networks Crossword Puzzles
DEET Halloween Challenge 2023-10-30
Across
- QW4gb3BlbiBkb29yd2F5IHRoYXQgY291bGQgbGV0IG1vbnN0ZXJzIGluLg==
- See Image 3
- A spell to mend and keep away vulnerabilities.
- A plan for when full moons cause unexpected issues.
- A hostage-taking horror active until a bounty is paid.
- An event requiring action from the cyberteam.
- 80 114 111 118 105 110 103 32 111 110 101 226 128 153 115 32 105 100 101 110 116 105 116 121
Down
- The ability to bounce back from a vampire's bite.
- A software ghost that haunts computers and networks.
- See Image 1
- See Image 2
- Following the rules to keep the cauldron from boiling over.
- An event that could lead to a horror story.
- IEQGG2DFMNVS25LQEB2G6IDFNZZXK4TFEBXG6IDTNNSWYZLUN5XHGIDBOJSSA2DJMRUW4ZZO
14 Clues: See Image 1 • See Image 3 • See Image 2 • An event that could lead to a horror story. • An event requiring action from the cyberteam. • A spell to mend and keep away vulnerabilities. • The ability to bounce back from a vampire's bite. • A plan for when full moons cause unexpected issues. • A software ghost that haunts computers and networks. • ...
Twentieth and Twenty-First Century 2023-05-01
Across
- education beyond high school
- the science of travel through air
- words,sounds,or picures sent by cable,telegraph,telephone,radio,or television.
- helped African Americans throughout Texas
- filled or overcrowded
- a short,easy to remember phrase used in advertising
- dedicated his life to the civil rights movement
- a gas used in light bulbs
Down
- the first woman to become a supreme court judge
- Greg Abbott was born here
- one of six international awards given for outstanding work
- a worldwide system of computer networks
- a newspaper article that gives an opinion on a topic
- became president and lawyer for MALDEF
14 Clues: filled or overcrowded • Greg Abbott was born here • a gas used in light bulbs • education beyond high school • the science of travel through air • became president and lawyer for MALDEF • a worldwide system of computer networks • helped African Americans throughout Texas • the first woman to become a supreme court judge • dedicated his life to the civil rights movement • ...
Network Components and Topologies 2025-03-16
Across
- Converts digital signals for transmission
- A topology where all devices connect to a central hub
- Provides wireless access to a network
- Connects multiple computers but does not filter data
- Stores and manages network resources
- A topology where data travels in a circular path
- Cable Used to connect devices for data transmission
Down
- Directs data between different networks
- Prevents signal reflection in a bus network
- Directs data to specific devices in a network
- A topology where all devices share a single communication line
- Connects two different network segments
- A topology where every device connects to multiple others
- Allows a computer to connect to a network
14 Clues: Stores and manages network resources • Provides wireless access to a network • Directs data between different networks • Connects two different network segments • Converts digital signals for transmission • Allows a computer to connect to a network • Prevents signal reflection in a bus network • Directs data to specific devices in a network • ...
cruciverba sulla cittadinanza digitale 2021-11-28
7 Clues: it is a digital profile • personal data protection • it is a network of networks • it is a form of digital bullying • virtual world extremely similar to reality • it serves to protect your data and account • online lesson which can be either free or paid
SOCIAL MEDIA 2020-12-01
7 Clues: # • a self portrait taken • a photo sharing application • a platform founded by Mark Zuckerberg • a pictorial presentation of facial expression in text writing • an image or username that represent someone on online platform • anything shared across social media networks that get passed along rapidly
Information Management 2025-09-23
Across
- Identifying risks and taking precautions to avoid them.
- Anything valuable that isn’t natural.
- A system that supports functions of Information Management.
- Anything created with someone’s mind.
Down
- The protection of networks, and data.
- A business that involves people, processes that collects data.
- An unbiased inspection to review safety, integrity, and accuracy of information.
- The accuracy of data.
- A practice not knowing outside the company.
9 Clues: The accuracy of data. • The protection of networks, and data. • Anything valuable that isn’t natural. • Anything created with someone’s mind. • A practice not knowing outside the company. • Identifying risks and taking precautions to avoid them. • A system that supports functions of Information Management. • ...
internet vocab crossword 2013-03-26
Across
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- To renew or revitalize; To reload a webpage on the internet
- a reference to a published or unpublished source (not always the original source).
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
Down
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- An unauthorized person who secretly gains access to computer files
- a piece of writing that has been copied from someone else and is presented as being your own work
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
12 Clues: To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • a reference to a published or unpublished source (not always the original source). • a piece of writing that has been copied from someone else and is presented as being your own work • ...
Smartcross 2025-06-04
Across
- It converts digital to analog signal
- In this topology components are connected in a circula manner
- process of changing data into unreadable code
- A computer network restricted to an organisation
- It is the layout in which a network is set
- This network covers 10m of range
- this protect network from unauthorised users
- Combination of net and etiquette
- Conbination of voice and phishing
- copying someone else's work
Down
- Each computer in a network
- process of purchasing licensed software and spreading it to other computers
- It means the criminal activites done using computer and internet
- These are valid till 20 years
- unwanted mails send from unknown senders
- Device that connect two networks
- An illegal intrusion into a computer or network
- Footprints left intentionally by user
18 Clues: Each computer in a network • copying someone else's work • These are valid till 20 years • Device that connect two networks • This network covers 10m of range • Combination of net and etiquette • Conbination of voice and phishing • It converts digital to analog signal • Footprints left intentionally by user • unwanted mails send from unknown senders • ...
Aliyah Caballero 2013-03-27
Across
- An unauthorized person who secretly gains access to computer files.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- a list of citations that appear at the end of a paper, article, chapter or book.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
Down
- To renew or revitalize; To reload a webpage on the internet
- a piece of writing that has been copied from someone else and is presented as being your own work
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results.
- a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network
- (HOST)Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
12 Clues: To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • a list of citations that appear at the end of a paper, article, chapter or book. • OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results. • ...
internet vocab crossword 2013-03-26
Across
- :online communities where people meet, socialize, exchange digital files, etc.
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- (HOST) – Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
- - A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
- – Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- -- A bully who operates online, in cyberspace; To bully online
- – A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- – An unauthorized person who secretly gains access to computer files
12 Clues: -- A bully who operates online, in cyberspace; To bully online • – An unauthorized person who secretly gains access to computer files • :online communities where people meet, socialize, exchange digital files, etc. • – A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com • ...
kiana's internet crossword puzzle 2013-12-02
Across
- software used to view various kinds of Internet resources found on the Web.
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- A system of connected computers that allows the sharing of files and equipment.
Down
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so seen. Clicking the tab shows you different views/websites in the same browser.it can be labeled and
- A bully who operates online, in cyberspace; To bully online
- An unauthorized person who secretly gains access to computer files.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communicatio
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
12 Clues: A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • A system of connected computers that allows the sharing of files and equipment. • ...
Aliyah Caballero 2013-03-26
Across
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
Down
- A bully who operates online, in cyberspace; To bully online.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- usally known as a web site that are used to contain dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
7 Clues: A bully who operates online, in cyberspace; To bully online. • Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page. • NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram) • ...
Computer Science 2025-10-22
Across
- connects devices using radio waves instead of physical cables, allowing for mobility and flexibility.
- a communication method that uses electronic devices to deliver messages across computer networks
Down
- he maximum amount of data that can be transferred over a network connection in a given amount of time, often measured in megabits per second (Mbps)
- protocols act as a common language for devices to communicate effectively by defining how data is formatted, transmitted, and interpreted.
- a computer network that uses physical cables, such as Ethernet or fiber optic, to connect devices like computers and printers to a network and the internet
- a global communication system that links together thousands of individual networks.
- a unique numerical label assigned to each device connected to a computer network, similar to a home address for your data.
7 Clues: a global communication system that links together thousands of individual networks. • a communication method that uses electronic devices to deliver messages across computer networks • connects devices using radio waves instead of physical cables, allowing for mobility and flexibility. • ...
7.2. Keywords 2025-01-13
6 Clues: A set of rules • Electronic mail • A network connected by wires • A network not connected by wires • A thing that has computer networks on it • Electronic item used for searching things
uGSOT #2 2025-09-11
6 Clues: Programs running on computers • Device that connects networks • Portable digital music player • Logical set of instructions for calculation • Popular programming language with snake name • Software designed to disrupt or damage systems
Virtual Private Networks (VPN's) 2020-09-29
8 Clues: Safe • Distant, far away • encoding a message • A dedicated passageway • Exists and can be touched • The equipment used in computing • There is a logic gate named this • Underlying Framework of the system
Digital Information Technology Ch. 15 Communication Networks 2025-09-15
Across
- (WEP) Early security algorithm for wireless networks designed to protect data.
- Number of bits per second that can be sent from one device to another.
- Consists of a permanent connection between two nodes.
- Network topology in which each node on the network is connected to a single main transmission cable.
- (MAN) Consists of a group of computers that in the same city or small geographical area but not necessarily in the same room or building.
- (virtual private network); Uses the Internet as an extension of a LAN or other smaller network.
- Network topology in which each node in the network carries a signal to all other nodes until the message is received at its destination.
- Software process that encodes the file to make it unreadable unless the correct key is entered.
- Continuous signal that can vary over an infinite range.
- Alphanumeric code that must be entered to allow access to something.
- Noncomputer device that attaches to a network and is given a network address.
- Network topology in which a main node connects individually to all other nodes and the other nodes do not connect to each other.
- Topology in which devices are added to the network at the end of the line, like the links in a chain.
- Process of taking measurements along the analog signal to convert it into a digital signal.
- Application or process specific software communication endpoint in a computer's operating system.
- Wireless network connection in which a computer connects to the wireless signals transmitted by a router, which is wired to a modem.
- Data transmission technology that creates a wired connection between computers and modems or routers.
- Network topology used to connect smaller star topology networks via a bus topology.
- (LAN) Consists of a group of computers and devices that are locally assembled in a limited area.
- (WPA) Security and encryption standard for wireless data transmission.
- (Wide area network); Consists of a group of computers within a large geographical area.
- Radio wave-based wireless connection technology that provides communication between devices within a short range of each other, generally up to about 30 feet.
Down
- Signal composed of discrete or segmented chunks of data.
- Arrangement of the components of the network.
- Piece of hardware or software that requests or accesses a service from a server.
- (P2P) Network topology in which all devices act like both servers and clients.
- Hardware device that provides an interface between the computer and the network; also called a network interface card (NIC).
- Common connection point for devices in a network; simplest type of network connection.
- Network transmission device that checks and forwards packets between parts of the network.
- Process of verifying a user's identification.
- Open Systems Interconnection conceptual model that separates the functions of networking into layers that keep the same functions together for
- (GAN) Network that spans multiple countries.
- Network topology in which computers and devices are connected to one another in a circle, or ring.
- Technology that creates a barrier between computers.
- LAN that is accessible to connection by roaming users.
- (IAN)Concept for networks that connect voice and data transmissions within a cloud environment.
- Computer connected to a network.
37 Clues: Computer connected to a network. • (GAN) Network that spans multiple countries. • Arrangement of the components of the network. • Process of verifying a user's identification. • Technology that creates a barrier between computers. • Consists of a permanent connection between two nodes. • LAN that is accessible to connection by roaming users. • ...
TECHNOLOGY VOCABULARY 2021-11-02
Across
- A unit of measurement of information
- BAM memory that is set aside as a specialized buffer storage
- A program that gives a computer instructions
- A worldwide network of computer networks
- Locate and correct errors in a computer program code
- Set up for a particular purpose
- the symbolic arrangement of data in a computer program
- An organized body of related information
Down
- Put into a format that can be read or processed by
- Any small compartment
- The exclusive right to sell a work
- crime committed using a computer an the internet
- A data transmission
- Having an output that is proportional to the imput
- Transfer out of a database or document
15 Clues: A data transmission • Any small compartment • Set up for a particular purpose • The exclusive right to sell a work • A unit of measurement of information • Transfer out of a database or document • A worldwide network of computer networks • An organized body of related information • A program that gives a computer instructions • ...
TECHNOLOGY VOCABULARY 2021-11-02
Across
- Locate and correct errors in a computer program code
- An organized body of related information
- Any small compartment
- BAM memory that is set aside as a specialized buffer storage
- A unit of measurement of information
- Put into a format that can be read or processed by
- A program that gives a computer instructions
- Crime commited using a computer an the internet.
Down
- A worldwide network of computer networks
- The symbolic arrangement of data in a computer program
- Having an outpout that is proportional to the input
- Set up for a particular purpose
- the excluisive right to sell a work
- A data transmission rate for modems
- Transfer out of a database or document
15 Clues: Any small compartment • Set up for a particular purpose • the excluisive right to sell a work • A data transmission rate for modems • A unit of measurement of information • Transfer out of a database or document • A worldwide network of computer networks • An organized body of related information • A program that gives a computer instructions • ...
Basic computer knowledge 2023-02-13
Across
- Where are the emails stored?
- A central system that provides information about whether users are online and passed instant messages between them
- Most common method of protection is hard ________
- Type of virus which spy your activity
- The computer file which is sent along with an email
- Opposite of encryption
- What protects your computer networks from outside attacks?
- A friend list or contact list
Down
- Calling at a fixed price
- Abbreviation for internet provider
- Type of virus which shows us advertisement
- Junk mail by other words?
- Guy who wants to steal and potentially sell your personal data
- Small article which says us contect of the email
- Program for access to your mailbox
15 Clues: Opposite of encryption • Calling at a fixed price • Junk mail by other words? • Where are the emails stored? • A friend list or contact list • Abbreviation for internet provider • Program for access to your mailbox • Type of virus which spy your activity • Type of virus which shows us advertisement • Small article which says us contect of the email • ...
network quiz 2023-02-06
Across
- network A wireless network
- Computer networks
- Transmission Control Protocol
- Transmission Transfer data
- Routers bring the Internet to your devices
- serves as the point of connection for all devices on a local area network
- a system of rules that explain the correct conduct and procedures to be followed in formal situations
- Formatted unit of data
- hardware Routers, hubs, switches, and bridges are some examples of network hardware
Down
- Maximum rate of data
- network A wired network
- cable Networking cables are networking hardware used to connect one network device to other network devices
- interconnected computing devices that can exchange data and share resources with each other.
- address An Internet Protocol
- a computer-based application for the exchange of messages between users
- A computer program
16 Clues: Computer networks • A computer program • Maximum rate of data • Formatted unit of data • network A wired network • network A wireless network • Transmission Transfer data • address An Internet Protocol • Transmission Control Protocol • Routers bring the Internet to your devices • a computer-based application for the exchange of messages between users • ...
Computing terms 2023-04-24
Across
- Appearance of writing
- Online business
- Periodic website mail
- A set of interconnected global networks that allows computers and servers to communicate efficiently using a common communication protocol
- All data linked by hypertext links, on the Internet
- Operation which consists of duplicating and securing the data
Down
- Be live | connected to a network or system, including the Internet
- Random access memory
- Circuit board that supports most of the components and connectors needed to run a compatible PC
- Witness, snitch of connexion
- Video output device
- Set of digital data gathered under the same name
- Go back | ctrl + z
- Install the improved version of an application
- Input device for entering text
15 Clues: Online business • Go back | ctrl + z • Video output device • Random access memory • Appearance of writing • Periodic website mail • Witness, snitch of connexion • Input device for entering text • Install the improved version of an application • Set of digital data gathered under the same name • All data linked by hypertext links, on the Internet • ...
Artificial Intelligence and its foundations. 2025-04-21
Across
- Way of structuring information for reasoning
- Test to check if a machine can mimic human intelligence
- Early AI focused on rules and logic
- solving Core goal of AI involving decision-making steps
- Field where systems learn from data
- System that perceives and acts in an environment
- Ability to draw conclusions from facts or rules
Down
- Ability to interpret sensory input like vision or sound
- Field that enables machines to understand human language
- Enabling machines to interpret visual data
- Science of making machines behave intelligently
- System modeled after human brain structure
- Method to explore possible solutions
- Subset of ML using neural networks with many layers
- Acquiring knowledge through experience or data
15 Clues: Early AI focused on rules and logic • Field where systems learn from data • Method to explore possible solutions • Enabling machines to interpret visual data • System modeled after human brain structure • Way of structuring information for reasoning • Acquiring knowledge through experience or data • Science of making machines behave intelligently • ...
U.S. Navy Electronic Warfare Aircraft 2025-04-16
Across
- Equipment that disrupts enemy radar and communications
- Range of frequencies used in electronic warfare
- External container holding electronic warfare gear
- Nickname for SEAD aircraft suppressing enemy air defenses
- Technique employing misleading electronic signals
- EA-18G electronic warfare variant of Super Hornet
Down
- EA-6B, predecessor to the Growler for electronic attack
- Electronic Countermeasures to jam or spoof enemy systems
- Anti-radiation missile targeting radar installations
- Emitting signals to confuse enemy tracking systems
- Missions suppressing enemy radar and air defense networks
- EF-111A electronic warfare jet historically assisting Navy
- Targeted electronic detection system for EW aircraft
- Signals Intelligence, key electronic warfare mission
- Electronic Intelligence gathering and analysis capability
15 Clues: Range of frequencies used in electronic warfare • Technique employing misleading electronic signals • EA-18G electronic warfare variant of Super Hornet • Emitting signals to confuse enemy tracking systems • External container holding electronic warfare gear • Anti-radiation missile targeting radar installations • Targeted electronic detection system for EW aircraft • ...
Test 2025-09-30
Across
- — Secondary copy to restore data after loss or attack
- — Tool that detects and removes malicious code
- — Encrypted tunnel that protects traffic over untrusted networks
- — Install latest software versions for security/features
- — Filters network traffic by rules to block threats
- — Tricking users into revealing info via fake messages
- — Malicious software (virus, worm, trojan, ransomware)
- — Information that needs protection from loss/theft
Down
- — Scrambles data so only authorized parties can read it
- — Common attack vector for scams and payloads
- — Any endpoint (laptop/phone) connecting to a network
- — Unsolicited/bulk messages often carrying scams
- — Software fix that closes security holes
- — Secret used to verify identity; should be strong/unique
- — Person who exploits systems (ethical or malicious)
15 Clues: — Software fix that closes security holes • — Common attack vector for scams and payloads • — Tool that detects and removes malicious code • — Unsolicited/bulk messages often carrying scams • — Filters network traffic by rules to block threats • — Information that needs protection from loss/theft • — Person who exploits systems (ethical or malicious) • ...
My Internet Crossword 2018-03-29
Across
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- / = about 4.3 billion (2^32) We have run out! Hence…
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
Down
- control / control—message from receiving computer that packets have been received and the next one can be sent.
- / will provide the path taken between computers
- / ipconfig, ping, nslookup, tracert
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
- responsible for determining the path that packets take as they are routed on networks.
- / Interface Process Messenger
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
Vocabulary 2023-12-17
Across
- The unauthorized use or exploitation of an existing connection or system to gain access to another system or network.
- A malicious program that can replicate itself and spread to other computers, often causing damage to files and systems.
- A security system that monitors and controls incoming and outgoing network traffic, acting as a barrier between a private network and external networks.
- To take advantage of a vulnerability or weakness in a computer system for malicious purposes.
- The process of converting information into code to prevent unauthorized access, ensuring secure transmission and storage of sensitive data.
- A list of approved entities, such as software applications or IP addresses, allowed to access a particular system or network.
Down
- A person who exploits computer hardware and software, either for malicious purposes or ethical ones.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- Short for malicious software, it refers to any software designed to harm or exploit computer systems, including viruses, worms, and ransomware.
- A technique where a person or program masquerades as someone or something else to deceive or gain an advantage, often used in phishing attacks.
- A hidden method for bypassing normal authentication or encryption to access a computer system, often used by hackers.
- Unauthorized access or entry into a computer system or network by an individual or software.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in electronic communication.
13 Clues: Unauthorized access or entry into a computer system or network by an individual or software. • To take advantage of a vulnerability or weakness in a computer system for malicious purposes. • A person who exploits computer hardware and software, either for malicious purposes or ethical ones. • ...
Technology 2017-04-25
6 Clues: a web application • a personal computer • short for Web browser • short for electronic mail • a worldwide collection of computer networks • the transmission of a file from one computer system to another
Activity 2015-09-28
Across
- in HTML what tag comes after the header
- less content on a webpage improves ______
- the <img src=""> inserts what type of multimedia
- .com and .org are examples of a
- reading on a screen is easier than reading on paper: true or false
- composed of HTML code or tags
- a URL has how many parts
Down
- and, or, + not are examples of
- uses keywords to search for content
- all UTK users must ____
- code or tags browsers use for web pages
- short for wide area networks
- in reguard to copyright, how many photos from one artist can be used
- what is the domain designated for education
14 Clues: all UTK users must ____ • a URL has how many parts • short for wide area networks • composed of HTML code or tags • and, or, + not are examples of • .com and .org are examples of a • uses keywords to search for content • in HTML what tag comes after the header • code or tags browsers use for web pages • less content on a webpage improves ______ • ...
Information Technology Grade 8 2021-02-23
Across
- Only transmit in one direction
- Has an outer plastic covering containing 2 parallel conductors each having a separate insulated protection cover.
- This is any type of hardware capable of transmitting data instruction and information between a sending device and a receiving device.
- Connected through signal
- It consists of 2 separately insulated conductor wires wound about each other
- Exist in two states 1 and 0.
- Accepts the transmission of data
- Frequency Range:1GHz – 300GHz
Down
- This is the transmission media on which the data instructions or information travels.
- Frequency Range:300GHz – 400THz
- Frequency Range:3KHz – 1GHz.
- this initiates the instruction
- a network of networks
- physically connected
14 Clues: physically connected • a network of networks • Connected through signal • Frequency Range:3KHz – 1GHz. • Exist in two states 1 and 0. • Frequency Range:1GHz – 300GHz • Only transmit in one direction • this initiates the instruction • Frequency Range:300GHz – 400THz • Accepts the transmission of data • It consists of 2 separately insulated conductor wires wound about each other • ...
your body 2021-11-01
Across
- cell pieces that form clots
- the transport of blood back and forth between the heart and lungs
- the flow of blood between the heart and everything but the lungs
- study of the heart
- upper chamber of the heart
- lower chamber of the heart
- blood vessels that carry blood away from the heart
Down
- what arteries branch off into
- slippery membrane that covers the heart
- these transport oxygen to other cells of the body
- these carry blood from capillary networks to veins
- a straw colored liquid
- what arterioles branch off into
- blood vessels that carry blood back to the heart
14 Clues: study of the heart • a straw colored liquid • upper chamber of the heart • lower chamber of the heart • cell pieces that form clots • what arteries branch off into • what arterioles branch off into • slippery membrane that covers the heart • blood vessels that carry blood back to the heart • these transport oxygen to other cells of the body • ...
Ks3 - Threats and Preventions 2025-06-13
Across
- Malware that tricks you into downloading it by pretending to be something safe.
- Software detecting cyber threats
- The use of digital technology (such as social media, messaging apps, or emails) to intentionally harm, threaten, or upset someone.
- Attack security vulnerabilities
- Fake email for stealing data
- Malware which spreads by itself across computers and networks
- Malicious program holding data hostage
- Short for malicious software, harmful software installed on a computer without permission.
- Unauthorized access attempt
Down
- Secret key for authentication
- To trick people into illegally obtaining sensitive data.
- When a hacker tries lots of different passwords very quickly.
- Digital fingerprint identifier
- Scrambles data for security
14 Clues: Scrambles data for security • Unauthorized access attempt • Fake email for stealing data • Secret key for authentication • Digital fingerprint identifier • Attack security vulnerabilities • Software detecting cyber threats • Malicious program holding data hostage • To trick people into illegally obtaining sensitive data. • ...
Fundamentals of Computing: McKown 2022-10-26
Across
- Series of code that completes a specific task
- First Digital Computer
- Being mean directly or indirectly to an individual or group online
- Father of the computer
- .mp3 file type
- Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
- RAM Memory - Short Term
- Device used to display data to the user from the computer
- Single unit of the binary language
- First computer programmers
- 8 bits
Down
- Where all of the of compentants of a computer connect to or live
- Device used to give the computer data from the user
- The brain of the computer
- Industry that works to secure computers and computer networks as a whole
- Series of commands
- CodeHS Programming Dog
- Computer language
18 Clues: 8 bits • .mp3 file type • Computer language • Series of commands • First Digital Computer • Father of the computer • CodeHS Programming Dog • RAM Memory - Short Term • The brain of the computer • First computer programmers • Single unit of the binary language • Series of code that completes a specific task • Device used to give the computer data from the user • ...
Networking Concepts Crossword 2025-06-14
Across
- topology shaped like a star (4)
- that spans a limited area such as a home or office (3)
- large data into smaller parts for transmission (6)
- that forward data packets between networks (7)
- domain names into IP addresses (3)
- common local area network technology (9)
- that connects multiple devices in a network (6)
- network communication protocol (3)
- unauthorized access to or from a network (8)
- protocol for accessing web pages (4)
Down
- to overwhelm a system with traffic (3)
- address assigned to each device in a network (2,2)
- network standard (5)
- network used within an organization (8)
- used to distinguish computers on a network (9)
- for formatting and processing data (8)
- storage of data to speed up future access (6)
- for sending emails (4)
- that connects different network technologies (6)
- used to connect computers in a wired network (6,4)
20 Clues: network standard (5) • for sending emails (4) • topology shaped like a star (4) • domain names into IP addresses (3) • network communication protocol (3) • protocol for accessing web pages (4) • to overwhelm a system with traffic (3) • for formatting and processing data (8) • network used within an organization (8) • common local area network technology (9) • ...
Media Tech 2022-04-13
Across
- A set of data that describes and gives information about other data.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- An application is a software program that's designed to perform a specific function directly for the user or, in some cases, for another application program.
Down
- A digital footprint is data that is left behind when users have been online.
- Describes the opportunity to establish a protected network connection when using public networks.
- a brand name for an image messaging service and application, through which users can share images that may be private and temporary or public and stored for retrieval.
- a set of related web pages located under a single domain name, typically produced by a single person or organization.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- An act of logging in to a computer, database, or system.
11 Clues: An act of logging in to a computer, database, or system. • A set of data that describes and gives information about other data. • A digital footprint is data that is left behind when users have been online. • Describes the opportunity to establish a protected network connection when using public networks. • ...
IT-Related Terms 2023-06-26
Across
- to duplicate text
- the space around the edge of a page
- unwanted email containing advertisements
- the layout and design of a page
- a vertical section of text on a page
- to remove text from a document
- being slanted
- a dot or shape at the start of a paragraph
- a typing mistake
- a person who illegally accesses computers
Down
- the size of the blank areas between lines in a text
- a code that must be entered to verify identity or gain access to a resource
- a program used to protect private networks
- a file sent along with an email
- the size and shape of letters
- the middle of a page
- the address of a specific Internet site
- being darker and thicker than normal text
18 Clues: being slanted • to duplicate text • the middle of a page • a typing mistake • a file sent along with an email • the layout and design of a page • the size and shape of letters • to remove text from a document • the space around the edge of a page • unwanted email containing advertisements • a vertical section of text on a page • ...
English class- How east is meeting west 2021-01-27
Across
- having common sense or understanding
- a connected goup of people that exchange information
- very important and needing immediate attention
- a property, a land or a building
- to be forced to do something bc. it is your job or the law
- riche the newly rich
Down
- someone who behaves like someone, they want to be them
- starting to exist,appearing
- a former student of a school
9 Clues: riche the newly rich • starting to exist,appearing • a former student of a school • a property, a land or a building • having common sense or understanding • very important and needing immediate attention • a connected goup of people that exchange information • someone who behaves like someone, they want to be them • ...
Drobny-Beneda 2021-04-29
Across
- a group or system of interconnected people or things
- type of electromagnetic radiation
- local area network
- title of the wireless network without any other meaning
- a device that receives and sends data on networks
Down
- global computer network that provides wirel
- device that creates wireless local area network
- system of sending electronic information without wire
- the process of converting information into a code to prevent unauthorized access
9 Clues: local area network • type of electromagnetic radiation • global computer network that provides wirel • device that creates wireless local area network • a device that receives and sends data on networks • a group or system of interconnected people or things • system of sending electronic information without wire • title of the wireless network without any other meaning • ...
Edwin Martinez 2015-05-01
Across
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- An unauthorized person who secretly gains access to computer file
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- a piece of writing that has been copied from someone else and is presented as being your own work
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
Down
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- To renew or revitalize; To reload a webpage on the internet
- A bully who operates online, in cyberspace; To bully online
12 Clues: To renew or revitalize; To reload a webpage on the internet • A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer file • a piece of writing that has been copied from someone else and is presented as being your own work • ...
Data Transmission 2022-07-13
Across
- a message sent to the receiver indicating that data has been received correctly (used in the ARQ error detection method) (1 word)
- a device that enables data packets to be moved between different networks, for example to join a LAN to WAN (1 word)
- data that can be sent on one direction only (1 word)
- a method of transmission in which a message is broken into many data packets which can then be sent along pathways independently of each other (2 words)
Down
- a verification method used to check if data transferred has been altered or corrupted; calculated from the block of data of data being sent; the checksum value is sent after each data block (1 word)
- the part of a data packet that indicates the end of the data packet and cyclic redundancy check error check (2 words)
- a horizontal and vertical parity check on a block of data being transmitted (2 words)
- stages in a network that can receive and transmit data packets; routers and nodes in communication networks (1 word)
- the original text/message before it is put through an encryption algorithm (1 word)
- a type of encryption key that is known to all users (2 words)
10 Clues: data that can be sent on one direction only (1 word) • a type of encryption key that is known to all users (2 words) • the original text/message before it is put through an encryption algorithm (1 word) • a horizontal and vertical parity check on a block of data being transmitted (2 words) • ...
My Internet Crossword 2018-03-29
Across
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
- / will provide the path taken between computers
- / = about 4.3 billion (2^32) We have run out! Hence…
- control / control—message from receiving computer that packets have been received and the next one can be sent.
- / Interface Process Messenger
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
Down
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- responsible for determining the path that packets take as they are routed on networks.
- / ipconfig, ping, nslookup, tracert
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
Network Terminology 2023-10-02
Across
- Services: the technology that connects your offices, data centers, cloud applications, and cloud storage together.
- The technology that connects your offices, data centers, cloud applications, and cloud storage together.
- Routing is the process of path selection in any network
- and protocols: Network protocols break larger processes into discrete, narrowly defined functions and tasks across every level of the network.
- media: the communication channels used to interconnect nodes on a computer network.
- the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks
Down
- A collection of devices connected together in one physical location, such as a building, office, or home.
- an identifier for a node or host on a telecommunications network. Network addresses are designed to be unique identifiers across the network, although some networks allow for local, private addresses, or locally administered addresses that may not be unique.
- the process of identifying the cause of faults in the network.
- A computer network that connects computers within a metropolitan area,
- operating systems: A network operating system is a specialized operating system for a network device such as a router, switch or firewall.
- Pan connects electronic devices close to the user, such as a wireless mouse, a keyboard, and a computer. Network types.
- and standards: Codes and standards provide a common language and requirements for the design, construction, and operations of buildings.
13 Clues: Routing is the process of path selection in any network • the process of identifying the cause of faults in the network. • A computer network that connects computers within a metropolitan area, • media: the communication channels used to interconnect nodes on a computer network. • ...
crossword 2023-02-04
Across
- What device can make and receive phone calls without a traditional phone line?
- What is a device that senses and tracks an individual's movements?
- What is a set of instructions for a computer to perform a specific task?
Down
- What is the practice of securing IoT devices and networks from cyber threats called?
- What is the term used for a device that switches network traffic between different computer networks based on the network address of the data?
5 Clues: What is a device that senses and tracks an individual's movements? • What is a set of instructions for a computer to perform a specific task? • What device can make and receive phone calls without a traditional phone line? • What is the practice of securing IoT devices and networks from cyber threats called? • ...
My Internet Crossword 2018-03-29
Across
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- responsible for determining the path that packets take as they are routed on networks.
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- / will provide the path taken between computers
- / ipconfig, ping, nslookup, tracert
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- / = about 4.3 billion (2^32) We have run out! Hence…
Down
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
- control / control—message from receiving computer that packets have been received and the next one can be sent.
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- / Interface Process Messenger
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
My Internet Crossword 2018-03-29
Across
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- responsible for determining the path that packets take as they are routed on networks.
- / Interface Process Messenger
- / ipconfig, ping, nslookup, tracert
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
- / will provide the path taken between computers
- control / control—message from receiving computer that packets have been received and the next one can be sent.
Down
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- / = about 4.3 billion (2^32) We have run out! Hence…
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
Sable Howells 2013-03-27
Across
- – A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- - a piece of writing that has been copied from someone else and is presented as being your own work
- -- A bully who operates online, in cyberspace; To bully online
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- – An unauthorized person who secretly gains access to computer files.
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
Down
- – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- - A part of a computer system or network that is designed to block unauthorized access while permitting outward communicationHACKER – An unauthorized person who secretly gains access to computer files.
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- - To renew or revitalize; To reload a webpage on the internet
13 Clues: - To renew or revitalize; To reload a webpage on the internet • -- A bully who operates online, in cyberspace; To bully online • – An unauthorized person who secretly gains access to computer files. • - a piece of writing that has been copied from someone else and is presented as being your own work • ...
Spkout 5.1 vocab 2025-06-13
Across
- Medicines used to fight bacterial infections.
- Things people enjoy doing to relax or have fun.
- Gets things done well without wasting time or resources.
- A two-wheeled vehicle powered by an engine.
- A powerful energy source produced by splitting atoms.
- Cost-saving; not spending more than necessary.
- A place where people watch plays or performances.
- A circular road system at a junction.
Down
- To study or look into something carefully to find facts.
- Energy that comes from sunlight.
- Talking
- Science of changing DNA to improve living organisms.
- Injections that protect people from diseases.
- A household device that removes dust using suction.
- The Web
- Machines in space that send signals or collect data.
- Aircraft used to transport passengers and cargo.
- Relating to the countryside, not the city.
18 Clues: Talking • The Web • Energy that comes from sunlight. • A circular road system at a junction. • Relating to the countryside, not the city. • A two-wheeled vehicle powered by an engine. • Medicines used to fight bacterial infections. • Injections that protect people from diseases. • Cost-saving; not spending more than necessary. • ...
Chapter 3 2012-09-05
Across
- browser program that lets you find and view web pages
- small aplicationsthat can load and run on a web page
- the electronic transfer of messages
- search engines find _____ of words
- shows you a list of links for sites you have visited recently
- a measure of how much work can be done in a certain amount of time
- powerful computers
- uniform resource locator
Down
- World Wide Web
- allows users to post messages for others to read
- answers to a query
- allows you to create a list of links for sites
- a web of computer networks that spans the Earth
- can be text, a button, or a graphic
- Internet service provider
15 Clues: World Wide Web • answers to a query • powerful computers • uniform resource locator • Internet service provider • search engines find _____ of words • the electronic transfer of messages • can be text, a button, or a graphic • allows you to create a list of links for sites • a web of computer networks that spans the Earth • allows users to post messages for others to read • ...
Kerry Vocab 2014-11-13
Across
- short for Internet Service Provider
- a device or computer that stores network resources
- the quality of images
- part of a filename that usually shows a program in which a file was created
- short for Wireless Fidelity
- short for Hyper-Text Markup Language
- short for Uniform Resource Locator
- a program for a user
- parts of a computer that you can see and touch
- transferring a file to a local computer
Down
- world wide connection of networks which connects businesses and agencies
- internet etiquette
- the parts of a computer that one cannot touch
- a main page of any website
- box a box that asks for you input and is on the screen
15 Clues: internet etiquette • a program for a user • the quality of images • a main page of any website • short for Wireless Fidelity • short for Uniform Resource Locator • short for Internet Service Provider • short for Hyper-Text Markup Language • transferring a file to a local computer • the parts of a computer that one cannot touch • parts of a computer that you can see and touch • ...
Mackenzie Vocab 2014-11-12
Across
- means hyper text markup lauguage
- parts of the computer that you can see and or touch
- internet service provider
- wireless fidelity
- something that stores information
- part of a file name that you use to open
- a thing that connects computers
- the main page of a website
Down
- the world wide web that connects other networks
- when you transfer a file from a computer into the inter-web
- a program that everyday people can use
- when you are connected to the inter-web
- uniform resource locator
- when you move a file from the inter-web to another computer
- the parts of a computer that you cannot touch
15 Clues: wireless fidelity • uniform resource locator • internet service provider • the main page of a website • a thing that connects computers • means hyper text markup lauguage • something that stores information • a program that everyday people can use • when you are connected to the inter-web • part of a file name that you use to open • the parts of a computer that you cannot touch • ...
Tech Vocab 2019-05-20
Across
- an organization that provides access to the internet
- a small text file up
- a hardware interface for up to 127 peripherals
- an inhouse website that serves employees only
- the computing part of the computer
- the primary method for keeping secure from intruders
- a large network made up of little networks
- the address that defines the route to a file
- to store data locally in order to speed up subsequent retrieval
Down
- the fundamental display element of an electronics screen
- instructions for the computer
- computer people may use the term for capability and time
- machinery and
- to write and post an entry in a weblog
- a scam to steal valuables
15 Clues: machinery and • a small text file up • a scam to steal valuables • instructions for the computer • the computing part of the computer • to write and post an entry in a weblog • a large network made up of little networks • the address that defines the route to a file • an inhouse website that serves employees only • a hardware interface for up to 127 peripherals • ...
The Thing About Jellyfish Vocabulary 2023-11-20
Across
- "The telethon was broadcast _____________ on 31 US networks"
- "They had reached an ____ agreement"
- "She ______ in the yard, enjoying the warm sunshine"
- Having had all moisture removed, dried out.
- "His theory of the _____ of life"
- The use of irony to mock or convey contempt.
- Requiring immediate action or attention.
Down
- In a casually calm and relaxed manner.
- A scientist who studies the universe.
- An organism or cell that is genetically identical.
- "A ____ needle, free of bacteria"
- Make a slight involuntary grimace or shrinking movement of the body out of pain.
- An acute loss of blood from a damaged blood vessel"
- "Madeleine was still an _____ to him.
- A Japanese poem.
15 Clues: A Japanese poem. • "A ____ needle, free of bacteria" • "His theory of the _____ of life" • "They had reached an ____ agreement" • A scientist who studies the universe. • "Madeleine was still an _____ to him. • In a casually calm and relaxed manner. • Requiring immediate action or attention. • Having had all moisture removed, dried out. • ...
IT revision 2025-02-10
Across
- printed output
- Program or hardware device or both that filter the information coming through the internet preventing unauthorized person
- made up of keys
- MOdulator-DEModulator
- raw facts
- a set of rules that govern how computers are to communicate
- A set of characters which uniquely identifies a user
- the clarity of an image
- A computer publication on the Internet’s World Wide Web
- identification system that uses body parts
Down
- Networks that are set up in large companies so that employees can access
- physical parts of a computer
- a collection of tables
- To transfer data from one computer to a remote computer
- a connection of nodes sharing information
15 Clues: raw facts • printed output • made up of keys • MOdulator-DEModulator • a collection of tables • the clarity of an image • physical parts of a computer • a connection of nodes sharing information • identification system that uses body parts • A set of characters which uniquely identifies a user • To transfer data from one computer to a remote computer • ...
Crossword I 2024-10-13
Across
- A block of organized, reusable code
- A device that forwards data between networks
- A hardware or software component that stores data temporarily
- A structured set of data stored electronically
- The process of identifying and fixing errors
- A machine that provides data to other computers
- A display screen for a computer
Down
- The device that receives services from a server
- A virtual private network used for secure connections
- A network security system that monitors traffic
- A secret code used for authentication
- An input device for typing text
- A popular front-end web framework
- Remote servers that store, manage, and process data
- A set of functions and procedures for building software
15 Clues: An input device for typing text • A display screen for a computer • A popular front-end web framework • A block of organized, reusable code • A secret code used for authentication • A device that forwards data between networks • The process of identifying and fixing errors • A structured set of data stored electronically • The device that receives services from a server • ...
Computer Science 2025-08-12
Across
- – Finding and fixing errors in code.
- – Online storage and services accessed via the internet.
- – Two or more computers connected to share data.
- – Protecting computers and networks from attacks.
- – The physical parts of a computer.
- – Data or commands entered into a computer.
Down
- – A device used to type into a computer.
- – A global network that connects computers.
- – Scrambling data to keep it secure.
- – Information a computer gives back after processing.
- – Step-by-step instructions to solve a problem.
- – A way computers store data using 0s and 1s.
- – Instructions written for a computer to follow.
- – Programs that run on a computer.
- – Facts or information stored on a computer.
15 Clues: – Programs that run on a computer. • – The physical parts of a computer. • – Scrambling data to keep it secure. • – Finding and fixing errors in code. • – A device used to type into a computer. • – A global network that connects computers. • – Data or commands entered into a computer. • – Facts or information stored on a computer. • ...
Homework 2023-01-25
Across
- The acceptance of or mental capacity to accept contary opinions
- Biased information or misleading
- Fail to resist pressure or temptation
- Percieved materalistic values or conventional atitudes
- Willingness to allow existence of opinions you dont agree with
- Intense enjoyment
- Practice of refraining
Down
- a secret plan by a group to do something unlawful
- offering nothing that is challenging
- matured by age
- Special words or expression that are used by a particualr profession
- systems that propel cylindrical containers thru networks of tubes
- A politcal or economical theory of social organization which advocates means of production
- Action of subjecting a country or person to ones control
- discover the presence of
15 Clues: matured by age • Intense enjoyment • Practice of refraining • discover the presence of • Biased information or misleading • offering nothing that is challenging • Fail to resist pressure or temptation • a secret plan by a group to do something unlawful • Percieved materalistic values or conventional atitudes • Action of subjecting a country or person to ones control • ...
5/6M - Week 9 2025-09-11
Across
- — Make a happy sound when something is funny.
- — Real or genuine; not fake.
- — Your parent’s sister (or your uncle’s wife).
- — Unfriendly or harsh; not welcoming.
- — The basic systems a place needs—roads, power, and networks.
- — Gave a lesson; past tense of “teach.” (Sounds like “taut.”)
Down
- — To clap or show approval after a performance.
- — A full body flip forward or backward.
- — A sale where people bid and the highest offer wins.
- — Chances or possibilities for future success.
- — Pulled tight; not slack.
- — Wrong ideas or beliefs based on misunderstanding.
- — A small, shiny trinket or Christmas-tree ornament.
- — Care taken to avoid danger; a warning.
- — An official count of a country’s people.
15 Clues: — Pulled tight; not slack. • — Real or genuine; not fake. • — Unfriendly or harsh; not welcoming. • — A full body flip forward or backward. • — Care taken to avoid danger; a warning. • — An official count of a country’s people. • — Make a happy sound when something is funny. • — Chances or possibilities for future success. • — Your parent’s sister (or your uncle’s wife). • ...
U11 Cyber Threats 2025-09-30
Across
- Malicious code that attaches to files and spreads when opened.
- Malware disguised as legitimate software.
- Deliberate destruction or disruption of systems.
- Tool that records every keystroke made by a user.
- Fake alerts designed to trick users into downloading malware.
- Software that hides the existence of malware.
- Intercepting data packets on a network.
- Publishing private information about someone online.
Down
- Fraudulent attempt to obtain sensitive information via email.
- Software that secretly monitors user activity.
- Network of infected devices controlled remotely.
- Malware that encrypts data and demands payment.
- Self-replicating malware that spreads across networks.
- Hidden method of bypassing normal authentication.
- Impersonating another device or user to gain access.
15 Clues: Intercepting data packets on a network. • Malware disguised as legitimate software. • Software that hides the existence of malware. • Software that secretly monitors user activity. • Malware that encrypts data and demands payment. • Network of infected devices controlled remotely. • Deliberate destruction or disruption of systems. • ...
Chapter 2 Vocab 2025-02-19
Across
- A signal used in wireless networks indicating that a computer has data ready to send on the network.
- to share available bandwidth.
- Point A wireless device that serves as the central connection point of a wireless LAN and mediates communication between wireless
- A signal an AP generates in response to a request-to-send signal. A CTS signal indicates that the computer that sent an RTS can transmit data
- The address configured in a computer’s IP address settings specifying the address of a router to which the computer can send packets addressed to devices on other networks.
- A network design in which interconnecting devices allow only one connected device to transmit data at a time, thus requiring
- The scope of devices to which broadcast frames are forwarded.
- A routing table entry that tells a router where to send a packet with a destination network address that can’t be found in the routing table.
- A network design in which interconnecting devices allow only one connected device to transmit data at a time, thus requiring
- A designated port on a hub or switch used to connect to another hub or switch without using a crossover cable.
Down
- A network message intended to be processed by all devices on a LAN; it has the destination address FF:FF:FF:FF:FF:FF.
- The name assigned to a wireless network that is configured on the wireless access point.
- A network message addressed to only one computer on the LAN. PREV
- Making a connection between devices such as two switches, usually for the purpose of expanding a network.
- A network device that performs the same function as a repeater but has several ports to connect a number of devices; sometimes called a multiport repeater
- a multiport repeater
- to share available bandwidth.
- A network device that takes incoming signals and regenerates, or repeats, them to other parts of the network.
- A device that enables LANs to communicate with one another by forwarding packets from one LAN to another
- A network device that performs the same function as a repeater but has several ports to connect a number of devices; sometimes
20 Clues: a multiport repeater • to share available bandwidth. • to share available bandwidth. • The scope of devices to which broadcast frames are forwarded. • A network message addressed to only one computer on the LAN. PREV • The name assigned to a wireless network that is configured on the wireless access point. • ...
My Internet Crossword 2018-03-29
Across
- / Interface Process Messenger
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
Down
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- / ipconfig, ping, nslookup, tracert
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
- / will provide the path taken between computers
- control / control—message from receiving computer that packets have been received and the next one can be sent.
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- / = about 4.3 billion (2^32) We have run out! Hence…
- responsible for determining the path that packets take as they are routed on networks.
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
Groups & Formal Organizations Project 2025-09-26
6 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • How much can you learn about someone just by identifying the groups and social networks they belong to?
virus vocab -Natalie m 2018-04-11
Across
- a standalone malware computer program that replicates itself in order to spread
- sending email to receive personal information from someone
- the gulf between those who have ready access to computers and the Internet,
- copy (data) from one computer system to another,
- a person who uses computers to gain unauthorized access to data
- a group or system of interconnected people or things
- a small electronic device containing flash memory
- operating information used my computers
Down
- a type of malware that is disguised as software
- an infection agent
- a global computer network providing a variety of information
- a digital letter
- stealing someone's private information
- distributed denial of service
- designed to detect and destroy computer viruses.
15 Clues: a digital letter • an infection agent • distributed denial of service • stealing someone's private information • operating information used my computers • a type of malware that is disguised as software • copy (data) from one computer system to another, • designed to detect and destroy computer viruses. • a small electronic device containing flash memory • ...
Technology Vocabulary 2021-07-28
Across
- any small compartment
- crime committed using a computer and the internet
- a list of questions that are frequently asked (about a given topic) along with their answers
- having an output that is proportional to the input
- program used to view HTML documents
- an organized body of related information
- the exclusive right to sell a work
Down
- a worldwide network of computer networks
- adjusting the parts of something in relation to each other
- compact disk that used with a computer
- set up for a particular purpose
- data transmission rate for modems
- a program that gives a computer instructions
- locate and correct errors in a computer program code
- unit of measurement of information
15 Clues: any small compartment • set up for a particular purpose • data transmission rate for modems • unit of measurement of information • the exclusive right to sell a work • program used to view HTML documents • compact disk that used with a computer • a worldwide network of computer networks • an organized body of related information • a program that gives a computer instructions • ...
Chung Hwa Middle School, BSB Year 8 Social Studies 2019 2019-08-24
Across
- Japanese Military Police
- This country was invaded by Germany in 1939
- refer to rain/hail or snow
- information circulated to promote political cause [mostly biased]
- keeper international soldiers/group who are deployed to help to bring peace and stability
- – Energy from plants and animals
- person who visits places
- Lines run east to west around the earth, measured in degrees
- group who are deployed to help to bring peace and stability
Down
- travel to an important religious site
- natural home of an animal, plant or other organism
- periods of unusually hot weather
- degree to which places are connected by communication networks
- visitors explore nature
- explanatory symbol on maps
15 Clues: visitors explore nature • Japanese Military Police • person who visits places • refer to rain/hail or snow • explanatory symbol on maps • periods of unusually hot weather • – Energy from plants and animals • travel to an important religious site • This country was invaded by Germany in 1939 • natural home of an animal, plant or other organism • ...
Excretory System 24 2024-02-06
Across
- releases urine through this small tube
- worn out red blood cells turn into
- _____ glands that help the body rid of excess salt, urea and water.
- large organ that plays a role in removing waste
- sweating helps the body maintain ________
- covers 1.5-2 square meters of space
- kidney, urethra, bladder, and ureters.
- excess proteins and breaks them down into _____
- 95% of the urine is this
- kidneys can filter this much blood per minute
Down
- stores up to about 470mL of urine
- transport the urine from the kidneys
- Main job of the Excretory system is to ________waste.
- there are how many kidneys
- millions of these complex networks of tubes and capillaries.
15 Clues: 95% of the urine is this • there are how many kidneys • stores up to about 470mL of urine • worn out red blood cells turn into • covers 1.5-2 square meters of space • transport the urine from the kidneys • releases urine through this small tube • kidney, urethra, bladder, and ureters. • sweating helps the body maintain ________ • kidneys can filter this much blood per minute • ...
community 2025-01-23
Across
- - Where your crypto assets are stored securely.
- - Essential for smooth swapping and trading in DeFi.
- - The platform's reward system for community engagement.
- - Earning rewards by locking up crypto assets.
- - The ability of different blockchain networks to communicate and work together.
- - Ecosystem with 50+ EVM and Non-EVM chains.
- - A term describing interaction between multiple blockchains.
Down
- - A major benefit of using Galaxy Exchange.
- - The study and design of token economies.
- - Galaxy Exchange's contribution to the future of Web3.
- - Exchange one cryptocurrency for another.
- - A key advantage of Galaxy Exchange transactions that all.
- - A core principle of blockchain technology.
- - A feature allowing the transfer of assets across blockchains.
- - Describes Galaxy Exchange's smooth user experience.
15 Clues: - The study and design of token economies. • - Exchange one cryptocurrency for another. • - A major benefit of using Galaxy Exchange. • - A core principle of blockchain technology. • - Ecosystem with 50+ EVM and Non-EVM chains. • - Earning rewards by locking up crypto assets. • - Where your crypto assets are stored securely. • ...
browsing safely 2025-05-29
Across
- bullying act of harming or harassing using technology
- program used to identify and remove viruses
- use of illegal methods to get money
- criminal activity used to harm anyone using the internet
- a set of programs that disrupts the functioning of a compute
- hoaxing or misleading
- process of 'befriending children' on social media
Down
- to conduct terrorism using a computer
- sending an email to an user and misleading them to believe its from a trusted account
- unethical hackers
- helps prevent unauthorised access to your computer
- victim is attacked and then forced to pay money
- misusing someone's personal information
- to protect networks or your devices
- illegal entry into computer system
15 Clues: unethical hackers • hoaxing or misleading • illegal entry into computer system • use of illegal methods to get money • to protect networks or your devices • to conduct terrorism using a computer • misusing someone's personal information • program used to identify and remove viruses • victim is attacked and then forced to pay money • ...
computer communications 2025-10-09
Across
- an acronym for vpn
- a wireless technology used in computer networks
- someone has made up a network without permission and tries to steal data
- sending and receiving messages
- a portable computer
- numbers or symbols used to find your exact location
Down
- a collection a service that runs on the internet
- a global device that can connect multiple devices together
- cables that uses light
- data transmitted through copper cables
- someone creates a fake account and pretends to be them
- two or more connected devices for communication
- a small symbol to show your network is private and needs a password to access it.
- service set identifier
- give a portion of something to someone
15 Clues: an acronym for vpn • a portable computer • cables that uses light • service set identifier • sending and receiving messages • data transmitted through copper cables • give a portion of something to someone • a wireless technology used in computer networks • two or more connected devices for communication • a collection a service that runs on the internet • ...
SUM PRODUCT ALGORITHM 2025-11-04
Across
- State when beliefs stop changing significantly
- Mathematical description of possible values and their likelihood
- Relating to probabilistic reasoning or networks
- Node that represents a random variable in a factor graph
- Measure of uncertainty represented in each variable
- Final probability distribution computed for each variable
- Estimated probability of a variable after message passing
- Structure of variables and factors used in sum product algorithm
Down
- Connection between variable and factor nodes
- Combined probability distribution over multiple variables
- Step to ensure probabilities sum to one
- Repeated message updates until convergence
- Function connecting variables in a factor graph
- Information passed between nodes in belief propagation
- Process of computing unknown probabilities using known factors
15 Clues: Step to ensure probabilities sum to one • Repeated message updates until convergence • Connection between variable and factor nodes • State when beliefs stop changing significantly • Relating to probabilistic reasoning or networks • Function connecting variables in a factor graph • Measure of uncertainty represented in each variable • ...
IT 2025-12-14
Across
- A set of instructions for solving a problem
- A security system that blocks unauthorized access
- The act of entering your username and password
- Converting information into a code for security
- A computer that provides data or services to others
- A secret word or phrase to access an account
- An organized collection of information
Down
- A program that can damage files or systems
- Software designed to harm a computer or network
- Programs that run on a computer
- A copy of data to prevent loss
- A device that directs data between networks
- A group of connected computers
- The physical parts of a computer
- Storing data online instead of on a local device
15 Clues: A copy of data to prevent loss • A group of connected computers • Programs that run on a computer • The physical parts of a computer • An organized collection of information • A program that can damage files or systems • A set of instructions for solving a problem • A device that directs data between networks • A secret word or phrase to access an account • ...
information technology 2021-08-19
Across
- text that when clicked takes the user to a webpage
- he programs and other operating information used by a computer
- organized collection of information, data
- computer program designed to help people perform an activity
- between a plug or connector
- wireless technology exchange data
- one of the small dots or squares that make up an image on a computer screen
- servers, networks, databases, websites, computer hardware and etc
Down
- data measurement
- monitoring and controlling the movement of a craft or vehicle from one place to another
- network security device
- servers, mainframes, network devices
- navigating between web and page
- separate fragments
- electronic device for storing and processing data
15 Clues: data measurement • separate fragments • network security device • between a plug or connector • navigating between web and page • wireless technology exchange data • servers, mainframes, network devices • organized collection of information, data • electronic device for storing and processing data • text that when clicked takes the user to a webpage • ...
TECHNOLOGY VOCABULARY 2021-07-26
Across
- an organized body of related information
- any small compartment
- a worldwide network of computer networks
- a set of related records kept together
- transfer out of a database or document
- fix a computer program piecemeal until it works
- the exclusive right to sell a work
- software that is provided without charge
Down
- transfer a file or program to a smaller computer
- a listing of the computer files stored in memory
- user interface a user interface based on graphics instead of text
- a program used to view HTML documents
- crime committed using a computer and the internet
- a unit of measurement of information
- page the opening page of a web site
15 Clues: any small compartment • the exclusive right to sell a work • page the opening page of a web site • a unit of measurement of information • a program used to view HTML documents • a set of related records kept together • transfer out of a database or document • an organized body of related information • a worldwide network of computer networks • ...
Texas History Crossword 2022-04-21
Across
- A financial gain
- Established the first French colony in Texas
- Return to a normal state
- The worldwide computer network that connects other computer networks
- A form of natural disaster, one happened in Galveston in 1900
- The Earth's atmosphere and beyond
- Where the biggest amount of oil was discovered in Texas
- Sectors of an economy
- The kind of livestock that cowboys took east to be sold
Down
- A form of protest where protestors occupy a place and refuse to leave
- Texas has the biggest amount of this in the US
- A long period of economic decline
- The act of competing
- The banning of alcohol in the 20th century
- Period of severe dust storms
15 Clues: A financial gain • The act of competing • Sectors of an economy • Return to a normal state • Period of severe dust storms • A long period of economic decline • The Earth's atmosphere and beyond • The banning of alcohol in the 20th century • Established the first French colony in Texas • Texas has the biggest amount of this in the US • ...
snair bear 2017-12-08
Across
- a sweet treat
- The fundamental display element of an electronic screen
- fat band members
- A series of instructions that performs a particular task
- a scam to steal valuable information such as credit card and social security numbers
- The address that defines the route to a file on an Internet server
- an annoying mom writes this
Down
- locally stored data
- large network made up of smaller networks
- An organization that provides access to the Internet
- An external hard disk drive or optical disc drive that plugs into the ___ port
- An in-house website that serves employees only
- computer machinery and equipment
- the processer of a computer
- a wall made of my mixtapes
15 Clues: a sweet treat • fat band members • locally stored data • a wall made of my mixtapes • the processer of a computer • an annoying mom writes this • computer machinery and equipment • large network made up of smaller networks • An in-house website that serves employees only • An organization that provides access to the Internet • ...
Tech Vocab 2019-05-20
Across
- a scam to steal valuables
- the computing part of the computer
- a large network made up of little networks
- a small text file up
- to write and post an entry in a weblog
- computer people may use the term for capability and time
- machinery and
- the address that defines the route to a file
Down
- an organization that provides access to the internet
- to store data locally in order to speed up subsequent retrieval
- an inhouse website that serves employees only
- the fundamental display element of an electronics screen
- a hardware interface for up to 127 peripherals
- instructions for the computer
- the primary method for keeping secure from intruders
15 Clues: machinery and • a small text file up • a scam to steal valuables • instructions for the computer • the computing part of the computer • to write and post an entry in a weblog • a large network made up of little networks • the address that defines the route to a file • an inhouse website that serves employees only • a hardware interface for up to 127 peripherals • ...
Tech Vocab 2019-05-20
Across
- the fundamental display element of an electronics screen
- the computing part of the computer
- a scam to steal valuables
- the address that defines the route to a file
- an inhouse website that serves employees only
- the primary method for keeping secure from intruders
- instructions for the computer
Down
- an organization that provides access to the internet
- a small text file up
- to store data locally in order to speed up subsequent retrieval
- a large network made up of little networks
- computer people may use the term for capability and time
- machinery and
- to write and post an entry in a weblog
- a hardware interface for up to 127 peripherals
15 Clues: machinery and • a small text file up • a scam to steal valuables • instructions for the computer • the computing part of the computer • to write and post an entry in a weblog • a large network made up of little networks • the address that defines the route to a file • an inhouse website that serves employees only • a hardware interface for up to 127 peripherals • ...
Biological approach psychology 2023-03-06
Across
- emotional centre of our brain
- genetic structure of an organism inherited from parent
- when one structure in our brain is responsible for a specific function
- degree to which a trait is shared between two or more groups/individuals
- drugs that block the function of a neurotransmitter
- happens when we learn new things
- selection survival of the fittest
- chemical messengers made by endocrine glands
Down
- observable characteristics of an organism resulting from environment and genes
- enhance effect of neurotransmitter
- happens when we forget things
- ability of our neural networks to change
- inhibortor of acetylcholine
- chemical substance that mimic or enhance effect of neurotransmitter
- study of environmental influences on gene expression
15 Clues: inhibortor of acetylcholine • emotional centre of our brain • happens when we forget things • happens when we learn new things • selection survival of the fittest • enhance effect of neurotransmitter • ability of our neural networks to change • chemical messengers made by endocrine glands • drugs that block the function of a neurotransmitter • ...
Network Reform crossword 2025-06-27
Across
- Electric potential difference in the network.
- Consistency of power supply without interruptions.
- Complete loss of power in an area.
- Linking of different parts of the power system.
- Australian Energy Market Commission, responsible for rule-making and market development.
- Process of preparing for future grid needs.
- Australian Energy Market Operator, manages electricity and gas systems.
Down
- System for buying and selling electricity.
- Network that delivers electricity from substations to consumers.
- Pricing schedule for electricity services.
- Regulatory mechanism to encourage efficiency.
- High-voltage network transporting electricity over long distances.
- Australian Energy Regulator, oversees electricity and gas networks.
- Amount of electricity consumed at a given time.
- Small-scale energy sources connected to the grid.
15 Clues: Complete loss of power in an area. • System for buying and selling electricity. • Pricing schedule for electricity services. • Process of preparing for future grid needs. • Electric potential difference in the network. • Regulatory mechanism to encourage efficiency. • Linking of different parts of the power system. • Amount of electricity consumed at a given time. • ...
AI 2024-02-09
8 Clues: What is the future of AI • What is Microsoft's AI named • What do neural networks mimic • What does the I stand for in AI • Is machine learning a subset of AI • Is AI safe using Bing Chat Enterprise • What is Microsoft's search engine named • What field focuses on language understanding by computers
Impacts of Artificial Intelligence 2021-05-01
Across
- A sub-discipline of AI
- Challenges posed by AI
- The final layer of an artificial neural network
- It involves nothing more than filtering an image
- A technology capable of identifying places, people, objects and many other types of elements within an image
Down
- Annual world summit sponsored by the United Nations
- Another application field of AI
- It involves the construction of brain-inspired systems of artificial neural networks
- The father of AI
- An application field of AI
10 Clues: The father of AI • A sub-discipline of AI • Challenges posed by AI • An application field of AI • Another application field of AI • The final layer of an artificial neural network • It involves nothing more than filtering an image • Annual world summit sponsored by the United Nations • It involves the construction of brain-inspired systems of artificial neural networks • ...
Networking 2018-03-27
Across
- an encryption method used in wireless networks
- No access to other users files
- a method of avoiding data collisions
- Data is sent 3 times, at least two will arrive correctly
- Cheaper than other topology option
Down
- An even or odd system to check binary data is correct
- A white list can be made from these to secure a network
- All computers have equal status
- Will fail if central hub stops working
- Locally unique identification of the network
10 Clues: No access to other users files • All computers have equal status • Cheaper than other topology option • a method of avoiding data collisions • Will fail if central hub stops working • Locally unique identification of the network • an encryption method used in wireless networks • An even or odd system to check binary data is correct • ...
Crossword Puzzle 2024-04-27
Across
- - Process of transferring data from a remote server to a local device.
- - Process of encoding data to make it unreadable without authorizatio.
- - Wireless technology for short-range data exchange.
- - Duplicate copy of data for recovery purposes.
- - Malicious software disrupting computer operations.
Down
- - Language for creating web pages.
- - Deliberate exploitation of computer systems or networks.
- - Organized collection of data.
- - Personal computer designed for use on a desk.
- - Remote storage and computing services accessible via the internet.
10 Clues: - Organized collection of data. • - Language for creating web pages. • - Personal computer designed for use on a desk. • - Duplicate copy of data for recovery purposes. • - Wireless technology for short-range data exchange. • - Malicious software disrupting computer operations. • - Deliberate exploitation of computer systems or networks. • ...
My Dream Job Software Developer 2024-12-15
Across
- A tool used to test software applications.
- Platform used for storing code and collaborating on projects.
- A collaborative method for software development.
- Software that translates written code into instructions a computer can understand.
- Programming language used for web development.
- Popular programming language for machine learning and data science.
Down
- Process of finding and fixing errors in code.
- Commonly used database system.
- The global system of interconnected computer networks.
- A reusable solution to a common problem in programming.
10 Clues: Commonly used database system. • A tool used to test software applications. • Process of finding and fixing errors in code. • Programming language used for web development. • A collaborative method for software development. • The global system of interconnected computer networks. • A reusable solution to a common problem in programming. • ...
MALWARE ANALYSIS QUIZ - B 2025-04-15
Across
- makes the code harder to understand
- Process Monitor combines features of Filemon and
- primarily used for identifying Devices or systems
- A common technique to analyze shellcode in a controlled environment is to use a
- Disassemblers help understand code without
Down
- Shellcode is typically written in
- In assembly, arithmetic operations are usually followed by
- A common tool used for analyzing shellcode is
- A patch that fixes security vulnerabilities is often called a
- Wireshark can capture data from
10 Clues: Wireshark can capture data from • Shellcode is typically written in • makes the code harder to understand • Disassemblers help understand code without • A common tool used for analyzing shellcode is • Process Monitor combines features of Filemon and • primarily used for identifying Devices or systems • In assembly, arithmetic operations are usually followed by • ...
Mobile and Wireless Networking 2025-05-20
Across
- Common wireless network used in homes and offices
- Method used to secure wireless communication
- Set of rules for data transmission in networks
- Device that boosts wireless signal range
Down
- A place that offers wireless internet access
- Portable device for calling, browsing, and apps
- Wireless method using light waves for short-range communication
- Mobile network used for voice and data communication
- Device that directs traffic in a wireless network
- Wireless technology for short-range data exchange
10 Clues: Device that boosts wireless signal range • A place that offers wireless internet access • Method used to secure wireless communication • Set of rules for data transmission in networks • Portable device for calling, browsing, and apps • Common wireless network used in homes and offices • Device that directs traffic in a wireless network • ...
FOR3701 Learning Unit 1 Cellphone 2025-08-06
Across
- control centre of a cellphone
- principle related to leaving traces
- principle established in 2006 regarding cellphone technology
- without this cellphone communication is not possible
- can also be subpoenaed to make available the radius of their towers
Down
- geographic coverage areas relating to a cellular network
- Mobile stations are known as
- legislation has proven useful in helping police secure convictions with intercepted cellphone evidence.
- type of communication used by cellphones
- will assist an investigator obtain subscribers data
10 Clues: Mobile stations are known as • control centre of a cellphone • principle related to leaving traces • type of communication used by cellphones • will assist an investigator obtain subscribers data • without this cellphone communication is not possible • geographic coverage areas relating to a cellular network • ...
Kiara 2025-07-22
Across
- Young people spend the day in front of the screens, it generates ………
- Virtual assistant
- The …………. generated by the networks is worrying
- Cyberbulling generates depression and …….
- Tik tok, Instagram and Youtube are forms of…..
- We entertain and spend hours on……
Down
- Just like in the real world, in the digital world we are...
- Thanks to the internet we have …………. with everyone
- Purchase and sale through the internet and other digital platforms
- We confused it with being sad.
10 Clues: Virtual assistant • We confused it with being sad. • We entertain and spend hours on…… • Cyberbulling generates depression and ……. • Tik tok, Instagram and Youtube are forms of….. • The …………. generated by the networks is worrying • Thanks to the internet we have …………. with everyone • Just like in the real world, in the digital world we are... • ...
The Networking Concepts Puzzle 2025-06-23
Across
- – Device that connects your home to the internet.
- – A group of computers linked to share resources.
- – Device used to connect multiple computers in a network.
- – Network within a small area like a home or school
- – Short-range wireless communication technology
Down
- – Any device connected to a network.
- – Device that connects multiple networks together.
- – Wireless way of connecting to the internet.
- – Network spread across a large area
- – A basic device that connects multiple devices in a network.
10 Clues: – Any device connected to a network. • – Network spread across a large area • – Wireless way of connecting to the internet. • – Short-range wireless communication technology • – Device that connects your home to the internet. • – A group of computers linked to share resources. • – Device that connects multiple networks together. • ...
Binary search tree 2022-12-06
Across
- The process of moving the nodes to make tree balanced
- LDR- left, root, right
- Smallest entity in tree
- Tree used in routers and bridges respectively in computer networks
- DLR-root, left, right
Down
- NULL links can be replaced by pointers called threads to other nodes
- Used in Compilers
- Unique node in the tree to which further sub trees are attached
8 Clues: Used in Compilers • DLR-root, left, right • LDR- left, root, right • Smallest entity in tree • The process of moving the nodes to make tree balanced • Unique node in the tree to which further sub trees are attached • Tree used in routers and bridges respectively in computer networks • NULL links can be replaced by pointers called threads to other nodes
crossword 2023-06-06
8 Clues: I ….. it in the trash • All kids are on social … • I …… if that was a good choice • On twitch there is a lot of …. • This device helps detect something • When we make a mistake we need to … • If you don’t want the baby you need to do an … • In a market there are a lot of different products ….
Ethics and Mass Communication 2021-09-17
Across
- to yourself
- simultaneously control several related aspects of the media business
- everyone processes messages differently
- National Association of Broadcasters
- The practice of a news organization paying for an interview or photograph.
- to large audiences or markets
- Federal Communications Commission
- The intentional planting of false information by government sources.
- a response
Down
- Companies that own media companies as well as businesses that are unrelated to the media business.
- variety of information
- to other people
- The rules or standards that govern someone’s conduct.
- Stations that use network programming but are owned by companies other than the networks.
- ends government control of an industry.
- interferes, makes unclear
- plural for medium
- A message system that allows senders and receivers to communicate simultaneously.
- how a message gets to audience
19 Clues: a response • to yourself • to other people • plural for medium • variety of information • interferes, makes unclear • to large audiences or markets • how a message gets to audience • Federal Communications Commission • National Association of Broadcasters • ends government control of an industry. • everyone processes messages differently • ...
Technology 2023-03-22
Across
- I have everything on time.
- The opposite of a sad person.
- App to work with essays, presentations,etc.
- When someone is very kind.
- A program to make presentations, videos etc.
- A person that can feel what other people are living.
- Humans clones.
- Third Anglo pride.
- First Anglo pride.
Down
- Last Anglo pride.
- The opposite of negative.
- citizens Second Anglo pride.
- a small handheld device that moves the cursor on the computer.
- Electronic machine, it can control other computers.
- Interconnected networks.
- Fourth Anglo pride.
- To hear music on your own.
- The quantities, characters, or symbols on which operations are performed by a computer.
- An instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- Is a software program that's designed to perform a specific function directly for the user.
20 Clues: Humans clones. • Last Anglo pride. • Third Anglo pride. • First Anglo pride. • Fourth Anglo pride. • Interconnected networks. • The opposite of negative. • I have everything on time. • When someone is very kind. • To hear music on your own. • citizens Second Anglo pride. • The opposite of a sad person. • App to work with essays, presentations,etc. • ...
technology 2018-04-04
Across
- fundamental display element of an electronic screen
- to store data locally in order to speed up subsequent retrievals
- a large network made up of smaller networks
- inhouse website that serves employees only
- the most widely used hardware interface for attaching peripherals to a computer
- a small text file
- organization that provides access to the internet
Down
- the address that defines the route to a file on an internet server
- primary method for keeping a computer secure from intruders
- machinery and equipment
- term for capability and time
- instructions for a computer
- a scam to steal valuable information
- to write and post an entry
- the computing part of the computer
15 Clues: a small text file • machinery and equipment • to write and post an entry • instructions for a computer • term for capability and time • the computing part of the computer • a scam to steal valuable information • inhouse website that serves employees only • a large network made up of smaller networks • organization that provides access to the internet • ...
Chapter 3 2012-09-05
Across
- To return to your home page
- Each time you search for something on the Web
- Text, a button, or a graphic
- Feature allows you to create a list of links for sites
- Answers to a query
- When one computer links to another computer
- Allows you to return to the previous page
Down
- Feature shows you a list of links for sites you've recently visited
- Electronic transfer of messages
- The buying and selling of products on the internet
- A web of computer networks that spans the Earth
- Powerful computers
- Allows users to post messages for others to read
- To return to the page you just left
- Feature to find information
15 Clues: Powerful computers • Answers to a query • To return to your home page • Feature to find information • Text, a button, or a graphic • Electronic transfer of messages • To return to the page you just left • Allows you to return to the previous page • When one computer links to another computer • Each time you search for something on the Web • ...
Technology vocabulary 2021-06-16
Across
- a part of RAM used for temporary storage of data.
- a worldwide network of computer networks.
- any small compartment.
- an organized body of related informático.
- set up for a particular purpose.
- the exclusive right to sell a Work.
Down
- crime committed using a computer and the Internet.
- a data transmission rate for modems.
- transfer out of a database or document
- a program used to view HTML documentos.
- any computer that is hooked up to a computer network.
- the symbolic arrangement of data in a computer program.
- having an output that is proportional to the input.
- adjusting the parts of something in relation to each other.
- a unit of measurement of informático.
15 Clues: any small compartment. • set up for a particular purpose. • the exclusive right to sell a Work. • a data transmission rate for modems. • a unit of measurement of informático. • transfer out of a database or document • a program used to view HTML documentos. • a worldwide network of computer networks. • an organized body of related informático. • ...
tegnology vocabulary 2021-06-23
Across
- a part of RAM used for temporary storage of data
- a worldwide network of computer networks
- any small compartment
- an organized body of related information
- set up for a particular purpose
- the exclusive right to sell a work
Down
- crime committed using a computer and the internet
- a data transmission rate for modems
- transfer out of a database or document
- a program used to view HTML documents
- any computer that is hooked up to a computer ne
- the symbolic arrangement of data in a computer program
- having an output that is proportional to the input
- adjusting the parts of something in relation to each other
- a unit of measurement of information
15 Clues: any small compartment • set up for a particular purpose • the exclusive right to sell a work • a data transmission rate for modems • a unit of measurement of information • a program used to view HTML documents • transfer out of a database or document • a worldwide network of computer networks • an organized body of related information • ...
Tecnology Vocabulary 2021-04-16
Across
- A symbol in a graphical user interface
- A data transmission rate for modems
- A fault or defect in a computer program, System, or machine
- The exclusive right to sell a work
- An organized body of related information
- Transfer out of a database or document
- A set of related records kept together
- Any small compartment
- A worldwide network of computer networks
Down
- Set up for a particular purpose
- A compact disk that is used with a computer
- A program used to view HTML documents
- A unit of measurement of information
- Page the opening page of a web site
- The organization of data according to preset specifications
15 Clues: Any small compartment • Set up for a particular purpose • The exclusive right to sell a work • A data transmission rate for modems • Page the opening page of a web site • A unit of measurement of information • A program used to view HTML documents • A symbol in a graphical user interface • Transfer out of a database or document • A set of related records kept together • ...
Technology Vocabulary 2021-04-16
Across
- A program that gives a computer instructions.
- Having an output that is proportional to the input.
- A data transmission rate for modems.
- A set of related records kept together.
- Transfer out of a database or document.
- A unit of measurement of information.
- A compact disk that is used with a computer.
- Locate and correct errors in a computer program code.
Down
- Any small compartment.
- A copy of a file or directory on a separate storage device.
- Set up for a particular purpose.
- Adjusting the parts of something in relation to each other.
- in Enter a computer.
- A program used to view HTML documents.
- A worldwide network of computer networks.
15 Clues: in Enter a computer. • Any small compartment. • Set up for a particular purpose. • A data transmission rate for modems. • A unit of measurement of information. • A program used to view HTML documents. • A set of related records kept together. • Transfer out of a database or document. • A worldwide network of computer networks. • A compact disk that is used with a computer. • ...
GRADE 9 QUIZ 1 2022-10-21
Across
- ......converts hardcopy to softcopy.
- A......is a folder inside another folder.
- ....network that connects computers in three towns
- Information on a computer for user to see is displayed using.......
- The type of data input by microphone.
- The protection of data being transmitted over network.
- .....is a network restricted to an organization .
- Performing financial transactions such as money transfers using the internet.
Down
- ....is danger posed by electric wires that are uncovered.
- .....global system of interconnected computer networks.
- .......converts softcopy to hardcopy.
- A crime of harassing using the internet.
- In Excel columns are labelled by......
- A network formed between a bluetooth earpiece and smartphone.
- How many bytes are in the code 10001010.
15 Clues: ......converts hardcopy to softcopy. • .......converts softcopy to hardcopy. • The type of data input by microphone. • In Excel columns are labelled by...... • A crime of harassing using the internet. • How many bytes are in the code 10001010. • A......is a folder inside another folder. • .....is a network restricted to an organization . • ...
INTERNET AND USES 2020-05-12
Across
- a computer that receives request and searches for information
- the brain of the computer
- what you must never share with a friend online
- it is the foundation of internet by US government
- it is electronic mail
- a program that locates and displays web pages
- global network of networks
- a computer that sends request over the internet
Down
- an example of a browser. it starts with a G
- program used to search for information online
- a form of instant messages online
- the method by which people access information online
- the address of the website
- a process of buying and selling online
- a language used to design web pages
15 Clues: it is electronic mail • the brain of the computer • the address of the website • global network of networks • a form of instant messages online • a language used to design web pages • a process of buying and selling online • an example of a browser. it starts with a G • program used to search for information online • a program that locates and displays web pages • ...
