networks Crossword Puzzles
My Computer Anatomy Crossword-Manjot 2017-09-20
Across
- Is a common interface that enables communication between devices
- a local area network
- Worldwide system of computer networks
- Network that is deigned to block unauthorized access while permitting outward communication
- Wide area network
- Link form a hypertext file or document to another location
- Type of computer memory that can be accessed randomly
- Printed circuit board containing the principle components
Down
- The brain of the computer
- Collection of physical parts of a computer system
- The programs and other operating information used by a computer
- Ability to use information and communication
- for web pages
- set of computers connected together for the purpose of sharing resources
- Retains the its content even when the computer is turned off
15 Clues: for web pages • Wide area network • a local area network • The brain of the computer • Worldwide system of computer networks • Ability to use information and communication • Collection of physical parts of a computer system • Type of computer memory that can be accessed randomly • Printed circuit board containing the principle components • ...
tek class 2018-04-04
Across
- The computing part of the computer
- The primary method for keeping a computer secure from intruders
- it is a scam to steal valuable information such as credit card and social security numbers
- not enough staff or time
- The address that defines the route to a file on an Internet server
- Instructions for the computer
- Machinery and equipment
Down
- a circle that is good to eat
- The fundamental display element of an electronic screen
- An organization that provides access to the Internet
- An inhouse website that serves employees only
- To write and post an entry in a Web
- a large network made up of smaller networks
- The most widely used hardware interface for attaching peripherals to a computer
- To store data
15 Clues: To store data • Machinery and equipment • not enough staff or time • a circle that is good to eat • Instructions for the computer • The computing part of the computer • To write and post an entry in a Web • a large network made up of smaller networks • An inhouse website that serves employees only • An organization that provides access to the Internet • ...
Crossword 3 2015-05-21
Across
- Properly configured firewalls prevent users from accessing resources that are not _________ for business activities
- Server _______ is a technique to assess what services should be running on a server and turn off any unnecessary services
- Users will always let you know if they are ______ to access something they need on the network
- A buffer between two networks containing servers or resources that must be available to the Internet with a different level of security from other internal systems
- ________ provides the ability for internal computers to use a single external IP address for communication on the Internet
- A command line tool that utilizes the echo-request and echo-reply to provide a tool for testing connectivity on a network
- Ports 135-139 and 445 are used in Microsoft networks for the browsing and _________ of files
- The firewall policy should be available for internal ______ to review
- The ________ policy is a high-level document describing acceptable incoming and outgoing network traffic and requires very little understanding of technology to understand.
- A method of file sharing among computers. (Kazaa, Napster, etc)
Down
- A technology whereby users are notified when their friends are online and available to chat
- This tool can be used to determine the ip address of websites
- A common terminal based application used to gain access to servers and network equipment
- ___________ often adopts a more open firewall strategy
- An attack where a large volume of network requests are generated, also called a DOS attack.
- By talking with knowledgeable employees, hackers often use _______ engineering to bypass firewalls
- One of the hardest parts of setting up a firewall policy is determining what services _________ will be able to access
- DNS uses port 53 TCP connections for ___________ which may not need to pass through the firewall
- The corporate _____ server should be allowed to make outgoing port 25 SMTP connections
- The 2 key functions of a firewall are to protect the internet network from attack and controlling access of internal machines to the _________
20 Clues: ___________ often adopts a more open firewall strategy • This tool can be used to determine the ip address of websites • A method of file sharing among computers. (Kazaa, Napster, etc) • The firewall policy should be available for internal ______ to review • The corporate _____ server should be allowed to make outgoing port 25 SMTP connections • ...
Pt.2 of Network Vocabulary 2024-04-07
Across
- is a process of moving data packets from source to destination
- is a digital representation of anything in any form
- Processing Unit is a class of logic machines that execute computer programs
- is where you transmit a message to a single computer on a network
- Tolerance is an ability of a system to continue perform his functions when one or more of its components has failed
- a set of rules that controls connection, communication, and data transfer between two computing endpoints
- is an application or a device that performs services for connected client
- a device for connecting multiple twisted pair or fiber optic Ethernet devices together, making them act as a single network segment
- a set of communications protocols that implement the protocol stack on which the Internet runs
- Voice over Internet Protocol optimized for the transmission of Voice through the Internet
- is a unique address that certain electronic devices such as computers use in order to communicate with each other on a computer network
- Media Access Control address, also known as hardware address is a unique identifier attached to Network Interface Cards
- is a network protocol used in Internet and LAN connections
Down
- a layered, abstract description for communications and computer network protocol design
- is where you simultaneously transmit a message to a group of computers on a network
- is a device that retransmits a signal at a higher level or power
- Wide Area Network is a computer network that covers a broad area
- is a worldwide, public series of interconnected computer networks that transmit data using Internet Protocol
- Operating System is the software that manages the resources of a computer
- communications network tunnel through another network, dedicated for a specific network
- a device that controls data packets forwarding between different networks
- is an internetworking device used to help conserve the bandwidth on the network
- is a private computer network that uses Internet Protocol to securely share part of an organization's information or operations with its employees
- Local Area Network is a computer network covering a small geographic area
- Operating System is the software that manages the resources of a computer
- is a device that connects network segments
26 Clues: is a device that connects network segments • is a digital representation of anything in any form • is a network protocol used in Internet and LAN connections • is a process of moving data packets from source to destination • is a device that retransmits a signal at a higher level or power • Wide Area Network is a computer network that covers a broad area • ...
kim chart 2025-04-04
Across
- device that captures images or text from physical documents and converts them into a digital format for storage and manipulation on a computer
- an output device that converts electrical signals from the computer into audible sound waves, allowing users to hear audio output from the computer
- a device that prints documents and images onto paper or other materials
- a smaller, faster memory that stores frequently accessed data, allowing for quicker retrieval than accessing main memory (RAM)
- input devices (keyboards, mice), output devices (printers, monitors), and storage devices (external hard drives)
- a physical data storage device that uses magnetic storage to store and retrieve digital information on one or more rapidly rotating rigid disks (platters)
- an input device that allows you to type letters, numbers, and symbols into your computer or other electronic device
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- converts alternating current (AC) from the wall outlet to the direct current (DC) needed to power a computer's internal components
- the "brain" of a computer, responsible for executing instructions and performing calculations to run programs and operate the system
- the main printed circuit board within a computer
- a device that captures images or text from physical documents and converts them into a digital format for storage and manipulation on a computer
- a computer and networking device that forwards data packets between computer networks
Down
- a type of computer storage device that uses integrated circuit assemblies to store data persistently
- a specialized processor originally designed to accelerate graphics rendering
- allows devices to communicate with each other without cables or wires
- a type of non-volatile memory that stores data permanently, meaning the data remains even when power is off, and can only be read, not modified or erased
- a device that converts digital signals from a computer into analog signals for transmission over telephone lines or cable networks, and vice versa, enabling internet access and communication
- an essential component of any laptop or computer
- external hardware components that connect to a computer to extend its functionality
20 Clues: an essential component of any laptop or computer • the main printed circuit board within a computer • allows devices to communicate with each other without cables or wires • a device that prints documents and images onto paper or other materials • a specialized processor originally designed to accelerate graphics rendering • ...
International Brew Crossword 2021-07-31
Across
- also known as international bank of reconstruction and development
- enterprises that produces, market, invests and operates across the world
- this country is a part of the NAFTA
- South American regional economic organization
Down
- chinese word for personal connection, relationships or social networks
- gave the theory of comparative cost advantage
- gave the theory of absolute cost advantage
- world’s largest selling beer by volume
- video streaming service taken over by walt disney from Comcast
9 Clues: this country is a part of the NAFTA • world’s largest selling beer by volume • gave the theory of absolute cost advantage • gave the theory of comparative cost advantage • South American regional economic organization • video streaming service taken over by walt disney from Comcast • also known as international bank of reconstruction and development • ...
Test 2022-05-08
Across
- Right to keep your data safe
- The vital need for Domotics in our current life
- Evolution of the POV for gaming
- Book published in 1992 which has defined the metaverse
- A distinctive attribute or aspect of something
Down
- The way someone move his body which help to identify him
- Software to keep in touch with other human beings
- The future leader of social networks
- To take place in another body shell
9 Clues: Right to keep your data safe • Evolution of the POV for gaming • To take place in another body shell • The future leader of social networks • A distinctive attribute or aspect of something • The vital need for Domotics in our current life • Software to keep in touch with other human beings • Book published in 1992 which has defined the metaverse • ...
ML ISE 2024-10-11
Across
- What term refers to model sensitivity to data changes?
- What is the broader field that includes ML?
- What occurs when a model is too simple?
- What is the error from simplifying a model?
Down
- What term describes a model that learns noise?
- Which ML subset uses deep neural networks?
- What is the sequence to build an ML model?
- What is the process of fixing data errors?
- What involves converting data for analysis?
9 Clues: What occurs when a model is too simple? • Which ML subset uses deep neural networks? • What is the sequence to build an ML model? • What is the process of fixing data errors? • What involves converting data for analysis? • What is the broader field that includes ML? • What is the error from simplifying a model? • What term describes a model that learns noise? • ...
Computer chapter 1 and 2 crossword puzzle 2024-06-22
Across
- The CPU is also called as
- ALU stands for
- Wrist watches microwave oven washing machine are example of _________ computer
- __________ computer performs only specific tasks
Down
- server __________ are medium size computers used to host programs and data for small networks
- __________ is used to store data and programs
- __________ computer is most powerful computer
- Collecting the data and converted into information is called
- This part send signals to other parts of computer to tell what to do
9 Clues: ALU stands for • The CPU is also called as • __________ is used to store data and programs • __________ computer is most powerful computer • __________ computer performs only specific tasks • Collecting the data and converted into information is called • This part send signals to other parts of computer to tell what to do • ...
PIXEL PERFECT PUZZLE 2025-05-28
Across
- Wireless technology used to interconnect mobiles computers etc
- Refers to unwanted bulk emails that come from unknown sources
- Practice of protecting digital information
- Network topology with a central hub
Down
- It is a combination of two terms 'net' and 'etiquette'
- The process of transforming data into an unreadable code
- Type of cyber attack that tricks users
- Refers to an illegal intrusion into a computer system or network
- Device that connects multiple networks
9 Clues: Network topology with a central hub • Type of cyber attack that tricks users • Device that connects multiple networks • Practice of protecting digital information • It is a combination of two terms 'net' and 'etiquette' • The process of transforming data into an unreadable code • Refers to unwanted bulk emails that come from unknown sources • ...
Electronic Mail 2017-06-18
5 Clues: an email provider • electronic message • Contains messages not yet sent • Contains undesired electronic messages • a vast network linking smaller computer networks worldwide
Industry Buzz 2025-01-07
5 Clues: Counseling, mental health, wellbeing • Marketing, finance, strategy, management • Networks, cybersecurity, coding, software • Patient care, diagnoses, treatment, hospitals • Curriculum, pedagogy, classroom, lesson plans
Crossword Puzzle 2024-04-30
Across
- An electronic tool or machine used for specific tasks.
- Installing new or improved software to fix issues or add features.
- Tricking people into giving away their personal information.
- A group of interconnected computers or devices.
- Bullying someone using digital devices or platforms.
- A secret word or phrase used to access something.
- An electronic device that manipulates information or data.
- The main means of mass communication.
- An example of a computer platform is a desktop computer with Microsoft Windows installed on it
- Related to computers or technology.
- Protecting digital systems and data from attacks or breaches.
- Free from harm or danger.
- The device that allows your computers, smartphones,etc. to connect to the internet.
- Linking to the internet or another device.
- Any criminal activity that involves a computer, network/ed device.
- Being accountable for one's actions online.
- Software designed to harm or disrupt computer systems.
- A person or thing that provides a service or commodity.
- Keeping personal information safe and confidential.
- Physical and electronic parts of a computer, or metal tools and equipment, or military equipment.
- Belief in the reliability or truth of someone or something online.
- The process of assigning a code to something for classification or identification.
- To determine or set the value or amount of something, or to judge or assess its significance, worth, or quality.
- controlled by or connected to another computer or to a network.
- A thing that is hidden or stored.
- Understanding and recognizing potential risks online.
- The ability to acquire and apply knowledge and skills.
- Protection from harm, damage, or unauthorized access.
- A communication method that uses electronic devices to deliver messages across computer networks.
- Being a member of a digital community and acting responsibly.
Down
- Relating to society or interaction with others.
- Who you are, especially online or in digital form.
- A set of related web pages located under a single domain name, typically produced by a single person or organization.
- Moral principles that guide behavior.
- The programs and other operating information used by a computer
- Relating to electronic communication networks and virtual reality.
- A computer program with a graphical user interface for displaying and navigating between web pages.
- The ability to read, write, and understand information.
- Random-access memory.
- An electronic communications network that connects computer networks and organizational computer facilities around the world
- A person or thing that brings something into existence.
- A barrier that blocks unauthorized access to a network.
- Converting information into a secret code to prevent unauthorized access.
- Facts or data used for communication or knowledge.
- A harmful program that can damage computer systems.
- Traces or records of online activity.
- A user’s access to a digital service or platform.
- Unsolicited or unwanted emails or messages.
- A set of rules for formatting and processing data.
- On the internet include identity theft, cyberbullying, and online harassment.
- Permission for something to happen or agreement to do something.
- Information stored or transmitted electronically.
- Verify the identity of a user or device.
- People who gain unauthorized access to computer systems.
54 Clues: Random-access memory. • Free from harm or danger. • A thing that is hidden or stored. • Related to computers or technology. • Moral principles that guide behavior. • The main means of mass communication. • Traces or records of online activity. • Verify the identity of a user or device. • Linking to the internet or another device. • ...
CSP Unit 2 Crosssword Puzzle 2024-09-18
Across
- A person who is responsible for managing computers, networks, servers, and other computing resources for an organization or group.
- A business or organization that issues a digital certificate verifying that a given public key is owned by the entity named on the certificate.
- A single dot in an image.
- Confirming your identity by using knowledge known only to you or information interpreted by you.
- Small text-based bits of information about your browser that a web server saves.
- A very common concept in computer science and information technology meaning that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
- A base 2 numeral system that represents all numbers, using only the two digits 0 and 1.
- The process of decoding the data, the reverse of the encryption process, making the data human-readable again.
- Software intended to damage a computing system or to take partial control over its operation.
- The science and art of delivering a message securely and confidentially.
- A wireless access point that gives unauthorized access to secure networks.
- A string of characters used as a parameter that determines the output of an encryption algorithm.
- The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Down
- Also called public-key encryption, an encryption method that uses two keys, a public key and a private key, belonging to one owner.
- An error that occurs when a computer attempts to handle a number that is outside of the defined range of values.
- Eight bits, able to represent 256 distinct values (abbreviated “b”).
- A global computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols. It relies on TCP/IP for communication between devices.
- Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
- The process of encoding data to prevent unauthorized access, such as converting plaintext to ciphertext.
- The unauthorized access or retrieval of confidential or otherwise protected data.
- Currently the dominant method for designing human-computer interaction.
- A method for determining a solution to a problem by sequentially testing all possible solutions.
- An example of public key encryption developed by Rivest, Shamir, and Adelman, an American computer and network security company.
- A digital document used to verify the authenticity of a server or public key.
- One of the most famous ciphers in history was implemented by an encryption machine. It was used during World War II by Germany and Italy to encrypt and protect transmitted messages from the United States and the Allied powers.
- Information about an individual, such as social security number, age, race, phone number(s), medical information, financial information, and biometric data such as fingerprint records and retina scans.
- How information is passed through the Internet. They contain chunks of data, which are encapsulated in packets.
- Also called shared key encryption, a process in which a single key is used in both the encryption and decryption algorithm to encode/decode data.
28 Clues: A single dot in an image. • Eight bits, able to represent 256 distinct values (abbreviated “b”). • Currently the dominant method for designing human-computer interaction. • The science and art of delivering a message securely and confidentially. • A wireless access point that gives unauthorized access to secure networks. • ...
ch.12 Joshua Park 2025-02-18
Across
- Resonance Imaging: A medical imaging technique that uses strong magnetic fields and radio waves to produce detailed images of the body's internal structures.
- Tomography: A medical imaging technique that uses computer-processed combinations of X-ray measurements taken from different angles to produce cross-sectional images.
- Each collection of related information.
- Power Supply: A backup power system that provides electricity in case of a power failure.
- Surgery: A type of surgery performed using robotic systems to enhance precision and control.
- Stress Test: A diagnostic test that uses a drug called adenosine to widen blood vessels and simulate the effects of exercise on the heart.
- Devices that generate concentrated beams of light used in medical treatments and surgeries.
- Instruction: The use of computers to provide interactive instruction or training.
- Specific categories or areas of data within a database.
- Portals: Secure online websites that allow patients to access their health records and communicate with providers.
- A global network that connects millions of private, public, academic, business, and government networks.
- Computer: A powerful computer used for large-scale data processing and critical applications.
- The use of telecommunications technology to provide healthcare services remotely.
- A test that records the electrical activity of the heart over a period of time.
- Security systems that protect networks from unauthorized access.
- Emission Tomography: A medical imaging technique that uses radioactive tracers to visualize metabolic processes in the body.
- Surgery: A surgical technique that uses real-time imaging to guide procedures with precision.
- Computer: A computer designed for general use by an individual.
Down
- When a group of related records is combined.
- A small, personal computer designed for individual use.
- Literacy: A basic understanding of how a computer works and the applications used in your field or profession.
- An applied science used to promote an individual's safety and well-being by adapting to the environment and using techniques to prevent injuries.
- A test that uses ultrasound waves to create images of the heart to assess its structure and function.
- Allows a user to locate records quickly, compile statistics and reports, enter additional information and changes readily, and store information more efficiently than paper files.
- Information Exchange: The secure sharing of health-related information among organizations.
- Stress Test: A test that uses radioactive tracers to evaluate blood flow to the heart.
- Stress Test: A test that evaluates heart function by monitoring its activity during physical exertion.
- Design: The use of computer software to create, modify, analyze, or optimize designs.
- Systems that connect computers and devices to share resources and information.
- Stress Test: A diagnostic test where dobutamine, a medication that mimics the effects of exercise, is administered to evaluate heart function.
- A software application used for organizing, analyzing, and storing data in tabular form.
- Therapy: The use of high-energy radiation to treat diseases, especially cancer.
- Mail: A method of exchanging digital messages over the internet.
- The remote delivery of pharmaceutical care through telecommunications.
- Learning: Education or training conducted over digital platforms.
- A diagnostic imaging technique that uses high-frequency sound waves to visualize internal body structures.
- Health Record: A computerized version of a patient’s medical information that may include statistical data.
- Malicious software programs designed to disrupt, damage, or gain unauthorized access to computer systems.
38 Clues: Each collection of related information. • When a group of related records is combined. • A small, personal computer designed for individual use. • Specific categories or areas of data within a database. • Computer: A computer designed for general use by an individual. • Mail: A method of exchanging digital messages over the internet. • ...
Become a Subject Area Expert 2014-11-05
Across
- A dynamic, object-oriented scripting language for developing websites and mobile apps. It powers the Ruby on Rails.
- Procedure or formula for solving a problem.
- The World Wide Web was invented by Sir Tim Berners-Lee and is an information system that allows users to view documents (called Web pages) using a piece of software called a Web browser.
- Research into packet switching started in the early 1960s and packet switched networks such as Mark I at NPL in the UK,[14] ARPANET, CYCLADES,[15][16] Merit Network,[17] Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks
- Class-based, object oriented programming language developed by Sun Microsystems in the 1990s.
- Client and server-side scripting language developed by Netscape that derives much of its syntax from C.
- The different activities in this phase, static analysis, peer review, and unit testing, leads to generation of implementation related vulnerabilities.
- Process by which a computer or a virtual machine performs the instructions of a computer program. The instructions in the program trigger sequences of simple actions on the executing machine. Those actions produce effects according to the semantics of the instructions in the program.
- Free source code editor and Notepad replacement that supports several languages.
- Hyper Text Markup Language, markup language for describing web documents (web pages).
- Detailed yet readable description of what a computer program or algorithm must do, expressed in a formally-styled natural language rather than in a programming language.
- Structured Query Language is a special-purpose language for managing data in relational database management systems.
- This phase is an add-on phase in the normal SDLC that plays an important role in increasing the overall security and resilience of the software being developed.
Down
- Numeric system that only uses two digits — 0 and 1. Computers operate in it, meaning they store data and perform calculations using only zeros and ones. Multiple digits can be used to store large numbers and perform complex functions.
- High-level, server-side scripting language for websites and mobile apps. Powers web apps for Instagram, Pinterest and Rdio through its associated web framework, Django, and is used by Google, Yahoo! and NASA.
- Formalized graphic representation of a logic sequence, work or manufacturing process, organization chart, or similar formalized structure.
- Programming framework created by Microsoft that developers can use to create applications more easily.
- In this phase all the business requirements are gathered and finalized by the project managers, the development team and the stakeholders.
- This phase is the final phase of SSDLC where the final software is implemented in the production environment.
- Intermediate-level language with object-oriented programming features, originally designed to enhance the C language.
- Multi-paradigm language developed by Microsoft as part of its .NET initiative.
- This process helps in discovering the vulnerabilities that were not discovered in the previous phases.
- (Hypertext Processor) free, server-side scripting language designed for dynamic websites and app development.
- Oldest and the most widely used language, providing the building blocks for other popular languages. Mostly used for implementing operating systems and embedded applications.
- Software architecture; the design of the system is designed.
25 Clues: Procedure or formula for solving a problem. • Software architecture; the design of the system is designed. • Multi-paradigm language developed by Microsoft as part of its .NET initiative. • Free source code editor and Notepad replacement that supports several languages. • Hyper Text Markup Language, markup language for describing web documents (web pages). • ...
MIS Chapter 7 Crossword Puzzle 2016-04-19
Across
- The English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet
- Software for locating and managing stored Web pages
- Two or more pairs of insulated copper wires twisted together
- Any computer on the network that requests and uses the services provided by the server
- Integrates disparate channels for voice communication, data communication, instant messaging, email, and electronic conferencing into a single experience where users can seamlessly switch back and forth between different communication modes
- A 32-bit number represented by four strings of numbers ranging from 0 to 255
- The process of improving the quality and volume of traffic to a Web site by employing a series of techniques that help a Web site achieve a higher ranking in search engine results
- A form of distributed computing that partitions software processes between client and server computers
- Advanced networking consortium of over 500 universities, businesses, government agencies, and other institutions
- A computer that is specifically optimized to provide software and other resources to other computers on the network
- Made of light-conducting glass or plastic core, surrounded by more glass, called cladding, and a tough outer sheath
Down
- A network that span large geographical distances
- Allows millions of users to send chunks of data across the Internet concurrently
- A collection of Webpages linked to a homepage
- Used to filter and forward data to a specified destination on the network. More efficient than hub
- Identifies Web pages that appear to match keywords (queries) entered by a user, and provides a list of best matches based on one or more of a variety of techniques
- Technology that delivers voice information on digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks
- A network that is designed to connect personal computers and other digital devices within a half-mile
- A 128-bit IP address
- A set of rules and procedures governing transmission of information between two points in a network
- Breaks the data into smaller packets, numbers them, ensures each packet is reliably delivered, and puts them in the proper order at the destination
- Contains a solid inner copper conductor surrounded by insulation and outer braided copper or foil shield
- Device used to connect network components, sending packets of data to all other connected devices. Least intelligent and expensive
- Two or more connected computers
- A large worldwide collection of networks that use a common protocol to communicate with each other
- A network that spans a metropolitan area, usually a city and its major suburbs
- Converts domain names to IP addresses
- The directory path and document name within a Web address that helps the browser track down the requested page
- A special communications processor used to route packets of data through different networks, ensuring that the data sent gets to the correct address. Smartest and most complicated
- Provides a universally agreed-on method for breaking up digital messages into packets, routing them to the proper address, and then reassembling them into coherent messages
- Provides powerful technology for tracking the movement of goods throughout the supply chain using tiny tags with embedded microchips
- A secure connection between two points across the Internet to transmit corporate data
- Addresses each packet with the source and destination address and routes the message to the final destination
33 Clues: A 128-bit IP address • Two or more connected computers • Converts domain names to IP addresses • A collection of Webpages linked to a homepage • A network that span large geographical distances • Software for locating and managing stored Web pages • Two or more pairs of insulated copper wires twisted together • ...
Innovative Activity 2021-02-28
Across
- Lowest Data rate in mobile systems.
- Signal that can be intercepted easily
- is prevented if the signal is spread
- type of wireless media for communication
Down
- process in which the narrowband signals are amplified to Broadband signals.
- 15 digit code that uniquely identifies a device.
- Latest Generation in Mobile Networks.
7 Clues: Lowest Data rate in mobile systems. • is prevented if the signal is spread • Signal that can be intercepted easily • Latest Generation in Mobile Networks. • type of wireless media for communication • 15 digit code that uniquely identifies a device. • process in which the narrowband signals are amplified to Broadband signals.
Immigrant Families 2018-06-27
Across
- 40 million in U.S.
- Children born to immigrants living in U.S. (2 words)
- Type of stress caused by family transitions
- Often the quickest to adapt to new culture
Down
- Adapting to the values of the new culture
- Networks that provide social support in place of family left behind (2 words)
- Rejecting new values and retaining the old
- Common characteristic among immigrants
8 Clues: 40 million in U.S. • Common characteristic among immigrants • Adapting to the values of the new culture • Rejecting new values and retaining the old • Often the quickest to adapt to new culture • Type of stress caused by family transitions • Children born to immigrants living in U.S. (2 words) • ...
Stay in touch 2024-06-11
Across
- I've got lots of friends. I think ___________ is important.
- The opposite of "nice".
- It isn't always easy to find a ________.
- Verb of "mediation"
- Jay has a new phone. Is Luke ______ of Jay?
Down
- Social networks can become an addiction.
- Radio, TV and the internet are all different kinds of _____.
- When you post photos on the internet, they don't go away. They can stay there ________.
8 Clues: Verb of "mediation" • The opposite of "nice". • Social networks can become an addiction. • It isn't always easy to find a ________. • Jay has a new phone. Is Luke ______ of Jay? • I've got lots of friends. I think ___________ is important. • Radio, TV and the internet are all different kinds of _____. • ...
Stay in touch 2024-06-11
Across
- I've got lots of friends. I think ___________ is important.
- The opposite of "nice".
- It isn't always easy to find a ________.
- Verb of "mediation"
- Jay has a new phone. Is Luke ______ of Jay?
Down
- Social networks can become an __________.
- Radio, TV and the internet are all different kinds of _____.
- When you post photos on the internet, they don't go away. They can stay there ________.
8 Clues: Verb of "mediation" • The opposite of "nice". • It isn't always easy to find a ________. • Social networks can become an __________. • Jay has a new phone. Is Luke ______ of Jay? • I've got lots of friends. I think ___________ is important. • Radio, TV and the internet are all different kinds of _____. • ...
LIFE IN THE FUTURE 2023-05-22
Across
- things are very modern come from the future
- there are a lot of cars on the road
- an empty area
- are special areas for parking cars.
Down
- Things don't exist in the real world
- a worldwide system of computer networks
- rooms you try new clothes on
- a vehicle that combines key characteristics from both light road cars and light aircraft
8 Clues: an empty area • rooms you try new clothes on • there are a lot of cars on the road • are special areas for parking cars. • Things don't exist in the real world • a worldwide system of computer networks • things are very modern come from the future • a vehicle that combines key characteristics from both light road cars and light aircraft
Dataverse 12.0 2024-11-07
Across
- Type of data without meaningful order or magnitude
- Visual diagram of decision points in machine learning
- Key concept in data science, used to clean and organize information
Down
- Type of learning without labeled data
- Libraryfor data manipulation in Python
- Large set of numbers used to train neural networks
- Programming language popular for data analytics
- Data structure for tabular data in Python
8 Clues: Type of learning without labeled data • Libraryfor data manipulation in Python • Data structure for tabular data in Python • Programming language popular for data analytics • Large set of numbers used to train neural networks • Type of data without meaningful order or magnitude • Visual diagram of decision points in machine learning • ...
Round 3 2025-08-25
Across
- What is the act of posting abusive messages online ?
- Write the full form of ASP
- Which action compromise cyber security ?
- Theft of digital property?
Down
- Which device links to homogenous packed broadcast local networks ?
- Who coined the term "cyberspace" ?
- Name the type of attack which uses a fraudulent server with a relay address?
- What is the legal field dealing with internet behavior called ?
8 Clues: Write the full form of ASP • Theft of digital property? • Who coined the term "cyberspace" ? • Which action compromise cyber security ? • What is the act of posting abusive messages online ? • What is the legal field dealing with internet behavior called ? • Which device links to homogenous packed broadcast local networks ? • ...
Computing 2025-10-20
Across
- A small device used to point and select on a computer
- Software used to browse websites
- A program that protects your computer from harmful software
- A portable computer you can carry around
Down
- The main screen where computer programs are launched
- A global network of connected computer networks
- Electronic messages sent between computers
- A place to store and share digital files online
8 Clues: Software used to browse websites • A portable computer you can carry around • Electronic messages sent between computers • A global network of connected computer networks • A place to store and share digital files online • The main screen where computer programs are launched • A small device used to point and select on a computer • ...
NETWORKING PUZZLE 2020-07-30
Across
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- A company that provides customers with Internet access.
- A group of computers and associated devices that share a common communications line or wireless link to a server
Down
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A device which controls access to separately stored files, as part of a multi-user system.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
12 Clues: A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • A telecommunications network or computer network that extends over a large geographical distance/place. • ...
ALexis Lujan's Internet Crossword Puzzle 2013-03-26
Across
- A bully who operates online, in cyberspace; To bully online.
- a piece of writing that has been copied from someone else and is presented as being your own work.
- software used to view various kinds of Internet resources found on the Web.
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
Down
- unauthorized person who secretly gains access to computer files.
- a list of citations that appear at the end of a paper, article, chapter or book.
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
12 Clues: A bully who operates online, in cyberspace; To bully online. • unauthorized person who secretly gains access to computer files. • software used to view various kinds of Internet resources found on the Web. • a list of citations that appear at the end of a paper, article, chapter or book. • ...
Micah's internet crossword puzzle 2013-12-02
Across
- PLAGIARISM - a piece of writing that has been copied from someone else and is presented as being your own work
- HACKER – An unauthorized person who secretly gains access to computer files.
- INTERNET – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- UNIFORM RESOURCE LOCATOR (URL) – Full website address. Example
- VIRUS – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software
Down
- REFRESH - To renew or revitalize; To reload a webpage on the internet
- NETWORK – A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- HYPERLINK–Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- PIRACY – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- WEBSITE TABS – the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
10 Clues: UNIFORM RESOURCE LOCATOR (URL) – Full website address. Example • REFRESH - To renew or revitalize; To reload a webpage on the internet • HACKER – An unauthorized person who secretly gains access to computer files. • PLAGIARISM - a piece of writing that has been copied from someone else and is presented as being your own work • ...
computer network puzzle 2020-07-31
Across
- Service Provider (ISP)-A company that provides customers with Internet access.
- Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- Network - A series of computers connected together for the purpose of sharing information with other people.
- WI-FI- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet. ..
- system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- Fibre-A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
Down
- Server-A device which controls access to separately stored files, as part of a multi-user system.
- Area Network (WAN)-A telecommunications network or computer network that extends over a large geographical distance/place.
- global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- group or system of interconnected people or things.
- Area Network (LAN)-A group of computers and associated devices that share a common communications line or wireless link to a server
- set of rules or procedures for transmitting data between electronic devices, such as computers.
- Switch-A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
14 Clues: group or system of interconnected people or things. • Service Provider (ISP)-A company that provides customers with Internet access. • set of rules or procedures for transmitting data between electronic devices, such as computers. • Server-A device which controls access to separately stored files, as part of a multi-user system. • ...
Network Puzzel 2022-03-29
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Compute Network Puzzle 2022-03-31
Across
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- group or system of interconnected people or things.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- A device which controls access to separately stored files, as part of a multi-user system.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A company that provides customers with Internet access.
Down
- A group of computers and associated devices that share a common communications line or wireless link to a server
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A network is a series of computers connected together for the purpose of sharing information with other people.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
NETWORKING TODAY 2023-08-28
Across
- The network infrastructure that provides access to other networks over a large geographic area and is often owned and managed by a telecommunications service provider.
- Which consideration is where data can travel through more than one route for delivery from a remote source.
- This networking trend makes use of servers on the internet as an infrastructure, platform or service that allows us to store personal files, back up an entire drive or use online applications. CLOUD COMPUTING
- WHAT REFERS TO COMPUTERS WITH SOFTWARE THAT ENABLES THEM TO PROVIDE RESOURCES TO OTHER END DEVICES ON A NETWORK?
- This means that networks can grow or expand with minimal impact on performance.
- WHAT NETWORK MAKES USE OF SEPARATE COMPUTERS WHERE IT IS POSSIBLE FOR ONE TO CARRY OUT BOTH CLIENT OR SERVER ROLES?
Down
- The network infrastructure an organization use to provide secure and safe access to individuals (partners, suppliers or customers) who work for a different organization but require access to the organization’s data.
- This network layout identifies devices, ports, and IP addressing schemes
- The media being used to transmit data encoded as pulses of light.
- What trend allows using personal devices to access information and communicate across a business or campus network.
- Which network consideration looks at protecting the information contained in packets as they are transmitted over the network.
- Which network consideration has the primary mechanism for managing congestion and ensuring reliable delivery of content.
- WHICH CISCO CERTIFICATION LEVEL ARE YOU CURRENTLY STUDYING IN CNT125?
- An inexpensive, very low-bandwidth option to connect to the internet where it made use of one phone line so calls cannot be made or taken when connected to the internet.
14 Clues: The media being used to transmit data encoded as pulses of light. • WHICH CISCO CERTIFICATION LEVEL ARE YOU CURRENTLY STUDYING IN CNT125? • This network layout identifies devices, ports, and IP addressing schemes • This means that networks can grow or expand with minimal impact on performance. • ...
AP World History Unit 2 Vocab 2023-10-09
Across
- Mali trading city that became a center of wealth and learning thanks to its location in the trans-Saharan trade networks; universities, mosques, and libraries
- Islands Europeans' name for the Moluccas, islands rich in cloves and nutmeg - highly valued spices often traded in the Indian Ocean trade network
- He (1371-1433?) Chinese Ming Dynasty naval explorer who sailed along most of the coast of Asia, Japan, and half way down the east coast of Africa before his death; facilitated China's role in the tribute system in the Indian Ocean trade network
- Name for a Mongol ruler
- Ocean Trade connected to Europe, Africa, South Asia, and China.; worlds richest maritime trading network and an area of rapid Muslim expansion, spread of goods, ideas
- Kempe Wrote the Book of Margery Kempe - considered the 1st autobiography in the English language. Chronicles her pilgrimages to holy sites in Europe and Asia. Claimed to have vision that called her to leave the vanities of the world
- Trade route across the Sahara Desert; traded for gold and salt, created caravan routes, economic benefit for controlling dessert, camels and camel saddles were crucial in the development of these trade networks; facilitated the spread of Islam
- Steering device, usually a vertical blade attached to a post at, or near, the stern of the boat; improved sea trade
- League an organization of north German and Scandinavian cities for the purpose of establishing a commercial alliance; facilitated trade and commercial growth in the 1200-1450 time period
- Saddle An invention which gives camel riders more stability on the animal and its invention and basic idea traveled along the Trans-Saharan Caravan Trade Route. Invented somewhere between 500 and 100 BCE by Bedouin tribes.
- the founder of Mali empire. He crushed his enemies and won control of the gold trade routes along the trans-Saharan trade networks
- Mongolica The period of approximately 150 years of relative peace and stability created by the Mongol Empire.
- Mongol empire that ruled over Iran (Persia) & the Middle East
- Dynasty (1279-1368 CE) The dynasty with Mongol rule in China; centralized with bureaucracy but structure is different: Mongols on top->Persian bureaucrats->Chinese bureaucrats; did not emphasize Confucianism and the civil service exams
- group of traveling merchants and animals
- money legal currency issued on paper; it developed in China as a convenient alternative to metal coins; facilitated trade
Down
- Plague Also called the Black Death; the deadly disease that spread through Asia and Europe and killed more than a third of the population in some areas; hit Europe (peak 1347-1351) especially hard due to unsanitary living conditions and overcrowded cities; spread thanks to increased trade along the Silk Roads
- Roads A system of ancient caravan routes across Central Asia, along which traders carried silk and other trade goods; known for spreading religions such as Buddhism, Christianity, and Islam as well as technological transfers and diseases like the Bubonic plague
- Horde Mongol khanate founded by Genghis Khan's. It was based in southern Russia and quickly adopted both the Turkic language and Islam.
- Invented within China during the 9th century, this substance was became the dominate military technology used to expand European and Asian empires by the 15th century; spread from East to West via trade networks like the Silk Roads and help from the Pax Mongolica
- ship A very large flat-bottom sailing ship produced in the Tang and Song Empires, specially designed for long-distance commercial travel and participation in the tribute system
- Four regional Mongol kingdoms that arose following the death of Ghengis Khan.
- Ships Arab sailing vessels with triangular or lateen sails; strongly influenced European ship design; facilitated trade in the Indian Ocean networks
- an inn with a central courtyard for travelers in the desert regions of Asia or North Africa; allowed caravans and their camels to rest in a protected environment, encouraging trade
- compass Chinese invention that aided navigation by showing which direction was north
- a thin, beautiful pottery invented in China
- During the rule of Timur Lane was the most influential capital city, a wealthy trading center known for decorated mosques and tombs; a key trading city along the Silk Roads
- Polo (1254-1324) Italian explorer and author. He made numerous trips to China and returned to Europe to write of his journeys. He is responsible for much of the knowledge exchanged between Europe and China during this time period.
- city-states City coasts that actively participated in Indian Ocean trade along the East coast of the African continent
- A dispersion of people from their homeland; merchant communities of Muslim spread Islam throughout Southeast Asia
- winds seasonal wind in India, the winter monsoon brings hot, dry weather and the summer monsoon brings rain
- Also known as Kashi, a central trading point at which the western and the eastern Silk Road met; It is one of the westernmost cities of China, near the border with modern day Afghanistan, Kyrgyzstan, Pakistan, and Tajikistan.
- Musa Ruler of Mali (r. 1312-1337). His extravagant pilgrimage through Egypt to Mecca in 1324-1325 established the empire's reputation for wealth in the Mediterranean world.
- Battuta (1304-1369) Moroccan Muslim scholar, the most widely traveled individual of his time. He wrote a detailed account of his visits to Islamic lands from China to Spain and the western Sudan. His writings gave a glimpse into the world of that time period.
34 Clues: Name for a Mongol ruler • group of traveling merchants and animals • a thin, beautiful pottery invented in China • Mongol empire that ruled over Iran (Persia) & the Middle East • Four regional Mongol kingdoms that arose following the death of Ghengis Khan. • compass Chinese invention that aided navigation by showing which direction was north • ...
Shaye Seyffarts Cross World Puzzle 2013-10-30
Across
- A machine that processes something.
- fashionably attractive or impressive
- A firm decision to do or not to do something
- A paper or cardboard container, typically one in which goods are packed to be sold
- A domesticated carnivorous mammal that typically has a long snout, an acute sense of smell, and a barking, howling, or whining voice. It is widely kept as a pet or for work or field sports
Down
- A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks.
- A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit. Also called hard disk drive
- A minute area of illumination on a display screen, one of many from which an image is composed.
- A game played by two teams of eleven players with a round ball that may not be touched with the hands or arms during play except by the goalkeepers. The object of the game is to score goals by kicking or heading the ball into the opponents' goal.
- 1. encoding: the activity of converting data or information into code
11 Clues: A machine that processes something. • fashionably attractive or impressive • A firm decision to do or not to do something • 1. encoding: the activity of converting data or information into code • A paper or cardboard container, typically one in which goods are packed to be sold • ...
NETWORKING 2012-11-07
Across
- / ability to transfer data only in one direction at a time
- / the part of a network communications process that
- / all the physical parts of the computer system
- / a main computer that provides a storage area for data files on a network
- / an electronic device used to convert signals from analogue into digital ones.
- / a low-cost centrally- managed basic computer with a keyboard and display, but no disk drives or expansion sots
- / ability to transfer data on both directions simultaneously
- / a hardware device, often equipped with a keyboard and screen, through which data can be entered or displayed
- / the part of a network communications process that ensures the message is transmitted in a language that the receiving computer can interpret
- / an electronic device that isolates a network system from high voltage and allows it to use the mains electricity cables for connecting computers together and transferring data
- / a type of signal that has only two levels- on and off
- / programs and applications
- / a main data communication s cable connecting LANs together
- / a network computer that does some of the processing
- / stop-start transmission, data is sent one byte at a time
- / a data bit that marks the end of a data block in a network transmission
- / the computer that uses the services
- / an electronic device for connecting different types of networks together
Down
- / the only part of a network communications process that a user sees etc.
- / the most common way of connecting computers in LAN
- / the part of a network communications process that opens communications and has the job of keeping the straight the communications among all nodes on the network. It sets boundaries for the beginning and end of the message and establishes the way data is sent.
- / a network that covers a small area e.g. an office or a building
- / a common type of network cable that uses two wires twisted together to reduce interference from external signals
- / the part of a network communications process that
- / the interconnection of computers using signals carried through the air instead of through the connecting cables
- / calculated value that is stored with data to detect any errors that may occur when data is copied or transmitted
- / an electronic device for connecting different types of networks together and determining the best path for the signals
- / transmission where data is sent in blocks
- / an electronic device for dividing a LAN into separate parts or connecting similar networks together
- / a network computer that doesn’t have a processor, all the processing must be done by the server computer
- / a type of Network where the main server provides the services and client computers are attached
- / the part of a network communications process that forms the data into packets and selects a route for the message
- / the part of a network communications process that protects the data being sent. It subdivides the message into segments and creates the checksum.
- / a type of signal that can take any value from minimum to maximum
- / a start or stop bit pattern that marks the beginning or end of a transmitted data block
- / a data bit that marks the beginning of a data block in a network transmission
- / an electronic device at the center of a star network topology, amplifies the signals
37 Clues: / programs and applications • / the computer that uses the services • / transmission where data is sent in blocks • / all the physical parts of the computer system • / the part of a network communications process that • / the part of a network communications process that • / the most common way of connecting computers in LAN • ...
TestOut Ch 6 - Networking 2021-01-04
Across
- A computer that provides email services to a network.
- A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address.
- A group of networked computers that are physically close together, usually in the same building.
- A computer that provides a gaming environment that tracks events in multiplayer video games.
- A network of interconnected LANs across a large geographical location.
- A computer component that provides a port (usually RJ-45) where a network cable can be connected.
- A small network device with modem, firewall, routing, and switching features that is used in homes and small businesses.
- Short for modulator/demodulator, a network device that converts digital signals used by modern networks to analog signals that are typically carried by telephone or cable television lines.
- A network device that moves traffic between two different IP networks.
- A network device that connects wireless devices to a wired network.
- A cable that provides connectivity between networkdevices. A common network cable connects a computer's network interface with a wall jack.
- An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address.
- A network topology in which all the devices are connected to each other by a single central cable.
- A network that covers a larger geographical area than a LAN, but is usually as large as a WAN. The term generally refers to smaller networks that are connected throughout a city into one larger, centralized network.
Down
- A technology used to create wireless connections between computers and devices.
- A computer that stores databases, which are huge repositories of organized data.
- A network topology in which each host is connected to two other hosts in a circle.
- A technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store.
- A host on a network that consumes network services.
- A network device that moves traffic within an IP network.
- A network topology in which devices are not connected to each other but rather to a centralized device called a switch.
- A host on a network that provides network services.
- A computer that stores web pages and hypertext documents and transmits them to devices requesting these pages.
- The principal communications protocol in the internet protocol suite that is used to route information over the internet.
- A computer that provides network access to shared disk storage.
- MAC address.
- A network security device that protects a network by examining the traffic before transferring it to the network.
- A network topology where each device on the network has a point-to-point connection to every other device on the network.
- A device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected. On the hidden side of a wall jack is wiring to a patch panel or to a network device.
29 Clues: MAC address. • A host on a network that consumes network services. • A host on a network that provides network services. • A computer that provides email services to a network. • A network device that moves traffic within an IP network. • A computer that provides network access to shared disk storage. • ...
internet basics 2024-01-18
Across
- The buying and selling of goods and services over the internet.
- Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
- Voice over Internet Protocol, a technology that allows voice communication over the internet instead of traditional telephone lines.
- Engineering: Manipulating individuals to disclose sensitive information or perform actions that may harm them or their organization.
- Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
- Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
- To transfer data from a remote server to a local device over the internet.
- Digital or virtual currency that uses cryptography for security and operates independently of a central bank.
- Unsolicited and often unwanted email or messages sent in bulk, typically for advertising purposes.
- Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
- Small digital icons or characters used to express emotions or ideas in electronic communication.
- Hypertext Markup Language, the standard language used for creating web pages and applications on the internet.
- Domain Name System, a system that translates domain names (e.g., www.example.com) into IP addresses to locate resources on the internet.
- A live or pre-recorded seminar, workshop, or presentation conducted over the internet.
- A security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and threats.
Down
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems and networks.
- To transfer data from a local device to a remote server over the internet.
- A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
- A form of cyber attack where attackers impersonate trustworthy entities to deceive individuals into revealing sensitive information.
- Media: Online platforms that enable users to create and share content, communicate, and connect with others.
- Internet of Things, the network of physical devices embedded with sensors, software, and connectivity, enabling them to exchange data and interact with the internet and other devices.
- Storage: Storing and accessing data over the internet on remote servers rather than on local devices.
- Address: A unique numerical identifier assigned to each device connected to a computer network, enabling communication between devices.
- The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
- A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
- Virtual Private Network, a secure connection that allows users to access the internet privately and securely by encrypting their data.
- Electronic mail that allows users to send and receive messages and files over the internet.
- Secure Sockets Layer, a protocol that provides secure communication over the internet by encrypting data transmitted between a web server and a browser.
- A networking device that forwards data packets between computer networks, allowing devices to connect to the internet.
- A global network of interconnected computers that enables the sharing of information and resources.
- Uniform Resource Locator, the address used to access a web page or resource on the internet.
- A wireless networking technology that allows devices to connect to the internet without the need for physical cables.
32 Clues: The buying and selling of goods and services over the internet. • To transfer data from a local device to a remote server over the internet. • To transfer data from a remote server to a local device over the internet. • A live or pre-recorded seminar, workshop, or presentation conducted over the internet. • ...
Planetary Networks:Climate Change 2023-11-08
Across
- major impact on the environment caused by the consumption of energy in our homes and transportation. (Answer: Pollution)
- process in which seawater expands as it warms, contributing to rising sea levels. (Answer: Ocean Alkalinity)
- parts of the world made up of ice, including ice sheets and glaciers. (Answer: Cryosphere)
- term refers to changes in regional temperatures due to climate change. (Answer: Regional Warming)
- amazing scientific accord that attributes global climate change to human use of fossil fuels. (Answer: Scientific Consensus)
- loss of coral reefs and damage to sea floors due to trawling are examples of this cause of biodiversity loss. (Answer: Habitat Change)
- glaciers and ice sheets melt, global sea levels continue to rise, causing this phenomenon. (Answer: Rising Oceans)
- an invasive species is introduced to a habitat, it disrupts the existing ecosystem. (Answer: Biotic Change)
- rise in global sea levels can lead to the submerging of these land formations. (Answer: Coral Atolls)
- melting of the Arctic due to rising temperatures is known as the __________ Arctic. (Answer: Thawing)
- component of the climate system responsible for filtering the sun's radiation and trapping heat on Earth. (Answer: Atmosphere)
- rise in sea levels caused by water covering the land is known as __________ changes. (Answer: Sea Level)
- ultimate cause of climate change in the context of human activities. (Answer: Human Activities)
- major strategy to combat climate change that focuses on countering its effects. (Answer: Adaptation)
- change can result in the extinction of various species, leading to __________ of Species. (Answer: Extinctions)
- bodies of water on Earth collectively. (Answer: Hydrosphere)
Down
- dominant direct driver of change in marine systems, caused by excessive fishing. (Answer: Overfishing)
- process that means we have warmed our planet enough to set an unstoppable process in motion. (Answer: Tipping Points)
- increase in average surface temperatures on Earth. (Answer: Climate Change)
- Here are 30 identification questions in crossword puzzle form related to the topic of "Planetary Networks: Climate Change" along with the answers:
- network of nature that encompasses all other networks. (Answer: Planetary Network)
- gases responsible for trapping heat inside the atmosphere and causing climate change. (Answer: Greenhouse Gases)
- organization that enumerated a list of strategies to counteract climate change. (Answer: United Nations)
- increase in the emission of this gas contributes to global warming. (Answer: CO2)
- most fundamental network that connects all living species with their habitats and environments. (Answer: Ecosystem)
- agency that implements strategies for combating climate change, including adaptation, mitigation, science, and communication. (Answer: UNEP)
- environment's chemical composition is changing due to human activities, causing a disequilibrium that affects our __________ systems. (Answer: Climate)
- global agreement that identifies human activities as the primary cause of climate change. (Answer: Scientific Consensus)
- terrestrial component of the world's surface. (Answer: Land Surface)
- life forms of the world, including marine and terrestrial plants and animals. (Answer: Biosphere)
- climate change is important to protect the networks of nature and these ecosystems. (Answer: Biodiversity)
31 Clues: bodies of water on Earth collectively. (Answer: Hydrosphere) • terrestrial component of the world's surface. (Answer: Land Surface) • increase in average surface temperatures on Earth. (Answer: Climate Change) • increase in the emission of this gas contributes to global warming. (Answer: CO2) • ...
Per: 2 Chapter 11 - Kahala, M 2023-03-28
Across
- a method for removing restrictions and protections added to mobile operating systems, but typically on iOS devices
- Computers that have been commandeered by hackers and unwillingly launch attacks against networks and servers. Also called botnets.
- What is the name given to the programming-code patterns of viruses?
- a method used on Android devices for removing restrictions and protections added to mobile operating systems
- A computer pretends to be a trusted computer to gain access to resources. The computer uses a forged IP or MAC address to impersonate a computer that is trusted on the network.
- What is the most effective way of securing wireless traffic?
- Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
- a location of the OS that keeps code isolated from other resources and other code
- Configured to limit individual or group user access to specific data.
- Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?
- a private network established through a public network to remote sites
- a family of free and open-source software operating systems based on an operating system kernel
- a navigation system that determines the time and geographical location of the device by using messages from satellites in space and a receiver located on the device
- a file hosting service and synchronization service operated by Microsoft
- a service in Linux and OS X for scheduling tasks to be executed at specific dates and times
Down
- making phone calls using Wi-Fi networks
- an operating system based on the Linux kernel and containing a software collection and a package management system
- a program that interprets the commands from the keyboard and passes them to the operating system
- Disrupts or eliminates the magnetic field on a hard drive that allows for the storage of data.
- Also known as secure erase, is a procedure performed to permanently delete data from a hard drive.
- a cloud service provided by Apple for iOS amd OS X devices
- an open source, Linux based smartphone/tablet operating system
- A denial of service attack launched from multiple infected PCs called zombies or botnets. The intent is to obstruct or overwhelm access to the targeted server.
- a backup tool in OS X
- Computers that have been commandeered by hackers and unwillingly launch attacks against networks and servers. Also called zombies.
- Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?
- A document that outlines procedures regarding physical security, and the protection of data, research and development, and customer information.
- a monitoring system included in computer hard disk drives to detect and report drive status
- a cloud service developed by Google to provide file storage and synchronization service
- a closed source Unix based operating system for smartphones and tablets made by Apple
- What is the minimum level of Windows security required to allow a local user to restore backed up files?
- a feature of a computer system that allows booting from more than one operating system
32 Clues: a backup tool in OS X • making phone calls using Wi-Fi networks • a cloud service provided by Apple for iOS amd OS X devices • What is the most effective way of securing wireless traffic? • an open source, Linux based smartphone/tablet operating system • What is the name given to the programming-code patterns of viruses? • ...
Mesh Network 2020-05-10
Across
- laptops and cellphones
- A packet is, generally speaking, the most basic unit that is transfered over a network. When communicating over a network, packets are the envelopes that carry your data (in
- repeated interconnections
- local area network
- configuring a mesh networks that works itself out
- a stable network
- modulator and demodulator
- protection of the network
Down
- A firewall is a program that decides whether traffic coming into a server or going out should be allowed
- when a node reroutes itself
- Interface A network interface can refer to any kind of software interface to networking hardware.
- when the nodes all connect
- points in the network where it is strong
- a device that improves the network strength
- Wide area network
15 Clues: a stable network • Wide area network • local area network • laptops and cellphones • repeated interconnections • modulator and demodulator • protection of the network • when the nodes all connect • when a node reroutes itself • points in the network where it is strong • a device that improves the network strength • configuring a mesh networks that works itself out • ...
OUIGHOURS 2021-02-24
Across
- Name of the specific region in which the Uyghurs are located
- A word that definies the systematic refusal to consume the product or services of a company or a
- Punitive measure
- fashion Expression used to designate the renewal, as quickly as possible, of collections of clothing fashion
- Synonymous with racial discrimination
- Company that everyone knows, specialising in sport, complicit in this torture
- The Uyghurs are...(2words) cheap for companies
- Uyghurs religion
Down
- The country where the Uyghurs are imprisoned
- Where the Uyghurs live
- Colour representing the movement on social networks for Uyghurs
- Word defining a crime against humanity aimed at the total or partial destruction of a national, ethnic, racial
- Uyghurs are deprived of...(1word)
- Synonymous of persecution
- Antonym of majority
15 Clues: Punitive measure • Uyghurs religion • Antonym of majority • Where the Uyghurs live • Synonymous of persecution • Uyghurs are deprived of...(1word) • Synonymous with racial discrimination • The country where the Uyghurs are imprisoned • The Uyghurs are...(2words) cheap for companies • Name of the specific region in which the Uyghurs are located • ...
Computer words 2017-12-08
Across
- The computing part of the computer.
- An organization that provides access to the Internet.
- Not enough _______ to get the job done
- Machinery and equipment
- The address that defines the route to a file
- Instructions for the computer.
- The fundamental display element of an electronic screen
Down
- a scam to steal valuable information
- The primary method for keeping a computer secure from intruders.
- An in house website that serves employees only
- a large network made up of smaller networks.
- A website that is usually ran by a small group
- Reserved areas of memory in every computer
- The most widely used hardware interface for attaching peripherals to a computer.
- A small text file (up to 4KB)
15 Clues: Machinery and equipment • A small text file (up to 4KB) • Instructions for the computer. • The computing part of the computer. • a scam to steal valuable information • Not enough _______ to get the job done • Reserved areas of memory in every computer • a large network made up of smaller networks. • The address that defines the route to a file • ...
CTF SET 1 2023-07-12
Across
- Developed the first compiler for programming languages.
- Invented the computer mouse.
- Co-founded Facebook, a popular social media platform.
- Co-founder of Apple, known for innovations like the iPhone and Macintosh.
- Considered the first computer programmer.
- Co-founded Google, the world's most widely used search engine.
- Developed the Spanning Tree Protocol (STP) for computer networks.
- Created the Java programming language.
Down
- Co-founder of Intel, observed Moore's Law.
- Co-founder of Apple, involved in the development of early Apple computers.
- Invented the World Wide Web (WWW).
- Created the Linux operating system.
- Co-founded Microsoft and played a pivotal role in shaping the personal computer industry.
- Pioneered alternating current (AC) electrical systems.
- Co-developed frequency-hopping spread spectrum technology.
15 Clues: Invented the computer mouse. • Invented the World Wide Web (WWW). • Created the Linux operating system. • Created the Java programming language. • Considered the first computer programmer. • Co-founder of Intel, observed Moore's Law. • Co-founded Facebook, a popular social media platform. • Pioneered alternating current (AC) electrical systems. • ...
Friday Game v1.1 2023-06-23
Across
- Remote server storage and computing.
- A powerful computer that provides resources to other computers on a network.
- Domain Name System - translates domain names to IP addresses.
- A security measure that requires two different forms of identification.
- Identity and access management service for Microsoft 365.
- A directory service used in Windows environments.
- Common wired networking technology.
Down
- Microsoft's cloud-based productivity suite.
- A unique numerical label assigned to each device connected to a computer network.
- Microsoft's email server and collaboration platform.
- A network security device that monitors and controls incoming and outgoing network traffic.
- Wireless Local Area Network.
- Dynamic Host Configuration Protocol - assigns IP addresses automatically
- Secure connection over a public network.
- Device that forwards data packets between computer networks
15 Clues: Wireless Local Area Network. • Common wired networking technology. • Remote server storage and computing. • Secure connection over a public network. • Microsoft's cloud-based productivity suite. • A directory service used in Windows environments. • Microsoft's email server and collaboration platform. • Identity and access management service for Microsoft 365. • ...
CH Computer Lab Crossword Puzzle 2023-02-20
Across
- Microsoft software used for creating spreadsheets that hold data
- Handheld hardware input device that controls the cursor
- Microsoft software used for creating resumes, letters, essays, etc.
- A browser tool used for favoriting websites
- Microsoft software used for creating slideshow presentations
- Software used for accessing webpages (Ex: Google Chrome, Microsoft Edge, etc.)
- The "home" screen of the computer where you'll find software icons
- Hardware input device used for entering letters, words, numbers, etc.
- The address of a web page
Down
- A group of web pages
- A USB device used for storing and transferring files
- One of the most basic operating systems
- Hardware used for the computer's display
- A worldwide system of computer networks
- Messages distributed by electronic means
15 Clues: A group of web pages • The address of a web page • One of the most basic operating systems • A worldwide system of computer networks • Hardware used for the computer's display • Messages distributed by electronic means • A browser tool used for favoriting websites • A USB device used for storing and transferring files • ...
Lily Kate's Sports Med Crossword 2024-01-18
Across
- power house of a cell
- takes place without the presence of oxygen
- takes place in the presence of oxygen
- an acid that helps in cellular respiration and glucose production
- the formation of more extensive capillary networks around the fiber
- function is to produce movement, sustain body position
- involuntarily muscle
Down
- these fibers use aerobic respiration to produce ATP and contract slowly
- these fibers have fast contractions and mainly use anaerobic glycolysis
- produced by a fiber
- fibers that have fast contractions and mainly use aerobic respiration
- makes up the thick middle layer of the heart
- the extra that the body uses during exercise
- muscle atrophy that is related to age
- process in which muscle mass decreases and structural proteins are lost
15 Clues: produced by a fiber • involuntarily muscle • power house of a cell • takes place in the presence of oxygen • muscle atrophy that is related to age • takes place without the presence of oxygen • makes up the thick middle layer of the heart • the extra that the body uses during exercise • function is to produce movement, sustain body position • ...
Vocab Review 2022-07-24
Across
- _____rights/issues
- a system of government where people of a country can vote to elect their leaders
- the environmental______of tourism
- that is legally or officially acceptable
- a feeling that you have a link with somebody/something or are part of a group
- a device that can react to light, heat, pressure, etc. in order to make a machine
- Kingdom of Talossa;Sealand; Liberians are______
- someone who steals your information through the internet
- every adult has the right to vote
Down
- antonym of specific
- racial/social/gender______
- someone who is rich and powerful
- a country that has a king or a queen as the leader
- the activities involved in protecting Sth
- connected with electronic communication networks, especially the internet
15 Clues: _____rights/issues • antonym of specific • racial/social/gender______ • someone who is rich and powerful • the environmental______of tourism • every adult has the right to vote • that is legally or officially acceptable • the activities involved in protecting Sth • Kingdom of Talossa;Sealand; Liberians are______ • a country that has a king or a queen as the leader • ...
Imperialism 1 2022-12-05
Across
- Owing money to someone
- What happened to India after road networks, dams, bridges and canals were built
- Waterway in Egypt for so ships don't have to sail around Africa
- Sepoys were jailed by the British because
- Threaten Indian tradition
- area of land run by a foreign country
- Indian soldiers who worked for the British
- Local rulers run the country while taking orders from an imperialistic country
Down
- Controlled by the Dutch
- Being a country of your own not under an imperialistic country
- India was called this because of people and resources
- Parts of a country being influenced by only one country per place
- Controlling or influencing countries remotely
- Exchange for goods and services
- Muhammad Ali shifts Egyptian agriculture to _______
15 Clues: Owing money to someone • Controlled by the Dutch • Threaten Indian tradition • Exchange for goods and services • area of land run by a foreign country • Sepoys were jailed by the British because • Indian soldiers who worked for the British • Controlling or influencing countries remotely • Muhammad Ali shifts Egyptian agriculture to _______ • ...
Browsing safely 2025-06-08
Across
- program that can harm our computer
- a type of cybercrime where a person pretends to be someone else
- a collection of interconnected machines and computers
- a precaution against data loss
- full form of WAN
- a software wall that protects networks and computers
- a combination of characters only known to us
- a type of illegal activity done using computers
- a process of breaking passwords
Down
- a huge connection of connected computers around the world
- a type of malware that is installed collects information about users illegally
- a program that is used to protect computer against viruses
- a person who can steal our data from computers
- another name given to viruses
- process of illegally stealing data from someone else's computer
15 Clues: full form of WAN • another name given to viruses • a precaution against data loss • a process of breaking passwords • program that can harm our computer • a combination of characters only known to us • a person who can steal our data from computers • a type of illegal activity done using computers • a software wall that protects networks and computers • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Database query language often exploited for injection attacks.
- Method of guessing passwords by trying all possibilities.
- Condition where timing flaws lead to security gaps.
- Technique of inserting malicious code into input fields.
- Memory structure targeted in buffer overflow attacks.
- Small piece of code used to exploit a vulnerability.
- Process of gathering information before an attack.
- Code or tool designed to abuse vulnerabilities.
Down
- Technique aimed at disturbing or halting services.
- Attack using precompiled lists of common passwords.
- Searching for insecure wireless networks to exploit.
- Error caused when data exceeds memory storage limits.
- Engineering attack that manipulates human behavior.
- Attack that makes a system unavailable to users.
- Cross-site scripting that injects scripts into web pages.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Attack using precompiled lists of common passwords. • Condition where timing flaws lead to security gaps. • Engineering attack that manipulates human behavior. • ...
computer work 2022-03-28
Across
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group of computers and associated devices that share a common communications line or wireless link to a server
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A telecommunications network or computer network that extends over a large geographical distance/place.
Down
- network is a series of computers connected together for the purpose of sharing information with other people.
- or system of interconnected people or things.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A device which controls access to separately stored files, as part of a multi-user system.
13 Clues: or system of interconnected people or things. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • A telecommunications network or computer network that extends over a large geographical distance/place. • ...
Cybercrime 2015-06-26
Across
- an offense that relies on advanced or emerging technologies in its commission
- involves tricking people to break computer security procedures
- use of email messages to direct cybercrime victims to phony websites
Down
- focuses on information stored in electronic media
- destructive software programs that can vandalize computers and computer systems
- extending across national boundaries
- a person who illegally accesses computers or computer networks
- malicious computer programs like viruses, worms and Trojan horses
- unsolicited commercial bulk email
9 Clues: unsolicited commercial bulk email • extending across national boundaries • focuses on information stored in electronic media • a person who illegally accesses computers or computer networks • involves tricking people to break computer security procedures • malicious computer programs like viruses, worms and Trojan horses • ...
Computers 'n' stuff 2019-05-13
Across
- any physical device capable of storing information temporarily
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- an electronic device for storing and processing data
- an error, flaw, failure or fault in a computer program
Down
- Read Only Memory
- a network in which the devices -- or nodes -- are connected
- Random-access memory
- networking device that forwards data packets between computer networks
- central processing unit
9 Clues: Read Only Memory • Random-access memory • central processing unit • an electronic device for storing and processing data • an error, flaw, failure or fault in a computer program • a network in which the devices -- or nodes -- are connected • any physical device capable of storing information temporarily • ...
digital tools 2021-09-14
Across
- science or knowledge put into use to solve problems or invent tools.
- drive cloud base storage solution.
- sharing ideas,thoughts and information through networks.
- visual representation of something.
Down
- software that runs on a computer.
- network connects all computers all over the world.
- a collection of web pages and related content published on at least one webserver.
- can provide input to the computer.
- programs websites or online resources that can make task easier to complete.
9 Clues: software that runs on a computer. • drive cloud base storage solution. • can provide input to the computer. • visual representation of something. • network connects all computers all over the world. • sharing ideas,thoughts and information through networks. • science or knowledge put into use to solve problems or invent tools. • ...
Cyber Ethics 2025-06-19
Across
- personal information and not engaging in activities that violate others' privacy, such as snooping or unauthorized access to data.
- harm:
- plagiarism, respecting copyright laws, and not using or distributing software or content without proper authorization.
- intellectual property:
- privacy:
- mindful of the impact of online actions, avoiding cyberbullying, and engaging in respectful communication.
Down
- security:
- responsible digital citizenship:
- and access:
- the integrity of computer systems and networks, protecting them from unauthorized access, malware, and other threats.
- that technology is used equitably and that everyone has access to the benefits of technology.
- using technology to cause physical or emotional harm to others, including spreading misinformation, harassment, or hate speech.
12 Clues: harm: • privacy: • security: • and access: • intellectual property: • responsible digital citizenship: • that technology is used equitably and that everyone has access to the benefits of technology. • mindful of the impact of online actions, avoiding cyberbullying, and engaging in respectful communication. • ...
sydney qurioz internet crossword puzzle 2013-12-02
Across
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- To renew or revitalize; To reload a webpage on the internet
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
Down
- An unauthorized person who secretly gains access to computer files
- OPERATORS A bully who operates online, in cyberspace; To bully online
- a list of citations that appear at the end of a paper, article, chapter or book
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
12 Clues: To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • OPERATORS A bully who operates online, in cyberspace; To bully online • a list of citations that appear at the end of a paper, article, chapter or book • ...
Tory R 2015-05-01
Across
- software used to view various kinds of Internet resources found on the Web.
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- a piece of writing that has been copied from someone else and is presented as being your own work
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application anoperating system software.
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
Down
- a list of citations that appear at the end of a paper, article, chapter or book.
- Law granting a legal right to a copyright holder or
- a restricted computer network; a private network created using World Wide Web software, example: Hays CISD network
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
12 Clues: Law granting a legal right to a copyright holder or • software used to view various kinds of Internet resources found on the Web. • a list of citations that appear at the end of a paper, article, chapter or book. • a piece of writing that has been copied from someone else and is presented as being your own work • ...
Online words 2017-09-08
Across
- A place where you can share your life with others through the internet
- Tell the truth online
- Copy and pasting
- use passwords that aren't easy to guess
- trail left on communications
- the state of belonging to the internet
- Be careful what sites you go on
- talking back and forth online
- searching and finding information online
- don't talk to people you don't know
- buying and selling online
- is that you should use the internet the same as others
Down
- refers to the relationship between copyrighted digital works (such as film, music, and art) and user permissions and rights related to computers, networks, and electronic devices.
- bullying on the internet
- the right way to use the internet
- the privacy of information
- anything that can be found via a google search
- laws on the internet
- not putting a link to the photo
19 Clues: Copy and pasting • laws on the internet • Tell the truth online • bullying on the internet • buying and selling online • the privacy of information • trail left on communications • talking back and forth online • Be careful what sites you go on • not putting a link to the photo • the right way to use the internet • don't talk to people you don't know • ...
Alexander Arias Vocabulary 2024-07-23
Across
- - Characteristics or circumstances in which something operates.
- - Representation or design of an object for analysis.
- - Process of introducing new ideas or methods
- - Measure of how well something meets its purpose.
- - Process of evaluating something to ensure its quality or effectiveness.
- - Process of making changes or adjustments to something.
- - Process of imitating a system to study its operation.
- - Ability to do something without wasting resources.
- - Precautions and measures to avoid damage or accidents.
- - Computer program used on computers.
- - Instruments or equipment used to perform specific tasks
- - Related to technology that uses computers and networks.
Down
- - System of hardware and software for data processing
- - Process of producing products in large quantities.
- - Process of generating something new.
- - Preliminary version of a product used for testing.
- - Cooperation between people to achieve a common goal.
- - Application of scientific knowledge to solve problems.
- - Process of improving something by making it more precise or effective.
19 Clues: - Computer program used on computers. • - Process of generating something new. • - Process of introducing new ideas or methods • - Measure of how well something meets its purpose. • - Process of producing products in large quantities. • - Preliminary version of a product used for testing. • - Ability to do something without wasting resources. • ...
Exact inference in BN 2025-11-03
Across
- Observed variable values used during inference.
- Situation where one event does not affect another.
- Table storing conditional probabilities in BN (Abbreviation).
- Method used to compute joint distributions in BN (single word form).
- Combined probability distribution over multiple variables.
- The variable for which we want a probability answer.
- The variable for which the probability is sought (single word form).
- Directed connection between nodes in BN.
- Posterior probability distribution for a variable.
Down
- Exact inference becomes difficult due to this in large networks.
- A function mapping variable assignments to probabilities.
- The process of computing probabilities in a Bayesian network.
- Probability given that another event has occurred.
- Probability of a single variable independent of others.
- Represents a variable in BN.
- Type of network that represents probabilistic relationships.
- Numerical value expressing uncertainty.
- Structure of Bayesian network (Abbreviation for Directed Acyclic Graph).
- Algorithm that removes variables to compute probabilities.
19 Clues: Represents a variable in BN. • Numerical value expressing uncertainty. • Directed connection between nodes in BN. • Observed variable values used during inference. • Situation where one event does not affect another. • Probability given that another event has occurred. • Posterior probability distribution for a variable. • ...
ITS OLYMPICS 2025-09-18
Across
- Measures to protect computers, networks, and data
- Being responsible for one’s actions
- Assigning tasks to others effectively
- Software installed on a computer to perform tasks
- Working from a distance using technology
- Transferring data from your device to the internet or server
- A storage container for documents or data
- Understanding and sharing the feelings of others
- Ability to see and plan for the future
- Online meeting platform
- A web link that directs you to another page or file
Down
- Ensuring only authorized users can access a system
- The ability to use technology regardless of ability or disability
- Programming language used to make web pages interactive
- Security process requiring two steps to verify identity
- Ability to recover from setbacks or challenges
- Working together toward a common goal
- A program designed to harm or steal data
- Information given to improve performance
19 Clues: Online meeting platform • Being responsible for one’s actions • Assigning tasks to others effectively • Working together toward a common goal • Ability to see and plan for the future • Working from a distance using technology • A program designed to harm or steal data • Information given to improve performance • A storage container for documents or data • ...
Chapter 3 2012-09-05
Across
- uniform resource locator
- allows you to create a list of links for sites
- return to the previous page
- shows you a list of links for sites you have visited recently
- how much work can be done in a certain amount of time
- browser program that lets you find and view web pages
- a web of computer networks that spans the earth
Down
- files on the internet that are stored in powerful computers
- electric transfer of messages
- buying and selling of products
- answers to a query
- allows users to post messages for others to read
- return to your starting point
- can be a text, a button, or a graphic
- one computer linked to another computer
15 Clues: answers to a query • uniform resource locator • return to the previous page • electric transfer of messages • return to your starting point • buying and selling of products • can be a text, a button, or a graphic • one computer linked to another computer • allows you to create a list of links for sites • a web of computer networks that spans the earth • ...
Chapter 12 2015-02-22
Across
- environment harassment, all sexual behaviors that make a worker uncomfortable
- communication, lower level to a higher level
- communication, messages that are sanctioned by the organization itself
- channels through which messages pass from one person to another
- every group has its own rituals, norms, and rules of communication
- an experienced individual trains a less experiences individual
- when a worker is given no information
Down
- don't follow any of the formal lines of communication
- communication, deter work
- employment opportunities granted by sexual favors
- communication, messages between equals
- communication, sent from a higher level to a lower level
- and organized group of people who work together to achieve a goal
- harassment, major problem in organizations
- harassment in the work place
15 Clues: communication, deter work • harassment in the work place • when a worker is given no information • communication, messages between equals • harassment, major problem in organizations • communication, lower level to a higher level • employment opportunities granted by sexual favors • don't follow any of the formal lines of communication • ...
Wellness Mental Health Crossword 2022-12-19
Across
- Also called "good stress"
- Most complex part of the brain; conscious thought, memory, and learning
- A deep and longing stress
- The ability of neural networks in the brain to change Through growth and reorganization
- Emotions stabilize and "re-enter" reality
- A feeling of worry
- Saddened mood or loss in activities
Down
- Questioning reality/making deals
- "Displacement" of frustration towards others
- To train attention and awareness, and achieve a mentally clear and emotionally calm and stable state
- Understanding how others feel
- Damage to brain form; blockage of blood supply in the brain
- Refusal to believe in reality
- The study of how your behaviors and environment can cause changes that affect the way your genes work
- Stress hormone
15 Clues: Stress hormone • A feeling of worry • Also called "good stress" • A deep and longing stress • Understanding how others feel • Refusal to believe in reality • Questioning reality/making deals • Saddened mood or loss in activities • Emotions stabilize and "re-enter" reality • "Displacement" of frustration towards others • ...
The Nervous System by Samantha Tarr 2023-05-04
Across
- complex system of nerves and networks within the brain
- the junction between two neurons
- central trunk or brain, and continues downward to form spinal cord
- carries nerve signals away from cell body
- an ability to understand, recognize, value, or react to something
- part of the brain at the back of skull
- impulse conducting cells
Down
- system that consists of nerves throughout the body
- the faculty by which the mind stores and remembers information
- a whitish fiber or bundle of fibers that transmits impulses of sensation to the brain or spinal cord
- relating to the spine
- involuntary or unconscious
- relating to the body
- system that contains the brain and spinal cord
- receives signals and conducts the information to the cell body
15 Clues: relating to the body • relating to the spine • impulse conducting cells • involuntary or unconscious • the junction between two neurons • part of the brain at the back of skull • carries nerve signals away from cell body • system that contains the brain and spinal cord • system that consists of nerves throughout the body • ...
Lesson 19. Review 2021-06-25
Across
- a person who does a job where he/she is not get paid
- a very successful and famous female singer or actor
- Facebook, Instagram, TikTok, Youtube.
- not willing to work or use any effort
- colorful explosions in the air
- the night when children dress in special clothes
- nervous and uncomfortable with other people
Down
- not joking or not trying to be funny
- someone who is famous
- the photographers who follow famous people everywhere they go to take photos
- a set of clothes worn in order to look like someone or something else
- someone who only thinks of themselves
- not listening or not giving an attention on purpose
- humorous causing laughter
- to tell someone that you are sorry
15 Clues: someone who is famous • humorous causing laughter • colorful explosions in the air • to tell someone that you are sorry • not joking or not trying to be funny • Facebook, Instagram, TikTok, Youtube. • someone who only thinks of themselves • not willing to work or use any effort • nervous and uncomfortable with other people • the night when children dress in special clothes • ...
fall of roman empire 2017-02-05
Across
- frequent wars caused _____ troubles
- the migration of these tribes caused the decline of the empire
- this side of the empire flourished while the other declined
- overuse of this caused the borders to be harder to defend
- caused the Romans to overuse their military
- the arrival of this tribe forced several other tribes inland
- increased coinage caused this
Down
- the spread of this religion helped cause the fall of Rome
- overreliance on this type of labor caused a decline
- barbarians that sacked Rome
- brought from trade networks
- decline in this caused economic problems
- _____ instability caused a faster decline of the empire
- caused by underfunding of the military
- which modern day nation were the barbarians that invaded Rome from
15 Clues: barbarians that sacked Rome • brought from trade networks • increased coinage caused this • frequent wars caused _____ troubles • caused by underfunding of the military • decline in this caused economic problems • caused the Romans to overuse their military • overreliance on this type of labor caused a decline • _____ instability caused a faster decline of the empire • ...
Technology Vocabulary 2019-05-20
Across
- Universal Serial Bus
- The primary method for keeping a computer secure from intruders
- An in house website that serves employees only
- Instructions for the computer
- Scam to steal valuable information
- To write and post and entry in a weblog
Down
- Central Process Unit or the computing part of the computer
- Computer people may use the term for capability and time
- A small text file (up to 4KB) created by a website that is stored in the users computer
- Machinery and Equipment
- Uniform Resource Locator
- A large network made up of smaller networks
- Image Signal Processor
- To store data locally in order to speed up subsequent retrievals
- The fundamental display element of an electronic screen or bit mapped image
15 Clues: Universal Serial Bus • Image Signal Processor • Machinery and Equipment • Uniform Resource Locator • Instructions for the computer • Scam to steal valuable information • To write and post and entry in a weblog • A large network made up of smaller networks • An in house website that serves employees only • Computer people may use the term for capability and time • ...
Lily Kate's Sports Med Crossword 2024-01-18
Across
- power house of a cell
- takes place without the presence of oxygen
- takes place in the presence of oxygen
- an acid that helps in cellular respiration and glucose production
- the formation of more extensive capillary networks around the fiber
- function is to produce movement, sustain body position
- involuntarily muscle
Down
- these fibers use aerobic respiration to produce ATP and contract slowly
- these fibers have fast contractions and mainly use anaerobic glycolysis
- produced by a fiber
- fibers that have fast contractions and mainly use aerobic respiration
- makes up the thick middle layer of the heart
- the extra oxygen that the body uses during exercise
- muscle atrophy that is related to age
- process in which muscle mass decreases and structural proteins are lost
15 Clues: produced by a fiber • involuntarily muscle • power house of a cell • takes place in the presence of oxygen • muscle atrophy that is related to age • takes place without the presence of oxygen • makes up the thick middle layer of the heart • the extra oxygen that the body uses during exercise • function is to produce movement, sustain body position • ...
Unit_5_Assignment - Part 2 2025-04-28
Across
- Process of improving model performance and accuracy.
- Type of graph computation in PyTorch models.
- AI that makes its decision process understandable.
- Google’s cloud platform for coding with GPU support.
- Technique used to tailor AI to specific domains.
- AI application used in healthcare to find issues.
- Simple API for building neural networks in TensorFlow.
Down
- Common AI task for identifying objects or threats.
- AI that creates new images, text, or videos.
- Useful information generated by AI from data analysis.
- Tool in TensorFlow to visualize model performance.
- AI that handles different types of input data.
- Feedback method to fine-tune AI using human ratings.
- Method in OpenCV for detecting features like faces.
- Image form created by removing color.
15 Clues: Image form created by removing color. • AI that creates new images, text, or videos. • Type of graph computation in PyTorch models. • AI that handles different types of input data. • Technique used to tailor AI to specific domains. • AI application used in healthcare to find issues. • Common AI task for identifying objects or threats. • ...
The Tech Behind the desk 2025-08-22
Across
- : Network of infected devices controlled remotely
- : Secure connection that hides your IP address (abbr.)
- : A small program used to automate tasks
- : Temporary storage to speed up access to data
- : Standard markup language for creating web pages (abbr.)
- : Process of converting data into a code to prevent unauthorized access
- : Software programmed into hardware devices
Down
- : Process of verifying identity before granting access
- : Device that forwards data packets between computer networks
- : Copy of data stored separately to prevent loss
- : A computer that provides data or services to other computers
- : Maximum data transfer rate of a network
- : Fraudulent attempt to obtain sensitive information via email
- : Security system that monitors and controls incoming and outgoing network traffic
- : To find and remove errors in code
15 Clues: : To find and remove errors in code • : A small program used to automate tasks • : Maximum data transfer rate of a network • : Software programmed into hardware devices • : Temporary storage to speed up access to data • : Copy of data stored separately to prevent loss • : Network of infected devices controlled remotely • ...
Ethical hacking 2025-11-02
Across
- Hidden entry point into a system bypassing security
- Software that secretly monitors user activity
- Fraudulent attempt to obtain sensitive information via email
- Process of converting data into a coded format
- Security barrier that controls incoming and outgoing network traffic
- Malicious software designed to harm or exploit devices
- Tool that records keystrokes to steal information
- Self-replicating program that infects computers
Down
- Malware disguised as legitimate software
- Malware that locks files until a payment is made
- Weakness in a system that can be exploited by hackers
- Person who gains unauthorized access to systems
- Process of gathering information about a target system
- Testing method used to find vulnerabilities in a system
- Malware that spreads across networks without user action
15 Clues: Malware disguised as legitimate software • Software that secretly monitors user activity • Process of converting data into a coded format • Person who gains unauthorized access to systems • Self-replicating program that infects computers • Malware that locks files until a payment is made • Tool that records keystrokes to steal information • ...
Chapter 1: Human Relations 2016-03-07
Across
- office Computer and information networks that link people in different (remote) locations so they can interact and share work as if they were located in one office building.
- Mathematical models that assist managers with planning and controlling factors such as inventory, product mixes, and sales forecasts.
- The school of management that focused on the technical efficiency of work as a way to maximize production.
- Sharing an office space in your company’s building through reservations.
Down
- Study of relationships among people.
- The idea that the human element is more important to productivity than the technical or physical aspects of the job; identified through experiments conducted by Mayo.
- The school branch of management that began after World War II and was used to solve complex management problems; the computer has played an important role in this school.
- The school of management that focused on techniques to motivate workers.
- People, frequently based at home, who use technology networks to send and receive work and information to and from different locations (such as offices) to which they would once have needed to commute.
- A set of interrelated elements or parts that function as a whole. All parts are connected to all other parts and are affected by at least one other part, and each part affects the whole.
10 Clues: Study of relationships among people. • The school of management that focused on techniques to motivate workers. • Sharing an office space in your company’s building through reservations. • The school of management that focused on the technical efficiency of work as a way to maximize production. • ...
IT a level 2024-10-09
Across
- A network that extends over a large geographic area, such as a city, country, or even globally, connecting multiple LANs.
- A unique identifier assigned to a network interface card (NIC) for communication at the data link layer of a network.
- A networking device that connects multiple Ethernet devices, making them act as a single network segment. Unlike switches, hubs broadcast incoming traffic to all ports.
- A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- A network that connects computers and devices within a limited geographic area, such as a home, office, or building.
- Converts digital data from a computer into analog signals for transmission over telephone lines and vice versa, enabling internet connectivity.
- A network device that connects multiple devices on the same network and forwards data only to the intended destination within the local network.
- A network device that connects and filters traffic between two or more network segments, operating at the data link layer to reduce traffic and improve performance.
- A device that forwards data packets between computer networks, enabling devices on different networks to communicate.
- A device that creates a wireless local area network, typically in an office or large building, enabling wireless devices to connect to a wired network using Wi-Fi.
10 Clues: A network that connects computers and devices within a limited geographic area, such as a home, office, or building. • A unique identifier assigned to a network interface card (NIC) for communication at the data link layer of a network. • A device that forwards data packets between computer networks, enabling devices on different networks to communicate. • ...
Metaverse Puzzle 2025-01-23
Across
- : Type of reality that enhances the physical world with digital elements.
- : Fully engaging or deeply interactive experiences in virtual environments.
- : Non-Fungible Token for digital ownership.
- : Short for Virtual Reality.
Down
- : Technology used for decentralized networks in the Metaverse.
- : A virtual-reality space where users can interact with a computer-generated environment and other users.
- : A 3D image projected into space.
- : Currency used in Metaverse transactions.
- : A digital representation of a person in the Metaverse.
9 Clues: : Short for Virtual Reality. • : A 3D image projected into space. • : Currency used in Metaverse transactions. • : Non-Fungible Token for digital ownership. • : A digital representation of a person in the Metaverse. • : Technology used for decentralized networks in the Metaverse. • : Type of reality that enhances the physical world with digital elements. • ...
Puzzle 1: IT, The Internet, Web & E-commerce 2020-08-18
Across
- What the Internet was initially called
- ISP stand for?
- A collection of computer networks that connect people all over the world
- The biggest and the most powerful computer
- National ISP in South Africa
Down
- Script that is often used to trigger simple interactive feature, which can be contained in a web page
- The specific address where the resources is located
- User that sees a computer as a black/magic box
- Language in which your resources will be sent to your computer form the internet
- Being connected to the Internet
- The software running in the background
- Programs that provide access to Web resources
- Rules for exchanging data between computers
- Also known as midrange computer
- Synonym of Software
15 Clues: ISP stand for? • Synonym of Software • National ISP in South Africa • Being connected to the Internet • Also known as midrange computer • What the Internet was initially called • The software running in the background • The biggest and the most powerful computer • Rules for exchanging data between computers • Programs that provide access to Web resources • ...
The Nervous System 2022-03-12
Across
- Largest part of the brain
- Connective and supporting tissue of an organ
- Neurotransmitter chemical released at the ends of a nerve cell
- Networks of intersecting blood and lymphatic vessels
- Motor nerve that carries messages away from the brain
- Depression or groove in the surface of the cerebral cortex
Down
- Three protective membranes that surround the brain and spinal cord
- Type of glial cell that transports water and salt
- Microscopic branching fiber of a nerve cell
- Sensory nerve that carries messages toward the brain
- Canals in the brain that contain cerebrospinal fluid
- Space through which a nervous impulse travels between nerve cells
- Individual nerve cell
- Fatty tissue covering axons
- Essential distinguishing tissue of an organ
15 Clues: Individual nerve cell • Largest part of the brain • Fatty tissue covering axons • Microscopic branching fiber of a nerve cell • Essential distinguishing tissue of an organ • Connective and supporting tissue of an organ • Type of glial cell that transports water and salt • Sensory nerve that carries messages toward the brain • ...
My Computer Anatomy Crossword - Ravdeep 2017-09-20
Across
- Temporary memory
- Permanent memory
- Reads and writes data from from optical disks through laser technology
- A local or restricted communications network
- Contains the principal components of a computer + connectors into which other circuit boards can be slotted
- A computer network that spans a larger area
- Designed to block unauthorized access
- A set of computers connected together for the purpose of sharing
- The "brains" of a computer
Down
- The machines and wiring/ other electronic system
- A system of internet servers
- A computer network that spans a smaller area
- Using information and communication technologies to find, evaluate, create, and communicate cognitive and technical skills.
- The massive network of networks
- A device or program that allows a computer to transmit data
15 Clues: Temporary memory • Permanent memory • The "brains" of a computer • A system of internet servers • The massive network of networks • Designed to block unauthorized access • A computer network that spans a larger area • A computer network that spans a smaller area • A local or restricted communications network • The machines and wiring/ other electronic system • ...
My Computer Anatomy Crossword - Ravdeep 2017-09-20
Across
- A computer network that spans a larger area
- Contains the principal components of a computer + connectors into which other circuit boards can be slotted
- The massive network of networks
- The "brains" of a computer
- A system of internet servers
- Using information and communication technologies to find, evaluate, create, and communicate cognitive and technical skills.
- Designed to block unauthorized access
- A set of computers connected together for the purpose of sharing
Down
- A local or restricted communications network
- Reads and writes data from from optical disks through laser technology
- Permanent memory
- Temporary memory
- A computer network that spans a smaller area
- The machines and wiring/ other electronic system
- A device or program that allows a computer to transmit data
15 Clues: Permanent memory • Temporary memory • The "brains" of a computer • A system of internet servers • The massive network of networks • Designed to block unauthorized access • A computer network that spans a larger area • A local or restricted communications network • A computer network that spans a smaller area • The machines and wiring/ other electronic system • ...
Wellness Mental Health Crossword 2022-12-19
Across
- A deep and longing stress
- Also called "good stress"
- The study of how your behaviors and environment can cause changes that affect the way your genes work
- A feeling of worry
- Damage to brain form; blockage of blood supply in the brain
- Questioning reality/making deals
- The ability of neural networks in the brain to change Through growth and reorganization
- Refusal to believe in reality
Down
- Saddened mood or loss in activities
- Emotions stabilize and "re-enter" reality
- "Displacement" of frustration towards others
- Stress hormone
- Understanding how others feel
- Most complex part of the brain; conscious thought, memory, and learning
- To train attention and awareness, and achieve a mentally clear and emotionally calm and stable state
15 Clues: Stress hormone • A feeling of worry • A deep and longing stress • Also called "good stress" • Understanding how others feel • Refusal to believe in reality • Questioning reality/making deals • Saddened mood or loss in activities • Emotions stabilize and "re-enter" reality • "Displacement" of frustration towards others • ...
the internet 2022-10-11
Across
- - an ex. google.
- - defence advanced research projects agency.
- - open systems interconnection 7 layers that computer systems needs to communicate.
- - a packet switching network made in 1972.
- - software pointer that points to the location where hyper media is stored.
- - network control protocol it was an early protocol put in place by ARPANET.
- - a suite of communication protocols used to interconnect network devices.
- - advanced research projects agency networks.
- - Uniform Resource Locator.
Down
- - an exact copy of an entire optical disk.
- - the collection of hypertext links throughout the internet.
- - can be abbreviated to js.
- - transmission control protocol it is one of the main protocols in the internet protocol suite.
- - the first packet router.
- - hypertext markup language.
15 Clues: - an ex. google. • - the first packet router. • - can be abbreviated to js. • - Uniform Resource Locator. • - hypertext markup language. • - an exact copy of an entire optical disk. • - a packet switching network made in 1972. • - defence advanced research projects agency. • - advanced research projects agency networks. • ...
IP Fragmentation and Reassembly 2025-05-21
Across
- — Control bits used in fragmentation.
- — A formatted unit of data carried by a network.
- — A piece of a larger IP packet.
- — Field indicating the position of a fragment in the original data.
- — The process of putting IP fragments back together.
- — Contains routing and control information in a packet.
- — Unique number used to identify fragments of a packet.
Down
- — A self-contained packet in packet-switched networks.
- — Maximum Transmission Unit, largest packet size allowed.
- — Error-checking value in packet headers.
- — Time To Live, limits the packet lifespan.
- — A set of rules governing data communication.
- — Temporary storage for fragments before reassembly.
- — The fourth version of the Internet Protocol.
- — The newest Internet Protocol version with longer addresses.
15 Clues: — A piece of a larger IP packet. • — Control bits used in fragmentation. • — Error-checking value in packet headers. • — Time To Live, limits the packet lifespan. • — A set of rules governing data communication. • — The fourth version of the Internet Protocol. • — A formatted unit of data carried by a network. • — The process of putting IP fragments back together. • ...
COMPUTER LANGUAGE 2025-06-17
Across
- type of software protects computers from malicious software
- is used in assembly languages(2 words)
- network security system that protects networks from unsutharised
- of fifth generation computer language
- of the high-level language
- first instructive computer language
- language
Down
- of fifty generation computer language(2 word)
- kind of language java is
- access to computer network security sysem
- set of instruction that tells the computer what to do
- high level language to low level language and vice versa
- storage location of computer memory that stores data
- of rules that define structure and formed a programing language
- social engineering attack that used to steal user data
15 Clues: language • kind of language java is • of the high-level language • first instructive computer language • of fifth generation computer language • is used in assembly languages(2 words) • access to computer network security sysem • of fifty generation computer language(2 word) • storage location of computer memory that stores data • ...
CH. 40 Medical Office Computerization 2025-09-27
Across
- usually rounded off to 1000 bytes
- programs that tell a computer what to do
- duplicate copy of a program kept for reference
- method of transmitting electronic data that handles a wide range of frequencies
- system that protects a computer network from unauthorized access
- an output device
- group of computers that share data and resources
- equal to one billion bytes
Down
- an input device
- process that turns data into an unreadable form that requires software to reverse process
- wireless device used to connect networks
- a large computer that stores data for other computers on a network
- physical equipment making up the computer system
- information that has been generated by the computer
- data that have been entered in the computer
15 Clues: an input device • an output device • equal to one billion bytes • usually rounded off to 1000 bytes • programs that tell a computer what to do • wireless device used to connect networks • data that have been entered in the computer • duplicate copy of a program kept for reference • physical equipment making up the computer system • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Searching for insecure wireless networks to exploit.
- Small piece of code used to exploit a vulnerability.
- Memory structure targeted in buffer overflow attacks.
- Technique aimed at disturbing or halting services.
- Cross-site scripting that injects scripts into web pages.
- Process of gathering information before an attack.
- Method of guessing passwords by trying all possibilities.
- Engineering attack that manipulates human behavior.
Down
- Condition where timing flaws lead to security gaps.
- Code or tool designed to abuse vulnerabilities.
- Attack using precompiled lists of common passwords.
- Error caused when data exceeds memory storage limits.
- Attack that makes a system unavailable to users.
- Technique of inserting malicious code into input fields.
- Database query language often exploited for injection attacks.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Condition where timing flaws lead to security gaps. • Attack using precompiled lists of common passwords. • Engineering attack that manipulates human behavior. • ...
Deep Learning 2024-05-04
Across
- A computational model inspired by the human brain, consisting of interconnected nodes (neurons) organized in layers.
- A type of neural network designed for processing structured grid data, commonly used in image recognition and classification tasks.
Down
- An open-source deep learning framework developed by Google, widely used for building and training neural networks.
- An optimization algorithm used to minimize the error of a neural network by adjusting its parameters in the direction of the steepest descent of the loss function.
- A method used to train neural networks by computing the gradient of the loss function with respect to the network's parameters, allowing for efficient parameter updates.
- A type of neural network architecture designed to handle sequential data by maintaining a state or memory of previous inputs.
- A deep learning framework developed by Facebook's AI Research lab, known for its dynamic computation graph and ease of use.
7 Clues: An open-source deep learning framework developed by Google, widely used for building and training neural networks. • A computational model inspired by the human brain, consisting of interconnected nodes (neurons) organized in layers. • ...
Network topologies 2018-10-15
Across
- a commonly used piece of technology
- wide area network
- a network that goes down a central cable and that is easily broken
- a network that all connects to one central hub
Down
- local area network
- an item required to connecting most networks
- a network where all are semi independent network where all computers are able to share with whom ever they want
- a central hub
- a cable connecting all computers within a circular shape
9 Clues: a central hub • wide area network • local area network • a commonly used piece of technology • an item required to connecting most networks • a network that all connects to one central hub • a cable connecting all computers within a circular shape • a network that goes down a central cable and that is easily broken • ...
Technological Progress 2024-03-09
Across
- Meeting present needs without compromising future resources
- Transmitting information over a distance by electronic means
- The use of living systems and organisms to develop products
- The use of machines to perform tasks without human intervention
- The process of introducing new ideas or methods
Down
- Protecting computers and networks from theft or damage
- Designing, constructing, and using robots
- A secure, shared digital ledger for recording transactions
- A set of rules to solve problems or perform computations
9 Clues: Designing, constructing, and using robots • The process of introducing new ideas or methods • Protecting computers and networks from theft or damage • A set of rules to solve problems or perform computations • A secure, shared digital ledger for recording transactions • Meeting present needs without compromising future resources • ...
pbl 2021-04-04
5 Clues: not a NoSQL database • language used in neo4j • format supported by mongodb • stores information about networks • MongoDB has been adopted as a ____ software
Computer Network Puzzle 2020-07-30
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Computer Network Puzzle 2022-04-05
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Industry Buzz 2025-01-07
5 Clues: Marketing, finance, strategy, management • Networks, cybersecurity, coding, software • Patient care, diagnoses, treatment, hospitals • Curriculum, pedagogy, classroom, lesson plans • Therapy, counseling, mental health, wellbeing
Chapter 1: Human Relations 2016-06-22
Across
- The school of management that focused on the technical efficiency of work as a way to maximize production.
- The idea that the human element is more important to productivity than the technical or physical aspects of the job; identified through experiments conducted by Mayo.
- Mathematical models that assist managers with planning and controlling factors such as inventory, product mixes, and sales forecasts.
- The school of management that focused on techniques to motivate workers.
- Sharing an office space in your company’s building through reservations.
Down
- A set of interrelated elements or parts that function as a whole. All parts are connected to all other parts and are affected by at least one other part, and each part affects the whole.
- The Branch of management school that began after World War II and was used to solve complex management problems; the computer has played an important role in this school.
- Study of relationships among people.
- Computer and information networks that link people in different (remote) locations so they can interact and share work as if they were located in one office building.
- People, frequently based at home, who use technology networks to send and receive work and information to and from different locations (such as offices) to which they would once have needed to commute.
10 Clues: Study of relationships among people. • The school of management that focused on techniques to motivate workers. • Sharing an office space in your company’s building through reservations. • The school of management that focused on the technical efficiency of work as a way to maximize production. • ...
Theories of Networks and Communities 2021-04-14
Across
- The degree to which a community is prepared to take action on a specific issue.
- The tendency for people to have relationships with others who have similar attributes.
- The process by which an innovation moves through channels of a social system.
- Local, state, and national laws, decisions, and plans that create built and social environments and systems.
- The number of connections in the network as a proportion of those possible.
- Ideas, practices, or objects that are perceived as new by an individual or other unit of adoption.
- The spread of a behavior or trait from one person to another.
Down
- The active process of using planned strategies to spread information to promote adoption.
- A group of people who have something in common, whether it is a trait, an interest, geographical proximity, or a common goal.
- The interconnectedness and solidarity of the network actors: a function of the strength of ties, distance, and density.
10 Clues: The spread of a behavior or trait from one person to another. • The number of connections in the network as a proportion of those possible. • The process by which an innovation moves through channels of a social system. • The degree to which a community is prepared to take action on a specific issue. • ...
Transport layer for mobile networks 2025-05-22
Across
- – Reliable data delivery protocol
- – Variation in packet arrival times
- – Initial connection setup process
- – Lightweight, connectionless protocol
- Control – Prevents sender from overwhelming receiver
Down
- Loss – Data that didn’t make it
- – Actual data rate achieved
- Number – Identifies specific apps or services
- Control – Manages network traffic load
- – Time delay in data transfer
10 Clues: – Actual data rate achieved • – Time delay in data transfer • Loss – Data that didn’t make it • – Reliable data delivery protocol • – Initial connection setup process • – Variation in packet arrival times • Control – Manages network traffic load • – Lightweight, connectionless protocol • Number – Identifies specific apps or services • ...
Tech Terms 2022-11-22
Across
- Small blocks of data created by a web server
- Software meant to disrupt, damage, destroy, or gain access unauthorized to a computer system
- starting up the system
- portable Document Format
- Software that supports a computer's basic functions
- Most basic unit of data in computers
- networking device that forwards data packets between computer networks
Down
- Family of wired computer networking in an area
- converts data from a digital format into a format suitable for an analog transmission
- reloading the system
- Central Processing Unit
- Group of binary digits or bits as a unit
- A network security system to stop unauthorized or malicious access
- Unit of information loosely equal to one million bytes
- hypertext markup language
- unique string of characters that can identify each computer
16 Clues: reloading the system • starting up the system • Central Processing Unit • portable Document Format • hypertext markup language • Most basic unit of data in computers • Group of binary digits or bits as a unit • Small blocks of data created by a web server • Family of wired computer networking in an area • Software that supports a computer's basic functions • ...
Brain and Emotion 2014-11-23
Across
- Pattern of neuronal firing.
- Brain region responsible for forming new memories.
- Change in the strength of a synapse, resulting in learning and memory
- Brain region responsible for emotion.
- The psychological term for mood.
- Brain region responsible for breathing.
- Memory of personal experiences.
Down
- Emotions depend on both body states and cognitive functions.
- Signals that the body sends to the brain concerning physical factors of emotion
- Chemical signalling molecule in the brain.
- Using emotions to review a problem
- "Putting yourself in someone else's shoes"/
- View that suggests that computation networks of emotion are neurologically unrealistic.
- Appraisal that certain aspects of the situation are extremely important
- These are related to emotions in a problem space.
- A neural network that computes emotions by giving each unit a valence.
16 Clues: Pattern of neuronal firing. • Memory of personal experiences. • The psychological term for mood. • Using emotions to review a problem • Brain region responsible for emotion. • Brain region responsible for breathing. • Chemical signalling molecule in the brain. • "Putting yourself in someone else's shoes"/ • These are related to emotions in a problem space. • ...
BTT Crossword 4 2016-02-27
Across
- These devices expand networks by creating multiple subnets or subnetworks.
- Network that covers metropolitan, regional, national or international boundaries.
- Father of the WWW _____ Berners-Lee.
- Each host or client in a LAN has a Network ________ Card (NIC)
- Type of signal that looks like a sine wave.
- (ISDN) ______ Services Digital Network.
- OSI layer 3 ensures network integrity and is called the ______ layer.
- A WAN is created when connect two or more of these.
- - OSI layer 1 works with the bits themselves.
Down
- These devices improve performance of a network by creating separate collision domains.
- Session ________ Protocol (SIP).
- The design layout of the network.
- (SONET)________ Optical Network.
- A LAN software is called a network ________ system (NOS).
- Dual _____ Multi-Frequency (DTMF).
- Type of signal that looks like a square wave.
16 Clues: (SONET)________ Optical Network. • Session ________ Protocol (SIP). • The design layout of the network. • Dual _____ Multi-Frequency (DTMF). • Father of the WWW _____ Berners-Lee. • (ISDN) ______ Services Digital Network. • Type of signal that looks like a sine wave. • Type of signal that looks like a square wave. • - OSI layer 1 works with the bits themselves. • ...
chapter 1 crossword 2017-11-29
Across
- Engineer: Design the hardware used in computer systems.
- Analyst: Responsible for protecting computer networks.
- Basic building block in an electronic computer.
- The physical parts of a computer.
- Intelligence: Tries to copy movement, speech, vision, and decision-making of humans.
- A group of eight bits.
- Processing: CPU's in a computer working on separate tasks at the same time.
Down
- Compatible: Something created in an earlier version will work in the new version.
- Name of memory location.
- Writes computer code to create software.
- Simulation: Tries to produce results similar to reality.
- Developer: Writes the specifications for software.
- The instructions that tell the hardware what to do.
- Software in a computer.
- Number System: Based on ten digits , from 0-9.
- Number System: Based on two digits
16 Clues: A group of eight bits. • Software in a computer. • Name of memory location. • The physical parts of a computer. • Number System: Based on two digits • Writes computer code to create software. • Number System: Based on ten digits , from 0-9. • Basic building block in an electronic computer. • Developer: Writes the specifications for software. • ...
Spelling List #16 2017-03-09
Across
- Mrs. Crystal is a ______ not a boy.
- What you do you call your friends on?
- What do you listen to music on?
- First you go the bathroom and ______ you wash your hands.
- What do you warm up food in?
- I _____ want to go home.
- You can get on a ________ to play games or get on Facebook.
- She is ____ in the park.
Down
- I watch movies on the __________.
- If you go bowling you must _____ a ball.
- What ____ you lost your hair?
- This is white and you can eat it at the movies.
- This is the old way to send mail with a phone.
- Disney and Nickelodeon are ______ that have kids shows.
- This is what you put on popcorn.
15 Clues: I _____ want to go home. • She is ____ in the park. • What do you warm up food in? • What ____ you lost your hair? • What do you listen to music on? • This is what you put on popcorn. • I watch movies on the __________. • Mrs. Crystal is a ______ not a boy. • What you do you call your friends on? • If you go bowling you must _____ a ball. • ...
