networks Crossword Puzzles
q 2023-12-20
Across
- Abbreviation for a type of network that covers a large geographic area
- Standard for wireless network communication
- A device that connects multiple network segments
- Abbreviation for the protocol that assigns IP addresses automatically
- A system that translates domain names into IP addresses
Down
- Data unit at the network layer
- An attack where an attacker floods a network with traffic to disrupt its normal operation
- High-speed network technology commonly used for local area networks
- Communication protocol used for email transmission
9 Clues: Data unit at the network layer • Standard for wireless network communication • A device that connects multiple network segments • Communication protocol used for email transmission • A system that translates domain names into IP addresses • High-speed network technology commonly used for local area networks • ...
Humanizing Technology: Some Key Concepts 2024-08-21
Across
- proactive efforts to help people have a more fulfilling live
- adjustment of teachers' expectations and behaviors as a result of learning analytics
- unwillingness to deal with other points of view
- the ways in which physical objects are connected to virtual, online networks
- a model that developed to understand the effects of technology on the users
Down
- sharing misinformation, desinformation, and fake news,
- lack of focus/partial attention
- the access gat to technological and other resources
- artificial intelligence that creates new content
9 Clues: lack of focus/partial attention • unwillingness to deal with other points of view • artificial intelligence that creates new content • the access gat to technological and other resources • sharing misinformation, desinformation, and fake news, • proactive efforts to help people have a more fulfilling live • ...
IST - Crossword 2024-11-03
Across
- programmed computer system to block access to private networks
- A unit of data that is sent across a network
- private network owned by a company or organisation
- A protocol that designs the front-end of a website
- protocol used in web design
Down
- Complex language used to create interactive elements
- Small files that can access stored info from a device
- protocol for downloading and uploading files through the internet
- A set of information that describes how computers communicate with each other on a network.
9 Clues: protocol used in web design • A unit of data that is sent across a network • private network owned by a company or organisation • A protocol that designs the front-end of a website • Complex language used to create interactive elements • Small files that can access stored info from a device • programmed computer system to block access to private networks • ...
Maltese 2025-04-16
Across
- A key sector Malta is known for besides tourism and finance
- The capital city, where many startups set up shop
- A place where founders pitch ideas, build networks, and raise funding
- A person who takes risks to build something new
Down
- A digital or tech-based new business
- The small but mighty island in the Mediterranean
- One word: turning an idea into a business
- Type of tax Malta is famous for offering at a reduced rate to foreign businesses
- Malta’s biggest source of income?
9 Clues: Malta’s biggest source of income? • A digital or tech-based new business • One word: turning an idea into a business • A person who takes risks to build something new • The small but mighty island in the Mediterranean • The capital city, where many startups set up shop • A key sector Malta is known for besides tourism and finance • ...
alex smells 2025-10-09
Across
- A service of the internet that contains websites, web pages, and the links between them.
- A machine located on the internet that holds website pages
- a portable computer
- a cabel with light
- fake wifi
Down
- can be connected to wifi
- A worldwide network of interconnected networks
- A series of web pages located on the internet. They are often written in a programming language called HTML, and frequently contain text and images.
- a fake email that tries to get your details
9 Clues: fake wifi • a cabel with light • a portable computer • can be connected to wifi • a fake email that tries to get your details • A worldwide network of interconnected networks • A machine located on the internet that holds website pages • A service of the internet that contains websites, web pages, and the links between them. • ...
Unit 1 Vocabulary 2022-11-10
Across
- 1. Panorama 2.Perceiving something material by means of the sense of sight 3.Opinion
- Understand wrongly
- Indicates that two people are facing each other.
- Tell, notify
- Discuss / chat about something
- Tranfer, computer data
- Most recent news report
- Expressing / making the message understood
- Speak directly
- To cause a thing or person to pass through a series of successive states, so that it grows, increases or progresses.
- Handle / To use or treat a thing for a particular purpose
- Be less serious
Down
- Cut off, create a break in / Disrupt
- In modern times
- Manifest your emotions
- Communication networks
- 1. Difficult task 2.Dare
- Formal warning / Become aware of
- Talk lightly
- 1. Use together 2. Allow others to use
- Making a thing public or known
- Extend, propagate
- Spanning the world / all over the world
- Sending typed mobile phone messages
- Complicated
- Stay in contact
- Orally expressing a personal judgement, opinion or observation about something or someone.
- Correctly
28 Clues: Correctly • Complicated • Talk lightly • Tell, notify • Speak directly • In modern times • Stay in contact • Be less serious • Extend, propagate • Understand wrongly • Manifest your emotions • Communication networks • Tranfer, computer data • Most recent news report • 1. Difficult task 2.Dare • Making a thing public or known • Discuss / chat about something • Formal warning / Become aware of • ...
BTT10 2022-11-10
Across
- stores data using flash based memory
- short term memory where data is stored
- holds the physical parts of a computer
- it is a device that determines the quality of what is on ur screen
- is known as the brain of the PC
- ties all the computer components together
- a device that displays images
- a non-volatile data storage device
- it transfers information on to paper
- various physical components of a computer
Down
- type of optical disc used for data storage
- a device that can make a sound louder
- a device that allows you to enter letters,numbers, and symbols.
- for performing calculations automatically
- the use of computers,storage, and networking
- a world wide system of computer networks
- an expansion device that provides an existing computer with certain added capabilities
- it connects different devices to the computer
- a device that allows you to control the range of things on a computer
- a cable that transmits power or data between devices
20 Clues: a device that displays images • is known as the brain of the PC • a non-volatile data storage device • stores data using flash based memory • it transfers information on to paper • a device that can make a sound louder • short term memory where data is stored • holds the physical parts of a computer • a world wide system of computer networks • ...
unit 5 lab 2022-12-22
Across
- records the electrical activity of the heart.
- the pericardial sac around the heart is inflamed.
- condition process or method
- increased pressure in the blood vessels.
- networks of small vessels that perfuse tissues.
- small
- heart is not efficiently pumping from the left ventricle, causing reduced blood flow.
- complete stopping of the heart.
- specialized area of radiology
Down
- evaluate how well this system is functioning.
- uses ultrasound to look at the heart and its vessels.
- without
- pumps blood through the system.
- an artery has a weakened wall, causing it to swell, like a balloon.
- look at blood going through blood vessels to determine if they are narrowed or have a thrombus
- vessels that return blood to the heart.
- vessels that deliver blood to tissues.
- heart failure
- within
- Cerebrovascular accident
- Left ventricular assist device
- bring in air from the atmosphere and pass oxygen into the bloodstream.
- beyond or excess
- cardiovascular pulmonary resuscitation
- permanent pacemaker
25 Clues: small • within • without • heart failure • beyond or excess • permanent pacemaker • Cerebrovascular accident • condition process or method • specialized area of radiology • Left ventricular assist device • pumps blood through the system. • complete stopping of the heart. • vessels that deliver blood to tissues. • cardiovascular pulmonary resuscitation • ...
Computer Concepts 2020-10-14
Across
- An output device.
- Largely determines how fast a computer operates.
- Wide Area Network
- Word processing software application.
- Physical components of the computer system.
- The 2nd step in the computer process.
- Group of computers linked together to share information, communication and/or resources.
- Brains of the computer system.
- A trillion bytes of information.
- Typically holds 4-128 GB of information.
- A billion bytes of information.
- The 3rd step in the computer process.
- The 1st step in the computer process.
- Developed in 1969.
Down
- One piece of information such as one letter.
- Used for calculating and manipulating numbers and creating charts/graphs of data.
- Manages hardware, software and files.
- Extra, external hardware components such as a printer.
- Changes as software programs are updated.
- PowerPoint is an example.
- Spreadsheet application program.
- Category of software programs.
- Local Area Network
- An input device.
- World wide network of networks.
- Instructions that make computer hardware work.
- The final step in the computer process.
27 Clues: An input device. • An output device. • Wide Area Network • Local Area Network • Developed in 1969. • PowerPoint is an example. • Category of software programs. • Brains of the computer system. • A billion bytes of information. • World wide network of networks. • Spreadsheet application program. • A trillion bytes of information. • Manages hardware, software and files. • ...
Unit 7 Crossword 2015-12-16
Across
- different types of chemicals and elements used to power certain things
- made from natural light, and can be absorbed and used as energy
- found but might exist
- on three factors
- as trade passage between Europe and Asia in the 1800’s
- associated with the established transportation networks accessible from a specific place.
- of resources that can be used as fuel, like wood and coal
- popular in late 20th century
- much people are willing to buy
- millions of years ago
- much something is for sale
Down
- types of these exist
- in a country once a year
- resulting from the unique characteristics of a location.
- that have been discovered
- of women who have finished high school
- during the second half of the 18th Century
- creation of products
- that has 5 different types of parts
- energy source used in Nuclear Power Plants
20 Clues: on three factors • types of these exist • creation of products • found but might exist • millions of years ago • in a country once a year • that have been discovered • much something is for sale • popular in late 20th century • much people are willing to buy • that has 5 different types of parts • of women who have finished high school • during the second half of the 18th Century • ...
2015 Physics Holiday Party 2015-12-09
Across
- / Drives a Boxter
- / Medical School that Dr. Ruffer graduated from
- / Played college baseball
- / Won a $35,000 grant
- / Was a mechanical engineer before becoming a physicist
- / Considered sending her daughter to badminton school
- / Lives in Indiana
- / Cyberknife Advocate
- / Site that has a lamb sculpture in the lobby
- / Awarded best dosimetry plan prize in 2014
- / Missing the tip of a finger
- / Site with Truebeam SN 2132
- / Just came back from Houston
Down
- / Lived in Canada
- / Next generation Varian linac
- / Fan of the Cardinals (College football)
- / Designated site that will treat the President in case of an emergency
- / Received Nobel Prize for discovering Photoelectric Effect
- / Received Ph.D. for work in neural networks
- / Was Director of Physics in 1998
- / Classmate of Kathy in dosimetry school
- / Visited Bora Bora and Costa Rica
- / Wrote a paper on neutron activation of a Grid block
- / Physician that can program in C Sharp
- / Fan of the Cardinals (baseball)
- / Graduated from MD Anderson
26 Clues: / Lived in Canada • / Drives a Boxter • / Lives in Indiana • / Won a $35,000 grant • / Cyberknife Advocate • / Played college baseball • / Site with Truebeam SN 2132 • / Graduated from MD Anderson • / Missing the tip of a finger • / Just came back from Houston • / Next generation Varian linac • / Was Director of Physics in 1998 • / Fan of the Cardinals (baseball) • ...
Network Security 2018-08-24
Across
- determining the privileges of a user
- protection of information or information resources
- commonly used hash function that makes 128-bit hash value
- Access, Authentication, Authorization
- puts up a barrier in between internal network and outside networks
- collections of equal and non-equal encryption algorithms
- combines multiple layers of defenses at the edge and in the network
- determines physical location
Down
- stop people from uploading or forwarding important information in an not safe way
- automatically sees activities that are not normal
- cryptographic hash functions published by NIST
- control web use, block threats, and deny access to malicious websites
- the only protection for the data when the defense fails
- Confidentiality, Integrity, Availability
- protects a wireless network
- blocks incoming attacks and controls outbound messages to prevent the loss of data
- hiding information in blocks or within images
- Determining the privileges to resources, objects, or data
- countermeasures to avoid or fight against security risks
- encrypts the connection from an endpoint to a network
20 Clues: protects a wireless network • determines physical location • determining the privileges of a user • Access, Authentication, Authorization • Confidentiality, Integrity, Availability • hiding information in blocks or within images • cryptographic hash functions published by NIST • automatically sees activities that are not normal • ...
70s Technology Advancements 2023-07-26
Across
- - Random Access Memory, critical for computer data access.
- - Miniature electronic circuit on a single chip.
- - Scannable code revolutionizing inventory management and sales.
- - Early versions of portable communication devices.
- - Video Cassette Recorder, changing home entertainment forever.
- - Electronic imaging device for capturing photographs.
- - Device emitting amplified light, finding various applications.
- - Early personal computer systems like the Altair 8800.
- - Timepiece with electronic display, a symbol of modernity.
- - Early video game systems like the Magnavox Odyssey.
Down
- - Handheld electronic device for mathematical calculations.
- - Advanced optical instrument used for magnifying objects.
- - Central processing unit (CPU) on a microchip, revolutionizing computing.
- - Global Positioning System, providing precise location information.
- - Electronic mail, a revolutionary form of communication.
- - Portable communication device for receiving short messages.
- - Computer operating system laying the groundwork for future systems.
- - Software company founded in the mid-70s, shaping the future of computing.
- - Networking technology enabling local area networks (LANs).
- - Removable storage media for computers in the 70s.
20 Clues: - Miniature electronic circuit on a single chip. • - Early versions of portable communication devices. • - Removable storage media for computers in the 70s. • - Early video game systems like the Magnavox Odyssey. • - Electronic imaging device for capturing photographs. • - Early personal computer systems like the Altair 8800. • ...
Geo Extravaganza!!!! 2023-09-29
Across
- places grouped together based on similar characteristics
- 0 degrees latitude
- country known for auto and tech manufacturing
- level of economic activity where resources are gathered
- chain of islands
- roads, bridges, transportation networks, etc.
- 0 degrees longitude
- tropical storm in the pacific ocean going towards asia
Down
- desert
- area around the pacific ocean where there is a lot of volcanic activity and earthquakes
- level of economic activity where things are manufactured
- countries who have a lower standard of living
- dividing the world into halves (ie northern and southern)
- referring to the parts of geography like culture, language, politics, and religions
- tropical storm in the atlantic ocean
- referring to the parts of geography like landforms (mountains, rivers, climate, etc.)
- ability to read or write
- where goods or services are sold to the consumer
- place of worship for muslims
- weather patterns for an area over a long period of time
- wealthy countries with good infrastructure
21 Clues: desert • chain of islands • 0 degrees latitude • 0 degrees longitude • ability to read or write • place of worship for muslims • tropical storm in the atlantic ocean • wealthy countries with good infrastructure • countries who have a lower standard of living • country known for auto and tech manufacturing • roads, bridges, transportation networks, etc. • ...
Español 3H Unit 1 Vocab 2025-08-19
Across
- you don't say!
- to have
- to be (temporary)
- homework
- committed
- cell phone
- persistent
- playful
- of course!
- open-minded
- lively
- for/by
- with
- computer (Spain)
- to be (permanent)
- passionate
- whiteboard/blackboard
- to think
- to take out the trash
- student desks
- often, many times
- social networks
- to have a good time
- for
- what a shame!
- sometimes
- of/from
Down
- to do the shopping
- how cool!
- me too!
- to set the table
- to surf the internet
- there is/there are
- to chat online
- I don't understand!
- really?
- to dust the furniture
- to wash the clothes
- challenging, demanding
- never
- how interesting!
- proud
- towards
- to like
- to upload photos
- to go
- to clear the table
- I am sorry!
- always
- in/on
- melancholic
- capable
- until/up to
- to want
54 Clues: for • with • never • proud • to go • in/on • lively • for/by • always • me too! • to have • really? • playful • towards • to like • capable • to want • of/from • homework • to think • how cool! • committed • sometimes • cell phone • persistent • of course! • passionate • open-minded • I am sorry! • melancholic • until/up to • student desks • what a shame! • you don't say! • to chat online • social networks • to set the table • how interesting! • ...
AI in marketing 2025-10-22
Across
- = Using past data to forecast future trends
- = Relying too much on machine suggestions
- = Protection of personal information collected by AI systems
- = The study of how people buy and use products
- = An AI tool that communicates with users in natural language
- = A set of rules that an AI follows to make decisions
- = The creation of new ideas and technologies in marketing
- = AI detecting emotions in text or social media
- = Using AI to complete tasks without human effort
- = How people and AI systems work together
Down
- = Tailoring marketing messages to individual customers
- = AI suggesting products to customers
- = Very large sets of information analyzed by computers
- = Machines that can think and learn like humans
- = Promoting products using online platforms
- = Advanced machine learning using neural networks
- = Moral principles guiding the responsible use of AI
- = Adapting global AI tools to local cultures
- = A computer system modeled after the human brain
- = A type of AI that improves automatically through experience
20 Clues: = AI suggesting products to customers • = Relying too much on machine suggestions • = How people and AI systems work together • = Using past data to forecast future trends • = Promoting products using online platforms • = Adapting global AI tools to local cultures • = The study of how people buy and use products • = Machines that can think and learn like humans • ...
BoekOpdracht 2025-06-10
Across
- – Wat je doet als je nieuwe kennis of vaardigheden opdoet.
- – Getal dat de fout tussen voorspelling en waarheid meet.
- – Kunstmatige eenheid die signalen verwerkt.
- – Wat je schrijft om een neuraal netwerk te bouwen.
- – Veelgebruikte activatiefunctie die negatieve waarden afvlakt.
- – Structuur waarin meerdere neuronen parallel werken.
- – Wiskundige functie die bepaalt of een neuron vuurt.
- – “Eerst het belangrijkste” is een kernprincipe.
- – Programmeertaal gebruikt in het boek Neural Networks from Scratch.
- – Activatiefunctie met output tussen 0 en 1.
- – Eén volledige doorgang door de trainingsdata.
Down
- – Richting waarin de fout afneemt, gebruikt bij optimalisatie.
- – De metavaardigheid achter persoonlijke groei en effectiviteit.
- – Methode om fouten terug te verspreiden in een netwerk.
- – Informatierichting binnen een neuraal netwerk zonder terugkoppeling.
- – Samenwerking waarbij het geheel meer is dan de som der delen.
- – Verbindingssterkte tussen twee neuronen.
- – Waarde toegevoegd aan de input om de activatie te beïnvloeden.
- – Denken vanuit je einddoel, een centrale gewoonte.
- – De eerste gewoonte; zelf verantwoordelijkheid nemen.
20 Clues: – Verbindingssterkte tussen twee neuronen. • – Kunstmatige eenheid die signalen verwerkt. • – Activatiefunctie met output tussen 0 en 1. • – Eén volledige doorgang door de trainingsdata. • – “Eerst het belangrijkste” is een kernprincipe. • – Wat je schrijft om een neuraal netwerk te bouwen. • – Denken vanuit je einddoel, een centrale gewoonte. • ...
Crossword 2026-02-27
Across
- The closeness of a measured value to the true value
- A sequential circuit that counts pulses
- A worldwide network of interconnected computer networks
- Raw information processed by a computer
- A compact integrated circuit containing processor, memory, and I/O peripherals
- Parameter measured in Hertz
- A number system with base 2
- Electronic message sent over the internet
- A material whose electrical conductivity lies between a conductor and an insulator
- V = IR is also called as _____'s Law
- Stands for Random Access Memory
Down
- Ability to store electric charge
- ALU stands for _______ and Logical Unit
- A basic digital circuit performing a logical function is called as _____ gate
- Unit of light intensity
- A transmission medium that carries data in the form of light signals is called as _______ fibre
- A device that sends signals to a communication channel
- A protective device that melts due to overcurrent
- A component that opposes current
- A device that is used to sense parameters
20 Clues: Unit of light intensity • Parameter measured in Hertz • A number system with base 2 • Stands for Random Access Memory • Ability to store electric charge • A component that opposes current • V = IR is also called as _____'s Law • ALU stands for _______ and Logical Unit • A sequential circuit that counts pulses • Raw information processed by a computer • ...
for alex 2024-05-30
Across
- Network that functions around the world
- Made experiments with a frog
- Sudden flow of electricity beteween 2 electricity charged objects
- Network that functions in a single location and using a cable
- Standard unit of electrical resistance
- Collection of devices connected to allow sharing data
- It has memory effect,it´s heavy, created in the 90s
- Wiressly connects devices
- The Change i direction of a wave passing from one medium to another
Down
- Device that protects a circuit against brownouts,blackouts etc.
- Alternation or vibration of space
- They can charge chemical energy to electricity
- Device used to permanently store and retrieve information
- Network that belongs to one person
- Non volatil storage device that stores persistent data
- Radiant energy to which the organs of sight react
- Gave the name to the bluetooth
- It is a short-term storage memory
- Portable devicdes used to extinguish small fire
- Used to connect devices to a network
20 Clues: Wiressly connects devices • Made experiments with a frog • Gave the name to the bluetooth • Alternation or vibration of space • It is a short-term storage memory • Network that belongs to one person • Used to connect devices to a network • Standard unit of electrical resistance • Network that functions around the world • They can charge chemical energy to electricity • ...
Tech Terms 2024-12-03
Across
- Malicious software
- Central Processing Unit
- personal identification
- something you can tough
- Public website
- Prevents unauthorized access to personal data
- Ctrl+V=
- Ctrl+P=
- Portable Document format
- Open source software
- Website address
- A system connected to every electronic device
- Random access memory
- zeros&ones
- connecting a number of computer systems together to form local area networks
- A system providing information to other computers
- Data and information protection
- Storage device
Down
- computer created view of a virtual reality
- Online Journal
- Main printed circuit board
- A MILLION BITES
- Manages all other systems in the computer
- files of information
- Internet Protocol
- Transfer of data
- Hypertext markup language
- Ctrl+c=
- To reload the operating system
- Those who use tech and those who dont
- Providing information
- Domain name system
- Speaker
- something you can see
- keyboard,
- Portable Document format
- Input,Output,Storage,Process
- 8 bits
- Computer language
- Firefox
- Read only memory
- Icloud
43 Clues: Google • 8 bits • Icloud • Ctrl+c= • Speaker • Ctrl+V= • Ctrl+P= • Firefox • keyboard, • zeros&ones • Online Journal • Public website • Storage device • A MILLION BITES • Website address • Transfer of data • Read only memory • Internet Protocol • Computer language • Malicious software • Domain name system • files of information • Open source software • Random access memory • Providing information • something you can see • ...
Business communication 2024-10-14
Across
- Advise
- A telephone interconnection
- Ceremonious
- A co-worker
- Communication networks: social ...
- A company provider
- Assign, allocate
- Outside own country
- To have difficulty
- Technical knowledge
- A customer
- Psychological wellness: mental ...
- To make contact
- A mobile phone
- Written record of a meeting
- A computer
- To talk about something
- Not suitable
- To answer phone call: to ... up
- A break in electricity supply: a ... cut
- to suggest, to advise
- Involving different cultures
- Mental state, disposition
- To catch a break: to ... off
Down
- Betterment
- Amount of work
- Assembly of people
- To express something to others
- Profession
- Would prefer: had ...
- Employment request: an ... letter
- A meeting room
- To be present at something
- Ambiance
- Meeting conducted via phone
- To handle, to deal with something
- A limit
- Acceptable clothing: a dress ...
- Arrange, conduct a deal
- A legal agreement
40 Clues: Advise • A limit • Ambiance • Betterment • Profession • A customer • A computer • Ceremonious • A co-worker • Not suitable • Amount of work • A meeting room • A mobile phone • To make contact • Assign, allocate • A legal agreement • Assembly of people • A company provider • To have difficulty • Outside own country • Technical knowledge • Would prefer: had ... • to suggest, to advise • To talk about something • ...
Fiserv 40&5 Celebration 2024-07-26
Across
- Sum for purpose
- Devices that communicate
- Adapt
- 365
- Amount held
- How many years ago did we start
- art of sound
- Negative account
- Slower payment
- Obtain goods based on trust
- Attempt to generate income or gain
- audio installment
- Digital Conversation style
- price paid or value
- Early
- We work with both large and small...
- Flavored Carbonation
- Our name
- Government
- A type of payment from a customers account
Down
- collective time alive
- secure message
- Type of Photograph
- Sum of money placed or kept in a bank
- One may deposit and withdrawal from this
- Computerized machine that performs banking functions
- Branch of scientific knowledge for purpose or application
- The past
- tender
- message across networks
- Money paid at a particular rate
- Numbers, Tally
- Back in time
- Shared in the ownership
- Analyze to make information
- How many years ago did we merge
- Internet humor
- wrongful gain
- Icon
39 Clues: 365 • Icon • Adapt • Early • tender • The past • Our name • Government • Amount held • art of sound • Back in time • wrongful gain • secure message • Slower payment • Numbers, Tally • Internet humor • Sum for purpose • Negative account • audio installment • Type of Photograph • price paid or value • Flavored Carbonation • collective time alive • message across networks • Shared in the ownership • Devices that communicate • ...
Unit 2 2024-07-17
Across
- This allows devices with Wi-Fi connectivity to connect to wired networks
- Acts as the mediator in a network
- Dynamic address
- Used to amplify the signal in a network
- Link a web page to another page
- Server which manage files on the network
- This server checks usernames & passwords
- Connects a computer to a network
- The name of an organisation maintaining the site
- This server is used to keep installed all the programs, software, etc.
- To view files on the web, you need this
Down
- Method used to track a device on a network
- Can act as a gateway
- This server can also act as a data filter
- Changing static address
- Provides the internet facility
- Aends the transmitted data to all computers
- Key device within a client-server network
- The global network
- Connects two different types of network
- This software prevents users from accessing inappropriate information
- Modulate and demodulate the signals
- One million bits equals to how many Megabytes
23 Clues: Dynamic address • The global network • Can act as a gateway • Changing static address • Provides the internet facility • Link a web page to another page • Connects a computer to a network • Acts as the mediator in a network • Modulate and demodulate the signals • Used to amplify the signal in a network • Connects two different types of network • ...
2.2 Organizational Structure 2025-10-10
Across
- – Personnel organized into a group
- SPAN OF CONTROL – Span of control that encompasses many people
- – Removing layers in the hierarchy to cut costs
- – The size (number) of the firm's employees
- STRUCTURE – Structure that caters well for part-time practices
- OF COMMAND – The official path which instructions are passed on
- – Holding someone responsible for their actions
- – Person with authority and responsibility for staff
- AUTHORITY – Type of authority over those directly below you
- MANAGER – The person directly above you in the organization
Down
- – Person who inspires their team and staff
- GROUPS – Teams formed naturally, through unofficial means
- – The act of passing down authority to others
- – A particular job that needs doing
- – Such structures help to improve communication
- GENERAL MEETING – The yearly meeting held for all key stakeholders
- – Electronic form of written communication
- STRUCTURE – Flexible organizational structure for projects
- HIERARCHY – Structure with many levels in the hierarchy
- – The highest ranking person in a company
- – The levels or ranks in an organization
- – A sense of duty for others in your team
22 Clues: – Personnel organized into a group • – A particular job that needs doing • – The levels or ranks in an organization • – The highest ranking person in a company • – A sense of duty for others in your team • – Person who inspires their team and staff • – Electronic form of written communication • – The size (number) of the firm's employees • ...
Cm viruses 2025-08-23
Across
- Malware that hides its presence from users/OS (ROOTKIT)
- Security system that blocks unauthorized access (FIREWALL)
- Software that removes or blocks harmful programs (ANTIVIRUS)
- General term for harmful software (MALWARE)
- Program that locks files and demands money (RANSOMWARE)
- Malicious part of a virus that causes damage (PAYLOAD)
- Self-replicating program that spreads over networks (WORM)
- Unwanted or junk email messages (SPAM)
- Fake messages to trick users into revealing data (PHISHING)
Down
- A network of infected computers controlled remotely (BOTNET)
- Program that records keystrokes (KEYLOGGER)
- A harmful program that disrupts a computer system (VIRUS)
- Criminal who breaks into systems (HACKER)
- Software that secretly collects user information (SPYWARE)
- A malicious code triggered by specific events (LOGICBOMB)
- Malicious software that opens a hidden way into a system (BACKDOOR)
- Secret code method to secure data (ENCRYPTION)
- False warning about non-existent malware (HOAX)
- Malware hidden inside useful software (TROJAN)
- Software that displays unwanted advertisements (ADWARE)
20 Clues: Unwanted or junk email messages (SPAM) • Criminal who breaks into systems (HACKER) • Program that records keystrokes (KEYLOGGER) • General term for harmful software (MALWARE) • Secret code method to secure data (ENCRYPTION) • Malware hidden inside useful software (TROJAN) • False warning about non-existent malware (HOAX) • ...
An Introduction to HTML 2022-01-16
Across
- text that when clicked on will lead to another web page
- an application used to view webpages
- stores data about the web page
- a group of networks connected to share information
Down
- a group of web pages connected via hyperlinks
- a language used for writing websites
- a programming language which uses tags to translate text to a web page
- where the main content seen on the site is seen
- a collection of websites that we can access using the Internet
9 Clues: stores data about the web page • a language used for writing websites • an application used to view webpages • a group of web pages connected via hyperlinks • where the main content seen on the site is seen • a group of networks connected to share information • text that when clicked on will lead to another web page • ...
Digital Citizenship Crossword Puzzle 2013-11-14
Across
- a place where you can communicate and share information with others
- what can happen if you cyberbully, plagiarize or misuse technology
- someone who is aware of the situation but doesn't take action
- properly using technology overall
- your right to determine what you'd like others to know about you
Down
- properly using technology as a tool rather than a distraction
- putting someone down through social networks constantly
- taking someone else's work without giving credit
- someone who is harmed by something (like cyberbullying)
9 Clues: properly using technology overall • taking someone else's work without giving credit • putting someone down through social networks constantly • someone who is harmed by something (like cyberbullying) • properly using technology as a tool rather than a distraction • someone who is aware of the situation but doesn't take action • ...
The Building Blocks of Blockchain 2024-11-07
Across
- Someone who validates transactions on a blockchain.
- A digital tool to store cryptocurrency.
- Agreement among nodes in a blockchain network.
- A record of all transactions on the blockchain.
- A number used only once, essential in the process of mining a block.
Down
- A data structure used to organize and verify transactions in a block.
- A digital asset created on a blockchain.
- A fee required to perform transactions on networks like Ethereum.
- A unique string created by an algorithm to represent data.
9 Clues: A digital tool to store cryptocurrency. • A digital asset created on a blockchain. • Agreement among nodes in a blockchain network. • A record of all transactions on the blockchain. • Someone who validates transactions on a blockchain. • A unique string created by an algorithm to represent data. • A fee required to perform transactions on networks like Ethereum. • ...
TTS KOM.DATA 2025-09-24
Across
- setiap stasiun dapat mengirim dan menenrima tetapi tidak saat yang bersmaan disebut
- Sistem harus mengirimkan data secara akurat disebut
- Media tranmisi adalah jalur fisik yang dilalui dari data pengirim ke penerima disebut
- Perangkat yang terhubung oleh tautan komunikasi disebut
- Sistem harus mengirimkan data secara akurat disebut
- Sekumpulan aturan yang mengatur Komunikasi data disebut
Down
- Informasi data yang akan dikomunikasikan disebut
- Sistem harus mengirimkan data ke tujuan yang benar disebut
- Penundaan yang tidak merata dalam pengiriman paket audio atau video adalah
- Komunikasi yang bersifat satu arah disebut
10 Clues: Komunikasi yang bersifat satu arah disebut • Informasi data yang akan dikomunikasikan disebut • Sistem harus mengirimkan data secara akurat disebut • Sistem harus mengirimkan data secara akurat disebut • Perangkat yang terhubung oleh tautan komunikasi disebut • Sekumpulan aturan yang mengatur Komunikasi data disebut • ...
5G Crossword Challenge – “Connecting the Future" 2025-10-27
Across
- Acronym for enhanced mobile broadband
- The next evolution of 5G, defined under 3GPP Release 18, is called
- Logical virtual network created on shared infrastructure
- Global body that sets international standards for IMT-2020
- The organisation that defines global standards for mobile networks like LTE and 5G.
Down
- Broadband initiative by MCMC in providing rural connectivity
- Technique that directs radio signals in a specific direction
- National agency overseeing communications and multimedia
- 5G frequency band known for ultra-high speed and low latency
9 Clues: Acronym for enhanced mobile broadband • National agency overseeing communications and multimedia • Logical virtual network created on shared infrastructure • Global body that sets international standards for IMT-2020 • Broadband initiative by MCMC in providing rural connectivity • Technique that directs radio signals in a specific direction • ...
What's New In Utopia? 2022-04-18
Across
- New Digital Rack is now called _ _
- Team Assignment is assigned where?
- The Medical Stop Loss Quote is now the new name for _ tab
- Categories in Journal Notes is now labeled as?
Down
- Clone & Copy are found under _ _ section
- Competitive Analysis moved to the Final Rating tab after clicking _ button
- Bulk auto assign under PPO Networks is now labeled as _ _
7 Clues: New Digital Rack is now called _ _ • Team Assignment is assigned where? • Clone & Copy are found under _ _ section • Categories in Journal Notes is now labeled as? • Bulk auto assign under PPO Networks is now labeled as _ _ • The Medical Stop Loss Quote is now the new name for _ tab • Competitive Analysis moved to the Final Rating tab after clicking _ button
Operating System and Utility Software - GCSE 2020-01-31
Across
- turns data into secure information
- prevents unauthorized access to computer networks
- organizing the hard drive to optimize storage
- reduces file sizes - typical file types are .zip and .rar
Down
- a utility software that determines the operation status within specific software
- utility software that carries out full and incremental backups
- acts a barrier to prevent malware spreading on the computer
7 Clues: turns data into secure information • organizing the hard drive to optimize storage • prevents unauthorized access to computer networks • reduces file sizes - typical file types are .zip and .rar • acts a barrier to prevent malware spreading on the computer • utility software that carries out full and incremental backups • ...
THE INTERNET 2020-04-21
Across
- publish sth on the internet
- regular record of your thoughts, opinions or self-experiences you put on the internet for other people to read
- to look at information on the internet
- a group of interconnected computer networks
- to sound familiar
Down
- a website or computer program that allows people to communicate/share information on the internet
- give your opinion on socialnetworks
7 Clues: to sound familiar • publish sth on the internet • give your opinion on socialnetworks • to look at information on the internet • a group of interconnected computer networks • a website or computer program that allows people to communicate/share information on the internet • ...
THE INTERNET 2020-04-21
Across
- publish sth on the internet
- regular record of your thoughts, opinions or self-experiences you put on the internet for other people to read
- to look at information on the internet
- a group of interconnected computer networks
- to sound familiar
Down
- a website or computer program that allows people to communicate/share information on the internet
- give your opinion on socialnetworks
7 Clues: to sound familiar • publish sth on the internet • give your opinion on socialnetworks • to look at information on the internet • a group of interconnected computer networks • a website or computer program that allows people to communicate/share information on the internet • ...
Merriam GPTW 2018-01-19
Across
- If you have a salad over 10oz in café what color coin do you get?
- How many conference rooms do we have?
- How many laps on the walking trail equal a mile?
- How many hours of volunteer time do you get per year?
- Who makes this a Great Place To Work?
- How many treadmills are in the get fit room?
- Where is the blood pressure machine located?
- Who is our site leader?
Down
- How many diversity networks are there?
- What day of the week can you wear your hat?
- Who is the manager of Sodexo?
- What is the speed limit in the parking lot?
- Name of the monthly newsletter?
- Where can you find the HR Portal?
- What day is yoga?
- According to the dress code are you allowed to wear sweatpants?
16 Clues: What day is yoga? • Who is our site leader? • Who is the manager of Sodexo? • Name of the monthly newsletter? • Where can you find the HR Portal? • How many conference rooms do we have? • Who makes this a Great Place To Work? • How many diversity networks are there? • What day of the week can you wear your hat? • What is the speed limit in the parking lot? • ...
Nervous System 2021-09-28
Across
- junction between two connecting neurons
- groups of neurons responsible for a specific function or behavior. (riding a bike, tying your shoe...)
- inhibitory neurotransmitter. low levels of this are associated with anxiety and phobia
- brain lobe responsible for memory, understanding, and language
- the part of the nervous system that controls voluntary movements
- nerve that connects to all organs, most important cranial nerve
- nerve that controls sense of smell
- neurotransmitter that decreases membrane permeability, lowers the chance for threshold to be activated
Down
- cells that connect blood vessels to neurons
- part of the brain responsible for higher mental function
- main portions of the spinal nerves combine to form complex networks
- rest and digest
- regulates mood and happiness
- masses of nerve cells that transmit information
- insulation surrounding nerves
- gland responsible for fear
16 Clues: rest and digest • gland responsible for fear • regulates mood and happiness • insulation surrounding nerves • nerve that controls sense of smell • junction between two connecting neurons • cells that connect blood vessels to neurons • masses of nerve cells that transmit information • part of the brain responsible for higher mental function • ...
EMB Greece Chapter Crossword 2024-07-30
Across
- the current EMB Greece secretary studies in this city
- a well known couple of biomedical scientists
- a type of transformation for dimensionality reduction
- action potential occurs across its membrane
- used in smartwatches to indrectly estimate heart rate
- surface EEG is used to identify its focus
- directs synthesis of specific proteins
- the most visually obvious part of an ECG
Down
- a type of time-scale transform
- protocol used in personal area networks
- will need to address it if you make health studies with humans
- z-transform is the discrete counterpart of this transform
- alterations to the genome that do not involve DNA mutation
- can be used to measure carotid blood flow and artery wall stiffness
- this theory related to deterministic nonlinear systems
- part of a gene that forms the final RNA
16 Clues: a type of time-scale transform • directs synthesis of specific proteins • protocol used in personal area networks • part of a gene that forms the final RNA • the most visually obvious part of an ECG • surface EEG is used to identify its focus • action potential occurs across its membrane • a well known couple of biomedical scientists • ...
Cyber Corner 2023-03-06
Across
- a signal that temporarily stops the execution of a program
- a number system with 16 digits, used in computing
- a device that connects two different networks
- a popular operating system
- a security system that prevents unauthorized access to a network
- the smallest unit of digital data
- a volatile memory used to store data that can be accessed quickly
- a program that translates code written in one language to another language
- a popular networking protocol
Down
- a set of rules governing the format and transmission of data
- a data structure that follows the first in first out (fifo) principle
- the process of finding and fixing errors in code
- a set of rules to solve a problem
- the process of adding information to a carrier signal
- a point of connection in a network
- the core of an operating system
- a small, fast memory used to store frequently accessed data
17 Clues: a popular operating system • a popular networking protocol • the core of an operating system • a set of rules to solve a problem • the smallest unit of digital data • a point of connection in a network • a device that connects two different networks • the process of finding and fixing errors in code • a number system with 16 digits, used in computing • ...
Unit 6 2022-04-07
Across
- method confirming identity using two or more means of authentication.
- data, applications, systems, networks, or physical space.
- error occurring when a person is falsely denied access.
- centralized database containing user accounts and security information.
- collection of trees.
- process of confirming the identity of a user.
- collection of network resources that share common directory database and policies.
- users, applications, or processes that need access to objects.
Down
- controls the type of access that is allowed or denied.
- process of validating identity.
- Granting or denying access to resources or a computer.
- error occurring when a person is falsely allowed access.
- network resources stored as objects in Active Directory.
- set of configuration settings applied to user or computers.
- ability to permit or deny access to network resources.
- similar appearance to credit cards, have an embedded memory chip used for authentication.
- group of related domains
17 Clues: collection of trees. • group of related domains • process of validating identity. • process of confirming the identity of a user. • controls the type of access that is allowed or denied. • Granting or denying access to resources or a computer. • ability to permit or deny access to network resources. • error occurring when a person is falsely denied access. • ...
Computer Technologies 2025-03-11
Across
- Number of instructions a CPU can execute per second
- Most common keyboard layout used in English-speaking countries
- 8 bits
- Network topology that connects all devices in a circular format
- Small, fast storage location within the CPU.
- Display which uses organic compounds that emit light when current flows
- Phase of the fetch-execute cycle that prepares the CPU for the next operation
- Wireless network connection used in home networks
- CPU component, performs mathematical operations and logical operations.
- Type of I/O interface which transmits both data and power
Down
- Acts as the central hub that connects all the components together.
- Protocol used to assign IP addresses dynamically
- Type of memory which stores frequently used instructions directly on the processor
- Splits internet connection among devices in a LAN.
- Father of Computing
- First commercially produced microprocessor was released in 1971.
- Brain of the computer
17 Clues: 8 bits • Father of Computing • Brain of the computer • Small, fast storage location within the CPU. • Protocol used to assign IP addresses dynamically • Wireless network connection used in home networks • Splits internet connection among devices in a LAN. • Number of instructions a CPU can execute per second • Type of I/O interface which transmits both data and power • ...
Inter, Intro, Intra Crossword Puzzle 2024-04-10
Across
- Between multiple nations
- Time set between the length of a play or movie to rest or prepare for the next act
- Linked between two things
- To bring something within a new place or position
- Existing or occurring within a state
- To look within one’s own thoughts and feelings
- Burst between others who are having a conversation
- Networks that exist between each other
- A local computer network that stays within
Down
- Existing or taking place within a vein or veins in the human body
- To seize between or stop something from reaching its destination
- Situated, occurring, or done within the layers of skin on the body.
- To prefer to be within one’s own company
- To lead into what will be within the following passage
- A brief look within a passage or piece of music
- Something that travels between states, typically referring to the road
- To cut between
17 Clues: To cut between • Between multiple nations • Linked between two things • Existing or occurring within a state • Networks that exist between each other • To prefer to be within one’s own company • A local computer network that stays within • To look within one’s own thoughts and feelings • A brief look within a passage or piece of music • ...
1.2 Compare and contrast networking appliances, applications, and functions 2025-07-14
Across
- Can block suspicious traffic in real time
- Connects devices within a LAN using MAC addresses
- High-speed network for connecting storage devices to servers
- Directs traffic between networks using IP addresses
- Type of appliance running on a hypervisor or cloud
- Distributes traffic across multiple servers to avoid overload
- Delivers web content quickly by using servers closer to users
- Acts as a gateway between users and the internet
Down
- Prioritizes certain types of network traffic for performance
- Monitors traffic and alerts when something seems suspicious
- Manages multiple wireless devices centrally
- Controls traffic flow using allow/deny rules
- Hardware-based network appliance you can touch
- Limits how long a data packet can exist before being discarded
- Provides shared file access over a network
- Creates an encrypted tunnel for private remote access
- Extends wireless coverage by allowing Wi-Fi connections
17 Clues: Can block suspicious traffic in real time • Provides shared file access over a network • Manages multiple wireless devices centrally • Controls traffic flow using allow/deny rules • Hardware-based network appliance you can touch • Acts as a gateway between users and the internet • Connects devices within a LAN using MAC addresses • ...
Risk Interest Group 2025-12-05
Across
- Access Control List defining allowed/denied permissions.
- Single software instance serves multiple customers with isolation.
- Public Key Infrastructure that manages certificates and trust.
- Algorithm that performs encryption and decryption.
- Cryptographic proof of data integrity and signer authenticity.
- Learning Algorithms that learn patterns from data to make predictions/decisions.
- AI Models that create new content (text, images, code) from learned patterns.
- Language Processing AI field enabling computers to understand and generate human language.
- Cloud model delivering virtualized compute, storage, and networking.
Down
- Automated coordination/management of services, containers, and workloads.
- Model memorizes noise in training data, hurting generalization.
- Authority Trusted entity that issues and validates digital certificates.
- Learning Machine learning using deep neural networks with many layers.
- Packaging apps and dependencies into portable, isolated containers.
- Controls network traffic based on security policies.
- Security Information and Event Management for log aggregation and analytics.
- Transforming plaintext into ciphertext using cryptographic keys.
17 Clues: Algorithm that performs encryption and decryption. • Controls network traffic based on security policies. • Access Control List defining allowed/denied permissions. • Public Key Infrastructure that manages certificates and trust. • Cryptographic proof of data integrity and signer authenticity. • Model memorizes noise in training data, hurting generalization. • ...
computer terms 2017-10-18
Across
- a blend of songs, videos, or audio files made into one
- the illegal act of spammers trying to get information by disguising themselves as a business
- website showing links to other websites
- a game that lets players connect and interact with game together
Down
- saying something mean about someone online in ALL CAPS
- a website updated by a person providing mainly opinions
- downloadable video or audio file
- networks that allow sharing videos, MP3s, and digital files
- 2 or 3D icon representing the gamer
9 Clues: downloadable video or audio file • 2 or 3D icon representing the gamer • website showing links to other websites • saying something mean about someone online in ALL CAPS • a blend of songs, videos, or audio files made into one • a website updated by a person providing mainly opinions • networks that allow sharing videos, MP3s, and digital files • ...
An Introduction to HTML 2022-01-16
Across
- text that when clicked on will lead to another web page
- an application used to view webpages
- stores data about the web page
- a group of networks connected to share information
Down
- a group of web pages connected via hyperlinks
- a language used for writing websites
- a programming language which uses tags to translate text to a web page
- where the main content seen on the site is seen
- a collection of websites that we can access using the Internet
9 Clues: stores data about the web page • a language used for writing websites • an application used to view webpages • a group of web pages connected via hyperlinks • where the main content seen on the site is seen • a group of networks connected to share information • text that when clicked on will lead to another web page • ...
1st Semester World Geography ACP Review 2022-11-18
Across
- ecological community including plants and animals
- transportation, communication networks,sewage
- movement of weathered material by wind or water
- killing group of people from a nation or ethnicity
Down
- liquid or frozen water that falls to the earth
- winds that blow in the summer carrying moist air tornadoes violently rotating columns of air
- spread of people, things, ideas, diseases desalinization the process of removing salt from seawater
- cause high winds and large amounts of rainfall
- periodic warm ocean currents of the Pacific waters
9 Clues: transportation, communication networks,sewage • liquid or frozen water that falls to the earth • cause high winds and large amounts of rainfall • movement of weathered material by wind or water • ecological community including plants and animals • periodic warm ocean currents of the Pacific waters • killing group of people from a nation or ethnicity • ...
Computer terms 2023-09-03
Across
- Programs that run on the computer.
- A system of computers linked together to share programs and information.
- Anything that puts information into a computer (mouse, keyboard, scanner).
- Parts of the computer that you can touch.
- A computer network that links smaller computer networks across the world.
Down
- It is a device that "directs traffic" on a wireless network.
- A very small, portable hard drive that can store information for a computer.
- Anything that can display information (Monitor, printer, speakers).
- Programs that run on the computer
9 Clues: Programs that run on the computer • Programs that run on the computer. • Parts of the computer that you can touch. • It is a device that "directs traffic" on a wireless network. • Anything that can display information (Monitor, printer, speakers). • A system of computers linked together to share programs and information. • ...
Ch. 10: Exploiting Networks 2026-04-07
Across
- "... Innovation". A platform where patients/caregivers develop their own medical solutions for unmet needs
- Innovation is not a solo act but a ... game
- Online process of gathering ideas or solutions from a large group of people
Down
- What innovation happening really looks like (hint:food)
- Type of innovation where firms use both internal and external ideas
- A complex, interconnected group or system
- Users who experience needs earlier than others and often create first solutions
7 Clues: A complex, interconnected group or system • Innovation is not a solo act but a ... game • What innovation happening really looks like (hint:food) • Type of innovation where firms use both internal and external ideas • Online process of gathering ideas or solutions from a large group of people • ...
PM003(08) 2017-03-20
Across
- A description of services that are rarely the same because they involve interactions between people.
- Form of cooperation between two or more brands, which can create synergies that create value for both participants, above the value they would expect to generate on their own.
- Where the time of production is very close or simultaneous with the time of consumption.
- This refers to a graph showing fewer products selling in large quantities versus many more products selling in low quantities
- Retailer’s own brand, e.g. Sainsbury’s Taste the Difference.
- Simply explained, it is a theory in which products or brands follow a sequence of stages, including introduction, growth, maturity and sales decline.
- The supplier delivers an important key component to the final product, e.g. Intel delivers its processor to the major PC manufacturers.
- A description for services that cannot be touched or tested and payment is for use or performance.
Down
- A description for services that cannot be stored for future use and can cause problems with matching supply and demand.
- A business activity of value exchanges that is accessible through electronic networks, which include the internet and mobile networks.
- This is the premium a customer/ consumer would pay for the branded product or service compared with an identical unbranded version of the same product/service.
- Normally brand communication involves just two senses – sight and hearing. This involves all five senses: sight, hearing (sound), smell, touch and taste.
- Type of advertising in which celebrities use their status in society to promote a product, service, charity or cause.
- The position that a product holds in a customer’s mind and can have an impact on premium pricing and competitive advantage.
- The time it takes from the conception of an idea until it is available for sale. TTM is important in those industries where products become quickly outmoded.
15 Clues: Retailer’s own brand, e.g. Sainsbury’s Taste the Difference. • Where the time of production is very close or simultaneous with the time of consumption. • A description for services that cannot be touched or tested and payment is for use or performance. • A description of services that are rarely the same because they involve interactions between people. • ...
Engineering Careers 2014-10-29
Across
- Solve medical problems in hospitals and medical companies.
- Distribute electricity and design electrical systems.
- Improve design and manufacturing of boats and watercraft.
- Reviewing and implementing production standards.
- Operate MRI equipment and solve calculations.
- Design heating and cooling systems.
- Build construction projects from roadways to office buildings.
- Computer applications software engineer.
- Design equipment in nuclear power plants.
- Draw designs of cars and trucks.
- Generate x-rays
- Maintain and design kitchen machinery.
- Design drawings and virtual models of yachts.
Down
- Design and install phone networks.
- Monitor instruments used on airplanes during flight.
- Monitor and develop alternative energy outputs.
- Install, service, maintain, and repair gas systems.
- Design ships.
- Create everything from iPhones to drilling components.
- Make sure manufacturing and shipping equipment work.
- Research in fields like environmental science and engineering.
- Examine jets, helicopters, etc.
- Design internal electronic components of PC computers.
- Design habitats for animals to be comfortable.
- Development of energy efficient lighting.
- Design and develop programs and applications.
26 Clues: Design ships. • Generate x-rays • Examine jets, helicopters, etc. • Draw designs of cars and trucks. • Design and install phone networks. • Design heating and cooling systems. • Maintain and design kitchen machinery. • Computer applications software engineer. • Design equipment in nuclear power plants. • Development of energy efficient lighting. • ...
FITE 2013-05-16
Across
- symbol for a company
- personal conduct online
- document or file made with a preset format
- one thousand terabytes
- a thousand bytes
- one thousand megabytes
- one thousand brontobytes
- search engine that checks all search engines
- wireless home network
- one thousand exabytes
- close up preview of a template
- one thousand petabytes
- protection of information computer/networks
- any type of internet hosting service
- appearence of a document
- port that connects the mouse or keyboard to PC
- one thousand yottabytes
Down
- arrangement of data for a computer
- Ex: mouse, flash drive
- one thousand zetabytes
- software used to search data
- one thousand gigabytes
- one million bytes
- a device that has a lot of data storage
- zoomable presentation program
- computer screen
- network name
- Ex:comcast,verizon
- Ex: monitor, printer
- eight bytes
- rules to keep people safe online
- smallest unit of data
- plug your flashdrive into
- Ex: headphones, speakers
- a short memorable phrase for advertising
35 Clues: eight bytes • network name • computer screen • a thousand bytes • one million bytes • Ex:comcast,verizon • symbol for a company • Ex: monitor, printer • wireless home network • one thousand exabytes • smallest unit of data • Ex: mouse, flash drive • one thousand zetabytes • one thousand gigabytes • one thousand terabytes • one thousand megabytes • one thousand petabytes • personal conduct online • ...
Mīkla 2018-01-08
Across
- A type of malicious software program.
- Person who penetrates systems.
- Biggest social media platform on the Internet.
- Organization that provides services accessing and using the Internet.(Acronym)
- Simple graphics editor that has been included with all versions of Microsoft Windows.
- Electronic circuitry within a computer that carries out the instructions of a computer program.
- Step-by-step walk-through for someone with no experience
- Computer network that interconnects computers within a limited area.(Acronym)
- Accessory to insert information.
- Enclosure that contains most of the components of a computer.
Down
- Programming language.
- specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images.(Acronym)
- web browser developed by Apple.
- Portable personal computer.
- Networking device that forwards data packets between computer networks.
- A device to keep hot components cool.
- Computer software that transform high-level programming language to machine code.
- Handheld personal computer with a mobile operating system.
- Biggest microprocessor manufacturer.
- Operating system.
20 Clues: Operating system. • Programming language. • Portable personal computer. • Person who penetrates systems. • web browser developed by Apple. • Accessory to insert information. • Biggest microprocessor manufacturer. • A type of malicious software program. • A device to keep hot components cool. • Biggest social media platform on the Internet. • ...
Module 5 2017-10-28
Across
- patterns, based on first language
- Stage, the brain recognizes words
- verbs, verbs that are conjugated following the same pattern
- Alphabetical Phase, the brain makes connection between letters in the words and the phonemes to pronounce it
- meaning of word
- brain area for speaking
- Alphabetical Phase, reading becomes more fluent
- Stage, a brain representation of a word as a picture
- representation of a word with letters
- Prominent, languages that place the topic as the central part of a sentence
Down
- Phase, the brain does not have any systemic letter-sound-connection
- verbs, verbs that are conjugated differently from other verbs
- sounds that form syllabi
- letters at the end of the word
- stage, the brain begins to decode letters into sounds
- Networks, clusters of words of the same type in the brain
- brain area for comprehension of hear and spoken words
- rhythm, cadence, pitch of spoken language
- letters before a word
- Alphabetical Phase, the brain recognizes high frequency words
20 Clues: meaning of word • letters before a word • brain area for speaking • sounds that form syllabi • letters at the end of the word • patterns, based on first language • Stage, the brain recognizes words • representation of a word with letters • rhythm, cadence, pitch of spoken language • Alphabetical Phase, reading becomes more fluent • ...
John Taylor May 2020-09-10
Across
- an act of uploading the display on screen
- a line of text at the top of the page
- a Uniform Resource Identifier
- to talk in a friendly or informal way
- any media that are encoded in machine-readable formats
- controlled by or connected to
- a link from a hypertext file
- a collection of names and addresses
- the environment where communicating over computer networks occur
- moving from page to page
- a correct way of communicating
- an identification used by a person
- a theme or characteristic
Down
- a computer or computer program
- a website where users can post comments
- a file system cataloging structure
- a list of questions and answers
- an identification string
- a collection of information
- an act of moving displayed text up and down
- a network of social interactions
- an act or process of uploading data
- a computer that mediates multiple access to a database
- to communicate with on twitter
- the state of communicating or meeting
25 Clues: an identification string • moving from page to page • a theme or characteristic • a collection of information • a link from a hypertext file • a Uniform Resource Identifier • controlled by or connected to • a computer or computer program • to communicate with on twitter • a correct way of communicating • a list of questions and answers • a network of social interactions • ...
Common Prefixes 2023-04-21
Across
- having many colors
- to put something in a new order beforehand
- a feeling of suffering together
- someone hired to work under a supervisor on a job
- after the regular game season
- 10 turns into 40
- a medicine that works against poison or disease
- a concert of instruments played together
- able to speak three different languages
- to put something in a new order again
- to join together again
- occurring every 200 years
- able to run by itself
- able to speak many different languages
- to join together
Down
- communication between computer networks
- to put or sink below the surface of water
- able to speak two different languages
- a self-written story about their life
- occurring between planets
- not daring
- before the regular game season
- to look similar as one
- to put off until after or late
- four-footed
- against associating with people
- to assemble together
- bringing together as one
- stool or table with three legs
29 Clues: not daring • four-footed • 10 turns into 40 • to join together • having many colors • to assemble together • able to run by itself • to look similar as one • to join together again • bringing together as one • occurring between planets • occurring every 200 years • after the regular game season • before the regular game season • to put off until after or late • stool or table with three legs • ...
Unit 5 Activity 2 - Savannah Hinton W3 2023-11-09
Across
- cardiovascular disease
- a test that records the electrical signals in the heart.
- a device used to control an irregular heart rhythm.
- when your heart does not pump enough blood to your body.
- creates radio waves to take clear pictures of your body.
- outside of, without
- vessel
- sound waves that create images of internal body structure.
- the process of recording
- chest organ that pumps blood throughout your body.
- when brain blood flow is blocked or sudden bleeding in brain.
- diabetes mellitus
- ventricular tachycardia
- acute coronary syndrome
Down
- it takes dynamic xray pictures of your heart
- electricity
- excessive
- a blood vessel that carries blood from the heart to the body.
- chest pain or discomfort that keeps coming back.
- networks of small vessels that perfuse tissues.
- blood vessels that carry blood throughout your body.
- a problem with the rate or rhythm of your heartbeat.
- cane-shaped vessel that delivers oxygen-rich blood in the body.
23 Clues: vessel • excessive • electricity • diabetes mellitus • outside of, without • cardiovascular disease • ventricular tachycardia • acute coronary syndrome • the process of recording • it takes dynamic xray pictures of your heart • networks of small vessels that perfuse tissues. • chest pain or discomfort that keeps coming back. • chest organ that pumps blood throughout your body. • ...
Operating Systems (Cyber 100) 2024-02-01
Across
- file extension for compressed files
- Microsoft's disk operating system that came before Windows.
- A cable that connects networks
- A graphical OS released by Google in 2007
- Apple's computer operating system.
- A computer software package that preforms a specific function directly for the end user.
- The OS portions that interface with hardware
- Eight bits make up this
- OS developed in the late 1960's by AT&T Bell Laboratories
- Memory used for short term tasks
Down
- The command to see your current windows version
- A language that can be used to style a web page
- The most common base version of Linux.
- Holds instructions and data when a program is executing.
- The default browser for Mac
- a textual language for creating web pages
- Bill Gate's operating system created in 1985
- The default browser for Windows
- What is the default browser for Linux?
- Commonly placed after a modem to route packets
- The way computers communicate using zeros and ones is?
21 Clues: Eight bits make up this • The default browser for Mac • A cable that connects networks • The default browser for Windows • Memory used for short term tasks • Apple's computer operating system. • file extension for compressed files • The most common base version of Linux. • What is the default browser for Linux? • a textual language for creating web pages • ...
DMR Ham Radio 2024-11-14
Across
- Hotspot software platform
- Clear voice communication
- Time division channel
- Interconnected repeater systems
- Digital Mobile Radio protocol
- Preconfigured DMR settings
- Extends radio coverage
- MHz VHF DMR frequency
- Talk group identifier
- Motorola repeater feature
- Popular DMR handheld model
- Chinese DMR encryption
- Fusion repeater integration
- Dashboard for BrandMeister users
- One-to-one DMR call
- U.S. BrandMeister server
- Personal DMR gateway
- Popular DMR network
- Prevents interference conflicts
Down
- User-friendly DMR network
- Icom’s digital radio mode
- Push-to-talk button
- DMR group communication
- Codeplug programming software
- Repeater operation mode
- Group of repeaters
- TDMA channel division
- Motorola DMR technology
- Low-bitrate voice codec
- MHz UHF DMR frequency
- Unique user identifier
- Fusion DMR alternative
- Direct radio-to-radio
- Versatile hotspot modem
- DMR-integrated location reporting
- High-speed DMR data
- Motorola DMR brand
- Real-time user info
- Kenwood digital alternative
- Digital network bridge
40 Clues: Group of repeaters • Motorola DMR brand • Push-to-talk button • High-speed DMR data • One-to-one DMR call • Real-time user info • Popular DMR network • Personal DMR gateway • Time division channel • TDMA channel division • MHz VHF DMR frequency • MHz UHF DMR frequency • Talk group identifier • Direct radio-to-radio • Extends radio coverage • Unique user identifier • Fusion DMR alternative • ...
cybercrime 2024-11-11
Across
- – Software that automatically displays or downloads ads.
- – Malware that replicates itself to spread across networks.
- – Software that records keystrokes to capture information.
- – Malicious code that attaches itself to programs and spreads.
- – Faking identity or location to deceive.
- - An unauthorized way to access a system.
- – Process of encoding data to protect it from unauthorized access.
- – Software designed to harm or exploit systems.
- – Stealing someone's personal information to impersonate them.
Down
- – Another term for Trojan malware.
- – Malware that demands payment to restore access.
- – Using technology to harass or bully someone.
- – A fraudulent scheme, often online, to steal money or information.
- – Security system that monitors and controls network traffic.
- – Software that secretly collects user information.
- – Distributed Denial of Service, an attack that overwhelms a network.
- – Malware disguised as legitimate software.
- – A person who breaks into computer systems.
- – A scam to trick people into giving personal information.
- – A network of infected computers controlled remotely.
20 Clues: – Another term for Trojan malware. • – Faking identity or location to deceive. • - An unauthorized way to access a system. • – Malware disguised as legitimate software. • – A person who breaks into computer systems. • – Using technology to harass or bully someone. • – Software designed to harm or exploit systems. • – Malware that demands payment to restore access. • ...
cybercrime 2024-11-11
Across
- - An unauthorized way to access a system.
- – A fraudulent scheme, often online, to steal money or information.
- – A person who breaks into computer systems.
- – Stealing someone's personal information to impersonate them.
- – Malware that demands payment to restore access.
- – Faking identity or location to deceive.
- – Malware disguised as legitimate software.
- – Software that secretly collects user information.
- – Another term for Trojan malware.
- – A network of infected computers controlled remotely.
Down
- – Malware that replicates itself to spread across networks.
- – Software designed to harm or exploit systems.
- – Distributed Denial of Service, an attack that overwhelms a network.
- – Using technology to harass or bully someone.
- – Software that records keystrokes to capture information.
- – Software that automatically displays or downloads ads.
- – Security system that monitors and controls network traffic.
- – Malicious code that attaches itself to programs and spreads.
- – A scam to trick people into giving personal information.
- – Process of encoding data to protect it from unauthorized access.
20 Clues: – Another term for Trojan malware. • - An unauthorized way to access a system. • – Faking identity or location to deceive. • – Malware disguised as legitimate software. • – A person who breaks into computer systems. • – Using technology to harass or bully someone. • – Software designed to harm or exploit systems. • – Malware that demands payment to restore access. • ...
Unit 5 - Assignment FAI 2025-04-25
Across
- Graph showing the relationship between two values.
- Tool in TensorFlow to visualize model performance.
- Visual output of data in graphs or charts.
- Google’s tool to study web user behavior and trends.
- AI-powered conversion of spoken audio into words.
- Python library used to create appealing statistical charts.
- Google’s cloud platform for coding with GPU support.
- Input type processed by AI to convert into text.
- Toolkit for real-time computer vision and image processing.
- Google’s open-source framework for machine learning.
Down
- Model architecture behind ChatGPT’s intelligence.
- OpenAI's chatbot that mimics human-like conversations.
- Amazon’s cloud service for hosting AI applications.
- Type of graph computation in PyTorch models.
- AI tool used to generate marketing content automatically.
- Feedback method to fine-tune AI using human ratings.
- Meta’s dynamic framework for AI and deep learning tasks.
- Python library for creating graphs and plots.
- Simple API for building neural networks in TensorFlow.
- Google’s AI that understands images, audio, video, and code.
20 Clues: Visual output of data in graphs or charts. • Type of graph computation in PyTorch models. • Python library for creating graphs and plots. • Input type processed by AI to convert into text. • Model architecture behind ChatGPT’s intelligence. • AI-powered conversion of spoken audio into words. • Graph showing the relationship between two values. • ...
Network Security & Protection 2025-05-14
Across
- Unique mark indicating authenticity or approval.
- Assurance that a party cannot deny their actions.
- Temporary credential for secure access.
- Reverting encrypted data back to its original form.
- Verifying user identity or access rights.
- Malicious software that secretly monitors user activity.
- Fraudulent attempts to obtain sensitive information online.
- Analyzing patterns in user actions for security.
- Converting data into a secure format.
- Luring victims with false promises or goods.
- Ensuring data remains accurate and unaltered.
- Software designed to detect and eliminate malware.
- Decentralized ledger technology for secure transactions.
Down
- Encrypted data that is unreadable without decryption.
- Readable data before encryption.
- Identifying individuals or objects based on characteristics.
- Secretly listening to private communications or data.
- Software that displays unwanted advertisements on devices.
- Unauthorized access to computer systems or networks.
- Malware that encrypts files for ransom payment.
- Secret word or phrase for user authentication.
- Identifying individuals using biological traits.
- Protecting personal information from unauthorized access.
23 Clues: Readable data before encryption. • Converting data into a secure format. • Temporary credential for secure access. • Verifying user identity or access rights. • Luring victims with false promises or goods. • Ensuring data remains accurate and unaltered. • Secret word or phrase for user authentication. • Malware that encrypts files for ransom payment. • ...
unit 3 2024-04-11
Across
- Predicts interaction based on distance and size
- Knowledge of one's surroundings
- Movement from one place to another
- Involuntary movement due to conflict
- Actions or reactions of individuals
- Migration through social networks
- Explains distribution of settlements
- Scattered distribution of phenomena
- Explains retail trade patterns
- Movement along specific routes
- Obstruction hindering movement or interaction
- Decrease in interaction with distance
- Return migration to place of origin
- Mutual dependency between regions
- Area migrants come from or go to
- Alternative closer to origin
Down
- Resistance to movement over distance
- Seeks refuge in another country.
- Forced to flee within country
- Temporary labor migrant
- Studies human actions and decisions
- Potential threat from natural events
- Connection between places or ideas
- Mental disposition towards a subject
- Preference or inclination in migration
- Threshold for effective interaction
- Ability to move or be moved
- Everything is connected spatially
- Mental processes like perception and reasoning
- Area of routine daily movement
30 Clues: Temporary labor migrant • Ability to move or be moved • Alternative closer to origin • Forced to flee within country • Explains retail trade patterns • Movement along specific routes • Area of routine daily movement • Knowledge of one's surroundings • Seeks refuge in another country. • Area migrants come from or go to • Migration through social networks • ...
Understanding Computers 2022-10-20
Across
- Represented by only two symbols or digits
- Gets very hot so it has its own heatsink with a fan
- A screen that shows an image or information.
- Application-switching keyboard shortcut
- Logical data, has only the values true or false
- Information processed & sent out from a computer
- a gate with an opposite output of the input
- Physical computer equipment such as a keyboard.
- Permanent storage of data and information
- Connects and transfers data between devices
- a gate with 1 output if all input is 1
- Gate with output of 1 even if only one input is 1
- Address book
Down
- Data that entered into or received by a computer
- Stores data and is editable
- The smallest unit of a computer
- Worldwide system of computer networks
- Common communications line within an area
- Programs like Microsoft products on a computer
- Main circuit board, a host to the computer
- Improves the performance of a computer
21 Clues: Address book • Stores data and is editable • The smallest unit of a computer • Worldwide system of computer networks • Improves the performance of a computer • a gate with 1 output if all input is 1 • Application-switching keyboard shortcut • Represented by only two symbols or digits • Common communications line within an area • Permanent storage of data and information • ...
Career Clusters Crossword Puzzle 2025-10-21
Across
- Computers, software, and IT specialists.
- Jobs related to hospitals and wellness.
- Teaching and learning professions.
- Business related to travel and vacations.
- Designing buildings and spaces.
- Managing money and budgets.
- The system of rules and legal work.
- The use of computers and gadgets in work.
- Buying and selling goods and services.
- Protecting natural resources and the planet.
- Helping people with social or personal needs.
- Sharing information through media and networks.
- Moving people and goods from place to place.
Down
- Building homes, bridges, and roads.
- Farming and growing food.
- Producing goods in factories.
- Running cities, states, and countries.
- Designing and building machines and structures.
- Creating and distributing news and entertainment.
- Creative fields like music, painting, and theater.
- Providing food and lodging for travelers.
- The study of human society and relationships.
- Protecting citizens through police and fire services.
- Promoting products and services to customers.
- Studying the natural world and experiments.
25 Clues: Farming and growing food. • Managing money and budgets. • Producing goods in factories. • Designing buildings and spaces. • Teaching and learning professions. • Building homes, bridges, and roads. • The system of rules and legal work. • Running cities, states, and countries. • Buying and selling goods and services. • Jobs related to hospitals and wellness. • ...
computing devices 2026-02-18
Across
- Transmission Control Protocol
- a global computer network providing a variety of information
- a device that uses recourses from a sever
- is the fundamental unit of data transmitted
- the transmission capacity of a computer network
- customers access to the Internet
- data, or systems to enhance reliability
- is a fundamental component of the internet infrastructure
- a combined device for modulation and demodulation
- connection for a wireless network device
- a hardware device that connects multiple devices within a network
- process that transforms readable data,
- a networking hardware device
- refers to the intentional duplication of critical components or functions
Down
- high-performance computer system
- high-performance data transmission medium
- is a standardized set of rules
- is a computer or software that provides services
- refers to the time delay between initiating a request for data.
- stands for Local Area Network
- internet protocol laws
- a networking device that connects multiple computer networks
- facility allowing computers, smartphones, or other devices to connect to the internet
23 Clues: internet protocol laws • a networking hardware device • Transmission Control Protocol • stands for Local Area Network • is a standardized set of rules • high-performance computer system • customers access to the Internet • process that transforms readable data, • data, or systems to enhance reliability • connection for a wireless network device • ...
English Around Us and Cyberbullying 2025-10-09
Across
- To give or show something to other people online.
- A machine like a phone, tablet, or computer.
- What people think or say about someone.
- Related to computers or electronic devices.
- Related to people or society.
- You use it to call, text, or play games.
- You need it to go online and find information.
- When you are connected to the internet.
Down
- Platforms like TV, radio, or social networks.
- Everything that happens to a person from birth to death.
- A group of words with a special meaning.
- Something that causes damage or hurt.
- Something that happens every day.
- The language we are studying.
- Something you share on social media.
- You listen to it on your phone or computer.
- When someone hurts or scares another person repeatedly.
- You watch it at the cinema or on streaming apps.
- Something fun you play on your phone or console.
- The basic unit of language.
20 Clues: The basic unit of language. • The language we are studying. • Related to people or society. • Something that happens every day. • Something you share on social media. • Something that causes damage or hurt. • What people think or say about someone. • When you are connected to the internet. • A group of words with a special meaning. • You use it to call, text, or play games. • ...
El tiempo libre (Entreculturas 3) 2025-09-23
Across
- campground
- it seems
- outside
- it was (preterite)
- soon
- I want
- city
- assignments
- all (singular/masculine)
- community
- tourists
- lie
- village
- welcome
- blog
- networks
- tapas
- to return (Empieza con v.)
- messages
- all (plural/masculine)
- market
- beach
- there is, there are
- to know (to be familiar with)
- studies
- to speak/to talk
- social (plural)
- animated (singular/masculine)
- daily (plural/feminine adjective)
- to chat
Down
- products
- because
- computer
- neighborhood
- summer
- ages
- food
- he/she invites
- all (plural/feminine)
- animated (singular/feminine)
- world
- to see
- to buy
- to have fun (reflexive)
- time (amount)
- free (as in available)
- prize
- people (singular)
- we live
- comments
- to contribute
- vacations
- photos
- air
- to publish
- to survive
- better
- activities
- they go
- they do/they make
- review
61 Clues: lie • air • soon • ages • food • city • blog • world • prize • tapas • beach • summer • I want • to see • to buy • photos • market • better • review • because • outside • village • we live • welcome • studies • they go • to chat • products • it seems • computer • tourists • comments • networks • messages • community • vacations • campground • to publish • to survive • activities • assignments • neighborhood • time (amount) • to contribute • he/she invites • social (plural) • ...
Communication tools 2025-09-25
Across
- a desktop email client for windows and macOS users.
- combines messaging and social media.
- talk to people online through video.
- communicate with people over video chat and messaging.
- manage emails, calendars, contacts, and tasks in one place.
- you can send messages, call.
- deliver messages across computers networks.
- open-source content management system.
- screen share, audio and video for participants.
- user-friendly and secure website builder.
- allows users to write and execute distributed program's
- send someone an instant message.
Down
- a platform that allows you to text and send photos to chat with people.
- the use of dedicated websites and applications to interact with people.
- eCommerce platform.
- communicate in the form of a video conference.
- learning tool.
- communicate with people through FaceTime
- cloud-based content creation platform
- an AI powered cloud communication platforms.
- helps teems communicate through direct messaging.
- a message sent by telegraph.
- create and edit web pages.
- social media platform that allows you to communicate with others.
24 Clues: learning tool. • eCommerce platform. • create and edit web pages. • you can send messages, call. • a message sent by telegraph. • send someone an instant message. • combines messaging and social media. • talk to people online through video. • cloud-based content creation platform • open-source content management system. • communicate with people through FaceTime • ...
NSTP 1 Volunteerism 2026-02-09
Across
- Actions done to help individuals or communities
- Genuine concern and compassion for others
- Volunteer service that follows ethics, safety, and proper roles
- Helping communities improve their abilities and resources
- A key feature of volunteer work where no salary is expected
- A program that promotes civic service and volunteerism among students
- Personal satisfaction gained from helping others
- The principle that volunteering is done by choice
- Relationships and networks formed through volunteering
Down
- A group of people sharing a common place or purpose
- Preparation given to volunteers before deployment
- Volunteer actions that promote awareness and positive change
- The Filipino tradition of collective help and unity
- The practice of giving time and skills to help others
- An NSTP activity where students experience real community life
- A situation where both the volunteer and the community gain
- Collaboration between volunteers and communities
- Putting the needs of others before personal gain
- Allowing people from all backgrounds to volunteer
- A person who offers service freely without expecting payment
20 Clues: Genuine concern and compassion for others • Actions done to help individuals or communities • Collaboration between volunteers and communities • Putting the needs of others before personal gain • Personal satisfaction gained from helping others • Preparation given to volunteers before deployment • Allowing people from all backgrounds to volunteer • ...
Cybersecurity Crossword 2026-03-10
Across
- — Program that records keystrokes to steal information.
- — Network security system that blocks unauthorized access.
- — Secret way to bypass normal authentication in a system.
- — Set of rules governing data communication on networks.
- — Process of converting encrypted data back to readable form.
- — Process of verifying a user's identity.
- — Malicious program disguised as legitimate software.
- — Software that secretly monitors user activity.
- — Network of infected computers controlled by a hacker.
- — Unauthorized access to a computer system.
Down
- — Process of converting data into a secure coded form.
- — Newly discovered vulnerability with no patch yet.
- — Code that takes advantage of a system vulnerability.
- — Software designed to damage or disrupt computers.
- — Malware designed to gain hidden administrator access.
- — Isolated environment used to test suspicious files.
- — Scam emails or messages that try to steal passwords or personal data.
- — Malware that locks files and demands payment.
- — Fixed-length value used to verify data integrity.
- — Pretending to be a trusted source in communication.
20 Clues: — Process of verifying a user's identity. • — Unauthorized access to a computer system. • — Malware that locks files and demands payment. • — Software that secretly monitors user activity. • — Newly discovered vulnerability with no patch yet. • — Software designed to damage or disrupt computers. • — Fixed-length value used to verify data integrity. • ...
Different Type of Networks 2018-10-15
7 Clues: a piece of jewelry • could be mistaken with a star • are used to play games together • they are 9 meters long in Britain • you can find them throughout the galaxy • multiple computers connect to this with Ethernet cables • _____________ cable used to connect a computer to a switch on a wired network
CYBERCRIME 2021-07-13
Across
- it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
- an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.
- an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
- any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
- it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
- criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
- terrorist activity that targets computer networks and information systems for attack.
- an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
- an act emending certain provisions of republic act no. 8293
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- an act providing for the recognition and electronic commercial and non-commercial transactions and documents penalties for the unlawful use thereof and for other purposes.
- a general term for a variety of computer codes ( such as viruses, logic bombs and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- it occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
- any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
- the act of copying digital material posted online into the storage medium on one’s computer.
- the interactional space or environment created by linking computers together into a communication network.
- political activism and social protest that uses hacking tools and techniques.
- market economic activity undertaken via the internet or similar electronic communication networks.
- the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
- stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
- unauthorized access to the entire or any part of a computer system.
Down
- sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
- group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
- it is doing psychological harm to or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
- a program is secretly attached to the company’s computer system.
- unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- it is one computer is used to reprogram another for illicit purposes.
- an illegally obtains data from a computer system by leaking it out in small amounts.
- an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
- a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- an investment scheme in which investors are promised abnormally high profits on their investments.
- act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
- property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
- most computer programs used in business have built-in anti-theft safeguards.
- a techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
- the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
- it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
- a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
- it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
- the most sensitive component as prevention from cybercrime.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.
- it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
- the right to be left alone freedom from observation and interference from others.
- these can be used to store copies of files from the computer for use in his investigation.
51 Clues: an act emending certain provisions of republic act no. 8293 • the most sensitive component as prevention from cybercrime. • a program is secretly attached to the company’s computer system. • unauthorized access to the entire or any part of a computer system. • it is one computer is used to reprogram another for illicit purposes. • ...
Network Security 2018-08-24
Across
- puts up a barrier in between internal network and outside networks
- Determining the privileges to resources, objects, or data
- stop people from uploading or forwarding important information in an not safe way
- determining the privileges of a user
- cryptographic hash functions published by NIST
- Confidentiality, Integrity, Availability
- encrypts the connection from an endpoint to a network
- combines multiple layers of defenses at the edge and in the network
- blocks incoming attacks and controls outbound messages to prevent the loss of data
- countermeasures to avoid or fight against security risks
Down
- collections of equal and non-equal encryption algorithms
- determines physical location
- protects a wireless network
- hiding information in blocks or within images
- control web use, block threats, and deny access to malicious websites
- automatically sees activities that are not normal
- commonly used hash function that makes 128-bit hash value
- protection of information or information resources
- the only protection for the data when the defense fails
- Access, Authentication, Authorization
20 Clues: protects a wireless network • determines physical location • determining the privileges of a user • Access, Authentication, Authorization • Confidentiality, Integrity, Availability • hiding information in blocks or within images • cryptographic hash functions published by NIST • automatically sees activities that are not normal • ...
Unit 7 2018-04-10
Across
- revolution Transition to new manufacturing processes
- railroad Networks of routes and safe houses to free the slaves
- locomotive A railway locomotive that runs on a steam engine
- codes Status of slaves and their owners
- People who wanted to end slavery
- parts When something is made with rare parts never to be made again
- cady stanton Leading figure of early WRM
- Sending messages along a wire
- How much people want the supply you’re selling
- rights movement Discussed problems of women’s right
- The product that you are selling
Down
- b anthony Played a pivotal role in the WRM
- party A secret society
- douglass African American writer,abolitionist,reformist,orator, statesman
- jenny Key part in the industrial system for weaving.
- Where the country’s trade and industry is controlled by private owners
- movement Movement about non consumption of alcoholic beverages
- system Using machinery to divide the time of labor
- gin Separates seeds from cotton
- reform Social movement to make a great change
20 Clues: party A secret society • Sending messages along a wire • gin Separates seeds from cotton • People who wanted to end slavery • The product that you are selling • codes Status of slaves and their owners • cady stanton Leading figure of early WRM • b anthony Played a pivotal role in the WRM • reform Social movement to make a great change • ...
ISDM 2 crossword 2020-09-03
Across
- a command that checks to see if the network given is available or not
- convert the following binary number 11111
- software that hurts your computer
- binary digit; 1 or 0
- acronym for www
- a program that navigates the world wide web
- American Standard Code Info Interchange
- A network of hardware & software that people and organizations use to collect, filter, process, create, and distribute data
- This infects your computer, reproduce in your machines, infect others
- a software that supports the basic functions of a device
Down
- stores and retrieves digital data using one or more rigid rapidly rotating platters coated with magnetic material
- network of networks
- 1/1 billionth second
- 1/1 millionth second
- search engine found in 1995
- a command that finds the time it takes for a packet of information to travel between a local computer and a destination IP address or domain
- unwanted stuff installed on your machine
- 1/1000 second
- 8 bits
- dishonest scheme; fraud
20 Clues: 8 bits • 1/1000 second • acronym for www • network of networks • 1/1 billionth second • 1/1 millionth second • binary digit; 1 or 0 • dishonest scheme; fraud • search engine found in 1995 • software that hurts your computer • American Standard Code Info Interchange • unwanted stuff installed on your machine • convert the following binary number 11111 • ...
2nd Exam Review 2022-02-22
Across
- the primary role of the intestines
- sac that gives provision & protection for a developing baby
- PNS state of "rest & digest"
- type of muscle in blood vessels
- kneecap
- a word part that means "body"
- increased surface area of this increases gas exchange at the cell level
- the innermost lining of this structure sheds when no fertilized egg implants into it
- produces bile to break down fats
- they bring blood from the body, toward the heart
Down
- 2nd step of producing lots of AIP
- networks of capillaries wrap around these lung structures
- the largest section of the brain. The main thinking area
- pumping chambers of the heart
- the highly-synchronized contraction of this muscle pushes blood through the body
- nervous system built of interneurons
- how O2 & CO2 move between capillaries and alveoli
- type of neuron that causes a gland to secrete
- byproduct of light-dependent reactions
- neurotransmitters cross this
- blood part that fights infections
- a covering around the axon
22 Clues: kneecap • a covering around the axon • PNS state of "rest & digest" • neurotransmitters cross this • pumping chambers of the heart • a word part that means "body" • type of muscle in blood vessels • produces bile to break down fats • 2nd step of producing lots of AIP • blood part that fights infections • the primary role of the intestines • nervous system built of interneurons • ...
Isenberg 191 2021-09-03
Across
- Peach baskets + Springfield
- Innovation (blank)
- HOF SB Coach Sortino
- largest employer in WMass
- 1 in 10 employees globally
- Where WRs are made
- Wings, wings, wings!
- Yum! (blank) wall
- THE minute(man)
- Dr. Nagurney's (blank) networks
- Thanks IMG!
- Back-to-back-to-back-to-back-tback #1
- Walmart/Target/TraderJoes...everything Route
- $ interacts with risk & time
- (blank) Meals
- Chase's new platform
- Just under 10k loud
Down
- Bump, set, spike Holyoke
- Long before minutemen/women
- You don't pronounce the "H" in
- Where Dr. J operated
- Dr. Miller's new chair
- Most UMass sports; before 11
- Four tracks plus real estate
- Dr. Solak's new chair
- Center for entrepreneurial inspriration
- Dean (blank)
- Prepare for Big Four
- AD Yankees fan, but we forgive him
- Five tall and 11 small
- Taller than any other college
- Namesake CEO
- ED D&I
- Your Associate Dean
34 Clues: ED D&I • Thanks IMG! • Dean (blank) • Namesake CEO • (blank) Meals • THE minute(man) • Yum! (blank) wall • Innovation (blank) • Where WRs are made • Your Associate Dean • Just under 10k loud • Where Dr. J operated • HOF SB Coach Sortino • Prepare for Big Four • Wings, wings, wings! • Chase's new platform • Dr. Solak's new chair • Dr. Miller's new chair • Five tall and 11 small • Bump, set, spike Holyoke • ...
anglaisWhittaker 2021-06-18
Across
- A clothing for your head
- Famous sport
- Mammal with a horn
- Has a trunk
- Used to protect your accounts
- Likes to chase mouse
- Composed of bones
- Object that tells you the time
- Extraterrestrial
- A large red and green fruit of a plant
- Set of global networks
- Man's best friend
- an animal with a lot of wool
- Lollipop
Down
- A desert flower that stings
- Used to represents a country
- Red fruit
- Used to count
- A place to eat
- North polar regions
- Savannah's king
- Someone that tells a lot of lie
- Insect that make cobwebs
- An orange vegetable
- Star of light
- An extinct species
- Stone art that represents often a king
- Yellow fruit
- Flying vehicule
- Environmentally friendly vehicle
- Part of a tree
- A transparent wall
- A confortable furniture to sleep
- A beautiful red flower
- Audiio output
35 Clues: Lollipop • Red fruit • Has a trunk • Famous sport • Yellow fruit • Used to count • Star of light • Audiio output • A place to eat • Part of a tree • Savannah's king • Flying vehicule • Extraterrestrial • Composed of bones • Man's best friend • Mammal with a horn • An extinct species • A transparent wall • North polar regions • An orange vegetable • Likes to chase mouse • Set of global networks • ...
unit 5 lab: medical terminology 2021-10-01
Across
- heart is not efficiently pumping from the left ventricle, causing reduced blood flow.
- Cerebrovascular accident
- cardiovascular pulmonary resuscitation
- complete stopping of the heart.
- records the electrical activity of the heart.
- condition process or method
- beyond or excess
- vessels that return blood to the heart.
- pumps blood through the system.
- the pericardial sac around the heart is inflamed.
- evaluate how well this system is functioning.
- heart failure
- specialized area of radiology
Down
- Left ventricular assist device
- look at blood going through blood vessels to determine if they are narrowed or have a thrombus
- uses ultrasound to look at the heart and its vessels.
- an artery has a weakened wall, causing it to swell, like a balloon.
- small
- within
- without
- networks of small vessels that perfuse tissues.
- bring in air from the atmosphere and pass oxygen into the bloodstream.
- permanent pace maker
- vessels that deliver blood to tissues.
- increased pressure in the blood vessels.
25 Clues: small • within • without • heart failure • beyond or excess • permanent pace maker • Cerebrovascular accident • condition process or method • specialized area of radiology • Left ventricular assist device • complete stopping of the heart. • pumps blood through the system. • cardiovascular pulmonary resuscitation • vessels that deliver blood to tissues. • ...
Cardiovascular system 2022-05-25
Across
- networks of smell vessels perfuse tissues
- test- ultrasounds to look at heart and blood vessels
- Deep Vein Thrombosis
- vessels
- Atrioventricular
- pumps blood
- leads (wires) attached to chest that record electrical activity
- vessels that return blood back to the heart
- cutting into
- narrowing
- Acute Myocardial Infraction
- intensive care unit
- Automated External Defibrillator
- hardening in the arteries, can be caused by fat build up
Down
- heart not pumping from left ventricle resulting in reduced blood flow
- vessels that deliver blood to tissue
- x-ray dye called contrast is injected into blood vessels to diagnose things like stenosis
- portable ECG, records activity to show possible pattern for symptoms that are occurring
- used to measure certain items in blood that may indicate heart muscle damage
- pulse
- carries blood away from heart to the rest of your body
- hardening
- high blood pressure; increased pressure in blood vessels
- weakened wall in artery
- lack of blood flow/blockage in coronary arteries; "heart attack"
25 Clues: pulse • vessels • hardening • narrowing • pumps blood • cutting into • Atrioventricular • intensive care unit • Deep Vein Thrombosis • weakened wall in artery • Acute Myocardial Infraction • Automated External Defibrillator • vessels that deliver blood to tissue • networks of smell vessels perfuse tissues • vessels that return blood back to the heart • ...
Johnavon Marroquin 2016-12-01
Across
- the use of electronic communication to bully in person
- – a web page that allows collaborative editing
- private network
- OPERATORS and , or , not
- ENGINE identify ideas in a data base
- a list of books referred to in scholarly work
- to start over
- operate with a network
- global network communication
- USE the doctrine that brief excerpts of copyright material
- quotation of a reference
- a newspaper to the internet
- the unauthorized use
Down
- navigate the world wide web
- (HOST) names or in
- a link that takes you to a website
- taking someone else's work
- –an infecteve agent that typically consist of a nucleic acid
- accepted way to communicate on the internet
- copying people without permission
- TABS – bookmark
- a person who gets access to your computer
- stop from getting hacked
- NETWORKS a network of social interactions
- RESOURCE LOCATOR (URL) – location or address that tells you where documents are
25 Clues: to start over • TABS – bookmark • private network • (HOST) names or in • the unauthorized use • operate with a network • OPERATORS and , or , not • stop from getting hacked • quotation of a reference • taking someone else's work • navigate the world wide web • a newspaper to the internet • global network communication • copying people without permission • a link that takes you to a website • ...
Unit 5 Activity 2 - Savannah Hinton W3 2023-11-09
Across
- cardiovascular disease
- a test that records the electrical signals in the heart.
- a device used to control an irregular heart rhythm.
- when your heart does not pump enough blood to your body.
- creates radio waves to take clear pictures of your body.
- outside of, without
- vessel
- sound waves that create images of internal body structure.
- the process of recording
- chest organ that pumps blood throughout your body.
- when brain blood flow is blocked or sudden bleeding in brain.
- diabetes mellitus
- ventricular tachycardia
- acute coronary syndrome
Down
- it takes dynamic xray pictures of your heart
- electricity
- excessive
- a blood vessel that carries blood from the heart to the body.
- chest pain or discomfort that keeps coming back.
- networks of small vessels that perfuse tissues.
- blood vessels that carry blood throughout your body.
- a problem with the rate or rhythm of your heartbeat.
- cane-shaped vessel that delivers oxygen-rich blood in the body.
23 Clues: vessel • excessive • electricity • diabetes mellitus • outside of, without • cardiovascular disease • ventricular tachycardia • acute coronary syndrome • the process of recording • it takes dynamic xray pictures of your heart • networks of small vessels that perfuse tissues. • chest pain or discomfort that keeps coming back. • chest organ that pumps blood throughout your body. • ...
Chapter 11 Security Plus 2024-05-02
Across
- IT services using resources that are traditionally bound to hardware
- Virtualizing parts of physical network for reconfiguration.
- Special security challenges in spanning public/private spaces.
- VM breaking out to interact with host OS.
- Linux security architecture for access control.
- On-demand infrastructure for configurable computing resources.
- Dividing application development into smaller, manageable entities.
- Simplifies the process of building, deploying, and managing containerized applications
- Virtualized service extending WAN networks.
- Table listing security duties of user and cloud provider.
- Computing resources located on organization’s campus.
- AWS Lambda, Microsoft Azure Functions, Google Cloud Functions
- integrated, cloud-centric, and user-centric approach to network security.
Down
- External providers offering cloud security controls.
- Cloud security controls to mitigate vulnerabilities.
- Unique challenges to securing cloud usage.
- Method of packaging, distributing, and running applications .
- Equipment and personnel spread across different locations.
- provision computing infrastructure using code instead of manual processes.
- Local equipment and personnel at organization’s campus computing.
- Virtualization vulnerability exposing data to another VM.
21 Clues: VM breaking out to interact with host OS. • Unique challenges to securing cloud usage. • Virtualized service extending WAN networks. • Linux security architecture for access control. • External providers offering cloud security controls. • Cloud security controls to mitigate vulnerabilities. • Computing resources located on organization’s campus. • ...
Chapter 8 Introduction to Networking 2024-09-02
Across
- causes latency and troubleshooting issues
- 127.0.0.1
- Shows network connections and listening ports
- mechanism maintains agreement among devices
- routes the router does not have a direct connection
- IPv6 was developed by
- ::
- Automatically discover remote networks
- devices are not on the same LAN
- Largest data unit a network can transmit
- destination is on the same LAN
Down
- no establishment of a connection with destination
- routes are automatically added by the router
- Non-guaranteed network service
- When it becomes zero the router will discard the packet
- can be sent over any media type
- in IPV6 provide optional network layer information
- forwards traffic to a specific direction when there is not a match
- fields were removed from IPV6
- Layer 3 splits the IPv4 packet into smaller units
- Must be configured manually
- detect corruption in the IPV4 header
- field used for QoS
- IP address in the same range as the rest of the LAN
24 Clues: :: • 127.0.0.1 • field used for QoS • IPv6 was developed by • Must be configured manually • fields were removed from IPV6 • Non-guaranteed network service • destination is on the same LAN • can be sent over any media type • devices are not on the same LAN • detect corruption in the IPV4 header • Automatically discover remote networks • Largest data unit a network can transmit • ...
cybercrime 2024-11-11
Across
- – Software that secretly collects user information.
- – Malicious code that attaches itself to programs and spreads.
- – Software that records keystrokes to capture information.
- – A person who breaks into computer systems.
- – A fraudulent scheme, often online, to steal money or information.
- – Malware disguised as legitimate software.
- – Another term for Trojan malware.
- – Using technology to harass or bully someone.
- - An unauthorized way to access a system.
Down
- – Software designed to harm or exploit systems.
- – A network of infected computers controlled remotely.
- – Distributed Denial of Service, an attack that overwhelms a network.
- – A scam to trick people into giving personal information.
- – Malware that demands payment to restore access.
- – Stealing someone's personal information to impersonate them.
- – Malware that replicates itself to spread across networks.
- – Security system that monitors and controls network traffic.
- – Faking identity or location to deceive.
- – Software that automatically displays or downloads ads.
- – Process of encoding data to protect it from unauthorized access.
20 Clues: – Another term for Trojan malware. • – Faking identity or location to deceive. • - An unauthorized way to access a system. • – Malware disguised as legitimate software. • – A person who breaks into computer systems. • – Using technology to harass or bully someone. • – Software designed to harm or exploit systems. • – Malware that demands payment to restore access. • ...
Vocab 2024-11-01
Across
- to leave behind
- community
- club
- I am fascinated by (plural)
- diverse
- participate
- team
- religious community
- temple
- indigenous people
- jews
- dances
- a I belong to
- things in common
- muslims
- to pray
- get together (gathering)
- pride
- to join
- to have fun
- to get together
- mosque
- organizations
- a to get used to
- world
Down
- for a long time
- to miss
- traditional
- I like (plural)
- a tradition
- immigrants
- culture shock
- multi-lingual
- I am fascinated by (singular)
- It interests me
- to do things together
- a to move (home)
- members
- I like (singular)
- holidays
- They interest me
- group
- adapt
- languages
- de I am a part of
- I am a member of
- social networks
- parades
- traditional clothes
- a custom
- enjoy
- of the same age
- neighborhood
53 Clues: club • team • jews • group • adapt • enjoy • pride • world • temple • dances • mosque • to miss • diverse • members • parades • muslims • to pray • to join • holidays • a custom • community • languages • immigrants • traditional • a tradition • participate • to have fun • neighborhood • culture shock • multi-lingual • a I belong to • organizations • for a long time • I like (plural) • to leave behind • It interests me • social networks • of the same age • ...
ia3 2025-04-05
Across
- or fundamental assets.
- organization's public perception, a key asset.
- weakness in a system exploitable by a threat actor.
- potential harm from exploiting a vulnerability.
- website developer using this creates a vulnerability.
- ability to bounce back from disruptions.
- act of establishing a BCMS (two words).
- likelihood and consequence of a potential event.
- 'C' in BCMS, referring to ongoing operational capability.
- events are examples of these.
- emails trying to steal information.
- taken to protect computer systems and networks.
Down
- resources a BCMS aims to safeguard.
- first step in vulnerability management.
- piece of personal information targeted in phishing.
- security system that monitors network traffic.
- used by hackers to gain system access (abbr.).
- formal examination of a BCMS.
- piece of personal information targeted in phishing.
- 'M' in BCMS, overseeing the system.
- documented set of actions for specific crisis scenarios.
- provides a management ______.
- common medium for deploying phishing attacks via phone text.
- form for Business Continuity Plan.
- 'T' in BCP Test Plan.
25 Clues: 'T' in BCP Test Plan. • or fundamental assets. • formal examination of a BCMS. • provides a management ______. • events are examples of these. • form for Business Continuity Plan. • resources a BCMS aims to safeguard. • 'M' in BCMS, overseeing the system. • emails trying to steal information. • first step in vulnerability management. • act of establishing a BCMS (two words). • ...
Friends, Networking & Teamwork 2025-09-14
Across
- Assigning tasks or responsibilities to others.
- The ability to recognize and manage emotions in oneself and others.
- The process of solving disagreements in a constructive way.
- Ensuring everyone feels valued and included.
- Understanding and sharing the feelings of others.
- The unity and harmony within a group.
- Leading by empowering others and sharing decision-making.
- Discussing to reach a mutual agreement.
Down
- Intervening to help resolve conflicts between parties.
- Guiding a group process to ensure productive discussions and outcomes.
- Skills used to interact effectively with others.
- The combined effort of a group that achieves more than the sum of individual efforts.
- General agreement within a group.
- Expressing opinions confidently and respectfully.
- Supporting others, especially marginalized groups, to promote equality.
- Building professional relationships for mutual benefit.
- Working together to achieve a common goal.
- Relying on each other mutually to achieve common goals.
- Taking ownership of one’s actions and commitments.
- The value gained from networks of relationships that enable cooperation.
20 Clues: General agreement within a group. • The unity and harmony within a group. • Discussing to reach a mutual agreement. • Working together to achieve a common goal. • Ensuring everyone feels valued and included. • Assigning tasks or responsibilities to others. • Skills used to interact effectively with others. • Expressing opinions confidently and respectfully. • ...
Cyber Ethics Puzzle by Arush 2025-05-20
Across
- Footprint: The trail of data you leave behind online
- The right to keep your personal information secure
- Unwanted or junk messages, often email
- A malicious program that spreads from device to device
- Converting data into a secret code
- Moral principles governing behavior
- Permission to use or access something
- Legal protection for original creative works
- Breach: Unauthorized access to private or confidential data
- A barrier that protects a network from threats
- A mutual understanding or contract between parties
Down
- Theft: Using someone else’s personal data without permission
- Software designed to harm or damage a device
- A secret word or phrase used to access accounts
- Trick to steal personal data through fake websites or emails
- Unauthorized access to computer systems or networks
- Media: Websites and apps for sharing and interacting online
- A person who posts offensive or annoying messages online
- A dishonest scheme to trick someone for personal gain
- Online harassment or bullying using digital platforms
20 Clues: Converting data into a secret code • Moral principles governing behavior • Permission to use or access something • Unwanted or junk messages, often email • Software designed to harm or damage a device • Legal protection for original creative works • A barrier that protects a network from threats • A secret word or phrase used to access accounts • ...
IT 2025-07-21
Across
- To find and fix errors in code.
- Programs and other operating information used by a computer.
- A number system using only 0s and 1s.
- Unsolicited or junk email.
- A device that forwards data packets between networks.
- An organized collection of data.
- A popular high-level programming language.
- The process of gaining access to a computer system.
- A global network connecting millions of computers.
- An identifier used by a person to access a computer system.
Down
- A step-by-step procedure for solving a problem or performing a task.
- A group of connected computers that share resources.
- The process of encoding data to prevent unauthorized access.
- The physical parts of a computer.
- The rules that define the structure of a programming language.
- A security system that monitors and controls network traffic.
- Software designed to harm or exploit a computer system.
- An input device used to type text.
- A high-level programming language known for its readability.
- A type of malicious software that replicates itself.
20 Clues: Unsolicited or junk email. • To find and fix errors in code. • An organized collection of data. • The physical parts of a computer. • An input device used to type text. • A number system using only 0s and 1s. • A popular high-level programming language. • A global network connecting millions of computers. • The process of gaining access to a computer system. • ...
Cybersecurity Crossword 2025-09-04
Across
- Update that fixes a vulnerability
- Scrambles data securely
- Training and phishing simulation partner (two words)
- Software that protects against malicious code
- Practice of protecting networks, devices and data from unauthorized access or criminal use
- A phishing email sent for practice
- Cybersecurity Awareness Month
- Attempts by hackers to cause harm, destroy, or access sensitive information
- Harmful software
- Button for suspicious emails (two words)
Down
- Cybersecurity mascot
- Process of confirming your identity
- Blocks network intruders
- Cybercriminals disguise their identity as a trusted source to exploit an unassuming user
- Creates a secure connection to another online network
- Mimecast option to allow emails into your inbox
- Someone who tries to access data they aren’t authorized to view
- Email security partner
- Unauthorized data access
- Sending emails or other messages purporting to be from a reputable source
- Software that obtains covert information by transmitting data covertly
- Malware that demands money
- Mimecast option to stop emails from being received
- Secret word for login
24 Clues: Harmful software • Cybersecurity mascot • Secret word for login • Email security partner • Scrambles data securely • Blocks network intruders • Unauthorized data access • Malware that demands money • Cybersecurity Awareness Month • Update that fixes a vulnerability • A phishing email sent for practice • Process of confirming your identity • Button for suspicious emails (two words) • ...
Chapter 5 - Crime and Security 2025-11-12
Across
- requiring users to do multiple authentications checks
- ensuring systems are available
- the use of computers or networks to perform unethical activity
- ensuring private data remains private
- the process of transforming data into secret code to prevent theft
- process where security professionals report vulnerabilities within the system
- psychological feelings and characteristics for an individual
- the state of being protected or safe
- not likely to cause harm
- ensuring data is not changed without correct authentication
Down
- the process of proving something is true
- automated measurements to discover physical or behavioral characteristics
- a method to bypass regular authentication. Usually used by law enforcement
- the use of hacking to hurt or benefit a political cause
- the state of being exposed and the potential of being harmed
- the process of simulating cyberattacks on a system
- people who can help protect the digital world
- individuals that will be using the system created
- an act that is considered shameful or wrong
- irresponsible or destructive action performed by a criminal
20 Clues: not likely to cause harm • ensuring systems are available • the state of being protected or safe • ensuring private data remains private • the process of proving something is true • an act that is considered shameful or wrong • people who can help protect the digital world • individuals that will be using the system created • ...
CSP Review. 2025-12-08
Across
- How ready the U.S. military is for nuclear war
- The movie we saw with Brad Pitt
- Central Processing _
- Files that lose no data when compressed and decompressed
- A search engine whose name is inspired by a really large number
- Lines in the code editor the interpreter ignores
- Vint Cerf, the father of the _
- Small chunks of data sent across networks
- A type of virus that takes a user's data and encrypts it until money is received for the decryption key
- Internet service provider
Down
- small text files websites to remember and track you
- The thing people in the late 90's were scared of
- Hypertext Markup Language
- How many bits are in a byte
- DNS _ makes users think they're visiting a legitimate site, but really on a malicious one
- not or no longer needed or useful; superfluous.
- The term for refresh rate
- _ commons, the organization that provides free, easy-to-use copyright licenses
- A computer that beat some humans at Jeopardy
- A cute elephant
20 Clues: A cute elephant • Central Processing _ • Hypertext Markup Language • The term for refresh rate • Internet service provider • How many bits are in a byte • Vint Cerf, the father of the _ • The movie we saw with Brad Pitt • Small chunks of data sent across networks • A computer that beat some humans at Jeopardy • How ready the U.S. military is for nuclear war • ...
Crossword Review 2025-12-08
Across
- Rules and regulations we all agree to use.
- One of the 5 V's; speed.
- Data with values that change continuously.
- Finding and fixing problems in a program.
- A bug people worried about from switching from the year 1999 to 2000.
- Tool from google that shows popularity.
- A way to leave notes in code.
- Electric current or voltage.
- Use of computer program to record every keystroke.
Down
- IBM computer that played on Jeopardy.
- Networking device that forwards data packets between networks.
- Type of AI carried out to do human-like tasks.
- Max amount of data that can be sent in bits per second.
- Finite, step-by-step set of instructions
- A collection of commands made available to a programmer.
- Unit of digital information, typically consisting of 8 bits
- Type of AI carried out to do one task.
- Collecting data from others so you can analyze it.
- Picture Element, smallest square on a screen
- Error when the computer tries a number too large.
20 Clues: One of the 5 V's; speed. • Electric current or voltage. • A way to leave notes in code. • IBM computer that played on Jeopardy. • Type of AI carried out to do one task. • Tool from google that shows popularity. • Finite, step-by-step set of instructions • Finding and fixing problems in a program. • Rules and regulations we all agree to use. • ...
Brandon's AP Comp Sci Crossword 2025-12-08
Across
- Converting analog data to digital by taking measurements
- Base-2 number system using 0s and 1s
- Compression that removes no data
- Tiny electronic switch inside CPUs that processes bits
- Standard that encodes text as numbers
- Scrambling data so only someone with the key can read it
- Base-16 number system used in computing
- Address of a web page on the Internet
- Time it takes for data to travel from source to destination
Down
- Attack that overwhelms a server using many devices
- Step-by-step instructions for solving a problem
- Observation that transistor counts double about every 2 years
- Maximum amount of data sent per second
- Device that forwards data packets between networks
- Smallest dot of color in a digital image
- Unit of digital info equal to 8 bits
- Reliable protocol ensuring packets arrive correctly
- New Internet addressing system using 128-bit addresses
- Central processor that executes program instructions
- Software designed to harm or disrupt a computer
20 Clues: Compression that removes no data • Base-2 number system using 0s and 1s • Unit of digital info equal to 8 bits • Standard that encodes text as numbers • Address of a web page on the Internet • Maximum amount of data sent per second • Base-16 number system used in computing • Smallest dot of color in a digital image • Step-by-step instructions for solving a problem • ...
ESL (Topics 1-3) 2026-01-20
Across
- money paid for work
- costing nothing
- for all time
- things that cause great fear
- changed in form
- get
- methods or tools for doing something
- connected systems of many things
- some of the first settlers
- let your thoughts move from topic to topic
- tried to find out by questioning
- very tiring and difficult
- for each year
- be higher or taller than
- helped or supported
- most more than half
- whenever you want (at your choice)
Down
- finding new workers
- something good or useful
- take out from something
- room at the top of a house
- a journey by ship
- more than
- abroad across the sea
- final results after processing
- passed from person to person
- information that helps you find an answer
- good for you as food
- chances of success
- produces naturally
- very greatly or seriously
- a job or position (as a servant)
- very great or very important
33 Clues: get • more than • for all time • for each year • costing nothing • changed in form • a journey by ship • chances of success • produces naturally • finding new workers • money paid for work • helped or supported • most more than half • good for you as food • abroad across the sea • take out from something • something good or useful • be higher or taller than • very greatly or seriously • ...
computing devices 2026-02-18
Across
- Transmission Control Protocol
- a global computer network providing a variety of information
- a device that uses recourses from a sever
- is the fundamental unit of data transmitted
- the transmission capacity of a computer network
- customers access to the Internet
- data, or systems to enhance reliability
- is a fundamental component of the internet infrastructure
- a combined device for modulation and demodulation
- connection for a wireless network device
- a hardware device that connects multiple devices within a network
- process that transforms readable data,
- a networking hardware device
- refers to the intentional duplication of critical components or functions
Down
- high-performance computer system
- high-performance data transmission medium
- is a standardized set of rules
- is a computer or software that provides services
- refers to the time delay between initiating a request for data.
- stands for Local Area Network
- internet protocol laws
- a networking device that connects multiple computer networks
- facility allowing computers, smartphones, or other devices to connect to the internet
23 Clues: internet protocol laws • a networking hardware device • Transmission Control Protocol • stands for Local Area Network • is a standardized set of rules • high-performance computer system • customers access to the Internet • process that transforms readable data, • data, or systems to enhance reliability • connection for a wireless network device • ...
civil law of end to end digitalization 2024-03-12
Across
- a decentralized communication model where interconnected nodes or individuals share resources or information without the need for a central server. Cryptocurrencies operate on P2P networks to facilitate direct transactions between users.
- a programmed event in some cryptocurrencies, such as Bitcoin, where the block rewards earned by miners are reduced by half after a certain number of blocks are mined. Halving events occur periodically to control inflation, scarcity, and mining rewards in the network.
- refers to a distributed database where data, once written, cannot be altered or deleted. Blockchain technology provides immutable ledgers for cryptocurrencies to ensure transparency and security.
- trusted data sources that provide external information to smart contracts on blockchains. Oracles help smart contracts access real-world data, such as prices, weather conditions, or events, enabling decentralized applications to interact with external systems.
- refers to a cryptocurrency wallet that is not connected to the internet, providing offline storage for digital assets to enhance security and protect against hacking attacks.
- short for market capitalization, is the total value of all circulating coins or tokens of a cryptocurrency. Market cap is calculated by multiplying the current price per unit by the total circulating supply, indicating the project's relative size and value in the market
- the process of validating and adding new transactions to a blockchain by solving complex mathematical problems. Miners are rewarded with newly minted cryptocurrencies for their computational efforts.
- a consensus algorithm used in blockchain networks where miners compete to solve complex mathematical puzzles to validate transactions and create new blocks. The first miner to find the solution is rewarded with cryptocurrency.
- an online platform that allows users to buy, sell, and trade cryptocurrencies. Exchanges facilitate the conversion of digital assets and provide liquidity for the crypto market.
- also known as transaction fee, is the amount of cryptocurrency paid by users to execute transactions, smart contracts, and operations on blockchain networks. Gas fees compensate miners for processing transactions and maintaining network security
- a type of cryptocurrency designed to minimize price volatility by pegging its value to a stable asset like fiat currency, commodities, or other cryptocurrencies. Stablecoins provide a reliable medium of exchange and store of value in the crypto market
- refers to the computational power or speed at which a miner's hardware can solve cryptographic puzzles and process transactions on a blockchain network. Hash rate is a critical factor in mining operations and network security.
- cryptocurrencies that focus on enhancing user anonymity and transaction privacy by employing advanced encryption techniques and privacy protocols. Privacy coins prioritize confidentiality and censorship resistance in financial transactions
- refers to the ease and speed at which an asset, such as a cryptocurrency, can be bought or sold in the market without significantly impacting its price. Liquidity is essential for efficient trading, price stability, and market depth in cryptocurrency exchanges.
Down
- refers to a category of financial applications and protocols built on blockchain technology that aim to provide decentralized alternatives to traditional financial services such as lending, borrowing, and trading.
- occurs in a blockchain when a new set of rules is implemented, resulting in a divergence from the existing protocol. Forks can be classified as soft forks (backwards compatible) or hard forks (non-backwards compatible
- a self-governing entity or community run by smart contracts and governed by token holders on a blockchain. DAOs operate without centralized control and enable decentralized decision-making and resource allocation
- a mathematical algorithm that converts input data into a fixed-length string of characters. Hash functions are vital for securing transactions in cryptocurrencies by creating unique digital signatures.
- refers to interoperability solutions that allow different blockchain networks to communicate and transfer assets seamlessly. Cross-chain technology enables the exchange of digital assets and data across multiple blockchains
- a fundraising method in which a project or company issues digital tokens to investors in exchange for funding. ICOs are used to raise capital for blockchain projects and decentralized applications
- refers to adherence to laws, regulations, and guidelines set by governmental authorities or financial institutions governing the use of cryptocurrencies and blockchain technology. Compliance measures are essential for ensuring legal operation and risk management in the crypto industry.
- refers to the act of spending the same cryptocurrency tokens or digital assets more than once by exploiting vulnerabilities in a blockchain network. Double spending attacks can undermine the security and trustworthiness of digital transactions.
- known as a seed phrase or mnemonic, is a series of words used to restore access to a cryptocurrency wallet in case of loss, theft, or device failure. Recovery phrases ensure secure backup and restoration of wallet funds
- a self-executing contract with the terms of the agreement directly written into code. Smart contracts automatically enforce and execute the terms of the contract when predefined conditions are met.
- a unique digital asset that represents ownership or proof of authenticity for a specific item, art piece, collectible, or virtual asset. NFTs are indivisible, verifiable on blockchains, and are used in digital art, gaming, and collectibles
- a unique alphanumeric string used to receive, send, or store digital assets in a cryptocurrency wallet. Wallet addresses serve as identifiers for transactions and ensure accurate delivery of funds between users on blockchain networks.
- refers to government-issued currencies that are not backed by a physical commodity such as gold or silver. Fiat currencies, like the US Dollar or Euro, are used as legal tender for commerce and trade, and serve as a benchmark for cryptocurrency prices
- a formal document that outlines the technology, features, goals, and economics of a blockchain project or cryptocurrency. Whitepapers provide detailed information to investors, developers, and stakeholders about the project's vision and implementation
- the process of converting real-world assets or rights into digital tokens on a blockchain. Tokens represent ownership, value, or access rights and can be traded or utilized within decentralized applications.
- refers to the use of algorithms and computer programs to automatically execute trades in financial markets based on predefined criteria such as price, volume, or timing.
30 Clues: refers to the use of algorithms and computer programs to automatically execute trades in financial markets based on predefined criteria such as price, volume, or timing. • refers to a cryptocurrency wallet that is not connected to the internet, providing offline storage for digital assets to enhance security and protect against hacking attacks. • ...
ISDM 2 Crossword By:Jesus Garcia 2020-09-03
Across
- bot that systematically browses the World Wide Web
- Locks your machine and payment is needed to get it back
- System of computer networks
- perception that the number of transistors on a microchip doubles every two years
- infects your computer
- What protocol does the internet use?
- standalone malware that replicates to spread to other computers
- Evil Software
- A program that searches for and identifies items in a database that correspond to keywords or characters
- stores file that can be accessed anywhere
Down
- ads begin to pop up
- a word, phrase, or image that you can click on to jump to a new document or a new section within the current document.
- Precursor to the internet
- Pretends to be legit but is dangerous
- acts like a traffic manager for packets
- standard markup language for documents
- program with a graphical user interface for displaying HTML files
- Bits of information that travel in a computer
- Digital currency
- unwanted items are installed in your system
20 Clues: Evil Software • Digital currency • ads begin to pop up • infects your computer • Precursor to the internet • System of computer networks • What protocol does the internet use? • Pretends to be legit but is dangerous • standard markup language for documents • acts like a traffic manager for packets • stores file that can be accessed anywhere • ...
