networks Crossword Puzzles
Chapter 3 2012-09-05
Across
- buying and selling of products
- uniform resource locator
- awnsers to a query
- allows you to create a list of links for sites
- can be text, a button, or a graphic
- browser programs that let you find and view web pages
- alows users to post messages for others to read
- one computer linked to another computer
Down
- how much work can be done in a certain amount of time
- electric transfer of messages
- return to your starting point
- files on the Internet that are stored on powerful computers
- shows you a list o flinks for sites you have vistited recently
- a web of computer networks that spans the Earth
- return to the previous page
15 Clues: awnsers to a query • uniform resource locator • return to the previous page • electric transfer of messages • return to your starting point • buying and selling of products • can be text, a button, or a graphic • one computer linked to another computer • allows you to create a list of links for sites • a web of computer networks that spans the Earth • ...
Technology Vocabulary 2021-11-11
Across
- a set of related records kept together
- the process in whch output of a sistem is returned
- restore something
- a set of characters comprising unit of imformatio
- transfer a file or program to a smaller computer
- crime comitted using a computer and the internet
- an organized body of related information
- a data storage devece that is not the main memory of a computer
Down
- a wordw the network of computes networks
- an output that is proportional to que inpunt
- a list of question thet are frequenly
- a facial expression represented by a sequense of charater
- locateand and correc errorsin an computer program code
- transfer out for a database of document
- the part of something in relatio other
15 Clues: restore something • a list of question thet are frequenly • a set of related records kept together • the part of something in relatio other • transfer out for a database of document • a wordw the network of computes networks • an organized body of related information • an output that is proportional to que inpunt • transfer a file or program to a smaller computer • ...
Noise Pollution Crossword 2022-04-05
Across
- form of measuring sound
- a device for finding sources of sound underwater
- to find things by finding the time for an echo to return and the direction from which it returns
- a measure of the rate of decrease in the intensity of electromagnetic radiation as it passes through a given substance
- a compound substance
- the transmission of acoustic energy through a medium
- allowing water to pass through
- aspects of a stimulus; what are perceived after a stimulus
- relating to sound
- a cluster of soil particles
Down
- inorganic, typically ceramic, alumino-silicate forming long-range, covalently bonded, non-crystalline networks
- a dampening of sound
- make softer
- percentage of void space in a solid
- a polymer with elastic properties
15 Clues: make softer • relating to sound • a dampening of sound • a compound substance • form of measuring sound • a cluster of soil particles • allowing water to pass through • a polymer with elastic properties • percentage of void space in a solid • a device for finding sources of sound underwater • the transmission of acoustic energy through a medium • ...
The Nervous System 2022-03-12
Across
- Largest part of the brain
- Connective and supporting tissue of an organ
- Neurotransmitter chemical released at the ends of a nerve cell
- Networks of intersecting blood and lymphatic vessels
- Motor nerve that carries messages away from the brain
- Depression or groove in the surface of the cerebral cortex
Down
- Three protective membranes that surround the brain and spinal cord
- Type of glial cell that transports water and salt
- Microscopic branching fiber of a nerve cell
- Sensory nerve that carries messages toward the brain
- Canals in the brain that contain cerebrospinal fluid
- Space through which a nervous impulse travels between nerve cells
- Individual nerve cell
- Fatty tissue covering axons
- Essential distinguishing tissue of an organ
15 Clues: Individual nerve cell • Largest part of the brain • Fatty tissue covering axons • Microscopic branching fiber of a nerve cell • Essential distinguishing tissue of an organ • Connective and supporting tissue of an organ • Type of glial cell that transports water and salt • Sensory nerve that carries messages toward the brain • ...
tachnology vocabulary 2021-08-12
Across
- of or pertaining to a number system having 2 as its base
- having an output that is proportional to the input
- a facial expression represented by a sequence of characters
- transfer out of a database or document
- any small compartment
- transfer a file or program to a smaller computer
- a data transmission rate for modems
Down
- a unit of measurement of information
- adjusting the parts of something in relation to each other
- a worldwide network of computer networks
- a set of related records kept together
- set up for a particular purpose
- crime committed using a computer and the internet
- a program that gives a computer instructions
- a copy of a file or directory on a separate storage device
15 Clues: any small compartment • set up for a particular purpose • a data transmission rate for modems • a unit of measurement of information • a set of related records kept together • transfer out of a database or document • a worldwide network of computer networks • a program that gives a computer instructions • transfer a file or program to a smaller computer • ...
Lily Kate's Sports Med Crossword 2024-01-18
Across
- power house of a cell
- takes place without the presence of oxygen
- takes place in the presence of oxygen
- an acid that helps in cellular respiration and glucose production
- the formation of more extensive capillary networks around the fiber
- function is to produce movement, sustain body position
- involuntarily muscle
Down
- these fibers use aerobic respiration to produce ATP and contract slowly
- these fibers have fast contractions and mainly use anaerobic glycolysis
- produced by a fiber
- fibers that have fast contractions and mainly use aerobic respiration
- makes up the thick middle layer of the heart
- the extra "BLANK" that the body uses during exercise
- muscle atrophy that is related to age
- process in which muscle mass decreases and structural proteins are lost
15 Clues: produced by a fiber • involuntarily muscle • power house of a cell • takes place in the presence of oxygen • muscle atrophy that is related to age • takes place without the presence of oxygen • makes up the thick middle layer of the heart • the extra "BLANK" that the body uses during exercise • function is to produce movement, sustain body position • ...
Business review Tristan Termuhlen 2023-10-02
Across
- people who work for organzation who control th workers in most areas
- an ablity to empathize with people and understand the people.
- what is chandlers real name
- a assest that is not physical in nature
- A plan of action to achive a goal.
- who is our president
- two how many NFL teams are there
Down
- using tech and assembly lines to make large quanties.
- for profit or non-profit involved in a trade
- information about a employee leaving a company
- protection of networks,devices,and data from being stolen
- a assest thphysicalsyical and can be touched
- an aspirational view of the future.
- the daily functoning of an organation.
- a independent and baised inspection and review to evaluate the safety.
15 Clues: who is our president • what is chandlers real name • A plan of action to achive a goal. • an aspirational view of the future. • the daily functoning of an organation. • a assest that is not physical in nature • two how many NFL teams are there • for profit or non-profit involved in a trade • a assest thphysicalsyical and can be touched • ...
Puzzle 1: IT, The Internet, Web & E-commerce 2020-08-18
Across
- What the Internet was initially called
- ISP stand for?
- A collection of computer networks that connect people all over the world
- The biggest and the most powerful computer
- National ISP in South Africa
Down
- Script that is often used to trigger simple interactive feature, which can be contained in a web page
- The specific address where the resources is located
- User that sees a computer as a black/magic box
- Language in which your resources will be sent to your computer form the internet
- Being connected to the Internet
- The software running in the background
- Programs that provide access to Web resources
- Rules for exchanging data between computers
- Also known as midrange computer
- Synonym of Software
15 Clues: ISP stand for? • Synonym of Software • National ISP in South Africa • Being connected to the Internet • Also known as midrange computer • What the Internet was initially called • The software running in the background • The biggest and the most powerful computer • Rules for exchanging data between computers • Programs that provide access to Web resources • ...
Sofia Acero Virus 2019-11-06
Across
- Messages passed between computers through networks
- Information on a computer
- Virus that modifies computer system
- Type of virus named after Greek myth
- Infects a host and connects back to a central server
- Virus sent through email with just a text file that said “love-letter-for-you.txt”
- Programs used on a computer
- Unwanted software installed on your computer without your consent
Down
- Software designed to damage a computer
- Sending email pretending to be from a company to trick people into giving up personal information
- Computer that holds a virus
- Software that protects your computer against viruses
- Distributed Denial of Service
- Flaw in a computer that causes it to behave unexpectedly
- Virus that multiplies itself
15 Clues: Information on a computer • Computer that holds a virus • Programs used on a computer • Virus that multiplies itself • Distributed Denial of Service • Virus that modifies computer system • Type of virus named after Greek myth • Software designed to damage a computer • Messages passed between computers through networks • Software that protects your computer against viruses • ...
Tunnitöö Ragnar Kuurmaa 2020-11-12
Across
- / a numerical label assigned to each device
- / a typewriter-style device
- / receive data from a remote system
- / a modifier key on a keyboard, used to type capital letters and other alternate upper characters
- / a general category of storage mechanisms where data is recorded by various electronic
- / a collection of web pages
- /method of exchanging messages
Down
- / a computer resource for recording data discretely in a computer storage device
- /a device that optically scans images
- /you can check a
- / name of this symbol @
- /a networking device that forwards data packets between computer networks
- /mobile application, also referred to as a
- / small piece of data stored on the user's computer by the web browser while browsing a website
- / a small round spot
15 Clues: /you can check a • / a small round spot • / name of this symbol @ • / a typewriter-style device • / a collection of web pages • /method of exchanging messages • / receive data from a remote system • /a device that optically scans images • /mobile application, also referred to as a • / a numerical label assigned to each device • ...
Nursing Information System 2024-07-02
Across
- information repositories that collect input from various users
- another term for software as a service
- allowing for individual contribition or donation
- messages distributed by electronic means from one computer to another via network
- network of networks
- cable internet service
Down
- the second phase of SDLC
- the place where the first-ever publication of website
- a social media example that starts with letter F.
- the first name of the inventor of world wide web
- allow users to input opinions and information onto web pages
- domain for educational institution
- represents the amount of data that travels over a network
- refers to a shift in how the internet is used
- the primary purpose of internet as a nursing resources
15 Clues: network of networks • cable internet service • the second phase of SDLC • domain for educational institution • another term for software as a service • refers to a shift in how the internet is used • the first name of the inventor of world wide web • allowing for individual contribition or donation • a social media example that starts with letter F. • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Attack using precompiled lists of common passwords.
- Searching for insecure wireless networks to exploit.
- Small piece of code used to exploit a vulnerability.
- Technique aimed at disturbing or halting services.
- Memory structure targeted in buffer overflow attacks.
- Process of gathering information before an attack.
Down
- Error caused when data exceeds memory storage limits.
- Technique of inserting malicious code into input fields.
- Cross-site scripting that injects scripts into web pages.
- Code or tool designed to abuse vulnerabilities.
- Method of guessing passwords by trying all possibilities.
- Attack that makes a system unavailable to users.
- Condition where timing flaws lead to security gaps.
- Engineering attack that manipulates human behavior.
- Database query language often exploited for injection attacks.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Attack using precompiled lists of common passwords. • Condition where timing flaws lead to security gaps. • Engineering attack that manipulates human behavior. • ...
NETWORK CROSSWORD 2025-12-22
Across
- : VLAN that can cause leaks if mismatched on trunk links
- : Metric that measures recovery speed after failures
- : Keyword hidden as the main horizontal axis of the puzzle
- : Link that silently fails when VLAN tagging is inconsistent
- : Switch behavior when destination MAC is unknown
- : Protocol that depends on broadcast for IP resolution
- : Event eliminated by switches but not hubs
- : Mechanism that prevents Layer 2 loops
Down
- : Attack movement inside a compromised network
- : Design principle that reduces broadcast impact
- : Part of a device affected during broadcast storms
- : Traffic type that collapses flat Layer 2 networks when uncontrolled
- : Method used to identify VLAN membership on trunk links
- : One-to-one traffic delivery method
- : Logical boundary that limits broadcast propagation
15 Clues: : One-to-one traffic delivery method • : Mechanism that prevents Layer 2 loops • : Event eliminated by switches but not hubs • : Attack movement inside a compromised network • : Design principle that reduces broadcast impact • : Switch behavior when destination MAC is unknown • : Part of a device affected during broadcast storms • ...
Computer network puzzle 2022-03-28
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Social Media 2024-09-19
Across
- To look through a book, newspaper, website, etc. without reading everything
- The activity of tricking people into providing personal or financial information by sending emails, texts, etc. that seem to be from companies that the person knows, often in order to steal money from them
- (of an activity or service) available on or done using the internet or other computer network
- The activity of presenting, advertising and selling a company’s products or services in the best possible way
- A way of sending messages and data to other people by means of computers connected together in a network
- To move text on a computer screen up or down so that you can read different parts of it
- A website where people can watch and share videos
- The practice of funding a project or an activity by raising many small amounts of money from a large number of people, usually using the internet
Down
- A word or phrase with the symbol ‘#’ in front of it, used on social media sites and apps so that you can search for content with the same subject
- A person or thing that influences somebody/something, especially a person with the ability to influence potential buyers of a product or service by recommending it on social media
- An international computer network connecting other networks and computers that allows people to share information around the world
- Connected with electronic communication networks, especially the internet
- To choose to regularly see content from a person, company, etc. using a social media service
- A website where an individual person, or people representing an organization, write regularly about recent events or topics that interest them, usually with photos and links to other websites that they find interesting
14 Clues: A website where people can watch and share videos • Connected with electronic communication networks, especially the internet • To look through a book, newspaper, website, etc. without reading everything • To move text on a computer screen up or down so that you can read different parts of it • ...
Disruptive Technology 2025-08-09
Across
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- security enhancement that requires users to provide more than one form of identification to access an account or system
- a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- the process of identifying and assessing potential security weaknesses in systems, software, and networks
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
14 Clues: the process of identifying and assessing potential security weaknesses in systems, software, and networks • Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • ...
COCS 100 Spencer Zehring 2015-09-24
Across
- up to 10% or no more than 30 seconds
- orders links by relevance to user
- a group of information on a computer that can be software programs or data
- not logging in to the computer
- _____ can be increased through high quality graphics and good writing
- type of text editor
- world wide web
- language that is neutral rather than subjective
- when computers are geographically close
- type of cache that stores a file before returning the information to the browser
Down
- develop and deliver content
- Easy-Consistent-Location in site
- main technology for local area networks
- sending and receiving occur at different times
- The internet become _____ effective with each computer added
- may result in termination of access or disciplinary review
- no more than 5 _____ from one artist
- translates the hierarchical, human-readable names into IP addresses
- servers that send files to browsers running on other computers connected to the internet
- always discovering web pages and building an index
20 Clues: world wide web • type of text editor • develop and deliver content • not logging in to the computer • Easy-Consistent-Location in site • orders links by relevance to user • up to 10% or no more than 30 seconds • no more than 5 _____ from one artist • main technology for local area networks • when computers are geographically close • ...
Pfromotion 2023-05-18
Across
- to create and share information, ideas and interests
- Media The various places where advertisements
- Adverts These are a form of online marketing which place
- advertisements on mobile phones and websites.
- on web pages showing the results from
- engine queries.
- to persuade them to buy those products now and
- businesses to make consumers aware of products
- Mix The combination of promotional materials
- the future.
- browser windows on computer screens.
Down
- Engine Advertising A form of online marketing which places
- internet with other users producing their own entries or
- Involves information and techniques used
- be found such as television, newspapers, or the
- Media Involves websites and applications which allow
- Adverts Using internet technologies to provide a range of
- by a business to communicate with its customers.
- including using email, social media messages and
- Provides information and allows discussion on
- other individuals, communities and networks.
21 Clues: the future. • engine queries. • browser windows on computer screens. • on web pages showing the results from • Involves information and techniques used • other individuals, communities and networks. • Media The various places where advertisements • advertisements on mobile phones and websites. • Provides information and allows discussion on • ...
Heat Engineer Crossword 2022-06-16
Across
- Who fixes supply problems?
- These are carried out once every 2 years on customers HIU's
- What do we run when a customer has a loss of supply.
- The customer can control the temperature of the supply
- This works on the Heating network to ensure the water moves around.
Down
- A customers secondary cylinder
- These are found on indirect networks
- Something the engineer leaves after the visit.
- Something you can increase to gain supply
9 Clues: Who fixes supply problems? • A customers secondary cylinder • These are found on indirect networks • Something you can increase to gain supply • Something the engineer leaves after the visit. • What do we run when a customer has a loss of supply. • The customer can control the temperature of the supply • These are carried out once every 2 years on customers HIU's • ...
UNIT 9 2023-04-26
Across
- you use it to add sugar to your drink
- social networks like Instagram are a part of … (you can get information there)
- you scan it to buy a product
Down
- if you want to lose weight you need a …
- when you look for information for your project
- a small thing that you can eat
- a very big test
- something that you can buy or sell
- a game on your phones is an …
9 Clues: a very big test • you scan it to buy a product • a game on your phones is an … • a small thing that you can eat • something that you can buy or sell • you use it to add sugar to your drink • if you want to lose weight you need a … • when you look for information for your project • social networks like Instagram are a part of … (you can get information there)
Metaverse Puzzle 2025-01-23
Across
- : A 3D image projected into space.
- : Short for Virtual Reality.
- : Fully engaging or deeply interactive experiences in virtual environments.
- : Currency used in Metaverse transactions.
Down
- : Technology used for decentralized networks in the Metaverse.
- : A virtual-reality space where users can interact with a computer-generated environment and other users.
- : Type of reality that enhances the physical world with digital elements.
- : A digital representation of a person in the Metaverse.
- : Non-Fungible Token for digital ownership.
9 Clues: : Short for Virtual Reality. • : A 3D image projected into space. • : Currency used in Metaverse transactions. • : Non-Fungible Token for digital ownership. • : A digital representation of a person in the Metaverse. • : Technology used for decentralized networks in the Metaverse. • : Type of reality that enhances the physical world with digital elements. • ...
Computer Network Puzzle 2022-03-28
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Network services 2019-11-11
Across
- The protocol used when you use the Remote Desktop Connections program to connect to a computer.
- A Transport Layer Security (TLS) extension that allows the application layer to negotiate which protocol should be performed over a secure connection in a manner that avoids additional round trips and which is independent of the application-layer protocols.
- The largest container object within Active Directory.
- Any and all connections between computing devices.
- A network management protocol used on UDP/IP networks whereby a ____ server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.
- A piece of computer hardware or software that accesses a service made available by a server.
Down
- interface In the industrial design field of human–computer interaction, is the space where interactions between humans and machines occur.
- A set of technologies that enable the delivery of voice communications over the Internet.
- A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
- A hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
- A computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
- A functional building block within a network infrastructure, which has well-defined external interfaces and a well-defined functional behavior.
- A set of rules that dictate how information should be transferred and handled by entities communicating with one another.
- Allows a user to connect to a corporate network using the Internet.
14 Clues: Any and all connections between computing devices. • The largest container object within Active Directory. • Allows a user to connect to a corporate network using the Internet. • A set of technologies that enable the delivery of voice communications over the Internet. • ...
computer network 2022-05-10
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Nathans crossword 2022-05-06
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Networking 2025-01-24
Across
- Involves rehearsing what you will say and doing it over and over again for when the day comes.
- The percent of employers that use social networks to screen job candidates.
- Involves doing what you need to do to get ready.
- A network that usually includes your friends, family members, neighbors, parents of friends, and friends of friends.
- The percent of job vacancies that are filled by recommendations or referrals from people within one of your networks.
- Knowing what you are talking about, being humble with the knowledge you have, doing your research, and getting people to like you and help you.
- Isaac Serwanga said this is the currency of our generation.
Down
- Isaac Serwanga said that networking is not only a skillset, but is is also what?
- The idea that all people on average are six, or fewer, social connections away from each other.
- Involves having resume, certification, and other documents ready, being properly groomed and dressed, and being able to answer and ask questions.
- A network made up of people that you may not see or interact with on a regular basis, but these are people that are still beneficial to your future career and success as an individual.
- The percent of employers that did not offer a candidate a job based on a the candidate’s content on their social media.
- Has to do with being persistent, not giving up, and dealing with and getting pass the word "no."
- Has to do with what you want, who can help you get there, your dreams, goals, and aspirations for life and your future career.
- The process of interacting with others to exchange information and develop professional or social contacts.
15 Clues: Involves doing what you need to do to get ready. • Isaac Serwanga said this is the currency of our generation. • The percent of employers that use social networks to screen job candidates. • Isaac Serwanga said that networking is not only a skillset, but is is also what? • ...
Information technology 2020-12-07
6 Clues: old, no longer in use. • graphical representation of text. • piece of software used for calculations. • maximum productivity with minimum effort • something exposed the possibility of being attacked or exploited. • networking device that forwards data packets. between computer networks.
US Foreign Policy Crossword 2024-06-05
Across
- The act of gaining unauthorized access to computer systems or networks, often to steal information or cause damage.
- An economic system in which private individuals or businesses own capital goods and operate for profit, with minimal government interference in the market.
- The authority of a state to govern itself or another state; it involves full control over its own affairs without external interference.
- The reduction or elimination of a country's armed forces or weapons, often through international agreements, to promote peace and security.
Down
- The practice of managing international relations through negotiation, dialogue, and communication to resolve conflicts and promote cooperation.
- The process by which businesses, cultures, and governments become interconnected and interdependent across the world, leading to increased exchange of ideas, goods, and services.
- Software or hardware tools designed to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
- The rapid increase or spread of something, particularly weapons or nuclear materials, to multiple countries or groups.
- The monitoring of behavior, activities, or information for the purpose of gathering data, typically by governments or organizations to ensure security or gather intelligence.
- The holding of extreme political or religious views that are far outside the mainstream attitudes of society, often leading to radical actions or beliefs.
10 Clues: The act of gaining unauthorized access to computer systems or networks, often to steal information or cause damage. • The rapid increase or spread of something, particularly weapons or nuclear materials, to multiple countries or groups. • ...
Unit 5.4 to 5.7 2020-04-13
Across
- they set up more than one branch in a location
- development of ideas
- legal concerns a business has to consider
- simply to get started
- Existing transport networks for people and products
- expand and follow the market
- what has worked in the past
- simulations and procedures in a place
- time it takes between ordering new stock and receiving it
- example of financial crisis
Down
- the amount of stock delivered
- low risk, role based, bureaucratic
- building from many components and building something bigger
- available workers to innovate
- level at which stock has to be reordered
- manager will need to act promptly
- systematic steps by organization to limit the damage
- how much stock is used over a given time period
- the amount of stock that is ordered
19 Clues: development of ideas • simply to get started • what has worked in the past • example of financial crisis • expand and follow the market • the amount of stock delivered • available workers to innovate • manager will need to act promptly • low risk, role based, bureaucratic • the amount of stock that is ordered • simulations and procedures in a place • ...
September 2023 2023-10-13
Across
- Cunning; sly
- Strange; uncommon
- Large; powerful; impressive
- An advanced type of machine learning that uses multilayered neural networks to establish nested hierarchical models for data processing and analysis
- A longing or desire
- An Icelandic tradition in which books are given as Christmas presents and opened on December 24, after which the evening is spent reading the books
- The white of an egg
- Traditionally a striped cotton with alternate stripes crinkled in the weaving
- The act or instance of carrying
- (Greek & Roman Mythology) The food of the gods. Thought to confer immortality
- Any of several large Central and South American birds of the trogon family, having golden-green and scarlet plumage
Down
- Collect or form into a mass or group
- Distinct in kind; essentially different; dissimilar
- To praise highly
- Enigmatic; ambiguous
- Having a fluffy or woolly appearance
- Foamy; foamlike; frothy
- Happiness; well-being
- Opposing; antagonistic; contrary
19 Clues: Cunning; sly • To praise highly • Strange; uncommon • A longing or desire • The white of an egg • Enigmatic; ambiguous • Happiness; well-being • Foamy; foamlike; frothy • Large; powerful; impressive • The act or instance of carrying • Opposing; antagonistic; contrary • Collect or form into a mass or group • Having a fluffy or woolly appearance • ...
World of The Web 2016-02-20
Across
- Web______ are used to view web pages
- Web______ is composed of HTML tags and multimedia
- Text______ is used to edit text files
- Software programs or data on a computer
- Wide Area Networks
- No more than ___ copies may be made of a project.
- Graphics, pictures, and movies
- Professors last name
- Professors first name
Down
- Domain Name System
- Hooks up to a router. (provides the internet)
- Where you submit your homework at.
- Wire used for physical setup of a network.
- No more than ___% or 15 images are allowed copied of another's work.
- World Wide Web
- Do not launch denial of service attacks against other users is part of the ___ policy.
- Up to 10 % of the work, but no more than _____ seconds are allowed of a music video.
- Codes or tags that browsers use to create web pages
- Each computer is hooked up to the internet with an ____ address.
19 Clues: World Wide Web • Domain Name System • Wide Area Networks • Professors last name • Professors first name • Graphics, pictures, and movies • Where you submit your homework at. • Web______ are used to view web pages • Text______ is used to edit text files • Software programs or data on a computer • Wire used for physical setup of a network. • ...
Networking Crossword 2024-06-14
Across
- a fast yet expensive way to send data
- group of interconnected computers in a single location
- transmission capacity, measured by bitrate
- a program that follows hyperlinks
- wireless way to send data
- 8 bits
- a group of LANs spread throughout multiple locations
- most commonly used networking cable
- send info through LANs, connects LANs to make a WAN
- the internet was modeled after this project
Down
- is used by fiber optic cables to reflect light
- time it takes for a bit to get from sender to receiver
- who is in charge of the internet
- Even wireless networks rely on this
- a way to identify a computer/device on the internet
- Knows the physical address of every computer on a LAN
- a network card that plugs into your motherboard
- number of bits a system can transmit per second
- takes a signal and broadcast it to all attached computers
19 Clues: 8 bits • wireless way to send data • who is in charge of the internet • a program that follows hyperlinks • Even wireless networks rely on this • most commonly used networking cable • a fast yet expensive way to send data • transmission capacity, measured by bitrate • the internet was modeled after this project • is used by fiber optic cables to reflect light • ...
Crosswordpuzzels_BEL0032 2022-03-28
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Nathans crossword 2022-03-28
Across
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- group or system of interconnected people or things.
Down
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A company that provides customers with Internet access.
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Computer Network puzzle 2020-07-30
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Computer Network Puzzle 2020-07-30
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
ICT Crossword 2020-08-11
Across
- A company that provides customers with Internet access.
- A telecommunications network or computer network that extends over a large geographical distance/place.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- A device which controls access to separately stored files, as part of a multi-user system.
- A network is a series of computers connected together for the purpose of sharing information with other people.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
Down
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- A group of computers and associated devices that share a common communications line or wireless link to a server
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- group or system of interconnected people or things.
14 Clues: group or system of interconnected people or things. • A company that provides customers with Internet access. • A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • ...
Disruptive Technology 2025-08-09
Across
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
- cybersecurity approach that continuously monitors and analyzes endpoint activity to detect, investigate, and respond to threats.
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
- security enhancement that requires users to provide more than one form of identification to access an account or system
- a cloud computing model where products, services, and solutions are delivered to customers on demand over the internet, typically through a subscription or pay-per-use basis
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
Down
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- the process of identifying and assessing potential security weaknesses in systems, software, and networks
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- business-driven approach that combines multiple technologies like RPA, AI, ML, and more, to automate as many business and IT processes as possible
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- leverages quantum mechanics to perform computations, offering the potential to solve complex problems far beyond the capabilities of classical computers.
14 Clues: the process of identifying and assessing potential security weaknesses in systems, software, and networks • Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • ...
COMPUTER NETWORK 2020-07-29
5 Clues: MODULATOR DE MODULATOR • AN EXAMPLE OF UNGUIDED TRANSMISSION • INTERCONNECTION OF VARIOUS COMPUTERS • NETWORK DEVICE CONNECTING DIFFERENT NETWORKS • NETWORK CONNECTING COMPUTERS AT SHORT DISTANCE
tts gmpng 1000% 2024-05-08
5 Clues: perpustakaan digital • like di yt cerdas berkarakter • aplikasi perangkat lunak milis • Singkatan Hak Atas Kekayaan Intelektual • terhubung ke jaringan komputer besar dunia
Crossword 2017-01-12
Across
- a vast computer network linking smaller computer networks worldwide (usually preceded by the)that includes commercial, educational, governmental, and other networks, all of which use the same set of communications protocols.
- Also called ___ _______. Digital Technology. a software program that allows the user to find and read encoded documents in a form suitable for display, especially such a program for use on the World Wide Web.
- a system for sending messages from one individual to another via telecommunications links between computers or terminals using dedicated software
Down
- anything that is not hardware but is used with hardware, especially audiovisual materials, as film, tapes, records, etc.
- a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network
- a system of extensively interlinked hypertext documents: a branch of the Internet
- a protocol for specifying addresses on the Internet.
7 Clues: a protocol for specifying addresses on the Internet. • a system of extensively interlinked hypertext documents: a branch of the Internet • anything that is not hardware but is used with hardware, especially audiovisual materials, as film, tapes, records, etc. • ...
Other words 4 2023-03-30
Across
- The health care system in the US has been criticized by many people and private __________________ accounts for about 35% of health care there
- People in Africa have been dealing with the issue of starvation because their food supplies are __________________ to meet the needs of the hungry.
- Most of the citizens think that it was an attempt to __________________ attention away from the real problems in the country.
- The most common symptoms of coronavirus disease are fever, tiredness and dry cough and the people who __________________ the warnings of authorities can lead
Down
- The management did not want to take responsibility and paid __________________ attention to working conditions.
- People need to be __________________ in their behavior, actions, and what they mean and do. Otherwise, they may fail to build strong relationships with the others.
- The most successful salespeople have infinite __________________. The win more and more often because they never stop looking for ways to improve.
- Rail networks are primarily built for the purpose of industrial growth. The __________________ of these networks led to vast industrial growth and trading between the parts of a country became easier than before.
- Compared to other cities in Turkey, the population __________________ in Istanbul is really high.
9 Clues: Compared to other cities in Turkey, the population __________________ in Istanbul is really high. • The management did not want to take responsibility and paid __________________ attention to working conditions. • Most of the citizens think that it was an attempt to __________________ attention away from the real problems in the country. • ...
Communication Technology 2020-03-16
Across
- any device connected to a network
- faster that dsl
- Network also called as hierarchical
- allows exchange of information and resources
- permissions are granted only to members of the organizations for which it was created
- all computers are connected to a common channel
- also known as low bandwidth
- covers a wide geographical the size of a city
- a network that serves within a household
- types of signal
Down
- to peer easy and inexpensive to setup
- open access for many organizations
- detection System analyzes all incoming and outgoing network traffic
- widely used to connect individual computers that are located close to one another
- used for high capacity transmission
- private connections that connects organizations
- can be used to link watering system, outdoor light and alarm systems
- types of signal
- protect against external threats
- covers a wide geographical area such as a country
20 Clues: faster that dsl • types of signal • types of signal • also known as low bandwidth • protect against external threats • any device connected to a network • open access for many organizations • used for high capacity transmission • Network also called as hierarchical • a network that serves within a household • to peer easy and inexpensive to setup • ...
Daily Bulldog - Phish and Whistle 2023-07-22
Across
- Whistles when the water is ready
- Malicious software
- Large or small mouth, fishermen are all about this fish?
- What used to run on the Whistlestop Trail
- Porcupine's favorite place to hike?
- Provides high speed internet
- Laugh Out Loud
- Alliance leading the rebuilding of trestle bridge of Sandy River
- scam where attackers deceive people into revealing sensitive information
- Coach of the The Franklin County 13U All-Star team
Down
- Lead singer of Phish
- Actress who asked, "You know how to whistle, don't you Steve?"
- person who informs about illegal activity
- Jennifer Anavi Davies set the world record for this type of whistling in 2010(25 hr,30 min, 5 sec)
- type of crime committed with computers and networks
- Cheap type of whistle?
- Singer-songwriter who wrote "Fish and Whistle"
- Colorful type of cold water game fish
- Canned spiced meat or sometimes it clogs up your inbox
19 Clues: Laugh Out Loud • Malicious software • Lead singer of Phish • Cheap type of whistle? • Provides high speed internet • Whistles when the water is ready • Porcupine's favorite place to hike? • Colorful type of cold water game fish • person who informs about illegal activity • What used to run on the Whistlestop Trail • Singer-songwriter who wrote "Fish and Whistle" • ...
Application Software 2025-03-03
Across
- Allows users to organize data in rows and columns
- Controls access to the hardware, software, and other resources on a network
- A digital representation of non-text information
- Web site offers an interactive and engaging environment
- A large, expensive, powerful computer
- Contains content that describes a cause, opinion, or idea
- A worldwide collection of networks
- A collection of computers connected together
Down
- A real-time typed conversation that takes place on a computer
- Code of acceptable behaviors users on internet
- A program that extends the capability of a browser
- The fastest, most powerful computer
- Copyrighted software provided at no cost
- Conveys meaning and is useful to people
- Copyrighted software that is distributed at no cost for a trial period
- A collection of unprocessed items
16 Clues: A collection of unprocessed items • A worldwide collection of networks • The fastest, most powerful computer • A large, expensive, powerful computer • Conveys meaning and is useful to people • Copyrighted software provided at no cost • A collection of computers connected together • Code of acceptable behaviors users on internet • ...
BIS3588 2018-11-14
Across
- the standard data manipulation language for relational database management systems.
- independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
- a string of bits, usually eight, used to store one number or character in a computer system.
- type of eavesdropping program that monitors information traveling over a network.
- composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
- the process of translating the system specifications prepared during the design stage into program code.
- Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
- the process of changing from the old system to the new system.
- a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
- a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
Down
- Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
- device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
- Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
- phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
- form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
- _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
- the coding and scrambling of messages to prevent their being read or accessed without authorization.
- technology that aids in gathering information about a person or organization without their knowledge.
- collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
19 Clues: the process of changing from the old system to the new system. • type of eavesdropping program that monitors information traveling over a network. • the standard data manipulation language for relational database management systems. • a string of bits, usually eight, used to store one number or character in a computer system. • ...
Alpha Wireless Christmas Crossword 2025-12-01
Across
- The country famous for Santa’s workshop (hint: Lapland!).
- What antennas transmit and receive.
- The shape of many antenna towers — tall and made of this metal.
- A festive tree, often decorated with lights and tinsel.
- The season of snow and sparkle.
- The wireless technology standard after 4G.
Down
- The jolly man in red.
- The red-nosed reindeer who leads Santa’s sleigh.
- A type of Alpha Wireless product — small cell or ______ antenna.
- The wireless frequency range used for mobile networks.
- Frozen water that falls from the sky.
- What engineers aim for — strong ______ signal.
- What you might wear on your head to keep warm.
- A warm drink made with milk and chocolate.
- A Christmas song, or something antennas can carry.
- Santa’s helpers at the North Pole.
16 Clues: The jolly man in red. • The season of snow and sparkle. • Santa’s helpers at the North Pole. • What antennas transmit and receive. • Frozen water that falls from the sky. • A warm drink made with milk and chocolate. • The wireless technology standard after 4G. • What engineers aim for — strong ______ signal. • What you might wear on your head to keep warm. • ...
0 2024-05-31
5 Clues: person who prepares meals • Worldwide web of networks • place of learning within a school • Electronic device for processing data • Screen for displaying computer output
Wireshark Telnet 2025-03-25
Across
- This operating system is often used for ethical hacking
- Prompt message shown when Telnet connection begins
- Captured in Wireshark to analyze data sent across the network
- Protocol that sends data in cleartext
- Network simulation tool used in the lab
- Wireshark displays this type of text for Telnet passwords
- Each letter typed in Telnet is echoed this way
- Device that replies to Telnet requests and prompts for login
Down
- A method used in physical networks to monitor traffic
- Each keypress in Telnet sends one of these
- IP command often shown during device setup
- Linux command used to check IP address
- Used to simulate a network environment in software
- Wireshark feature that reconstructs the session conversation
- This color in Wireshark’s TCP stream represents user input
- More secure alternative to Telnet
16 Clues: More secure alternative to Telnet • Protocol that sends data in cleartext • Linux command used to check IP address • Network simulation tool used in the lab • Each keypress in Telnet sends one of these • IP command often shown during device setup • Each letter typed in Telnet is echoed this way • Prompt message shown when Telnet connection begins • ...
geo 2024-09-23
Across
- The ease of reaching services and amenities
- Systems that provide transportation options for the public
- The physical structures needed for a society to function
Down
- The social networks and support systems in an area
- The presence of plants and open spaces in urban areas
- The ability to maintain ecological balance
- The economic feasibility of living in an area
- The condition of being protected from harm
8 Clues: The ability to maintain ecological balance • The condition of being protected from harm • The ease of reaching services and amenities • The economic feasibility of living in an area • The social networks and support systems in an area • The presence of plants and open spaces in urban areas • The physical structures needed for a society to function • ...
The Tech Terminology 2024-05-30
Across
- Topology where each node is connected to every other node
- Accessing a bank's website using a browser
- Modern networks that use twisted pair cable with 8 wires
Down
- A wireless technology used for short range connection
- Unified Payments Interface
- e-shopping, e-banking, e-learning, etc. are done using which mode
- Network created for an individual person
- Each computer in a network is called a
8 Clues: Unified Payments Interface • Each computer in a network is called a • Network created for an individual person • Accessing a bank's website using a browser • A wireless technology used for short range connection • Modern networks that use twisted pair cable with 8 wires • Topology where each node is connected to every other node • ...
computer shortcuts 2024-10-22
Across
- software program that allows read and find documents
- system for sending and receiving one or more messages
- a set of keys used to operate the computer or tablet
- a portable computer that closes over the keyboard
- a portable computer that lacks a cover
Down
- a vast computer network linking smaller linking world wide networks using the same protocols
- electronic device for storing data
- initial page of the website
8 Clues: initial page of the website • electronic device for storing data • a portable computer that lacks a cover • a portable computer that closes over the keyboard • software program that allows read and find documents • a set of keys used to operate the computer or tablet • system for sending and receiving one or more messages • ...
CSP Principle Terms 2023-04-26
Across
- JPG images use a _____ _____ technique. It removes all the subtle color variations that the human eye can not pick up. Once removed, they can never be brought back
- where lists start at
- A binary digit, either 0 or 1
- A sequence of 8 bits.
- When a system can support failures and still continue to function, it is called _____ _______
- issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model
- is the process of finding a path from sender to receiver. Routing on the Internet is usually dynamic; it is not specified in advance
- The ability of a system to adjust in scale to meet new demands.
Down
- a wireless access point that gives unauthorized access to secure networks
- Material created on a computer is the ______ _______ of the creator or an organization
- In the software development process, the ______ outlines how to accomplish a program's specifications. It may include brainstorming, storyboarding, flowchart and creating other planning diagrams, developing a testing strategy, etc
- The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
- Values that change smoothly, rather than in discrete intervals, over time. For example, the pitch and volume of a live concert.
- A small network often in one building. The most common type was ____ which used MAC addresses to send data between computers on the network. Wifi networks also use MAC addresses.
- The sequential execution of steps in an algorithm or code in a program (like steps in a recipe).
- A technique that helps an algorithm find a good solution in a hard problem (like always walking toward the north star when you are stuck in a forest)
- Data about data, like descriptive information about a file or a row in a database.
- is the inclusion of extra components that can be used to mitigate failure of a system if other components fail
- Error that results when the number of bits is not enough to represent the number with full precision (like using 3 digits to represent πpi as 3.14).
19 Clues: where lists start at • A sequence of 8 bits. • A binary digit, either 0 or 1 • The ability of a system to adjust in scale to meet new demands. • a wireless access point that gives unauthorized access to secure networks • Data about data, like descriptive information about a file or a row in a database. • ...
U03 - CSE-CH01 - Keywords 2024-02-01
Across
- (3,4) is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- (13,8) The CVE National Database was developed to provide a publicly available database of all know vulnerabilities. The Common Vulnerabilities and Exposures (CVE) database is an example.
- (8,2,6) is the collection of technologies that enable the connection of various devices to the Internet abbreviated (IoT).
- (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Down
- (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- (11,8,10,9) The standards provide a framework for implementing cybersecurity measures within an organization. The ISO 27000 standards are an example.
- (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
9 Clues: (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards. • (3,4) is the result of data sets that are large and complex, making traditional data processing applications inadequate. • ...
COMPUTER SCIENCE TERMINOLOGY 2025-01-03
Across
- Software designed to harm or exploit any device, service, or network, often by causing damage, stealing information, or gaining unauthorized access.
- A device that forwards data packets between computer networks, directing them to their destination by using routing tables.
- A type of malware that attaches itself to legitimate software or files and spreads to other systems, often causing harm or disruption.
- The process of verifying the identity of a user, device, or system before granting access to resources or services.
- A computer or system that provides services, data, or resources to other computers (clients) over a network.
Down
- The process of converting data into a code or cipher to prevent unauthorized access, ensuring confidentiality during storage or transmissionIP Address A unique numerical label assigned to each device connected to a computer network, used for identification and location addressing.
- A global network of interconnected computer systems that communicate via standardized protocols, enabling access to information, communication, and services.
- A security system that monitors and controls incoming and outgoing network traffic, based on predetermined security rules to protect a network from unauthorized access.
- A family of network technologies used for local area networks (LANs), typically using cables to transmit data between devices.
9 Clues: A computer or system that provides services, data, or resources to other computers (clients) over a network. • The process of verifying the identity of a user, device, or system before granting access to resources or services. • A device that forwards data packets between computer networks, directing them to their destination by using routing tables. • ...
Chapter 20: The Societies of Oceania 2019-11-11
Across
- nui Hawaiin class of high chiefs
- Polynesian temple structure
- people inhabiting the larger Pacific islands
Down
- peoples inhabitants of Australia that ventured across the continent and created networks of trade and exchange between hunting and gathering societies
- indigenous people of New Zealand
- Hawaiin concept of something being taboo
- Madol an area on Pohnpei in the Caroline Islands
7 Clues: Polynesian temple structure • nui Hawaiin class of high chiefs • indigenous people of New Zealand • Hawaiin concept of something being taboo • people inhabiting the larger Pacific islands • Madol an area on Pohnpei in the Caroline Islands • ...
CLASS TEST - 2 2023-11-01
Across
- last checked is not used to scan viruses.
- horse is a computer virus used to harm computer programs.
- monitors computer activities of other devices.
- finds a backdoor for access into other networks.
Down
- messages steal user's personal details, passwords, etc.
- does not harm computers with viruses.
- is designed to gain unauthorized access to a computer.
7 Clues: does not harm computers with viruses. • last checked is not used to scan viruses. • monitors computer activities of other devices. • finds a backdoor for access into other networks. • is designed to gain unauthorized access to a computer. • messages steal user's personal details, passwords, etc. • horse is a computer virus used to harm computer programs.
It 2025-09-02
5 Clues: point in a network (NODES) • storage and services (CLOUD) • that provides resources (SERVE) • vulnerabilities in networks (SCANS) • structure of equal-length elements (ARRAY)
BIS3588 2018-11-14
Across
- a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
- Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
- the coding and scrambling of messages to prevent their being read or accessed without authorization.
- collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
- independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
- technology that aids in gathering information about a person or organization without their knowledge.
- phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
- type of eavesdropping program that monitors information traveling over a network.
- device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
Down
- a string of bits, usually eight, used to store one number or character in a computer system.
- Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
- the process of translating the system specifications prepared during the design stage into program code.
- the process of changing from the old system to the new system.
- Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
- a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
- _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
- form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
- composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
- the standard data manipulation language for relational database management systems.
19 Clues: the process of changing from the old system to the new system. • type of eavesdropping program that monitors information traveling over a network. • the standard data manipulation language for relational database management systems. • a string of bits, usually eight, used to store one number or character in a computer system. • ...
Computer Systems & Networks by Alex :) 2018-03-22
Across
- A person who tries to illegally access/attack a computer network or device
- What is the name of a small range of WiFi Frequencies (Hint: BBC1 is a...)
- Non-volatile memory that stores start up instructions and the BIOS
- Data storage inside the CPU that's much faster than RAM that stores frequently used data
- A specialized circuit for video and image processing
Down
- High speed, volatile memory that stores information on programs, files and data while in use
- Name the network attack which uses software to crack a password through trial and error (2 words in one)
- For helpful revision, layers can be organized into a delicious rainbow...
- A part of the CPU that processes data independently of the rest
- Fetches, decodes and executes the instructions issued by programs
10 Clues: A specialized circuit for video and image processing • A part of the CPU that processes data independently of the rest • Fetches, decodes and executes the instructions issued by programs • Non-volatile memory that stores start up instructions and the BIOS • For helpful revision, layers can be organized into a delicious rainbow... • ...
DC ANALYSIS OF ELECTRICAL NETWORKS 2021-04-04
Across
- Norton resistance is found by shorting all voltage sources and _________ all current sources
- If there are 8 nodes in network, we can get ____ number of equations in the nodal analysis.
- Nodal analysis is generally used to determine ______.
- The Thevenin voltage is a __________ circuit voltage.
- Superposition theorem does not work for ________.
- In superposition theorem, when we consider the effect of one current source, all the other voltage sources are ____________.
Down
- Norton’s theorem is true for __________ networks.
- Which theorem is also known as the dual of Thevenin’s theorem?
- In Norton’s theorem Isc is a _______ current source.
- Vth is found across the ____________ terminals of the network.
10 Clues: Norton’s theorem is true for __________ networks. • Superposition theorem does not work for ________. • In Norton’s theorem Isc is a _______ current source. • Nodal analysis is generally used to determine ______. • The Thevenin voltage is a __________ circuit voltage. • Which theorem is also known as the dual of Thevenin’s theorem? • ...
Transport layer for mobile networks 2025-05-22
Across
- – Reliable data delivery protocol
- – Variation in packet arrival times
- – Initial connection setup process
- – Lightweight, connectionless protocol
- Control – Prevents sender from overwhelming receiver
Down
- Loss – Data that didn’t make it
- – Actual data rate achieved
- Number – Identifies specific apps or services
- Control – Manages network traffic load
- – Time delay in data transfer
10 Clues: – Actual data rate achieved • – Time delay in data transfer • Loss – Data that didn’t make it • – Reliable data delivery protocol • – Initial connection setup process • – Variation in packet arrival times • Control – Manages network traffic load • – Lightweight, connectionless protocol • Number – Identifies specific apps or services • ...
Transport Layer for Mobile Networks 2025-05-22
Across
- – What is the term for the initial process where a connection is established between devices before data is transferred?
- – What lightweight transport protocol is faster but does not guarantee delivery, making it suitable for real-time applications?
- – What protocol in the transport layer ensures reliable, ordered, and error-checked delivery of data?
- – What mechanism is used in the transport layer to prevent network overload by adjusting data transmission rates?
- – What occurs when data packets fail to reach their destination, affecting network performance?
- – What is the identifier used by the transport layer to direct data to specific applications on a device?
Down
- – What mechanism controls the rate of data transmission between sender and receiver to prevent overwhelming the receiver?
- – What transport layer function allows multiple applications to use the network simultaneously over the same connection?
- – What term describes the delay before a data transfer begins following an instruction for its transfer?
- (Quality of Service) – What is the term for managing network resources to ensure consistent performance, especially for real-time data?
10 Clues: – What occurs when data packets fail to reach their destination, affecting network performance? • – What protocol in the transport layer ensures reliable, ordered, and error-checked delivery of data? • – What term describes the delay before a data transfer begins following an instruction for its transfer? • ...
Home networks and Wi-Fi 2025-06-30
10 Clues: P2P network type • PON network modem • Main router's name • Brand of router we use • We ask these kinds of questions • Something that effects the WiFi • Name of our second line support team • 2.4Ghz and 5Ghz are examples of what? • We can only guarantee speeds from here • Diagnostics site that runs off Salesforce
BIS3588 In-class Activity 2018-11-14
Across
- Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
- composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
- phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
- collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
- the coding and scrambling of messages to prevent their being read or accessed without authorization.
- a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
- type of eavesdropping program that monitors information traveling over a network.
- a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
- the standard data manipulation language for relational database management systems.
- Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
Down
- _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
- a string of bits, usually eight, used to store one number or character in a computer system.
- form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
- the process of changing from the old system to the new system.
- the process of translating the system specifications prepared during the design stage into program code.
- technology that aids in gathering information about a person or organization without their knowledge.
- Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
- independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
- device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
19 Clues: the process of changing from the old system to the new system. • type of eavesdropping program that monitors information traveling over a network. • the standard data manipulation language for relational database management systems. • a string of bits, usually eight, used to store one number or character in a computer system. • ...
Networking Puzzle 2020-07-30
Across
- A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength.
- a set of rules or procedures for transmitting data between electronic devices, such as computers.
- A device which controls access to separately stored files, as part of a multi-user system.
- A computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.
Down
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.
- a system that makes it possible for many messages or large amounts of information to be sent at the same time and very quickly.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
- Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
9 Clues: A device which controls access to separately stored files, as part of a multi-user system. • a set of rules or procedures for transmitting data between electronic devices, such as computers. • A thin flexible fibre with a glass core through which light signals can be sent with very little loss of strength. • ...
Technology Vocab 2014-11-09
Across
- the state of being connected to the internet
- highspeed internet access that is always connected
- moving a file from your computer to the internet
- world wide connection of networks
Down
- moving a file from the internet to your computer
- short for internet etiquette; the code of acceptable behaviors you should follow while on the internet
- short for Hyper Text Markup Language
- short for internet service provider
8 Clues: world wide connection of networks • short for internet service provider • short for Hyper Text Markup Language • the state of being connected to the internet • moving a file from the internet to your computer • moving a file from your computer to the internet • highspeed internet access that is always connected • ...
Modern life 2019-12-31
Across
- Tell others your news, photos via the Internet
- top search engine
- transferring files from the Internet to your computer or phone
- on a computer system - a set of information provided about the user
Down
- a secret word or a specific sequence of characters intended to confirm the identity
- worldwide system of connected computer networks
- The program is required to go online
- destroy files from your computer or phone.
8 Clues: top search engine • The program is required to go online • destroy files from your computer or phone. • Tell others your news, photos via the Internet • worldwide system of connected computer networks • transferring files from the Internet to your computer or phone • on a computer system - a set of information provided about the user • ...
Mesh Networking 2020-06-02
Across
- A device that transmits and/or receives wireless signal
- Device that broadcasts the internet signal
- type of node that makes wireless signal available further
- setting option to control kids activity
Down
- an account that visitors can use
- Device that ISP use to connect a home to the web
- feature of mesh networks with apple offer extra security
- type of network that includes main router and series of nodes
8 Clues: an account that visitors can use • setting option to control kids activity • Device that broadcasts the internet signal • Device that ISP use to connect a home to the web • A device that transmits and/or receives wireless signal • feature of mesh networks with apple offer extra security • type of node that makes wireless signal available further • ...
TECHNOLOGY VOCABULARY 2021-07-06
Across
- the symbolic arrangement of data in a computer program
- a set of related records kept together
- a computer providing shared resources to a computer network
- a worldwide network of computer networks
Down
- a security system preventing access to a computer or network
- RAM memory that is set aside as a specialized buffer storage
- a set of characters comprising a unit of information
- any small compartment
8 Clues: any small compartment • a set of related records kept together • a worldwide network of computer networks • a set of characters comprising a unit of information • the symbolic arrangement of data in a computer program • a computer providing shared resources to a computer network • a security system preventing access to a computer or network • ...
Unit 5 Crossword 2022-12-13
Across
- The production of cotton cloth inside of people's homes
- Apartment building of the industrial era
- repositories of fuel for steamships located along trade networks
Down
- The industrial working class
- large, family-based business organizations in Japan during the Meiji era
- The industrial middle class
- Reforms adopted by the Ottoman Empire after the death of Mahmud II
- Land grant given by the Sultan in the Ottoman Empire
8 Clues: The industrial middle class • The industrial working class • Apartment building of the industrial era • Land grant given by the Sultan in the Ottoman Empire • The production of cotton cloth inside of people's homes • repositories of fuel for steamships located along trade networks • Reforms adopted by the Ottoman Empire after the death of Mahmud II • ...
School Safety 2022-11-28
Across
- a reason for doing something
- national threat assessment center
- a statement with intention to inflict, pain, injury, or other hostile action on someone or something
Down
- protecting school networks from hackers
- document that outlines how a school will prepare, respond and recover
- a network security device
- a person who carries out a harmful, illegal or immoral act
- violence directed at a student, group, or location
8 Clues: a network security device • a reason for doing something • national threat assessment center • protecting school networks from hackers • violence directed at a student, group, or location • a person who carries out a harmful, illegal or immoral act • document that outlines how a school will prepare, respond and recover • ...
cyber safety 2017-04-25
6 Clues: a word used for electronics • worldwide of computer networks • a message sent from electronics • when a person writes something online • an application that lets you in a game or internet • a application on the web that locates,retrieves, and displays information
CM-BCMS 2025-04-04
Across
- Harmful software that infiltrates and disrupts systems
- A sudden event causing disruption or harm to operations
- Fraudulent phone calls designed to extract sensitive details
- Analyzing potential risks to prepare for future challenges
- A critical situation requiring urgent decision-making
- Framework ensuring operations continue despite challenges.
- Potential actions that compromise digital safety
- A technique used to take advantage of system vulnerabilities
- Interconnected systems for sharing resources and information
- A state of readiness to effectively manage crises
- The process of converting information into secure code
Down
- Verifying a user’s identity to ensure security
- The capacity to adjust quickly to changing situations
- Steps taken to reduce the impact of potential risks
- Restoring critical business operations after a crisis
- The ability to adapt and recover during disruptions
- A security barrier protecting networks from external threats
17 Clues: Verifying a user’s identity to ensure security • Potential actions that compromise digital safety • A state of readiness to effectively manage crises • Steps taken to reduce the impact of potential risks • The ability to adapt and recover during disruptions • The capacity to adjust quickly to changing situations • ...
Crossword Time 2020-09-05
Across
- which number uniquely identifies each computer in an network.
- which domain represents government websites.
- which dbms object is the easy way to enter,edit and view tables.
- a networking device used to connect dissimilar networks.
Down
- common rules and instructions that each computer follows on internet.
- which topology is cost effective.
- individual page in a website.
7 Clues: individual page in a website. • which topology is cost effective. • which domain represents government websites. • a networking device used to connect dissimilar networks. • which number uniquely identifies each computer in an network. • which dbms object is the easy way to enter,edit and view tables. • ...
90s cartoons 2021-09-28
Across
- Every once fav mouse and cat, the biggest enemies and the bestest friends.
- Cartoon networks __ 10.
- Fastest construction team you’ll ever find.
- Your best octopus friend who can sing for in every occasion.
Down
- Your fav. play boy.
- Three super sisters which who was made by mistake.
- A genius scientist kid who always troubled by his sister.
7 Clues: Your fav. play boy. • Cartoon networks __ 10. • Fastest construction team you’ll ever find. • Three super sisters which who was made by mistake. • A genius scientist kid who always troubled by his sister. • Your best octopus friend who can sing for in every occasion. • Every once fav mouse and cat, the biggest enemies and the bestest friends.
Historical Empires 2024-12-19
Across
- Empire in South America with its capital at Cusco
- Empire that spanned from Europe to Asia for over 600 years
- Empire that ruled Mesoamerica before the Spanish conquest
Down
- Empire known for the ruins of Persepolis
- Eastern Roman Empire centered around Constantinople
- Ancient empire known for its road networks and law
- Empire founded by Genghis Khan
7 Clues: Empire founded by Genghis Khan • Empire known for the ruins of Persepolis • Empire in South America with its capital at Cusco • Ancient empire known for its road networks and law • Eastern Roman Empire centered around Constantinople • Empire that ruled Mesoamerica before the Spanish conquest • Empire that spanned from Europe to Asia for over 600 years
CYBERSECURITY 2025-04-06
Across
- a type of social engineering to steal user data
- protection of systems, networks, and programs from digital attacks
- an intrusive software developed by cybercriminals
Down
- weak places in the security system
- an unauthorized person who tries to gain access
- a computer data storage on servers in off-site locations is called … storage
- the use of numbers
7 Clues: the use of numbers • weak places in the security system • a type of social engineering to steal user data • an unauthorized person who tries to gain access • an intrusive software developed by cybercriminals • protection of systems, networks, and programs from digital attacks • a computer data storage on servers in off-site locations is called … storage
Computer Communication 2025-10-10
Across
- is data sent over by light power.
- a set of rules that provides devices to communicate
Down
- a person sending a fake email to get your data.
- a collection of webpages together.
- a network of networks.
- something that is sent with a packet to tell where it should be delivered
- 2 or more connected devices communicating.
7 Clues: a network of networks. • is data sent over by light power. • a collection of webpages together. • 2 or more connected devices communicating. • a person sending a fake email to get your data. • a set of rules that provides devices to communicate • something that is sent with a packet to tell where it should be delivered
COMPUTER FUNDAMENTALS(COMPLEX) 2023-01-25
Across
- it perform internet protocol blocking to protect networks from unauthorized access.
- verification of a login name and password is known as
- the resolution of a pronter is measured in
Down
- father of personal computer.
- networking technique of delivering the same packet simultaneously to a group of clients.
- common name for the crime of stealing passwords.
- command used to restore the deleted files.
- father of punched cards processing.
8 Clues: father of personal computer. • father of punched cards processing. • command used to restore the deleted files. • the resolution of a pronter is measured in • common name for the crime of stealing passwords. • verification of a login name and password is known as • it perform internet protocol blocking to protect networks from unauthorized access. • ...
cyber security 2023-04-21
Across
- Data that identifies a specific individual
- It is evaluating computer networks and systems vulnerabilities in securities.
- It is information security and the psychological manipulation of people.
Down
- An action that has been done but is not intended by the person.
- the collection of information
- When you obtain something by using persuasion
- It is when you show responsibility for your actions.
- facts provided about something/someone
8 Clues: the collection of information • facts provided about something/someone • Data that identifies a specific individual • When you obtain something by using persuasion • It is when you show responsibility for your actions. • An action that has been done but is not intended by the person. • It is information security and the psychological manipulation of people. • ...
vocabulary 2021-07-06
Across
- a set of related records kept together
- a security system preventing access to a computer or network
- a computer providing shared resources to a computer network
- the symbolic arrangement of data in a computer program
- a set of characters comprising a unit of information
Down
- a worldwide network of computer networks
- any small compartment
- RAM memory that is set aside as a specialized buffer storage
8 Clues: any small compartment • a set of related records kept together • a worldwide network of computer networks • a set of characters comprising a unit of information • the symbolic arrangement of data in a computer program • a computer providing shared resources to a computer network • a security system preventing access to a computer or network • ...
inter- 2023-11-02
Across
- to stop, seize, or interrupt in progress or course or before arrival.
- networks that exist between each other.
- existing or carried on between states.
- a space of time between events or states.
Down
- existing, occurring, or carried on between two or more nations.
- to stop or hinder by breaking in.
- a point or line common to lines or surfaces that intersect.
- mutually joined or related.
8 Clues: mutually joined or related. • to stop or hinder by breaking in. • existing or carried on between states. • networks that exist between each other. • a space of time between events or states. • a point or line common to lines or surfaces that intersect. • existing, occurring, or carried on between two or more nations. • ...
KINGDOM FUNGI 2024-12-09
5 Clues: NETWORKS OF HYPHAE • HYPHAE WITH SEPTUMS • ABSORBS NUTRIENT FROM LIVING HOST • ROOT THAT HELP EXTRACT NUTRIENT FROM HOST • BREAKDOWN ORGANIC MATTER/ RECYCLING NUTRIENT INTO ECOSYSTEMS
TECHNOLOGY VOCABULARY 2021-07-06
Across
- the symbolic arrangement of data in a computer program
- a set of related records kept together
- a computer providing shared resources to a computer network
- a worldwide network of computer networks
Down
- a security system preventing access to a computer or network
- RAM memory that is set aside as a specialized buffer storage
- a set of characters comprising a unit of information
- any small compartment
8 Clues: any small compartment • a set of related records kept together • a worldwide network of computer networks • a set of characters comprising a unit of information • the symbolic arrangement of data in a computer program • a computer providing shared resources to a computer network • a security system preventing access to a computer or network • ...
Network Security Terminologies 2025-02-26
Across
- A principle ensuring data is accurate and unaltered.
- An attack that floods a network to disrupt service.
- A deceptive attack designed to steal sensitive information.
- A security method requiring more than just passwords.
Down
- A method to protect data by scrambling it.
- A tool that encrypts internet connections for privacy.
- A security approach that assumes no implicit trust.
- A security device that filters traffic between networks.
8 Clues: A method to protect data by scrambling it. • A security approach that assumes no implicit trust. • An attack that floods a network to disrupt service. • A principle ensuring data is accurate and unaltered. • A security method requiring more than just passwords. • A tool that encrypts internet connections for privacy. • ...
Servers- By Guillermo and Gerie 2019-03-19
Across
- browsers Software application used to request and display information
- Infrastructure The networks of hardware facilities owned by organisations used to transfer data
- Server Allows users to access shared and private storage
- A computer that shares its resources with connected devices
Down
- This device is used to extend the range of a network
- list a list of unacceptable URLs
- Software Prevents users from accessing inappropriate information
- A website address
- Computers that are connected to the server are called...
9 Clues: A website address • list a list of unacceptable URLs • This device is used to extend the range of a network • Computers that are connected to the server are called... • Server Allows users to access shared and private storage • A computer that shares its resources with connected devices • Software Prevents users from accessing inappropriate information • ...
Types of engineer 2021-10-21
Across
- they build devises, design computer networks and develop new technologies
- they develop and design chemical manufacturing processes
- they build buildings
- they develop solutions to environmental problems
- they design primarily aircraft, space craft, satellites, and missiles
Down
- they design,develop, test, and supervise the manufacture of electrical equipment
- they focus on advanced in technology and medicine to develop new devices and equipment for improving human health
- they design power-producing machines
- they create programs that make the digital world possible
9 Clues: they build buildings • they design power-producing machines • they develop solutions to environmental problems • they develop and design chemical manufacturing processes • they create programs that make the digital world possible • they design primarily aircraft, space craft, satellites, and missiles • ...
Crossword 2014-05-03
Across
- 2 USING 1 AND 0 AS BITS TO REPRESENTS DATA.
- USED TO ALLOW INTERNET ACCESS THROUGH A CABLE COMPANY.
- GROUP OF A LOCAL AREA.
- OR MORE COMPUTERS LINKED TO SHARED INFORMATION.
Down
- NODE WHERE A USER WOULD SIT AND ACCESS AND NETWORK.
- USED TO CONNECT HOSTS ON LAN.
- USED TO CONNECT TWO OR MORE NETWORKS.
- CODE OF A WIRELESS SYSTEM.
- TYPE OF LAN TECHNOLOGIES THAT USED A TOKEN.
9 Clues: GROUP OF A LOCAL AREA. • CODE OF A WIRELESS SYSTEM. • USED TO CONNECT HOSTS ON LAN. • USED TO CONNECT TWO OR MORE NETWORKS. • 2 USING 1 AND 0 AS BITS TO REPRESENTS DATA. • TYPE OF LAN TECHNOLOGIES THAT USED A TOKEN. • OR MORE COMPUTERS LINKED TO SHARED INFORMATION. • NODE WHERE A USER WOULD SIT AND ACCESS AND NETWORK. • ...
Weke 15 Vocabulary Quiz 2024-07-06
Across
- Protecting computers and networks from attacks or damage.
- Changing information into a secret code to keep it safe.
- Making something suitable for a particular place or culture.
- Discussing something to reach an agreement.
- A person who designs, builds, or fixes machines or structures.
- Abilities or expertise in doing something well.
- "_____ breach". When private information is accessed without permission.
Down
- "_____ Skills". The ability to examine things carefully and understand them.
- Keeping information private and not sharing it with others.
9 Clues: Discussing something to reach an agreement. • Abilities or expertise in doing something well. • Changing information into a secret code to keep it safe. • Protecting computers and networks from attacks or damage. • Keeping information private and not sharing it with others. • Making something suitable for a particular place or culture. • ...
DC ANALYSIS OF ELECTRICAL NETWORKS 2021-04-04
Across
- Norton resistance is found by shorting all voltage sources and _________ all current sources
- If there are 8 nodes in network, we can get ____ number of equations in the nodal analysis.
- Nodal analysis is generally used to determine ______.
- The Thevenin voltage is a __________ circuit voltage.
- Superposition theorem does not work for ________.
- In superposition theorem, when we consider the effect of one current source, all the other voltage sources are ____________.
Down
- Norton’s theorem is true for __________ networks.
- Which theorem is also known as the dual of Thevenin’s theorem?
- In Norton’s theorem Isc is a _______ current source.
- Vth is found across the ____________ terminals of the network.
10 Clues: Norton’s theorem is true for __________ networks. • Superposition theorem does not work for ________. • In Norton’s theorem Isc is a _______ current source. • Nodal analysis is generally used to determine ______. • The Thevenin voltage is a __________ circuit voltage. • Which theorem is also known as the dual of Thevenin’s theorem? • ...
social networks and new technologies 2018-10-08
Across
- A virtual presentation of a person on a social network.
- A founder who creates a big social network, his symbol is a bird.
- A social network where we can post pictures.
- phone A revolution in new technologies which is appeared in 1990's
- An innegale action which consists to pirate a website,...
- A social network which watchs videos.
Down
- A game which plays on PC, mobile phone pad or TV.
- A brend which sends mobile phone and tablet.
- An action which consists to love a webpage or a content.
- An american multinational company which designs tablets, computers and mobile phones.
10 Clues: A social network which watchs videos. • A social network where we can post pictures. • A brend which sends mobile phone and tablet. • A game which plays on PC, mobile phone pad or TV. • A virtual presentation of a person on a social network. • An action which consists to love a webpage or a content. • An innegale action which consists to pirate a website,... • ...
Transport layer for mobile networks 2025-05-22
Across
- – Reliable data delivery protocol
- – Variation in packet arrival times
- – Initial connection setup process
- – Lightweight, connectionless protocol
- Control – Prevents sender from overwhelming receiver
Down
- Loss – Data that didn’t make it
- – Actual data rate achieved
- Number – Identifies specific apps or services
- Control – Manages network traffic load
- – Time delay in data transfer
10 Clues: – Actual data rate achieved • – Time delay in data transfer • Loss – Data that didn’t make it • – Reliable data delivery protocol • – Initial connection setup process • – Variation in packet arrival times • Control – Manages network traffic load • – Lightweight, connectionless protocol • Number – Identifies specific apps or services • ...
Networked Entertainment in Computer Networks 2025-05-21
Across
- A global system that delivers web content to users from nearby servers
- The amount of data that can be transmitted over a network in a given time
- A device that connects different networks and directs traffic
- Delay in data transfer that affects real-time gaming
- A company that provides internet access to customers
Down
- A type of entertainment where players interact in a shared virtual world
- A service that lets users watch videos over the internet
- A system that stores and manages data remotely for services like Netflix and Spotify
- Temporary pause in online video caused by slow internet
- High-speed internet connection for homes and businesses
10 Clues: Delay in data transfer that affects real-time gaming • A company that provides internet access to customers • Temporary pause in online video caused by slow internet • High-speed internet connection for homes and businesses • A service that lets users watch videos over the internet • A device that connects different networks and directs traffic • ...
Grade 12 CAT 2021-03-07
Across
- A computer user who runs an office from home
- A computer intended for individual use that is faster and more capable than a personal computer
- A fast, powerful computer that performs huge tasks
- that enables interactive media experiences
- A manufacturer of a CPU
- Used in computer networks for centralized file storage
- Processed data
- Short for "picture element"
Down
- A free Adobe web-browser
- Acronym for hardware that allows a computer to connect to a network
- A software licensing agreement
- The collective term for all computer 'threats'
- Good manners when using the Internet
- A term to describe how multiple technologies are combined into a single device
- specialized websites that allow users to share information
- A video blog
- Acronym for the procedures to send large files on the Internet
17 Clues: A video blog • Processed data • A manufacturer of a CPU • A free Adobe web-browser • Short for "picture element" • A software licensing agreement • Good manners when using the Internet • that enables interactive media experiences • A computer user who runs an office from home • The collective term for all computer 'threats' • A fast, powerful computer that performs huge tasks • ...
Websites 2019-04-06
Across
- picture; piece of film; or display used to illustrate or accompany something
- graphical user interface (GUI) for displaying html files; used to navigate the world wide web
- current
- group of two or more computer systems linked together
- single computer in a network reserved for serving the needs of the network e.g. dedicated server managing printing
- computer game designed for several players playing together
- supplying a public need such as transport; communications; or utilities such as electricity and water
- first; main; key; significant
- device used to connect two different networks to the internet
Down
- symbols; signs
- proceed with something without difficulty
- safety
- set of related webpages located under a single domain (area) name
- visuals; illustrations; picture; graphs; charts; Emojis
- popular
- first; main; key; major
- hypertext document connected to the world wide web
17 Clues: safety • current • popular • symbols; signs • first; main; key; major • first; main; key; significant • proceed with something without difficulty • hypertext document connected to the world wide web • group of two or more computer systems linked together • visuals; illustrations; picture; graphs; charts; Emojis • computer game designed for several players playing together • ...
Fake News 2022-03-07
Across
- social media that fights against disinformation
- What is the most used synonym for fake news?
Down
- Fake news in 18th century, Paris
- law that punishes social networks for not deleting fake news
- how many times faster than real news are fake news spreading?
- the main reason for posting fake news
- donated 25 million $ to anti-disinformation team
7 Clues: Fake news in 18th century, Paris • the main reason for posting fake news • What is the most used synonym for fake news? • social media that fights against disinformation • donated 25 million $ to anti-disinformation team • law that punishes social networks for not deleting fake news • how many times faster than real news are fake news spreading?
Vaashini- 8 Lyra 2023-01-19
Across
- A web browser used by apple users.
- people who use technology to commit malicious activities on digital systems or networks.
- A social media bought by Elon Musk.
- Most famous social media in the world
Down
- Hackers deceive people into revealing sensitive information or installing malware.
- Information and communications technology.
- Social media platform used mostly by teens.
7 Clues: A web browser used by apple users. • A social media bought by Elon Musk. • Most famous social media in the world • Information and communications technology. • Social media platform used mostly by teens. • Hackers deceive people into revealing sensitive information or installing malware. • ...
decline of the medieval 2022-10-18
Across
- a serious shortage of food
- a closely interconnected group of people or things
- plague a deadly infection
Down
- revolt killing lords and burning manors
- Years' War the conflict between kingdoms of England and France, lasted from 1337 to 1453
- not visible
- death a bubonic plague pandemic occurring in Western Eurasia and North Africa from 1346 to 1353
7 Clues: not visible • a serious shortage of food • plague a deadly infection • revolt killing lords and burning manors • a closely interconnected group of people or things • Years' War the conflict between kingdoms of England and France, lasted from 1337 to 1453 • death a bubonic plague pandemic occurring in Western Eurasia and North Africa from 1346 to 1353
Chapter 20: The Societies of Oceania 2019-11-12
Across
- inhabitants of Australia that ventured across the continent and created networks of trade and exchange between hunting and gathering societies
- an area on Pohnpei in the Caroline Islands
- Hawaiian class of high chiefs
Down
- Polynesian temple structure
- Hawaiian concept of something being taboo
- people inhabiting the larger Pacific islands
- indigenous people of New Zealand
7 Clues: Polynesian temple structure • Hawaiian class of high chiefs • indigenous people of New Zealand • Hawaiian concept of something being taboo • an area on Pohnpei in the Caroline Islands • people inhabiting the larger Pacific islands • ...
