networks Crossword Puzzles
Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29
Across
- Someone who posts rude or off-topic messages in an online community
- malware,cyber-destroyer, break your technology
- Rules or manners for interacting courteously with others online
- Setting up a fake online profile
- unwanted emails
- A hostile and insulting interaction between internet users.
Down
- Sharing someone’s secrets or embarrassing information online
- An image that is captured of what is shown on a phone, tablet, or computer screen
- Online communities, also known as social networks
- A technology that allows us to access our files through the internet from anywhere in the world.
10 Clues: unwanted emails • Setting up a fake online profile • malware,cyber-destroyer, break your technology • Online communities, also known as social networks • A hostile and insulting interaction between internet users. • Sharing someone’s secrets or embarrassing information online • Rules or manners for interacting courteously with others online • ...
Addiction 2020-12-24
Across
- A kind of social media platform which has a blue icon.
- A kind of social media platform which has a yellow icon.
- Building virtual networks and communities. A medium through which we share ideas and make friends.
- Medical care given to a person with an illness.
- A mental process involving thinking.
Down
- A hormone and neurotransmitter which is responsible for how we feel pleasure.
- Related to Maslow's Hierarchy
- A kind of social media platform which has a pink/purple/white icon.
- abuse Excessive use of psychoactive drugs.
- Someone who is addicted to something.
10 Clues: Related to Maslow's Hierarchy • Someone who is addicted to something. • A mental process involving thinking. • abuse Excessive use of psychoactive drugs. • Medical care given to a person with an illness. • A kind of social media platform which has a blue icon. • A kind of social media platform which has a yellow icon. • ...
School readiness 2020-10-21
Across
- over a period of time you might make this
- an group of people or organisations working together to provide support
- sharing information and working together with others
Down
- assessment taking place during learning
- a way of keeping track of learning over a long period of time
- the screening that takes place in Year 1
- we use this to assess a child's stage of development
- assessment done at the end of learning
- children learning letters and words
- the summative assessment carried out by June of a child's last year in nursery
10 Clues: children learning letters and words • assessment done at the end of learning • assessment taking place during learning • the screening that takes place in Year 1 • over a period of time you might make this • we use this to assess a child's stage of development • sharing information and working together with others • ...
Crossword Puzzle for IT 2021-08-04
Across
- What is the first word in the acronym ISP?
- What is a device that routes traffic between networks?
- What is a system for connecting a number of computers systems to form a local area network?
- What are the set of rules by which computers communicate?
- What does LAN stand for?
- What is the first word in the acronym DNS?
- What is it called when you reboot a device with either a cold or warm boot?
Down
- What is a local or restricted communications network?
- What is 8 bits called?
- What does WAN stand for?
10 Clues: What is 8 bits called? • What does WAN stand for? • What does LAN stand for? • What is the first word in the acronym ISP? • What is the first word in the acronym DNS? • What is a local or restricted communications network? • What is a device that routes traffic between networks? • What are the set of rules by which computers communicate? • ...
Digi-tech crossword 2021-08-11
Across
- what is the first thing you type in a computer login?
- what does the first 'W' in WWW stand for
- a device that routes traffic between networks?
- pressing and holding down the power button on a computer will result in a...
Down
- a system used to connect multiple computer systems to form a local area network is called?
- what does 'D' in dos stand for?
- what game do you play that builds stuff?
- what does WAN stand for?
- what does DNS stand for?
- what does AP stand for?
10 Clues: what does AP stand for? • what does WAN stand for? • what does DNS stand for? • what does 'D' in dos stand for? • what game do you play that builds stuff? • what does the first 'W' in WWW stand for • a device that routes traffic between networks? • what is the first thing you type in a computer login? • ...
Module 1 Test 2023-09-08
Across
- attack that will publish or withhold data unless money is paid
- this triad is widely accepted security measure
- using phone calls and voicemails to gain personal information
- using deceptive emails to gain personal information
- protection from unauthorized people making changes
Down
- Identity theft, stealing money, stealing private information, controlling private computers
- protection of computer systems, networks, and data from digital attacks
- with "of things" means that so much of our devices are connect to the internet
- assurance that systems and data will be able to be accessed
- protection from people not authorized to view
10 Clues: protection from people not authorized to view • this triad is widely accepted security measure • protection from unauthorized people making changes • using deceptive emails to gain personal information • assurance that systems and data will be able to be accessed • using phone calls and voicemails to gain personal information • ...
computing Solutions elementary 7A 2023-06-29
Across
- it records moving pictures and sound
- you need it if have a low power on your phone
- you need it to save the information from your computer
- a device that connects two or more packet-switched networks.
- a device with a part to cover each ear through which you can listen
Down
- a small, flat computer that is controlled by touching the screen
- you need them to listen to music on your computer
- a computer that is small enough to be carried around easily
- a computer screen
- A panel of buttons used for typing
10 Clues: a computer screen • A panel of buttons used for typing • it records moving pictures and sound • you need it if have a low power on your phone • you need them to listen to music on your computer • you need it to save the information from your computer • a computer that is small enough to be carried around easily • ...
Crosword (Nurkenov Sultan, TOU MIS 12n) 2023-04-25
Across
- A portable computer designed for use on the go.
- А temporary storage location for frequently accessed data
- А unit of measurement for digital information
- The process of finding and fixing errors in code
- A security system that monitors and controls incoming and outgoing network traffic
Down
- A programming language used to create interactive web pages
- An input device used to enter data into a computer
- A type of wired network technology used for local area networks (LANs)
- Visual images or designs produced using software
- Hypertext Markup Language, used to create websites
10 Clues: А unit of measurement for digital information • A portable computer designed for use on the go. • The process of finding and fixing errors in code • Visual images or designs produced using software • An input device used to enter data into a computer • Hypertext Markup Language, used to create websites • А temporary storage location for frequently accessed data • ...
Electronic Brain 2023-08-17
Across
- AI chatbot platform with a musical name
- Sector that involves managing money, investments, and financial transactions
- Application of AI that helps in understanding languages
- Implementation of AI in the medical field for diagnostics and patient care
- Another name for Electronic Brain
Down
- Just A Rather Very Intelligence System stands for
- A key component of AI
- works by using artificial neural networks, which are inspired by the structure of the human brain
- AI-powered conversation platform by Open AI
- AI-powered software that engages in text or voice-based conversations
10 Clues: A key component of AI • Another name for Electronic Brain • AI chatbot platform with a musical name • AI-powered conversation platform by Open AI • Just A Rather Very Intelligence System stands for • Application of AI that helps in understanding languages • AI-powered software that engages in text or voice-based conversations • ...
Charlotte's Crossword Puzzel 2021-10-29
Across
- what is a file that organises other files in a hierarchical structure?
- what happens when you hold down the off button on a device?
- you can eat it, and it was a berry in it
- A computer system that is designed to block unauthorised access while permitting authorised communications?
- what is short for category 6?
Down
- when you reboot a device either with a cold or warm boot.
- A centre for data?
- opposite to a cold boot
- A device that routes traffic between networks?
- Plain Old Telephone ______
10 Clues: A centre for data? • opposite to a cold boot • Plain Old Telephone ______ • what is short for category 6? • you can eat it, and it was a berry in it • A device that routes traffic between networks? • when you reboot a device either with a cold or warm boot. • what happens when you hold down the off button on a device? • ...
Charlotte's Crossword Puzzle 2021-10-29
Across
- A device that routes traffic between networks?
- what happens when you hold down the off button on a device?
- you can eat it, and it was a berry in it
- A computer system that is designed to block unauthorised access while permitting authorised communications?
Down
- when you reboot a device either with a cold or warm boot.
- A centre for data?
- what is a file that organises other files in a hierarchical structure?
- opposite to a cold boot
- Plain Old Telephone ______
- what is short for category 6?
10 Clues: A centre for data? • opposite to a cold boot • Plain Old Telephone ______ • what is short for category 6? • you can eat it, and it was a berry in it • A device that routes traffic between networks? • when you reboot a device either with a cold or warm boot. • what happens when you hold down the off button on a device? • ...
Network and telecommunication 2022-05-20
Across
- The speed with which data is moved from one place on a network to another.
- The generic term refers to any device on a network.
- full form of WAN.
- A unique identification that specifies a particular computer on the Internet.
- various configuration used to administrator LAN.
Down
- DNS stands for.
- A connection in which transfer speeds are faster than 128 bits per second.
- A computer that stores and manages files for multiple users on a network.
- Network devices used to direct packets between networks.
- IP stands for.
10 Clues: IP stands for. • DNS stands for. • full form of WAN. • various configuration used to administrator LAN. • The generic term refers to any device on a network. • Network devices used to direct packets between networks. • A computer that stores and manages files for multiple users on a network. • A connection in which transfer speeds are faster than 128 bits per second. • ...
media 2024-09-25
Across
- A digital audio file available for downloading (7 letters)
- A device used for watching shows and news (10 letters)
- A way of broadcasting audio signals (5 letters)
- To transmit radio or TV signals to a large audience (9 letters)
Down
- A publication with articles, photographs, and advertisements (8 letters)
- A person who writes news stories (10 letters)
- A global system of interconnected computer networks (8 letters)
- Someone who gathers and reports news (8 letters)
- Media Platforms used to interact online (6, 5 letters)
- The means of mass communication (5 letters) 4.
10 Clues: A person who writes news stories (10 letters) • The means of mass communication (5 letters) 4. • A way of broadcasting audio signals (5 letters) • Someone who gathers and reports news (8 letters) • A device used for watching shows and news (10 letters) • Media Platforms used to interact online (6, 5 letters) • ...
ICT 2024-09-18
Across
- When receives message, sends to the specific device connected to it.
- It is capable of sending and receiving data over the network.
- When receives message, sends to all devices connected to it.
- One who studies about weather conditions / forecast.
- Message sent over the internet is splitted into small sections.
Down
- Cable that is used to connect devices that are placed more than 100m.
- A device that connects two networks.
- WAP in a public place is called.
- A device that convert one signals into another signal.
- It is otherwise called as internet.
10 Clues: WAP in a public place is called. • It is otherwise called as internet. • A device that connects two networks. • One who studies about weather conditions / forecast. • A device that convert one signals into another signal. • When receives message, sends to all devices connected to it. • It is capable of sending and receiving data over the network. • ...
Origins of Civilization 2024-09-10
Across
- is the study of how human beings behave, how they act together, and where they come from.
- change a way of life to survive.
- is something that can be used as proof.
- surroundings.
- time before written records.
Down
- are scientists who study the physical materials of Earth, such as rocks.
- a closely interconnected group of people or things.
- occurs when people leave their homeland to live somewhere else.
- includes the many different elements that make up the way of life of a group of people.
- anything made and used by humans.
10 Clues: surroundings. • time before written records. • change a way of life to survive. • anything made and used by humans. • is something that can be used as proof. • a closely interconnected group of people or things. • occurs when people leave their homeland to live somewhere else. • are scientists who study the physical materials of Earth, such as rocks. • ...
Information technology 2025-02-23
Across
- What does Wi-Fi stand for?
- What is a program that protects computers from malicious software?
- What does RAM stand for?
- What is a device that connects multiple networks?
Down
- What type of software manages computer hardware and software resources?
- What is the primary function of a CPU?
- What is the term for storing and accessing data over the internet?
- What is a computer network that covers a small area called?
- What is a malicious program that replicates itself called?
- What is the address of a webpage called?
10 Clues: What does RAM stand for? • What does Wi-Fi stand for? • What is the primary function of a CPU? • What is the address of a webpage called? • What is a device that connects multiple networks? • What is a malicious program that replicates itself called? • What is a computer network that covers a small area called? • ...
Knowledge and Technology 2024-12-04
Across
- Collaborative platforms that allow free access to shared knowledge
- Online tools for storing and sharing academic resources.
- An application that processes and analyzes large datasets.
- The ability to critically analyze the reliability of online information
Down
- A closed environment that limits exposure to differing viewpoints
- Customized content provided by social media platforms.
- The unequal access to technology and the internet globally
- The global system of interconnected networks providing vast knowledge.
- Bias in algorithms due to incomplete or flawed data.
- Technology that generates human-like responses in text.
10 Clues: Bias in algorithms due to incomplete or flawed data. • Customized content provided by social media platforms. • Technology that generates human-like responses in text. • Online tools for storing and sharing academic resources. • The unequal access to technology and the internet globally • An application that processes and analyzes large datasets. • ...
CompTIA Network+ (009) Ch. 1 2025-04-04
Across
- A communication between a single sender and a single receiver.
- A hardware identifier for network interfaces.
- Resolves IP addresses to MAC addresses on a local network.
- Translates domain names into IP addresses.
- Separates the network and host portions of an IP address.
Down
- Routes traffic from a local network to external networks.
- Sends data to all devices on a network segment.
- Delivers data to multiple specific recipients.
- Identifies a device on a network using a numerical label.
- Used to test network functionality on the local machine (127.0.0.1).
10 Clues: Translates domain names into IP addresses. • A hardware identifier for network interfaces. • Delivers data to multiple specific recipients. • Sends data to all devices on a network segment. • Routes traffic from a local network to external networks. • Identifies a device on a network using a numerical label. • ...
NaSCon'25 Crossword 2025-05-13
Across
- Three-day solo coding guantlet-one error meant elimination
- Business event mixing strategy and Squid Game-style challenges.
- Robowars champion bot in a fierce mechanical showdown
- Comedy event with mimicry and spontaneous performances
Down
- AI exhibition with projects in art, diagnosis and trend prediction
- New cybersecurity event with a fun, game-like twist
- Showcase of Pakistan's heritage with attire, dance and traditions
- Theatrical play inspired by Bollywood hit-NaSCon's crowd favorite
- AI-themed activity mimicking neural networks using human participants
- Data Science event simulating high-pressure decisions with tech prizes.
10 Clues: New cybersecurity event with a fun, game-like twist • Robowars champion bot in a fierce mechanical showdown • Comedy event with mimicry and spontaneous performances • Three-day solo coding guantlet-one error meant elimination • Business event mixing strategy and Squid Game-style challenges. • Showcase of Pakistan's heritage with attire, dance and traditions • ...
AI 2025-05-14
Across
- Computer that beat the world chess champion Garry Kasparov.
- first used the term “Artificial Intelligence.”
- Talos, a giant robot made of bronze who protected the island of
- Period when many people lost interest in AI during the 1970s. This time is called the “AI ____"
- part of computer science that focuses on making machines smart
- A program called ____ Theorist could solve math problems.
Down
- French philosopher that French philosopher
- Networks helped machines understand complex things.
- A program could have simple conversations, like a therapist.
- wrote a paper called “Computing Machinery and Intelligence.”
10 Clues: French philosopher that French philosopher • first used the term “Artificial Intelligence.” • Networks helped machines understand complex things. • A program called ____ Theorist could solve math problems. • Computer that beat the world chess champion Garry Kasparov. • A program could have simple conversations, like a therapist. • ...
Daily activities 2024-03-02
Across
- to look at information on the internet.
- drink a hot cup
- send messages to someone you have a friendship with.
Down
- to communicate by voice through an electronic device
- a form of electronic commerce
- use the computer for entertainment purposes.
- look at and understand the words that are written in a paper.
- to consume visual content in different platforms.
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- go out for the purpose of exercise, relaxation, or enjoyment.
10 Clues: drink a hot cup • a form of electronic commerce • to look at information on the internet. • use the computer for entertainment purposes. • to consume visual content in different platforms. • to communicate by voice through an electronic device • send messages to someone you have a friendship with. • look at and understand the words that are written in a paper. • ...
CROSSWORD 2022-05-08
Across
- evolution of the POV for gaming
- book published in 1992 which has defined the metaverse
- the way someone move his body which help to identify him
- virtual item/art that you are the only one who is acknowledge with
- the vital need of Domotics in our current life
- to take place in another body shell
Down
- : Software to keep in touch with other human beings.
- right to keep your data safe
- a distinctive attribute or aspect of something.
- the future leader of social networks
10 Clues: right to keep your data safe • evolution of the POV for gaming • to take place in another body shell • the future leader of social networks • the vital need of Domotics in our current life • a distinctive attribute or aspect of something. • : Software to keep in touch with other human beings. • book published in 1992 which has defined the metaverse • ...
Network Performance 2022-06-27
Across
- How much data can be transferred over a connection in a given time
- A range of radio frequencies
- Copper cabling that transfers data using electrical signals
- A wireless network protocol allowing data to be transferred by radio waves
- Having two devices transmit on the same frequency would cause them to .........
Down
- A high-bandwidth cable connecting LANs or a WAN, expected to carry heavy data traffic
- ..... networks are connected by physical cables
- A subdivision of a band
- Several computers connected together to share data
- Fibre ..... cables transfer data using light signals
10 Clues: A subdivision of a band • A range of radio frequencies • ..... networks are connected by physical cables • Several computers connected together to share data • Fibre ..... cables transfer data using light signals • Copper cabling that transfers data using electrical signals • How much data can be transferred over a connection in a given time • ...
COMPUTER APPLICATIONS 01 2022-08-05
Across
- Alphabetic symbols used in place of numeric codes
- The location of a character or word in computer memory
- The use of technology to accomplish a task
- A program that infects an executable program on a computer
Down
- A hardware device that routes packets to different locations on a network
- The process of making changes and improvements in operational programs
- A device to connect two networks
- Data transmission occurs in both directions simultaneously
- Instructions that control the physical hardware of the computer system
- Input–output devices connected to a computer system
10 Clues: A device to connect two networks • The use of technology to accomplish a task • Alphabetic symbols used in place of numeric codes • Input–output devices connected to a computer system • The location of a character or word in computer memory • Data transmission occurs in both directions simultaneously • A program that infects an executable program on a computer • ...
Week 4 Studies Weekly 2022-10-04
Across
- a group of tribes under one leader, or chief
- a group of people of the same tribe who are closely connected
- larger groups of distant relatives
- to provide safety, justice, and welfare, every community, past, and present, has had a form of ____________.
- crops grown in small mounds to prevent soil erosion
Down
- a picture carved into rock
- American Indians used these networks to get what they needed from other people in the Americas
- large group of tribes
- canoe
- a group of people connected by a common language, belief, land, and culture
10 Clues: canoe • large group of tribes • a picture carved into rock • larger groups of distant relatives • a group of tribes under one leader, or chief • crops grown in small mounds to prevent soil erosion • a group of people of the same tribe who are closely connected • a group of people connected by a common language, belief, land, and culture • ...
Crossword for XI TKJ 2025-11-13
Across
- The main circuit board of a computer.
- device that connects multiple computers in a network.
- software that protects a network from unauthorized access.
- the unique address that identifies a computer on a network.
- A group of computers connected together to share resources.
Down
- A set of rules that determine how data is transmitted over a network.
- A small device that stores data and can be connected via USB.
- A device that provides wireless Internet connection.
- device that forwards data packets between computer networks.
- The physical path that connects network devices.
10 Clues: The main circuit board of a computer. • The physical path that connects network devices. • A device that provides wireless Internet connection. • device that connects multiple computers in a network. • software that protects a network from unauthorized access. • the unique address that identifies a computer on a network. • ...
CIS Puzzle 3 2025-11-18
Across
- Common enterprise tool for IT service management and ticketing.
- Enterprise-grade backup and recovery solution for disaster resilience.
- Technology enabling multiple operating systems on a single physical machine.
- Virtualized computing resources delivered over the internet.
- Technology that creates secure tunnels over public networks.
Down
- Network security model based on “never trust, always verify.”
- Popular cloud provider offering AWS, Azure, and GCP alternatives.
- Cloud deployment model combining public and private resources.
- Service model that provides runtime environments without managing servers.
- Protocol suite for next-generation IP addressing and routing.
10 Clues: Virtualized computing resources delivered over the internet. • Technology that creates secure tunnels over public networks. • Network security model based on “never trust, always verify.” • Protocol suite for next-generation IP addressing and routing. • Cloud deployment model combining public and private resources. • ...
Computer Systems 2020-09-10
Across
- from a printer • Open a saved document. • A key used to erase characters. • Information entered into the computer • AS To save a document with a new name. • ...
- AND PERSONAL TECHNOLOGY
- information
- SYSTEM
Down
- NETWORKS
- device with keys • an internet-enabled HDTV • small symbol on the screen • touch-sensitive display device • any data & instructions entered • used to produce high quality drawings • ...
- • E-mail software • Database software • Spreadsheet software • Presentation software • Feature of a DTP software • Feature of an e-mail software • Feature of a database software • ...
- E-COMMERCE
- OF A
- source
- TECHNOLOGY
11 Clues: OF A • source • SYSTEM • NETWORKS • E-COMMERCE • TECHNOLOGY • information • AND PERSONAL TECHNOLOGY • from a printer • Open a saved document. • A key used to erase characters. • Information entered into the computer • AS To save a document with a new name. • ... • ...
Globalization 2021-11-25
Across
- strengthens ties between trading partners, promote peace, security, and growth
- allows billions of people to contact friends and access information around the world
- includes large scale production for export
- another big part of service economy
- North American Free Trade Agreement
Down
- networks that turn raw materials into finished items and distributes goods and services throughout a trans-national company to minimize waist
- includes automobiles, food processing, and metal products
- includes banking and transportation
- is the process of interaction and integration among people, companies, and governments worldwide
- lead to increase consumer choices and reduced prices
10 Clues: includes banking and transportation • another big part of service economy • North American Free Trade Agreement • includes large scale production for export • lead to increase consumer choices and reduced prices • includes automobiles, food processing, and metal products • strengthens ties between trading partners, promote peace, security, and growth • ...
Urinary System 2022-04-12
Across
- A membranous fold that supports an organ and keeps it in position.
- sudden lossnof kidney function.
- An Imflammationof the bladder
- To maintain balance within the body
Down
- Kidney function begins to reduce slowly
- A cup-like sac at the beginning of the tubular component of a nephron.
- Tiny vessels that branch out from arterioles to form networks around body cells.
- a small convoluted or intertwined mass
- Treatment that takes over kidney functions when they stop working properly.
- Collection of a sample of tissue and cells from the affected organ.
10 Clues: An Imflammationof the bladder • sudden lossnof kidney function. • To maintain balance within the body • a small convoluted or intertwined mass • Kidney function begins to reduce slowly • A membranous fold that supports an organ and keeps it in position. • Collection of a sample of tissue and cells from the affected organ. • ...
Digital Citizenship 2013-11-14
Across
- someone who acknowledges the bullying, but doesn't take action
- your right to determine what you'd like others to know about you
- Properly using technology overall
- a law that prohibits people from taking others' work and gives the creator control
- a place where you can communicate and share information with others
- what can happen if you cyberbully, plagiarize or misuse technology
Down
- Putting someone else down through social networks constantly
- taking someone else's work without giving credit
- properly using technology as a tool rather than a distraction
- someone who is harmed by something (like cyberbullying)
10 Clues: Properly using technology overall • taking someone else's work without giving credit • someone who is harmed by something (like cyberbullying) • Putting someone else down through social networks constantly • properly using technology as a tool rather than a distraction • someone who acknowledges the bullying, but doesn't take action • ...
Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29
Across
- A hostile and insulting interaction between internet users.
- An image that is captured of what is shown on a phone, tablet, or computer screen
- Rules or manners for interacting courteously with others online
- unwanted emails
Down
- Online communities, also known as social networks
- Sharing someone’s secrets or embarrassing information online
- Setting up a fake online profile
- malware,cyber-destroyer, break your technology
- A technology that allows us to access our files through the internet from anywhere in the world.
- Someone who posts rude or off-topic messages in an online community
10 Clues: unwanted emails • Setting up a fake online profile • malware,cyber-destroyer, break your technology • Online communities, also known as social networks • A hostile and insulting interaction between internet users. • Sharing someone’s secrets or embarrassing information online • Rules or manners for interacting courteously with others online • ...
Digi Tech 2021-02-25
Across
- Web that is world wide
- Type of files that organize other files
- Is a network over a local area
- Statistics and facts together for reference or analysis
- Picture element is the smallest part of a graphic image
Down
- Sort of online inventory that consists of a series of entries
- It's a computer network system, and covers a small area, only authorized people can access it
- A cable used in networks (Hint starts with a C)
- Endpoint of a network connection
- Wireless access point that allows wifi to connect to a wired network
10 Clues: Web that is world wide • Is a network over a local area • Endpoint of a network connection • Type of files that organize other files • A cable used in networks (Hint starts with a C) • Statistics and facts together for reference or analysis • Picture element is the smallest part of a graphic image • Sort of online inventory that consists of a series of entries • ...
Digi-tech crossword 2021-08-11
Across
- what is the first thing you type in a computer login?
- what does the first 'W' in WWW stand for
- a device that routes traffic between networks?
- pressing and holding down the power button on a computer will result in a...
Down
- a system used to connect multiple computer systems to form a local area network is called?
- what does 'D' in dos stand for?
- what game do you play that builds stuff?
- what does WAN stand for?
- what does DNS stand for?
- what does AP stand for?
10 Clues: what does AP stand for? • what does WAN stand for? • what does DNS stand for? • what does 'D' in dos stand for? • what game do you play that builds stuff? • what does the first 'W' in WWW stand for • a device that routes traffic between networks? • what is the first thing you type in a computer login? • ...
CROSSWORD 2022-05-08
Across
- evolution of the POV for gaming
- right to keep your data safe
- : Software to keep in touch with other human beings.
- the future leader of social networks
Down
- the vital need of Domotics in our current life
- virtual item/art that you are the only one who is acknowledge with
- to take place in another body shell
- book published in 1992 which has defined the metaverse
- a distinctive attribute or aspect of something.
- the way someone move his body which help to identify him
10 Clues: right to keep your data safe • evolution of the POV for gaming • to take place in another body shell • the future leader of social networks • the vital need of Domotics in our current life • a distinctive attribute or aspect of something. • : Software to keep in touch with other human beings. • book published in 1992 which has defined the metaverse • ...
Network and telecommunication 2022-05-20
Across
- DNS stands for.
- A unique identification that specifies a particular computer on the Internet.
- full form of WAN.
- various configuration used to administrator LAN.
- A connection in which transfer speeds are faster than 128 bits per second.
- Network devices used to direct packets between networks.
Down
- IP stands for.
- A computer that stores and manages files for multiple users on a network.
- The generic term refers to any device on a network.
- The speed with which data is moved from one place on a network to another.
10 Clues: IP stands for. • DNS stands for. • full form of WAN. • various configuration used to administrator LAN. • The generic term refers to any device on a network. • Network devices used to direct packets between networks. • A computer that stores and manages files for multiple users on a network. • A connection in which transfer speeds are faster than 128 bits per second. • ...
crossword 2023-11-05
Across
- A procedure used for solving a problem or performing a computation
- Vihicle with engine and 4 wheels
- Basic element of language that carries an objective or practical meaning
- A machine that can be programmed to carry out sequences of arithmetic or logical operations automatically
- Structure between the eyes
Down
- A peripheral input device modeled after the typewriter keyboard
- Sport where players kicking a ball to score a goal
- A pair of small loudspeaker drivers worn on the head
- A gateway that passes data between one or more local area networks
- Red round vegetable
10 Clues: Red round vegetable • Structure between the eyes • Vihicle with engine and 4 wheels • Sport where players kicking a ball to score a goal • A pair of small loudspeaker drivers worn on the head • A peripheral input device modeled after the typewriter keyboard • A procedure used for solving a problem or performing a computation • ...
The Underground Railroad 2024-02-11
Across
- secret routes and safe houses used by slaves to escape to freedom
- a famous abolitionst who helped many slaves escape from slavery
- a person who helps slaves get to freedom
- punishment for people caught while trying to escape
- a signal used to guide slaves to safety
Down
- code name for underground railroad
- a place where slaves could hide for the day
- the routes of the underground railroads
- a legal term for a person who escaped from slavery
- a state in the north where slaves went for freedom
10 Clues: code name for underground railroad • the routes of the underground railroads • a signal used to guide slaves to safety • a person who helps slaves get to freedom • a place where slaves could hide for the day • a legal term for a person who escaped from slavery • a state in the north where slaves went for freedom • punishment for people caught while trying to escape • ...
The Underground Railroad 2024-02-11
Across
- secret routes and safe houses used by slaves to escape to freedom
- a famous abolitionst who helped many slaves escape from slavery
- a person who helps slaves get to freedom
- punishment for people caught while trying to escape
- a signal used to guide slaves to safety
Down
- code name for underground railroad
- a place where slaves could hide for the day
- the routes of the underground railroads
- a legal term for a person who escaped from slavery
- a state in the north where slaves went for freedom
10 Clues: code name for underground railroad • the routes of the underground railroads • a signal used to guide slaves to safety • a person who helps slaves get to freedom • a place where slaves could hide for the day • a legal term for a person who escaped from slavery • a state in the north where slaves went for freedom • punishment for people caught while trying to escape • ...
Cyber Crossword 2024-10-24
Across
- A tool that helps block unauthorized access to networks.
- Software that collects data from your device without consent.
- Verifying your identity, often with passwords or biometrics.
- False information spread to deceive or manipulate people.
Down
- Malicious software that harms devices or steals data.
- Encoding data to keep it secure from unauthorized access.
- Your login details needed to access accounts.
- Information that must be protected from unauthorized access.
- An incident where data is accessed without permission.
- A deceptive attempt to steal personal data through fake emails or SMS.
10 Clues: Your login details needed to access accounts. • Malicious software that harms devices or steals data. • An incident where data is accessed without permission. • A tool that helps block unauthorized access to networks. • Encoding data to keep it secure from unauthorized access. • False information spread to deceive or manipulate people. • ...
IT terminu krustvārdu mīkla 2024-10-31
Across
- An error or flaw in software or hardware.
- The process of converting data into a secure format.
- A step-by-step procedure for calculations and problem-solving.
- A device that forwards data packets between networks.
- Software designed to disrupt, damage, or gain unauthorized access.
Down
- A base-2 number system used in computing.
- Unwanted or junk email messages.
- A unit of digital storage equal to 1,024 megabytes.
- A security system that monitors and controls network traffic.
- A hardware or software component that stores data for faster access.
10 Clues: Unwanted or junk email messages. • An error or flaw in software or hardware. • A base-2 number system used in computing. • A unit of digital storage equal to 1,024 megabytes. • The process of converting data into a secure format. • A device that forwards data packets between networks. • A security system that monitors and controls network traffic. • ...
Patryk Juska Berna 2024-12-10
Across
- to copy something achieved by someone else
- considers the spaces and networks created by technological developments (2 words)
- Full and satisfied
- something that you hear repetitively (2 words)
Down
- to open your eyes to sth (3 words)
- offer/oppose (2 words)
- a localized physical condition in which part of the body becomes reddened, swollen, hot
- to fill something or someone with a particular feeling, quality, or idea
- relating to deep feelings and beliefs
- Having to do sth, beacause you are forced or feel that it is necessary
10 Clues: Full and satisfied • offer/oppose (2 words) • to open your eyes to sth (3 words) • relating to deep feelings and beliefs • to copy something achieved by someone else • something that you hear repetitively (2 words) • Having to do sth, beacause you are forced or feel that it is necessary • to fill something or someone with a particular feeling, quality, or idea • ...
Type of cables 2024-12-17
Across
- type of cable used in Ethernet networks to reduce interference.
- cable such as Cat 5e or Cat 6 used for wired connections.
- cable with red, white, and yellow connectors.
- for analog video signal transmission from computer to monitor.
- cable used for connecting peripherals to computers.
- used for high-definition audio and video transmission.
Down
- enhanced Ethernet cable supporting speeds up to 1 Gbps.
- cable used to connect network devices.
- cable with a metallic shield, often used for cable TV.
- that transmits data using light signals.
10 Clues: cable used to connect network devices. • that transmits data using light signals. • cable with red, white, and yellow connectors. • cable used for connecting peripherals to computers. • cable with a metallic shield, often used for cable TV. • used for high-definition audio and video transmission. • enhanced Ethernet cable supporting speeds up to 1 Gbps. • ...
Personnel in IT 2025-03-18
Across
- creates websites through the use of programming codes.
- monitors and maintains the system security.
- analyses system that have already been created and recommends upgrade of computer systems.
- creates and shares content using social media platforms.
- writes, tests and maintains application software.
Down
- create and maintain networks.
- attends to any hardware faults and malfunctions in the equipment.
- provides technical assistance to computer users who need help with a specific application.
- Develops applications that allow users to do various functions.
- designs, creates and maintains a database and is responsible for the security of that database.
10 Clues: create and maintain networks. • monitors and maintains the system security. • writes, tests and maintains application software. • creates websites through the use of programming codes. • creates and shares content using social media platforms. • Develops applications that allow users to do various functions. • ...
AI 2025-04-24
Across
- Highly autonomous systems outperforming humans at most economically valuable work.
- AI field focused on understanding and generating human language.
- AI Running AI models directly on devices rather than the cloud.
- systems performing tasks requiring human intelligence.
- LEARNING Subset of AI where computers learn from data.
- LEARNING Operates through rewards and penalties to maximize cumulative outcomes.
- 1956 conference considered the formal birth of AI.
Down
- AI Systems capable of creating new content like text or images.
- LEARNING Subset of Machine Learning using multi-layered neural networks.
- VISION AI field focused on interpreting visual data.
10 Clues: 1956 conference considered the formal birth of AI. • VISION AI field focused on interpreting visual data. • systems performing tasks requiring human intelligence. • LEARNING Subset of AI where computers learn from data. • AI Systems capable of creating new content like text or images. • AI Running AI models directly on devices rather than the cloud. • ...
CS Terms 2025-06-07
Across
- protects a network by blocking unwanted traffic.
- Address is like the mailing address for a device on a network.
- shows the amount of data transferred at any time.
- tiny data bundles that help send information online.
- directs traffic between networks (like a traffic cop for data!).
Down
- measures the time delay in data transfer.
- checks how fast data travels to another computer and back.
- measures the maximum potential transfer speed.
- measures how much the time between data packets varies.
- is when bits of data don’t make it to the destination.
10 Clues: measures the time delay in data transfer. • measures the maximum potential transfer speed. • protects a network by blocking unwanted traffic. • shows the amount of data transferred at any time. • tiny data bundles that help send information online. • is when bits of data don’t make it to the destination. • measures how much the time between data packets varies. • ...
History of AI 2025-06-22
Across
- The year the term "Artificial Intelligence" was first coined (_____)
- A type of AI that can perform general cognitive tasks (______ AI)
- Machine Learning technique inspired by the brain (Neural ______)
- Computer scientist who coined the term "AI" (John _______)
- AI pioneer known for the Turing Test (Alan _______)
- First AI program that mimicked human problem-solving (Logic ________)
Down
- The 1997 chess match winner against Garry Kasparov (Deep )
- The first successful AI conference ( Workshop, 1956)
- The first chatbot, developed in the 1960s (_____)
- The field combining statistics and AI (______ learning)
10 Clues: The first chatbot, developed in the 1960s (_____) • AI pioneer known for the Turing Test (Alan _______) • The first successful AI conference ( Workshop, 1956) • The field combining statistics and AI (______ learning) • The 1997 chess match winner against Garry Kasparov (Deep ) • Computer scientist who coined the term "AI" (John _______) • ...
Crimes Crossword 2021-01-17
Across
- threatening harm or causing actual harm to another person
- abducting someone and holding them captive
- a form of theft, specifically from shops
- burning of the property of another
- when two or more people agree to commit an illegal act and take some step toward its completion
- assisting in a crime
- threat to do something unless that person meets certain demands
Down
- intentionally entering someone else’s property without permission
- taking of another’s property by force or threat
- offenses involving computers and computer networks
- killing of one human being by another
- creating or changing something with the intent of passing it off as genuine
- scheme to obtain financial gain by using false statements
- entering property with intent of breaking the law
14 Clues: assisting in a crime • burning of the property of another • killing of one human being by another • a form of theft, specifically from shops • abducting someone and holding them captive • taking of another’s property by force or threat • entering property with intent of breaking the law • offenses involving computers and computer networks • ...
Internet and its services 2021-06-08
Across
- A service of the internet that allows a user to access a remote computer.
- Service enabling users to send and receive messages.
- People at different locations can send and receive instant message
- Available applications such as skype , cooltalk.
- An internet service provider of Nepal
- What is WWW also known as?
- Country code
Down
- experimental computer network that was the forerunner of the Internet.
- A network of networks
- It is the user identification name of a mail box
- A service of the internet that enables a user to transmit electronic computer files as faxes.
- An electronic public notice board
- An e-commerce site
- Links five regional areas and allows researchers across the US to access data.
14 Clues: Country code • An e-commerce site • A network of networks • What is WWW also known as? • An electronic public notice board • An internet service provider of Nepal • It is the user identification name of a mail box • Available applications such as skype , cooltalk. • Service enabling users to send and receive messages. • ...
IT jobs 2023-09-12
Across
- works for a big companymakes apps for computer.
- manages the company's computer systems, servers, and networks.
- The IT department must _____(provide) the company's computers to keep them running smoothly.
- manages the company's databases.
- To improve the website's performance, we need to _____ its usage data.
- ensures that the software is free of bugs and errors.
- It is important to be ______ when working with computers.
Down
- helps people with their computer problems.
- creates the customer-facing part of the website.
- oversees the project and ensures deadlines are met.
- provides technical support to customers.
- works on the behind-the-scenes functionality of the website.
- analyzes the system to improve it.
- Yesterday, I attended a ______ on computer networking.
14 Clues: manages the company's databases. • analyzes the system to improve it. • provides technical support to customers. • helps people with their computer problems. • works for a big companymakes apps for computer. • creates the customer-facing part of the website. • oversees the project and ensures deadlines are met. • ensures that the software is free of bugs and errors. • ...
Assignment 1/ Chapters 1-4 2020-08-29
Across
- take stock of your knowledge and capabilities about a topic
- organized, punctual and dependable
- Strategic Human Resources
- tolerant, sensitive and warm
- outgoing and sociable
- goals and objectives
- learn enough about a topic so that you can set specific development goals on which you can apply and practice, and later gauge again your progress toward your set goals
Down
- Irritable, anxious and moody
- Curious, original and open to new ideas
- Leadership and decision making
- step back and look at the ways you have achieved your goals, take the opportunity to set new ones, and chronicle this experience and thought process in a daily journal.
- Learners capable of processing information presented visually or verbally
- Abbreviation for Learning Style Index
- Social networks and design
14 Clues: goals and objectives • outgoing and sociable • Strategic Human Resources • Social networks and design • Irritable, anxious and moody • tolerant, sensitive and warm • Leadership and decision making • organized, punctual and dependable • Abbreviation for Learning Style Index • Curious, original and open to new ideas • take stock of your knowledge and capabilities about a topic • ...
BigDataBoss Season-3 2020-10-31
Across
- , Movie famous for "Indha 1 eli, 2 eli, 3 eli, 4 eli, 5 eli la...andha Anjali!"
- locator in selenium
- composed of multiple weaker models(independently trained)
- asynchronous
- open source library for coreference
- hiphop star of Kollywood
- murugan
- acceleration using Graphics Processing Units with a familiar NumPy-like API through CuPy
Down
- inpoint of view of vigneshsivan
- saying he is pregnant
- , Movie famous for "Parasakthi hero da!"
- neural networks, a main area of deep learning research written in brother of C
- type of modelling error which results in the failure to predict future observation.
- algorithm which is used for both classification as well as regression
14 Clues: murugan • asynchronous • locator in selenium • saying he is pregnant • hiphop star of Kollywood • inpoint of view of vigneshsivan • open source library for coreference • , Movie famous for "Parasakthi hero da!" • composed of multiple weaker models(independently trained) • algorithm which is used for both classification as well as regression • ...
Japan 2024-03-23
Across
- World's longest continental mountain range in South America.
- Empire known for extensive road networks and architecture in South America.
- Traditional Japanese gate marking a Shinto shrine's entrance.
- Mesoamerican culture famous for complex society and capital Tenochtitlan.
- Belief that natural entities possess spiritual essence.
Down
- Multi-tiered tower with religious significance, typically found in Asia.
- Historic capital of the Inca Empire in Peru.
- Ancient civilization noted for advanced writing, astronomy, and architecture in Mesoamerica.
- Ancient Andean device for recording information using knotted strings.
- Narrow land strip connecting two larger landmasses.
- Capital of the Aztec Empire, now Mexico City.
- Indigenous spirituality of Japan, focusing on ritual practices.
- Agricultural practice on steep terrain using stepped levels.
- Floating gardens used by the Aztecs for agriculture.
14 Clues: Historic capital of the Inca Empire in Peru. • Capital of the Aztec Empire, now Mexico City. • Narrow land strip connecting two larger landmasses. • Floating gardens used by the Aztecs for agriculture. • Belief that natural entities possess spiritual essence. • World's longest continental mountain range in South America. • ...
Mrs Dadd's Bonanza 2023-01-19
Across
- Re-using components instead of throwing them away
- The processes and technologies designed to protect networks, computers and programs from attack, damage or unauthorised access
- Electronic waste
- Tricking people into breaking security procedures
- Watching people enter passwords or PINS
- Designed to protect creators of books, software, etc from having their work illegally copied
- Misinformation which is spread
Down
- Stealing data as it is passed across a network
- Short for malicious software
- Describes the technology that is carried inside the body
- One who breaks a systems integrity maliciously
- The moral principles which govern attitudes and behaviour
- A method of obscuring data so it cannot be read if it is intercepted
- One who is intensely interested in a computer system
14 Clues: Electronic waste • Short for malicious software • Misinformation which is spread • Watching people enter passwords or PINS • Stealing data as it is passed across a network • One who breaks a systems integrity maliciously • Re-using components instead of throwing them away • Tricking people into breaking security procedures • ...
Network topology and software 2024-09-27
Across
- Centralized system that provides resources to other devices
- Arrangement of devices and connections in a network
- Protects networked devices from malware and threats.
Down
- Collection of computers and devices connected together.
- Device that directs data packets between networks.
- An indicator of a transmitted message.
6 Clues: An indicator of a transmitted message. • Device that directs data packets between networks. • Arrangement of devices and connections in a network • Protects networked devices from malware and threats. • Collection of computers and devices connected together. • Centralized system that provides resources to other devices
Russia: Political Culture and Participation 2022-12-11
Across
- Groups often shut down by the Kremlin
- Deportation of a refugee who faces prosecution in their home country
Down
- Assassinated near the Kremlin
- One of two main TV networks in Russia
- Organizations in Russia subject to heavy regulation
- Anti-Putin activist who was poisoned
- One of two main TV networks in Russia
7 Clues: Assassinated near the Kremlin • Anti-Putin activist who was poisoned • One of two main TV networks in Russia • Groups often shut down by the Kremlin • One of two main TV networks in Russia • Organizations in Russia subject to heavy regulation • Deportation of a refugee who faces prosecution in their home country
Crossword 2025-10-29
6 Clues: Your next destination • The money a company earns from sales • Type of business done over the internet • Online retail giant founded by Jeff Bezos • Protecting computers, networks, and data from digital attacks • A young company with a new business idea, often seeking investors
Chapter 10 - What are transport systems? 2022-02-21
Across
- Made up of 3 components - networks, infrastructure and modes
- Number of occurences of a service
- Contains nodes that are linked by routes
Down
- Ways in which pople and goods move from one location to another
- Number of nodes and routes in an area
- Availability and reach of infrastructure
- Reliability and performance of a transport system is dependent on the ______________ of infrastructure.
- Path of travel between nodes
- Transport such as bike-sharing and car-sharing are known as
- Number of people and amount of good that can be moved
10 Clues: Path of travel between nodes • Number of occurences of a service • Number of nodes and routes in an area • Availability and reach of infrastructure • Contains nodes that are linked by routes • Number of people and amount of good that can be moved • Transport such as bike-sharing and car-sharing are known as • Made up of 3 components - networks, infrastructure and modes • ...
Digi-tech crossword 2021-08-11
Across
- what is the first thing you type in a computer login?
- what does the first 'W' in WWW stand for
- a device that routes traffic between networks?
- pressing and holding down the power button on a computer will result in a...
Down
- a system used to connect multiple computer systems to form a local area network is called?
- what does 'D' in dos stand for?
- what game do you play that builds stuff?
- what does WAN stand for?
- what does DNS stand for?
- what does AP stand for?
10 Clues: what does AP stand for? • what does WAN stand for? • what does DNS stand for? • what does 'D' in dos stand for? • what game do you play that builds stuff? • what does the first 'W' in WWW stand for • a device that routes traffic between networks? • what is the first thing you type in a computer login? • ...
Cognitive Learning Theory 2018-08-13
Across
- Memory used for forming and retrieving specific events in time
- Type of memory perceives incoming information
- Cognitive load unrelated to the learning
- Technique used to break information into smaller pieces
- Cognitive load that connects working memory to long-term memory
Down
- Type of memory that processes information
- Cognitive load referring to the complexity of the topic or materials
- Memory used for factual information like the meaning of words
- Type of memory that stores well-known, accessible knowledge
- Complex networks of related information stored in long-term memory
10 Clues: Cognitive load unrelated to the learning • Type of memory that processes information • Type of memory perceives incoming information • Technique used to break information into smaller pieces • Type of memory that stores well-known, accessible knowledge • Memory used for factual information like the meaning of words • ...
Power Delphine 2015-12-17
Across
- A man who must serve an other man
- Represented by the symbol of balance
- An event where people, in communities, group together
- Win a fight
Down
- Leader who has all of power and who manages with violence
- It can be a president, a dictator or a tyrant, and he governs other people
- Politic system where people can choose the government
- It's a demo which becomes violent
- Inside, there are radio, television and social networks and they allow us to know everything about the world
- One can win a fight thanks to this
10 Clues: Win a fight • A man who must serve an other man • It's a demo which becomes violent • One can win a fight thanks to this • Represented by the symbol of balance • Politic system where people can choose the government • An event where people, in communities, group together • Leader who has all of power and who manages with violence • ...
Long term Project 2023-12-12
Across
- Creation of new connections between neurons within the brain, spinal cord, or between neurons and muscle cells
- the ability of neural networks in the brain to change through growth and reorganization.
- What is this?
Down
- through repetition and frequent activation, synaptic connections with neurons strengthen.
- cognitive timed test
- a junction between two nerve cells, consisting of a minute gap across which impulses pass by diffusion of a neurotransmitter.
- Doing something over and over
- the thing that strengthens when doing something multiple times
- meal that was tested
- if you finish you know
10 Clues: What is this? • cognitive timed test • meal that was tested • if you finish you know • Doing something over and over • the thing that strengthens when doing something multiple times • the ability of neural networks in the brain to change through growth and reorganization. • through repetition and frequent activation, synaptic connections with neurons strengthen. • ...
q 2023-12-20
Across
- Data unit at the network layer
- The process of converting a domain name into its IP address
- Abbreviation for a type of network that covers a large geographic area
- A system that translates domain names into IP addresses
- A device that connects multiple network segments
Down
- Communication protocol used for email transmission
- An attack where an attacker floods a network with traffic to disrupt its normal operation
- High-speed network technology commonly used for local area networks
- Abbreviation for the protocol that assigns IP addresses automatically
- Standard for wireless network communication
10 Clues: Data unit at the network layer • Standard for wireless network communication • A device that connects multiple network segments • Communication protocol used for email transmission • A system that translates domain names into IP addresses • The process of converting a domain name into its IP address • ...
The Underground Railroad 2024-02-11
Across
- secret routes and safe houses used by slaves to escape to freedom
- a famous abolitionst who helped many slaves escape from slavery
- a person who helps slaves get to freedom
- punishment for people caught while trying to escape
- a signal used to guide slaves to safety
Down
- code name for underground railroad
- a place where slaves could hide for the day
- the routes of the underground railroads
- a legal term for a person who escaped from slavery
- a state in the north where slaves went for freedom
10 Clues: code name for underground railroad • the routes of the underground railroads • a signal used to guide slaves to safety • a person who helps slaves get to freedom • a place where slaves could hide for the day • a legal term for a person who escaped from slavery • a state in the north where slaves went for freedom • punishment for people caught while trying to escape • ...
internet and world wide web 2023-03-06
Across
- protects a network or system from unauthorized access
- a global computer network providing a variety of information and communication
- what WWW stands for
- allows you to find different websites on the internet
Down
- a unique string of characters that identifies different websites
- a computer or computer program which manages access to a centralized resource or service in a network
- a group or system of interconnected people or things
- directs traffic around a Lan
- a facility allowing computers or other devices to connect to the internet
- Local area networks
10 Clues: what WWW stands for • Local area networks • directs traffic around a Lan • a group or system of interconnected people or things • protects a network or system from unauthorized access • allows you to find different websites on the internet • a unique string of characters that identifies different websites • ...
technology 2024-07-18
Across
- - An electronic device for storing and processing data.
- - Programs and operating information used by a computer.
- - A global network connecting millions of computers.
- - An organized collection of data, generally stored and accessed electronically.
Down
- - A mobile phone with advanced features.
- - The practice of protecting systems, networks, and programs from digital attacks.
- - An input device with keys used to type characters.
- - A process or set of rules to be followed in problem-solving operations.
- - The branch of technology dealing with the design and application of robots.
- - A small electronic device or tool.
10 Clues: - A small electronic device or tool. • - A mobile phone with advanced features. • - An input device with keys used to type characters. • - A global network connecting millions of computers. • - An electronic device for storing and processing data. • - Programs and operating information used by a computer. • ...
Theme: Inventions 2024-07-24
Across
- A road vehicle typically with four wheels powered by an internal combustion engine
- An appliance that cooks food using microwave radiation
- A device for transmitting voices over a distance using wire or radio
- A system for transmitting visual images and sound
Down
- The transmission and reception of electromagnetic waves
- An appliance for keeping food and drinks cold
- An electronic device for storing and processing data
- A powered flying vehicle with fixed wings
- A global network connecting millions of private public academic and government networks
- A device that produces light
10 Clues: A device that produces light • A powered flying vehicle with fixed wings • An appliance for keeping food and drinks cold • A system for transmitting visual images and sound • An electronic device for storing and processing data • An appliance that cooks food using microwave radiation • The transmission and reception of electromagnetic waves • ...
Crossword 2024-10-03
Across
- The process of converting a coded data back into its original format.
- The process of converting data into a coded format to prevent unauthorized access.
- A person who tries to gain unauthorized access.
- Malicious computer software.
- Tricking someone into giving informations over the internet.
Down
- A secret pathway that allows unauthorized access to a system or software.
- Intercepting communication between two parties without their knowledge.
- A method for guessing a password.
- A barrier between a trusted internal network and untrusted external networks.
- A Denial of Service Attack
10 Clues: A Denial of Service Attack • Malicious computer software. • A method for guessing a password. • A person who tries to gain unauthorized access. • Tricking someone into giving informations over the internet. • The process of converting a coded data back into its original format. • Intercepting communication between two parties without their knowledge. • ...
Chapter 5 Vocabulary 2022-11-06
Across
- a problem or task that tests a person's abilities.
- A part of a civilization that includes the beliefs and behaviors of a group or society.
- to bring something new into being.
- Use of tools and other inventions for practical purposes.
- A person who makes money by selling goods.
- Someone who is trained in a particular career.
Down
- A society marked by developed arts, sciences, government, and social structure.
- A way of life that offers more than what is needed.
- An interconnected system of channels or lines.
- a craft person
10 Clues: a craft person • to bring something new into being. • A person who makes money by selling goods. • An interconnected system of channels or lines. • Someone who is trained in a particular career. • a problem or task that tests a person's abilities. • A way of life that offers more than what is needed. • Use of tools and other inventions for practical purposes. • ...
Compliance Crossword Puzzle Challenge 2023-06-02
Across
- Word to place in an email subject line to encrypt.
- Name of Privacy officer.
- Situation type used prior to installing open source or purchased software.
- Place where Information Security and Privacy Policies can be found.
- Person who must approve usage of a cloud storage service.
- Process of transforming plan text into encoded text, making it unreadable.
Down
- Enabled after 10 minutes of workstation inactivity.
- Forwarding company-related email to a personal email account.
- Workstations must have this installed before accessing corporate networks.
- An electronic computing device such as a PDA, mobile phone, or laptop.
10 Clues: Name of Privacy officer. • Word to place in an email subject line to encrypt. • Enabled after 10 minutes of workstation inactivity. • Person who must approve usage of a cloud storage service. • Forwarding company-related email to a personal email account. • Place where Information Security and Privacy Policies can be found. • ...
media 2024-09-25
Across
- A digital audio file available for downloading (7 letters)
- A device used for watching shows and news (10 letters)
- A way of broadcasting audio signals (5 letters)
- To transmit radio or TV signals to a large audience (9 letters)
Down
- A publication with articles, photographs, and advertisements (8 letters)
- A person who writes news stories (10 letters)
- A global system of interconnected computer networks (8 letters)
- Someone who gathers and reports news (8 letters)
- Media Platforms used to interact online (6, 5 letters)
- The means of mass communication (5 letters) 4.
10 Clues: A person who writes news stories (10 letters) • The means of mass communication (5 letters) 4. • A way of broadcasting audio signals (5 letters) • Someone who gathers and reports news (8 letters) • A device used for watching shows and news (10 letters) • Media Platforms used to interact online (6, 5 letters) • ...
BCSS-Transformation-1 2024-11-05
Across
- The very best
- Change in form, appearance, nature, or character.
- Team members are isolated from the team itself
- To work jointly with others or together especially in an intellectual endeavor
- Identification, acknowledgment
Down
- The action or process of trying out new ideas, methods, or activities
- Change which makes the quality or condition of somebody/something better
- The collection of shared beliefs, values, behaviors, and practices that define a group
- This is done to process, store, and transmit the information through digital circuits, equipment, and networks
- The state of owning something
10 Clues: The very best • The state of owning something • Identification, acknowledgment • Team members are isolated from the team itself • Change in form, appearance, nature, or character. • The action or process of trying out new ideas, methods, or activities • Change which makes the quality or condition of somebody/something better • ...
Gateway Quizmas 2024-11-06
Across
- Acquired in October 2024, Gateway are now part of this group
- Award-winning hexagonal shaped enclosure from CamdenBoss
- Town in which Gateway's office is located
- Colour used in The Power Gateway logo
Down
- Gateway, the team with the " " spirit!
- Name for the embedded mount style range of antennas from Siretta
- If you can dream it, we can " " it!
- Accessory for a ferrite core, wound with wire
- A cylindrical shaped ferrite core, also referred to as a 'ferrite ring'
- What 'NR' stands for in relation to 5G networks
10 Clues: If you can dream it, we can " " it! • Colour used in The Power Gateway logo • Gateway, the team with the " " spirit! • Town in which Gateway's office is located • Accessory for a ferrite core, wound with wire • What 'NR' stands for in relation to 5G networks • Award-winning hexagonal shaped enclosure from CamdenBoss • ...
Smarter with AI 2025-05-13
Across
- LEARNING - Subset improving through experience
- - AI is described as this, not a replacement for doctors
- RECOGNITION - AI's ability to find commonalities or trends in data
- MEDICINE - Using AI to tailor medical care based on patient data
Down
- COMPLIANCE - Lack of this is a major concern for AI in healthcare regarding patient data
- AI - Technology producing human-like responses
- LANGUAGE PROCESSING - Technology interpreting human language
- - A key role of AI in processing medical images
- LEARNING - AI that uses neural networks for complex data
- TASKS - AI applications to streamline tasks like scheduling or billing
10 Clues: AI - Technology producing human-like responses • LEARNING - Subset improving through experience • - A key role of AI in processing medical images • LEARNING - AI that uses neural networks for complex data • - AI is described as this, not a replacement for doctors • LANGUAGE PROCESSING - Technology interpreting human language • ...
REVSION - GCSE STYLE! 2025-04-29
Across
- – Security system that controls incoming and outgoing traffic.
- – Translates high-level code into machine code at once.
- – A step-by-step set of instructions to solve a problem.
- – A device that connects networks and directs data.
Down
- – The smallest unit of a digital image.
- – A structured way to store, manage and retrieve data.
- – A wired network connection standard.
- – The number system used by computers (1s and 0s).
- – Small memory close to the CPU for quick data access.
- – A control structure that repeats code until a condition is met.
10 Clues: – A wired network connection standard. • – The smallest unit of a digital image. • – The number system used by computers (1s and 0s). • – A device that connects networks and directs data. • – A structured way to store, manage and retrieve data. • – Small memory close to the CPU for quick data access. • – Translates high-level code into machine code at once. • ...
FUNGAL BASICS 2025-05-06
Across
- A unicellular fungus used in baking and brewing.(5)
- Fungi are more closely related to _ than to plants.(7)
- Fungi secrete _ to break down complex molecules.(7)
- The cell walls of the fungi are made of _.(6)
- Fungi are _, meaning they absorb nutrients from outside their body.(10)
- Mutualistic relationship between fungi and plant roots.(10)
Down
- Fungal lifestyle that breaks down dead organic materials.(10)
- Fungi reproduce using _, produced sexually or asexually.(6)
- A mass of hyphae is called a _.(8)
- Networks of branched filaments that make up fungal bodies.(6)
10 Clues: A mass of hyphae is called a _.(8) • The cell walls of the fungi are made of _.(6) • A unicellular fungus used in baking and brewing.(5) • Fungi secrete _ to break down complex molecules.(7) • Fungi are more closely related to _ than to plants.(7) • Fungi reproduce using _, produced sexually or asexually.(6) • ...
FUNGAL BASICS 2025-05-06
Across
- A unicellular fungus used in baking and brewing.(5)
- Fungi are more closely related to _ than to plants.(7)
- Fungi secrete _ to break down complex molecules.(7)
- The cell walls of the fungi are made of _.(6)
- Fungi are _, meaning they absorb nutrients from outside their body.(12)
- Mutualistic relationship between fungi and plant roots.(11)
Down
- Fungal lifestyle that breaks down dead organic materials.(10)
- Fungi reproduce using _, produced sexually or asexually.(6)
- A mass of hyphae is called a _.(8)
- Networks of branched filaments that make up fungal bodies.(6)
10 Clues: A mass of hyphae is called a _.(8) • The cell walls of the fungi are made of _.(6) • A unicellular fungus used in baking and brewing.(5) • Fungi secrete _ to break down complex molecules.(7) • Fungi are more closely related to _ than to plants.(7) • Fungi reproduce using _, produced sexually or asexually.(6) • ...
Mindware 1 2025-06-23
Across
- A networking device that connects multiple networks together and forwards data PACKETS BETWEEN THEM
- company which created Sophia humanoid ROBOT
- which company launched the first SMARTPHONE
Down
- Which protocol is used to send e-maiL
- Which company developed the humanoid "atlas"
- McCARTHY LISP programming language was created by
- What is the extension type of the excel files
- What is the name of the device that connects two computers by means of telephone line
- The location of a resource on the internet is given by it
- What allows websites to remember user DATA BETWEEN VISITS
10 Clues: Which protocol is used to send e-maiL • company which created Sophia humanoid ROBOT • which company launched the first SMARTPHONE • Which company developed the humanoid "atlas" • What is the extension type of the excel files • McCARTHY LISP programming language was created by • The location of a resource on the internet is given by it • ...
tech terms 2 2025-10-21
Across
- to shut down and restart a computer
- Portable Document Format
- hardware that's connected to the internet
- illegally access computer systems, data, and networks
- systems different operating systems(android windows and linux.)
Down
- 1 million bytes
- Internet Protocol
- the standard language used to create web pages and define their structure and content
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- a small text file stored on your device by a website to remember information about your visit
10 Clues: 1 million bytes • Internet Protocol • Portable Document Format • to shut down and restart a computer • hardware that's connected to the internet • illegally access computer systems, data, and networks • systems different operating systems(android windows and linux.) • the standard language used to create web pages and define their structure and content • ...
Office Management 2025-10-11
Across
- A room or building used for commercial or professional work.
- The process of making plans for something.
- programs and operating information used by a computer.
- The fact or quality of being on time.
- The state of keeping or being kept secret or private.
Down
- The process of entrusting a task or responsibility to a subordinate.
- A system or organization where people are ranked by status or authority.
- SECURITY Protecting networks and data from unauthorized use.
- INTELLIGENCE Computer systems able to perform tasks normally requiring human intelligence.
- Distinctive attributes or characteristics.
10 Clues: The fact or quality of being on time. • The process of making plans for something. • Distinctive attributes or characteristics. • The state of keeping or being kept secret or private. • programs and operating information used by a computer. • A room or building used for commercial or professional work. • SECURITY Protecting networks and data from unauthorized use. • ...
Digital World 2021-10-29
Across
- are built specifically for Internet web browsers to track, personalize, and save information about each user's session.
- refers to a company that provides access to the Internet to both personal and business customers.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
- a concept describing a widespread interconnected digital technology.
- a software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.
- is the portion of a computer that retrieves and executes instructions.
- a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.
Down
- means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- the computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.
- the introductory page of a website, typically serving as a table of contents for the site.
- that enables a user to obtain covert spyware information about another's computer activities by transmitting data covertly from their hard drive.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.
- a sequence of keyboard symbols that serves to represent a facial expression
- a person who uses computers to gain unauthorized access to data.
- a format for storing uncompressed audio files
18 Clues: a format for storing uncompressed audio files • a person who uses computers to gain unauthorized access to data. • a concept describing a widespread interconnected digital technology. • is the portion of a computer that retrieves and executes instructions. • a sequence of keyboard symbols that serves to represent a facial expression • ...
PBHL 4603 Exam 3 Revision 2022-11-15
Across
- Reinforcement involving the removal of an aversive stimulus.
- Type of learning that occurs vicariously.
- This concept explains how innovations diffuse through informal networks.
- Community-level factors impacting individual behavior make up this system.
Down
- Risk takers who like to try new inventions.
- Bronfenbrenner's term for interpersonal interactions impacting the individual.
- Jason gets sweaty palms when he opens his Blackboard exam. What type of conditioning is this?
- Value placed on a behavioral outcome.
8 Clues: Value placed on a behavioral outcome. • Type of learning that occurs vicariously. • Risk takers who like to try new inventions. • Reinforcement involving the removal of an aversive stimulus. • This concept explains how innovations diffuse through informal networks. • Community-level factors impacting individual behavior make up this system. • ...
Data and Data Management 2023-04-23
Across
- of data.
- It may include facilities, equipment, repositories, instruments, tools,
- and others to create, update, administer and otherwise interact with a relational database.
Down
- DBMS Is a collection of programs and capabilities that enable IT
- Warehouse basically a database specially designed to store, filter, retrieve, and analyze very large
- Facts, information, and skills acquired through experience or
- the theoretical or practical understanding of a subject.
- software, networks and hardware.
8 Clues: of data. • software, networks and hardware. • the theoretical or practical understanding of a subject. • Facts, information, and skills acquired through experience or • DBMS Is a collection of programs and capabilities that enable IT • It may include facilities, equipment, repositories, instruments, tools, • ...
Digital Awareness 2025-10-23
Across
- – Information such as videos, articles, or images shared online
- – Systems that connect computers to share data
- – A global network that connects computers and allows communication
Down
- – Content like text, audio, video, and images shared online
- – To work together using digital tools or platforms
- – To share information or ideas through digital means
- – Involving technology or devices that use binary code
- – Tools like phones, tablets, or computers used to access digital media
8 Clues: – Systems that connect computers to share data • – To work together using digital tools or platforms • – To share information or ideas through digital means • – Involving technology or devices that use binary code • – Content like text, audio, video, and images shared online • – Information such as videos, articles, or images shared online • ...
BEEFY Protocol 2026-02-12
Across
- BEEFY checks _____ from random validators to significantly reduce checks
- Example of one company that has used BEEFY
- To achieve interoperability many blockchains rely on
Down
- Each of them has its own approach to deal with decentralized
- Currently, blockchain networks looks like a cluster of
- What protocol is fundamental in both blockchains for BEEFY to work
- Solutions to the interoperability blockchain problem
- An architecture for trusted bridges between proof-of-stake blockchains
8 Clues: Example of one company that has used BEEFY • Solutions to the interoperability blockchain problem • To achieve interoperability many blockchains rely on • Currently, blockchain networks looks like a cluster of • Each of them has its own approach to deal with decentralized • What protocol is fundamental in both blockchains for BEEFY to work • ...
IT-Terms 2024-04-18
Across
- A security device that monitors and controls the traffic between a network or computer system and the internet to block unwanted access or threats.
- Software that manages computer hardware and provides common services and functions for other software applications, such as Windows, macOS, and Linux.
- (Random Access Memory) A type of computer memory that allows data to be accessed randomly, typically used to temporarily store data and instructions for processing.
- A set of instructions or rules used to solve a specific problem or perform a particular task, especially in computer science.
- A computer or system that provides services or resources to other computers or devices on a network, such as files, printers, or applications.
- The process of converting data into a form that is unreadable to unauthorized users to ensure the security and confidentiality of information.
Down
- Malicious software designed to damage, steal, or manipulate computers, networks, or data, often without the knowledge or consent of the user.
- A widely used technology for wired networks that enables the transmission of data across a local area network (LAN) by defining a standardized set of rules for data communication.
- Programs and applications that run on a computer or other electronic device to perform specific tasks or provide functions.
- A structured collection of data that is organized in a way that allows for easy retrieval, manipulation, and management.
- An application software used to display and browse web pages on the internet by interpreting and rendering HTML documents.
- (Central Processing Unit) The primary component of a computer that performs instructions and processes data to execute programs.
12 Clues: A structured collection of data that is organized in a way that allows for easy retrieval, manipulation, and management. • An application software used to display and browse web pages on the internet by interpreting and rendering HTML documents. • ...
Terminology Learning Experience - AR 2024-05-02
Across
- Impact performance by reducing the size of data, resulting in faster transfer and retrieval times.
- Its goal is to make networks more agile and flexible by separating the forwarding of network packets (the infrastructure layer) from the logical decision-making process (the control layer).
- It is a proprietary protocol developed by Microsoft that enables users to remotely access and control a computer or virtual machine over a network connection.
- Is a dedicated network connection that provides a private, high-bandwidth link between on-premises infrastructure and cloud services, enabling secure and reliable communication.
- It allows for scalable and efficient storage of unstructured data in the cloud.
Down
- The primary advantage of this is the reduction in storage space requirements.
- Enables multiple users to access and collaborate on shared files in the cloud, providing a central repository for documents, presentations, spreadsheets, and other file types.
- Compression and Deduplication allow you to obtain additional services at any time. What's another name for this.
- It is a secure, encrypted connection that allows remote users or networks to connect to a private network over the internet, providing a secure pathway for data transmission.
- Hot storage and Cold Storage are examples of
- A great thing about this access type is that every client device, including desktops, laptops, tablets, and smartphones, has a built-in web browser. Even better, nearly all users know how to use them!
- You are obtaining cloud-based networking for your company. The CIO insists that the cloud resources be as safe as possible from potential hackers. Which service will help with this?
12 Clues: Hot storage and Cold Storage are examples of • The primary advantage of this is the reduction in storage space requirements. • It allows for scalable and efficient storage of unstructured data in the cloud. • Impact performance by reducing the size of data, resulting in faster transfer and retrieval times. • ...
CCNA1 Quick Revision 2021-01-27
Across
- A device that forwards data packets along networks.
- Also known as Physical address, Hardware address or Layer 2 address.
- address Also known as Logical address or Layer 3 address.
- The PDU at the physical layer.
- It converts an IP address to its corresponding physical network address.
- A shared-bandwidth device.
- This layer is logically divided into two sublayers the MAC Sublayer and the LLC Sublayer.
- A single network channel capable of delivering multiple communication forms.
Down
- This layer is responsible for managing logical addressing.
- The seventh layer in OSI network model.
- A device that filters and forwards packets between LAN segments.
- The PDU at the network layer.
- The PDU at the data link layer.
- Bring your own device.
- This layer support TCP and UDP protocols.
15 Clues: Bring your own device. • A shared-bandwidth device. • The PDU at the network layer. • The PDU at the physical layer. • The PDU at the data link layer. • The seventh layer in OSI network model. • This layer support TCP and UDP protocols. • A device that forwards data packets along networks. • address Also known as Logical address or Layer 3 address. • ...
CCNA1 Quick Revision 2021-01-27
Across
- The PDU at the network layer.
- Also known as Physical address, Hardware address or Layer 2 address.
- Also known as Logical address or Layer 3 address.
- A shared-bandwidth device.
- The fourth layer in TCP/IP model.
- A single network channel capable of delivering multiple communication forms.
- A device that filters and forwards packets between LAN segments.
Down
- The PDU at the data link layer.
- This layer support TCP and UDP protocols.
- This layer is logically divided into two sublayers the MAC Sublayer and the LLC Sublayer.
- The PDU at the physical layer.
- A device that forwards data packets along networks.
- Bring your own device.
- It converts an IP address to its corresponding physical network address.
- This layer is responsible for managing logical addressing.
15 Clues: Bring your own device. • A shared-bandwidth device. • The PDU at the network layer. • The PDU at the physical layer. • The PDU at the data link layer. • The fourth layer in TCP/IP model. • This layer support TCP and UDP protocols. • Also known as Logical address or Layer 3 address. • A device that forwards data packets along networks. • ...
Las asignaturas 2024-02-10
Across
- Understanding the natural world through observation, experimentation, and evidence-based reasoning.
- Study of computers, software, networks, and other digital technologies.
- Language spoken in Spain and numerous countries in Latin America.
- The nature and properties of matter and energy.
- Physical fitness, sports, and overall health.
- Past events, people, and civilizations, often focusing on their causes and effects.
- Acting, theater production, and dramatic performance.
Down
- Study of numbers, quantities, shapes, and patterns, including arithmetic, algebra, geometry, and calculus.
- Recording, analyzing, and reporting of financial transactions.
- The composition, properties, and reactions of substances.
- Study of the society.
- Language arts, including literature, writing, grammar, and reading comprehension.
- Language spoken in France and many other countries around the world.
- Culinary skills, including food preparation, cooking techniques, and nutrition.
- Creativity and visual expression.
15 Clues: Study of the society. • Creativity and visual expression. • Physical fitness, sports, and overall health. • The nature and properties of matter and energy. • Acting, theater production, and dramatic performance. • The composition, properties, and reactions of substances. • Recording, analyzing, and reporting of financial transactions. • ...
Planning 2025-01-21
Across
- The study and design of cities and towns
- Buildings of special architectural or historic interest with legal protection
- Process to challenge a planning decision
- Levy charged on new developments to fund local infrastructure
- Previously developed land now available for redevelopment
- Systems like transport, utilities, and communication networks
Down
- Type of development allowed without full planning permission
- Spaces accessible to all, such as parks, streets, and squares (two words)
- A comprehensive design scheme for future urban development
- Preserving and enhancing historical or natural environments
- Variety of life in a particular habitat or ecosystem
- Housing provided at below-market rates
- Revitalization of urban areas through development and investment
- Measure of population or building concentration in an area
- Protected land around urban areas to prevent sprawl
15 Clues: Housing provided at below-market rates • The study and design of cities and towns • Process to challenge a planning decision • Protected land around urban areas to prevent sprawl • Variety of life in a particular habitat or ecosystem • Previously developed land now available for redevelopment • A comprehensive design scheme for future urban development • ...
COMPONENTS OF A COMPUTER 2025-01-05
Across
- Looks like a television and displays output.
- Produces a physical copy of digital documents.
- Produces sound output from the computer.
- Supply Unit (PSU) Provides electricity to all computer parts.
- Known as the brain of the computer.
- The main circuit board that connects all components.
- Drive (HDD) Stores all data and files permanently.
Down
- Captures sound input for recording or communication.
- Converts physical documents or images into digital form.
- Card Processes images and videos for display.
- Card Connects the computer to the internet or local networks.
- Has keys for typing letters, numbers, and symbols.
- A small device used to point, click, and drag items.
- (Random Access Memory) Temporary memory that helps the computer run faster.
- Captures video input for online meetings or recording.
15 Clues: Known as the brain of the computer. • Produces sound output from the computer. • Looks like a television and displays output. • Card Processes images and videos for display. • Produces a physical copy of digital documents. • Has keys for typing letters, numbers, and symbols. • Drive (HDD) Stores all data and files permanently. • ...
Ancient Egypt 2023-12-08
Across
- Things exiting a civilization that sold them.
- These people sell goods and are in the middle class.
- Trade routes allowed Egyptians to buy and sell ______.
- The rulers of Ancient Egypt.
- These were built to honor the pharaohs.
- Triangle shaped piece of land where at the end of a river.
- A dynasty is passed from member to member of the same ______.
- The Ancient Egyptian Civilization was built around this river.
Down
- The Egyptian writing system
- The Rosetta Stone helped us _______ hieroglyphics.
- The Nile River supplied resources, fertile soil, trade routes and _____.
- Pharaohs of Ancient Egypt were treated like these.
- Things brought into a new civilization that bought them.
- The ______ Stone helped us translate Hieroglyphics for the first time.
- Trade networks started as _______ between different civilizations.
15 Clues: The Egyptian writing system • The rulers of Ancient Egypt. • These were built to honor the pharaohs. • Things exiting a civilization that sold them. • The Rosetta Stone helped us _______ hieroglyphics. • Pharaohs of Ancient Egypt were treated like these. • These people sell goods and are in the middle class. • Trade routes allowed Egyptians to buy and sell ______. • ...
Networking concepts 2025-06-17
Across
- - A wireless way to connect to the internet
- - A type of wired connection used in LANs
- - A wide area network, covering large geographic areas
- - A set of rules for communication between computers
- - A device that connects a network to the Internet
- - The web address used to access websites
- - The amount of data that can be transmitted at once
Down
- - A security system that blocks unauthorized access
- - A computer that provides data to other computers
- - A computer that receives data from a server
- - A device that connects different networks together
- - A device that connects multiple devices in a LAN
- - A local area network within a small area like a school or home
- - Translates domain names to IP addresses
- Address - A unique number assigned to each device on a network
15 Clues: - A type of wired connection used in LANs • - The web address used to access websites • - Translates domain names to IP addresses • - A wireless way to connect to the internet • - A computer that receives data from a server • - A computer that provides data to other computers • - A device that connects a network to the Internet • ...
NETWORKING CONCEPTS 2025-05-19
Across
- each node is connected with every node
- simplest form of network
- enables you to connect the computer to the available internet
- protecting data and resources from any unauthorized access
- A user is given a unique name and password
- network that is created for an individual
Down
- requires a single communication line or one main cable
- two or more computers and peripheral devices are connected
- all the nodes in the network are connected in a circular manner
- works similar to a hub
- physically attach a computer to a network
- device that connects two different types of networks
- consists of a group of star figured workstations
- a group of computers are linked together for the purpose of sharing data and hardware resources
- computers that communicate with each other
15 Clues: works similar to a hub • simplest form of network • each node is connected with every node • physically attach a computer to a network • network that is created for an individual • A user is given a unique name and password • computers that communicate with each other • consists of a group of star figured workstations • device that connects two different types of networks • ...
NETWORKING CONCEPTS 2025-05-19
Across
- physically attach a computer to a network
- simplest form of network
- a group of computers are linked together for the purpose of sharing data and hardware resources
- computers that communicate with each other
- consists of a group of star figured workstations
- protecting data and resources from any unauthorized access
- network that is created for an individual
Down
- two or more computers and peripheral devices are connected
- all the nodes in the network are connected in a circular manner
- A user is given a unique name and password
- works similar to a hub
- device that connects two different types of networks
- enables you to connect the computer to the available internet
- each node is connected with every node
- requires a single communication line or one main cable
15 Clues: works similar to a hub • simplest form of network • each node is connected with every node • physically attach a computer to a network • network that is created for an individual • A user is given a unique name and password • computers that communicate with each other • consists of a group of star figured workstations • device that connects two different types of networks • ...
Information Security Crossword 2025-09-03
Across
- principle of keeping data accurate and unchanged. (9 letters)
- program that spreads by attaching to files. (5 letters)
- secret used to access systems. (8 letters)
- security item to secure doors. (5 letters)
- designed to damage or disrupt. (7 letters)
- accounts with two or more verification steps. (3 letters)
- document defining how data is handled. (6 letters)
Down
- who gains unauthorized access. (6 letters)
- review of systems for compliance and risks. (5 letters)
- information unreadable without a key. (11 letters)
- control that limits who can see or use data. (9 letters)
- messages used to trick people into giving data. (8 letters)
- hidden malicious program disguised as useful. (6 letters)
- where someone pretends to be another user. (11 letters)
- systems and networks from attacks. (10 letters)
15 Clues: who gains unauthorized access. (6 letters) • secret used to access systems. (8 letters) • security item to secure doors. (5 letters) • designed to damage or disrupt. (7 letters) • systems and networks from attacks. (10 letters) • information unreadable without a key. (11 letters) • document defining how data is handled. (6 letters) • ...
Sarah cybersecurity passwords 2026-04-02
Across
- The collection of data stored online
- spreads across devices while replicating within a network
- Unwanted software that secretly installs and puts pop ups on your device
- protects data from being changed or stolen
- a backup of daily changes or new files
- a code that is capable of corrupting the system or destroying data.
- A malicious software that secretly infects devices to steal information
- A complete copy of all data files
Down
- keeps software and apps from being hacked into
- plans how to restore data AFTER being attacked
- The freedom from being observed or disturbed
- Stores backup files at an alternative location
- A download disguised as a program
- protects how data is handled and shared
- Protects computer networks from hackers and unauthorized access
15 Clues: A download disguised as a program • A complete copy of all data files • The collection of data stored online • a backup of daily changes or new files • protects how data is handled and shared • protects data from being changed or stolen • The freedom from being observed or disturbed • keeps software and apps from being hacked into • ...
Jadian crossword puzzle title 2026-04-06
Across
- — A copy of data stored in case of loss.
- — Software that secretly collects user information.
- — Fake messages that trick people into giving personal information.
- Engineering — Manipulating people into giving confidential information.
- — A malicious program that spreads by attaching itself to files.
- Authentication — A login method requiring two forms of verification.
- Footprint — The trail of data you leave online.
- — Malware that spreads automatically across networks without user action.
Down
- — Scrambling data so only authorized users can read it.
- — Malware that locks files and demands payment to unlock them.
- — A secret word used to access an account.
- — A security system that blocks unauthorized network access.
- — Installing the latest software fixes and security patches.
- Security — Protecting a computer network from threats.
- — Software designed to harm or exploit a computer system.
15 Clues: — A copy of data stored in case of loss. • — A secret word used to access an account. • Footprint — The trail of data you leave online. • — Software that secretly collects user information. • Security — Protecting a computer network from threats. • — Scrambling data so only authorized users can read it. • — Software designed to harm or exploit a computer system. • ...
Cyber Ready 2022-09-15
Across
- A person who uses technical skills and technology to gain unauthorized access to systems, networks, or data to commit crimes.
- A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones
- The act of applying effective technical and practical security measures to meet the regulatory or contractual requirements of a third party.
- URLS that lead the user to download a virus or visit a harmful website
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
- The probability of exposure or loss that can result from a cyberattack or data breach
- A self-replicating program that spreads across a network
- Malicious code that spreads through devices to damage them or steal the data within them.
Down
- A type of phishing based on previously gathered information about a target that's publicly available or gained from a data breach.
- . A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
- The possibility of an attack to gain unauthorized access to, damage, or steal information, intellectual property, or data.
- A type of phishing attack that tricks C-suite employees into falling for some sort of emergency where they click a link or attachment that installs malware or steals sensitive information
- Malicious code intended to monitor your activity without your permission.
- preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.
- Settings on folders or files that control who is allowed to access them.
- Unauthorized entry to gain access to computer data, applications, networks, or devices.
- A security approach based on the concept that all users both inside and outside an organization's network must have security authentication, authorization, and validation before gaining access to applications or data
- An attack intended to make a machine or network inaccessible to its authorized users
18 Clues: A self-replicating program that spreads across a network • URLS that lead the user to download a virus or visit a harmful website • Settings on folders or files that control who is allowed to access them. • Malicious code intended to monitor your activity without your permission. • ...
