networks Crossword Puzzles
Media Tech 2022-04-13
Across
- A set of data that describes and gives information about other data.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- An application is a software program that's designed to perform a specific function directly for the user or, in some cases, for another application program.
Down
- A digital footprint is data that is left behind when users have been online.
- Describes the opportunity to establish a protected network connection when using public networks.
- a brand name for an image messaging service and application, through which users can share images that may be private and temporary or public and stored for retrieval.
- a set of related web pages located under a single domain name, typically produced by a single person or organization.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- An act of logging in to a computer, database, or system.
11 Clues: An act of logging in to a computer, database, or system. • A set of data that describes and gives information about other data. • A digital footprint is data that is left behind when users have been online. • Describes the opportunity to establish a protected network connection when using public networks. • ...
Data Transmission 2022-07-13
Across
- a message sent to the receiver indicating that data has been received correctly (used in the ARQ error detection method) (1 word)
- a device that enables data packets to be moved between different networks, for example to join a LAN to WAN (1 word)
- data that can be sent on one direction only (1 word)
- a method of transmission in which a message is broken into many data packets which can then be sent along pathways independently of each other (2 words)
Down
- a verification method used to check if data transferred has been altered or corrupted; calculated from the block of data of data being sent; the checksum value is sent after each data block (1 word)
- the part of a data packet that indicates the end of the data packet and cyclic redundancy check error check (2 words)
- a horizontal and vertical parity check on a block of data being transmitted (2 words)
- stages in a network that can receive and transmit data packets; routers and nodes in communication networks (1 word)
- the original text/message before it is put through an encryption algorithm (1 word)
- a type of encryption key that is known to all users (2 words)
10 Clues: data that can be sent on one direction only (1 word) • a type of encryption key that is known to all users (2 words) • the original text/message before it is put through an encryption algorithm (1 word) • a horizontal and vertical parity check on a block of data being transmitted (2 words) • ...
Cloud Computing 2026-03-12
Across
- A cryptographic network protocol used to securely operate network services, log into systems, and execute commands remotely over unsecured networks
- A highly scalable, flat data architecture designed to manage massive, unstructured data volumes (like videos, images, and backups) by storing data as self-contained "______" rather than in folders or blocks.
- A high-performance, low-latency storage technology that divides data into fixed-sized, independently accessible blocks, each with its own address.
- An architectural approach that virtualizes networks by separating the control plane (network logic) from the data plane (packet forwarding)
- The elimination of duplicate or redundant information, especially in computer data.
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
Down
- A data storage approach that separates management software from underlying physical hardware, creating a flexible, pooled, and policy-driven storage environment.
- Allows users to access online resources using memorable names rather than complex IP addresses.
- A hierarchical data storage system that organizes data into _____ and folders, similar to a physical filing cabinet.
- The process of reducing the size of data files using algorithms to optimize storage capacity, minimize bandwidth usage, and accelerate data transmission.
10 Clues: The elimination of duplicate or redundant information, especially in computer data. • Allows users to access online resources using memorable names rather than complex IP addresses. • A hierarchical data storage system that organizes data into _____ and folders, similar to a physical filing cabinet. • ...
ict henry morris 2026-03-25
Across
- any program designed to disrupt, damage, or gain unauthorized access to a computer system.
- a security professional who operates between white hat (ethical) and black hat (malicious) hackers
- a type of standalone, self-replicating malware that spreads automatically across networks without human intervention.
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- a network security system that acts as a barrier between a trusted internal network (or computer) and untrusted external networks, such as the internet.
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
Down
- an automatic legal right protecting original creative works—such as literature, art, music, films, and software—once they are expressed in a tangible form. I
- malicious software (malware) disguised as legitimate, harmless software, designed to trick users into installing it.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
10 Clues: any program designed to disrupt, damage, or gain unauthorized access to a computer system. • a security professional who operates between white hat (ethical) and black hat (malicious) hackers • malicious software (malware) disguised as legitimate, harmless software, designed to trick users into installing it. • ...
Edwin Martinez 2015-05-01
Across
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- An unauthorized person who secretly gains access to computer file
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- a piece of writing that has been copied from someone else and is presented as being your own work
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
Down
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- To renew or revitalize; To reload a webpage on the internet
- A bully who operates online, in cyberspace; To bully online
12 Clues: To renew or revitalize; To reload a webpage on the internet • A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer file • a piece of writing that has been copied from someone else and is presented as being your own work • ...
Technology 2017-04-25
6 Clues: a web application • a personal computer • short for Web browser • short for electronic mail • a worldwide collection of computer networks • the transmission of a file from one computer system to another
English class- How east is meeting west 2021-01-27
Across
- having common sense or understanding
- a connected goup of people that exchange information
- very important and needing immediate attention
- a property, a land or a building
- to be forced to do something bc. it is your job or the law
- riche the newly rich
Down
- someone who behaves like someone, they want to be them
- starting to exist,appearing
- a former student of a school
9 Clues: riche the newly rich • starting to exist,appearing • a former student of a school • a property, a land or a building • having common sense or understanding • very important and needing immediate attention • a connected goup of people that exchange information • someone who behaves like someone, they want to be them • ...
Drobny-Beneda 2021-04-29
Across
- a group or system of interconnected people or things
- type of electromagnetic radiation
- local area network
- title of the wireless network without any other meaning
- a device that receives and sends data on networks
Down
- global computer network that provides wirel
- device that creates wireless local area network
- system of sending electronic information without wire
- the process of converting information into a code to prevent unauthorized access
9 Clues: local area network • type of electromagnetic radiation • global computer network that provides wirel • device that creates wireless local area network • a device that receives and sends data on networks • a group or system of interconnected people or things • system of sending electronic information without wire • title of the wireless network without any other meaning • ...
My Internet Crossword 2018-03-29
Across
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
- / will provide the path taken between computers
- / = about 4.3 billion (2^32) We have run out! Hence…
- control / control—message from receiving computer that packets have been received and the next one can be sent.
- / Interface Process Messenger
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
Down
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- responsible for determining the path that packets take as they are routed on networks.
- / ipconfig, ping, nslookup, tracert
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
Network Terminology 2023-10-02
Across
- Services: the technology that connects your offices, data centers, cloud applications, and cloud storage together.
- The technology that connects your offices, data centers, cloud applications, and cloud storage together.
- Routing is the process of path selection in any network
- and protocols: Network protocols break larger processes into discrete, narrowly defined functions and tasks across every level of the network.
- media: the communication channels used to interconnect nodes on a computer network.
- the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks
Down
- A collection of devices connected together in one physical location, such as a building, office, or home.
- an identifier for a node or host on a telecommunications network. Network addresses are designed to be unique identifiers across the network, although some networks allow for local, private addresses, or locally administered addresses that may not be unique.
- the process of identifying the cause of faults in the network.
- A computer network that connects computers within a metropolitan area,
- operating systems: A network operating system is a specialized operating system for a network device such as a router, switch or firewall.
- Pan connects electronic devices close to the user, such as a wireless mouse, a keyboard, and a computer. Network types.
- and standards: Codes and standards provide a common language and requirements for the design, construction, and operations of buildings.
13 Clues: Routing is the process of path selection in any network • the process of identifying the cause of faults in the network. • A computer network that connects computers within a metropolitan area, • media: the communication channels used to interconnect nodes on a computer network. • ...
My Internet Crossword 2018-03-29
Across
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- responsible for determining the path that packets take as they are routed on networks.
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- / will provide the path taken between computers
- / ipconfig, ping, nslookup, tracert
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- / = about 4.3 billion (2^32) We have run out! Hence…
Down
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
- control / control—message from receiving computer that packets have been received and the next one can be sent.
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- / Interface Process Messenger
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
My Internet Crossword 2018-03-29
Across
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- responsible for determining the path that packets take as they are routed on networks.
- / Interface Process Messenger
- / ipconfig, ping, nslookup, tracert
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
- / will provide the path taken between computers
- control / control—message from receiving computer that packets have been received and the next one can be sent.
Down
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- / = about 4.3 billion (2^32) We have run out! Hence…
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
Sable Howells 2013-03-27
Across
- – A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- - a piece of writing that has been copied from someone else and is presented as being your own work
- -- A bully who operates online, in cyberspace; To bully online
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- – An unauthorized person who secretly gains access to computer files.
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
Down
- – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- - A part of a computer system or network that is designed to block unauthorized access while permitting outward communicationHACKER – An unauthorized person who secretly gains access to computer files.
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- - To renew or revitalize; To reload a webpage on the internet
13 Clues: - To renew or revitalize; To reload a webpage on the internet • -- A bully who operates online, in cyberspace; To bully online • – An unauthorized person who secretly gains access to computer files. • - a piece of writing that has been copied from someone else and is presented as being your own work • ...
crossword 2023-02-04
Across
- What device can make and receive phone calls without a traditional phone line?
- What is a device that senses and tracks an individual's movements?
- What is a set of instructions for a computer to perform a specific task?
Down
- What is the practice of securing IoT devices and networks from cyber threats called?
- What is the term used for a device that switches network traffic between different computer networks based on the network address of the data?
5 Clues: What is a device that senses and tracks an individual's movements? • What is a set of instructions for a computer to perform a specific task? • What device can make and receive phone calls without a traditional phone line? • What is the practice of securing IoT devices and networks from cyber threats called? • ...
Spkout 5.1 vocab 2025-06-13
Across
- Medicines used to fight bacterial infections.
- Things people enjoy doing to relax or have fun.
- Gets things done well without wasting time or resources.
- A two-wheeled vehicle powered by an engine.
- A powerful energy source produced by splitting atoms.
- Cost-saving; not spending more than necessary.
- A place where people watch plays or performances.
- A circular road system at a junction.
Down
- To study or look into something carefully to find facts.
- Energy that comes from sunlight.
- Talking
- Science of changing DNA to improve living organisms.
- Injections that protect people from diseases.
- A household device that removes dust using suction.
- The Web
- Machines in space that send signals or collect data.
- Aircraft used to transport passengers and cargo.
- Relating to the countryside, not the city.
18 Clues: Talking • The Web • Energy that comes from sunlight. • A circular road system at a junction. • Relating to the countryside, not the city. • A two-wheeled vehicle powered by an engine. • Medicines used to fight bacterial infections. • Injections that protect people from diseases. • Cost-saving; not spending more than necessary. • ...
Chapter 3 2012-09-05
Across
- browser program that lets you find and view web pages
- small aplicationsthat can load and run on a web page
- the electronic transfer of messages
- search engines find _____ of words
- shows you a list of links for sites you have visited recently
- a measure of how much work can be done in a certain amount of time
- powerful computers
- uniform resource locator
Down
- World Wide Web
- allows users to post messages for others to read
- answers to a query
- allows you to create a list of links for sites
- a web of computer networks that spans the Earth
- can be text, a button, or a graphic
- Internet service provider
15 Clues: World Wide Web • answers to a query • powerful computers • uniform resource locator • Internet service provider • search engines find _____ of words • the electronic transfer of messages • can be text, a button, or a graphic • allows you to create a list of links for sites • a web of computer networks that spans the Earth • allows users to post messages for others to read • ...
Kerry Vocab 2014-11-13
Across
- short for Internet Service Provider
- a device or computer that stores network resources
- the quality of images
- part of a filename that usually shows a program in which a file was created
- short for Wireless Fidelity
- short for Hyper-Text Markup Language
- short for Uniform Resource Locator
- a program for a user
- parts of a computer that you can see and touch
- transferring a file to a local computer
Down
- world wide connection of networks which connects businesses and agencies
- internet etiquette
- the parts of a computer that one cannot touch
- a main page of any website
- box a box that asks for you input and is on the screen
15 Clues: internet etiquette • a program for a user • the quality of images • a main page of any website • short for Wireless Fidelity • short for Uniform Resource Locator • short for Internet Service Provider • short for Hyper-Text Markup Language • transferring a file to a local computer • the parts of a computer that one cannot touch • parts of a computer that you can see and touch • ...
Mackenzie Vocab 2014-11-12
Across
- means hyper text markup lauguage
- parts of the computer that you can see and or touch
- internet service provider
- wireless fidelity
- something that stores information
- part of a file name that you use to open
- a thing that connects computers
- the main page of a website
Down
- the world wide web that connects other networks
- when you transfer a file from a computer into the inter-web
- a program that everyday people can use
- when you are connected to the inter-web
- uniform resource locator
- when you move a file from the inter-web to another computer
- the parts of a computer that you cannot touch
15 Clues: wireless fidelity • uniform resource locator • internet service provider • the main page of a website • a thing that connects computers • means hyper text markup lauguage • something that stores information • a program that everyday people can use • when you are connected to the inter-web • part of a file name that you use to open • the parts of a computer that you cannot touch • ...
Tech Vocab 2019-05-20
Across
- an organization that provides access to the internet
- a small text file up
- a hardware interface for up to 127 peripherals
- an inhouse website that serves employees only
- the computing part of the computer
- the primary method for keeping secure from intruders
- a large network made up of little networks
- the address that defines the route to a file
- to store data locally in order to speed up subsequent retrieval
Down
- the fundamental display element of an electronics screen
- instructions for the computer
- computer people may use the term for capability and time
- machinery and
- to write and post an entry in a weblog
- a scam to steal valuables
15 Clues: machinery and • a small text file up • a scam to steal valuables • instructions for the computer • the computing part of the computer • to write and post an entry in a weblog • a large network made up of little networks • the address that defines the route to a file • an inhouse website that serves employees only • a hardware interface for up to 127 peripherals • ...
The Thing About Jellyfish Vocabulary 2023-11-20
Across
- "The telethon was broadcast _____________ on 31 US networks"
- "They had reached an ____ agreement"
- "She ______ in the yard, enjoying the warm sunshine"
- Having had all moisture removed, dried out.
- "His theory of the _____ of life"
- The use of irony to mock or convey contempt.
- Requiring immediate action or attention.
Down
- In a casually calm and relaxed manner.
- A scientist who studies the universe.
- An organism or cell that is genetically identical.
- "A ____ needle, free of bacteria"
- Make a slight involuntary grimace or shrinking movement of the body out of pain.
- An acute loss of blood from a damaged blood vessel"
- "Madeleine was still an _____ to him.
- A Japanese poem.
15 Clues: A Japanese poem. • "A ____ needle, free of bacteria" • "His theory of the _____ of life" • "They had reached an ____ agreement" • A scientist who studies the universe. • "Madeleine was still an _____ to him. • In a casually calm and relaxed manner. • Requiring immediate action or attention. • Having had all moisture removed, dried out. • ...
IT revision 2025-02-10
Across
- printed output
- Program or hardware device or both that filter the information coming through the internet preventing unauthorized person
- made up of keys
- MOdulator-DEModulator
- raw facts
- a set of rules that govern how computers are to communicate
- A set of characters which uniquely identifies a user
- the clarity of an image
- A computer publication on the Internet’s World Wide Web
- identification system that uses body parts
Down
- Networks that are set up in large companies so that employees can access
- physical parts of a computer
- a collection of tables
- To transfer data from one computer to a remote computer
- a connection of nodes sharing information
15 Clues: raw facts • printed output • made up of keys • MOdulator-DEModulator • a collection of tables • the clarity of an image • physical parts of a computer • a connection of nodes sharing information • identification system that uses body parts • A set of characters which uniquely identifies a user • To transfer data from one computer to a remote computer • ...
Crossword I 2024-10-13
Across
- A block of organized, reusable code
- A device that forwards data between networks
- A hardware or software component that stores data temporarily
- A structured set of data stored electronically
- The process of identifying and fixing errors
- A machine that provides data to other computers
- A display screen for a computer
Down
- The device that receives services from a server
- A virtual private network used for secure connections
- A network security system that monitors traffic
- A secret code used for authentication
- An input device for typing text
- A popular front-end web framework
- Remote servers that store, manage, and process data
- A set of functions and procedures for building software
15 Clues: An input device for typing text • A display screen for a computer • A popular front-end web framework • A block of organized, reusable code • A secret code used for authentication • A device that forwards data between networks • The process of identifying and fixing errors • A structured set of data stored electronically • The device that receives services from a server • ...
Computer Science 2025-08-12
Across
- – Finding and fixing errors in code.
- – Online storage and services accessed via the internet.
- – Two or more computers connected to share data.
- – Protecting computers and networks from attacks.
- – The physical parts of a computer.
- – Data or commands entered into a computer.
Down
- – A device used to type into a computer.
- – A global network that connects computers.
- – Scrambling data to keep it secure.
- – Information a computer gives back after processing.
- – Step-by-step instructions to solve a problem.
- – A way computers store data using 0s and 1s.
- – Instructions written for a computer to follow.
- – Programs that run on a computer.
- – Facts or information stored on a computer.
15 Clues: – Programs that run on a computer. • – The physical parts of a computer. • – Scrambling data to keep it secure. • – Finding and fixing errors in code. • – A device used to type into a computer. • – A global network that connects computers. • – Data or commands entered into a computer. • – Facts or information stored on a computer. • ...
Homework 2023-01-25
Across
- The acceptance of or mental capacity to accept contary opinions
- Biased information or misleading
- Fail to resist pressure or temptation
- Percieved materalistic values or conventional atitudes
- Willingness to allow existence of opinions you dont agree with
- Intense enjoyment
- Practice of refraining
Down
- a secret plan by a group to do something unlawful
- offering nothing that is challenging
- matured by age
- Special words or expression that are used by a particualr profession
- systems that propel cylindrical containers thru networks of tubes
- A politcal or economical theory of social organization which advocates means of production
- Action of subjecting a country or person to ones control
- discover the presence of
15 Clues: matured by age • Intense enjoyment • Practice of refraining • discover the presence of • Biased information or misleading • offering nothing that is challenging • Fail to resist pressure or temptation • a secret plan by a group to do something unlawful • Percieved materalistic values or conventional atitudes • Action of subjecting a country or person to ones control • ...
5/6M - Week 9 2025-09-11
Across
- — Make a happy sound when something is funny.
- — Real or genuine; not fake.
- — Your parent’s sister (or your uncle’s wife).
- — Unfriendly or harsh; not welcoming.
- — The basic systems a place needs—roads, power, and networks.
- — Gave a lesson; past tense of “teach.” (Sounds like “taut.”)
Down
- — To clap or show approval after a performance.
- — A full body flip forward or backward.
- — A sale where people bid and the highest offer wins.
- — Chances or possibilities for future success.
- — Pulled tight; not slack.
- — Wrong ideas or beliefs based on misunderstanding.
- — A small, shiny trinket or Christmas-tree ornament.
- — Care taken to avoid danger; a warning.
- — An official count of a country’s people.
15 Clues: — Pulled tight; not slack. • — Real or genuine; not fake. • — Unfriendly or harsh; not welcoming. • — A full body flip forward or backward. • — Care taken to avoid danger; a warning. • — An official count of a country’s people. • — Make a happy sound when something is funny. • — Chances or possibilities for future success. • — Your parent’s sister (or your uncle’s wife). • ...
U11 Cyber Threats 2025-09-30
Across
- Malicious code that attaches to files and spreads when opened.
- Malware disguised as legitimate software.
- Deliberate destruction or disruption of systems.
- Tool that records every keystroke made by a user.
- Fake alerts designed to trick users into downloading malware.
- Software that hides the existence of malware.
- Intercepting data packets on a network.
- Publishing private information about someone online.
Down
- Fraudulent attempt to obtain sensitive information via email.
- Software that secretly monitors user activity.
- Network of infected devices controlled remotely.
- Malware that encrypts data and demands payment.
- Self-replicating malware that spreads across networks.
- Hidden method of bypassing normal authentication.
- Impersonating another device or user to gain access.
15 Clues: Intercepting data packets on a network. • Malware disguised as legitimate software. • Software that hides the existence of malware. • Software that secretly monitors user activity. • Malware that encrypts data and demands payment. • Network of infected devices controlled remotely. • Deliberate destruction or disruption of systems. • ...
NETWORK 2026-03-04
Across
- Layer responsible for frames and MAC addressing
- Highest layer of the OSI model providing services to applications
- Address used to send data to all devices on a network
- Number system using only zeros and ones
- Communication method with a dedicated path
- Value determining how long DNS data is cached
Down
- Process of assigning authority for domain zones
- Layer responsible for reliable delivery of data
- Layer responsible for routing packets
- Layer responsible for transmitting bits through media
- IP address accessible from the Internet
- Process of giving an IP address to a device
- Network method where data is sent in small packets
- IP address used inside local networks
- Organization that manages domain registration
15 Clues: Layer responsible for routing packets • IP address used inside local networks • IP address accessible from the Internet • Number system using only zeros and ones • Communication method with a dedicated path • Process of giving an IP address to a device • Organization that manages domain registration • Value determining how long DNS data is cached • ...
Chapter 2 Vocab 2025-02-19
Across
- A signal used in wireless networks indicating that a computer has data ready to send on the network.
- to share available bandwidth.
- Point A wireless device that serves as the central connection point of a wireless LAN and mediates communication between wireless
- A signal an AP generates in response to a request-to-send signal. A CTS signal indicates that the computer that sent an RTS can transmit data
- The address configured in a computer’s IP address settings specifying the address of a router to which the computer can send packets addressed to devices on other networks.
- A network design in which interconnecting devices allow only one connected device to transmit data at a time, thus requiring
- The scope of devices to which broadcast frames are forwarded.
- A routing table entry that tells a router where to send a packet with a destination network address that can’t be found in the routing table.
- A network design in which interconnecting devices allow only one connected device to transmit data at a time, thus requiring
- A designated port on a hub or switch used to connect to another hub or switch without using a crossover cable.
Down
- A network message intended to be processed by all devices on a LAN; it has the destination address FF:FF:FF:FF:FF:FF.
- The name assigned to a wireless network that is configured on the wireless access point.
- A network message addressed to only one computer on the LAN. PREV
- Making a connection between devices such as two switches, usually for the purpose of expanding a network.
- A network device that performs the same function as a repeater but has several ports to connect a number of devices; sometimes called a multiport repeater
- a multiport repeater
- to share available bandwidth.
- A network device that takes incoming signals and regenerates, or repeats, them to other parts of the network.
- A device that enables LANs to communicate with one another by forwarding packets from one LAN to another
- A network device that performs the same function as a repeater but has several ports to connect a number of devices; sometimes
20 Clues: a multiport repeater • to share available bandwidth. • to share available bandwidth. • The scope of devices to which broadcast frames are forwarded. • A network message addressed to only one computer on the LAN. PREV • The name assigned to a wireless network that is configured on the wireless access point. • ...
My Internet Crossword 2018-03-29
Across
- / Interface Process Messenger
- Layer / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
- Layer / Translates or converts the data from the Application Layer so that it can be read by the Application layer of the receiving computer—it does this in standard ways, such as converting text to ASCII or HTML, graphics to jpg or gif, or video to QuickTime or AVI.
- Application Layer / is the interface that the user sees and interacts with, allowing the user to “click send” to send an email, for example, or move a file from a local computer to a network drive.
- Layer / Controls the communication link or session between the sending and receiving computers (starts and stops communication)
Down
- Layer / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level.
- / ipconfig, ping, nslookup, tracert
- / TCP—both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number…
- / will provide the path taken between computers
- control / control—message from receiving computer that packets have been received and the next one can be sent.
- Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP
- / = about 4.3 billion (2^32) We have run out! Hence…
- responsible for determining the path that packets take as they are routed on networks.
13 Clues: / Interface Process Messenger • / ipconfig, ping, nslookup, tracert • / will provide the path taken between computers • / = about 4.3 billion (2^32) We have run out! Hence… • Layer / Addresses the packets for delivery (IP number)—networks use TCP/IP • responsible for determining the path that packets take as they are routed on networks. • ...
virus vocab -Natalie m 2018-04-11
Across
- a standalone malware computer program that replicates itself in order to spread
- sending email to receive personal information from someone
- the gulf between those who have ready access to computers and the Internet,
- copy (data) from one computer system to another,
- a person who uses computers to gain unauthorized access to data
- a group or system of interconnected people or things
- a small electronic device containing flash memory
- operating information used my computers
Down
- a type of malware that is disguised as software
- an infection agent
- a global computer network providing a variety of information
- a digital letter
- stealing someone's private information
- distributed denial of service
- designed to detect and destroy computer viruses.
15 Clues: a digital letter • an infection agent • distributed denial of service • stealing someone's private information • operating information used my computers • a type of malware that is disguised as software • copy (data) from one computer system to another, • designed to detect and destroy computer viruses. • a small electronic device containing flash memory • ...
Technology Vocabulary 2021-07-28
Across
- any small compartment
- crime committed using a computer and the internet
- a list of questions that are frequently asked (about a given topic) along with their answers
- having an output that is proportional to the input
- program used to view HTML documents
- an organized body of related information
- the exclusive right to sell a work
Down
- a worldwide network of computer networks
- adjusting the parts of something in relation to each other
- compact disk that used with a computer
- set up for a particular purpose
- data transmission rate for modems
- a program that gives a computer instructions
- locate and correct errors in a computer program code
- unit of measurement of information
15 Clues: any small compartment • set up for a particular purpose • data transmission rate for modems • unit of measurement of information • the exclusive right to sell a work • program used to view HTML documents • compact disk that used with a computer • a worldwide network of computer networks • an organized body of related information • a program that gives a computer instructions • ...
Chung Hwa Middle School, BSB Year 8 Social Studies 2019 2019-08-24
Across
- Japanese Military Police
- This country was invaded by Germany in 1939
- refer to rain/hail or snow
- information circulated to promote political cause [mostly biased]
- keeper international soldiers/group who are deployed to help to bring peace and stability
- – Energy from plants and animals
- person who visits places
- Lines run east to west around the earth, measured in degrees
- group who are deployed to help to bring peace and stability
Down
- travel to an important religious site
- natural home of an animal, plant or other organism
- periods of unusually hot weather
- degree to which places are connected by communication networks
- visitors explore nature
- explanatory symbol on maps
15 Clues: visitors explore nature • Japanese Military Police • person who visits places • refer to rain/hail or snow • explanatory symbol on maps • periods of unusually hot weather • – Energy from plants and animals • travel to an important religious site • This country was invaded by Germany in 1939 • natural home of an animal, plant or other organism • ...
Excretory System 24 2024-02-06
Across
- releases urine through this small tube
- worn out red blood cells turn into
- _____ glands that help the body rid of excess salt, urea and water.
- large organ that plays a role in removing waste
- sweating helps the body maintain ________
- covers 1.5-2 square meters of space
- kidney, urethra, bladder, and ureters.
- excess proteins and breaks them down into _____
- 95% of the urine is this
- kidneys can filter this much blood per minute
Down
- stores up to about 470mL of urine
- transport the urine from the kidneys
- Main job of the Excretory system is to ________waste.
- there are how many kidneys
- millions of these complex networks of tubes and capillaries.
15 Clues: 95% of the urine is this • there are how many kidneys • stores up to about 470mL of urine • worn out red blood cells turn into • covers 1.5-2 square meters of space • transport the urine from the kidneys • releases urine through this small tube • kidney, urethra, bladder, and ureters. • sweating helps the body maintain ________ • kidneys can filter this much blood per minute • ...
community 2025-01-23
Across
- - Where your crypto assets are stored securely.
- - Essential for smooth swapping and trading in DeFi.
- - The platform's reward system for community engagement.
- - Earning rewards by locking up crypto assets.
- - The ability of different blockchain networks to communicate and work together.
- - Ecosystem with 50+ EVM and Non-EVM chains.
- - A term describing interaction between multiple blockchains.
Down
- - A major benefit of using Galaxy Exchange.
- - The study and design of token economies.
- - Galaxy Exchange's contribution to the future of Web3.
- - Exchange one cryptocurrency for another.
- - A key advantage of Galaxy Exchange transactions that all.
- - A core principle of blockchain technology.
- - A feature allowing the transfer of assets across blockchains.
- - Describes Galaxy Exchange's smooth user experience.
15 Clues: - The study and design of token economies. • - Exchange one cryptocurrency for another. • - A major benefit of using Galaxy Exchange. • - A core principle of blockchain technology. • - Ecosystem with 50+ EVM and Non-EVM chains. • - Earning rewards by locking up crypto assets. • - Where your crypto assets are stored securely. • ...
browsing safely 2025-05-29
Across
- bullying act of harming or harassing using technology
- program used to identify and remove viruses
- use of illegal methods to get money
- criminal activity used to harm anyone using the internet
- a set of programs that disrupts the functioning of a compute
- hoaxing or misleading
- process of 'befriending children' on social media
Down
- to conduct terrorism using a computer
- sending an email to an user and misleading them to believe its from a trusted account
- unethical hackers
- helps prevent unauthorised access to your computer
- victim is attacked and then forced to pay money
- misusing someone's personal information
- to protect networks or your devices
- illegal entry into computer system
15 Clues: unethical hackers • hoaxing or misleading • illegal entry into computer system • use of illegal methods to get money • to protect networks or your devices • to conduct terrorism using a computer • misusing someone's personal information • program used to identify and remove viruses • victim is attacked and then forced to pay money • ...
computer communications 2025-10-09
Across
- an acronym for vpn
- a wireless technology used in computer networks
- someone has made up a network without permission and tries to steal data
- sending and receiving messages
- a portable computer
- numbers or symbols used to find your exact location
Down
- a collection a service that runs on the internet
- a global device that can connect multiple devices together
- cables that uses light
- data transmitted through copper cables
- someone creates a fake account and pretends to be them
- two or more connected devices for communication
- a small symbol to show your network is private and needs a password to access it.
- service set identifier
- give a portion of something to someone
15 Clues: an acronym for vpn • a portable computer • cables that uses light • service set identifier • sending and receiving messages • data transmitted through copper cables • give a portion of something to someone • a wireless technology used in computer networks • two or more connected devices for communication • a collection a service that runs on the internet • ...
SUM PRODUCT ALGORITHM 2025-11-04
Across
- State when beliefs stop changing significantly
- Mathematical description of possible values and their likelihood
- Relating to probabilistic reasoning or networks
- Node that represents a random variable in a factor graph
- Measure of uncertainty represented in each variable
- Final probability distribution computed for each variable
- Estimated probability of a variable after message passing
- Structure of variables and factors used in sum product algorithm
Down
- Connection between variable and factor nodes
- Combined probability distribution over multiple variables
- Step to ensure probabilities sum to one
- Repeated message updates until convergence
- Function connecting variables in a factor graph
- Information passed between nodes in belief propagation
- Process of computing unknown probabilities using known factors
15 Clues: Step to ensure probabilities sum to one • Repeated message updates until convergence • Connection between variable and factor nodes • State when beliefs stop changing significantly • Relating to probabilistic reasoning or networks • Function connecting variables in a factor graph • Measure of uncertainty represented in each variable • ...
IT 2025-12-14
Across
- A set of instructions for solving a problem
- A security system that blocks unauthorized access
- The act of entering your username and password
- Converting information into a code for security
- A computer that provides data or services to others
- A secret word or phrase to access an account
- An organized collection of information
Down
- A program that can damage files or systems
- Software designed to harm a computer or network
- Programs that run on a computer
- A copy of data to prevent loss
- A device that directs data between networks
- A group of connected computers
- The physical parts of a computer
- Storing data online instead of on a local device
15 Clues: A copy of data to prevent loss • A group of connected computers • Programs that run on a computer • The physical parts of a computer • An organized collection of information • A program that can damage files or systems • A set of instructions for solving a problem • A device that directs data between networks • A secret word or phrase to access an account • ...
Ariel Cybersecurity Crossword 2026-04-03
Across
- Locks your files and asks for money.
- Malware that spreads by itself on networks.
- Security Keeping data safe from being stolen.
- Breach When private info gets stolen.
- Fake messages that try to steal your info.
- Watches what you do without you knowing.
Down
- Authentication Uses two steps to log in for extra safety.
- Blocks bad traffic from entering your computer.
- A secret word to log into accounts.
- Bad software that can hurt your computer.
- Hides in a computer so hackers can control it.
- A program that spreads and damages files.
- Turns data into a secret code.
- Citizenship Being safe and respectful online.
- Security Protecting a network from hackers.
15 Clues: Turns data into a secret code. • A secret word to log into accounts. • Locks your files and asks for money. • Watches what you do without you knowing. • Bad software that can hurt your computer. • A program that spreads and damages files. • Breach When private info gets stolen. • Fake messages that try to steal your info. • Malware that spreads by itself on networks. • ...
information technology 2021-08-19
Across
- text that when clicked takes the user to a webpage
- he programs and other operating information used by a computer
- organized collection of information, data
- computer program designed to help people perform an activity
- between a plug or connector
- wireless technology exchange data
- one of the small dots or squares that make up an image on a computer screen
- servers, networks, databases, websites, computer hardware and etc
Down
- data measurement
- monitoring and controlling the movement of a craft or vehicle from one place to another
- network security device
- servers, mainframes, network devices
- navigating between web and page
- separate fragments
- electronic device for storing and processing data
15 Clues: data measurement • separate fragments • network security device • between a plug or connector • navigating between web and page • wireless technology exchange data • servers, mainframes, network devices • organized collection of information, data • electronic device for storing and processing data • text that when clicked takes the user to a webpage • ...
TECHNOLOGY VOCABULARY 2021-07-26
Across
- an organized body of related information
- any small compartment
- a worldwide network of computer networks
- a set of related records kept together
- transfer out of a database or document
- fix a computer program piecemeal until it works
- the exclusive right to sell a work
- software that is provided without charge
Down
- transfer a file or program to a smaller computer
- a listing of the computer files stored in memory
- user interface a user interface based on graphics instead of text
- a program used to view HTML documents
- crime committed using a computer and the internet
- a unit of measurement of information
- page the opening page of a web site
15 Clues: any small compartment • the exclusive right to sell a work • page the opening page of a web site • a unit of measurement of information • a program used to view HTML documents • a set of related records kept together • transfer out of a database or document • an organized body of related information • a worldwide network of computer networks • ...
Texas History Crossword 2022-04-21
Across
- A financial gain
- Established the first French colony in Texas
- Return to a normal state
- The worldwide computer network that connects other computer networks
- A form of natural disaster, one happened in Galveston in 1900
- The Earth's atmosphere and beyond
- Where the biggest amount of oil was discovered in Texas
- Sectors of an economy
- The kind of livestock that cowboys took east to be sold
Down
- A form of protest where protestors occupy a place and refuse to leave
- Texas has the biggest amount of this in the US
- A long period of economic decline
- The act of competing
- The banning of alcohol in the 20th century
- Period of severe dust storms
15 Clues: A financial gain • The act of competing • Sectors of an economy • Return to a normal state • Period of severe dust storms • A long period of economic decline • The Earth's atmosphere and beyond • The banning of alcohol in the 20th century • Established the first French colony in Texas • Texas has the biggest amount of this in the US • ...
snair bear 2017-12-08
Across
- a sweet treat
- The fundamental display element of an electronic screen
- fat band members
- A series of instructions that performs a particular task
- a scam to steal valuable information such as credit card and social security numbers
- The address that defines the route to a file on an Internet server
- an annoying mom writes this
Down
- locally stored data
- large network made up of smaller networks
- An organization that provides access to the Internet
- An external hard disk drive or optical disc drive that plugs into the ___ port
- An in-house website that serves employees only
- computer machinery and equipment
- the processer of a computer
- a wall made of my mixtapes
15 Clues: a sweet treat • fat band members • locally stored data • a wall made of my mixtapes • the processer of a computer • an annoying mom writes this • computer machinery and equipment • large network made up of smaller networks • An in-house website that serves employees only • An organization that provides access to the Internet • ...
Tech Vocab 2019-05-20
Across
- a scam to steal valuables
- the computing part of the computer
- a large network made up of little networks
- a small text file up
- to write and post an entry in a weblog
- computer people may use the term for capability and time
- machinery and
- the address that defines the route to a file
Down
- an organization that provides access to the internet
- to store data locally in order to speed up subsequent retrieval
- an inhouse website that serves employees only
- the fundamental display element of an electronics screen
- a hardware interface for up to 127 peripherals
- instructions for the computer
- the primary method for keeping secure from intruders
15 Clues: machinery and • a small text file up • a scam to steal valuables • instructions for the computer • the computing part of the computer • to write and post an entry in a weblog • a large network made up of little networks • the address that defines the route to a file • an inhouse website that serves employees only • a hardware interface for up to 127 peripherals • ...
Tech Vocab 2019-05-20
Across
- the fundamental display element of an electronics screen
- the computing part of the computer
- a scam to steal valuables
- the address that defines the route to a file
- an inhouse website that serves employees only
- the primary method for keeping secure from intruders
- instructions for the computer
Down
- an organization that provides access to the internet
- a small text file up
- to store data locally in order to speed up subsequent retrieval
- a large network made up of little networks
- computer people may use the term for capability and time
- machinery and
- to write and post an entry in a weblog
- a hardware interface for up to 127 peripherals
15 Clues: machinery and • a small text file up • a scam to steal valuables • instructions for the computer • the computing part of the computer • to write and post an entry in a weblog • a large network made up of little networks • the address that defines the route to a file • an inhouse website that serves employees only • a hardware interface for up to 127 peripherals • ...
Biological approach psychology 2023-03-06
Across
- emotional centre of our brain
- genetic structure of an organism inherited from parent
- when one structure in our brain is responsible for a specific function
- degree to which a trait is shared between two or more groups/individuals
- drugs that block the function of a neurotransmitter
- happens when we learn new things
- selection survival of the fittest
- chemical messengers made by endocrine glands
Down
- observable characteristics of an organism resulting from environment and genes
- enhance effect of neurotransmitter
- happens when we forget things
- ability of our neural networks to change
- inhibortor of acetylcholine
- chemical substance that mimic or enhance effect of neurotransmitter
- study of environmental influences on gene expression
15 Clues: inhibortor of acetylcholine • emotional centre of our brain • happens when we forget things • happens when we learn new things • selection survival of the fittest • enhance effect of neurotransmitter • ability of our neural networks to change • chemical messengers made by endocrine glands • drugs that block the function of a neurotransmitter • ...
Network Reform crossword 2025-06-27
Across
- Electric potential difference in the network.
- Consistency of power supply without interruptions.
- Complete loss of power in an area.
- Linking of different parts of the power system.
- Australian Energy Market Commission, responsible for rule-making and market development.
- Process of preparing for future grid needs.
- Australian Energy Market Operator, manages electricity and gas systems.
Down
- System for buying and selling electricity.
- Network that delivers electricity from substations to consumers.
- Pricing schedule for electricity services.
- Regulatory mechanism to encourage efficiency.
- High-voltage network transporting electricity over long distances.
- Australian Energy Regulator, oversees electricity and gas networks.
- Amount of electricity consumed at a given time.
- Small-scale energy sources connected to the grid.
15 Clues: Complete loss of power in an area. • System for buying and selling electricity. • Pricing schedule for electricity services. • Process of preparing for future grid needs. • Electric potential difference in the network. • Regulatory mechanism to encourage efficiency. • Linking of different parts of the power system. • Amount of electricity consumed at a given time. • ...
Groups & Formal Organizations Project 2025-09-26
6 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • How much can you learn about someone just by identifying the groups and social networks they belong to?
AI 2024-02-09
8 Clues: What is the future of AI • What is Microsoft's AI named • What do neural networks mimic • What does the I stand for in AI • Is machine learning a subset of AI • Is AI safe using Bing Chat Enterprise • What is Microsoft's search engine named • What field focuses on language understanding by computers
Impacts of Artificial Intelligence 2021-05-01
Across
- A sub-discipline of AI
- Challenges posed by AI
- The final layer of an artificial neural network
- It involves nothing more than filtering an image
- A technology capable of identifying places, people, objects and many other types of elements within an image
Down
- Annual world summit sponsored by the United Nations
- Another application field of AI
- It involves the construction of brain-inspired systems of artificial neural networks
- The father of AI
- An application field of AI
10 Clues: The father of AI • A sub-discipline of AI • Challenges posed by AI • An application field of AI • Another application field of AI • The final layer of an artificial neural network • It involves nothing more than filtering an image • Annual world summit sponsored by the United Nations • It involves the construction of brain-inspired systems of artificial neural networks • ...
Networking 2018-03-27
Across
- an encryption method used in wireless networks
- No access to other users files
- a method of avoiding data collisions
- Data is sent 3 times, at least two will arrive correctly
- Cheaper than other topology option
Down
- An even or odd system to check binary data is correct
- A white list can be made from these to secure a network
- All computers have equal status
- Will fail if central hub stops working
- Locally unique identification of the network
10 Clues: No access to other users files • All computers have equal status • Cheaper than other topology option • a method of avoiding data collisions • Will fail if central hub stops working • Locally unique identification of the network • an encryption method used in wireless networks • An even or odd system to check binary data is correct • ...
Mobile and Wireless Networking 2025-05-20
Across
- Common wireless network used in homes and offices
- Method used to secure wireless communication
- Set of rules for data transmission in networks
- Device that boosts wireless signal range
Down
- A place that offers wireless internet access
- Portable device for calling, browsing, and apps
- Wireless method using light waves for short-range communication
- Mobile network used for voice and data communication
- Device that directs traffic in a wireless network
- Wireless technology for short-range data exchange
10 Clues: Device that boosts wireless signal range • A place that offers wireless internet access • Method used to secure wireless communication • Set of rules for data transmission in networks • Portable device for calling, browsing, and apps • Common wireless network used in homes and offices • Device that directs traffic in a wireless network • ...
FOR3701 Learning Unit 1 Cellphone 2025-08-06
Across
- control centre of a cellphone
- principle related to leaving traces
- principle established in 2006 regarding cellphone technology
- without this cellphone communication is not possible
- can also be subpoenaed to make available the radius of their towers
Down
- geographic coverage areas relating to a cellular network
- Mobile stations are known as
- legislation has proven useful in helping police secure convictions with intercepted cellphone evidence.
- type of communication used by cellphones
- will assist an investigator obtain subscribers data
10 Clues: Mobile stations are known as • control centre of a cellphone • principle related to leaving traces • type of communication used by cellphones • will assist an investigator obtain subscribers data • without this cellphone communication is not possible • geographic coverage areas relating to a cellular network • ...
Kiara 2025-07-22
Across
- Young people spend the day in front of the screens, it generates ………
- Virtual assistant
- The …………. generated by the networks is worrying
- Cyberbulling generates depression and …….
- Tik tok, Instagram and Youtube are forms of…..
- We entertain and spend hours on……
Down
- Just like in the real world, in the digital world we are...
- Thanks to the internet we have …………. with everyone
- Purchase and sale through the internet and other digital platforms
- We confused it with being sad.
10 Clues: Virtual assistant • We confused it with being sad. • We entertain and spend hours on…… • Cyberbulling generates depression and ……. • Tik tok, Instagram and Youtube are forms of….. • The …………. generated by the networks is worrying • Thanks to the internet we have …………. with everyone • Just like in the real world, in the digital world we are... • ...
The Networking Concepts Puzzle 2025-06-23
Across
- – Device that connects your home to the internet.
- – A group of computers linked to share resources.
- – Device used to connect multiple computers in a network.
- – Network within a small area like a home or school
- – Short-range wireless communication technology
Down
- – Any device connected to a network.
- – Device that connects multiple networks together.
- – Wireless way of connecting to the internet.
- – Network spread across a large area
- – A basic device that connects multiple devices in a network.
10 Clues: – Any device connected to a network. • – Network spread across a large area • – Wireless way of connecting to the internet. • – Short-range wireless communication technology • – Device that connects your home to the internet. • – A group of computers linked to share resources. • – Device that connects multiple networks together. • ...
hw 2026-02-20
Across
- – Software used for disk imaging and cloning.
- – The CPU; executes instructions in a computer.
- Administration – Management and maintenance of servers and networks.
- – Low-level software embedded in hardware devices.
Down
- – Facility that houses servers and network equipment.
- – Process of copying an entire hard drive image.
- – Windows tool used to prepare a system image for deployment.
- – A smaller system that is part of a larger system.
- – Computer that provides services to clients.
- – Popular open-source server operating system.
10 Clues: – Software used for disk imaging and cloning. • – Computer that provides services to clients. • – Popular open-source server operating system. • – The CPU; executes instructions in a computer. • – Process of copying an entire hard drive image. • – Low-level software embedded in hardware devices. • – A smaller system that is part of a larger system. • ...
Crossword Puzzle 2024-04-27
Across
- - Process of transferring data from a remote server to a local device.
- - Process of encoding data to make it unreadable without authorizatio.
- - Wireless technology for short-range data exchange.
- - Duplicate copy of data for recovery purposes.
- - Malicious software disrupting computer operations.
Down
- - Language for creating web pages.
- - Deliberate exploitation of computer systems or networks.
- - Organized collection of data.
- - Personal computer designed for use on a desk.
- - Remote storage and computing services accessible via the internet.
10 Clues: - Organized collection of data. • - Language for creating web pages. • - Personal computer designed for use on a desk. • - Duplicate copy of data for recovery purposes. • - Wireless technology for short-range data exchange. • - Malicious software disrupting computer operations. • - Deliberate exploitation of computer systems or networks. • ...
My Dream Job Software Developer 2024-12-15
Across
- A tool used to test software applications.
- Platform used for storing code and collaborating on projects.
- A collaborative method for software development.
- Software that translates written code into instructions a computer can understand.
- Programming language used for web development.
- Popular programming language for machine learning and data science.
Down
- Process of finding and fixing errors in code.
- Commonly used database system.
- The global system of interconnected computer networks.
- A reusable solution to a common problem in programming.
10 Clues: Commonly used database system. • A tool used to test software applications. • Process of finding and fixing errors in code. • Programming language used for web development. • A collaborative method for software development. • The global system of interconnected computer networks. • A reusable solution to a common problem in programming. • ...
MALWARE ANALYSIS QUIZ - B 2025-04-15
Across
- makes the code harder to understand
- Process Monitor combines features of Filemon and
- primarily used for identifying Devices or systems
- A common technique to analyze shellcode in a controlled environment is to use a
- Disassemblers help understand code without
Down
- Shellcode is typically written in
- In assembly, arithmetic operations are usually followed by
- A common tool used for analyzing shellcode is
- A patch that fixes security vulnerabilities is often called a
- Wireshark can capture data from
10 Clues: Wireshark can capture data from • Shellcode is typically written in • makes the code harder to understand • Disassemblers help understand code without • A common tool used for analyzing shellcode is • Process Monitor combines features of Filemon and • primarily used for identifying Devices or systems • In assembly, arithmetic operations are usually followed by • ...
Threats to computer systems and networks (J277) 2025-06-02
Across
- A self-propagating malware that does not need a host program.
- A type of malware that self-replicates and spreads between computers.
- A malicious program disguised as legitimate software.
- Phishing attempts conducted via SMS messages.
- A system that SQL injection attacks target.
- Manipulating people into divulging confidential information.
- Malware that encrypts data and demands payment for its release.
- Software that automatically displays unwanted advertisements.
- Creating a false scenario to trick someone into giving information.
- A DoS attack launched from multiple compromised systems (acronym).
- An attack that tries every possible combination to guess credentials.
Down
- Malware that collects information about users without their knowledge.
- An attack aimed at disrupting a service by overwhelming it (acronym).
- An attack that exploits vulnerabilities in database queries.
- An attack that floods a system with traffic to make it unavailable (acronym).
- Malicious software designed to disrupt or damage computer systems.
- A social engineering attack using deceptive emails or websites to trick users.
- Phishing attempts conducted via voice calls.
- Illegally taking data from a system.
- An attack where data is secretly monitored during transmission.
- A social engineering technique involving looking over someone's shoulder to steal information.
21 Clues: Illegally taking data from a system. • A system that SQL injection attacks target. • Phishing attempts conducted via voice calls. • Phishing attempts conducted via SMS messages. • A malicious program disguised as legitimate software. • An attack that exploits vulnerabilities in database queries. • Manipulating people into divulging confidential information. • ...
African States' Impact on Networks of Exchange 2025-10-02
Across
- – Malian ruler whose pilgrimage to Mecca displayed immense wealth and promoted Islam abroad.
- – Religious structures built across Mali and Swahili cities, reflecting Islamic influence.
- – String of East African city-states that thrived as middlemen in Indian Ocean trade.
- – Valued commodity in Mali that symbolized its role as a center of learning and scholarship.
- – Blending of African traditions with Islam in religion, language, and culture.
- – Key African export carried from both Mali and Swahili Coast into wider markets.
- – Early West African kingdom that prospered from controlling trans-Saharan trade before Mali.
- – West African state that succeeded Mali and expanded control over trade.
Down
- – Malian city known for trade, Islamic scholarship, and its famous learning centers.
- – Human captives exported from Africa along trans-Saharan and Indian Ocean routes.
- – Important Swahili port that prospered from ivory, spice, and slave trade.
- – Seasonal winds that allowed merchants to time voyages safely in the Indian Ocean.
- – Prominent Swahili city-state that grew wealthy from controlling regional trade.
- – Indian Ocean commodity that Swahili ports exchanged along with ivory and slaves.
- – Exchange system where West African gold was traded for North African salt.
- – Precious metal exported from both West Africa and Swahili ports, fueling global demand.
- – Merchant settlements of Arabs, Persians, and Indians in Swahili ports that spread culture and commerce.
- – West African state that thrived by dominating the gold-salt trade and spreading Islam.
- – Religion that spread into West and East Africa through trade, shaping politics and culture.
- – Groups of merchants and camels that connected Mali to North Africa across the Sahara.
20 Clues: – West African state that succeeded Mali and expanded control over trade. • – Important Swahili port that prospered from ivory, spice, and slave trade. • – Exchange system where West African gold was traded for North African salt. • – Blending of African traditions with Islam in religion, language, and culture. • ...
technology 2018-04-04
Across
- fundamental display element of an electronic screen
- to store data locally in order to speed up subsequent retrievals
- a large network made up of smaller networks
- inhouse website that serves employees only
- the most widely used hardware interface for attaching peripherals to a computer
- a small text file
- organization that provides access to the internet
Down
- the address that defines the route to a file on an internet server
- primary method for keeping a computer secure from intruders
- machinery and equipment
- term for capability and time
- instructions for a computer
- a scam to steal valuable information
- to write and post an entry
- the computing part of the computer
15 Clues: a small text file • machinery and equipment • to write and post an entry • instructions for a computer • term for capability and time • the computing part of the computer • a scam to steal valuable information • inhouse website that serves employees only • a large network made up of smaller networks • organization that provides access to the internet • ...
Chapter 3 2012-09-05
Across
- To return to your home page
- Each time you search for something on the Web
- Text, a button, or a graphic
- Feature allows you to create a list of links for sites
- Answers to a query
- When one computer links to another computer
- Allows you to return to the previous page
Down
- Feature shows you a list of links for sites you've recently visited
- Electronic transfer of messages
- The buying and selling of products on the internet
- A web of computer networks that spans the Earth
- Powerful computers
- Allows users to post messages for others to read
- To return to the page you just left
- Feature to find information
15 Clues: Powerful computers • Answers to a query • To return to your home page • Feature to find information • Text, a button, or a graphic • Electronic transfer of messages • To return to the page you just left • Allows you to return to the previous page • When one computer links to another computer • Each time you search for something on the Web • ...
Technology vocabulary 2021-06-16
Across
- a part of RAM used for temporary storage of data.
- a worldwide network of computer networks.
- any small compartment.
- an organized body of related informático.
- set up for a particular purpose.
- the exclusive right to sell a Work.
Down
- crime committed using a computer and the Internet.
- a data transmission rate for modems.
- transfer out of a database or document
- a program used to view HTML documentos.
- any computer that is hooked up to a computer network.
- the symbolic arrangement of data in a computer program.
- having an output that is proportional to the input.
- adjusting the parts of something in relation to each other.
- a unit of measurement of informático.
15 Clues: any small compartment. • set up for a particular purpose. • the exclusive right to sell a Work. • a data transmission rate for modems. • a unit of measurement of informático. • transfer out of a database or document • a program used to view HTML documentos. • a worldwide network of computer networks. • an organized body of related informático. • ...
tegnology vocabulary 2021-06-23
Across
- a part of RAM used for temporary storage of data
- a worldwide network of computer networks
- any small compartment
- an organized body of related information
- set up for a particular purpose
- the exclusive right to sell a work
Down
- crime committed using a computer and the internet
- a data transmission rate for modems
- transfer out of a database or document
- a program used to view HTML documents
- any computer that is hooked up to a computer ne
- the symbolic arrangement of data in a computer program
- having an output that is proportional to the input
- adjusting the parts of something in relation to each other
- a unit of measurement of information
15 Clues: any small compartment • set up for a particular purpose • the exclusive right to sell a work • a data transmission rate for modems • a unit of measurement of information • a program used to view HTML documents • transfer out of a database or document • a worldwide network of computer networks • an organized body of related information • ...
Tecnology Vocabulary 2021-04-16
Across
- A symbol in a graphical user interface
- A data transmission rate for modems
- A fault or defect in a computer program, System, or machine
- The exclusive right to sell a work
- An organized body of related information
- Transfer out of a database or document
- A set of related records kept together
- Any small compartment
- A worldwide network of computer networks
Down
- Set up for a particular purpose
- A compact disk that is used with a computer
- A program used to view HTML documents
- A unit of measurement of information
- Page the opening page of a web site
- The organization of data according to preset specifications
15 Clues: Any small compartment • Set up for a particular purpose • The exclusive right to sell a work • A data transmission rate for modems • Page the opening page of a web site • A unit of measurement of information • A program used to view HTML documents • A symbol in a graphical user interface • Transfer out of a database or document • A set of related records kept together • ...
Technology Vocabulary 2021-04-16
Across
- A program that gives a computer instructions.
- Having an output that is proportional to the input.
- A data transmission rate for modems.
- A set of related records kept together.
- Transfer out of a database or document.
- A unit of measurement of information.
- A compact disk that is used with a computer.
- Locate and correct errors in a computer program code.
Down
- Any small compartment.
- A copy of a file or directory on a separate storage device.
- Set up for a particular purpose.
- Adjusting the parts of something in relation to each other.
- in Enter a computer.
- A program used to view HTML documents.
- A worldwide network of computer networks.
15 Clues: in Enter a computer. • Any small compartment. • Set up for a particular purpose. • A data transmission rate for modems. • A unit of measurement of information. • A program used to view HTML documents. • A set of related records kept together. • Transfer out of a database or document. • A worldwide network of computer networks. • A compact disk that is used with a computer. • ...
GRADE 9 QUIZ 1 2022-10-21
Across
- ......converts hardcopy to softcopy.
- A......is a folder inside another folder.
- ....network that connects computers in three towns
- Information on a computer for user to see is displayed using.......
- The type of data input by microphone.
- The protection of data being transmitted over network.
- .....is a network restricted to an organization .
- Performing financial transactions such as money transfers using the internet.
Down
- ....is danger posed by electric wires that are uncovered.
- .....global system of interconnected computer networks.
- .......converts softcopy to hardcopy.
- A crime of harassing using the internet.
- In Excel columns are labelled by......
- A network formed between a bluetooth earpiece and smartphone.
- How many bytes are in the code 10001010.
15 Clues: ......converts hardcopy to softcopy. • .......converts softcopy to hardcopy. • The type of data input by microphone. • In Excel columns are labelled by...... • A crime of harassing using the internet. • How many bytes are in the code 10001010. • A......is a folder inside another folder. • .....is a network restricted to an organization . • ...
INTERNET AND USES 2020-05-12
Across
- a computer that receives request and searches for information
- the brain of the computer
- what you must never share with a friend online
- it is the foundation of internet by US government
- it is electronic mail
- a program that locates and displays web pages
- global network of networks
- a computer that sends request over the internet
Down
- an example of a browser. it starts with a G
- program used to search for information online
- a form of instant messages online
- the method by which people access information online
- the address of the website
- a process of buying and selling online
- a language used to design web pages
15 Clues: it is electronic mail • the brain of the computer • the address of the website • global network of networks • a form of instant messages online • a language used to design web pages • a process of buying and selling online • an example of a browser. it starts with a G • program used to search for information online • a program that locates and displays web pages • ...
Lynette + Cybersecurity Crossword 2026-04-03
Across
- Authentication: Extra step to verify identity when logging in
- Malware disguised as a normal program
- Citizenship: Using the internet safely and responsibly
- Malware that spreads by attaching to files
- Someone who breaks into computer systems illegally
- Software that secretly tracks your activity
- Protects a network by controlling traffic
- Trick to steal personal info through fake messages
Down
- Secret code used to access accounts
- Malware that spreads itself across networks
- Malware hidden deep in a system to avoid detection
- Software designed to harm or access a computer without permission
- Security: Protecting a network from attacks or intrusions
- Malware that locks files and demands payment
- Scrambles data so only authorized users can read it
15 Clues: Secret code used to access accounts • Malware disguised as a normal program • Protects a network by controlling traffic • Malware that spreads by attaching to files • Malware that spreads itself across networks • Software that secretly tracks your activity • Malware that locks files and demands payment • Malware hidden deep in a system to avoid detection • ...
Ethics and Mass Communication 2021-09-17
Across
- to yourself
- simultaneously control several related aspects of the media business
- everyone processes messages differently
- National Association of Broadcasters
- The practice of a news organization paying for an interview or photograph.
- to large audiences or markets
- Federal Communications Commission
- The intentional planting of false information by government sources.
- a response
Down
- Companies that own media companies as well as businesses that are unrelated to the media business.
- variety of information
- to other people
- The rules or standards that govern someone’s conduct.
- Stations that use network programming but are owned by companies other than the networks.
- ends government control of an industry.
- interferes, makes unclear
- plural for medium
- A message system that allows senders and receivers to communicate simultaneously.
- how a message gets to audience
19 Clues: a response • to yourself • to other people • plural for medium • variety of information • interferes, makes unclear • to large audiences or markets • how a message gets to audience • Federal Communications Commission • National Association of Broadcasters • ends government control of an industry. • everyone processes messages differently • ...
Technology 2023-03-22
Across
- I have everything on time.
- The opposite of a sad person.
- App to work with essays, presentations,etc.
- When someone is very kind.
- A program to make presentations, videos etc.
- A person that can feel what other people are living.
- Humans clones.
- Third Anglo pride.
- First Anglo pride.
Down
- Last Anglo pride.
- The opposite of negative.
- citizens Second Anglo pride.
- a small handheld device that moves the cursor on the computer.
- Electronic machine, it can control other computers.
- Interconnected networks.
- Fourth Anglo pride.
- To hear music on your own.
- The quantities, characters, or symbols on which operations are performed by a computer.
- An instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- Is a software program that's designed to perform a specific function directly for the user.
20 Clues: Humans clones. • Last Anglo pride. • Third Anglo pride. • First Anglo pride. • Fourth Anglo pride. • Interconnected networks. • The opposite of negative. • I have everything on time. • When someone is very kind. • To hear music on your own. • citizens Second Anglo pride. • The opposite of a sad person. • App to work with essays, presentations,etc. • ...
Binary search tree 2022-12-06
Across
- The process of moving the nodes to make tree balanced
- LDR- left, root, right
- Smallest entity in tree
- Tree used in routers and bridges respectively in computer networks
- DLR-root, left, right
Down
- NULL links can be replaced by pointers called threads to other nodes
- Used in Compilers
- Unique node in the tree to which further sub trees are attached
8 Clues: Used in Compilers • DLR-root, left, right • LDR- left, root, right • Smallest entity in tree • The process of moving the nodes to make tree balanced • Unique node in the tree to which further sub trees are attached • Tree used in routers and bridges respectively in computer networks • NULL links can be replaced by pointers called threads to other nodes
crossword 2023-06-06
8 Clues: I ….. it in the trash • All kids are on social … • I …… if that was a good choice • On twitch there is a lot of …. • This device helps detect something • When we make a mistake we need to … • If you don’t want the baby you need to do an … • In a market there are a lot of different products ….
AP World Review on Trade: Period 2 2022-05-04
Across
- Could have a variety of tobacco, sugar, etc. meant for farming that usually had labor
- Also known as the western hemisphere
- labor/slave system est. by Spanish
- trade system across Atlantic for slaves
- conquered the tribes of the Americas
- which countries made trade networks from old world to new
- system used to rank people
- connected new world with old in trade
- Spread to Americas alongside diseases and other stuff
- term that associates with sea
Down
- England produced this, very desired by Chinese
- Knowledge of this helped with trade across oceans
- Place known before exploration of Americas
- country that found the Americas
- another word for exchange;world-changing
- found a trade route to India
16 Clues: system used to rank people • found a trade route to India • term that associates with sea • country that found the Americas • labor/slave system est. by Spanish • Also known as the western hemisphere • conquered the tribes of the Americas • connected new world with old in trade • trade system across Atlantic for slaves • another word for exchange;world-changing • ...
Crime 2025-10-06
Across
- taking property from a person by force or threat
- unlawful killing with intent (premeditated)
- intentionally causing fear of harm or attempted harm
- obtaining money or property by threats or coercion
- taking someone’s property without permission
- creating or altering documents to deceive
- entering a building to commit a crime (often theft)
Down
- stealing money placed in one’s trust or care
- unlawful taking and holding of a person against their will
- unlawful killing without premeditation
- deception to gain money or advantage
- unlawful physical contact that causes injury
- intentionally setting fire to property
- deliberate damage or defacement of property
- criminal activity carried out using computers or networks
- offering or receiving money to influence an official act
16 Clues: deception to gain money or advantage • unlawful killing without premeditation • intentionally setting fire to property • creating or altering documents to deceive • unlawful killing with intent (premeditated) • deliberate damage or defacement of property • stealing money placed in one’s trust or care • unlawful physical contact that causes injury • ...
Cog Sci Ch. 9 & 10 Review 2022-04-20
Across
- Who is the researcher who demonstrated the interaction of perception and imagery by using “back projection” with participants in their imagery task?
- An average representation of the “typical” member of a category is referred to as a ________.
- A category member that closely resembles a category prototype is considered _____ in prototypicality.
- Living things are distinguished by sensory properties and artifacts are distinguished by functions describes the _______-functional hypothesis.
- Family ________ refers to items in a category that resemble one another in a number of ways.
- Who is the researcher who conducted the mental-walk task?
- Who (the general term of researchers who hold this perspective) branded the study of imagery as unproductive because visual images are invisible to everyone except the person experiencing them?
- Back ______ is when an error signal is transmitted back through the circuit; this indicates how weights should be changed to allow an output signal to match the correct signal (learning).
Down
- The pegword technique is particularly suitable for use when you need to remember items based on their _____.
- Graceful ______ is when a performance disruption occurs gradually as parts of the system are damaged.
- When you measure the amount of time a person requires to complete a cognitive task, you are using mental ______.
- This psychologist believed that imagery is propositional and can be represented by abstract symbols.
- Imagine your roommate says, “I am leaving a key under the mat.” and you visualize your roommate putting a key under your doormat. This would support the idea that imagery is _______.
- The ________ approach is when knowledge of concepts is based on reactivation of sensory and motor processes that occur when we interact with an object.
- Concepts that are arranged in networks that represent the way concepts are organized in the mind are _______ networks.
15 Clues: Who is the researcher who conducted the mental-walk task? • Family ________ refers to items in a category that resemble one another in a number of ways. • An average representation of the “typical” member of a category is referred to as a ________. • This psychologist believed that imagery is propositional and can be represented by abstract symbols. • ...
Genesis's Crossword Puzzle 2016-08-31
Across
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- A person who uses computers to gain unauthorized access to data.
- A general purpose computer programming language designed to produce programs that will run on any computer system.
- printing A process for making a physical object from a three-dimensional digital model, typically by laying down many successive thin layers of a material.
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- a networking device that forwards data packets between computer networks.
- a device for examining, reading, or monitoring something, in particular.
Down
- is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.
- using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- A unit of information equal to one billion (109) or, strictly, 230 bits.
- an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet.
- Bits per second
- As a measure of computer memory or storage, a kilobyte (KB or Kbyte*) is approximately a thousand bytes
- A telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
14 Clues: Bits per second • A person who uses computers to gain unauthorized access to data. • A unit of information equal to one billion (109) or, strictly, 230 bits. • a device for examining, reading, or monitoring something, in particular. • a networking device that forwards data packets between computer networks. • ...
esafety 2023-06-29
Across
- Manipulative techniques used to deceive individuals into divulging confidential information or performing certain actions.
- A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity through electronic communication.
- A security measure that acts as a barrier between a trusted internal network and untrusted external networks, controlling incoming and outgoing network traffic.
- The ability to use technology effectively and safely, including understanding online risks, critical thinking, and responsible digital behavior.
- designed to harm or infiltrate a computer system without the user's consent, often including viruses, worms, or ransomware.
- An additional layer of security that requires users to provide two forms of identification or verification to access an account or system.
Down
- The act of intentionally causing harm, harassment, or distress to someone through digital means such as social media, messaging apps, or emails.
- The trail of information and data left behind by a person's online activities, including posts, comments, and interactions.
- Measures taken to protect computers, networks, and data from unauthorized access or attacks.
- The online representation of an individual or organization, including personal information, usernames, profiles, and online activities.
- The process of converting data into a coded form to prevent unauthorized access or interception, ensuring confidentiality.
- The right to keep personal information and online activities confidential and secure from unauthorized access.
- Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information.
- Software or tools that allow parents or guardians to monitor and control their child's online activities, restricting access to inappropriate content or limiting screen time.
14 Clues: Measures taken to protect computers, networks, and data from unauthorized access or attacks. • The right to keep personal information and online activities confidential and secure from unauthorized access. • Secret codes or phrases used to authenticate a user's identity and protect access to personal accounts or information. • ...
Crossword 2025-04-22
Computer Networks Cross Words 2013-12-03
8 Clues: Medium Acess Control • used in error control • most commonly used network • occurs due to network traffic • its a portion of Data Link Layer • the rules that governs the data communication • which sends the data to the transmission medium • which receives the data from the transmission medium
CryptoRiddle 2023-09-23
Across
- Harmful software that steals data or disrupts a computer.
- Long-term, sophisticated attacks by skilled hackers. (abbreviation)
- Exploiting vulnerabilities in a website's database.(abbreviation)
- Deceptive emails or websites aiming to steal information.
- Coordinated digital assault on computer systems or networks.
- Fake systems designed to attract hackers.
Down
- Programs that protect your computer from viruses.
- Overwhelming a website with traffic to make it unavailable. (abbreviation)
- Secret Data Collector (A type of Malware Attack)
- A protective barrier for your network.
10 Clues: A protective barrier for your network. • Fake systems designed to attract hackers. • Secret Data Collector (A type of Malware Attack) • Programs that protect your computer from viruses. • Harmful software that steals data or disrupts a computer. • Deceptive emails or websites aiming to steal information. • Coordinated digital assault on computer systems or networks. • ...
Computer Hardware 2024-07-15
Across
- The hardware device we need to connect to the Internet
- The name for computers connected together
- The big room that contains switches, routers, and servers
- The address of your computer
Down
- The largest network
- The type of cable needed in wired networks
- The hardware that connects computers in a local area network (LAN)
- ones and zeroes
- Type of network in which you connect without wires. Sometimes offered for free in airports
- The "brain" of the computer
10 Clues: ones and zeroes • The largest network • The "brain" of the computer • The address of your computer • The name for computers connected together • The type of cable needed in wired networks • The hardware device we need to connect to the Internet • The big room that contains switches, routers, and servers • The hardware that connects computers in a local area network (LAN) • ...
Worksheet 9 – Vocabulary check 2023-03-26
Across
- Basic element of artificial neural networks
- System that learns via neural network
- System that learns based on large, structured data
- A technology capable of identifying places, people, objects and many other types of elements within an image
Down
- The father of AI
- The first layer of an artificial neural network
- Challenges posed by AI
- Fake videos
- Annual world summit sponsored by the United Nations
- Anomaly in the output of AI algorithms, due to some prejudiced assumptions
10 Clues: Fake videos • The father of AI • Challenges posed by AI • System that learns via neural network • Basic element of artificial neural networks • The first layer of an artificial neural network • System that learns based on large, structured data • Annual world summit sponsored by the United Nations • ...
The internet 2025-04-11
Across
- A small file stored on your computer by a website.
- Short for Uniform Resource Locator, a web address.
- To look at websites on the internet.
- A website or online service where people connect and share.
- Online conversation in real-time.
Down
- A global system of interconnected computer networks.
- To transfer data from a remote computer to a local one.
- A program used to access the internet.
- A collection of linked documents accessible through the internet.
- Electronic mail.
10 Clues: Electronic mail. • Online conversation in real-time. • To look at websites on the internet. • A program used to access the internet. • A small file stored on your computer by a website. • Short for Uniform Resource Locator, a web address. • A global system of interconnected computer networks. • To transfer data from a remote computer to a local one. • ...
ICT 2022-03-11
Across
- Metropolitan area Network
- is the Wireless Technology used to connect computers, tablets and etc
- is a device that enables computers to exchange data over a telephone line
- is a digital electronic machine
- Modern computer networks are mostly connected via
- is a Network topology in which nodes are directly connected to a common linear
Down
- Diagnosis of various diseases
- is a set commands that controls the computer operations
- the most popular browser
- is an organized collection of data
10 Clues: the most popular browser • Metropolitan area Network • Diagnosis of various diseases • is a digital electronic machine • is an organized collection of data • Modern computer networks are mostly connected via • is a set commands that controls the computer operations • is the Wireless Technology used to connect computers, tablets and etc • ...
Privacy & Security 2022-11-01
Across
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
- process of identifying a user’s identity
- the right to be let alone
Down
- common examples are viruses & trojans
- coding protecting information from hackers
- (2 words) information about an individual
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
- international organization for standardization
10 Clues: compromise of security • the right to be let alone • common examples are viruses & trojans • process of identifying a user’s identity • (2 words) information about an individual • coding protecting information from hackers • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
Cybersecurity Terminology 2025-06-25
Across
- Prefix meaning harmful or bad
- The act of keeping something safe from harm
- Software used to stop or remove viruses
- Prefix related to computers, networks, or the internet
- A hacker who helps protect systems legally
- Fraudulent email tricking people into giving personal information
Down
- Malicious software that locks access until a ransom is paid.
- A weakness that can be exploited in a system.
- Software that secretly collects user data
- The process of encoding data to protect it
10 Clues: Prefix meaning harmful or bad • Software used to stop or remove viruses • Software that secretly collects user data • The process of encoding data to protect it • A hacker who helps protect systems legally • The act of keeping something safe from harm • A weakness that can be exploited in a system. • Prefix related to computers, networks, or the internet • ...
Technology Crossword 2025-09-29
Across
- Small piece of data stored by websites on your browser
- Roughly one trillion bytes of data
- Programming language named after a comedy group
- Open-source operating system with a penguin mascot
- Technology that hides your IP by tunneling internet traffic
Down
- Small, high-speed storage close to the CPU
- Digital ledger technology behind cryptocurrencies
- Cybercrime that tricks users into giving personal information
- Device that directs internet traffic between networks
- Security system that filters network traffic
10 Clues: Roughly one trillion bytes of data • Small, high-speed storage close to the CPU • Security system that filters network traffic • Programming language named after a comedy group • Digital ledger technology behind cryptocurrencies • Open-source operating system with a penguin mascot • Device that directs internet traffic between networks • ...
st10212348 2022-08-19
Across
- Parameters that express aspects to a network as a whole instead of just the network system.
- the variation in time delay between when a signal is transmitted and when it's received over a network connection.
- is a set of instructions, data or programs used to operate computers and execute specific tasks.
- is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- the human-computer interaction layer.
- Protocol layer that retains connections and controls ports and sessions.
- is an expression of how much time it takes for a data packet to travel from one designated point to another.
- dictates the amount of data stored or transferred on a device.
- are the components required to operate and manage enterprise IT environments.
- is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
- is an administrative grouping of multiple private computer networks or local hosts within the same infrastructure.
Down
- Network printers, scanners, photocopiers, and multifunction devices that may also handle fax are all examples of networked... devices.
- is any application running on one host providing communication to another application running on a different host.
- can be a mix of hardware devices, software applications, and network services.
- the time hold-up to deliver a unit of data over a channel or network.
- A adapter that allows for connections between computers and servers or any other networking device over a local area network.
- to expand the coverage area of the network, repropagate a weak or broken signal and or service remote nodes.
- is a communication medium, the path that data takes from source to destination
- is a collection of local-area networks.
- is an established set of rules that determine how data is transmitted between different devices in the same network.
20 Clues: the human-computer interaction layer. • is a collection of local-area networks. • dictates the amount of data stored or transferred on a device. • the time hold-up to deliver a unit of data over a channel or network. • Protocol layer that retains connections and controls ports and sessions. • ...
IT Knowledge 2025-11-27
Across
- The right to keep your personal data secret.
- Virtual Private Network; protects your browsing privacy.
- Malicious code that replicates itself.
- An offensive action against computer systems.
- Malware that spreads through networks without human help.
Down
- The secret string of characters used to verify identity.
- Scrambling data so it cannot be read without a key.
- Unsolicited and unwanted junk email.
8 Clues: Unsolicited and unwanted junk email. • Malicious code that replicates itself. • The right to keep your personal data secret. • An offensive action against computer systems. • Scrambling data so it cannot be read without a key. • The secret string of characters used to verify identity. • Virtual Private Network; protects your browsing privacy. • ...
Phising Play Action 2025-08-21
Across
- Crime committed using computer networks
- Using false information to impersonate an entity
- Malicious software designed to harm, disrupt or gain unauthorized access
- Malicious software designed to spread from one to computer to another
Down
- Cybercrime where attackers use deceptive communication
- Malicious software preventing access to computer files
- Transferring messages from one computer to another
- To defraud or embezzle
8 Clues: To defraud or embezzle • Crime committed using computer networks • Using false information to impersonate an entity • Transferring messages from one computer to another • Cybercrime where attackers use deceptive communication • Malicious software preventing access to computer files • Malicious software designed to spread from one to computer to another • ...
IT quiz 2023-04-03
Across
- a system that integrates telephones and computer
- a device that forwards data packets
- He/she creates animationswith a computer
- written information on your TV screen
- a global system of networks of intergrated services
Down
- He/she is in charge of computer data input and processing
- joins multiple computers together to form a single network segment
- this send copirs of documents through telephone lines
- design and develop ICT devices
- radio communication system
10 Clues: radio communication system • design and develop ICT devices • a device that forwards data packets • written information on your TV screen • He/she creates animationswith a computer • a system that integrates telephones and computer • a global system of networks of intergrated services • this send copirs of documents through telephone lines • ...
GiANT's 5 Voices Language 2023-08-01
Across
- Champion of Relational networks, collaboration, and effective communication
- Champion of Strategic vision, results focused, and problem solving
- Culture of Apathy and Low Expectation
- Champion of Future ideas, innovation, and organizational integrity
- Champion of People, relational harmony, and values
Down
- Culture of Fear and Manipulation
- Champion of Due diligence, resources, and efficient systems and processes
- Culture of Empowerment and Opportunity
- Culture of Entitlement and Mistrust
- Certain things that can trigger you to step into the danger zone.
10 Clues: Culture of Fear and Manipulation • Culture of Entitlement and Mistrust • Culture of Apathy and Low Expectation • Culture of Empowerment and Opportunity • Champion of People, relational harmony, and values • Certain things that can trigger you to step into the danger zone. • Champion of Strategic vision, results focused, and problem solving • ...
My Dream Job Software Developer 2024-12-15
Across
- Platform used for storing code and collaborating on projects.
- The global system of interconnected computer networks.
- A reusable solution to a common problem in programming.
- A tool used to test software applications.
- Software that translates written code into instructions a computer can understand.
Down
- Process of finding and fixing errors in code.
- Popular programming language for machine learning and data science.
- A collaborative method for software development.
- Programming language used for web development.
- Commonly used database system.
10 Clues: Commonly used database system. • A tool used to test software applications. • Process of finding and fixing errors in code. • Programming language used for web development. • A collaborative method for software development. • The global system of interconnected computer networks. • A reusable solution to a common problem in programming. • ...
Technical Innovator 2026-03-18
Across
- Field combining cybernetics, mechatronics, and design
- Virtualization of network functions without dedicated hardware
- Business model for IIoT
- Technology enabling devices to switch networks without disconnecting
- System that improves decision making using data
- Computing layer closer to devices, reduces latency
Down
- Trend of making devices smaller in size
- Ability of systems to grow and handle increased demand
- Characteristic of Big Data referring to speed of data generation
- Centralized computing resource for IIoT data storage and processing
10 Clues: Business model for IIoT • Trend of making devices smaller in size • System that improves decision making using data • Computing layer closer to devices, reduces latency • Field combining cybernetics, mechatronics, and design • Ability of systems to grow and handle increased demand • Virtualization of network functions without dedicated hardware • ...
The Internet 2016-01-25
Across
- This is when part of an intranet is made accessible to customers, partners, suppliers or others outside a respective company.
- Page This is a document on the World Wide Web consisting of an HTML file and any related files for scripts and graphics and often hyperlinked to other Web pages.
- the Acronym "URL" stands for
- This is the largest computer network system in the world. It is consists of many smaller networks connected together by a global public network.
Down
- this consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
- This is a program that allows users to view and explore information on the World Wide Web.
- Each page on the World Wide Web has a unique address and this is called
- This is a private network that belongs to an organisation and is designed to be accessible by the organisation’s members, employees or others with authorization.
- It allows you to send, receive and manage electronic messages and communicate with friends, family and businesses all over the world.
9 Clues: the Acronym "URL" stands for • Each page on the World Wide Web has a unique address and this is called • This is a program that allows users to view and explore information on the World Wide Web. • This is when part of an intranet is made accessible to customers, partners, suppliers or others outside a respective company. • ...
Internet Crossword 2021-10-29
Across
- a one-to-one direction.
- A square associated with internet.
- an identifier that's used to identify different networks or computers.
- a piece of data with a destination address.
- Something that you put information into.
Down
- a type of location.
- an interface on a device where the device is connected.
- a type of protection to block unauthorised requests.
8 Clues: a type of location. • a one-to-one direction. • A square associated with internet. • Something that you put information into. • a piece of data with a destination address. • a type of protection to block unauthorised requests. • an interface on a device where the device is connected. • an identifier that's used to identify different networks or computers.
Internet Crossword :) 2021-11-11
Across
- a one-to-one direction.
- a piece of data with a destination address.
- Something that you put information into.
- a type of location.
Down
- A square associated with internet.
- an identifier that's used to identify different networks or computers.
- an interface on a device where the device is connected.
- a type of protection to block unauthorised requests.
8 Clues: a type of location. • a one-to-one direction. • A square associated with internet. • Something that you put information into. • a piece of data with a destination address. • a type of protection to block unauthorised requests. • an interface on a device where the device is connected. • an identifier that's used to identify different networks or computers.
FAKE NEWS 2022-04-04
Across
- given to a unique resource on the Web.
- real.
- share a fake news is a .....
- network Whose main objective is to support the production and sharing of content.
- in wich two or more people with different interests entre into confrontation.
Down
- through social networks.
- comennt or news circulating among people.
- .....
8 Clues: real. • ..... • through social networks. • share a fake news is a ..... • given to a unique resource on the Web. • comennt or news circulating among people. • in wich two or more people with different interests entre into confrontation. • network Whose main objective is to support the production and sharing of content.
