networks Crossword Puzzles
Internet Vocabulary Crossword 2013-03-26
Across
- Domain names come with different extensions of the web address based
- To renew or revitalize; To reload a webpage on the internet.
Down
- An unauthorized person who secretly gains access to computer files.
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN)
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- NETWORKS online communities where people meet, socialize and exchange digitcal files etc.
6 Clues: To renew or revitalize; To reload a webpage on the internet. • An unauthorized person who secretly gains access to computer files. • Domain names come with different extensions of the web address based • NETWORKS online communities where people meet, socialize and exchange digitcal files etc. • ...
Tech terms 1-3 crossword 2025-05-02
Across
- Something you can touch
- An example of a search engine
- A way to back up info on your computer
- The address of a web page
- Transferring data, files, etc, to another storage device
- The keyboard shortcut for printing
- Languages understood by a computer
- The keyboard shortcut for copying
- 8 0s and 1s
- A worldwide system of interconnected computer networks and electronic devices
- An example of an output device
Down
- An example of an input device
- An example of a browser
- A type of internal or external data storage device
- Brains of the computer
- All of the public websites or pages that can be accessed through the internet on a computer
- Something you can't touch
- The keyboard shortcut for pasting
- 0 and 1
19 Clues: 0 and 1 • 8 0s and 1s • Brains of the computer • An example of a browser • Something you can touch • Something you can't touch • The address of a web page • An example of an input device • An example of a search engine • An example of an output device • The keyboard shortcut for pasting • The keyboard shortcut for copying • The keyboard shortcut for printing • ...
Media: Key Terms 2023-04-20
Across
- A type of increased increasingly popular media coverage focused on political scandals
- Refers to topics that are usually timely, important and consequential, such as politics, international affairs and business news.
- Journalism that is based upon sensationalism and crude exaggeration.
- A law that protects witnesses from revealing certain information, especially in court.
- Defined as information that is primarily entertaining or personally useful.
- Requires broadcasters to treat political candidates equally in terms of air time.
- The term used to describe the revolutionary business tactic of producing newspapers which sold for one cent.Wire Service: A news agency that supplies syndicated news by wire to newspapers, radio, and television stations.
- The process whereby news media highlight, emphasize and give more prominence to a specific aspect of a news story.
- A person who searches for and tries to expose real or alleged corruption, scandal, or other wrongdoing.
Down
- Regulates interstate and international communications through cable, radio, television, satellite and wire
- became concerned that the monopoly audience control of the three main networks, NBC, ABC and CBS, could misuse their broadcast licenses to set a biased public agenda. The Fairness Doctrine mandated broadcast networks devote time to contrasting views on issues of public importance.
- Describes the tendency of the national media to focus on who is winning at any given time during a presidential campaign.
- To distort (information) by rendering it unfaithfully or incompletely, especially in order to reflect a particular viewpoint.
- To appear or happen gradually or to a limited degree: News filtered down to us during the day.
- The means of communication that reach large numbers of people in a short time,
- When news content suggests to news audiences that they ought to use specific issues as benchmarks for evaluating the performance of leaders and governments.
16 Clues: Journalism that is based upon sensationalism and crude exaggeration. • Defined as information that is primarily entertaining or personally useful. • The means of communication that reach large numbers of people in a short time, • Requires broadcasters to treat political candidates equally in terms of air time. • ...
Chapter 3: Business, Physical Activity, and Sport Crossword 2016-05-27
Across
- athletes are members of a workforce in which _________ is the one criterion upon which all members are judged.
- the loyalty of a ___ is the most important asset for a sports franchise.
- the National Hockey League experienced a ________ of players by team owners that lasted from September 2012 to January 2013.
- an ___________ is when an individual in some way promotes the product or service provided by the commercial interest.
- a financial agreement between an organization that hosts an event and the medium that provides coverage of that event to a large audience not physically present at the event venue.
- interaction among people through online networks and in virtual communities that have been established for the purpose of creating, sharing, and exchanging information and ideas.
- the various means of communication through which people are reached widely, including print, radio, television, the Internet and social and news networks.
- a type of athlete that is not paid to compete in sports.
Down
- organized sport in which owners hire players and market their athletes and team to make a return on their investment.
- refers to a team and all of its associated business interests.
- an athlete's career that blends professionalism and amateurism.
- a type of athlete that is paid to compete in sports.
- revenue ________ are the various ways in which a professional sports team can earn money.
- acronym for a Canadian sport funding program that combines sport and academic or working careers while training for world-class performances.
- Sports _______ has almost become an entertainment event in itself.
- a sports ______ represents athletes in all levels of business dealing.
16 Clues: a type of athlete that is paid to compete in sports. • a type of athlete that is not paid to compete in sports. • refers to a team and all of its associated business interests. • an athlete's career that blends professionalism and amateurism. • Sports _______ has almost become an entertainment event in itself. • ...
Day1-recap 2025-04-16
6 Clues: type of learning • GenAI model for generating text • unsupervised learning technique • technique for predicting discrete values • technique for predicting continuous values • subset of machine learning that uses neural networks
Data Transmission 2022-07-13
Across
- data sent simultaneously
- ARQ error detection method
- known to all users
- encrypted that is a result of putting a plaintext message through an encryption message
- stages in a network that can receive and transmit data packets
Down
- sent in both directions but not at the same time
- one direction only
- move between different networks; a network
- actual data carried in a data packet
- altered or corrupted; it is a verification method
- the usual text before an encryption algorithm
11 Clues: one direction only • known to all users • data sent simultaneously • ARQ error detection method • actual data carried in a data packet • move between different networks; a network • the usual text before an encryption algorithm • sent in both directions but not at the same time • altered or corrupted; it is a verification method • ...
Week 7 Worksheet 2023-04-19
Across
- are more social-centric and relational
- are much more fluid, self-organizing
- a fixed and prescribed network which reinfroces ego and positional power.
- are the “central nervous system” of an organization
- Different perspectives, backgrounds, and cultures
- a dominant theory in the 1960
Down
- sometimes known as the‘hub and spoke’ system
- the way we perceive/see the world drive habits and behaviors
- helps us to look beyond surface
- Welsh word signifying habitat or place of multiple
- a dominant theory in the 1950s
11 Clues: a dominant theory in the 1960 • a dominant theory in the 1950s • helps us to look beyond surface • are much more fluid, self-organizing • are more social-centric and relational • sometimes known as the‘hub and spoke’ system • Different perspectives, backgrounds, and cultures • Welsh word signifying habitat or place of multiple • ...
digitalfootprint 2016-09-09
Across
- footprint:is a digital trail that you leave
- to chat or comunicate with friends by posting.
- computer networks.
- short form of video sharing that is 6.5 sec long.
- way to get to a website faster and easeir.
Down
- any smartphone or computer to connect to internet.
- connected to the internet
- video sharing and messaging system.
- you post or go on websites.
- social media website where people can post
- something that you use to communicate with people when you don'twi have wifi
11 Clues: computer networks. • connected to the internet • you post or go on websites. • video sharing and messaging system. • social media website where people can post • way to get to a website faster and easeir. • footprint:is a digital trail that you leave • to chat or comunicate with friends by posting. • short form of video sharing that is 6.5 sec long. • ...
Scandiweb Puzzle №7 2021-04-11
Across
- Dangerous situation affecting an individual, group, or all of society
- German shoes multinational corporation
- Food consisting of salt-cured roe of the family Acipenseridae
- Type of law enforcement and law enforcement state activities
- Someone who sells raw fish and seafood
- Community of people formed on the basis of a common language
Down
- genius/video game designer
- Country in East Asia
- American online social media and social networking service
- An infectious disease
- Form of literature that uses aesthetic and often rhythmic qualities of language
- Global system of interconnected computer networks
12 Clues: Country in East Asia • An infectious disease • genius/video game designer • German shoes multinational corporation • Someone who sells raw fish and seafood • Global system of interconnected computer networks • American online social media and social networking service • Type of law enforcement and law enforcement state activities • ...
Alaina Corbitt 2015-05-04
Across
- engine software that identifies info from a database
- an online source for people to communicate with eachother
- a person who gets access to computer files in secret
- a network of other computer networks
- a program created to destroy files on a computer
- copying a piece of work and passing it off as your own
- when someones is bullying someone online
Down
- to reload a internet site
- a list of references
- a website that can be edited by anyone with access to it
- websites about a specific topic
- a web adress
12 Clues: a web adress • a list of references • to reload a internet site • websites about a specific topic • a network of other computer networks • when someones is bullying someone online • a program created to destroy files on a computer • a person who gets access to computer files in secret • engine software that identifies info from a database • ...
Alaina Corbitt 2015-05-04
Across
- a person who gets access to computer files in secret
- engine software that identifies info from a database
- an online source for people to communicate with eachother
- a web adress
- copying a piece of work and passing it off as your own
Down
- a network of other computer networks
- to reload a internet site
- a program created to destroy files on a computer
- a list of references
- when someones is bullying someone online
- websites about a specific topic
- a website that can be edited by anyone with access to it
12 Clues: a web adress • a list of references • to reload a internet site • websites about a specific topic • a network of other computer networks • when someones is bullying someone online • a program created to destroy files on a computer • a person who gets access to computer files in secret • engine software that identifies info from a database • ...
Crypto Crossword#26 2023-11-29
Across
- What is the PayPal stable coin called?
- CryptoPunks is a famous ___ art collection.
- Lido DAO provides ____ infrastructure for multiple blockchain networks.
- What is the name of the new Polygon token
- The consensus mechanism of Fantom blockchain.
- The Crypto Fear and Greed index is based on this.
Down
- The ‘R’ in PoR stands for ___
- A blockchain is secured by ______.
- Which organization is the creator of BNB token?
- Opposite of a crypto whale
- Pax Gold is backed by which precious metal?
- A token hosted on the Ethereum blockchain
12 Clues: Opposite of a crypto whale • The ‘R’ in PoR stands for ___ • A blockchain is secured by ______. • What is the PayPal stable coin called? • What is the name of the new Polygon token • A token hosted on the Ethereum blockchain • CryptoPunks is a famous ___ art collection. • Pax Gold is backed by which precious metal? • The consensus mechanism of Fantom blockchain. • ...
Crypto Crossword#26 2023-11-29
Across
- What is the name of the new Polygon token
- The ‘R’ in PoR stands for ___
- Lido DAO provides ____ infrastructure for multiple blockchain networks.
- A blockchain is secured by ______.
- The consensus mechanism of Fantom blockchain.
- Which organization is the creator of BNB token?
Down
- Pax Gold is backed by which precious metal?
- Opposite of a crypto whale
- What is the PayPal stable coin called?
- A token hosted on the Ethereum blockchain
- The Crypto Fear and Greed index is based on this.
- CryptoPunks is a famous ___ art collection.
12 Clues: Opposite of a crypto whale • The ‘R’ in PoR stands for ___ • A blockchain is secured by ______. • What is the PayPal stable coin called? • What is the name of the new Polygon token • A token hosted on the Ethereum blockchain • Pax Gold is backed by which precious metal? • CryptoPunks is a famous ___ art collection. • The consensus mechanism of Fantom blockchain. • ...
Extreme Offroad Crosswording 2025-10-05
Across
- When somethings strange with your cellular service, who do you call
- If I'm light this is my highway
- Spooky problem when a customer doesn't return your calls
- What do ALLO and Lightning McQueen have in common
- At ALLO our blood runs
- What needs confirmed when a customer calls in
- Arizona does not observe
Down
- Home not built? That's okay we will ____ before install.
- Connect to other networks by using this handy perk.
- Dusk for linear TV
- Little bars that cause big stress
- Alternative to linear Tv
12 Clues: Dusk for linear TV • At ALLO our blood runs • Alternative to linear Tv • Arizona does not observe • If I'm light this is my highway • Little bars that cause big stress • What needs confirmed when a customer calls in • What do ALLO and Lightning McQueen have in common • Connect to other networks by using this handy perk. • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Things you label so you don’t forget
- Rules limiting who can see or do things
- A promise you hold without a receipt
- The shadow you measure before it bites
- Government rule guiding healthcare data protection
- Many little fences inside one yard
- Intent written down so it can’t wander
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Keeping an up-to-date list of tech devices and app
- Be ready to bend and bounce back
- Attacker’s movement sideways inside a system
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Keeping an up-to-date list of tech devices and app
- Attacker’s movement sideways inside a system
- Government rule guiding healthcare data protection
- Things you label so you don’t forget
- Many little fences inside one yard
- A promise you hold without a receipt
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Intent written down so it can’t wander
- Be ready to bend and bounce back
- The shadow you measure before it bites
- Rules limiting who can see or do things
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • Intent written down so it can’t wander • The shadow you measure before it bites • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Networking Concepts and Cyber Ethics 2025-06-11
Across
- A scam email that tricks people.
- A basic rule or standard in computer networking.
- A global system of interconnected computers.
- A harmful program like virus or spyware.
- The respectful and responsible use of internet.
- Illegal entry into a computer system
Down
- A word or phrase used to log into your account.
- A large network that covers cities or countries.
- The full form of IP is Internet
- Refers to bullying or harming people online.
- A device that connects your computer to the internet
- A device that connects two networks.
- A network limited to a small area like a house
13 Clues: The full form of IP is Internet • A scam email that tricks people. • A device that connects two networks. • Illegal entry into a computer system • A harmful program like virus or spyware. • Refers to bullying or harming people online. • A global system of interconnected computers. • A network limited to a small area like a house • ...
Test Yourself! 2025-06-24
Across
- Unauthorized access to systems or data
- Malicious software designed to harm or exploit systems
- A fake website or link used to trick people
- messages distributed by electronic means
- Secret sequence of characters used for safety purposes
- Program that appears useful but is harmful
- File extension often used for dangerous attachments
Down
- A flaw or gap in software security
- Practice of protecting systems, networks, and programs
- Type of scam that tricks users via fake emails
- Type of attack where users are locked out unless they pay
- Common malware that replicates through a network
12 Clues: A flaw or gap in software security • Unauthorized access to systems or data • messages distributed by electronic means • Program that appears useful but is harmful • A fake website or link used to trick people • Type of scam that tricks users via fake emails • Common malware that replicates through a network • File extension often used for dangerous attachments • ...
cloud ipa 2024-10-29
Across
- azure .... is used to manage hybrid cloud
- specifies expected downtime for each service
- most expensive support plan is professional ....
- service allows private connections between azure servers
- is a web application firewall
- you should have one firewall for all networks, and for each network you have ...
Down
- cloud providers use ....... type 1
- a jump server
- part of azure windows defender, It constantly checks your cloud setup to find weaknesses
- to prevent all DDOS attacks, you should go from basic to ....
- a group of policies
- a resource should be in a resource ......
12 Clues: a jump server • a group of policies • is a web application firewall • cloud providers use ....... type 1 • azure .... is used to manage hybrid cloud • a resource should be in a resource ...... • specifies expected downtime for each service • most expensive support plan is professional .... • service allows private connections between azure servers • ...
Urbanization: Growing Cities 2026-01-19
Across
- Large pits where city waste is stored.
- The growith and development of cities.
- When a species no longer exists.
- The clearing of land for roads, houses, and new infrastructure.
- Hardware, Software, Networks.
- A declining city.
- Cities consume 75% of the world’s supply of this resource.
- Tiny plastic particles found in most urban rivers worldwide.
Down
- The number of people that live in a city or town.
- A growing city.
- Roads, Airports, Railways.
- The transportation across borders of goods, services, people, and information.
- Buying and selling of goods between countries.
- A factor in city growth.
- Plenty of cultures and backgrounds that strengthen a city.
- Businesses pay these to the government.
- Money put into businesses or cities to help them grow.
17 Clues: A growing city. • A declining city. • A factor in city growth. • Roads, Airports, Railways. • Hardware, Software, Networks. • When a species no longer exists. • Large pits where city waste is stored. • The growith and development of cities. • Businesses pay these to the government. • Buying and selling of goods between countries. • ...
Information technology 2020-12-07
Across
- piece of software used for calculations.
- computer that manages access to resources or service in network
- networking device that forwards data packets. between computer networks.
- maximum productivity with minimum effort
Down
- old, no longer in use.
- something exposed the possibility of being attacked or exploited.
- easy to use, understand.
- graphical representation of text.
8 Clues: old, no longer in use. • easy to use, understand. • graphical representation of text. • piece of software used for calculations. • maximum productivity with minimum effort • computer that manages access to resources or service in network • something exposed the possibility of being attacked or exploited. • ...
Dialog DET 2024-11-05
Across
- a device or node that connects two networks by translating communication between them
- used to determine traveling of packets across a network
- popular networking vendor
- used to
Down
- used in radio transmission
- dialog is a subsidiary of this group
- a medium used to transport light or data
- Can make rain or store data
8 Clues: used to • popular networking vendor • used in radio transmission • Can make rain or store data • dialog is a subsidiary of this group • a medium used to transport light or data • used to determine traveling of packets across a network • a device or node that connects two networks by translating communication between them
networks 2019-05-17
Networks 2024-01-27
3 Clues: Eliminate cables that connect devices to peripherals. • Facilitate communication, the sharing of information and much more between devices • To link computers together and provide shared access to printers, file servers, and other services.
REVIEW COMPUTER NETWORK KEY WORDS 2024-08-13
Across
- IP Address is an IP address that is automatically assigned to each connection, or node, of a network like your
- Network Protocols is a formal standards and policies made up of rules, procedures, and formats and defines communication between two or more devices over a network.
- Network is a collection of computers, servers, network devices, peripherals, or other devices connected to allow the sharing of data.
- Switch is a networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
- is any physical device within a network or other tools that can send, receive, or forward information. A personal computer is the most common node.
- Server. It is called static because it does not change.
- desktop PC, or wireless tablet. This automatic assignment of IP Address is a accomplished by what is called a DHCP Server.
- IP Address is an IP address that was manually configured for a device instead of one that was assigned by a
Down
- Connection is a computer network that uses wireless data connections between network nodes.
- Connection is a computer network that requires a physical wire to be pulled to the desired location of the network jack.
- IP Address is a numerical label assigned to each device connected to a computer network that uses the internet protocol
- Server is assigns IP addresses to client computers which are often used in networks to reduce
- is a networking device that forwards data packets between computer networks.
- is a unit of digital information in computing and telecommunications that consists of eight bits.
- communication.
- efforts.
16 Clues: efforts. • communication. • Server. It is called static because it does not change. • is a networking device that forwards data packets between computer networks. • Connection is a computer network that uses wireless data connections between network nodes. • is a unit of digital information in computing and telecommunications that consists of eight bits. • ...
G7CR 2022-09-27
Across
- Azure _____________ is a directory service that enables you to sign in and access both Microsoft cloud applications and cloud applications that you develop.
- According to the shared responsibility model, which cloud service type places the most responsibility on the customer? (IaaS, PaaS, SaaS)
- _______ cloud combines Public and Private clouds to allow applications to run in the most appropriate location.
- All resources and resources groups are part of ___________________s.
- You can purchase Azure access directly from Microsoft by signing up on the Azure website or through a Microsoft representative. (write truee or false)
- You can also allow your employee's phone to become a passwordless authentication method. You may already be using the Microsoft ________ App as a convenient multi-factor authentication option in addition to a password.
- A _________ is the basic building block of Azure. Anything you create, provision, deploy, etc. is a _________. Virtual Machines (VMs), virtual networks, databases, cognitive services, etc. are all considered _________ within Azure.
Down
- Azure _________ is an interactive, authenticated, browser-accessible shell for managing Azure resources.
- Trainer's fav. student name.
- In Azure, Maintaining Physical networks and datacenter is the responsibility of __________
- In ______ cloud hardware must be purchased for start-up and maintenance.
- Azure ___ can manage ___ records for your Azure services and provide ___ for your external resources as well. Azure ___ is integrated in the Azure portal and uses the same credentials, support contract, and billing as your other Azure services.
- When you deploy a resource in Azure, you'll often need to choose the region where you don't want your resource deployed. (write truee or false)
- Two types of Environment in Cloudshell, Powershell and _______
- Cloud ______is the delivery of computing services over the internet, enabling faster innovation, flexible resources, and economies of scale.
- Cloud benefits are High availability, reliability, Predictability and __________.
16 Clues: Trainer's fav. student name. • Two types of Environment in Cloudshell, Powershell and _______ • All resources and resources groups are part of ___________________s. • In ______ cloud hardware must be purchased for start-up and maintenance. • Cloud benefits are High availability, reliability, Predictability and __________. • ...
Linux 2025-07-22
7 Clues: used to input command lines • Linux®-based operating system • distributes products and software • how users communicate with a computer • Source able to be modified by the user • has word processing and spreadsheet programs • allows Linux computers to connect to networks
Crossword 2022-06-02
Across
- A single page in powerpoint
- The most popular operating system
- Horizontal sets of cells
- a movable indicator on a computer screen identifying the point that will be affected by input from the user.
- A collection of related files in windows
Down
- The most popular search engine
- to login using an email you need it
- repeats a piece of code in programming.
- A large collection of networks
- visual programming language for coding.
10 Clues: Horizontal sets of cells • A single page in powerpoint • The most popular search engine • A large collection of networks • The most popular operating system • to login using an email you need it • repeats a piece of code in programming. • visual programming language for coding. • A collection of related files in windows • ...
Power Theft 2020-05-16
Across
- The wattmeters used to measure AC power.
- Voltage boosting in distribution networks the capacitor used is
- Effective use of Resources.
Down
- The examination of company's record.
- The efficiency of such turbines ranges from 35-45%.
- Changing the Characteristic of Energy Meter.
- The eddy Current torque in energy meter is proportional to-
- The efficiency measured in Lumens/watt.
- The monitoring of Energy Management.
- The Load Factor is the ratio of Average to ___Load.
10 Clues: Effective use of Resources. • The examination of company's record. • The monitoring of Energy Management. • The efficiency measured in Lumens/watt. • The wattmeters used to measure AC power. • Changing the Characteristic of Energy Meter. • The efficiency of such turbines ranges from 35-45%. • The Load Factor is the ratio of Average to ___Load. • ...
Mobile technology 2020-08-30
Across
- The moblie ISDN number is stored in
- the base station covers a specific area that is called as
- global system of computer networks is known as
- Acronym of short message service
- in piconet slaves are connected in
Down
- In piconet devices connected with the master is called
- example for piconet
- Network used inside a college campus
- which is the base of most mobile communications?
- Most WALNs are based upon the standard
10 Clues: example for piconet • Acronym of short message service • in piconet slaves are connected in • The moblie ISDN number is stored in • Network used inside a college campus • Most WALNs are based upon the standard • global system of computer networks is known as • which is the base of most mobile communications? • In piconet devices connected with the master is called • ...
Pip's Crossword 2017-10-02
Across
- What does WAN stand for?
- A short for local area network.
- Word,powerpoint,l exel, office, puplisher etc..
- You might go and see one of these at the cinema.
Down
- One of the biggest companies in the world!
- A way of typing with different buttons
- A way of keeping your work secure.
- A way of communicating using networks.
- The I in ICT.
- A box that stores information that transfers onto a screen.
10 Clues: The I in ICT. • What does WAN stand for? • A short for local area network. • A way of keeping your work secure. • A way of typing with different buttons • A way of communicating using networks. • One of the biggest companies in the world! • Word,powerpoint,l exel, office, puplisher etc.. • You might go and see one of these at the cinema. • ...
Technology 2023-07-06
Across
- Identification used by a person with access to a computer
- Another word for the top-notch support that we provide our users.
- A smaller computer that runs on ChromeOS
- A systematic approach to solving a problem
- What kids use to spell bad words
- A person that is learning
Down
- Sound
- Enables storing data and files on the internet
- The practice of protecting systems and networks from digital attacks
- Intelligence demonstrated by computers
10 Clues: Sound • A person that is learning • What kids use to spell bad words • Intelligence demonstrated by computers • A smaller computer that runs on ChromeOS • A systematic approach to solving a problem • Enables storing data and files on the internet • Identification used by a person with access to a computer • Another word for the top-notch support that we provide our users. • ...
Networking Crossword Puzzle 2024-03-21
Across
- secure encryption used for Wi-Fi
- small devices that connect to the internet
- a smart device used at home
- most common used protocol used in voip phones
- allows virtual machines to connect to physical machines
Down
- Device that adds many ports to a network
- separates networks for security
- technology that uses ethernet to connect phones
- Device needed to connect to the internet
- the name of a wifi connection is known as
10 Clues: a smart device used at home • separates networks for security • secure encryption used for Wi-Fi • Device that adds many ports to a network • Device needed to connect to the internet • the name of a wifi connection is known as • small devices that connect to the internet • most common used protocol used in voip phones • technology that uses ethernet to connect phones • ...
YOU AND YOUR DATA 2024-08-04
Across
- - The state of being free from public attention.
- - Permission for something to happen.
- - To look for information on the internet.
- - The information or material available on websites.
Down
- - Related to technology and computers.
- - The global system of interconnected computer networks.
- - A website or application where users can share and interact.
- - The path left by your online activity.
- - A piece of electronic equipment like a phone or computer.
- - Information collected or stored, especially online.
10 Clues: - Permission for something to happen. • - Related to technology and computers. • - The path left by your online activity. • - To look for information on the internet. • - The state of being free from public attention. • - The information or material available on websites. • - Information collected or stored, especially online. • ...
CROSSWORD 2025-12-01
Across
- Software that creates and manages virtual machines
- Process of finding and fixing code errors
- Temporary memory area between producer and consumer
- Store frequently used data for faster access
- Convert data into unreadable form for privacy
Down
- Device that forwards packets between networks
- Network device that connects devices within a LAN
- Hiding sensitive data by replacing or obfuscating it
- Group of linked computers working together as one
- Open-source Unix-like operating system
10 Clues: Open-source Unix-like operating system • Process of finding and fixing code errors • Store frequently used data for faster access • Device that forwards packets between networks • Convert data into unreadable form for privacy • Network device that connects devices within a LAN • Group of linked computers working together as one • ...
Network Hardware 2021-05-07
6 Clues: storage for files • routers data between networks • allows computer to join network • ethernet, twister pairs, fibre optics • allows to connect to network wirelessly • route informational data to correct user
Social Media Platforms 2023-03-23
7 Clues: Most popular hashtag • Best Network for B2B • Biggest Social Network in the world • Most popular Social Network for Gen-Z • #1 Social Network to interact with a brand • Best way to diversify your digital marketing • Highest engaged content on all Social Networks
G7CR 2022-09-27
Across
- In ______ cloud hardware must be purchased for start-up and maintenance.
- According to the shared responsibility model, which cloud service type places the most responsibility on the customer? (IaaS, PaaS, SaaS)
- When you deploy a resource in Azure, you'll often need to choose the region where you don't want your resource deployed. (write truee or false)
- Azure _________ is an interactive, authenticated, browser-accessible shell for managing Azure resources.
- Trainer's fav. student name.
- You can purchase Azure access directly from Microsoft by signing up on the Azure website or through a Microsoft representative. (write truee or false)
- All resources and resources groups are part of ___________________s.
- Cloud benefits are High availability, reliability, Predictability and __________.
Down
- A _________ is the basic building block of Azure. Anything you create, provision, deploy, etc. is a _________. Virtual Machines (VMs), virtual networks, databases, cognitive services, etc. are all considered _________ within Azure.
- Two types of Environment in Cloudshell, Powershell and _______
- Cloud ______is the delivery of computing services over the internet, enabling faster innovation, flexible resources, and economies of scale.
- You can also allow your employee's phone to become a passwordless authentication method. You may already be using the Microsoft ________ App as a convenient multi-factor authentication option in addition to a password.
- Azure ___ can manage ___ records for your Azure services and provide ___ for your external resources as well. Azure ___ is integrated in the Azure portal and uses the same credentials, support contract, and billing as your other Azure services.
- Azure _____________ is a directory service that enables you to sign in and access both Microsoft cloud applications and cloud applications that you develop.
- In Azure, Maintaining Physical networks and datacenter is the responsibility of __________
- _______ cloud combines Public and Private clouds to allow applications to run in the most appropriate location.
16 Clues: Trainer's fav. student name. • Two types of Environment in Cloudshell, Powershell and _______ • All resources and resources groups are part of ___________________s. • In ______ cloud hardware must be purchased for start-up and maintenance. • Cloud benefits are High availability, reliability, Predictability and __________. • ...
Cisco-AIML 2025-06-27
Across
- Architecture that revolutionized NLP with attention
- Basic processing units in artificial neural networks
- ___ search: finding results by understanding context, not just matching words
- Component that generates output in transformer architecture
- Individual units of text processed by language models
- Vector representations that capture word meanings in high-dimensional space
Down
- Mathematical operation central to CNNs
- Mechanism allowing models to focus on relevant parts
- Learnable parameters that determine connection strength
- Component that processes input in transformer architecture
- Input text given to generative AI models
11 Clues: Mathematical operation central to CNNs • Input text given to generative AI models • Architecture that revolutionized NLP with attention • Mechanism allowing models to focus on relevant parts • Basic processing units in artificial neural networks • Individual units of text processed by language models • Learnable parameters that determine connection strength • ...
gg 2016-03-22
Across
- Although was originally a compliment, it is now a derogatory term referring to someone who accesses a computer or network illegally
- Programs that act without a users knowledge and deliberately alter the computers operations
- One whose owner is unaware the computer is being controlled remotely by an outsider
- Technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.
- Verifies that the individual is the person they claim to be
- A private combination of characters associated with user name allows access to certain computers
- A potentially damaging computer program that affects or infects a computer negatively by altering the way the computer works without the users knowledge
- Online or internet based illegal acts
- A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network
- A program that performs a repetitive task on a network
Down
- Hardware or software that protects a networks resources from intrusion by users on another network such as the internet
- A vulnerable computer that is set up to entice an intruder to break into it
- Program, Protects a computer against viruses by identifying and removing any computer virus found in memory, storage, or incoming files
- Software used by cybercriminals
- Someone who accesses a computer or network illegally but has the intent of destroying data, stealing info, or other malicious actions
- A server outside the organization's network that controls which communications pass into the organization's network
- A numeric password either assigned by a company or selected by a user
- A program that copies itself repeatedly, in memory or on a network using up resources and shutting down the computer or network
- A group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks
19 Clues: Software used by cybercriminals • Online or internet based illegal acts • A program that performs a repetitive task on a network • Verifies that the individual is the person they claim to be • A numeric password either assigned by a company or selected by a user • A vulnerable computer that is set up to entice an intruder to break into it • ...
Digital Citizenship 2022-09-22
Across
- All the information online about a person either posted by that person or others, intentionally or unintentionally.
- Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads.
- False information that is spread, with intent to mislead
- Means that networks, systems, and applications are up and running. It ensures that authorized users have timely, reliable access to resources when they are needed.
- Small file that some websites attach to a user’s hard drive while the user is browsing that site; they can be used to track user preferences, speed loading times, and for advertising.
- Used to describe online harassment, which can be in the form of flames, comments made in chat rooms, the sending of offensive or cruel e-mail, or even harassing others by posting on blogs, Web pages or social networking sites
- Protection of computer systems, networks, and data from digital attacks
- Secret series of numbers, letters and special characters that allows you to access a locked computer or program
Down
- Refers to an organizations efforts to keep their data private or secret. Only those authorized have access to specific assets.
- Being believed or accepted as true, real, or honest
- Contributing online via posts, comments, or other forms of communication or expression.
- A person with substance use disorder who is seeking a mental escape from reality
- A ritualistic routine that becomes part of your normal life
- An attitude or prejudice that favors a way of feeling or acting over another
- Is about ensuring that data has not been tampered with and, therefore, can be trusted. It is correct, authentic, and reliable.
- Scrolling through online content without reacting to the content.
- False information that is spread, regardless of intent to mislead
- Having a hidden identity
- False information published as being authentic
19 Clues: Having a hidden identity • False information published as being authentic • Being believed or accepted as true, real, or honest • False information that is spread, with intent to mislead • A ritualistic routine that becomes part of your normal life • Scrolling through online content without reacting to the content. • ...
Media: Key Terms 2023-04-20
Across
- A type of increased increasingly popular media coverage focused on political scandals
- Refers to topics that are usually timely, important and consequential, such as politics, international affairs and business news.
- Journalism that is based upon sensationalism and crude exaggeration.
- A law that protects witnesses from revealing certain information, especially in court.
- Defined as information that is primarily entertaining or personally useful.
- Requires broadcasters to treat political candidates equally in terms of air time.
- The term used to describe the revolutionary business tactic of producing newspapers which sold for one cent.Wire Service: A news agency that supplies syndicated news by wire to newspapers, radio, and television stations.
- The process whereby news media highlight, emphasize and give more prominence to a specific aspect of a news story.
- A person who searches for and tries to expose real or alleged corruption, scandal, or other wrongdoing.
Down
- Regulates interstate and international communications through cable, radio, television, satellite and wire
- became concerned that the monopoly audience control of the three main networks, NBC, ABC and CBS, could misuse their broadcast licenses to set a biased public agenda. The Fairness Doctrine mandated broadcast networks devote time to contrasting views on issues of public importance.
- Describes the tendency of the national media to focus on who is winning at any given time during a presidential campaign.
- To distort (information) by rendering it unfaithfully or incompletely, especially in order to reflect a particular viewpoint.
- To appear or happen gradually or to a limited degree: News filtered down to us during the day.
- The means of communication that reach large numbers of people in a short time,
- When news content suggests to news audiences that they ought to use specific issues as benchmarks for evaluating the performance of leaders and governments.
16 Clues: Journalism that is based upon sensationalism and crude exaggeration. • Defined as information that is primarily entertaining or personally useful. • The means of communication that reach large numbers of people in a short time, • Requires broadcasters to treat political candidates equally in terms of air time. • ...
G7CR 2022-09-27
Across
- Cloud benefits are High availability, reliability, Predictability and __________.
- Trainer's fav. student name.
- A _________ is the basic building block of Azure. Anything you create, provision, deploy, etc. is a _________. Virtual Machines (VMs), virtual networks, databases, cognitive services, etc. are all considered _________ within Azure.
- In ______ cloud hardware must be purchased for start-up and maintenance.
- All resources and resources groups are part of ___________________s.
- Azure ___ can manage ___ records for your Azure services and provide ___ for your external resources as well. Azure ___ is integrated in the Azure portal and uses the same credentials, support contract, and billing as your other Azure services.
- _______ cloud combines Public and Private clouds to allow applications to run in the most appropriate location.
- You can purchase Azure access directly from Microsoft by signing up on the Azure website or through a Microsoft representative. (write truee or false)
- When you deploy a resource in Azure, you'll often need to choose the region where you don't want your resource deployed. (write truee or false)
- IN Azure, Maintaining Physical networks and datacenter is the responsibility of __________
Down
- Two types of Environment in Cloudshell, Powershell and _______
- According to the shared responsibility model, which cloud service type places the most responsibility on the customer? (IaaS, PaaS, SaaS)
- Azure _____________ is a directory service that enables you to sign in and access both Microsoft cloud applications and cloud applications that you develop.
- Azure _________ is an interactive, authenticated, browser-accessible shell for managing Azure resources.
- You can also allow your employee's phone to become a passwordless authentication method. You may already be using the Microsoft ________ App as a convenient multi-factor authentication option in addition to a password.
- Cloud ______is the delivery of computing services over the internet, enabling faster innovation, flexible resources, and economies of scale.
16 Clues: Trainer's fav. student name. • Two types of Environment in Cloudshell, Powershell and _______ • All resources and resources groups are part of ___________________s. • In ______ cloud hardware must be purchased for start-up and maintenance. • Cloud benefits are High availability, reliability, Predictability and __________. • ...
History of the NCCA Crossword 2024-08-14
7 Clues: a nationality • local government body • building used for Christian worship • a particular system of faith and worship • the action of bringing something into existence • a group or system of interconnected people or things • feel concern or interest in the wellbeing of someone
History of the NCCA Crossword 2024-08-14
7 Clues: a nationality • local government body • building used for Christian worship • a particular system of faith and worship • the action of bringing something into existence • a group or system of interconnected people or things • feel concern or interest in the wellbeing of someone
Mass Media 2017-01-11
Across
- Describes a set of shared concepts, methods, and assumptions that make up scientific reality at any point in time.
- The gap between those with access to new technologies and those without.
- Community in which the exchange of information is the main social and economic activity
- The term meant to refer to the tendency of people to remain silent when they feel that their views are in opposition to the majority view on a subject.
- Holds that scientific research should be judged solely on the basis of quality.
- States that as new info enters society, wealthy and better-educated members acquire it at a faster rate that poor and less educated people.
- Media executives, editors, or reporters who can open and close the "gate" on a particular news story.
- Sociological investigation of how scientific knowledge develops.
- The pursuit of knowledge through systematic methods.
- The phenomenon where "the rich get richer and the poor get poorer".
- Respected individuals in the community.
Down
- Social networks and the reciprocal norms associated with these networks that encourage people to do things for each other.
- Belief that all scientific knowledge should be made available to everyone in the scientific community.
- " Mass Media, Mass Culture" is the process whereby the mass media determine what we think and worry about. Walter Lippmann, a journalist first observed this function, in the 1920's.
- No scientific finding or theory is exempt from questioning.
- Instruments of communication that reach large audiences with no personal contact between those sending the information and those receiving it.
- Scientists should seek truth, not personal gain.
- The merging of mass communication outlets - print, television, radio, the Internet along with portable and interactive technologies through various digital media platforms
- An objective and systematic way of collecting information and arriving at conclusions.
19 Clues: Respected individuals in the community. • Scientists should seek truth, not personal gain. • The pursuit of knowledge through systematic methods. • No scientific finding or theory is exempt from questioning. • Sociological investigation of how scientific knowledge develops. • The phenomenon where "the rich get richer and the poor get poorer". • ...
Cybersecurity Crossword 2020-09-13
Across
- Pretending to be somebody else online.
- A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
- A type of attack that uses trial and error over and over to guess a password until it is correct.
- Small files that are saved on your computer that store information that help websites track your visits
- A virus that can replicate without the user doing anything such as opening a program.
- Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
- Stealing another person's information to use for criminal activity.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands money if the victim wants his or her files back.
- The amount of data that can pass through a network or part of a network per second.
- Computer programs that can block, detect, and remove viruses and other malware.
- Creating a web address that purposely fools people into thinking it is another person or company's website.
- The process of making extra copies of computer files that can be used to restore files that are lost or damaged.
- Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Down
- The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
- Two or more interconnected devices that can exchange data.
- A "good guy" hacker; one who hacks to help find vulnerabilities to make a system more secure.
- Software designed to block malware from entering protected networks.
- The use of something in a way different from what it was intended for in order to solve a problem.
- A general name for software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
- A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
- Malware that records every key struck on a keyboard and sends that information to an attacker.
- A way of shutting down or slowing down a website by overwhelming it with a flood of traffic from a team of computers.
- Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
- A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
25 Clues: Pretending to be somebody else online. • Two or more interconnected devices that can exchange data. • Stealing another person's information to use for criminal activity. • Software designed to block malware from entering protected networks. • Computer programs that can block, detect, and remove viruses and other malware. • ...
Digimath 9 2025-03-05
Across
- – The smallest unit of data in a computer
- – A wireless technology standard used to exchange data between devices over short distances
- – The practice of protecting computers and networks from digital attacks
- – A harmful program that can damage a computer
- – Used to type and input data
- – A screen that displays information
- – Physical parts of a computer
Down
- – A global network connecting millions of computers
- – A wireless connection to the internet
- – The "brain" of the computer
- – Storing data on the internet instead of a local device
- – Programs that run on a computer
- – A pointing device used to control the cursor
13 Clues: – The "brain" of the computer • – Used to type and input data • – Physical parts of a computer • – Programs that run on a computer • – A screen that displays information • – A wireless connection to the internet • – The smallest unit of data in a computer • – A harmful program that can damage a computer • – A pointing device used to control the cursor • ...
Truth in Social MEdia 2025-07-28
Across
- the global system of interconnected computer networks
- a blog that contains video material
- false information deliberately spread
- a famous or celebrated person
- quickly and widely spread or popularized by the means of social media
- the ability to read, write, speak
- Media forms of electronic communication
Down
- the process of teaching and learning, especially in an institution.
- a person who is able to generate interest by posting about it on social media
- Filipino Word for Gossip
- the structure or conditions of economic life
- incorrect or misleading information
- a mutual enmity or quarrel that is often prolonged or inveterate
13 Clues: Filipino Word for Gossip • a famous or celebrated person • the ability to read, write, speak • a blog that contains video material • incorrect or misleading information • false information deliberately spread • Media forms of electronic communication • the structure or conditions of economic life • the global system of interconnected computer networks • ...
Blood & Circulatory System 2022-09-23
Across
- white blood cell that engulfs pathogens
- blood vessels in networks near tissues
- carried by red blood cells
- takes blood away from the heart
- blood vessel connected to left ventricle
- chiefly responsible for clotting
- waste product carried in blood, excreted via lungs
- proteins involved in clotting
- waste product carried in blood, excreted via kidneys
- carries blood to the heart
- blood vessel connected to left atrium
- holds platelets together in a mesh
Down
- blood vessel connected to right ventricle
- valves prevent this
- white blood cell that gives long lasting immunity
- hormone that increase heart rate
- blood vessel connected to right atrium
- protein on the surface of a pathogen
- the liquid component of blood
- protein created by lymphocytes that kills pathogens
- related to kidneys
- related to liver
- related to the heart
23 Clues: related to liver • related to kidneys • valves prevent this • related to the heart • carried by red blood cells • carries blood to the heart • the liquid component of blood • proteins involved in clotting • takes blood away from the heart • hormone that increase heart rate • chiefly responsible for clotting • holds platelets together in a mesh • protein on the surface of a pathogen • ...
Unit3 2019-04-07
Across
- made to look,like the real thing
- means or right of using
- of or for the mode
- suddenly
- breaking something into small pieces
- cause to be notstraight or exact
- neither small nor large but between the two
- see,notice orrealize something
- an occasion
- a place or an occasion for taking about a problem
- action of making a situation, quality or feather appear greater
Down
- being dependent on sth
- who can not stop drinking
- a word in witch sb can do anything or go anywhere
- the state of developing
- low in spirits
- cause sb to feel distant from or not welcome to sb else
- data blanks and networks in computer technology considered as a space
- pleasure
- help to develop
- the opposite
- skim the internet aimlessly
- ability to develop
23 Clues: suddenly • pleasure • an occasion • the opposite • low in spirits • help to develop • of or for the mode • ability to develop • being dependent on sth • means or right of using • the state of developing • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • made to look,like the real thing • cause to be notstraight or exact • ...
Unit3 2019-04-07
Across
- made to look,like the real thing
- who can not stop drinking
- cause sb to feel distant from or not welcome to sb else
- the opposite
- data blanks and networks in computer technology considered as a space
- suddenly
- of or for the mode
- breaking something into small pieces
- neither small nor large but between the two
- a word in witch sb can do anything or go anywhere
- help to develop
Down
- an occasion
- action of making a situation, quality or feather appear greater
- ability to develop
- the state of developing
- means or right of using
- low in spirits
- pleasure
- see,notice orrealize something
- being dependent on sth
- cause to be notstraight or exact
- skim the internet aimlessly
- a place or an occasion for taking about a problem
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • ability to develop • of or for the mode • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • made to look,like the real thing • cause to be notstraight or exact • ...
Unit3 2019-04-07
Across
- of or for the mode
- skim the internet aimlessly
- see,notice orrealize something
- means or right of using
- being dependent on sth
- an occasion
- a place or an occasion for taking about a problem
- action of making a situation, quality or feather appear greater
- cause to be notstraight or exact
- a word in witch sb can do anything or go anywhere
- suddenly
- breaking something into small pieces
Down
- cause sb to feel distant from or not welcome to sb else
- help to develop
- the opposite
- neither small nor large but between the two
- made to look,like the real thing
- who can not stop drinking
- ability to develop
- pleasure
- the state of developing
- data blanks and networks in computer technology considered as a space
- low in spirits
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • of or for the mode • ability to develop • being dependent on sth • means or right of using • the state of developing • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • made to look,like the real thing • cause to be notstraight or exact • ...
Vocabulary Topic 1 Crossword 2021-10-26
Across
- It's planted to be harvested.
- The name of an Ariana Grande's music.
- You're so immature, you need to ____ __.
- The name of the 10-hour pause.
- There are two different ones, one at the war and one at the farm.
- There is a big one in Paris.
- Children often are.
- I smile when you do it. :)
- You put money in it.
Down
- The opposite of ''agree''.
- There are twenty-one in the class.
- It's better to trust in anyone.
- You need it to earn money.
- A car has 4.
- You are when you see a shooting star.
- History classes are.
- The Earth ______ because of human activity.
- Influencers _____ their lives on social networks.
- I ____ you in my life.
- You ask for it when you have finished eating at the restaurant.
20 Clues: A car has 4. • Children often are. • History classes are. • You put money in it. • I ____ you in my life. • The opposite of ''agree''. • You need it to earn money. • I smile when you do it. :) • There is a big one in Paris. • It's planted to be harvested. • The name of the 10-hour pause. • It's better to trust in anyone. • There are twenty-one in the class. • ...
Alley Floods crossword vocab 2014-02-19
Across
- device
- software for which the original source code
- the practice of using a network
- temporary computer memory
- a computer that can access information
- automatically
- A high-capacity, self-contained storage device
- A printed circuit board containing the components of a computer or other device
- a worldwide network of computer networks
- programs and other operating information used by a computer
Down
- The working surface of a desk
- software that supports a computer's basic functions
- a program with a graphical user
- desktop computer that is capable of information
- Tools, machinery, and other durable equipment
- string of numbers separated by periods
- the first piece of software that starts a computer
- a coding system using the binary digits 0 and 1
- internet service provider
- not temporary
- connect or operate
21 Clues: device • automatically • not temporary • connect or operate • temporary computer memory • internet service provider • The working surface of a desk • a program with a graphical user • the practice of using a network • string of numbers separated by periods • a computer that can access information • a worldwide network of computer networks • software for which the original source code • ...
IPv6 2018-04-06
Across
- Hexadecimal
- All of these are /64
- When client configures own IPv6 address
- Allows IPv4 and IPv6 hosts communication on public networks
- Transferring address space to another
- Built in with IPv6
- Unique identification of IPv6 device
- Layer of OSI IPv6 is on
- Used when no other IPv6 translation is available
- Uses the prefix fe80::/10
Down
- Locates certain areas of the network
- When IPv4 and IPv6 are run on the same network
- One Hundred and Twenty Eight
- This type of translation is removed in IPv6 addresses
- The same as IPv4 unicast
- When one address type is change to the other
- Method of shortening IPv6 addresses
- Bits in one hexadecimal series
- Aren't routable on the global internet
- Allows IPv4 and IPv6 hosts communication via router
- Certain address prefixes are
21 Clues: Hexadecimal • Built in with IPv6 • All of these are /64 • Layer of OSI IPv6 is on • The same as IPv4 unicast • Uses the prefix fe80::/10 • One Hundred and Twenty Eight • Certain address prefixes are • Bits in one hexadecimal series • Method of shortening IPv6 addresses • Locates certain areas of the network • Unique identification of IPv6 device • ...
PERETTE_HOERTNER_Crosswors_Computer_Definition 2018-09-20
Across
- Something to see outside when you are in a room
- shortcup to save
- All commands on the keyboard to be faster
- something to throw wastes
- something to listen to sound
- What you have to do before going on a website ( after having created an account)
- What you do to show something to more people on social networks
- What we are using
- Something to see with the pc
- Shortcut to copy
- Take something from internet
- Put something on internet
Down
- to receive and stock emails
- shortcut to return
- The key to turn on/off the capitals
- something to listen to sound bigger than earphones
- all equipements wich you can touch
- In a folder you have them
- The thing to write on the computer
- Shortcut to paste
- Shortcut to select all
21 Clues: shortcup to save • Shortcut to copy • What we are using • Shortcut to paste • shortcut to return • Shortcut to select all • something to throw wastes • In a folder you have them • Put something on internet • to receive and stock emails • something to listen to sound • Something to see with the pc • Take something from internet • all equipements wich you can touch • ...
TECH TERMS 2023-11-28
Across
- Central Processing Unit
- A security system tat monitors incoming and outgoing network traffic
- Read Only Memory
- A unit of information equal to 220 bytes
- Personal identifiable information
- A binary digit
- Used to protect data from being stolen
- Domain Name System
- 8 bits
- A device that connects 2 or more packet-switched networks
- Random Access Memory
- Office of Strategic Services
- Virtual Reality
- Harmful software
Down
- Text files with small pieces of data
- Turn off and on again
- A computer system that provides resources
- Distributes electricity to the Central Processing Unit
- A unique address given to every device on the internet
- Regularly updated content on a topic
- Portable Document File
- A device that is connected to an internet service provider
- Hypertext Markup Language
- Uniform Resource Locator
24 Clues: 8 bits • A binary digit • Virtual Reality • Read Only Memory • Harmful software • Domain Name System • Random Access Memory • Turn off and on again • Portable Document File • Central Processing Unit • Uniform Resource Locator • Hypertext Markup Language • Office of Strategic Services • Personal identifiable information • Text files with small pieces of data • ...
med term 2023-11-28
Across
- - means Veins
- -Cardiovascular disease
- -record the heart's activity during daily activities.
- -heart not pumping blood as well as it should
- -sound waves to create detailed images of the heart
- - networks of small vessels that perfuse tissues.
- -often involve walking on a treadmill
- -you lie on a table inside a doughnut-shaped machine
- - records the electrical signals
- - means “little vessel
- -cover a variety of different abnormalities
Down
- - means Blood
- - means Aorta
- -tissue found in the heart
- - vessels that return blooEpithelial tissue
- - pumps blood through the system.
- - any abnormal rhythm of the heart
- -Electrocardiogram
- - tops the list of cardiovascular diseases in the United States
- -means “heart,”
- -Percutaneous coronary intervention
- - vessels that deliver blood to tissues.
- - due to problems with blood flow
- -Drug-eluting stent
- - Bare metal stent
25 Clues: - means Blood • - means Aorta • - means Veins • -means “heart,” • -Electrocardiogram • - Bare metal stent • -Drug-eluting stent • - means “little vessel • -Cardiovascular disease • -tissue found in the heart • - pumps blood through the system. • - due to problems with blood flow • - records the electrical signals • - any abnormal rhythm of the heart • -Percutaneous coronary intervention • ...
Netceed Crossword Puzzle 2025-10-06
Across
- The strand that carries data as light
- Describes Netceed’s worldwide reach
- A standard that defines Netceed’s products and services
- Moving the right materials to the right place
- What connects everything together
- A trusted company we collaborate with
- The foundation of strong partnerships
- Support that keeps customers running smoothly
- Getting materials where they need to go
Down
- The result of teamwork and innovation
- Help that strengthens customer success
- Items that help get every job done
- A product that literally connects the world
- Creating better ideas and solutions for the future
- The group that makes success possible
- What Netceed helps people and networks do
- What unites our identity around “We build connections”
- What customers place to get what they need
- Working together across regions and teams
- Part of our promise: “We _____ connections”
20 Clues: What connects everything together • Items that help get every job done • Describes Netceed’s worldwide reach • The result of teamwork and innovation • The strand that carries data as light • The group that makes success possible • A trusted company we collaborate with • The foundation of strong partnerships • Help that strengthens customer success • ...
Easy Link 16 Crossword 2024-08-20
Across
- Option and .... identifies your surveillance TSB
- Name for NPG 9
- NPG 12 and 13 are used for...
- With Net number makes frequency hopping
- J2.2 is the Air...
- 300NM is the "standard" ... mode
- Enables tactical data messages to be transmitted over long-distance networks
- Its duration is 7.8125ms
- Common name for Random Access Mode
- Best Multilink Section in NATO!
- Message Security
- Name for NPG 7
- Inactive relay
Down
- TSR is the acronym for Time Slot ...
- It can also be "reuse"
- The 5.16 is related to Link 16 messages
- File format for INDE files (Rev.4 or Rev.5)
- "Cover letter" for the ATDLP technical document
- percentage pulses in a frame
- File used to exchange network designs
- NPG 9, 12 and 13 are ...... nets!
- LVT or JTRS
22 Clues: LVT or JTRS • Name for NPG 9 • Name for NPG 7 • Inactive relay • Message Security • J2.2 is the Air... • It can also be "reuse" • Its duration is 7.8125ms • percentage pulses in a frame • NPG 12 and 13 are used for... • Best Multilink Section in NATO! • 300NM is the "standard" ... mode • NPG 9, 12 and 13 are ...... nets! • Common name for Random Access Mode • ...
networking concepts 2025-06-15
Across
- A powerful computer that stores websites
- Getting files from the internet
- Secret code for safety
- Big network across cities or countries
- A device that sends or receives data
- Protects computers from bad things
- Small network in one place (like school)
- Shares internet with many devices
- Wire used to connect devices
Down
- Helps you open websites (like Chrome)
- Sending messages over the internet
- A group of connected computers
- Connects you to the internet
- Information sent or received
- Someone who breaks into networks
- Wireless internet connection
- The biggest network in the world
- Address of a computer on the network
- A page you visit on the internet
- A device that uses services from a server
- Your name on a network or website
- Sending files to the internet
22 Clues: Secret code for safety • Connects you to the internet • Information sent or received • Wireless internet connection • Wire used to connect devices • Sending files to the internet • A group of connected computers • Getting files from the internet • Someone who breaks into networks • The biggest network in the world • A page you visit on the internet • ...
Crossword 1 2026-03-06
Across
- A worldwide network of interconnected computer networks
- A sequential circuit that counts pulses
- Unit of light intensity
- A protective device that melts due to overcurrent
- A device that is used to sense parameters
- Ability to store electric charge
- A compact integrated circuit containing processor, memory, and I/O peripherals
- Distance/Time
- ALU stands for _______ and Logical Unit
Down
- A number system with base 2
- Raw information processed by a computer
- Electronic message sent over the internet
- A device that sends signals to a communication channel
- Parameter measured in Hertz
- A component that opposes current
- Resistor colour code with tolerance of +- 5%
- Short form of Hypertext Markup Language
- V = IR is also called as _____'s Law
- A basic digital circuit performing a logical function is called as _____ gate
- Stands for Random Access Memory
20 Clues: Distance/Time • Unit of light intensity • A number system with base 2 • Parameter measured in Hertz • Stands for Random Access Memory • A component that opposes current • Ability to store electric charge • V = IR is also called as _____'s Law • Raw information processed by a computer • A sequential circuit that counts pulses • Short form of Hypertext Markup Language • ...
Journalism Vocabulary 2024-10-02
Across
- a form of receiving (sometimes untruthful) news that older people tend to dislike
- the written account of what people are meant to say
- added audio that emphasizes something in a broadcast; buh dum tss
- beating other reporters and releasing breaking news before anyone else
- someone's exact words
- part of a newspaper that displays recent deaths
- the annoying content that plays between news reports
- opinionated writing; argumentative
- the creative title
- reporters are sneaky and use this instead of reading from a script
- the head honcho
Down
- sandwiched between two quotes
- quote at the end of an article
- oooh, fancy letters
- local news
- who said that?
- not prerecorded
- networks dedicated to news; it'll rot your brain!
- unpaid learning position; they get coffee for employees
- if it bleeds, it ____
20 Clues: local news • who said that? • not prerecorded • the head honcho • the creative title • oooh, fancy letters • someone's exact words • if it bleeds, it ____ • sandwiched between two quotes • quote at the end of an article • opinionated writing; argumentative • part of a newspaper that displays recent deaths • networks dedicated to news; it'll rot your brain! • ...
Entrepeneur crossward 2025-10-30
Across
- promoting products to the people
- something made to be sold
- Rivals in the same market
- possibility or failure
- something difficult to overcome
- person who buys something
- process or improvement
- connection with people
- putting money into something to gain profit
- guiding and inspiring others
- a plan to reach a goal
Down
- a future goal
- company name or image
- never giving up
- achieving goals
- Creating something new or better
- becoming bigger
- Thinking original ideas
- a group working together
- Person who starts a business
- place where products are sold
- Organization that sells goods or services
- something you want to achieve
- the reason to keep going
- steps to reach a goal
- a chance to do something good
- work done for others
- business organization
28 Clues: a future goal • never giving up • achieving goals • becoming bigger • work done for others • company name or image • steps to reach a goal • business organization • possibility or failure • process or improvement • connection with people • a plan to reach a goal • Thinking original ideas • a group working together • the reason to keep going • something made to be sold • Rivals in the same market • ...
IT based crossword puzzle 2025-12-04
Across
- – The brain of a computer.
- – Temporary storage for quick data access.
- – Process of finding and fixing errors in code.
- – Standard markup language for web pages.
- – Unique address identifying a device on a network.
- – Security system that monitors network traffic.
- – Popular programming language used worldwide.
- – Computer providing services to other machines.
- – Securing data by converting it into code.
- – Small file stored by websites on your computer.
Down
- – High-level programming language known for simplicity.
- – Internet-based storage and services.
- – Organized collection of structured information.
- – Step-by-step procedure for solving a problem.
- – Address used to access resources on the web.
- – Software designed to harm or exploit systems.
- – Device directing data between networks.
- – Translates source code into machine code.
- – Group of connected computers sharing resources.
- – Number system using only 0 and 1.
20 Clues: – The brain of a computer. • – Number system using only 0 and 1. • – Internet-based storage and services. • – Standard markup language for web pages. • – Device directing data between networks. • – Temporary storage for quick data access. • – Translates source code into machine code. • – Securing data by converting it into code. • ...
Podstawy sieci Ethernet 2013-10-28
Across
- Jeden z czynników związanych z sukcesem technologii Ethernet.
- Maksymalna jednostka transmisyjna.
- Najczęstszy błąd w sieci Ethernet.
- Znacznik początku ramki.
- Oznaczenie adresu MAC jako adresu wbudowanego.
- Termin na oznaczenie energii (szumu) wykrywanej w kablu wprowadzony przez firmę Fluke Networks.
Down
- Przykład niedeterministycznej sieci LAN
- Funkcja opcjonalna w większości implementacji technologii Ethernet.
- Jedno z dozwolonych lub wymaganych pól ramki Ethernet 802.3.
- Kolizje w kablu UTP są rozpoznawane tylko wtedy gdy stacja prcuje w trybie ...
- Jednostka w której podaje się długość ramki zgodnie z wymaganiami standardu Ethernet.
- Jedna z trzech rodzajów kolizji w sieci Ethernet.
12 Clues: Znacznik początku ramki. • Maksymalna jednostka transmisyjna. • Najczęstszy błąd w sieci Ethernet. • Przykład niedeterministycznej sieci LAN • Oznaczenie adresu MAC jako adresu wbudowanego. • Jedna z trzech rodzajów kolizji w sieci Ethernet. • Jedno z dozwolonych lub wymaganych pól ramki Ethernet 802.3. • Jeden z czynników związanych z sukcesem technologii Ethernet. • ...
Scandiweb Puzzle №7 2021-04-12
Across
- Dangerous situation affecting an individual, group, or all of society
- German shoes multinational corporation
- Food consisting of salt-cured roe of the family Acipenseridae
- Type of law enforcement and law enforcement state activities
- Someone who sells raw fish and seafood
- Community of people formed on the basis of a common language
Down
- genius/video game designer
- Country in East Asia
- American online social media and social networking service
- An infectious disease
- Form of literature that uses aesthetic and often rhythmic qualities of language
- Global system of interconnected computer networks
12 Clues: Country in East Asia • An infectious disease • genius/video game designer • German shoes multinational corporation • Someone who sells raw fish and seafood • Global system of interconnected computer networks • American online social media and social networking service • Type of law enforcement and law enforcement state activities • ...
Digi-tech crossword 2021-08-11
Across
- to form a local area network is called?
- what is the first thing you type in a computer login?
- a device that routes traffic between networks?
- what does DNS stand for?
- what does the first 'W' in WWW stand for
Down
- what does AP stand for?
- a system used to connect multiple computer
- pressing and holding down the power button
- what game do you play that builds stuff?
- what does 'D' in dos stand for?
- what does WAN stand for?
- a computer will result in a...
12 Clues: what does AP stand for? • what does WAN stand for? • what does DNS stand for? • a computer will result in a... • what does 'D' in dos stand for? • to form a local area network is called? • what game do you play that builds stuff? • what does the first 'W' in WWW stand for • a system used to connect multiple computer • pressing and holding down the power button • ...
4 keyword 2024-11-26
Across
- we use it daily
- when the internet is missing
- Condition of a node in a network that does not interact with others.
- what are the american states
- those that are sent with whatsapp
- what are all the networks between them
Down
- follow these steps to ensure your computer works properly
- Set of ordered instructions for performing a task
- what we use when communicating remotely
- a predefined order that is messy, tells us that it does not have
- the reason why the computer is not working
- everything that gives us advantages
12 Clues: we use it daily • when the internet is missing • what are the american states • those that are sent with whatsapp • everything that gives us advantages • what are all the networks between them • what we use when communicating remotely • the reason why the computer is not working • Set of ordered instructions for performing a task • ...
TECHNOWAYS- FIND IT FIRST 2024-03-13
Across
- Letting machines do the work for you.
- Pocket-sized silicon circuits.
- A way to decode using your unique features.
- The LEGO game of monomer construction to networks.
- Shape your health with science and technology.Encryption - Protecting digital data with secret codes.
- The secret code driving computer logic.
- The humidity detective of the atmosphere.
- Finding your way through the waves.
Down
- Be it hot or cold you need this device to maintain them.
- The surveyor's precise angle finder
- Crude oil : Petrol :: Distillation Feed : ?
- Utilizing fluid power to drive mechanical systems.
12 Clues: Pocket-sized silicon circuits. • The surveyor's precise angle finder • Finding your way through the waves. • Letting machines do the work for you. • The secret code driving computer logic. • The humidity detective of the atmosphere. • Crude oil : Petrol :: Distillation Feed : ? • A way to decode using your unique features. • ...
Ransomware - 2022 2022-11-16
Across
- A software program or hardware device that protects networks by filtering packets
- Old phone hacking technique used to make free calls
- A software designed to help computers stay safe from viruses and avoid them
- A malware that is independent and does not need any host program
- A malware that misleads users of its true intent
Down
- The first computer virus
- Abbreviation for malicious software
- Compromising confidential information
- Unsolicited email sent for commercial purposes
- Lack of access control policy
- The first hacker's conference
- The least strong security encryption
12 Clues: The first computer virus • Lack of access control policy • The first hacker's conference • Abbreviation for malicious software • The least strong security encryption • Compromising confidential information • Unsolicited email sent for commercial purposes • A malware that misleads users of its true intent • Old phone hacking technique used to make free calls • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Things you label so you don’t forget
- Rules limiting who can see or do things
- A promise you hold without a receipt
- The shadow you measure before it bites
- Government rule guiding healthcare data protection
- Many little fences inside one yard
- Intent written down so it can’t wander
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Keeping an up-to-date list of tech devices and app
- Be ready to bend and bounce back
- Attacker’s movement sideways inside a system
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Things you label so you don’t forget
- Rules limiting who can see or do things
- A promise you hold without a receipt
- The shadow you measure before it bites
- Government rule guiding healthcare data protection
- Many little fences inside one yard
- Intent written down so it can’t wander
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Keeping an up-to-date list of tech devices and app
- Be ready to bend and bounce back
- Attacker’s movement sideways inside a system
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Internet Crossword Puzzle -Adeen 2015-09-22
Across
- Link to a different website within the same document
- Very Popular use of the Internet
- Structure that handles the major traffic in a networked system
- Transmission Control Protocol
- Network Control Protocol
- Small Amount Of Information Sent Over A Network
- Gap between those who have Internet access and those who don’t
Down
- A location on the World Wide Web
- Light pulses used to carry information
- Defense Advanced Research Projects Agency
- Global System of interconnected networks
- Mainframe computers that are capable of very fast processing
- World Wide Web
- Where you can keep URLs that you would like to visit often
- A French packet switching network
- Transmission Control Protocol
- International Organization for Standardization
- Early version of the Internet
18 Clues: World Wide Web • Network Control Protocol • Transmission Control Protocol • Transmission Control Protocol • Early version of the Internet • A location on the World Wide Web • Very Popular use of the Internet • A French packet switching network • Light pulses used to carry information • Global System of interconnected networks • Defense Advanced Research Projects Agency • ...
Technology 2022-04-02
Across
- Getting access at anytime and anywhere
- A hardware device to control the cursor Movement
- Maximum data that travels along communication path
- Brain of the computer, makes the program Work
- Email texts for marketing purpose
- A famous console to play pokemon at
- The thing on which technology runs
Down
- Wireless technology to replace cables
- Main computer handling other computers’ network services
- Virtual assistant by amazon
- Interacting and chatting with each other
- Safe usage of internet to protect against viruses and online crimes
- Building networks beyond borders
- An automatic operated machine with human like actions
- A space area with keys to type
- A small portable device to keep to yourself
- Damage causing programming code
17 Clues: Virtual assistant by amazon • A space area with keys to type • Damage causing programming code • Building networks beyond borders • Email texts for marketing purpose • The thing on which technology runs • A famous console to play pokemon at • Wireless technology to replace cables • Getting access at anytime and anywhere • Interacting and chatting with each other • ...
BFS Crossword 2020-08-03
Across
- August 1st is World _____ day
- Apple's acquired softPOS payments startup
- largest payment processing company in the UK
- Mastercard approved _____ as the principal member to issue crypto-based debit cards
- Metro Bank acquired this P2P lender
Down
- Pay Direct is a new open banking payment initiation service from ____
- new European payments initiative to challenge payment networks
- FinGO provides ___ biometrics for age verification, contact tracing
- Scandal-ridden German Payments Processor
- regulatory agency of the European Union headquartered in Paris
- SMB-focused UK bank ____ signs deal with Mastercard
11 Clues: August 1st is World _____ day • Metro Bank acquired this P2P lender • Scandal-ridden German Payments Processor • Apple's acquired softPOS payments startup • largest payment processing company in the UK • SMB-focused UK bank ____ signs deal with Mastercard • new European payments initiative to challenge payment networks • ...
Network performance 2023-03-25
Across
- delay from when you asked for the data to when you get the data
- and exchange of information
- is measured in bits per second
- a network of networks
- the amount of data you receive within a certain amount of time
Down
- local area network
- how much data can a network carry
- wireless internet beamed down
- uses an active phone line connection to connect to the internet
- active phone line connection to connect to the internet
- national broadband network
11 Clues: local area network • a network of networks • national broadband network • and exchange of information • wireless internet beamed down • is measured in bits per second • how much data can a network carry • active phone line connection to connect to the internet • the amount of data you receive within a certain amount of time • ...
E9H vocab 2023-05-03
Across
- readily perceived by the senses and especially by the sense of sight
- the color black
- deprived of natural moisture
- masked ball; aristocratic entertainment
- lacking remembrance, memory, or mindful attention
- to put a question: seek for information by questioning
- to fluctuate in opinion, allegiance, or direction
Down
- such as is or might be caused by nervousness or shakiness
- grisly, gruesome; horrible, distressing; having death as a subject
- fine-branching blood vessels that form networks
- to lose vitality, force, or freshness
11 Clues: the color black • deprived of natural moisture • to lose vitality, force, or freshness • masked ball; aristocratic entertainment • fine-branching blood vessels that form networks • lacking remembrance, memory, or mindful attention • to fluctuate in opinion, allegiance, or direction • to put a question: seek for information by questioning • ...
Yeehaw 2021-05-05
Across
- What is the abbreviated version of Wide Area Network
- A cable used in network
- A file that orders other files into a specific structure
- What rhymes with you yowtfoot
- Blocks unauthorized access
Down
- Temporary space that lets us access data
- Smallest part of an imagine/film
- An interface in a device where another device is connected
- What is the green mob that explodes in Minecraft called
- What routes traffic between networks
- What is the abbreviated version of Uniform Resource Locator
11 Clues: A cable used in network • Blocks unauthorized access • What rhymes with you yowtfoot • Smallest part of an imagine/film • What routes traffic between networks • Temporary space that lets us access data • What is the abbreviated version of Wide Area Network • What is the green mob that explodes in Minecraft called • A file that orders other files into a specific structure • ...
compute 2021-06-03
Across
- what extension can disguise your online identity?
- what thing on your pc screen helps you click onto stuff?
- what is the interface part of a device where another device is connected
- what device can you plug/ connect to a device to play music?
- what has 1,024 bytes?
Down
- what application lets you make slideshow presentations?
- world's largest video sharing website?
- man behind the
- what is the smallest part of a graphic image?
- what device prints out printed paper?
- what device routes traffic between networks?
11 Clues: man behind the • what has 1,024 bytes? • what device prints out printed paper? • world's largest video sharing website? • what device routes traffic between networks? • what is the smallest part of a graphic image? • what extension can disguise your online identity? • what application lets you make slideshow presentations? • ...
Asia 2022-11-17
Across
- classical for of Japanese dance-drama
- military dictators of japan 1158-1868
- Japanese sword with curved, single-edged blade
- merchant who traveled across the silk road
- First great Khan of Mongolian empire
- ancient chinese military treatise
Down
- type of short poetry originated in Japan
- ancient trade networks that connect china with the east
- forts built across northern borders of ancient china for protection against nomadic groups
- hereditary military nobility in medieval Japan
- east Asia ethnic group native to Mongolia
11 Clues: ancient chinese military treatise • First great Khan of Mongolian empire • classical for of Japanese dance-drama • military dictators of japan 1158-1868 • type of short poetry originated in Japan • east Asia ethnic group native to Mongolia • merchant who traveled across the silk road • Japanese sword with curved, single-edged blade • ...
Artificial Intelligence by Jermiah Hicks 2026-03-16
Across
- They use it to fight in wars and many more
- Turing The mathematic that famously ask “Can machines think”
- 1950 when ai was first created
- the sciences and engineering
- where ai was created
- McCarthy the founding father of AI
- 4 2011 was when siri was first made
Down
- Its wifi for your devices
- a step by step introduction
- fields They use it to see through people's body so they can treat them as needed
- the bot that everyone uses it starts with Chat
11 Clues: where ai was created • Its wifi for your devices • a step by step introduction • the sciences and engineering • 1950 when ai was first created • McCarthy the founding father of AI • 4 2011 was when siri was first made • They use it to fight in wars and many more • the bot that everyone uses it starts with Chat • Turing The mathematic that famously ask “Can machines think” • ...
IP Addresses & DNS 2024-03-12
Across
- Application for surfing the internet are called Web __________
- Name of an ISP in Australia that starts with O
- DNS stands for _____ Name System
- All devices on the internet have ________ addresses
- Name of the web browser developed by Google
Down
- An example of ISP in Australia that starts with T
- ISP stands for Internet _______ Providers
- IPv4 addresses are 32 ________ long
- A technique used by hackers is called DNS ______
- A well-known set of rules used on the internet
- network of networks
11 Clues: network of networks • DNS stands for _____ Name System • IPv4 addresses are 32 ________ long • ISP stands for Internet _______ Providers • Name of the web browser developed by Google • A well-known set of rules used on the internet • Name of an ISP in Australia that starts with O • A technique used by hackers is called DNS ______ • ...
social media 2020-09-22
4 Clues: a program in a smartphone. • someone that want you make angry in social networks. • something funny as a video, picture, text of any topic. • the things you can do in networks like twitch, youtube, flooxer in live.
Hardware of the internet 2022-05-13
Across
- domain name system
- Internet Service Provider
- How much time it takes for a data packet to go from one point to another
- a system connecting computers in a LAN
- data on a computer that is sent between two users
- equal to 1000 megabits
Down
- transfer of data or a file from one computer to another
- filters unnecessary or malicious network traffic
- a device that processes data
- a device that connects two or more networks
- maximum rate of data transmitted over a period of time
- connects devices to an internet connection wirelessly
12 Clues: domain name system • equal to 1000 megabits • Internet Service Provider • a device that processes data • a system connecting computers in a LAN • a device that connects two or more networks • filters unnecessary or malicious network traffic • data on a computer that is sent between two users • connects devices to an internet connection wirelessly • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Things you label so you don’t forget
- Rules limiting who can see or do things
- A promise you hold without a receipt
- The shadow you measure before it bites
- Government rule guiding healthcare data protection
- Many little fences inside one yard
- Intent written down so it can’t wander
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Keeping an up-to-date list of tech devices and app
- Be ready to bend and bounce back
- Attacker’s movement sideways inside a system
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Artificial intelligence by Jermiah Hicks 2026-03-17
Across
- They use it to see through people's body so they can treat them as needed
- used by people a lot today but known as apple and android
- the month was Siri made
- The mathematic that famously ask “Can machines think”
- They use it to fight in wars and many more
Down
- the founding father of AI
- the bot that everyone uses it starts with Chat
- Its wifi for your devices
- the sciences and engineering
- where ai was created
- a step by step introduction
- when ai was first created
12 Clues: where ai was created • the month was Siri made • the founding father of AI • Its wifi for your devices • when ai was first created • a step by step introduction • the sciences and engineering • They use it to fight in wars and many more • the bot that everyone uses it starts with Chat • The mathematic that famously ask “Can machines think” • ...
Information Technology 2020-12-10
8 Clues: a wire in IT • text style and family • having a lot of errors • software that lets you use computer • device that allow us to connect networks • computer with special system to data menaging • most frequently an ad that shows in separate window • port in computer that allows user to connect pendrive
Internet, Web, and Malware 2017-01-02
Across
- part of the Internet
- wireless connection, for example
- Internet Service Provider
- wired connection, for example (2 words)
- wired connection, for example
- your unique name on the Internet (2 words)
- in one hack at Yahoo, this many people were affected
- device that connects to the Internet and chooses the best path for data
- your unique number on the Internet (2 words)
Down
- malicious software
- network of computers controlled by a hacker
- an ISP, for example
- one symptom that your computer may be infected by malware (2 words)
- a network of networks
- malware that asks for money in return for access to your documents
- wireless connection, for example
- an ISP, for example
- a device you have that's not on the web
- an ISP, for example
- large computer containing websites, games, etc.
20 Clues: malicious software • an ISP, for example • an ISP, for example • an ISP, for example • part of the Internet • a network of networks • Internet Service Provider • wired connection, for example • wireless connection, for example • wireless connection, for example • wired connection, for example (2 words) • a device you have that's not on the web • ...
DC (Digital Citizenship) 12 Vocabulary Words! 2020-09-30
Across
- Something that’s not what it seems
- Something that can “kill” your computer
- The victim of bullying
- To critically rate something on how secure it is and on the quality of something
- Interconnected computer networks that help you communicate with others.
- Threatening (a form of bullying)
- Bullying online
Down
- A form of communication over the internet.
- Some who witnesses the bullying happen
- To trick someone
- Someone who stands up to the bully on the victims behalf
- A person who is trying to get personal information about you
12 Clues: Bullying online • To trick someone • The victim of bullying • Threatening (a form of bullying) • Something that’s not what it seems • Some who witnesses the bullying happen • Something that can “kill” your computer • A form of communication over the internet. • Someone who stands up to the bully on the victims behalf • ...
PM001 Modules 1-4 Crossword Activity 2016-12-05
Across
- The project life cycle is based on this
- Organisational Breakdown Structure (Initials)
- Work Breakdown Structure (Initials)
- An activity that has more than one activity immediately preceding it
- Activity on Node (Initials)
- The logical sequence of project events
- Forecasted work timelines and datelines
- Documents reflecting clear project statements
Down
- One of the methods for forecasting project costs, times and resources
- A risk assessment helps to avoid this
- The ability to challenge, inspire, enable and encourage
- The name of the path on the network diagram with the longest duration
12 Clues: Activity on Node (Initials) • Work Breakdown Structure (Initials) • A risk assessment helps to avoid this • The logical sequence of project events • The project life cycle is based on this • Forecasted work timelines and datelines • Organisational Breakdown Structure (Initials) • Documents reflecting clear project statements • ...
computer crossword 2013-01-10
Across
- allows computer signals to be sent over telephone lines.
- text which contains a hyperlink.
- communicating over a distance.
- wide web internet interface that contains millions of hypertext documents.
- hypertext transfer protocol.
- up sending a file from one computer to another.
Down
- a global network of many smaller computer networks.
- a hyperlink that links to other forms of media.
- computers sending or recieving information by electronic means.
- recieving a file from another computer.
- two or more computers connected together.
- rate the speed at which dat is transmitted.
12 Clues: hypertext transfer protocol. • communicating over a distance. • text which contains a hyperlink. • recieving a file from another computer. • two or more computers connected together. • rate the speed at which dat is transmitted. • a hyperlink that links to other forms of media. • up sending a file from one computer to another. • ...
The Roaring 20s 2014-01-14
Across
- cut their hair short and wore short dresses
- one of the first radio stations
- the first woman to fly solo across the atlantic ocean
- the right to vote
- social movement that proclaims return to the power of natives
- a dance named for the city in south carolina
- the deportation of several hundred immigrants
Down
- the white supremacist organization
- the space where the trunk is on todays cars
- legal prevention of transportation of alcoholic beverages
- the place where the first womens rights convention was held
- another one of the first radio networks
12 Clues: the right to vote • one of the first radio stations • the white supremacist organization • another one of the first radio networks • the space where the trunk is on todays cars • cut their hair short and wore short dresses • a dance named for the city in south carolina • the deportation of several hundred immigrants • the first woman to fly solo across the atlantic ocean • ...
The Roaring 20s 2014-01-14
Across
- first womens rights convention taken place
- A dance named after a city in South Carolina
- Legal prohibiting of the manufacture and sale of alcoholic drinks
- "public enemy number 1"
- Young women who dressed in an unconventional manner
- right to vote
Down
- A group of white people who believed in the united states being native country
- First woman to fly across the Atlantic Ocean
- One of the first radio networks
- Policy of protecting the interest of inhabitants against immigrants
- affordable care desgined by Henry Ford
- Fear of communism rising
12 Clues: right to vote • "public enemy number 1" • Fear of communism rising • One of the first radio networks • affordable care desgined by Henry Ford • first womens rights convention taken place • First woman to fly across the Atlantic Ocean • A dance named after a city in South Carolina • Young women who dressed in an unconventional manner • ...
Ransomware - 2022 2022-11-16
Across
- A software program or hardware device that protects networks by filtering packets
- Old phone hacking technique used to make free calls
- A software designed to help computers stay safe from viruses and avoid them
- A malware that is independent and does not need any host program
- A malware that misleads users of its true intent
Down
- The first computer virus
- Abbreviation for malicious software
- Compromising confidential information
- Unsolicited email sent for commercial purposes
- Lack of access control policy
- The first hacker's conference
- The least strong security encryption
12 Clues: The first computer virus • Lack of access control policy • The first hacker's conference • Abbreviation for malicious software • The least strong security encryption • Compromising confidential information • Unsolicited email sent for commercial purposes • A malware that misleads users of its true intent • Old phone hacking technique used to make free calls • ...
4 keyword 2024-11-26
Across
- we use it daily
- when the internet is missing
- Condition of a node in a network that does not interact with others.
- what are the american states
- those that are sent with whatsapp
- what are all the networks between them
Down
- follow these steps to ensure your computer works properly
- Set of ordered instructions for performing a task
- what we use when communicating remotely
- a predefined order that is messy, tells us that it does not have
- the reason why the computer is not working
- everything that gives us advantages
12 Clues: we use it daily • when the internet is missing • what are the american states • those that are sent with whatsapp • everything that gives us advantages • what are all the networks between them • what we use when communicating remotely • the reason why the computer is not working • Set of ordered instructions for performing a task • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Government rule guiding healthcare data protection
- Be ready to bend and bounce back
- Things you label so you don’t forget
- The shadow you measure before it bites
- Many little fences inside one yard
Down
- Rules limiting who can see or do things
- Attacker’s movement sideways inside a system
- Intent written down so it can’t wander
- Extra layer proving who you are during login
- A promise you hold without a receipt
- Splitting networks to block threat spread
- Keeping an up-to-date list of tech devices and apps
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • Intent written down so it can’t wander • The shadow you measure before it bites • Rules limiting who can see or do things • Splitting networks to block threat spread • Attacker’s movement sideways inside a system • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Things you label so you don’t forget
- Rules limiting who can see or do things
- A promise you hold without a receipt
- The shadow you measure before it bites
- Government rule guiding healthcare data protection
- Many little fences inside one yard
- Intent written down so it can’t wander
Down
- Extra layer proving who you are during login
- Splitting networks to block threat spreads
- Keeping an up-to-date list of tech devices and app
- Be ready to bend and bounce back
- Attacker’s movement sideways inside a system
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spreads • Extra layer proving who you are during login • ...
Artificial intelligence by Jermiah Hicks 2026-03-18
Across
- The month Siri was made
- a step by step introduction
- the sciences and engineering
- used by people a lot today but known as apple and android
- 1950 when ai was first created
Down
- They use it to see through people's body so they can treat them as needed
- the founding father of AI
- Its wifi for your devices
- The mathematic that famously ask “Can machines think”
- where ai was created
- They use it to fight in wars and many more
- the bot that everyone uses it starts with Chat
12 Clues: where ai was created • The month Siri was made • the founding father of AI • Its wifi for your devices • a step by step introduction • the sciences and engineering • 1950 when ai was first created • They use it to fight in wars and many more • the bot that everyone uses it starts with Chat • The mathematic that famously ask “Can machines think” • ...
