networks Crossword Puzzles

AP World Review on Trade: Period 2 2022-05-04

AP World Review on Trade: Period 2 crossword puzzle
Across
  1. Could have a variety of tobacco, sugar, etc. meant for farming that usually had labor
  2. Also known as the western hemisphere
  3. labor/slave system est. by Spanish
  4. trade system across Atlantic for slaves
  5. conquered the tribes of the Americas
  6. which countries made trade networks from old world to new
  7. system used to rank people
  8. connected new world with old in trade
  9. Spread to Americas alongside diseases and other stuff
  10. term that associates with sea
Down
  1. England produced this, very desired by Chinese
  2. Knowledge of this helped with trade across oceans
  3. Place known before exploration of Americas
  4. country that found the Americas
  5. another word for exchange;world-changing
  6. found a trade route to India

16 Clues: system used to rank peoplefound a trade route to Indiaterm that associates with seacountry that found the Americaslabor/slave system est. by SpanishAlso known as the western hemisphereconquered the tribes of the Americasconnected new world with old in tradetrade system across Atlantic for slavesanother word for exchange;world-changing...

Crime 2025-10-06

Crime crossword puzzle
Across
  1. taking property from a person by force or threat
  2. unlawful killing with intent (premeditated)
  3. intentionally causing fear of harm or attempted harm
  4. obtaining money or property by threats or coercion
  5. taking someone’s property without permission
  6. creating or altering documents to deceive
  7. entering a building to commit a crime (often theft)
Down
  1. stealing money placed in one’s trust or care
  2. unlawful taking and holding of a person against their will
  3. unlawful killing without premeditation
  4. deception to gain money or advantage
  5. unlawful physical contact that causes injury
  6. intentionally setting fire to property
  7. deliberate damage or defacement of property
  8. criminal activity carried out using computers or networks
  9. offering or receiving money to influence an official act

16 Clues: deception to gain money or advantageunlawful killing without premeditationintentionally setting fire to propertycreating or altering documents to deceiveunlawful killing with intent (premeditated)deliberate damage or defacement of propertystealing money placed in one’s trust or careunlawful physical contact that causes injury...

Cog Sci Ch. 9 & 10 Review 2022-04-20

Cog Sci Ch. 9 & 10 Review crossword puzzle
Across
  1. Who is the researcher who demonstrated the interaction of perception and imagery by using “back projection” with participants in their imagery task?
  2. An average representation of the “typical” member of a category is referred to as a ________.
  3. A category member that closely resembles a category prototype is considered _____ in prototypicality.
  4. Living things are distinguished by sensory properties and artifacts are distinguished by functions describes the _______-functional hypothesis.
  5. Family ________ refers to items in a category that resemble one another in a number of ways.
  6. Who is the researcher who conducted the mental-walk task?
  7. Who (the general term of researchers who hold this perspective) branded the study of imagery as unproductive because visual images are invisible to everyone except the person experiencing them?
  8. Back ______ is when an error signal is transmitted back through the circuit; this indicates how weights should be changed to allow an output signal to match the correct signal (learning).
Down
  1. The pegword technique is particularly suitable for use when you need to remember items based on their _____.
  2. Graceful ______ is when a performance disruption occurs gradually as parts of the system are damaged.
  3. When you measure the amount of time a person requires to complete a cognitive task, you are using mental ______.
  4. This psychologist believed that imagery is propositional and can be represented by abstract symbols.
  5. Imagine your roommate says, “I am leaving a key under the mat.” and you visualize your roommate putting a key under your doormat. This would support the idea that imagery is _______.
  6. The ________ approach is when knowledge of concepts is based on reactivation of sensory and motor processes that occur when we interact with an object.
  7. Concepts that are arranged in networks that represent the way concepts are organized in the mind are _______ networks.

15 Clues: Who is the researcher who conducted the mental-walk task?Family ________ refers to items in a category that resemble one another in a number of ways.An average representation of the “typical” member of a category is referred to as a ________.This psychologist believed that imagery is propositional and can be represented by abstract symbols....

Crossword 2025-04-22

Crossword crossword puzzle
Across
  1. A Programming language
  2. A Presentation software
Down
  1. Network of Networks spanning the globe
  2. An electronic device
  3. Interconnection of computers

5 Clues: An electronic deviceA Programming languageA Presentation softwareInterconnection of computersNetwork of Networks spanning the globe

Genesis's Crossword Puzzle 2016-08-31

Genesis's Crossword Puzzle crossword puzzle
Across
  1. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  2. A person who uses computers to gain unauthorized access to data.
  3. A general purpose computer programming language designed to produce programs that will run on any computer system.
  4. printing A process for making a physical object from a three-dimensional digital model, typically by laying down many successive thin layers of a material.
  5. A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  6. a networking device that forwards data packets between computer networks.
  7. a device for examining, reading, or monitoring something, in particular.
Down
  1. is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.
  2. using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
  3. A unit of information equal to one billion (109) or, strictly, 230 bits.
  4. an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet.
  5. Bits per second
  6. As a measure of computer memory or storage, a kilobyte (KB or Kbyte*) is approximately a thousand bytes
  7. A telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.

14 Clues: Bits per secondA person who uses computers to gain unauthorized access to data.A unit of information equal to one billion (109) or, strictly, 230 bits.a device for examining, reading, or monitoring something, in particular.a networking device that forwards data packets between computer networks....

esafety 2023-06-29

esafety crossword puzzle
Across
  1. Manipulative techniques used to deceive individuals into divulging confidential information or performing certain actions.
  2. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity through electronic communication.
  3. A security measure that acts as a barrier between a trusted internal network and untrusted external networks, controlling incoming and outgoing network traffic.
  4. The ability to use technology effectively and safely, including understanding online risks, critical thinking, and responsible digital behavior.
  5. designed to harm or infiltrate a computer system without the user's consent, often including viruses, worms, or ransomware.
  6. An additional layer of security that requires users to provide two forms of identification or verification to access an account or system.
Down
  1. The act of intentionally causing harm, harassment, or distress to someone through digital means such as social media, messaging apps, or emails.
  2. The trail of information and data left behind by a person's online activities, including posts, comments, and interactions.
  3. Measures taken to protect computers, networks, and data from unauthorized access or attacks.
  4. The online representation of an individual or organization, including personal information, usernames, profiles, and online activities.
  5. The process of converting data into a coded form to prevent unauthorized access or interception, ensuring confidentiality.
  6. The right to keep personal information and online activities confidential and secure from unauthorized access.
  7. Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information.
  8. Software or tools that allow parents or guardians to monitor and control their child's online activities, restricting access to inappropriate content or limiting screen time.

14 Clues: Measures taken to protect computers, networks, and data from unauthorized access or attacks.The right to keep personal information and online activities confidential and secure from unauthorized access.Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information....

CryptoRiddle 2023-09-23

CryptoRiddle crossword puzzle
Across
  1. Harmful software that steals data or disrupts a computer.
  2. Long-term, sophisticated attacks by skilled hackers. (abbreviation)
  3. Exploiting vulnerabilities in a website's database.(abbreviation)
  4. Deceptive emails or websites aiming to steal information.
  5. Coordinated digital assault on computer systems or networks.
  6. Fake systems designed to attract hackers.
Down
  1. Programs that protect your computer from viruses.
  2. Overwhelming a website with traffic to make it unavailable. (abbreviation)
  3. Secret Data Collector (A type of Malware Attack)
  4. A protective barrier for your network.

10 Clues: A protective barrier for your network.Fake systems designed to attract hackers.Secret Data Collector (A type of Malware Attack)Programs that protect your computer from viruses.Harmful software that steals data or disrupts a computer.Deceptive emails or websites aiming to steal information.Coordinated digital assault on computer systems or networks....

Computer Hardware 2024-07-15

Computer Hardware crossword puzzle
Across
  1. The hardware device we need to connect to the Internet
  2. The name for computers connected together
  3. The big room that contains switches, routers, and servers
  4. The address of your computer
Down
  1. The largest network
  2. The type of cable needed in wired networks
  3. The hardware that connects computers in a local area network (LAN)
  4. ones and zeroes
  5. Type of network in which you connect without wires. Sometimes offered for free in airports
  6. The "brain" of the computer

10 Clues: ones and zeroesThe largest networkThe "brain" of the computerThe address of your computerThe name for computers connected togetherThe type of cable needed in wired networksThe hardware device we need to connect to the InternetThe big room that contains switches, routers, and serversThe hardware that connects computers in a local area network (LAN)...

Worksheet 9 – Vocabulary check 2023-03-26

Worksheet 9 – Vocabulary check crossword puzzle
Across
  1. Basic element of artificial neural networks
  2. System that learns via neural network
  3. System that learns based on large, structured data
  4. A technology capable of identifying places, people, objects and many other types of elements within an image
Down
  1. The father of AI
  2. The first layer of an artificial neural network
  3. Challenges posed by AI
  4. Fake videos
  5. Annual world summit sponsored by the United Nations
  6. Anomaly in the output of AI algorithms, due to some prejudiced assumptions

10 Clues: Fake videosThe father of AIChallenges posed by AISystem that learns via neural networkBasic element of artificial neural networksThe first layer of an artificial neural networkSystem that learns based on large, structured dataAnnual world summit sponsored by the United Nations...

The internet 2025-04-11

The internet crossword puzzle
Across
  1. A small file stored on your computer by a website.
  2. Short for Uniform Resource Locator, a web address.
  3. To look at websites on the internet.
  4. A website or online service where people connect and share.
  5. Online conversation in real-time.
Down
  1. A global system of interconnected computer networks.
  2. To transfer data from a remote computer to a local one.
  3. A program used to access the internet.
  4. A collection of linked documents accessible through the internet.
  5. Electronic mail.

10 Clues: Electronic mail.Online conversation in real-time.To look at websites on the internet.A program used to access the internet.A small file stored on your computer by a website.Short for Uniform Resource Locator, a web address.A global system of interconnected computer networks.To transfer data from a remote computer to a local one....

ICT 2022-03-11

ICT crossword puzzle
Across
  1. Metropolitan area Network
  2. is the Wireless Technology used to connect computers, tablets and etc
  3. is a device that enables computers to exchange data over a telephone line
  4. is a digital electronic machine
  5. Modern computer networks are mostly connected via
  6. is a Network topology in which nodes are directly connected to a common linear
Down
  1. Diagnosis of various diseases
  2. is a set commands that controls the computer operations
  3. the most popular browser
  4. is an organized collection of data

10 Clues: the most popular browserMetropolitan area NetworkDiagnosis of various diseasesis a digital electronic machineis an organized collection of dataModern computer networks are mostly connected viais a set commands that controls the computer operationsis the Wireless Technology used to connect computers, tablets and etc...

Privacy & Security 2022-11-01

Privacy & Security crossword puzzle
Across
  1. a malware designed to deny a user or organization access to files on their computer
  2. the art of protecting networks, devices, and data from unauthorized access
  3. process of identifying a user’s identity
  4. the right to be let alone
Down
  1. common examples are viruses & trojans
  2. coding protecting information from hackers
  3. (2 words) information about an individual
  4. compromise of security
  5. a set of policies and procedures for systematically managing an organization's sensitive data
  6. international organization for standardization

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses & trojansprocess of identifying a user’s identity(2 words) information about an individualcoding protecting information from hackersinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

Cybersecurity Terminology 2025-06-25

Cybersecurity Terminology crossword puzzle
Across
  1. Prefix meaning harmful or bad
  2. The act of keeping something safe from harm
  3. Software used to stop or remove viruses
  4. Prefix related to computers, networks, or the internet
  5. A hacker who helps protect systems legally
  6. Fraudulent email tricking people into giving personal information
Down
  1. Malicious software that locks access until a ransom is paid.
  2. A weakness that can be exploited in a system.
  3. Software that secretly collects user data
  4. The process of encoding data to protect it

10 Clues: Prefix meaning harmful or badSoftware used to stop or remove virusesSoftware that secretly collects user dataThe process of encoding data to protect itA hacker who helps protect systems legallyThe act of keeping something safe from harmA weakness that can be exploited in a system.Prefix related to computers, networks, or the internet...

Technology Crossword 2025-09-29

Technology Crossword crossword puzzle
Across
  1. Small piece of data stored by websites on your browser
  2. Roughly one trillion bytes of data
  3. Programming language named after a comedy group
  4. Open-source operating system with a penguin mascot
  5. Technology that hides your IP by tunneling internet traffic
Down
  1. Small, high-speed storage close to the CPU
  2. Digital ledger technology behind cryptocurrencies
  3. Cybercrime that tricks users into giving personal information
  4. Device that directs internet traffic between networks
  5. Security system that filters network traffic

10 Clues: Roughly one trillion bytes of dataSmall, high-speed storage close to the CPUSecurity system that filters network trafficProgramming language named after a comedy groupDigital ledger technology behind cryptocurrenciesOpen-source operating system with a penguin mascotDevice that directs internet traffic between networks...

Threats to computer systems and networks (J277) 2025-06-02

Threats to computer systems and networks (J277) crossword puzzle
Across
  1. A self-propagating malware that does not need a host program.
  2. A type of malware that self-replicates and spreads between computers.
  3. A malicious program disguised as legitimate software.
  4. Phishing attempts conducted via SMS messages.
  5. A system that SQL injection attacks target.
  6. Manipulating people into divulging confidential information.
  7. Malware that encrypts data and demands payment for its release.
  8. Software that automatically displays unwanted advertisements.
  9. Creating a false scenario to trick someone into giving information.
  10. A DoS attack launched from multiple compromised systems (acronym).
  11. An attack that tries every possible combination to guess credentials.
Down
  1. Malware that collects information about users without their knowledge.
  2. An attack aimed at disrupting a service by overwhelming it (acronym).
  3. An attack that exploits vulnerabilities in database queries.
  4. An attack that floods a system with traffic to make it unavailable (acronym).
  5. Malicious software designed to disrupt or damage computer systems.
  6. A social engineering attack using deceptive emails or websites to trick users.
  7. Phishing attempts conducted via voice calls.
  8. Illegally taking data from a system.
  9. An attack where data is secretly monitored during transmission.
  10. A social engineering technique involving looking over someone's shoulder to steal information.

21 Clues: Illegally taking data from a system.A system that SQL injection attacks target.Phishing attempts conducted via voice calls.Phishing attempts conducted via SMS messages.A malicious program disguised as legitimate software.An attack that exploits vulnerabilities in database queries.Manipulating people into divulging confidential information....

African States' Impact on Networks of Exchange 2025-10-02

African States' Impact on Networks of Exchange crossword puzzle
Across
  1. – Malian ruler whose pilgrimage to Mecca displayed immense wealth and promoted Islam abroad.
  2. – Religious structures built across Mali and Swahili cities, reflecting Islamic influence.
  3. – String of East African city-states that thrived as middlemen in Indian Ocean trade.
  4. – Valued commodity in Mali that symbolized its role as a center of learning and scholarship.
  5. – Blending of African traditions with Islam in religion, language, and culture.
  6. – Key African export carried from both Mali and Swahili Coast into wider markets.
  7. – Early West African kingdom that prospered from controlling trans-Saharan trade before Mali.
  8. – West African state that succeeded Mali and expanded control over trade.
Down
  1. – Malian city known for trade, Islamic scholarship, and its famous learning centers.
  2. – Human captives exported from Africa along trans-Saharan and Indian Ocean routes.
  3. – Important Swahili port that prospered from ivory, spice, and slave trade.
  4. – Seasonal winds that allowed merchants to time voyages safely in the Indian Ocean.
  5. – Prominent Swahili city-state that grew wealthy from controlling regional trade.
  6. – Indian Ocean commodity that Swahili ports exchanged along with ivory and slaves.
  7. – Exchange system where West African gold was traded for North African salt.
  8. – Precious metal exported from both West Africa and Swahili ports, fueling global demand.
  9. – Merchant settlements of Arabs, Persians, and Indians in Swahili ports that spread culture and commerce.
  10. – West African state that thrived by dominating the gold-salt trade and spreading Islam.
  11. – Religion that spread into West and East Africa through trade, shaping politics and culture.
  12. – Groups of merchants and camels that connected Mali to North Africa across the Sahara.

20 Clues: – West African state that succeeded Mali and expanded control over trade.– Important Swahili port that prospered from ivory, spice, and slave trade.– Exchange system where West African gold was traded for North African salt.– Blending of African traditions with Islam in religion, language, and culture....

Phising Play Action 2025-08-21

Phising Play Action crossword puzzle
Across
  1. Crime committed using computer networks
  2. Using false information to impersonate an entity
  3. Malicious software designed to harm, disrupt or gain unauthorized access
  4. Malicious software designed to spread from one to computer to another
Down
  1. Cybercrime where attackers use deceptive communication
  2. Malicious software preventing access to computer files
  3. Transferring messages from one computer to another
  4. To defraud or embezzle

8 Clues: To defraud or embezzleCrime committed using computer networksUsing false information to impersonate an entityTransferring messages from one computer to anotherCybercrime where attackers use deceptive communicationMalicious software preventing access to computer filesMalicious software designed to spread from one to computer to another...

IT Knowledge 2025-11-27

IT Knowledge crossword puzzle
Across
  1. The right to keep your personal data secret.
  2. Virtual Private Network; protects your browsing privacy.
  3. Malicious code that replicates itself.
  4. An offensive action against computer systems.
  5. Malware that spreads through networks without human help.
Down
  1. The secret string of characters used to verify identity.
  2. Scrambling data so it cannot be read without a key.
  3. Unsolicited and unwanted junk email.

8 Clues: Unsolicited and unwanted junk email.Malicious code that replicates itself.The right to keep your personal data secret.An offensive action against computer systems.Scrambling data so it cannot be read without a key.The secret string of characters used to verify identity.Virtual Private Network; protects your browsing privacy....

IT quiz 2023-04-03

IT quiz crossword puzzle
Across
  1. a system that integrates telephones and computer
  2. a device that forwards data packets
  3. He/she creates animationswith a computer
  4. written information on your TV screen
  5. a global system of networks of intergrated services
Down
  1. He/she is in charge of computer data input and processing
  2. joins multiple computers together to form a single network segment
  3. this send copirs of documents through telephone lines
  4. design and develop ICT devices
  5. radio communication system

10 Clues: radio communication systemdesign and develop ICT devicesa device that forwards data packetswritten information on your TV screenHe/she creates animationswith a computera system that integrates telephones and computera global system of networks of intergrated servicesthis send copirs of documents through telephone lines...

GiANT's 5 Voices Language 2023-08-01

GiANT's 5 Voices Language crossword puzzle
Across
  1. Champion of 
Relational networks, collaboration, and effective communication
  2. Champion of Strategic vision, results focused, and problem solving
  3. Culture of Apathy and Low Expectation
  4. Champion of
 Future ideas, innovation, and organizational integrity
  5. Champion of People, relational harmony, and values
Down
  1. Culture of Fear and Manipulation
  2. Champion of 
Due diligence, resources, and efficient systems and processes
  3. Culture of Empowerment and Opportunity
  4. Culture of Entitlement and Mistrust
  5. Certain things that can trigger you to step into the danger zone.

10 Clues: Culture of Fear and ManipulationCulture of Entitlement and MistrustCulture of Apathy and Low ExpectationCulture of Empowerment and OpportunityChampion of People, relational harmony, and valuesCertain things that can trigger you to step into the danger zone.Champion of Strategic vision, results focused, and problem solving...

My Dream Job Software Developer 2024-12-15

My Dream Job Software Developer crossword puzzle
Across
  1. Platform used for storing code and collaborating on projects.
  2. The global system of interconnected computer networks.
  3. A reusable solution to a common problem in programming.
  4. A tool used to test software applications.
  5. Software that translates written code into instructions a computer can understand.
Down
  1. Process of finding and fixing errors in code.
  2. Popular programming language for machine learning and data science.
  3. A collaborative method for software development.
  4. Programming language used for web development.
  5. Commonly used database system.

10 Clues: Commonly used database system.A tool used to test software applications.Process of finding and fixing errors in code.Programming language used for web development.A collaborative method for software development.The global system of interconnected computer networks.A reusable solution to a common problem in programming....

st10212348 2022-08-19

st10212348 crossword puzzle
Across
  1. Parameters that express aspects to a network as a whole instead of just the network system.
  2. the variation in time delay between when a signal is transmitted and when it's received over a network connection.
  3. is a set of instructions, data or programs used to operate computers and execute specific tasks.
  4. is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  5. the human-computer interaction layer.
  6. Protocol layer that retains connections and controls ports and sessions.
  7. is an expression of how much time it takes for a data packet to travel from one designated point to another.
  8. dictates the amount of data stored or transferred on a device.
  9. are the components required to operate and manage enterprise IT environments.
  10. is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
  11. is an administrative grouping of multiple private computer networks or local hosts within the same infrastructure.
Down
  1. Network printers, scanners, photocopiers, and multifunction devices that may also handle fax are all examples of networked... devices.
  2. is any application running on one host providing communication to another application running on a different host.
  3. can be a mix of hardware devices, software applications, and network services.
  4. the time hold-up to deliver a unit of data over a channel or network.
  5. A adapter that allows for connections between computers and servers or any other networking device over a local area network.
  6. to expand the coverage area of the network, repropagate a weak or broken signal and or service remote nodes.
  7. is a communication medium, the path that data takes from source to destination
  8. is a collection of local-area networks.
  9. is an established set of rules that determine how data is transmitted between different devices in the same network.

20 Clues: the human-computer interaction layer.is a collection of local-area networks.dictates the amount of data stored or transferred on a device.the time hold-up to deliver a unit of data over a channel or network.Protocol layer that retains connections and controls ports and sessions....

Internet Crossword 2021-10-29

Internet Crossword crossword puzzle
Across
  1. a one-to-one direction.
  2. A square associated with internet.
  3. an identifier that's used to identify different networks or computers.
  4. a piece of data with a destination address.
  5. Something that you put information into.
Down
  1. a type of location.
  2. an interface on a device where the device is connected.
  3. a type of protection to block unauthorised requests.

8 Clues: a type of location.a one-to-one direction.A square associated with internet.Something that you put information into.a piece of data with a destination address.a type of protection to block unauthorised requests.an interface on a device where the device is connected.an identifier that's used to identify different networks or computers.

Internet Crossword :) 2021-11-11

Internet Crossword :) crossword puzzle
Across
  1. a one-to-one direction.
  2. a piece of data with a destination address.
  3. Something that you put information into.
  4. a type of location.
Down
  1. A square associated with internet.
  2. an identifier that's used to identify different networks or computers.
  3. an interface on a device where the device is connected.
  4. a type of protection to block unauthorised requests.

8 Clues: a type of location.a one-to-one direction.A square associated with internet.Something that you put information into.a piece of data with a destination address.a type of protection to block unauthorised requests.an interface on a device where the device is connected.an identifier that's used to identify different networks or computers.

FAKE NEWS 2022-04-04

FAKE NEWS crossword puzzle
Across
  1. given to a unique resource on the Web.
  2. real.
  3. share a fake news is a .....
  4. network Whose main objective is to support the production and sharing of content.
  5. in wich two or more people with different interests entre into confrontation.
Down
  1. through social networks.
  2. comennt or news circulating among people.
  3. .....

8 Clues: real......through social networks.share a fake news is a .....given to a unique resource on the Web.comennt or news circulating among people.in wich two or more people with different interests entre into confrontation.network Whose main objective is to support the production and sharing of content.

Internet 2015-02-18

Internet crossword puzzle
Across
  1. It is a software used to look at web pages
  2. A collection of related webpages.
  3. Group of computers connected together.
  4. It is the first page of a website.
Down
  1. Network of networks.
  2. Moving from one website to another web site.
  3. A lot of computers on internet make a web.
  4. It is a page that contain text,picture,images etc

8 Clues: Network of networks.A collection of related webpages.It is the first page of a website.Group of computers connected together.A lot of computers on internet make a web.It is a software used to look at web pagesMoving from one website to another web site.It is a page that contain text,picture,images etc

Internet 2015-01-27

Internet crossword puzzle
Across
  1. A collection of related webpages.
  2. Moving from one website to another web site.
  3. A lot of computers on internet make a web.
  4. It is a page that contain text,picture,images etc
Down
  1. It is the first page of a website.
  2. It is a software used to look at web pages
  3. Group of computers connected together.
  4. Network of networks.

8 Clues: Network of networks.A collection of related webpages.It is the first page of a website.Group of computers connected together.It is a software used to look at web pagesA lot of computers on internet make a web.Moving from one website to another web site.It is a page that contain text,picture,images etc

The Internet 2016-01-25

The Internet crossword puzzle
Across
  1. This is when part of an intranet is made accessible to customers, partners, suppliers or others outside a respective company.
  2. Page This is a document on the World Wide Web consisting of an HTML file and any related files for scripts and graphics and often hyperlinked to other Web pages.
  3. the Acronym "URL" stands for
  4. This is the largest computer network system in the world. It is consists of many smaller networks connected together by a global public network.
Down
  1. this consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
  2. This is a program that allows users to view and explore information on the World Wide Web.
  3. Each page on the World Wide Web has a unique address and this is called
  4. This is a private network that belongs to an organisation and is designed to be accessible by the organisation’s members, employees or others with authorization.
  5. It allows you to send, receive and manage electronic messages and communicate with friends, family and businesses all over the world.

9 Clues: the Acronym "URL" stands forEach page on the World Wide Web has a unique address and this is calledThis is a program that allows users to view and explore information on the World Wide Web.This is when part of an intranet is made accessible to customers, partners, suppliers or others outside a respective company....

4th Grade - Spelling Words Unit 7 Week 1 2024-04-25

4th Grade - Spelling Words Unit 7 Week 1 crossword puzzle
Across
  1. very tiring or difficult
  2. to come into being or operation
  3. to direct or control
  4. goods shipped by boat, plane, train, or truck
  5. a nobleman by birth of a particular rank
Down
  1. a rich, powerful person in business or industry
  2. to use power to manage or command
  3. a person whom one tries to be better than; competitor
  4. a long journey by air, land, sea, or outer space
  5. a system that involves a number of many groups

10 Clues: to direct or controlvery tiring or difficultto come into being or operationto use power to manage or commanda nobleman by birth of a particular rankgoods shipped by boat, plane, train, or trucka system that involves a number of many groupsa rich, powerful person in business or industrya long journey by air, land, sea, or outer space...

Computer 2023-08-12

Computer crossword puzzle
Across
  1. Data storage device inside a computer.
  2. Output device that produces physical copies of digital content.
  3. Input device for typing and entering commands.
  4. Programs and applications that run on a computer.
  5. Computer system with a monitor, CPU, and peripherals.
Down
  1. Global network connecting computers worldwide.
  2. Camera used to transmit video over the internet.
  3. Pointing device used to interact with a computer.
  4. Device that directs data between computer networks.
  5. Portable computer that can be used on the go.

10 Clues: Data storage device inside a computer.Portable computer that can be used on the go.Global network connecting computers worldwide.Input device for typing and entering commands.Camera used to transmit video over the internet.Pointing device used to interact with a computer.Programs and applications that run on a computer....

Inter,Intro,Intra, Circum 2022-05-11

Inter,Intro,Intra, Circum crossword puzzle
Across
  1. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  2. area of a circle
  3. occurring between nation
  4. obstruct someone from going to a destination
Down
  1. bring something to a place for the first time
  2. find a way around (an obstacle)
  3. act in such a way as to have an effect on each other.
  4. intervene in a situation without invitation
  5. taking place or existing within the mind.
  6. Job

10 Clues: Jobarea of a circleoccurring between nationfind a way around (an obstacle)taking place or existing within the mind.intervene in a situation without invitationobstruct someone from going to a destinationbring something to a place for the first timeact in such a way as to have an effect on each other....

Artificial Intelligence 2022-05-27

Artificial Intelligence crossword puzzle
Across
  1. period of reduced funding and interest in AI
  2. search that doesn´t have information it's domain
  3. Sequence of well-defined instructions used in computation
  4. capability to process human speech into a written format
Down
  1. series of algorithms that mimic the human brain
  2. Used to make text-to-speech conversation
  3. the ability to acquire and apply knowledge
  4. A bunch of nodes
  5. automation technology based on metaphorical software robots
  6. intelligence demonstrated by machines

10 Clues: A bunch of nodesintelligence demonstrated by machinesUsed to make text-to-speech conversationthe ability to acquire and apply knowledgeperiod of reduced funding and interest in AIseries of algorithms that mimic the human brainsearch that doesn´t have information it's domaincapability to process human speech into a written format...

TCC & New Haven Crossword 2024-10-28

TCC & New Haven Crossword crossword puzzle
Across
  1. The state where TCC operates
  2. An important part of TCC’s mission in supporting communities
  3. Renowned university in New Haven
  4. Core value at TCC for creating equitable spaces
  5. Abbreviation for the organization providing local support and advocacy
Down
  1. TCC’s focus area to promote well-being
  2. Iconic central area of New Haven known for gatherings
  3. Historic street in New Haven known for Italian food
  4. The historic city where TCC is located
  5. Essential goal of TCC’s mission in fostering support networks

10 Clues: The state where TCC operatesRenowned university in New HavenTCC’s focus area to promote well-beingThe historic city where TCC is locatedCore value at TCC for creating equitable spacesHistoric street in New Haven known for Italian foodIconic central area of New Haven known for gatheringsAn important part of TCC’s mission in supporting communities...

ACM Newsletter Edition 3 2025-07-08

ACM Newsletter Edition 3 crossword puzzle
Across
  1. Crucial in ensuring responsible AI development
  2. Brain-inspired networks used in deep learning
  3. Grouping data points based on similarity
  4. Fraudulent attempt to obtain sensitive information via email
  5. Computing model leveraging superposition and entanglement
Down
  1. A model problem where training accuracy is high but test accuracy is low
  2. Network security system that monitors incoming/outgoing traffic
  3. Global organization advancing computing as a science
  4. An input that guides an LLM’s response
  5. Platform for code collaboration and version control

10 Clues: An input that guides an LLM’s responseGrouping data points based on similarityBrain-inspired networks used in deep learningCrucial in ensuring responsible AI developmentPlatform for code collaboration and version controlGlobal organization advancing computing as a scienceComputing model leveraging superposition and entanglement...

Cross-Word 2025-09-12

Cross-Word crossword puzzle
Across
  1. → Like the unclear edges of a nebula
  2. → Arrangement, like star charts in rows and columns
  3. → Similar to how brain-like networks analyze telescope data
  4. → Needed to decode signals from outer space
  5. → Rule of strengthening, like gravity binding stars
Down
  1. → Like grouping galaxies together in the universe
  2. → An early model, like a prototype telescope for starlight
  3. → Just as stars evolve, this algorithm evolves solutions
  4. → Like mass values assigned to planets in orbit
  5. → Small shift, like tilt in Earth’s axis

10 Clues: → Like the unclear edges of a nebula→ Small shift, like tilt in Earth’s axis→ Needed to decode signals from outer space→ Like mass values assigned to planets in orbit→ Like grouping galaxies together in the universe→ Arrangement, like star charts in rows and columns→ Rule of strengthening, like gravity binding stars...

Network keywords ~ Computing 2025-10-10

Network keywords ~ Computing crossword puzzle
Across
  1. a fake email
  2. a service of the internet that contains web pages
  3. a global network or networks
  4. messages that are sent between a browser and a website
  5. a set of rules on how to communicate
  6. standard mark up language that is used to create web pages
Down
  1. the person who created the world wide web
  2. a series of web pages
  3. the process of converting a message into code that can't be read easily
  4. a message that is split

10 Clues: a fake emaila series of web pagesa message that is splita global network or networksa set of rules on how to communicatethe person who created the world wide weba service of the internet that contains web pagesmessages that are sent between a browser and a websitestandard mark up language that is used to create web pages...

The secret language of trees - Camille Defrenne and Suzanne Simard 2022-02-02

The secret language of trees - Camille Defrenne and Suzanne Simard crossword puzzle
Across
  1. Trees can share information like ____ or insect attacks through their fungi networks.
  2. Symbiotic fungi called _______.
  3. The secret of trees' success lies under the ___ ____.
  4. Tress shares food, supplies, and _______.
Down
  1. Process where leaves use the ample sunlight up to create sugars.
  2. Fungi branches together make up the ______.
  3. There is a _____ species of mycorrhizae fungi.
  4. This element is considered fuel for fungi ____.

8 Clues: Symbiotic fungi called _______.Tress shares food, supplies, and _______.Fungi branches together make up the ______.There is a _____ species of mycorrhizae fungi.This element is considered fuel for fungi ____.The secret of trees' success lies under the ___ ____.Process where leaves use the ample sunlight up to create sugars....

the tic ta toe vocabulary 2014-05-02

the tic ta toe vocabulary crossword puzzle
Across
  1. to reload a webpage on the internet
  2. bullies in cyberspace
  3. text or graphics that when clicked will connect to a new web page
  4. a peson that secretly gains access to computers
  5. a global network of thousands of other computer networks that offers e-mails
Down
  1. to make copies
  2. a group of connected computers
  3. used to write a report

8 Clues: to make copiesbullies in cyberspaceused to write a reporta group of connected computersto reload a webpage on the interneta peson that secretly gains access to computerstext or graphics that when clicked will connect to a new web pagea global network of thousands of other computer networks that offers e-mails

BVC 2022-11-14

BVC crossword puzzle
Across
  1. Extrernal forces stopping people from buying the brand they want
  2. measures the core aspects of choice: brand saliency and brand relationships
  3. known to be one of the market effects
  4. ____ brands have strong brand networks or associative memory structures
Down
  1. Ipsos brand equity framework
  2. Brands grow when its chosen by more people, more___
  3. AE+ME=___
  4. AE stands for____

8 Clues: AE+ME=___AE stands for____Ipsos brand equity frameworkknown to be one of the market effectsBrands grow when its chosen by more people, more___Extrernal forces stopping people from buying the brand they want____ brands have strong brand networks or associative memory structures...

Inventions 2025-03-02

Inventions crossword puzzle
Across
  1. Stores energy in a chemical form
  2. Stores food and keeps it cold
  3. Lens use to produce a magnifies image of an object
  4. Advanced machine, capable of flying
Down
  1. Global system of interconnected computer networks
  2. Makes for easy transport
  3. Device designed for transmission and reception of the human voice
  4. Safe and effective way of protecting you against harmful deseases

8 Clues: Makes for easy transportStores food and keeps it coldStores energy in a chemical formAdvanced machine, capable of flyingGlobal system of interconnected computer networksLens use to produce a magnifies image of an objectDevice designed for transmission and reception of the human voiceSafe and effective way of protecting you against harmful deseases

Phising 2025-08-21

Phising crossword puzzle
Across
  1. crime committed using computer networks
  2. using false information to impersonate an entity
  3. malicious software designed to harm, disrupt or gain unauthorized access
  4. malicious software designed to spread from one to computer to another
Down
  1. cybercrime where attackers use deceptive communication
  2. malicious software preventing access to computer files
  3. transferring messages from one computer to another
  4. to defraud or embezzle

8 Clues: to defraud or embezzlecrime committed using computer networksusing false information to impersonate an entitytransferring messages from one computer to anothercybercrime where attackers use deceptive communicationmalicious software preventing access to computer filesmalicious software designed to spread from one to computer to another...

IA-II- Mobile Emerging Technology (Honours)- July-Dec 2023 2023-10-16

IA-II- Mobile Emerging Technology (Honours)- July-Dec 2023 crossword puzzle
Across
  1. ___ is used to create the radiation pattern of an antenna array by strongly adding the phase of the signal in the direction of the desired target/moving object and nulling the pattern of the target in unwanted direction
  2. The technique that offers a linear increase in the capacity for the same bandwidth and no additional power expenditure
  3. the component that stores the information about subscriber's phone number, encryption keys, and identification
  4. The scheme in which two or more statistically independent replicas is used for transfer of the same information
  5. the antennas that have signal processing capability that can perform tasks such as analysis of the direction of arrival of a signal
  6. The unit in LTE architecture that commuicates with packet data networks in the outside world such as internet, private and IMS
Down
  1. Diverity improves the _____ of the received message because nothing can recover the data signal in a deep fade except getting more copies of the same signal
  2. the coding technique which can be utilized to transmit over multiple antennas and achieve similar gains as can be achieved using multiple antenna diversity reception
  3. In _____ diversity replica of same signal is transmitted through different antenna
  4. the device that forwards the data between base station and packet data network gateway in 5G system
  5. the fifth generation network concept in which under single infrastrcture is divided into multiple networks
  6. a reference carrier that is known at receiver end that provides channel state information and channel behaviour
  7. Compared to SISO, system with ____ antennas give more degree of freedom in signalling at transmitter and receiver
  8. the technique that is used to elimitate the unwanted sideband components and thus limit the total transmission bandwidth in OFDM system
  9. the parameter that is used to describe instantaneous communication between devices and minimizing delays

15 Clues: In _____ diversity replica of same signal is transmitted through different antennathe device that forwards the data between base station and packet data network gateway in 5G systemthe parameter that is used to describe instantaneous communication between devices and minimizing delays...

Media Manipulation 2013-01-14

Media Manipulation crossword puzzle
Across
  1. television is a type of
  2. the people who read a media text
  3. To exercise authoritative or dominating influence over
  4. pointing in the wrong direction
  5. A panel for the display of advertisements in public places
  6. taking advantage of someone
  7. the depiction of something in a media text
  8. An act intended to deceive or trick
  9. a famous person whom many people know
  10. Of or relating to communal living.
Down
  1. the commercial processes involved in selling a product
  2. The transmission of dynamic images
  3. Communication of audible signals encoded in electromagnetic waves
  4. poster or a paid announcement in the print
  5. the organized dissemination of information, allegations
  6. Expressing, containing, or consisting of a negation, refusal, or denial
  7. Relating to, involving, or characteristic of politics or politicians
  8. persuading someone
  9. An interconnected system of networks that connects computers

19 Clues: persuading someonetelevision is a type oftaking advantage of someonepointing in the wrong directionthe people who read a media textThe transmission of dynamic imagesOf or relating to communal living.An act intended to deceive or tricka famous person whom many people knowposter or a paid announcement in the print...

computer vocabulary 2017-06-21

computer vocabulary crossword puzzle
Across
  1. a way to organize computer files.
  2. physical parts of a computer system.
  3. a picture, image, or other representation
  4. the software that supports a computer’s basic functions
  5. occurs when a computer program stops functioning properly and exits
  6. CENTRAL PROCESSING UNIT
  7. a panel of keys that operate a computer or a typewriter
  8. to restart by loading the operating system
  9. a person or thing that browses
Down
  1. an external flash drive
  2. is an operating system
  3. DRVE storage device containing a read-write mechanism
  4. a vast computer network linking smaller computer networks worldwide
  5. AN ELECTRONIC DEVICE FOR STORING AND PROCESSING DATA
  6. a folder
  7. a display screen used from a computer
  8. the working surface of a desk
  9. of or relating to present and recent time
  10. an input device that is most often used with a personal computer

19 Clues: a folderis an operating systeman external flash driveCENTRAL PROCESSING UNITthe working surface of a deska person or thing that browsesa way to organize computer files.physical parts of a computer system.a display screen used from a computera picture, image, or other representationof or relating to present and recent time...

Year 8 Comp Sci 2025-07-04

Year 8 Comp Sci crossword puzzle
Across
  1. The time between sending a packet and receiving a packet
  2. The brain of the computer
  3. A device that connects devices together on a network.
  4. Microscopic switches responsible for binary
  5. Running a program one instruction at a time
  6. Done by using if/else in Python
  7. Being able to learn and adapt from new data
  8. The amount of traffic that can be transmitted at once on a network.
  9. a wide area network
Down
  1. Two or more computers connected together.
  2. A device that connects local area networks together.
  3. A document used to establish a target audience
  4. The layout/shape of nodes on a network
  5. Loops
  6. a local area network
  7. How can we gather data?
  8. Connects all the parts together
  9. A type of AI that gives out text-based responses
  10. Base 2 number system

19 Clues: Loopsa wide area networka local area networkBase 2 number systemHow can we gather data?The brain of the computerConnects all the parts togetherDone by using if/else in PythonThe layout/shape of nodes on a networkTwo or more computers connected together.Microscopic switches responsible for binaryRunning a program one instruction at a time...

tech terms 1 and 2 2023-01-05

tech terms 1 and 2 crossword puzzle
Across
  1. portion of a pc that retrieves and executes instructions
  2. stores data
  3. pc hardware device that converts data from digital format to a suitable format for telephone or radio
  4. a starting computer operating system
  5. traditional technology for connecting devices in a wired local area network
  6. a start for a second or third time
  7. file or code that infects, steals or conducts behavior an attacker wants
  8. portable document format
  9. network security
  10. uniform resource locator
Down
  1. unique address that identifies a device on the internet
  2. piece of data from a website that is stored and be retrieved later
  3. standard markup language
  4. managing traffic between networks by forwarding data to IP addresses
  5. 1,000,000 bytes or 1,048,576 bytes
  6. instructions
  7. unit of data that is 8 binary digits long
  8. physical and visible
  9. short binary digit

19 Clues: stores datainstructionsnetwork securityshort binary digitphysical and visiblestandard markup languageportable document formatuniform resource locator1,000,000 bytes or 1,048,576 bytesa start for a second or third timea starting computer operating systemunit of data that is 8 binary digits longunique address that identifies a device on the internet...

Health and Safety Crossword 2025-04-28

Health and Safety Crossword crossword puzzle
Across
  1. A harmful program that replicates itself
  2. A harmful program that displays unwanted ads
  3. Regularly saving your work
  4. What does the fire extinguisher contain if it has a black label
  5. Proper seating posture
  6. A secure way to access your computer remotely
  7. A harmful software that demands ransom
Down
  1. What the white label fire extinguisher contains
  2. A device to protect your computer from power surges
  3. Name for harmful software
  4. A software update to fix security vulnerabilities
  5. Software that protects against malicious attacks
  6. A secure method to encrypt data
  7. A harmful program that spreads through networks
  8. What label colour is on the Dry Powder Fire extinguisher
  9. A short break to rest your eyes
  10. A harmful software that spies on user activity
  11. A program that blocks unauthorised access
  12. A harmful program disguised as legitimate software

19 Clues: Proper seating postureName for harmful softwareRegularly saving your workA secure method to encrypt dataA short break to rest your eyesA harmful software that demands ransomA harmful program that replicates itselfA program that blocks unauthorised accessA harmful program that displays unwanted adsA secure way to access your computer remotely...

crypto crossword 2025-01-10

crypto crossword crossword puzzle
Across
  1. - Popular decentralized cryptocurrency
  2. - New unit added to a blockchain
  3. - A change to a blockchain’s protocol that creates two separate chains
  4. - Cryptocurrency designed to minimize price volatility
  5. - Financial metric used to measure a company's profitability
  6. - Unique code identifying a crypto wallet
  7. - Measure of computational power in a blockchain network
  8. - Return on an investment over a specific period
  9. - Value of all final goods and services produced
Down
  1. - Algorithm that secures blockchain networks
  2. - Measure of market risk
  3. - Digital ledger technology used for recording transactions
  4. - Agreement among participants in a blockchain network
  5. - Any cryptocurrency other than Bitcoin
  6. - A participant who validates transactions and adds them to a blockchain
  7. - Smallest unit of Bitcoin
  8. - A digital asset representing ownership or utility on a blockchain
  9. - Profiting from price differences between markets
  10. - A digital tool used to store cryptocurrencies

19 Clues: - Measure of market risk- Smallest unit of Bitcoin- New unit added to a blockchain- Popular decentralized cryptocurrency- Any cryptocurrency other than Bitcoin- Unique code identifying a crypto wallet- Algorithm that secures blockchain networks- A digital tool used to store cryptocurrencies- Return on an investment over a specific period...

Vocabulary about web site 2020-07-12

Vocabulary about web site crossword puzzle
Across
  1. แฟ้มข้อมูลหรือกลุ่มแฟ้มข้อมูลที่มีอยู่บนเวิลด์ไวด์เว็บ ดู world wide web ประกอบ
  2. หน้าเอกสารที่เขียนขึ้นในรูปแบบภาษาเอชทีเอ็มแอล ซึ่งสามารถเชื่อมโยงไปยังเอกสารหน้าอื่นได้ โดยเรียกดูผ่านเว็บบราวเซอร์
  3. โปรแกรมคอมพิวเตอร์ที่ใช้เปิดดูเว็บ (web browser)
Down
  1. หน้าแรกของเอกสารที่มีอยู่ในระบบอินเทอร์เน็ต ที่จะเป็นตัวแนะนำให้รู้จักหน่วยงานหรือสถาบันต่าง ๆ ในเวิร์ลด์ไวด์เว็บ (world wide web)
  2. การเชื่อมโยงคอมพิวเตอร์สองเครื่องเข้าด้วยกันโดยผ่านทางโมเด็ม (modem) หรือ สายไฟ หรือข่ายงาน (networks)
  3. บรรจุขึ้น, บรรจุขึ้น คือการถ่ายโอนข้อมูลจากคอมพิวเตอร์เครื่องหนึ่งไปยังคอมพิวเตอร์อีกเครื่องหนึ่ง เครื่องที่ส่งข้อมูล เรียกว่า ตัวที่ทำการ "บรรจุขึ้น" หรือการส่งข้อมูลจากเครือข่ายไปยังแม่ข่าย

6 Clues: โปรแกรมคอมพิวเตอร์ที่ใช้เปิดดูเว็บ (web browser)แฟ้มข้อมูลหรือกลุ่มแฟ้มข้อมูลที่มีอยู่บนเวิลด์ไวด์เว็บ ดู world wide web ประกอบการเชื่อมโยงคอมพิวเตอร์สองเครื่องเข้าด้วยกันโดยผ่านทางโมเด็ม (modem) หรือ สายไฟ หรือข่ายงาน (networks)หน้าเอกสารที่เขียนขึ้นในรูปแบบภาษาเอชทีเอ็มแอล ซึ่งสามารถเชื่อมโยงไปยังเอกสารหน้าอื่นได้ โดยเรียกดูผ่านเว็บบราวเซอร์...

Computer Networks Cross Words 2013-12-03

Computer Networks Cross Words crossword puzzle
Across
  1. which receives the data from the transmission medium
  2. used in error control
  3. its a portion of Data Link Layer
Down
  1. occurs due to network traffic
  2. most commonly used network
  3. the rules that governs the data communication
  4. which sends the data to the transmission medium
  5. Medium Acess Control

8 Clues: Medium Acess Controlused in error controlmost commonly used networkoccurs due to network trafficits a portion of Data Link Layerthe rules that governs the data communicationwhich sends the data to the transmission mediumwhich receives the data from the transmission medium

GI Crossword Game 2025-05-04

GI Crossword Game crossword puzzle
Across
  1. JavaScript method to add an element to the end of array
  2. Ansible module to install packages
  3. The secret function behind all those endless loops
  4. javaScript to declare a variable with block scope
  5. This protocol ensures your data doesn’t take the scenic route
  6. It’s like a personal assistant, but for your servers
  7. This Python function really defines a program
Down
  1. python library for data analysis
  2. network device used to connect multiple networks
  3. protocol to resolve domain names
  4. define tasks in Ansible
  5. A JavaScript variable that refuses to change its mind
  6. Code executes after a set wait period
  7. Ansible module to copy files to managed nodes
  8. Python data type to store key-value pairs
  9. The unsung hero keeping your containerized apps afloat

16 Clues: define tasks in Ansiblepython library for data analysisprotocol to resolve domain namesAnsible module to install packagesCode executes after a set wait periodPython data type to store key-value pairsAnsible module to copy files to managed nodesThis Python function really defines a programnetwork device used to connect multiple networks...

Digital Communication Methods 2023-01-31

Digital Communication Methods crossword puzzle
Across
  1. Describes how formal dig comms should be
  2. Electronic Mail
  3. Online platorm to build social networks
Down
  1. Informal communication example WhatsApp
  2. A live video metting
  3. An online diary to share thoughts and interests

6 Clues: Electronic MailA live video mettingInformal communication example WhatsAppOnline platorm to build social networksDescribes how formal dig comms should beAn online diary to share thoughts and interests

Geography Crossword Puzzle 2021-09-23

Geography Crossword Puzzle crossword puzzle
Across
  1. A landform along the shoreline of an ocean, sea, lake, or river
  2. A waterless area of land with little or no vegetation
  3. A chain or cluster of islands
  4. The world's largest continent
  5. The study of place.
  6. Country with the largest population
  7. The world's smallest continent
  8. Largest ocean
Down
  1. An extensive area filled with trees.
  2. The height of a point on the Earth's surface compared to the sea level
  3. Geography of the networks of people and cultures on Earth’s surface.
  4. Geography of the Earth’s climate, landforms, and oceans.
  5. The Grand Canyon is in this state
  6. The sudden and intense shaking of the ground due to tectonic activity.
  7. Largest country in the world
  8. Northern most country in North America

16 Clues: Largest oceanThe study of place.Largest country in the worldA chain or cluster of islandsThe world's largest continentThe world's smallest continentThe Grand Canyon is in this stateCountry with the largest populationAn extensive area filled with trees.Northern most country in North AmericaA waterless area of land with little or no vegetation...

Digital World Crossword 2025-02-21

Digital World Crossword crossword puzzle
Across
  1. Google's popular web browser
  2. Place where you store files online instead of on your device
  3. Common programming language known for its snake logo
  4. Operating system used by most smartphones
  5. Type of malicious software that encrypts files and demands payment
  6. Main circuit board in a computer
  7. Company that makes the iPhone
  8. Wireless technology standard for short-distance data exchange
Down
  1. Global system of interconnected networks
  2. Storage device that uses flash memory, often connected via USB
  3. AI assistant in Windows
  4. Three-letter abbreviation for a common image format
  5. Microsoft's cloud computing platform
  6. Device that connects to a computer and moves a cursor
  7. Process of converting data into a secure format
  8. Acronym for Central Processing Unit

16 Clues: AI assistant in WindowsGoogle's popular web browserCompany that makes the iPhoneMain circuit board in a computerAcronym for Central Processing UnitMicrosoft's cloud computing platformGlobal system of interconnected networksOperating system used by most smartphonesProcess of converting data into a secure format...

tech crossword 2015-05-13

tech crossword crossword puzzle
Across
  1. an instrument or device used for observing
  2. used for hitting a tennis ball
  3. a system for transmitting visual images and sound that are reproduced on screens
  4. what do you use to connect to the internet
  5. Hard disks may be internal or ______
Down
  1. used for texting
  2. a printed circuit board containing the principal components of a computer
  3. global system of interconnected computer networks
  4. was used to decapitate people
  5. a machine with moving parts that converts power into motion

10 Clues: used for textingwas used to decapitate peopleused for hitting a tennis ballHard disks may be internal or ______an instrument or device used for observingwhat do you use to connect to the internetglobal system of interconnected computer networksa machine with moving parts that converts power into motion...

Artificial Intelligence 2022-06-02

Artificial Intelligence crossword puzzle
Across
  1. period of reduced funding and interest in AI
  2. search that doesn´t have the information it's domain
  3. Sequence of well-defined instructions used in computation
  4. capability to process human speech into a written format
Down
  1. series of algorithms that mimic the human brain
  2. Used to make text-to-speech conversation
  3. the ability to acquire and apply knowledge
  4. A bunch of nodes
  5. automation technology based on metaphorical software robots
  6. intelligence demonstrated by machines

10 Clues: A bunch of nodesintelligence demonstrated by machinesUsed to make text-to-speech conversationthe ability to acquire and apply knowledgeperiod of reduced funding and interest in AIseries of algorithms that mimic the human brainsearch that doesn´t have the information it's domaincapability to process human speech into a written format...

Lesson 2 2022-09-09

Lesson 2 crossword puzzle
Across
  1. Change their way of life in response to the environment
  2. 70,000 years ago when thick sheets of ice spread across large regions of Earth
  3. A closely interconnected group of people or things
  4. The place early humans originated from
  5. Having many related parts, not simple
Down
  1. Modern human
  2. When people leave their homeland to live somewhere else
  3. First hominin to bury their dead, a close relative of us.
  4. A way early people killed animals for food.
  5. Surroundings

10 Clues: Modern humanSurroundingsHaving many related parts, not simpleThe place early humans originated fromA way early people killed animals for food.A closely interconnected group of people or thingsWhen people leave their homeland to live somewhere elseChange their way of life in response to the environment...

NYSE + NASDAQ 2024-02-09

NYSE + NASDAQ crossword puzzle
Across
  1. the right to trade on a floor of the NYSE
  2. known as the "Big Board"
  3. the NYSE is a _____ market with specialists
  4. units of stocks issued by a corporation that represent ownership.
  5. the NASDAQ is a _____ market with market makers
  6. a person who buys and sells goods or assets for others.
Down
  1. investors post order over computer networks
  2. the agreement that created the NYSE
  3. NASDAQ is the ____ biggest stock exchange
  4. has a higher trading volume than NYSE

10 Clues: known as the "Big Board"the agreement that created the NYSEhas a higher trading volume than NYSEthe right to trade on a floor of the NYSENASDAQ is the ____ biggest stock exchangeinvestors post order over computer networksthe NYSE is a _____ market with specialiststhe NASDAQ is a _____ market with market makers...

Privacy & Security 2023-12-20

Privacy & Security crossword puzzle
Across
  1. coding protecting information from hackers
  2. the right to be let alone
  3. a malware designed to deny a user or organization access to files on their computer
  4. the art of protecting networks, devices, and data from unauthorized access
Down
  1. (2 words) information about an individual
  2. common examples are viruses and trojans
  3. the process of identifying a user's identity
  4. international organization for standardization
  5. compromise of security
  6. a set of policies and procedures for systematically managing an organization's sensitive data

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses and trojans(2 words) information about an individualcoding protecting information from hackersthe process of identifying a user's identityinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

Tech Trivia Crossword 2024-08-13

Tech Trivia Crossword crossword puzzle
Across
  1. The key that is used to connect one schema to another schema
  2. Situation that occurs when resources are overloaded
  3. Which type of exploit utilizes fake websites and url names
  4. Any software intentionally designed to disrupt computer or computer networks
Down
  1. CEO of Alphabet
  2. Address to a variable
  3. CEO of Youtube
  4. A method that can be used to replace loops in a function
  5. A keyword used to delete table data
  6. Which bootloader does Linux use to boot itself

10 Clues: CEO of YoutubeCEO of AlphabetAddress to a variableA keyword used to delete table dataWhich bootloader does Linux use to boot itselfSituation that occurs when resources are overloadedA method that can be used to replace loops in a functionWhich type of exploit utilizes fake websites and url names...

FOR3701_SEM 2_2024 2024-07-31

FOR3701_SEM 2_2024 crossword puzzle
Across
  1. the heart of the cellphone system
  2. the main computer database of the cellphone system
  3. used by most investigators as the starting point for their investigation
  4. cellphone networks configure this location
  5. cellphone records may be used for this purpose in court
  6. without this, cellphone communication is not possible
Down
  1. hears the Section 205 subpoena application
  2. type of communication used by cellular phones
  3. the investigative principle established in 2006 for cellphones
  4. is also known as a mobile station

10 Clues: the heart of the cellphone systemis also known as a mobile stationhears the Section 205 subpoena applicationcellphone networks configure this locationtype of communication used by cellular phonesthe main computer database of the cellphone systemwithout this, cellphone communication is not possible...

CrossWord 2024-07-07

CrossWord crossword puzzle
Across
  1. A machine learning algorithm used for clustering
  2. An AI application that mimics conversation with users
  3. An ensemble learning method
  4. Which library is commonly used for data manipulation and analysis in Python?
  5. A popular machine learning library
Down
  1. A function defined without a name in Python
  2. Controls the step size in gradient descent
  3. Learning from data without labeled responses
  4. A type of AI that imitates human cognitive processes
  5. Type of learning involving neural networks with many layers

10 Clues: An ensemble learning methodA popular machine learning libraryControls the step size in gradient descentA function defined without a name in PythonLearning from data without labeled responsesA machine learning algorithm used for clusteringA type of AI that imitates human cognitive processesAn AI application that mimics conversation with users...

Innovation Day 20 2024-06-14

Innovation Day 20 crossword puzzle
Across
  1. - AI-driven software which can simulate a conversation with users
  2. - Abbreviation for Artificial Intelligence.
  3. - Acronym for Large Language Model.
  4. - Type of AI that creates new content or data.
  5. - Pertaining to networks that mimic the human brain.
Down
  1. - Open-source platform for machine learning developed by Google
  2. - Interface for building and interacting with software applications.
  3. - Programming language commonly used for AI and machine learning.
  4. - Microsoft's cloud service offering for advanced AI tools.
  5. - OpenAI's advanced conversational model.

10 Clues: - Acronym for Large Language Model.- OpenAI's advanced conversational model.- Abbreviation for Artificial Intelligence.- Type of AI that creates new content or data.- Pertaining to networks that mimic the human brain.- Microsoft's cloud service offering for advanced AI tools.- Open-source platform for machine learning developed by Google...

APCOM Unit 5 2023-04-18

APCOM Unit 5 crossword puzzle
Across
  1. Budget Cuts
  2. Oil leads to issues in terms of democratization
  3. Implemented by governments to reduce poverty
  4. The only course country not in the World Trade Organization
  5. economic networks that are growing more interconnected
  6. This Country has privatization and increased competition in its oil industry
Down
  1. reduction of state control of the economy
  2. This increases in the uk and is a demographic change
  3. This country has Special Economic Zones on its coast
  4. Growing populations can cause this change

10 Clues: Budget Cutsreduction of state control of the economyGrowing populations can cause this changeImplemented by governments to reduce povertyOil leads to issues in terms of democratizationThis country has Special Economic Zones on its coastThis increases in the uk and is a demographic changeeconomic networks that are growing more interconnected...

ΕΡΓΑΣΙΑ ΚΡΙΣΤΙΑΝ ΑΣΙΚΟΥ 2023-04-28

ΕΡΓΑΣΙΑ ΚΡΙΣΤΙΑΝ ΑΣΙΚΟΥ crossword puzzle
Across
  1. device that send data over a connection
  2. device used to connect multiple network hosts
  3. a person that acceses your computer and destroys it
  4. physical networking device
  5. Access point to devices outside of the network
  6. an intelligent way to deal with data packets
  7. used to connect networks
Down
  1. a piece of cable that connects multiple computers
  2. electronic device that amplifies the signal recieved
  3. a piece of computer hardware or software that provides functionality for other programs or devices

10 Clues: used to connect networksphysical networking devicedevice that send data over a connectionan intelligent way to deal with data packetsdevice used to connect multiple network hostsAccess point to devices outside of the networka piece of cable that connects multiple computersa person that acceses your computer and destroys it...

DePIN 2025-03-18

DePIN crossword puzzle
Across
  1. Real-time, high-precision GNSS for geospatial data.
  2. AI-driven mapping using crowd-sourced dashcam footage.
  3. Lets users own, control, and monetize vehicle data.
  4. Decentralized wireless network, powered by tokens.
  5. Expanding affordable and decentralized internet access.
Down
  1. Geospatial networks for mapping and location services.
  2. Converts fragmented data into decentralized AI intelligence.
  3. Earn from multiple projects with one token, manage in-app.
  4. Tracks air quality, rewards users for environmental data.
  5. Decentralized video streaming, rewards bandwidth sharing.

10 Clues: Decentralized wireless network, powered by tokens.Real-time, high-precision GNSS for geospatial data.Lets users own, control, and monetize vehicle data.Geospatial networks for mapping and location services.AI-driven mapping using crowd-sourced dashcam footage.Expanding affordable and decentralized internet access....

Cybersecurity 2025-07-29

Cybersecurity crossword puzzle
Across
  1. Network of private computers infected with malicious software
  2. Technique of making data unreadable to unauthorized users
  3. Fraudulent attempt to obtain sensitive information
  4. Barrier between a trusted network and untrusted networks
  5. Software designed to damage, disrupt, or gain unauthorized access
  6. Secret string used to authenticate access
Down
  1. Attacker tricks someone into breaking security procedures
  2. Attempts to guess a password by trying many combinations
  3. Method of verifying identity using fingerprints, retina, etc.
  4. Security flaw allowing attackers to access restricted data

10 Clues: Secret string used to authenticate accessFraudulent attempt to obtain sensitive informationAttempts to guess a password by trying many combinationsBarrier between a trusted network and untrusted networksAttacker tricks someone into breaking security proceduresTechnique of making data unreadable to unauthorized users...

Vocabulary Unit 3.1 2025-11-18

Vocabulary Unit 3.1 crossword puzzle
Across
  1. The study of matter, energy, motion, and forces.
  2. Creative expression through visual, auditory, or performance forms.
  3. The study of Earth’s landscapes, environments, and people.
  4. Focuses on computers, networks, and digital systems.
  5. Written works that express ideas, emotions, and stories.
Down
  1. The record of past events, societies, and cultures.
  2. The science of substances and their interactions.
  3. The study of living organisms and life processes.
  4. The language of numbers, patterns, and logic.
  5. Promotes fitness, movement, and teamwork.

10 Clues: Promotes fitness, movement, and teamwork.The language of numbers, patterns, and logic.The study of matter, energy, motion, and forces.The science of substances and their interactions.The study of living organisms and life processes.The record of past events, societies, and cultures.Focuses on computers, networks, and digital systems....

Cyber Security Puzzle 2024-04-22

Cyber Security Puzzle crossword puzzle
Across
  1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  2. the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
  3. an attack in which someone sends unsolicited messages to a Bluetooth-enabled device
  4. An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
  5. process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
  6. the physical opening where a data cable can be plugged in
Down
  1. an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them
  2. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
  3. a form of testing that is performed with knowledge of a target system's internals
  4. any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application
  5. an unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
  6. capability to limit network traffic between networks and/or information systems.
  7. The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
  8. a design and programming philosophy that focuses on formally correct and verifiable input handling throughout all phases of the software development lifecycle
  9. The unauthorized transfer of information from an information system.

15 Clues: the physical opening where a data cable can be plugged inThe unauthorized transfer of information from an information system.capability to limit network traffic between networks and/or information systems.a form of testing that is performed with knowledge of a target system's internals...

BVC 2022-11-14

BVC crossword puzzle
Across
  1. Extrernal forces stopping people from buying the brand they want
  2. measures the core aspects of choice: brand saliency and brand relationships
  3. known to be one of the market effects
  4. ____ brands have strong brand networks or associative memory structures
Down
  1. Ipsos brand equity framework
  2. Brands grow when its chosen by more people, more___
  3. AE+ME=___
  4. AE stands for____

8 Clues: AE+ME=___AE stands for____Ipsos brand equity frameworkknown to be one of the market effectsBrands grow when its chosen by more people, more___Extrernal forces stopping people from buying the brand they want____ brands have strong brand networks or associative memory structures...

Phising Play Action 2025-08-21

Phising Play Action crossword puzzle
Across
  1. crime committed using computer networks
  2. using false information to impersonate an entity
  3. malicious software designed to harm, disrupt or gain unauthorized access
  4. malicious software designed to spread from one to computer to another
Down
  1. cybercrime where attackers use deceptive communication
  2. malicious software preventing access to computer files
  3. transferring messages from one computer to another
  4. to defraud or embezzle

8 Clues: to defraud or embezzlecrime committed using computer networksusing false information to impersonate an entitytransferring messages from one computer to anothercybercrime where attackers use deceptive communicationmalicious software preventing access to computer filesmalicious software designed to spread from one to computer to another...

LT 3.4 2022-10-12

LT 3.4 crossword puzzle
Across
  1. An empire must efficiently organize this
  2. An empire must distinguish its core from this
  3. An empire must distinguish its citizens from these
  4. An empire must cooperate and compete with these
  5. An empire must unite a diverse ___
Down
  1. An empire must use this to expand its territory
  2. An empire must impose a dominant___ on an existing___
  3. An empire must maintain trade ___
  4. An empire must use this to unite its people

9 Clues: An empire must maintain trade ___An empire must unite a diverse ___An empire must efficiently organize thisAn empire must use this to unite its peopleAn empire must distinguish its core from thisAn empire must use this to expand its territoryAn empire must cooperate and compete with theseAn empire must distinguish its citizens from these...

IT JOBS 2018-02-13

IT JOBS crossword puzzle
Across
  1. He processes computer data.
  2. He tests,designs and tests computer programs.
  3. He installs and maintains networks.
  4. He controls all the IT experts.
Down
  1. He is in charge of the database operating without a hitch.
  2. He creates and maintains webpages and web applications.
  3. He is in charge of troubleshooting and debugging of technical problems.
  4. He is responsible for research and development of databases.
  5. He designs and develops ICT devices.

9 Clues: He processes computer data.He controls all the IT experts.He installs and maintains networks.He designs and develops ICT devices.He tests,designs and tests computer programs.He creates and maintains webpages and web applications.He is in charge of the database operating without a hitch.He is responsible for research and development of databases....

The Hand Salon Puzzle 2021-11-29

The Hand Salon Puzzle crossword puzzle
Across
  1. The constant variable is the _____ of the brush
  2. this experiment deals with _____ sensation
  3. What is the independent variable?
Down
  1. What scientist used research to help the study with strokes and paralyzation
  2. Marotta used ____-up processing to help with research
  3. Where are you right now?
  4. The rubber hand illusion can cause your body to feel _______
  5. This experiment makes you think the ____ is your real hand
  6. _____ networks control the ability for growth

9 Clues: Where are you right now?What is the independent variable?this experiment deals with _____ sensation_____ networks control the ability for growthThe constant variable is the _____ of the brushMarotta used ____-up processing to help with researchThis experiment makes you think the ____ is your real hand...

Chapter 14 2014-03-23

Chapter 14 crossword puzzle
Across
  1. Web Things you can easily find in a search engine
  2. Web A collection of documents that don't come up in a general search
  3. What your main focus is on
  4. Web Dealing with all social networks
  5. Sources Someone who speaks from experience
  6. Purpose deciding wither to be informative or persuasive
  7. Analysis knowing the people
  8. What the people think is right
  9. Speeches To create an understanding of your topic
  10. A long Story
  11. Sources Information found in handbooks
  12. What the people believe in
Down
  1. The system of topics
  2. Your central idea
  3. Apprehension a fear of speaking in front of people
  4. Copying someone else work and claim it to be yours
  5. Speaking Someone speaking to a large group of people
  6. How you handle a topic
  7. Diagrams Helps divide your topic to make it easier to talk about

19 Clues: A long StoryYour central ideaThe system of topicsHow you handle a topicWhat your main focus is onWhat the people believe inAnalysis knowing the peopleWhat the people think is rightWeb Dealing with all social networksSources Information found in handbooksSources Someone who speaks from experienceWeb Things you can easily find in a search engine...

IT Office Survival Crossword 2025-06-30

IT Office Survival Crossword crossword puzzle
Across
  1. This protocol secures your web traffic
  2. The one device that can ruin a Monday: “Out of toner!”
  3. The “cloud” heavyweight from Seattle
  4. The “power cycle” button on a server
  5. The “hub” of your company’s email
  6. When you “ping” but get nothing back
  7. Where all the tickets pile up endlessly
  8. The overnight job that always fails at 2am
  9. “Root” on Linux, “___” on Windows
  10. The process of copying your data before disaster strikes
Down
  1. Classic IT phrase: “It’s not a ___ issue!”
  2. The OS with penguin mascot
  3. “Oops, wrong environment!”
  4. The “gateway” to the internet for your office
  5. What you do to a device before sending it to recycling
  6. “Blue cable” original—makes networks go
  7. What IT calls a “planned” outage
  8. Where you “commit” your changes
  9. Where all your deleted files go first

19 Clues: The OS with penguin mascot“Oops, wrong environment!”Where you “commit” your changesWhat IT calls a “planned” outageThe “hub” of your company’s email“Root” on Linux, “___” on WindowsThe “cloud” heavyweight from SeattleThe “power cycle” button on a serverWhen you “ping” but get nothing backWhere all your deleted files go first...

Unit 3: Networks or Tangles? 2017-06-05

Unit 3: Networks or Tangles? crossword puzzle
Across
  1. when you watch your smartphone intensely, for a long time
  2. social media helps you ...... .. ...... with your friends
  3. synonym for "allow"
  4. when you are on social media, you sometimes lose ..... of time
  5. when you cannot do without your phone (adj.)
Down
  1. the place where many social media apps and websites were created
  2. you ..... a message, when you want people to receive it
  3. something you put on social media is a bit of your life that you .....
  4. with a smartphone, when you are bored you can .... ....
  5. smartphones are easy to use and you need them: they are ......
  6. the name of the head of a company

11 Clues: synonym for "allow"the name of the head of a companywhen you cannot do without your phone (adj.)you ..... a message, when you want people to receive itwith a smartphone, when you are bored you can .... ....when you watch your smartphone intensely, for a long timesocial media helps you ...... .. ...... with your friends...

wide area network 2023-10-10

wide area network crossword puzzle
Across
  1. computers can only connect to other computers if they know there...
  2. what does WAN stand for
  3. a benifit of the cloud is that ...... can occur
  4. what does DNS stand for
  5. what does IP adress mean
  6. what does ISP stand for
  7. what does VPN stand for
Down
  1. where a company may devide a LAN into smaller for the employees to communicate and share
  2. a characteristic of a WAN regarding its area
  3. A WAN can be made up of...
  4. what does URL stand for
  5. when companies host websites for the public to access
  6. what is the name if the biggest WAN
  7. what is the internet
  8. where LANS and WANS are redivided into smaller networks
  9. network of servers hosted on the internet

16 Clues: what is the internetwhat does URL stand forwhat does WAN stand forwhat does DNS stand forwhat does ISP stand forwhat does VPN stand forwhat does IP adress meanA WAN can be made up of...what is the name if the biggest WANnetwork of servers hosted on the interneta characteristic of a WAN regarding its area...

Social networks and teens 2025-01-21

Social networks and teens crossword puzzle
Across
  1. transmission of news
  2. move the cursor up and down
  3. most popular social network with teens
  4. bring together
Down
  1. put something on social media
  2. digital persecution
  3. numerical
  4. publish

8 Clues: publishnumericalbring togetherdigital persecutiontransmission of newsmove the cursor up and downput something on social mediamost popular social network with teens

Ransomware 2021-09-23

Ransomware crossword puzzle
Across
  1. Convert information into a code
  2. Protects against threat online
  3. Software created for malicious purposes
  4. New Ransomware Variant
Down
  1. A technique used by hackers to obtain sensitive information
  2. Protecting networks, devices and data from unauthorized access

6 Clues: New Ransomware VariantProtects against threat onlineConvert information into a codeSoftware created for malicious purposesA technique used by hackers to obtain sensitive informationProtecting networks, devices and data from unauthorized access

Computer 2016-12-06

Computer crossword puzzle
Across
  1. crash
  2. the way by which you can enter a place
  3. a device which can be used for surfing the Internet
  4. a global system of interconnected computer networks
Down
  1. something you use to click on things
  2. a typewriter-style device which uses an arrangement of buttons or keys on a computer
  3. press it to move back to delete
  4. combination this key with A means choosing the whole text
  5. information or facts

9 Clues: crashinformation or factspress it to move back to deletesomething you use to click on thingsthe way by which you can enter a placea device which can be used for surfing the Interneta global system of interconnected computer networkscombination this key with A means choosing the whole text...

Cyber security 2025-08-22

Cyber security crossword puzzle
Across
  1. organized collection of data, stored and accessed by computers
  2. unauthorized access or exposure of sensitive information
  3. a collection of interconnected computing devices that can communicate and share resources with each other
  4. a weakness in a system
  5. publishing private personal information about an individual online without their consent
Down
  1. IT professional who ensures an organization's computer networks are secure
  2. raw facts, figures, and observations
  3. protecting digital systems
  4. Personal identification information

9 Clues: a weakness in a systemprotecting digital systemsPersonal identification informationraw facts, figures, and observationsunauthorized access or exposure of sensitive informationorganized collection of data, stored and accessed by computersIT professional who ensures an organization's computer networks are secure...

JPowel50 Computer Science Crossword 2015-09-28

JPowel50 Computer Science Crossword crossword puzzle
Across
  1. sender and receiver are not active at the same time
  2. Harms your computer!
  3. How to get into your account
  4. Info on a computer, can be software items or data
  5. The top part of a piece of text
  6. what packets must visit
  7. Computers programmed to send files to other computer browsers
  8. specifies the type of code being entered
  9. building blocks of a Website
Down
  1. sender and receiver are active at the same time
  2. include all words together in search results
  3. a way to make search results more accurate
  4. used to connect servers across continents
  5. wide area networks, what internet is made up of
  6. World Wide Web
  7. If there are clashing colors on a web page, it is an example of______
  8. using copyright material for legal purposes

17 Clues: World Wide WebHarms your computer!what packets must visitHow to get into your accountbuilding blocks of a WebsiteThe top part of a piece of textspecifies the type of code being enteredused to connect servers across continentsa way to make search results more accurateusing copyright material for legal purposes...

Tech Terms 2024-05-08

Tech Terms crossword puzzle
Across
  1. an electronic machine that can store and work with large amounts of information
  2. global system of interconnected computer networks that uses the internet protocol suite TCP/IP TO communicate between networks and devices.
Down
  1. Automation is the use of technology to perform tasks with reduced human assistance.
  2. Robotics is the interdisciplinary study and pract ice of the design, construction, operation, and use of robots.
  3. Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion.

5 Clues: an electronic machine that can store and work with large amounts of informationAutomation is the use of technology to perform tasks with reduced human assistance.Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion....

Threats to Computer Networks 2023-03-28

Threats to Computer Networks crossword puzzle
Across
  1. programs that are hidden within other files
  2. is a type of attack used to steal data
  3. these are programs that pretend to be legitimate and are often disguised as an email attachment
  4. method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
Down
  1. these are often spread through emails
  2. the creators of most of the problems that leads to inconvenience
  3. programs that attempt to blackmail a user in an attempt to make a payment to a hacker
  4. programs that monitor users activities and send information to hacks

8 Clues: these are often spread through emailsis a type of attack used to steal dataprograms that are hidden within other filesthe creators of most of the problems that leads to inconvenienceprograms that monitor users activities and send information to hacksprograms that attempt to blackmail a user in an attempt to make a payment to a hacker...

Your phone and your location 2015-01-06

Your phone and your location crossword puzzle
Across
  1. Means wireless network
  2. the A in MAC
  3. What Wi-Fi networks can do using your MAC address
Down
  1. the M in MAC
  2. the C in Mac
  3. The thing that's special about the MAC address

6 Clues: the M in MACthe A in MACthe C in MacMeans wireless networkThe thing that's special about the MAC addressWhat Wi-Fi networks can do using your MAC address

Networking 2016-02-07

Networking crossword puzzle
Across
  1. It connects networks together.
  2. Tiniest piece of a file.
  3. Sending & receiving data over a computer network.
  4. Directory structure for information management.
Down
  1. Means rules.
  2. Number that uniquely identifies each device on a network.
  3. Group of computers that are connected to share resources and exchange data.
  4. Group of people overseeing the technical development of the World Wide Web.
  5. Any electronic device that shares resources and exchanges data on a network.

9 Clues: Means rules.Tiniest piece of a file.It connects networks together.Directory structure for information management.Sending & receiving data over a computer network.Number that uniquely identifies each device on a network.Group of computers that are connected to share resources and exchange data....

crossword unit 2 2023-03-05

crossword unit 2 crossword puzzle
Across
  1. barriers resist sharing information
  2. warranty costs complaints and/or claims and assume additional costs
  3. attitudes lack of trust in the company or between partners
  4. chain add value to each stage
  5. service It can be by phone or social networks
  6. management mobility produces great uncertainty in the objects and purposes
Down
  1. theory changes gradually
  2. medical costs senior doctors in collaborators, associates, to poor conditions in collaborators
  3. of constancy of purpose lack of clear leadership
  4. cycle Constant optimization of business activities through four stages

10 Clues: theory changes graduallychain add value to each stagebarriers resist sharing informationservice It can be by phone or social networksof constancy of purpose lack of clear leadershipattitudes lack of trust in the company or between partnerswarranty costs complaints and/or claims and assume additional costs...

Television in the 1950s 2023-02-01

Television in the 1950s crossword puzzle
Across
  1. TV star who had his own Variety show
  2. How many shows did Berle have
  3. cost of television set
  4. Most popular choice of entertainment before the TV
  5. Star of the first hit show
Down
  1. When Berle's last show aired what percent of people had a TV
  2. When Berle's show first aired what percent of people had a TV
  3. One of the four television networks in 1948
  4. Most popular type of TV

9 Clues: cost of television setMost popular type of TVStar of the first hit showHow many shows did Berle haveTV star who had his own Variety showOne of the four television networks in 1948Most popular choice of entertainment before the TVWhen Berle's last show aired what percent of people had a TVWhen Berle's show first aired what percent of people had a TV

LT 3.4 2022-10-12

LT 3.4 crossword puzzle
Across
  1. An empire must impose a dominant___ on an existing___
  2. An empire must efficiently organize this
  3. An empire must maintain trade ___
  4. An empire must cooperate and compete with these
Down
  1. An empire must distinguish its citizens from these
  2. An empire must unite a diverse ___
  3. An empire must distinguish its core from this
  4. An empire must use this to unite its people
  5. An empire must use this to expand its territory

9 Clues: An empire must maintain trade ___An empire must unite a diverse ___An empire must efficiently organize thisAn empire must use this to unite its peopleAn empire must distinguish its core from thisAn empire must use this to expand its territoryAn empire must cooperate and compete with theseAn empire must distinguish its citizens from these...

Mr Robot 2022-11-15

Mr Robot crossword puzzle
Across
  1. prevent attacks by blocking malicious traffic
  2. unwanted files or programs that can cause harm to a computer
  3. private information being kept secret
  4. people who seek to exploit weaknesses in software
  5. a set of characters that allows access to a system
  6. software designed to detect and destroy viruses
Down
  1. flaws in software
  2. the art of protecting networks, devices, and data from attacks
  3. type of email use to steal information about you

9 Clues: flaws in softwareprivate information being kept secretprevent attacks by blocking malicious trafficsoftware designed to detect and destroy virusestype of email use to steal information about youpeople who seek to exploit weaknesses in softwarea set of characters that allows access to a system...

Online Safety 2018-10-10

Online Safety crossword puzzle
Across
  1. keeping personal information secret
  2. a secret combination used to open and lock something
  3. a program that protects your computer from most scams and tricks
  4. sharing too much online
  5. a message sent between computers
Down
  1. bullying that happens online
  2. tricking people to get something of value from them
  3. a person who uses a computer to get into other people's information
  4. a communication system that connects computers and networks together

9 Clues: sharing too much onlinebullying that happens onlinea message sent between computerskeeping personal information secrettricking people to get something of value from thema secret combination used to open and lock somethinga program that protects your computer from most scams and tricks...

CLUE QUEST 2025-10-04

CLUE QUEST crossword puzzle
Across
  1. An error in software that causes incorrect behavior
  2. Process of hiding internal data representation from outside
  3. A database query language
  4. Technique for managing concurrent processes safely
Down
  1. A networking device that forwards data packets between networks
  2. Storage that loses data when power is off
  3. System that converts domain names into IP addresses
  4. High-level language primarily used for AI and machine learning
  5. Algorithm used for traversing or searching tree/graph structures

9 Clues: A database query languageStorage that loses data when power is offTechnique for managing concurrent processes safelyAn error in software that causes incorrect behaviorSystem that converts domain names into IP addressesProcess of hiding internal data representation from outsideHigh-level language primarily used for AI and machine learning...

Cloud Computing _ BCS601_Crosswords 2025-07-02

Cloud Computing _ BCS601_Crosswords crossword puzzle
Across
  1. / Highest security level suitable for sensitive data
  2. / Popular service model offering software over the internet
  3. A key feature of cloud computing, "Pay only for what you ___
  4. Maximum level of risk or security
  5. Cloud model combining public and private infrastructure
Down
  1. Service model providing virtual machines, storage, and networks.
  2. / Term for computing resources provided over the internet
  3. / The ability to automatically adjust computing resources
  4. Cloud deployment model combining public and private clouds
  5. A level of resource utilization with minimal computing requirements

10 Clues: Maximum level of risk or security/ Highest security level suitable for sensitive dataCloud model combining public and private infrastructure/ Term for computing resources provided over the internet/ The ability to automatically adjust computing resourcesCloud deployment model combining public and private clouds...

Engineer crossword 2022-09-01

Engineer crossword crossword puzzle
Across
  1. run trains that transport passengers and cargo
  2. equipment for improving human health
  3. determines the amount and type of insulation needed.
  4. create drawings and specifications
  5. combining veterinary medicine and biomedical engineering
  6. make sure that each part they manufacture has to be shipped well and made well
  7. lighting effects for visual art mediums
  8. Test radio networks
  9. develop processes, test procedures and implement systems
  10. Engineer storage systems
  11. designing aircraft
  12. oil and gas
Down
  1. road network projects
  2. food processing machines
  3. Hardware circuit boards
  4. aircraft
  5. create new materials.
  6. devoted to the implementation of existing technology
  7. develop methods for extracting oil and gas
  8. study a broad range of subjects
  9. medical equipment repairers or biomedical
  10. use geographic information systems
  11. genetics in animals
  12. research and develop the processes,
  13. work closely with process engineers to improve product yield

25 Clues: aircraftoil and gasdesigning aircraftgenetics in animalsTest radio networksroad network projectscreate new materials.Hardware circuit boardsfood processing machinesEngineer storage systemsstudy a broad range of subjectsuse geographic information systemscreate drawings and specificationsresearch and develop the processes,...

Medical Terminology 2022-10-20

Medical Terminology crossword puzzle
Across
  1. x-rays used to create detailed pictures of the heart
  2. a sudden loss of brain function caused by an interruption in the supply of blood
  3. networks of small vessels that perfuse tissue
  4. disease
  5. problem with rhythm of your heartbeat
  6. heart
  7. portable device that records rhythm of the heart
  8. heart failure
  9. vessels that deliver blood to tissue
  10. when this muscle doesn't pump blood as it should
  11. records electrical signal
  12. arterial fibrillation
  13. without
  14. two
Down
  1. thickest layer in the arteries
  2. oxygen rich blood is blocked from the heart muscles
  3. pertaining to
  4. magnetric resonance imaging
  5. deep vein thrombosis
  6. effects the blood flowing in the correct direction
  7. pumps blood through the system
  8. vessels that return blood to the heart
  9. ultrasound of the heart
  10. blood pressure
  11. cardiac care unit

25 Clues: twoheartdiseasewithoutpertaining toheart failureblood pressurecardiac care unitdeep vein thrombosisarterial fibrillationultrasound of the heartrecords electrical signalmagnetric resonance imagingthickest layer in the arteriespumps blood through the systemvessels that deliver blood to tissueproblem with rhythm of your heartbeat...

ch 20 vocab 2019-12-11

ch 20 vocab crossword puzzle
Across
  1. nation where all facilities needed for the advanced production of goods
  2. cooperative venture sponsered by 16 nations
  3. layer of the earths upper atmosphere
  4. transferring of genes from one living thing to another
  5. cultral elements
  6. greatest global health issue
  7. process of industrialization is not yet complete
  8. placing of high value
  9. growth or spread
  10. all human beings have rights to life,liberty,and security
  11. attempt to increase food resources worldwide
  12. politically motivated attacks
Down
  1. difference of opinion
  2. financial interactions involving people
  3. commerce between nations without economic restrictions
  4. U.S. federal agency
  5. creation of plants or animals that are genetically identical to another
  6. linkage of computer networks
  7. use of force or threats to frighten people or governments
  8. difference between men and women
  9. person who leaves his or her nation in pursuit of safety
  10. economic development
  11. antiterrorism bill

23 Clues: cultral elementsgrowth or spreadantiterrorism billU.S. federal agencyeconomic developmentdifference of opinionplacing of high valuelinkage of computer networksgreatest global health issuepolitically motivated attacksdifference between men and womenlayer of the earths upper atmospherefinancial interactions involving people...

Fundamentals of Computing Terms 2020-09-21

Fundamentals of Computing Terms crossword puzzle
Across
  1. A harmful computer program that creates glitches
  2. transferring data from the internet to a device
  3. a small graphic that represents a file/application
  4. A widely-accepted cyber security measure
  5. the protection of computer systems/networks
  6. an interface for connecting peripheral devices
  7. an output device that displays info from CPU
  8. uses pictures and words to represent ideas, etc.
  9. a piece of equipment outside the computer
  10. software that is pre-programmed for user
Down
  1. the blocking of data access for ransom
  2. program that you run on a computer/phone
  3. an input device that allows user to click graphics
  4. 8 bites of info represented in 1 character
  5. the brain of the computer
  6. Temporary memory
  7. smallest piece of info in the computer
  8. items that you can touch, I.E, tablet, etc.
  9. transferring data to the internet
  10. a unit of storage that is about 1 mil bytes
  11. the network of physical objects

21 Clues: Temporary memorythe brain of the computerthe network of physical objectstransferring data to the internetthe blocking of data access for ransomsmallest piece of info in the computerprogram that you run on a computer/phoneA widely-accepted cyber security measuresoftware that is pre-programmed for usera piece of equipment outside the computer...

Alpo 2021-02-25

Alpo crossword puzzle
Across
  1. cable with 8 wires used for networking
  2. network spanning a local area
  3. Unique six sets of two numbers identifier for a device
  4. global network comprised of most devices
  5. reaches up to 100gb/s of speed or higher
  6. ip comprised of 8 sets of 4 long hexadecimal numbers
  7. used to connect together multiple devices, not that intelligent
  8. connects devices to others, provides a firewall
  9. supports 100baseT
Down
  1. fastest speed possible
  2. extends the range of cabled networks
  3. supports 1000baset
  4. network spanning a wide area
  5. network spanning a metropolitan area
  6. supports 10baseT
  7. aware of every device connected to it, used to connect together multiple devices, smart
  8. stores and transfers data, has no physical interface
  9. Number assigned by router linked to your internet activity
  10. ip comprised of 4 different sets of numbers ranging 0 - 255
  11. Two or more computers linked to share resources

20 Clues: supports 10baseTsupports 100baseTsupports 1000basetfastest speed possiblenetwork spanning a wide areanetwork spanning a local areaextends the range of cabled networksnetwork spanning a metropolitan areacable with 8 wires used for networkingglobal network comprised of most devicesreaches up to 100gb/s of speed or higher...

The types of Engineers! 2021-10-14

The types of Engineers! crossword puzzle
Across
  1. Clear Boxes
  2. Builds Advanced Logic in Computer Systems
  3. Created the Quality Management System (QMS)
  4. Bridges
  5. Chain Home/Air Warning System
  6. Visuals for Theatre performances by Lighting the Scenes
  7. Printing press
  8. Steam Engines
  9. Nuclear Power Plant, Electricity, Electrical Power Distribution
  10. hovercraft
  11. Fire Alarm
  12. X-ray
  13. Prosthetics
Down
  1. Automobile sound systems
  2. Health and Advance Manufacture Systems
  3. Ice Powers Condition, Dual Fuel Heat Pumps
  4. Electric battery
  5. Built New Exhibits for Endangered or Rare Animals
  6. Fiber, Satellite, and Wired Communication Systems
  7. Solar Cell
  8. Laser
  9. The Design and Installation of Mobile Wireless Networks and Maintaining Them
  10. Dams
  11. Improves Product Yield and Troubleshoots Process
  12. Technological devices
  13. Furnace

26 Clues: DamsLaserX-rayBridgesFurnaceSolar CellhovercraftFire AlarmClear BoxesProstheticsSteam EnginesPrinting pressElectric batteryTechnological devicesAutomobile sound systemsChain Home/Air Warning SystemHealth and Advance Manufacture SystemsBuilds Advanced Logic in Computer SystemsIce Powers Condition, Dual Fuel Heat Pumps...