My dream job 2024-05-03

My dream job crossword puzzle
Across
  1. who works for himself
  2. who likes to trade and is in commerce field
  3. maybe owner of successful companies
  4. always build networks and relationship with people
  5. always take risk and adapt to each market situation
Down
  1. are really good at negotiating
  2. have useful skills in finance and achieve their goals
  3. have strong leaderships which motivates their teams also
  4. make decision based on market analysis
  5. contribute a lot in economic growth

10 Clues: who works for himselfare really good at negotiatingmaybe owner of successful companiescontribute a lot in economic growthmake decision based on market analysiswho likes to trade and is in commerce fieldalways build networks and relationship with peoplealways take risk and adapt to each market situation...

Learning Activities and or Games for CTE and Computer Science 2025-07-15

Learning Activities and or Games for CTE and Computer Science crossword puzzle
Across
  1. It is a device that provides a service to other computers over a network
  2. Not software
  3. Computer Language that is used in many places
  4. The systematic study of materials
  5. The ability of machines to perform simple tasks
Down
  1. The arrangement of words or phrases
  2. Worldwide system of interconnected networks
  3. An electronic device for storing and processing information through an input and output
  4. Facts or statistics
  5. The exchange of information

10 Clues: Not softwareFacts or statisticsThe exchange of informationThe systematic study of materialsThe arrangement of words or phrasesWorldwide system of interconnected networksComputer Language that is used in many placesThe ability of machines to perform simple tasksIt is a device that provides a service to other computers over a network...

Edu in Tech puzzle 2025-09-08

Edu in Tech puzzle crossword puzzle
Across
  1. Learning theory emphasizing networks and connections
  2. Study of knowledge and justified belief
  3. Market dominated by a few powerful companies
  4. Online courses open to anyone, often free
  5. Current era characterized by digital technologies
Down
  1. Learning theory focusing on mental processes and knowledge
  2. Custom tailoring of skills to an individual's needs
  3. Learning theory based on observable behavior changes
  4. Society transformed by digital technologies
  5. Vehicles that drive themselves without human input

10 Clues: Study of knowledge and justified beliefOnline courses open to anyone, often freeSociety transformed by digital technologiesMarket dominated by a few powerful companiesCurrent era characterized by digital technologiesVehicles that drive themselves without human inputCustom tailoring of skills to an individual's needs...

CIW CROSSWORD 2017-05-10

CIW CROSSWORD crossword puzzle
Across
  1. / unsolicited e-mail sent to multiple users and is often made to appear as if it came from a trusted source.
  2. server / listens on a specific port and allows clients to connect
  3. transfer protocol / allows the transfer of files between two computers, or one server and one computer
  4. / an unethical practice in which the perpetrator (i.e., typosquatter) capitalizes on typing mistakes that users make when entering the URL of a Web site into a browser.
  5. source / a development methodology that makes an application's source code available to anyone
  6. command / used to display your system's IP configuration
  7. group / A group of users that subscribes to a mailing list
  8. / The screen that contains the Web page you are viewing.
  9. / Web page cookies and related data stored locally on the hard drive, unless the browser's privacy mode has been invoked.
  10. / any file or collection of software tools that resolves system liabilities and improves software performance
Down
  1. command / determine the path between a source and a destination system
  2. / small text files placed on Web site visitors' computers
  3. networks / each computer has both client and server capabilities
  4. saver / displays images or animation on your monitor when no keystrokes or mouse actions have occurred for a specified duration
  5. / An instruction from a running application that executes a particular task.
  6. command / tests connectivity between source and destination systems.
  7. / a file of programming code that is inserted into an existing executable program to fix a known problem, or bug
  8. / An application that adds extra capabilities to your Web browser
  9. / a security barrier that prevents unauthorized access to or from private networks
  10. / ny word, slogan, symbol, name, package design or device (or any combination thereof) that marks and distinguishes a product from other products in a trade
  11. server / enhance the corporate network's security and increase its Internet access speed by providing caching server functions for frequently used documents

21 Clues: / small text files placed on Web site visitors' computers/ The screen that contains the Web page you are viewing.command / used to display your system's IP configurationgroup / A group of users that subscribes to a mailing listnetworks / each computer has both client and server capabilities...

Clone of MISM5306 4-5 2015-09-15

Clone of MISM5306 4-5 crossword puzzle
Across
  1. redundant array of independent disks
  2. transforms data into a scrambled form call ciphertext
  3. a type of Trojan program used to release a virus, worm, or other destructive code
  4. short for modulator-demodulator
  5. a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet
  6. travels from computer to computer in a network, but id does not usually erase data.
  7. a self-propagating program code that is triggered by a specified time or event
  8. contains code intended to disrupt a computer, network or Web site, and is usually hidden in a popular program
  9. means that computers and networks are operating and authorized users can access the information they need
  10. designed to protect systems from unauthorized access in order to preserve data integrity
  11. sending fraudulent e-mails that seem to come from a legitimate source
  12. the aount of data that can be transferred from one point to another in a certain time period
  13. attempt to gain access to a network by posing as an authorized user
Down
  1. this attack floods a network or server with service requests to prevent legitimate users access to the system.
  2. a programming routine built into a system by its designer or programmer
  3. rules that govern data communication
  4. secure tunnel through the internet
  5. network connection device containing software the connects network systems and controls traffic flow between them
  6. capturing and recording network traffic
  7. loss of power in a signal as it travels from the sending device to the receiving device
  8. the address that allows network traffic to be routed to your desktop
  9. issued $5 billion in check to identity thieves
  10. an inexpensive way to secure a computer to a desktop or counter
  11. this card enables computers to communicate over a network
  12. a type of router
  13. can protect against both external and internal access

26 Clues: a type of routershort for modulator-demodulatorsecure tunnel through the internetredundant array of independent disksrules that govern data communicationcapturing and recording network trafficissued $5 billion in check to identity thievestransforms data into a scrambled form call ciphertextcan protect against both external and internal access...

Introduction to Cyber Security 2023-09-10

Introduction to Cyber Security crossword puzzle
Across
  1. A sort of cyber assault in which attackers use fraudulent emails or websites to dupe people into disclosing sensitive information, such as login passwords.
  2. A component of a computer system that prevents unauthorized data access.
  3. a system for establishing a secure connection between a computing equipment and a computer network, or between two networks, through the use of an unsecured communication medium like as the public Internet.
  4. A software update or repair published by developers to correct security flaws or enhance system performance.
  5. When a person is tormented and harassed as a result of technological technologies like texting and social media platforms
  6. unwanted email messages
  7. Computer program that is used to provide customized adverts
  8. a field in which computers and networks are employed
  9. An authentication mechanism that requires users to produce two pieces of identity in order to get access to an account or system.
Down
  1. To imitate a character, users exploit internet platforms to acquire access or personal information.
  2. Manipulation used to obtain unauthorized access to a computer system
  3. software that is secretly installed on a user's device in order to acquire confidential information
  4. a breach of security in which sensitive, protected, or confidential material is copied, transferred, viewed, stolen, altered, or utilized by someone who is not allowed to do so.
  5. A program can run entirely via the network without requiring any software to be installed on the endpoint device that is running it.
  6. An unauthorized effort to gain access to a computer
  7. Malware that prevents an organization from accessing a file system.
  8. avoiding an organization's existing security mechanisms
  9. software used with the goal of destroying, disrupting, or gaining unauthorized access to a computer
  10. The process of protecting digital information over its full life cycle.
  11. A collection of personal computers used to infect malicious software.

20 Clues: unwanted email messagesAn unauthorized effort to gain access to a computera field in which computers and networks are employedavoiding an organization's existing security mechanismsComputer program that is used to provide customized advertsMalware that prevents an organization from accessing a file system....

Internet Basics 2020-02-07

Internet Basics crossword puzzle
Across
  1. single web document which opens in a browser
  2. descriptive words or phrases which accompany photos to identify what the image is when the image will not open or load
  3. list of websites visted
  4. first portion of a web name; often “www.” domain
  5. collection of web pages which have a common theme or focus
  6. computer program which replicates and spreads itself from one computer to another
  7. software program which searches the Internet for words or phrases and returns a list as to where each is located
  8. middle portion of a web name; unique to the web name top-level
  9. allows equipment such as fax machines, printers and files to be served to multiple computers
  10. networks or websites which require a password or security code to gain access
  11. hardware which checks information coming from the Internet or a network and either turns it away or allows it to pass through to the computer
  12. websites used to share, post and exchange information in an informal format through several differing channels web
  13. companies which provide Internet connections for a fee social
Down
  1. combination of words and symbols unique to each web page host
  2. last portion of a web name; includes examples such as “.com”, “.org” or “.net”
  3. adult Internet user who uses social networking sites,chat rooms or other cyberspace to approach and eventually hurt other people
  4. software program retrieving and presenting data using the Internet
  5. feature which can be used to store and organize a list of web pages which can be revisited easily
  6. portion of the Internet consisting of computer sites containing billions of documents called web pages web
  7. worldwide collection of networks which allow people to communicate and share information quickly and easily
  8. two or more computers linked together which share and exchange information
  9. words, phrases or graphics in a web page which targets another location
  10. web page which automatically opens when the web browser is opened web
  11. computer user who attempts to acquire unauthorized entry to servers and computer systems

24 Clues: list of websites vistedsingle web document which opens in a browserfirst portion of a web name; often “www.” domaincollection of web pages which have a common theme or focuscombination of words and symbols unique to each web page hostcompanies which provide Internet connections for a fee social...

computer Christopher Dunn 2020-10-01

computer Christopher Dunn crossword puzzle
Across
  1. a peripheral device which makes a persistent representation of graphics or text, usually on paper
  2. Local Area Networks
  3. an American online video-sharing platform headquartered in San Bruno, California.
  4. Random Access Memory
  5. is an electrical cable that temporarily connects an appliance to the mains electricity supply via a wall socket or extension cord
  6. software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user
  7. standalone malware computer program that replicates itself in order to spread to other computers
  8. output how computer tells you things input tell your computer things
  9. the physical parts of a computer
  10. wireless internet card
  11. manly used for gamers to talk to each other during games
  12. how computer tells you things
  13. Wide Area Networks
  14. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  15. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
Down
  1. Read Only Memory
  2. Long term data storage
  3. Responsible for carrying out instructions of a program
  4. how your computer talks to other computers
  5. attached to, a computer case used for active cooling
  6. Where the processor & memory live
  7. an electro-mechanical data storage device that uses magnetic storage to store and retrieve digital data using one or more rigid rapidly rotating platters coated with magnetic material
  8. Operating system
  9. a hand-held pointing device that detects two-dimensional motion relative to a surface
  10. A video card is an expansion card which generates visuals for the display
  11. tell your computer things
  12. , water cooling or liquid cooling is a system used to reduce the temperature of its hardware

27 Clues: Read Only MemoryOperating systemWide Area NetworksLocal Area NetworksRandom Access MemoryLong term data storagewireless internet cardtell your computer thingshow computer tells you thingsthe physical parts of a computerWhere the processor & memory livehow your computer talks to other computersattached to, a computer case used for active cooling...

Computer Security and Ethics 2024-08-23

Computer Security and Ethics crossword puzzle
Across
  1. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
  2. Make sure you use a different ____ for different sites and keep them long and complex.
  3. Computer activities often leave a digital ____ that leads back to the offender.
  4. You should regularly make a ____ of your data/photos.
  5. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
  6. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
  7. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
  8. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
  9. To protect your device from malware, you should install reputable ____ software and run frequent scans.
  10. If you download software, ____ it before running it.
Down
  1. Malware that damages files on your computer or stops your computer from running properly.
  2. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
  3. When you copy sections of someone else's work and claim it is your own.
  4. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
  5. Emails can spread malware, most often when you click links or open ____.
  6. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
  7. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
  8. Keep your operating system secure by running all the latest.
  9. Avoid making financial transactions on ____ networks or computers.
  10. Tries to open security holes in your computer so a hacker can gain access.

20 Clues: If you download software, ____ it before running it.You should regularly make a ____ of your data/photos.Keep your operating system secure by running all the latest.Avoid making financial transactions on ____ networks or computers.When you copy sections of someone else's work and claim it is your own....

Tech Terms 2023-04-27

Tech Terms crossword puzzle
Across
  1. Central processing unit
  2. a unit of data that is eight binary digits long
  3. the system that your computer uses to operate all of its user base functions
  4. Search engine
  5. internet box
  6. a website designed to make it easy for users to create entries in chronological order
  7. random access memory
  8. a computer-generated environment
  9. Open-source software
  10. portable document format
  11. turns domain names into IP addresses
  12. the gulf between those who have ready access to computers and the internet and those who do not
  13. computer code or program that is protected by law against copying
  14. Input device
  15. Output device
  16. malicious software
  17. An internet cord
  18. programs and operating systems that need to be installed
  19. a binary digit the smallest increment of data on a computer
  20. Copy (data) from one computer system to another, typically over the internet.
  21. provides a service to another computer program and its user
  22. hyper text markup language
Down
  1. CTRL C
  2. back up information on computer
  3. 1000 kilobytes
  4. server based pieces of data ion websites
  5. the process of protecting information using mathematical models
  6. Search engine
  7. ties the computer's components together at one spot and allows them to talk to each other.
  8. Back up information on computer
  9. Personally Identifiable Information
  10. A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
  11. CTRL V
  12. Machine language
  13. a selective wall that lets certain ip addresses go through and blocks out viruses
  14. A global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
  15. Address Internet protocol address
  16. An information system enabling documents and other web resources to be accessed over the Internet.
  17. Turn on
  18. Control P
  19. keyboard, monitor, and speakers
  20. makes wifi
  21. Read-only memory

43 Clues: CTRL VCTRL CTurn onControl Pmakes wifiinternet boxInput deviceSearch engineSearch engineOutput device1000 kilobytesMachine languageAn internet cordRead-only memorymalicious softwarerandom access memoryOpen-source softwareCentral processing unitportable document formathyper text markup languageback up information on computer...

Module 5 Vocabulary Crossword Puzzle 2025-01-31

Module 5 Vocabulary Crossword Puzzle crossword puzzle
Across
  1. A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.
  2. Make a copy of a file, program, or media.
  3. Hardware and/or software that protects a network’s resources from intrusion by users on another network, such as the Internet.
  4. The unauthorized and illegal duplication of copyrighted software.
  5. An object that can be tapped or clicked — such as a button, image, or link — on a website, pop-up ad, pop-under ad, or in an email message or text message contains a malicious program.
  6. An attack whose goal ranges from disabling a government’s computer network to crippling a country.
  7. The process of decoding encrypted data.
  8. A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
  9. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
  10. A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
  11. Creates software registration numbers and sometimes activation codes.
  12. The discovery, collection, and analysis of evidence found on computers and networks. See also cyberforensics
Down
  1. The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
  2. A small text file that a web server stores on your computer.
  3. Destructive event or prank
  4. Someone who accesses a computer or network illegally.
  5. Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
  6. Someone who demands payment to stop an attack on an organization’s technology infrastructure.
  7. A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
  8. The encrypted (scrambled) data

20 Clues: Destructive event or prankThe encrypted (scrambled) dataThe process of decoding encrypted data.Make a copy of a file, program, or media.Someone who accesses a computer or network illegally.A small text file that a web server stores on your computer.The unauthorized and illegal duplication of copyrighted software....

Networking 3 Dante 2025-03-02

Networking 3 Dante crossword puzzle
Across
  1. signals are focused in a single direction, which makes them ideal for placement at one end of long, narrow spaces or to cover distances between buildings
  2. the path data travels between computers on a network is considered the network’s
  3. sometimes called “peer-to-peer mode,” is a wireless mode of operation typically used only in small or temporary installations
  4. uses the token-passing media access method and dual rings for redundancy
  5. The extra 5 MB comes in the form of packet and frame headers, acknowledgments, and retransmissions, collectively known as
  6. which allows 802.11ac APs to send data to multiple client stations simultaneously
  7. In most towns, you can usually find a public Wi-Fi network, called a
  8. which is essentially the throughput minus the protocol headers that don’t contain application data.
Down
  1. So, although there’s no escaping noise on a Wi-Fi network, what’s important is the amount of noise compared with the signal strength, which is called the
  2. Ethernet standard works over Cat5e and Cat6 cabling
  3. Ethernet, released as the IEEE 802.3ab standard, supports 1000 Mbps Ethernet
  4. operates only in full-duplex mode, so there is no such thing as a 10 Gbps hub
  5. Wi-Fi signals can pass through solid objects, such as walls and trees, but they don’t get through unscathed. Solid objects absorb radio signals, causing them to
  6. (often called simply “100BaseT”)
  7. the signals radiate out from the antenna with equal strength in all directions.
  8. The 1997 802.11 wireless networking standard, also referred to as
  9. Wi-Fi networks can operate in one of two modes: infrastructure and ad hoc. Most Wi-Fi networks operate in
  10. The actual amount of data transferred, not counting errors and acknowledgments, is called
  11. network technology provides reliable transport of data, although it’s slow by current standards.
  12. Signals arriving at different times (referred to as “out of phase”) are called

20 Clues: (often called simply “100BaseT”)Ethernet standard works over Cat5e and Cat6 cablingThe 1997 802.11 wireless networking standard, also referred to asIn most towns, you can usually find a public Wi-Fi network, called auses the token-passing media access method and dual rings for redundancy...

Foundations of Cyber Security I 2025-02-13

Foundations of Cyber Security I crossword puzzle
Across
  1. The act of making sure every individual working with an information system has specific responsibilities for information assurance.
  2. A process that gives a user permission to do certain things.
  3. A three-pronged system of cybersecurity.
  4. Ciphers that break down information into fixed-size blocks before encrypting it.
  5. Software that displays unwanted advertising while running an application on your computer.
  6. A program designed to perform a set of coordinated functions, jobs, or activities for the convenience of the user.
  7. A guarantee of reliable access to information.
  8. A device that helps join two separate computer networks together to allow for communication.
  9. A guarantee that the message, transaction, or other exchange of information has shown its proof of identity.
Down
  1. A security technique used to regulate who or what can utilize the resources of a computer system.
  2. Encryption that uses two different keys, a public one for scrambling and a private one for unscrambling.
  3. A process that measures how much information has been accessed or the amount of time spent on a session.
  4. The governance, development, and maintenance of computer programs.
  5. A process that identifies a user by asking them to enter some kind of valid information, like a password or user name.
  6. The use of software and hardware in combination with certain procedural methods to protect applications from external threats.
  7. One that is physically isolated from the internet and only able to pass data along via removable media.
  8. A process or set of rules.
  9. The use of human characteristics to distinctly identify individuals as themselves.
  10. A process that keeps a system secure by physically isolating it from all unsecured networks.
  11. An orderly search for nonvolatile data storage to load the OS.

20 Clues: A process or set of rules.A three-pronged system of cybersecurity.A guarantee of reliable access to information.A process that gives a user permission to do certain things.An orderly search for nonvolatile data storage to load the OS.The governance, development, and maintenance of computer programs....

AP World Semester 1 Review 2026-01-12

AP World Semester 1 Review crossword puzzle
Across
  1. Investor corporation limiting risk on voyages.
  2. Mongol Peace enabling safe Eurasian trade travel.
  3. Global biological exchange after 1492 contact.
  4. Muslim dynasty ruling tolerant Hindu-majority India.
  5. Economic theory maximizing exports for bullion accumulation.
  6. Sea network linking Africa, Arabia, India, East Asia.
  7. Shia Persian empire challenging Sunni Ottomans.
  8. Overland routes connecting East Asia to Mediterranean.
  9. Spanish Native labor system resembling feudalism.
  10. Gold-salt routes across Sahara linking West Africa.
  11. Elite Ottoman infantry from Christian devshirme recruits.
  12. 1494 line dividing New World between Spain/Portugal.
  13. Monarchs claiming God-given absolute authority.
  14. Religion/tech/crop spread through expanding trade networks.
  15. Final Chinese imperial dynasty by Manchu conquest.
  16. Mesoamerican empire using tribute system and human sacrifice.
  17. East African ports thriving on Indian Ocean commerce.
  18. Plague pandemic killing 30-60% of Afro-Eurasia.
Down
  1. Global commerce dominated by Spanish American silver.
  2. Ottoman Christian boy levy for elite military service.
  3. Spanish Pacific ships linking Mexico and Philippines.
  4. Rational philosophy blending Confucianism, Buddhism, Daoism.
  5. Mali ruler whose pilgrimage demonstrated massive wealth.
  6. Largest contiguous land empire created by Genghis Khan.
  7. Ottoman/Safavid/Mughal empires using firearms.
  8. Military dictator controlling Japan behind symbolic emperor.
  9. Manor system exchanging land for military service.
  10. Catholic response via Jesuits and Council of Trent.
  11. Chinese credit system enabling long-distance commerce.
  12. Slave-based monoculture agriculture in Americas.
  13. Transatlantic enslaved African voyage to Americas.
  14. Andean civilization with mit'a labor and road networks.
  15. Economic powerhouse with commercialization and merit-based bureaucracy.
  16. Luther's challenge to Catholic Church authority.
  17. Multiethnic Islamic empire controlling key trade routes.
  18. Fortified Silk Road inns protecting merchants.
  19. Muslim rule introducing Islam to Hindu northern India.
  20. Atlantic cycle: Europe-Africa-Americas commerce.
  21. China's massive waterway linking rice south to population north.
  22. West African gold-salt trade empire led by Mansa Musa.

40 Clues: Investor corporation limiting risk on voyages.Global biological exchange after 1492 contact.Ottoman/Safavid/Mughal empires using firearms.Fortified Silk Road inns protecting merchants.Shia Persian empire challenging Sunni Ottomans.Monarchs claiming God-given absolute authority.Plague pandemic killing 30-60% of Afro-Eurasia....

Technology vania 2022-02-16

Technology vania crossword puzzle
Across
  1. Computer portable
  2. Wireless fidelity
  3. Global Positioning System
  4. Switching device for networks
  5. machine for printing text or pictures onto paper
  6. a video camera that inputs to a computer connected to the internet
Down
  1. it’s everything you can touch
  2. uses light beam to scan codes, text,etc
  3. a system for connecting a number of computer systems to form a local area network
  4. the instructions that control what a computer does

10 Clues: Computer portableWireless fidelityGlobal Positioning Systemit’s everything you can touchSwitching device for networksuses light beam to scan codes, text,etcmachine for printing text or pictures onto paperthe instructions that control what a computer doesa video camera that inputs to a computer connected to the internet...

Unit C By, Justin Howard 2015-10-22

Unit C By, Justin Howard crossword puzzle
Across
  1. a portable computer
  2. a phonograph record
  3. a connected group of pages on the World Wide Web
  4. electronic device
Down
  1. output device that produces a paper copy of alphanumeric or graphic data
  2. a set of keys
  3. portion of a terminal or monitor upon which information is displayed
  4. pictorial computer output produced on a display screen, plotter, or printer
  5. vast computer network linking smaller computer networks worldwide
  6. pointing device

10 Clues: a set of keyspointing deviceelectronic devicea portable computera phonograph recorda connected group of pages on the World Wide Webvast computer network linking smaller computer networks worldwideportion of a terminal or monitor upon which information is displayedoutput device that produces a paper copy of alphanumeric or graphic data...

Spelling Test A October 31 2014-10-30

Spelling Test A                October 31 crossword puzzle
Across
  1. using computer unrelated to the job
  2. prevents unauthorized access to computers or networks
  3. using personal information about someone else
  4. detects viruses
  5. sending e-mail to lure users into revealing personal information
Down
  1. appears as pop-up ad box
  2. protects computers from power surges
  3. gathers information on computer about you without your knowledge
  4. travels between systems through a network to spread infections
  5. encoding so only authorized individuals can view

10 Clues: detects virusesappears as pop-up ad boxusing computer unrelated to the jobprotects computers from power surgesusing personal information about someone elseencoding so only authorized individuals can viewprevents unauthorized access to computers or networkstravels between systems through a network to spread infections...

Team Auton crossword 2021-05-14

Team Auton crossword crossword puzzle
Across
  1. This enables customers to keep their account active while they are away from home at a reduced monthly rate for a minimum of two months and up to nine months.
  2. a portal tool that has various tabs to assist with account handling for all customers, except Ordering for ICOMS accounts.
  3. a secure and streamlined authentication method using just the sound of a voice to authenticate callers.
  4. a web-based application that manages work schedules, schedule changes, shift swaps, and vacation time.
Down
  1. a networking device that forwards data packets between computer networks
  2. Tool that we use in order to review our scorecard
  3. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols

7 Clues: Tool that we use in order to review our scorecarda networking device that forwards data packets between computer networksa web-based application that manages work schedules, schedule changes, shift swaps, and vacation time.a secure and streamlined authentication method using just the sound of a voice to authenticate callers....

Delicious 2024-12-22

Delicious crossword puzzle
Across
  1. You can't do your job without it
  2. Your Favorite child
  3. Can't live without it
  4. Popular sport played by tall people
Down
  1. Igneous rock commonly found east of here
  2. Your husband is paid handsomely to manage these
  3. Decorate it for festive cheer

7 Clues: Your Favorite childCan't live without itDecorate it for festive cheerYou can't do your job without itPopular sport played by tall peopleIgneous rock commonly found east of hereYour husband is paid handsomely to manage these

Networking Concepts 2025-06-04

Networking Concepts crossword puzzle
Across
  1. In this topology, device are connected to main cable
  2. This topology connects each device to all other devices
  3. Connects network across a town or city
  4. Connects computers and sends data to destination computer
  5. Connects network in a small area like school or office
Down
  1. To exchange information
  2. Arrangement of devices
  3. Connects different networks together and facilitates communication
  4. Computer in a network
  5. Converts digital signals into analog signals
  6. Connect computers and sends data to all of them

11 Clues: Computer in a networkArrangement of devicesTo exchange informationConnects network across a town or cityConverts digital signals into analog signalsConnect computers and sends data to all of themIn this topology, device are connected to main cableConnects network in a small area like school or office...

crossword that Mr. Randall made us do... 2018-04-05

crossword that Mr. Randall made us do... crossword puzzle
Across
  1. The computing part of the computer.
  2. a scam to steal valuable information
  3. method for keeping a computer secure from intruders.
  4. website that serves employees only
  5. most widely used hardware interface
  6. To store data
  7. A small text file (up to 4KB)
  8. (CPUs, drives, keyboards, printers, scanners, cables, etc.)
Down
  1. provides access to the Internet
  2. display element of an electronic screen
  3. a large network made up of smaller networks
  4. series of instructions that performs a particular task
  5. may use the term for capability and time
  6. contains text entries in reverse chronological order
  7. address that defines the route to a file on an Internet server

15 Clues: To store dataA small text file (up to 4KB)provides access to the Internetwebsite that serves employees onlyThe computing part of the computer.most widely used hardware interfacea scam to steal valuable informationdisplay element of an electronic screenmay use the term for capability and timea large network made up of smaller networks...

COMPUTER PARTS 2022-10-21

COMPUTER PARTS crossword puzzle
Across
  1. STAYS FORVER
  2. Exchange information and form networks
  3. PART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN
  4. KEEPS HOLD OF DATA FOREVER
  5. IN A computing system this means using to exchange information
  6. LIKE LONG TERM MEMORY IN A COMPUTER
  7. 8 BITS
Down
  1. to accelerate the creation of images in a frame
  2. DISPLAYS INFORMATION FOR THE USER E.G SCREEN
  3. ONLY STAYS WHEN SYSTEM IS ON
  4. HOW THE USER TELLS THE COMPUTER WHAT TO DO E.G KEYBOARD
  5. LIKE THE HEART OF THE COMPUTER
  6. PART OF COMPUTER THAT IS LIKE YOUR SHORT-TERM MEMORY
  7. PART OF COMPUTER THAT ACTS LIKE A SKELETON
  8. 1 BINARY DIGIT

15 Clues: 8 BITSSTAYS FORVER1 BINARY DIGITKEEPS HOLD OF DATA FOREVERONLY STAYS WHEN SYSTEM IS ONLIKE THE HEART OF THE COMPUTERLIKE LONG TERM MEMORY IN A COMPUTERExchange information and form networksPART OF COMPUTER THAT ACTS LIKE A SKELETONDISPLAYS INFORMATION FOR THE USER E.G SCREENPART OF COMPUTER THAT FINCTIONS LIKE THE BRAIN...

Cybersecurity 2024-01-19

Cybersecurity crossword puzzle
Across
  1. Malware that attaches itself to other software.
  2. A way to protect a network from incoming and outgoing attacks.
  3. Keeping secret things secret.
  4. An attack that takes place through digital means.
  5. Government agency responsible for Cybersecurity and Infrastructure Security
  6. The national organization which sets standards for technology
  7. Malware that can self-replicate and spread on its own.
  8. A way to secure an account; Something you know.
Down
  1. The right to access systems or networks.
  2. Maintaining access to key technologies.
  3. Verifying someone is who they say they are.
  4. A malicious software
  5. Monitoring who accesses what.
  6. Keeping systems secure and complete.
  7. A cybersecurity competition

15 Clues: A malicious softwareA cybersecurity competitionMonitoring who accesses what.Keeping secret things secret.Keeping systems secure and complete.Maintaining access to key technologies.The right to access systems or networks.Verifying someone is who they say they are.Malware that attaches itself to other software....

balls 2023-10-20

balls crossword puzzle
Across
  1. A common theme addressed in hip-hop.
  2. Lyrics often used to convey social messages.
  3. Promotion of social or political change.
  4. Hip-hop's role in inspiring change.
  5. Use of hip-hop to express social dissent.
  6. Elevating marginalized voices through hip-hop.
Down
  1. Refusal to accept societal injustices.
  2. Hip-hop's role in raising social consciousness.
  3. Unity within hip-hop communities.
  4. Skillful wordplay to convey powerful messages.
  5. A goal advocated for in hip-hop songs.
  6. Building networks for social impact.
  7. Call for societal change in hip-hop music.
  8. Tool used to amplify hip-hop's social voice.
  9. Hip-hop artists' involvement in social causes.

15 Clues: Unity within hip-hop communities.Hip-hop's role in inspiring change.A common theme addressed in hip-hop.Building networks for social impact.Refusal to accept societal injustices.A goal advocated for in hip-hop songs.Promotion of social or political change.Use of hip-hop to express social dissent.Call for societal change in hip-hop music....

cw1 2025-11-05

cw1 crossword puzzle
Across
  1. Technique to run multiple OS on a single machine
  2. Algorithm used in training neural networks
  3. Concurrent execution of multiple threads
  4. AI system inspired by human brain structure
  5. OOP feature allowing one interface, many forms
  6. CPU technique for parallel instruction execution
  7. Science of secure communication
Down
  1. Network security system monitoring traffic
  2. Database process reducing redundancy
  3. AI model learns training data too well
  4. Step-by-step procedure for solving a problem
  5. State where processes wait indefinitely for each other
  6. Process of securing data by converting it to code
  7. Program that converts code into machine language
  8. Software that creates and manages virtual machines

15 Clues: Science of secure communicationDatabase process reducing redundancyAI model learns training data too wellConcurrent execution of multiple threadsNetwork security system monitoring trafficAlgorithm used in training neural networksAI system inspired by human brain structureStep-by-step procedure for solving a problem...

Marketing & Technologies 2013-07-10

Marketing & Technologies crossword puzzle
Across
  1. Set of activities that control how materials and products move from the initial source to the end user
  2. Company's interaction with customers
  3. Bid for product and services over the internet
  4. Electronic interpretation of information
  5. Efficient handling of information and resources within a commercial organization
Down
  1. Personalization of high volumes
  2. Global system of interconnected computer networks
  3. Anything related to computing technology
  4. Commerce conducted electronically

9 Clues: Personalization of high volumesCommerce conducted electronicallyCompany's interaction with customersAnything related to computing technologyElectronic interpretation of informationBid for product and services over the internetGlobal system of interconnected computer networks...

Network Topologies 2018-10-15

Network Topologies crossword puzzle
Across
  1. a network that has one hub/switch
  2. Network _________ is a way to connect multiple computers
  3. Thing that connects everything
Down
  1. network that uses one big cable
  2. network in the shape of a circle
  3. a device that redirects data
  4. network that has many routers and doesn't matter if one breaks
  5. a small local network
  6. big network that is made of many smaller networks

9 Clues: a small local networka device that redirects dataThing that connects everythingnetwork that uses one big cablenetwork in the shape of a circlea network that has one hub/switchbig network that is made of many smaller networksNetwork _________ is a way to connect multiple computersnetwork that has many routers and doesn't matter if one breaks

Tech terms 2024-11-06

Tech terms crossword puzzle
Across
  1. centurial processing unit
  2. Physical parts of a computer
  3. eight binary digits
  4. Worldwide system of interconnected computer networks and electronic devices that communicate using established set of protocols
Down
  1. Transmission from one computer to another network
  2. lowest level of programing language
  3. Store all digital content
  4. The address of unique resource on the internet
  5. 1 means its on and 0 means its off

9 Clues: eight binary digitsStore all digital contentcenturial processing unitPhysical parts of a computer1 means its on and 0 means its offlowest level of programing languageThe address of unique resource on the internetTransmission from one computer to another network...

Guanxi (Unit 3 - 10 words) 2021-01-27

Guanxi (Unit 3 - 10 words) crossword puzzle
Across
  1. A former student of a school
  2. S.one who acts like a person they want to be
  3. Quick at seeing what to do in a situation
  4. Important and needing immediate attention
Down
  1. Trying often to achieve something hard
  2. The quality of being faithful
  3. Starting to exist, appearing, becoming known
  4. Connected group of people that exchange info
  5. Having particular knowledge of something
  6. A former male student of a school

10 Clues: A former student of a schoolThe quality of being faithfulA former male student of a schoolTrying often to achieve something hardHaving particular knowledge of somethingQuick at seeing what to do in a situationImportant and needing immediate attentionStarting to exist, appearing, becoming knownS.one who acts like a person they want to be...

CLIMATE CHANGE 2024-08-12

CLIMATE CHANGE crossword puzzle
Across
  1. Gases trapping heat in the atmosphere
  2. Contamination of air, water, or land
  3. Release of harmful gases into the atmosphere
Down
  1. Complex networks of living organisms and their environment
  2. Main component of greenhouse gas causing global warming
  3. Actions that meet present needs without compromising future
  4. Energy sources that can be replenished
  5. Widespread climate change affecting the entire planet
  6. Increase in Earth's average temperature
  7. Fuels formed from ancient organisms

10 Clues: Fuels formed from ancient organismsContamination of air, water, or landGases trapping heat in the atmosphereEnergy sources that can be replenishedIncrease in Earth's average temperatureRelease of harmful gases into the atmosphereWidespread climate change affecting the entire planetMain component of greenhouse gas causing global warming...

CompTIA Network+ (009) Ch. 13 2025-04-04

CompTIA Network+ (009) Ch. 13 crossword puzzle
Across
  1. Secured intermediary device for remote admin access.
  2. Encrypts the full IP packet in IPSec.
  3. Protocol to set up secure keys in IPSec VPNs.
  4. Connects geographically dispersed networks.
  5. Secure protocol for command-line remote access.
  6. Uses a browser instead of client software.
Down
  1. Sends only some traffic through the VPN.
  2. Connects a user to internal network remotely.
  3. Protocol suite for securing IP communications.
  4. Dedicated line offering 1.544 Mbps bandwidth.

10 Clues: Encrypts the full IP packet in IPSec.Sends only some traffic through the VPN.Uses a browser instead of client software.Connects geographically dispersed networks.Connects a user to internal network remotely.Protocol to set up secure keys in IPSec VPNs.Dedicated line offering 1.544 Mbps bandwidth.Protocol suite for securing IP communications....

Chapter 2 vocab. The French in north America 2024-10-29

Chapter 2 vocab. The French in north America crossword puzzle
Across
  1. Self-governing and independent of external powers
  2. A francophone farm New France
  3. A francophone citizen of Acadia
  4. Networks of colonies
  5. only 1 company is allowed to sell or trade items
Down
  1. Most powerful member of the sovereign council
  2. Extending its control over other countries often using economic or military means
  3. missionaries who came to North America
  4. The second most important figure of the sovereign council
  5. Head of Church

10 Clues: Head of ChurchNetworks of coloniesA francophone farm New FranceA francophone citizen of Acadiamissionaries who came to North AmericaMost powerful member of the sovereign councilonly 1 company is allowed to sell or trade itemsSelf-governing and independent of external powersThe second most important figure of the sovereign council...

Transformers 2024-12-08

Transformers crossword puzzle
Across
  1. encoding***Adds positional information to input embeddings
  2. heads***Multiple attention mechanisms in parallel
  3. output sequence
  4. input sequence
  5. layer***Maps input tokens to dense vectors
Down
  1. for weighting input tokens
  2. network***Neural network layer applied to each token independently
  3. layers***Stacked layers of self-attention and feed-forward networks
  4. dot-product attention***Common attention mechanism in transformers
  5. key, value***Components of self-attention mechanism

10 Clues: input sequenceoutput sequencefor weighting input tokenslayer***Maps input tokens to dense vectorsheads***Multiple attention mechanisms in parallelkey, value***Components of self-attention mechanismencoding***Adds positional information to input embeddingsnetwork***Neural network layer applied to each token independently...

5G Technology 2025-10-14

5G Technology crossword puzzle
Across
  1. What is the main frequency range used in 5G?
  2. What type of network connects 5G base stations?
  3. Which layer of OSI handles transmission?
  4. What enables ultra-fast downloads?
  5. What network architecture does 5G use?
Down
  1. What technology supports faster switching?
  2. What type of cells are used in 5G networks?
  3. What generation of mobile network is 5G?
  4. What replaces cables in 5G transmission?
  5. What device connects users to the 5G network?

10 Clues: What enables ultra-fast downloads?What network architecture does 5G use?What generation of mobile network is 5G?Which layer of OSI handles transmission?What replaces cables in 5G transmission?What technology supports faster switching?What type of cells are used in 5G networks?What is the main frequency range used in 5G?...

Cyber Security 1 2023-04-23

Cyber Security 1 crossword puzzle
Across
  1. Manipulative tactics used by cybercriminals to trick people into divulging sensitive information or performing actions that compromise security.
  2. The part of the internet not indexed by search engines and accessible only through special software, often associated with illegal activities.
  3. An incident in which unauthorized individuals gain access to sensitive, protected, or confidential data.
  4. An additional layer of security that requires a user to provide two separate pieces of evidence for authentication.
  5. The process of converting data into a code to prevent unauthorized access.
  6. A trial-and-error method used by attackers to gain access to an account or system by systematically guessing passwords or encryption keys.
  7. A string of characters used to authenticate a user's identity and grant access to a computer system or account.
Down
  1. Malicious software designed to infiltrate or damage computer systems, networks, or devices.
  2. A virtual private network that extends a private network across a public network, allowing users to send and receive data securely and anonymously.
  3. A type of malicious software that encrypts a victim's files and demands payment for their release.
  4. The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
  5. A piece of information used to decrypt or encrypt data, ensuring its confidentiality and integrity.
  6. A network of compromised computers remotely controlled by a cybercriminal to perform tasks such as launching attacks or sending spam emails.
  7. A security system that controls incoming and outgoing network traffic based on predetermined rules.
  8. A cyber attack that attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.

15 Clues: The process of converting data into a code to prevent unauthorized access.Malicious software designed to infiltrate or damage computer systems, networks, or devices.A type of malicious software that encrypts a victim's files and demands payment for their release....

Networking devices 2025-03-15

Networking devices crossword puzzle
Across
  1. A device that converts digital signals from a computer into analog signals for transmission over telephone lines or other communication channels.
  2. Short for Virtual Local Area Network, a logically separate network created within a physical LAN.
  3. A node or device that serves as an entrance point between two different networks, often translating between protocols.
  4. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. Short for Wide Area Network, a telecommunications network that spans a large geographic area, connecting multiple LANs.
  6. A device that connects two separate network segments and forwards data between them based on MAC addresses.
  7. A device that connects multiple networks and directs data packets to their intended destinations.
  8. A networking device that manages data flow within a local area network (LAN) by connecting devices together.
Down
  1. A device used to regenerate signals in order to extend the range of a network connection.
  2. Short for Local Area Network, a group of computers and devices connected within a limited geographical area.
  3. A hardware component that enables a computer or device to connect to a network, such as a USB Ethernet adapter.
  4. Point A wireless networking hardware device that allows Wi-Fi devices to connect to a wired network.
  5. A server or software application that acts as an intermediary between a client and other servers, providing privacy and caching benefits.
  6. Stands for Domain Name System, a service that translates human-readable domain names into IP addresses.
  7. A simple networking device that broadcasts data received from one port to all other ports without filtering or managing the traffic.

15 Clues: A device used to regenerate signals in order to extend the range of a network connection.Short for Virtual Local Area Network, a logically separate network created within a physical LAN.A device that connects multiple networks and directs data packets to their intended destinations....

Network Components 2022-10-27

Network Components crossword puzzle
Across
  1. A computer that sits between different networks or applications
  2. a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
  3. Connects devices in a network to each other, and allows them to 'talk' by exchanging data packets.
  4. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  5. A class of network device that's designed to connect networks at OSI Level 2.
Down
  1. a combination transmitter/receiver in a single package.
  2. A device used at the customer premises to terminate a dial-up Integrated Services Digital Network (ISDN) line and connect it to a computer or a local area network (LAN).
  3. Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.

8 Clues: a combination transmitter/receiver in a single package.A computer that sits between different networks or applicationsA class of network device that's designed to connect networks at OSI Level 2.Connects devices in a network to each other, and allows them to 'talk' by exchanging data packets....

Cybersecurity Fundamentals Chapter 1 2024-06-02

Cybersecurity Fundamentals Chapter 1 crossword puzzle
Across
  1. Identifies and explains various cybersecurity threats that affect individuals, businesses, and organizations. It covers the nature of these threats and their potential impact .
  2. Involves the collaboration between businesses, government agencies, and countries to share information about serious cyberattacks.
  3. Professionals dedicated to protecting information systems and networks from cyber threats.
  4. refers to the broad scope of cybersecurity, which includes understanding the history and evolution of hacking, the role of cyber criminals, and the ongoing need for cybersecurity professionals to protect data and systems .
  5. The various areas within cybersecurity, such as big data, data analytics, and the responsibilities of businesses to protect data.
Down
  1. Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals.
  2. Individuals or groups who use computers, networks, and the internet to commit illegal activities.
  3. The frameworks and guidelines, such as the ISO 27000 series, that help organizations implement effective cybersecurity measures.

8 Clues: Professionals dedicated to protecting information systems and networks from cyber threats.Individuals or groups who use computers, networks, and the internet to commit illegal activities.Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals....

Technology Crossword 2015-02-01

Technology Crossword crossword puzzle
Across
  1. means memory
  2. joins two networks together
  3. Printed circuit board
  4. what your computer runs on
  5. What you are using
  6. allows you to browse the web
  7. a person who uses computers to gain unauthorised access to data.
  8. Drive- An optical disc drive that reads and writes all common CD and DVD formats.
Down
  1. abbreviation for the word Operating System.
  2. a device used for browsing
  3. has two buttons and a scroll bar
  4. numbering system with two unique numbers
  5. Carries out all the work inside the computer
  6. allows you to connect to the internet
  7. Card- is an electronic device that connects a computer to a computer network
  8. Drive- A data storage device

16 Clues: means memoryWhat you are usingPrinted circuit boarda device used for browsingwhat your computer runs onjoins two networks togetherallows you to browse the webDrive- A data storage devicehas two buttons and a scroll barallows you to connect to the internetnumbering system with two unique numbersabbreviation for the word Operating System....

NETWORKING CONCEPS PUZZLE 2025-06-07

NETWORKING CONCEPS PUZZLE crossword puzzle
Across
  1. Short form of" Local Area Network".
  2. Common example of WAN.
  3. Each computers in a network.
  4. Something similar to Hub.
  5. Topology where all nodes are connected in a circular manner.
  6. Short form of 'Wide Area Network".
  7. Topology that connects devices to central hub or switch.
  8. Topology that can handle large volume of data traffic.
Down
  1. Computer network enables two or more computers to share.
  2. It is the network larger than LAN.
  3. Topology that requires a single communication line or one main cable.
  4. Network card used most commonly.
  5. An address format for communication.
  6. A computer network created for an individual.
  7. Network Topologies are categorised into how many types ?
  8. It connects two different networks.

16 Clues: Common example of WAN.Something similar to Hub.Each computers in a network.Network card used most commonly.It is the network larger than LAN.Short form of 'Wide Area Network".Short form of" Local Area Network".It connects two different networks.An address format for communication.A computer network created for an individual....

networks 2019-05-17

networks crossword puzzle
Across
  1. A dumb switch
  2. This network hardware sounds like it should be riding on a broomstick! (6 letters)
Down
  1. Network Cable

3 Clues: Network CableA dumb switchThis network hardware sounds like it should be riding on a broomstick! (6 letters)

Vocabulary Lesson 2 Jenifer S 2017-03-02

Vocabulary Lesson 2 Jenifer S crossword puzzle
Across
  1. software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  2. A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
  3. is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
  4. a unit of information equal to one billion (109) or, strictly, 230 bits.
  5. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
  6. is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. ... In computer literature, kilobyte is usually abbreviated as K or KB.
  7. the way in which something is arranged or set out.
  8. a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  9. Basis point refers to a common unit of measure for interest rates and other percentages in finance.
  10. the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
  11. Is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
  12. the introductory page of a website, typically serving as a table of contents for the site.
  13. abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
  14. the process of converting information or data into a code, especially to prevent unauthorized access.
  15. The Internet's system for converting alphabetic names into numeric IP addresses.
  16. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Down
  1. a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
  2. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
  3. Java was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network
  4. to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.
  5. is an input device that scans documents and images, which can be imported into a computer
  6. a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
  7. dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
  8. a person who uses computers to gain unauthorized access to data.

24 Clues: the way in which something is arranged or set out.a person who uses computers to gain unauthorized access to data.a unit of information equal to one billion (109) or, strictly, 230 bits.The Internet's system for converting alphabetic names into numeric IP addresses....

Emerging Tech Vocab 2023-10-10

Emerging Tech Vocab crossword puzzle
Across
  1. a duplicate of content on a storage medium
  2. Wireless communication technology
  3. a series of related instructions
  4. device, I small device designed to be worn
  5. sometimes called a host computer
  6. media, a computer that keeps data,
  7. creates images using a laser beam
  8. device, stores data and instructions
  9. device, allows component you to enter data
Down
  1. console, A mobile device designed for video games
  2. Camera, A mobile device to take pictures
  3. Software that enables a user's connection.
  4. device, allows you to get results
  5. tells the computer what tasks to perform.
  6. A collection of computers
  7. Process of matching the files on computers
  8. store instructions waiting to be executed
  9. drive, Term used to refer collectively to hard disks
  10. a worldwide collection of computer networks
  11. program designed to make users more productive.

20 Clues: A collection of computersa series of related instructionssometimes called a host computerWireless communication technologydevice, allows you to get resultscreates images using a laser beammedia, a computer that keeps data,device, stores data and instructionsCamera, A mobile device to take picturestells the computer what tasks to perform....

Wireless Network 2021-03-02

Wireless Network crossword puzzle
Across
  1. Unique number for identifying a device on a mobile network.
  2. Invisible radio frequencies that wireless signals travel over.
Down
  1. Describe the protocols for 2G digital cellular networks used by mobile devices.
  2. digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM.
  3. Channel access method for shared-medium networks which share the same frequency channel by dividing the signal into different time slots.

5 Clues: Unique number for identifying a device on a mobile network.Invisible radio frequencies that wireless signals travel over.Describe the protocols for 2G digital cellular networks used by mobile devices.digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM....

The Global Network 2024-04-25

The Global Network crossword puzzle
Across
  1. a trade route between China and the Mediterranean.
  2. the connection of different parts of the world.
  3. President,electons
  4. Bollywood,Costumes,McDonald's
Down
  1. internet,cellphones,networks
  2. vacations,tourists,travelers

6 Clues: President,electonsinternet,cellphones,networksvacations,tourists,travelersBollywood,Costumes,McDonald'sthe connection of different parts of the world.a trade route between China and the Mediterranean.

society of Indus 2025-10-15

society of Indus crossword puzzle
Across
  1. urban structure a grid layout with streets intersecting at right angles, standardized brick sizes, and advanced sanitation systems with private and public drains
  2. supported a large rural population and fed the urban centers
Down
  1. cities highly organized, grid-patterned cities
  2. drainage systems covered drains, private toilets, and engineered sewer networks in cities like Mohenjo-daro and Harappa
  3. management sophisticated sanitation, elaborate drainage networks, and water storage solutions like wells and reservoirs

5 Clues: cities highly organized, grid-patterned citiessupported a large rural population and fed the urban centersdrainage systems covered drains, private toilets, and engineered sewer networks in cities like Mohenjo-daro and Harappamanagement sophisticated sanitation, elaborate drainage networks, and water storage solutions like wells and reservoirs...

Brain Drain 2021-10-20

Brain Drain crossword puzzle
Across
  1. countries connected with ?
  2. parents learn it to child
  3. People with a job
Down
  1. connection in the world
  2. you must have it to travel
  3. workers who form a group

6 Clues: People with a jobconnection in the worldworkers who form a groupparents learn it to childyou must have it to travelcountries connected with ?

Industrial Revolution 2019-02-17

Industrial Revolution crossword puzzle
Across
  1. artifact by weaving synthetic fibers
  2. productive work
  3. increase in percentage of people living in urban areas
Down
  1. a branch of socialism that emphasizes exploitation of class
  2. communicating by transmitting signals
  3. networks of iron rails
  4. a system in which society controls production

7 Clues: productive worknetworks of iron railsartifact by weaving synthetic fiberscommunicating by transmitting signalsa system in which society controls productionincrease in percentage of people living in urban areasa branch of socialism that emphasizes exploitation of class

Linux 2024-01-23

Linux crossword puzzle
Across
  1. Linux-based operating system
  2. has word processing and spreadsheet programs
  3. allows Linux computers to connect to networks
  4. able to be modified by the user
  5. used to input command lines
Down
  1. how users communicate with a computer
  2. distributes products and software

7 Clues: used to input command linesLinux-based operating systemable to be modified by the userdistributes products and softwarehow users communicate with a computerhas word processing and spreadsheet programsallows Linux computers to connect to networks

Networks 2019-05-17

Networks crossword puzzle
Across
  1. This network hardware sounds like it should be riding on a broomstick! (6 letters)
Down
  1. Network Cable
  2. A dumb switch

3 Clues: Network CableA dumb switchThis network hardware sounds like it should be riding on a broomstick! (6 letters)

networks 2026-02-11

networks crossword puzzle
Across
  1. cable
Down
  1. point
  2. optic cable

3 Clues: pointcableoptic cable

glossary of terms 2019-09-26

glossary of terms crossword puzzle
Across
  1. the address of a web page
  2. word,phrase or image that can link you to another page or document
  3. using search engine to search for information
  4. electronic mail
Down
  1. virtual computer world in which communication over computer networks occurs
  2. a program on your computer that allows you to visit websites
  3. wireless connection
  4. electronic junk mail or posting
  5. universal resource locator

9 Clues: electronic mailwireless connectionthe address of a web pageuniversal resource locatorelectronic junk mail or postingusing search engine to search for informationa program on your computer that allows you to visit websitesword,phrase or image that can link you to another page or document...

Introduction to 4G 2024-11-19

Introduction to 4G crossword puzzle
Across
  1. Simplified network architecture in LTE
  2. Component responsible for policy and charging control in EPC
  3. Gateway forwarding data between base stations and PDN
  4. Entity managing high-level mobile operations in EPC.
Down
  1. Card running the USIM application in LTE devices
  2. Wireless broadband technology succeeding 3G
  3. Key modulation technique for efficient spectrum use in LTE
  4. EPC gateway communicating with external networks
  5. LTE base station acronym

9 Clues: LTE base station acronymSimplified network architecture in LTEWireless broadband technology succeeding 3GCard running the USIM application in LTE devicesEPC gateway communicating with external networksEntity managing high-level mobile operations in EPC.Gateway forwarding data between base stations and PDN...

healthcare 2025-06-13

healthcare crossword puzzle
Across
  1. – Computer ______ helps detect tumors from scans
  2. – AI helps decode activity in this central organ
  3. – Networks that mimic brain structure
  4. – Basic tool AI uses in diagnostics
Down
  1. – AI can assist in transplant matching of this
  2. – Used in precision surgeries
  3. – CT and MRI are examples of these AI-enhanced diagnostics
  4. – Attached to skin to record body signals
  5. – AI is used in personalized physical ______ therapy

9 Clues: – Used in precision surgeries– Basic tool AI uses in diagnostics– Networks that mimic brain structure– Attached to skin to record body signals– AI can assist in transplant matching of this– Computer ______ helps detect tumors from scans– AI helps decode activity in this central organ– AI is used in personalized physical ______ therapy...

luis castillo 2013-03-26

luis castillo crossword puzzle
Across
  1. ENGINE Software that searches and gathers information.
  2. To bully online.
  3. Software program that is made to damage files on a computer.
  4. a global network.
  5. NETWORKS online thing were people communicate.
Down
  1. reload a webpage on the internet.
  2. a person who gains access to computer files.
  3. to copy someones word.
  4. A website that can be edited by anyone with access it.

9 Clues: To bully online.a global network.to copy someones word.reload a webpage on the internet.a person who gains access to computer files.NETWORKS online thing were people communicate.ENGINE Software that searches and gathers information.A website that can be edited by anyone with access it.Software program that is made to damage files on a computer.

Networking (Ans) 2025-08-01

Networking (Ans) crossword puzzle
Across
  1. Directs traffic between networks
  2. Table tennis is also called ____-pong
  3. The energy or mental capacity required to deal with a situation
Down
  1. A harbour
  2. A structure carrying a road over obstacle
  3. "Light ______" by Charlie Puth
  4. The number of layers in the OSI Model
  5. A network device that monitors and filters network traffic
  6. The effective centre of an activity, region, or network

9 Clues: A harbour"Light ______" by Charlie PuthDirects traffic between networksThe number of layers in the OSI ModelTable tennis is also called ____-pongA structure carrying a road over obstacleThe effective centre of an activity, region, or networkA network device that monitors and filters network traffic...

Network Components 2022-10-27

Network Components crossword puzzle
Across
  1. a device used at the customer premises to terminate a dial-up Integrated Services Digital Network line and connect it to a computer or a local area network
  2. a transmitter and a receiver of signals, such as analog or digital
  3. a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
  4. a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals
  5. is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
  1. networking devices that connect networks
  2. a network node used in telecommunications that connects two networks with different transmission protocols together
  3. a hardware component responsible for relaying data from a computer network to the destination endpoint

8 Clues: networking devices that connect networksa transmitter and a receiver of signals, such as analog or digitala transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signalsa hardware component responsible for relaying data from a computer network to the destination endpoint...

Quiz 1 Review 2023-09-29

Quiz 1 Review crossword puzzle
Across
  1. Information that can be used to identify you.
  2. A collection of web pages.
  3. A world wide network.
  4. Information that cannot be used to identify who you are.
  5. Software used to view web pages.
  6. Two or more connected computers.
  7. A tool used to preform a task.
Down
  1. All the information about a person that exists on the internet.
  2. A central computer that serves computers on a network.
  3. An engine is a software program, that helps users to find information.
  4. A collection of public websites.
  5. Internet Service Provider.
  6. First sent in 1971 by Ray Tomlinson.
  7. A hypertext document.
  8. All the activities preformed using the internet.
  9. Connects two or more networks.

16 Clues: A world wide network.A hypertext document.A collection of web pages.Internet Service Provider.Connects two or more networks.A tool used to preform a task.A collection of public websites.Software used to view web pages.Two or more connected computers.First sent in 1971 by Ray Tomlinson.Information that can be used to identify you....

Name and Fibers 2021-09-29

Name and Fibers crossword puzzle
Across
  1. An animal that is used for its fibers
  2. something that can be turned into a thread
  3. the plant used to make most clothes and blanket
  4. The act of moving something from one place to another
  5. A natural fiber produced from goats
  6. The animals that produce cashmere
  7. A species of Flowering plant
  8. A object that is used to collect fibers
Down
  1. something made to intimate something natural
  2. the fiber produced by sheeps
  3. The fiber made from the thick skin of a coconut
  4. A naturally occurring fibrous silicate metal
  5. The Person that created this
  6. A fiber made from intertwining networks or yarn and thread
  7. A cloth obtained from SlikWorms
  8. Something not man made

16 Clues: Something not man madethe fiber produced by sheepsThe Person that created thisA species of Flowering plantA cloth obtained from SlikWormsThe animals that produce cashmereA natural fiber produced from goatsAn animal that is used for its fibersA object that is used to collect fiberssomething that can be turned into a thread...

Computational linguistics 2024-09-25

Computational linguistics crossword puzzle
Across
  1. The technology driving modern machine translation
  2. Large datasets that help improve AI and translation.
  3. Advanced translation method using AI and deep learning.
  4. Machine learning technique involving neural networks.
  5. Short form of neural machine translation.
  6. Adapting a product to meet language and cultural standards.
  7. Company that provided AI translation at Boao Forum.
  8. Widely used CAT software.
  9. Popular online translation tool.
Down
  1. Forum where AI-based simultaneous interpretation was showcased.
  2. Connected devices communicating over the internet.
  3. AI’s ability to learn from data to improve performance.
  4. Database of previous translations used to assist translators.
  5. Computing services that support machine translation.
  6. Abbreviation for computer-assisted translation.
  7. Google’s neural machine translation system.

16 Clues: Widely used CAT software.Popular online translation tool.Short form of neural machine translation.Google’s neural machine translation system.Abbreviation for computer-assisted translation.The technology driving modern machine translationConnected devices communicating over the internet.Company that provided AI translation at Boao Forum....

Data Privacy! 2017-01-23

Data Privacy! crossword puzzle
Across
  1. Some stores and other locations use this to track movements while you are within range.
  2. Criminal activities carried out by means of computers or the Internet.
  3. The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
  4. Unsolicited commercial e-mail.
  5. Series of words used as a password
  6. The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
  7. Any person other than - (a) the data subject, (b) the data controller, or (c) any data processor or other person authorised to process data for the data controller or processor.
  8. A small text file stored on a client machine that may later be retrieved by a web server from the machine.
  9. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
  1. Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
  2. Information collected and maintained by a government entity and available to the general public.
  3. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  4. May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
  5. The conversion of digital information into a format unreadable to anyone except those possessing a “key”
  6. Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

15 Clues: Unsolicited commercial e-mail.Series of words used as a passwordCriminal activities carried out by means of computers or the Internet.May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)Some stores and other locations use this to track movements while you are within range....

Dewey's Tech Review 2022-12-05

Dewey's Tech Review crossword puzzle
Across
  1. a simulated experience that employs pose tracking and 3D near-eye displays to give the user an immersive feel of a virtual world
  2. a string of characters that allows access to a computer system or service
  3. methods, systems, and devices which are the result of scientific knowledge being used for practical purposes.
  4. allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area
  5. a computer network that links devices within a building or group of adjacent buildings.
  6. software used by computers to mimic aspects of human intelligence
Down
  1. piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  2. type of security that protects the integrity of a computer network and the data within it.
  3. branch of technology that deals with the design, construction, operation, and application of robots branch of technology that deals with the design, construction, operation, and application of robots
  4. any hardware device used to send data from a computer to another device or user
  5. the type of security that deals with personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage.
  6. any kind of unwanted, unsolicited digital communication that gets sent out in bulk
  7. any hardware device that sends data to a computer, allowing you to interact with and control it.
  8. a computer network that spans a limited geographic area and interconnects multiple local area networks
  9. type of scan that is 20,000 times more accurate than a fingerprint

15 Clues: software used by computers to mimic aspects of human intelligencetype of scan that is 20,000 times more accurate than a fingerprinta string of characters that allows access to a computer system or serviceany hardware device used to send data from a computer to another device or user...

Sport and Media 2 2025-04-09

Sport and Media 2 crossword puzzle
Across
  1. the gap between those with access to new technologies and those without
  2. media executives, editors, or reporters who can open or close the “gate” on a particular news story
  3. the social networks and the reciprocal norms associated with these networks that encourage people to do things for each other
Down
  1. an argument that the media sets the boundaries of public debate by deciding which issues will receive coverage and which will not
  2. respected individuals in the community
  3. a belief that as more people accept common opinions the people who disagree are less likely to voice their views
  4. a theory that states as new information enters society, wealthy and better-educated members acquire it at a faster that poor and less-educated people

7 Clues: respected individuals in the communitythe gap between those with access to new technologies and those withoutmedia executives, editors, or reporters who can open or close the “gate” on a particular news storya belief that as more people accept common opinions the people who disagree are less likely to voice their views...

Data Privacy! 2017-01-23

Data Privacy! crossword puzzle
Across
  1. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  2. A small text file stored on a client machine that may later be retrieved by a web server from the machine.
  3. The obligation of an individual, organization or business to protect personal information and not misuse or wrongfully disclose that information.
  4. Enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  5. The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
  6. Any person other than - (a) the data subject, (b) the data controller, or (c) any data processor or other person authorised to process data for the data controller or processor.
  7. Computer-mediated technologies that allow the creating and sharing of information via virtual communities and networks
  8. Unsolicited commercial e-mail.
  9. The conversion of digital information into a format unreadable to anyone except those possessing a “key”
Down
  1. Criminal activities carried out by means of computers or the Internet.
  2. Some stores and other locations use this to track movements while you are within range.
  3. Information collected and maintained by a government entity and available to the general public.
  4. May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)
  5. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  6. Series of words used as a password

15 Clues: Unsolicited commercial e-mail.Series of words used as a passwordCriminal activities carried out by means of computers or the Internet.May be Explicit (i.e. opt-in) or Implicit (i.e. the individual didn’t opt out)Some stores and other locations use this to track movements while you are within range....

TEST 1 2022-02-10

TEST 1 crossword puzzle
Across
  1. A security benefit that verifies data is unmodified and therefore original, complete and intact.
  2. Anything that is used in and is necessary to the completion of a business task.
  3. An attack focusing on people rather than technology. This type of attack is psychological and aims to either gain access to information or to a logical or physical environment.
Down
  1. An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
  2. Software that automatically displays or downloads material when a user is offline.
  3. A social engineering attack that attempts to collect information from victims. This attacks can take place over e-mail, text messages, through social networks or via smart phone apps.
  4. An error or mistake in software coding or hardware design or construction
  5. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP.

8 Clues: An error or mistake in software coding or hardware design or constructionAnything that is used in and is necessary to the completion of a business task.Software that automatically displays or downloads material when a user is offline.An internet traffic filter meant to stop unauthorized incoming and outgoing traffic....

Network Components 2022-10-27

Network Components crossword puzzle
Across
  1. A computer that sits between different networks or applications
  2. a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
  3. Connects devices in a network to each other, and allows them to 'talk' by exchanging data packets.
  4. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  5. A class of network device that's designed to connect networks at OSI Level 2.
Down
  1. a combination transmitter/receiver in a single package.
  2. A device used at the customer premises to terminate a dial-up Integrated Services Digital Network (ISDN) line and connect it to a computer or a local area network (LAN).
  3. Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.

8 Clues: a combination transmitter/receiver in a single package.A computer that sits between different networks or applicationsA class of network device that's designed to connect networks at OSI Level 2.Connects devices in a network to each other, and allows them to 'talk' by exchanging data packets....

HSS1101 Crossword 1 2020-09-02

HSS1101 Crossword 1 crossword puzzle
Across
  1. dimension of health that involves the body
  2. positive forces that contribute to resiliency
  3. a benefit of achieving optimal health
  4. the health that thinks of you
  5. a predisposing factor that can influence behaviour change
  6. when you achieve higher levels in each dimension of health
  7. most common emotional disorder in Canada
  8. model
  9. purposely stopping negative thoughts
  10. dimension of health that involves your job
Down
  1. traits that protect from threat or harm
  2. dimension of health that includes social networks
  3. sense of respect
  4. this type of prevention includes treatment and rehabilitation
  5. the first stage of change in the
  6. careful observation of others
  7. belief in ability (personal control)
  8. the health that looks at inner well-being
  9. this type of prevention stops health problems before they start

19 Clues: modelsense of respectthe health that thinks of youcareful observation of othersthe first stage of change in thebelief in ability (personal control)purposely stopping negative thoughtsa benefit of achieving optimal healthtraits that protect from threat or harmmost common emotional disorder in Canadathe health that looks at inner well-being...

Computing Support Vocabulary 2 2022-04-09

Computing Support Vocabulary 2 crossword puzzle
Across
  1. data and programs stored on the internet
  2. main 'brain' of a computer
  3. a personal, digital address
  4. click and drag across text to manipulate it
  5. a network of computer networks
  6. a document on the internet
  7. the home screen of the computer
Down
  1. hide a window from view
  2. software program used to view websites
  3. an image used to represent a file or program
  4. the visuals of texts, graphics and tables
  5. storage device outside the computer
  6. central wheel of the mouse for page functions
  7. data generated by the computer
  8. data entered into a computer
  9. position of the mouse pointer over top an icon
  10. collection of computers that are connected
  11. a list of options available in a software program
  12. to point and choose an object on a computer screen

19 Clues: hide a window from viewmain 'brain' of a computera document on the interneta personal, digital addressdata entered into a computerdata generated by the computera network of computer networksthe home screen of the computerstorage device outside the computersoftware program used to view websitesdata and programs stored on the internet...

FAI Crossword 2025-04-28

FAI Crossword crossword puzzle
Across
  1. Platform hosting pre-trained AI models
  2. Company behind ChatGPT and DALL-E
  3. AI program designed for conversation
  4. Computing system modeled after the brain
  5. Input given to an AI model
  6. Field where AI interprets visual data
  7. Field of study that gives computers the ability to learn
Down
  1. Subfield of machine learning with neural networks
  2. AI tool for generating artistic images
  3. AI system like Siri or Alexa
  4. Using AI to perform tasks without human help
  5. Google's open-source machine learning framework
  6. AI model that creates images from text prompts
  7. Company behind Stable Diffusion
  8. Deep learning library by Meta
  9. OpenAI's powerful language model
  10. GitHub's AI tool that suggests code
  11. Google's AI chatbot rival to ChatGPT
  12. Acronym for large language model

19 Clues: Input given to an AI modelAI system like Siri or AlexaDeep learning library by MetaCompany behind Stable DiffusionOpenAI's powerful language modelAcronym for large language modelCompany behind ChatGPT and DALL-EGitHub's AI tool that suggests codeAI program designed for conversationGoogle's AI chatbot rival to ChatGPT...

Trade and Transport 2017-05-23

Trade and Transport crossword puzzle
Across
  1. Goods used that cannot be seen e.g. mobile networks
  2. items manufactured in factories
  3. used to transport goods internationally
  4. exchange of goods and services
Down
  1. travels on water
  2. raw materials used to manufacture goods or services
  3. carries cargo and other goods

7 Clues: travels on watercarries cargo and other goodsexchange of goods and servicesitems manufactured in factoriesused to transport goods internationallyGoods used that cannot be seen e.g. mobile networksraw materials used to manufacture goods or services

Muscle Fibers 2024-01-17

Muscle Fibers crossword puzzle
Across
  1. only in the heart
  2. muscles that are trainable
  3. a native compound that people take supplements of
Down
  1. muscles that are involuntary and line organs
  2. formation of new capillary networks around a muscle fib
  3. causes soreness in muscles
  4. age related muscle atrophy

7 Clues: only in the heartcauses soreness in musclesage related muscle atrophymuscles that are trainablemuscles that are involuntary and line organsa native compound that people take supplements offormation of new capillary networks around a muscle fib

Computer Revision 2019-11-03

Computer Revision crossword puzzle
Across
  1. Networking device used to connect several computers together
  2. Network created using Bluetooth connection
  3. Memory that has hardware related instructions
  4. Computer connects all the computers in a network
  5. Network device that connects several computers together
  6. Oldest category of printers
  7. Memory that saves information as long as the computer is turned ON.
  8. group of connected computers
Down
  1. The brain of the computer
  2. Network established in a floor or a building
  3. Computers are divided into Software and
  4. Output device used to reproduce document on papers
  5. The main purpose of computer networks is to ...... information
  6. The most economical printer
  7. Printer that consumes too much ink
  8. Network extended to several buildings

16 Clues: The brain of the computerThe most economical printerOldest category of printersgroup of connected computersPrinter that consumes too much inkNetwork extended to several buildingsComputers are divided into Software andNetwork created using Bluetooth connectionNetwork established in a floor or a buildingMemory that has hardware related instructions...

Computer Revision 2019-11-03

Computer Revision crossword puzzle
Across
  1. Network device that connects several computers together
  2. The most economical printer
  3. Group of connected computers
  4. Network established in a floor or a building
  5. Computer connects all the computers in a network
  6. The main purpose of computer networks is to ...... information
  7. Computers are divided into Software and
Down
  1. Network created using Bluetooth connection
  2. Oldest category of printers
  3. Printer that consumes too much ink
  4. The brain of the computer
  5. Memory that saves information as long as the computer is turned ON.
  6. Output device used to reproduce document on papers
  7. Memory that has hardware related instructions
  8. Networking device used to connect several computers together
  9. Network extended to several buildings

16 Clues: The brain of the computerOldest category of printersThe most economical printerGroup of connected computersPrinter that consumes too much inkNetwork extended to several buildingsComputers are divided into Software andNetwork created using Bluetooth connectionNetwork established in a floor or a buildingMemory that has hardware related instructions...

Computer Network Puzzle 2020-08-02

Computer Network Puzzle crossword puzzle
Across
  1. A company that gives people internet access.
  2. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  3. A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
  4. The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
Down
  1. A device which controls access to separately stored files, as part of a multi-user system.
  2. a set of rules or procedures for transmitting data between electronic devices, such as computers.
  3. Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
  4. group/system of interconnected people or things.

8 Clues: A company that gives people internet access.group/system of interconnected people or things.A device which controls access to separately stored files, as part of a multi-user system.a set of rules or procedures for transmitting data between electronic devices, such as computers....

bcs review by kayla murry 2015-11-11

bcs review by kayla murry crossword puzzle
Across
  1. websites with a fancy word in it
  2. Information that sends you to another website
  3. taking objects from the computer and turning it on paper
  4. a way to show more words in a row.
  5. and software that hooks up to the computer
  6. typing with out looking down
  7. anything that keeps comfort and privacy
  8. Information on computers
  9. Something that goes in a sentence
Down
  1. software that can be used to browse things.
  2. something that doesn't mix up the letters
  3. drives objects that save information on tiny objects
  4. typing with and without looking
  5. keys to show symbols and signs
  6. Pages that are on computers that can be viewed
  7. Things that makes words and sentences

16 Clues: Information on computerstyping with out looking downkeys to show symbols and signstyping with and without lookingwebsites with a fancy word in itSomething that goes in a sentencea way to show more words in a row.Things that makes words and sentencesanything that keeps comfort and privacysomething that doesn't mix up the letters...

Quiz 1 Review 2023-09-29

Quiz 1 Review crossword puzzle
Across
  1. Information that can be used to identify you.
  2. A collection of web pages.
  3. A world wide network.
  4. Information that cannot be used to identify who you are.
  5. Software used to view web pages.
  6. Two or more connected computers.
  7. A tool used to preform a task.
Down
  1. All the information about a person that exists on the internet.
  2. A central computer that serves computers on a network.
  3. An engine is a software program, that helps users to find information.
  4. A collection of public websites.
  5. Internet Service Provider.
  6. First sent in 1971 by Ray Tomlinson.
  7. A hypertext document.
  8. All the activities preformed using the internet.
  9. Connects two or more networks.

16 Clues: A world wide network.A hypertext document.A collection of web pages.Internet Service Provider.Connects two or more networks.A tool used to preform a task.A collection of public websites.Software used to view web pages.Two or more connected computers.First sent in 1971 by Ray Tomlinson.Information that can be used to identify you....

IELTS Science & Tech Vocabulary 2025-09-03

IELTS Science & Tech Vocabulary crossword puzzle
Across
  1. A sudden and important discovery or development
  2. The investigation of outer space through tech
  3. A new method, idea, or product
  4. Highly advanced and innovative
  5. Based on or guided by data
  6. The most advanced or sophisticated version available
  7. The imitation of intelligent human behavior
  8. The period characterized by the internet
  9. The gap between those with and without technology
Down
  1. Technology dealing with robots
  2. Involving advanced technological development
  3. High levels of technological development
  4. The use of machines to perform tasks without human involvement
  5. A digital space used for interaction or services
  6. The practice of protecting systems and networks from attacks
  7. Easy to understand or use

16 Clues: Easy to understand or useBased on or guided by dataTechnology dealing with robotsA new method, idea, or productHighly advanced and innovativeHigh levels of technological developmentThe period characterized by the internetThe imitation of intelligent human behaviorInvolving advanced technological development...

Antanaysiah's Engineering Careers Puzzle 2013-08-26

Antanaysiah's Engineering Careers Puzzle crossword puzzle
Across
  1. works with trains, cars, cargo etc.
  2. work for the federal government
  3. works with components and systems used to build computers
  4. Inspector A building inspector
  5. applies biology chemistry and electrical engineer
  6. responsible for installation of refrigerators
  7. Interested in how the stars and planets are born
  8. Creates detailed designs of buildings, roads, and machinery
  9. Inspector Managing safety equipment
Down
  1. Engineer they preform entry level professional engineering
  2. Engineer To study and solve problems with rocks and soil term geo
  3. Engineer They use food technology for food science
  4. deals with converting electrical areas
  5. Creates and carves objects
  6. components from drawings to high standard
  7. Aircraft
  8. required to operate heavy industrial machines
  9. Hygienist use aerospace and networks
  10. they check ton make sure they meet the standards

19 Clues: AircraftCreates and carves objectsInspector A building inspectorwork for the federal governmentworks with trains, cars, cargo etc.Inspector Managing safety equipmentHygienist use aerospace and networksdeals with converting electrical areascomponents from drawings to high standardrequired to operate heavy industrial machines...

Functionality and performance of network systems 2024-08-04

Functionality and performance of network systems crossword puzzle
Across
  1. A network security protocol
  2. Software used to protect a network
  3. Address A type of network address
  4. A network protocol for data transmission
  5. A network connection method
  6. A network that covers a small geographical area
  7. A network connection issue
  8. Address A unique identifier for a network device
  9. A network device that filters traffic
  10. The speed at which data can be transferred
  11. A device that connects multiple networks
Down
  1. A measure of network reliability
  2. A measure of network performance
  3. A network that covers a large geographical area
  4. A type of network attack
  5. The physical components of a network
  6. A type of network cable
  7. A network device that amplifies signals
  8. A type of network topology where all devices are connected to a central point
  9. A network topology where devices are connected in a line

20 Clues: A type of network cableA type of network attackA network connection issueA network security protocolA network connection methodA measure of network reliabilityA measure of network performanceAddress A type of network addressSoftware used to protect a networkThe physical components of a networkA network device that filters traffic...

Marketing & Technologies 2013-07-10

Marketing & Technologies crossword puzzle
Across
  1. commerce conducted electronically
  2. Personalization of high volumes
  3. Bid for product and services over the internet
  4. global system of interconnected computer networks
  5. Anything related to computing technology
Down
  1. Efficient handling of information and resources within a commercial organization
  2. Electronic interpretation of information
  3. Company's interaction with customers
  4. Set of activities that control how materials and products move from the initial source to the end user

9 Clues: Personalization of high volumescommerce conducted electronicallyCompany's interaction with customersElectronic interpretation of informationAnything related to computing technologyBid for product and services over the internetglobal system of interconnected computer networks...

UNIT DETAILS 2023-09-26

UNIT DETAILS crossword puzzle
Across
  1. Someone who conveys messages or information very well.
  2. A base for launching or supporting something.
  3. How is it connected to other things?
  4. Doing what's right based on strong values.
  5. To evaluate or determine the value or quality of something.
  6. Systems of interconnected things or people.
Down
  1. How does it work?
  2. Why is it like it is?
  3. The principles of right and wrong behavior.

9 Clues: How does it work?Why is it like it is?How is it connected to other things?Doing what's right based on strong values.The principles of right and wrong behavior.Systems of interconnected things or people.A base for launching or supporting something.Someone who conveys messages or information very well....

UNIT DETAILS 2023-09-26

UNIT DETAILS crossword puzzle
Across
  1. Someone who conveys messages or information very well.
  2. A base for launching or supporting something.
  3. How is it connected to other things?
  4. Doing what's right based on strong values.
  5. To evaluate or determine the value or quality of something.
  6. Systems of interconnected things or people.
Down
  1. How does it work?
  2. Why is it like it is?
  3. The principles of right and wrong behavior.

9 Clues: How does it work?Why is it like it is?How is it connected to other things?Doing what's right based on strong values.The principles of right and wrong behavior.Systems of interconnected things or people.A base for launching or supporting something.Someone who conveys messages or information very well....

HTHSCI 3GG3 - Policy Development (3I+E Model) Crossword 2020-12-04

HTHSCI 3GG3 - Policy Development (3I+E Model) Crossword crossword puzzle
Across
  1. The ability to overturn government decisions
  2. Type of influence which can include engendering an anticipatory reaction and influencing public opinion
  3. A policy is more likely to be developed if influential interest groups face _____ benefits
  4. If a governor signed a bill which reduces funding for prenatal care but maintains the core-bargain, then that change can be ______
  5. Types of pluralist policy networks in which organized interests primarily assume a policy advocacy role, such as the ONA in Ontario
  6. If citizens invest in a local hospital, and a policy aims to expand access-to-care in the same hospital, then the citizens are considered to be in a ___ effect (hint: Type of interpretive effect)
  7. A policy is more likely to be developed if influential interest groups face _____ costs
Down
  1. Part of the 3I+E model that encompasses government structures, policy legacies, and policy networks
  2. Type of influence which can include money (e.g., political donations) and in-kind benefits (e.g, foot soldiers). Common example with physicians where they can voice their opposition to patients
  3. Factors that can trigger action towards policy development, examples include political, economical, or technological changes
  4. A change to the private delivery model of healthcare services in Ontario (core-bargain) would be considered a highly ___ change
  5. The OMA is considered a ___ pluralist policy network
  6. ____ cake federalism, where there exists shared powers between the federal and state/provincial government
  7. _____ cake federalism, where there exists reserved powers delegated to provinces/states
  8. Encompasses knowledge/beliefs about "what is" and values/mass opinion about "what ought to be"

15 Clues: The ability to overturn government decisionsThe OMA is considered a ___ pluralist policy network_____ cake federalism, where there exists reserved powers delegated to provinces/statesA policy is more likely to be developed if influential interest groups face _____ costs...

75 2026-03-08

75 crossword puzzle
Across
  1. - language used in showbiz
  2. - ranking of fashion influence
Down
  1. - organized hunt for celebrity photos
  2. - structure of communication networks
  3. - conflict between popularity and privacy
  4. - circle of people around a star

6 Clues: - language used in showbiz- ranking of fashion influence- circle of people around a star- organized hunt for celebrity photos- structure of communication networks- conflict between popularity and privacy

Systems Chp 4 2013-02-14

Systems Chp 4 crossword puzzle
Across
  1. one of the Internet’s high-speed, long-distance communications links.
  2. an internal corporate network built using Internet and World Wide Web standards and products; used by employees to gain access to corporate information.
  3. - World Wide Web a collection of tens of thousands of independently owned computers that work together as one in an Internet service
  4. a telecommunications device that uses the physical device address in each incoming message on the network to determine to which output port it should forward the message to reach another device on the same network
Down
  1. a collection of interconnected networks, all freely exchanging information
  2. a telecommunications device that connects one LAN to another LAN that uses the same telecommunications protocol
  3. a telecommunications device that serves as an entrance to another network.
  4. a telecommunications device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing

8 Clues: one of the Internet’s high-speed, long-distance communications links.a collection of interconnected networks, all freely exchanging informationa telecommunications device that serves as an entrance to another network.a telecommunications device that connects one LAN to another LAN that uses the same telecommunications protocol...

Assignment 6 2016-02-22

Assignment 6 crossword puzzle
Across
  1. using a system attached to resources to capture data packets
  2. World Wide Web
  3. local area network
  4. using neutral rather than subjective language
  5. computers programmed to send files to browsers running on other computers
  6. both the sender and the receiver are active at the same time
  7. sequences of computers
Down
  1. using all three improvements in writing style together: concise, scannable, objective
  2. suffix to the name of a computer file
  3. program used for editing plain text files
  4. educational domain
  5. used to view web pages that may contain text, images, videos, and other multimedia
  6. internet service provider
  7. Wide-Area networks
  8. related group of networked computers
  9. Hypertext Markup Language

16 Clues: World Wide Webeducational domainlocal area networkWide-Area networkssequences of computersinternet service providerHypertext Markup Languagerelated group of networked computerssuffix to the name of a computer fileprogram used for editing plain text filesusing neutral rather than subjective language...

The Values and Ethics Working Group Crossword 2013-04-15

The Values and Ethics Working Group Crossword crossword puzzle
Across
  1. Values and Ethics Working Group abbreviation
  2. Electronic Networks' ___ Policy
  3. The Aurora _____
  4. Oshawa's basketball team nickname
  5. Demonstrating positive attributes and behaviours
  6. Misusing business mail network is NOT an example of this value statement
  7. Assistant to the Regional Manager on the sitcom "The Office"
Down
  1. Integrity, Respect, Professionalism and Cooperation make up the ___ statements
  2. Protect your ____ at all times
  3. Toronto Blue ___
  4. Name of the newsletter produced by the Values and Ethics Working Group
  5. Last name of actor in 'Oceans 11" (2001)
  6. Cultivating a harmonious work environment through teamwork
  7. One way to submit issues to the Values and Ethics Working Group
  8. Being considerate to one another
  9. Values and ___

16 Clues: Values and ___Toronto Blue ___The Aurora _____Protect your ____ at all timesElectronic Networks' ___ PolicyBeing considerate to one anotherOshawa's basketball team nicknameLast name of actor in 'Oceans 11" (2001)Values and Ethics Working Group abbreviationDemonstrating positive attributes and behaviours...

Under the Hood 2022-01-28

Under the Hood crossword puzzle
Across
  1. THE MEASUREMENT RAM USUALLY COMES IN
  2. AN INPUT DEVICE YOU USE TO CLICK
  3. WHAT IS THE HEART OF THE COMPUTER?
  4. WHEN THE DEVICE LOSES POWER, THE DATA IS LOST
  5. WHAT DOES RAM STAND FOR?
  6. TYPE OF MAGNETIC STORAGE
  7. EXAMPLE OF SOLID STATE STORAGE
  8. A WORLDWIDE NETWORK OF INTERCONNECTED NETWORKS
  9. WHAT IS THE BRAIN OF THE COMPUTER
Down
  1. WHO INVENTED THE WORLD WIDE WEB
  2. WHAT DOES WWW STAND FOR
  3. CONNECTING EVERYDAY 'THINGS' TO THE INTERNET
  4. AN OUTPUT DEVICE YOU USE TO SEE THINGS ON A DEVICE
  5. WHAT DOES CPU STAND FOR?
  6. EXAMPLE OF OPTICAL STORAGE
  7. AN OUTPUT DEVICE YOU USE TO LISTEN TO SOUND OUT LOUD

16 Clues: WHAT DOES WWW STAND FORWHAT DOES RAM STAND FOR?WHAT DOES CPU STAND FOR?TYPE OF MAGNETIC STORAGEEXAMPLE OF OPTICAL STORAGEEXAMPLE OF SOLID STATE STORAGEWHO INVENTED THE WORLD WIDE WEBAN INPUT DEVICE YOU USE TO CLICKWHAT IS THE BRAIN OF THE COMPUTERWHAT IS THE HEART OF THE COMPUTER?THE MEASUREMENT RAM USUALLY COMES IN...

CS10 Terms Reveiw 2026-03-06

CS10 Terms Reveiw crossword puzzle
Across
  1. malware used to extort money from people
  2. temporary data storage that hole frequently accessed information
  3. System that manages all basic functions in a computer
  4. stores data and instructions for quick use
  5. ___ Logic Unit (ALU)
  6. part of a computer that acts as a switch or amplifier
  7. Ransomware that spreads across files or networks to cause damage
Down
  1. main circuit in a computer system
  2. software designed for users to perform specific, productive, or entertaining tasks
  3. random ___ memory (RAM)
  4. storage that includes the SSD and HDD
  5. ___ processing unit (CPU)
  6. gates that are named AND, OR, NOT
  7. how many bits in a byte?
  8. 10100101
  9. ___ state drive, replaces an HDD in most computers now

16 Clues: 10100101___ Logic Unit (ALU)random ___ memory (RAM)how many bits in a byte?___ processing unit (CPU)main circuit in a computer systemgates that are named AND, OR, NOTstorage that includes the SSD and HDDmalware used to extort money from peoplestores data and instructions for quick useSystem that manages all basic functions in a computer...

Internet Vocabulary Crossword 2013-03-26

Internet Vocabulary Crossword crossword puzzle
Across
  1. Domain names come with different extensions of the web address based
  2. To renew or revitalize; To reload a webpage on the internet.
Down
  1. An unauthorized person who secretly gains access to computer files.
  2. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN)
  3. Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
  4. NETWORKS online communities where people meet, socialize and exchange digitcal files etc.

6 Clues: To renew or revitalize; To reload a webpage on the internet.An unauthorized person who secretly gains access to computer files.Domain names come with different extensions of the web address basedNETWORKS online communities where people meet, socialize and exchange digitcal files etc....