networks Crossword Puzzles
Weke 15 Vocabulary Quiz 2024-07-06
Across
- Protecting computers and networks from attacks or damage.
- Changing information into a secret code to keep it safe.
- Making something suitable for a particular place or culture.
- Discussing something to reach an agreement.
- A person who designs, builds, or fixes machines or structures.
- Abilities or expertise in doing something well.
- "_____ breach". When private information is accessed without permission.
Down
- "_____ Skills". The ability to examine things carefully and understand them.
- Keeping information private and not sharing it with others.
9 Clues: Discussing something to reach an agreement. • Abilities or expertise in doing something well. • Changing information into a secret code to keep it safe. • Protecting computers and networks from attacks or damage. • Keeping information private and not sharing it with others. • Making something suitable for a particular place or culture. • ...
DC ANALYSIS OF ELECTRICAL NETWORKS 2021-04-04
Across
- Norton resistance is found by shorting all voltage sources and _________ all current sources
- If there are 8 nodes in network, we can get ____ number of equations in the nodal analysis.
- Nodal analysis is generally used to determine ______.
- The Thevenin voltage is a __________ circuit voltage.
- Superposition theorem does not work for ________.
- In superposition theorem, when we consider the effect of one current source, all the other voltage sources are ____________.
Down
- Norton’s theorem is true for __________ networks.
- Which theorem is also known as the dual of Thevenin’s theorem?
- In Norton’s theorem Isc is a _______ current source.
- Vth is found across the ____________ terminals of the network.
10 Clues: Norton’s theorem is true for __________ networks. • Superposition theorem does not work for ________. • In Norton’s theorem Isc is a _______ current source. • Nodal analysis is generally used to determine ______. • The Thevenin voltage is a __________ circuit voltage. • Which theorem is also known as the dual of Thevenin’s theorem? • ...
social networks and new technologies 2018-10-08
Across
- A virtual presentation of a person on a social network.
- A founder who creates a big social network, his symbol is a bird.
- A social network where we can post pictures.
- phone A revolution in new technologies which is appeared in 1990's
- An innegale action which consists to pirate a website,...
- A social network which watchs videos.
Down
- A game which plays on PC, mobile phone pad or TV.
- A brend which sends mobile phone and tablet.
- An action which consists to love a webpage or a content.
- An american multinational company which designs tablets, computers and mobile phones.
10 Clues: A social network which watchs videos. • A social network where we can post pictures. • A brend which sends mobile phone and tablet. • A game which plays on PC, mobile phone pad or TV. • A virtual presentation of a person on a social network. • An action which consists to love a webpage or a content. • An innegale action which consists to pirate a website,... • ...
Transport layer for mobile networks 2025-05-22
Across
- – Reliable data delivery protocol
- – Variation in packet arrival times
- – Initial connection setup process
- – Lightweight, connectionless protocol
- Control – Prevents sender from overwhelming receiver
Down
- Loss – Data that didn’t make it
- – Actual data rate achieved
- Number – Identifies specific apps or services
- Control – Manages network traffic load
- – Time delay in data transfer
10 Clues: – Actual data rate achieved • – Time delay in data transfer • Loss – Data that didn’t make it • – Reliable data delivery protocol • – Initial connection setup process • – Variation in packet arrival times • Control – Manages network traffic load • – Lightweight, connectionless protocol • Number – Identifies specific apps or services • ...
Networked Entertainment in Computer Networks 2025-05-21
Across
- A global system that delivers web content to users from nearby servers
- The amount of data that can be transmitted over a network in a given time
- A device that connects different networks and directs traffic
- Delay in data transfer that affects real-time gaming
- A company that provides internet access to customers
Down
- A type of entertainment where players interact in a shared virtual world
- A service that lets users watch videos over the internet
- A system that stores and manages data remotely for services like Netflix and Spotify
- Temporary pause in online video caused by slow internet
- High-speed internet connection for homes and businesses
10 Clues: Delay in data transfer that affects real-time gaming • A company that provides internet access to customers • Temporary pause in online video caused by slow internet • High-speed internet connection for homes and businesses • A service that lets users watch videos over the internet • A device that connects different networks and directs traffic • ...
Fake News 2022-03-07
Across
- social media that fights against disinformation
- What is the most used synonym for fake news?
Down
- Fake news in 18th century, Paris
- law that punishes social networks for not deleting fake news
- how many times faster than real news are fake news spreading?
- the main reason for posting fake news
- donated 25 million $ to anti-disinformation team
7 Clues: Fake news in 18th century, Paris • the main reason for posting fake news • What is the most used synonym for fake news? • social media that fights against disinformation • donated 25 million $ to anti-disinformation team • law that punishes social networks for not deleting fake news • how many times faster than real news are fake news spreading?
Vaashini- 8 Lyra 2023-01-19
Across
- A web browser used by apple users.
- people who use technology to commit malicious activities on digital systems or networks.
- A social media bought by Elon Musk.
- Most famous social media in the world
Down
- Hackers deceive people into revealing sensitive information or installing malware.
- Information and communications technology.
- Social media platform used mostly by teens.
7 Clues: A web browser used by apple users. • A social media bought by Elon Musk. • Most famous social media in the world • Information and communications technology. • Social media platform used mostly by teens. • Hackers deceive people into revealing sensitive information or installing malware. • ...
decline of the medieval 2022-10-18
Across
- a serious shortage of food
- a closely interconnected group of people or things
- plague a deadly infection
Down
- revolt killing lords and burning manors
- Years' War the conflict between kingdoms of England and France, lasted from 1337 to 1453
- not visible
- death a bubonic plague pandemic occurring in Western Eurasia and North Africa from 1346 to 1353
7 Clues: not visible • a serious shortage of food • plague a deadly infection • revolt killing lords and burning manors • a closely interconnected group of people or things • Years' War the conflict between kingdoms of England and France, lasted from 1337 to 1453 • death a bubonic plague pandemic occurring in Western Eurasia and North Africa from 1346 to 1353
Chapter 20: The Societies of Oceania 2019-11-12
Across
- inhabitants of Australia that ventured across the continent and created networks of trade and exchange between hunting and gathering societies
- an area on Pohnpei in the Caroline Islands
- Hawaiian class of high chiefs
Down
- Polynesian temple structure
- Hawaiian concept of something being taboo
- people inhabiting the larger Pacific islands
- indigenous people of New Zealand
7 Clues: Polynesian temple structure • Hawaiian class of high chiefs • indigenous people of New Zealand • Hawaiian concept of something being taboo • an area on Pohnpei in the Caroline Islands • people inhabiting the larger Pacific islands • ...
Estela's crossword 2024-01-18
Across
- Reaching the end or term of a journey.
- Set of connected equipment
- Action of moving from one place to another in something
Down
- Conditions that contribute to making life pleasant, dignified and valuable.
- Carry someone or something from one place to another
- go from outside to inside
- amount electricity in an object
7 Clues: go from outside to inside • Set of connected equipment • amount electricity in an object • Reaching the end or term of a journey. • Carry someone or something from one place to another • Action of moving from one place to another in something • Conditions that contribute to making life pleasant, dignified and valuable.
Developments in Africa 2024-04-05
Across
- known for its vibrant trade networks, and heavy Islamic influence .
- Commerce route connecting North and West Africa
- Precious metal sought after in ancient trade
Down
- Essential mineral for preserving food
- Musa Wealthy ruler of the Mali Empire
- Traditional seat for a desert journey
- Ancient African empire known for its wealth and power
7 Clues: Essential mineral for preserving food • Musa Wealthy ruler of the Mali Empire • Traditional seat for a desert journey • Precious metal sought after in ancient trade • Commerce route connecting North and West Africa • Ancient African empire known for its wealth and power • known for its vibrant trade networks, and heavy Islamic influence .
Chapter 20: The Societies of Oceania 2019-11-11
Across
- Hawaiian concept of something being taboo
- peoples inhabitants of Australia that ventured across the continent and created networks of trade and exchange between hunting and gathering societies
Down
- people inhabiting the larger Pacific islands
- Polynesian temple structure
- indigenous people of New Zealand
- Madol an area on Pohnpei in the Caroline Islands
- nui Hawaiian class of high chiefs
7 Clues: Polynesian temple structure • indigenous people of New Zealand • nui Hawaiian class of high chiefs • Hawaiian concept of something being taboo • people inhabiting the larger Pacific islands • Madol an area on Pohnpei in the Caroline Islands • ...
Prohibition 2025-04-04
Across
- Original movement calling for abstinence from alcohol
- Act created to enforce the 18th amendment
- Period where alcohol was banned
Down
- Secret bars which sold alcohol without putting it on the menu.
- Term used to describe the illegal transportation of liquor
- Created underground trafficking networks
- A person who embraces new ideas, styles, and social trends
7 Clues: Period where alcohol was banned • Created underground trafficking networks • Act created to enforce the 18th amendment • Original movement calling for abstinence from alcohol • Term used to describe the illegal transportation of liquor • A person who embraces new ideas, styles, and social trends • Secret bars which sold alcohol without putting it on the menu.
Phone 2023-06-29
Across
- This is a digital marketplace where users can download and install various applications and games on their smartphones.
- This is a short written message sent and received on a cellphone, often used for quick communication.
- This is a system that allows callers to leave recorded messages when the recipient is unable to answer the phone.
- This is a type of cellphone that can be folded in half, featuring a small screen and physical keypad.
- This is a phone that does not require a physical connection to the telephone network, allowing mobility within a limited range.
- This is a feature that allows users to have real-time audio and video communication using their phones.
- This is a mobile phone that offers advanced features, such as internet connectivity, apps, and touchscreen capabilities.
- This is a public telephone that requires payment to make calls, often found in public spaces or on the streets.
Down
- This is a basic cellphone that offers essential calling and texting functions, without advanced capabilities of a smartphone.
- This is a popular brand of smartphones produced by Apple Inc., known for its sleek design and user-friendly interface.
- This is a device that provides power to the phone, allowing it to operate without being connected to an external power source.
- This is a telephone that is connected to a fixed line, usually in a home or office, using physical wiring.
- This is a small card that contains information identifying the user's phone number and allows access to cellular networks.
- This is a portable phone that operates using cellular networks, allowing communication wirelessly.
- This is a feature that enables hands-free communication by broadcasting the call audio through the phone's speakers.
- This is an operating system used in many smartphones, known for its flexibility and compatibility with various apps.
16 Clues: This is a portable phone that operates using cellular networks, allowing communication wirelessly. • This is a short written message sent and received on a cellphone, often used for quick communication. • This is a type of cellphone that can be folded in half, featuring a small screen and physical keypad. • ...
Year 8 - Computer Networks Crossword 2020-09-24
Across
- A collection of computers which are connected together.
- The type network located in a single geographical area.
- The full name of the man credited with designing the architecture of The Internet.
- The device in your home which allows you to connect to a network.
- The fastest method of sending data over a network, which uses light to transmit data.
Down
- The type of network which can spread over many, large geographical areas (e.g. the world).
- The number of bits which can be sent over a given period of time.
- The biggest example of a global network.
- The most common method for connecting wirelessly to a local network, using radio waves.
- Data is split up into these to be sent over a network.
10 Clues: The biggest example of a global network. • Data is split up into these to be sent over a network. • A collection of computers which are connected together. • The type network located in a single geographical area. • The number of bits which can be sent over a given period of time. • The device in your home which allows you to connect to a network. • ...
STS 2024-12-15
Across
- Major urban development expanding into rural areas.
- Tool to analyze environmental trends and data.
- Biodiversity loss due to human activities.
- Protection of endangered species and habitats.
- The global condition of rising temperatures and its effects.
- Using digital technology to enhance learning experiences.
- Using algorithms to mimic human thought processes.
Down
- Protection for computers against unauthorized access.
- A technology that allows virtual collaboration.
- The raw input used for computation or analysis.
- Digital networks and their protection mechanisms.
- Materials or energy sources found in nature.
- A numerical representation of environmental conditions.
- An invention or method that's newly created.
- Measure of diversity within ecosystems.
- A burst of rapid increase, often in demand or water levels.
- Sudden, uncontrolled spread of wildfires.
17 Clues: Measure of diversity within ecosystems. • Sudden, uncontrolled spread of wildfires. • Biodiversity loss due to human activities. • Materials or energy sources found in nature. • An invention or method that's newly created. • Tool to analyze environmental trends and data. • Protection of endangered species and habitats. • A technology that allows virtual collaboration. • ...
robotics 2026-04-01
Across
- Laser-based remote sensing for mapping
- GRADIENT Machine learning method that optimizes actions directly
- SLAM Visual method for mapping while tracking position
- SEGMENTATION Dividing an image into meaningful regions or classes
- Inertial Measurement Unit (abbreviation)
- VISION Technique using two cameras for depth perception
- EXTRACTION Extracting key points or edges from images
- SENSOR Depth sensor that measures time for light to return
- CRITIC RL algorithm using two networks: one for policy, one for value
Down
- ODOMETRY Using camera images to estimate robot motion
- Inertial sensor that measures linear acceleration
- Device that measures angular velocity
- Estimating position by tracking movement from sensors
- FUSION Combining data from multiple sensors for better accuracy
- VISION Field dealing with how computers interpret images
- Determining where a robot is in its environment
- DETECTION Identifying specific objects in an image or scene
17 Clues: Device that measures angular velocity • Laser-based remote sensing for mapping • Inertial Measurement Unit (abbreviation) • Determining where a robot is in its environment • Inertial sensor that measures linear acceleration • Estimating position by tracking movement from sensors • EXTRACTION Extracting key points or edges from images • ...
How People Stay Connected 2021-08-30
Across
- an activity performed for the fun and amusement.
- Speaking to someone via phone.
- sport involving many people in one group.
- A fact-to-face conversation with someone through the internet.
Down
- An institution for educating children.
- activity requiring physical effort to help health and fitness.
- Technology that facilitates ideas, thoughts, and information over virtual networks.
- a task done for the purpose of getting money.
8 Clues: Speaking to someone via phone. • An institution for educating children. • sport involving many people in one group. • a task done for the purpose of getting money. • an activity performed for the fun and amusement. • activity requiring physical effort to help health and fitness. • A fact-to-face conversation with someone through the internet. • ...
tech 2 2024-04-14
Across
- Highspeed internet service via telephone networks, preDSL era
- Motorola's thin mobile phone model, though late 90s entry
- P2P service that revolutionized music sharing online
- Online auction site that went live in 1995
Down
- Early instant messaging program that became very popular
- Microsoft's tool for capturing and analyzing network packets
- Handheld gaming device from Nintendo, with a landscape screen
- Digital personal journals that gained popularity; short for "weblog"
8 Clues: Online auction site that went live in 1995 • P2P service that revolutionized music sharing online • Early instant messaging program that became very popular • Motorola's thin mobile phone model, though late 90s entry • Microsoft's tool for capturing and analyzing network packets • Highspeed internet service via telephone networks, preDSL era • ...
escape room -2 2024-08-02
Across
- A lightweight, open-source database management system
- A method of encrypting data for secure communication
- A device used to input text into a computer
- A virtual private network protocol
Down
- The primary language used for creating web pages
- A term for software that manages data stored in tables
- The act of hiding data within another file
- A network device that routes data between different networks
8 Clues: A virtual private network protocol • The act of hiding data within another file • A device used to input text into a computer • The primary language used for creating web pages • A method of encrypting data for secure communication • A lightweight, open-source database management system • A term for software that manages data stored in tables • ...
Globalization 2020-06-08
6 Clues: Products • Give and recieve something. • Exchange of information among people • modern networks that allow people to interact using internet • when you take a plane to another country, you are traveling____ • codes that are used by people from different countries to communicate
Ink and think 2026-02-08
6 Clues: resumes became networks because of him • A pocket brain for unquestioned truths • pictures speak louder than numbers here • From garbage packing to global logistics • A blue platform that knows your friendships • Ideas travel one click at a time across rectangles
Tech Terms 2 2023-05-04
Across
- “a piece of data from a website that is stored within a web browser that the website can retrieve at a later time.”
- Address A number assigned to any devices connected to the internet
- systems: Windows 10
- A storage amount
- Viruses or ill intended software
- Hypertext Markup Language
- Direct connection to the internet
Down
- Portable Document Format
- “device that connects your home, usually through a coax cable connection, to your Internet service provider”
- Prevention from viruses and hackers
- or Reboot: To turn something on or off and then back on again
- “device that connects two or more packet-switched networks or subnetworks”
12 Clues: A storage amount • systems: Windows 10 • Portable Document Format • Hypertext Markup Language • Viruses or ill intended software • Direct connection to the internet • Prevention from viruses and hackers • or Reboot: To turn something on or off and then back on again • Address A number assigned to any devices connected to the internet • ...
Crypto Crossword#23 2023-11-14
Across
- Lido DAO provides ____ infrastructure for multiple blockchain networks.
- The short name for Regenerative Finance that rhymes with DeFi
- The first game built on the Ethereum network.
- Ava Labs backs which layer one blockchain?
- Jed McCaleb and Joyce Kim founded — blockchain after leaving Ripple in 2013.
Down
- Coins that are simply unprofitable and have no value.
- One of the largest Bitcoin mining pools.
- ___ whitepaper was published on 31 October 2008.
- A leading self-custodial crypto wallets that rhymes with Mask
- Exchange-traded fund is popularly abbreviated as
- What are Individuals or entities that hold huge amounts of a specific cryptocurrency are known as
- The ticker symbol for Cosmos
12 Clues: The ticker symbol for Cosmos • One of the largest Bitcoin mining pools. • Ava Labs backs which layer one blockchain? • The first game built on the Ethereum network. • ___ whitepaper was published on 31 October 2008. • Exchange-traded fund is popularly abbreviated as • Coins that are simply unprofitable and have no value. • ...
IKT Nozares 2025-02-11
Across
- Address - A unique number assigned to a device on a network.
- - A device that sends data between different networks.
- Interface - The part of a system that users interact with.
- Learning - A method of data analysis that allows computers to learn from data.
- - A set of steps to solve a problem.
- - A system for organizing and storing data.
- - An initial model used for testing and improvement.
- - A virtual private network connection that ensures secure data transmission.
Down
- - A security system that controls network traffic.
- - Instructions written in a programming language.
- - A storage location in a program whose value can change.
- - Identifying and fixing errors in a program.
12 Clues: - A set of steps to solve a problem. • - A system for organizing and storing data. • - Identifying and fixing errors in a program. • - Instructions written in a programming language. • - A security system that controls network traffic. • - An initial model used for testing and improvement. • - A device that sends data between different networks. • ...
Technologies 2021-06-03
Across
- a small computer
- an engine that allows me to learn online
- when someone spends too much time on social networks, they are...
- someone who gets angry easily
Down
- a modal auxiliary to give advice "conseil"
- a device that allows me to have an internet connexion
- when someone is very angry and connot control themselves
7 Clues: a small computer • someone who gets angry easily • an engine that allows me to learn online • a modal auxiliary to give advice "conseil" • a device that allows me to have an internet connexion • when someone is very angry and connot control themselves • when someone spends too much time on social networks, they are...
Computer 2022-09-28
Across
- - The basis of any equipment without which nothing works
- - an output device that displays information in pictorial or text form.
- - input device
Down
- - the largest vendor of computer software in the world
- - global system of interconnected computer networks
- - a hand-held pointing device that detects two-dimensional motion relative to a surface.
- - apple computer
7 Clues: - input device • - apple computer • - global system of interconnected computer networks • - the largest vendor of computer software in the world • - The basis of any equipment without which nothing works • - an output device that displays information in pictorial or text form. • ...
Crossword 2024-07-11
Across
- The London office is located in this building
- Visa, Mastercard, and Discover are Worldpay’s main _______
- Worldpay provides payments services to _______
- Cincinnati, AKA Worldpay HQ, is known as the ____ City
Down
- According to their website, Worldpay processes over 40 billion of these annually
- Best company ever
- Total number of interns across the two Worldpay offices
7 Clues: Best company ever • The London office is located in this building • Worldpay provides payments services to _______ • Cincinnati, AKA Worldpay HQ, is known as the ____ City • Total number of interns across the two Worldpay offices • Visa, Mastercard, and Discover are Worldpay’s main _______ • ...
5AU7 2021-04-21
Across
- at all times; on every occasion
- to go to see a person or a place for a period of time
- many times, frequently
- an international computer network connecting other networks and computers from companies, universities, etc.
- the father or mother of your father or mother
Down
- occasionally rather than all of the time
- to talk in a friendly informal way to sb
- on the weekend,over the weekend(2 words)
- in, at or to that place or position
9 Clues: many times, frequently • at all times; on every occasion • in, at or to that place or position • occasionally rather than all of the time • to talk in a friendly informal way to sb • on the weekend,over the weekend(2 words) • the father or mother of your father or mother • to go to see a person or a place for a period of time • ...
Networking Hardware 2022-07-30
Across
- a device that receives and delivers signals
- to mention smth, to make an idea
- a piece of el equipment that controls the movement of onformation around the network
- a device that modulates data into a digital or analog signal
- channels incoming data and shares the bandwidth among the devices present on a network
Down
- smth that is needed
- connects networks and sends data btw them
- a device that channels incoming data but mantains the bandwidth
- how quickly smth happens
9 Clues: smth that is needed • how quickly smth happens • to mention smth, to make an idea • connects networks and sends data btw them • a device that receives and delivers signals • a device that modulates data into a digital or analog signal • a device that channels incoming data but mantains the bandwidth • ...
Week 6 MG101 PASS Activity - Making management decisions 2025-08-24
Across
- – Relates to the role of analysing information to make choices.
- – A situation that can lead to improvement or success.
- – Ability to evaluate information and identify patterns.
- – A knowledge worker who makes decisions and handles information.
- – Skill in understanding and using new technologies.
Down
- – The role involving motivating people and building networks.
- – A discrepancy between an actual and desired situation.
- – A situation where something is or could go wrong.
- – Data that is gathered, analysed, and shared for decision-making.
9 Clues: – A situation where something is or could go wrong. • – Skill in understanding and using new technologies. • – A situation that can lead to improvement or success. • – A discrepancy between an actual and desired situation. • – Ability to evaluate information and identify patterns. • – The role involving motivating people and building networks. • ...
Emails & Drives 2021-02-09
Across
- The signer is confirmed as the signer.
- The content has not been changed or tampered since it was digitally signed.
- An app or extension to manage your email box.
- Proves to all parties the origin of the singed content.
- Used by receiver to verify digital signature.
Down
- A Certificate Authority is an entity similar to a ____________ public.
- Transmission of messages over communication networks.
- Set of rules that governs Internet Activities.
- A free web-based application in which documents & spreadsheets can be created, edited and stored online.
- A freemium cloud storage service.
- Portion to the right side of @.
- Portion to the left side of @.
- Used by sender to digitally sign an electronic document.
13 Clues: Portion to the left side of @. • Portion to the right side of @. • A freemium cloud storage service. • The signer is confirmed as the signer. • An app or extension to manage your email box. • Used by receiver to verify digital signature. • Set of rules that governs Internet Activities. • Transmission of messages over communication networks. • ...
PD/H/PE by Claire Kowald 2014-02-20
Across
- make or become different
- the degree of excellence of something
- a group of two parents and their children living together as a unit
- the way in which one overcomes difficulties or challenges
- aggressive pressure or intimidation
- the way in which two or more things are connected
- having or showing a confident and forceful personality
- abusively disparaging speech or writing
- the emotions or conduct of friends
- being the only one of it's kind; unlike anything else
- repeated harmful behavior
Down
- relating to society or its organization
- the measure of how people come together and interact
- a group of people who provide help to someone in difficulty
- the imparting or exchanging or information
- a task or situation that tests someones abilities
- the things that stop people interacting socially
- the capacity to have effect on someone or something
18 Clues: make or become different • repeated harmful behavior • the emotions or conduct of friends • aggressive pressure or intimidation • the degree of excellence of something • relating to society or its organization • abusively disparaging speech or writing • the imparting or exchanging or information • the things that stop people interacting socially • ...
Introduction to ICT 2026-01-13
Across
- Technology used to send messages over long distances (13)
- The smallest unit of data in a computer (3)
- Programs and applications used by a computer (8)
- Communication through computers and networks (3)
- Technology used to process information electronically (3)
- The use of computers to create, store, and share information (3)
- Information processed by a computer (4)
- A device used to input text into a computer (8)
- A set of instructions that tells a computer what to do (7)
- The process of protecting computer systems and data (8)
Down
- A computer network that covers a small area like a school or office (3)
- Technology that combines text, sound, images, and video (10)
- A portable computer (6)
- Physical components of a computer (8)
- A device that displays output visually (7)
- Online global network connecting millions of computers (8)
- A system used to store and organize information electronically (8)
- Unauthorized access to computer systems (7)
- The “brain” of the computer (3)
- A device used to point and click (5)
20 Clues: A portable computer (6) • The “brain” of the computer (3) • A device used to point and click (5) • Physical components of a computer (8) • Information processed by a computer (4) • A device that displays output visually (7) • The smallest unit of data in a computer (3) • Unauthorized access to computer systems (7) • A device used to input text into a computer (8) • ...
CryotoMaze 2 2024-12-09
Across
- Standard for information security management systems.
- Malware that demands payment to restore access.
- Strategies to prevent data loss or misuse.
- Secret key used for decryption in asymmetric encryption.
- Process of converting data into a fixed-size string of characters for integrity verification.
- Device that monitors and controls network traffic.
- Testing to identify vulnerabilities in a system.
- To verify the identity of a user or system.
- Reverse process of converting ciphertext back to plaintext.
- Protocol ensuring secure communications over networks.
- Centralized unit managing security operations.
- Security mechanism requiring multiple forms of verification.
Down
- Assurance that one cannot deny the validity of their actions.
- Key used in asymmetric encryption, shared publicly.
- Decentralized ledger technology for secure transactions.
- A weakness in a system that can be exploited.
- Handling cryptographic keys throughout their lifecycle.
- Process of converting plaintext into ciphertext.
18 Clues: Strategies to prevent data loss or misuse. • To verify the identity of a user or system. • A weakness in a system that can be exploited. • Centralized unit managing security operations. • Malware that demands payment to restore access. • Testing to identify vulnerabilities in a system. • Process of converting plaintext into ciphertext. • ...
Crossword 2014-05-03
Across
- EQUIPMENT USED TO ALLOW INTERNET ACCESS THROUGH A CABLE COMPANY.
- ENCRYPTION CODE OF A WIRELESS SYSTEM.
- NETWORK GROUP OF A LOCAL AREA.
- TWO OR MORE COMPUTERS LINKED TO SHARED INFORMATION.
Down
- EQUIPMENT USED TO CONNECT TWO OR MORE NETWORKS.
- OTHER TYPE OF LAN TECHNOLOGIES THAT USED A TOKEN.
- NETWORK NODE WHERE A USER WOULD SIT AND ACCESS AND NETWORK.
- EQUIPMENT USED TO CONNECT HOSTS ON LAN.
- based 2 USING 1 AND 0 AS BITS TO REPRESENTS DATA.
9 Clues: NETWORK GROUP OF A LOCAL AREA. • ENCRYPTION CODE OF A WIRELESS SYSTEM. • EQUIPMENT USED TO CONNECT HOSTS ON LAN. • EQUIPMENT USED TO CONNECT TWO OR MORE NETWORKS. • OTHER TYPE OF LAN TECHNOLOGIES THAT USED A TOKEN. • TWO OR MORE COMPUTERS LINKED TO SHARED INFORMATION. • based 2 USING 1 AND 0 AS BITS TO REPRESENTS DATA. • ...
visual arts 2021-10-20
Across
- A profession in which the artist use materials like rocks.
- An art where a pallette is included.
- "Lights, cameras... ACTION!"
- Comics are included in this form of art
- "attraction" is a group of ...
Down
- A very popular form of art. you can see it in magazines, websites and social networks.
- A profession that creates ceramic bottles.
- You can see this art in urban places like streets, walls or squares.
- The art we will see next class.
9 Clues: "Lights, cameras... ACTION!" • "attraction" is a group of ... • The art we will see next class. • An art where a pallette is included. • Comics are included in this form of art • A profession that creates ceramic bottles. • A profession in which the artist use materials like rocks. • You can see this art in urban places like streets, walls or squares. • ...
The 5G architecture 2024-11-21
Across
- Virtualized instances replacing hardware appliances in networking
- Key component of NFV for managing virtualized functions
- Protocol used in SDN for direct access to network devices
- Time delay critical for real-time network operations
Down
- Ability of different network components to work seamlessly
- Architecture handling communication between mobile devices and networks
- Technique for improving wireless communication using multiple antennas
- Virtualization framework introduced in 2012 to reduce hardware reliance
- Software-defined approach enabling granular network control via APIs
9 Clues: Time delay critical for real-time network operations • Key component of NFV for managing virtualized functions • Protocol used in SDN for direct access to network devices • Ability of different network components to work seamlessly • Virtualized instances replacing hardware appliances in networking • ...
Network and telecommunication 2022-05-20
Across
- IP stands for.
- A computer dedicated to responding to requests for web pages.
- A computer that stores and manages files for multiple users on a network.
- full form of WAN.
Down
- The speed with which data is moved from one place on a network to another.
- DNS stands for.
- A unique identification that specifies a particular computer on the Internet.
- Network devices used to direct packets between networks.
- various configuration used to administrator LAN.
- The generic term refers to any device on a network.
- A connection in which transfer speeds are faster than 128 bits per second.
11 Clues: IP stands for. • DNS stands for. • full form of WAN. • various configuration used to administrator LAN. • The generic term refers to any device on a network. • Network devices used to direct packets between networks. • A computer dedicated to responding to requests for web pages. • A computer that stores and manages files for multiple users on a network. • ...
Information technology 2021-01-13
Across
- Software that has lots of glitches and errors
- Windows that are showing up when, for example, you are browsing the internet
- Device used for connecting different computer networks
- A program used for accessing email
- Software that manages computer hardware and software resources
- Software component that lets the operating system and a device communicate with each other
Down
- Easy and intuitive to use
- Looks of the letter in computer system
- Something that is used to connect wired devices
- Software that is not resources heavy and/or can run even on older, weaker computers
- Program used for editing text files
11 Clues: Easy and intuitive to use • A program used for accessing email • Program used for editing text files • Looks of the letter in computer system • Software that has lots of glitches and errors • Something that is used to connect wired devices • Device used for connecting different computer networks • Software that manages computer hardware and software resources • ...
GLOBALIZATION 2021-03-11
Across
- global network focusing on women's rights
- connection of individuals, institutions, or groups across borders
- element of globalization where tariffs and quotas are removed for the sake of free flow of goods
- process of international interaction of cultures, politics, and economy beyond national borders
Down
- global networks that are composed of equipment and non-human connections
- global network of licensed professionals
- global network of extremists
- global network aiming to communicate data
- global network of activists
- element of globalization where government assets were sold to private firms
- element of globalization where the government halts from intervening from the prices of commercial goods
11 Clues: global network of activists • global network of extremists • global network of licensed professionals • global network aiming to communicate data • global network focusing on women's rights • connection of individuals, institutions, or groups across borders • global networks that are composed of equipment and non-human connections • ...
Tech Crossword 2014-03-04
Across
- many of them make a image or a word on a computer
- is the process of encoding messages or information
- a small piece of data
- something that contains files
- a string of numbers that identifies each computer using the Internet Protocol to communicate over a network
- stores all of your saved files and holds the information when you r computer is turned off
Down
- a device that forwards data packets between computer networks
- graphic display of a computer
- known as the “brain” of the computer
- collection of 8 BITS
- is the short-term memory of the disk
11 Clues: collection of 8 BITS • a small piece of data • graphic display of a computer • something that contains files • known as the “brain” of the computer • is the short-term memory of the disk • many of them make a image or a word on a computer • is the process of encoding messages or information • a device that forwards data packets between computer networks • ...
Communication 2023-11-14
Across
- Software Applications facilitating text-based communication, often in real-time.
- Communication between multiple participants in different locations using audio.
- Electronic messages exchanged over the internet.
- Messaging Real-time, text-based communication between users over the internet.
Down
- Text messages sent between mobile devices.
- Technology for making voice calls over the internet.
- Assistant Virtual software that assists users with tasks, often through voice commands.
- Communication using signals transmitted to and from satellites in orbit.
- Conference Real-time visual communication between individuals or groups in different locations.
- MediaOnline platforms enabling users to share content and communicate with others.
- Wireless communication through mobile networks.
11 Clues: Text messages sent between mobile devices. • Wireless communication through mobile networks. • Electronic messages exchanged over the internet. • Technology for making voice calls over the internet. • Communication using signals transmitted to and from satellites in orbit. • Messaging Real-time, text-based communication between users over the internet. • ...
Management of Blockchain Project 2025-11-02
Across
- Popular blockchain platform supporting smart contracts
- Document describing objectives, stakeholders, and budget in the initiating phase
- Framework providing structured project management stages.
- Technology involving decentralized, distributed networks and cryptography.
- The stage focusing on performance metrics and feedback loops.
- The first phase of blockchain project management where objectives and stakeholders are defined
Down
- Self-executing code that automates blockchain transactions
- The final phase involving documentation, evaluation, and handover.
- The phase where smart contracts are developed and nodes configure
- The stage where timeline, costs, and technology stack are designed
- Abbreviation for the organization that created the PMBOK® Guide
11 Clues: Popular blockchain platform supporting smart contracts • Framework providing structured project management stages. • Self-executing code that automates blockchain transactions • The stage focusing on performance metrics and feedback loops. • Abbreviation for the organization that created the PMBOK® Guide • ...
Computer 2022-12-08
Across
- part of the computer for data storage
- A worldwide system of intergraded computer networks for storing and transmitting information
- A device that performs image reading to transmit information over a distance
- A graphical interface element that points to an odject that will be interacted
Down
- A device for manual typing in a computer
- An area with certain information
- A program that interferes with the operation of the computer
- Portadle personaly computer
- One of the types of transmission lines
9 Clues: Portadle personaly computer • An area with certain information • part of the computer for data storage • One of the types of transmission lines • A device for manual typing in a computer • A program that interferes with the operation of the computer • A device that performs image reading to transmit information over a distance • ...
LbV 2024-10-31
Across
- An association focused on tolls and crossings (abbreviation)
- A spicy vegetable relish often served with bread
- An online platform for human resources management
- A method for recognizing immobile road users (abbreviation)
- A messaging platform used for team communication and collaboration
Down
- A system for controlling flow on roadways
- A popular Middle Eastern dish made from ground chickpeas
- A surface material used to pave roads
- A district in London known for its road networks and urban infrastructure
9 Clues: A surface material used to pave roads • A system for controlling flow on roadways • A spicy vegetable relish often served with bread • An online platform for human resources management • A popular Middle Eastern dish made from ground chickpeas • A method for recognizing immobile road users (abbreviation) • An association focused on tolls and crossings (abbreviation) • ...
. 2025-10-22
Across
- Electronic mail, or email, is a system for exchanging digital messages over a computer network, such as the internet.
- A hub is a central point of connection that facilitates a concentration of activity, communication, or traffic. The term is used across various fields, including general business, transp
- A router is a networking device that connects multiple computer networks, such as your home network to the internet
- Network hardware is the physical equipment, or "computer networking devices," that enable devices to communicate with each other on a computer network.
- A router is a networking device that connects multiple computer networks, such as your home network to the internet.
- A protocol is a formal, standardized set of rules that govern behavior, communication, or procedures in a specific context
Down
- A computer network is a system of interconnected devices, such as computers, servers, and printers, that can communicate with each other and share resources like files, applications, and internet access.
- A network cable is a physical wire used to connect devices in a wired network, enabling them to communicate and share data. Different types of network cables, such as twisted pair, coaxial,
8 Clues: A router is a networking device that connects multiple computer networks, such as your home network to the internet • A router is a networking device that connects multiple computer networks, such as your home network to the internet. • Electronic mail, or email, is a system for exchanging digital messages over a computer network, such as the internet. • ...
Global Health Module 11 2025-04-02
5 Clues: Report specific diseases • Respond to public health events • established international networks • Work together with other countries to make • Make sure surveillance systems can detect potential threats
Emily Rendon 2012-04-02
Across
- a stranger that has access to your files
- junk mail or meat in a can
- a mean person that puts you down using technology
- webites thats have text containing entries
- keeps from looking at unwanted websites and protects from hackers
- software that can be tested before you buy
Down
- reproduction of copyrighted material
- small text files or a really good treat
- writing that is copied and pasted to other files and not giving credit to the real writer
- networks a website where people meet and talk or videochat
- a file that harms your system or germs
- a dangerous software code or a insect thats lives under ground
12 Clues: junk mail or meat in a can • reproduction of copyrighted material • a file that harms your system or germs • small text files or a really good treat • a stranger that has access to your files • webites thats have text containing entries • software that can be tested before you buy • a mean person that puts you down using technology • ...
Mikayla Ojeda 2015-05-04
Across
- a software program that is designed to destruct files on your computer.
- a reference to a published or unpublished source.
- a bully who operates online.
- a software that searches, gathers, and identifies information.
- a website that can be edited by anyone who enters the website.
- to renew or to revitalize.
Down
- a global network of thousands of computer networks.
- a list of citations that appear at the end of a paper.
- a piece of writing that has been copied by someone else.
- an online community where people socialize.
- software used to browse multiple internet pages.
- an unauthorized person who secretly gains access to computer files.
12 Clues: to renew or to revitalize. • a bully who operates online. • an online community where people socialize. • software used to browse multiple internet pages. • a reference to a published or unpublished source. • a global network of thousands of computer networks. • a list of citations that appear at the end of a paper. • ...
comp sci 2019-04-24
Across
- Wells Pl, Eastleigh SO50 5SG
- worldwide network
- when a device does not know when data is going to be sent
- IP:Port
- data transfer per unit of time
- amount of changes in voltage possible per unit of time
Down
- Divide the network into multiple smaller networks
- when a device
- the process of a device requesting and receiving an IP address
- organisation that manages all ips in the world
- solves the problem of allowing the internet to access resources on a LAN Socket set of rules that creates a persistent connection between two computers on a
- protocol for avoiding wireless packet collision
12 Clues: IP:Port • when a device • worldwide network • Wells Pl, Eastleigh SO50 5SG • data transfer per unit of time • organisation that manages all ips in the world • protocol for avoiding wireless packet collision • Divide the network into multiple smaller networks • amount of changes in voltage possible per unit of time • when a device does not know when data is going to be sent • ...
Unit 4 Social 7 - The Fur Trade 2017-11-06
Across
- Their trade networks were mostly based around the Great Lakes region.
- Similar to the Coureurs de Bois, trappers and traders in the fur trade.
- Animal hunted in the fur trade.
- Method of transportation in fur trade.
- Another word for trade.
- First Nations trade partners of the French.
Down
- Long-lasting food for travel made with berries and animal fat.
- Abbreviation for one of the fur trading companies.
- Item given to the First Nations in trade that the Church disapproved of.
- Owned Rupert's Land until 1869.
- One of the items made from beaver fur.
- Many of the trading post's names started with this word.
12 Clues: Another word for trade. • Owned Rupert's Land until 1869. • Animal hunted in the fur trade. • One of the items made from beaver fur. • Method of transportation in fur trade. • First Nations trade partners of the French. • Abbreviation for one of the fur trading companies. • Many of the trading post's names started with this word. • ...
Braelyn Santiago - IST Crossword 2023-09-01
Across
- A system of interrelated computing devices.
- Most powerful computer, usually custom made.
- Contents belong to everyone.
- Designed so user can carry it from place to place.
- A device that allows your to take photos and store the photographed images digitally.
- Mobile device for single or mulitplayer games.
- World-wide collection of networks.
Down
- Provides protection to authors of original works.
- An internet service that provides remote storage to computer users.
- Uses flash memory to store data, instructions, and information.
- An electronic document on the web that can contain text, images, interactive animations, audio and video.
- A collection of related webpages stored on a web server.
12 Clues: Contents belong to everyone. • World-wide collection of networks. • A system of interrelated computing devices. • Most powerful computer, usually custom made. • Mobile device for single or mulitplayer games. • Provides protection to authors of original works. • Designed so user can carry it from place to place. • A collection of related webpages stored on a web server. • ...
Cyber Safety 2023-09-14
Across
- Malware that requires the victim to pay a ransom to access encrypted files.
- criminals who break into computer networks with malicious intent.
- two words creates and stores strong passwords
- sending, posting, or sharing negative, harmful, false, or mean content about someone else.
- two words. long (phrases or sentences) that mix capital and lowercase letters, numbers, and symbols
Down
- Malicious software
- The numeric address of a computer on the internet
- A Private Network that ensures your anonymity on the internet
- Which social media platform is a hackers’ favorite
- Software used to protect a computer from viruses
- Main component of a server
- unwanted email messages
12 Clues: Malicious software • unwanted email messages • Main component of a server • two words creates and stores strong passwords • Software used to protect a computer from viruses • The numeric address of a computer on the internet • Which social media platform is a hackers’ favorite • A Private Network that ensures your anonymity on the internet • ...
online saftey 2023-04-21
Across
- scams sent via emails
- information that has been processed
- collection of internet-connected devices
- facts provided or learned about something or someone
- individuals that break into the computing code
- any program or file that is intentionally harmful to a computer
Down
- infect the computer systems of users and manipulates the infected system
- when someone makes up a story to gain a persons interest and uses this to encourage them to give away personal information
- an application that controls access to networks/monitors
- self-replicating malware
- a person that looks over someone's shoulder as they enter personal data
- attaches itself to another programme, which can replicate itself
12 Clues: scams sent via emails • self-replicating malware • information that has been processed • collection of internet-connected devices • individuals that break into the computing code • facts provided or learned about something or someone • an application that controls access to networks/monitors • any program or file that is intentionally harmful to a computer • ...
Introduction to Cybersecurity 2024-09-18
Across
- Protection of computer systems, networks, and data from digital attacks
- IoT devices increase our ____ to cyber attacks
- Assurance that systems and data are accessible by authorized users
- Ensuring information is protected from unauthorized or unintentional alterations
- Secure Systems with ____ and other security measures
- _______ contain a combination of numbers, letters, and symbols
- ______ store and send personal information
Down
- Protection of information from people who are not authorized to view it
- Security measure that should be guaranteed in every secured system
- ________ workers are needed to build more secure systems and respond to threats
- Cyber attacks threaten security,_______, and economic growth
- Another name for Internet of things
12 Clues: Another name for Internet of things • ______ store and send personal information • IoT devices increase our ____ to cyber attacks • Secure Systems with ____ and other security measures • Cyber attacks threaten security,_______, and economic growth • _______ contain a combination of numbers, letters, and symbols • ...
Inside the ransomware playbook 2024-10-25
Across
- - Notorious group known for exploiting vulnerabilities for profit
- - The tool of choice for a thief who likes to play hide and seek
- - The process of scrambling information to keep it secret
- - The principle of limiting access based on user needs
- - Protocol used for authentication in Microsoft networks
Down
- - Crafty crew that snatches your secrets without a sword
- - Ritual of sharpening defenses to keep the bad guys at bay
- - Structured guide that outlines how to respond to threats
- - Secretive moves of an attacker, often hidden in plain sight
- - The secret playbook of cyber mischief-makers
- - Legendary flaw that opens doors without knocking
- - Ransomware tactic that involves manipulating security software
12 Clues: - The secret playbook of cyber mischief-makers • - Legendary flaw that opens doors without knocking • - The principle of limiting access based on user needs • - Crafty crew that snatches your secrets without a sword • - Protocol used for authentication in Microsoft networks • - The process of scrambling information to keep it secret • ...
World Wide Web 2024-03-07
Across
- Address of your computer connected to the internet.
- an item like a word or button that points to another location.
- A software program used to locate and display
- on the Internet.
- Website and application that focus communication and content sharing.
- Used to connect a computer to a remote host or server.
Down
- A method of identifying computer addresses.
- any process that a business organization
- a communication method that uses electronic devices to deliver messages across computer networks.
- The first page that is viewed when the browser starts.
- The standard method for downloading files over the internet.
- over a computer mediated network.
12 Clues: on the Internet. • over a computer mediated network. • any process that a business organization • A method of identifying computer addresses. • A software program used to locate and display • Address of your computer connected to the internet. • The first page that is viewed when the browser starts. • Used to connect a computer to a remote host or server. • ...
COMPUTER CROSSWORD PUZZLE 2025-06-08
Across
- The primary input device for typing text and commands .
- A type of volatile memory used by the CPU. (abbr.)
- A global network connecting millions of computer networks.
- A common port for connecting peripherals like keyboards and mice. (abbr.)
- The "brain" of the computer. (abbr.)
Down
- To save data to a storage device
- The physical components of a computer system
- The display screen of a computer.
- A collection of data or information stored on a computer.
- A software application
- A portable computing device with a touchscreen, larger than a phone but smaller than a laptop.
- A pointing device used to control the cursor on a screen.
12 Clues: A software application • To save data to a storage device • The display screen of a computer. • The "brain" of the computer. (abbr.) • The physical components of a computer system • A type of volatile memory used by the CPU. (abbr.) • The primary input device for typing text and commands . • A collection of data or information stored on a computer. • ...
Ransomware - 2022 2022-11-16
Across
- A software designed to help computers stay safe from viruses and avoid them
- A malware that is independent and does not need any host program
- An internet fraud aimed at revealing the personal data of users
- William Gibson coined this term which is in popular use now
- The first hacker's conference
- The least strong security encryption
- Old phone hacking technique used to make free calls
Down
- Unsolicited email sent for commercial purposes
- A malware that misleads users of its true intent
- Kevin Poulsen broke into this secret defense information systems network
- A software program or hardware device that protects networks by filtering data packets
- The first computer virus
12 Clues: The first computer virus • The first hacker's conference • The least strong security encryption • Unsolicited email sent for commercial purposes • A malware that misleads users of its true intent • Old phone hacking technique used to make free calls • William Gibson coined this term which is in popular use now • ...
Iot 2025-12-24
Across
- Tiny parts that detect things like motion heat or light
- Cities using connected tech to manage services like traffic
- A network of everyday objects connected online
- Tools and systems created to solve problems and improve life
- Information collected by devices to be stored or analyzed
- Connections that let devices send and receive information
- The ability for devices to stay linked and communicate
Down
- Gadgets that can sense connect and act automatically
- Houses where connected devices control comfort and safety
- When a system does tasks by itself without a person
- Processing data on or near the device for speed
- Online computers that store and process lots of information
12 Clues: A network of everyday objects connected online • Processing data on or near the device for speed • When a system does tasks by itself without a person • Gadgets that can sense connect and act automatically • The ability for devices to stay linked and communicate • Tiny parts that detect things like motion heat or light • ...
Tech 2023-03-18
Across
- A set of instructions for a computer to perform a specific task.
- A global network connecting millions of computers.
- A security system that monitors and controls incoming and outgoing network traffic.
- Random Access Memory, a type of computer memory.
- Software that manages computer hardware and software resources.
Down
- The physical components of a computer.
- Central processing unit, the "brain" of a computer.
- Device that forwards data packets between computer networks.
- A software application used to access and view websites.
- Programmed instructions that control a computer.
- A malicious program that replicates itself and infects a computer.
- Short for "application," a software program designed to perform a specific function.
12 Clues: The physical components of a computer. • Programmed instructions that control a computer. • Random Access Memory, a type of computer memory. • A global network connecting millions of computers. • Central processing unit, the "brain" of a computer. • A software application used to access and view websites. • ...
Cybersecurity 2021 2021-10-18
Across
- use this where possible to protect valuable data and content
- creep around every corner
- do this over a link to ensure it is taking you to the site the email content says it will
- phishing via SMS
- hover over all of these before clicking on them to make sure they are legitimate
Down
- cybersecurity month
- don't allow your devices to do this with unfamiliar networks
- keep these updated to ensure they have the latest security
- involves scammers impersonating someone via email or phone to steal information
- every employee is one of these
- before you share
- Spotting these URLs is a bit of an art
12 Clues: before you share • phishing via SMS • cybersecurity month • creep around every corner • every employee is one of these • Spotting these URLs is a bit of an art • keep these updated to ensure they have the latest security • don't allow your devices to do this with unfamiliar networks • use this where possible to protect valuable data and content • ...
Crypto Crossword#45 2024-04-15
Across
- ______ trading enables traders to automatically execute trades by communicating with an exchange's trading engine.
- The second country to approve spot crypto ETFs.
- Which Bitcoin landmark event is scheduled this week?
- The smallest denomination of ADA.
- Optimism, a layer-two blockchain on top of ___.
- Lido DAO provides ____ infrastructure for multiple blockchain networks.
- An account that has had no activity for a long period.
Down
- A person who is bullish on Bitcoin
- The Ethereum of China?
- Just like silver, BTC is ___.
- When a trader purchases a token shortly after its project launch date without thorough research
- The Crypto Fear and Greed index measures the market ____.
12 Clues: The Ethereum of China? • Just like silver, BTC is ___. • The smallest denomination of ADA. • A person who is bullish on Bitcoin • The second country to approve spot crypto ETFs. • Optimism, a layer-two blockchain on top of ___. • Which Bitcoin landmark event is scheduled this week? • An account that has had no activity for a long period. • ...
Cyber Security Puzzle 2024-10-22
Across
- The process of verifying the identity of a user
- A method of disguising data to protect it
- A device that helps protect networks by filtering traffic
- A breach where sensitive data is accessed unlawfully
- A malicious email designed to trick recipients
- A protocol used to send emails securely
Down
- A common form of malware that locks files
- A program that scans for vulnerabilities in systems
- A common cybersecurity measure that involves using complex passwords
- Software that detects and removes malware
- A type of attack where multiple systems are used to overwhelm a target
- A legal framework for data protection in the EU
12 Clues: A protocol used to send emails securely • A common form of malware that locks files • A method of disguising data to protect it • Software that detects and removes malware • A malicious email designed to trick recipients • The process of verifying the identity of a user • A legal framework for data protection in the EU • ...
Кәмшат 2024-11-19
Across
- A cloud computing environment designed specifically for one organization?
- An infrastructure-as-a-service model?
- What is the process of software allocation of computer resources called?
- Protecting data and systems from cyber attacks?
- The process of automatically adjusting resources based on user demand?
Down
- Google's cloud storage service?
- A collection of key resources such as networks, servers, hardware?
- Special coding process to protect data?
- A software-as-a-service model?
- What is the process of protecting data from unauthorized access called?
- What is the level of service available to users?
- A service for hosting websites and applications on the Internet?
12 Clues: A software-as-a-service model? • Google's cloud storage service? • An infrastructure-as-a-service model? • Special coding process to protect data? • Protecting data and systems from cyber attacks? • What is the level of service available to users? • A service for hosting websites and applications on the Internet? • ...
Data Security 2025-11-19
Across
- A measure taken to protect data
- Ensuring data is accessible when needed
- Technological tools like firewalls or encryption
- Malware that locks data until a ransom is paid
- Tangible security measures like locks or badges
- Keeping information private and accessible only to authorized users
Down
- When data is accessed or leaked without permission
- Building products that respect user privacy and data rights
- Relating to actions people take (like turning off location sharing)
- The right to control who sees or uses your personal information
- an individual or group that intentionally attempts to exploit vulnerabilities in computer systems, networks, or devices for malicious purposes
- Ensuring data remains accurate and unaltered
12 Clues: A measure taken to protect data • Ensuring data is accessible when needed • Ensuring data remains accurate and unaltered • Malware that locks data until a ransom is paid • Tangible security measures like locks or badges • Technological tools like firewalls or encryption • When data is accessed or leaked without permission • ...
BigDataBoss Season-3 2020-10-31
Across
- , Movie famous for "Indha 1 eli, 2 eli, 3 eli, 4 eli, 5 eli la...andha Anjali!"
- locator in selenium
- composed of multiple weaker models(independently trained)
- asynchronous
- open source library for coreference
- hiphop star of Kollywood
- murugan
- acceleration using Graphics Processing Units with a familiar NumPy-like API through CuPy
Down
- inpoint of view of vigneshsivan
- saying he is pregnant
- , Movie famous for "Parasakthi hero da!"
- neural networks, a main area of deep learning research written in brother of C
- type of modelling error which results in the failure to predict future observation.
- algorithm which is used for both classification as well as regression
14 Clues: murugan • asynchronous • locator in selenium • saying he is pregnant • hiphop star of Kollywood • inpoint of view of vigneshsivan • open source library for coreference • , Movie famous for "Parasakthi hero da!" • composed of multiple weaker models(independently trained) • algorithm which is used for both classification as well as regression • ...
Lesson 3 2025-07-09
Across
- A small network for one person's devices (abbreviation)
- The public name of a Wi-Fi network
- Short-range wireless for connecting peripherals
- A connection type that does not use physical cables
- A major advantage of wireless technology
- The central device that creates a Wi-Fi network
- The process of scrambling data to make it secure
Down
- You need this to connect to a secure Wi-Fi network
- When physical objects or other signals block a connection
- A network that covers a single building (abbreviation)
- The radio waves used to transmit wireless data
- A common wireless technology for home networks
- The maximum effective distance of a wireless signal
- A common security protocol for encrypting Wi-Fi
14 Clues: The public name of a Wi-Fi network • A major advantage of wireless technology • The radio waves used to transmit wireless data • A common wireless technology for home networks • Short-range wireless for connecting peripherals • The central device that creates a Wi-Fi network • A common security protocol for encrypting Wi-Fi • ...
Super U! 2024-09-19
Across
- I cannot ... because I’m afraid of water.
- I cannot ... poetry because I lack creativity.
- I cannot ... because I always burn the food.
- I can ... websites because I have a good sense of user experience.
- I cannot ... a bike because I have poor balance.
- I cannot ... the piano because I have no musical talent.
- I can ... because I understand logic structures well.
- I cannot ... because I have no rhythm.
- I cannot ... because my hands are unsteady.
Down
- I can ... networks because I understand cybersecurity protocols.
- I cannot ... fast because I have weak legs.
- I cannot ... math because numbers confuse me.
- I cannot ... soccer because I have no coordination.
- I can ... animations because I have a sharp eye for detail.
- I can ... videos because I’m good with digital tools.
15 Clues: I cannot ... because I have no rhythm. • I cannot ... because I’m afraid of water. • I cannot ... fast because I have weak legs. • I cannot ... because my hands are unsteady. • I cannot ... because I always burn the food. • I cannot ... math because numbers confuse me. • I cannot ... poetry because I lack creativity. • I cannot ... a bike because I have poor balance. • ...
Underground Railroad 2022-03-03
Across
- state with most active networks in the underground railroad
- most famous conductor of the underground railroad
- made it harder for slaves to escape and become free
- quaker who helped over 2,000 slaves
- where most underground railroad routes went to
Down
- known as the father of the underground railroad
- famous abolitionist and conductor of the underground railroad and established the League of
- what ended the underground railroad
- approximate number of people who escaped through the underground railroad
9 Clues: what ended the underground railroad • quaker who helped over 2,000 slaves • where most underground railroad routes went to • known as the father of the underground railroad • most famous conductor of the underground railroad • made it harder for slaves to escape and become free • state with most active networks in the underground railroad • ...
Machine learning algortihms 2023-11-02
Across
- Method for dividing data into distinct groups, often used in marketing
- Machine learning technique for clustering data points
- Commonly used linear classification algorithm
- Algorithm for predicting a continuous value or estimating data
- Technique for determining the best split point for decision trees
Down
- Technique for minimizing the cost function to train neural networks
- Type of machine learning algorithm used for supervised classification
- Machine learning algorithm that uses decision trees
- Ensemble learning method that combines multiple models
9 Clues: Commonly used linear classification algorithm • Machine learning algorithm that uses decision trees • Machine learning technique for clustering data points • Ensemble learning method that combines multiple models • Algorithm for predicting a continuous value or estimating data • Technique for determining the best split point for decision trees • ...
WHAT DO YOU KNOW ABOUT COMPUTERS? 2023-05-03
Across
- the most important device for handling computer operations
- the main circuit board with key parts of the computer
- a typical input device that moves the cursor on the screen
- a technology that superimposes three-dimensional virtual images on real images or backgrounds
Down
- a worldwide network of computer networks
- writing a program code using computer language
- a device that stores computer processing results and data
- a computer system modeled after human intelligence
- a software to run computers efficiently
9 Clues: a software to run computers efficiently • a worldwide network of computer networks • writing a program code using computer language • a computer system modeled after human intelligence • the main circuit board with key parts of the computer • a device that stores computer processing results and data • the most important device for handling computer operations • ...
the internet 2015-09-21
Across
- Gap between those who have Internet access and those who don’t
- early version of the internet
- Structure that handles the major traffic in a networked system
- mainframe computers that are capable of very fast processing
- Collection of networks of computers & storage devices linked by cables & satellite
- also know as "surfing the web"
- where you can keep urls that you access often
Down
- a sites address
- allows multiple devices to communicate with eachother without cables
- Companies that proved users with access to the Internet, usually for a fee
- used for all communication across the internet
- set of text and codes only visible to the web browser
- location on the WWW
13 Clues: a sites address • location on the WWW • early version of the internet • also know as "surfing the web" • where you can keep urls that you access often • used for all communication across the internet • set of text and codes only visible to the web browser • mainframe computers that are capable of very fast processing • ...
Computer Science Vocab 2026-02-16
Across
- These parts allow the computer to perform tasks like work,gaming,communication, or AI processing.
- Systems that allow the computer to function on its own
- Anything that connects to a computer externally
- External storage that holds large amounts of data
- Provide services to other devices
Down
- Connects all parts together
- Temporarily stores data being used
- The "brain" that performs calculations
- Anything that is connected to the internet
- Used to connect peripheral devices (mice,keyboards, printers, etc.) to computers.
- A unique number that every device needs on the internet to send and receive data
- The wide web of networks that links devices
- Storage that saves files and programs long term
13 Clues: Connects all parts together • Provide services to other devices • Temporarily stores data being used • The "brain" that performs calculations • Anything that is connected to the internet • The wide web of networks that links devices • Anything that connects to a computer externally • Storage that saves files and programs long term • ...
Cyber security 2025-12-14
Across
- Digital information stored or shared on computers
- A security system that blocks unwanted network access
- A tool that secures internet connections and hides online activity
- Protecting computers and networks from digital attacks
- Tricking users into giving away personal information online
Down
- Malware that locks data and demands payment
- A type of malware that spreads by infecting files
- Harmful software designed to damage or spy on devices
- A person who breaks into or tests computer systems
- Security using fingerprints, face scans, or voice patterns
- Scrambling data so only authorized users can read it
- A network of infected devices controlled by attackers
- A secret word or code used to access an account
13 Clues: Malware that locks data and demands payment • A secret word or code used to access an account • Digital information stored or shared on computers • A type of malware that spreads by infecting files • A person who breaks into or tests computer systems • Scrambling data so only authorized users can read it • Harmful software designed to damage or spy on devices • ...
lessons 1-9 2016-02-23
Across
- Translates the hierarchal,human readable names into a 4 number IP
- File, memory, browser, edge
- You must identify yourself on the UT system none of this
- Good writing,quality graphics, outbound hypertext links add
- .edu, .com, .org, .net, .mil, .gov
- Computers are geographically close to internet connections
- Bulleted lists,inverted pyramid,color,typeface variations
- Copyrights on material last a certain number of years
- Internet connections that are not geographically close
- Hypertext makeup language
Down
- Do not participate in any unauthorized attempts of UT IT resources
- Fed law does allows use of material under certain circumstances
- Results in termination of access and/or disciplinary action
- Uncopyrighted material available to anyone without authorization
- A group of information on a computer, software programs or data
- Pictures/movies/graphics
- Main technology for local area networks,connects to a building
- Tells protocol, pathname, server computer's name
18 Clues: Pictures/movies/graphics • Hypertext makeup language • File, memory, browser, edge • .edu, .com, .org, .net, .mil, .gov • Tells protocol, pathname, server computer's name • Copyrights on material last a certain number of years • Internet connections that are not geographically close • You must identify yourself on the UT system none of this • ...
COSC 100 2016-02-22
Across
- where all of the html files live
- clustered website
- percent of permissible amount of work to use in music video
- is a universal communication medium
- You must login and identify yourself
- second of permissible amount of time to use in an individual music video
- files that can be embedded in web pages and displayed by a browser
- local area network
- is a related group of networked computers
- more manageable website
Down
- main technology for main for local area networks
- login into site
- suffix to the name of a computer file applied to indicate the encoding of its content or usage
- All users shall share computing resources in a fair manner
- hyper text markup language
- how many leads the scripss team has
- a great site for digital storytelling in a safe environment
- a great way to create digital stories using this comic creator
18 Clues: login into site • clustered website • local area network • more manageable website • hyper text markup language • where all of the html files live • is a universal communication medium • how many leads the scripss team has • You must login and identify yourself • is a related group of networked computers • main technology for main for local area networks • ...
U1 Vocabulary 2017-11-30
Across
- something created in an earlier version will work in the new version
- Responsible for protecting computer networks
- tries to produce results similar
- A set of rules used to predict reality
- The basic building block in an electronic computer
- Multiple CPU's in a computer can work on separate tasks at the same time and then add their results to the final outcome
- Group of eight bits
- The study of the technology and Ideas related to computers
- code that tells hardware what to do
Down
- writes the specifications for software
- Writes computer code to create software
- based on ten digits
- designs the hardware used in computer systems
- Physical parts of a computer
- The memory location on the CPU
- The software in a computer
- Based on two digits
- to copy the movement, speech, vision, and decision-making of humans
18 Clues: based on ten digits • Based on two digits • Group of eight bits • The software in a computer • Physical parts of a computer • The memory location on the CPU • tries to produce results similar • code that tells hardware what to do • writes the specifications for software • A set of rules used to predict reality • Writes computer code to create software • ...
DTIN Chapter 4 2024-04-23
Across
- - Common wireless network technology that provides Internet access.
- - Markup language for creating webpages.
- - Technology for transmitting voice over the Internet.
- - Each electronic document on the World Wide Web.
- - Service that allows communication over the Internet.
- - Software used to access and view websites.
- - Buying and selling of goods and services online.
- - Website that helps users find information on the Internet.
- - Server that translates domain names to IP addresses.
- - Unique address for each webpage.
- - Top-level domain in Internet addresses, like .com or .org.
Down
- - Worldwide collection of networks connecting millions.
- - Protocol for uploading and downloading files on the Internet.
- - Business transactions conducted electronically on the Internet.
- - Numeric identifier for each computer on the Internet.
- - Text-based name that corresponds to an IP address.
- - A computer that delivers webpages to your browser.
- - Real-time typed conversation online between users.
18 Clues: - Unique address for each webpage. • - Markup language for creating webpages. • - Software used to access and view websites. • - Each electronic document on the World Wide Web. • - Buying and selling of goods and services online. • - Text-based name that corresponds to an IP address. • - A computer that delivers webpages to your browser. • ...
CM-BCMS 2025-04-04
Across
- Analysis Evaluating potential digital threats to ensure safety.
- Assessment Analyzing threats to minimize potential vulnerabilities.
- Management Routine updates to close security gaps in software.
- Deceptive techniques using fake messages to steal sensitive information.
- Testing Simulated attack to uncover security system flaws.
- An attack demanding payment to unlock encrypted data.
- Backup plan prepared for unexpected disruptions.
- A voice-based scam to extract personal information over the phone.
- Management Planning to ensure survival during emergencies.
- Malicious software created to disrupt or damage systems.
- Ability to recover operations during or after a crisis.
- Continuity Plan (BCP) Framework ensuring operations continue despite challenges.
- Cyberattack via text messages designed to deceive users.
Down
- State of readiness to effectively respond to issues.
- Process of restoring crucial business functions post-disruption.
- Weakness in a system exploitable by attackers.
- Process of verifying a user’s identity for security purposes.
- Secures information by converting it into unreadable code.
- A system barrier preventing unauthorized access to networks.
19 Clues: Weakness in a system exploitable by attackers. • Backup plan prepared for unexpected disruptions. • State of readiness to effectively respond to issues. • An attack demanding payment to unlock encrypted data. • Ability to recover operations during or after a crisis. • Malicious software created to disrupt or damage systems. • ...
Gaming Engineer 2022-11-15
Across
- 2 year degree
- create programs by doing this
- 4 year degree
- Graphics processing unit
- investigate systematically
- Second word of AI
- systematic knowledge of the physical or material world gained through observation and
- how much someone makes
Down
- a part or element of a larger whole, especially a part of a machine or vehicle
- a plan or schedule of activities, procedures, etc., to be followed
- a roughly circular line, route, or movement that starts and finishes at the same place
- a test, trial, or tentative procedure; an act or operation for the purpose of discovering something unknown or of testing a principle, supposition, etc
- subject you learn since you were a kid, 2+2
- you might code this, handheld device created by Apple or Samsung
- an amusement or pastime
- a vast computer network linking smaller computer networks worldwide
- Central processing unit
- Random-access memory
18 Clues: 2 year degree • 4 year degree • Second word of AI • Random-access memory • how much someone makes • an amusement or pastime • Central processing unit • Graphics processing unit • investigate systematically • create programs by doing this • subject you learn since you were a kid, 2+2 • you might code this, handheld device created by Apple or Samsung • ...
How People Stay Connected 2021-08-30
Across
- An institution for educating children.
- a task done for the purpose of getting money.
- trade between countries, where producers receive a fair price for their products.
- Technology that facilitates ideas, thoughts, and information over virtual networks.
- activity requiring physical effort to help health and fitness.
- Speaking to someone via phone.
Down
- the process of spending time away from your home and/or country for pleasure.
- activities performed for fun and amusement.
- A face-to-face conversation with someone through the internet.
- sport involving many people in one group.
- going from one place to another far away
- the careful use of money and resources.
12 Clues: Speaking to someone via phone. • An institution for educating children. • the careful use of money and resources. • going from one place to another far away • sport involving many people in one group. • activities performed for fun and amusement. • a task done for the purpose of getting money. • A face-to-face conversation with someone through the internet. • ...
COMPUTER SPAGHETTI WIFI 2019-03-05
Across
- Address- a unique identifier for every machine using the internet.
- family of computer networking technologies commonly used in local area networks
- wireless networking technology that uses radiowaves
- rate-istheresendingofpacketswhichhavebeeneitherdamaged or lost.
- networking hardware used to connect one networkdevicetoothernetworkdevices
- (Domain Name Server)-hierarchical and decentralized naming system for computers
Down
- optic- made by drawing glass or plastic to adiameterslightlythickerthanthafahumanhair.Wikipedia
- amount of data that can be transmitted in a fixedamountoftime.
- rate/collision-istheresultoftwodevicesonthesameEthernetnetworkattemptingtotransmitdataatexactlythesametime
- formatted unit of data carried
- before a transfer of data begins following aninstructionforitstransfer.
- a particular set of rules for having a conversation between two computers to convey a specific set of information.
12 Clues: formatted unit of data carried • wireless networking technology that uses radiowaves • amount of data that can be transmitted in a fixedamountoftime. • rate-istheresendingofpacketswhichhavebeeneitherdamaged or lost. • Address- a unique identifier for every machine using the internet. • before a transfer of data begins following aninstructionforitstransfer. • ...
Network Crossword 2019-04-24
Across
- worldwide network
- range of frequencies that can be transmitted at once over the medium
- solves the problem of allowing the internet to access resources on a lan
- central server providing requests to many clients
- recieveing device doesn't know when data will be sent
- unique identifier for NICs
- automatically assigns ip addresses to devices on a network
Down
- Divide the network into multiple smaller networks
- organisation that manages all ips in the world
- set of rules that creates a persistent connection between two computers on a network to enable real-time collaboration.
- protocol for avoiding wireless packet collision
- maximum rate at which signal changes
12 Clues: worldwide network • unique identifier for NICs • maximum rate at which signal changes • organisation that manages all ips in the world • protocol for avoiding wireless packet collision • Divide the network into multiple smaller networks • central server providing requests to many clients • recieveing device doesn't know when data will be sent • ...
Crossword 2014-06-12
Across
- I am working for data bases management team. Complete the signature: RESG/GTS/MKT/…
- What always comes ‘FIRST’ in SSB team ?
- One of the four main RESG Resources lines
- My name is GTS. I am … years old
- Number of Outages typologies
- The RESG/GTS/MKT department working for "architecture, projects and security"
- They manages the Group networks and telecom (voice, data, security) as well as computer rooms
Down
- The 3 letters for connecting to Marley
- Not Retail but corporate finance and investment
- Head of RESG/GTS/MKT
- Acronym of “IT Infrastructures” (Global technology Services) department
- To be submitted if I want to perform an ITIL change
12 Clues: Head of RESG/GTS/MKT • Number of Outages typologies • My name is GTS. I am … years old • The 3 letters for connecting to Marley • What always comes ‘FIRST’ in SSB team ? • One of the four main RESG Resources lines • Not Retail but corporate finance and investment • To be submitted if I want to perform an ITIL change • ...
Ap Comp Sci 2023-05-06
Across
- a group of functions or procedures that may be used in creating new programs.
- Data sent over a computer.
- A gap of access to modern communication and technology.
- A type of compression with complete reconstruction of original data.
Down
- Letters/Special Characters/Symbols represented by the binary system.
- an ordered collection of elements.
- A system for representing the colors to be used on the computer screen.
- Rules and regulations of coding.
- A type of system used to monitor connections between computer networks.
- A type of compression without complete reconstruction of the original data.
- Physical representation of something.
- A digital representation of an analog signal.
12 Clues: Data sent over a computer. • Rules and regulations of coding. • an ordered collection of elements. • Physical representation of something. • A digital representation of an analog signal. • A gap of access to modern communication and technology. • Letters/Special Characters/Symbols represented by the binary system. • ...
Computer Crossword 2014-03-10
Across
- a device that forwards data packets between computer networks
- A small piece of data
- something that contains files
- graphic display of a computer
- collection of 8 BITS
- A string of numbers that identifies each computer using the Internet Protocol to communicate over a network
Down
- many of them make a image or a word on a computer
- known as the “brain” of the computer
- stores all of your saved files and holds the information when you r computer is turned off
- is the process of encoding messages or information
- is the short-term memory of the disk
11 Clues: collection of 8 BITS • A small piece of data • something that contains files • graphic display of a computer • known as the “brain” of the computer • is the short-term memory of the disk • many of them make a image or a word on a computer • is the process of encoding messages or information • a device that forwards data packets between computer networks • ...
COMMERCE- COMMUNICATION: PUZZLE 2016-07-20
Across
- ,one of the cheaper communication
- ,it may be useful if a document is required quickly.
- ,visual method of communication include ___, graphs and posters.
- ,this links people in different locations by sound and vision for meetings.
- ,this links computers within the organisation.
- ,this services may be unreliable or unavailable in rural areas.
- ,a suitable communication when discussion is required.
Down
- ,this communication gives instant feedback
- ,this is a network of networks linking millions of users worldwide.
- ,this method of communication can be used when they are in different countries.
- , this conversation is one of the common oral communication.
11 Clues: ,one of the cheaper communication • ,this communication gives instant feedback • ,this links computers within the organisation. • ,it may be useful if a document is required quickly. • ,a suitable communication when discussion is required. • , this conversation is one of the common oral communication. • ,this services may be unreliable or unavailable in rural areas. • ...
Inventions and discovers 2020-05-08
Across
- One of the most remarkable inventions of XX century in the field of medicine
- The vehicle, which moves on four wheels
- The invention, by which you can sit on the internet
- The invention, which may bring any live audio range of human speech or music
Down
- With this invention you can light a lamp
- Without this invention, people could not express their thoughts on a paper
- Global system of combined computer networks
- Large marsupial
- It was specially devised for the protection and hunting
- Communication tool, invented by Alexander Graham Bell
- Material to the letter
11 Clues: Large marsupial • Material to the letter • The vehicle, which moves on four wheels • With this invention you can light a lamp • Global system of combined computer networks • The invention, by which you can sit on the internet • Communication tool, invented by Alexander Graham Bell • It was specially devised for the protection and hunting • ...
MIL 2021-03-19
Across
- electronic media used to store, transmit, and receive digitized information is _____ media
- _____ media,the combination of traditional media and computer and communications technology
- is a communitaions that incorpate multiplie forms of information content and processing
- communications delivered over mass electronic communication networks is _____ media
- form of information that man gets when see something
Down
- media with hyperlinks
- field of science, studying laws and methods of information processing
- tools used to store and deliver data
- is a combination of media and information literacy
- media focused on communicating news is _____
- form of information that consists of cymbols is ____ information
11 Clues: media with hyperlinks • tools used to store and deliver data • media focused on communicating news is _____ • is a combination of media and information literacy • form of information that man gets when see something • form of information that consists of cymbols is ____ information • field of science, studying laws and methods of information processing • ...
Communication Methods 2023-11-14
Across
- Communication between multiple participants in different locations using audio.
- Assistant Virtual software that assists users with tasks, often through voice commands.
- Software Applications facilitating text-based communication, often in real-time.
- Communication using signals transmitted to and from satellites in orbit.
Down
- Messaging Real-time, text-based communication between users over the internet.
- Technology for making voice calls over the internet.
- Wireless communication through mobile networks.
- MediaOnline platforms enabling users to share content and communicate with others.
- Electronic messages exchanged over the internet.
- Conference Real-time visual communication between individuals or groups in different locations.
- Text messages sent between mobile devices.
11 Clues: Text messages sent between mobile devices. • Wireless communication through mobile networks. • Electronic messages exchanged over the internet. • Technology for making voice calls over the internet. • Communication using signals transmitted to and from satellites in orbit. • Messaging Real-time, text-based communication between users over the internet. • ...
Communication Methods 2023-11-14
Across
- Communication between multiple participants in different locations using audio.
- Assistant Virtual software that assists users with tasks, often through voice commands.
- Software Applications facilitating text-based communication, often in real-time.
- Communication using signals transmitted to and from satellites in orbit.
Down
- Messaging Real-time, text-based communication between users over the internet.
- Technology for making voice calls over the internet.
- Wireless communication through mobile networks.
- MediaOnline platforms enabling users to share content and communicate with others.
- Electronic messages exchanged over the internet.
- Conference Real-time visual communication between individuals or groups in different locations.
- Text messages sent between mobile devices.
11 Clues: Text messages sent between mobile devices. • Wireless communication through mobile networks. • Electronic messages exchanged over the internet. • Technology for making voice calls over the internet. • Communication using signals transmitted to and from satellites in orbit. • Messaging Real-time, text-based communication between users over the internet. • ...
Transnational crimes 2025-01-20
Across
- There is an e... order in your name.
- In its operations, Frontex also targets e... crime.
- The witness has seen the ... crossing the border illegally.
- The police need an arrest ... to detain suspects.
Down
- means ‘inadmissible passengers’.
- The witness saw a ... person on the plane.
- All joint operations contain the element of cross-border crime counter... .
- Frontex operational response is based on the ... analysis and identified criminal threats.
- The efforts to ... organised crime at the EU’s external borders need to be enhanced.
- Many criminal ... engage in multiple criminal activities simultaneously.
- A ... represents people in court.
11 Clues: means ‘inadmissible passengers’. • A ... represents people in court. • There is an e... order in your name. • The witness saw a ... person on the plane. • The police need an arrest ... to detain suspects. • In its operations, Frontex also targets e... crime. • The witness has seen the ... crossing the border illegally. • ...
CyberSmart '24 2024-10-01
Across
- A form of software that protects against malicious software
- A secret word or phrase used for authentication
- A weakness that can be exploited in a system
- The process of encoding data to prevent unauthorized access
- Unwanted and unsolicited emails
- Unauthorized access to or manipulation of data or systems
Down
- A method of securing data during transmission across networks
- A program designed to damage or disrupt a computer system
- Prevents unauthorized access to data or systems
- in the Middle An attack where the attacker intercepts communication between two parties
- The act of verifying the identity of a user or device
- A security technique using scrambled text, readable only with a key
- A method to authenticate users with something they know
13 Clues: Unwanted and unsolicited emails • A weakness that can be exploited in a system • Prevents unauthorized access to data or systems • A secret word or phrase used for authentication • The act of verifying the identity of a user or device • A method to authenticate users with something they know • A program designed to damage or disrupt a computer system • ...
COMPANY ORGANISATION 2024-01-23
Across
- job loss
- the top executive
- a person who is being given practical training under supervision
- an alliance or a relationship in which two or more people, organizations, or countries work together
- a company which is part of a larger and more important company
Down
- working for himself/herself
- charity
- something to do with computers and networks
- the regular and essential expenses of a company ( salaries, rent, electricity, and phone bills)
- a person who is in control or in charge of a group of people / team
- you can buy shares in this company
11 Clues: charity • job loss • the top executive • working for himself/herself • you can buy shares in this company • something to do with computers and networks • a company which is part of a larger and more important company • a person who is being given practical training under supervision • a person who is in control or in charge of a group of people / team • ...
Network management 2022-05-10
Across
- passes information between two or more networks
- last address of a subnet
- a series of numbers that identifies any device on a network
- short of "Command Line Interface"
- subnet design strategy that allows all subnet masks to have variable sizes
- 32-bit number created by setting host bits to all 0s and setting network bits to all 1s
- short of "personal computer"
Down
- collection of devices connected to allow data sharing
- high-speed device that receives incoming data packets and redirects them
- Have no wire or wires
- a unique identifier assigned to every active network equipment unit
11 Clues: Have no wire or wires • last address of a subnet • short of "personal computer" • short of "Command Line Interface" • passes information between two or more networks • collection of devices connected to allow data sharing • a series of numbers that identifies any device on a network • a unique identifier assigned to every active network equipment unit • ...
Terms 2021-03-25
Across
- a device for connecting computers and other network capable devices together to form a network
- communication's sent over a network
- a global network collecting millions of computers
- a server that stores files for other computers to access
- physical devices used to transfer data
- A group of inter connected devices
- on a network, a computer that has equal rights and control
Down
- the end point of communication between networks
- A period of time delay in a computer system
- a device that transmits and receives messages
- a connection that does not require wires and transmit data through radio signals
- an area of control or management
- software designed to cause harm or damage to a computer
13 Clues: an area of control or management • A group of inter connected devices • communication's sent over a network • physical devices used to transfer data • A period of time delay in a computer system • a device that transmits and receives messages • the end point of communication between networks • a global network collecting millions of computers • ...
Crossword Puzzle - DGTIN 2021-09-02
Across
- Bitcoin solves _____ issues through the integration of timestamped cryptographic blocks.
- _____ encourages consumers and users to take charge and pursue their goals.
- Blockchain is a ______ system with no central authority that manages the data flow.
- often being referred to as root cause analysis.
- ______ is an individual who not only consume but also produces.
- most crypto's are ______ networks based on blockchain technology.
- world's first Cryptocurrency.
Down
- _____ refers to the master ledger that records all prior transactions and activity of cryptocurrencies.
- _____ serve as record-keepers for cryptocurrency communities.
- uses historical data in order to predict future events.
- A finalized blockchain transaction are usually _____.
- cryptocurrency makes it nearly impossible to ______ or double-spend.
- facebook's facial recognition technology.
13 Clues: world's first Cryptocurrency. • facebook's facial recognition technology. • often being referred to as root cause analysis. • A finalized blockchain transaction are usually _____. • uses historical data in order to predict future events. • _____ serve as record-keepers for cryptocurrency communities. • ______ is an individual who not only consume but also produces. • ...
IT Trivia 2022-07-18
Across
- ... word, excel, powerpoint, office
- measures taken to protect devices, networks, and data from unauthorized access and criminal use
- a program that is dedicated to managing network resources
- the vaccine for computers
- not physical but...
- an output device that produces a tangible copy of alphanumeric or graphic data
- one of the primary input devices used with a computer
Down
- the standard way to connect computers on a network over a wired connection
- a piece of code which can corrupt a system or destroy data
- Jerry
- the button you press when you make an error
- what we hate to see in our emails
- the practice of tricking internet users through deception into revealing personal information
13 Clues: Jerry • not physical but... • the vaccine for computers • what we hate to see in our emails • ... word, excel, powerpoint, office • the button you press when you make an error • one of the primary input devices used with a computer • a program that is dedicated to managing network resources • a piece of code which can corrupt a system or destroy data • ...
