networks Crossword Puzzles
AP World Review on Trade: Period 2 2022-05-04
Across
- Could have a variety of tobacco, sugar, etc. meant for farming that usually had labor
- Also known as the western hemisphere
- labor/slave system est. by Spanish
- trade system across Atlantic for slaves
- conquered the tribes of the Americas
- which countries made trade networks from old world to new
- system used to rank people
- connected new world with old in trade
- Spread to Americas alongside diseases and other stuff
- term that associates with sea
Down
- England produced this, very desired by Chinese
- Knowledge of this helped with trade across oceans
- Place known before exploration of Americas
- country that found the Americas
- another word for exchange;world-changing
- found a trade route to India
16 Clues: system used to rank people • found a trade route to India • term that associates with sea • country that found the Americas • labor/slave system est. by Spanish • Also known as the western hemisphere • conquered the tribes of the Americas • connected new world with old in trade • trade system across Atlantic for slaves • another word for exchange;world-changing • ...
Crime 2025-10-06
Across
- taking property from a person by force or threat
- unlawful killing with intent (premeditated)
- intentionally causing fear of harm or attempted harm
- obtaining money or property by threats or coercion
- taking someone’s property without permission
- creating or altering documents to deceive
- entering a building to commit a crime (often theft)
Down
- stealing money placed in one’s trust or care
- unlawful taking and holding of a person against their will
- unlawful killing without premeditation
- deception to gain money or advantage
- unlawful physical contact that causes injury
- intentionally setting fire to property
- deliberate damage or defacement of property
- criminal activity carried out using computers or networks
- offering or receiving money to influence an official act
16 Clues: deception to gain money or advantage • unlawful killing without premeditation • intentionally setting fire to property • creating or altering documents to deceive • unlawful killing with intent (premeditated) • deliberate damage or defacement of property • stealing money placed in one’s trust or care • unlawful physical contact that causes injury • ...
Cog Sci Ch. 9 & 10 Review 2022-04-20
Across
- Who is the researcher who demonstrated the interaction of perception and imagery by using “back projection” with participants in their imagery task?
- An average representation of the “typical” member of a category is referred to as a ________.
- A category member that closely resembles a category prototype is considered _____ in prototypicality.
- Living things are distinguished by sensory properties and artifacts are distinguished by functions describes the _______-functional hypothesis.
- Family ________ refers to items in a category that resemble one another in a number of ways.
- Who is the researcher who conducted the mental-walk task?
- Who (the general term of researchers who hold this perspective) branded the study of imagery as unproductive because visual images are invisible to everyone except the person experiencing them?
- Back ______ is when an error signal is transmitted back through the circuit; this indicates how weights should be changed to allow an output signal to match the correct signal (learning).
Down
- The pegword technique is particularly suitable for use when you need to remember items based on their _____.
- Graceful ______ is when a performance disruption occurs gradually as parts of the system are damaged.
- When you measure the amount of time a person requires to complete a cognitive task, you are using mental ______.
- This psychologist believed that imagery is propositional and can be represented by abstract symbols.
- Imagine your roommate says, “I am leaving a key under the mat.” and you visualize your roommate putting a key under your doormat. This would support the idea that imagery is _______.
- The ________ approach is when knowledge of concepts is based on reactivation of sensory and motor processes that occur when we interact with an object.
- Concepts that are arranged in networks that represent the way concepts are organized in the mind are _______ networks.
15 Clues: Who is the researcher who conducted the mental-walk task? • Family ________ refers to items in a category that resemble one another in a number of ways. • An average representation of the “typical” member of a category is referred to as a ________. • This psychologist believed that imagery is propositional and can be represented by abstract symbols. • ...
Crossword 2025-04-22
Genesis's Crossword Puzzle 2016-08-31
Across
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- A person who uses computers to gain unauthorized access to data.
- A general purpose computer programming language designed to produce programs that will run on any computer system.
- printing A process for making a physical object from a three-dimensional digital model, typically by laying down many successive thin layers of a material.
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- a networking device that forwards data packets between computer networks.
- a device for examining, reading, or monitoring something, in particular.
Down
- is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.
- using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- A unit of information equal to one billion (109) or, strictly, 230 bits.
- an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet.
- Bits per second
- As a measure of computer memory or storage, a kilobyte (KB or Kbyte*) is approximately a thousand bytes
- A telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
14 Clues: Bits per second • A person who uses computers to gain unauthorized access to data. • A unit of information equal to one billion (109) or, strictly, 230 bits. • a device for examining, reading, or monitoring something, in particular. • a networking device that forwards data packets between computer networks. • ...
esafety 2023-06-29
Across
- Manipulative techniques used to deceive individuals into divulging confidential information or performing certain actions.
- A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity through electronic communication.
- A security measure that acts as a barrier between a trusted internal network and untrusted external networks, controlling incoming and outgoing network traffic.
- The ability to use technology effectively and safely, including understanding online risks, critical thinking, and responsible digital behavior.
- designed to harm or infiltrate a computer system without the user's consent, often including viruses, worms, or ransomware.
- An additional layer of security that requires users to provide two forms of identification or verification to access an account or system.
Down
- The act of intentionally causing harm, harassment, or distress to someone through digital means such as social media, messaging apps, or emails.
- The trail of information and data left behind by a person's online activities, including posts, comments, and interactions.
- Measures taken to protect computers, networks, and data from unauthorized access or attacks.
- The online representation of an individual or organization, including personal information, usernames, profiles, and online activities.
- The process of converting data into a coded form to prevent unauthorized access or interception, ensuring confidentiality.
- The right to keep personal information and online activities confidential and secure from unauthorized access.
- Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information.
- Software or tools that allow parents or guardians to monitor and control their child's online activities, restricting access to inappropriate content or limiting screen time.
14 Clues: Measures taken to protect computers, networks, and data from unauthorized access or attacks. • The right to keep personal information and online activities confidential and secure from unauthorized access. • Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information. • ...
CryptoRiddle 2023-09-23
Across
- Harmful software that steals data or disrupts a computer.
- Long-term, sophisticated attacks by skilled hackers. (abbreviation)
- Exploiting vulnerabilities in a website's database.(abbreviation)
- Deceptive emails or websites aiming to steal information.
- Coordinated digital assault on computer systems or networks.
- Fake systems designed to attract hackers.
Down
- Programs that protect your computer from viruses.
- Overwhelming a website with traffic to make it unavailable. (abbreviation)
- Secret Data Collector (A type of Malware Attack)
- A protective barrier for your network.
10 Clues: A protective barrier for your network. • Fake systems designed to attract hackers. • Secret Data Collector (A type of Malware Attack) • Programs that protect your computer from viruses. • Harmful software that steals data or disrupts a computer. • Deceptive emails or websites aiming to steal information. • Coordinated digital assault on computer systems or networks. • ...
Computer Hardware 2024-07-15
Across
- The hardware device we need to connect to the Internet
- The name for computers connected together
- The big room that contains switches, routers, and servers
- The address of your computer
Down
- The largest network
- The type of cable needed in wired networks
- The hardware that connects computers in a local area network (LAN)
- ones and zeroes
- Type of network in which you connect without wires. Sometimes offered for free in airports
- The "brain" of the computer
10 Clues: ones and zeroes • The largest network • The "brain" of the computer • The address of your computer • The name for computers connected together • The type of cable needed in wired networks • The hardware device we need to connect to the Internet • The big room that contains switches, routers, and servers • The hardware that connects computers in a local area network (LAN) • ...
Worksheet 9 – Vocabulary check 2023-03-26
Across
- Basic element of artificial neural networks
- System that learns via neural network
- System that learns based on large, structured data
- A technology capable of identifying places, people, objects and many other types of elements within an image
Down
- The father of AI
- The first layer of an artificial neural network
- Challenges posed by AI
- Fake videos
- Annual world summit sponsored by the United Nations
- Anomaly in the output of AI algorithms, due to some prejudiced assumptions
10 Clues: Fake videos • The father of AI • Challenges posed by AI • System that learns via neural network • Basic element of artificial neural networks • The first layer of an artificial neural network • System that learns based on large, structured data • Annual world summit sponsored by the United Nations • ...
The internet 2025-04-11
Across
- A small file stored on your computer by a website.
- Short for Uniform Resource Locator, a web address.
- To look at websites on the internet.
- A website or online service where people connect and share.
- Online conversation in real-time.
Down
- A global system of interconnected computer networks.
- To transfer data from a remote computer to a local one.
- A program used to access the internet.
- A collection of linked documents accessible through the internet.
- Electronic mail.
10 Clues: Electronic mail. • Online conversation in real-time. • To look at websites on the internet. • A program used to access the internet. • A small file stored on your computer by a website. • Short for Uniform Resource Locator, a web address. • A global system of interconnected computer networks. • To transfer data from a remote computer to a local one. • ...
ICT 2022-03-11
Across
- Metropolitan area Network
- is the Wireless Technology used to connect computers, tablets and etc
- is a device that enables computers to exchange data over a telephone line
- is a digital electronic machine
- Modern computer networks are mostly connected via
- is a Network topology in which nodes are directly connected to a common linear
Down
- Diagnosis of various diseases
- is a set commands that controls the computer operations
- the most popular browser
- is an organized collection of data
10 Clues: the most popular browser • Metropolitan area Network • Diagnosis of various diseases • is a digital electronic machine • is an organized collection of data • Modern computer networks are mostly connected via • is a set commands that controls the computer operations • is the Wireless Technology used to connect computers, tablets and etc • ...
Privacy & Security 2022-11-01
Across
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
- process of identifying a user’s identity
- the right to be let alone
Down
- common examples are viruses & trojans
- coding protecting information from hackers
- (2 words) information about an individual
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
- international organization for standardization
10 Clues: compromise of security • the right to be let alone • common examples are viruses & trojans • process of identifying a user’s identity • (2 words) information about an individual • coding protecting information from hackers • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
Cybersecurity Terminology 2025-06-25
Across
- Prefix meaning harmful or bad
- The act of keeping something safe from harm
- Software used to stop or remove viruses
- Prefix related to computers, networks, or the internet
- A hacker who helps protect systems legally
- Fraudulent email tricking people into giving personal information
Down
- Malicious software that locks access until a ransom is paid.
- A weakness that can be exploited in a system.
- Software that secretly collects user data
- The process of encoding data to protect it
10 Clues: Prefix meaning harmful or bad • Software used to stop or remove viruses • Software that secretly collects user data • The process of encoding data to protect it • A hacker who helps protect systems legally • The act of keeping something safe from harm • A weakness that can be exploited in a system. • Prefix related to computers, networks, or the internet • ...
Technology Crossword 2025-09-29
Across
- Small piece of data stored by websites on your browser
- Roughly one trillion bytes of data
- Programming language named after a comedy group
- Open-source operating system with a penguin mascot
- Technology that hides your IP by tunneling internet traffic
Down
- Small, high-speed storage close to the CPU
- Digital ledger technology behind cryptocurrencies
- Cybercrime that tricks users into giving personal information
- Device that directs internet traffic between networks
- Security system that filters network traffic
10 Clues: Roughly one trillion bytes of data • Small, high-speed storage close to the CPU • Security system that filters network traffic • Programming language named after a comedy group • Digital ledger technology behind cryptocurrencies • Open-source operating system with a penguin mascot • Device that directs internet traffic between networks • ...
Threats to computer systems and networks (J277) 2025-06-02
Across
- A self-propagating malware that does not need a host program.
- A type of malware that self-replicates and spreads between computers.
- A malicious program disguised as legitimate software.
- Phishing attempts conducted via SMS messages.
- A system that SQL injection attacks target.
- Manipulating people into divulging confidential information.
- Malware that encrypts data and demands payment for its release.
- Software that automatically displays unwanted advertisements.
- Creating a false scenario to trick someone into giving information.
- A DoS attack launched from multiple compromised systems (acronym).
- An attack that tries every possible combination to guess credentials.
Down
- Malware that collects information about users without their knowledge.
- An attack aimed at disrupting a service by overwhelming it (acronym).
- An attack that exploits vulnerabilities in database queries.
- An attack that floods a system with traffic to make it unavailable (acronym).
- Malicious software designed to disrupt or damage computer systems.
- A social engineering attack using deceptive emails or websites to trick users.
- Phishing attempts conducted via voice calls.
- Illegally taking data from a system.
- An attack where data is secretly monitored during transmission.
- A social engineering technique involving looking over someone's shoulder to steal information.
21 Clues: Illegally taking data from a system. • A system that SQL injection attacks target. • Phishing attempts conducted via voice calls. • Phishing attempts conducted via SMS messages. • A malicious program disguised as legitimate software. • An attack that exploits vulnerabilities in database queries. • Manipulating people into divulging confidential information. • ...
African States' Impact on Networks of Exchange 2025-10-02
Across
- – Malian ruler whose pilgrimage to Mecca displayed immense wealth and promoted Islam abroad.
- – Religious structures built across Mali and Swahili cities, reflecting Islamic influence.
- – String of East African city-states that thrived as middlemen in Indian Ocean trade.
- – Valued commodity in Mali that symbolized its role as a center of learning and scholarship.
- – Blending of African traditions with Islam in religion, language, and culture.
- – Key African export carried from both Mali and Swahili Coast into wider markets.
- – Early West African kingdom that prospered from controlling trans-Saharan trade before Mali.
- – West African state that succeeded Mali and expanded control over trade.
Down
- – Malian city known for trade, Islamic scholarship, and its famous learning centers.
- – Human captives exported from Africa along trans-Saharan and Indian Ocean routes.
- – Important Swahili port that prospered from ivory, spice, and slave trade.
- – Seasonal winds that allowed merchants to time voyages safely in the Indian Ocean.
- – Prominent Swahili city-state that grew wealthy from controlling regional trade.
- – Indian Ocean commodity that Swahili ports exchanged along with ivory and slaves.
- – Exchange system where West African gold was traded for North African salt.
- – Precious metal exported from both West Africa and Swahili ports, fueling global demand.
- – Merchant settlements of Arabs, Persians, and Indians in Swahili ports that spread culture and commerce.
- – West African state that thrived by dominating the gold-salt trade and spreading Islam.
- – Religion that spread into West and East Africa through trade, shaping politics and culture.
- – Groups of merchants and camels that connected Mali to North Africa across the Sahara.
20 Clues: – West African state that succeeded Mali and expanded control over trade. • – Important Swahili port that prospered from ivory, spice, and slave trade. • – Exchange system where West African gold was traded for North African salt. • – Blending of African traditions with Islam in religion, language, and culture. • ...
Phising Play Action 2025-08-21
Across
- Crime committed using computer networks
- Using false information to impersonate an entity
- Malicious software designed to harm, disrupt or gain unauthorized access
- Malicious software designed to spread from one to computer to another
Down
- Cybercrime where attackers use deceptive communication
- Malicious software preventing access to computer files
- Transferring messages from one computer to another
- To defraud or embezzle
8 Clues: To defraud or embezzle • Crime committed using computer networks • Using false information to impersonate an entity • Transferring messages from one computer to another • Cybercrime where attackers use deceptive communication • Malicious software preventing access to computer files • Malicious software designed to spread from one to computer to another • ...
IT Knowledge 2025-11-27
Across
- The right to keep your personal data secret.
- Virtual Private Network; protects your browsing privacy.
- Malicious code that replicates itself.
- An offensive action against computer systems.
- Malware that spreads through networks without human help.
Down
- The secret string of characters used to verify identity.
- Scrambling data so it cannot be read without a key.
- Unsolicited and unwanted junk email.
8 Clues: Unsolicited and unwanted junk email. • Malicious code that replicates itself. • The right to keep your personal data secret. • An offensive action against computer systems. • Scrambling data so it cannot be read without a key. • The secret string of characters used to verify identity. • Virtual Private Network; protects your browsing privacy. • ...
IT quiz 2023-04-03
Across
- a system that integrates telephones and computer
- a device that forwards data packets
- He/she creates animationswith a computer
- written information on your TV screen
- a global system of networks of intergrated services
Down
- He/she is in charge of computer data input and processing
- joins multiple computers together to form a single network segment
- this send copirs of documents through telephone lines
- design and develop ICT devices
- radio communication system
10 Clues: radio communication system • design and develop ICT devices • a device that forwards data packets • written information on your TV screen • He/she creates animationswith a computer • a system that integrates telephones and computer • a global system of networks of intergrated services • this send copirs of documents through telephone lines • ...
GiANT's 5 Voices Language 2023-08-01
Across
- Champion of Relational networks, collaboration, and effective communication
- Champion of Strategic vision, results focused, and problem solving
- Culture of Apathy and Low Expectation
- Champion of Future ideas, innovation, and organizational integrity
- Champion of People, relational harmony, and values
Down
- Culture of Fear and Manipulation
- Champion of Due diligence, resources, and efficient systems and processes
- Culture of Empowerment and Opportunity
- Culture of Entitlement and Mistrust
- Certain things that can trigger you to step into the danger zone.
10 Clues: Culture of Fear and Manipulation • Culture of Entitlement and Mistrust • Culture of Apathy and Low Expectation • Culture of Empowerment and Opportunity • Champion of People, relational harmony, and values • Certain things that can trigger you to step into the danger zone. • Champion of Strategic vision, results focused, and problem solving • ...
My Dream Job Software Developer 2024-12-15
Across
- Platform used for storing code and collaborating on projects.
- The global system of interconnected computer networks.
- A reusable solution to a common problem in programming.
- A tool used to test software applications.
- Software that translates written code into instructions a computer can understand.
Down
- Process of finding and fixing errors in code.
- Popular programming language for machine learning and data science.
- A collaborative method for software development.
- Programming language used for web development.
- Commonly used database system.
10 Clues: Commonly used database system. • A tool used to test software applications. • Process of finding and fixing errors in code. • Programming language used for web development. • A collaborative method for software development. • The global system of interconnected computer networks. • A reusable solution to a common problem in programming. • ...
st10212348 2022-08-19
Across
- Parameters that express aspects to a network as a whole instead of just the network system.
- the variation in time delay between when a signal is transmitted and when it's received over a network connection.
- is a set of instructions, data or programs used to operate computers and execute specific tasks.
- is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- the human-computer interaction layer.
- Protocol layer that retains connections and controls ports and sessions.
- is an expression of how much time it takes for a data packet to travel from one designated point to another.
- dictates the amount of data stored or transferred on a device.
- are the components required to operate and manage enterprise IT environments.
- is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
- is an administrative grouping of multiple private computer networks or local hosts within the same infrastructure.
Down
- Network printers, scanners, photocopiers, and multifunction devices that may also handle fax are all examples of networked... devices.
- is any application running on one host providing communication to another application running on a different host.
- can be a mix of hardware devices, software applications, and network services.
- the time hold-up to deliver a unit of data over a channel or network.
- A adapter that allows for connections between computers and servers or any other networking device over a local area network.
- to expand the coverage area of the network, repropagate a weak or broken signal and or service remote nodes.
- is a communication medium, the path that data takes from source to destination
- is a collection of local-area networks.
- is an established set of rules that determine how data is transmitted between different devices in the same network.
20 Clues: the human-computer interaction layer. • is a collection of local-area networks. • dictates the amount of data stored or transferred on a device. • the time hold-up to deliver a unit of data over a channel or network. • Protocol layer that retains connections and controls ports and sessions. • ...
Internet Crossword 2021-10-29
Across
- a one-to-one direction.
- A square associated with internet.
- an identifier that's used to identify different networks or computers.
- a piece of data with a destination address.
- Something that you put information into.
Down
- a type of location.
- an interface on a device where the device is connected.
- a type of protection to block unauthorised requests.
8 Clues: a type of location. • a one-to-one direction. • A square associated with internet. • Something that you put information into. • a piece of data with a destination address. • a type of protection to block unauthorised requests. • an interface on a device where the device is connected. • an identifier that's used to identify different networks or computers.
Internet Crossword :) 2021-11-11
Across
- a one-to-one direction.
- a piece of data with a destination address.
- Something that you put information into.
- a type of location.
Down
- A square associated with internet.
- an identifier that's used to identify different networks or computers.
- an interface on a device where the device is connected.
- a type of protection to block unauthorised requests.
8 Clues: a type of location. • a one-to-one direction. • A square associated with internet. • Something that you put information into. • a piece of data with a destination address. • a type of protection to block unauthorised requests. • an interface on a device where the device is connected. • an identifier that's used to identify different networks or computers.
FAKE NEWS 2022-04-04
Across
- given to a unique resource on the Web.
- real.
- share a fake news is a .....
- network Whose main objective is to support the production and sharing of content.
- in wich two or more people with different interests entre into confrontation.
Down
- through social networks.
- comennt or news circulating among people.
- .....
8 Clues: real. • ..... • through social networks. • share a fake news is a ..... • given to a unique resource on the Web. • comennt or news circulating among people. • in wich two or more people with different interests entre into confrontation. • network Whose main objective is to support the production and sharing of content.
Internet 2015-02-18
Across
- It is a software used to look at web pages
- A collection of related webpages.
- Group of computers connected together.
- It is the first page of a website.
Down
- Network of networks.
- Moving from one website to another web site.
- A lot of computers on internet make a web.
- It is a page that contain text,picture,images etc
8 Clues: Network of networks. • A collection of related webpages. • It is the first page of a website. • Group of computers connected together. • A lot of computers on internet make a web. • It is a software used to look at web pages • Moving from one website to another web site. • It is a page that contain text,picture,images etc
Internet 2015-01-27
Across
- A collection of related webpages.
- Moving from one website to another web site.
- A lot of computers on internet make a web.
- It is a page that contain text,picture,images etc
Down
- It is the first page of a website.
- It is a software used to look at web pages
- Group of computers connected together.
- Network of networks.
8 Clues: Network of networks. • A collection of related webpages. • It is the first page of a website. • Group of computers connected together. • It is a software used to look at web pages • A lot of computers on internet make a web. • Moving from one website to another web site. • It is a page that contain text,picture,images etc
The Internet 2016-01-25
Across
- This is when part of an intranet is made accessible to customers, partners, suppliers or others outside a respective company.
- Page This is a document on the World Wide Web consisting of an HTML file and any related files for scripts and graphics and often hyperlinked to other Web pages.
- the Acronym "URL" stands for
- This is the largest computer network system in the world. It is consists of many smaller networks connected together by a global public network.
Down
- this consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
- This is a program that allows users to view and explore information on the World Wide Web.
- Each page on the World Wide Web has a unique address and this is called
- This is a private network that belongs to an organisation and is designed to be accessible by the organisation’s members, employees or others with authorization.
- It allows you to send, receive and manage electronic messages and communicate with friends, family and businesses all over the world.
9 Clues: the Acronym "URL" stands for • Each page on the World Wide Web has a unique address and this is called • This is a program that allows users to view and explore information on the World Wide Web. • This is when part of an intranet is made accessible to customers, partners, suppliers or others outside a respective company. • ...
4th Grade - Spelling Words Unit 7 Week 1 2024-04-25
Across
- very tiring or difficult
- to come into being or operation
- to direct or control
- goods shipped by boat, plane, train, or truck
- a nobleman by birth of a particular rank
Down
- a rich, powerful person in business or industry
- to use power to manage or command
- a person whom one tries to be better than; competitor
- a long journey by air, land, sea, or outer space
- a system that involves a number of many groups
10 Clues: to direct or control • very tiring or difficult • to come into being or operation • to use power to manage or command • a nobleman by birth of a particular rank • goods shipped by boat, plane, train, or truck • a system that involves a number of many groups • a rich, powerful person in business or industry • a long journey by air, land, sea, or outer space • ...
Computer 2023-08-12
Across
- Data storage device inside a computer.
- Output device that produces physical copies of digital content.
- Input device for typing and entering commands.
- Programs and applications that run on a computer.
- Computer system with a monitor, CPU, and peripherals.
Down
- Global network connecting computers worldwide.
- Camera used to transmit video over the internet.
- Pointing device used to interact with a computer.
- Device that directs data between computer networks.
- Portable computer that can be used on the go.
10 Clues: Data storage device inside a computer. • Portable computer that can be used on the go. • Global network connecting computers worldwide. • Input device for typing and entering commands. • Camera used to transmit video over the internet. • Pointing device used to interact with a computer. • Programs and applications that run on a computer. • ...
Inter,Intro,Intra, Circum 2022-05-11
Across
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- area of a circle
- occurring between nation
- obstruct someone from going to a destination
Down
- bring something to a place for the first time
- find a way around (an obstacle)
- act in such a way as to have an effect on each other.
- intervene in a situation without invitation
- taking place or existing within the mind.
- Job
10 Clues: Job • area of a circle • occurring between nation • find a way around (an obstacle) • taking place or existing within the mind. • intervene in a situation without invitation • obstruct someone from going to a destination • bring something to a place for the first time • act in such a way as to have an effect on each other. • ...
Artificial Intelligence 2022-05-27
Across
- period of reduced funding and interest in AI
- search that doesn´t have information it's domain
- Sequence of well-defined instructions used in computation
- capability to process human speech into a written format
Down
- series of algorithms that mimic the human brain
- Used to make text-to-speech conversation
- the ability to acquire and apply knowledge
- A bunch of nodes
- automation technology based on metaphorical software robots
- intelligence demonstrated by machines
10 Clues: A bunch of nodes • intelligence demonstrated by machines • Used to make text-to-speech conversation • the ability to acquire and apply knowledge • period of reduced funding and interest in AI • series of algorithms that mimic the human brain • search that doesn´t have information it's domain • capability to process human speech into a written format • ...
TCC & New Haven Crossword 2024-10-28
Across
- The state where TCC operates
- An important part of TCC’s mission in supporting communities
- Renowned university in New Haven
- Core value at TCC for creating equitable spaces
- Abbreviation for the organization providing local support and advocacy
Down
- TCC’s focus area to promote well-being
- Iconic central area of New Haven known for gatherings
- Historic street in New Haven known for Italian food
- The historic city where TCC is located
- Essential goal of TCC’s mission in fostering support networks
10 Clues: The state where TCC operates • Renowned university in New Haven • TCC’s focus area to promote well-being • The historic city where TCC is located • Core value at TCC for creating equitable spaces • Historic street in New Haven known for Italian food • Iconic central area of New Haven known for gatherings • An important part of TCC’s mission in supporting communities • ...
ACM Newsletter Edition 3 2025-07-08
Across
- Crucial in ensuring responsible AI development
- Brain-inspired networks used in deep learning
- Grouping data points based on similarity
- Fraudulent attempt to obtain sensitive information via email
- Computing model leveraging superposition and entanglement
Down
- A model problem where training accuracy is high but test accuracy is low
- Network security system that monitors incoming/outgoing traffic
- Global organization advancing computing as a science
- An input that guides an LLM’s response
- Platform for code collaboration and version control
10 Clues: An input that guides an LLM’s response • Grouping data points based on similarity • Brain-inspired networks used in deep learning • Crucial in ensuring responsible AI development • Platform for code collaboration and version control • Global organization advancing computing as a science • Computing model leveraging superposition and entanglement • ...
Cross-Word 2025-09-12
Across
- → Like the unclear edges of a nebula
- → Arrangement, like star charts in rows and columns
- → Similar to how brain-like networks analyze telescope data
- → Needed to decode signals from outer space
- → Rule of strengthening, like gravity binding stars
Down
- → Like grouping galaxies together in the universe
- → An early model, like a prototype telescope for starlight
- → Just as stars evolve, this algorithm evolves solutions
- → Like mass values assigned to planets in orbit
- → Small shift, like tilt in Earth’s axis
10 Clues: → Like the unclear edges of a nebula • → Small shift, like tilt in Earth’s axis • → Needed to decode signals from outer space • → Like mass values assigned to planets in orbit • → Like grouping galaxies together in the universe • → Arrangement, like star charts in rows and columns • → Rule of strengthening, like gravity binding stars • ...
Network keywords ~ Computing 2025-10-10
Across
- a fake email
- a service of the internet that contains web pages
- a global network or networks
- messages that are sent between a browser and a website
- a set of rules on how to communicate
- standard mark up language that is used to create web pages
Down
- the person who created the world wide web
- a series of web pages
- the process of converting a message into code that can't be read easily
- a message that is split
10 Clues: a fake email • a series of web pages • a message that is split • a global network or networks • a set of rules on how to communicate • the person who created the world wide web • a service of the internet that contains web pages • messages that are sent between a browser and a website • standard mark up language that is used to create web pages • ...
The secret language of trees - Camille Defrenne and Suzanne Simard 2022-02-02
Across
- Trees can share information like ____ or insect attacks through their fungi networks.
- Symbiotic fungi called _______.
- The secret of trees' success lies under the ___ ____.
- Tress shares food, supplies, and _______.
Down
- Process where leaves use the ample sunlight up to create sugars.
- Fungi branches together make up the ______.
- There is a _____ species of mycorrhizae fungi.
- This element is considered fuel for fungi ____.
8 Clues: Symbiotic fungi called _______. • Tress shares food, supplies, and _______. • Fungi branches together make up the ______. • There is a _____ species of mycorrhizae fungi. • This element is considered fuel for fungi ____. • The secret of trees' success lies under the ___ ____. • Process where leaves use the ample sunlight up to create sugars. • ...
the tic ta toe vocabulary 2014-05-02
Across
- to reload a webpage on the internet
- bullies in cyberspace
- text or graphics that when clicked will connect to a new web page
- a peson that secretly gains access to computers
- a global network of thousands of other computer networks that offers e-mails
Down
- to make copies
- a group of connected computers
- used to write a report
8 Clues: to make copies • bullies in cyberspace • used to write a report • a group of connected computers • to reload a webpage on the internet • a peson that secretly gains access to computers • text or graphics that when clicked will connect to a new web page • a global network of thousands of other computer networks that offers e-mails
BVC 2022-11-14
Across
- Extrernal forces stopping people from buying the brand they want
- measures the core aspects of choice: brand saliency and brand relationships
- known to be one of the market effects
- ____ brands have strong brand networks or associative memory structures
Down
- Ipsos brand equity framework
- Brands grow when its chosen by more people, more___
- AE+ME=___
- AE stands for____
8 Clues: AE+ME=___ • AE stands for____ • Ipsos brand equity framework • known to be one of the market effects • Brands grow when its chosen by more people, more___ • Extrernal forces stopping people from buying the brand they want • ____ brands have strong brand networks or associative memory structures • ...
Inventions 2025-03-02
Across
- Stores energy in a chemical form
- Stores food and keeps it cold
- Lens use to produce a magnifies image of an object
- Advanced machine, capable of flying
Down
- Global system of interconnected computer networks
- Makes for easy transport
- Device designed for transmission and reception of the human voice
- Safe and effective way of protecting you against harmful deseases
8 Clues: Makes for easy transport • Stores food and keeps it cold • Stores energy in a chemical form • Advanced machine, capable of flying • Global system of interconnected computer networks • Lens use to produce a magnifies image of an object • Device designed for transmission and reception of the human voice • Safe and effective way of protecting you against harmful deseases
Phising 2025-08-21
Across
- crime committed using computer networks
- using false information to impersonate an entity
- malicious software designed to harm, disrupt or gain unauthorized access
- malicious software designed to spread from one to computer to another
Down
- cybercrime where attackers use deceptive communication
- malicious software preventing access to computer files
- transferring messages from one computer to another
- to defraud or embezzle
8 Clues: to defraud or embezzle • crime committed using computer networks • using false information to impersonate an entity • transferring messages from one computer to another • cybercrime where attackers use deceptive communication • malicious software preventing access to computer files • malicious software designed to spread from one to computer to another • ...
IA-II- Mobile Emerging Technology (Honours)- July-Dec 2023 2023-10-16
Across
- ___ is used to create the radiation pattern of an antenna array by strongly adding the phase of the signal in the direction of the desired target/moving object and nulling the pattern of the target in unwanted direction
- The technique that offers a linear increase in the capacity for the same bandwidth and no additional power expenditure
- the component that stores the information about subscriber's phone number, encryption keys, and identification
- The scheme in which two or more statistically independent replicas is used for transfer of the same information
- the antennas that have signal processing capability that can perform tasks such as analysis of the direction of arrival of a signal
- The unit in LTE architecture that commuicates with packet data networks in the outside world such as internet, private and IMS
Down
- Diverity improves the _____ of the received message because nothing can recover the data signal in a deep fade except getting more copies of the same signal
- the coding technique which can be utilized to transmit over multiple antennas and achieve similar gains as can be achieved using multiple antenna diversity reception
- In _____ diversity replica of same signal is transmitted through different antenna
- the device that forwards the data between base station and packet data network gateway in 5G system
- the fifth generation network concept in which under single infrastrcture is divided into multiple networks
- a reference carrier that is known at receiver end that provides channel state information and channel behaviour
- Compared to SISO, system with ____ antennas give more degree of freedom in signalling at transmitter and receiver
- the technique that is used to elimitate the unwanted sideband components and thus limit the total transmission bandwidth in OFDM system
- the parameter that is used to describe instantaneous communication between devices and minimizing delays
15 Clues: In _____ diversity replica of same signal is transmitted through different antenna • the device that forwards the data between base station and packet data network gateway in 5G system • the parameter that is used to describe instantaneous communication between devices and minimizing delays • ...
Media Manipulation 2013-01-14
Across
- television is a type of
- the people who read a media text
- To exercise authoritative or dominating influence over
- pointing in the wrong direction
- A panel for the display of advertisements in public places
- taking advantage of someone
- the depiction of something in a media text
- An act intended to deceive or trick
- a famous person whom many people know
- Of or relating to communal living.
Down
- the commercial processes involved in selling a product
- The transmission of dynamic images
- Communication of audible signals encoded in electromagnetic waves
- poster or a paid announcement in the print
- the organized dissemination of information, allegations
- Expressing, containing, or consisting of a negation, refusal, or denial
- Relating to, involving, or characteristic of politics or politicians
- persuading someone
- An interconnected system of networks that connects computers
19 Clues: persuading someone • television is a type of • taking advantage of someone • pointing in the wrong direction • the people who read a media text • The transmission of dynamic images • Of or relating to communal living. • An act intended to deceive or trick • a famous person whom many people know • poster or a paid announcement in the print • ...
computer vocabulary 2017-06-21
Across
- a way to organize computer files.
- physical parts of a computer system.
- a picture, image, or other representation
- the software that supports a computer’s basic functions
- occurs when a computer program stops functioning properly and exits
- CENTRAL PROCESSING UNIT
- a panel of keys that operate a computer or a typewriter
- to restart by loading the operating system
- a person or thing that browses
Down
- an external flash drive
- is an operating system
- DRVE storage device containing a read-write mechanism
- a vast computer network linking smaller computer networks worldwide
- AN ELECTRONIC DEVICE FOR STORING AND PROCESSING DATA
- a folder
- a display screen used from a computer
- the working surface of a desk
- of or relating to present and recent time
- an input device that is most often used with a personal computer
19 Clues: a folder • is an operating system • an external flash drive • CENTRAL PROCESSING UNIT • the working surface of a desk • a person or thing that browses • a way to organize computer files. • physical parts of a computer system. • a display screen used from a computer • a picture, image, or other representation • of or relating to present and recent time • ...
Year 8 Comp Sci 2025-07-04
Across
- The time between sending a packet and receiving a packet
- The brain of the computer
- A device that connects devices together on a network.
- Microscopic switches responsible for binary
- Running a program one instruction at a time
- Done by using if/else in Python
- Being able to learn and adapt from new data
- The amount of traffic that can be transmitted at once on a network.
- a wide area network
Down
- Two or more computers connected together.
- A device that connects local area networks together.
- A document used to establish a target audience
- The layout/shape of nodes on a network
- Loops
- a local area network
- How can we gather data?
- Connects all the parts together
- A type of AI that gives out text-based responses
- Base 2 number system
19 Clues: Loops • a wide area network • a local area network • Base 2 number system • How can we gather data? • The brain of the computer • Connects all the parts together • Done by using if/else in Python • The layout/shape of nodes on a network • Two or more computers connected together. • Microscopic switches responsible for binary • Running a program one instruction at a time • ...
tech terms 1 and 2 2023-01-05
Across
- portion of a pc that retrieves and executes instructions
- stores data
- pc hardware device that converts data from digital format to a suitable format for telephone or radio
- a starting computer operating system
- traditional technology for connecting devices in a wired local area network
- a start for a second or third time
- file or code that infects, steals or conducts behavior an attacker wants
- portable document format
- network security
- uniform resource locator
Down
- unique address that identifies a device on the internet
- piece of data from a website that is stored and be retrieved later
- standard markup language
- managing traffic between networks by forwarding data to IP addresses
- 1,000,000 bytes or 1,048,576 bytes
- instructions
- unit of data that is 8 binary digits long
- physical and visible
- short binary digit
19 Clues: stores data • instructions • network security • short binary digit • physical and visible • standard markup language • portable document format • uniform resource locator • 1,000,000 bytes or 1,048,576 bytes • a start for a second or third time • a starting computer operating system • unit of data that is 8 binary digits long • unique address that identifies a device on the internet • ...
Health and Safety Crossword 2025-04-28
Across
- A harmful program that replicates itself
- A harmful program that displays unwanted ads
- Regularly saving your work
- What does the fire extinguisher contain if it has a black label
- Proper seating posture
- A secure way to access your computer remotely
- A harmful software that demands ransom
Down
- What the white label fire extinguisher contains
- A device to protect your computer from power surges
- Name for harmful software
- A software update to fix security vulnerabilities
- Software that protects against malicious attacks
- A secure method to encrypt data
- A harmful program that spreads through networks
- What label colour is on the Dry Powder Fire extinguisher
- A short break to rest your eyes
- A harmful software that spies on user activity
- A program that blocks unauthorised access
- A harmful program disguised as legitimate software
19 Clues: Proper seating posture • Name for harmful software • Regularly saving your work • A secure method to encrypt data • A short break to rest your eyes • A harmful software that demands ransom • A harmful program that replicates itself • A program that blocks unauthorised access • A harmful program that displays unwanted ads • A secure way to access your computer remotely • ...
crypto crossword 2025-01-10
Across
- - Popular decentralized cryptocurrency
- - New unit added to a blockchain
- - A change to a blockchain’s protocol that creates two separate chains
- - Cryptocurrency designed to minimize price volatility
- - Financial metric used to measure a company's profitability
- - Unique code identifying a crypto wallet
- - Measure of computational power in a blockchain network
- - Return on an investment over a specific period
- - Value of all final goods and services produced
Down
- - Algorithm that secures blockchain networks
- - Measure of market risk
- - Digital ledger technology used for recording transactions
- - Agreement among participants in a blockchain network
- - Any cryptocurrency other than Bitcoin
- - A participant who validates transactions and adds them to a blockchain
- - Smallest unit of Bitcoin
- - A digital asset representing ownership or utility on a blockchain
- - Profiting from price differences between markets
- - A digital tool used to store cryptocurrencies
19 Clues: - Measure of market risk • - Smallest unit of Bitcoin • - New unit added to a blockchain • - Popular decentralized cryptocurrency • - Any cryptocurrency other than Bitcoin • - Unique code identifying a crypto wallet • - Algorithm that secures blockchain networks • - A digital tool used to store cryptocurrencies • - Return on an investment over a specific period • ...
Vocabulary about web site 2020-07-12
Across
- แฟ้มข้อมูลหรือกลุ่มแฟ้มข้อมูลที่มีอยู่บนเวิลด์ไวด์เว็บ ดู world wide web ประกอบ
- หน้าเอกสารที่เขียนขึ้นในรูปแบบภาษาเอชทีเอ็มแอล ซึ่งสามารถเชื่อมโยงไปยังเอกสารหน้าอื่นได้ โดยเรียกดูผ่านเว็บบราวเซอร์
- โปรแกรมคอมพิวเตอร์ที่ใช้เปิดดูเว็บ (web browser)
Down
- หน้าแรกของเอกสารที่มีอยู่ในระบบอินเทอร์เน็ต ที่จะเป็นตัวแนะนำให้รู้จักหน่วยงานหรือสถาบันต่าง ๆ ในเวิร์ลด์ไวด์เว็บ (world wide web)
- การเชื่อมโยงคอมพิวเตอร์สองเครื่องเข้าด้วยกันโดยผ่านทางโมเด็ม (modem) หรือ สายไฟ หรือข่ายงาน (networks)
- บรรจุขึ้น, บรรจุขึ้น คือการถ่ายโอนข้อมูลจากคอมพิวเตอร์เครื่องหนึ่งไปยังคอมพิวเตอร์อีกเครื่องหนึ่ง เครื่องที่ส่งข้อมูล เรียกว่า ตัวที่ทำการ "บรรจุขึ้น" หรือการส่งข้อมูลจากเครือข่ายไปยังแม่ข่าย
6 Clues: โปรแกรมคอมพิวเตอร์ที่ใช้เปิดดูเว็บ (web browser) • แฟ้มข้อมูลหรือกลุ่มแฟ้มข้อมูลที่มีอยู่บนเวิลด์ไวด์เว็บ ดู world wide web ประกอบ • การเชื่อมโยงคอมพิวเตอร์สองเครื่องเข้าด้วยกันโดยผ่านทางโมเด็ม (modem) หรือ สายไฟ หรือข่ายงาน (networks) • หน้าเอกสารที่เขียนขึ้นในรูปแบบภาษาเอชทีเอ็มแอล ซึ่งสามารถเชื่อมโยงไปยังเอกสารหน้าอื่นได้ โดยเรียกดูผ่านเว็บบราวเซอร์ • ...
Computer Networks Cross Words 2013-12-03
8 Clues: Medium Acess Control • used in error control • most commonly used network • occurs due to network traffic • its a portion of Data Link Layer • the rules that governs the data communication • which sends the data to the transmission medium • which receives the data from the transmission medium
GI Crossword Game 2025-05-04
Across
- JavaScript method to add an element to the end of array
- Ansible module to install packages
- The secret function behind all those endless loops
- javaScript to declare a variable with block scope
- This protocol ensures your data doesn’t take the scenic route
- It’s like a personal assistant, but for your servers
- This Python function really defines a program
Down
- python library for data analysis
- network device used to connect multiple networks
- protocol to resolve domain names
- define tasks in Ansible
- A JavaScript variable that refuses to change its mind
- Code executes after a set wait period
- Ansible module to copy files to managed nodes
- Python data type to store key-value pairs
- The unsung hero keeping your containerized apps afloat
16 Clues: define tasks in Ansible • python library for data analysis • protocol to resolve domain names • Ansible module to install packages • Code executes after a set wait period • Python data type to store key-value pairs • Ansible module to copy files to managed nodes • This Python function really defines a program • network device used to connect multiple networks • ...
Digital Communication Methods 2023-01-31
6 Clues: Electronic Mail • A live video metting • Informal communication example WhatsApp • Online platorm to build social networks • Describes how formal dig comms should be • An online diary to share thoughts and interests
Geography Crossword Puzzle 2021-09-23
Across
- A landform along the shoreline of an ocean, sea, lake, or river
- A waterless area of land with little or no vegetation
- A chain or cluster of islands
- The world's largest continent
- The study of place.
- Country with the largest population
- The world's smallest continent
- Largest ocean
Down
- An extensive area filled with trees.
- The height of a point on the Earth's surface compared to the sea level
- Geography of the networks of people and cultures on Earth’s surface.
- Geography of the Earth’s climate, landforms, and oceans.
- The Grand Canyon is in this state
- The sudden and intense shaking of the ground due to tectonic activity.
- Largest country in the world
- Northern most country in North America
16 Clues: Largest ocean • The study of place. • Largest country in the world • A chain or cluster of islands • The world's largest continent • The world's smallest continent • The Grand Canyon is in this state • Country with the largest population • An extensive area filled with trees. • Northern most country in North America • A waterless area of land with little or no vegetation • ...
Digital World Crossword 2025-02-21
Across
- Google's popular web browser
- Place where you store files online instead of on your device
- Common programming language known for its snake logo
- Operating system used by most smartphones
- Type of malicious software that encrypts files and demands payment
- Main circuit board in a computer
- Company that makes the iPhone
- Wireless technology standard for short-distance data exchange
Down
- Global system of interconnected networks
- Storage device that uses flash memory, often connected via USB
- AI assistant in Windows
- Three-letter abbreviation for a common image format
- Microsoft's cloud computing platform
- Device that connects to a computer and moves a cursor
- Process of converting data into a secure format
- Acronym for Central Processing Unit
16 Clues: AI assistant in Windows • Google's popular web browser • Company that makes the iPhone • Main circuit board in a computer • Acronym for Central Processing Unit • Microsoft's cloud computing platform • Global system of interconnected networks • Operating system used by most smartphones • Process of converting data into a secure format • ...
tech crossword 2015-05-13
Across
- an instrument or device used for observing
- used for hitting a tennis ball
- a system for transmitting visual images and sound that are reproduced on screens
- what do you use to connect to the internet
- Hard disks may be internal or ______
Down
- used for texting
- a printed circuit board containing the principal components of a computer
- global system of interconnected computer networks
- was used to decapitate people
- a machine with moving parts that converts power into motion
10 Clues: used for texting • was used to decapitate people • used for hitting a tennis ball • Hard disks may be internal or ______ • an instrument or device used for observing • what do you use to connect to the internet • global system of interconnected computer networks • a machine with moving parts that converts power into motion • ...
Artificial Intelligence 2022-06-02
Across
- period of reduced funding and interest in AI
- search that doesn´t have the information it's domain
- Sequence of well-defined instructions used in computation
- capability to process human speech into a written format
Down
- series of algorithms that mimic the human brain
- Used to make text-to-speech conversation
- the ability to acquire and apply knowledge
- A bunch of nodes
- automation technology based on metaphorical software robots
- intelligence demonstrated by machines
10 Clues: A bunch of nodes • intelligence demonstrated by machines • Used to make text-to-speech conversation • the ability to acquire and apply knowledge • period of reduced funding and interest in AI • series of algorithms that mimic the human brain • search that doesn´t have the information it's domain • capability to process human speech into a written format • ...
Lesson 2 2022-09-09
Across
- Change their way of life in response to the environment
- 70,000 years ago when thick sheets of ice spread across large regions of Earth
- A closely interconnected group of people or things
- The place early humans originated from
- Having many related parts, not simple
Down
- Modern human
- When people leave their homeland to live somewhere else
- First hominin to bury their dead, a close relative of us.
- A way early people killed animals for food.
- Surroundings
10 Clues: Modern human • Surroundings • Having many related parts, not simple • The place early humans originated from • A way early people killed animals for food. • A closely interconnected group of people or things • When people leave their homeland to live somewhere else • Change their way of life in response to the environment • ...
NYSE + NASDAQ 2024-02-09
Across
- the right to trade on a floor of the NYSE
- known as the "Big Board"
- the NYSE is a _____ market with specialists
- units of stocks issued by a corporation that represent ownership.
- the NASDAQ is a _____ market with market makers
- a person who buys and sells goods or assets for others.
Down
- investors post order over computer networks
- the agreement that created the NYSE
- NASDAQ is the ____ biggest stock exchange
- has a higher trading volume than NYSE
10 Clues: known as the "Big Board" • the agreement that created the NYSE • has a higher trading volume than NYSE • the right to trade on a floor of the NYSE • NASDAQ is the ____ biggest stock exchange • investors post order over computer networks • the NYSE is a _____ market with specialists • the NASDAQ is a _____ market with market makers • ...
Privacy & Security 2023-12-20
Across
- coding protecting information from hackers
- the right to be let alone
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
Down
- (2 words) information about an individual
- common examples are viruses and trojans
- the process of identifying a user's identity
- international organization for standardization
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
10 Clues: compromise of security • the right to be let alone • common examples are viruses and trojans • (2 words) information about an individual • coding protecting information from hackers • the process of identifying a user's identity • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
Tech Trivia Crossword 2024-08-13
Across
- The key that is used to connect one schema to another schema
- Situation that occurs when resources are overloaded
- Which type of exploit utilizes fake websites and url names
- Any software intentionally designed to disrupt computer or computer networks
Down
- CEO of Alphabet
- Address to a variable
- CEO of Youtube
- A method that can be used to replace loops in a function
- A keyword used to delete table data
- Which bootloader does Linux use to boot itself
10 Clues: CEO of Youtube • CEO of Alphabet • Address to a variable • A keyword used to delete table data • Which bootloader does Linux use to boot itself • Situation that occurs when resources are overloaded • A method that can be used to replace loops in a function • Which type of exploit utilizes fake websites and url names • ...
FOR3701_SEM 2_2024 2024-07-31
Across
- the heart of the cellphone system
- the main computer database of the cellphone system
- used by most investigators as the starting point for their investigation
- cellphone networks configure this location
- cellphone records may be used for this purpose in court
- without this, cellphone communication is not possible
Down
- hears the Section 205 subpoena application
- type of communication used by cellular phones
- the investigative principle established in 2006 for cellphones
- is also known as a mobile station
10 Clues: the heart of the cellphone system • is also known as a mobile station • hears the Section 205 subpoena application • cellphone networks configure this location • type of communication used by cellular phones • the main computer database of the cellphone system • without this, cellphone communication is not possible • ...
CrossWord 2024-07-07
Across
- A machine learning algorithm used for clustering
- An AI application that mimics conversation with users
- An ensemble learning method
- Which library is commonly used for data manipulation and analysis in Python?
- A popular machine learning library
Down
- A function defined without a name in Python
- Controls the step size in gradient descent
- Learning from data without labeled responses
- A type of AI that imitates human cognitive processes
- Type of learning involving neural networks with many layers
10 Clues: An ensemble learning method • A popular machine learning library • Controls the step size in gradient descent • A function defined without a name in Python • Learning from data without labeled responses • A machine learning algorithm used for clustering • A type of AI that imitates human cognitive processes • An AI application that mimics conversation with users • ...
Innovation Day 20 2024-06-14
Across
- - AI-driven software which can simulate a conversation with users
- - Abbreviation for Artificial Intelligence.
- - Acronym for Large Language Model.
- - Type of AI that creates new content or data.
- - Pertaining to networks that mimic the human brain.
Down
- - Open-source platform for machine learning developed by Google
- - Interface for building and interacting with software applications.
- - Programming language commonly used for AI and machine learning.
- - Microsoft's cloud service offering for advanced AI tools.
- - OpenAI's advanced conversational model.
10 Clues: - Acronym for Large Language Model. • - OpenAI's advanced conversational model. • - Abbreviation for Artificial Intelligence. • - Type of AI that creates new content or data. • - Pertaining to networks that mimic the human brain. • - Microsoft's cloud service offering for advanced AI tools. • - Open-source platform for machine learning developed by Google • ...
APCOM Unit 5 2023-04-18
Across
- Budget Cuts
- Oil leads to issues in terms of democratization
- Implemented by governments to reduce poverty
- The only course country not in the World Trade Organization
- economic networks that are growing more interconnected
- This Country has privatization and increased competition in its oil industry
Down
- reduction of state control of the economy
- This increases in the uk and is a demographic change
- This country has Special Economic Zones on its coast
- Growing populations can cause this change
10 Clues: Budget Cuts • reduction of state control of the economy • Growing populations can cause this change • Implemented by governments to reduce poverty • Oil leads to issues in terms of democratization • This country has Special Economic Zones on its coast • This increases in the uk and is a demographic change • economic networks that are growing more interconnected • ...
ΕΡΓΑΣΙΑ ΚΡΙΣΤΙΑΝ ΑΣΙΚΟΥ 2023-04-28
Across
- device that send data over a connection
- device used to connect multiple network hosts
- a person that acceses your computer and destroys it
- physical networking device
- Access point to devices outside of the network
- an intelligent way to deal with data packets
- used to connect networks
Down
- a piece of cable that connects multiple computers
- electronic device that amplifies the signal recieved
- a piece of computer hardware or software that provides functionality for other programs or devices
10 Clues: used to connect networks • physical networking device • device that send data over a connection • an intelligent way to deal with data packets • device used to connect multiple network hosts • Access point to devices outside of the network • a piece of cable that connects multiple computers • a person that acceses your computer and destroys it • ...
DePIN 2025-03-18
Across
- Real-time, high-precision GNSS for geospatial data.
- AI-driven mapping using crowd-sourced dashcam footage.
- Lets users own, control, and monetize vehicle data.
- Decentralized wireless network, powered by tokens.
- Expanding affordable and decentralized internet access.
Down
- Geospatial networks for mapping and location services.
- Converts fragmented data into decentralized AI intelligence.
- Earn from multiple projects with one token, manage in-app.
- Tracks air quality, rewards users for environmental data.
- Decentralized video streaming, rewards bandwidth sharing.
10 Clues: Decentralized wireless network, powered by tokens. • Real-time, high-precision GNSS for geospatial data. • Lets users own, control, and monetize vehicle data. • Geospatial networks for mapping and location services. • AI-driven mapping using crowd-sourced dashcam footage. • Expanding affordable and decentralized internet access. • ...
Cybersecurity 2025-07-29
Across
- Network of private computers infected with malicious software
- Technique of making data unreadable to unauthorized users
- Fraudulent attempt to obtain sensitive information
- Barrier between a trusted network and untrusted networks
- Software designed to damage, disrupt, or gain unauthorized access
- Secret string used to authenticate access
Down
- Attacker tricks someone into breaking security procedures
- Attempts to guess a password by trying many combinations
- Method of verifying identity using fingerprints, retina, etc.
- Security flaw allowing attackers to access restricted data
10 Clues: Secret string used to authenticate access • Fraudulent attempt to obtain sensitive information • Attempts to guess a password by trying many combinations • Barrier between a trusted network and untrusted networks • Attacker tricks someone into breaking security procedures • Technique of making data unreadable to unauthorized users • ...
Vocabulary Unit 3.1 2025-11-18
Across
- The study of matter, energy, motion, and forces.
- Creative expression through visual, auditory, or performance forms.
- The study of Earth’s landscapes, environments, and people.
- Focuses on computers, networks, and digital systems.
- Written works that express ideas, emotions, and stories.
Down
- The record of past events, societies, and cultures.
- The science of substances and their interactions.
- The study of living organisms and life processes.
- The language of numbers, patterns, and logic.
- Promotes fitness, movement, and teamwork.
10 Clues: Promotes fitness, movement, and teamwork. • The language of numbers, patterns, and logic. • The study of matter, energy, motion, and forces. • The science of substances and their interactions. • The study of living organisms and life processes. • The record of past events, societies, and cultures. • Focuses on computers, networks, and digital systems. • ...
Cyber Security Puzzle 2024-04-22
Across
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
- an attack in which someone sends unsolicited messages to a Bluetooth-enabled device
- An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
- process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
- the physical opening where a data cable can be plugged in
Down
- an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them
- A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
- a form of testing that is performed with knowledge of a target system's internals
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application
- an unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
- capability to limit network traffic between networks and/or information systems.
- The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
- a design and programming philosophy that focuses on formally correct and verifiable input handling throughout all phases of the software development lifecycle
- The unauthorized transfer of information from an information system.
15 Clues: the physical opening where a data cable can be plugged in • The unauthorized transfer of information from an information system. • capability to limit network traffic between networks and/or information systems. • a form of testing that is performed with knowledge of a target system's internals • ...
BVC 2022-11-14
Across
- Extrernal forces stopping people from buying the brand they want
- measures the core aspects of choice: brand saliency and brand relationships
- known to be one of the market effects
- ____ brands have strong brand networks or associative memory structures
Down
- Ipsos brand equity framework
- Brands grow when its chosen by more people, more___
- AE+ME=___
- AE stands for____
8 Clues: AE+ME=___ • AE stands for____ • Ipsos brand equity framework • known to be one of the market effects • Brands grow when its chosen by more people, more___ • Extrernal forces stopping people from buying the brand they want • ____ brands have strong brand networks or associative memory structures • ...
Phising Play Action 2025-08-21
Across
- crime committed using computer networks
- using false information to impersonate an entity
- malicious software designed to harm, disrupt or gain unauthorized access
- malicious software designed to spread from one to computer to another
Down
- cybercrime where attackers use deceptive communication
- malicious software preventing access to computer files
- transferring messages from one computer to another
- to defraud or embezzle
8 Clues: to defraud or embezzle • crime committed using computer networks • using false information to impersonate an entity • transferring messages from one computer to another • cybercrime where attackers use deceptive communication • malicious software preventing access to computer files • malicious software designed to spread from one to computer to another • ...
LT 3.4 2022-10-12
Across
- An empire must efficiently organize this
- An empire must distinguish its core from this
- An empire must distinguish its citizens from these
- An empire must cooperate and compete with these
- An empire must unite a diverse ___
Down
- An empire must use this to expand its territory
- An empire must impose a dominant___ on an existing___
- An empire must maintain trade ___
- An empire must use this to unite its people
9 Clues: An empire must maintain trade ___ • An empire must unite a diverse ___ • An empire must efficiently organize this • An empire must use this to unite its people • An empire must distinguish its core from this • An empire must use this to expand its territory • An empire must cooperate and compete with these • An empire must distinguish its citizens from these • ...
IT JOBS 2018-02-13
Across
- He processes computer data.
- He tests,designs and tests computer programs.
- He installs and maintains networks.
- He controls all the IT experts.
Down
- He is in charge of the database operating without a hitch.
- He creates and maintains webpages and web applications.
- He is in charge of troubleshooting and debugging of technical problems.
- He is responsible for research and development of databases.
- He designs and develops ICT devices.
9 Clues: He processes computer data. • He controls all the IT experts. • He installs and maintains networks. • He designs and develops ICT devices. • He tests,designs and tests computer programs. • He creates and maintains webpages and web applications. • He is in charge of the database operating without a hitch. • He is responsible for research and development of databases. • ...
The Hand Salon Puzzle 2021-11-29
Across
- The constant variable is the _____ of the brush
- this experiment deals with _____ sensation
- What is the independent variable?
Down
- What scientist used research to help the study with strokes and paralyzation
- Marotta used ____-up processing to help with research
- Where are you right now?
- The rubber hand illusion can cause your body to feel _______
- This experiment makes you think the ____ is your real hand
- _____ networks control the ability for growth
9 Clues: Where are you right now? • What is the independent variable? • this experiment deals with _____ sensation • _____ networks control the ability for growth • The constant variable is the _____ of the brush • Marotta used ____-up processing to help with research • This experiment makes you think the ____ is your real hand • ...
Chapter 14 2014-03-23
Across
- Web Things you can easily find in a search engine
- Web A collection of documents that don't come up in a general search
- What your main focus is on
- Web Dealing with all social networks
- Sources Someone who speaks from experience
- Purpose deciding wither to be informative or persuasive
- Analysis knowing the people
- What the people think is right
- Speeches To create an understanding of your topic
- A long Story
- Sources Information found in handbooks
- What the people believe in
Down
- The system of topics
- Your central idea
- Apprehension a fear of speaking in front of people
- Copying someone else work and claim it to be yours
- Speaking Someone speaking to a large group of people
- How you handle a topic
- Diagrams Helps divide your topic to make it easier to talk about
19 Clues: A long Story • Your central idea • The system of topics • How you handle a topic • What your main focus is on • What the people believe in • Analysis knowing the people • What the people think is right • Web Dealing with all social networks • Sources Information found in handbooks • Sources Someone who speaks from experience • Web Things you can easily find in a search engine • ...
IT Office Survival Crossword 2025-06-30
Across
- This protocol secures your web traffic
- The one device that can ruin a Monday: “Out of toner!”
- The “cloud” heavyweight from Seattle
- The “power cycle” button on a server
- The “hub” of your company’s email
- When you “ping” but get nothing back
- Where all the tickets pile up endlessly
- The overnight job that always fails at 2am
- “Root” on Linux, “___” on Windows
- The process of copying your data before disaster strikes
Down
- Classic IT phrase: “It’s not a ___ issue!”
- The OS with penguin mascot
- “Oops, wrong environment!”
- The “gateway” to the internet for your office
- What you do to a device before sending it to recycling
- “Blue cable” original—makes networks go
- What IT calls a “planned” outage
- Where you “commit” your changes
- Where all your deleted files go first
19 Clues: The OS with penguin mascot • “Oops, wrong environment!” • Where you “commit” your changes • What IT calls a “planned” outage • The “hub” of your company’s email • “Root” on Linux, “___” on Windows • The “cloud” heavyweight from Seattle • The “power cycle” button on a server • When you “ping” but get nothing back • Where all your deleted files go first • ...
Unit 3: Networks or Tangles? 2017-06-05
Across
- when you watch your smartphone intensely, for a long time
- social media helps you ...... .. ...... with your friends
- synonym for "allow"
- when you are on social media, you sometimes lose ..... of time
- when you cannot do without your phone (adj.)
Down
- the place where many social media apps and websites were created
- you ..... a message, when you want people to receive it
- something you put on social media is a bit of your life that you .....
- with a smartphone, when you are bored you can .... ....
- smartphones are easy to use and you need them: they are ......
- the name of the head of a company
11 Clues: synonym for "allow" • the name of the head of a company • when you cannot do without your phone (adj.) • you ..... a message, when you want people to receive it • with a smartphone, when you are bored you can .... .... • when you watch your smartphone intensely, for a long time • social media helps you ...... .. ...... with your friends • ...
wide area network 2023-10-10
Across
- computers can only connect to other computers if they know there...
- what does WAN stand for
- a benifit of the cloud is that ...... can occur
- what does DNS stand for
- what does IP adress mean
- what does ISP stand for
- what does VPN stand for
Down
- where a company may devide a LAN into smaller for the employees to communicate and share
- a characteristic of a WAN regarding its area
- A WAN can be made up of...
- what does URL stand for
- when companies host websites for the public to access
- what is the name if the biggest WAN
- what is the internet
- where LANS and WANS are redivided into smaller networks
- network of servers hosted on the internet
16 Clues: what is the internet • what does URL stand for • what does WAN stand for • what does DNS stand for • what does ISP stand for • what does VPN stand for • what does IP adress mean • A WAN can be made up of... • what is the name if the biggest WAN • network of servers hosted on the internet • a characteristic of a WAN regarding its area • ...
Social networks and teens 2025-01-21
8 Clues: publish • numerical • bring together • digital persecution • transmission of news • move the cursor up and down • put something on social media • most popular social network with teens
Ransomware 2021-09-23
6 Clues: New Ransomware Variant • Protects against threat online • Convert information into a code • Software created for malicious purposes • A technique used by hackers to obtain sensitive information • Protecting networks, devices and data from unauthorized access
Computer 2016-12-06
Across
- crash
- the way by which you can enter a place
- a device which can be used for surfing the Internet
- a global system of interconnected computer networks
Down
- something you use to click on things
- a typewriter-style device which uses an arrangement of buttons or keys on a computer
- press it to move back to delete
- combination this key with A means choosing the whole text
- information or facts
9 Clues: crash • information or facts • press it to move back to delete • something you use to click on things • the way by which you can enter a place • a device which can be used for surfing the Internet • a global system of interconnected computer networks • combination this key with A means choosing the whole text • ...
Cyber security 2025-08-22
Across
- organized collection of data, stored and accessed by computers
- unauthorized access or exposure of sensitive information
- a collection of interconnected computing devices that can communicate and share resources with each other
- a weakness in a system
- publishing private personal information about an individual online without their consent
Down
- IT professional who ensures an organization's computer networks are secure
- raw facts, figures, and observations
- protecting digital systems
- Personal identification information
9 Clues: a weakness in a system • protecting digital systems • Personal identification information • raw facts, figures, and observations • unauthorized access or exposure of sensitive information • organized collection of data, stored and accessed by computers • IT professional who ensures an organization's computer networks are secure • ...
JPowel50 Computer Science Crossword 2015-09-28
Across
- sender and receiver are not active at the same time
- Harms your computer!
- How to get into your account
- Info on a computer, can be software items or data
- The top part of a piece of text
- what packets must visit
- Computers programmed to send files to other computer browsers
- specifies the type of code being entered
- building blocks of a Website
Down
- sender and receiver are active at the same time
- include all words together in search results
- a way to make search results more accurate
- used to connect servers across continents
- wide area networks, what internet is made up of
- World Wide Web
- If there are clashing colors on a web page, it is an example of______
- using copyright material for legal purposes
17 Clues: World Wide Web • Harms your computer! • what packets must visit • How to get into your account • building blocks of a Website • The top part of a piece of text • specifies the type of code being entered • used to connect servers across continents • a way to make search results more accurate • using copyright material for legal purposes • ...
Tech Terms 2024-05-08
Across
- an electronic machine that can store and work with large amounts of information
- global system of interconnected computer networks that uses the internet protocol suite TCP/IP TO communicate between networks and devices.
Down
- Automation is the use of technology to perform tasks with reduced human assistance.
- Robotics is the interdisciplinary study and pract ice of the design, construction, operation, and use of robots.
- Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion.
5 Clues: an electronic machine that can store and work with large amounts of information • Automation is the use of technology to perform tasks with reduced human assistance. • Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion. • ...
Threats to Computer Networks 2023-03-28
Across
- programs that are hidden within other files
- is a type of attack used to steal data
- these are programs that pretend to be legitimate and are often disguised as an email attachment
- method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
Down
- these are often spread through emails
- the creators of most of the problems that leads to inconvenience
- programs that attempt to blackmail a user in an attempt to make a payment to a hacker
- programs that monitor users activities and send information to hacks
8 Clues: these are often spread through emails • is a type of attack used to steal data • programs that are hidden within other files • the creators of most of the problems that leads to inconvenience • programs that monitor users activities and send information to hacks • programs that attempt to blackmail a user in an attempt to make a payment to a hacker • ...
Your phone and your location 2015-01-06
6 Clues: the M in MAC • the A in MAC • the C in Mac • Means wireless network • The thing that's special about the MAC address • What Wi-Fi networks can do using your MAC address
Networking 2016-02-07
Across
- It connects networks together.
- Tiniest piece of a file.
- Sending & receiving data over a computer network.
- Directory structure for information management.
Down
- Means rules.
- Number that uniquely identifies each device on a network.
- Group of computers that are connected to share resources and exchange data.
- Group of people overseeing the technical development of the World Wide Web.
- Any electronic device that shares resources and exchanges data on a network.
9 Clues: Means rules. • Tiniest piece of a file. • It connects networks together. • Directory structure for information management. • Sending & receiving data over a computer network. • Number that uniquely identifies each device on a network. • Group of computers that are connected to share resources and exchange data. • ...
crossword unit 2 2023-03-05
Across
- barriers resist sharing information
- warranty costs complaints and/or claims and assume additional costs
- attitudes lack of trust in the company or between partners
- chain add value to each stage
- service It can be by phone or social networks
- management mobility produces great uncertainty in the objects and purposes
Down
- theory changes gradually
- medical costs senior doctors in collaborators, associates, to poor conditions in collaborators
- of constancy of purpose lack of clear leadership
- cycle Constant optimization of business activities through four stages
10 Clues: theory changes gradually • chain add value to each stage • barriers resist sharing information • service It can be by phone or social networks • of constancy of purpose lack of clear leadership • attitudes lack of trust in the company or between partners • warranty costs complaints and/or claims and assume additional costs • ...
Television in the 1950s 2023-02-01
Across
- TV star who had his own Variety show
- How many shows did Berle have
- cost of television set
- Most popular choice of entertainment before the TV
- Star of the first hit show
Down
- When Berle's last show aired what percent of people had a TV
- When Berle's show first aired what percent of people had a TV
- One of the four television networks in 1948
- Most popular type of TV
9 Clues: cost of television set • Most popular type of TV • Star of the first hit show • How many shows did Berle have • TV star who had his own Variety show • One of the four television networks in 1948 • Most popular choice of entertainment before the TV • When Berle's last show aired what percent of people had a TV • When Berle's show first aired what percent of people had a TV
LT 3.4 2022-10-12
Across
- An empire must impose a dominant___ on an existing___
- An empire must efficiently organize this
- An empire must maintain trade ___
- An empire must cooperate and compete with these
Down
- An empire must distinguish its citizens from these
- An empire must unite a diverse ___
- An empire must distinguish its core from this
- An empire must use this to unite its people
- An empire must use this to expand its territory
9 Clues: An empire must maintain trade ___ • An empire must unite a diverse ___ • An empire must efficiently organize this • An empire must use this to unite its people • An empire must distinguish its core from this • An empire must use this to expand its territory • An empire must cooperate and compete with these • An empire must distinguish its citizens from these • ...
Mr Robot 2022-11-15
Across
- prevent attacks by blocking malicious traffic
- unwanted files or programs that can cause harm to a computer
- private information being kept secret
- people who seek to exploit weaknesses in software
- a set of characters that allows access to a system
- software designed to detect and destroy viruses
Down
- flaws in software
- the art of protecting networks, devices, and data from attacks
- type of email use to steal information about you
9 Clues: flaws in software • private information being kept secret • prevent attacks by blocking malicious traffic • software designed to detect and destroy viruses • type of email use to steal information about you • people who seek to exploit weaknesses in software • a set of characters that allows access to a system • ...
Online Safety 2018-10-10
Across
- keeping personal information secret
- a secret combination used to open and lock something
- a program that protects your computer from most scams and tricks
- sharing too much online
- a message sent between computers
Down
- bullying that happens online
- tricking people to get something of value from them
- a person who uses a computer to get into other people's information
- a communication system that connects computers and networks together
9 Clues: sharing too much online • bullying that happens online • a message sent between computers • keeping personal information secret • tricking people to get something of value from them • a secret combination used to open and lock something • a program that protects your computer from most scams and tricks • ...
CLUE QUEST 2025-10-04
Across
- An error in software that causes incorrect behavior
- Process of hiding internal data representation from outside
- A database query language
- Technique for managing concurrent processes safely
Down
- A networking device that forwards data packets between networks
- Storage that loses data when power is off
- System that converts domain names into IP addresses
- High-level language primarily used for AI and machine learning
- Algorithm used for traversing or searching tree/graph structures
9 Clues: A database query language • Storage that loses data when power is off • Technique for managing concurrent processes safely • An error in software that causes incorrect behavior • System that converts domain names into IP addresses • Process of hiding internal data representation from outside • High-level language primarily used for AI and machine learning • ...
Cloud Computing _ BCS601_Crosswords 2025-07-02
Across
- / Highest security level suitable for sensitive data
- / Popular service model offering software over the internet
- A key feature of cloud computing, "Pay only for what you ___
- Maximum level of risk or security
- Cloud model combining public and private infrastructure
Down
- Service model providing virtual machines, storage, and networks.
- / Term for computing resources provided over the internet
- / The ability to automatically adjust computing resources
- Cloud deployment model combining public and private clouds
- A level of resource utilization with minimal computing requirements
10 Clues: Maximum level of risk or security • / Highest security level suitable for sensitive data • Cloud model combining public and private infrastructure • / Term for computing resources provided over the internet • / The ability to automatically adjust computing resources • Cloud deployment model combining public and private clouds • ...
Engineer crossword 2022-09-01
Across
- run trains that transport passengers and cargo
- equipment for improving human health
- determines the amount and type of insulation needed.
- create drawings and specifications
- combining veterinary medicine and biomedical engineering
- make sure that each part they manufacture has to be shipped well and made well
- lighting effects for visual art mediums
- Test radio networks
- develop processes, test procedures and implement systems
- Engineer storage systems
- designing aircraft
- oil and gas
Down
- road network projects
- food processing machines
- Hardware circuit boards
- aircraft
- create new materials.
- devoted to the implementation of existing technology
- develop methods for extracting oil and gas
- study a broad range of subjects
- medical equipment repairers or biomedical
- use geographic information systems
- genetics in animals
- research and develop the processes,
- work closely with process engineers to improve product yield
25 Clues: aircraft • oil and gas • designing aircraft • genetics in animals • Test radio networks • road network projects • create new materials. • Hardware circuit boards • food processing machines • Engineer storage systems • study a broad range of subjects • use geographic information systems • create drawings and specifications • research and develop the processes, • ...
Medical Terminology 2022-10-20
Across
- x-rays used to create detailed pictures of the heart
- a sudden loss of brain function caused by an interruption in the supply of blood
- networks of small vessels that perfuse tissue
- disease
- problem with rhythm of your heartbeat
- heart
- portable device that records rhythm of the heart
- heart failure
- vessels that deliver blood to tissue
- when this muscle doesn't pump blood as it should
- records electrical signal
- arterial fibrillation
- without
- two
Down
- thickest layer in the arteries
- oxygen rich blood is blocked from the heart muscles
- pertaining to
- magnetric resonance imaging
- deep vein thrombosis
- effects the blood flowing in the correct direction
- pumps blood through the system
- vessels that return blood to the heart
- ultrasound of the heart
- blood pressure
- cardiac care unit
25 Clues: two • heart • disease • without • pertaining to • heart failure • blood pressure • cardiac care unit • deep vein thrombosis • arterial fibrillation • ultrasound of the heart • records electrical signal • magnetric resonance imaging • thickest layer in the arteries • pumps blood through the system • vessels that deliver blood to tissue • problem with rhythm of your heartbeat • ...
ch 20 vocab 2019-12-11
Across
- nation where all facilities needed for the advanced production of goods
- cooperative venture sponsered by 16 nations
- layer of the earths upper atmosphere
- transferring of genes from one living thing to another
- cultral elements
- greatest global health issue
- process of industrialization is not yet complete
- placing of high value
- growth or spread
- all human beings have rights to life,liberty,and security
- attempt to increase food resources worldwide
- politically motivated attacks
Down
- difference of opinion
- financial interactions involving people
- commerce between nations without economic restrictions
- U.S. federal agency
- creation of plants or animals that are genetically identical to another
- linkage of computer networks
- use of force or threats to frighten people or governments
- difference between men and women
- person who leaves his or her nation in pursuit of safety
- economic development
- antiterrorism bill
23 Clues: cultral elements • growth or spread • antiterrorism bill • U.S. federal agency • economic development • difference of opinion • placing of high value • linkage of computer networks • greatest global health issue • politically motivated attacks • difference between men and women • layer of the earths upper atmosphere • financial interactions involving people • ...
Fundamentals of Computing Terms 2020-09-21
Across
- A harmful computer program that creates glitches
- transferring data from the internet to a device
- a small graphic that represents a file/application
- A widely-accepted cyber security measure
- the protection of computer systems/networks
- an interface for connecting peripheral devices
- an output device that displays info from CPU
- uses pictures and words to represent ideas, etc.
- a piece of equipment outside the computer
- software that is pre-programmed for user
Down
- the blocking of data access for ransom
- program that you run on a computer/phone
- an input device that allows user to click graphics
- 8 bites of info represented in 1 character
- the brain of the computer
- Temporary memory
- smallest piece of info in the computer
- items that you can touch, I.E, tablet, etc.
- transferring data to the internet
- a unit of storage that is about 1 mil bytes
- the network of physical objects
21 Clues: Temporary memory • the brain of the computer • the network of physical objects • transferring data to the internet • the blocking of data access for ransom • smallest piece of info in the computer • program that you run on a computer/phone • A widely-accepted cyber security measure • software that is pre-programmed for user • a piece of equipment outside the computer • ...
Alpo 2021-02-25
Across
- cable with 8 wires used for networking
- network spanning a local area
- Unique six sets of two numbers identifier for a device
- global network comprised of most devices
- reaches up to 100gb/s of speed or higher
- ip comprised of 8 sets of 4 long hexadecimal numbers
- used to connect together multiple devices, not that intelligent
- connects devices to others, provides a firewall
- supports 100baseT
Down
- fastest speed possible
- extends the range of cabled networks
- supports 1000baset
- network spanning a wide area
- network spanning a metropolitan area
- supports 10baseT
- aware of every device connected to it, used to connect together multiple devices, smart
- stores and transfers data, has no physical interface
- Number assigned by router linked to your internet activity
- ip comprised of 4 different sets of numbers ranging 0 - 255
- Two or more computers linked to share resources
20 Clues: supports 10baseT • supports 100baseT • supports 1000baset • fastest speed possible • network spanning a wide area • network spanning a local area • extends the range of cabled networks • network spanning a metropolitan area • cable with 8 wires used for networking • global network comprised of most devices • reaches up to 100gb/s of speed or higher • ...
The types of Engineers! 2021-10-14
Across
- Clear Boxes
- Builds Advanced Logic in Computer Systems
- Created the Quality Management System (QMS)
- Bridges
- Chain Home/Air Warning System
- Visuals for Theatre performances by Lighting the Scenes
- Printing press
- Steam Engines
- Nuclear Power Plant, Electricity, Electrical Power Distribution
- hovercraft
- Fire Alarm
- X-ray
- Prosthetics
Down
- Automobile sound systems
- Health and Advance Manufacture Systems
- Ice Powers Condition, Dual Fuel Heat Pumps
- Electric battery
- Built New Exhibits for Endangered or Rare Animals
- Fiber, Satellite, and Wired Communication Systems
- Solar Cell
- Laser
- The Design and Installation of Mobile Wireless Networks and Maintaining Them
- Dams
- Improves Product Yield and Troubleshoots Process
- Technological devices
- Furnace
26 Clues: Dams • Laser • X-ray • Bridges • Furnace • Solar Cell • hovercraft • Fire Alarm • Clear Boxes • Prosthetics • Steam Engines • Printing press • Electric battery • Technological devices • Automobile sound systems • Chain Home/Air Warning System • Health and Advance Manufacture Systems • Builds Advanced Logic in Computer Systems • Ice Powers Condition, Dual Fuel Heat Pumps • ...
