networks Crossword Puzzles
Internet Crossword 2015-09-22
Across
- Companies that proved users with access to the Internet, usually for a fee
- The Internet from the past
- Structure that handles the major traffic in a networked system
- where you can keep URLs that you would like to consult frequently
- Gap between those who have Internet access and those who don’t
- Lead to another website/place within same document
Down
- Companies that proved users with access to the Internet, usually for a fee
- mainframe computers that are capable of very fast processing
- Collection of millions of hypertext documents
- Examples are Smartphones, Web TV, Internet Tablets
- Ethernet or USB cable and a DSL or cable modem
- Each site contains a home page and is run by an individual, company, or organization
- Collection of networks of computers
13 Clues: The Internet from the past • Collection of networks of computers • Collection of millions of hypertext documents • Ethernet or USB cable and a DSL or cable modem • Examples are Smartphones, Web TV, Internet Tablets • Lead to another website/place within same document • mainframe computers that are capable of very fast processing • ...
Module 6 Terms and Commands Crossword 2021-12-02
Across
- the arrangement of the elements of a communication network
- the organization of programming into separate functional components
- a method of designing modular communication protocols
- a computer hardware component that connects a computer to a computer network(acronym)
- point-to-point system composed of two or more connected parties
- a network topology in which nodes are directly connected to a common half-duplex link
Down
- a device that can receive, create, store, or forward data along a communications path
- a communications protocol for local area networks (acronym)
- Implements this sublayer in hardware (acronym)
- each node connects to exactly two other nodes
- something that uniquely distinguishes a network
- IEEE 802.2 sublayer (acronym)
12 Clues: IEEE 802.2 sublayer (acronym) • each node connects to exactly two other nodes • Implements this sublayer in hardware (acronym) • something that uniquely distinguishes a network • a method of designing modular communication protocols • the arrangement of the elements of a communication network • a communications protocol for local area networks (acronym) • ...
BITS of Cisco Fun 2025-03-25
Across
- memory in a computer that temporary stores data (3)
- product of cisco used for video conferencing, virtual meetings and webinars (5)
- state in which bits Pilani Hyderabad campus is located (9)
- full form of "IP" in networking (8,8)
- the name of the city from where "cisco" originated from (12)
- a common input device used to type (8)
Down
- cisco device used to connect networks and route traffic between them (6)
- bits hyderabad cultural fest (5)
- 2nd level of OSI model (8)
- fiesta del sol celebrates which type of culture (6)
- a network that connects devices in a limited area like an office (3)
- a common technology for wireless internet connectivity (4)
12 Clues: 2nd level of OSI model (8) • bits hyderabad cultural fest (5) • full form of "IP" in networking (8,8) • a common input device used to type (8) • memory in a computer that temporary stores data (3) • fiesta del sol celebrates which type of culture (6) • state in which bits Pilani Hyderabad campus is located (9) • ...
Class 6 2025-03-23
Across
- The memory that temporarily holds data while a computer is on
- Software used to detect and remove computer viruses
- The main circuit board that holds the computer’s components
- The brain of the computer
- Number system with only two digits: 0 and 1, used by computers
Down
- A global network that connects computers around the world
- The main part of the computer that performs calculations and tasks
- A person who tries to access computers or networks without permission
- Memory that holds important startup instructions, cannot be changed
- A popular search engine used to find information on the internet
- A type of computer virus
- Number system with ten digits, from 0 to 9
12 Clues: A type of computer virus • The brain of the computer • Number system with ten digits, from 0 to 9 • Software used to detect and remove computer viruses • A global network that connects computers around the world • The main circuit board that holds the computer’s components • The memory that temporarily holds data while a computer is on • ...
Crossword 2025-06-05
Across
- - a device that connects many devices in one network.
- - a device that directs data between different networks.
- - a device that strengthens and sends signals to cover larger areas.
- - a list of things a business owns.
- - a plan of how much money can be spent.
Down
- - a powerful computer that provides data or services to other computers.
- - a simple device that sends data to all devices in a network.
- - a device that connects your network to the internet.
- - a person or group interested in a business or project.
- - a security system that protects a network from bad access.
- - a screen that shows information from a computer.
- - a plan or suggestion for a project or idea.
12 Clues: - a list of things a business owns. • - a plan of how much money can be spent. • - a plan or suggestion for a project or idea. • - a screen that shows information from a computer. • - a device that connects many devices in one network. • - a device that connects your network to the internet. • - a person or group interested in a business or project. • ...
PST7 Modules 5-8 2023-01-20
Across
- Computer-Aided Dispatch
- We work in 24-hour time known as ___ time
- Proper radio demeanor and attitude requires you to speak ___
- Onboard ____ devices can open a voice channel and transmit information via a connection to a TCC
- Terminal device with display and keyboard for the deaf
- An emergency button activation, no voice call is like a 911 ___ ___
Down
- A small computer terminal that permits data transfer between response units and PSAP
- An ambitious plan to create a network of networks for the US
- unmanned aerial vehicles (UAV) are known as ___
- Global ___ System
- ___ recorder information can be used for QA/QI purposes
- technology that provides a mapped location of response unit vehicles
12 Clues: Global ___ System • Computer-Aided Dispatch • We work in 24-hour time known as ___ time • unmanned aerial vehicles (UAV) are known as ___ • Terminal device with display and keyboard for the deaf • ___ recorder information can be used for QA/QI purposes • An ambitious plan to create a network of networks for the US • ...
marketing 2025-03-02
Across
- An audio-based medium for advertisements and promotions.
- Printed visuals placed in public spaces for marketing.
- A global sportswear brand with three stripes.
- Marketing strategies that do not rely on paid advertisements
- A small booklet used to promote products or services.
- A streaming platform known for original shows and movies.
Down
- A large outdoor advertisement placed in high-traffic areas.
- A symbol used to categorize content on social media
- Relating to online networks where people interact and share content.
- When a brand supports an event for advertising exposure.
- A platform for posting short messages and engaging with followers.
- The material, such as text, images, or videos, used in marketing.
12 Clues: A global sportswear brand with three stripes. • A symbol used to categorize content on social media • A small booklet used to promote products or services. • Printed visuals placed in public spaces for marketing. • An audio-based medium for advertisements and promotions. • When a brand supports an event for advertising exposure. • ...
Block Chain Crossword Puzzle for the Patients by Taylor Gregory BSN, RN 2024-10-31
Across
- The action of sharing information with another party.
- Protects patient data, computers, and networks used by healthcare providers
- A record of your medical history kept online
- Blockchain can prevent this type of medical record problem, where the same data is entered multiple times
- With this, healthcare organizations can directly query the block chain.
- protects patient information
- Healthcare organizations use this to confirm if data is correct on the blockchain
Down
- Working together as a team
- Focuses on the wants and needs of the patients
- With blockchain, patients don’t have to worry about data being __ or changed
- A tool being used to advance healthcare
- Medical test results, prescriptions, and doctor notes make up your __ record
12 Clues: Working together as a team • protects patient information • A tool being used to advance healthcare • A record of your medical history kept online • Focuses on the wants and needs of the patients • The action of sharing information with another party. • With this, healthcare organizations can directly query the block chain. • ...
Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity 2025-08-25
Across
- The practice of protecting computers and networks from digital threats like hackers and viruses.
- Harmful software designed to damage or disrupt systems
- Unwanted or junk email messages
- Someone who breaks into computer systems, often illegally
- A secret string used to verify identity
- A scam where attackers trick you into giving up personal info via fake emails
Down
- Cyber Security Awareness Month is observed in ---?
- A type of malware disguised as a legitimate program
- A digital barrier that blocks unauthorized access to a network
- Software that detects and removes viruses and other malwares
- The name you use to log into a computer or website account.
- A copy of your data saved in case something goes wrong
12 Clues: Unwanted or junk email messages • A secret string used to verify identity • Cyber Security Awareness Month is observed in ---? • A type of malware disguised as a legitimate program • Harmful software designed to damage or disrupt systems • A copy of your data saved in case something goes wrong • Someone who breaks into computer systems, often illegally • ...
Recollection Protocol 2025-10-22
Across
- City where Mobile World Congress (MWC) was held in 2024.
- The network that connects computers worldwide.
- The digital assistant developed by Amazon.
- Platform used by makers for IoT projects, also a board for prototyping.
- Developer behind the Linux kernel.
- The technology company famous for its colourful letter logo and search engine.
- Company that introduced the first web browser with tabs.
Down
- The AI chatbot launched by OpenAI in late 2022.
- Last name of the co-founder of Google alongside Larry Page.
- Google’s open-source library widely used for training and building neural networks.
- Web development language that adds interactivity to websites.
- Type of computer memory that is volatile and erased when power is off.
12 Clues: Developer behind the Linux kernel. • The digital assistant developed by Amazon. • The network that connects computers worldwide. • The AI chatbot launched by OpenAI in late 2022. • City where Mobile World Congress (MWC) was held in 2024. • Company that introduced the first web browser with tabs. • Last name of the co-founder of Google alongside Larry Page. • ...
Chapter 7 Vocabulary 2014-01-16
Across
- When the camera shows someone talking directly at the camera.
- Choosing to watch media that's more towards your political ideology.
- They spend alot of time and money into supporting policies they want.
- Reporters try to reveal infomation to see what the political leaders reaction is.
- Different networks of the media.
- Media that's shown to a large group of people over the news, internet,etc.
- Group of newspaper companies.
- If the media isn't present,then the less likely this will occur.
Down
- Reporters express the news in their own beleifs.
- Policies that the media chooses to focus on.
- Reporters who try to uncover things political leaders may be hiding.
- Media that's towards a certain interest and audience.
- A clip of the politician's speech.
13 Clues: Group of newspaper companies. • Different networks of the media. • A clip of the politician's speech. • Policies that the media chooses to focus on. • Reporters express the news in their own beleifs. • Media that's towards a certain interest and audience. • When the camera shows someone talking directly at the camera. • ...
SMART CITIES 2022-02-15
Across
- The transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
- T in ciTies
- SMART is the ___ use of resources in an efficient & effective way
- a person who is among the first to explore or settle a new country or area
- E in citiEs
- C in Cities
- facts and statistics collected together for reference or analysis
Down
- 2nd I in citIes
- S in citieS
- A global network which facilitates communication and sharing of information online
- the protection of computer systems and networks from cyber threats
- 1st I in cIties
- Reuse discarded objects or material in such a way as to create a product of higher quality or value than the original
13 Clues: S in citieS • T in ciTies • E in citiEs • C in Cities • 2nd I in citIes • 1st I in cIties • SMART is the ___ use of resources in an efficient & effective way • facts and statistics collected together for reference or analysis • the protection of computer systems and networks from cyber threats • a person who is among the first to explore or settle a new country or area • ...
Business & Management 2020-04-13
Across
- This rate can be calculated using thus equation: total output / total input x 100
- Outsourcing outside of the home country
- Is the space needed
- unpredictable event that threatens to harm an organization ad its stakeholders
- This rate can be calculated using this equation: actual output / productive capacity x 100
- Cost to buy P*Q
- Enables the organization to focus on its core activities
- Business had to locate close to their customers
Down
- This needs to have a good availability of a range f good, reliable local
- Cost to made FC (VC*Q)
- Existing transport networks for people and products
- Wide system of connected organizations, information, resources and operations
- The amount of time it takes between ordering new stock and receiving it
13 Clues: Cost to buy P*Q • Is the space needed • Cost to made FC (VC*Q) • Outsourcing outside of the home country • Business had to locate close to their customers • Existing transport networks for people and products • Enables the organization to focus on its core activities • The amount of time it takes between ordering new stock and receiving it • ...
Activities of Information Technology Workers 2024-04-26
Across
- Responsible primarily for supporting end-user software applications
- Modifying computer systems to improve production and workflow
- Works in communicating a concept of information via a computer using audio, video, text, graphics animation, etc.
- Help desk technicians and service workers
- responsible for monitoring and controlling computer systems in a company or organization
- Electronic Information networks that carry ,audio, video and computer data.
Down
- Connecting two or more computers for communication purposes
- Maintains and operates a computer system or network for a company or other organization
- Responsible for monitoring and controlling computer systems in a company or organization
- Physical paComputerhe computer
- Writing code for computer software
- Maintains and updates a website
- Monitoring and controlling computer systems
- Involves the understanding and design of computers and computational processes
14 Clues: Physical paComputerhe computer • Maintains and updates a website • Writing code for computer software • Help desk technicians and service workers • Monitoring and controlling computer systems • Connecting two or more computers for communication purposes • Modifying computer systems to improve production and workflow • ...
Words >;} 2024-05-09
Across
- Most amount of data that can be transmitted over and internet connection and one given time.
- A way to scramble data
- A programming device that provides a service to it’s user.
- The arrangement of nodes and connections that are found in a network.
- Computers or other electronic devises working together
- The person who is responsible for administrating
Down
- The language that two devices need to understand to be able to connect.
- A workstation that can obtain information from a server
- Local Area Network
- A private networked in an enterprise
- A unique identifying number
- A point virtually where a network starts and end with it’s connection
- A device that secures a network by filtering the incoming networks
13 Clues: Local Area Network • A way to scramble data • A unique identifying number • A private networked in an enterprise • The person who is responsible for administrating • Computers or other electronic devises working together • A workstation that can obtain information from a server • A programming device that provides a service to it’s user. • ...
Computers 2023-06-19
Across
- Screen that displays images and text generated by a device
- Board with letters, numbers, and symbols for inputting information
- Part carrying out instructions and managing tasks in a device
- Technology for wireless connection to networks
- Set of programs or applications that instruct a device's operation
Down
- Physical parts of a device, like the monitor, keyboard, or processor
- Global system connecting devices for communication and information
- Visual images, designs, and animations displayed on a screen
- Device creating a paper copy of digital documents
- system Collection of programs managing a device's software and hardware
- Handheld tool controlling the cursor on a screen
- Capacity for a device to store and retrieve data
- Connector allowing devices to exchange data and power
13 Clues: Technology for wireless connection to networks • Handheld tool controlling the cursor on a screen • Capacity for a device to store and retrieve data • Device creating a paper copy of digital documents • Connector allowing devices to exchange data and power • Screen that displays images and text generated by a device • ...
Q1 Crssword 2023-04-25
Across
- ____ First - deliver problem resolution and exceed customer expectations
- Product that extends patching to protect over 350 third party apps
- Software-defined secondary storage solution
- Firm who provided an audit of the systems management appliance source code
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Company who’s slogan Where Next Meets Now?
- Information Systems Management abbreviation
Down
- Cloud ready enterprise backup software
- Practice of defending computers, networks and data from malicious attacks
- This product released Query Insights, which allows customers to gain visibility into the performance of SQL statements
- Month of the Sales Kickoff Meeting 2023
- Celebrating its 25th anniversary
- ___ Thompson, President and GM
- Abbreviation, primarily covering the erwin portfolio and Toad data point
14 Clues: ___ Thompson, President and GM • Celebrating its 25th anniversary • Cloud ready enterprise backup software • Month of the Sales Kickoff Meeting 2023 • Company who’s slogan Where Next Meets Now? • Software-defined secondary storage solution • Information Systems Management abbreviation • Product that extends patching to protect over 350 third party apps • ...
Doge Internet Words 2017-02-23
Across
- the attempt of gathering information
- the rules of etiquette that apply when communicating over computer networks, especially the Internet.
Down
- a website that can be edited by the public.
- A group of writers
- Websites that are full of opinions
- Uniform Resource Locator: a protocol for specifying addresses on the Internet.
6 Clues: A group of writers • Websites that are full of opinions • the attempt of gathering information • a website that can be edited by the public. • Uniform Resource Locator: a protocol for specifying addresses on the Internet. • the rules of etiquette that apply when communicating over computer networks, especially the Internet.
Network Security 2019-05-16
6 Clues: Networks Essential in our lives • Used to keep data secure on the network • limits how data enters and leaves the system • authentication common for more important data • most commonly used method to protect a network • examines the contents of data packets, that pass in and out
Neolithic revolution 2024-02-18
Across
- - search (a place) to obtain food.
- - the process of both growing and harvesting crops and livestock
- - Connections between people and groups
Down
- - brought under human control to provide food
- -more than what is needed or used
- - a system that organizes or ranks things, often according to power or importance
6 Clues: -more than what is needed or used • - search (a place) to obtain food. • - Connections between people and groups • - brought under human control to provide food • - the process of both growing and harvesting crops and livestock • - a system that organizes or ranks things, often according to power or importance
CIS Controls & Technicians 2024-05-14
Across
- track and manage hardware devices
- protect the organization's info through measures such as encryption and access controls
- educate users on safe-handling of information
- regularly test the security controls by simulating attacks on systems and networks
- manage the security life cycle of acquired software
Down
- only authorized to be installed and executed
- continuously acquire, assess and take action
- defense of this is to control the installation, spread and execution of malicious code
- part of inventory and control of enterprise assets
- protect the organization's info, by developing and implementing an incident response capability
- test of security controls to ensure they are effective and updated as needed
11 Clues: track and manage hardware devices • only authorized to be installed and executed • continuously acquire, assess and take action • educate users on safe-handling of information • part of inventory and control of enterprise assets • manage the security life cycle of acquired software • test of security controls to ensure they are effective and updated as needed • ...
clément 2024-10-10
Across
- Programs created to damage or interfere with a computer
- A device that connects multiple computers in a network
- A device that connects computers to the internet
- Programs that run on a computer
- A protocol that prevents loops in a network with multiple switches.
- A protocol that automatically assigns IP addresses to devices on a network.
Down
- A secret word used to access a computer.
- A communication protocol used for computer networks.
- A unique number assigned to each device on a network.
- A system that blocks unauthorized access to a network.
- A secure protocol for remote access to a computer over a network.
11 Clues: Programs that run on a computer • A secret word used to access a computer. • A device that connects computers to the internet • A communication protocol used for computer networks. • A unique number assigned to each device on a network. • A device that connects multiple computers in a network • A system that blocks unauthorized access to a network. • ...
AI Crossword 2025-07-11
Across
- Language Processing, Technique that powers ChatGPT and similar tools to provide answers to human developed question prompts
- Learning, Deep statistical technique for building neural networks
- Prejudice or skew in data or AI output
- A program that mimics human conversation
- Automated system that can perform tasks or make decisions in a tool or application
Down
- Instructions given to an AI to generate a response
- Data-based decision maker
- AI,Advanced form of AI that acts proactively and independently
- Learning, Field combining algorithms and data to enable learning from experience
- The process of teaching AI models using data
- Language Model, Enterprise models like GPT, Mistral, or Claude
11 Clues: Data-based decision maker • Prejudice or skew in data or AI output • A program that mimics human conversation • The process of teaching AI models using data • Instructions given to an AI to generate a response • AI,Advanced form of AI that acts proactively and independently • Language Model, Enterprise models like GPT, Mistral, or Claude • ...
Network Security 2019-05-16
6 Clues: Networks Essential in our lives • Used to keep data secure on the network • limits how data enters and leaves the system • authentication common for more important data • most commonly used method to protect a network • examines the contents of data packets, that pass in and out
Cybersecurity 2022-11-24
Across
- is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle
- software to defend the computer
- is a method of exchanging messages ("mail") between people using electronic devices.
- protection of computer systems and networks
Down
- data .....
- any software intentionally designed to cause disruption to a computer, server, client, or computer network
- synonym for nasty
7 Clues: data ..... • synonym for nasty • software to defend the computer • protection of computer systems and networks • is a method of exchanging messages ("mail") between people using electronic devices. • any software intentionally designed to cause disruption to a computer, server, client, or computer network • ...
Attack and Risk Vectors 2023-08-17
Across
- like pretending to be a legitimate website
- harmful software
- or holding a PC or operation station hostage
- a cybercriminal's path to breach a computer system or network
- tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
- send fake emails
- the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.
7 Clues: send fake emails • harmful software • like pretending to be a legitimate website • or holding a PC or operation station hostage • a cybercriminal's path to breach a computer system or network • tricking people into revealing sensitive information, often through deceptive emails or fake websites? • ...
Digital Troubleshooting 2020-06-01
Across
- Escalated cases need a ______ case opened for technical assistance
- A basic troubleshooting step for browsers is to clear cache and _______
- Kroger mobile apps are only supported on iOS and ______ operating systems
- A huge network of networks that connects computers all over the world
- Where we direct customers to on their PC to find system information: banner.com/______
- Where the IP address is shown on the status page
- Another name for a web address
Down
- Where to find IP Address if it doesn't show on the status page
- Required Internet browser plug-in for our website
- Where to check for current minimum requirements
10 Clues: Another name for a web address • Where to check for current minimum requirements • Where the IP address is shown on the status page • Required Internet browser plug-in for our website • Where to find IP Address if it doesn't show on the status page • Escalated cases need a ______ case opened for technical assistance • ...
Ethical Haching 2019-05-25
Across
- intending to cause harm.
- is the first phase of penetration testing.
- is a system program that controls and organises the general operations of a computer.
- a service that interprets domain names into IP addresses.
- is committing a crime with the aid of computers.
Down
- is a tactic of manipulating people to give up important information.
- an attempt to cause harm to a computer network or system.
- is the practice of protecting computer networks and systems from cyberattacks.
- a computer or other device connected to a computer network.
- is a method to identify vulnerabilities in a computer network or system.
10 Clues: intending to cause harm. • is the first phase of penetration testing. • is committing a crime with the aid of computers. • an attempt to cause harm to a computer network or system. • a service that interprets domain names into IP addresses. • a computer or other device connected to a computer network. • ...
?Wordnite? made By Christopher 2019-08-27
Across
- / Untrue informations ?
- / content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.?
- / Information published on networks in order to create a buzz.?
- / mocking another's weaknesses?
- Online is the condition of being connected to a network of computers or other devices.⌨️?
Down
- / Means, technique and support for the massive dissemination of information?
- / Content created in order to manipulate people on internet.?
- / Post an information on Twitter.?
- / Posting information on a social network.?
- / make a deliberately offensive or provocative online post with the aim of upsetting someone.?
10 Clues: / Untrue informations ? • / mocking another's weaknesses? • / Post an information on Twitter.? • / Posting information on a social network.? • / Content created in order to manipulate people on internet.? • / Information published on networks in order to create a buzz.? • / Means, technique and support for the massive dissemination of information? • ...
Circulatory system 2021-04-28
Across
- receives deoxygenated blood from the right atrium
- Receives oxygenated blood from the lungs
- blood vessels that carry deoxygenated blood from the right side of the heart
- tiny vessels that branch out from arterioles to form networks around body cells
Down
- the veins that transfer oxygenated blood from the lungs to the heart
- empties the blood into the right ventricle
- pumps the oxygen-rich blood through the aortic valve out to the rest of the body
- the largest artery in the body
- a large vein carrying deoxygenated blood into the heart
- gives oxygen into the bloodstream
10 Clues: the largest artery in the body • gives oxygen into the bloodstream • Receives oxygenated blood from the lungs • empties the blood into the right ventricle • receives deoxygenated blood from the right atrium • a large vein carrying deoxygenated blood into the heart • the veins that transfer oxygenated blood from the lungs to the heart • ...
DBMS and GIT commands 2023-03-09
Across
- A process of securely logging into a computer system or network
- A type of NoSQL database management system
- A technique used to protect computer networks and systems
- A type of application designed to run on cloud infrastructure
Down
- A security practice that involves protecting sensitive information from unauthorized access or disclosure
- A design pattern used in software development that emphasizes loose coupling between components
- A type of database management system
- A version control system commonly used in software development
- A tool used in software development to automate the building and testing of code
- Object-oriented programming paradigm
10 Clues: A type of database management system • Object-oriented programming paradigm • A type of NoSQL database management system • A technique used to protect computer networks and systems • A type of application designed to run on cloud infrastructure • A version control system commonly used in software development • ...
SECURITY AND VIRUSES 2013-05-01
Across
- software program that displays advertising on your computer
- Programming language that allows applets to run within a web browser
- is a file or program other then a virus that is potentially harmful
- Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
- program written with malicious intent and sent out by attackers
Down
- Events or attacks that remove, corrupt, deny access, allow access, or steal information
- technically a worm
- , is software designed specifically to detect, disable, and remove viruses
- Technology created by Microsoft to control interactivity on web pages
- self-replicating program that is harmful to networks
10 Clues: technically a worm • self-replicating program that is harmful to networks • software program that displays advertising on your computer • program written with malicious intent and sent out by attackers • is a file or program other then a virus that is potentially harmful • Programming language that allows applets to run within a web browser • ...
Conundra Crossword 2013-02-13
Across
- Part of a tag that provides additional information about the element.
- A named group of files.
- The register holding the instruction currently being executed.
- formal rules governing the construction of valid instructions.
- A node that handles communication between its LAN and other networks.
- A single value in a table.
Down
- A file that contains data is a specific format,requiring a special interpretation of its bits.
- Methods to shrink size of a movie
- A program that is used to arrange data in the form of grids.
- An algorithm whose Big O work expression is a constant.
10 Clues: A named group of files. • A single value in a table. • Methods to shrink size of a movie • An algorithm whose Big O work expression is a constant. • A program that is used to arrange data in the form of grids. • The register holding the instruction currently being executed. • formal rules governing the construction of valid instructions. • ...
Seth Stewart 2014-04-29
Across
- a collaborative website that allows users to create, add to, modify, or delete the content via their browser
- an informal website consisting of posts in a diary or journal format
- collection of computers and devices connected together
- Transmission of messages and files via a computer network
- Internet etiquette
Down
- collection of related webpages and associated items stored on a web server
- software that enables users to access and view internet webpages
- Worldwide collection of networks
- output device that produces text and graphics on a physical medium
- a personal computer designed to be in a stationary location
10 Clues: Internet etiquette • Worldwide collection of networks • collection of computers and devices connected together • Transmission of messages and files via a computer network • a personal computer designed to be in a stationary location • software that enables users to access and view internet webpages • output device that produces text and graphics on a physical medium • ...
crossword pr.1 2016-02-11
Across
- A set of coded instructions that a computer can understand to solve a problem or produce a desired result.
- a person who operates equipment or a machine.
- an error in a software program.
- along with the keyboard, is one of the two main input devices used by computers.
- images displayed on a computer screen.
- Whenever you enter data into your computer.
- and remove errors from (computer hardware or software).
Down
- the world's most popular search engine.
- the main circuit of your computer.
- a software that acts as a bridge between two networks so that data can be transferred.
10 Clues: an error in a software program. • the main circuit of your computer. • images displayed on a computer screen. • the world's most popular search engine. • Whenever you enter data into your computer. • a person who operates equipment or a machine. • and remove errors from (computer hardware or software). • ...
InQUIZitive 2018-04-22
Across
- A computer system initially developed to answer questions on the quiz show Jeopardy
- Method to train deep neural networks
- A provisional idea whose merit requires evaluation
- A node in neural network
Down
- Variables that me not directly observed but are rather inferred from other variables that are observed
- Square matrix of second-order partial derivatives of a scalar-valued function, or scalar field
- e^x= ∑_(n=0)^∞▒x^n/n!
- Platform for predictive modelling and analytics competitions
- Expertise Enrichment _____________
- A regression analysis method that performs both variable selection and regularization to improve model's accuracy and interpretability
10 Clues: e^x= ∑_(n=0)^∞▒x^n/n! • A node in neural network • Expertise Enrichment _____________ • Method to train deep neural networks • A provisional idea whose merit requires evaluation • Platform for predictive modelling and analytics competitions • A computer system initially developed to answer questions on the quiz show Jeopardy • ...
technology 2022-01-19
Across
- device used for observing, checking
- an output hardware device that connects to a computer to generate sound
- a panel of keys that operate a computer or typewriter
- capable of detecting and installing the software necessary for the operation of the devices
- external device that provides input and output for the computer
Down
- the programs and other operating information used by a computer
- something you don't have to use wires with
- flat control surface used to move the cursor and perform other functions on a computer
- Digital Video Disc
- standard way computers connect to wireless networks
10 Clues: Digital Video Disc • device used for observing, checking • something you don't have to use wires with • standard way computers connect to wireless networks • a panel of keys that operate a computer or typewriter • the programs and other operating information used by a computer • external device that provides input and output for the computer • ...
9 2024-01-31
Across
- Creating low-quality pages optimized for specific keywords to deceive search engines.
- Creating fake forum profiles to include links to target websites.
- Establishing interconnected networks of websites to manipulate rankings.
- Automatically generating content using algorithms without human input.
Down
- Circulating false information online with the aim of promoting a website.
- METRICS Manipulating metrics like Domain Authority or PageRank through illegitimate means.
- Registering domains similar to legitimate sites to deceive users.
- Filling meta tags with excessive keywords to manipulate search engines.
- Infecting websites with malware to gain control or redirect traffic.
- Presenting different content to search engines and users to deceive.
10 Clues: Registering domains similar to legitimate sites to deceive users. • Creating fake forum profiles to include links to target websites. • Infecting websites with malware to gain control or redirect traffic. • Presenting different content to search engines and users to deceive. • Automatically generating content using algorithms without human input. • ...
Cyber bullying 2023-10-26
Across
- , sending messages from a mobile phone
- , form of cyber bullying
- , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
- , a social media app that lets you take and upload photos for people to like, comment on and share
- , social media website beginning with F
Down
- , intentional emotional harm through devices like computers and phones
- , a wireless handheld device used for calls and messaging
- , making a statement of intention to cause harm to someone
- , an image showing what is on a phone or computer screen
- , words or actions intended to annoy, or abuse others
10 Clues: , form of cyber bullying • , sending messages from a mobile phone • , social media website beginning with F • , words or actions intended to annoy, or abuse others • , an image showing what is on a phone or computer screen • , a wireless handheld device used for calls and messaging • ...
GBH Grid Grind 2023-10-03
Across
- The ability to influence and guide others towards a goal.
- Working together towards a common goal.
- The particular style of organizational culture at GBH.
- An area that proposes creative and unique designs and proposals.
- Whatever you do should have a positive impact on others at GBH.
- Show openness and transparency; every voice is heard at GBH
- An area that offers a service related to networks.
Down
- An area that ensures every project is perfectly executed.
- Always do the right thing, even if it's harder, as one of GBH's values.
- The introduction of something new or different.
10 Clues: Working together towards a common goal. • The introduction of something new or different. • An area that offers a service related to networks. • The particular style of organizational culture at GBH. • The ability to influence and guide others towards a goal. • An area that ensures every project is perfectly executed. • ...
STEP OUT AND INNOVATE 2024-04-25
Across
- An Anti-virus program scans our disc for viruses and removes them
- A software that translates computer language into machine language.
- A web browser is a software that helps us view the web pages on the WWW.
- Wireless connection that shares the internet.
- An example of popular operating system used on desktop and laptop.
- A simple device used for performing arithmetic calculations.
Down
- It remains an essential input device for desktop computers and other computing devices.
- A category of application software that help us create and edit images.
- Send electronic messages quickly and efficiently over computer networks.
- A social humanoid robot
10 Clues: A social humanoid robot • Wireless connection that shares the internet. • A simple device used for performing arithmetic calculations. • An Anti-virus program scans our disc for viruses and removes them • An example of popular operating system used on desktop and laptop. • A software that translates computer language into machine language. • ...
Conservatism 2024-04-22
Across
- Americans (especially the democratic party) took conservatism very
- something that happens often (usually at family gatherings) AKA conservatism
- this is the emotion movement conservatives felt with the president's approach to governance
- the political party that conservatives are typically in.
- The ____ of a Conservative was made in 1960
Down
- this is what conservative activists did with networks (and institutions)
- conservative activists built this post-WW2
- ____ power, the government achieved conservative goals using ________
- the type of conservatism articulated in the 1960's
- the last name of the president who was elected by the conservatives who took over the republican party
10 Clues: conservative activists built this post-WW2 • The ____ of a Conservative was made in 1960 • the type of conservatism articulated in the 1960's • the political party that conservatives are typically in. • Americans (especially the democratic party) took conservatism very • ____ power, the government achieved conservative goals using ________ • ...
AI Word Puzzle 2025-11-24
Across
- - Neural network design behind GPT and BERT models.
- - Process of adapting a pre-trained model to a specific domain or task.
- - Converts words or data into dense numeric vectors for similarity tasks.
- - Architecture with two competing networks, often used for image generation.
- - Crafting instructions to guide LLMs toward desired responses.
Down
- - Combines retrieval of external data with generative models for better answers.
- - Field of Al focused on understanding and processing human language.
- - Breaking text into smaller units for model input.
- - Running a trained model to produce predictions or outputs.
- - A type of model with billions of parameters used for text generation.
10 Clues: - Neural network design behind GPT and BERT models. • - Breaking text into smaller units for model input. • - Running a trained model to produce predictions or outputs. • - Crafting instructions to guide LLMs toward desired responses. • - Field of Al focused on understanding and processing human language. • ...
Becoming a lifelong learner 2025-10-02
Across
- When you use good choices to solve a problem or argument
- Feelings that can impact the way you learn
- A skill that helps you stay calm, focused, and on track
- The part of your brain that reacts fast to keep you safe
Down
- What makes you special or good at something
- Feeling like you fit in or are part of a group
- Knowing and understanding your own feelings
- The part of your body that learns new things every day
- Showing kindness or understanding towards another person
- The way your brain grows when you learn something new
10 Clues: Feelings that can impact the way you learn • What makes you special or good at something • Knowing and understanding your own feelings • Feeling like you fit in or are part of a group • The way your brain grows when you learn something new • The part of your body that learns new things every day • A skill that helps you stay calm, focused, and on track • ...
CyberSecurity Crossword 2025-10-22
Across
- An online trick where someone tries to steal your personal information by pretending to be someone else.
- A strong secret word or phrase used to access accounts.
- Protecting systems, networks, and data from digital attacks.
- A hidden, harmful program disguised as something safe to download.
- The practice of using technology in a safe and responsible way.
- Messages that threaten or harass others through technology.
Down
- Traces of information left online by users.
- Software that protects a computer from viruses and malware.
- The process of scrambling information to keep it private.
- A wall of security that blocks unauthorized access to a network.
10 Clues: Traces of information left online by users. • A strong secret word or phrase used to access accounts. • The process of scrambling information to keep it private. • Software that protects a computer from viruses and malware. • Messages that threaten or harass others through technology. • Protecting systems, networks, and data from digital attacks. • ...
Networks of Exchange: the Mongols, c.1200-1450 2025-10-16
Across
- this term means miltary leader; ruler
- Location of the Kipchak Khanate
- Foreign observer; Venetian merchant; traveled through Mongol territory
- The title of the people who collected taxes for the Mongols in the Kipchak Khanate.
- A term used to describe the type of rule the Mongols employed in the Khanate of the Golden Horde.
- This group of people sometimes advised Mdynastyaders on policies (unlike many other cultures).
- Caliphate the Mongols ended in 1258.
- Capital of the Mongol dynasty in China
- the Capital of the Mongol Empire
- Warriors that fought the Mongols during the invasion of Japan, c.1281.
- A term used to define divisions by bloodlines within a community or culture
- Birth name of Chinggis Khan
- The Mongol Empire's stance or policy on religious diversity
- This principle gave legitmacy to dynastic rule in China
Down
- The dominant monothesitic religion in Russia, c. 1230.
- In the 16th century, this group of people was called "the Mongols of the seas" by some historians.
- Dynasty ruled by the Mongols in China
- Environmental factor that contributed to the demise of the Mongol world.
- system of herding and raising livestock
- Mongolian term for yurt; portable housing made of animal hides
- Mongol conquerers in this region greatly transformed; they converted to Islam and adopted bureaucratic practices.
- Respect for nature and the spirit world (belief system)
- This dynastry took power in China after the collapse of the Mongols, c. 1368.
- Environmental factor that helped end a Mongol invasion of Japan
- A term used to describe how Muslims in Persia viewed the non-monotheistic Mongol conquerors.
25 Clues: Birth name of Chinggis Khan • Location of the Kipchak Khanate • the Capital of the Mongol Empire • Caliphate the Mongols ended in 1258. • this term means miltary leader; ruler • Dynasty ruled by the Mongols in China • Capital of the Mongol dynasty in China • system of herding and raising livestock • The dominant monothesitic religion in Russia, c. 1230. • ...
COMPUTER NETWORKS UNIT-3 SET-B 2025-09-13
Across
- The type of BGP session between routers in different Autonomous Systems.
- The IPv6 field that serves the same purpose as the IPv4 TTL field.
- A type of autonomous system that only allows traffic to originate or terminate within it.
- The algorithm category for BGP.
- An IPv6 address type where a packet is delivered to the most reachable member of a group.
- The RIP timer that marks a route as unreachable after 180 seconds.
Down
- The transport protocol used by BGP on port 179.
- In IPv6, replacing consecutive sections of zeros with :: is called this.
- The unicast routing algorithm that uses the Dijkstra algorithm.
- The RIP timer that removes a route from the table after 240 seconds.
- The BGP attribute that contains the list of traversed Autonomous Systems.
- The process of summarizing multiple network prefixes into one.
12 Clues: The algorithm category for BGP. • The transport protocol used by BGP on port 179. • The process of summarizing multiple network prefixes into one. • The unicast routing algorithm that uses the Dijkstra algorithm. • The IPv6 field that serves the same purpose as the IPv4 TTL field. • The RIP timer that marks a route as unreachable after 180 seconds. • ...
Garvins Rivers 4th periode 2016-10-27
Across
- what allows you to see the stuff on the computer screen
- what modems use to communicate over the internet
- the differences in WiFi standers
- what does modem stand for
- the last step in the information processing cycle
- WiFi is
- a communication device that you can put in your pocket
- peripheral device that lets you hear through the computer directly
- the C drive is also known as
Down
- What is a series of instructions that tells the computer what to do called
- peripheral device that lets you type
- the A drive is also known as
- whats the first step in the information processing cycle
- what do computer networks connect
- what allows you to click on things on your monitor
- whats the third step in the information processing cycle
- user interface What does GUI stand for
- something computers use to communicate with each other
- whats the second step in the information processing cycle
19 Clues: WiFi is • what does modem stand for • the A drive is also known as • the C drive is also known as • the differences in WiFi standers • what do computer networks connect • peripheral device that lets you type • user interface What does GUI stand for • what modems use to communicate over the internet • the last step in the information processing cycle • ...
Geography Knowledge Crossword 2018-04-04
Across
- The world that is used for country areas like farms
- One of Mexico City's biggest challenges is dealing with this
- Measures how many children each woman has (F____)
- A kind of pollution that is common around airports
- The length of expected life
- The acronym for Gross Domestic Product
- Cities develop along ________ lines and networks
- The country with the highest mobile phone ownership.
- One of Tokyo's biggest challenges is finding s____ for people
Down
- The word used for built-up areas like cities
- This ability to read and write is a major driver of well-being
- A kind of pollution that is produced by cities at night
- The condition of not being able to meet basic needs
- A city with more than 10,000,000 people
- Cities absorb heat to create H_____ I______.
- If countries produce less children, they need this to grow
- Index that measures wellbeing and environmental impact
- Around the world birth rates are increasing\declining?
- Term for "per head" or "per person"
19 Clues: The length of expected life • Term for "per head" or "per person" • The acronym for Gross Domestic Product • A city with more than 10,000,000 people • The word used for built-up areas like cities • Cities absorb heat to create H_____ I______. • Cities develop along ________ lines and networks • Measures how many children each woman has (F____) • ...
Bison Hunting Unit 2 Lesson 2 Topic 3 2021-12-01
Across
- Father G.A. Belcourt went on bison hunt
- __________became well known throughout the North American continent because of their crops.
- Women dried the meat, stored the fat, and made _______
- hunters hunted for ___________
- wolf chief was born into a _________ family around 1850
- Hunters gathered at ___________
- a place in North Dakota is ______________
- the __________
- _________ were often proceeded by religious ceremonies such as the Sun Dance
Down
- _________hunted bison, deer, elk, and antelope
- trade networks carried corn north and west into the Missouri Valley and ____________
- ________ meant White Bison were rare or sacred
- a Hidatsa women named ____________
- _________ Lived in the woodlands east of the Great plains
- __________ Controlled the camp and had the ability to punish anyone who broke the rules
- __________ was a game that involved speed and accuracy
- ________ was eaten fresh or used in soups
- ____________ Was a very bad sickness
- __________ in hides was traded to other tribes or to Anglo Americans for other things they needed
19 Clues: the __________ • hunters hunted for ___________ • Hunters gathered at ___________ • a Hidatsa women named ____________ • ____________ Was a very bad sickness • Father G.A. Belcourt went on bison hunt • ________ was eaten fresh or used in soups • a place in North Dakota is ______________ • _________hunted bison, deer, elk, and antelope • ...
Risky Clues 2025-06-25
Across
- A voice-based scam technique
- Use a ______ password to protect your accounts
- Latest wireless security protocol for networks
- Avoid using this kind of free network in public places
- An internal framework that shapes the administration of an organisation
- Leakage Unauthorised exposure of sensitive information
- Risk Umbrella term for various threats for an organisation
- Risk Risk due to obligations or failures in external agreements
- Media Avoid these websites on official devices
Down
- A calculated step to soften the blow of what might go wrong
- Regulation that governs how personal information is stored.
- Always lock your system when you leave it
- If you find yourself in cyber threat, call me
- System or process failing to work as intended
- A type of cyberattack using fake emails
- Intentional deception for personal or financial gain
- Security Protect this sensitive information of clients
- Known exposure despite controls
- Register Structured risk documentation tool
- Controls Tools used to prevent confidential info from leaving the system
20 Clues: A voice-based scam technique • Known exposure despite controls • A type of cyberattack using fake emails • Always lock your system when you leave it • Register Structured risk documentation tool • If you find yourself in cyber threat, call me • System or process failing to work as intended • Use a ______ password to protect your accounts • ...
The Internet 2015-09-21
Across
- Standard network protocol for communication across networks
- Lead to another website/place within same document
- Where you can keep URLs that you would like to consult frequently
- Structure that handles the major traffic in a networked system
- Mainframe computers that are capable of very fast processing
- A software program
- A location on the WWW
Down
- An agreed upon format for transmitting data between two or more devices
- Every computer on the internet can be traced by this
- In the later 1980's and early 1990's, more individuals were using these
- Internet Appliance involving a portable device
- One of the most popular uses for the internet
- Companies that proved users with access to the internet, usually for a fee
- modem Connection device
14 Clues: A software program • A location on the WWW • modem Connection device • One of the most popular uses for the internet • Internet Appliance involving a portable device • Lead to another website/place within same document • Every computer on the internet can be traced by this • Standard network protocol for communication across networks • ...
Year 8 computer words 2021-03-04
Across
- plain old telephone
- authorized communications.
- Domain Name System is an Internet service that converts names to IP addresses. A common
- Internet service provider provides users with a connection to the Internet.
- a one to one connection
- picture element is the smallest part of a graphic image
Down
- are text files retained on computers by browsers containing various information in regards to a
- website visit.
- locate your residence.
- would be a system that could use either your home address or the parcel number and
- A device that routes traffic between networks
- pages per minute
- Is a part of a computer system or network that is designed to block unauthorized access while
- the ability of a computer to automatically configure when a device connects to it
14 Clues: website visit. • pages per minute • plain old telephone • locate your residence. • a one to one connection • authorized communications. • A device that routes traffic between networks • picture element is the smallest part of a graphic image • Internet service provider provides users with a connection to the Internet. • ...
Unit 4 and 5 - English for IT 2023-10-02
Across
- Someone who gets into other people's computer systems without permission
- The department in a company that makes thing
- A business deal or action such as buying or selling things
- (adj) far away
- "Human ______" is the department dealing with employment, training and
- a large amount of information stored in a computer system
- data _________ means gathering the raw data
Down
- data ______ means entering the data into the system
- the area of a website where you pay for the items
- data _______ means double-checking the data for faults or
- A way of connecting two computer networks
- The main computer of a network, which controls all the others
- (Verb)to protect information by putting it into a special code
- A system that protects a computer network
14 Clues: (adj) far away • A way of connecting two computer networks • A system that protects a computer network • data _________ means gathering the raw data • The department in a company that makes thing • the area of a website where you pay for the items • data ______ means entering the data into the system • data _______ means double-checking the data for faults or • ...
Siegel Year In Review Puzzle 2023-11-02
Across
- The abbreviation we use for public interest technology.
- We believe philanthropy is society’s __________ capital.
- We believe infrastructure is physical, digital, and _______.
- Who writes grant recommendations?
- We describe our approach as __________-driven.
- ________ M. Siegel, our Chairman.
- One of two authors we cite as inspiration for our work.
- Our research strategy is shaped by what we call the 3 “N’s,” ___________, Networks, and Insights (Hint: it doesn’t start with an “N!”).
Down
- One of our values in action.
- Our latest white paper “_______ as Community Infrastructure.”
- We recently started thinking about the intersection of art and research, what we are calling ___________ research.
- What we call our weekly posts on our websites sharing news, updates and general thoughts.
- We work at the nexus of technology and ___________.
- We have _______ interest areas.
14 Clues: One of our values in action. • We have _______ interest areas. • Who writes grant recommendations? • ________ M. Siegel, our Chairman. • We describe our approach as __________-driven. • We work at the nexus of technology and ___________. • The abbreviation we use for public interest technology. • One of two authors we cite as inspiration for our work. • ...
Siegel Year In Review Puzzle 2023-11-02
Across
- Our latest white paper “_______ as Community Infrastructure.”
- One of our values in action.
- The abbreviation we use for public interest technology.
- Our research strategy is shaped by what we call the 3 “N’s,” ___________, Networks, and Insights (Hint: it doesn’t start with an “N!”).
- We describe our approach as __________-driven.
- ________ M. Siegel, our Chairman.
- Who writes grant recommendations?
- We have _______ interest areas.
Down
- We work at the nexus of technology and ___________.
- One of two authors we cite as inspiration for our work.
- We believe infrastructure is physical, digital, and _______.
- We recently started thinking about the intersection of art and research, what we are calling ___________ research.
- What we call our weekly posts on our websites sharing news, updates and general thoughts.
- We believe philanthropy is society’s __________ capital.
14 Clues: One of our values in action. • We have _______ interest areas. • ________ M. Siegel, our Chairman. • Who writes grant recommendations? • We describe our approach as __________-driven. • We work at the nexus of technology and ___________. • One of two authors we cite as inspiration for our work. • The abbreviation we use for public interest technology. • ...
20th and 21st century 2023-05-02
Across
- First Mexican American women to be chosen for a high position in politics.
- Largest refinery in America
- Became one of MALDEF's first two women of the organizations board of directors
- exporting from other countries.
- the high school Greg Abbot graduated from
- The science of travel through air
- promised to focus on building roads,securing the border between Texas and Mexico.
Down
- Texans have been drilling holes in search of this.
- Clearing trees,knowing which crops grow best in the climate and soil.
- a way of getting from one place to another
- Manufacturing companies that people moved to the border of Mexico at the end of the 20th century
- cycle of economic positives and negatives
- worldwide system of computer networks
- USA base for telecommunications.
14 Clues: Largest refinery in America • exporting from other countries. • USA base for telecommunications. • The science of travel through air • worldwide system of computer networks • cycle of economic positives and negatives • the high school Greg Abbot graduated from • a way of getting from one place to another • Texans have been drilling holes in search of this. • ...
tech foundry crossword 2025-09-30
Across
- spreadsheets
- information intended to be kept secret or only shared with those that need to know.
- understands customer emotions
- offer more flexibility and allow out-of-network care
- a quantity of medication or drug taken or recommended to be taken at a particular time.
- feeling for the customer
Down
- cloud storage
- Treat others how you would like them to treat you
- insurance/Payer Verification site
- Contracted Payer List ID
- what is a leading pharmaceutical solutions organization centered on improving the lives of people and animals everywhere.
- Annual Enrollment Period
- provider networks and lower cost
- This is a term used to refer to Salesforce. Fusion used to be the name of Salesforce previously, but it’s since been bought out and now goes back Salesforce.
14 Clues: spreadsheets • cloud storage • Contracted Payer List ID • Annual Enrollment Period • feeling for the customer • understands customer emotions • provider networks and lower cost • insurance/Payer Verification site • Treat others how you would like them to treat you • offer more flexibility and allow out-of-network care • ...
chapter3 2012-09-05
Across
- any unsolicited or unwanted message.
- policy a document that tells how personal data will be used.
- using material created by another person and claiming it as your own.
- moral standards or values
- the selling and buying of products on the internet
- messaging allows users who ae online to key txt messages.
- one of the most exciting resources on the web
Down
- virus a destructive program.
- names urls contain these
- term often used to discribe rules for proper online behavior.
- allows users to post meesages for others to read
- is a web of computer networks that spans the earth.
- a scheme used to take money under false pretenses.
- a feature that allows you to create a list of links for sites.
- browser a program that lets you find and view web pages.
15 Clues: names urls contain these • moral standards or values • virus a destructive program. • any unsolicited or unwanted message. • one of the most exciting resources on the web • allows users to post meesages for others to read • a scheme used to take money under false pretenses. • the selling and buying of products on the internet • ...
Globalisation 2013-02-20
Across
- act or instance of integrating a racial, religious, or ethnic group
- natural body that revolves around a planet
- right or license granted by a company to an individual or group to market its products
- beyond national boundaries or interests
- investing of money or capital
- process or act of migrating
- management; frugality in the expenditure or consumption of money, materials
- particular form or stage of civilization
Down
- basic, underlying framework or features of a system or organization
- quality or state of being sovereign
- convey (cargo) in standard-sized containers
- act of globalizing, or extending to other or all parts of the world
- computer network linking smaller computer networks worldwide
- person or thing that consumes
- act or process of buying, selling, or exchanging commodities
15 Clues: process or act of migrating • investing of money or capital • person or thing that consumes • quality or state of being sovereign • beyond national boundaries or interests • particular form or stage of civilization • natural body that revolves around a planet • convey (cargo) in standard-sized containers • computer network linking smaller computer networks worldwide • ...
IT CROSSWORD 2024-06-10
Across
- _______ connects all the components of a computer.
- _______ is used for connecting peripheral devices to a computer.
- _______ established the most successful computer software company.
- ________ is a popular social networking app that allows users to share photos and videos with their friends and followers.
- What does GPT stand for in Chat GPT.
- Fidelity What does Wi-Fi stand for ?
- _______ to manage computer hardware and software resources and provide common services for computer programs.
- What is the purpose of an SSD in a computer?
Down
- What is the full form of URL.
- Who developed the first computer mouse ?
- What does GUI stand for ?
- Network What does VPN stand for ?
- Who is credited with inventing the World Wide Web?
- What does LAN stand for ?
- _______ is networking device that forwards data packets between computer networks.
15 Clues: What does GUI stand for ? • What does LAN stand for ? • What is the full form of URL. • What does GPT stand for in Chat GPT. • Who developed the first computer mouse ? • Network What does VPN stand for ? • What is the purpose of an SSD in a computer? • _______ connects all the components of a computer. • Who is credited with inventing the World Wide Web? • ...
Technická angličtina 2023-02-12
Across
- Special HW that you need to videoconference.
- It protects a company intranet from outside attacks.
- User have to enter it to gain access to a network.
- As soon as possible.
- The line that describes the content of an emai.
- A person who uses technology for criminal aims.
Down
- Small files placed on your hard drive by web servers so that they can recognize your PC when you return to their site.
- It is a person who uses their PC skill to enter computers and networks illegally.
- It is program designed to infiltrate or damage your computer.
- Technology that enables people to make phone calls over the internet.
- In my honest opinion.
- Characters used when interacting with people online.
- The name given to junk email.
- A protocol which provides secure trasactions.
- Bye for now.
15 Clues: Bye for now. • As soon as possible. • In my honest opinion. • The name given to junk email. • Special HW that you need to videoconference. • A protocol which provides secure trasactions. • The line that describes the content of an emai. • A person who uses technology for criminal aims. • User have to enter it to gain access to a network. • ...
AP Comp Sci Test 2023-05-02
Across
- security network system that monitors incoming and outgoing network traffic based on security rules
- there are 8 bits in one ____
- variable in a function definition, placeholder for values
- networking device that forwards data packets between computer networks
- common method for referencing elements in a list or string using numbers
- standard markup language for documents designed to be displayed in a web browser
- an ordered collection of elements in a program
- legal right given to an originator
- smallest unit of data
- 0s and 1s
Down
- group of functions that may be used in creating new programs
- a finite set of instructions that accomplish a task
- program that records keystrokes by a user
- rules and regulations we all agree to use
- a facility that allows computing devices to connect to the internet and send data via radio waves
15 Clues: 0s and 1s • smallest unit of data • there are 8 bits in one ____ • legal right given to an originator • program that records keystrokes by a user • rules and regulations we all agree to use • an ordered collection of elements in a program • a finite set of instructions that accomplish a task • variable in a function definition, placeholder for values • ...
crossword puzzle 2021-09-28
Across
- to be conscious of the truth while telling carefully constructed lies
- using false or misleading information to promote a certain political figure or party
- fail to resist pressure or temptation
- characteristic of middle class
- to be willing to allow the existence of other opinions or thoughts
- intense and eager enjoyment or interest
- the practice of refraining from sexual intercourse
Down
- a secret plan or plot to do something unlawful
- lacking significance and liveliness
- to be softened by age or experience
- special words or expressions used by a certain group of people that isn't understood by outsiders
- systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum
- political and economic system that destroys human spirit
- to be forced to undergo something
- discover or identify the presence of something
15 Clues: characteristic of middle class • to be forced to undergo something • lacking significance and liveliness • to be softened by age or experience • fail to resist pressure or temptation • intense and eager enjoyment or interest • a secret plan or plot to do something unlawful • discover or identify the presence of something • ...
Cyber Fraud 2024-12-09
Across
- Deceitful practices to gain illegal financial advantage.
- Pretending to be a trusted source to deceive someone.
- Illegal activities conducted using the internet or computers.
- Technique to secure data by converting it into unreadable format.
- Unauthorized access to computer systems or networks.
- Software that secretly monitors user activity.
- A unique string of characters used for account protection.
- Information that can be stolen or corrupted in a cyber attack.
- Malicious software designed to harm or exploit devices.
Down
- A type of malware disguised as legitimate software.
- A security system that monitors and controls incoming and outgoing network traffic.
- A fraudulent attempt to obtain sensitive information through email or messages.
- Theft of personal information to commit fraud.
- Fraudulent schemes designed to trick and steal money or information.
- Malware that locks your data until a payment is made.
15 Clues: Theft of personal information to commit fraud. • Software that secretly monitors user activity. • A type of malware disguised as legitimate software. • Unauthorized access to computer systems or networks. • Pretending to be a trusted source to deceive someone. • Malware that locks your data until a payment is made. • ...
Cyber security - 1 2025-07-09
Across
- Mechanisms that restrict access to systems and data.
- surface, The sum of all the points in a system that are exposed to an attacker.
- A security measure where a device is physically isolated from unsecured networks.
- A prolonged and targeted cyberattack.
- Becoming desensitized to frequent security alerts.
- Verifying the identity of a user, device, or system.
- Granting access to resources based on identity and permissions.
- Blocking known harmful software or processes.
- Ensuring that authorized users have access to information and systems when needed.
Down
- Trying many combinations to guess a password or encryption key.
- A program where organizations reward individuals for finding vulnerabilities.
- A network of infected computers controlled remotely.
- Software that detects and removes malicious software.
- Encryption using a pair of keys – one public and one private.
- An entity that issues digital certificates.
15 Clues: A prolonged and targeted cyberattack. • An entity that issues digital certificates. • Blocking known harmful software or processes. • Becoming desensitized to frequent security alerts. • Mechanisms that restrict access to systems and data. • A network of infected computers controlled remotely. • Verifying the identity of a user, device, or system. • ...
Networking concept 2025-06-11
Across
- – A program that detects and removes malicious software.
- – Someone who illegally gains access to computer systems.
- – Shared elements in a network, like printers, files, or servers.
- – A security system that monitors and controls network traffic.
- Address – A unique number that identifies a device on a network.
- System – Software that manages computer hardware and software resources.
- – A digital message sent over the internet between users.
- – A device that directs data between networks.
- – A cyber attack that tricks users into revealing sensitive information.
Down
- – Using digital platforms to harass or intimidate others.
- – Online promotion or marketing meant to attract attention or sales.
- – Unwanted or junk messages sent in bulk, usually via email.
- – The global network that connects computers and devices worldwide.
- – The physical or logical arrangement of a network.
- – Harmful software like viruses, worms, or trojans.
15 Clues: – A device that directs data between networks. • – The physical or logical arrangement of a network. • – Harmful software like viruses, worms, or trojans. • – A program that detects and removes malicious software. • – Using digital platforms to harass or intimidate others. • – Someone who illegally gains access to computer systems. • ...
Networking 2017-01-04
Across
- Join together two or more computers on a network
- Data travelling across the internet is broken up into….
- Connects a network to the Internet
- A wide area network
- A point on a network - could be a computer, printer or other connected device
- A type of cable used to connect computers to a LAN
Down
- The largest WAN – A network of networks spanning the world
- A super-fast cable used to transfer data across the planet
- Local area network
- A computer in charge of the network
- Every computer must have one of these to connect to a network - could be wireless or wired
11 Clues: Local area network • A wide area network • Connects a network to the Internet • A computer in charge of the network • Join together two or more computers on a network • A type of cable used to connect computers to a LAN • Data travelling across the internet is broken up into…. • The largest WAN – A network of networks spanning the world • ...
internet safety by Bam 2013-09-08
Across
- A person who uses computers and know how to go and destroy your website.
- place that you can connect to other people around the world
- a place that you can research stuff
- the transmission of messages over communications networks.
- is a famous social networking
Down
- about yourself
- computer connected to the internet that maintains a series of web.
- place that where you can talk to your friend
- somebody say mean thing to you on the internet
- is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes
- is a social networking that you can see the other person
11 Clues: about yourself • is a famous social networking • a place that you can research stuff • place that where you can talk to your friend • somebody say mean thing to you on the internet • is a social networking that you can see the other person • the transmission of messages over communications networks. • place that you can connect to other people around the world • ...
Tech Cross-word 2014-03-14
Across
- The smallest unit of measure for computer data.
- Minute area of illumination on a display screen, one of many from which and image is composed.
- One unit of binary data cpable of being routed.
- Eight BITs
- Central processing unit, also referred to as a CPU.
- A measurement of the smallest detail that can be distinguished by a sensor system under specific conditions.
Down
- 1024 gigabytes
- A unique string of numbers separated by periods that identifies each computer.
- Is the conversion of data into a form called ciphertext.
- High-capacity, self-contained storage device containing a read –write mechanism.
- Device that forwards data packets between computer networks.
11 Clues: Eight BITs • 1024 gigabytes • The smallest unit of measure for computer data. • One unit of binary data cpable of being routed. • Central processing unit, also referred to as a CPU. • Is the conversion of data into a form called ciphertext. • Device that forwards data packets between computer networks. • ...
Networking Concepts 2025-06-17
Across
- The entire network goes down if the hub fails.
- Net working layout to communicate with all components
- A network connects two or more computers located at distant places
- A device that connects two different types of network
- Two or more computers and peripheral device connect
- Connect computer to the internet
Down
- Provide the facility to transfer soft copies from one computer to another
- A computer network mainly created for individual person
- The networking allow the networks to be without cabling
- A device to connect all computer in a network
- In which topology, all the nodes in the network are connected in a circular manner?
11 Clues: Connect computer to the internet • A device to connect all computer in a network • The entire network goes down if the hub fails. • Two or more computers and peripheral device connect • Net working layout to communicate with all components • A device that connects two different types of network • A computer network mainly created for individual person • ...
COMPUTERS, OPERATING SIYSTEMS AND NETWORKS 2020-12-22
Across
- also called Memory Pen or Pendrive
- It is a set of applications that allow a programmer to develop their own computer programs using their logical knowledge and programming languages
- It is the software that allows us to have an interaction with our hardware, that is, the one that controls the CPU and peripherals; It is also called an operating system
- An application that has multiple programs
- it is the storage medium par excellence.
Down
- Based on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function
- These are the programs that allow us to perform specific tasks in our system
- Random Access Memory
- also known as mainboard
9 Clues: Random Access Memory • also known as mainboard • also called Memory Pen or Pendrive • it is the storage medium par excellence. • An application that has multiple programs • These are the programs that allow us to perform specific tasks in our system • Based on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function • ...
OneArt crossword 2022-09-05
5 Clues: Information stored in NFT • One of the biggest NFT project • Exchanging one crypto asset for another • Code that grants you access to your crypto wallet • Technology that enhances the interconnection between blockchain networks
Vocab 8 2012-10-29
Across
- user-written programs that enable the user to perform various tasks automatically. For instance, in Word, a macro is composed of a series of Word commands thus saving keystrokes and time
- devices device that transfers data to or from a computer.( hard disks, keyboards, and mouses) and others provide both input and output of data (hard disks, diskettes, writable CD-ROMs).
- private network that is contained within an enterprise
- software refers to multiple software applications or services that appear to run as one software package for ease-of-use.
- frame complete video frames (or images) that are inserted at consistent intervals in a video clip
- one of the image file formats supported on the World Wide Web, usually with the file suffix of “.jpg”
- tool a tool that can be used to separate obvious lines for selection, whether it be to copy the selection or delete it.
- printer popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology.
- worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer
Down
- tool Allows you to insert any picture file into a document
- Liquid-crystal display: a display of information using a liquid crystalline film used on a computer screen or a camera screen.
- messaging (IM) actually predating the Internet. IM has only recently started to garner credibility in the corporate world as a valuable productivity tool. Presence is a key driver of instant messaging. Presence technology allows users to see if the person they're trying to reach is available or not, making the value of real-time communications more potent.
- ability of a system or a product to work with other systems or products without special effort on the part of the customer
- something that will bring you to a specific web site
14 Clues: something that will bring you to a specific web site • private network that is contained within an enterprise • tool Allows you to insert any picture file into a document • frame complete video frames (or images) that are inserted at consistent intervals in a video clip • ...
assgn1 asl 2021-08-19
Across
- Cross Site Request Forgery
- ______ is a popular tool used for discovering networks as well as in security auditing.
- Compromising confidential information comes under ________
- _______________ is time based SQL injection attack.
Down
- What is simplest form of memory protection introduce in the single authentication system
- Which happens first authorization or authentication?
6 Clues: Cross Site Request Forgery • _______________ is time based SQL injection attack. • Which happens first authorization or authentication? • Compromising confidential information comes under ________ • ______ is a popular tool used for discovering networks as well as in security auditing. • ...
ICT EMPOWERMENT 2025-06-20
Across
- Posting, sharing, and liking are common actions on this ICT platform
- A device used to connect to the internet wirelessly
- Sending an electronic message
Down
- Real-time online meeting platform
- The global system of connected networks
- The use of computers and digital tools to access, create, and communicate information
6 Clues: Sending an electronic message • Real-time online meeting platform • The global system of connected networks • A device used to connect to the internet wirelessly • Posting, sharing, and liking are common actions on this ICT platform • The use of computers and digital tools to access, create, and communicate information
Hardware 2020-03-10
Across
- a standard for connecting computers and their peripherals
- converts mains AC to low-voltage regulated DC power
- a form of computer memory that can be read and changed in any order
- a place in a computer where an expansion card can be inserted
- abbreviation
- card A USB-based device that transmits and receives wireless signals.
- a unit of information equal to one billion
- known as NIC
- storage device containing a read-write mechanism plus one
Down
- a printed circuit board controlling output to a display screen
- substance for absorbing excessive or unwanted heat
- a computer networking technologies commonly used in local area networks
- Operations are controlled
- unit of information equal to one million bytes
- a circuit board containing the main components of a computer
- a device which can be slotted into a computer to allow the use of audio components
- you use it to get connection at home or and public place
- small device able to be connected to and used with a computer
- abbreviation
- measurement
20 Clues: measurement • abbreviation • abbreviation • known as NIC • Operations are controlled • a unit of information equal to one billion • unit of information equal to one million bytes • substance for absorbing excessive or unwanted heat • converts mains AC to low-voltage regulated DC power • you use it to get connection at home or and public place • ...
Chapter 9 Security Plus 2024-03-21
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Chapter 7 Security Plus 2024-03-11
Across
- Granting access that is limited
- Standard preconfigured passwords
- Single sign-on for networks owned by different organizations
- An access control scheme that is the most restrictive
- evidence or proof of something
- features and characteristics of the individual
- Removing user accounts
- Granting or denying approval to use specific resources
- The ability of systems to exchange information
Down
- Requiring the user to provide proof that they are the unique user.
- The point in time when a password is no longer valid
- allows secure web domains to exchange user authentication and authorization data
- enables users to access a network resource through a directory service
- An access control scheme that is the least restrictive
- Using more than one type of authentication credential
- Adding a random string to a hash algorithm for enhanced security
- A key pair “burned” into a security key
- small number of passwords used when trying several different user accounts
- provide control over user validation and the resources that may be accessed
- An open-source federation framework
20 Clues: Removing user accounts • evidence or proof of something • Granting access that is limited • Standard preconfigured passwords • An open-source federation framework • A key pair “burned” into a security key • features and characteristics of the individual • The ability of systems to exchange information • The point in time when a password is no longer valid • ...
CYBER ETHICS 2025-07-29
Across
- Unwanted and often harmful bulk emails. |
- Online etiquette or good manners on the internet. |
- Legal right granted to an inventor for a new invention. |
- Installing one licensed software copy on multiple devices illegally. |
- Theft Stealing someone's personal information for fraudulent use. |
- Illegally breaking into systems to steal sensitive information. |
- Illegal intrusion into a computer system or network. |
- Footprint Online data left behind from a user's digital activity. |
Down
- Using technology to harass or harm someone on purpose. |
- Piracy Copying and distributing software illegally. |
- Not morally correct or acceptable, especially in the digital world. |
- Tricking users into clicking something they didn't intend to. |
- Presenting someone else's work or ideas as your own. |
- Legal protection for original creative work. |
- Using phone calls or VoIP to steal personal information. |
- Attempting to trick someone into revealing personal info via fake emails. |
- A program that disrupts a computer's normal functioning. |
- Criminal activity involving computers, networks, or the internet. |
- Bombing Sending repeated spam to overflow someone’s inbox. |
- Law Rules and restrictions imposed on online users. |
20 Clues: Using technology to harass or harm someone on purpose. | • Unwanted and often harmful bulk emails. | • Online etiquette or good manners on the internet. | • Not morally correct or acceptable, especially in the digital world. | • ...
ICT 2017-12-13
Across
- An example of Application Software.
- Holds the programs and data being worked on.
- The S in RSI stands for?
- Smallest unit of storage
- Performs all the basic calculations and functions to make the computer work.
- An example of System Software.
- The A in EULA stands for?
- This is measured in bits per second.
- Type of software licence that must be paid for before you can use the program.
- Software that performs a specific function.
- A computer that has high performance, easy to move and uses wireless networks
Down
- The C in ICT stands for?
- Any device that is controlled by the CPU.
- An item of hardware that displays processed results.
- An example of a WAN.
- An example of an Input device.
- An example of an impact printer.
- A very expensive type of Internet connection used for people in remote areas.
- Program of instructions that tell the device what to do.
19 Clues: An example of a WAN. • The C in ICT stands for? • The S in RSI stands for? • Smallest unit of storage • The A in EULA stands for? • An example of an Input device. • An example of System Software. • An example of an impact printer. • An example of Application Software. • This is measured in bits per second. • Any device that is controlled by the CPU. • ...
Computer Words 2015-11-30
Across
- the tv-like screen where you can see the text as it enters the system
- the storage space needed to represent one letter or digit
- random access memory
- a work station consisting of a keyboard and monitor
- a blinking light on the display screen that shows where the next keystroke
- machine-printed stipes that give information such as a product ID
- an efficient system of preparing documents by computer
- the physical equipment of a computer system
- read on memory
Down
- belonging to a numbering system to the base 2
- electronic equipment that handles input/ouput information
- messages between computers
- the computer's main thinking unit
- approcimately 1,000 kilobyte
- combining a document with a list of variable
- an information storage device
- a message and data forwarding system that links computer networks all around the world
- a large collection of data on a given subject that can be consulted by multiple users
- computer programs
19 Clues: read on memory • computer programs • random access memory • messages between computers • approcimately 1,000 kilobyte • an information storage device • the computer's main thinking unit • the physical equipment of a computer system • combining a document with a list of variable • belonging to a numbering system to the base 2 • a work station consisting of a keyboard and monitor • ...
Health & Human Development 2015-02-11
Across
- general movement or pattern over time
- number of deaths of children under five
- an aspect of this would be your creativity improving
- the last stage of the human lifespan
- number of new cases
- estimate number of number of healthy years expected to live
- the sum of the years of potential life lost due to premature death and the years of productive life lost due to disability
- from conception to birth stage of life
- communication is an aspect of
- Yll + _____ = Daly
- not merely the lack of disease think physical mental social
Down
- number of women dying who are pregnant pr within 42 days birth
- growth is classified under
- number of deaths caused by disease, illness or environmental factor
- number of cases present in a population or at a given time
- number of years a person can expect to love of current mortality patterns don't change
- fine and gross motor skills are an aspect of
- body weight is an aspect of
- depression is an aspect of
- productive social networks is an aspect of
20 Clues: Yll + _____ = Daly • number of new cases • growth is classified under • depression is an aspect of • body weight is an aspect of • communication is an aspect of • the last stage of the human lifespan • general movement or pattern over time • from conception to birth stage of life • number of deaths of children under five • productive social networks is an aspect of • ...
Chapter 8 Security Plus 2024-03-20
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Network requirments 2023-08-28
Across
- The minimum allowable network connection speed
- Time it takes a packet to arrive to its destination
- In charge of routing data packets between networks
- A gadget that joins many networks
- The greatest quantity of data that may be communicated in a particular period
- A network device's unique identification
- A network architecture in which devices are linked in a circle
- Filters network traffic to provide security
- The division of a network into smaller pieces
Down
- A network with restricted access, frequently requiring a password
- The quantity of data that may be sent per second is measured
- The data transmission unit across a network
- Ensures data arrives at its destination without mistakes
- Determines the format and encoding of data for transmission
- A big geographically dispersed network
- Required for wireless communication between devices
- The entity in charge of assigning IP addresses
- The protocol that allows for file sharing over a network
- The protocol that is used to convert domain names into IP addresses
- A mechanism that ensures dependable data transmission
20 Clues: A gadget that joins many networks • A big geographically dispersed network • A network device's unique identification • The data transmission unit across a network • Filters network traffic to provide security • The division of a network into smaller pieces • The minimum allowable network connection speed • The entity in charge of assigning IP addresses • ...
ICT TERMINOLOGIES 2025-03-25
Across
- An organized collection of structured information.
- The delay before data transfer begins.
- A cyberattack method used to trick users into giving sensitive information.
- A request for data from a database.
- The core component of an operating system.
- A step-by-step procedure for solving a problem.
- The process of converting data into a secret code.
- The rules defining how code must be written in a programming language.
Down
- A small storage space for frequently accessed data.
- A programming language used to create interactive web pages.
- A group of interconnected devices for communication.
- A security system that monitors and controls network traffic.
- A device that directs internet traffic between networks.
- The maximum data transfer rate of a network.
- A unit of digital storage equal to 1024 megabytes.
- A clickable link that directs users to another webpage.
- Software with publicly available source code.
- Malicious software designed to harm a system.
- A point where two systems interact or communicate.
19 Clues: A request for data from a database. • The delay before data transfer begins. • The core component of an operating system. • The maximum data transfer rate of a network. • Software with publicly available source code. • Malicious software designed to harm a system. • A step-by-step procedure for solving a problem. • An organized collection of structured information. • ...
Computing Systems Review 2021-12-08
Across
- software embedded in hardware devices
- this type of software helps users complete specific tasks or activities
- Windows and iOS are examples of this type of software
- often referred to as the brains of the computer
- device that transfers data between networks
- computer hardware that sends info to a computer
- physical computer components that can been seen and touched
Down
- any invention including tools, machines, techniques and power sources
- when hackers listen in on WiFi signals
- a group of computers connected in order to share resources
- security software to protect your computer from hackers
- storage used to temporarily store files being used by the computer
- a set of instructions to tell a computer what to do
- converting data into unreadable code to make it more secure before sending
- .jpg is an example of this type of file
15 Clues: software embedded in hardware devices • when hackers listen in on WiFi signals • .jpg is an example of this type of file • device that transfers data between networks • often referred to as the brains of the computer • computer hardware that sends info to a computer • a set of instructions to tell a computer what to do • ...
Needs of all learners 2013-07-01
Across
- assessing students' knowledge and skills before beginning a unit of study and allowing learners to begin at their level
- collection of work used for reflection on growth over time
- the result when a student applies what they have learned
- how a student learns best
- activity where students study same concept with different levels
- adult basic education
- refers to a student's knowledge, understanding, and skill
- ways in which content is taught
Down
- students working together on one project
- breaking assignments into smaller parts
- strategic teaching to meet needs of all students
- type of learning where students are given real life problems to solve as if in the professional world
- students working on their own on topics of interest to them
- support networks for teachers
- topics that evoke curiosity and passion
15 Clues: adult basic education • how a student learns best • support networks for teachers • ways in which content is taught • breaking assignments into smaller parts • topics that evoke curiosity and passion • students working together on one project • strategic teaching to meet needs of all students • the result when a student applies what they have learned • ...
Technology Vocabulary 2021-07-28
Across
- a worldwide network of computer networks
- any smal compartmen
- transfer a file or program to a smaller computer
- a unit of measurement of information
- a listing of the computer files stored in memory
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- having an output that is proportional to the input
- locate and correct errors in a computer program code
Down
- a set of related records kept together
- a link from a hypertext file to another location or file
- a data transmission rate for modems
- the exclusive right to sell a work
- restore something reduced in volume to its full volume
- a compact disk that is used with a computer
- transfer out of a database or document
15 Clues: any smal compartmen • the exclusive right to sell a work • a data transmission rate for modems • a unit of measurement of information • a set of related records kept together • transfer out of a database or document • a worldwide network of computer networks • a compact disk that is used with a computer • transfer a file or program to a smaller computer • ...
Emergency communication and warning systems (text A) 2016-12-18
Across
- Name the primary communication network which carries Federal CD operational information.
- The National Communication System connects national and regional civil defence ...
- how many levels does the US warning system consist of?
- The emergency operators are well-trained and ...
- Which network provides emergency alert?
- Which system plays a great role in emergency response?
- Name the most widespread sounding public warning device
- These authorities are responsible for sunding public warning devices
Down
- What is often used for governmental communication?
- How many networks does the emergency communication system inslude?
- The emergecy response greatly depends on this quality of the emergency communication system
- There are more than 700 of this in the USA.
- The National Warning System is an extension of the military ... and warning systems.
- What authorities do warning points send warning information to?
- What is the simplest communication system?
15 Clues: Which network provides emergency alert? • What is the simplest communication system? • There are more than 700 of this in the USA. • The emergency operators are well-trained and ... • What is often used for governmental communication? • how many levels does the US warning system consist of? • Which system plays a great role in emergency response? • ...
Unit 4 and 5 - English for IT 2023-10-02
Across
- the area of a website where you pay for the items
- (adj) far away
- Someone who gets into other people's computer systems without permission
- The department in a company that makes thing
- "Human ______" is the department dealing with employment, training and
- A system that protects a computer network
- (Verb)to protect information by putting it into a special code
Down
- the business of selling a product or service to the public
- a large amount of information stored in a computer system
- A business deal or action such as buying or selling things
- The main computer of a network, which controls all the others
- data _______ means double-checking the data for faults or
- data ______ means entering the data into the system
- data _________ means gathering the raw data
- A way of connecting two computer networks
15 Clues: (adj) far away • A way of connecting two computer networks • A system that protects a computer network • data _________ means gathering the raw data • The department in a company that makes thing • the area of a website where you pay for the items • data ______ means entering the data into the system • a large amount of information stored in a computer system • ...
Crossword puzzle based on cyber ethics 2025-06-11
Across
- A group of interconnected computers or devices.
- Using manipulation to trick someone into revealing information.
- Software designed to harm or disrupt computer systems.
- Software designed to damage or disrupt a computer system.
- A scam that uses email to trick people into revealing sensitive information.
- Rights associated with creations of the mind, such as inventions and artistic works.
Down
- The process of converting data into a secret code.
- Harassment or intimidation conducted using electronic devices.
- A secret word or phrase used for authentication.
- A system that blocks unauthorized access to a network.
- The right to be free from unwarranted intrusion or observation.
- Protection against threats or risks.
- Criminal activity carried out using computers or networks.
- The exclusive legal right to copy, distribute, and adapt a work.
- Unauthorized access to a computer or network.
15 Clues: Protection against threats or risks. • Unauthorized access to a computer or network. • A group of interconnected computers or devices. • A secret word or phrase used for authentication. • The process of converting data into a secret code. • A system that blocks unauthorized access to a network. • Software designed to harm or disrupt computer systems. • ...
Computer languages and browsing safely 2025-06-05
Across
- act of stealing and misusing someone's personal information
- It can do addition, subtraction, multiplication, division, etc.
- an illegal entry into a computer system or network
- use of illegal methods to get money or other things that belong to a bank
- process of 'befriending' children on social media
- it is vital information resources
- It has based 2
- Act to believe the email has been sent from a trusted person or organisation
- the number system consists of 16 digits
- it means hoaxing or misleading
Down
- the number system consists of 10 digits
- it consists of 8 digits
- Collection of technologies, processes, and practices design to protect networks, computers, programs, and data
- Any criminal activity intended to harm anyone using a computer and an internet connection
- Extract confident information from users and use this information to execute fraudulent tasks online
15 Clues: It has based 2 • it consists of 8 digits • it means hoaxing or misleading • it is vital information resources • the number system consists of 10 digits • the number system consists of 16 digits • process of 'befriending' children on social media • an illegal entry into a computer system or network • act of stealing and misusing someone's personal information • ...
inglish 2025-09-19
Across
- a type of squared code you can scan
- The “NFC” professor
- You have to use it when your phone has low battery
- you use it to move a cursor on your pc
- it’s used to change your location to a different country
- Technique used to divide a network into multiple networks
- it’s used to type
- they are used to control the temperature
Down
- it’s used to copy and transform digital images into images on paper sheets
- a tiny block of memory needed for common instructions
- Language that uses markups that we used in TPSI
- name of the software we use to write java programs
- technology that can enable voice or data communication between multiple devices using radio signals at short distance
- you can use one to play music or sounds from your PC
- Temporary kind of memory
15 Clues: it’s used to type • The “NFC” professor • Temporary kind of memory • a type of squared code you can scan • you use it to move a cursor on your pc • they are used to control the temperature • Language that uses markups that we used in TPSI • You have to use it when your phone has low battery • name of the software we use to write java programs • ...
The World Wide Web from its origins 2025-11-03
Across
- Huge star systems studied in GalaxyZoo Paragraph 4
- To sort items into specific scientific groups Paragraph 4
- Something observed that needs explanation, like “winner takes all” Paragraph 6
- Type of analysis used to study Web behaviour Paragraph 6
- Motivation or reward that encourages action Paragraph 8
- review Evaluation of research by other experts Paragraph 7
- Formal written plan that introduced the Web Paragraph 1
Down
- Non-experts who help scientists online Paragraph 4
- Working together, especially among scientists Paragraph 7
- networks Online platforms used to study human connections Paragraph 5
- Website used by researchers to analyse message patterns Paragraph 5
- Original written file linking scientists’ data Paragraph 1
- Academic publications now available online Paragraph 4
- Giant machine used to smash particles at CERN Paragraph 2
- European physics lab where the Web began Paragraph 1
15 Clues: Non-experts who help scientists online Paragraph 4 • Huge star systems studied in GalaxyZoo Paragraph 4 • European physics lab where the Web began Paragraph 1 • Academic publications now available online Paragraph 4 • Motivation or reward that encourages action Paragraph 8 • Formal written plan that introduced the Web Paragraph 1 • ...
karey 2013-05-01
Across
- self-replicating program that is harmful to networks.
- software program that displays advertising on your computer.
- of death – A series of repeated, larger than normal pings that crash the receiving computer
- is unsolicited e-mail.
- process of removing sensitive data from hardware and software before recycling
- protocol suite that is used to control all of the communications on the Internet.
- attcach that prevents users from acessing normal services
- social engineering where the attacker pretends to represent a legitimate outside organization
Down
- technically a worm
- person who is able to gain access to equipment
- file or program other then a virus that is potentially harmful.
- Gains access to resources on devices by pretending to be a trusted computer
- Programming language developed to interact with HTML
- type of grayware
- malicious software programs loaded into computers inadvertently.
15 Clues: type of grayware • technically a worm • is unsolicited e-mail. • person who is able to gain access to equipment • Programming language developed to interact with HTML • self-replicating program that is harmful to networks. • attcach that prevents users from acessing normal services • software program that displays advertising on your computer. • ...
IMPERIALISM LESSON 1 REVIEW 2024-01-18
Across
- WHO SIGNED TRIETIES TO GAIN LAND AND RUBBER ALONG THE CONGO
- AFRICAN RELIGIONS INCLUDED TRADITIONAL BELEIFS, CHRISTIANITY AND WHAT RELIGION
- EUROPEAN NATIONS LOOKED FOR NEW MARKETS AND SOURCES OF WHAT?
- AFRICANS CONTROLLED THEIR OWN NETWORKS FOR WHAT?
- PEOPLE WHO WANTED THE AFRICANS TO CONVERT.
- EUROPEANS BELIEVED THAT THEY WERE BETTER THAN MANY OTHER WHAT?
- EUROPEAN COUNTRIES WERE TRYING TO MAKE WHAT?
Down
- SHIPS POWERED BY WHAT ALLOWED FOR MORE EXPLORATION
- WHAT TWO THINGS KEPT EUROPEAN OUT OF AFRICA FOR HUNDREDS OF YEARS
- WHO CARRIED THE STORIES OF LEOPOLD'S ABUSE OF THE PEOPLE IN THE CONGO
- THEY BELIEVED THEY HAD THE RIGHT TO BRING PROGRESS TO THE AREA.
- DISEASE AFRICANS WERE SUSCEPTIBLE TO
- FIRST MACHINE GUN
- DRUG THAT PROTECTED EUROPEANS FROM MALARIA
- LEOPOLD SIGNED TREATIES TO GAIN LAND ALONG WHAT RIVER/
15 Clues: FIRST MACHINE GUN • DISEASE AFRICANS WERE SUSCEPTIBLE TO • DRUG THAT PROTECTED EUROPEANS FROM MALARIA • PEOPLE WHO WANTED THE AFRICANS TO CONVERT. • EUROPEAN COUNTRIES WERE TRYING TO MAKE WHAT? • AFRICANS CONTROLLED THEIR OWN NETWORKS FOR WHAT? • SHIPS POWERED BY WHAT ALLOWED FOR MORE EXPLORATION • LEOPOLD SIGNED TREATIES TO GAIN LAND ALONG WHAT RIVER/ • ...
Isaac Kaup 2024-01-09
Across
- data about data
- a named reference to a value that can be used repeatedly throughout a program.
- a command that executes the code within a function
- scientific research conducted in whole or part by distributed individuals.
- a collection of program statements. Programs run (or “execute”) one command at a time.
- an ordered sequence of characters
- a named group of programming instructions. Also referred to as a “procedure”.
Down
- A way of representing information using ten options.
- the maximum amount of data that can be sent in a fixed amount of time.
- 8 bits
- The unique number assigned to each device
- a computer network consisting of interconnected networks
- A way of representing information using only two options.
- typically represented as a 0 or 1
- An agreed-upon set of rules that specify the behavior of some system
15 Clues: 8 bits • data about data • typically represented as a 0 or 1 • an ordered sequence of characters • The unique number assigned to each device • a command that executes the code within a function • A way of representing information using ten options. • a computer network consisting of interconnected networks • A way of representing information using only two options. • ...
Vocab Review 2022-07-24
Across
- (n) a country that has a king or a queen as the leader
- (n) a feeling that you have a link with somebody/something or are part of a group
- (prefix) connected with electronic communication networks, especially the internet
- _____rights/issues
- (n) a system of government where people of a country can vote to elect their leaders
- (n) someone who is rich and powerful
- (n) racial/social/gender______
- (n) every adult has the right to vote
- (adj) that is legally or officially acceptable
- (n) a device that can react to light, heat, pressure, etc. in order to make a machine
Down
- (adj) antonym of specific
- (n) someone who steals your information through the internet
- (n) the activities involved in protecting Sth
- (n) the environmental______of tourism
- (n) Kingdom of Talossa; Sealand; Liberlsnd are______
15 Clues: _____rights/issues • (adj) antonym of specific • (n) racial/social/gender______ • (n) the environmental______of tourism • (n) someone who is rich and powerful • (n) every adult has the right to vote • (n) the activities involved in protecting Sth • (adj) that is legally or officially acceptable • (n) Kingdom of Talossa; Sealand; Liberlsnd are______ • ...
Vocab Review 2022-07-24
Across
- (n) a country that has a king or a queen as the leader
- (n) a feeling that you have a link with somebody/something or are part of a group
- (prefix) connected with electronic communication networks, especially the internet
- _____rights/issues
- (n) a system of government where people of a country can vote to elect their leaders
- (n) someone who is rich and powerful
- (n) racial/social/gender______
- (n) every adult has the right to vote
- (adj) that is legally or officially acceptable
- (n) a device that can react to light, heat etc. in order to make a machine do sth
Down
- (adj) antonym of specific
- (n) someone who steals your information through the internet
- (n) the activities involved in protecting sth
- (n) the environmental______of tourism
- (n) Kingdom of Talossa; Sealand; Liberland are______
15 Clues: _____rights/issues • (adj) antonym of specific • (n) racial/social/gender______ • (n) the environmental______of tourism • (n) someone who is rich and powerful • (n) every adult has the right to vote • (n) the activities involved in protecting sth • (adj) that is legally or officially acceptable • (n) Kingdom of Talossa; Sealand; Liberland are______ • ...
