networks Crossword Puzzles
Creativity- Definitions and Terms 2014-09-20
Across
- building complex networks of ideas into the curriculum
- introducing unique ideas not normally found in the curriculum
- people who are creative in their own lives
- moving more rapidly through the curriculum and school system
- important breakthroughs for problem solvers
Down
- unique
- creative people who avoid learning the academic and technical skill
- adding details
- building onto the regular curriculum
- creative people who are considered eminent in thier field
- spots groups of related hits
- taking a different perspective on a situation or problem
- the ability to produce many ideas when problem solving
- fresh and new perspective to the obvious
14 Clues: unique • adding details • spots groups of related hits • building onto the regular curriculum • fresh and new perspective to the obvious • people who are creative in their own lives • important breakthroughs for problem solvers • building complex networks of ideas into the curriculum • the ability to produce many ideas when problem solving • ...
Crossword 2015-04-28
Across
- Also called wind pipe
- tubes that carry blood from parts of your body to the heart
- arteries and veins are by networks of very narrow tubes calles__
- The main organ in our circulatory system
- Which gas makes up most of the air you breath in
- A group of similar__ come together to make a tissue
- breath using this part of your body
Down
- Different organs working together
- To stay alive your cells need__
- If body fights diseases
- Balloon like air sacs at the end of the bronchiole
- Germs that spread easily
- Different word for breathing
- Transports blood away from the body
14 Clues: Also called wind pipe • If body fights diseases • Germs that spread easily • Different word for breathing • To stay alive your cells need__ • Different organs working together • Transports blood away from the body • breath using this part of your body • The main organ in our circulatory system • Which gas makes up most of the air you breath in • ...
Language & Technology 2024-11-22
Across
- The brain of a computer.
- A method to secure data by converting it into code.
- Technology dealing with the design and use of robots.
- A security system for networks.
- A global network connecting millions of computers.
- (AI) Technology that simulates human intelligence.
- Rules governing the structure of sentences.
Down
- The physical parts of a computer.
- A figure of speech comparing two things without "like" or "as."
- A collection of words in a language.
- Programs and operating systems for computers.
- The language of computers using 0s and 1s.
- A comparison using "like" or "as."
- A set of rules for solving problems, often in computing.
14 Clues: The brain of a computer. • A security system for networks. • The physical parts of a computer. • A comparison using "like" or "as." • A collection of words in a language. • The language of computers using 0s and 1s. • Rules governing the structure of sentences. • Programs and operating systems for computers. • A global network connecting millions of computers. • ...
TECHNOLOGY 2024-07-17
Across
- - Software designed to harm computers.
- Computing - Internet-based computing services.
- Computing - Advanced computing using quantum bits.
- Reality (VR) - Simulated experiences that can mimic or differ from the real world.
- Learning - Systems that learn from data.
- - Device that directs internet traffic.
- Source - Software with source code available to all.
- - A set of rules for data communication.
Down
- - A security system for protecting networks.
- Mining - Discovering patterns in large data sets.
- - A computer that provides data to other computers.
- - Temporary storage for frequently accessed data.
- Interface (UI) - The means through which users interact with a computer.
- - A step-by-step procedure for solving a problem.
14 Clues: - Software designed to harm computers. • - Device that directs internet traffic. • Learning - Systems that learn from data. • - A set of rules for data communication. • - A security system for protecting networks. • Computing - Internet-based computing services. • Mining - Discovering patterns in large data sets. • - Temporary storage for frequently accessed data. • ...
Crossword English 2022-06-13
Across
- Is a book for know words.
- Is a social networks.
- Is a transport that a lot of persons use and have 2 weels.
- Is a language that speak in USA.
Down
- Is a person that teaches.
- Is a person that study.
- Is a site for definicions.
- Is a number that go bihain the four.
- Is a drink that is transparent and we need for live.
- Is a think that you have to read.
10 Clues: Is a social networks. • Is a person that study. • Is a person that teaches. • Is a book for know words. • Is a site for definicions. • Is a language that speak in USA. • Is a think that you have to read. • Is a number that go bihain the four. • Is a drink that is transparent and we need for live. • Is a transport that a lot of persons use and have 2 weels.
Technological Crossword 2021-07-30
Across
- What is one of the tiny dots on your screen called?
- How to connect multiple computers to the same LAN?
- What is Cat6?
- What files do browsers keep on your? computer
- What is the number tied to a specific device?
- What blocks unauthorized access?
Down
- What does LAN stand for?
- What comes after megabyte?
- What routes traffic between networks?
- What is it called when you turn off the computer from the button?
10 Clues: What is Cat6? • What does LAN stand for? • What comes after megabyte? • What blocks unauthorized access? • What routes traffic between networks? • What files do browsers keep on your? computer • What is the number tied to a specific device? • How to connect multiple computers to the same LAN? • What is one of the tiny dots on your screen called? • ...
Office of Womens Health 2023-10-06
Across
- Medical test for breast health screening.
- Media Online networks for communication and sharing.
- Online platform containing information or services.
- Gathering of people for discussion and collaboration.
Down
- Personal or informational website with regular updates.
- Act Legislation aimed at supporting community needs.
- A small, typically round, flat piece of food.
- Organized effort to achieve a specific goal, often in politics.
- Visual content often found on platforms like YouTube.
- Pamphlet providing information or promoting a product.
10 Clues: Medical test for breast health screening. • A small, typically round, flat piece of food. • Online platform containing information or services. • Act Legislation aimed at supporting community needs. • Media Online networks for communication and sharing. • Visual content often found on platforms like YouTube. • Gathering of people for discussion and collaboration. • ...
Data Analytics - Crossword Unit 1 2019-02-04
Across
- The data used for testing
- The data used for learning
- The process of extracting patterns from the data
- Repository of data
- Classifying separator in support vector machines
- In neural networks the nodes are assigned with ---
Down
- Classifier easily understandable by layman
- Analysis to Understand what products or services are commonly purchased together
- Process of converting large amount of data into knowledge [ short form]
- The man who said the processing speed doubles every 18 months
10 Clues: Repository of data • The data used for testing • The data used for learning • Classifier easily understandable by layman • The process of extracting patterns from the data • Classifying separator in support vector machines • In neural networks the nodes are assigned with --- • The man who said the processing speed doubles every 18 months • ...
5th Grade -Unit 7 Week 1 Vocabulary Words 2024-04-19
Across
- very tiring or difficult
- to come into being or operation
- to direct or control
- goods shmanyat, plane, train, or truck
- a nobleman by birth of a particular rank
Down
- a rich, powerful person in business or industry
- to use power to manage or command
- a person whom one tries to be better than; competitor
- a long journey by air, land, sea, or outer space
- a system that involves a number of persons or groups
10 Clues: to direct or control • very tiring or difficult • to come into being or operation • to use power to manage or command • goods shmanyat, plane, train, or truck • a nobleman by birth of a particular rank • a rich, powerful person in business or industry • a long journey by air, land, sea, or outer space • a system that involves a number of persons or groups • ...
Public Policy in China 2023-05-17
Across
- Highest decision-making body in Chinese party-state
- Number of administrative levels in Chinese public administration
- Other word for policy field
- Policy cycle phase where gaps occur
Down
- Third pillar in Chinese party-state, after Party and State
- Important actor networks according to Sabatier
- Phase of stability according to Baumgartner and Jones
- Influential retired decision-makers within the CCP
- Super ministry headed by premier, starts with State
- List of issues governments want to solve
10 Clues: Other word for policy field • Policy cycle phase where gaps occur • List of issues governments want to solve • Important actor networks according to Sabatier • Influential retired decision-makers within the CCP • Highest decision-making body in Chinese party-state • Super ministry headed by premier, starts with State • ...
Application of Boosting And Ensemble Learning 2025-10-31
Across
- Detects anomalies or intrusions in networks
- Used in suggesting products or movies on platforms
- General purpose of using ensemble models
- Applied in detecting diseases in the medical field
- Helps in predicting stock prices or sales trends
- Used for improving decision-making processes
Down
- Applied in dividing images into meaningful regions
- Used in image and speech recognition tasks
- Used in identifying spam or fraudulent activities
- Common application in sorting data into categories
10 Clues: General purpose of using ensemble models • Used in image and speech recognition tasks • Detects anomalies or intrusions in networks • Used for improving decision-making processes • Helps in predicting stock prices or sales trends • Used in identifying spam or fraudulent activities • Applied in dividing images into meaningful regions • ...
Business Technology 2026-02-18
Across
- – Running business operations online.
- storage – Where digital information is saved for later use.
- – Meeting with people using both audio and video.
- – Talking to people in different places using audio only.
Down
- – The programs on a computer.
- Technology – Tools and systems used to run a business efficiently.
- – The physical parts of a computer.
- networks – Systems connecting computers for communication.
- – Buying and selling goods online.
- banking – Managing bank accounts through the internet.
10 Clues: – The programs on a computer. • – Buying and selling goods online. • – The physical parts of a computer. • – Running business operations online. • – Meeting with people using both audio and video. • banking – Managing bank accounts through the internet. • – Talking to people in different places using audio only. • ...
Crossword Labs 3 2025-10-31
Across
- Multiple computers connected together to share resources
- Physical components of a computer system
- Programs and operating information used by a computer
- Number system that uses only 0s and 1s
- A collection of elements organized for a common purpose
Down
- A step-by-step procedure for solving a problem
- Protection of computer systems from theft or damage
- Computer components that retain digital data
- An organized collection of structured information
- Global system of interconnected computer networks
10 Clues: Number system that uses only 0s and 1s • Physical components of a computer system • Computer components that retain digital data • A step-by-step procedure for solving a problem • An organized collection of structured information • Global system of interconnected computer networks • Protection of computer systems from theft or damage • ...
Cyber Security Crossword Puzzle 2026-03-14
Across
- Cyber law in India introduced in the year 2000.
- Unauthorized access to a computer system.
- Illegal copying or distribution of software.
- Copying someone else's work without giving credit.
- Fake emails or websites used to steal personal information.
Down
- Protection of computers, networks, and data from cyber attacks.
- Moral rules for proper use of computers.
- Secret code used to access accounts.
- Trace of activities left on the internet.
- Sending large numbers of unwanted emails.
10 Clues: Secret code used to access accounts. • Moral rules for proper use of computers. • Unauthorized access to a computer system. • Trace of activities left on the internet. • Sending large numbers of unwanted emails. • Illegal copying or distribution of software. • Cyber law in India introduced in the year 2000. • Copying someone else's work without giving credit. • ...
SocialMediaCrosswordPuzzle 2019-10-30
Across
- a short introduction of a person
- a person who influences other people via social media etc.
- something that is popular right now
- an online log
Down
- expert knowledge or skill in an area
- the people who watch or follow a public event, e.g. a film or concert
- tag used on social networks (i.e. Twitter)
- a person who subscribes to social media content
- (adj.) easily remembered, attractive, memorable
- expert knowledge or skill in an area
10 Clues: an online log • a short introduction of a person • something that is popular right now • expert knowledge or skill in an area • expert knowledge or skill in an area • tag used on social networks (i.e. Twitter) • a person who subscribes to social media content • (adj.) easily remembered, attractive, memorable • a person who influences other people via social media etc. • ...
Trade Networks and the Black Death 2023-02-23
Across
- After the plague, workers gained power and earned higher _______________.
- As a result of the plague, many Europeans began to question the _______________ and their power.
- Goods and _______________ traveled along these trade routes.
- Where did the bubonic plague originate or start?
- Network of trade routes that connected China to Europe.
- In some areas death rates reached as high as _______________ percent.
- Bacteria that caused the Black Death
Down
- This is the deadly disease that killed millions in the 1300s.
- How did the plague get to Italy?
- Continent that got hit the worst.
- The system of _______________ ended as there were fewer peasants to work in the fields.
- Responsible for spreading the deadly bacteria to humans.
- Number of individuals from Africa, Asia and Europe that perished as a result of this disease.
- Swollen lymph nodes are called this.
- Number of years the plague lasted.
15 Clues: How did the plague get to Italy? • Continent that got hit the worst. • Number of years the plague lasted. • Swollen lymph nodes are called this. • Bacteria that caused the Black Death • Where did the bubonic plague originate or start? • Network of trade routes that connected China to Europe. • Responsible for spreading the deadly bacteria to humans. • ...
DEC30023: Network Types 2025-02-02
6 Clues: A wireless LAN technology • The largest WAN in the world • A common wired LAN technology • A high-speed connection method • A device that connects networks • A common PAN communication method
IP for Surveillance 2013-08-19
Across
- term for an individual chunk of TCP
- single source message sent to many or all, not solicited or subscribed to
- protocol that maps IP addresses to MAC addresses
- any port below 1024
- The testing interface IP Address present on ALL network cards
- This is how TCP sets up a stateful, reliable connection. Cumbersome.
- average rate of successful data transfer
- large networks are managed more efficiently by use of _______.
- handles the addressing component of a typical network
- Makes up the Internet Protocol suite
- numbers used to separate the host and network portions of an IP Address
- Address ____ Protocol
- All IP Addresses EXCEPT 10, 172 and 192 ARE _______.
- like a channel on television or a specific frequency on a walkie-talkie
- _____ host control protocol
- layer 2 device (of the OSI Model, remember that?)
- sometimes used as a measurement of data transfer but includes protocol overhead and lost packets
- IP Addresses beginning with 10, 172 and 192 are classified as what type of addresses?
- can identify the type of data in a data packet, divide the packets into traffic classes and prioritized for forwarding
- use this to get through a firewall that is blocking a desired port
- sending IP datagrams to a group of interested receivers in a single transmission.
- portion of the IP Address that represents the group or 'family'
- In the OSI model, data communication starts with the ___ layer
- protocol used to provide IP Addresses automagically
- computers use this numbering system
- address consisting of eight hexidecimal pairs of numbers
- connects networks to one another
- Media ____ Control
Down
- ports used after initial client server connections are established
- guarantees dlivery of the datagrams
- Layer 7 of the Open Systems Interconnection Model
- translates domain names, meaningful for users, to the numerical IP addresses needed for the purpose of locating computer services and devices.
- a ______ protocol can send unicast, broadcast or multicast messages
- term associated with the path to an adjacent router
- technology for virtually segmenting networks
- a really dumb switch. Not really available any more.
- packet sent when server confirms client has been provided a lease on an IP Address
- connection-oriented protocols can only use ______ addresses
- Abreviation for the 'model' which defines internetworking, conceptually, as mad up of 'layers'
- minimum value in a dotted decimal octet
- Layer 1 of the Open Systems Interconnection Model
- single grouping of numbers in an IP Address
- portion of the IP Address that represents the individual unit
- humans use this numbering system
- IP Addresses are written in this format
- number of OSI layers used in the TCP/IP stack
- type of packet sent by client who needs an IP Address
- term for the IP packet
- theoretical maximum transmission speed
- protocol is the lazy cousin of TCP. Used when gauranteed delivery of packets is not needed
- endpoint of a TCP/IP connection
- Number of layers in the Open Systems Interconnection Model
52 Clues: Media ____ Control • any port below 1024 • Address ____ Protocol • term for the IP packet • _____ host control protocol • endpoint of a TCP/IP connection • humans use this numbering system • connects networks to one another • term for an individual chunk of TCP • guarantees dlivery of the datagrams • computers use this numbering system • Makes up the Internet Protocol suite • ...
Mesh Networks by Tim Hoover 2020-05-23
Across
- Apple's device for streaming content from the Internet to a TV.
- A device to wirelessly transmit the internet signal in a home setup.
- The device provided by your Internet Service Provider, needed for connection to the Internet.
- A cable for connecting video sources and outputs.
- Another word for each device on a wireless network.
- A measure of the volume of data an Internet connection can support.
Down
- A physical barrier in a home that might weaken a wifi signal.
- While range extenders can expand the reach of a wifi network, they will usually decrease the ________ of the connection.
- Internet connection via a cable rather than wifi.
- The most common first name for staff at Apple Polo Park.
- A software framework from Apple for securely controlling smart devices in the home.
11 Clues: Internet connection via a cable rather than wifi. • A cable for connecting video sources and outputs. • Another word for each device on a wireless network. • The most common first name for staff at Apple Polo Park. • A physical barrier in a home that might weaken a wifi signal. • Apple's device for streaming content from the Internet to a TV. • ...
Network Hardware 2021-05-05
Across
- fastest wired connection
- network is controlled by a server
- data is sent across a LAN in...
- all devices are equal on this network
- the address system used on a LAN
- directs frames of data across a LAN
- directs packets of data between networks
- the backup updates and security have to be done like this on a peer to peer network
Down
- connects the device to a network and contains the MAC address
- allows wireless connection to a network
- slower wired connection
- data is sent across a WAN in....
- the address system used on a WAN
13 Clues: slower wired connection • fastest wired connection • data is sent across a LAN in... • data is sent across a WAN in.... • the address system used on a LAN • the address system used on a WAN • network is controlled by a server • directs frames of data across a LAN • all devices are equal on this network • allows wireless connection to a network • ...
WAN 2023-10-10
Across
- What does URL stand for
- how long can wweb hosting networks be acessed for
- what does the cloud do
- what is the name of the biggest WAN on the planet
- why should people work on the cloud (what happens to thier work?)
- what does vpn stand for?
Down
- what does ISP stand for
- what area does a WAN cover (big, small, medum large geogrpphical area?)
- what does dns stand for
- what does WAN stand for
- what does IPaddress stand for/ mean
- WANs are often a collection of …
- What is used to make a virtual network?
13 Clues: what does the cloud do • what does ISP stand for • What does URL stand for • what does dns stand for • what does WAN stand for • what does vpn stand for? • WANs are often a collection of … • what does IPaddress stand for/ mean • What is used to make a virtual network? • how long can wweb hosting networks be acessed for • what is the name of the biggest WAN on the planet • ...
SMR2 2026-02-24
Across
- Slot on a motherboard for inserting a processor.
- Screen that displays images and video from a computer.
- Pointing device that controls the cursor on screen.
- Security system blocking unauthorized network access.
- Device directing data traffic between networks.
- Metal frame housing a computer's internal parts.
- Device connecting multiple devices in a local network.
- Machine that produces physical copies of digital documents.
Down
- Device with keys for typing letters and commands.
- Computer providing resources to other devices.
- Main circuit board connecting all computer components.
- Central chip executing computer instructions
- Device requesting services from a server.
13 Clues: Device requesting services from a server. • Central chip executing computer instructions • Computer providing resources to other devices. • Device directing data traffic between networks. • Slot on a motherboard for inserting a processor. • Metal frame housing a computer's internal parts. • Device with keys for typing letters and commands. • ...
Technical Quiz 2025-10-11
Across
- A portable device category requiring BIS certification
- Electronic device that amplifies signals
- Device that can switch electronic signals, key in circuits
- BIS compulsory regulation that covers over 100 categories of electronic goods
- The official mark on certified electronic products
- Component allowing current flow in one direction
Down
- Electrical component used to store charge
- Electrical resistance unit named after a physicist
- Optic Optical communication technology used in networks
- Certification process mandatory before importing electronics in India
- National organization responsible for standards in India
- Popular device requiring testing under BIS before sale in India
- Measurement instrument for current
13 Clues: Measurement instrument for current • Electronic device that amplifies signals • Electrical component used to store charge • Component allowing current flow in one direction • Electrical resistance unit named after a physicist • The official mark on certified electronic products • A portable device category requiring BIS certification • ...
Y 2026-03-07
Across
- The process of genes being turned on or off
- The ability of machines to make smart predictions
- The process of finding new scientific knowledge
- The study of all the proteins in a cell or organism
- Using computers to study biological data
Down
- Complex biological networks working together
- Creating computer-based representations of real systems
- Extremely powerful computers used for advanced research
- A process where computers improve from data
- The study of an organism’s complete DNA
- The molecule that carries genetic instructions
- The way a protein bends into its working shape
- Virtual models used to test biological processes
13 Clues: The study of an organism’s complete DNA • Using computers to study biological data • The process of genes being turned on or off • A process where computers improve from data • Complex biological networks working together • The molecule that carries genetic instructions • The way a protein bends into its working shape • The process of finding new scientific knowledge • ...
Andres muniz 2016-12-01
Across
- a person that gains access to your computer
- the history of the book printing
- ENGINE identifies idea’s in a data base
- a web page that allows edits
- OPERATORS and, or, and not
- Reference
- USE have permission to use as yours
- the accepted way to communicating on the internet
- RESOURCE LOCATOR (URL) location or address that tells you where documents are
- copying people
- global communication network connect to exchange information
- operate with a network
- TABS bookmark
Down
- copying people without permission
- taking someone else’s work
- unauthorized use
- a link that takes to a web site
- NETWORKS social interaction
- (HOST) names of individuation
- private network
- a newspaper to the internet
- navigate the world wide web
- to start over
- an agent that mostly consists of a nucleic acid
24 Clues: Reference • to start over • copying people • TABS bookmark • private network • unauthorized use • operate with a network • taking someone else’s work • OPERATORS and, or, and not • a newspaper to the internet • navigate the world wide web • a web page that allows edits • NETWORKS social interaction • (HOST) names of individuation • a link that takes to a web site • ...
computer crossword 2017-06-21
Across
- program that runs against a Web server
- resources
- device for storing and processing data .
- pulverize, or force inwards by compressing forcefully.
- representation on a screen of a program, option, or window,
- working surface of a desk
- the Alt, Control and Delete keys simultaneously
- of Internet servers that support specially formatted documents.
- or program that enables
- (a document) in a cabinet, box, or folder in a particular order
- way to organize computer files
Down
- a window in form or function, in particular.
- mail, or unsolicited commercial email
- high-capacity, self-contained storage device
- software program inserting its own code
- or device used for observing.
- network of networks infrastructure
- wear-case, monitor, keyboard, and mouse.
- data from a remote system
- kind devise to help a computer
- be used with any computer that has a USB port.
21 Clues: resources • or program that enables • working surface of a desk • data from a remote system • or device used for observing. • kind devise to help a computer • way to organize computer files • network of networks infrastructure • mail, or unsolicited commercial email • program that runs against a Web server • software program inserting its own code • ...
CS Principles 2022 2022-04-27
Across
- Error checking mechanism built into internet packages
- Encoding data
- Allows for scalability of the internet
- Data about data
- Decoding data
- A type of compression in which no data is lost
- A public copywrite license
- Contain packets
- The use of digital data to approximate real world data
Down
- When a system can still function after parts of it have failed
- Anything that uses software
- Finding a path from sender to receiver
- Measured in bits per second
- Set of rules dictating how a system functions
- An approximate solution to an undecidable problem
- How many resourses an algorithm uses
- The inclusion of extra components meant to reduce the likelihood of failure
- A type of compression in which data is lost
- A wireless access point that give unauthorized access to secure networks
- Contain chunks of data
20 Clues: Encoding data • Decoding data • Data about data • Contain packets • Contain chunks of data • A public copywrite license • Anything that uses software • Measured in bits per second • How many resourses an algorithm uses • Finding a path from sender to receiver • Allows for scalability of the internet • A type of compression in which data is lost • ...
Unit3 2019-04-07
Across
- who can not stop drinking
- of or for the mode
- cause to be notstraight or exact
- being dependent on sth
- suddenly
- breaking something into small pieces
- action of making a situation, quality or feather appear greater
- ability to develop
- the opposite
- see,notice orrealize something
- an occasion
Down
- a place or an occasion for taking about a problem
- the state of developing
- pleasure
- made to look,like the real thing
- neither small nor large but between the two
- low in spirits
- skim the internet aimlessly
- cause sb to feel distant from or not welcome to sb else
- data blanks and networks in computer technology considered as a space
- a word in witch sb can do anything or go anywhere
- help to develop
- means or right of using
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • of or for the mode • ability to develop • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • cause to be notstraight or exact • made to look,like the real thing • ...
Unit3 2019-04-07
Across
- made to look,like the real thing
- who can not stop drinking
- cause sb to feel distant from or not welcome to sb else
- the opposite
- data blanks and networks in computer technology considered as a space
- suddenly
- of or for the mode
- breaking something into small pieces
- neither small nor large but between the two
- a word in witch sb can do anything or go anywhere
- help to develop
Down
- an occasion
- action of making a situation, quality or feather appear greater
- ability to develop
- the state of developing
- means or right of using
- low in spirits
- pleasure
- see,notice orrealize something
- being dependent on sth
- cause to be notstraight or exact
- skim the internet aimlessly
- a place or an occasion for taking about a problem
23 Clues: pleasure • suddenly • an occasion • the opposite • low in spirits • help to develop • ability to develop • of or for the mode • being dependent on sth • the state of developing • means or right of using • who can not stop drinking • skim the internet aimlessly • see,notice orrealize something • made to look,like the real thing • cause to be notstraight or exact • ...
computer networking 2024-08-20
Across
- unique numerical identifier for every device
- traditional technology for connecting devices
- agreed set of rules between devices
- wireless networking technology
- delay that happens between when a user takes an action on a network
- a small segment of a larger message
- capacity at which a network can transmit data
- hardware identifier that uniquely identifies each device on a network
Down
- forwards power to other devices
- network that provides the interface
- virtual private network
- protocol that automatically provides an Internet
- network inside a network
- suite of communication protocols
- modulator demodulator
- network security device
- service that enables private IP networks to use the internet and cloud
- key building blocks for any network
- naming database in which internet domain names are located and translated into Internet Protocol
- service set identifier
20 Clues: modulator demodulator • service set identifier • virtual private network • network security device • network inside a network • wireless networking technology • forwards power to other devices • suite of communication protocols • network that provides the interface • agreed set of rules between devices • a small segment of a larger message • key building blocks for any network • ...
Jargon Crossword 2025-12-11
Across
- EU directive for cybersecurity
- fieldbus communication standard
- Key metric for manufacturing productivity
- network device used to connect multiple devices
- system used to monitor and control processes
- IT and OT systems integration
- device connecting different networks or protocols
- Manages and monitors factory floor operations
- serial communication protocol
- industrial network protocol
- Lightweight messaging protocol for IoT devices
Down
- Upgrading existing industrial site
- device detecting changes in physical conditions
- Period when equipment is not operational
- computer used to automate processes
- specialized database for large volumes of data
- New facility built from scratch
- processes data at or near the source
- Automated machine performing repetitive tasks
- Evaluation process for systems or risks
- Driverless vehicle for material transport
- Industrial version of the Internet of Things
- Deviation from expected process behavior
23 Clues: industrial network protocol • IT and OT systems integration • serial communication protocol • EU directive for cybersecurity • fieldbus communication standard • New facility built from scratch • Upgrading existing industrial site • computer used to automate processes • processes data at or near the source • Evaluation process for systems or risks • ...
Computing systems and networks - systems and searching 2025-08-25
Across
- A small device you move to control the pointer
- Another search engine that also gives email
- A person who uses a computer
- A very popular search engine
- The device you use to type letters and numbers
- The biggest network in the world
- The part of a system where information enters
- A machine that gives a paper copy of your work
- A company that makes Windows
Down
- A person that is also part of a system
- The brain of the computer that processes information
- The machine we use to compute and work
- The word you type to find things online
- A group of parts working together
- Another search engine starting with “B”
- The part of a system that shows the result
- The flat part where you watch videos or games
- A group of computers connected together
- The part of a computer that shows pictures and text
- The middle step in a system, between input and output
20 Clues: A person who uses a computer • A very popular search engine • A company that makes Windows • The biggest network in the world • A group of parts working together • A person that is also part of a system • The machine we use to compute and work • The word you type to find things online • Another search engine starting with “B” • A group of computers connected together • ...
2025 Cybersecurity Awareness Month 2025-09-08
Across
- Fake system set up to lure hackers.
- Unauthorized access to data or systems
- Fake emails or messages to steal information
- Malware that locks files and demands payment.
- Code used to take advantage of a vulnerability.
- Hacker intercepts communication between two parties.
- Securing data by converting it into unreadable code.
- Encrypts internet traffic for secure browsing
Down
- Authentication Verifying identity using two methods.
- EU law protecting personal data privacy.
- Security barrier between trusted and untrusted networks.
- Process of verifying a user’s identity.
- Username and password for authentication.
- Malicious code that spreads through files or programs
- Software that protects against malicious programs.
- Malware disguised as legitimate software.
- Isolated environment for testing suspicious files
- Security rules for handling credit card data.
18 Clues: Fake system set up to lure hackers. • Unauthorized access to data or systems • Process of verifying a user’s identity. • EU law protecting personal data privacy. • Username and password for authentication. • Malware disguised as legitimate software. • Fake emails or messages to steal information • Malware that locks files and demands payment. • ...
Entertainment Marketing 2014-01-27
Across
- Most popular snack in a movie theatre
- Selling additional related products tied to one name
- Process of developing, promoting, and distributing products
- Biggest sports event on TV
- Retail business with a physical location or store site
- A short-term popular trend
- Business situation where few firms affect but do not control an industry
- costs and income equal to the income revenue
Down
- Focuses on service rather than profit
- time free from work
- Rankings of TV programs
- Marketing that focuses on a small market of consumers
- Methods used for communicating and transmitting messages
- Independent broadcaster that contracts with larger national networks
14 Clues: time free from work • Rankings of TV programs • Biggest sports event on TV • A short-term popular trend • Focuses on service rather than profit • Most popular snack in a movie theatre • costs and income equal to the income revenue • Selling additional related products tied to one name • Marketing that focuses on a small market of consumers • ...
Quick_Crossword 2023-03-14
Across
- The top layer
- Protocol used to send data unreliably
- transfers packets between two or more networks
- Used to check connectivity between two devices
- European data protection legislation
- Layer 2 device on a network
Down
- Tool used to scan network hosts for open ports
- Name of the data unit at the data link layer
- Conceptual model used to help us understand networking
- Allows devices to connect wirelessly
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- Area of weakness
- Prevents legitimate access to a resource
- The physical address that network devices have
14 Clues: The top layer • Area of weakness • Layer 2 device on a network • Allows devices to connect wirelessly • European data protection legislation • Protocol used to send data unreliably • Prevents legitimate access to a resource • Name of the data unit at the data link layer • Tool used to scan network hosts for open ports • transfers packets between two or more networks • ...
Desires and Likes 2021-10-16
Across
- / is a team sport played between two teams of eleven players each and some referees who make sure that the rules are followed correctly.
- / is a decentralized set of interconnected communications networks, which use the TCP / IP family of protocols, which guarantees that the heterogeneous physical networks that compose it constitute a single logical network of global reach.
- /is a building built and intended to be inhabited.
- / is a group of people formed by united individuals, and primarily linked by filiation or partner relationships.
- / It is a place where various aesthetic services are offered, mainly haircuts.
Down
- / is a portable device that can make or receive calls through a radio frequency carrier, while the user is moving within a telephone service area.
- / refer to those practices and traditions whose objective is to subdue or defend oneself through a specific technique.
- / is a two-wheeled vehicle, 1 powered by a gasoline internal combustion engine that powers the rear wheel.
- / refers, in ancient times, to the aromatic substance that gave off a fragrant smoke when burned.
- / is a series of still images which, when projected onto a screen consecutively in rapid succession, create the optical illusion of moving images.
10 Clues: /is a building built and intended to be inhabited. • / It is a place where various aesthetic services are offered, mainly haircuts. • / refers, in ancient times, to the aromatic substance that gave off a fragrant smoke when burned. • / is a two-wheeled vehicle, 1 powered by a gasoline internal combustion engine that powers the rear wheel. • ...
May 2021 Newsletter Crossword Puzzle 2021-05-07
Across
- The name of the Wi-Fi network that is being set up.
- An individual, groups, or states who maliciously intend to take advantage of vulnerabilities to gain unauthorized access to information systems in order to access networks, systems, devices, and data.
- Security professionals who act as adversary hackers to successful attack system security, gain unauthorized access to assets, and evaluate system security.
- An attacker inserts themselves secretly between you and another person on the internet to eavesdrop and capture sensitive information like passwords.
Down
- Network hardware that allows communication between your local home network such as personal computers and other connected devices like Alexa, an Internet of Things device.
- A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data.
- Defensive security professionals responsible for maintaining internal network defenses against each threat and cyberattack.
- The speed at which data is transmitted and received among the devices on your wireless network.
- Wired computer networking technologies used in local area networks to connect computers and other network devices to share files, information, and data.
- A wireless networking technology that allows devices such as computers, mobile devices, and other equipment to interface with the internet.
10 Clues: The name of the Wi-Fi network that is being set up. • The speed at which data is transmitted and received among the devices on your wireless network. • A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data. • ...
It words 2024-12-17
Across
- The description or measurement of the overall performance of a service, such as telephony or computer networking, particularly the performance seen by the users of the network
- An intermediary server separating end users from the websites they browse, providing varying levels of functionality, security, and privacy.
- The maximum rate of data transfer across a given path, measured in bits per second (bps).
- A protocol that allows IPv4 hosts on the same local link to perform name resolution for other hosts without the need for a DNS server.
- A device that distributes network or application traffic across multiple servers to ensure no single server becomes overwhelmed
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
- The practice of dividing a network into two or more smaller networks, improving performance and security.
- A routing protocol for Internet Protocol (IP) networks that uses a link state routing algorithm and falls into the group of interior gateway protoco
- The creation of a virtual version of something, such as a server, a storage device, or network resources.
- The delay before a transfer of data begins following an instruction for its transfer.
10 Clues: The delay before a transfer of data begins following an instruction for its transfer. • The maximum rate of data transfer across a given path, measured in bits per second (bps). • The practice of dividing a network into two or more smaller networks, improving performance and security. • ...
Biological approach to understanding behaviour 2023-03-06
Across
- a longitudinal family study,to study the potential genetic nature of Major Depressive Disorder
- study of the role of acetylcholine in the encoding of spatial memory
- study of flashbulb memory, the role of emotion in the creation of memory
- case study of the role of the hippocampus on memory formation
- study of the role of stress hormones on memory,determine the effect of glucocorticoids(stress hormones)on memory
- study on the role that gene mutation and epigenetics may play in major depressive disorder
Down
- to determine the potential role of biological factors on flashbulb memories
- an experiment to see the effect of AND and EST on heterosexual and homosexual men and women
- the effects of stress on verbal declarative memory, investigate whether high levels of the stress hormone cortisol interfere with verbal declarative memory
- study of neuroplasticity that demonstrates how a repeated action can lead to the growth of neural networks - and then the cessation of that activity can lead to neural pruning, study of neuroplasticity that demonstrates how a repeated action can lead to the growth of neural networks - and then the cessation of that activity can lead to neural pruning
- study to demonstrate how cognitive processes may lead to neuroplasticity in the hippocampus. (London Taxi Drivers)
11 Clues: case study of the role of the hippocampus on memory formation • study of the role of acetylcholine in the encoding of spatial memory • study of flashbulb memory, the role of emotion in the creation of memory • to determine the potential role of biological factors on flashbulb memories • ...
My crossword 2022-10-04
Across
- a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
- a network that exists over a large-scale geographical area, as compared to other network types, such as a local area network.
- a network security device that monitors and filters incoming and outgoing network traffic based on security policies
- network component that is physically connected to a central node such as a router, hub or switch.
Down
- a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes.
- a network device that both modulates and demodulates analog carrier signals for encoding and decoding digital information for processing.
- a computer hardware component that allows a computer to connect to a network. NICs may be used for both wired and wireless connections.
- a high-speed device that receives incoming data packets and redirects them to their destination on a local area network.
- a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings.
- a device that connects two or more packet-switched networks or subnetworks.
- a hardware device or configured node on a local area network (LAN) that allows wireless capable devices and wired networks to connect through a wireless standard
11 Clues: a device that connects two or more packet-switched networks or subnetworks. • network component that is physically connected to a central node such as a router, hub or switch. • a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic. • ...
Jessica Perez 2014-04-04
Across
- – An unauthorized person who secretly gains access to computer files.
- NETWORKS -- online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software
- – software used to view various kinds of Internet resources found on the Web.
- -- A bully who operates online, in cyberspace; To bully online
- - a list of citations that appear at the end of a paper, article, chapter or book.
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
Down
- - A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- or graphics that, when clicked, will connect the user to a new web page or another place on the same page
- – Originally known as Web Log. Blogs are websites that contains dated text e citations that appear at the end of a paper, article, chapter or bookntries,
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
12 Clues: -- A bully who operates online, in cyberspace; To bully online • – An unauthorized person who secretly gains access to computer files. • – software used to view various kinds of Internet resources found on the Web. • - a list of citations that appear at the end of a paper, article, chapter or book. • ...
computer technology words 2022-01-05
Across
- wireless signal used to connect devices to internet
- a mobile computer device with a screen
- information input or stored on a computer
- a set of computers sharing one internet address
- handheld hardware input device
- opening used to plug a charger into a computer
- computer output display device (image or words)
- network hardware to connects networks to internet
- device to charge a battery or computer
Down
- world wide network where information is shared
- personal computer easily moved
- device(phone) not needing to be outlet plugged
- a large computer that sits on a desk
- a panel of typing keys to operate a computer
14 Clues: personal computer easily moved • handheld hardware input device • a large computer that sits on a desk • a mobile computer device with a screen • device to charge a battery or computer • information input or stored on a computer • a panel of typing keys to operate a computer • world wide network where information is shared • device(phone) not needing to be outlet plugged • ...
your heart 2021-11-01
Across
- blood vessels that carry blood away from the heart
- a straw colored liquid
- what arterioles branch off into
- blood vessels that carry blood back to the heart
- what arteries branch off into
- the flow of blood between the heart and everything but the lungs
- upper chamber of the heart
- these transport oxygen to other cells of the body
Down
- these carry blood from capillary networks to veins
- slippery membrane that covers the heart
- the transport of blood back and forth between the heart and lungs
- study of the heart
- lower chamber of the heart
- cell pieces that form clots
14 Clues: study of the heart • a straw colored liquid • lower chamber of the heart • upper chamber of the heart • cell pieces that form clots • what arteries branch off into • what arterioles branch off into • slippery membrane that covers the heart • blood vessels that carry blood back to the heart • these transport oxygen to other cells of the body • ...
Technology Vocabulary 2021-08-02
Across
- /the exclusive right to sell a work
- page /the opening page of a web site
- /a set of characters comprising a unit of information
- in /enter a computer
- /an organized body of related information
- /any small compartment
Down
- /a unit of measurement of information
- out /exit a computer
- /a worldwide network of computer networks
- /of or pertaining to a number system having 2 as its base
- /a computer providing shared resources to a computer network
- /transfer out of a database or document
- /a set of related records kept together
- /locate and correct errors in a computer program code
- /restore something reduced in volume to its full volume
15 Clues: out /exit a computer • in /enter a computer • /any small compartment • /the exclusive right to sell a work • page /the opening page of a web site • /a unit of measurement of information • /transfer out of a database or document • /a set of related records kept together • /a worldwide network of computer networks • /an organized body of related information • ...
Career Options 2022-11-11
Across
- A person trained to give guidance on personal, social, or psychological problems.
- Joins two pieces of metal together.
- Types include voice, screen, stage or character.
- People in these jobs work to protect our communities.
- Protects computer systems, networks and data.
- Transports goods all over the country.
- Repairs and maintains machinery, motors, etc.
Down
- A scientist who studies fossils.
- Health of the human body.
- Jobs in this field include coaches, announcers and recruiters.
- Performs beauty treatment regimens on hair, skin and nails.
- Invent, design and maintain machines, structures and data systems.
- Defends the U.S.and its allies.
- Set up situations in which students can learn effectively.
14 Clues: Health of the human body. • Defends the U.S.and its allies. • A scientist who studies fossils. • Joins two pieces of metal together. • Transports goods all over the country. • Protects computer systems, networks and data. • Repairs and maintains machinery, motors, etc. • Types include voice, screen, stage or character. • ...
Computer Science Crossword 2024-03-21
Across
- The main page of a website.
- A security system that controls incoming and outgoing network traffic.
- A small file saved by websites to remember user information.
- Wireless internet connection.
- A step-by-step procedure for calculations.
- A program used to navigate the internet.
- A list of commands executed by a program or scripting engine.
Down
- A scam to steal personal information via email.
- Information processed or stored by a computer.
- Finding and fixing errors in code.
- Protection for computer systems and networks.
- A way of representing data using only two digits, 0 and 1.
- The ability to read and write.
- The address of a web page.
14 Clues: The address of a web page. • The main page of a website. • Wireless internet connection. • The ability to read and write. • Finding and fixing errors in code. • A program used to navigate the internet. • A step-by-step procedure for calculations. • Protection for computer systems and networks. • Information processed or stored by a computer. • ...
Oklahoma Computer Science 2025-05-13
Across
- A tool to organize, calculate, and analyze data
- A unique number for each device on a network
- Programs and apps that run on a computer
- A list of steps to solve a problem
- A group of connected computers that share information
- Information that can be collected and used
- Finding and fixing errors in code
Down
- Protecting devices and data from digital threats
- A device that sends data between computers and networks
- Code that repeats instructions
- A value in a program that can change
- Technology doing tasks without human help
- Showing only specific data based on rules
- The physical parts of a computer
14 Clues: Code that repeats instructions • The physical parts of a computer • Finding and fixing errors in code • A list of steps to solve a problem • A value in a program that can change • Programs and apps that run on a computer • Technology doing tasks without human help • Showing only specific data based on rules • Information that can be collected and used • ...
Tech 2025-09-05
Across
- "A popular programming language for web development."
- "A program that helps users browse the internet.",
- "A global system of interconnected computer networks.",
- "The physical parts of a computer.",
- "A place where apps are downloaded on Android devices.",
- "A popular social media platform owned by Meta.",
Down
- "The brain of the computer.",
- "A type of malicious software often called a 'worm' or 'Trojan.'",
- "A technology that allows voice interaction with computers, e.g., Alexa.",
- "A company that makes iPhones.",
- "A portable computer.",
- "A wireless technology standard for exchanging data over short distances.",
- "A device that stores digital data.",
- "The system software that manages hardware and software.",
14 Clues: "A portable computer.", • "The brain of the computer.", • "A company that makes iPhones.", • "The physical parts of a computer.", • "A device that stores digital data.", • "A popular social media platform owned by Meta.", • "A program that helps users browse the internet.", • "A popular programming language for web development." • ...
IEEE CS Git Informed 2025-10-27
Across
- Computation type where multiple processes run simultaneously.
- Iterative and incremental approach to development.
- Pioneer recognized as the father of computer science.
- A fundamental unit of work in a database system.
- Integrated circuit that contains the core of a computer.
- Fundamental structure of a computer system's components.
Down
- Step-by-step procedure for solving a problem.
- Formal documents defining hardware and protocol rules.
- Prefix describing the security field protecting networks.
- The primary focus area of the Computer Society.
- Chip designed for a specific application only.
- Computing resources delivered over the internet.
- The academic field central to the IEEECS mission.
- Peer-reviewed academic publication of the society.
14 Clues: Step-by-step procedure for solving a problem. • Chip designed for a specific application only. • The primary focus area of the Computer Society. • A fundamental unit of work in a database system. • Computing resources delivered over the internet. • The academic field central to the IEEECS mission. • Iterative and incremental approach to development. • ...
Information Technology Literacy I 2026-02-12
Across
- Ability to use technology effectively and safely.
- Device that shares internet to many devices (WiFi).
- Programs used to do tasks (Word, Excel).
- Global network connecting millions of networks.
- Physical parts of a computer (keyboard, monitor).
- A common online trick to steal information (email/link)
Down
- A network in a small area like a lab or home.
- Meaningful data after processing.
- Short form for Information Technology.
- Rules/steps to use a system (e.g., login steps).
- Raw facts (numbers, text) before processing.
- A person who uses a computer system.
- Device that connects your home to the ISP.
- A device in LAN used to connect many computers.
14 Clues: Meaningful data after processing. • A person who uses a computer system. • Short form for Information Technology. • Programs used to do tasks (Word, Excel). • Device that connects your home to the ISP. • Raw facts (numbers, text) before processing. • A network in a small area like a lab or home. • Global network connecting millions of networks. • ...
computing terms 2016-03-14
Across
- a common computer software whose name also describes a component found on a house
- other name for a video card
- the most used search engine in the world
- a computer code represented by 1s and 0s
Down
- main circuit board in a computer
- processes and plays sound
- software to help protect your computer
- device where the computer stores long term data
- device that links computer networks
9 Clues: processes and plays sound • other name for a video card • main circuit board in a computer • device that links computer networks • software to help protect your computer • the most used search engine in the world • a computer code represented by 1s and 0s • device where the computer stores long term data • ...
Connect Crossword 2025-01-28
Across
- A collection of devices in one physical location
- A system of representing data in 1s and 0s
- System software that manages computer hardware and software resources
- Random Access....
Down
- A process or set of rules to be followed in calculations
- First letter in CPU
- A device that connects two or more networks or subnetworks
- an input device used to enter characters and functions
- Waste Electrical and ***** Equipment
9 Clues: Random Access.... • First letter in CPU • Waste Electrical and ***** Equipment • A system of representing data in 1s and 0s • A collection of devices in one physical location • an input device used to enter characters and functions • A process or set of rules to be followed in calculations • A device that connects two or more networks or subnetworks • ...
technology vocabulary 2021-08-13
Across
- put into format that can be read or processed by computers
- set up for a particular purpose
- a unit of measurement of information
- crime commited using a computer and the internet
- transfer a file or program to a smaller computer
- space a world wide network of of computer networks
- any small compartment
- an organized body of related information
Down
- a program thatgives a computer instrucctions
- a listing of the computer files stored in memory
- the exclusive right to sell a work
- locate and correct errors in a computer program code
- transfer a file or program to a smaller computer
- restore something reduced in volume to it's full volume
- a data transmmision rate for modems
15 Clues: any small compartment • set up for a particular purpose • the exclusive right to sell a work • a data transmmision rate for modems • a unit of measurement of information • an organized body of related information • a program thatgives a computer instrucctions • a listing of the computer files stored in memory • crime commited using a computer and the internet • ...
NoSQL Databases 2021-08-27
Across
- This is the database in Cassandra
- Most popular wide column store NoSQL database
- NoSQL databases is used mainly for handling large volumes of ______________ data
- MongoDB documents are stored inside____
- one of the popular key-value database
Down
- one of the properties of CAP theorem
- ________ stores are used to store information about networks such as social connection
- one of the categories of NoSQL database
- Protocol name in Cassandra
- One of the V in big data
- MongoDB stores data in terms of__________
- one of the component in Cassandra database
- The query language of cassandra
- _____ is a widely used document based NoSQL data model
14 Clues: One of the V in big data • Protocol name in Cassandra • The query language of cassandra • This is the database in Cassandra • one of the properties of CAP theorem • one of the popular key-value database • one of the categories of NoSQL database • MongoDB documents are stored inside____ • MongoDB stores data in terms of__________ • one of the component in Cassandra database • ...
Effects of ICT 2013-03-19
Across
- in modern office, .... is less used
- This is cause due to the rapid development of technology connectivity
- People can share data and hold meetings online
- Negative out view of the future
- Amazon, Ebay,...
- Positive out view of the future
- Allow people to send and receive message
- This is caused due to the advance development of technology which could replace human
- People can still work at home
Down
- It's a work for woman to just sit and type the whole day
- typists, filers,...
- Don't meet people face to face
- Youtube, gaming, social networks...
- Vast quantities of data can be stored in small amounts of space
14 Clues: Amazon, Ebay,... • typists, filers,... • People can still work at home • Don't meet people face to face • Negative out view of the future • Positive out view of the future • in modern office, .... is less used • Youtube, gaming, social networks... • Allow people to send and receive message • People can share data and hold meetings online • ...
DEET Halloween Challenge 2023-10-30
Across
- QW4gb3BlbiBkb29yd2F5IHRoYXQgY291bGQgbGV0IG1vbnN0ZXJzIGluLg==
- See Image 3
- A spell to mend and keep away vulnerabilities.
- A plan for when full moons cause unexpected issues.
- A hostage-taking horror active until a bounty is paid.
- An event requiring action from the cyberteam.
- 80 114 111 118 105 110 103 32 111 110 101 226 128 153 115 32 105 100 101 110 116 105 116 121
Down
- The ability to bounce back from a vampire's bite.
- A software ghost that haunts computers and networks.
- See Image 1
- See Image 2
- Following the rules to keep the cauldron from boiling over.
- An event that could lead to a horror story.
- IEQGG2DFMNVS25LQEB2G6IDFNZZXK4TFEBXG6IDTNNSWYZLUN5XHGIDBOJSSA2DJMRUW4ZZO
14 Clues: See Image 1 • See Image 3 • See Image 2 • An event that could lead to a horror story. • An event requiring action from the cyberteam. • A spell to mend and keep away vulnerabilities. • The ability to bounce back from a vampire's bite. • A plan for when full moons cause unexpected issues. • A software ghost that haunts computers and networks. • ...
Twentieth and Twenty-First Century 2023-05-01
Across
- education beyond high school
- the science of travel through air
- words,sounds,or picures sent by cable,telegraph,telephone,radio,or television.
- helped African Americans throughout Texas
- filled or overcrowded
- a short,easy to remember phrase used in advertising
- dedicated his life to the civil rights movement
- a gas used in light bulbs
Down
- the first woman to become a supreme court judge
- Greg Abbott was born here
- one of six international awards given for outstanding work
- a worldwide system of computer networks
- a newspaper article that gives an opinion on a topic
- became president and lawyer for MALDEF
14 Clues: filled or overcrowded • Greg Abbott was born here • a gas used in light bulbs • education beyond high school • the science of travel through air • became president and lawyer for MALDEF • a worldwide system of computer networks • helped African Americans throughout Texas • the first woman to become a supreme court judge • dedicated his life to the civil rights movement • ...
Network Components and Topologies 2025-03-16
Across
- Converts digital signals for transmission
- A topology where all devices connect to a central hub
- Provides wireless access to a network
- Connects multiple computers but does not filter data
- Stores and manages network resources
- A topology where data travels in a circular path
- Cable Used to connect devices for data transmission
Down
- Directs data between different networks
- Prevents signal reflection in a bus network
- Directs data to specific devices in a network
- A topology where all devices share a single communication line
- Connects two different network segments
- A topology where every device connects to multiple others
- Allows a computer to connect to a network
14 Clues: Stores and manages network resources • Provides wireless access to a network • Directs data between different networks • Connects two different network segments • Converts digital signals for transmission • Allows a computer to connect to a network • Prevents signal reflection in a bus network • Directs data to specific devices in a network • ...
Digital Information Technology Ch. 15 Communication Networks 2025-09-15
Across
- (WEP) Early security algorithm for wireless networks designed to protect data.
- Number of bits per second that can be sent from one device to another.
- Consists of a permanent connection between two nodes.
- Network topology in which each node on the network is connected to a single main transmission cable.
- (MAN) Consists of a group of computers that in the same city or small geographical area but not necessarily in the same room or building.
- (virtual private network); Uses the Internet as an extension of a LAN or other smaller network.
- Network topology in which each node in the network carries a signal to all other nodes until the message is received at its destination.
- Software process that encodes the file to make it unreadable unless the correct key is entered.
- Continuous signal that can vary over an infinite range.
- Alphanumeric code that must be entered to allow access to something.
- Noncomputer device that attaches to a network and is given a network address.
- Network topology in which a main node connects individually to all other nodes and the other nodes do not connect to each other.
- Topology in which devices are added to the network at the end of the line, like the links in a chain.
- Process of taking measurements along the analog signal to convert it into a digital signal.
- Application or process specific software communication endpoint in a computer's operating system.
- Wireless network connection in which a computer connects to the wireless signals transmitted by a router, which is wired to a modem.
- Data transmission technology that creates a wired connection between computers and modems or routers.
- Network topology used to connect smaller star topology networks via a bus topology.
- (LAN) Consists of a group of computers and devices that are locally assembled in a limited area.
- (WPA) Security and encryption standard for wireless data transmission.
- (Wide area network); Consists of a group of computers within a large geographical area.
- Radio wave-based wireless connection technology that provides communication between devices within a short range of each other, generally up to about 30 feet.
Down
- Signal composed of discrete or segmented chunks of data.
- Arrangement of the components of the network.
- Piece of hardware or software that requests or accesses a service from a server.
- (P2P) Network topology in which all devices act like both servers and clients.
- Hardware device that provides an interface between the computer and the network; also called a network interface card (NIC).
- Common connection point for devices in a network; simplest type of network connection.
- Network transmission device that checks and forwards packets between parts of the network.
- Process of verifying a user's identification.
- Open Systems Interconnection conceptual model that separates the functions of networking into layers that keep the same functions together for
- (GAN) Network that spans multiple countries.
- Network topology in which computers and devices are connected to one another in a circle, or ring.
- Technology that creates a barrier between computers.
- LAN that is accessible to connection by roaming users.
- (IAN)Concept for networks that connect voice and data transmissions within a cloud environment.
- Computer connected to a network.
37 Clues: Computer connected to a network. • (GAN) Network that spans multiple countries. • Arrangement of the components of the network. • Process of verifying a user's identification. • Technology that creates a barrier between computers. • Consists of a permanent connection between two nodes. • LAN that is accessible to connection by roaming users. • ...
internet vocab crossword 2013-03-26
Across
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- To renew or revitalize; To reload a webpage on the internet
- a reference to a published or unpublished source (not always the original source).
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
Down
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- An unauthorized person who secretly gains access to computer files
- a piece of writing that has been copied from someone else and is presented as being your own work
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
12 Clues: To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • a reference to a published or unpublished source (not always the original source). • a piece of writing that has been copied from someone else and is presented as being your own work • ...
Computer Networking 2024-09-16
Across
- Global network of networks
- Provides internet to users on payment
- It is a host computer which controls access to h/w & s/w
- Set of standard rules used for communication
- Address is an unique ID assigned to a Computer
Down
- Contains many web pages
- Group of interconnected computer sytems and devices
- It is the address of the website
- Computer which depends on the server for all resources
9 Clues: Contains many web pages • Global network of networks • It is the address of the website • Provides internet to users on payment • Set of standard rules used for communication • Address is an unique ID assigned to a Computer • Group of interconnected computer sytems and devices • Computer which depends on the server for all resources • ...
WORKING 9 TO 5 2026-02-06
Across
- A person who helps passengers on a plane
- A person who works with money and accounts
- A person who creates computer programs
- A person who manages a companys social networks
- A person who designs clothes
Down
- A person who grows food without chemicals
- A person who studies environmentally friendly ideas
- A person who makes people laugh
- A person who helps students with school or personal problems
9 Clues: A person who designs clothes • A person who makes people laugh • A person who creates computer programs • A person who helps passengers on a plane • A person who grows food without chemicals • A person who works with money and accounts • A person who manages a companys social networks • A person who studies environmentally friendly ideas • ...
Packets, Protocols, and Adresses 2021-05-18
7 Clues: A label for a network device • A large spaced computer network • An agreed format between devices • A limited computer network space • A unique number on a network card • Small amount of data sent over network • Used to make a secure connection over other networks
test1 2024-04-10
Aliyah Caballero 2013-03-27
Across
- An unauthorized person who secretly gains access to computer files.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- a list of citations that appear at the end of a paper, article, chapter or book.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
Down
- To renew or revitalize; To reload a webpage on the internet
- a piece of writing that has been copied from someone else and is presented as being your own work
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results.
- a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network
- (HOST)Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
12 Clues: To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • a list of citations that appear at the end of a paper, article, chapter or book. • OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results. • ...
internet vocab crossword 2013-03-26
Across
- :online communities where people meet, socialize, exchange digital files, etc.
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- (HOST) – Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
- - A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
- – Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- -- A bully who operates online, in cyberspace; To bully online
- – A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- – An unauthorized person who secretly gains access to computer files
12 Clues: -- A bully who operates online, in cyberspace; To bully online • – An unauthorized person who secretly gains access to computer files • :online communities where people meet, socialize, exchange digital files, etc. • – A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com • ...
kiana's internet crossword puzzle 2013-12-02
Across
- software used to view various kinds of Internet resources found on the Web.
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- A system of connected computers that allows the sharing of files and equipment.
Down
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so seen. Clicking the tab shows you different views/websites in the same browser.it can be labeled and
- A bully who operates online, in cyberspace; To bully online
- An unauthorized person who secretly gains access to computer files.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communicatio
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
12 Clues: A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • A system of connected computers that allows the sharing of files and equipment. • ...
Information Management 2025-09-23
Across
- Identifying risks and taking precautions to avoid them.
- Anything valuable that isn’t natural.
- A system that supports functions of Information Management.
- Anything created with someone’s mind.
Down
- The protection of networks, and data.
- A business that involves people, processes that collects data.
- An unbiased inspection to review safety, integrity, and accuracy of information.
- The accuracy of data.
- A practice not knowing outside the company.
9 Clues: The accuracy of data. • The protection of networks, and data. • Anything valuable that isn’t natural. • Anything created with someone’s mind. • A practice not knowing outside the company. • Identifying risks and taking precautions to avoid them. • A system that supports functions of Information Management. • ...
cruciverba sulla cittadinanza digitale 2021-11-28
7 Clues: it is a digital profile • personal data protection • it is a network of networks • it is a form of digital bullying • virtual world extremely similar to reality • it serves to protect your data and account • online lesson which can be either free or paid
SOCIAL MEDIA 2020-12-01
7 Clues: # • a self portrait taken • a photo sharing application • a platform founded by Mark Zuckerberg • a pictorial presentation of facial expression in text writing • an image or username that represent someone on online platform • anything shared across social media networks that get passed along rapidly
Virtual Private Networks (VPN's) 2020-09-29
8 Clues: Safe • Distant, far away • encoding a message • A dedicated passageway • Exists and can be touched • The equipment used in computing • There is a logic gate named this • Underlying Framework of the system
Smartcross 2025-06-04
Across
- It converts digital to analog signal
- In this topology components are connected in a circula manner
- process of changing data into unreadable code
- A computer network restricted to an organisation
- It is the layout in which a network is set
- This network covers 10m of range
- this protect network from unauthorised users
- Combination of net and etiquette
- Conbination of voice and phishing
- copying someone else's work
Down
- Each computer in a network
- process of purchasing licensed software and spreading it to other computers
- It means the criminal activites done using computer and internet
- These are valid till 20 years
- unwanted mails send from unknown senders
- Device that connect two networks
- An illegal intrusion into a computer or network
- Footprints left intentionally by user
18 Clues: Each computer in a network • copying someone else's work • These are valid till 20 years • Device that connect two networks • This network covers 10m of range • Combination of net and etiquette • Conbination of voice and phishing • It converts digital to analog signal • Footprints left intentionally by user • unwanted mails send from unknown senders • ...
Aliyah Caballero 2013-03-26
Across
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
Down
- A bully who operates online, in cyberspace; To bully online.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- usally known as a web site that are used to contain dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
7 Clues: A bully who operates online, in cyberspace; To bully online. • Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page. • NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram) • ...
Computer Science 2025-10-22
Across
- connects devices using radio waves instead of physical cables, allowing for mobility and flexibility.
- a communication method that uses electronic devices to deliver messages across computer networks
Down
- he maximum amount of data that can be transferred over a network connection in a given amount of time, often measured in megabits per second (Mbps)
- protocols act as a common language for devices to communicate effectively by defining how data is formatted, transmitted, and interpreted.
- a computer network that uses physical cables, such as Ethernet or fiber optic, to connect devices like computers and printers to a network and the internet
- a global communication system that links together thousands of individual networks.
- a unique numerical label assigned to each device connected to a computer network, similar to a home address for your data.
7 Clues: a global communication system that links together thousands of individual networks. • a communication method that uses electronic devices to deliver messages across computer networks • connects devices using radio waves instead of physical cables, allowing for mobility and flexibility. • ...
SBMC Unity Day 2026-03-27
Across
- _______________ is our business.
- _______________ is when everyone feels welcome and part of the group.
- We are Unique and we are _______________.
- _______________ is someone who supports and advocates for others.
Down
- Living Legacy: Own Our _______________.
- This is where you opt-in to Affinity Networks.
- Living Legacy: _______________ in eachother.
7 Clues: _______________ is our business. • Living Legacy: Own Our _______________. • We are Unique and we are _______________. • Living Legacy: _______________ in eachother. • This is where you opt-in to Affinity Networks. • _______________ is someone who supports and advocates for others. • _______________ is when everyone feels welcome and part of the group.
Fundamentals of Computing: McKown 2022-10-26
Across
- Series of code that completes a specific task
- First Digital Computer
- Being mean directly or indirectly to an individual or group online
- Father of the computer
- .mp3 file type
- Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
- RAM Memory - Short Term
- Device used to display data to the user from the computer
- Single unit of the binary language
- First computer programmers
- 8 bits
Down
- Where all of the of compentants of a computer connect to or live
- Device used to give the computer data from the user
- The brain of the computer
- Industry that works to secure computers and computer networks as a whole
- Series of commands
- CodeHS Programming Dog
- Computer language
18 Clues: 8 bits • .mp3 file type • Computer language • Series of commands • First Digital Computer • Father of the computer • CodeHS Programming Dog • RAM Memory - Short Term • The brain of the computer • First computer programmers • Single unit of the binary language • Series of code that completes a specific task • Device used to give the computer data from the user • ...
Networking Concepts Crossword 2025-06-14
Across
- topology shaped like a star (4)
- that spans a limited area such as a home or office (3)
- large data into smaller parts for transmission (6)
- that forward data packets between networks (7)
- domain names into IP addresses (3)
- common local area network technology (9)
- that connects multiple devices in a network (6)
- network communication protocol (3)
- unauthorized access to or from a network (8)
- protocol for accessing web pages (4)
Down
- to overwhelm a system with traffic (3)
- address assigned to each device in a network (2,2)
- network standard (5)
- network used within an organization (8)
- used to distinguish computers on a network (9)
- for formatting and processing data (8)
- storage of data to speed up future access (6)
- for sending emails (4)
- that connects different network technologies (6)
- used to connect computers in a wired network (6,4)
20 Clues: network standard (5) • for sending emails (4) • topology shaped like a star (4) • domain names into IP addresses (3) • network communication protocol (3) • protocol for accessing web pages (4) • to overwhelm a system with traffic (3) • for formatting and processing data (8) • network used within an organization (8) • common local area network technology (9) • ...
TECHNOLOGY VOCABULARY 2021-11-02
Across
- A unit of measurement of information
- BAM memory that is set aside as a specialized buffer storage
- A program that gives a computer instructions
- A worldwide network of computer networks
- Locate and correct errors in a computer program code
- Set up for a particular purpose
- the symbolic arrangement of data in a computer program
- An organized body of related information
Down
- Put into a format that can be read or processed by
- Any small compartment
- The exclusive right to sell a work
- crime committed using a computer an the internet
- A data transmission
- Having an output that is proportional to the imput
- Transfer out of a database or document
15 Clues: A data transmission • Any small compartment • Set up for a particular purpose • The exclusive right to sell a work • A unit of measurement of information • Transfer out of a database or document • A worldwide network of computer networks • An organized body of related information • A program that gives a computer instructions • ...
TECHNOLOGY VOCABULARY 2021-11-02
Across
- Locate and correct errors in a computer program code
- An organized body of related information
- Any small compartment
- BAM memory that is set aside as a specialized buffer storage
- A unit of measurement of information
- Put into a format that can be read or processed by
- A program that gives a computer instructions
- Crime commited using a computer an the internet.
Down
- A worldwide network of computer networks
- The symbolic arrangement of data in a computer program
- Having an outpout that is proportional to the input
- Set up for a particular purpose
- the excluisive right to sell a work
- A data transmission rate for modems
- Transfer out of a database or document
15 Clues: Any small compartment • Set up for a particular purpose • the excluisive right to sell a work • A data transmission rate for modems • A unit of measurement of information • Transfer out of a database or document • A worldwide network of computer networks • An organized body of related information • A program that gives a computer instructions • ...
Basic computer knowledge 2023-02-13
Across
- Where are the emails stored?
- A central system that provides information about whether users are online and passed instant messages between them
- Most common method of protection is hard ________
- Type of virus which spy your activity
- The computer file which is sent along with an email
- Opposite of encryption
- What protects your computer networks from outside attacks?
- A friend list or contact list
Down
- Calling at a fixed price
- Abbreviation for internet provider
- Type of virus which shows us advertisement
- Junk mail by other words?
- Guy who wants to steal and potentially sell your personal data
- Small article which says us contect of the email
- Program for access to your mailbox
15 Clues: Opposite of encryption • Calling at a fixed price • Junk mail by other words? • Where are the emails stored? • A friend list or contact list • Abbreviation for internet provider • Program for access to your mailbox • Type of virus which spy your activity • Type of virus which shows us advertisement • Small article which says us contect of the email • ...
network quiz 2023-02-06
Across
- network A wireless network
- Computer networks
- Transmission Control Protocol
- Transmission Transfer data
- Routers bring the Internet to your devices
- serves as the point of connection for all devices on a local area network
- a system of rules that explain the correct conduct and procedures to be followed in formal situations
- Formatted unit of data
- hardware Routers, hubs, switches, and bridges are some examples of network hardware
Down
- Maximum rate of data
- network A wired network
- cable Networking cables are networking hardware used to connect one network device to other network devices
- interconnected computing devices that can exchange data and share resources with each other.
- address An Internet Protocol
- a computer-based application for the exchange of messages between users
- A computer program
16 Clues: Computer networks • A computer program • Maximum rate of data • Formatted unit of data • network A wired network • network A wireless network • Transmission Transfer data • address An Internet Protocol • Transmission Control Protocol • Routers bring the Internet to your devices • a computer-based application for the exchange of messages between users • ...
Computing terms 2023-04-24
Across
- Appearance of writing
- Online business
- Periodic website mail
- A set of interconnected global networks that allows computers and servers to communicate efficiently using a common communication protocol
- All data linked by hypertext links, on the Internet
- Operation which consists of duplicating and securing the data
Down
- Be live | connected to a network or system, including the Internet
- Random access memory
- Circuit board that supports most of the components and connectors needed to run a compatible PC
- Witness, snitch of connexion
- Video output device
- Set of digital data gathered under the same name
- Go back | ctrl + z
- Install the improved version of an application
- Input device for entering text
15 Clues: Online business • Go back | ctrl + z • Video output device • Random access memory • Appearance of writing • Periodic website mail • Witness, snitch of connexion • Input device for entering text • Install the improved version of an application • Set of digital data gathered under the same name • All data linked by hypertext links, on the Internet • ...
Test 2025-09-30
Across
- — Secondary copy to restore data after loss or attack
- — Tool that detects and removes malicious code
- — Encrypted tunnel that protects traffic over untrusted networks
- — Install latest software versions for security/features
- — Filters network traffic by rules to block threats
- — Tricking users into revealing info via fake messages
- — Malicious software (virus, worm, trojan, ransomware)
- — Information that needs protection from loss/theft
Down
- — Scrambles data so only authorized parties can read it
- — Common attack vector for scams and payloads
- — Any endpoint (laptop/phone) connecting to a network
- — Unsolicited/bulk messages often carrying scams
- — Software fix that closes security holes
- — Secret used to verify identity; should be strong/unique
- — Person who exploits systems (ethical or malicious)
15 Clues: — Software fix that closes security holes • — Common attack vector for scams and payloads • — Tool that detects and removes malicious code • — Unsolicited/bulk messages often carrying scams • — Filters network traffic by rules to block threats • — Information that needs protection from loss/theft • — Person who exploits systems (ethical or malicious) • ...
Digital Life 2026-01-01
Across
- A secret word to access an account
- A message alert from an app or device
- A program for a smartphone or tablet
- A digital message sent online
- The name you use to log in
- Moving pictures with sound
Down
- Personal information on a social network
- To talk online with someone in real time
- Relating to networks of people online
- To send a file from your device to the internet
- To watch or listen to media online without saving
- A network connecting computers worldwide
- To take a file from the internet to your device
- Online storage for files and data
- The state of keeping your information safe
15 Clues: The name you use to log in • Moving pictures with sound • A digital message sent online • Online storage for files and data • A secret word to access an account • A program for a smartphone or tablet • Relating to networks of people online • A message alert from an app or device • Personal information on a social network • To talk online with someone in real time • ...
IT Article Crossword 2026-02-05
Across
- The total usable life of battery before replacement
- Computer technology that can learn from data and solve problems
- Technology used to remove heat from equipment
- Hiring other companies to do their workload
- in the same technological field
- something important that marks progress or key stage
- Stores electricity
Down
- Stops hiring new employees
- Facility that houses computer systems
- The amount of data processing a system can perform
- Letting people go due to costs
- Device to charge battery
- A dedicated chip for accelerating AI tasks like neural networks, image recognition, and machine learning it is faster and more power-efficient than CPU/GPU for AI workloads
- Protection of digital information
- New ideas or products
15 Clues: Stores electricity • New ideas or products • Device to charge battery • Stops hiring new employees • Letting people go due to costs • in the same technological field • Protection of digital information • Facility that houses computer systems • Hiring other companies to do their workload • Technology used to remove heat from equipment • ...
Artificial Intelligence and its foundations. 2025-04-21
Across
- Way of structuring information for reasoning
- Test to check if a machine can mimic human intelligence
- Early AI focused on rules and logic
- solving Core goal of AI involving decision-making steps
- Field where systems learn from data
- System that perceives and acts in an environment
- Ability to draw conclusions from facts or rules
Down
- Ability to interpret sensory input like vision or sound
- Field that enables machines to understand human language
- Enabling machines to interpret visual data
- Science of making machines behave intelligently
- System modeled after human brain structure
- Method to explore possible solutions
- Subset of ML using neural networks with many layers
- Acquiring knowledge through experience or data
15 Clues: Early AI focused on rules and logic • Field where systems learn from data • Method to explore possible solutions • Enabling machines to interpret visual data • System modeled after human brain structure • Way of structuring information for reasoning • Acquiring knowledge through experience or data • Science of making machines behave intelligently • ...
U.S. Navy Electronic Warfare Aircraft 2025-04-16
Across
- Equipment that disrupts enemy radar and communications
- Range of frequencies used in electronic warfare
- External container holding electronic warfare gear
- Nickname for SEAD aircraft suppressing enemy air defenses
- Technique employing misleading electronic signals
- EA-18G electronic warfare variant of Super Hornet
Down
- EA-6B, predecessor to the Growler for electronic attack
- Electronic Countermeasures to jam or spoof enemy systems
- Anti-radiation missile targeting radar installations
- Emitting signals to confuse enemy tracking systems
- Missions suppressing enemy radar and air defense networks
- EF-111A electronic warfare jet historically assisting Navy
- Targeted electronic detection system for EW aircraft
- Signals Intelligence, key electronic warfare mission
- Electronic Intelligence gathering and analysis capability
15 Clues: Range of frequencies used in electronic warfare • Technique employing misleading electronic signals • EA-18G electronic warfare variant of Super Hornet • Emitting signals to confuse enemy tracking systems • External container holding electronic warfare gear • Anti-radiation missile targeting radar installations • Targeted electronic detection system for EW aircraft • ...
7.2. Keywords 2025-01-13
6 Clues: A set of rules • Electronic mail • A network connected by wires • A network not connected by wires • A thing that has computer networks on it • Electronic item used for searching things
uGSOT #2 2025-09-11
6 Clues: Programs running on computers • Device that connects networks • Portable digital music player • Logical set of instructions for calculation • Popular programming language with snake name • Software designed to disrupt or damage systems
Activity 2015-09-28
Across
- in HTML what tag comes after the header
- less content on a webpage improves ______
- the <img src=""> inserts what type of multimedia
- .com and .org are examples of a
- reading on a screen is easier than reading on paper: true or false
- composed of HTML code or tags
- a URL has how many parts
Down
- and, or, + not are examples of
- uses keywords to search for content
- all UTK users must ____
- code or tags browsers use for web pages
- short for wide area networks
- in reguard to copyright, how many photos from one artist can be used
- what is the domain designated for education
14 Clues: all UTK users must ____ • a URL has how many parts • short for wide area networks • composed of HTML code or tags • and, or, + not are examples of • .com and .org are examples of a • uses keywords to search for content • in HTML what tag comes after the header • code or tags browsers use for web pages • less content on a webpage improves ______ • ...
Information Technology Grade 8 2021-02-23
Across
- Only transmit in one direction
- Has an outer plastic covering containing 2 parallel conductors each having a separate insulated protection cover.
- This is any type of hardware capable of transmitting data instruction and information between a sending device and a receiving device.
- Connected through signal
- It consists of 2 separately insulated conductor wires wound about each other
- Exist in two states 1 and 0.
- Accepts the transmission of data
- Frequency Range:1GHz – 300GHz
Down
- This is the transmission media on which the data instructions or information travels.
- Frequency Range:300GHz – 400THz
- Frequency Range:3KHz – 1GHz.
- this initiates the instruction
- a network of networks
- physically connected
14 Clues: physically connected • a network of networks • Connected through signal • Frequency Range:3KHz – 1GHz. • Exist in two states 1 and 0. • Frequency Range:1GHz – 300GHz • Only transmit in one direction • this initiates the instruction • Frequency Range:300GHz – 400THz • Accepts the transmission of data • It consists of 2 separately insulated conductor wires wound about each other • ...
your body 2021-11-01
Across
- cell pieces that form clots
- the transport of blood back and forth between the heart and lungs
- the flow of blood between the heart and everything but the lungs
- study of the heart
- upper chamber of the heart
- lower chamber of the heart
- blood vessels that carry blood away from the heart
Down
- what arteries branch off into
- slippery membrane that covers the heart
- these transport oxygen to other cells of the body
- these carry blood from capillary networks to veins
- a straw colored liquid
- what arterioles branch off into
- blood vessels that carry blood back to the heart
14 Clues: study of the heart • a straw colored liquid • upper chamber of the heart • lower chamber of the heart • cell pieces that form clots • what arteries branch off into • what arterioles branch off into • slippery membrane that covers the heart • blood vessels that carry blood back to the heart • these transport oxygen to other cells of the body • ...
Ks3 - Threats and Preventions 2025-06-13
Across
- Malware that tricks you into downloading it by pretending to be something safe.
- Software detecting cyber threats
- The use of digital technology (such as social media, messaging apps, or emails) to intentionally harm, threaten, or upset someone.
- Attack security vulnerabilities
- Fake email for stealing data
- Malware which spreads by itself across computers and networks
- Malicious program holding data hostage
- Short for malicious software, harmful software installed on a computer without permission.
- Unauthorized access attempt
Down
- Secret key for authentication
- To trick people into illegally obtaining sensitive data.
- When a hacker tries lots of different passwords very quickly.
- Digital fingerprint identifier
- Scrambles data for security
14 Clues: Scrambles data for security • Unauthorized access attempt • Fake email for stealing data • Secret key for authentication • Digital fingerprint identifier • Attack security vulnerabilities • Software detecting cyber threats • Malicious program holding data hostage • To trick people into illegally obtaining sensitive data. • ...
IT-Related Terms 2023-06-26
Across
- to duplicate text
- the space around the edge of a page
- unwanted email containing advertisements
- the layout and design of a page
- a vertical section of text on a page
- to remove text from a document
- being slanted
- a dot or shape at the start of a paragraph
- a typing mistake
- a person who illegally accesses computers
Down
- the size of the blank areas between lines in a text
- a code that must be entered to verify identity or gain access to a resource
- a program used to protect private networks
- a file sent along with an email
- the size and shape of letters
- the middle of a page
- the address of a specific Internet site
- being darker and thicker than normal text
18 Clues: being slanted • to duplicate text • the middle of a page • a typing mistake • a file sent along with an email • the layout and design of a page • the size and shape of letters • to remove text from a document • the space around the edge of a page • unwanted email containing advertisements • a vertical section of text on a page • ...
My Internet Crossword 2018-03-29
Across
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- / = about 4.3 billion (2^32) We have run out! Hence…
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
Down
- control / control—message from receiving computer that packets have been received and the next one can be sent.
- / will provide the path taken between computers
- / ipconfig, ping, nslookup, tracert
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
- responsible for determining the path that packets take as they are routed on networks.
- / Interface Process Messenger
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
Vocabulary 2023-12-17
Across
- The unauthorized use or exploitation of an existing connection or system to gain access to another system or network.
- A malicious program that can replicate itself and spread to other computers, often causing damage to files and systems.
- A security system that monitors and controls incoming and outgoing network traffic, acting as a barrier between a private network and external networks.
- To take advantage of a vulnerability or weakness in a computer system for malicious purposes.
- The process of converting information into code to prevent unauthorized access, ensuring secure transmission and storage of sensitive data.
- A list of approved entities, such as software applications or IP addresses, allowed to access a particular system or network.
Down
- A person who exploits computer hardware and software, either for malicious purposes or ethical ones.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- Short for malicious software, it refers to any software designed to harm or exploit computer systems, including viruses, worms, and ransomware.
- A technique where a person or program masquerades as someone or something else to deceive or gain an advantage, often used in phishing attacks.
- A hidden method for bypassing normal authentication or encryption to access a computer system, often used by hackers.
- Unauthorized access or entry into a computer system or network by an individual or software.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in electronic communication.
13 Clues: Unauthorized access or entry into a computer system or network by an individual or software. • To take advantage of a vulnerability or weakness in a computer system for malicious purposes. • A person who exploits computer hardware and software, either for malicious purposes or ethical ones. • ...
Media Tech 2022-04-13
Across
- A set of data that describes and gives information about other data.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- An application is a software program that's designed to perform a specific function directly for the user or, in some cases, for another application program.
Down
- A digital footprint is data that is left behind when users have been online.
- Describes the opportunity to establish a protected network connection when using public networks.
- a brand name for an image messaging service and application, through which users can share images that may be private and temporary or public and stored for retrieval.
- a set of related web pages located under a single domain name, typically produced by a single person or organization.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- An act of logging in to a computer, database, or system.
11 Clues: An act of logging in to a computer, database, or system. • A set of data that describes and gives information about other data. • A digital footprint is data that is left behind when users have been online. • Describes the opportunity to establish a protected network connection when using public networks. • ...
Technology 2017-04-25
6 Clues: a web application • a personal computer • short for Web browser • short for electronic mail • a worldwide collection of computer networks • the transmission of a file from one computer system to another
