networks Crossword Puzzles
Computer science 2024-11-18
Across
- What type of software secures network data?
- What device helps share the network load?
- What process improves file access speed?
- What manages hardware and software on a computer?
- What ensures a network can handle growth smoothly?
- Where is data stored and managed online?
Down
- What operating system is widely used on smartphones?
- What is Microsoft’s online file storage service?
- What protects networks from unauthorized access?
- What manages users and resources on a network?
10 Clues: What process improves file access speed? • Where is data stored and managed online? • What device helps share the network load? • What type of software secures network data? • What manages users and resources on a network? • What is Microsoft’s online file storage service? • What protects networks from unauthorized access? • ...
Computer vision 2025-02-03
Across
- is use to control the motion of computer
- an instrument used to capture and store images and videos
- an electronic circuit that can perform mathematical calculations at high speed.
- have function keys
- a gateway that passes data between one or more local area networks (LANs)
- as a main board
Down
- it’s provide sound
- is your computer short-term memory
- the most essential component of computer
- a display screen that support a visual output
10 Clues: as a main board • it’s provide sound • have function keys • is your computer short-term memory • is use to control the motion of computer • the most essential component of computer • a display screen that support a visual output • an instrument used to capture and store images and videos • a gateway that passes data between one or more local area networks (LANs) • ...
Set 1 2025-09-12
Across
- Continuously observing systems for suspicious activity.
- Strengthening systems by reducing vulnerabilities.
- Converting data into a coded format to protect it.
- Protecting personal or sensitive information by design.
- Verifying the identity of users before granting access.
- Recording system events for auditing and analysis.
- Dividing networks or systems to limit security risks.
Down
- Granting permissions based on user roles or rights.
- Checking input data to prevent errors or attacks.
- Designing systems to continue operating under attacks.
10 Clues: Checking input data to prevent errors or attacks. • Strengthening systems by reducing vulnerabilities. • Converting data into a coded format to protect it. • Recording system events for auditing and analysis. • Granting permissions based on user roles or rights. • Dividing networks or systems to limit security risks. • ...
isabella guerrero 2012-04-02
Across
- a special computer used to store programs
- a refreence to a published or an un published sourece
- a person who breaks into your computer
- unwanted emails
- someone who gets billeid on the internet
- a system with connected computersthat alows you to share files
Down
- is a form of internet fraud
- places where people can meet and chat
- software that ruins your computer
- a list of citations at the end of a story
- software disguised as something good but it is not
- software code that is desighned to copy itself
12 Clues: unwanted emails • is a form of internet fraud • software that ruins your computer • places where people can meet and chat • a person who breaks into your computer • someone who gets billeid on the internet • a special computer used to store programs • a list of citations at the end of a story • software code that is desighned to copy itself • ...
Bullying crossword... 2012-10-12
Across
- What some bullies take when theyre stressed
- What bullies pick on (mental ability)
- What most bullies do(and force victims to do sometimes(cigarrettes))
- The person who bullies
- A form of bullying used with words
- A form of bullying usually texting or social networks
Down
- A form of bullying done physically
- What bullies pick on (eyewear)
- Being forced into doing something by your friends just to try and be "cool"
- The person who gets bullied
- What bullies pick on (looks)
- What some bullies (and other people) like to drink
12 Clues: The person who bullies • The person who gets bullied • What bullies pick on (looks) • What bullies pick on (eyewear) • A form of bullying done physically • A form of bullying used with words • What bullies pick on (mental ability) • What some bullies take when theyre stressed • What some bullies (and other people) like to drink • ...
Cyber Defences 2021-09-22
Across
- Should be strong and have MFA
- Protects against viruses and worms
- This will protect a device/networks ports
- This is used to attract cyber attacks
- Used to record activity and find source of intrusions
- What to do to USB ports to prevent data exfiltration
- An update with a fix for a vulnerability
Down
- Can give false positives that distract administrator (acronym)
- These should be restricted to prevent users from having more access than required
- Teaches staff how to prevent falling for phishing scams
- Makes data unreadable
- Best defence against ransomware
12 Clues: Makes data unreadable • Should be strong and have MFA • Best defence against ransomware • Protects against viruses and worms • This is used to attract cyber attacks • An update with a fix for a vulnerability • This will protect a device/networks ports • What to do to USB ports to prevent data exfiltration • Used to record activity and find source of intrusions • ...
MIS 2022-07-29
Across
- one of the areas of office automation system
- the resource that is central to information systems
- Many big organizations develop this type of MIS
- One of the components of MIS
- inorder to get report from database one need to run this
- organized data
- MIS avoids it in data storage
Down
- system formed when databases are blended together.
- - process of drawing relevant data from database is _____ related process
- with MIS better control of organizational _____ can be obteained
- one of the objectives of MIS
- - MIS reduces information _____________
- __________ support system
13 Clues: organized data • __________ support system • one of the objectives of MIS • One of the components of MIS • MIS avoids it in data storage • - MIS reduces information _____________ • one of the areas of office automation system • Many big organizations develop this type of MIS • system formed when databases are blended together. • ...
Scandiweb Puzzle №7 2021-04-11
Across
- Dangerous situation affecting an individual, group, or all of society
- German shoes multinational corporation
- Food consisting of salt-cured roe of the family Acipenseridae
- Type of law enforcement and law enforcement state activities
- Someone who sells raw fish and seafood
- Community of people formed on the basis of a common language
Down
- genius/video game designer
- Country in East Asia
- American online social media and social networking service
- An infectious disease
- Form of literature that uses aesthetic and often rhythmic qualities of language
- Global system of interconnected computer networks
12 Clues: Country in East Asia • An infectious disease • genius/video game designer • German shoes multinational corporation • Someone who sells raw fish and seafood • Global system of interconnected computer networks • American online social media and social networking service • Type of law enforcement and law enforcement state activities • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Intent written down so it can’t wander
- A promise you hold without a receipt
- Be ready to bend and bounce back
- Many little fences inside one yard
- Rules limiting who can see or do things
Down
- Splitting networks to block threat spread
- Extra layer proving who you are during login
- Attacker’s movement sideways inside a system
- Keeping an up-to-date list of tech devices and apps
- Things you label so you don’t forget
- Government rule guiding healthcare data protection
- The shadow you measure before it bites
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • A promise you hold without a receipt • Things you label so you don’t forget • Intent written down so it can’t wander • The shadow you measure before it bites • Rules limiting who can see or do things • Splitting networks to block threat spread • Extra layer proving who you are during login • ...
Get Ahead of the HIPAA Security Rule Update With Secure Workload 2025-10-06
Across
- Be ready to bend and bounce back
- The shadow you measure before it bites
- Attacker’s movement sideways inside a system
- Keeping an up-to-date list of tech devices and apps
- A promise you hold without a receipt
- Splitting networks to block threat spread
- Intent written down so it can’t wander
Down
- Rules limiting who can see or do things
- Government rule guiding healthcare data protection
- Extra layer proving who you are during login
- Many little fences inside one yard
- Things you label so you don’t forget
12 Clues: Be ready to bend and bounce back • Many little fences inside one yard • Things you label so you don’t forget • A promise you hold without a receipt • The shadow you measure before it bites • Intent written down so it can’t wander • Rules limiting who can see or do things • Splitting networks to block threat spread • Extra layer proving who you are during login • ...
internet Crosswarod Puzzle 2014-05-01
Across
- socialize exchange digital files etc(facebook, twitter, instagram)
- Software program that is designed to damage a file
- Someone who hacks into your computer
- a group of connected computers
Down
- the address of a page on the world wde web
- computer networks that offers e-mail and information
- A collaborative website
- To realode a page
8 Clues: To realode a page • A collaborative website • a group of connected computers • Someone who hacks into your computer • the address of a page on the world wde web • Software program that is designed to damage a file • computer networks that offers e-mail and information • socialize exchange digital files etc(facebook, twitter, instagram)
ARTIFICIAL INTELLIGENCE 2022-05-23
Across
- The hottest job of the 21st Century is Data ___.
- The most popular language for AI.
- The father of AI is ____ McCarthy.
- The most popular computer vision library.
Down
- Neural networks need a large amount of ____ to work.
- Best institute for B.Tech in India.
- Google's open source AI framework.
- AI _____ is a job opportunity in AI.
8 Clues: The most popular language for AI. • Google's open source AI framework. • The father of AI is ____ McCarthy. • Best institute for B.Tech in India. • AI _____ is a job opportunity in AI. • The most popular computer vision library. • The hottest job of the 21st Century is Data ___. • Neural networks need a large amount of ____ to work.
algorithm and data representation 2022-01-14
Across
- compares adjacent element sand swaps them if they are in the wrong order
- set of rules to follow
- unique address identifying a device on a network
- a half byte
Down
- base 16 system simplifying binary
- occurs when packets are lost whilst travelling across networks
- attack that can shut down a machine
- represents text in computers
8 Clues: a half byte • set of rules to follow • represents text in computers • base 16 system simplifying binary • attack that can shut down a machine • unique address identifying a device on a network • occurs when packets are lost whilst travelling across networks • compares adjacent element sand swaps them if they are in the wrong order
POTTER PUZZEL 2022-10-03
Across
- Used in one of the wizarding transportation networks
- The fastest ball in quidditch
- Ron received one his third year
- I solemnly swear that I am up to no good
Down
- Plant often compared to "slimy grayish-green rat tails"
- Your entry ticket here
- I am the one who chooses the wizard
- Owned by Godric Gryffindor
8 Clues: Your entry ticket here • Owned by Godric Gryffindor • The fastest ball in quidditch • Ron received one his third year • I am the one who chooses the wizard • I solemnly swear that I am up to no good • Used in one of the wizarding transportation networks • Plant often compared to "slimy grayish-green rat tails"
Melisa's crossword 2024-01-18
8 Clues: transport • came up with • where the trains drive • something that you can carry on • something you risk dying by doing • the hot gas that is produced when water boils • to do something that you have intended to do for a long time • to connect computers together so that they can share information
CH 28 - FUNGI 2019-02-23
Across
- / long, narrow filaments that make up mycelium
- / characterized by tube-shaped mitochondria (example: humans)
- / “sac” fungi formed on hyphae, form 8 spores
- / “club” fungi formed at the ends of 4 spores
Down
- / distinctive spore-producing “yokes”
- / branching networks of thin hyphae
- / swimming gametes and spores
- / eukaryotes that transfer nutrients from dead plants/animals to living plants
8 Clues: / swimming gametes and spores • / branching networks of thin hyphae • / distinctive spore-producing “yokes” • / “sac” fungi formed on hyphae, form 8 spores • / “club” fungi formed at the ends of 4 spores • / long, narrow filaments that make up mycelium • / characterized by tube-shaped mitochondria (example: humans) • ...
Dialog DET 2024-11-05
Across
- a device or node that connects two networks by translating communication between them
- used to determine traveling of packets across a network
- popular networking vendor
- used to
Down
- used in radio transmission
- dialog is a subsidiary of this group
- a medium used to transport light or data
- Can make rain or store data
8 Clues: used to • popular networking vendor • used in radio transmission • Can make rain or store data • dialog is a subsidiary of this group • a medium used to transport light or data • used to determine traveling of packets across a network • a device or node that connects two networks by translating communication between them
Malware 2025-10-27
Across
- Automated malware that can carry out attacks
- A fake communication designed to deceive
- A program demanding money to stop problems
- A program that bombards users with adverts
Down
- A malicious program pretending to be legitimate
- A malicious program that tunnels through networks
- A program that tracks a computer or user
- A self-replicating malicious program
8 Clues: A self-replicating malicious program • A program that tracks a computer or user • A fake communication designed to deceive • A program demanding money to stop problems • A program that bombards users with adverts • Automated malware that can carry out attacks • A malicious program pretending to be legitimate • A malicious program that tunnels through networks
Business Administrative Support 2018-03-22
Across
- a program that searches for and identifies
- the address of a World Wide Web page
- 3rd best collage degree
- is an electronic device or computer software
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- Transfer (or Transport) Protocol
- s an interactive computer application for organization, analysis and storage of data
- best collage
Down
- 2nd college degree
- Markup Language
- a college degree
- software used to create a sequence of text and graphics
- is a set of social conventions that facilitate interaction over networks
13 Clues: best collage • Markup Language • a college degree • 2nd college degree • 3rd best collage degree • Transfer (or Transport) Protocol • the address of a World Wide Web page • a program that searches for and identifies • is an electronic device or computer software • software used to create a sequence of text and graphics • ...
Mreža računala 2021-03-18
Across
- kombinacija tipka za dobivanje znaka @
- eng. Metropolian Area Networks
- uređaj koji svaki primljeni podatak šalje svima u mreži
- usluge za razmjenu pisanih poruka
- tematske ili komercijalne mrežne stranice koje sadržavaju mnogo hiperlinkova
- eng. Post Office Protocol 3
- najčešći protokol koji kontrolira način prijenosa podataka u paketima
- eng. Uniform Resource Locator
Down
- označuje količinu podataka koja može proći kroz neki medij za prijenos podataka
- skup povezanih računala koji omogućuje brzu razmjenu podataka neovisno o udaljenosti
- domena za različite nekomercijalne organizacije
- upisuju se pri prijavi za korištenje elektroničke pošte
- javni mrežni dnevnik
13 Clues: javni mrežni dnevnik • eng. Post Office Protocol 3 • eng. Uniform Resource Locator • eng. Metropolian Area Networks • usluge za razmjenu pisanih poruka • kombinacija tipka za dobivanje znaka @ • domena za različite nekomercijalne organizacije • upisuju se pri prijavi za korištenje elektroničke pošte • uređaj koji svaki primljeni podatak šalje svima u mreži • ...
Science Cryptic Crossword 2022-10-12
Across
- Old cross I had is beginning to exhibit rust
- Torched mine
- Rites are performed for vital suppliers
- Doctor hypnotists host, energy extracting from light
- Lets Act I be adapted for the networks
Down
- Toil at Livy translation that involves constant change
- Shoe and coin collection in attachment
- A conductor ached to let loose!
- Earl talks boastfully, but they don't react
- Turn green with envy in the end-that's life!
- More than one camp friend of Clegg coming to North Dakota in America
- I go in, sent off for taking food
- It's why we don't slip right into fantasy
13 Clues: Torched mine • A conductor ached to let loose! • I go in, sent off for taking food • Shoe and coin collection in attachment • Lets Act I be adapted for the networks • Rites are performed for vital suppliers • It's why we don't slip right into fantasy • Earl talks boastfully, but they don't react • Old cross I had is beginning to exhibit rust • ...
Think you can outsmart the fraudsters? 2025-11-06
Across
- Automated KYC solution ensuring thorough initial checks
- Region affected by scam compounds in Pig Butchering story
- Keeps an eye on evolving client risks 24/7
- AI tool launched by Themis to enhance due diligence
- Data used to verify individuals
- Criminal networks’ favourite digital asset
Down
- The act of faking personal details to commit fraud
- Fraudulent wildlife trade often linked to laundering
- Deceptive scheme luring victims into fake investments
- Nation spotlighted for propaganda-driven fraud
- REPORTS In-depth due diligence process applied to higher-risk relationships
- Type of fraud exploiting fake romantic relationships
- Country where scam call centres often operate
13 Clues: Data used to verify individuals • Keeps an eye on evolving client risks 24/7 • Criminal networks’ favourite digital asset • Country where scam call centres often operate • Nation spotlighted for propaganda-driven fraud • The act of faking personal details to commit fraud • AI tool launched by Themis to enhance due diligence • ...
IPv6 2018-04-06
Across
- Hexadecimal
- All of these are /64
- When client configures own IPv6 address
- Allows IPv4 and IPv6 hosts communication on public networks
- Transferring address space to another
- Built in with IPv6
- Unique identification of IPv6 device
- Layer of OSI IPv6 is on
- Used when no other IPv6 translation is available
- Uses the prefix fe80::/10
Down
- Locates certain areas of the network
- When IPv4 and IPv6 are run on the same network
- One Hundred and Twenty Eight
- This type of translation is removed in IPv6 addresses
- The same as IPv4 unicast
- When one address type is change to the other
- Method of shortening IPv6 addresses
- Bits in one hexadecimal series
- Aren't routable on the global internet
- Allows IPv4 and IPv6 hosts communication via router
- Certain address prefixes are
21 Clues: Hexadecimal • Built in with IPv6 • All of these are /64 • Layer of OSI IPv6 is on • The same as IPv4 unicast • Uses the prefix fe80::/10 • One Hundred and Twenty Eight • Certain address prefixes are • Bits in one hexadecimal series • Method of shortening IPv6 addresses • Locates certain areas of the network • Unique identification of IPv6 device • ...
Cardiovascular Crossword 2020-01-29
Across
- Atrial fibrillation
- Hardening
- vessel
- is hard for the heart to pump
- networks of small vessels that perfuse tissues
- Bring blood back to the heart
- Vein
- Premature Ventricular Contraction
- Pumps blood throughout the body
- Failure When the body does not have enough blood being pumped
- monitor Measures a persons heartbeat for 24 hrs
- Defibrillation threshold testing
Down
- circuits carry oxygen-poor blood from the heart to the lungs
- Deliver blood throughout the system/body
- artery disc narrowing or blockage of the arteries
- Measure the heartbeat with electricity
- High blood pressure
- Implantable Cardioverter Defibrillator
- clot
- Inflamed heart muscle
- test A test where you exercise and then ae monitored for multiple things
- Heart
- Ventricular tachycardia
- To see Pictures of the heart
- recorder a small device implanted under the skin to monitor any irregular cardiac beats
25 Clues: clot • Vein • Heart • vessel • Hardening • Atrial fibrillation • High blood pressure • Inflamed heart muscle • Ventricular tachycardia • To see Pictures of the heart • is hard for the heart to pump • Bring blood back to the heart • Pumps blood throughout the body • Defibrillation threshold testing • Premature Ventricular Contraction • Measure the heartbeat with electricity • ...
Unit3 2019-04-07
Across
- who can not stop drinking
- of or for the mode
- cause to be notstraight or exact
- being dependent on sth
- suddenly
- breaking something into small pieces
- action of making a situation, quality or feather appear greater
- ability to develop
- the opposite
- see,notice orrealize something
- an occasion
Down
- a place or an occasion for taking about a problem
- the state of developing
- pleasure
- made to look,like the real thing
- neither small nor large but between the two
- low in spirits
- skim the internet aimlessly
- cause sb to feel distant from or not welcome to sb else
- data blanks and networks in computer technology considered as a space
- a word in witch sb can do anything or go anywhere
- help to develop
- means or right of using
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • of or for the mode • ability to develop • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • cause to be notstraight or exact • made to look,like the real thing • ...
Unit3 2019-04-07
Across
- made to look,like the real thing
- who can not stop drinking
- cause sb to feel distant from or not welcome to sb else
- the opposite
- data blanks and networks in computer technology considered as a space
- suddenly
- of or for the mode
- breaking something into small pieces
- neither small nor large but between the two
- a word in witch sb can do anything or go anywhere
- help to develop
Down
- an occasion
- action of making a situation, quality or feather appear greater
- ability to develop
- the state of developing
- means or right of using
- low in spirits
- pleasure
- see,notice orrealize something
- being dependent on sth
- cause to be notstraight or exact
- skim the internet aimlessly
- a place or an occasion for taking about a problem
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • ability to develop • of or for the mode • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • made to look,like the real thing • cause to be notstraight or exact • ...
Unit3 2019-04-07
Across
- made to look,like the real thing
- who can not stop drinking
- cause sb to feel distant from or not welcome to sb else
- the opposite
- data blanks and networks in computer technology considered as a space
- suddenly
- of or for the mode
- breaking something into small pieces
- neither small nor large but between the two
- a word in witch sb can do anything or go anywhere
- help to develop
Down
- an occasion
- action of making a situation, quality or feather appear greater
- ability to develop
- the state of developing
- means or right of using
- low in spirits
- pleasure
- see,notice orrealize something
- being dependent on sth
- cause to be notstraight or exact
- skim the internet aimlessly
- a place or an occasion for taking about a problem
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • ability to develop • of or for the mode • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • made to look,like the real thing • cause to be notstraight or exact • ...
PERETTE_HOERTNER_Crossword_Computer_Definition 2018-09-20
Across
- What we are using
- What you do to show something to more people on social networks
- IN What you have to do before going on a website ( after having created an account)
- In a folder you have them
- shortcup to save
- something to listen to sound bigger than earphones
- Shortcut to paste
- All commands on the keyboard to be faster
- The thing to write on the computer
- Put something on internet
- something to throw wastes
Down
- LOCK The key to turn on/off the capitals
- something to listen to sound
- Take something from internet
- Something to see outside when you are in a room
- Shortcut to copy
- to receive and stock emails
- Something to see with the pc
- all equipements wich you can touch
- shortcut to return
20 Clues: Shortcut to copy • shortcup to save • What we are using • Shortcut to paste • shortcut to return • In a folder you have them • Put something on internet • something to throw wastes • to receive and stock emails • something to listen to sound • Take something from internet • Something to see with the pc • all equipements wich you can touch • The thing to write on the computer • ...
mod 6 and 7 2024-11-19
Across
- they exploit technology for manipulation
- actions that supplement the precautionary measures
- tricks users into revealing sensitive information through fake websites or messages
- accurate, complete, reliable, and in its original form
- redirects users to fraudulent websites to steal information.
- security rules to determine what is displayed to which user
- online bullying and abuse
- refers to data from physical threats
- computer-based offences
Down
- software intentionally designed to harm, exploit, or disrupt computers, networks, or devices.
- action taken in advance to protect the system
- stealing of information from a user's system
- unauthorized system access
- a potential harm
- assurance of the origin of information
- unauthorized content reproduction
- legal content ownership protection
- a hacker or intruder
- mass distribution of unsolicited messages, advertising or pornography
- a weakness or implementation error
20 Clues: a potential harm • a hacker or intruder • computer-based offences • online bullying and abuse • unauthorized system access • unauthorized content reproduction • legal content ownership protection • a weakness or implementation error • refers to data from physical threats • assurance of the origin of information • they exploit technology for manipulation • ...
Data Science 2025-04-25
Across
- Clustering algorithm that groups data into k clusters
- The instruction given to a language model
- Metric to measure prediction error
- Collection of structured or unstructured data
- One complete pass through the training dataset
- Retrieval-augmented generation in LLMs
- Clue
- Brain-inspired model used in deep learning
- Vector of partial derivatives in optimization
- Learning via rewards and penalties
Down
- How neural networks learn through gradient descent
- A group of models making predictions together
- Python library for data manipulation and analysis
- Normalizing or standardizing data for ML models
- Distributed version control system
- Area under the ROC curve
- When your model knows the training set too well
- An ML library famous for dynamic computation graphs
- High-performance gradient boosting library
- A resampling method to test model performance
- Prevents overfitting by adding penalty terms
21 Clues: Clue • Area under the ROC curve • Metric to measure prediction error • Distributed version control system • Learning via rewards and penalties • Retrieval-augmented generation in LLMs • The instruction given to a language model • High-performance gradient boosting library • Brain-inspired model used in deep learning • Prevents overfitting by adding penalty terms • ...
Entrepeneur crossward 2025-10-30
Across
- promoting products to the people
- something made to be sold
- Rivals in the same market
- possibility or failure
- something difficult to overcome
- person who buys something
- process or improvement
- connection with people
- putting money into something to gain profit
- guiding and inspiring others
- a plan to reach a goal
Down
- a future goal
- company name or image
- never giving up
- achieving goals
- Creating something new or better
- becoming bigger
- Thinking original ideas
- a group working together
- Person who starts a business
- place where products are sold
- Organization that sells goods or services
- something you want to achieve
- the reason to keep going
- steps to reach a goal
- a chance to do something good
- work done for others
- business organization
28 Clues: a future goal • never giving up • achieving goals • becoming bigger • work done for others • company name or image • steps to reach a goal • business organization • possibility or failure • process or improvement • connection with people • a plan to reach a goal • Thinking original ideas • a group working together • the reason to keep going • something made to be sold • Rivals in the same market • ...
your heart 2021-11-01
Across
- cell pieces that form clots
- the transport of blood back and forth between the heart and lungs
- the flow of blood between the heart and everything but the lungs
- study of the heart
- upper chamber of the heart
- lower chamber of the heart
- blood vessels that carry blood away from the heart
Down
- what arteries branch off into
- slippery membrane that covers the heart
- these transport oxygen to other cells of the body
- these carry blood from capillary networks to veins
- a straw colored liquid
- what arterioles branch off into
- blood vessels that carry blood back to the heart
14 Clues: study of the heart • a straw colored liquid • upper chamber of the heart • lower chamber of the heart • cell pieces that form clots • what arteries branch off into • what arterioles branch off into • slippery membrane that covers the heart • blood vessels that carry blood back to the heart • these transport oxygen to other cells of the body • ...
Creativity- Definitions and Terms 2014-09-20
Across
- building complex networks of ideas into the curriculum
- introducing unique ideas not normally found in the curriculum
- people who are creative in their own lives
- moving more rapidly through the curriculum and school system
- important breakthroughs for problem solvers
Down
- unique
- creative people who avoid learning the academic and technical skill
- adding details
- building onto the regular curriculum
- creative people who are considered eminent in thier field
- spots groups of related hits
- taking a different perspective on a situation or problem
- the ability to produce many ideas when problem solving
- fresh and new perspective to the obvious
14 Clues: unique • adding details • spots groups of related hits • building onto the regular curriculum • fresh and new perspective to the obvious • people who are creative in their own lives • important breakthroughs for problem solvers • building complex networks of ideas into the curriculum • the ability to produce many ideas when problem solving • ...
Crossword 2015-04-28
Across
- Also called wind pipe
- tubes that carry blood from parts of your body to the heart
- arteries and veins are by networks of very narrow tubes calles__
- The main organ in our circulatory system
- Which gas makes up most of the air you breath in
- A group of similar__ come together to make a tissue
- breath using this part of your body
Down
- Different organs working together
- To stay alive your cells need__
- If body fights diseases
- Balloon like air sacs at the end of the bronchiole
- Germs that spread easily
- Different word for breathing
- Transports blood away from the body
14 Clues: Also called wind pipe • If body fights diseases • Germs that spread easily • Different word for breathing • To stay alive your cells need__ • Different organs working together • Transports blood away from the body • breath using this part of your body • The main organ in our circulatory system • Which gas makes up most of the air you breath in • ...
Language & Technology 2024-11-22
Across
- The brain of a computer.
- A method to secure data by converting it into code.
- Technology dealing with the design and use of robots.
- A security system for networks.
- A global network connecting millions of computers.
- (AI) Technology that simulates human intelligence.
- Rules governing the structure of sentences.
Down
- The physical parts of a computer.
- A figure of speech comparing two things without "like" or "as."
- A collection of words in a language.
- Programs and operating systems for computers.
- The language of computers using 0s and 1s.
- A comparison using "like" or "as."
- A set of rules for solving problems, often in computing.
14 Clues: The brain of a computer. • A security system for networks. • The physical parts of a computer. • A comparison using "like" or "as." • A collection of words in a language. • The language of computers using 0s and 1s. • Rules governing the structure of sentences. • Programs and operating systems for computers. • A global network connecting millions of computers. • ...
TECHNOLOGY 2024-07-17
Across
- - Software designed to harm computers.
- Computing - Internet-based computing services.
- Computing - Advanced computing using quantum bits.
- Reality (VR) - Simulated experiences that can mimic or differ from the real world.
- Learning - Systems that learn from data.
- - Device that directs internet traffic.
- Source - Software with source code available to all.
- - A set of rules for data communication.
Down
- - A security system for protecting networks.
- Mining - Discovering patterns in large data sets.
- - A computer that provides data to other computers.
- - Temporary storage for frequently accessed data.
- Interface (UI) - The means through which users interact with a computer.
- - A step-by-step procedure for solving a problem.
14 Clues: - Software designed to harm computers. • - Device that directs internet traffic. • Learning - Systems that learn from data. • - A set of rules for data communication. • - A security system for protecting networks. • Computing - Internet-based computing services. • Mining - Discovering patterns in large data sets. • - Temporary storage for frequently accessed data. • ...
Chapter 11 How Do I Create a Simple Network? 2023-04-18
Across
- type of topology that featured a common cable or backbone connecting all the devices
- The average number of bits of data that can be transmitted from a source to a destination over the network in one second
- ________ Area Network – covering a small geographical area typically within the same building such as a home or office
- Wireless ________ point is a network hardware that connects to wired networks and provides a connection between wireless devices up to 100 metres away.
- device that sets up a long-distance connection to the ISP’s network
- ________ Area Network - covering a larger geographical area comprising two or more buildings within the same town or city
- address used by routers in WAN
- add additional bit at the start of the data string
- computer that initiates a connection to a server to request for resources and services to perform operations
- ________ number is used in combination with an IP address to identify a program that is running on a network
- number of bytes used to represent an IPv6 address
- ________ Access Control
- has a unique 48-bit MAC address that can be used to identify the particular computer or device
- number of bytes used to represent an IPv4 address
- type of topology where each computer is connected to two other computers and passing data around in the same direction
Down
- private network that only authorised users within an organization can access
- string of up to 32 bytes that identifies a wireless access point (WAP) and all the devices connected to it
- device that acts like a loudspeaker and broadcasts the data to all its connected devices
- device that constructs a single network by connecting two similar networks together
- number system to represent an IPv6 address
- IP stands for Internet ________
- most widely used wired network protocol in LANs and MANs
- type of topology where computers will send data to the central network hardware and the hardware forwards the data to the intended destination
- ________ Area Network - covering a large-scale geographical area typically across multiple geographical locations
- public WAN network where anyone can connect to it and share data
- add additional bit at the end of the data string
- ________ check - simplest method of error detection whereby an additional bit is included in the data string to be transmitted
- A unit of broken-up data containing a header with information about the source and destination addresses that are needed for transmission
- computer that shares resources with and responds to requests from devices and other similar computers on the network
- calculated value that is used to determine the integrity of transmitted data – it serves as a unique identifier for the data and is sent together with the data.
- ________ to ________ is a type of network where all computers are considered as equals and act as both clients and servers distributing the load among all computers
- most common wireless network protocol
- physical address used in LAN
- device that keeps the connected networks separate and forwards packets between them using Internet protocols
34 Clues: ________ Access Control • physical address used in LAN • address used by routers in WAN • IP stands for Internet ________ • most common wireless network protocol • number system to represent an IPv6 address • add additional bit at the end of the data string • number of bytes used to represent an IPv6 address • number of bytes used to represent an IPv4 address • ...
CN-120 Linux Fundamentals Week 4 2023-06-01
Across
- Unique label specified in a DNS hierarchy to identify a particular host within a subdomain within a top–level domain
- Access control model where resources are protected by inflexible, system–defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label)
- Media type that uses copper conductors a
- Protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information
- The default context–based permissions scheme provided with CentOS and Red Hat Enterprise Linux (RHEL)
- Authentication scheme that requires the user to present at least two different factors as credentials; for example, something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA
- Single sign–on authentication and authorization service that is based on a time–sensitive, ticket–granting system
- Widely used protocol analyzer
- Authentication technology that enables a user to authenticate once and receive authorizations for multiple services
- A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication (MFA)
- A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys
- One link in the path from a host to a router or from router to router
- Network protocol suite used to implement the internet and most WANs (wide–area networks) and LANs (local–area networks)
- Protocol used to automatically assign IP addressing information to hosts that have not been configured manually
Down
- A simplified interface for configuring the iptables firewall service
- Routing mechanism that conceals internal addressing schemes from the public internet by translating between a single public address on the external side of a router and private, non–routable addresses internally
- Broadcast mechanism by which the hardware MAC address of an interface is matched to an IP address on a local network segment
- Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities
- Intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types
- A context–based permissions scheme provided with Debian–based and SUSE Linux distributions
- Original, obsolete version of the security protocol now developed as transport layer security (TLS)
- Encryption of all data on a disk can be accomplished via a supported OS, via third–party software, or at the controller level by the disk device itself
- Intermediate system used to establish contention–free network segments at OSI layer 2 (Data Link).
- Process of making a host or app configuration secure by reducing its attack surface, running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits
- A cryptographic hashing algorithm created to address possible weaknesses in MD5. The current version is SHA–2
- A password that is generated for use in one specific session and becomes invalid after the session ends
26 Clues: Widely used protocol analyzer • Media type that uses copper conductors a • A simplified interface for configuring the iptables firewall service • One link in the path from a host to a router or from router to router • A context–based permissions scheme provided with Debian–based and SUSE Linux distributions • ...
Early Middle Ages Study Guide RMS 2021-09-27
Across
- lowest in feudalism
- religion that spread during Middle Ages
- self sufficient community
- group of workers practicing the same craft
- group from Scandinavia
- community where monks lived and studied
- Latin word meaning middle ages
- group trained for religious services
- living in the countryside
- tries to convert others to a religion
- leader of the Franks; nicknamed the Hammer
Down
- helped spread christianity to Ireland
- an especially holy person
- living in the city
- networks that helped Europe grow
- Thomas______; Paris university professor
- code of conduct for knights
- invention that helped grow crops better
- type of architecture in middle ages
- leader of the catholic church
- political/social system in the middle ages
- Land surrounded by water on 3 sides
- Warrior on horseback
- Charles the Great
- highest in feudalism
25 Clues: Charles the Great • living in the city • lowest in feudalism • Warrior on horseback • highest in feudalism • group from Scandinavia • an especially holy person • self sufficient community • living in the countryside • code of conduct for knights • leader of the catholic church • Latin word meaning middle ages • networks that helped Europe grow • type of architecture in middle ages • ...
IPv6 2018-04-06
Across
- Hexadecimal
- All of these are /64
- When client configures own IPv6 address
- Allows IPv4 and IPv6 hosts communication on public networks
- Transferring address space to another
- Built in with IPv6
- Unique identification of IPv6 device
- Layer of OSI IPv6 is on
- Used when no other IPv6 translation is available
- Uses the prefix fe80::/10
Down
- Locates certain areas of the network
- When IPv4 and IPv6 are run on the same network
- One Hundred and Twenty Eight
- This type of translation is removed in IPv6 addresses
- The same as IPv4 unicast
- When one address type is change to the other
- Method of shortening IPv6 addresses
- Bits in one hexadecimal series
- Aren't routable on the global internet
- Allows IPv4 and IPv6 hosts communication via router
- Certain address prefixes are
21 Clues: Hexadecimal • Built in with IPv6 • All of these are /64 • Layer of OSI IPv6 is on • The same as IPv4 unicast • Uses the prefix fe80::/10 • One Hundred and Twenty Eight • Certain address prefixes are • Bits in one hexadecimal series • Method of shortening IPv6 addresses • Locates certain areas of the network • Unique identification of IPv6 device • ...
IP version 6 2018-04-06
Across
- ______ devices have been adapting IPv6 addresses.
- This server gives you an IPV6 or IPV4 address.
- IPv4 would use a _____ of ip addresses that DHCP would grab from
- What does LAN mean.
- A group of eight binary digits.
- How many Class c networks were assigned in 1981?
- IPv6 offers more ____.
- By 2020 each _______ will have 6 devices.
- Was replaced by IPv6 because the designers were running out of ideas.
- Before compressing a IPv6 address it is ____.
- What does IoT stand for?
- this is the prefix length.
- There was 500 ________ connected devices in 2003.
Down
- The difference between IPv4 and IPv6.
- IPv6 protocols use this to separate the bits.
- IPv4 is still in _____.
- 0000 can be represented as _____.
- What does NAT stand for?
- There are 128 _____ in IPv6.
- The numbering system used for IPv6.
20 Clues: What does LAN mean. • IPv6 offers more ____. • IPv4 is still in _____. • What does NAT stand for? • What does IoT stand for? • this is the prefix length. • There are 128 _____ in IPv6. • A group of eight binary digits. • 0000 can be represented as _____. • The numbering system used for IPv6. • The difference between IPv4 and IPv6. • By 2020 each _______ will have 6 devices. • ...
Unit3 2019-04-07
Across
- made to look,like the real thing
- who can not stop drinking
- cause sb to feel distant from or not welcome to sb else
- the opposite
- data blanks and networks in computer technology considered as a space
- suddenly
- of or for the mode
- breaking something into small pieces
- neither small nor large but between the two
- a word in witch sb can do anything or go anywhere
- help to develop
Down
- an occasion
- action of making a situation, quality or feather appear greater
- ability to develop
- the state of developing
- means or right of using
- low in spirits
- pleasure
- see,notice orrealize something
- being dependent on sth
- cause to be notstraight or exact
- skim the internet aimlessly
- a place or an occasion for taking about a problem
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • ability to develop • of or for the mode • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • made to look,like the real thing • cause to be notstraight or exact • ...
Unit3 2019-04-07
Across
- who can not stop drinking
- of or for the mode
- cause to be notstraight or exact
- being dependent on sth
- suddenly
- breaking something into small pieces
- action of making a situation, quality or feather appear greater
- ability to develop
- the opposite
- see,notice orrealize something
- an occasion
Down
- a place or an occasion for taking about a problem
- the state of developing
- pleasure
- made to look,like the real thing
- neither small nor large but between the two
- low in spirits
- skim the internet aimlessly
- cause sb to feel distant from or not welcome to sb else
- data blanks and networks in computer technology considered as a space
- a word in witch sb can do anything or go anywhere
- help to develop
- means or right of using
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • of or for the mode • ability to develop • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • cause to be notstraight or exact • made to look,like the real thing • ...
Criminals Ride the Internet 2015-04-22
Across
- Able to be trusted
- another name for a crook
- To buy
- The electronic medium of computer networks, in which online communication takes place
- Not fake or counterfeit; original; real; authentic
- This can mean a group or association of gangsters controlling organised crime or one type of crime.
- To move from one place to another
- Something that occurs often
- To confront something or this can be where you live
Down
- Something that is not done honestly
- World wide form of communication
- One who is an impostor.
- A firm or business
- Plastic money
- To apply yourself to something
- A place where people go o eat out
- To bring or transport to the proper place or recipient; distribute
- Somebody who steals from others
- The opposite to true
- The location of something
20 Clues: To buy • Plastic money • Able to be trusted • A firm or business • The opposite to true • One who is an impostor. • another name for a crook • The location of something • Something that occurs often • To apply yourself to something • Somebody who steals from others • World wide form of communication • A place where people go o eat out • To move from one place to another • ...
networking concepts 2025-06-15
Across
- A powerful computer that stores websites
- Getting files from the internet
- Secret code for safety
- Big network across cities or countries
- A device that sends or receives data
- Protects computers from bad things
- Small network in one place (like school)
- Shares internet with many devices
- Wire used to connect devices
Down
- Helps you open websites (like Chrome)
- Sending messages over the internet
- A group of connected computers
- Connects you to the internet
- Information sent or received
- Someone who breaks into networks
- Wireless internet connection
- The biggest network in the world
- Address of a computer on the network
- A page you visit on the internet
- A device that uses services from a server
- Your name on a network or website
- Sending files to the internet
22 Clues: Secret code for safety • Connects you to the internet • Information sent or received • Wireless internet connection • Wire used to connect devices • Sending files to the internet • A group of connected computers • Getting files from the internet • Someone who breaks into networks • The biggest network in the world • A page you visit on the internet • ...
Artificial Intelligence(AI) 2025-07-02
Across
- Popular programming language for AI
- Type of AI system that mimics human decision-making
- AI program that simulates conversation
- Process by which AI improves over time
- Field where AI interprets visual data
- Type of network modeled after the human brain
- Surname of the father of modern AI
- Type of learning involving complex neural networks
- Step-by-step procedure for solving a problem
- Mathematical representation used by AI
Down
- Mental process simulated by AI
- Often paired with "learning" in AI
- Moral concerns related to AI use
- Process of teaching AI using data
- Systematic error in AI predictions
- Type of learning using labeled data
- Type of learning without labeled data
- Ability of AI to operate without human input
- Raw input used to train AI systems
- Machine capable of carrying out complex actions
20 Clues: Mental process simulated by AI • Moral concerns related to AI use • Process of teaching AI using data • Often paired with "learning" in AI • Systematic error in AI predictions • Surname of the father of modern AI • Raw input used to train AI systems • Popular programming language for AI • Type of learning using labeled data • Field where AI interprets visual data • ...
Tech Crossword Dave 2025-12-08
Across
- Online data storage
- High-definition display cable
- Portable power source
- Handles graphics processing
- Laptop pointing device
- Captures sound input
- Main circuit board
- Temporary computer memory
- Short-range wireless tech
- Pointing input device
- USB
- Software program
- Fix for software issues
- App used to view websites
Down
- Drive Portable USB storage
- Step-by-step computer method
- Network security barrier
- Personal audio device
- Software error
- Sends data across networks
- Displays enlarged images
- Converts paper to digital
- Brain of the computer
- Audio output device
- Visual Output Device
- Visual Input Device
- Wired network connection
- Converts one connector to another
- Core of an operating system
- Organized digital information
- Input device with letters and numbers
- Fast digital storage drive
- Wireless network signal
33 Clues: USB • Software error • Software program • Main circuit board • Online data storage • Audio output device • Visual Input Device • Captures sound input • Visual Output Device • Personal audio device • Portable power source • Brain of the computer • Pointing input device • Laptop pointing device • Fix for software issues • Wireless network signal • Network security barrier • Displays enlarged images • ...
CSP Unit 4 2020-12-02
Across
- Encryption process that uses 2 different keys for encoding and decoding data
- A cipher in which each letter in an alphabet is replaced with a different character or symbol
- Added to code to see what values are being set on variables while code is running
- Helps programmers figure out what code is supposed to do
- Encryption process that uses related private key and public key for encryption/decryption
- Adding an extra layer of security by requiring a user to provide two different types of identifying information
- Type of wireless access point that gives unauthorized access to secure networks
- Input used to verify a program runs correcty
- Information about letters that can help you break a simple substitution cipher
- An encryption machine used during World War II by Germany and Italy to encrypt and protect transmitted messages
- Decoding encrypted data to make it human-readable
- tricking someone into sharing sensitive information with a fraudulent e-mail
- Encoding data to prevent unauthorized access, such as converting plaintext to ciphertext
- Manually checking a program by recording variable values and changes line by line
- System of rules and specifications that standardizes communication and interoperability between computers
- A string of characters used as a parameter that determines the output of an encryption algorithm
- Sensitive or identifying info. about a person, e.g. social security number, age, financial info
- data such as fingerprint record or retinal scan
- Records every keystroke to gain fraudulent access to passwords / confidential information
- An attempt to discover information, especially passwords, by trying many possibilities, hoping one of the guesses is correct
- An example of public key encryption algorithm
- Software intended to damage or take partial control over a computing system
- To give permission to access information
Down
- A digital document used to verify the authenticity of a server or public key.
- A designated stopping place in the code used by debuggers
- Confirming your identity using knowledge known only to you
- A way of allowing programmers to write code that interacts with a system, e.g., by providing function/method headers, access to them, documentation how to use them
- An organization that verifies a public key is owned by the entity named on the certificate
- A mistake in the program that occurs during the execution of a program
- Person responsible for managing computers, networks, servers, and other computing resources
- The science and art of delivering a message securely and confidentially
- Global network comprised of many smaller networks operating with standardized communication rules
- Result of trying to handle data that is outside of the defined range of values
- When code compiles and runs, but produces unexpected/undesirable behavior/results
- small, text-based bits of information that a web server saves and accesses
- Tool provided by IDE that helps with error finding
- unauthorized access of protected data
- Encryption process that uses a single key for encoding and decoding data
38 Clues: unauthorized access of protected data • To give permission to access information • Input used to verify a program runs correcty • An example of public key encryption algorithm • data such as fingerprint record or retinal scan • Decoding encrypted data to make it human-readable • Tool provided by IDE that helps with error finding • ...
SocialMediaCrosswordPuzzle 2019-10-30
Across
- a short introduction of a person
- a person who influences other people via social media etc.
- something that is popular right now
- an online log
Down
- expert knowledge or skill in an area
- the people who watch or follow a public event, e.g. a film or concert
- tag used on social networks (i.e. Twitter)
- a person who subscribes to social media content
- (adj.) easily remembered, attractive, memorable
- expert knowledge or skill in an area
10 Clues: an online log • a short introduction of a person • something that is popular right now • expert knowledge or skill in an area • expert knowledge or skill in an area • tag used on social networks (i.e. Twitter) • a person who subscribes to social media content • (adj.) easily remembered, attractive, memorable • a person who influences other people via social media etc. • ...
Crossword English 2022-06-13
Across
- Is a book for know words.
- Is a social networks.
- Is a transport that a lot of persons use and have 2 weels.
- Is a language that speak in USA.
Down
- Is a person that teaches.
- Is a person that study.
- Is a site for definicions.
- Is a number that go bihain the four.
- Is a drink that is transparent and we need for live.
- Is a think that you have to read.
10 Clues: Is a social networks. • Is a person that study. • Is a person that teaches. • Is a book for know words. • Is a site for definicions. • Is a language that speak in USA. • Is a think that you have to read. • Is a number that go bihain the four. • Is a drink that is transparent and we need for live. • Is a transport that a lot of persons use and have 2 weels.
Technological Crossword 2021-07-30
Across
- What is one of the tiny dots on your screen called?
- How to connect multiple computers to the same LAN?
- What is Cat6?
- What files do browsers keep on your? computer
- What is the number tied to a specific device?
- What blocks unauthorized access?
Down
- What does LAN stand for?
- What comes after megabyte?
- What routes traffic between networks?
- What is it called when you turn off the computer from the button?
10 Clues: What is Cat6? • What does LAN stand for? • What comes after megabyte? • What blocks unauthorized access? • What routes traffic between networks? • What files do browsers keep on your? computer • What is the number tied to a specific device? • How to connect multiple computers to the same LAN? • What is one of the tiny dots on your screen called? • ...
Office of Womens Health 2023-10-06
Across
- Medical test for breast health screening.
- Media Online networks for communication and sharing.
- Online platform containing information or services.
- Gathering of people for discussion and collaboration.
Down
- Personal or informational website with regular updates.
- Act Legislation aimed at supporting community needs.
- A small, typically round, flat piece of food.
- Organized effort to achieve a specific goal, often in politics.
- Visual content often found on platforms like YouTube.
- Pamphlet providing information or promoting a product.
10 Clues: Medical test for breast health screening. • A small, typically round, flat piece of food. • Online platform containing information or services. • Act Legislation aimed at supporting community needs. • Media Online networks for communication and sharing. • Visual content often found on platforms like YouTube. • Gathering of people for discussion and collaboration. • ...
Data Analytics - Crossword Unit 1 2019-02-04
Across
- The data used for testing
- The data used for learning
- The process of extracting patterns from the data
- Repository of data
- Classifying separator in support vector machines
- In neural networks the nodes are assigned with ---
Down
- Classifier easily understandable by layman
- Analysis to Understand what products or services are commonly purchased together
- Process of converting large amount of data into knowledge [ short form]
- The man who said the processing speed doubles every 18 months
10 Clues: Repository of data • The data used for testing • The data used for learning • Classifier easily understandable by layman • The process of extracting patterns from the data • Classifying separator in support vector machines • In neural networks the nodes are assigned with --- • The man who said the processing speed doubles every 18 months • ...
5th Grade -Unit 7 Week 1 Vocabulary Words 2024-04-19
Across
- very tiring or difficult
- to come into being or operation
- to direct or control
- goods shmanyat, plane, train, or truck
- a nobleman by birth of a particular rank
Down
- a rich, powerful person in business or industry
- to use power to manage or command
- a person whom one tries to be better than; competitor
- a long journey by air, land, sea, or outer space
- a system that involves a number of persons or groups
10 Clues: to direct or control • very tiring or difficult • to come into being or operation • to use power to manage or command • goods shmanyat, plane, train, or truck • a nobleman by birth of a particular rank • a rich, powerful person in business or industry • a long journey by air, land, sea, or outer space • a system that involves a number of persons or groups • ...
Public Policy in China 2023-05-17
Across
- Highest decision-making body in Chinese party-state
- Number of administrative levels in Chinese public administration
- Other word for policy field
- Policy cycle phase where gaps occur
Down
- Third pillar in Chinese party-state, after Party and State
- Important actor networks according to Sabatier
- Phase of stability according to Baumgartner and Jones
- Influential retired decision-makers within the CCP
- Super ministry headed by premier, starts with State
- List of issues governments want to solve
10 Clues: Other word for policy field • Policy cycle phase where gaps occur • List of issues governments want to solve • Important actor networks according to Sabatier • Influential retired decision-makers within the CCP • Highest decision-making body in Chinese party-state • Super ministry headed by premier, starts with State • ...
Crossword Labs 3 2025-10-31
Across
- Multiple computers connected together to share resources
- Physical components of a computer system
- Programs and operating information used by a computer
- Number system that uses only 0s and 1s
- A collection of elements organized for a common purpose
Down
- A step-by-step procedure for solving a problem
- Protection of computer systems from theft or damage
- Computer components that retain digital data
- An organized collection of structured information
- Global system of interconnected computer networks
10 Clues: Number system that uses only 0s and 1s • Physical components of a computer system • Computer components that retain digital data • A step-by-step procedure for solving a problem • An organized collection of structured information • Global system of interconnected computer networks • Protection of computer systems from theft or damage • ...
Application of Boosting And Ensemble Learning 2025-10-31
Across
- Detects anomalies or intrusions in networks
- Used in suggesting products or movies on platforms
- General purpose of using ensemble models
- Applied in detecting diseases in the medical field
- Helps in predicting stock prices or sales trends
- Used for improving decision-making processes
Down
- Applied in dividing images into meaningful regions
- Used in image and speech recognition tasks
- Used in identifying spam or fraudulent activities
- Common application in sorting data into categories
10 Clues: General purpose of using ensemble models • Used in image and speech recognition tasks • Detects anomalies or intrusions in networks • Used for improving decision-making processes • Helps in predicting stock prices or sales trends • Used in identifying spam or fraudulent activities • Applied in dividing images into meaningful regions • ...
DEC30023: Network Types 2025-02-02
6 Clues: A wireless LAN technology • The largest WAN in the world • A common wired LAN technology • A high-speed connection method • A device that connects networks • A common PAN communication method
Network Hardware 2021-05-05
Across
- fastest wired connection
- network is controlled by a server
- data is sent across a LAN in...
- all devices are equal on this network
- the address system used on a LAN
- directs frames of data across a LAN
- directs packets of data between networks
- the backup updates and security have to be done like this on a peer to peer network
Down
- connects the device to a network and contains the MAC address
- allows wireless connection to a network
- slower wired connection
- data is sent across a WAN in....
- the address system used on a WAN
13 Clues: slower wired connection • fastest wired connection • data is sent across a LAN in... • data is sent across a WAN in.... • the address system used on a LAN • the address system used on a WAN • network is controlled by a server • directs frames of data across a LAN • all devices are equal on this network • allows wireless connection to a network • ...
WAN 2023-10-10
Across
- What does URL stand for
- how long can wweb hosting networks be acessed for
- what does the cloud do
- what is the name of the biggest WAN on the planet
- why should people work on the cloud (what happens to thier work?)
- what does vpn stand for?
Down
- what does ISP stand for
- what area does a WAN cover (big, small, medum large geogrpphical area?)
- what does dns stand for
- what does WAN stand for
- what does IPaddress stand for/ mean
- WANs are often a collection of …
- What is used to make a virtual network?
13 Clues: what does the cloud do • what does ISP stand for • What does URL stand for • what does dns stand for • what does WAN stand for • what does vpn stand for? • WANs are often a collection of … • what does IPaddress stand for/ mean • What is used to make a virtual network? • how long can wweb hosting networks be acessed for • what is the name of the biggest WAN on the planet • ...
Technical Quiz 2025-10-11
Across
- A portable device category requiring BIS certification
- Electronic device that amplifies signals
- Device that can switch electronic signals, key in circuits
- BIS compulsory regulation that covers over 100 categories of electronic goods
- The official mark on certified electronic products
- Component allowing current flow in one direction
Down
- Electrical component used to store charge
- Electrical resistance unit named after a physicist
- Optic Optical communication technology used in networks
- Certification process mandatory before importing electronics in India
- National organization responsible for standards in India
- Popular device requiring testing under BIS before sale in India
- Measurement instrument for current
13 Clues: Measurement instrument for current • Electronic device that amplifies signals • Electrical component used to store charge • Component allowing current flow in one direction • Electrical resistance unit named after a physicist • The official mark on certified electronic products • A portable device category requiring BIS certification • ...
I SOCIAL NETWORKS 2020-12-29
6 Clues: ti seguono • durano 24 ore • lo metti se ti piace • lo scrivi sotto la foto • invenzione di mark zuckemberg • social network per la condivisione di foto
Andres muniz 2016-12-01
Across
- a person that gains access to your computer
- the history of the book printing
- ENGINE identifies idea’s in a data base
- a web page that allows edits
- OPERATORS and, or, and not
- Reference
- USE have permission to use as yours
- the accepted way to communicating on the internet
- RESOURCE LOCATOR (URL) location or address that tells you where documents are
- copying people
- global communication network connect to exchange information
- operate with a network
- TABS bookmark
Down
- copying people without permission
- taking someone else’s work
- unauthorized use
- a link that takes to a web site
- NETWORKS social interaction
- (HOST) names of individuation
- private network
- a newspaper to the internet
- navigate the world wide web
- to start over
- an agent that mostly consists of a nucleic acid
24 Clues: Reference • to start over • copying people • TABS bookmark • private network • unauthorized use • operate with a network • taking someone else’s work • OPERATORS and, or, and not • a newspaper to the internet • navigate the world wide web • a web page that allows edits • NETWORKS social interaction • (HOST) names of individuation • a link that takes to a web site • ...
computer crossword 2017-06-21
Across
- program that runs against a Web server
- resources
- device for storing and processing data .
- pulverize, or force inwards by compressing forcefully.
- representation on a screen of a program, option, or window,
- working surface of a desk
- the Alt, Control and Delete keys simultaneously
- of Internet servers that support specially formatted documents.
- or program that enables
- (a document) in a cabinet, box, or folder in a particular order
- way to organize computer files
Down
- a window in form or function, in particular.
- mail, or unsolicited commercial email
- high-capacity, self-contained storage device
- software program inserting its own code
- or device used for observing.
- network of networks infrastructure
- wear-case, monitor, keyboard, and mouse.
- data from a remote system
- kind devise to help a computer
- be used with any computer that has a USB port.
21 Clues: resources • or program that enables • working surface of a desk • data from a remote system • or device used for observing. • kind devise to help a computer • way to organize computer files • network of networks infrastructure • mail, or unsolicited commercial email • program that runs against a Web server • software program inserting its own code • ...
CS Principles 2022 2022-04-27
Across
- Error checking mechanism built into internet packages
- Encoding data
- Allows for scalability of the internet
- Data about data
- Decoding data
- A type of compression in which no data is lost
- A public copywrite license
- Contain packets
- The use of digital data to approximate real world data
Down
- When a system can still function after parts of it have failed
- Anything that uses software
- Finding a path from sender to receiver
- Measured in bits per second
- Set of rules dictating how a system functions
- An approximate solution to an undecidable problem
- How many resourses an algorithm uses
- The inclusion of extra components meant to reduce the likelihood of failure
- A type of compression in which data is lost
- A wireless access point that give unauthorized access to secure networks
- Contain chunks of data
20 Clues: Encoding data • Decoding data • Data about data • Contain packets • Contain chunks of data • A public copywrite license • Anything that uses software • Measured in bits per second • How many resourses an algorithm uses • Finding a path from sender to receiver • Allows for scalability of the internet • A type of compression in which data is lost • ...
Unit3 2019-04-07
Across
- who can not stop drinking
- of or for the mode
- cause to be notstraight or exact
- being dependent on sth
- suddenly
- breaking something into small pieces
- action of making a situation, quality or feather appear greater
- ability to develop
- the opposite
- see,notice orrealize something
- an occasion
Down
- a place or an occasion for taking about a problem
- the state of developing
- pleasure
- made to look,like the real thing
- neither small nor large but between the two
- low in spirits
- skim the internet aimlessly
- cause sb to feel distant from or not welcome to sb else
- data blanks and networks in computer technology considered as a space
- a word in witch sb can do anything or go anywhere
- help to develop
- means or right of using
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • of or for the mode • ability to develop • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • cause to be notstraight or exact • made to look,like the real thing • ...
Unit3 2019-04-07
Across
- made to look,like the real thing
- who can not stop drinking
- cause sb to feel distant from or not welcome to sb else
- the opposite
- data blanks and networks in computer technology considered as a space
- suddenly
- of or for the mode
- breaking something into small pieces
- neither small nor large but between the two
- a word in witch sb can do anything or go anywhere
- help to develop
Down
- an occasion
- action of making a situation, quality or feather appear greater
- ability to develop
- the state of developing
- means or right of using
- low in spirits
- pleasure
- see,notice orrealize something
- being dependent on sth
- cause to be notstraight or exact
- skim the internet aimlessly
- a place or an occasion for taking about a problem
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • ability to develop • of or for the mode • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • made to look,like the real thing • cause to be notstraight or exact • ...
computer networking 2024-08-20
Across
- unique numerical identifier for every device
- traditional technology for connecting devices
- agreed set of rules between devices
- wireless networking technology
- delay that happens between when a user takes an action on a network
- a small segment of a larger message
- capacity at which a network can transmit data
- hardware identifier that uniquely identifies each device on a network
Down
- forwards power to other devices
- network that provides the interface
- virtual private network
- protocol that automatically provides an Internet
- network inside a network
- suite of communication protocols
- modulator demodulator
- network security device
- service that enables private IP networks to use the internet and cloud
- key building blocks for any network
- naming database in which internet domain names are located and translated into Internet Protocol
- service set identifier
20 Clues: modulator demodulator • service set identifier • virtual private network • network security device • network inside a network • wireless networking technology • forwards power to other devices • suite of communication protocols • network that provides the interface • agreed set of rules between devices • a small segment of a larger message • key building blocks for any network • ...
Jargon Crossword 2025-12-11
Across
- EU directive for cybersecurity
- fieldbus communication standard
- Key metric for manufacturing productivity
- network device used to connect multiple devices
- system used to monitor and control processes
- IT and OT systems integration
- device connecting different networks or protocols
- Manages and monitors factory floor operations
- serial communication protocol
- industrial network protocol
- Lightweight messaging protocol for IoT devices
Down
- Upgrading existing industrial site
- device detecting changes in physical conditions
- Period when equipment is not operational
- computer used to automate processes
- specialized database for large volumes of data
- New facility built from scratch
- processes data at or near the source
- Automated machine performing repetitive tasks
- Evaluation process for systems or risks
- Driverless vehicle for material transport
- Industrial version of the Internet of Things
- Deviation from expected process behavior
23 Clues: industrial network protocol • IT and OT systems integration • serial communication protocol • EU directive for cybersecurity • fieldbus communication standard • New facility built from scratch • Upgrading existing industrial site • computer used to automate processes • processes data at or near the source • Evaluation process for systems or risks • ...
IP for Surveillance 2013-08-19
Across
- term for an individual chunk of TCP
- single source message sent to many or all, not solicited or subscribed to
- protocol that maps IP addresses to MAC addresses
- any port below 1024
- The testing interface IP Address present on ALL network cards
- This is how TCP sets up a stateful, reliable connection. Cumbersome.
- average rate of successful data transfer
- large networks are managed more efficiently by use of _______.
- handles the addressing component of a typical network
- Makes up the Internet Protocol suite
- numbers used to separate the host and network portions of an IP Address
- Address ____ Protocol
- All IP Addresses EXCEPT 10, 172 and 192 ARE _______.
- like a channel on television or a specific frequency on a walkie-talkie
- _____ host control protocol
- layer 2 device (of the OSI Model, remember that?)
- sometimes used as a measurement of data transfer but includes protocol overhead and lost packets
- IP Addresses beginning with 10, 172 and 192 are classified as what type of addresses?
- can identify the type of data in a data packet, divide the packets into traffic classes and prioritized for forwarding
- use this to get through a firewall that is blocking a desired port
- sending IP datagrams to a group of interested receivers in a single transmission.
- portion of the IP Address that represents the group or 'family'
- In the OSI model, data communication starts with the ___ layer
- protocol used to provide IP Addresses automagically
- computers use this numbering system
- address consisting of eight hexidecimal pairs of numbers
- connects networks to one another
- Media ____ Control
Down
- ports used after initial client server connections are established
- guarantees dlivery of the datagrams
- Layer 7 of the Open Systems Interconnection Model
- translates domain names, meaningful for users, to the numerical IP addresses needed for the purpose of locating computer services and devices.
- a ______ protocol can send unicast, broadcast or multicast messages
- term associated with the path to an adjacent router
- technology for virtually segmenting networks
- a really dumb switch. Not really available any more.
- packet sent when server confirms client has been provided a lease on an IP Address
- connection-oriented protocols can only use ______ addresses
- Abreviation for the 'model' which defines internetworking, conceptually, as mad up of 'layers'
- minimum value in a dotted decimal octet
- Layer 1 of the Open Systems Interconnection Model
- single grouping of numbers in an IP Address
- portion of the IP Address that represents the individual unit
- humans use this numbering system
- IP Addresses are written in this format
- number of OSI layers used in the TCP/IP stack
- type of packet sent by client who needs an IP Address
- term for the IP packet
- theoretical maximum transmission speed
- protocol is the lazy cousin of TCP. Used when gauranteed delivery of packets is not needed
- endpoint of a TCP/IP connection
- Number of layers in the Open Systems Interconnection Model
52 Clues: Media ____ Control • any port below 1024 • Address ____ Protocol • term for the IP packet • _____ host control protocol • endpoint of a TCP/IP connection • humans use this numbering system • connects networks to one another • term for an individual chunk of TCP • guarantees dlivery of the datagrams • computers use this numbering system • Makes up the Internet Protocol suite • ...
2025 Cybersecurity Awareness Month 2025-09-08
Across
- Fake system set up to lure hackers.
- Unauthorized access to data or systems
- Fake emails or messages to steal information
- Malware that locks files and demands payment.
- Code used to take advantage of a vulnerability.
- Hacker intercepts communication between two parties.
- Securing data by converting it into unreadable code.
- Encrypts internet traffic for secure browsing
Down
- Authentication Verifying identity using two methods.
- EU law protecting personal data privacy.
- Security barrier between trusted and untrusted networks.
- Process of verifying a user’s identity.
- Username and password for authentication.
- Malicious code that spreads through files or programs
- Software that protects against malicious programs.
- Malware disguised as legitimate software.
- Isolated environment for testing suspicious files
- Security rules for handling credit card data.
18 Clues: Fake system set up to lure hackers. • Unauthorized access to data or systems • Process of verifying a user’s identity. • EU law protecting personal data privacy. • Username and password for authentication. • Malware disguised as legitimate software. • Fake emails or messages to steal information • Malware that locks files and demands payment. • ...
Trade Networks and the Black Death 2023-02-23
Across
- After the plague, workers gained power and earned higher _______________.
- As a result of the plague, many Europeans began to question the _______________ and their power.
- Goods and _______________ traveled along these trade routes.
- Where did the bubonic plague originate or start?
- Network of trade routes that connected China to Europe.
- In some areas death rates reached as high as _______________ percent.
- Bacteria that caused the Black Death
Down
- This is the deadly disease that killed millions in the 1300s.
- How did the plague get to Italy?
- Continent that got hit the worst.
- The system of _______________ ended as there were fewer peasants to work in the fields.
- Responsible for spreading the deadly bacteria to humans.
- Number of individuals from Africa, Asia and Europe that perished as a result of this disease.
- Swollen lymph nodes are called this.
- Number of years the plague lasted.
15 Clues: How did the plague get to Italy? • Continent that got hit the worst. • Number of years the plague lasted. • Swollen lymph nodes are called this. • Bacteria that caused the Black Death • Where did the bubonic plague originate or start? • Network of trade routes that connected China to Europe. • Responsible for spreading the deadly bacteria to humans. • ...
Mesh Networks by Tim Hoover 2020-05-23
Across
- Apple's device for streaming content from the Internet to a TV.
- A device to wirelessly transmit the internet signal in a home setup.
- The device provided by your Internet Service Provider, needed for connection to the Internet.
- A cable for connecting video sources and outputs.
- Another word for each device on a wireless network.
- A measure of the volume of data an Internet connection can support.
Down
- A physical barrier in a home that might weaken a wifi signal.
- While range extenders can expand the reach of a wifi network, they will usually decrease the ________ of the connection.
- Internet connection via a cable rather than wifi.
- The most common first name for staff at Apple Polo Park.
- A software framework from Apple for securely controlling smart devices in the home.
11 Clues: Internet connection via a cable rather than wifi. • A cable for connecting video sources and outputs. • Another word for each device on a wireless network. • The most common first name for staff at Apple Polo Park. • A physical barrier in a home that might weaken a wifi signal. • Apple's device for streaming content from the Internet to a TV. • ...
Entertainment Marketing 2014-01-27
Across
- Most popular snack in a movie theatre
- Selling additional related products tied to one name
- Process of developing, promoting, and distributing products
- Biggest sports event on TV
- Retail business with a physical location or store site
- A short-term popular trend
- Business situation where few firms affect but do not control an industry
- costs and income equal to the income revenue
Down
- Focuses on service rather than profit
- time free from work
- Rankings of TV programs
- Marketing that focuses on a small market of consumers
- Methods used for communicating and transmitting messages
- Independent broadcaster that contracts with larger national networks
14 Clues: time free from work • Rankings of TV programs • Biggest sports event on TV • A short-term popular trend • Focuses on service rather than profit • Most popular snack in a movie theatre • costs and income equal to the income revenue • Selling additional related products tied to one name • Marketing that focuses on a small market of consumers • ...
Quick_Crossword 2023-03-14
Across
- The top layer
- Protocol used to send data unreliably
- transfers packets between two or more networks
- Used to check connectivity between two devices
- European data protection legislation
- Layer 2 device on a network
Down
- Tool used to scan network hosts for open ports
- Name of the data unit at the data link layer
- Conceptual model used to help us understand networking
- Allows devices to connect wirelessly
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- Area of weakness
- Prevents legitimate access to a resource
- The physical address that network devices have
14 Clues: The top layer • Area of weakness • Layer 2 device on a network • Allows devices to connect wirelessly • European data protection legislation • Protocol used to send data unreliably • Prevents legitimate access to a resource • Name of the data unit at the data link layer • Tool used to scan network hosts for open ports • transfers packets between two or more networks • ...
Desires and Likes 2021-10-16
Across
- / is a team sport played between two teams of eleven players each and some referees who make sure that the rules are followed correctly.
- / is a decentralized set of interconnected communications networks, which use the TCP / IP family of protocols, which guarantees that the heterogeneous physical networks that compose it constitute a single logical network of global reach.
- /is a building built and intended to be inhabited.
- / is a group of people formed by united individuals, and primarily linked by filiation or partner relationships.
- / It is a place where various aesthetic services are offered, mainly haircuts.
Down
- / is a portable device that can make or receive calls through a radio frequency carrier, while the user is moving within a telephone service area.
- / refer to those practices and traditions whose objective is to subdue or defend oneself through a specific technique.
- / is a two-wheeled vehicle, 1 powered by a gasoline internal combustion engine that powers the rear wheel.
- / refers, in ancient times, to the aromatic substance that gave off a fragrant smoke when burned.
- / is a series of still images which, when projected onto a screen consecutively in rapid succession, create the optical illusion of moving images.
10 Clues: /is a building built and intended to be inhabited. • / It is a place where various aesthetic services are offered, mainly haircuts. • / refers, in ancient times, to the aromatic substance that gave off a fragrant smoke when burned. • / is a two-wheeled vehicle, 1 powered by a gasoline internal combustion engine that powers the rear wheel. • ...
May 2021 Newsletter Crossword Puzzle 2021-05-07
Across
- The name of the Wi-Fi network that is being set up.
- An individual, groups, or states who maliciously intend to take advantage of vulnerabilities to gain unauthorized access to information systems in order to access networks, systems, devices, and data.
- Security professionals who act as adversary hackers to successful attack system security, gain unauthorized access to assets, and evaluate system security.
- An attacker inserts themselves secretly between you and another person on the internet to eavesdrop and capture sensitive information like passwords.
Down
- Network hardware that allows communication between your local home network such as personal computers and other connected devices like Alexa, an Internet of Things device.
- A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data.
- Defensive security professionals responsible for maintaining internal network defenses against each threat and cyberattack.
- The speed at which data is transmitted and received among the devices on your wireless network.
- Wired computer networking technologies used in local area networks to connect computers and other network devices to share files, information, and data.
- A wireless networking technology that allows devices such as computers, mobile devices, and other equipment to interface with the internet.
10 Clues: The name of the Wi-Fi network that is being set up. • The speed at which data is transmitted and received among the devices on your wireless network. • A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data. • ...
It words 2024-12-17
Across
- The description or measurement of the overall performance of a service, such as telephony or computer networking, particularly the performance seen by the users of the network
- An intermediary server separating end users from the websites they browse, providing varying levels of functionality, security, and privacy.
- The maximum rate of data transfer across a given path, measured in bits per second (bps).
- A protocol that allows IPv4 hosts on the same local link to perform name resolution for other hosts without the need for a DNS server.
- A device that distributes network or application traffic across multiple servers to ensure no single server becomes overwhelmed
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
- The practice of dividing a network into two or more smaller networks, improving performance and security.
- A routing protocol for Internet Protocol (IP) networks that uses a link state routing algorithm and falls into the group of interior gateway protoco
- The creation of a virtual version of something, such as a server, a storage device, or network resources.
- The delay before a transfer of data begins following an instruction for its transfer.
10 Clues: The delay before a transfer of data begins following an instruction for its transfer. • The maximum rate of data transfer across a given path, measured in bits per second (bps). • The practice of dividing a network into two or more smaller networks, improving performance and security. • ...
Biological approach to understanding behaviour 2023-03-06
Across
- a longitudinal family study,to study the potential genetic nature of Major Depressive Disorder
- study of the role of acetylcholine in the encoding of spatial memory
- study of flashbulb memory, the role of emotion in the creation of memory
- case study of the role of the hippocampus on memory formation
- study of the role of stress hormones on memory,determine the effect of glucocorticoids(stress hormones)on memory
- study on the role that gene mutation and epigenetics may play in major depressive disorder
Down
- to determine the potential role of biological factors on flashbulb memories
- an experiment to see the effect of AND and EST on heterosexual and homosexual men and women
- the effects of stress on verbal declarative memory, investigate whether high levels of the stress hormone cortisol interfere with verbal declarative memory
- study of neuroplasticity that demonstrates how a repeated action can lead to the growth of neural networks - and then the cessation of that activity can lead to neural pruning, study of neuroplasticity that demonstrates how a repeated action can lead to the growth of neural networks - and then the cessation of that activity can lead to neural pruning
- study to demonstrate how cognitive processes may lead to neuroplasticity in the hippocampus. (London Taxi Drivers)
11 Clues: case study of the role of the hippocampus on memory formation • study of the role of acetylcholine in the encoding of spatial memory • study of flashbulb memory, the role of emotion in the creation of memory • to determine the potential role of biological factors on flashbulb memories • ...
My crossword 2022-10-04
Across
- a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
- a network that exists over a large-scale geographical area, as compared to other network types, such as a local area network.
- a network security device that monitors and filters incoming and outgoing network traffic based on security policies
- network component that is physically connected to a central node such as a router, hub or switch.
Down
- a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes.
- a network device that both modulates and demodulates analog carrier signals for encoding and decoding digital information for processing.
- a computer hardware component that allows a computer to connect to a network. NICs may be used for both wired and wireless connections.
- a high-speed device that receives incoming data packets and redirects them to their destination on a local area network.
- a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings.
- a device that connects two or more packet-switched networks or subnetworks.
- a hardware device or configured node on a local area network (LAN) that allows wireless capable devices and wired networks to connect through a wireless standard
11 Clues: a device that connects two or more packet-switched networks or subnetworks. • network component that is physically connected to a central node such as a router, hub or switch. • a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic. • ...
computing terms 2016-03-14
Across
- a common computer software whose name also describes a component found on a house
- other name for a video card
- the most used search engine in the world
- a computer code represented by 1s and 0s
Down
- main circuit board in a computer
- processes and plays sound
- software to help protect your computer
- device where the computer stores long term data
- device that links computer networks
9 Clues: processes and plays sound • other name for a video card • main circuit board in a computer • device that links computer networks • software to help protect your computer • the most used search engine in the world • a computer code represented by 1s and 0s • device where the computer stores long term data • ...
Connect Crossword 2025-01-28
Across
- A collection of devices in one physical location
- A system of representing data in 1s and 0s
- System software that manages computer hardware and software resources
- Random Access....
Down
- A process or set of rules to be followed in calculations
- First letter in CPU
- A device that connects two or more networks or subnetworks
- an input device used to enter characters and functions
- Waste Electrical and ***** Equipment
9 Clues: Random Access.... • First letter in CPU • Waste Electrical and ***** Equipment • A system of representing data in 1s and 0s • A collection of devices in one physical location • an input device used to enter characters and functions • A process or set of rules to be followed in calculations • A device that connects two or more networks or subnetworks • ...
Computing systems and networks - systems and searching 2025-08-25
Across
- A small device you move to control the pointer
- Another search engine that also gives email
- A person who uses a computer
- A very popular search engine
- The device you use to type letters and numbers
- The biggest network in the world
- The part of a system where information enters
- A machine that gives a paper copy of your work
- A company that makes Windows
Down
- A person that is also part of a system
- The brain of the computer that processes information
- The machine we use to compute and work
- The word you type to find things online
- A group of parts working together
- Another search engine starting with “B”
- The part of a system that shows the result
- The flat part where you watch videos or games
- A group of computers connected together
- The part of a computer that shows pictures and text
- The middle step in a system, between input and output
20 Clues: A person who uses a computer • A very popular search engine • A company that makes Windows • The biggest network in the world • A group of parts working together • A person that is also part of a system • The machine we use to compute and work • The word you type to find things online • Another search engine starting with “B” • A group of computers connected together • ...
test1 2024-04-10
Jessica Perez 2014-04-04
Across
- – An unauthorized person who secretly gains access to computer files.
- NETWORKS -- online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software
- – software used to view various kinds of Internet resources found on the Web.
- -- A bully who operates online, in cyberspace; To bully online
- - a list of citations that appear at the end of a paper, article, chapter or book.
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
Down
- - A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- or graphics that, when clicked, will connect the user to a new web page or another place on the same page
- – Originally known as Web Log. Blogs are websites that contains dated text e citations that appear at the end of a paper, article, chapter or bookntries,
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
12 Clues: -- A bully who operates online, in cyberspace; To bully online • – An unauthorized person who secretly gains access to computer files. • – software used to view various kinds of Internet resources found on the Web. • - a list of citations that appear at the end of a paper, article, chapter or book. • ...
Packets, Protocols, and Adresses 2021-05-18
7 Clues: A label for a network device • A large spaced computer network • An agreed format between devices • A limited computer network space • A unique number on a network card • Small amount of data sent over network • Used to make a secure connection over other networks
computer technology words 2022-01-05
Across
- wireless signal used to connect devices to internet
- a mobile computer device with a screen
- information input or stored on a computer
- a set of computers sharing one internet address
- handheld hardware input device
- opening used to plug a charger into a computer
- computer output display device (image or words)
- network hardware to connects networks to internet
- device to charge a battery or computer
Down
- world wide network where information is shared
- personal computer easily moved
- device(phone) not needing to be outlet plugged
- a large computer that sits on a desk
- a panel of typing keys to operate a computer
14 Clues: personal computer easily moved • handheld hardware input device • a large computer that sits on a desk • a mobile computer device with a screen • device to charge a battery or computer • information input or stored on a computer • a panel of typing keys to operate a computer • world wide network where information is shared • device(phone) not needing to be outlet plugged • ...
your heart 2021-11-01
Across
- blood vessels that carry blood away from the heart
- a straw colored liquid
- what arterioles branch off into
- blood vessels that carry blood back to the heart
- what arteries branch off into
- the flow of blood between the heart and everything but the lungs
- upper chamber of the heart
- these transport oxygen to other cells of the body
Down
- these carry blood from capillary networks to veins
- slippery membrane that covers the heart
- the transport of blood back and forth between the heart and lungs
- study of the heart
- lower chamber of the heart
- cell pieces that form clots
14 Clues: study of the heart • a straw colored liquid • lower chamber of the heart • upper chamber of the heart • cell pieces that form clots • what arteries branch off into • what arterioles branch off into • slippery membrane that covers the heart • blood vessels that carry blood back to the heart • these transport oxygen to other cells of the body • ...
Technology Vocabulary 2021-08-02
Across
- /the exclusive right to sell a work
- page /the opening page of a web site
- /a set of characters comprising a unit of information
- in /enter a computer
- /an organized body of related information
- /any small compartment
Down
- /a unit of measurement of information
- out /exit a computer
- /a worldwide network of computer networks
- /of or pertaining to a number system having 2 as its base
- /a computer providing shared resources to a computer network
- /transfer out of a database or document
- /a set of related records kept together
- /locate and correct errors in a computer program code
- /restore something reduced in volume to its full volume
15 Clues: out /exit a computer • in /enter a computer • /any small compartment • /the exclusive right to sell a work • page /the opening page of a web site • /a unit of measurement of information • /transfer out of a database or document • /a set of related records kept together • /a worldwide network of computer networks • /an organized body of related information • ...
Career Options 2022-11-11
Across
- A person trained to give guidance on personal, social, or psychological problems.
- Joins two pieces of metal together.
- Types include voice, screen, stage or character.
- People in these jobs work to protect our communities.
- Protects computer systems, networks and data.
- Transports goods all over the country.
- Repairs and maintains machinery, motors, etc.
Down
- A scientist who studies fossils.
- Health of the human body.
- Jobs in this field include coaches, announcers and recruiters.
- Performs beauty treatment regimens on hair, skin and nails.
- Invent, design and maintain machines, structures and data systems.
- Defends the U.S.and its allies.
- Set up situations in which students can learn effectively.
14 Clues: Health of the human body. • Defends the U.S.and its allies. • A scientist who studies fossils. • Joins two pieces of metal together. • Transports goods all over the country. • Protects computer systems, networks and data. • Repairs and maintains machinery, motors, etc. • Types include voice, screen, stage or character. • ...
Computer Science Crossword 2024-03-21
Across
- The main page of a website.
- A security system that controls incoming and outgoing network traffic.
- A small file saved by websites to remember user information.
- Wireless internet connection.
- A step-by-step procedure for calculations.
- A program used to navigate the internet.
- A list of commands executed by a program or scripting engine.
Down
- A scam to steal personal information via email.
- Information processed or stored by a computer.
- Finding and fixing errors in code.
- Protection for computer systems and networks.
- A way of representing data using only two digits, 0 and 1.
- The ability to read and write.
- The address of a web page.
14 Clues: The address of a web page. • The main page of a website. • Wireless internet connection. • The ability to read and write. • Finding and fixing errors in code. • A program used to navigate the internet. • A step-by-step procedure for calculations. • Protection for computer systems and networks. • Information processed or stored by a computer. • ...
Oklahoma Computer Science 2025-05-13
Across
- A tool to organize, calculate, and analyze data
- A unique number for each device on a network
- Programs and apps that run on a computer
- A list of steps to solve a problem
- A group of connected computers that share information
- Information that can be collected and used
- Finding and fixing errors in code
Down
- Protecting devices and data from digital threats
- A device that sends data between computers and networks
- Code that repeats instructions
- A value in a program that can change
- Technology doing tasks without human help
- Showing only specific data based on rules
- The physical parts of a computer
14 Clues: Code that repeats instructions • The physical parts of a computer • Finding and fixing errors in code • A list of steps to solve a problem • A value in a program that can change • Programs and apps that run on a computer • Technology doing tasks without human help • Showing only specific data based on rules • Information that can be collected and used • ...
Tech 2025-09-05
Across
- "A popular programming language for web development."
- "A program that helps users browse the internet.",
- "A global system of interconnected computer networks.",
- "The physical parts of a computer.",
- "A place where apps are downloaded on Android devices.",
- "A popular social media platform owned by Meta.",
Down
- "The brain of the computer.",
- "A type of malicious software often called a 'worm' or 'Trojan.'",
- "A technology that allows voice interaction with computers, e.g., Alexa.",
- "A company that makes iPhones.",
- "A portable computer.",
- "A wireless technology standard for exchanging data over short distances.",
- "A device that stores digital data.",
- "The system software that manages hardware and software.",
14 Clues: "A portable computer.", • "The brain of the computer.", • "A company that makes iPhones.", • "The physical parts of a computer.", • "A device that stores digital data.", • "A popular social media platform owned by Meta.", • "A program that helps users browse the internet.", • "A popular programming language for web development." • ...
IEEE CS Git Informed 2025-10-27
Across
- Computation type where multiple processes run simultaneously.
- Iterative and incremental approach to development.
- Pioneer recognized as the father of computer science.
- A fundamental unit of work in a database system.
- Integrated circuit that contains the core of a computer.
- Fundamental structure of a computer system's components.
Down
- Step-by-step procedure for solving a problem.
- Formal documents defining hardware and protocol rules.
- Prefix describing the security field protecting networks.
- The primary focus area of the Computer Society.
- Chip designed for a specific application only.
- Computing resources delivered over the internet.
- The academic field central to the IEEECS mission.
- Peer-reviewed academic publication of the society.
14 Clues: Step-by-step procedure for solving a problem. • Chip designed for a specific application only. • The primary focus area of the Computer Society. • A fundamental unit of work in a database system. • Computing resources delivered over the internet. • The academic field central to the IEEECS mission. • Iterative and incremental approach to development. • ...
Computer Networking 2024-09-16
Across
- Global network of networks
- Provides internet to users on payment
- It is a host computer which controls access to h/w & s/w
- Set of standard rules used for communication
- Address is an unique ID assigned to a Computer
Down
- Contains many web pages
- Group of interconnected computer sytems and devices
- It is the address of the website
- Computer which depends on the server for all resources
9 Clues: Contains many web pages • Global network of networks • It is the address of the website • Provides internet to users on payment • Set of standard rules used for communication • Address is an unique ID assigned to a Computer • Group of interconnected computer sytems and devices • Computer which depends on the server for all resources • ...
technology vocabulary 2021-08-13
Across
- put into format that can be read or processed by computers
- set up for a particular purpose
- a unit of measurement of information
- crime commited using a computer and the internet
- transfer a file or program to a smaller computer
- space a world wide network of of computer networks
- any small compartment
- an organized body of related information
Down
- a program thatgives a computer instrucctions
- a listing of the computer files stored in memory
- the exclusive right to sell a work
- locate and correct errors in a computer program code
- transfer a file or program to a smaller computer
- restore something reduced in volume to it's full volume
- a data transmmision rate for modems
15 Clues: any small compartment • set up for a particular purpose • the exclusive right to sell a work • a data transmmision rate for modems • a unit of measurement of information • an organized body of related information • a program thatgives a computer instrucctions • a listing of the computer files stored in memory • crime commited using a computer and the internet • ...
NoSQL Databases 2021-08-27
Across
- This is the database in Cassandra
- Most popular wide column store NoSQL database
- NoSQL databases is used mainly for handling large volumes of ______________ data
- MongoDB documents are stored inside____
- one of the popular key-value database
Down
- one of the properties of CAP theorem
- ________ stores are used to store information about networks such as social connection
- one of the categories of NoSQL database
- Protocol name in Cassandra
- One of the V in big data
- MongoDB stores data in terms of__________
- one of the component in Cassandra database
- The query language of cassandra
- _____ is a widely used document based NoSQL data model
14 Clues: One of the V in big data • Protocol name in Cassandra • The query language of cassandra • This is the database in Cassandra • one of the properties of CAP theorem • one of the popular key-value database • one of the categories of NoSQL database • MongoDB documents are stored inside____ • MongoDB stores data in terms of__________ • one of the component in Cassandra database • ...
Effects of ICT 2013-03-19
Across
- in modern office, .... is less used
- This is cause due to the rapid development of technology connectivity
- People can share data and hold meetings online
- Negative out view of the future
- Amazon, Ebay,...
- Positive out view of the future
- Allow people to send and receive message
- This is caused due to the advance development of technology which could replace human
- People can still work at home
Down
- It's a work for woman to just sit and type the whole day
- typists, filers,...
- Don't meet people face to face
- Youtube, gaming, social networks...
- Vast quantities of data can be stored in small amounts of space
14 Clues: Amazon, Ebay,... • typists, filers,... • People can still work at home • Don't meet people face to face • Negative out view of the future • Positive out view of the future • in modern office, .... is less used • Youtube, gaming, social networks... • Allow people to send and receive message • People can share data and hold meetings online • ...
