networks Crossword Puzzles
FAKE NEWS 2022-04-04
Across
- given to a unique resource on the Web.
- real.
- share a fake news is a .....
- network Whose main objective is to support the production and sharing of content.
- in wich two or more people with different interests entre into confrontation.
Down
- through social networks.
- comennt or news circulating among people.
- .....
8 Clues: real. • ..... • through social networks. • share a fake news is a ..... • given to a unique resource on the Web. • comennt or news circulating among people. • in wich two or more people with different interests entre into confrontation. • network Whose main objective is to support the production and sharing of content.
Internet 2015-02-18
Across
- It is a software used to look at web pages
- A collection of related webpages.
- Group of computers connected together.
- It is the first page of a website.
Down
- Network of networks.
- Moving from one website to another web site.
- A lot of computers on internet make a web.
- It is a page that contain text,picture,images etc
8 Clues: Network of networks. • A collection of related webpages. • It is the first page of a website. • Group of computers connected together. • A lot of computers on internet make a web. • It is a software used to look at web pages • Moving from one website to another web site. • It is a page that contain text,picture,images etc
Internet 2015-01-27
Across
- A collection of related webpages.
- Moving from one website to another web site.
- A lot of computers on internet make a web.
- It is a page that contain text,picture,images etc
Down
- It is the first page of a website.
- It is a software used to look at web pages
- Group of computers connected together.
- Network of networks.
8 Clues: Network of networks. • A collection of related webpages. • It is the first page of a website. • Group of computers connected together. • It is a software used to look at web pages • A lot of computers on internet make a web. • Moving from one website to another web site. • It is a page that contain text,picture,images etc
Media Manipulation 2013-01-14
Across
- television is a type of
- the people who read a media text
- To exercise authoritative or dominating influence over
- pointing in the wrong direction
- A panel for the display of advertisements in public places
- taking advantage of someone
- the depiction of something in a media text
- An act intended to deceive or trick
- a famous person whom many people know
- Of or relating to communal living.
Down
- the commercial processes involved in selling a product
- The transmission of dynamic images
- Communication of audible signals encoded in electromagnetic waves
- poster or a paid announcement in the print
- the organized dissemination of information, allegations
- Expressing, containing, or consisting of a negation, refusal, or denial
- Relating to, involving, or characteristic of politics or politicians
- persuading someone
- An interconnected system of networks that connects computers
19 Clues: persuading someone • television is a type of • taking advantage of someone • pointing in the wrong direction • the people who read a media text • The transmission of dynamic images • Of or relating to communal living. • An act intended to deceive or trick • a famous person whom many people know • poster or a paid announcement in the print • ...
computer vocabulary 2017-06-21
Across
- a way to organize computer files.
- physical parts of a computer system.
- a picture, image, or other representation
- the software that supports a computer’s basic functions
- occurs when a computer program stops functioning properly and exits
- CENTRAL PROCESSING UNIT
- a panel of keys that operate a computer or a typewriter
- to restart by loading the operating system
- a person or thing that browses
Down
- an external flash drive
- is an operating system
- DRVE storage device containing a read-write mechanism
- a vast computer network linking smaller computer networks worldwide
- AN ELECTRONIC DEVICE FOR STORING AND PROCESSING DATA
- a folder
- a display screen used from a computer
- the working surface of a desk
- of or relating to present and recent time
- an input device that is most often used with a personal computer
19 Clues: a folder • is an operating system • an external flash drive • CENTRAL PROCESSING UNIT • the working surface of a desk • a person or thing that browses • a way to organize computer files. • physical parts of a computer system. • a display screen used from a computer • a picture, image, or other representation • of or relating to present and recent time • ...
Year 8 Comp Sci 2025-07-04
Across
- The time between sending a packet and receiving a packet
- The brain of the computer
- A device that connects devices together on a network.
- Microscopic switches responsible for binary
- Running a program one instruction at a time
- Done by using if/else in Python
- Being able to learn and adapt from new data
- The amount of traffic that can be transmitted at once on a network.
- a wide area network
Down
- Two or more computers connected together.
- A device that connects local area networks together.
- A document used to establish a target audience
- The layout/shape of nodes on a network
- Loops
- a local area network
- How can we gather data?
- Connects all the parts together
- A type of AI that gives out text-based responses
- Base 2 number system
19 Clues: Loops • a wide area network • a local area network • Base 2 number system • How can we gather data? • The brain of the computer • Connects all the parts together • Done by using if/else in Python • The layout/shape of nodes on a network • Two or more computers connected together. • Microscopic switches responsible for binary • Running a program one instruction at a time • ...
4th Grade - Spelling Words Unit 7 Week 1 2024-04-25
Across
- very tiring or difficult
- to come into being or operation
- to direct or control
- goods shipped by boat, plane, train, or truck
- a nobleman by birth of a particular rank
Down
- a rich, powerful person in business or industry
- to use power to manage or command
- a person whom one tries to be better than; competitor
- a long journey by air, land, sea, or outer space
- a system that involves a number of many groups
10 Clues: to direct or control • very tiring or difficult • to come into being or operation • to use power to manage or command • a nobleman by birth of a particular rank • goods shipped by boat, plane, train, or truck • a system that involves a number of many groups • a rich, powerful person in business or industry • a long journey by air, land, sea, or outer space • ...
Computer 2023-08-12
Across
- Data storage device inside a computer.
- Output device that produces physical copies of digital content.
- Input device for typing and entering commands.
- Programs and applications that run on a computer.
- Computer system with a monitor, CPU, and peripherals.
Down
- Global network connecting computers worldwide.
- Camera used to transmit video over the internet.
- Pointing device used to interact with a computer.
- Device that directs data between computer networks.
- Portable computer that can be used on the go.
10 Clues: Data storage device inside a computer. • Portable computer that can be used on the go. • Global network connecting computers worldwide. • Input device for typing and entering commands. • Camera used to transmit video over the internet. • Pointing device used to interact with a computer. • Programs and applications that run on a computer. • ...
Inter,Intro,Intra, Circum 2022-05-11
Across
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- area of a circle
- occurring between nation
- obstruct someone from going to a destination
Down
- bring something to a place for the first time
- find a way around (an obstacle)
- act in such a way as to have an effect on each other.
- intervene in a situation without invitation
- taking place or existing within the mind.
- Job
10 Clues: Job • area of a circle • occurring between nation • find a way around (an obstacle) • taking place or existing within the mind. • intervene in a situation without invitation • obstruct someone from going to a destination • bring something to a place for the first time • act in such a way as to have an effect on each other. • ...
Artificial Intelligence 2022-05-27
Across
- period of reduced funding and interest in AI
- search that doesn´t have information it's domain
- Sequence of well-defined instructions used in computation
- capability to process human speech into a written format
Down
- series of algorithms that mimic the human brain
- Used to make text-to-speech conversation
- the ability to acquire and apply knowledge
- A bunch of nodes
- automation technology based on metaphorical software robots
- intelligence demonstrated by machines
10 Clues: A bunch of nodes • intelligence demonstrated by machines • Used to make text-to-speech conversation • the ability to acquire and apply knowledge • period of reduced funding and interest in AI • series of algorithms that mimic the human brain • search that doesn´t have information it's domain • capability to process human speech into a written format • ...
TCC & New Haven Crossword 2024-10-28
Across
- The state where TCC operates
- An important part of TCC’s mission in supporting communities
- Renowned university in New Haven
- Core value at TCC for creating equitable spaces
- Abbreviation for the organization providing local support and advocacy
Down
- TCC’s focus area to promote well-being
- Iconic central area of New Haven known for gatherings
- Historic street in New Haven known for Italian food
- The historic city where TCC is located
- Essential goal of TCC’s mission in fostering support networks
10 Clues: The state where TCC operates • Renowned university in New Haven • TCC’s focus area to promote well-being • The historic city where TCC is located • Core value at TCC for creating equitable spaces • Historic street in New Haven known for Italian food • Iconic central area of New Haven known for gatherings • An important part of TCC’s mission in supporting communities • ...
ACM Newsletter Edition 3 2025-07-08
Across
- Crucial in ensuring responsible AI development
- Brain-inspired networks used in deep learning
- Grouping data points based on similarity
- Fraudulent attempt to obtain sensitive information via email
- Computing model leveraging superposition and entanglement
Down
- A model problem where training accuracy is high but test accuracy is low
- Network security system that monitors incoming/outgoing traffic
- Global organization advancing computing as a science
- An input that guides an LLM’s response
- Platform for code collaboration and version control
10 Clues: An input that guides an LLM’s response • Grouping data points based on similarity • Brain-inspired networks used in deep learning • Crucial in ensuring responsible AI development • Platform for code collaboration and version control • Global organization advancing computing as a science • Computing model leveraging superposition and entanglement • ...
Cross-Word 2025-09-12
Across
- → Like the unclear edges of a nebula
- → Arrangement, like star charts in rows and columns
- → Similar to how brain-like networks analyze telescope data
- → Needed to decode signals from outer space
- → Rule of strengthening, like gravity binding stars
Down
- → Like grouping galaxies together in the universe
- → An early model, like a prototype telescope for starlight
- → Just as stars evolve, this algorithm evolves solutions
- → Like mass values assigned to planets in orbit
- → Small shift, like tilt in Earth’s axis
10 Clues: → Like the unclear edges of a nebula • → Small shift, like tilt in Earth’s axis • → Needed to decode signals from outer space • → Like mass values assigned to planets in orbit • → Like grouping galaxies together in the universe • → Arrangement, like star charts in rows and columns • → Rule of strengthening, like gravity binding stars • ...
Network keywords ~ Computing 2025-10-10
Across
- a fake email
- a service of the internet that contains web pages
- a global network or networks
- messages that are sent between a browser and a website
- a set of rules on how to communicate
- standard mark up language that is used to create web pages
Down
- the person who created the world wide web
- a series of web pages
- the process of converting a message into code that can't be read easily
- a message that is split
10 Clues: a fake email • a series of web pages • a message that is split • a global network or networks • a set of rules on how to communicate • the person who created the world wide web • a service of the internet that contains web pages • messages that are sent between a browser and a website • standard mark up language that is used to create web pages • ...
IA-II- Mobile Emerging Technology (Honours)- July-Dec 2023 2023-10-16
Across
- ___ is used to create the radiation pattern of an antenna array by strongly adding the phase of the signal in the direction of the desired target/moving object and nulling the pattern of the target in unwanted direction
- The technique that offers a linear increase in the capacity for the same bandwidth and no additional power expenditure
- the component that stores the information about subscriber's phone number, encryption keys, and identification
- The scheme in which two or more statistically independent replicas is used for transfer of the same information
- the antennas that have signal processing capability that can perform tasks such as analysis of the direction of arrival of a signal
- The unit in LTE architecture that commuicates with packet data networks in the outside world such as internet, private and IMS
Down
- Diverity improves the _____ of the received message because nothing can recover the data signal in a deep fade except getting more copies of the same signal
- the coding technique which can be utilized to transmit over multiple antennas and achieve similar gains as can be achieved using multiple antenna diversity reception
- In _____ diversity replica of same signal is transmitted through different antenna
- the device that forwards the data between base station and packet data network gateway in 5G system
- the fifth generation network concept in which under single infrastrcture is divided into multiple networks
- a reference carrier that is known at receiver end that provides channel state information and channel behaviour
- Compared to SISO, system with ____ antennas give more degree of freedom in signalling at transmitter and receiver
- the technique that is used to elimitate the unwanted sideband components and thus limit the total transmission bandwidth in OFDM system
- the parameter that is used to describe instantaneous communication between devices and minimizing delays
15 Clues: In _____ diversity replica of same signal is transmitted through different antenna • the device that forwards the data between base station and packet data network gateway in 5G system • the parameter that is used to describe instantaneous communication between devices and minimizing delays • ...
tech terms 1 and 2 2023-01-05
Across
- portion of a pc that retrieves and executes instructions
- stores data
- pc hardware device that converts data from digital format to a suitable format for telephone or radio
- a starting computer operating system
- traditional technology for connecting devices in a wired local area network
- a start for a second or third time
- file or code that infects, steals or conducts behavior an attacker wants
- portable document format
- network security
- uniform resource locator
Down
- unique address that identifies a device on the internet
- piece of data from a website that is stored and be retrieved later
- standard markup language
- managing traffic between networks by forwarding data to IP addresses
- 1,000,000 bytes or 1,048,576 bytes
- instructions
- unit of data that is 8 binary digits long
- physical and visible
- short binary digit
19 Clues: stores data • instructions • network security • short binary digit • physical and visible • standard markup language • portable document format • uniform resource locator • 1,000,000 bytes or 1,048,576 bytes • a start for a second or third time • a starting computer operating system • unit of data that is 8 binary digits long • unique address that identifies a device on the internet • ...
Health and Safety Crossword 2025-04-28
Across
- A harmful program that replicates itself
- A harmful program that displays unwanted ads
- Regularly saving your work
- What does the fire extinguisher contain if it has a black label
- Proper seating posture
- A secure way to access your computer remotely
- A harmful software that demands ransom
Down
- What the white label fire extinguisher contains
- A device to protect your computer from power surges
- Name for harmful software
- A software update to fix security vulnerabilities
- Software that protects against malicious attacks
- A secure method to encrypt data
- A harmful program that spreads through networks
- What label colour is on the Dry Powder Fire extinguisher
- A short break to rest your eyes
- A harmful software that spies on user activity
- A program that blocks unauthorised access
- A harmful program disguised as legitimate software
19 Clues: Proper seating posture • Name for harmful software • Regularly saving your work • A secure method to encrypt data • A short break to rest your eyes • A harmful software that demands ransom • A harmful program that replicates itself • A program that blocks unauthorised access • A harmful program that displays unwanted ads • A secure way to access your computer remotely • ...
crypto crossword 2025-01-10
Across
- - Popular decentralized cryptocurrency
- - New unit added to a blockchain
- - A change to a blockchain’s protocol that creates two separate chains
- - Cryptocurrency designed to minimize price volatility
- - Financial metric used to measure a company's profitability
- - Unique code identifying a crypto wallet
- - Measure of computational power in a blockchain network
- - Return on an investment over a specific period
- - Value of all final goods and services produced
Down
- - Algorithm that secures blockchain networks
- - Measure of market risk
- - Digital ledger technology used for recording transactions
- - Agreement among participants in a blockchain network
- - Any cryptocurrency other than Bitcoin
- - A participant who validates transactions and adds them to a blockchain
- - Smallest unit of Bitcoin
- - A digital asset representing ownership or utility on a blockchain
- - Profiting from price differences between markets
- - A digital tool used to store cryptocurrencies
19 Clues: - Measure of market risk • - Smallest unit of Bitcoin • - New unit added to a blockchain • - Popular decentralized cryptocurrency • - Any cryptocurrency other than Bitcoin • - Unique code identifying a crypto wallet • - Algorithm that secures blockchain networks • - A digital tool used to store cryptocurrencies • - Return on an investment over a specific period • ...
The secret language of trees - Camille Defrenne and Suzanne Simard 2022-02-02
Across
- Trees can share information like ____ or insect attacks through their fungi networks.
- Symbiotic fungi called _______.
- The secret of trees' success lies under the ___ ____.
- Tress shares food, supplies, and _______.
Down
- Process where leaves use the ample sunlight up to create sugars.
- Fungi branches together make up the ______.
- There is a _____ species of mycorrhizae fungi.
- This element is considered fuel for fungi ____.
8 Clues: Symbiotic fungi called _______. • Tress shares food, supplies, and _______. • Fungi branches together make up the ______. • There is a _____ species of mycorrhizae fungi. • This element is considered fuel for fungi ____. • The secret of trees' success lies under the ___ ____. • Process where leaves use the ample sunlight up to create sugars. • ...
the tic ta toe vocabulary 2014-05-02
Across
- to reload a webpage on the internet
- bullies in cyberspace
- text or graphics that when clicked will connect to a new web page
- a peson that secretly gains access to computers
- a global network of thousands of other computer networks that offers e-mails
Down
- to make copies
- a group of connected computers
- used to write a report
8 Clues: to make copies • bullies in cyberspace • used to write a report • a group of connected computers • to reload a webpage on the internet • a peson that secretly gains access to computers • text or graphics that when clicked will connect to a new web page • a global network of thousands of other computer networks that offers e-mails
BVC 2022-11-14
Across
- Extrernal forces stopping people from buying the brand they want
- measures the core aspects of choice: brand saliency and brand relationships
- known to be one of the market effects
- ____ brands have strong brand networks or associative memory structures
Down
- Ipsos brand equity framework
- Brands grow when its chosen by more people, more___
- AE+ME=___
- AE stands for____
8 Clues: AE+ME=___ • AE stands for____ • Ipsos brand equity framework • known to be one of the market effects • Brands grow when its chosen by more people, more___ • Extrernal forces stopping people from buying the brand they want • ____ brands have strong brand networks or associative memory structures • ...
Inventions 2025-03-02
Across
- Stores energy in a chemical form
- Stores food and keeps it cold
- Lens use to produce a magnifies image of an object
- Advanced machine, capable of flying
Down
- Global system of interconnected computer networks
- Makes for easy transport
- Device designed for transmission and reception of the human voice
- Safe and effective way of protecting you against harmful deseases
8 Clues: Makes for easy transport • Stores food and keeps it cold • Stores energy in a chemical form • Advanced machine, capable of flying • Global system of interconnected computer networks • Lens use to produce a magnifies image of an object • Device designed for transmission and reception of the human voice • Safe and effective way of protecting you against harmful deseases
Phising 2025-08-21
Across
- crime committed using computer networks
- using false information to impersonate an entity
- malicious software designed to harm, disrupt or gain unauthorized access
- malicious software designed to spread from one to computer to another
Down
- cybercrime where attackers use deceptive communication
- malicious software preventing access to computer files
- transferring messages from one computer to another
- to defraud or embezzle
8 Clues: to defraud or embezzle • crime committed using computer networks • using false information to impersonate an entity • transferring messages from one computer to another • cybercrime where attackers use deceptive communication • malicious software preventing access to computer files • malicious software designed to spread from one to computer to another • ...
GI Crossword Game 2025-05-04
Across
- JavaScript method to add an element to the end of array
- Ansible module to install packages
- The secret function behind all those endless loops
- javaScript to declare a variable with block scope
- This protocol ensures your data doesn’t take the scenic route
- It’s like a personal assistant, but for your servers
- This Python function really defines a program
Down
- python library for data analysis
- network device used to connect multiple networks
- protocol to resolve domain names
- define tasks in Ansible
- A JavaScript variable that refuses to change its mind
- Code executes after a set wait period
- Ansible module to copy files to managed nodes
- Python data type to store key-value pairs
- The unsung hero keeping your containerized apps afloat
16 Clues: define tasks in Ansible • python library for data analysis • protocol to resolve domain names • Ansible module to install packages • Code executes after a set wait period • Python data type to store key-value pairs • Ansible module to copy files to managed nodes • This Python function really defines a program • network device used to connect multiple networks • ...
Vocabulary about web site 2020-07-12
Across
- แฟ้มข้อมูลหรือกลุ่มแฟ้มข้อมูลที่มีอยู่บนเวิลด์ไวด์เว็บ ดู world wide web ประกอบ
- หน้าเอกสารที่เขียนขึ้นในรูปแบบภาษาเอชทีเอ็มแอล ซึ่งสามารถเชื่อมโยงไปยังเอกสารหน้าอื่นได้ โดยเรียกดูผ่านเว็บบราวเซอร์
- โปรแกรมคอมพิวเตอร์ที่ใช้เปิดดูเว็บ (web browser)
Down
- หน้าแรกของเอกสารที่มีอยู่ในระบบอินเทอร์เน็ต ที่จะเป็นตัวแนะนำให้รู้จักหน่วยงานหรือสถาบันต่าง ๆ ในเวิร์ลด์ไวด์เว็บ (world wide web)
- การเชื่อมโยงคอมพิวเตอร์สองเครื่องเข้าด้วยกันโดยผ่านทางโมเด็ม (modem) หรือ สายไฟ หรือข่ายงาน (networks)
- บรรจุขึ้น, บรรจุขึ้น คือการถ่ายโอนข้อมูลจากคอมพิวเตอร์เครื่องหนึ่งไปยังคอมพิวเตอร์อีกเครื่องหนึ่ง เครื่องที่ส่งข้อมูล เรียกว่า ตัวที่ทำการ "บรรจุขึ้น" หรือการส่งข้อมูลจากเครือข่ายไปยังแม่ข่าย
6 Clues: โปรแกรมคอมพิวเตอร์ที่ใช้เปิดดูเว็บ (web browser) • แฟ้มข้อมูลหรือกลุ่มแฟ้มข้อมูลที่มีอยู่บนเวิลด์ไวด์เว็บ ดู world wide web ประกอบ • การเชื่อมโยงคอมพิวเตอร์สองเครื่องเข้าด้วยกันโดยผ่านทางโมเด็ม (modem) หรือ สายไฟ หรือข่ายงาน (networks) • หน้าเอกสารที่เขียนขึ้นในรูปแบบภาษาเอชทีเอ็มแอล ซึ่งสามารถเชื่อมโยงไปยังเอกสารหน้าอื่นได้ โดยเรียกดูผ่านเว็บบราวเซอร์ • ...
Geography Crossword Puzzle 2021-09-23
Across
- A landform along the shoreline of an ocean, sea, lake, or river
- A waterless area of land with little or no vegetation
- A chain or cluster of islands
- The world's largest continent
- The study of place.
- Country with the largest population
- The world's smallest continent
- Largest ocean
Down
- An extensive area filled with trees.
- The height of a point on the Earth's surface compared to the sea level
- Geography of the networks of people and cultures on Earth’s surface.
- Geography of the Earth’s climate, landforms, and oceans.
- The Grand Canyon is in this state
- The sudden and intense shaking of the ground due to tectonic activity.
- Largest country in the world
- Northern most country in North America
16 Clues: Largest ocean • The study of place. • Largest country in the world • A chain or cluster of islands • The world's largest continent • The world's smallest continent • The Grand Canyon is in this state • Country with the largest population • An extensive area filled with trees. • Northern most country in North America • A waterless area of land with little or no vegetation • ...
Digital World Crossword 2025-02-21
Across
- Google's popular web browser
- Place where you store files online instead of on your device
- Common programming language known for its snake logo
- Operating system used by most smartphones
- Type of malicious software that encrypts files and demands payment
- Main circuit board in a computer
- Company that makes the iPhone
- Wireless technology standard for short-distance data exchange
Down
- Global system of interconnected networks
- Storage device that uses flash memory, often connected via USB
- AI assistant in Windows
- Three-letter abbreviation for a common image format
- Microsoft's cloud computing platform
- Device that connects to a computer and moves a cursor
- Process of converting data into a secure format
- Acronym for Central Processing Unit
16 Clues: AI assistant in Windows • Google's popular web browser • Company that makes the iPhone • Main circuit board in a computer • Acronym for Central Processing Unit • Microsoft's cloud computing platform • Global system of interconnected networks • Operating system used by most smartphones • Process of converting data into a secure format • ...
Cyber Security Puzzle 2024-04-22
Across
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
- an attack in which someone sends unsolicited messages to a Bluetooth-enabled device
- An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
- process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
- the physical opening where a data cable can be plugged in
Down
- an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them
- A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
- a form of testing that is performed with knowledge of a target system's internals
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application
- an unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
- capability to limit network traffic between networks and/or information systems.
- The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
- a design and programming philosophy that focuses on formally correct and verifiable input handling throughout all phases of the software development lifecycle
- The unauthorized transfer of information from an information system.
15 Clues: the physical opening where a data cable can be plugged in • The unauthorized transfer of information from an information system. • capability to limit network traffic between networks and/or information systems. • a form of testing that is performed with knowledge of a target system's internals • ...
tech crossword 2015-05-13
Across
- an instrument or device used for observing
- used for hitting a tennis ball
- a system for transmitting visual images and sound that are reproduced on screens
- what do you use to connect to the internet
- Hard disks may be internal or ______
Down
- used for texting
- a printed circuit board containing the principal components of a computer
- global system of interconnected computer networks
- was used to decapitate people
- a machine with moving parts that converts power into motion
10 Clues: used for texting • was used to decapitate people • used for hitting a tennis ball • Hard disks may be internal or ______ • an instrument or device used for observing • what do you use to connect to the internet • global system of interconnected computer networks • a machine with moving parts that converts power into motion • ...
Artificial Intelligence 2022-06-02
Across
- period of reduced funding and interest in AI
- search that doesn´t have the information it's domain
- Sequence of well-defined instructions used in computation
- capability to process human speech into a written format
Down
- series of algorithms that mimic the human brain
- Used to make text-to-speech conversation
- the ability to acquire and apply knowledge
- A bunch of nodes
- automation technology based on metaphorical software robots
- intelligence demonstrated by machines
10 Clues: A bunch of nodes • intelligence demonstrated by machines • Used to make text-to-speech conversation • the ability to acquire and apply knowledge • period of reduced funding and interest in AI • series of algorithms that mimic the human brain • search that doesn´t have the information it's domain • capability to process human speech into a written format • ...
Lesson 2 2022-09-09
Across
- Change their way of life in response to the environment
- 70,000 years ago when thick sheets of ice spread across large regions of Earth
- A closely interconnected group of people or things
- The place early humans originated from
- Having many related parts, not simple
Down
- Modern human
- When people leave their homeland to live somewhere else
- First hominin to bury their dead, a close relative of us.
- A way early people killed animals for food.
- Surroundings
10 Clues: Modern human • Surroundings • Having many related parts, not simple • The place early humans originated from • A way early people killed animals for food. • A closely interconnected group of people or things • When people leave their homeland to live somewhere else • Change their way of life in response to the environment • ...
NYSE + NASDAQ 2024-02-09
Across
- the right to trade on a floor of the NYSE
- known as the "Big Board"
- the NYSE is a _____ market with specialists
- units of stocks issued by a corporation that represent ownership.
- the NASDAQ is a _____ market with market makers
- a person who buys and sells goods or assets for others.
Down
- investors post order over computer networks
- the agreement that created the NYSE
- NASDAQ is the ____ biggest stock exchange
- has a higher trading volume than NYSE
10 Clues: known as the "Big Board" • the agreement that created the NYSE • has a higher trading volume than NYSE • the right to trade on a floor of the NYSE • NASDAQ is the ____ biggest stock exchange • investors post order over computer networks • the NYSE is a _____ market with specialists • the NASDAQ is a _____ market with market makers • ...
Privacy & Security 2023-12-20
Across
- coding protecting information from hackers
- the right to be let alone
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
Down
- (2 words) information about an individual
- common examples are viruses and trojans
- the process of identifying a user's identity
- international organization for standardization
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
10 Clues: compromise of security • the right to be let alone • common examples are viruses and trojans • (2 words) information about an individual • coding protecting information from hackers • the process of identifying a user's identity • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
Tech Trivia Crossword 2024-08-13
Across
- The key that is used to connect one schema to another schema
- Situation that occurs when resources are overloaded
- Which type of exploit utilizes fake websites and url names
- Any software intentionally designed to disrupt computer or computer networks
Down
- CEO of Alphabet
- Address to a variable
- CEO of Youtube
- A method that can be used to replace loops in a function
- A keyword used to delete table data
- Which bootloader does Linux use to boot itself
10 Clues: CEO of Youtube • CEO of Alphabet • Address to a variable • A keyword used to delete table data • Which bootloader does Linux use to boot itself • Situation that occurs when resources are overloaded • A method that can be used to replace loops in a function • Which type of exploit utilizes fake websites and url names • ...
FOR3701_SEM 2_2024 2024-07-31
Across
- the heart of the cellphone system
- the main computer database of the cellphone system
- used by most investigators as the starting point for their investigation
- cellphone networks configure this location
- cellphone records may be used for this purpose in court
- without this, cellphone communication is not possible
Down
- hears the Section 205 subpoena application
- type of communication used by cellular phones
- the investigative principle established in 2006 for cellphones
- is also known as a mobile station
10 Clues: the heart of the cellphone system • is also known as a mobile station • hears the Section 205 subpoena application • cellphone networks configure this location • type of communication used by cellular phones • the main computer database of the cellphone system • without this, cellphone communication is not possible • ...
CrossWord 2024-07-07
Across
- A machine learning algorithm used for clustering
- An AI application that mimics conversation with users
- An ensemble learning method
- Which library is commonly used for data manipulation and analysis in Python?
- A popular machine learning library
Down
- A function defined without a name in Python
- Controls the step size in gradient descent
- Learning from data without labeled responses
- A type of AI that imitates human cognitive processes
- Type of learning involving neural networks with many layers
10 Clues: An ensemble learning method • A popular machine learning library • Controls the step size in gradient descent • A function defined without a name in Python • Learning from data without labeled responses • A machine learning algorithm used for clustering • A type of AI that imitates human cognitive processes • An AI application that mimics conversation with users • ...
Innovation Day 20 2024-06-14
Across
- - AI-driven software which can simulate a conversation with users
- - Abbreviation for Artificial Intelligence.
- - Acronym for Large Language Model.
- - Type of AI that creates new content or data.
- - Pertaining to networks that mimic the human brain.
Down
- - Open-source platform for machine learning developed by Google
- - Interface for building and interacting with software applications.
- - Programming language commonly used for AI and machine learning.
- - Microsoft's cloud service offering for advanced AI tools.
- - OpenAI's advanced conversational model.
10 Clues: - Acronym for Large Language Model. • - OpenAI's advanced conversational model. • - Abbreviation for Artificial Intelligence. • - Type of AI that creates new content or data. • - Pertaining to networks that mimic the human brain. • - Microsoft's cloud service offering for advanced AI tools. • - Open-source platform for machine learning developed by Google • ...
APCOM Unit 5 2023-04-18
Across
- Budget Cuts
- Oil leads to issues in terms of democratization
- Implemented by governments to reduce poverty
- The only course country not in the World Trade Organization
- economic networks that are growing more interconnected
- This Country has privatization and increased competition in its oil industry
Down
- reduction of state control of the economy
- This increases in the uk and is a demographic change
- This country has Special Economic Zones on its coast
- Growing populations can cause this change
10 Clues: Budget Cuts • reduction of state control of the economy • Growing populations can cause this change • Implemented by governments to reduce poverty • Oil leads to issues in terms of democratization • This country has Special Economic Zones on its coast • This increases in the uk and is a demographic change • economic networks that are growing more interconnected • ...
ΕΡΓΑΣΙΑ ΚΡΙΣΤΙΑΝ ΑΣΙΚΟΥ 2023-04-28
Across
- device that send data over a connection
- device used to connect multiple network hosts
- a person that acceses your computer and destroys it
- physical networking device
- Access point to devices outside of the network
- an intelligent way to deal with data packets
- used to connect networks
Down
- a piece of cable that connects multiple computers
- electronic device that amplifies the signal recieved
- a piece of computer hardware or software that provides functionality for other programs or devices
10 Clues: used to connect networks • physical networking device • device that send data over a connection • an intelligent way to deal with data packets • device used to connect multiple network hosts • Access point to devices outside of the network • a piece of cable that connects multiple computers • a person that acceses your computer and destroys it • ...
DePIN 2025-03-18
Across
- Real-time, high-precision GNSS for geospatial data.
- AI-driven mapping using crowd-sourced dashcam footage.
- Lets users own, control, and monetize vehicle data.
- Decentralized wireless network, powered by tokens.
- Expanding affordable and decentralized internet access.
Down
- Geospatial networks for mapping and location services.
- Converts fragmented data into decentralized AI intelligence.
- Earn from multiple projects with one token, manage in-app.
- Tracks air quality, rewards users for environmental data.
- Decentralized video streaming, rewards bandwidth sharing.
10 Clues: Decentralized wireless network, powered by tokens. • Real-time, high-precision GNSS for geospatial data. • Lets users own, control, and monetize vehicle data. • Geospatial networks for mapping and location services. • AI-driven mapping using crowd-sourced dashcam footage. • Expanding affordable and decentralized internet access. • ...
Cybersecurity 2025-07-29
Across
- Network of private computers infected with malicious software
- Technique of making data unreadable to unauthorized users
- Fraudulent attempt to obtain sensitive information
- Barrier between a trusted network and untrusted networks
- Software designed to damage, disrupt, or gain unauthorized access
- Secret string used to authenticate access
Down
- Attacker tricks someone into breaking security procedures
- Attempts to guess a password by trying many combinations
- Method of verifying identity using fingerprints, retina, etc.
- Security flaw allowing attackers to access restricted data
10 Clues: Secret string used to authenticate access • Fraudulent attempt to obtain sensitive information • Attempts to guess a password by trying many combinations • Barrier between a trusted network and untrusted networks • Attacker tricks someone into breaking security procedures • Technique of making data unreadable to unauthorized users • ...
Vocabulary Unit 3.1 2025-11-18
Across
- The study of matter, energy, motion, and forces.
- Creative expression through visual, auditory, or performance forms.
- The study of Earth’s landscapes, environments, and people.
- Focuses on computers, networks, and digital systems.
- Written works that express ideas, emotions, and stories.
Down
- The record of past events, societies, and cultures.
- The science of substances and their interactions.
- The study of living organisms and life processes.
- The language of numbers, patterns, and logic.
- Promotes fitness, movement, and teamwork.
10 Clues: Promotes fitness, movement, and teamwork. • The language of numbers, patterns, and logic. • The study of matter, energy, motion, and forces. • The science of substances and their interactions. • The study of living organisms and life processes. • The record of past events, societies, and cultures. • Focuses on computers, networks, and digital systems. • ...
Chapter 14 2014-03-23
Across
- Web Things you can easily find in a search engine
- Web A collection of documents that don't come up in a general search
- What your main focus is on
- Web Dealing with all social networks
- Sources Someone who speaks from experience
- Purpose deciding wither to be informative or persuasive
- Analysis knowing the people
- What the people think is right
- Speeches To create an understanding of your topic
- A long Story
- Sources Information found in handbooks
- What the people believe in
Down
- The system of topics
- Your central idea
- Apprehension a fear of speaking in front of people
- Copying someone else work and claim it to be yours
- Speaking Someone speaking to a large group of people
- How you handle a topic
- Diagrams Helps divide your topic to make it easier to talk about
19 Clues: A long Story • Your central idea • The system of topics • How you handle a topic • What your main focus is on • What the people believe in • Analysis knowing the people • What the people think is right • Web Dealing with all social networks • Sources Information found in handbooks • Sources Someone who speaks from experience • Web Things you can easily find in a search engine • ...
IT Office Survival Crossword 2025-06-30
Across
- This protocol secures your web traffic
- The one device that can ruin a Monday: “Out of toner!”
- The “cloud” heavyweight from Seattle
- The “power cycle” button on a server
- The “hub” of your company’s email
- When you “ping” but get nothing back
- Where all the tickets pile up endlessly
- The overnight job that always fails at 2am
- “Root” on Linux, “___” on Windows
- The process of copying your data before disaster strikes
Down
- Classic IT phrase: “It’s not a ___ issue!”
- The OS with penguin mascot
- “Oops, wrong environment!”
- The “gateway” to the internet for your office
- What you do to a device before sending it to recycling
- “Blue cable” original—makes networks go
- What IT calls a “planned” outage
- Where you “commit” your changes
- Where all your deleted files go first
19 Clues: The OS with penguin mascot • “Oops, wrong environment!” • Where you “commit” your changes • What IT calls a “planned” outage • The “hub” of your company’s email • “Root” on Linux, “___” on Windows • The “cloud” heavyweight from Seattle • The “power cycle” button on a server • When you “ping” but get nothing back • Where all your deleted files go first • ...
BVC 2022-11-14
Across
- Extrernal forces stopping people from buying the brand they want
- measures the core aspects of choice: brand saliency and brand relationships
- known to be one of the market effects
- ____ brands have strong brand networks or associative memory structures
Down
- Ipsos brand equity framework
- Brands grow when its chosen by more people, more___
- AE+ME=___
- AE stands for____
8 Clues: AE+ME=___ • AE stands for____ • Ipsos brand equity framework • known to be one of the market effects • Brands grow when its chosen by more people, more___ • Extrernal forces stopping people from buying the brand they want • ____ brands have strong brand networks or associative memory structures • ...
Phising Play Action 2025-08-21
Across
- crime committed using computer networks
- using false information to impersonate an entity
- malicious software designed to harm, disrupt or gain unauthorized access
- malicious software designed to spread from one to computer to another
Down
- cybercrime where attackers use deceptive communication
- malicious software preventing access to computer files
- transferring messages from one computer to another
- to defraud or embezzle
8 Clues: to defraud or embezzle • crime committed using computer networks • using false information to impersonate an entity • transferring messages from one computer to another • cybercrime where attackers use deceptive communication • malicious software preventing access to computer files • malicious software designed to spread from one to computer to another • ...
Unit 3: Networks or Tangles? 2017-06-05
Across
- when you watch your smartphone intensely, for a long time
- social media helps you ...... .. ...... with your friends
- synonym for "allow"
- when you are on social media, you sometimes lose ..... of time
- when you cannot do without your phone (adj.)
Down
- the place where many social media apps and websites were created
- you ..... a message, when you want people to receive it
- something you put on social media is a bit of your life that you .....
- with a smartphone, when you are bored you can .... ....
- smartphones are easy to use and you need them: they are ......
- the name of the head of a company
11 Clues: synonym for "allow" • the name of the head of a company • when you cannot do without your phone (adj.) • you ..... a message, when you want people to receive it • with a smartphone, when you are bored you can .... .... • when you watch your smartphone intensely, for a long time • social media helps you ...... .. ...... with your friends • ...
Digital Communication Methods 2023-01-31
6 Clues: Electronic Mail • A live video metting • Informal communication example WhatsApp • Online platorm to build social networks • Describes how formal dig comms should be • An online diary to share thoughts and interests
LT 3.4 2022-10-12
Across
- An empire must efficiently organize this
- An empire must distinguish its core from this
- An empire must distinguish its citizens from these
- An empire must cooperate and compete with these
- An empire must unite a diverse ___
Down
- An empire must use this to expand its territory
- An empire must impose a dominant___ on an existing___
- An empire must maintain trade ___
- An empire must use this to unite its people
9 Clues: An empire must maintain trade ___ • An empire must unite a diverse ___ • An empire must efficiently organize this • An empire must use this to unite its people • An empire must distinguish its core from this • An empire must use this to expand its territory • An empire must cooperate and compete with these • An empire must distinguish its citizens from these • ...
IT JOBS 2018-02-13
Across
- He processes computer data.
- He tests,designs and tests computer programs.
- He installs and maintains networks.
- He controls all the IT experts.
Down
- He is in charge of the database operating without a hitch.
- He creates and maintains webpages and web applications.
- He is in charge of troubleshooting and debugging of technical problems.
- He is responsible for research and development of databases.
- He designs and develops ICT devices.
9 Clues: He processes computer data. • He controls all the IT experts. • He installs and maintains networks. • He designs and develops ICT devices. • He tests,designs and tests computer programs. • He creates and maintains webpages and web applications. • He is in charge of the database operating without a hitch. • He is responsible for research and development of databases. • ...
The Hand Salon Puzzle 2021-11-29
Across
- The constant variable is the _____ of the brush
- this experiment deals with _____ sensation
- What is the independent variable?
Down
- What scientist used research to help the study with strokes and paralyzation
- Marotta used ____-up processing to help with research
- Where are you right now?
- The rubber hand illusion can cause your body to feel _______
- This experiment makes you think the ____ is your real hand
- _____ networks control the ability for growth
9 Clues: Where are you right now? • What is the independent variable? • this experiment deals with _____ sensation • _____ networks control the ability for growth • The constant variable is the _____ of the brush • Marotta used ____-up processing to help with research • This experiment makes you think the ____ is your real hand • ...
U02 Learning Aim A – Crossword (Components & Networks) 2026-04-01
Across
- (4) Wireless method of connecting devices to a network
- (12) Hardware used to display or produce results
- (7) Device used to produce hard copies
- (10) Device used to capture sound
- (9) Short-range wireless communication technology
- (9) Common network cable made of twisted wires
- (3) Technology that reads printed text into digital form
- (3) Hardware that connects a computer to a network
- (8) Private network within an organisation
- (8) Physical parts of a computer system
- (3) Technology that reads marked answers on forms
- (9) Device that displays images onto a large surface
- (3) Network covering a small area like a building
- (13) Cable with a central core used for data transfer
- (5) Input device used to control the pointer
- (7) Device used to convert paper documents into digital form
- (6) Portable computer
- (8) Device that causes movement in automated systems
- (4) Technology that uses radio waves to identify objects
- (3) Network covering a large area
Down
- (8) Input device used to type data
- (11) Hardware used to enter data into a system
- (6) Computer that provides services to others
- (21) Device that reads data from cards
- (8) Global network connecting millions of devices
- (13) Hardware used to save data
- (3) Company that provides internet access
- (3) Network for personal devices
- (17) Complete set of hardware and software working together
- (13) High-speed cable using light signals
- (11) Input and output device operated by touch
- (15) Device used to read product barcodes
- (8) Output device that produces sound
- (6) Touch-based portable device
34 Clues: (6) Portable computer • (13) Hardware used to save data • (6) Touch-based portable device • (3) Network for personal devices • (10) Device used to capture sound • (3) Network covering a large area • (8) Input device used to type data • (8) Output device that produces sound • (21) Device that reads data from cards • (7) Device used to produce hard copies • ...
wide area network 2023-10-10
Across
- computers can only connect to other computers if they know there...
- what does WAN stand for
- a benifit of the cloud is that ...... can occur
- what does DNS stand for
- what does IP adress mean
- what does ISP stand for
- what does VPN stand for
Down
- where a company may devide a LAN into smaller for the employees to communicate and share
- a characteristic of a WAN regarding its area
- A WAN can be made up of...
- what does URL stand for
- when companies host websites for the public to access
- what is the name if the biggest WAN
- what is the internet
- where LANS and WANS are redivided into smaller networks
- network of servers hosted on the internet
16 Clues: what is the internet • what does URL stand for • what does WAN stand for • what does DNS stand for • what does ISP stand for • what does VPN stand for • what does IP adress mean • A WAN can be made up of... • what is the name if the biggest WAN • network of servers hosted on the internet • a characteristic of a WAN regarding its area • ...
Social networks and teens 2025-01-21
8 Clues: publish • numerical • bring together • digital persecution • transmission of news • move the cursor up and down • put something on social media • most popular social network with teens
JPowel50 Computer Science Crossword 2015-09-28
Across
- sender and receiver are not active at the same time
- Harms your computer!
- How to get into your account
- Info on a computer, can be software items or data
- The top part of a piece of text
- what packets must visit
- Computers programmed to send files to other computer browsers
- specifies the type of code being entered
- building blocks of a Website
Down
- sender and receiver are active at the same time
- include all words together in search results
- a way to make search results more accurate
- used to connect servers across continents
- wide area networks, what internet is made up of
- World Wide Web
- If there are clashing colors on a web page, it is an example of______
- using copyright material for legal purposes
17 Clues: World Wide Web • Harms your computer! • what packets must visit • How to get into your account • building blocks of a Website • The top part of a piece of text • specifies the type of code being entered • used to connect servers across continents • a way to make search results more accurate • using copyright material for legal purposes • ...
Ransomware 2021-09-23
6 Clues: New Ransomware Variant • Protects against threat online • Convert information into a code • Software created for malicious purposes • A technique used by hackers to obtain sensitive information • Protecting networks, devices and data from unauthorized access
Computer 2016-12-06
Across
- crash
- the way by which you can enter a place
- a device which can be used for surfing the Internet
- a global system of interconnected computer networks
Down
- something you use to click on things
- a typewriter-style device which uses an arrangement of buttons or keys on a computer
- press it to move back to delete
- combination this key with A means choosing the whole text
- information or facts
9 Clues: crash • information or facts • press it to move back to delete • something you use to click on things • the way by which you can enter a place • a device which can be used for surfing the Internet • a global system of interconnected computer networks • combination this key with A means choosing the whole text • ...
Cyber security 2025-08-22
Across
- organized collection of data, stored and accessed by computers
- unauthorized access or exposure of sensitive information
- a collection of interconnected computing devices that can communicate and share resources with each other
- a weakness in a system
- publishing private personal information about an individual online without their consent
Down
- IT professional who ensures an organization's computer networks are secure
- raw facts, figures, and observations
- protecting digital systems
- Personal identification information
9 Clues: a weakness in a system • protecting digital systems • Personal identification information • raw facts, figures, and observations • unauthorized access or exposure of sensitive information • organized collection of data, stored and accessed by computers • IT professional who ensures an organization's computer networks are secure • ...
Threats to Computer Networks 2023-03-28
Across
- programs that are hidden within other files
- is a type of attack used to steal data
- these are programs that pretend to be legitimate and are often disguised as an email attachment
- method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
Down
- these are often spread through emails
- the creators of most of the problems that leads to inconvenience
- programs that attempt to blackmail a user in an attempt to make a payment to a hacker
- programs that monitor users activities and send information to hacks
8 Clues: these are often spread through emails • is a type of attack used to steal data • programs that are hidden within other files • the creators of most of the problems that leads to inconvenience • programs that monitor users activities and send information to hacks • programs that attempt to blackmail a user in an attempt to make a payment to a hacker • ...
Tech Terms 2024-05-08
Across
- an electronic machine that can store and work with large amounts of information
- global system of interconnected computer networks that uses the internet protocol suite TCP/IP TO communicate between networks and devices.
Down
- Automation is the use of technology to perform tasks with reduced human assistance.
- Robotics is the interdisciplinary study and pract ice of the design, construction, operation, and use of robots.
- Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion.
5 Clues: an electronic machine that can store and work with large amounts of information • Automation is the use of technology to perform tasks with reduced human assistance. • Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion. • ...
Networking 2016-02-07
Across
- It connects networks together.
- Tiniest piece of a file.
- Sending & receiving data over a computer network.
- Directory structure for information management.
Down
- Means rules.
- Number that uniquely identifies each device on a network.
- Group of computers that are connected to share resources and exchange data.
- Group of people overseeing the technical development of the World Wide Web.
- Any electronic device that shares resources and exchanges data on a network.
9 Clues: Means rules. • Tiniest piece of a file. • It connects networks together. • Directory structure for information management. • Sending & receiving data over a computer network. • Number that uniquely identifies each device on a network. • Group of computers that are connected to share resources and exchange data. • ...
crossword unit 2 2023-03-05
Across
- barriers resist sharing information
- warranty costs complaints and/or claims and assume additional costs
- attitudes lack of trust in the company or between partners
- chain add value to each stage
- service It can be by phone or social networks
- management mobility produces great uncertainty in the objects and purposes
Down
- theory changes gradually
- medical costs senior doctors in collaborators, associates, to poor conditions in collaborators
- of constancy of purpose lack of clear leadership
- cycle Constant optimization of business activities through four stages
10 Clues: theory changes gradually • chain add value to each stage • barriers resist sharing information • service It can be by phone or social networks • of constancy of purpose lack of clear leadership • attitudes lack of trust in the company or between partners • warranty costs complaints and/or claims and assume additional costs • ...
Television in the 1950s 2023-02-01
Across
- TV star who had his own Variety show
- How many shows did Berle have
- cost of television set
- Most popular choice of entertainment before the TV
- Star of the first hit show
Down
- When Berle's last show aired what percent of people had a TV
- When Berle's show first aired what percent of people had a TV
- One of the four television networks in 1948
- Most popular type of TV
9 Clues: cost of television set • Most popular type of TV • Star of the first hit show • How many shows did Berle have • TV star who had his own Variety show • One of the four television networks in 1948 • Most popular choice of entertainment before the TV • When Berle's last show aired what percent of people had a TV • When Berle's show first aired what percent of people had a TV
LT 3.4 2022-10-12
Across
- An empire must impose a dominant___ on an existing___
- An empire must efficiently organize this
- An empire must maintain trade ___
- An empire must cooperate and compete with these
Down
- An empire must distinguish its citizens from these
- An empire must unite a diverse ___
- An empire must distinguish its core from this
- An empire must use this to unite its people
- An empire must use this to expand its territory
9 Clues: An empire must maintain trade ___ • An empire must unite a diverse ___ • An empire must efficiently organize this • An empire must use this to unite its people • An empire must distinguish its core from this • An empire must use this to expand its territory • An empire must cooperate and compete with these • An empire must distinguish its citizens from these • ...
Mr Robot 2022-11-15
Across
- prevent attacks by blocking malicious traffic
- unwanted files or programs that can cause harm to a computer
- private information being kept secret
- people who seek to exploit weaknesses in software
- a set of characters that allows access to a system
- software designed to detect and destroy viruses
Down
- flaws in software
- the art of protecting networks, devices, and data from attacks
- type of email use to steal information about you
9 Clues: flaws in software • private information being kept secret • prevent attacks by blocking malicious traffic • software designed to detect and destroy viruses • type of email use to steal information about you • people who seek to exploit weaknesses in software • a set of characters that allows access to a system • ...
Online Safety 2018-10-10
Across
- keeping personal information secret
- a secret combination used to open and lock something
- a program that protects your computer from most scams and tricks
- sharing too much online
- a message sent between computers
Down
- bullying that happens online
- tricking people to get something of value from them
- a person who uses a computer to get into other people's information
- a communication system that connects computers and networks together
9 Clues: sharing too much online • bullying that happens online • a message sent between computers • keeping personal information secret • tricking people to get something of value from them • a secret combination used to open and lock something • a program that protects your computer from most scams and tricks • ...
CLUE QUEST 2025-10-04
Across
- An error in software that causes incorrect behavior
- Process of hiding internal data representation from outside
- A database query language
- Technique for managing concurrent processes safely
Down
- A networking device that forwards data packets between networks
- Storage that loses data when power is off
- System that converts domain names into IP addresses
- High-level language primarily used for AI and machine learning
- Algorithm used for traversing or searching tree/graph structures
9 Clues: A database query language • Storage that loses data when power is off • Technique for managing concurrent processes safely • An error in software that causes incorrect behavior • System that converts domain names into IP addresses • Process of hiding internal data representation from outside • High-level language primarily used for AI and machine learning • ...
Cloud Computing _ BCS601_Crosswords 2025-07-02
Across
- / Highest security level suitable for sensitive data
- / Popular service model offering software over the internet
- A key feature of cloud computing, "Pay only for what you ___
- Maximum level of risk or security
- Cloud model combining public and private infrastructure
Down
- Service model providing virtual machines, storage, and networks.
- / Term for computing resources provided over the internet
- / The ability to automatically adjust computing resources
- Cloud deployment model combining public and private clouds
- A level of resource utilization with minimal computing requirements
10 Clues: Maximum level of risk or security • / Highest security level suitable for sensitive data • Cloud model combining public and private infrastructure • / Term for computing resources provided over the internet • / The ability to automatically adjust computing resources • Cloud deployment model combining public and private clouds • ...
Engineer crossword 2022-09-01
Across
- run trains that transport passengers and cargo
- equipment for improving human health
- determines the amount and type of insulation needed.
- create drawings and specifications
- combining veterinary medicine and biomedical engineering
- make sure that each part they manufacture has to be shipped well and made well
- lighting effects for visual art mediums
- Test radio networks
- develop processes, test procedures and implement systems
- Engineer storage systems
- designing aircraft
- oil and gas
Down
- road network projects
- food processing machines
- Hardware circuit boards
- aircraft
- create new materials.
- devoted to the implementation of existing technology
- develop methods for extracting oil and gas
- study a broad range of subjects
- medical equipment repairers or biomedical
- use geographic information systems
- genetics in animals
- research and develop the processes,
- work closely with process engineers to improve product yield
25 Clues: aircraft • oil and gas • designing aircraft • genetics in animals • Test radio networks • road network projects • create new materials. • Hardware circuit boards • food processing machines • Engineer storage systems • study a broad range of subjects • use geographic information systems • create drawings and specifications • research and develop the processes, • ...
Medical Terminology 2022-10-20
Across
- x-rays used to create detailed pictures of the heart
- a sudden loss of brain function caused by an interruption in the supply of blood
- networks of small vessels that perfuse tissue
- disease
- problem with rhythm of your heartbeat
- heart
- portable device that records rhythm of the heart
- heart failure
- vessels that deliver blood to tissue
- when this muscle doesn't pump blood as it should
- records electrical signal
- arterial fibrillation
- without
- two
Down
- thickest layer in the arteries
- oxygen rich blood is blocked from the heart muscles
- pertaining to
- magnetric resonance imaging
- deep vein thrombosis
- effects the blood flowing in the correct direction
- pumps blood through the system
- vessels that return blood to the heart
- ultrasound of the heart
- blood pressure
- cardiac care unit
25 Clues: two • heart • disease • without • pertaining to • heart failure • blood pressure • cardiac care unit • deep vein thrombosis • arterial fibrillation • ultrasound of the heart • records electrical signal • magnetric resonance imaging • thickest layer in the arteries • pumps blood through the system • vessels that deliver blood to tissue • problem with rhythm of your heartbeat • ...
ch 20 vocab 2019-12-11
Across
- nation where all facilities needed for the advanced production of goods
- cooperative venture sponsered by 16 nations
- layer of the earths upper atmosphere
- transferring of genes from one living thing to another
- cultral elements
- greatest global health issue
- process of industrialization is not yet complete
- placing of high value
- growth or spread
- all human beings have rights to life,liberty,and security
- attempt to increase food resources worldwide
- politically motivated attacks
Down
- difference of opinion
- financial interactions involving people
- commerce between nations without economic restrictions
- U.S. federal agency
- creation of plants or animals that are genetically identical to another
- linkage of computer networks
- use of force or threats to frighten people or governments
- difference between men and women
- person who leaves his or her nation in pursuit of safety
- economic development
- antiterrorism bill
23 Clues: cultral elements • growth or spread • antiterrorism bill • U.S. federal agency • economic development • difference of opinion • placing of high value • linkage of computer networks • greatest global health issue • politically motivated attacks • difference between men and women • layer of the earths upper atmosphere • financial interactions involving people • ...
Fundamentals of Computing Terms 2020-09-21
Across
- A harmful computer program that creates glitches
- transferring data from the internet to a device
- a small graphic that represents a file/application
- A widely-accepted cyber security measure
- the protection of computer systems/networks
- an interface for connecting peripheral devices
- an output device that displays info from CPU
- uses pictures and words to represent ideas, etc.
- a piece of equipment outside the computer
- software that is pre-programmed for user
Down
- the blocking of data access for ransom
- program that you run on a computer/phone
- an input device that allows user to click graphics
- 8 bites of info represented in 1 character
- the brain of the computer
- Temporary memory
- smallest piece of info in the computer
- items that you can touch, I.E, tablet, etc.
- transferring data to the internet
- a unit of storage that is about 1 mil bytes
- the network of physical objects
21 Clues: Temporary memory • the brain of the computer • the network of physical objects • transferring data to the internet • the blocking of data access for ransom • smallest piece of info in the computer • program that you run on a computer/phone • A widely-accepted cyber security measure • software that is pre-programmed for user • a piece of equipment outside the computer • ...
Alpo 2021-02-25
Across
- cable with 8 wires used for networking
- network spanning a local area
- Unique six sets of two numbers identifier for a device
- global network comprised of most devices
- reaches up to 100gb/s of speed or higher
- ip comprised of 8 sets of 4 long hexadecimal numbers
- used to connect together multiple devices, not that intelligent
- connects devices to others, provides a firewall
- supports 100baseT
Down
- fastest speed possible
- extends the range of cabled networks
- supports 1000baset
- network spanning a wide area
- network spanning a metropolitan area
- supports 10baseT
- aware of every device connected to it, used to connect together multiple devices, smart
- stores and transfers data, has no physical interface
- Number assigned by router linked to your internet activity
- ip comprised of 4 different sets of numbers ranging 0 - 255
- Two or more computers linked to share resources
20 Clues: supports 10baseT • supports 100baseT • supports 1000baset • fastest speed possible • network spanning a wide area • network spanning a local area • extends the range of cabled networks • network spanning a metropolitan area • cable with 8 wires used for networking • global network comprised of most devices • reaches up to 100gb/s of speed or higher • ...
The types of Engineers! 2021-10-14
Across
- Clear Boxes
- Builds Advanced Logic in Computer Systems
- Created the Quality Management System (QMS)
- Bridges
- Chain Home/Air Warning System
- Visuals for Theatre performances by Lighting the Scenes
- Printing press
- Steam Engines
- Nuclear Power Plant, Electricity, Electrical Power Distribution
- hovercraft
- Fire Alarm
- X-ray
- Prosthetics
Down
- Automobile sound systems
- Health and Advance Manufacture Systems
- Ice Powers Condition, Dual Fuel Heat Pumps
- Electric battery
- Built New Exhibits for Endangered or Rare Animals
- Fiber, Satellite, and Wired Communication Systems
- Solar Cell
- Laser
- The Design and Installation of Mobile Wireless Networks and Maintaining Them
- Dams
- Improves Product Yield and Troubleshoots Process
- Technological devices
- Furnace
26 Clues: Dams • Laser • X-ray • Bridges • Furnace • Solar Cell • hovercraft • Fire Alarm • Clear Boxes • Prosthetics • Steam Engines • Printing press • Electric battery • Technological devices • Automobile sound systems • Chain Home/Air Warning System • Health and Advance Manufacture Systems • Builds Advanced Logic in Computer Systems • Ice Powers Condition, Dual Fuel Heat Pumps • ...
KeyW Crossword 2017-01-18
Across
- When at work, what must you always carry
- Applying statistical analysis to data which has a geographical or spatial aspect
- KeyW non-profit organization abbreviated
- KeyW's best location
- What is the name of our newsletter
- KeyW CEO
- Time sheet
- What is the surname of KeyW's founder
- What type of bird is our mascot
Down
- KeyW's colors
- What month was KeyW founded
- What is the name of our mascot
- Radio Detection and Ranging
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- Parrot Ball location
- How many miles connect Key West to Florida main land
- Which food truck offers the best cheese steaks
- What color is our KeyW van
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
Rebecca Jones-crossword-2nd period 2016-10-24
Across
- storing program that keeps track of reading and writing programs
- connects computers of networks together
- small program that changes the health of your computer
- software mad to mess up your computer
- when people try to steel your information
- internet that is not hooked up with cables
- data programs
- memory that stores data
- free software download that advances searches and games
- lets Wi-Fi connect to a wired server
Down
- programe that runs your computer
- a smaller picture of the original
- using a remote server to store things
- 2 or more PC’s are connected and share resources
- a computer that has been programmed to perform a certain task
- connects two computers and lets them transfer data
- a device that sends things across a network
- a device that connects to the internet
- when you connect to computers when there was a bad connection
- sends digital signals over phone lines
20 Clues: data programs • memory that stores data • programe that runs your computer • a smaller picture of the original • lets Wi-Fi connect to a wired server • using a remote server to store things • software mad to mess up your computer • a device that connects to the internet • sends digital signals over phone lines • connects computers of networks together • ...
Abigail Barrera-Crossword-7th period 2016-10-24
Across
- productivity systems
- refers to a computer that can do a number of tasks
- network of computers that share files, etc.
- programs that affect computers negatively
- mobile phone that can do more than call
- broadband internet that can reach 15 mbps
- connection point for devices in one network
- software solely supported by advertisements
Down
- storing and accessing data over the internet
- anything that deals with computing technology
- using good behavior when using technology
- receives and analyzes packets, sends to networks
- people trying to steal personal information
- portable computer
- separate hard drive to different portions
- programs that manage the computer itself
- anything that can harm a computer system
- unnecessary advertising by emails etc.
- connects computers, printers, etc.
- peripheral device that connects to high speed internet
20 Clues: portable computer • productivity systems • connects computers, printers, etc. • unnecessary advertising by emails etc. • mobile phone that can do more than call • programs that manage the computer itself • anything that can harm a computer system • using good behavior when using technology • separate hard drive to different portions • ...
Kennedy Carter-Crossword-7th period 2016-10-24
Across
- the year WWW was created
- the part of a computer known as the brain
- another name for the system unit on a computer
- the keyboard shortcut for underline
- electronic device that has the ability to store, retrieve, and process data, and can be programmed with instructions
- how to select consecutive files inside a Google Drive folder
- what does ROM stand for
- the keyboard shortcut for cut
- what does WWW stand for
- A network on a computer linking smaller networks worldwide
Down
- the year the internet created
- what does RAM stand for
- When was WWW created
- Transfers information out of a piece of technology
- the keyboard shortcut for undo
- who created WWW
- a piece of equipment that stores information
- puts information into a piece of technology
- the keyboard shortcut for paste
- the keyboard shortcut for copy
20 Clues: who created WWW • When was WWW created • what does RAM stand for • what does ROM stand for • what does WWW stand for • the year WWW was created • the year the internet created • the keyboard shortcut for cut • the keyboard shortcut for undo • the keyboard shortcut for copy • the keyboard shortcut for paste • the keyboard shortcut for underline • ...
ICT Introduction 2017-09-05
Across
- Head-mounted display.
- To get information from the internet and save them onto your computer.
- The heart of a computer.
- Non-biodegradable waste like plastic cases, old PCs, microchips.
- Programmes on a PC.
- Physical units attached to the computer.
- Whiteboard that doesn't require any chalk to write on its surface.
- Newspapers in digital format accessible via the net.
- Navigation System in your car.
Down
- Read only memory
- The mechanical parts of a computer.
- Devices, which extract results from the PC.
- A collection of data stored on a computer.
- Technology for helping people with disability.
- Wireless connection.
- A monitor that is operated by direct human touch.wifi
- Random access memory
- Electronic book.
- generation People who have grown up with PCs.
- Technology combining telephone networks and the internet.
- Devices, which let us enter data onto the PC.
21 Clues: Read only memory • Electronic book. • Programmes on a PC. • Wireless connection. • Random access memory • Head-mounted display. • The heart of a computer. • Navigation System in your car. • The mechanical parts of a computer. • Physical units attached to the computer. • A collection of data stored on a computer. • Devices, which extract results from the PC. • ...
Techno def 2022-02-28
Across
- A person that changes things
- radar for light
- A wireless network
- Solar Systems
- Spread like a virus
- a pathway for robotic behavior
- Thinking of ideas
- misleading thumbnail
- How much of X for Y time
- high resolution sound
- reusing
- Radio detection and ranging
- more content the better
- vr youtube
- Massive open online classes
- way people think
Down
- being good on the internet
- Use multiple sensor
- using quantum mechanics to compute
- your value for data
- Free premium
- The generation that was born without phones
- Making your website mobile friendly
- key performance indicator
- Taking over
- When ai can improve on it self
- Learning Ai
- too many passwords
- Someone who wants to make a business
- Someone who invents
- Posting multiple times
31 Clues: reusing • vr youtube • Taking over • Learning Ai • Free premium • Solar Systems • radar for light • way people think • Thinking of ideas • A wireless network • too many passwords • Use multiple sensor • your value for data • Spread like a virus • Someone who invents • misleading thumbnail • high resolution sound • Posting multiple times • more content the better • How much of X for Y time • ...
DnD 1 2023-11-24
Across
- Blue gemstone; form of Corundum
- Large unit of digital data storage
- A gentle, mild breeze
- Stony sentinel often found on Gothic buildings
- Popular programming language for web development
- Mythical creature that can petrify with its gaze
- Unit of digital information, often abbreviated as KB
- Magic-user who communicates with the dead
- Memory aid, like 'Every Good Boy Deserves Fruit'
- The fully shaded inner region of a shadow
- Wired network technology for local area networks
- Open-source operating system kernel
Down
- Type of fruit and also a popular mini computer
- One attracted to foreign peoples, cultures, or customs
- Sequence of steps for solving problems
- Extremely bright and distant celestial object
- Chemical element with the symbol Y
- Device for viewing frequency waves, especially in audio
- Point of interaction between two systems or devices
- Larger cousin of goblins in fantasy settings
20 Clues: A gentle, mild breeze • Blue gemstone; form of Corundum • Large unit of digital data storage • Chemical element with the symbol Y • Open-source operating system kernel • Sequence of steps for solving problems • Magic-user who communicates with the dead • The fully shaded inner region of a shadow • Larger cousin of goblins in fantasy settings • ...
Globalization and cashless payment 2025-08-26
Across
- Card that allows purchases on credit to be paid later
- Removal of barriers to international trade.
- A company that operates in many different countries
- Bank card that deducts funds directly from an account.
- System of production, distribution, and consumption.
- The exchange of information worldwide.
- Identity, customs, and traditions spread across nations.
- Payment system without using physical cash.
- Process of increasing interconnection between countries in economy, politics, and culture.
- Exchange of goods and services between countries.
- The most popular cryptocurrency.
Down
- A digital wallet (e.g., GoPay, OVO, PayPal).
- Process of uniting countries in various fields.
- Buying and selling through the internet.
- Electronic machine used for card transactions at checkout
- The state of being connected through networks and the internet.
- Means of moving people or goods from one place to another.
- The act of transferring or exchanging money.
- Innovation in financial technology services.
- Standardized QR code payment system in Indonesia.
20 Clues: The most popular cryptocurrency. • The exchange of information worldwide. • Buying and selling through the internet. • Removal of barriers to international trade. • Payment system without using physical cash. • A digital wallet (e.g., GoPay, OVO, PayPal). • The act of transferring or exchanging money. • Innovation in financial technology services. • ...
Networking & Cyber Ethics 2025-05-22
Across
- Using digital platforms to harass others.
- Someone who gains unauthorized access to data.
- A computer that provides data to other computers.
- Moral principles guiding online behavior.
- Device that connects your home to the Internet.
- Footprint The trail of data left behind by online activity.
- Wide Area Network, larger than LAN.
- Software that protects against malicious programs.
- Local Area Network, usually within a building.
- Storing data on remote servers accessed via the Internet.
Down
- Fraudulent attempt to get sensitive information.
- Software designed to harm a computer.
- A device that forwards data packets between networks.
- A set of rules for data communication.
- A global network connecting millions of computers.
- Security system that monitors and controls incoming and outgoing traffic.
- A computer that receives data from a server.
- Address A unique number assigned to a device on a network.
- Secret code used for authentication.
- Virtual Private Network provides secure Internet access.
20 Clues: Wide Area Network, larger than LAN. • Secret code used for authentication. • Software designed to harm a computer. • A set of rules for data communication. • Using digital platforms to harass others. • Moral principles guiding online behavior. • A computer that receives data from a server. • Someone who gains unauthorized access to data. • ...
Computer Security 2026-01-07
Across
- malware that pretends to be safe software
- malware that shows unwanted advertisements
- malware that spreads automatically across networks
- software change that fixes security problems
- harmful software designed to damage devices or steal data
- protecting data by turning it into unreadable code
- unwanted or junk messages sent online
- fake messages or websites used to steal information
- security system that blocks unauthorized access
Down
- software that detects and removes malware
- someone who tries to break into systems illegally
- extra login step for better security
- software that secretly tracks user activity
- a type of malware that spreads by infecting files
- dishonest online trick to get money or data
- personal or important digital information
- personal online profile for a service
- malware that locks files and demands payment
- secret word or code used to log in
- control over who can see your personal information
20 Clues: secret word or code used to log in • extra login step for better security • personal online profile for a service • unwanted or junk messages sent online • software that detects and removes malware • malware that pretends to be safe software • personal or important digital information • malware that shows unwanted advertisements • ...
Networking concepts & Cyber ethics 2025-06-18
Across
- a small message sent over the internet.
- the unique number assigned to every device on a network.
- a group of connected computers in a small area.
- the illegal act of stealing someone’s personal data.
- keeping your data safe and private online.
- a place to store web pages.
- a physical device used to connect computers in a network.
- software that blocks harmful websites.
- acting kindly and respectfully online.
Down
- harmful links or attachments often sent via email.
- a global system of interconnected networks.
- software used to browse the web.
- rule-breaking activity on a computer.
- another word for cyber cheating or copying someone’s work.
- a strong word used to protect accounts.
- someone who uses the internet to bully others.
- unwanted software that harms your system.
- a document that explains acceptable computer use.
- the right to control how your personal information is used.
- connecting two or more computers.
20 Clues: a place to store web pages. • software used to browse the web. • connecting two or more computers. • rule-breaking activity on a computer. • software that blocks harmful websites. • acting kindly and respectfully online. • a small message sent over the internet. • a strong word used to protect accounts. • unwanted software that harms your system. • ...
TECHNOLOGY 2026-02-26
Across
- Secret word used for security
- Software designed to damage or disrupt systems
- Tool to store and generate secure passwords
- Digital elements added to the real world
- Someone who gains unauthorized access to systems
- Physical parts of a computer
- Protecting networks, devices, and data from attacks
- Extremely large datasets analyzed for trends
- Converting information into a secret code
- To get a file from the internet
- Data left behind when using technology
- Delivering video or audio content online
- Computer-generated 3D environment
Down
- To send a file to the internet
- Storing and accessing data online
- A machine for processing information
- Used to type on a computer
- Programs used on a computer
- Global system connecting computers
- Machines or programs that simulate human thinking
- Mobile device for calls and apps
- Software for smartphones or tablets
- A machine programmed to perform tasks
- Security system that controls network traffic
24 Clues: Used to type on a computer • Programs used on a computer • Physical parts of a computer • Secret word used for security • To send a file to the internet • To get a file from the internet • Mobile device for calls and apps • Storing and accessing data online • Computer-generated 3D environment • Global system connecting computers • Software for smartphones or tablets • ...
Computing 2024-05-08
Across
- instructions that tell a computer what to do
- when hackers listen in on your wifi signals and see everything you are doing online
- coverts data into unreadable code
- video file format
- email messages are organized into these
- links with isp and transmits digital data over analog utility lines
- data entered into a computer
- random access memory
- spread from 1 computer to another without human interaction
- physical components of a computer
- local area network
Down
- hardware that stores data
- act of cracking into a computer to steal information
- a programmable machine
- wide area network
- attaches itself to a file and can spread from 1 computer to another
- device that transfers data between networks
- audio file format
- compressed files
- holds the emails you receive
- image file format
- software that is embedded in hardware
- security software that protects your home computer from hackers
23 Clues: compressed files • wide area network • audio file format • video file format • image file format • local area network • random access memory • a programmable machine • hardware that stores data • holds the emails you receive • data entered into a computer • coverts data into unreadable code • physical components of a computer • software that is embedded in hardware • ...
ch 7 vocab 2024-11-20
Across
- first empire in india
- creator of the world
- the process of making conquered peoples part of chinese government culture
- acceptance of people who held different religious belief
- destroyer of the world
- one of india's greatest writers
- a sect of buddhism that offers salvation to all and allows popular worship
Down
- preserver of the world
- headed by the mother rather than the father
- included 18 different ranks
- central authority controls the running of a state
- occurs when a group has exclusive control over the production and distribution of certain goods
- vast networks of caravan routes
- india's second empire
- mounded stone structures built over holy objects
- the language the mauryans spoke
- headed by the oldest male
- brought the mauryan empire to its greatest heights
- also called the hinayana
- ruled china for more than 400 years
20 Clues: creator of the world • first empire in india • india's second empire • preserver of the world • destroyer of the world • also called the hinayana • headed by the oldest male • included 18 different ranks • vast networks of caravan routes • the language the mauryans spoke • one of india's greatest writers • ruled china for more than 400 years • ...
The internet and its uses 2024-08-05
Across
- a program or program code that replicates itself
- unsolicited emails
- text file of words used in a brute force attack
- unwanted advertising
- a digital record of date and time
- the act of gaining illegal access to a computer
- a text-based address fora web page
- text file sent from a website to a user’s browser
- type of malware that gathers information
- corrupting or manipulating data illegally
- sending out legitimate-looking emails
- text or an image that is link to a site
Down
- a form of digital currency
- the protection of data by use of coding
- software that connects to a domain name
- a stand-alone type of malware that can selfr-replicate
- the world-wide interconnection of networks
- fake requests come from many different computers
- massive collection of web pages
- a decentralised database
20 Clues: unsolicited emails • unwanted advertising • a decentralised database • a form of digital currency • massive collection of web pages • a digital record of date and time • a text-based address fora web page • sending out legitimate-looking emails • the protection of data by use of coding • software that connects to a domain name • text or an image that is link to a site • ...
Crossword 2025-10-14
Across
- – Structured collection of related data
- -A unique numerical address assigned to each device connected to a computer network
- – A collection of elements stored in contiguous memory
- -Model performance metric
- -connects different networks
- – Step by step logical procedure to solve a problem
- -connects distributed nodes
- -A sequence of characters
- – Executes a block of code multiple times
- -Temporary memory
Down
- – Deriving a new class from an existing one
- -Amazon voice activated assistant
- -A person who breaks into computer systems
- – Tool used to find and fix programming errors
- – Relationship between two classes
- -Popular open source programming language, version 3.13 released in 2025.
- -Apple’s AI Assistant
- – Reusable block of code
- -Nasty software that harms your device
- -a type of artificial intelligence model that is trained on a massive amount of text data to understand and generate human-like language
20 Clues: -Temporary memory • -Apple’s AI Assistant • – Reusable block of code • -Model performance metric • -A sequence of characters • -connects distributed nodes • -connects different networks • -Amazon voice activated assistant • – Relationship between two classes • -Nasty software that harms your device • – Structured collection of related data • ...
Ethernet Standards Terminology 2025-09-12
Across
- One of the slowest ethernet standards what utilizes bus topologies.
- IEEE standard for cabled networks
- Jenny, I've got your number.
- Device used with 100BASE-TX transmissions.
- Multimode with Standard Connector (SC).
- Each color coded pair in a Cat5e cable has this feature to reduce interference.
- The "A" in CSMA/CD.
- Fiber with a max of 300m, uses an LC connector.
- Another name for 100BASE-TX using copper cabling.
- Simultaneous two-way communication.
- Shorthand for shielded and foiled Category 7 cable.
Down
- Copper cable wit a maximum distance of 30m.
- 100MBPS Multi-Mode with MT-RJ connections.
- 10 gigabit Single Mode Fiber.
- Fiber with a max of 275m.
- This type of interference is common with unshielded cabling.
- Bidirectional communication with one sender at a time.
- OM4 that maxes out at 400m with Lucent Connectors.
- Devices connected to a hub share a _______.
- Shorthand for non-shielded copper pair cable.
20 Clues: The "A" in CSMA/CD. • Fiber with a max of 275m. • Jenny, I've got your number. • 10 gigabit Single Mode Fiber. • IEEE standard for cabled networks • Simultaneous two-way communication. • Multimode with Standard Connector (SC). • 100MBPS Multi-Mode with MT-RJ connections. • Device used with 100BASE-TX transmissions. • Copper cable wit a maximum distance of 30m. • ...
Clinical Laboratory Knowledge Challenge 2026-04-02
Across
- used for procedures CPT
- reviewed by this specialist Pathologist
- team chasing payments Accounts Receivable
- required before certain tests Authorization
- commonly tested for breast cancer risk BRCA
- used to manage lab data LIS
- and BRCA2 are types of Tumor Suppressor Genes
- claims that never go away Aging
- street lab location Corporate Grove Drive
- provider qualifications Credentialing
- used to amplify DNA PCR
- the same test again just to be sure Duplicate
- front line of every specimen Accessioning
- to join insurance networks Contracting
Down
- counseling often recommended before Testing
- insurance for the third time FollowUp
- lab systems running IT Support
- forever for payer response Pending
- tested in PSA screening Prostate
- method using antibodies for detection Immunoassay
- does RCM stand for? Revenue Cycle Management
- that carries genetic instructions DNA
- classification system ICD
- variation studied in testing Mutation
- owed to the lab Receivables
- before high-cost testing Precertification
- of applying stains to slides Staining
- of blood cells Hematology
- test that gets added after everything is done AddOn
29 Clues: used for procedures CPT • used to amplify DNA PCR • classification system ICD • of blood cells Hematology • used to manage lab data LIS • owed to the lab Receivables • lab systems running IT Support • claims that never go away Aging • tested in PSA screening Prostate • forever for payer response Pending • insurance for the third time FollowUp • ...
Your phone and your location 2015-01-06
6 Clues: the M in MAC • the A in MAC • the C in Mac • Means wireless network • The thing that's special about the MAC address • What Wi-Fi networks can do using your MAC address
End 2026-03-10
6 Clues: II End of World War One • Zigzagging ditch networks • President Wilson's third point • How many people died during WWI • Lands formerly held by Russia were given • Number of countries at the Paris Peace Conference
LT 3.4 2022-10-12
Across
- An empire must distinguish its citizens from these
- An empire must unite a diverse
- An empire must impose a dominant___ on an existing___
- An empire must maintain trade ___
Down
- An empire must efficiently organize this
- An empire must use this to expand its territory
- An empire must cooperate and compete with these
- An empire must use this to unite its people
- An empire must distinguish its core from this
9 Clues: An empire must unite a diverse • An empire must maintain trade ___ • An empire must efficiently organize this • An empire must use this to unite its people • An empire must distinguish its core from this • An empire must use this to expand its territory • An empire must cooperate and compete with these • An empire must distinguish its citizens from these • ...
LT 3.4 2022-10-12
Across
- An empire must distinguish its citizens from these
- An empire must unite a diverse ___
- An empire must impose a dominant___ on an existing___
- An empire must maintain trade ___
Down
- An empire must efficiently organize this
- An empire must use this to expand its territory
- An empire must cooperate and compete with these
- An empire must use this to unite its people
- An empire must distinguish its core from this
9 Clues: An empire must maintain trade ___ • An empire must unite a diverse ___ • An empire must efficiently organize this • An empire must use this to unite its people • An empire must distinguish its core from this • An empire must use this to expand its territory • An empire must cooperate and compete with these • An empire must distinguish its citizens from these • ...
EQUATE Cybersecurity - Email edition 2023-05-24
Across
- File included with an email that may carry risks.
- Something to look for when verifying an email
- Unwanted bulk emails
- website or email address identifier
Down
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • File included with an email that may carry risks. • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
JPowel50 Computer Science Crossword 2015-09-28
Across
- Info on a computer, can be software items or data
- Computers programmed to send files to other computer browsers
- a way to make search results more accurate
- The top part of a piece of text
- what packets must visit
- How to get into your account
- include all words together in search results
Down
- using copyright material for legal purposes
- Harms your computer!
- sender and receiver are not active at the same time
- World Wide Web
- If there are clashing colors on a web page, it is an example of______
- wide area networks, what internet is made up of
- specifies the type of code being entered
- sender and receiver are active at the same time
- used to connect servers across continents
- building blocks of a Website
17 Clues: World Wide Web • Harms your computer! • what packets must visit • How to get into your account • building blocks of a Website • The top part of a piece of text • specifies the type of code being entered • used to connect servers across continents • a way to make search results more accurate • using copyright material for legal purposes • ...
EQUATE - Mobile Security Risks Edition 2023-06-21
Across
- Short for malicious software, it refers to any software designed to harm or exploit computer systems
- The process of converting plain text or data into an unreadable form (ciphertext) to prevent unauthorized access, ensuring confidentiality and data security.
- Type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
- A network security device or software that monitors and controls incoming and outgoing network traffic, acting as a barrier between trusted internal networks and untrusted external networks.
Down
- The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people.
- A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
- Wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- A word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user
8 Clues: Short for malicious software, it refers to any software designed to harm or exploit computer systems • Wireless networking technology that uses radio waves to provide wireless high-speed Internet access. • The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people. • ...
