networks Crossword Puzzles
Unit 2 2024-07-17
Across
- This allows devices with Wi-Fi connectivity to connect to wired networks
- Acts as the mediator in a network
- Dynamic address
- Used to amplify the signal in a network
- Link a web page to another page
- Server which manage files on the network
- This server checks usernames & passwords
- Connects a computer to a network
- The name of an organisation maintaining the site
- This server is used to keep installed all the programs, software, etc.
- To view files on the web, you need this
Down
- Method used to track a device on a network
- Can act as a gateway
- This server can also act as a data filter
- Changing static address
- Provides the internet facility
- Aends the transmitted data to all computers
- Key device within a client-server network
- The global network
- Connects two different types of network
- This software prevents users from accessing inappropriate information
- Modulate and demodulate the signals
- One million bits equals to how many Megabytes
23 Clues: Dynamic address • The global network • Can act as a gateway • Changing static address • Provides the internet facility • Link a web page to another page • Connects a computer to a network • Acts as the mediator in a network • Modulate and demodulate the signals • Used to amplify the signal in a network • Connects two different types of network • ...
2.2 Organizational Structure 2025-10-10
Across
- – Personnel organized into a group
- SPAN OF CONTROL – Span of control that encompasses many people
- – Removing layers in the hierarchy to cut costs
- – The size (number) of the firm's employees
- STRUCTURE – Structure that caters well for part-time practices
- OF COMMAND – The official path which instructions are passed on
- – Holding someone responsible for their actions
- – Person with authority and responsibility for staff
- AUTHORITY – Type of authority over those directly below you
- MANAGER – The person directly above you in the organization
Down
- – Person who inspires their team and staff
- GROUPS – Teams formed naturally, through unofficial means
- – The act of passing down authority to others
- – A particular job that needs doing
- – Such structures help to improve communication
- GENERAL MEETING – The yearly meeting held for all key stakeholders
- – Electronic form of written communication
- STRUCTURE – Flexible organizational structure for projects
- HIERARCHY – Structure with many levels in the hierarchy
- – The highest ranking person in a company
- – The levels or ranks in an organization
- – A sense of duty for others in your team
22 Clues: – Personnel organized into a group • – A particular job that needs doing • – The levels or ranks in an organization • – The highest ranking person in a company • – A sense of duty for others in your team • – Person who inspires their team and staff • – Electronic form of written communication • – The size (number) of the firm's employees • ...
Cm viruses 2025-08-23
Across
- Malware that hides its presence from users/OS (ROOTKIT)
- Security system that blocks unauthorized access (FIREWALL)
- Software that removes or blocks harmful programs (ANTIVIRUS)
- General term for harmful software (MALWARE)
- Program that locks files and demands money (RANSOMWARE)
- Malicious part of a virus that causes damage (PAYLOAD)
- Self-replicating program that spreads over networks (WORM)
- Unwanted or junk email messages (SPAM)
- Fake messages to trick users into revealing data (PHISHING)
Down
- A network of infected computers controlled remotely (BOTNET)
- Program that records keystrokes (KEYLOGGER)
- A harmful program that disrupts a computer system (VIRUS)
- Criminal who breaks into systems (HACKER)
- Software that secretly collects user information (SPYWARE)
- A malicious code triggered by specific events (LOGICBOMB)
- Malicious software that opens a hidden way into a system (BACKDOOR)
- Secret code method to secure data (ENCRYPTION)
- False warning about non-existent malware (HOAX)
- Malware hidden inside useful software (TROJAN)
- Software that displays unwanted advertisements (ADWARE)
20 Clues: Unwanted or junk email messages (SPAM) • Criminal who breaks into systems (HACKER) • Program that records keystrokes (KEYLOGGER) • General term for harmful software (MALWARE) • Secret code method to secure data (ENCRYPTION) • Malware hidden inside useful software (TROJAN) • False warning about non-existent malware (HOAX) • ...
BoekOpdracht 2025-06-10
Across
- – Wat je doet als je nieuwe kennis of vaardigheden opdoet.
- – Getal dat de fout tussen voorspelling en waarheid meet.
- – Kunstmatige eenheid die signalen verwerkt.
- – Wat je schrijft om een neuraal netwerk te bouwen.
- – Veelgebruikte activatiefunctie die negatieve waarden afvlakt.
- – Structuur waarin meerdere neuronen parallel werken.
- – Wiskundige functie die bepaalt of een neuron vuurt.
- – “Eerst het belangrijkste” is een kernprincipe.
- – Programmeertaal gebruikt in het boek Neural Networks from Scratch.
- – Activatiefunctie met output tussen 0 en 1.
- – Eén volledige doorgang door de trainingsdata.
Down
- – Richting waarin de fout afneemt, gebruikt bij optimalisatie.
- – De metavaardigheid achter persoonlijke groei en effectiviteit.
- – Methode om fouten terug te verspreiden in een netwerk.
- – Informatierichting binnen een neuraal netwerk zonder terugkoppeling.
- – Samenwerking waarbij het geheel meer is dan de som der delen.
- – Verbindingssterkte tussen twee neuronen.
- – Waarde toegevoegd aan de input om de activatie te beïnvloeden.
- – Denken vanuit je einddoel, een centrale gewoonte.
- – De eerste gewoonte; zelf verantwoordelijkheid nemen.
20 Clues: – Verbindingssterkte tussen twee neuronen. • – Kunstmatige eenheid die signalen verwerkt. • – Activatiefunctie met output tussen 0 en 1. • – Eén volledige doorgang door de trainingsdata. • – “Eerst het belangrijkste” is een kernprincipe. • – Wat je schrijft om een neuraal netwerk te bouwen. • – Denken vanuit je einddoel, een centrale gewoonte. • ...
Español 3H Unit 1 Vocab 2025-08-19
Across
- you don't say!
- to have
- to be (temporary)
- homework
- committed
- cell phone
- persistent
- playful
- of course!
- open-minded
- lively
- for/by
- with
- computer (Spain)
- to be (permanent)
- passionate
- whiteboard/blackboard
- to think
- to take out the trash
- student desks
- often, many times
- social networks
- to have a good time
- for
- what a shame!
- sometimes
- of/from
Down
- to do the shopping
- how cool!
- me too!
- to set the table
- to surf the internet
- there is/there are
- to chat online
- I don't understand!
- really?
- to dust the furniture
- to wash the clothes
- challenging, demanding
- never
- how interesting!
- proud
- towards
- to like
- to upload photos
- to go
- to clear the table
- I am sorry!
- always
- in/on
- melancholic
- capable
- until/up to
- to want
54 Clues: for • with • never • proud • to go • in/on • lively • for/by • always • me too! • to have • really? • playful • towards • to like • capable • to want • of/from • homework • to think • how cool! • committed • sometimes • cell phone • persistent • of course! • passionate • open-minded • I am sorry! • melancholic • until/up to • student desks • what a shame! • you don't say! • to chat online • social networks • to set the table • how interesting! • ...
AI in marketing 2025-10-22
Across
- = Using past data to forecast future trends
- = Relying too much on machine suggestions
- = Protection of personal information collected by AI systems
- = The study of how people buy and use products
- = An AI tool that communicates with users in natural language
- = A set of rules that an AI follows to make decisions
- = The creation of new ideas and technologies in marketing
- = AI detecting emotions in text or social media
- = Using AI to complete tasks without human effort
- = How people and AI systems work together
Down
- = Tailoring marketing messages to individual customers
- = AI suggesting products to customers
- = Very large sets of information analyzed by computers
- = Machines that can think and learn like humans
- = Promoting products using online platforms
- = Advanced machine learning using neural networks
- = Moral principles guiding the responsible use of AI
- = Adapting global AI tools to local cultures
- = A computer system modeled after the human brain
- = A type of AI that improves automatically through experience
20 Clues: = AI suggesting products to customers • = Relying too much on machine suggestions • = How people and AI systems work together • = Using past data to forecast future trends • = Promoting products using online platforms • = Adapting global AI tools to local cultures • = The study of how people buy and use products • = Machines that can think and learn like humans • ...
What's New In Utopia? 2022-04-18
Across
- New Digital Rack is now called _ _
- Team Assignment is assigned where?
- The Medical Stop Loss Quote is now the new name for _ tab
- Categories in Journal Notes is now labeled as?
Down
- Clone & Copy are found under _ _ section
- Competitive Analysis moved to the Final Rating tab after clicking _ button
- Bulk auto assign under PPO Networks is now labeled as _ _
7 Clues: New Digital Rack is now called _ _ • Team Assignment is assigned where? • Clone & Copy are found under _ _ section • Categories in Journal Notes is now labeled as? • Bulk auto assign under PPO Networks is now labeled as _ _ • The Medical Stop Loss Quote is now the new name for _ tab • Competitive Analysis moved to the Final Rating tab after clicking _ button
Operating System and Utility Software - GCSE 2020-01-31
Across
- turns data into secure information
- prevents unauthorized access to computer networks
- organizing the hard drive to optimize storage
- reduces file sizes - typical file types are .zip and .rar
Down
- a utility software that determines the operation status within specific software
- utility software that carries out full and incremental backups
- acts a barrier to prevent malware spreading on the computer
7 Clues: turns data into secure information • organizing the hard drive to optimize storage • prevents unauthorized access to computer networks • reduces file sizes - typical file types are .zip and .rar • acts a barrier to prevent malware spreading on the computer • utility software that carries out full and incremental backups • ...
THE INTERNET 2020-04-21
Across
- publish sth on the internet
- regular record of your thoughts, opinions or self-experiences you put on the internet for other people to read
- to look at information on the internet
- a group of interconnected computer networks
- to sound familiar
Down
- a website or computer program that allows people to communicate/share information on the internet
- give your opinion on socialnetworks
7 Clues: to sound familiar • publish sth on the internet • give your opinion on socialnetworks • to look at information on the internet • a group of interconnected computer networks • a website or computer program that allows people to communicate/share information on the internet • ...
THE INTERNET 2020-04-21
Across
- publish sth on the internet
- regular record of your thoughts, opinions or self-experiences you put on the internet for other people to read
- to look at information on the internet
- a group of interconnected computer networks
- to sound familiar
Down
- a website or computer program that allows people to communicate/share information on the internet
- give your opinion on socialnetworks
7 Clues: to sound familiar • publish sth on the internet • give your opinion on socialnetworks • to look at information on the internet • a group of interconnected computer networks • a website or computer program that allows people to communicate/share information on the internet • ...
Cyber Corner 2023-03-06
Across
- a signal that temporarily stops the execution of a program
- a number system with 16 digits, used in computing
- a device that connects two different networks
- a popular operating system
- a security system that prevents unauthorized access to a network
- the smallest unit of digital data
- a volatile memory used to store data that can be accessed quickly
- a program that translates code written in one language to another language
- a popular networking protocol
Down
- a set of rules governing the format and transmission of data
- a data structure that follows the first in first out (fifo) principle
- the process of finding and fixing errors in code
- a set of rules to solve a problem
- the process of adding information to a carrier signal
- a point of connection in a network
- the core of an operating system
- a small, fast memory used to store frequently accessed data
17 Clues: a popular operating system • a popular networking protocol • the core of an operating system • a set of rules to solve a problem • the smallest unit of digital data • a point of connection in a network • a device that connects two different networks • the process of finding and fixing errors in code • a number system with 16 digits, used in computing • ...
Unit 6 2022-04-07
Across
- method confirming identity using two or more means of authentication.
- data, applications, systems, networks, or physical space.
- error occurring when a person is falsely denied access.
- centralized database containing user accounts and security information.
- collection of trees.
- process of confirming the identity of a user.
- collection of network resources that share common directory database and policies.
- users, applications, or processes that need access to objects.
Down
- controls the type of access that is allowed or denied.
- process of validating identity.
- Granting or denying access to resources or a computer.
- error occurring when a person is falsely allowed access.
- network resources stored as objects in Active Directory.
- set of configuration settings applied to user or computers.
- ability to permit or deny access to network resources.
- similar appearance to credit cards, have an embedded memory chip used for authentication.
- group of related domains
17 Clues: collection of trees. • group of related domains • process of validating identity. • process of confirming the identity of a user. • controls the type of access that is allowed or denied. • Granting or denying access to resources or a computer. • ability to permit or deny access to network resources. • error occurring when a person is falsely denied access. • ...
Inter, Intro, Intra Crossword Puzzle 2024-04-10
Across
- Between multiple nations
- Time set between the length of a play or movie to rest or prepare for the next act
- Linked between two things
- To bring something within a new place or position
- Existing or occurring within a state
- To look within one’s own thoughts and feelings
- Burst between others who are having a conversation
- Networks that exist between each other
- A local computer network that stays within
Down
- Existing or taking place within a vein or veins in the human body
- To seize between or stop something from reaching its destination
- Situated, occurring, or done within the layers of skin on the body.
- To prefer to be within one’s own company
- To lead into what will be within the following passage
- A brief look within a passage or piece of music
- Something that travels between states, typically referring to the road
- To cut between
17 Clues: To cut between • Between multiple nations • Linked between two things • Existing or occurring within a state • Networks that exist between each other • To prefer to be within one’s own company • A local computer network that stays within • To look within one’s own thoughts and feelings • A brief look within a passage or piece of music • ...
Computer Technologies 2025-03-11
Across
- Number of instructions a CPU can execute per second
- Most common keyboard layout used in English-speaking countries
- 8 bits
- Network topology that connects all devices in a circular format
- Small, fast storage location within the CPU.
- Display which uses organic compounds that emit light when current flows
- Phase of the fetch-execute cycle that prepares the CPU for the next operation
- Wireless network connection used in home networks
- CPU component, performs mathematical operations and logical operations.
- Type of I/O interface which transmits both data and power
Down
- Acts as the central hub that connects all the components together.
- Protocol used to assign IP addresses dynamically
- Type of memory which stores frequently used instructions directly on the processor
- Splits internet connection among devices in a LAN.
- Father of Computing
- First commercially produced microprocessor was released in 1971.
- Brain of the computer
17 Clues: 8 bits • Father of Computing • Brain of the computer • Small, fast storage location within the CPU. • Protocol used to assign IP addresses dynamically • Wireless network connection used in home networks • Splits internet connection among devices in a LAN. • Number of instructions a CPU can execute per second • Type of I/O interface which transmits both data and power • ...
Risk Interest Group 2025-12-05
Across
- Access Control List defining allowed/denied permissions.
- Single software instance serves multiple customers with isolation.
- Public Key Infrastructure that manages certificates and trust.
- Algorithm that performs encryption and decryption.
- Cryptographic proof of data integrity and signer authenticity.
- Learning Algorithms that learn patterns from data to make predictions/decisions.
- AI Models that create new content (text, images, code) from learned patterns.
- Language Processing AI field enabling computers to understand and generate human language.
- Cloud model delivering virtualized compute, storage, and networking.
Down
- Automated coordination/management of services, containers, and workloads.
- Model memorizes noise in training data, hurting generalization.
- Authority Trusted entity that issues and validates digital certificates.
- Learning Machine learning using deep neural networks with many layers.
- Packaging apps and dependencies into portable, isolated containers.
- Controls network traffic based on security policies.
- Security Information and Event Management for log aggregation and analytics.
- Transforming plaintext into ciphertext using cryptographic keys.
17 Clues: Algorithm that performs encryption and decryption. • Controls network traffic based on security policies. • Access Control List defining allowed/denied permissions. • Public Key Infrastructure that manages certificates and trust. • Cryptographic proof of data integrity and signer authenticity. • Model memorizes noise in training data, hurting generalization. • ...
1.2 Compare and contrast networking appliances, applications, and functions 2025-07-14
Across
- Can block suspicious traffic in real time
- Connects devices within a LAN using MAC addresses
- High-speed network for connecting storage devices to servers
- Directs traffic between networks using IP addresses
- Type of appliance running on a hypervisor or cloud
- Distributes traffic across multiple servers to avoid overload
- Delivers web content quickly by using servers closer to users
- Acts as a gateway between users and the internet
Down
- Prioritizes certain types of network traffic for performance
- Monitors traffic and alerts when something seems suspicious
- Manages multiple wireless devices centrally
- Controls traffic flow using allow/deny rules
- Hardware-based network appliance you can touch
- Limits how long a data packet can exist before being discarded
- Provides shared file access over a network
- Creates an encrypted tunnel for private remote access
- Extends wireless coverage by allowing Wi-Fi connections
17 Clues: Can block suspicious traffic in real time • Provides shared file access over a network • Manages multiple wireless devices centrally • Controls traffic flow using allow/deny rules • Hardware-based network appliance you can touch • Acts as a gateway between users and the internet • Connects devices within a LAN using MAC addresses • ...
Merriam GPTW 2018-01-19
Across
- If you have a salad over 10oz in café what color coin do you get?
- How many conference rooms do we have?
- How many laps on the walking trail equal a mile?
- How many hours of volunteer time do you get per year?
- Who makes this a Great Place To Work?
- How many treadmills are in the get fit room?
- Where is the blood pressure machine located?
- Who is our site leader?
Down
- How many diversity networks are there?
- What day of the week can you wear your hat?
- Who is the manager of Sodexo?
- What is the speed limit in the parking lot?
- Name of the monthly newsletter?
- Where can you find the HR Portal?
- What day is yoga?
- According to the dress code are you allowed to wear sweatpants?
16 Clues: What day is yoga? • Who is our site leader? • Who is the manager of Sodexo? • Name of the monthly newsletter? • Where can you find the HR Portal? • How many conference rooms do we have? • Who makes this a Great Place To Work? • How many diversity networks are there? • What day of the week can you wear your hat? • What is the speed limit in the parking lot? • ...
Nervous System 2021-09-28
Across
- junction between two connecting neurons
- groups of neurons responsible for a specific function or behavior. (riding a bike, tying your shoe...)
- inhibitory neurotransmitter. low levels of this are associated with anxiety and phobia
- brain lobe responsible for memory, understanding, and language
- the part of the nervous system that controls voluntary movements
- nerve that connects to all organs, most important cranial nerve
- nerve that controls sense of smell
- neurotransmitter that decreases membrane permeability, lowers the chance for threshold to be activated
Down
- cells that connect blood vessels to neurons
- part of the brain responsible for higher mental function
- main portions of the spinal nerves combine to form complex networks
- rest and digest
- regulates mood and happiness
- masses of nerve cells that transmit information
- insulation surrounding nerves
- gland responsible for fear
16 Clues: rest and digest • gland responsible for fear • regulates mood and happiness • insulation surrounding nerves • nerve that controls sense of smell • junction between two connecting neurons • cells that connect blood vessels to neurons • masses of nerve cells that transmit information • part of the brain responsible for higher mental function • ...
EMB Greece Chapter Crossword 2024-07-30
Across
- the current EMB Greece secretary studies in this city
- a well known couple of biomedical scientists
- a type of transformation for dimensionality reduction
- action potential occurs across its membrane
- used in smartwatches to indrectly estimate heart rate
- surface EEG is used to identify its focus
- directs synthesis of specific proteins
- the most visually obvious part of an ECG
Down
- a type of time-scale transform
- protocol used in personal area networks
- will need to address it if you make health studies with humans
- z-transform is the discrete counterpart of this transform
- alterations to the genome that do not involve DNA mutation
- can be used to measure carotid blood flow and artery wall stiffness
- this theory related to deterministic nonlinear systems
- part of a gene that forms the final RNA
16 Clues: a type of time-scale transform • directs synthesis of specific proteins • protocol used in personal area networks • part of a gene that forms the final RNA • the most visually obvious part of an ECG • surface EEG is used to identify its focus • action potential occurs across its membrane • a well known couple of biomedical scientists • ...
computer terms 2017-10-18
Across
- a blend of songs, videos, or audio files made into one
- the illegal act of spammers trying to get information by disguising themselves as a business
- website showing links to other websites
- a game that lets players connect and interact with game together
Down
- saying something mean about someone online in ALL CAPS
- a website updated by a person providing mainly opinions
- downloadable video or audio file
- networks that allow sharing videos, MP3s, and digital files
- 2 or 3D icon representing the gamer
9 Clues: downloadable video or audio file • 2 or 3D icon representing the gamer • website showing links to other websites • saying something mean about someone online in ALL CAPS • a blend of songs, videos, or audio files made into one • a website updated by a person providing mainly opinions • networks that allow sharing videos, MP3s, and digital files • ...
An Introduction to HTML 2022-01-16
Across
- text that when clicked on will lead to another web page
- an application used to view webpages
- stores data about the web page
- a group of networks connected to share information
Down
- a group of web pages connected via hyperlinks
- a language used for writing websites
- a programming language which uses tags to translate text to a web page
- where the main content seen on the site is seen
- a collection of websites that we can access using the Internet
9 Clues: stores data about the web page • a language used for writing websites • an application used to view webpages • a group of web pages connected via hyperlinks • where the main content seen on the site is seen • a group of networks connected to share information • text that when clicked on will lead to another web page • ...
1st Semester World Geography ACP Review 2022-11-18
Across
- ecological community including plants and animals
- transportation, communication networks,sewage
- movement of weathered material by wind or water
- killing group of people from a nation or ethnicity
Down
- liquid or frozen water that falls to the earth
- winds that blow in the summer carrying moist air tornadoes violently rotating columns of air
- spread of people, things, ideas, diseases desalinization the process of removing salt from seawater
- cause high winds and large amounts of rainfall
- periodic warm ocean currents of the Pacific waters
9 Clues: transportation, communication networks,sewage • liquid or frozen water that falls to the earth • cause high winds and large amounts of rainfall • movement of weathered material by wind or water • ecological community including plants and animals • periodic warm ocean currents of the Pacific waters • killing group of people from a nation or ethnicity • ...
Computer terms 2023-09-03
Across
- Programs that run on the computer.
- A system of computers linked together to share programs and information.
- Anything that puts information into a computer (mouse, keyboard, scanner).
- Parts of the computer that you can touch.
- A computer network that links smaller computer networks across the world.
Down
- It is a device that "directs traffic" on a wireless network.
- A very small, portable hard drive that can store information for a computer.
- Anything that can display information (Monitor, printer, speakers).
- Programs that run on the computer
9 Clues: Programs that run on the computer • Programs that run on the computer. • Parts of the computer that you can touch. • It is a device that "directs traffic" on a wireless network. • Anything that can display information (Monitor, printer, speakers). • A system of computers linked together to share programs and information. • ...
PM003(08) 2017-03-20
Across
- A description of services that are rarely the same because they involve interactions between people.
- Form of cooperation between two or more brands, which can create synergies that create value for both participants, above the value they would expect to generate on their own.
- Where the time of production is very close or simultaneous with the time of consumption.
- This refers to a graph showing fewer products selling in large quantities versus many more products selling in low quantities
- Retailer’s own brand, e.g. Sainsbury’s Taste the Difference.
- Simply explained, it is a theory in which products or brands follow a sequence of stages, including introduction, growth, maturity and sales decline.
- The supplier delivers an important key component to the final product, e.g. Intel delivers its processor to the major PC manufacturers.
- A description for services that cannot be touched or tested and payment is for use or performance.
Down
- A description for services that cannot be stored for future use and can cause problems with matching supply and demand.
- A business activity of value exchanges that is accessible through electronic networks, which include the internet and mobile networks.
- This is the premium a customer/ consumer would pay for the branded product or service compared with an identical unbranded version of the same product/service.
- Normally brand communication involves just two senses – sight and hearing. This involves all five senses: sight, hearing (sound), smell, touch and taste.
- Type of advertising in which celebrities use their status in society to promote a product, service, charity or cause.
- The position that a product holds in a customer’s mind and can have an impact on premium pricing and competitive advantage.
- The time it takes from the conception of an idea until it is available for sale. TTM is important in those industries where products become quickly outmoded.
15 Clues: Retailer’s own brand, e.g. Sainsbury’s Taste the Difference. • Where the time of production is very close or simultaneous with the time of consumption. • A description for services that cannot be touched or tested and payment is for use or performance. • A description of services that are rarely the same because they involve interactions between people. • ...
Engineering Careers 2014-10-29
Across
- Solve medical problems in hospitals and medical companies.
- Distribute electricity and design electrical systems.
- Improve design and manufacturing of boats and watercraft.
- Reviewing and implementing production standards.
- Operate MRI equipment and solve calculations.
- Design heating and cooling systems.
- Build construction projects from roadways to office buildings.
- Computer applications software engineer.
- Design equipment in nuclear power plants.
- Draw designs of cars and trucks.
- Generate x-rays
- Maintain and design kitchen machinery.
- Design drawings and virtual models of yachts.
Down
- Design and install phone networks.
- Monitor instruments used on airplanes during flight.
- Monitor and develop alternative energy outputs.
- Install, service, maintain, and repair gas systems.
- Design ships.
- Create everything from iPhones to drilling components.
- Make sure manufacturing and shipping equipment work.
- Research in fields like environmental science and engineering.
- Examine jets, helicopters, etc.
- Design internal electronic components of PC computers.
- Design habitats for animals to be comfortable.
- Development of energy efficient lighting.
- Design and develop programs and applications.
26 Clues: Design ships. • Generate x-rays • Examine jets, helicopters, etc. • Draw designs of cars and trucks. • Design and install phone networks. • Design heating and cooling systems. • Maintain and design kitchen machinery. • Computer applications software engineer. • Design equipment in nuclear power plants. • Development of energy efficient lighting. • ...
FITE 2013-05-16
Across
- symbol for a company
- personal conduct online
- document or file made with a preset format
- one thousand terabytes
- a thousand bytes
- one thousand megabytes
- one thousand brontobytes
- search engine that checks all search engines
- wireless home network
- one thousand exabytes
- close up preview of a template
- one thousand petabytes
- protection of information computer/networks
- any type of internet hosting service
- appearence of a document
- port that connects the mouse or keyboard to PC
- one thousand yottabytes
Down
- arrangement of data for a computer
- Ex: mouse, flash drive
- one thousand zetabytes
- software used to search data
- one thousand gigabytes
- one million bytes
- a device that has a lot of data storage
- zoomable presentation program
- computer screen
- network name
- Ex:comcast,verizon
- Ex: monitor, printer
- eight bytes
- rules to keep people safe online
- smallest unit of data
- plug your flashdrive into
- Ex: headphones, speakers
- a short memorable phrase for advertising
35 Clues: eight bytes • network name • computer screen • a thousand bytes • one million bytes • Ex:comcast,verizon • symbol for a company • Ex: monitor, printer • wireless home network • one thousand exabytes • smallest unit of data • Ex: mouse, flash drive • one thousand zetabytes • one thousand gigabytes • one thousand terabytes • one thousand megabytes • one thousand petabytes • personal conduct online • ...
Mīkla 2018-01-08
Across
- A type of malicious software program.
- Person who penetrates systems.
- Biggest social media platform on the Internet.
- Organization that provides services accessing and using the Internet.(Acronym)
- Simple graphics editor that has been included with all versions of Microsoft Windows.
- Electronic circuitry within a computer that carries out the instructions of a computer program.
- Step-by-step walk-through for someone with no experience
- Computer network that interconnects computers within a limited area.(Acronym)
- Accessory to insert information.
- Enclosure that contains most of the components of a computer.
Down
- Programming language.
- specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images.(Acronym)
- web browser developed by Apple.
- Portable personal computer.
- Networking device that forwards data packets between computer networks.
- A device to keep hot components cool.
- Computer software that transform high-level programming language to machine code.
- Handheld personal computer with a mobile operating system.
- Biggest microprocessor manufacturer.
- Operating system.
20 Clues: Operating system. • Programming language. • Portable personal computer. • Person who penetrates systems. • web browser developed by Apple. • Accessory to insert information. • Biggest microprocessor manufacturer. • A type of malicious software program. • A device to keep hot components cool. • Biggest social media platform on the Internet. • ...
Module 5 2017-10-28
Across
- patterns, based on first language
- Stage, the brain recognizes words
- verbs, verbs that are conjugated following the same pattern
- Alphabetical Phase, the brain makes connection between letters in the words and the phonemes to pronounce it
- meaning of word
- brain area for speaking
- Alphabetical Phase, reading becomes more fluent
- Stage, a brain representation of a word as a picture
- representation of a word with letters
- Prominent, languages that place the topic as the central part of a sentence
Down
- Phase, the brain does not have any systemic letter-sound-connection
- verbs, verbs that are conjugated differently from other verbs
- sounds that form syllabi
- letters at the end of the word
- stage, the brain begins to decode letters into sounds
- Networks, clusters of words of the same type in the brain
- brain area for comprehension of hear and spoken words
- rhythm, cadence, pitch of spoken language
- letters before a word
- Alphabetical Phase, the brain recognizes high frequency words
20 Clues: meaning of word • letters before a word • brain area for speaking • sounds that form syllabi • letters at the end of the word • patterns, based on first language • Stage, the brain recognizes words • representation of a word with letters • rhythm, cadence, pitch of spoken language • Alphabetical Phase, reading becomes more fluent • ...
John Taylor May 2020-09-10
Across
- an act of uploading the display on screen
- a line of text at the top of the page
- a Uniform Resource Identifier
- to talk in a friendly or informal way
- any media that are encoded in machine-readable formats
- controlled by or connected to
- a link from a hypertext file
- a collection of names and addresses
- the environment where communicating over computer networks occur
- moving from page to page
- a correct way of communicating
- an identification used by a person
- a theme or characteristic
Down
- a computer or computer program
- a website where users can post comments
- a file system cataloging structure
- a list of questions and answers
- an identification string
- a collection of information
- an act of moving displayed text up and down
- a network of social interactions
- an act or process of uploading data
- a computer that mediates multiple access to a database
- to communicate with on twitter
- the state of communicating or meeting
25 Clues: an identification string • moving from page to page • a theme or characteristic • a collection of information • a link from a hypertext file • a Uniform Resource Identifier • controlled by or connected to • a computer or computer program • to communicate with on twitter • a correct way of communicating • a list of questions and answers • a network of social interactions • ...
Common Prefixes 2023-04-21
Across
- having many colors
- to put something in a new order beforehand
- a feeling of suffering together
- someone hired to work under a supervisor on a job
- after the regular game season
- 10 turns into 40
- a medicine that works against poison or disease
- a concert of instruments played together
- able to speak three different languages
- to put something in a new order again
- to join together again
- occurring every 200 years
- able to run by itself
- able to speak many different languages
- to join together
Down
- communication between computer networks
- to put or sink below the surface of water
- able to speak two different languages
- a self-written story about their life
- occurring between planets
- not daring
- before the regular game season
- to look similar as one
- to put off until after or late
- four-footed
- against associating with people
- to assemble together
- bringing together as one
- stool or table with three legs
29 Clues: not daring • four-footed • 10 turns into 40 • to join together • having many colors • to assemble together • able to run by itself • to look similar as one • to join together again • bringing together as one • occurring between planets • occurring every 200 years • after the regular game season • before the regular game season • to put off until after or late • stool or table with three legs • ...
Unit 5 Activity 2 - Savannah Hinton W3 2023-11-09
Across
- cardiovascular disease
- a test that records the electrical signals in the heart.
- a device used to control an irregular heart rhythm.
- when your heart does not pump enough blood to your body.
- creates radio waves to take clear pictures of your body.
- outside of, without
- vessel
- sound waves that create images of internal body structure.
- the process of recording
- chest organ that pumps blood throughout your body.
- when brain blood flow is blocked or sudden bleeding in brain.
- diabetes mellitus
- ventricular tachycardia
- acute coronary syndrome
Down
- it takes dynamic xray pictures of your heart
- electricity
- excessive
- a blood vessel that carries blood from the heart to the body.
- chest pain or discomfort that keeps coming back.
- networks of small vessels that perfuse tissues.
- blood vessels that carry blood throughout your body.
- a problem with the rate or rhythm of your heartbeat.
- cane-shaped vessel that delivers oxygen-rich blood in the body.
23 Clues: vessel • excessive • electricity • diabetes mellitus • outside of, without • cardiovascular disease • ventricular tachycardia • acute coronary syndrome • the process of recording • it takes dynamic xray pictures of your heart • networks of small vessels that perfuse tissues. • chest pain or discomfort that keeps coming back. • chest organ that pumps blood throughout your body. • ...
Operating Systems (Cyber 100) 2024-02-01
Across
- file extension for compressed files
- Microsoft's disk operating system that came before Windows.
- A cable that connects networks
- A graphical OS released by Google in 2007
- Apple's computer operating system.
- A computer software package that preforms a specific function directly for the end user.
- The OS portions that interface with hardware
- Eight bits make up this
- OS developed in the late 1960's by AT&T Bell Laboratories
- Memory used for short term tasks
Down
- The command to see your current windows version
- A language that can be used to style a web page
- The most common base version of Linux.
- Holds instructions and data when a program is executing.
- The default browser for Mac
- a textual language for creating web pages
- Bill Gate's operating system created in 1985
- The default browser for Windows
- What is the default browser for Linux?
- Commonly placed after a modem to route packets
- The way computers communicate using zeros and ones is?
21 Clues: Eight bits make up this • The default browser for Mac • A cable that connects networks • The default browser for Windows • Memory used for short term tasks • Apple's computer operating system. • file extension for compressed files • The most common base version of Linux. • What is the default browser for Linux? • a textual language for creating web pages • ...
DMR Ham Radio 2024-11-14
Across
- Hotspot software platform
- Clear voice communication
- Time division channel
- Interconnected repeater systems
- Digital Mobile Radio protocol
- Preconfigured DMR settings
- Extends radio coverage
- MHz VHF DMR frequency
- Talk group identifier
- Motorola repeater feature
- Popular DMR handheld model
- Chinese DMR encryption
- Fusion repeater integration
- Dashboard for BrandMeister users
- One-to-one DMR call
- U.S. BrandMeister server
- Personal DMR gateway
- Popular DMR network
- Prevents interference conflicts
Down
- User-friendly DMR network
- Icom’s digital radio mode
- Push-to-talk button
- DMR group communication
- Codeplug programming software
- Repeater operation mode
- Group of repeaters
- TDMA channel division
- Motorola DMR technology
- Low-bitrate voice codec
- MHz UHF DMR frequency
- Unique user identifier
- Fusion DMR alternative
- Direct radio-to-radio
- Versatile hotspot modem
- DMR-integrated location reporting
- High-speed DMR data
- Motorola DMR brand
- Real-time user info
- Kenwood digital alternative
- Digital network bridge
40 Clues: Group of repeaters • Motorola DMR brand • Push-to-talk button • High-speed DMR data • One-to-one DMR call • Real-time user info • Popular DMR network • Personal DMR gateway • Time division channel • TDMA channel division • MHz VHF DMR frequency • MHz UHF DMR frequency • Talk group identifier • Direct radio-to-radio • Extends radio coverage • Unique user identifier • Fusion DMR alternative • ...
cybercrime 2024-11-11
Across
- – Software that automatically displays or downloads ads.
- – Malware that replicates itself to spread across networks.
- – Software that records keystrokes to capture information.
- – Malicious code that attaches itself to programs and spreads.
- – Faking identity or location to deceive.
- - An unauthorized way to access a system.
- – Process of encoding data to protect it from unauthorized access.
- – Software designed to harm or exploit systems.
- – Stealing someone's personal information to impersonate them.
Down
- – Another term for Trojan malware.
- – Malware that demands payment to restore access.
- – Using technology to harass or bully someone.
- – A fraudulent scheme, often online, to steal money or information.
- – Security system that monitors and controls network traffic.
- – Software that secretly collects user information.
- – Distributed Denial of Service, an attack that overwhelms a network.
- – Malware disguised as legitimate software.
- – A person who breaks into computer systems.
- – A scam to trick people into giving personal information.
- – A network of infected computers controlled remotely.
20 Clues: – Another term for Trojan malware. • – Faking identity or location to deceive. • - An unauthorized way to access a system. • – Malware disguised as legitimate software. • – A person who breaks into computer systems. • – Using technology to harass or bully someone. • – Software designed to harm or exploit systems. • – Malware that demands payment to restore access. • ...
cybercrime 2024-11-11
Across
- - An unauthorized way to access a system.
- – A fraudulent scheme, often online, to steal money or information.
- – A person who breaks into computer systems.
- – Stealing someone's personal information to impersonate them.
- – Malware that demands payment to restore access.
- – Faking identity or location to deceive.
- – Malware disguised as legitimate software.
- – Software that secretly collects user information.
- – Another term for Trojan malware.
- – A network of infected computers controlled remotely.
Down
- – Malware that replicates itself to spread across networks.
- – Software designed to harm or exploit systems.
- – Distributed Denial of Service, an attack that overwhelms a network.
- – Using technology to harass or bully someone.
- – Software that records keystrokes to capture information.
- – Software that automatically displays or downloads ads.
- – Security system that monitors and controls network traffic.
- – Malicious code that attaches itself to programs and spreads.
- – A scam to trick people into giving personal information.
- – Process of encoding data to protect it from unauthorized access.
20 Clues: – Another term for Trojan malware. • - An unauthorized way to access a system. • – Faking identity or location to deceive. • – Malware disguised as legitimate software. • – A person who breaks into computer systems. • – Using technology to harass or bully someone. • – Software designed to harm or exploit systems. • – Malware that demands payment to restore access. • ...
Unit 5 - Assignment FAI 2025-04-25
Across
- Graph showing the relationship between two values.
- Tool in TensorFlow to visualize model performance.
- Visual output of data in graphs or charts.
- Google’s tool to study web user behavior and trends.
- AI-powered conversion of spoken audio into words.
- Python library used to create appealing statistical charts.
- Google’s cloud platform for coding with GPU support.
- Input type processed by AI to convert into text.
- Toolkit for real-time computer vision and image processing.
- Google’s open-source framework for machine learning.
Down
- Model architecture behind ChatGPT’s intelligence.
- OpenAI's chatbot that mimics human-like conversations.
- Amazon’s cloud service for hosting AI applications.
- Type of graph computation in PyTorch models.
- AI tool used to generate marketing content automatically.
- Feedback method to fine-tune AI using human ratings.
- Meta’s dynamic framework for AI and deep learning tasks.
- Python library for creating graphs and plots.
- Simple API for building neural networks in TensorFlow.
- Google’s AI that understands images, audio, video, and code.
20 Clues: Visual output of data in graphs or charts. • Type of graph computation in PyTorch models. • Python library for creating graphs and plots. • Input type processed by AI to convert into text. • Model architecture behind ChatGPT’s intelligence. • AI-powered conversion of spoken audio into words. • Graph showing the relationship between two values. • ...
Network Security & Protection 2025-05-14
Across
- Unique mark indicating authenticity or approval.
- Assurance that a party cannot deny their actions.
- Temporary credential for secure access.
- Reverting encrypted data back to its original form.
- Verifying user identity or access rights.
- Malicious software that secretly monitors user activity.
- Fraudulent attempts to obtain sensitive information online.
- Analyzing patterns in user actions for security.
- Converting data into a secure format.
- Luring victims with false promises or goods.
- Ensuring data remains accurate and unaltered.
- Software designed to detect and eliminate malware.
- Decentralized ledger technology for secure transactions.
Down
- Encrypted data that is unreadable without decryption.
- Readable data before encryption.
- Identifying individuals or objects based on characteristics.
- Secretly listening to private communications or data.
- Software that displays unwanted advertisements on devices.
- Unauthorized access to computer systems or networks.
- Malware that encrypts files for ransom payment.
- Secret word or phrase for user authentication.
- Identifying individuals using biological traits.
- Protecting personal information from unauthorized access.
23 Clues: Readable data before encryption. • Converting data into a secure format. • Temporary credential for secure access. • Verifying user identity or access rights. • Luring victims with false promises or goods. • Ensuring data remains accurate and unaltered. • Secret word or phrase for user authentication. • Malware that encrypts files for ransom payment. • ...
unit 3 2024-04-11
Across
- Predicts interaction based on distance and size
- Knowledge of one's surroundings
- Movement from one place to another
- Involuntary movement due to conflict
- Actions or reactions of individuals
- Migration through social networks
- Explains distribution of settlements
- Scattered distribution of phenomena
- Explains retail trade patterns
- Movement along specific routes
- Obstruction hindering movement or interaction
- Decrease in interaction with distance
- Return migration to place of origin
- Mutual dependency between regions
- Area migrants come from or go to
- Alternative closer to origin
Down
- Resistance to movement over distance
- Seeks refuge in another country.
- Forced to flee within country
- Temporary labor migrant
- Studies human actions and decisions
- Potential threat from natural events
- Connection between places or ideas
- Mental disposition towards a subject
- Preference or inclination in migration
- Threshold for effective interaction
- Ability to move or be moved
- Everything is connected spatially
- Mental processes like perception and reasoning
- Area of routine daily movement
30 Clues: Temporary labor migrant • Ability to move or be moved • Alternative closer to origin • Forced to flee within country • Explains retail trade patterns • Movement along specific routes • Area of routine daily movement • Knowledge of one's surroundings • Seeks refuge in another country. • Area migrants come from or go to • Migration through social networks • ...
Understanding Computers 2022-10-20
Across
- Represented by only two symbols or digits
- Gets very hot so it has its own heatsink with a fan
- A screen that shows an image or information.
- Application-switching keyboard shortcut
- Logical data, has only the values true or false
- Information processed & sent out from a computer
- a gate with an opposite output of the input
- Physical computer equipment such as a keyboard.
- Permanent storage of data and information
- Connects and transfers data between devices
- a gate with 1 output if all input is 1
- Gate with output of 1 even if only one input is 1
- Address book
Down
- Data that entered into or received by a computer
- Stores data and is editable
- The smallest unit of a computer
- Worldwide system of computer networks
- Common communications line within an area
- Programs like Microsoft products on a computer
- Main circuit board, a host to the computer
- Improves the performance of a computer
21 Clues: Address book • Stores data and is editable • The smallest unit of a computer • Worldwide system of computer networks • Improves the performance of a computer • a gate with 1 output if all input is 1 • Application-switching keyboard shortcut • Represented by only two symbols or digits • Common communications line within an area • Permanent storage of data and information • ...
English Around Us and Cyberbullying 2025-10-09
Across
- To give or show something to other people online.
- A machine like a phone, tablet, or computer.
- What people think or say about someone.
- Related to computers or electronic devices.
- Related to people or society.
- You use it to call, text, or play games.
- You need it to go online and find information.
- When you are connected to the internet.
Down
- Platforms like TV, radio, or social networks.
- Everything that happens to a person from birth to death.
- A group of words with a special meaning.
- Something that causes damage or hurt.
- Something that happens every day.
- The language we are studying.
- Something you share on social media.
- You listen to it on your phone or computer.
- When someone hurts or scares another person repeatedly.
- You watch it at the cinema or on streaming apps.
- Something fun you play on your phone or console.
- The basic unit of language.
20 Clues: The basic unit of language. • The language we are studying. • Related to people or society. • Something that happens every day. • Something you share on social media. • Something that causes damage or hurt. • What people think or say about someone. • When you are connected to the internet. • A group of words with a special meaning. • You use it to call, text, or play games. • ...
El tiempo libre (Entreculturas 3) 2025-09-23
Across
- campground
- it seems
- outside
- it was (preterite)
- soon
- I want
- city
- assignments
- all (singular/masculine)
- community
- tourists
- lie
- village
- welcome
- blog
- networks
- tapas
- to return (Empieza con v.)
- messages
- all (plural/masculine)
- market
- beach
- there is, there are
- to know (to be familiar with)
- studies
- to speak/to talk
- social (plural)
- animated (singular/masculine)
- daily (plural/feminine adjective)
- to chat
Down
- products
- because
- computer
- neighborhood
- summer
- ages
- food
- he/she invites
- all (plural/feminine)
- animated (singular/feminine)
- world
- to see
- to buy
- to have fun (reflexive)
- time (amount)
- free (as in available)
- prize
- people (singular)
- we live
- comments
- to contribute
- vacations
- photos
- air
- to publish
- to survive
- better
- activities
- they go
- they do/they make
- review
61 Clues: lie • air • soon • ages • food • city • blog • world • prize • tapas • beach • summer • I want • to see • to buy • photos • market • better • review • because • outside • village • we live • welcome • studies • they go • to chat • products • it seems • computer • tourists • comments • networks • messages • community • vacations • campground • to publish • to survive • activities • assignments • neighborhood • time (amount) • to contribute • he/she invites • social (plural) • ...
Communication tools 2025-09-25
Across
- a desktop email client for windows and macOS users.
- combines messaging and social media.
- talk to people online through video.
- communicate with people over video chat and messaging.
- manage emails, calendars, contacts, and tasks in one place.
- you can send messages, call.
- deliver messages across computers networks.
- open-source content management system.
- screen share, audio and video for participants.
- user-friendly and secure website builder.
- allows users to write and execute distributed program's
- send someone an instant message.
Down
- a platform that allows you to text and send photos to chat with people.
- the use of dedicated websites and applications to interact with people.
- eCommerce platform.
- communicate in the form of a video conference.
- learning tool.
- communicate with people through FaceTime
- cloud-based content creation platform
- an AI powered cloud communication platforms.
- helps teems communicate through direct messaging.
- a message sent by telegraph.
- create and edit web pages.
- social media platform that allows you to communicate with others.
24 Clues: learning tool. • eCommerce platform. • create and edit web pages. • you can send messages, call. • a message sent by telegraph. • send someone an instant message. • combines messaging and social media. • talk to people online through video. • cloud-based content creation platform • open-source content management system. • communicate with people through FaceTime • ...
Career Clusters Crossword Puzzle 2025-10-21
Across
- Computers, software, and IT specialists.
- Jobs related to hospitals and wellness.
- Teaching and learning professions.
- Business related to travel and vacations.
- Designing buildings and spaces.
- Managing money and budgets.
- The system of rules and legal work.
- The use of computers and gadgets in work.
- Buying and selling goods and services.
- Protecting natural resources and the planet.
- Helping people with social or personal needs.
- Sharing information through media and networks.
- Moving people and goods from place to place.
Down
- Building homes, bridges, and roads.
- Farming and growing food.
- Producing goods in factories.
- Running cities, states, and countries.
- Designing and building machines and structures.
- Creating and distributing news and entertainment.
- Creative fields like music, painting, and theater.
- Providing food and lodging for travelers.
- The study of human society and relationships.
- Protecting citizens through police and fire services.
- Promoting products and services to customers.
- Studying the natural world and experiments.
25 Clues: Farming and growing food. • Managing money and budgets. • Producing goods in factories. • Designing buildings and spaces. • Teaching and learning professions. • Building homes, bridges, and roads. • The system of rules and legal work. • Running cities, states, and countries. • Buying and selling goods and services. • Jobs related to hospitals and wellness. • ...
Different Type of Networks 2018-10-15
7 Clues: a piece of jewelry • could be mistaken with a star • are used to play games together • they are 9 meters long in Britain • you can find them throughout the galaxy • multiple computers connect to this with Ethernet cables • _____________ cable used to connect a computer to a switch on a wired network
Organizational Structure 2021-05-11
5 Clues: based on social networks • mostly adopted by small companies • the most popular organizational chart type • people with similar skills are pooled for work • the most simplest type of organizational structure
Skin 2013-10-03
Across
- Bacterial invasion with rapid tissue destruction and septic shock.
- Begin in hair follicle and spreads into the surrounding dermis.
- Collagen deposits, inflammation, and fibrosis with decreased capillary networks develop in the skin.
- High contagious infections
- grows quickly, and metastasizes early
Down
- Appears dry and scaly
- slow growing tumor.
- Affect scalp or body, thriving off human blood.
- Systemic disorders such as liver disease, and infections such as chickenpox
- Ingested substances like shellfish or certain fruits and drugs cause this.
- Abnormal activation of T cells and increase in cytokines in affected tissues.
- Infection of the dermis and subcutaneous tissue.
- Disrupted epidermal cells, causing blisters to form.
- Recurrent painful vesicles around mouth.
- Exposure to an allergen or by direct chemical or mechanical irritation of the skin.
- Caused by HPV.
- Fungal infections such as tinea, which may affect the feet.
17 Clues: Caused by HPV. • slow growing tumor. • Appears dry and scaly • High contagious infections • grows quickly, and metastasizes early • Recurrent painful vesicles around mouth. • Affect scalp or body, thriving off human blood. • Infection of the dermis and subcutaneous tissue. • Disrupted epidermal cells, causing blisters to form. • ...
Basic Computer Terms 2018-10-17
Across
- A small picture usually representing program or file
- A collection of computer files organized and saved together
- Device that converts computer screen into a printed image
- Transferring data from another computer to your computer
- A program used to view the Internet
- Used to input data by pressing keys
- A network of computers connected through the World Wide Web
- Central processing unit; the brain of the computer
- A document that is usually named and saved in a folder
Down
- Device used to select items and place insertion point on screen
- A device used to display information visually
- The physical parts of a computer
- Uniform resource locator; the address of a site on the World Wide Web
- Presentation program
- Occurs when a user presses a button on a mouse
- Harmful computer program designed to destroy or corrupt networks
- Spreadsheet program
17 Clues: Spreadsheet program • Presentation program • The physical parts of a computer • A program used to view the Internet • Used to input data by pressing keys • A device used to display information visually • Occurs when a user presses a button on a mouse • Central processing unit; the brain of the computer • A small picture usually representing program or file • ...
ch 16 2025-03-18
Across
- Nerve (X) providing most parasympathetic outflow
- Division of the ANS known as "fight or flight"
- Preganglionic fibers pass through the sympathetic chain without synapsing to reach these ganglia
- HORNS Location of sympathetic preganglionic neuron cell bodies
- These ganglia are located near the spinal cord for the sympathetic division
- A heightened state of awareness due to increased sympathetic activity
- These connect pre- and postganglionic fibers in the ANS
- INNERVATION This type of innervation occurs when most vital organs are controlled by both ANS divisions
- Another name for norepinephrine
Down
- Division of the ANS also called the craniosacral division
- The adrenal part that releases epinephrine
- The "rest and digest" division
- Term for a sympathetic preganglionic fiber
- Neurotransmitter released by most sympathetic postganglionic fibers
- These nerve networks in the thoracic and abdominopelvic cavities mingle autonomic fibers
- Ganglia found along the vertebral column
- Neurotransmitter released by parasympathetic postganglionic fibers
- NERVOUS SYSTEM The visceral motor system, AUTONOMIC NERVOUS SYSTEM
18 Clues: The "rest and digest" division • Another name for norepinephrine • Ganglia found along the vertebral column • The adrenal part that releases epinephrine • Term for a sympathetic preganglionic fiber • Division of the ANS known as "fight or flight" • Nerve (X) providing most parasympathetic outflow • These connect pre- and postganglionic fibers in the ANS • ...
Web Design 2023-01-06
Across
- distributed by electronic mean forming a message
- name a name which c person chooses to go by on online communication
- a device used for observing checking or keeping a record
- identifies a device on the internet or local network
- online world of computer networks
- characters that allow access to the computer system
- a global network which has a variety of information and communication facilities
Down
- irrelevant messages sent in large numbers on the internet
- a set of related web pages under the same domain name
- named after a rodent
- a piece of code that can corrupt the system or destroy data
- indicator you control with mouse
- identification used by a person with access to a computer
- address of a web page
- portable computer
- room an area on the internet where people can communicate
- regularly updated website
17 Clues: portable computer • named after a rodent • address of a web page • regularly updated website • indicator you control with mouse • online world of computer networks • distributed by electronic mean forming a message • characters that allow access to the computer system • identifies a device on the internet or local network • ...
Network Security 2018-08-24
Across
- puts up a barrier in between internal network and outside networks
- Determining the privileges to resources, objects, or data
- stop people from uploading or forwarding important information in an not safe way
- determining the privileges of a user
- cryptographic hash functions published by NIST
- Confidentiality, Integrity, Availability
- encrypts the connection from an endpoint to a network
- combines multiple layers of defenses at the edge and in the network
- blocks incoming attacks and controls outbound messages to prevent the loss of data
- countermeasures to avoid or fight against security risks
Down
- collections of equal and non-equal encryption algorithms
- determines physical location
- protects a wireless network
- hiding information in blocks or within images
- control web use, block threats, and deny access to malicious websites
- automatically sees activities that are not normal
- commonly used hash function that makes 128-bit hash value
- protection of information or information resources
- the only protection for the data when the defense fails
- Access, Authentication, Authorization
20 Clues: protects a wireless network • determines physical location • determining the privileges of a user • Access, Authentication, Authorization • Confidentiality, Integrity, Availability • hiding information in blocks or within images • cryptographic hash functions published by NIST • automatically sees activities that are not normal • ...
Unit 7 2018-04-10
Across
- revolution Transition to new manufacturing processes
- railroad Networks of routes and safe houses to free the slaves
- locomotive A railway locomotive that runs on a steam engine
- codes Status of slaves and their owners
- People who wanted to end slavery
- parts When something is made with rare parts never to be made again
- cady stanton Leading figure of early WRM
- Sending messages along a wire
- How much people want the supply you’re selling
- rights movement Discussed problems of women’s right
- The product that you are selling
Down
- b anthony Played a pivotal role in the WRM
- party A secret society
- douglass African American writer,abolitionist,reformist,orator, statesman
- jenny Key part in the industrial system for weaving.
- Where the country’s trade and industry is controlled by private owners
- movement Movement about non consumption of alcoholic beverages
- system Using machinery to divide the time of labor
- gin Separates seeds from cotton
- reform Social movement to make a great change
20 Clues: party A secret society • Sending messages along a wire • gin Separates seeds from cotton • People who wanted to end slavery • The product that you are selling • codes Status of slaves and their owners • cady stanton Leading figure of early WRM • b anthony Played a pivotal role in the WRM • reform Social movement to make a great change • ...
ISDM 2 crossword 2020-09-03
Across
- a command that checks to see if the network given is available or not
- convert the following binary number 11111
- software that hurts your computer
- binary digit; 1 or 0
- acronym for www
- a program that navigates the world wide web
- American Standard Code Info Interchange
- A network of hardware & software that people and organizations use to collect, filter, process, create, and distribute data
- This infects your computer, reproduce in your machines, infect others
- a software that supports the basic functions of a device
Down
- stores and retrieves digital data using one or more rigid rapidly rotating platters coated with magnetic material
- network of networks
- 1/1 billionth second
- 1/1 millionth second
- search engine found in 1995
- a command that finds the time it takes for a packet of information to travel between a local computer and a destination IP address or domain
- unwanted stuff installed on your machine
- 1/1000 second
- 8 bits
- dishonest scheme; fraud
20 Clues: 8 bits • 1/1000 second • acronym for www • network of networks • 1/1 billionth second • 1/1 millionth second • binary digit; 1 or 0 • dishonest scheme; fraud • search engine found in 1995 • software that hurts your computer • American Standard Code Info Interchange • unwanted stuff installed on your machine • convert the following binary number 11111 • ...
2nd Exam Review 2022-02-22
Across
- the primary role of the intestines
- sac that gives provision & protection for a developing baby
- PNS state of "rest & digest"
- type of muscle in blood vessels
- kneecap
- a word part that means "body"
- increased surface area of this increases gas exchange at the cell level
- the innermost lining of this structure sheds when no fertilized egg implants into it
- produces bile to break down fats
- they bring blood from the body, toward the heart
Down
- 2nd step of producing lots of AIP
- networks of capillaries wrap around these lung structures
- the largest section of the brain. The main thinking area
- pumping chambers of the heart
- the highly-synchronized contraction of this muscle pushes blood through the body
- nervous system built of interneurons
- how O2 & CO2 move between capillaries and alveoli
- type of neuron that causes a gland to secrete
- byproduct of light-dependent reactions
- neurotransmitters cross this
- blood part that fights infections
- a covering around the axon
22 Clues: kneecap • a covering around the axon • PNS state of "rest & digest" • neurotransmitters cross this • pumping chambers of the heart • a word part that means "body" • type of muscle in blood vessels • produces bile to break down fats • 2nd step of producing lots of AIP • blood part that fights infections • the primary role of the intestines • nervous system built of interneurons • ...
Isenberg 191 2021-09-03
Across
- Peach baskets + Springfield
- Innovation (blank)
- HOF SB Coach Sortino
- largest employer in WMass
- 1 in 10 employees globally
- Where WRs are made
- Wings, wings, wings!
- Yum! (blank) wall
- THE minute(man)
- Dr. Nagurney's (blank) networks
- Thanks IMG!
- Back-to-back-to-back-to-back-tback #1
- Walmart/Target/TraderJoes...everything Route
- $ interacts with risk & time
- (blank) Meals
- Chase's new platform
- Just under 10k loud
Down
- Bump, set, spike Holyoke
- Long before minutemen/women
- You don't pronounce the "H" in
- Where Dr. J operated
- Dr. Miller's new chair
- Most UMass sports; before 11
- Four tracks plus real estate
- Dr. Solak's new chair
- Center for entrepreneurial inspriration
- Dean (blank)
- Prepare for Big Four
- AD Yankees fan, but we forgive him
- Five tall and 11 small
- Taller than any other college
- Namesake CEO
- ED D&I
- Your Associate Dean
34 Clues: ED D&I • Thanks IMG! • Dean (blank) • Namesake CEO • (blank) Meals • THE minute(man) • Yum! (blank) wall • Innovation (blank) • Where WRs are made • Your Associate Dean • Just under 10k loud • Where Dr. J operated • HOF SB Coach Sortino • Prepare for Big Four • Wings, wings, wings! • Chase's new platform • Dr. Solak's new chair • Dr. Miller's new chair • Five tall and 11 small • Bump, set, spike Holyoke • ...
anglaisWhittaker 2021-06-18
Across
- A clothing for your head
- Famous sport
- Mammal with a horn
- Has a trunk
- Used to protect your accounts
- Likes to chase mouse
- Composed of bones
- Object that tells you the time
- Extraterrestrial
- A large red and green fruit of a plant
- Set of global networks
- Man's best friend
- an animal with a lot of wool
- Lollipop
Down
- A desert flower that stings
- Used to represents a country
- Red fruit
- Used to count
- A place to eat
- North polar regions
- Savannah's king
- Someone that tells a lot of lie
- Insect that make cobwebs
- An orange vegetable
- Star of light
- An extinct species
- Stone art that represents often a king
- Yellow fruit
- Flying vehicule
- Environmentally friendly vehicle
- Part of a tree
- A transparent wall
- A confortable furniture to sleep
- A beautiful red flower
- Audiio output
35 Clues: Lollipop • Red fruit • Has a trunk • Famous sport • Yellow fruit • Used to count • Star of light • Audiio output • A place to eat • Part of a tree • Savannah's king • Flying vehicule • Extraterrestrial • Composed of bones • Man's best friend • Mammal with a horn • An extinct species • A transparent wall • North polar regions • An orange vegetable • Likes to chase mouse • Set of global networks • ...
unit 5 lab: medical terminology 2021-10-01
Across
- heart is not efficiently pumping from the left ventricle, causing reduced blood flow.
- Cerebrovascular accident
- cardiovascular pulmonary resuscitation
- complete stopping of the heart.
- records the electrical activity of the heart.
- condition process or method
- beyond or excess
- vessels that return blood to the heart.
- pumps blood through the system.
- the pericardial sac around the heart is inflamed.
- evaluate how well this system is functioning.
- heart failure
- specialized area of radiology
Down
- Left ventricular assist device
- look at blood going through blood vessels to determine if they are narrowed or have a thrombus
- uses ultrasound to look at the heart and its vessels.
- an artery has a weakened wall, causing it to swell, like a balloon.
- small
- within
- without
- networks of small vessels that perfuse tissues.
- bring in air from the atmosphere and pass oxygen into the bloodstream.
- permanent pace maker
- vessels that deliver blood to tissues.
- increased pressure in the blood vessels.
25 Clues: small • within • without • heart failure • beyond or excess • permanent pace maker • Cerebrovascular accident • condition process or method • specialized area of radiology • Left ventricular assist device • complete stopping of the heart. • pumps blood through the system. • cardiovascular pulmonary resuscitation • vessels that deliver blood to tissues. • ...
Cardiovascular system 2022-05-25
Across
- networks of smell vessels perfuse tissues
- test- ultrasounds to look at heart and blood vessels
- Deep Vein Thrombosis
- vessels
- Atrioventricular
- pumps blood
- leads (wires) attached to chest that record electrical activity
- vessels that return blood back to the heart
- cutting into
- narrowing
- Acute Myocardial Infraction
- intensive care unit
- Automated External Defibrillator
- hardening in the arteries, can be caused by fat build up
Down
- heart not pumping from left ventricle resulting in reduced blood flow
- vessels that deliver blood to tissue
- x-ray dye called contrast is injected into blood vessels to diagnose things like stenosis
- portable ECG, records activity to show possible pattern for symptoms that are occurring
- used to measure certain items in blood that may indicate heart muscle damage
- pulse
- carries blood away from heart to the rest of your body
- hardening
- high blood pressure; increased pressure in blood vessels
- weakened wall in artery
- lack of blood flow/blockage in coronary arteries; "heart attack"
25 Clues: pulse • vessels • hardening • narrowing • pumps blood • cutting into • Atrioventricular • intensive care unit • Deep Vein Thrombosis • weakened wall in artery • Acute Myocardial Infraction • Automated External Defibrillator • vessels that deliver blood to tissue • networks of smell vessels perfuse tissues • vessels that return blood back to the heart • ...
Johnavon Marroquin 2016-12-01
Across
- the use of electronic communication to bully in person
- – a web page that allows collaborative editing
- private network
- OPERATORS and , or , not
- ENGINE identify ideas in a data base
- a list of books referred to in scholarly work
- to start over
- operate with a network
- global network communication
- USE the doctrine that brief excerpts of copyright material
- quotation of a reference
- a newspaper to the internet
- the unauthorized use
Down
- navigate the world wide web
- (HOST) names or in
- a link that takes you to a website
- taking someone else's work
- –an infecteve agent that typically consist of a nucleic acid
- accepted way to communicate on the internet
- copying people without permission
- TABS – bookmark
- a person who gets access to your computer
- stop from getting hacked
- NETWORKS a network of social interactions
- RESOURCE LOCATOR (URL) – location or address that tells you where documents are
25 Clues: to start over • TABS – bookmark • private network • (HOST) names or in • the unauthorized use • operate with a network • OPERATORS and , or , not • stop from getting hacked • quotation of a reference • taking someone else's work • navigate the world wide web • a newspaper to the internet • global network communication • copying people without permission • a link that takes you to a website • ...
Unit 5 Activity 2 - Savannah Hinton W3 2023-11-09
Across
- cardiovascular disease
- a test that records the electrical signals in the heart.
- a device used to control an irregular heart rhythm.
- when your heart does not pump enough blood to your body.
- creates radio waves to take clear pictures of your body.
- outside of, without
- vessel
- sound waves that create images of internal body structure.
- the process of recording
- chest organ that pumps blood throughout your body.
- when brain blood flow is blocked or sudden bleeding in brain.
- diabetes mellitus
- ventricular tachycardia
- acute coronary syndrome
Down
- it takes dynamic xray pictures of your heart
- electricity
- excessive
- a blood vessel that carries blood from the heart to the body.
- chest pain or discomfort that keeps coming back.
- networks of small vessels that perfuse tissues.
- blood vessels that carry blood throughout your body.
- a problem with the rate or rhythm of your heartbeat.
- cane-shaped vessel that delivers oxygen-rich blood in the body.
23 Clues: vessel • excessive • electricity • diabetes mellitus • outside of, without • cardiovascular disease • ventricular tachycardia • acute coronary syndrome • the process of recording • it takes dynamic xray pictures of your heart • networks of small vessels that perfuse tissues. • chest pain or discomfort that keeps coming back. • chest organ that pumps blood throughout your body. • ...
Chapter 11 Security Plus 2024-05-02
Across
- IT services using resources that are traditionally bound to hardware
- Virtualizing parts of physical network for reconfiguration.
- Special security challenges in spanning public/private spaces.
- VM breaking out to interact with host OS.
- Linux security architecture for access control.
- On-demand infrastructure for configurable computing resources.
- Dividing application development into smaller, manageable entities.
- Simplifies the process of building, deploying, and managing containerized applications
- Virtualized service extending WAN networks.
- Table listing security duties of user and cloud provider.
- Computing resources located on organization’s campus.
- AWS Lambda, Microsoft Azure Functions, Google Cloud Functions
- integrated, cloud-centric, and user-centric approach to network security.
Down
- External providers offering cloud security controls.
- Cloud security controls to mitigate vulnerabilities.
- Unique challenges to securing cloud usage.
- Method of packaging, distributing, and running applications .
- Equipment and personnel spread across different locations.
- provision computing infrastructure using code instead of manual processes.
- Local equipment and personnel at organization’s campus computing.
- Virtualization vulnerability exposing data to another VM.
21 Clues: VM breaking out to interact with host OS. • Unique challenges to securing cloud usage. • Virtualized service extending WAN networks. • Linux security architecture for access control. • External providers offering cloud security controls. • Cloud security controls to mitigate vulnerabilities. • Computing resources located on organization’s campus. • ...
Chapter 8 Introduction to Networking 2024-09-02
Across
- causes latency and troubleshooting issues
- 127.0.0.1
- Shows network connections and listening ports
- mechanism maintains agreement among devices
- routes the router does not have a direct connection
- IPv6 was developed by
- ::
- Automatically discover remote networks
- devices are not on the same LAN
- Largest data unit a network can transmit
- destination is on the same LAN
Down
- no establishment of a connection with destination
- routes are automatically added by the router
- Non-guaranteed network service
- When it becomes zero the router will discard the packet
- can be sent over any media type
- in IPV6 provide optional network layer information
- forwards traffic to a specific direction when there is not a match
- fields were removed from IPV6
- Layer 3 splits the IPv4 packet into smaller units
- Must be configured manually
- detect corruption in the IPV4 header
- field used for QoS
- IP address in the same range as the rest of the LAN
24 Clues: :: • 127.0.0.1 • field used for QoS • IPv6 was developed by • Must be configured manually • fields were removed from IPV6 • Non-guaranteed network service • destination is on the same LAN • can be sent over any media type • devices are not on the same LAN • detect corruption in the IPV4 header • Automatically discover remote networks • Largest data unit a network can transmit • ...
cybercrime 2024-11-11
Across
- – Software that secretly collects user information.
- – Malicious code that attaches itself to programs and spreads.
- – Software that records keystrokes to capture information.
- – A person who breaks into computer systems.
- – A fraudulent scheme, often online, to steal money or information.
- – Malware disguised as legitimate software.
- – Another term for Trojan malware.
- – Using technology to harass or bully someone.
- - An unauthorized way to access a system.
Down
- – Software designed to harm or exploit systems.
- – A network of infected computers controlled remotely.
- – Distributed Denial of Service, an attack that overwhelms a network.
- – A scam to trick people into giving personal information.
- – Malware that demands payment to restore access.
- – Stealing someone's personal information to impersonate them.
- – Malware that replicates itself to spread across networks.
- – Security system that monitors and controls network traffic.
- – Faking identity or location to deceive.
- – Software that automatically displays or downloads ads.
- – Process of encoding data to protect it from unauthorized access.
20 Clues: – Another term for Trojan malware. • – Faking identity or location to deceive. • - An unauthorized way to access a system. • – Malware disguised as legitimate software. • – A person who breaks into computer systems. • – Using technology to harass or bully someone. • – Software designed to harm or exploit systems. • – Malware that demands payment to restore access. • ...
Vocab 2024-11-01
Across
- to leave behind
- community
- club
- I am fascinated by (plural)
- diverse
- participate
- team
- religious community
- temple
- indigenous people
- jews
- dances
- a I belong to
- things in common
- muslims
- to pray
- get together (gathering)
- pride
- to join
- to have fun
- to get together
- mosque
- organizations
- a to get used to
- world
Down
- for a long time
- to miss
- traditional
- I like (plural)
- a tradition
- immigrants
- culture shock
- multi-lingual
- I am fascinated by (singular)
- It interests me
- to do things together
- a to move (home)
- members
- I like (singular)
- holidays
- They interest me
- group
- adapt
- languages
- de I am a part of
- I am a member of
- social networks
- parades
- traditional clothes
- a custom
- enjoy
- of the same age
- neighborhood
53 Clues: club • team • jews • group • adapt • enjoy • pride • world • temple • dances • mosque • to miss • diverse • members • parades • muslims • to pray • to join • holidays • a custom • community • languages • immigrants • traditional • a tradition • participate • to have fun • neighborhood • culture shock • multi-lingual • a I belong to • organizations • for a long time • I like (plural) • to leave behind • It interests me • social networks • of the same age • ...
ia3 2025-04-05
Across
- or fundamental assets.
- organization's public perception, a key asset.
- weakness in a system exploitable by a threat actor.
- potential harm from exploiting a vulnerability.
- website developer using this creates a vulnerability.
- ability to bounce back from disruptions.
- act of establishing a BCMS (two words).
- likelihood and consequence of a potential event.
- 'C' in BCMS, referring to ongoing operational capability.
- events are examples of these.
- emails trying to steal information.
- taken to protect computer systems and networks.
Down
- resources a BCMS aims to safeguard.
- first step in vulnerability management.
- piece of personal information targeted in phishing.
- security system that monitors network traffic.
- used by hackers to gain system access (abbr.).
- formal examination of a BCMS.
- piece of personal information targeted in phishing.
- 'M' in BCMS, overseeing the system.
- documented set of actions for specific crisis scenarios.
- provides a management ______.
- common medium for deploying phishing attacks via phone text.
- form for Business Continuity Plan.
- 'T' in BCP Test Plan.
25 Clues: 'T' in BCP Test Plan. • or fundamental assets. • formal examination of a BCMS. • provides a management ______. • events are examples of these. • form for Business Continuity Plan. • resources a BCMS aims to safeguard. • 'M' in BCMS, overseeing the system. • emails trying to steal information. • first step in vulnerability management. • act of establishing a BCMS (two words). • ...
Friends, Networking & Teamwork 2025-09-14
Across
- Assigning tasks or responsibilities to others.
- The ability to recognize and manage emotions in oneself and others.
- The process of solving disagreements in a constructive way.
- Ensuring everyone feels valued and included.
- Understanding and sharing the feelings of others.
- The unity and harmony within a group.
- Leading by empowering others and sharing decision-making.
- Discussing to reach a mutual agreement.
Down
- Intervening to help resolve conflicts between parties.
- Guiding a group process to ensure productive discussions and outcomes.
- Skills used to interact effectively with others.
- The combined effort of a group that achieves more than the sum of individual efforts.
- General agreement within a group.
- Expressing opinions confidently and respectfully.
- Supporting others, especially marginalized groups, to promote equality.
- Building professional relationships for mutual benefit.
- Working together to achieve a common goal.
- Relying on each other mutually to achieve common goals.
- Taking ownership of one’s actions and commitments.
- The value gained from networks of relationships that enable cooperation.
20 Clues: General agreement within a group. • The unity and harmony within a group. • Discussing to reach a mutual agreement. • Working together to achieve a common goal. • Ensuring everyone feels valued and included. • Assigning tasks or responsibilities to others. • Skills used to interact effectively with others. • Expressing opinions confidently and respectfully. • ...
Cyber Ethics Puzzle by Arush 2025-05-20
Across
- Footprint: The trail of data you leave behind online
- The right to keep your personal information secure
- Unwanted or junk messages, often email
- A malicious program that spreads from device to device
- Converting data into a secret code
- Moral principles governing behavior
- Permission to use or access something
- Legal protection for original creative works
- Breach: Unauthorized access to private or confidential data
- A barrier that protects a network from threats
- A mutual understanding or contract between parties
Down
- Theft: Using someone else’s personal data without permission
- Software designed to harm or damage a device
- A secret word or phrase used to access accounts
- Trick to steal personal data through fake websites or emails
- Unauthorized access to computer systems or networks
- Media: Websites and apps for sharing and interacting online
- A person who posts offensive or annoying messages online
- A dishonest scheme to trick someone for personal gain
- Online harassment or bullying using digital platforms
20 Clues: Converting data into a secret code • Moral principles governing behavior • Permission to use or access something • Unwanted or junk messages, often email • Software designed to harm or damage a device • Legal protection for original creative works • A barrier that protects a network from threats • A secret word or phrase used to access accounts • ...
IT 2025-07-21
Across
- To find and fix errors in code.
- Programs and other operating information used by a computer.
- A number system using only 0s and 1s.
- Unsolicited or junk email.
- A device that forwards data packets between networks.
- An organized collection of data.
- A popular high-level programming language.
- The process of gaining access to a computer system.
- A global network connecting millions of computers.
- An identifier used by a person to access a computer system.
Down
- A step-by-step procedure for solving a problem or performing a task.
- A group of connected computers that share resources.
- The process of encoding data to prevent unauthorized access.
- The physical parts of a computer.
- The rules that define the structure of a programming language.
- A security system that monitors and controls network traffic.
- Software designed to harm or exploit a computer system.
- An input device used to type text.
- A high-level programming language known for its readability.
- A type of malicious software that replicates itself.
20 Clues: Unsolicited or junk email. • To find and fix errors in code. • An organized collection of data. • The physical parts of a computer. • An input device used to type text. • A number system using only 0s and 1s. • A popular high-level programming language. • A global network connecting millions of computers. • The process of gaining access to a computer system. • ...
Cybersecurity Crossword 2025-09-04
Across
- Update that fixes a vulnerability
- Scrambles data securely
- Training and phishing simulation partner (two words)
- Software that protects against malicious code
- Practice of protecting networks, devices and data from unauthorized access or criminal use
- A phishing email sent for practice
- Cybersecurity Awareness Month
- Attempts by hackers to cause harm, destroy, or access sensitive information
- Harmful software
- Button for suspicious emails (two words)
Down
- Cybersecurity mascot
- Process of confirming your identity
- Blocks network intruders
- Cybercriminals disguise their identity as a trusted source to exploit an unassuming user
- Creates a secure connection to another online network
- Mimecast option to allow emails into your inbox
- Someone who tries to access data they aren’t authorized to view
- Email security partner
- Unauthorized data access
- Sending emails or other messages purporting to be from a reputable source
- Software that obtains covert information by transmitting data covertly
- Malware that demands money
- Mimecast option to stop emails from being received
- Secret word for login
24 Clues: Harmful software • Cybersecurity mascot • Secret word for login • Email security partner • Scrambles data securely • Blocks network intruders • Unauthorized data access • Malware that demands money • Cybersecurity Awareness Month • Update that fixes a vulnerability • A phishing email sent for practice • Process of confirming your identity • Button for suspicious emails (two words) • ...
CSP Review. 2025-12-08
Across
- How ready the U.S. military is for nuclear war
- The movie we saw with Brad Pitt
- Central Processing _
- Files that lose no data when compressed and decompressed
- A search engine whose name is inspired by a really large number
- Lines in the code editor the interpreter ignores
- Vint Cerf, the father of the _
- Small chunks of data sent across networks
- A type of virus that takes a user's data and encrypts it until money is received for the decryption key
- Internet service provider
Down
- small text files websites to remember and track you
- The thing people in the late 90's were scared of
- Hypertext Markup Language
- How many bits are in a byte
- DNS _ makes users think they're visiting a legitimate site, but really on a malicious one
- not or no longer needed or useful; superfluous.
- The term for refresh rate
- _ commons, the organization that provides free, easy-to-use copyright licenses
- A computer that beat some humans at Jeopardy
- A cute elephant
20 Clues: A cute elephant • Central Processing _ • Hypertext Markup Language • The term for refresh rate • Internet service provider • How many bits are in a byte • Vint Cerf, the father of the _ • The movie we saw with Brad Pitt • Small chunks of data sent across networks • A computer that beat some humans at Jeopardy • How ready the U.S. military is for nuclear war • ...
Crossword Review 2025-12-08
Across
- Rules and regulations we all agree to use.
- One of the 5 V's; speed.
- Data with values that change continuously.
- Finding and fixing problems in a program.
- A bug people worried about from switching from the year 1999 to 2000.
- Tool from google that shows popularity.
- A way to leave notes in code.
- Electric current or voltage.
- Use of computer program to record every keystroke.
Down
- IBM computer that played on Jeopardy.
- Networking device that forwards data packets between networks.
- Type of AI carried out to do human-like tasks.
- Max amount of data that can be sent in bits per second.
- Finite, step-by-step set of instructions
- A collection of commands made available to a programmer.
- Unit of digital information, typically consisting of 8 bits
- Type of AI carried out to do one task.
- Collecting data from others so you can analyze it.
- Picture Element, smallest square on a screen
- Error when the computer tries a number too large.
20 Clues: One of the 5 V's; speed. • Electric current or voltage. • A way to leave notes in code. • IBM computer that played on Jeopardy. • Type of AI carried out to do one task. • Tool from google that shows popularity. • Finite, step-by-step set of instructions • Finding and fixing problems in a program. • Rules and regulations we all agree to use. • ...
Brandon's AP Comp Sci Crossword 2025-12-08
Across
- Converting analog data to digital by taking measurements
- Base-2 number system using 0s and 1s
- Compression that removes no data
- Tiny electronic switch inside CPUs that processes bits
- Standard that encodes text as numbers
- Scrambling data so only someone with the key can read it
- Base-16 number system used in computing
- Address of a web page on the Internet
- Time it takes for data to travel from source to destination
Down
- Attack that overwhelms a server using many devices
- Step-by-step instructions for solving a problem
- Observation that transistor counts double about every 2 years
- Maximum amount of data sent per second
- Device that forwards data packets between networks
- Smallest dot of color in a digital image
- Unit of digital info equal to 8 bits
- Reliable protocol ensuring packets arrive correctly
- New Internet addressing system using 128-bit addresses
- Central processor that executes program instructions
- Software designed to harm or disrupt a computer
20 Clues: Compression that removes no data • Base-2 number system using 0s and 1s • Unit of digital info equal to 8 bits • Standard that encodes text as numbers • Address of a web page on the Internet • Maximum amount of data sent per second • Base-16 number system used in computing • Smallest dot of color in a digital image • Step-by-step instructions for solving a problem • ...
Chapter 5 - Crime and Security 2025-11-12
Across
- requiring users to do multiple authentications checks
- ensuring systems are available
- the use of computers or networks to perform unethical activity
- ensuring private data remains private
- the process of transforming data into secret code to prevent theft
- process where security professionals report vulnerabilities within the system
- psychological feelings and characteristics for an individual
- the state of being protected or safe
- not likely to cause harm
- ensuring data is not changed without correct authentication
Down
- the process of proving something is true
- automated measurements to discover physical or behavioral characteristics
- a method to bypass regular authentication. Usually used by law enforcement
- the use of hacking to hurt or benefit a political cause
- the state of being exposed and the potential of being harmed
- the process of simulating cyberattacks on a system
- people who can help protect the digital world
- individuals that will be using the system created
- an act that is considered shameful or wrong
- irresponsible or destructive action performed by a criminal
20 Clues: not likely to cause harm • ensuring systems are available • the state of being protected or safe • ensuring private data remains private • the process of proving something is true • an act that is considered shameful or wrong • people who can help protect the digital world • individuals that will be using the system created • ...
CYBERCRIME 2021-07-13
Across
- it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
- an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.
- an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
- any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
- it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
- criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
- terrorist activity that targets computer networks and information systems for attack.
- an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
- an act emending certain provisions of republic act no. 8293
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- an act providing for the recognition and electronic commercial and non-commercial transactions and documents penalties for the unlawful use thereof and for other purposes.
- a general term for a variety of computer codes ( such as viruses, logic bombs and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- it occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
- any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
- the act of copying digital material posted online into the storage medium on one’s computer.
- the interactional space or environment created by linking computers together into a communication network.
- political activism and social protest that uses hacking tools and techniques.
- market economic activity undertaken via the internet or similar electronic communication networks.
- the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
- stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
- unauthorized access to the entire or any part of a computer system.
Down
- sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
- group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
- it is doing psychological harm to or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
- a program is secretly attached to the company’s computer system.
- unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- it is one computer is used to reprogram another for illicit purposes.
- an illegally obtains data from a computer system by leaking it out in small amounts.
- an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
- a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- an investment scheme in which investors are promised abnormally high profits on their investments.
- act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
- property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
- most computer programs used in business have built-in anti-theft safeguards.
- a techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
- the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
- it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
- a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
- it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
- the most sensitive component as prevention from cybercrime.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.
- it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
- the right to be left alone freedom from observation and interference from others.
- these can be used to store copies of files from the computer for use in his investigation.
51 Clues: an act emending certain provisions of republic act no. 8293 • the most sensitive component as prevention from cybercrime. • a program is secretly attached to the company’s computer system. • unauthorized access to the entire or any part of a computer system. • it is one computer is used to reprogram another for illicit purposes. • ...
ISDM 2 Crossword By:Jesus Garcia 2020-09-03
Across
- bot that systematically browses the World Wide Web
- Locks your machine and payment is needed to get it back
- System of computer networks
- perception that the number of transistors on a microchip doubles every two years
- infects your computer
- What protocol does the internet use?
- standalone malware that replicates to spread to other computers
- Evil Software
- A program that searches for and identifies items in a database that correspond to keywords or characters
- stores file that can be accessed anywhere
Down
- ads begin to pop up
- a word, phrase, or image that you can click on to jump to a new document or a new section within the current document.
- Precursor to the internet
- Pretends to be legit but is dangerous
- acts like a traffic manager for packets
- standard markup language for documents
- program with a graphical user interface for displaying HTML files
- Bits of information that travel in a computer
- Digital currency
- unwanted items are installed in your system
20 Clues: Evil Software • Digital currency • ads begin to pop up • infects your computer • Precursor to the internet • System of computer networks • What protocol does the internet use? • Pretends to be legit but is dangerous • standard markup language for documents • acts like a traffic manager for packets • stores file that can be accessed anywhere • ...
unit 5 lab 2021-10-20
Across
- a tubular structure carrying blood through the tissues and organs
- vessels that deliver blood to tissues
- when a part of the heart muscles doesn't get enough blood
- decreased blood flow and oxygen to the heart muscles
- percutaneous coronary intervention
- the use of ultrasound waves to investigate the action of the heart
- When one of the vessels that lead to the brain either becomes blocked by a blood clot or bursts
- vessels that return blood to the heart
Down
- cardiovascular disease
- produce immages of your heart,lungs,etc
- pumps blood through the system
- to determind the stability of a given system
- A condition in which the heart beats with an irregular or abnormal rhythm
- a scientific examination of a sample
- combining form indicating a blood vessel
- meaning pertaining to
- networks of small vessels that perfuse tissue
- a combining form used like a prefix meaning "heart"
- a magnetic resonance imaging to create pictures of your heart
- drug-eluting stent
- Electrocardiogram
- bare metal stent
22 Clues: bare metal stent • Electrocardiogram • drug-eluting stent • meaning pertaining to • cardiovascular disease • pumps blood through the system • percutaneous coronary intervention • a scientific examination of a sample • vessels that deliver blood to tissues • vessels that return blood to the heart • produce immages of your heart,lungs,etc • combining form indicating a blood vessel • ...
Bison Hunting Unit 2 Lesson 2 Topic 3 2021-12-01
Across
- ____________ Was a very bad sickness
- _________ were often proceeded by religious ceremonies such as the Sun Dance
- the __________
- hunters hunted for ___________
- __________ Controlled the camp and had the ability to punish anyone who broke the rules
- Hunters gathered at ___________
- __________became well known throughout the North American continent because of their crops.
- Women dried the meat, stored the fat, and made _______
- trade networks carried corn north and west into the Missouri Valley and ____________
Down
- _________ Lived in the woodlands east of the Great plains
- __________ in hides was traded to other tribes or to Anglo Americans for other things they needed
- a place in North Dakota is ______________
- __________ was a game that involved speed and accuracy
- ________ meant White Bison were rare or sacred
- Father G.A. Belcourt went on bison hunt
- ________ was eaten fresh or used in soups
- a Hidatsa women named ____________
- is high in protein
- wolf chief was born into a _________ family around 1850
- _________hunted bison, deer, elk, and antelope
20 Clues: the __________ • is high in protein • hunters hunted for ___________ • Hunters gathered at ___________ • a Hidatsa women named ____________ • ____________ Was a very bad sickness • Father G.A. Belcourt went on bison hunt • a place in North Dakota is ______________ • ________ was eaten fresh or used in soups • ________ meant White Bison were rare or sacred • ...
Crossword for relaxation 2016-11-21
Across
- / Overcrowding
- / Battery part
- / Interlinked group
- / Pierced with holes
- / An integrated circuit that contains all the functions of a central processing unit of a computer
- / Able to be maintained
- / Arousing one's curiosity or interest
- / The effective center of network
- / Fusing metals
- / Skill of being able to find correct way to place
- / Narrow track
- / Communications device
- / A statistic characterizing human populations
- / First model of something
- / Points of connection
- / Set up a computer
Down
- / Sudden important success or discovery
- / Predicting
- / A usual or ordinary thing
- / A board for making an experimental model of an electric circuit
- / The part of a network that connects other networks together
- / To become worse
- / The property of being connected
- / Something bought for later profit
- / Steep, rapid fall
- / Single thread
- / Any nonverbal action or gesture that encodes a message
- / Opposite of success
- / Not controlled by outside forces
- / Set used to broadcast radio or tv signals
30 Clues: / Predicting • / Overcrowding • / Battery part • / Narrow track • / Single thread • / Fusing metals • / To become worse • / Interlinked group • / Steep, rapid fall • / Set up a computer • / Pierced with holes • / Opposite of success • / Points of connection • / Able to be maintained • / Communications device • / First model of something • / A usual or ordinary thing • ...
Volunteering Information Sheet Crossword 2012-10-31
Across
- Ready for you to get or to use
- Knowledge and skill
- A group of people or a business
- To place a person or a group on a list
- Large in area, amount, degree, etc.
- A project , undertaking etc. that is difficult but interesting
- Any system of linked parts e.g. people
Down
- To ask for something in a polite way
- A state of having a good opinion of oneself
- To increase in amount
- Organized information or facts stored in a computer
- The money gained in trade, business, etc.
- To make something (e.g. activity) happen, fit, together in harmony with others
- Past tense of pay, can be used as an adjective
- To make something better or stronger
- Connected with special knowledge of machines for example
- To give someone else an idea to think about
- Not stopping, having no end
- Someone who does work but does not want to be paid for it
- The teaching of a sport
20 Clues: Knowledge and skill • To increase in amount • The teaching of a sport • Not stopping, having no end • Ready for you to get or to use • A group of people or a business • Large in area, amount, degree, etc. • To ask for something in a polite way • To make something better or stronger • To place a person or a group on a list • Any system of linked parts e.g. people • ...
Decades Crossword For 80s and 90s 2013-05-14
Across
- someone who believes in and practices the religion of Islam
- worldwide linking of computer networks
- Reagan Man who was elected as president in 1981
- the amount of money owed
- movie based on a board game that takes you into a fantasy land
- the use of violence by groups against civilians to achieve a political goal
- people organizing at the local level around the nation
- to make a formal accusation of wrongdoing against a public official
- Teenage Mutant Ninja Turtles
- A notifiable bacterial disease of sheep and cattle, typically affecting the skin and lungs
- Yeltsin president of Russian Republic
Down
- layer of gas
- Unity or agreement of feeling or action among individuals with a common interest
- cutting the rules and regulations of government agencies placed on a buisness
- Intermediate-Range Nuclear Forces
- artists who made "U Can't Touch This"
- opening soviet society to new ideas
- under control of Muslim fundamentalist
- Strategic Arms Reduction Treaty
- Clinton man who was reelected as president in 1997
20 Clues: layer of gas • the amount of money owed • Teenage Mutant Ninja Turtles • Strategic Arms Reduction Treaty • Intermediate-Range Nuclear Forces • opening soviet society to new ideas • artists who made "U Can't Touch This" • Yeltsin president of Russian Republic • worldwide linking of computer networks • under control of Muslim fundamentalist • ...
Hayli Enriquez 2015-05-01
Across
- RESOURCE LOCATOR (URL) Full website address. Example:
- to it; www.Wikipedia.com
- Network etiquette; Online manners; following the rules of conduct for online or internet users,
- a list of citations that appear at the end of a paper, article,
- software used to view various kinds of Internet resources
- To renew or revitalize; To reload a webpage on the internet
- or book.
- A collaborative website which can be directly edited by anyone with
- communication
- and text. Example: www.google.com
- the unauthorized use, reproduction, distribution, or transmission of copyrighted
Down
- An unauthorized person who secretly gains access to computer
- a good digital citizen.
- twitter, instagram)
- on the Web.
- (like pirates – its stealing)
- A part of a computer system or network that is designed to block unauthorized access while permitting
- A bully who operates online, in cyberspace; To bully
- NETWORKS online communities where people meet, socialize, exchange digital files, etc.
- ENGINE Software that searches and gathers and identifies information from a database based on keywords,
20 Clues: or book. • on the Web. • communication • twitter, instagram) • a good digital citizen. • to it; www.Wikipedia.com • (like pirates – its stealing) • and text. Example: www.google.com • A bully who operates online, in cyberspace; To bully • RESOURCE LOCATOR (URL) Full website address. Example: • software used to view various kinds of Internet resources • ...
Tech Crossword 2016-02-02
Across
- something that eeryone is doing or is in style
- posting pointless things on the internet
- where you put links to websites
- when someone keeps posting everything they get to rub it in
- Most visited social networking site
- place where you post videos and is very popular
- when you make your posts only viewable to people you want
- site that you post pictures
- sending messages to other people without actually talking but typing
Down
- where you can video call friends
- place where you can purchase items
- emblem is a blue bird and your posts are called tweets
- a site where you buy used items from people
- term that says whatever you do online is permanent
- Six second videos
- websites where people go to post virtually anything
- posts daily on a certain topic
- online site where you can watch tv shows and movies
- most popular search engine
- the first of the social networks
20 Clues: Six second videos • most popular search engine • site that you post pictures • posts daily on a certain topic • where you put links to websites • where you can video call friends • the first of the social networks • place where you can purchase items • Most visited social networking site • posting pointless things on the internet • a site where you buy used items from people • ...
tech terms 2023-11-27
Across
- read-only memory
- a network security device that prevents unauthorized access
- the brain
- malicious software
- portable document format
- text files used to identify a computer as it uses a network
- Domain Name System
- cords used to connect devices ina local wired area
- electronic devices that convert digital data signals into modulated analog signals.
- a website designed to make it easy for users to create entries in chronological order.
- reloading the operating system of a computer
- 8 bits
Down
- the main printed circuit board within a computer
- taking information from somewhere and uploading it in another place
- random-access memory
- uniform resource locator
- Personally Identifiable Information
- operations support systems
- a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
- hyper text markup language
- a device that connects packet witch networks or subnetworks
- 1,000,000 bytes
- the smallest unit of data
23 Clues: 8 bits • the brain • 1,000,000 bytes • read-only memory • malicious software • Domain Name System • random-access memory • uniform resource locator • portable document format • the smallest unit of data • operations support systems • hyper text markup language • Personally Identifiable Information • reloading the operating system of a computer • ...
Body Tissues 2022-10-30
Across
- most abundant connective tissue fiber
- eases joint movement; firm but flexible support
- involuntary
- connects tissues and organs together
- bone
- outer layer of cells
- dense connective tissue attach bone to bone
- multiple layers
- between epithelium/connective tissue
- continuous sheet of tightly packed cells
- can differentiate into many specialized cells
- fiber made of protein called elastin
- protects and assists neurons
- single layer
Down
- multiple layers and cell shape changes
- most widely distributed; is stretchable
- cube-shaped cell
- scar tissue results
- heart muscle
- key component of connective tissue
- unit that conducts a nervous impulse
- functional new tissue replaces damaged ones
- liquid matrix surrounding blood cells
- skeletal muscle
- secretes fluid to prevent friction
- modified cells that produce mucus
- flat, scale-like cell
- fiber that occurs in networks
- gives rise to connective and muscle tissue
- acts as a storage depo for excess food
- dense connective tissue attach muscle to bone
- there are three types of this membrane
32 Clues: bone • involuntary • heart muscle • single layer • skeletal muscle • multiple layers • cube-shaped cell • scar tissue results • outer layer of cells • flat, scale-like cell • protects and assists neurons • fiber that occurs in networks • modified cells that produce mucus • key component of connective tissue • secretes fluid to prevent friction • unit that conducts a nervous impulse • ...
Ancient Near East- Basic Knowledge 2024-08-18
Across
- Created the world’s first professional army
- It replaced bronze due to availability and cheapness
- Credited with writing the first law code in history
- This enabled long distance trade
- Neo-Babylonian king know for building the Hanging Gardens and destroying Jerusalem
- World first known conqueror
- Idea and practice developed by the Phoenicians to expand their trade networks
- Oldest known monotheistic faith
- These allowed maritime trade
Down
- Oldest known work of fiction in human history
- Area made up of the land between the Tigris and Euphrates and the Levant Coast
- Language family originating in the Near East and including Hebrew, Aramaic, and Phoenician
- World’s first civilization
- A specialized worker trained in the use of writing
- First metal used large-scale in human history
- Oldest form of writing known to man
- Principle upon which the first law code operated
- New method of writing developed by the Phoenicians
- Belief in only one god
- Stepped pyramid located in the middle of Sumerian cities
20 Clues: Belief in only one god • World’s first civilization • World first known conqueror • These allowed maritime trade • Oldest known monotheistic faith • This enabled long distance trade • Oldest form of writing known to man • Created the world’s first professional army • Oldest known work of fiction in human history • First metal used large-scale in human history • ...
Structure and Functions of Animal and Plant Cells 2024-08-30
Across
- these are responsible for protecting plants from water loss
- most abundant glial cell in the CNS
- muscle control of the skeletal muscle
- it gives rise to the secondary xylem and phloem
- tissues that contain networks of nerve cells allowing transmission and reception of electrochemical impulses
- sclerenchyma has two kinds: fibers and ______
- satellite cells are found in the _______
- only complex permanent tissues in plants
- ground tissues are also called ______ tissues
- cardiac muscle is found in the ______
Down
- secondary growth in plants increases their diameter and _______
- type of connective tissue that contains plasma
- simple permanent tissues consists of ground tissues and _______ tissues
- cartilage is made up of cells called ________
- type of epithelial tissue with an elongated shape and is found in the respiratory tract lining: _______ columnar
- types of permanent tissues: simple and ______
- vascular tissues consists of phloem and _______
- In plants, primary growth increases their _____
- the 4 types of tissues found in animals: epithelial, muscular, skeletal, _______
- these cells regulate the closing and opening of stomata
20 Clues: most abundant glial cell in the CNS • muscle control of the skeletal muscle • cardiac muscle is found in the ______ • satellite cells are found in the _______ • only complex permanent tissues in plants • cartilage is made up of cells called ________ • types of permanent tissues: simple and ______ • sclerenchyma has two kinds: fibers and ______ • ...
ML vs AI vs DL 2024-10-11
Across
- ML task of assigning labels to inputs
- ML task focused on predicting continuous values
- Backbone of deep learning models
- Problem in both ML and DL where the model fits noise
- Intelligence Broad field aiming to simulate human intelligence
- AI field focused on interpreting images and videos
- Learning Subset of ML using neural networks with many layers
- Ability of a model to perform well on unseen data
- Step-by-step procedures for solving ML problems
Down
- AI field focused on understanding human language
- Key goal of AI to perform tasks without human intervention
- Popular framework for deep learning models
- Learning type where models learn through rewards and penalties
- Learning Subset of AI focused on learning from data
- Type of learning where models learn from labeled data
- Inputs used by models to make predictions
- Type of learning where models find patterns in unlabeled data
- Key components of deep learning architectures
- Core element used for training ML and DL models
- Training method used in deep learning
20 Clues: Backbone of deep learning models • ML task of assigning labels to inputs • Training method used in deep learning • Inputs used by models to make predictions • Popular framework for deep learning models • Key components of deep learning architectures • ML task focused on predicting continuous values • Core element used for training ML and DL models • ...
crossword 2024-10-20
Across
- A device that directs data traffic within networks
- Wireless technology for connecting devices to the internet
- A program designed to disrupt or damage a computer system
- A popular social media platform for sharing photos
- Sending data from your computer to the internet
- The smallest unit of data in computing
- The physical components of a computer (8 letters)
- Temporary storage on a computer
- A graphical representation of a program or file
- A service for storing data over the internet
Down
- Software that allows browsing the web
- Hardware that displays output from a computer
- A high-speed internet connection type
- A global network connecting millions of computers
- A secret word for accessing a computer system
- A portable computer
- A system for connecting computers within a small area
- Electronic mail, a method of sending messages over the internet
- A central device for connecting multiple computers in a network
- The brain of the computer
20 Clues: A portable computer • The brain of the computer • Temporary storage on a computer • Software that allows browsing the web • A high-speed internet connection type • The smallest unit of data in computing • A service for storing data over the internet • Hardware that displays output from a computer • A secret word for accessing a computer system • ...
IT 2023-04-26
Across
- The device responsible for the graphics displayed on the screen is the card...
- A device for entering documents into a computer
- The program in the demo version
- The name of the standard image editor for Windows
- The smallest element of the image displayed on the screen
- A popular internet search engine
- Computer screen
- The part of the computer known as RAM is ... operating
- E.g. Windows
- A unit of recording and storing data in a computer.
Down
- Mouse controlled
- A network made up of computers and local networks located within the city limitsq
- One of the text editors
- Portable computer
- The longest key on the keyboard for spacing
- Excel, part of the Office suite, is ... a spreadsheet
- One of the most important parts of a computer is ... the main one
- Allows you to read and write data
- The smallest unit of information processed by a computer, can take the value "0" or "1"
- A collection of computer files, a catalog
20 Clues: E.g. Windows • Computer screen • Mouse controlled • Portable computer • One of the text editors • The program in the demo version • A popular internet search engine • Allows you to read and write data • A collection of computer files, a catalog • The longest key on the keyboard for spacing • A device for entering documents into a computer • ...
Computer Parts/Commonly Used Softwares-Vebushan 2022-09-29
Across
- Commonly used web browser
- Used to print out stuff onto paper
- Makes the audio output go to your ears
- Solid Storage
- Cools off CPU
- Competitor of IOS
- Networks properly between devices
- Another way to display output from the PC Personal Computer
- Used to give power to the PC
- Quick storage
- Used to play games
- Used as a mouse for laptops
- Used to increase volume by a lots
Down
- Circuit Board for a PC
- Graphics Processing Unit
- You use this to Type
- Directs and speeds up wifi connection
- Spinning Disk Storage
- Something that holds everything together
- Apple operating system
- Commonly used to play music
- Allows the PC to turn on
- Used to pick up voices/sounds
- Extra space for expansion card
- Used to navigate through files
- Used to display output from the PC
- Central Processing Unit
- Short for operating system
28 Clues: Solid Storage • Cools off CPU • Quick storage • Competitor of IOS • Used to play games • You use this to Type • Spinning Disk Storage • Circuit Board for a PC • Apple operating system • Central Processing Unit • Graphics Processing Unit • Allows the PC to turn on • Commonly used web browser • Short for operating system • Commonly used to play music • Used as a mouse for laptops • ...
RU ITEC41 2025-04-18
Across
- Converting data into a secure format to prevent unauthorized access.
- Protection of data and systems from cyber threats.
- Ensuring information is only accessible to authorized individuals.
- Safeguarding data from unauthorized access or damage.
- Legal rights over creations, such as digital content.
- Legal entitlements related to digital privacy and data.
- A weakness that can be exploited in a system.
- Deceptive attempts to acquire sensitive information, often via email.
- Software designed to disrupt or damage systems.
- Unauthorized access to or exposure of data.
Down
- Limiting access to data or systems based on authorization.
- The accuracy and consistency of data.
- Responsibility for actions and decisions, especially regarding data.
- Permission granted for the use of personal data.
- Illegal activities conducted through digital means.
- The trace of an individual's online activity.
- Defense against digital threats and attacks.
- Monitoring or tracking of online activity.
- Unauthorized access to systems or networks.
- The right to keep personal information secure and undisclosed.
20 Clues: The accuracy and consistency of data. • Monitoring or tracking of online activity. • Unauthorized access to systems or networks. • Unauthorized access to or exposure of data. • Defense against digital threats and attacks. • The trace of an individual's online activity. • A weakness that can be exploited in a system. • Software designed to disrupt or damage systems. • ...
Digital Education 2025-05-07
Across
- The information contained within a website or document
- A piece of electronic equipment like a phone or tablet
- – The way in which parts are arranged visually
- Software designed to perform a group of functions
- A browser feature that lets you open multiple websites
- A page on the World Wide Web
- A visual element such as a picture or chart
- To look for something online
- Another word for a computer application
- The act of sharing information
Down
- A saved link to a web page for quick access
- The global system of connected computer networks
- Free from danger, often used in context of internet browsing
- Information collected and used for reference or analysis
- The customs and beliefs of a particular group
- The name of a document, book, or infographic
- Facts provided or learned about something
- The part of a device you look at
- A program used to access the internet
- Words that are written or printed
20 Clues: A page on the World Wide Web • To look for something online • The act of sharing information • The part of a device you look at • Words that are written or printed • A program used to access the internet • Another word for a computer application • Facts provided or learned about something • A saved link to a web page for quick access • ...
ICT 2025-01-30
Across
- A copy of data stored for safety.
- Delivering content over the internet in real-time.
- A computer designed for use at a desk.
- A screen that can be controlled by touching it.
- Information that is collected and processed by a computer
- To transfer data from a computer to the internet.
- A collection of web pages accessible on the internet.
- A device that directs internet traffic between networks.
- A device used to type on a computer.
Down
- The physical components of a computer.
- The process of writing instructions for computers.
- A wireless technology for short-range communication.
- Software that protects against malicious software.
- A software program designed for specific tasks.
- Programs and applications used on a computer.
- A system that monitors and controls network traffic.
- To transfer data from the internet to a computer.
- Remote servers to store and process data.
- A secret code used to access secure systems.
- A collection of data stored on a computer.
20 Clues: A copy of data stored for safety. • A device used to type on a computer. • The physical components of a computer. • A computer designed for use at a desk. • Remote servers to store and process data. • A collection of data stored on a computer. • A secret code used to access secure systems. • Programs and applications used on a computer. • ...
Computer Viruses 2025-08-23
Across
- Criminal who breaks into systems (HACKER)
- Fake messages to trick users into revealing data (PHISHING)
- Program that locks files and demands money (RANSOMWARE)
- General term for harmful software (MALWARE)
- Malware that hides its presence from users/OS (ROOTKIT)
- Self-replicating program that spreads over networks (WORM)
- Malicious part of a virus that causes damage (PAYLOAD)
- Secret code method to secure data (ENCRYPTION)
- Malicious software that opens a hidden way into a system (BACKDOOR)
Down
- False warning about non-existent malware (HOAX)
- Malware hidden inside useful software (TROJAN)
- Program that records keystrokes (KEYLOGGER)
- A network of infected computers controlled remotely (BOTNET)
- A harmful program that disrupts a computer system (VIRUS)
- Security system that blocks unauthorized access (FIREWALL)
- A malicious code triggered by specific events (LOGICBOMB)
- Unwanted or junk email messages (SPAM)
- Software that removes or blocks harmful programs (ANTIVIRUS)
- Software that secretly collects user information (SPYWARE)
- Software that displays unwanted advertisements (ADWARE)
20 Clues: Unwanted or junk email messages (SPAM) • Criminal who breaks into systems (HACKER) • Program that records keystrokes (KEYLOGGER) • General term for harmful software (MALWARE) • Malware hidden inside useful software (TROJAN) • Secret code method to secure data (ENCRYPTION) • False warning about non-existent malware (HOAX) • ...
ICTTTT 2025-09-29
Across
- – The system of methods used in research.
- – A grouped set of lines in a poem.
- – A substance that speeds up a chemical reaction.
- – A security system that blocks unauthorized access.
- – The smallest unit of matter.
- – The main character in a story.
- – Published works used as research sources.
- – A set of step-by-step instructions for solving a problem.
- – The data transfer capacity of a network.
- – Process by which plants make food using sunlight.
- – A comparison using “like” or “as.”
- – The force that pulls objects toward each other.
Down
- – A subset of a population used for study.
- – A figure of speech that directly compares two unlike things.
- – Repetition of initial consonant sounds in nearby words.
- – A device that forwards data between networks.
- – A community of organisms and their environment.
- – A factor that can change in an experiment.
- – A testable prediction or explanation for an observation.
- – An organized collection of structured data.
20 Clues: – The smallest unit of matter. • – The main character in a story. • – A grouped set of lines in a poem. • – A comparison using “like” or “as.” • – The system of methods used in research. • – A subset of a population used for study. • – The data transfer capacity of a network. • – Published works used as research sources. • – A factor that can change in an experiment. • ...
ICTTTT 2025-09-29
Across
- – The system of methods used in research.
- – A grouped set of lines in a poem.
- – A substance that speeds up a chemical reaction.
- – A security system that blocks unauthorized access.
- – The smallest unit of matter.
- – The main character in a story.
- – Published works used as research sources.
- – A set of step-by-step instructions for solving a problem.
- – The data transfer capacity of a network.
- – Process by which plants make food using sunlight.
- – A comparison using “like” or “as.”
- – The force that pulls objects toward each other.
Down
- – A subset of a population used for study.
- – A figure of speech that directly compares two unlike things.
- – Repetition of initial consonant sounds in nearby words.
- – A device that forwards data between networks.
- – A community of organisms and their environment.
- – A factor that can change in an experiment.
- – A testable prediction or explanation for an observation.
- – An organized collection of structured data.
20 Clues: – The smallest unit of matter. • – The main character in a story. • – A grouped set of lines in a poem. • – A comparison using “like” or “as.” • – The system of methods used in research. • – A subset of a population used for study. • – The data transfer capacity of a network. • – Published works used as research sources. • – A factor that can change in an experiment. • ...
ai in marketing 2025-10-23
Across
- = Using past data to forecast future trends
- = Relying too much on machine suggestions
- = Protection of personal information collected by AI systems
- = The study of how people buy and use products
- = An AI tool that communicates with users in natural language
- = A set of rules that an AI follows to make decisions
- = The creation of new ideas and technologies in marketing
- = AI detecting emotions in text or social media
- = Using AI to complete tasks without human effort
- = How people and AI systems work together
Down
- = Tailoring marketing messages to individual customers
- = AI suggesting products to customers
- = Very large sets of information analyzed by computers
- = Machines that can think and learn like humans
- = Promoting products using online platforms
- = Advanced machine learning using neural networks
- = Moral principles guiding the responsible use of AI
- = Adapting global AI tools to local cultures
- = A computer system modeled after the human brain
- = A type of AI that improves automatically through experience
20 Clues: = AI suggesting products to customers • = Relying too much on machine suggestions • = How people and AI systems work together • = Using past data to forecast future trends • = Promoting products using online platforms • = Adapting global AI tools to local cultures • = The study of how people buy and use products • = Machines that can think and learn like humans • ...
RU ITEC411 2025-11-24
Across
- – Unwanted bulk email messages.
- – Security system that blocks unauthorized access to a network.
- – Legal protection for creative works.
- – Deception intended for financial or personal gain.
- - Program that attaches to files and spreads when those files are shared.
- – (__ of Service) Attack that floods a system with traffic to make it unusable.
- – Right to control personal information.
- – Process of scrambling data to protect confidentiality.
- - Fraudulent emails or websites that trick users into revealing personal information.
Down
- – Persistent unwanted monitoring or following online.
- – the kind of theft that means stealing personal information to impersonate someone.
- – Rules enforced by government to regulate behavior.
- – Self-replicating program that spreads independently across networks.
- – Harassment or intimidation carried out through digital communication.
- – Illegal copying or distribution of software, music, or movies.
- – Moral principles guiding responsible technology use.
- - Software created to damage, disrupt, or gain unauthorized control of systems.
- – Malicious program disguised as legitimate software.
- – Measures taken to protect systems and data.
- - Person who gains unauthorized access to computer systems.
20 Clues: – Unwanted bulk email messages. • – Legal protection for creative works. • – Right to control personal information. • – Measures taken to protect systems and data. • – Rules enforced by government to regulate behavior. • – Deception intended for financial or personal gain. • – Persistent unwanted monitoring or following online. • ...
November Edition 2025-12-07
Across
- What will connect India's AI hub to Google's global networks?
- A tax placed on imported goods
- What group's event did Seton Hall students attend on September 25
- Journalist killed in Saudi Arabia
- ADOR CEO who was demoted
- Natural landmark the side of the Louvre that was broken into faced
- Shortname for Bolivia's Movement for Socialism
- What country did a Seton Hall student intern in with the AFCA?
- Gang coalition formed in Port-au-Prince, Haiti
- Visiting scholar who talked to the John Quincy Adams Society
- Country where most of the fentanyl in America is imported from
- The program many students wanted to bring back to the School of Diplomacy
- Former Prime Minister of Bangladesh
Down
- Superbowl LX Halftime Performer
- New millennial saint
- Paramilitary group in Sudan
- Chilean singer who performed at Coachella in 2023
- UNAIDS South Africa Director
- Spokesperson for the UN Secretary-General
- Company that owns Sora 2
- District where a landslide occurred on November 15
21 Clues: New millennial saint • ADOR CEO who was demoted • Company that owns Sora 2 • Paramilitary group in Sudan • UNAIDS South Africa Director • A tax placed on imported goods • Superbowl LX Halftime Performer • Journalist killed in Saudi Arabia • Former Prime Minister of Bangladesh • Spokesperson for the UN Secretary-General • Shortname for Bolivia's Movement for Socialism • ...
civil law of end to end digitalization 2024-03-12
Across
- a decentralized communication model where interconnected nodes or individuals share resources or information without the need for a central server. Cryptocurrencies operate on P2P networks to facilitate direct transactions between users.
- a programmed event in some cryptocurrencies, such as Bitcoin, where the block rewards earned by miners are reduced by half after a certain number of blocks are mined. Halving events occur periodically to control inflation, scarcity, and mining rewards in the network.
- refers to a distributed database where data, once written, cannot be altered or deleted. Blockchain technology provides immutable ledgers for cryptocurrencies to ensure transparency and security.
- trusted data sources that provide external information to smart contracts on blockchains. Oracles help smart contracts access real-world data, such as prices, weather conditions, or events, enabling decentralized applications to interact with external systems.
- refers to a cryptocurrency wallet that is not connected to the internet, providing offline storage for digital assets to enhance security and protect against hacking attacks.
- short for market capitalization, is the total value of all circulating coins or tokens of a cryptocurrency. Market cap is calculated by multiplying the current price per unit by the total circulating supply, indicating the project's relative size and value in the market
- the process of validating and adding new transactions to a blockchain by solving complex mathematical problems. Miners are rewarded with newly minted cryptocurrencies for their computational efforts.
- a consensus algorithm used in blockchain networks where miners compete to solve complex mathematical puzzles to validate transactions and create new blocks. The first miner to find the solution is rewarded with cryptocurrency.
- an online platform that allows users to buy, sell, and trade cryptocurrencies. Exchanges facilitate the conversion of digital assets and provide liquidity for the crypto market.
- also known as transaction fee, is the amount of cryptocurrency paid by users to execute transactions, smart contracts, and operations on blockchain networks. Gas fees compensate miners for processing transactions and maintaining network security
- a type of cryptocurrency designed to minimize price volatility by pegging its value to a stable asset like fiat currency, commodities, or other cryptocurrencies. Stablecoins provide a reliable medium of exchange and store of value in the crypto market
- refers to the computational power or speed at which a miner's hardware can solve cryptographic puzzles and process transactions on a blockchain network. Hash rate is a critical factor in mining operations and network security.
- cryptocurrencies that focus on enhancing user anonymity and transaction privacy by employing advanced encryption techniques and privacy protocols. Privacy coins prioritize confidentiality and censorship resistance in financial transactions
- refers to the ease and speed at which an asset, such as a cryptocurrency, can be bought or sold in the market without significantly impacting its price. Liquidity is essential for efficient trading, price stability, and market depth in cryptocurrency exchanges.
Down
- refers to a category of financial applications and protocols built on blockchain technology that aim to provide decentralized alternatives to traditional financial services such as lending, borrowing, and trading.
- occurs in a blockchain when a new set of rules is implemented, resulting in a divergence from the existing protocol. Forks can be classified as soft forks (backwards compatible) or hard forks (non-backwards compatible
- a self-governing entity or community run by smart contracts and governed by token holders on a blockchain. DAOs operate without centralized control and enable decentralized decision-making and resource allocation
- a mathematical algorithm that converts input data into a fixed-length string of characters. Hash functions are vital for securing transactions in cryptocurrencies by creating unique digital signatures.
- refers to interoperability solutions that allow different blockchain networks to communicate and transfer assets seamlessly. Cross-chain technology enables the exchange of digital assets and data across multiple blockchains
- a fundraising method in which a project or company issues digital tokens to investors in exchange for funding. ICOs are used to raise capital for blockchain projects and decentralized applications
- refers to adherence to laws, regulations, and guidelines set by governmental authorities or financial institutions governing the use of cryptocurrencies and blockchain technology. Compliance measures are essential for ensuring legal operation and risk management in the crypto industry.
- refers to the act of spending the same cryptocurrency tokens or digital assets more than once by exploiting vulnerabilities in a blockchain network. Double spending attacks can undermine the security and trustworthiness of digital transactions.
- known as a seed phrase or mnemonic, is a series of words used to restore access to a cryptocurrency wallet in case of loss, theft, or device failure. Recovery phrases ensure secure backup and restoration of wallet funds
- a self-executing contract with the terms of the agreement directly written into code. Smart contracts automatically enforce and execute the terms of the contract when predefined conditions are met.
- a unique digital asset that represents ownership or proof of authenticity for a specific item, art piece, collectible, or virtual asset. NFTs are indivisible, verifiable on blockchains, and are used in digital art, gaming, and collectibles
- a unique alphanumeric string used to receive, send, or store digital assets in a cryptocurrency wallet. Wallet addresses serve as identifiers for transactions and ensure accurate delivery of funds between users on blockchain networks.
- refers to government-issued currencies that are not backed by a physical commodity such as gold or silver. Fiat currencies, like the US Dollar or Euro, are used as legal tender for commerce and trade, and serve as a benchmark for cryptocurrency prices
- a formal document that outlines the technology, features, goals, and economics of a blockchain project or cryptocurrency. Whitepapers provide detailed information to investors, developers, and stakeholders about the project's vision and implementation
- the process of converting real-world assets or rights into digital tokens on a blockchain. Tokens represent ownership, value, or access rights and can be traded or utilized within decentralized applications.
- refers to the use of algorithms and computer programs to automatically execute trades in financial markets based on predefined criteria such as price, volume, or timing.
30 Clues: refers to the use of algorithms and computer programs to automatically execute trades in financial markets based on predefined criteria such as price, volume, or timing. • refers to a cryptocurrency wallet that is not connected to the internet, providing offline storage for digital assets to enhance security and protect against hacking attacks. • ...
Puzzle 1 2023-09-27
5 Clues: Google's Machine Learning Framework • A Key Component of Artificial Neural Networks • Programming Language Known for its Versatility • JavaScript Framework for Building User Interfaces • Iterative Software Development Methodology Focused on Collaboration
