networks Crossword Puzzles

Internet Crossword 2015-09-22

Internet Crossword crossword puzzle
Across
  1. Companies that proved users with access to the Internet, usually for a fee
  2. The Internet from the past
  3. Structure that handles the major traffic in a networked system
  4. where you can keep URLs that you would like to consult frequently
  5. Gap between those who have Internet access and those who don’t
  6. Lead to another website/place within same document
Down
  1. Companies that proved users with access to the Internet, usually for a fee
  2. mainframe computers that are capable of very fast processing
  3. Collection of millions of hypertext documents
  4. Examples are Smartphones, Web TV, Internet Tablets
  5. Ethernet or USB cable and a DSL or cable modem
  6. Each site contains a home page and is run by an individual, company, or organization
  7. Collection of networks of computers

13 Clues: The Internet from the pastCollection of networks of computersCollection of millions of hypertext documentsEthernet or USB cable and a DSL or cable modemExamples are Smartphones, Web TV, Internet TabletsLead to another website/place within same documentmainframe computers that are capable of very fast processing...

Module 6 Terms and Commands Crossword 2021-12-02

Module 6 Terms and Commands Crossword crossword puzzle
Across
  1. the arrangement of the elements of a communication network
  2. the organization of programming into separate functional components
  3. a method of designing modular communication protocols
  4. a computer hardware component that connects a computer to a computer network(acronym)
  5. point-to-point system composed of two or more connected parties
  6. a network topology in which nodes are directly connected to a common half-duplex link
Down
  1. a device that can receive, create, store, or forward data along a communications path
  2. a communications protocol for local area networks (acronym)
  3. Implements this sublayer in hardware (acronym)
  4. each node connects to exactly two other nodes
  5. something that uniquely distinguishes a network
  6. IEEE 802.2 sublayer (acronym)

12 Clues: IEEE 802.2 sublayer (acronym)each node connects to exactly two other nodesImplements this sublayer in hardware (acronym)something that uniquely distinguishes a networka method of designing modular communication protocolsthe arrangement of the elements of a communication networka communications protocol for local area networks (acronym)...

BITS of Cisco Fun 2025-03-25

BITS of Cisco Fun crossword puzzle
Across
  1. memory in a computer that temporary stores data (3)
  2. product of cisco used for video conferencing, virtual meetings and webinars (5)
  3. state in which bits Pilani Hyderabad campus is located (9)
  4. full form of "IP" in networking (8,8)
  5. the name of the city from where "cisco" originated from (12)
  6. a common input device used to type (8)
Down
  1. cisco device used to connect networks and route traffic between them (6)
  2. bits hyderabad cultural fest (5)
  3. 2nd level of OSI model (8)
  4. fiesta del sol celebrates which type of culture (6)
  5. a network that connects devices in a limited area like an office (3)
  6. a common technology for wireless internet connectivity (4)

12 Clues: 2nd level of OSI model (8)bits hyderabad cultural fest (5)full form of "IP" in networking (8,8)a common input device used to type (8)memory in a computer that temporary stores data (3)fiesta del sol celebrates which type of culture (6)state in which bits Pilani Hyderabad campus is located (9)...

Class 6 2025-03-23

Class 6 crossword puzzle
Across
  1. The memory that temporarily holds data while a computer is on
  2. Software used to detect and remove computer viruses
  3. The main circuit board that holds the computer’s components
  4. The brain of the computer
  5. Number system with only two digits: 0 and 1, used by computers
Down
  1. A global network that connects computers around the world
  2. The main part of the computer that performs calculations and tasks
  3. A person who tries to access computers or networks without permission
  4. Memory that holds important startup instructions, cannot be changed
  5. A popular search engine used to find information on the internet
  6. A type of computer virus
  7. Number system with ten digits, from 0 to 9

12 Clues: A type of computer virusThe brain of the computerNumber system with ten digits, from 0 to 9Software used to detect and remove computer virusesA global network that connects computers around the worldThe main circuit board that holds the computer’s componentsThe memory that temporarily holds data while a computer is on...

Crossword 2025-06-05

Crossword crossword puzzle
Across
  1. - a device that connects many devices in one network.
  2. - a device that directs data between different networks.
  3. - a device that strengthens and sends signals to cover larger areas.
  4. - a list of things a business owns.
  5. - a plan of how much money can be spent.
Down
  1. - a powerful computer that provides data or services to other computers.
  2. - a simple device that sends data to all devices in a network.
  3. - a device that connects your network to the internet.
  4. - a person or group interested in a business or project.
  5. - a security system that protects a network from bad access.
  6. - a screen that shows information from a computer.
  7. - a plan or suggestion for a project or idea.

12 Clues: - a list of things a business owns.- a plan of how much money can be spent.- a plan or suggestion for a project or idea.- a screen that shows information from a computer.- a device that connects many devices in one network.- a device that connects your network to the internet.- a person or group interested in a business or project....

PST7 Modules 5-8 2023-01-20

PST7 Modules 5-8 crossword puzzle
Across
  1. Computer-Aided Dispatch
  2. We work in 24-hour time known as ___ time
  3. Proper radio demeanor and attitude requires you to speak ___
  4. Onboard ____ devices can open a voice channel and transmit information via a connection to a TCC
  5. Terminal device with display and keyboard for the deaf
  6. An emergency button activation, no voice call is like a 911 ___ ___
Down
  1. A small computer terminal that permits data transfer between response units and PSAP
  2. An ambitious plan to create a network of networks for the US
  3. unmanned aerial vehicles (UAV) are known as ___
  4. Global ___ System
  5. ___ recorder information can be used for QA/QI purposes
  6. technology that provides a mapped location of response unit vehicles

12 Clues: Global ___ SystemComputer-Aided DispatchWe work in 24-hour time known as ___ timeunmanned aerial vehicles (UAV) are known as ___Terminal device with display and keyboard for the deaf___ recorder information can be used for QA/QI purposesAn ambitious plan to create a network of networks for the US...

marketing 2025-03-02

marketing crossword puzzle
Across
  1. An audio-based medium for advertisements and promotions.
  2. Printed visuals placed in public spaces for marketing.
  3. A global sportswear brand with three stripes.
  4. Marketing strategies that do not rely on paid advertisements
  5. A small booklet used to promote products or services.
  6. A streaming platform known for original shows and movies.
Down
  1. A large outdoor advertisement placed in high-traffic areas.
  2. A symbol used to categorize content on social media
  3. Relating to online networks where people interact and share content.
  4. When a brand supports an event for advertising exposure.
  5. A platform for posting short messages and engaging with followers.
  6. The material, such as text, images, or videos, used in marketing.

12 Clues: A global sportswear brand with three stripes.A symbol used to categorize content on social mediaA small booklet used to promote products or services.Printed visuals placed in public spaces for marketing.An audio-based medium for advertisements and promotions.When a brand supports an event for advertising exposure....

Block Chain Crossword Puzzle for the Patients by Taylor Gregory BSN, RN 2024-10-31

Block Chain Crossword Puzzle for the Patients by Taylor Gregory BSN, RN crossword puzzle
Across
  1. The action of sharing information with another party.
  2. Protects patient data, computers, and networks used by healthcare providers
  3. A record of your medical history kept online
  4. Blockchain can prevent this type of medical record problem, where the same data is entered multiple times
  5. With this, healthcare organizations can directly query the block chain.
  6. protects patient information
  7. Healthcare organizations use this to confirm if data is correct on the blockchain
Down
  1. Working together as a team
  2. Focuses on the wants and needs of the patients
  3. With blockchain, patients don’t have to worry about data being __ or changed
  4. A tool being used to advance healthcare
  5. Medical test results, prescriptions, and doctor notes make up your __ record

12 Clues: Working together as a teamprotects patient informationA tool being used to advance healthcareA record of your medical history kept onlineFocuses on the wants and needs of the patientsThe action of sharing information with another party.With this, healthcare organizations can directly query the block chain....

Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity 2025-08-25

Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity crossword puzzle
Across
  1. The practice of protecting computers and networks from digital threats like hackers and viruses.
  2. Harmful software designed to damage or disrupt systems
  3. Unwanted or junk email messages
  4. Someone who breaks into computer systems, often illegally
  5. A secret string used to verify identity
  6. A scam where attackers trick you into giving up personal info via fake emails
Down
  1. Cyber Security Awareness Month is observed in ---?
  2. A type of malware disguised as a legitimate program
  3. A digital barrier that blocks unauthorized access to a network
  4. Software that detects and removes viruses and other malwares
  5. The name you use to log into a computer or website account.
  6. A copy of your data saved in case something goes wrong

12 Clues: Unwanted or junk email messagesA secret string used to verify identityCyber Security Awareness Month is observed in ---?A type of malware disguised as a legitimate programHarmful software designed to damage or disrupt systemsA copy of your data saved in case something goes wrongSomeone who breaks into computer systems, often illegally...

Recollection Protocol 2025-10-22

Recollection Protocol crossword puzzle
Across
  1. City where Mobile World Congress (MWC) was held in 2024.
  2. The network that connects computers worldwide.
  3. The digital assistant developed by Amazon.
  4. Platform used by makers for IoT projects, also a board for prototyping.
  5. Developer behind the Linux kernel.
  6. The technology company famous for its colourful letter logo and search engine.
  7. Company that introduced the first web browser with tabs.
Down
  1. The AI chatbot launched by OpenAI in late 2022.
  2. Last name of the co-founder of Google alongside Larry Page.
  3. Google’s open-source library widely used for training and building neural networks.
  4. Web development language that adds interactivity to websites.
  5. Type of computer memory that is volatile and erased when power is off.

12 Clues: Developer behind the Linux kernel.The digital assistant developed by Amazon.The network that connects computers worldwide.The AI chatbot launched by OpenAI in late 2022.City where Mobile World Congress (MWC) was held in 2024.Company that introduced the first web browser with tabs.Last name of the co-founder of Google alongside Larry Page....

Chapter 7 Vocabulary 2014-01-16

Chapter 7 Vocabulary crossword puzzle
Across
  1. When the camera shows someone talking directly at the camera.
  2. Choosing to watch media that's more towards your political ideology.
  3. They spend alot of time and money into supporting policies they want.
  4. Reporters try to reveal infomation to see what the political leaders reaction is.
  5. Different networks of the media.
  6. Media that's shown to a large group of people over the news, internet,etc.
  7. Group of newspaper companies.
  8. If the media isn't present,then the less likely this will occur.
Down
  1. Reporters express the news in their own beleifs.
  2. Policies that the media chooses to focus on.
  3. Reporters who try to uncover things political leaders may be hiding.
  4. Media that's towards a certain interest and audience.
  5. A clip of the politician's speech.

13 Clues: Group of newspaper companies.Different networks of the media.A clip of the politician's speech.Policies that the media chooses to focus on.Reporters express the news in their own beleifs.Media that's towards a certain interest and audience.When the camera shows someone talking directly at the camera....

SMART CITIES 2022-02-15

SMART CITIES crossword puzzle
Across
  1. The transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
  2. T in ciTies
  3. SMART is the ___ use of resources in an efficient & effective way
  4. a person who is among the first to explore or settle a new country or area
  5. E in citiEs
  6. C in Cities
  7. facts and statistics collected together for reference or analysis
Down
  1. 2nd I in citIes
  2. S in citieS
  3. A global network which facilitates communication and sharing of information online
  4. the protection of computer systems and networks from cyber threats
  5. 1st I in cIties
  6. Reuse discarded objects or material in such a way as to create a product of higher quality or value than the original

13 Clues: S in citieST in ciTiesE in citiEsC in Cities2nd I in citIes1st I in cItiesSMART is the ___ use of resources in an efficient & effective wayfacts and statistics collected together for reference or analysisthe protection of computer systems and networks from cyber threatsa person who is among the first to explore or settle a new country or area...

Business & Management 2020-04-13

Business & Management crossword puzzle
Across
  1. This rate can be calculated using thus equation: total output / total input x 100
  2. Outsourcing outside of the home country
  3. Is the space needed
  4. unpredictable event that threatens to harm an organization ad its stakeholders
  5. This rate can be calculated using this equation: actual output / productive capacity x 100
  6. Cost to buy P*Q
  7. Enables the organization to focus on its core activities
  8. Business had to locate close to their customers
Down
  1. This needs to have a good availability of a range f good, reliable local
  2. Cost to made FC (VC*Q)
  3. Existing transport networks for people and products
  4. Wide system of connected organizations, information, resources and operations
  5. The amount of time it takes between ordering new stock and receiving it

13 Clues: Cost to buy P*QIs the space neededCost to made FC (VC*Q)Outsourcing outside of the home countryBusiness had to locate close to their customersExisting transport networks for people and productsEnables the organization to focus on its core activitiesThe amount of time it takes between ordering new stock and receiving it...

Activities of Information Technology Workers 2024-04-26

Activities of Information Technology Workers crossword puzzle
Across
  1. Responsible primarily for supporting end-user software applications
  2. Modifying computer systems to improve production and workflow
  3. Works in communicating a concept of information via a computer using audio, video, text, graphics animation, etc.
  4. Help desk technicians and service workers
  5. responsible for monitoring and controlling computer systems in a company or organization
  6. Electronic Information networks that carry ,audio, video and computer data.
Down
  1. Connecting two or more computers for communication purposes
  2. Maintains and operates a computer system or network for a company or other organization
  3. Responsible for monitoring and controlling computer systems in a company or organization
  4. Physical paComputerhe computer
  5. Writing code for computer software
  6. Maintains and updates a website
  7. Monitoring and controlling computer systems
  8. Involves the understanding and design of computers and computational processes

14 Clues: Physical paComputerhe computerMaintains and updates a websiteWriting code for computer softwareHelp desk technicians and service workersMonitoring and controlling computer systemsConnecting two or more computers for communication purposesModifying computer systems to improve production and workflow...

Words >;} 2024-05-09

Words >;} crossword puzzle
Across
  1. Most amount of data that can be transmitted over and internet connection and one given time.
  2. A way to scramble data
  3. A programming device that provides a service to it’s user.
  4. The arrangement of nodes and connections that are found in a network.
  5. Computers or other electronic devises working together
  6. The person who is responsible for administrating
Down
  1. The language that two devices need to understand to be able to connect.
  2. A workstation that can obtain information from a server
  3. Local Area Network
  4. A private networked in an enterprise
  5. A unique identifying number
  6. A point virtually where a network starts and end with it’s connection
  7. A device that secures a network by filtering the incoming networks

13 Clues: Local Area NetworkA way to scramble dataA unique identifying numberA private networked in an enterpriseThe person who is responsible for administratingComputers or other electronic devises working togetherA workstation that can obtain information from a serverA programming device that provides a service to it’s user....

Computers 2023-06-19

Computers crossword puzzle
Across
  1. Screen that displays images and text generated by a device
  2. Board with letters, numbers, and symbols for inputting information
  3. Part carrying out instructions and managing tasks in a device
  4. Technology for wireless connection to networks
  5. Set of programs or applications that instruct a device's operation
Down
  1. Physical parts of a device, like the monitor, keyboard, or processor
  2. Global system connecting devices for communication and information
  3. Visual images, designs, and animations displayed on a screen
  4. Device creating a paper copy of digital documents
  5. system Collection of programs managing a device's software and hardware
  6. Handheld tool controlling the cursor on a screen
  7. Capacity for a device to store and retrieve data
  8. Connector allowing devices to exchange data and power

13 Clues: Technology for wireless connection to networksHandheld tool controlling the cursor on a screenCapacity for a device to store and retrieve dataDevice creating a paper copy of digital documentsConnector allowing devices to exchange data and powerScreen that displays images and text generated by a device...

Q1 Crssword 2023-04-25

Q1 Crssword crossword puzzle
Across
  1. ____ First - deliver problem resolution and exceed customer expectations
  2. Product that extends patching to protect over 350 third party apps
  3. Software-defined secondary storage solution
  4. Firm who provided an audit of the systems management appliance source code
  5. A type of malicious software designed to block access to a computer system until a sum of money is paid
  6. Company who’s slogan Where Next Meets Now?
  7. Information Systems Management abbreviation
Down
  1. Cloud ready enterprise backup software
  2. Practice of defending computers, networks and data from malicious attacks
  3. This product released Query Insights, which allows customers to gain visibility into the performance of SQL statements
  4. Month of the Sales Kickoff Meeting 2023
  5. Celebrating its 25th anniversary
  6. ___ Thompson, President and GM
  7. Abbreviation, primarily covering the erwin portfolio and Toad data point

14 Clues: ___ Thompson, President and GMCelebrating its 25th anniversaryCloud ready enterprise backup softwareMonth of the Sales Kickoff Meeting 2023Company who’s slogan Where Next Meets Now?Software-defined secondary storage solutionInformation Systems Management abbreviationProduct that extends patching to protect over 350 third party apps...

Doge Internet Words 2017-02-23

Doge Internet Words crossword puzzle
Across
  1. the attempt of gathering information
  2. the rules of etiquette that apply when communicating over computer networks, especially the Internet.
Down
  1. a website that can be edited by the public.
  2. A group of writers
  3. Websites that are full of opinions
  4. Uniform Resource Locator: a protocol for specifying addresses on the Internet.

6 Clues: A group of writersWebsites that are full of opinionsthe attempt of gathering informationa website that can be edited by the public.Uniform Resource Locator: a protocol for specifying addresses on the Internet.the rules of etiquette that apply when communicating over computer networks, especially the Internet.

Network Security 2019-05-16

Network Security crossword puzzle
Across
  1. Used to keep data secure on the network
  2. most commonly used method to protect a network
  3. limits how data enters and leaves the system
Down
  1. authentication common for more important data
  2. examines the contents of data packets, that pass in and out
  3. Networks Essential in our lives

6 Clues: Networks Essential in our livesUsed to keep data secure on the networklimits how data enters and leaves the systemauthentication common for more important datamost commonly used method to protect a networkexamines the contents of data packets, that pass in and out

Neolithic revolution 2024-02-18

Neolithic revolution crossword puzzle
Across
  1. - search (a place) to obtain food.
  2. - the process of both growing and harvesting crops and livestock
  3. - Connections between people and groups
Down
  1. - brought under human control to provide food
  2. -more than what is needed or used
  3. - a system that organizes or ranks things, often according to power or importance

6 Clues: -more than what is needed or used- search (a place) to obtain food.- Connections between people and groups- brought under human control to provide food- the process of both growing and harvesting crops and livestock- a system that organizes or ranks things, often according to power or importance

CIS Controls & Technicians 2024-05-14

CIS Controls & Technicians crossword puzzle
Across
  1. track and manage hardware devices
  2. protect the organization's info through measures such as encryption and access controls
  3. educate users on safe-handling of information
  4. regularly test the security controls by simulating attacks on systems and networks
  5. manage the security life cycle of acquired software
Down
  1. only authorized to be installed and executed
  2. continuously acquire, assess and take action
  3. defense of this is to control the installation, spread and execution of malicious code
  4. part of inventory and control of enterprise assets
  5. protect the organization's info, by developing and implementing an incident response capability
  6. test of security controls to ensure they are effective and updated as needed

11 Clues: track and manage hardware devicesonly authorized to be installed and executedcontinuously acquire, assess and take actioneducate users on safe-handling of informationpart of inventory and control of enterprise assetsmanage the security life cycle of acquired softwaretest of security controls to ensure they are effective and updated as needed...

clément 2024-10-10

clément crossword puzzle
Across
  1. Programs created to damage or interfere with a computer
  2. A device that connects multiple computers in a network
  3. A device that connects computers to the internet
  4. Programs that run on a computer
  5. A protocol that prevents loops in a network with multiple switches.
  6. A protocol that automatically assigns IP addresses to devices on a network.
Down
  1. A secret word used to access a computer.
  2. A communication protocol used for computer networks.
  3. A unique number assigned to each device on a network.
  4. A system that blocks unauthorized access to a network.
  5. A secure protocol for remote access to a computer over a network.

11 Clues: Programs that run on a computerA secret word used to access a computer.A device that connects computers to the internetA communication protocol used for computer networks.A unique number assigned to each device on a network.A device that connects multiple computers in a networkA system that blocks unauthorized access to a network....

AI Crossword 2025-07-11

AI Crossword crossword puzzle
Across
  1. Language Processing, Technique that powers ChatGPT and similar tools to provide answers to human developed question prompts
  2. Learning, Deep statistical technique for building neural networks
  3. Prejudice or skew in data or AI output
  4. A program that mimics human conversation
  5. Automated system that can perform tasks or make decisions in a tool or application
Down
  1. Instructions given to an AI to generate a response
  2. Data-based decision maker
  3. AI,Advanced form of AI that acts proactively and independently
  4. Learning, Field combining algorithms and data to enable learning from experience
  5. The process of teaching AI models using data
  6. Language Model, Enterprise models like GPT, Mistral, or Claude

11 Clues: Data-based decision makerPrejudice or skew in data or AI outputA program that mimics human conversationThe process of teaching AI models using dataInstructions given to an AI to generate a responseAI,Advanced form of AI that acts proactively and independentlyLanguage Model, Enterprise models like GPT, Mistral, or Claude...

Network Security 2019-05-16

Network Security crossword puzzle
Across
  1. examines the contents of data packets, that pass in and out
  2. Networks Essential in our lives
Down
  1. limits how data enters and leaves the system
  2. most commonly used method to protect a network
  3. authentication common for more important data
  4. Used to keep data secure on the network

6 Clues: Networks Essential in our livesUsed to keep data secure on the networklimits how data enters and leaves the systemauthentication common for more important datamost commonly used method to protect a networkexamines the contents of data packets, that pass in and out

Cybersecurity 2022-11-24

Cybersecurity crossword puzzle
Across
  1. is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle
  2. software to defend the computer
  3. is a method of exchanging messages ("mail") between people using electronic devices.
  4. protection of computer systems and networks
Down
  1. data .....
  2. any software intentionally designed to cause disruption to a computer, server, client, or computer network
  3. synonym for nasty

7 Clues: data .....synonym for nastysoftware to defend the computerprotection of computer systems and networksis a method of exchanging messages ("mail") between people using electronic devices.any software intentionally designed to cause disruption to a computer, server, client, or computer network...

Attack and Risk Vectors 2023-08-17

Attack and Risk Vectors crossword puzzle
Across
  1. like pretending to be a legitimate website
  2. harmful software
  3. or holding a PC or operation station hostage
  4. a cybercriminal's path to breach a computer system or network
  5. tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
  1. send fake emails
  2. the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.

7 Clues: send fake emailsharmful softwarelike pretending to be a legitimate websiteor holding a PC or operation station hostagea cybercriminal's path to breach a computer system or networktricking people into revealing sensitive information, often through deceptive emails or fake websites?...

Digital Troubleshooting 2020-06-01

Digital Troubleshooting crossword puzzle
Across
  1. Escalated cases need a ______ case opened for technical assistance
  2. A basic troubleshooting step for browsers is to clear cache and _______
  3. Kroger mobile apps are only supported on iOS and ______ operating systems
  4. A huge network of networks that connects computers all over the world
  5. Where we direct customers to on their PC to find system information: banner.com/______
  6. Where the IP address is shown on the status page
  7. Another name for a web address
Down
  1. Where to find IP Address if it doesn't show on the status page
  2. Required Internet browser plug-in for our website
  3. Where to check for current minimum requirements

10 Clues: Another name for a web addressWhere to check for current minimum requirementsWhere the IP address is shown on the status pageRequired Internet browser plug-in for our websiteWhere to find IP Address if it doesn't show on the status pageEscalated cases need a ______ case opened for technical assistance...

Ethical Haching 2019-05-25

Ethical Haching crossword puzzle
Across
  1. intending to cause harm.
  2. is the first phase of penetration testing.
  3. is a system program that controls and organises the general operations of a computer.
  4. a service that interprets domain names into IP addresses.
  5. is committing a crime with the aid of computers.
Down
  1. is a tactic of manipulating people to give up important information.
  2. an attempt to cause harm to a computer network or system.
  3. is the practice of protecting computer networks and systems from cyberattacks.
  4. a computer or other device connected to a computer network.
  5. is a method to identify vulnerabilities in a computer network or system.

10 Clues: intending to cause harm.is the first phase of penetration testing.is committing a crime with the aid of computers.an attempt to cause harm to a computer network or system.a service that interprets domain names into IP addresses.a computer or other device connected to a computer network....

?Wordnite? made By Christopher 2019-08-27

?Wordnite? made By Christopher crossword puzzle
Across
  1. / Untrue informations ?
  2. / content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.?
  3. / Information published on networks in order to create a buzz.?
  4. / mocking another's weaknesses?
  5. Online is the condition of being connected to a network of computers or other devices.⌨️?
Down
  1. / Means, technique and support for the massive dissemination of information?
  2. / Content created in order to manipulate people on internet.?
  3. / Post an information on Twitter.?
  4. / Posting information on a social network.?
  5. / make a deliberately offensive or provocative online post with the aim of upsetting someone.?

10 Clues: / Untrue informations ?/ mocking another's weaknesses?/ Post an information on Twitter.?/ Posting information on a social network.?/ Content created in order to manipulate people on internet.?/ Information published on networks in order to create a buzz.?/ Means, technique and support for the massive dissemination of information?...

Circulatory system 2021-04-28

Circulatory system crossword puzzle
Across
  1. receives deoxygenated blood from the right atrium
  2. Receives oxygenated blood from the lungs
  3. blood vessels that carry deoxygenated blood from the right side of the heart
  4. tiny vessels that branch out from arterioles to form networks around body cells
Down
  1. the veins that transfer oxygenated blood from the lungs to the heart
  2. empties the blood into the right ventricle
  3. pumps the oxygen-rich blood through the aortic valve out to the rest of the body
  4. the largest artery in the body
  5. a large vein carrying deoxygenated blood into the heart
  6. gives oxygen into the bloodstream

10 Clues: the largest artery in the bodygives oxygen into the bloodstreamReceives oxygenated blood from the lungsempties the blood into the right ventriclereceives deoxygenated blood from the right atriuma large vein carrying deoxygenated blood into the heartthe veins that transfer oxygenated blood from the lungs to the heart...

DBMS and GIT commands 2023-03-09

DBMS and GIT commands crossword puzzle
Across
  1. A process of securely logging into a computer system or network
  2. A type of NoSQL database management system
  3. A technique used to protect computer networks and systems
  4. A type of application designed to run on cloud infrastructure
Down
  1. A security practice that involves protecting sensitive information from unauthorized access or disclosure
  2. A design pattern used in software development that emphasizes loose coupling between components
  3. A type of database management system
  4. A version control system commonly used in software development
  5. A tool used in software development to automate the building and testing of code
  6. Object-oriented programming paradigm

10 Clues: A type of database management systemObject-oriented programming paradigmA type of NoSQL database management systemA technique used to protect computer networks and systemsA type of application designed to run on cloud infrastructureA version control system commonly used in software development...

SECURITY AND VIRUSES 2013-05-01

SECURITY AND VIRUSES crossword puzzle
Across
  1. software program that displays advertising on your computer
  2. Programming language that allows applets to run within a web browser
  3. is a file or program other then a virus that is potentially harmful
  4. Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
  5. program written with malicious intent and sent out by attackers
Down
  1. Events or attacks that remove, corrupt, deny access, allow access, or steal information
  2. technically a worm
  3. , is software designed specifically to detect, disable, and remove viruses
  4. Technology created by Microsoft to control interactivity on web pages
  5. self-replicating program that is harmful to networks

10 Clues: technically a wormself-replicating program that is harmful to networkssoftware program that displays advertising on your computerprogram written with malicious intent and sent out by attackersis a file or program other then a virus that is potentially harmfulProgramming language that allows applets to run within a web browser...

Conundra Crossword 2013-02-13

Conundra Crossword crossword puzzle
Across
  1. Part of a tag that provides additional information about the element.
  2. A named group of files.
  3. The register holding the instruction currently being executed.
  4. formal rules governing the construction of valid instructions.
  5. A node that handles communication between its LAN and other networks.
  6. A single value in a table.
Down
  1. A file that contains data is a specific format,requiring a special interpretation of its bits.
  2. Methods to shrink size of a movie
  3. A program that is used to arrange data in the form of grids.
  4. An algorithm whose Big O work expression is a constant.

10 Clues: A named group of files.A single value in a table.Methods to shrink size of a movieAn algorithm whose Big O work expression is a constant.A program that is used to arrange data in the form of grids.The register holding the instruction currently being executed.formal rules governing the construction of valid instructions....

Seth Stewart 2014-04-29

Seth Stewart crossword puzzle
Across
  1. a collaborative website that allows users to create, add to, modify, or delete the content via their browser
  2. an informal website consisting of posts in a diary or journal format
  3. collection of computers and devices connected together
  4. Transmission of messages and files via a computer network
  5. Internet etiquette
Down
  1. collection of related webpages and associated items stored on a web server
  2. software that enables users to access and view internet webpages
  3. Worldwide collection of networks
  4. output device that produces text and graphics on a physical medium
  5. a personal computer designed to be in a stationary location

10 Clues: Internet etiquetteWorldwide collection of networkscollection of computers and devices connected togetherTransmission of messages and files via a computer networka personal computer designed to be in a stationary locationsoftware that enables users to access and view internet webpagesoutput device that produces text and graphics on a physical medium...

crossword pr.1 2016-02-11

crossword pr.1 crossword puzzle
Across
  1. A set of coded instructions that a computer can understand to solve a problem or produce a desired result.
  2. a person who operates equipment or a machine.
  3. an error in a software program.
  4. along with the keyboard, is one of the two main input devices used by computers.
  5. images displayed on a computer screen.
  6. Whenever you enter data into your computer.
  7. and remove errors from (computer hardware or software).
Down
  1. the world's most popular search engine.
  2. the main circuit of your computer.
  3. a software that acts as a bridge between two networks so that data can be transferred.

10 Clues: an error in a software program.the main circuit of your computer.images displayed on a computer screen.the world's most popular search engine.Whenever you enter data into your computer.a person who operates equipment or a machine.and remove errors from (computer hardware or software)....

InQUIZitive 2018-04-22

InQUIZitive crossword puzzle
Across
  1. A computer system initially developed to answer questions on the quiz show Jeopardy
  2. Method to train deep neural networks
  3. A provisional idea whose merit requires evaluation
  4. A node in neural network
Down
  1. Variables that me not directly observed but are rather inferred from other variables that are observed
  2. Square matrix of second-order partial derivatives of a scalar-valued function, or scalar field
  3. e^x= ∑_(n=0)^∞▒x^n/n!
  4. Platform for predictive modelling and analytics competitions
  5. Expertise Enrichment _____________
  6. A regression analysis method that performs both variable selection and regularization to improve model's accuracy and interpretability

10 Clues: e^x= ∑_(n=0)^∞▒x^n/n!A node in neural networkExpertise Enrichment _____________Method to train deep neural networksA provisional idea whose merit requires evaluationPlatform for predictive modelling and analytics competitionsA computer system initially developed to answer questions on the quiz show Jeopardy...

technology 2022-01-19

technology crossword puzzle
Across
  1. device used for observing, checking
  2. an output hardware device that connects to a computer to generate sound
  3. a panel of keys that operate a computer or typewriter
  4. capable of detecting and installing the software necessary for the operation of the devices
  5. external device that provides input and output for the computer
Down
  1. the programs and other operating information used by a computer
  2. something you don't have to use wires with
  3. flat control surface used to move the cursor and perform other functions on a computer
  4. Digital Video Disc
  5. standard way computers connect to wireless networks

10 Clues: Digital Video Discdevice used for observing, checkingsomething you don't have to use wires withstandard way computers connect to wireless networksa panel of keys that operate a computer or typewriterthe programs and other operating information used by a computerexternal device that provides input and output for the computer...

9 2024-01-31

9 crossword puzzle
Across
  1. Creating low-quality pages optimized for specific keywords to deceive search engines.
  2. Creating fake forum profiles to include links to target websites.
  3. Establishing interconnected networks of websites to manipulate rankings.
  4. Automatically generating content using algorithms without human input.
Down
  1. Circulating false information online with the aim of promoting a website.
  2. METRICS Manipulating metrics like Domain Authority or PageRank through illegitimate means.
  3. Registering domains similar to legitimate sites to deceive users.
  4. Filling meta tags with excessive keywords to manipulate search engines.
  5. Infecting websites with malware to gain control or redirect traffic.
  6. Presenting different content to search engines and users to deceive.

10 Clues: Registering domains similar to legitimate sites to deceive users.Creating fake forum profiles to include links to target websites.Infecting websites with malware to gain control or redirect traffic.Presenting different content to search engines and users to deceive.Automatically generating content using algorithms without human input....

Cyber bullying 2023-10-26

Cyber bullying crossword puzzle
Across
  1. , sending messages from a mobile phone
  2. , form of cyber bullying
  3. , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
  4. , a social media app that lets you take and upload photos for people to like, comment on and share
  5. , social media website beginning with F
Down
  1. , intentional emotional harm through devices like computers and phones
  2. , a wireless handheld device used for calls and messaging
  3. , making a statement of intention to cause harm to someone
  4. , an image showing what is on a phone or computer screen
  5. , words or actions intended to annoy, or abuse others

10 Clues: , form of cyber bullying, sending messages from a mobile phone, social media website beginning with F, words or actions intended to annoy, or abuse others, an image showing what is on a phone or computer screen, a wireless handheld device used for calls and messaging...

GBH Grid Grind 2023-10-03

GBH Grid Grind crossword puzzle
Across
  1. The ability to influence and guide others towards a goal.
  2. Working together towards a common goal.
  3. The particular style of organizational culture at GBH.
  4. An area that proposes creative and unique designs and proposals.
  5. Whatever you do should have a positive impact on others at GBH.
  6. Show openness and transparency; every voice is heard at GBH
  7. An area that offers a service related to networks.
Down
  1. An area that ensures every project is perfectly executed.
  2. Always do the right thing, even if it's harder, as one of GBH's values.
  3. The introduction of something new or different.

10 Clues: Working together towards a common goal.The introduction of something new or different.An area that offers a service related to networks.The particular style of organizational culture at GBH.The ability to influence and guide others towards a goal.An area that ensures every project is perfectly executed....

STEP OUT AND INNOVATE 2024-04-25

STEP OUT AND INNOVATE crossword puzzle
Across
  1. An Anti-virus program scans our disc for viruses and removes them
  2. A software that translates computer language into machine language.
  3. A web browser is a software that helps us view the web pages on the WWW.
  4. Wireless connection that shares the internet.
  5. An example of popular operating system used on desktop and laptop.
  6. A simple device used for performing arithmetic calculations.
Down
  1. It remains an essential input device for desktop computers and other computing devices.
  2. A category of application software that help us create and edit images.
  3. Send electronic messages quickly and efficiently over computer networks.
  4. A social humanoid robot

10 Clues: A social humanoid robotWireless connection that shares the internet.A simple device used for performing arithmetic calculations.An Anti-virus program scans our disc for viruses and removes themAn example of popular operating system used on desktop and laptop.A software that translates computer language into machine language....

Conservatism 2024-04-22

Conservatism crossword puzzle
Across
  1. Americans (especially the democratic party) took conservatism very
  2. something that happens often (usually at family gatherings) AKA conservatism
  3. this is the emotion movement conservatives felt with the president's approach to governance
  4. the political party that conservatives are typically in.
  5. The ____ of a Conservative was made in 1960
Down
  1. this is what conservative activists did with networks (and institutions)
  2. conservative activists built this post-WW2
  3. ____ power, the government achieved conservative goals using ________
  4. the type of conservatism articulated in the 1960's
  5. the last name of the president who was elected by the conservatives who took over the republican party

10 Clues: conservative activists built this post-WW2The ____ of a Conservative was made in 1960the type of conservatism articulated in the 1960'sthe political party that conservatives are typically in.Americans (especially the democratic party) took conservatism very____ power, the government achieved conservative goals using ________...

AI Word Puzzle 2025-11-24

AI Word Puzzle crossword puzzle
Across
  1. - Neural network design behind GPT and BERT models.
  2. - Process of adapting a pre-trained model to a specific domain or task.
  3. - Converts words or data into dense numeric vectors for similarity tasks.
  4. - Architecture with two competing networks, often used for image generation.
  5. - Crafting instructions to guide LLMs toward desired responses.
Down
  1. - Combines retrieval of external data with generative models for better answers.
  2. - Field of Al focused on understanding and processing human language.
  3. - Breaking text into smaller units for model input.
  4. - Running a trained model to produce predictions or outputs.
  5. - A type of model with billions of parameters used for text generation.

10 Clues: - Neural network design behind GPT and BERT models.- Breaking text into smaller units for model input.- Running a trained model to produce predictions or outputs.- Crafting instructions to guide LLMs toward desired responses.- Field of Al focused on understanding and processing human language....

Becoming a lifelong learner 2025-10-02

Becoming a lifelong learner crossword puzzle
Across
  1. When you use good choices to solve a problem or argument
  2. Feelings that can impact the way you learn
  3. A skill that helps you stay calm, focused, and on track
  4. The part of your brain that reacts fast to keep you safe
Down
  1. What makes you special or good at something
  2. Feeling like you fit in or are part of a group
  3. Knowing and understanding your own feelings
  4. The part of your body that learns new things every day
  5. Showing kindness or understanding towards another person
  6. The way your brain grows when you learn something new

10 Clues: Feelings that can impact the way you learnWhat makes you special or good at somethingKnowing and understanding your own feelingsFeeling like you fit in or are part of a groupThe way your brain grows when you learn something newThe part of your body that learns new things every dayA skill that helps you stay calm, focused, and on track...

CyberSecurity Crossword 2025-10-22

CyberSecurity Crossword crossword puzzle
Across
  1. An online trick where someone tries to steal your personal information by pretending to be someone else.
  2. A strong secret word or phrase used to access accounts.
  3. Protecting systems, networks, and data from digital attacks.
  4. A hidden, harmful program disguised as something safe to download.
  5. The practice of using technology in a safe and responsible way.
  6. Messages that threaten or harass others through technology.
Down
  1. Traces of information left online by users.
  2. Software that protects a computer from viruses and malware.
  3. The process of scrambling information to keep it private.
  4. A wall of security that blocks unauthorized access to a network.

10 Clues: Traces of information left online by users.A strong secret word or phrase used to access accounts.The process of scrambling information to keep it private.Software that protects a computer from viruses and malware.Messages that threaten or harass others through technology.Protecting systems, networks, and data from digital attacks....

Networks of Exchange: the Mongols, c.1200-1450 2025-10-16

Networks of Exchange: the Mongols, c.1200-1450 crossword puzzle
Across
  1. this term means miltary leader; ruler
  2. Location of the Kipchak Khanate
  3. Foreign observer; Venetian merchant; traveled through Mongol territory
  4. The title of the people who collected taxes for the Mongols in the Kipchak Khanate.
  5. A term used to describe the type of rule the Mongols employed in the Khanate of the Golden Horde.
  6. This group of people sometimes advised Mdynastyaders on policies (unlike many other cultures).
  7. Caliphate the Mongols ended in 1258.
  8. Capital of the Mongol dynasty in China
  9. the Capital of the Mongol Empire
  10. Warriors that fought the Mongols during the invasion of Japan, c.1281.
  11. A term used to define divisions by bloodlines within a community or culture
  12. Birth name of Chinggis Khan
  13. The Mongol Empire's stance or policy on religious diversity
  14. This principle gave legitmacy to dynastic rule in China
Down
  1. The dominant monothesitic religion in Russia, c. 1230.
  2. In the 16th century, this group of people was called "the Mongols of the seas" by some historians.
  3. Dynasty ruled by the Mongols in China
  4. Environmental factor that contributed to the demise of the Mongol world.
  5. system of herding and raising livestock
  6. Mongolian term for yurt; portable housing made of animal hides
  7. Mongol conquerers in this region greatly transformed; they converted to Islam and adopted bureaucratic practices.
  8. Respect for nature and the spirit world (belief system)
  9. This dynastry took power in China after the collapse of the Mongols, c. 1368.
  10. Environmental factor that helped end a Mongol invasion of Japan
  11. A term used to describe how Muslims in Persia viewed the non-monotheistic Mongol conquerors.

25 Clues: Birth name of Chinggis KhanLocation of the Kipchak Khanatethe Capital of the Mongol EmpireCaliphate the Mongols ended in 1258.this term means miltary leader; rulerDynasty ruled by the Mongols in ChinaCapital of the Mongol dynasty in Chinasystem of herding and raising livestockThe dominant monothesitic religion in Russia, c. 1230....

COMPUTER NETWORKS UNIT-3 SET-B 2025-09-13

COMPUTER NETWORKS UNIT-3 SET-B crossword puzzle
Across
  1. The type of BGP session between routers in different Autonomous Systems.
  2. The IPv6 field that serves the same purpose as the IPv4 TTL field.
  3. A type of autonomous system that only allows traffic to originate or terminate within it.
  4. The algorithm category for BGP.
  5. An IPv6 address type where a packet is delivered to the most reachable member of a group.
  6. The RIP timer that marks a route as unreachable after 180 seconds.
Down
  1. The transport protocol used by BGP on port 179.
  2. In IPv6, replacing consecutive sections of zeros with :: is called this.
  3. The unicast routing algorithm that uses the Dijkstra algorithm.
  4. The RIP timer that removes a route from the table after 240 seconds.
  5. The BGP attribute that contains the list of traversed Autonomous Systems.
  6. The process of summarizing multiple network prefixes into one.

12 Clues: The algorithm category for BGP.The transport protocol used by BGP on port 179.The process of summarizing multiple network prefixes into one.The unicast routing algorithm that uses the Dijkstra algorithm.The IPv6 field that serves the same purpose as the IPv4 TTL field.The RIP timer that marks a route as unreachable after 180 seconds....

Garvins Rivers 4th periode 2016-10-27

Garvins Rivers 4th periode crossword puzzle
Across
  1. what allows you to see the stuff on the computer screen
  2. what modems use to communicate over the internet
  3. the differences in WiFi standers
  4. what does modem stand for
  5. the last step in the information processing cycle
  6. WiFi is
  7. a communication device that you can put in your pocket
  8. peripheral device that lets you hear through the computer directly
  9. the C drive is also known as
Down
  1. What is a series of instructions that tells the computer what to do called
  2. peripheral device that lets you type
  3. the A drive is also known as
  4. whats the first step in the information processing cycle
  5. what do computer networks connect
  6. what allows you to click on things on your monitor
  7. whats the third step in the information processing cycle
  8. user interface What does GUI stand for
  9. something computers use to communicate with each other
  10. whats the second step in the information processing cycle

19 Clues: WiFi iswhat does modem stand forthe A drive is also known asthe C drive is also known asthe differences in WiFi standerswhat do computer networks connectperipheral device that lets you typeuser interface What does GUI stand forwhat modems use to communicate over the internetthe last step in the information processing cycle...

Geography Knowledge Crossword 2018-04-04

Geography Knowledge Crossword crossword puzzle
Across
  1. The world that is used for country areas like farms
  2. One of Mexico City's biggest challenges is dealing with this
  3. Measures how many children each woman has (F____)
  4. A kind of pollution that is common around airports
  5. The length of expected life
  6. The acronym for Gross Domestic Product
  7. Cities develop along ________ lines and networks
  8. The country with the highest mobile phone ownership.
  9. One of Tokyo's biggest challenges is finding s____ for people
Down
  1. The word used for built-up areas like cities
  2. This ability to read and write is a major driver of well-being
  3. A kind of pollution that is produced by cities at night
  4. The condition of not being able to meet basic needs
  5. A city with more than 10,000,000 people
  6. Cities absorb heat to create H_____ I______.
  7. If countries produce less children, they need this to grow
  8. Index that measures wellbeing and environmental impact
  9. Around the world birth rates are increasing\declining?
  10. Term for "per head" or "per person"

19 Clues: The length of expected lifeTerm for "per head" or "per person"The acronym for Gross Domestic ProductA city with more than 10,000,000 peopleThe word used for built-up areas like citiesCities absorb heat to create H_____ I______.Cities develop along ________ lines and networksMeasures how many children each woman has (F____)...

Bison Hunting Unit 2 Lesson 2 Topic 3 2021-12-01

Bison Hunting Unit 2 Lesson 2 Topic 3 crossword puzzle
Across
  1. Father G.A. Belcourt went on bison hunt
  2. __________became well known throughout the North American continent because of their crops.
  3. Women dried the meat, stored the fat, and made _______
  4. hunters hunted for ___________
  5. wolf chief was born into a _________ family around 1850
  6. Hunters gathered at ___________
  7. a place in North Dakota is ______________
  8. the __________
  9. _________ were often proceeded by religious ceremonies such as the Sun Dance
Down
  1. _________hunted bison, deer, elk, and antelope
  2. trade networks carried corn north and west into the Missouri Valley and ____________
  3. ________ meant White Bison were rare or sacred
  4. a Hidatsa women named ____________
  5. _________ Lived in the woodlands east of the Great plains
  6. __________ Controlled the camp and had the ability to punish anyone who broke the rules
  7. __________ was a game that involved speed and accuracy
  8. ________ was eaten fresh or used in soups
  9. ____________ Was a very bad sickness
  10. __________ in hides was traded to other tribes or to Anglo Americans for other things they needed

19 Clues: the __________hunters hunted for ___________Hunters gathered at ___________a Hidatsa women named ________________________ Was a very bad sicknessFather G.A. Belcourt went on bison hunt________ was eaten fresh or used in soupsa place in North Dakota is _______________________hunted bison, deer, elk, and antelope...

Risky Clues 2025-06-25

Risky Clues crossword puzzle
Across
  1. A voice-based scam technique
  2. Use a ______ password to protect your accounts
  3. Latest wireless security protocol for networks
  4. Avoid using this kind of free network in public places
  5. An internal framework that shapes the administration of an organisation
  6. Leakage Unauthorised exposure of sensitive information
  7. Risk Umbrella term for various threats for an organisation
  8. Risk Risk due to obligations or failures in external agreements
  9. Media Avoid these websites on official devices
Down
  1. A calculated step to soften the blow of what might go wrong
  2. Regulation that governs how personal information is stored.
  3. Always lock your system when you leave it
  4. If you find yourself in cyber threat, call me
  5. System or process failing to work as intended
  6. A type of cyberattack using fake emails
  7. Intentional deception for personal or financial gain
  8. Security Protect this sensitive information of clients
  9. Known exposure despite controls
  10. Register Structured risk documentation tool
  11. Controls Tools used to prevent confidential info from leaving the system

20 Clues: A voice-based scam techniqueKnown exposure despite controlsA type of cyberattack using fake emailsAlways lock your system when you leave itRegister Structured risk documentation toolIf you find yourself in cyber threat, call meSystem or process failing to work as intendedUse a ______ password to protect your accounts...

The Internet 2015-09-21

The Internet crossword puzzle
Across
  1. Standard network protocol for communication across networks
  2. Lead to another website/place within same document
  3. Where you can keep URLs that you would like to consult frequently
  4. Structure that handles the major traffic in a networked system
  5. Mainframe computers that are capable of very fast processing
  6. A software program
  7. A location on the WWW
Down
  1. An agreed upon format for transmitting data between two or more devices
  2. Every computer on the internet can be traced by this
  3. In the later 1980's and early 1990's, more individuals were using these
  4. Internet Appliance involving a portable device
  5. One of the most popular uses for the internet
  6. Companies that proved users with access to the internet, usually for a fee
  7. modem Connection device

14 Clues: A software programA location on the WWWmodem Connection deviceOne of the most popular uses for the internetInternet Appliance involving a portable deviceLead to another website/place within same documentEvery computer on the internet can be traced by thisStandard network protocol for communication across networks...

Year 8 computer words 2021-03-04

Year 8 computer words crossword puzzle
Across
  1. plain old telephone
  2. authorized communications.
  3. Domain Name System is an Internet service that converts names to IP addresses. A common
  4. Internet service provider provides users with a connection to the Internet.
  5. a one to one connection
  6. picture element is the smallest part of a graphic image
Down
  1. are text files retained on computers by browsers containing various information in regards to a
  2. website visit.
  3. locate your residence.
  4. would be a system that could use either your home address or the parcel number and
  5. A device that routes traffic between networks
  6. pages per minute
  7. Is a part of a computer system or network that is designed to block unauthorized access while
  8. the ability of a computer to automatically configure when a device connects to it

14 Clues: website visit.pages per minuteplain old telephonelocate your residence.a one to one connectionauthorized communications.A device that routes traffic between networkspicture element is the smallest part of a graphic imageInternet service provider provides users with a connection to the Internet....

Unit 4 and 5 - English for IT 2023-10-02

Unit 4 and 5 - English for IT crossword puzzle
Across
  1. Someone who gets into other people's computer systems without permission
  2. The department in a company that makes thing
  3. A business deal or action such as buying or selling things
  4. (adj) far away
  5. "Human ______" is the department dealing with employment, training and
  6. a large amount of information stored in a computer system
  7. data _________ means gathering the raw data
Down
  1. data ______ means entering the data into the system
  2. the area of a website where you pay for the items
  3. data _______ means double-checking the data for faults or
  4. A way of connecting two computer networks
  5. The main computer of a network, which controls all the others
  6. (Verb)to protect information by putting it into a special code
  7. A system that protects a computer network

14 Clues: (adj) far awayA way of connecting two computer networksA system that protects a computer networkdata _________ means gathering the raw dataThe department in a company that makes thingthe area of a website where you pay for the itemsdata ______ means entering the data into the systemdata _______ means double-checking the data for faults or...

Siegel Year In Review Puzzle 2023-11-02

Siegel Year In Review Puzzle crossword puzzle
Across
  1. The abbreviation we use for public interest technology.
  2. We believe philanthropy is society’s __________ capital.
  3. We believe infrastructure is physical, digital, and _______.
  4. Who writes grant recommendations?
  5. We describe our approach as __________-driven.
  6. ________ M. Siegel, our Chairman.
  7. One of two authors we cite as inspiration for our work.
  8. Our research strategy is shaped by what we call the 3 “N’s,” ___________, Networks, and Insights (Hint: it doesn’t start with an “N!”).
Down
  1. One of our values in action.
  2. Our latest white paper “_______ as Community Infrastructure.”
  3. We recently started thinking about the intersection of art and research, what we are calling ___________ research.
  4. What we call our weekly posts on our websites sharing news, updates and general thoughts.
  5. We work at the nexus of technology and ___________.
  6. We have _______ interest areas.

14 Clues: One of our values in action.We have _______ interest areas.Who writes grant recommendations?________ M. Siegel, our Chairman.We describe our approach as __________-driven.We work at the nexus of technology and ___________.The abbreviation we use for public interest technology.One of two authors we cite as inspiration for our work....

Siegel Year In Review Puzzle 2023-11-02

Siegel Year In Review Puzzle crossword puzzle
Across
  1. Our latest white paper “_______ as Community Infrastructure.”
  2. One of our values in action.
  3. The abbreviation we use for public interest technology.
  4. Our research strategy is shaped by what we call the 3 “N’s,” ___________, Networks, and Insights (Hint: it doesn’t start with an “N!”).
  5. We describe our approach as __________-driven.
  6. ________ M. Siegel, our Chairman.
  7. Who writes grant recommendations?
  8. We have _______ interest areas.
Down
  1. We work at the nexus of technology and ___________.
  2. One of two authors we cite as inspiration for our work.
  3. We believe infrastructure is physical, digital, and _______.
  4. We recently started thinking about the intersection of art and research, what we are calling ___________ research.
  5. What we call our weekly posts on our websites sharing news, updates and general thoughts.
  6. We believe philanthropy is society’s __________ capital.

14 Clues: One of our values in action.We have _______ interest areas.________ M. Siegel, our Chairman.Who writes grant recommendations?We describe our approach as __________-driven.We work at the nexus of technology and ___________.One of two authors we cite as inspiration for our work.The abbreviation we use for public interest technology....

20th and 21st century 2023-05-02

20th and 21st century crossword puzzle
Across
  1. First Mexican American women to be chosen for a high position in politics.
  2. Largest refinery in America
  3. Became one of MALDEF's first two women of the organizations board of directors
  4. exporting from other countries.
  5. the high school Greg Abbot graduated from
  6. The science of travel through air
  7. promised to focus on building roads,securing the border between Texas and Mexico.
Down
  1. Texans have been drilling holes in search of this.
  2. Clearing trees,knowing which crops grow best in the climate and soil.
  3. a way of getting from one place to another
  4. Manufacturing companies that people moved to the border of Mexico at the end of the 20th century
  5. cycle of economic positives and negatives
  6. worldwide system of computer networks
  7. USA base for telecommunications.

14 Clues: Largest refinery in Americaexporting from other countries.USA base for telecommunications.The science of travel through airworldwide system of computer networkscycle of economic positives and negativesthe high school Greg Abbot graduated froma way of getting from one place to anotherTexans have been drilling holes in search of this....

tech foundry crossword 2025-09-30

tech foundry crossword crossword puzzle
Across
  1. spreadsheets
  2. information intended to be kept secret or only shared with those that need to know.
  3. understands customer emotions
  4. offer more flexibility and allow out-of-network care
  5. a quantity of medication or drug taken or recommended to be taken at a particular time.
  6. feeling for the customer
Down
  1. cloud storage
  2. Treat others how you would like them to treat you
  3. insurance/Payer Verification site
  4. Contracted Payer List ID
  5. what is a leading pharmaceutical solutions organization centered on improving the lives of people and animals everywhere.
  6. Annual Enrollment Period
  7. provider networks and lower cost
  8. This is a term used to refer to Salesforce. Fusion used to be the name of Salesforce previously, but it’s since been bought out and now goes back Salesforce.

14 Clues: spreadsheetscloud storageContracted Payer List IDAnnual Enrollment Periodfeeling for the customerunderstands customer emotionsprovider networks and lower costinsurance/Payer Verification siteTreat others how you would like them to treat youoffer more flexibility and allow out-of-network care...

chapter3 2012-09-05

chapter3 crossword puzzle
Across
  1. any unsolicited or unwanted message.
  2. policy a document that tells how personal data will be used.
  3. using material created by another person and claiming it as your own.
  4. moral standards or values
  5. the selling and buying of products on the internet
  6. messaging allows users who ae online to key txt messages.
  7. one of the most exciting resources on the web
Down
  1. virus a destructive program.
  2. names urls contain these
  3. term often used to discribe rules for proper online behavior.
  4. allows users to post meesages for others to read
  5. is a web of computer networks that spans the earth.
  6. a scheme used to take money under false pretenses.
  7. a feature that allows you to create a list of links for sites.
  8. browser a program that lets you find and view web pages.

15 Clues: names urls contain thesemoral standards or valuesvirus a destructive program.any unsolicited or unwanted message.one of the most exciting resources on the weballows users to post meesages for others to reada scheme used to take money under false pretenses.the selling and buying of products on the internet...

Globalisation 2013-02-20

Globalisation crossword puzzle
Across
  1. act or instance of integrating a racial, religious, or ethnic group
  2. natural body that revolves around a planet
  3. right or license granted by a company to an individual or group to market its products
  4. beyond national boundaries or interests
  5. investing of money or capital
  6. process or act of migrating
  7. management; frugality in the expenditure or consumption of money, materials
  8. particular form or stage of civilization
Down
  1. basic, underlying framework or features of a system or organization
  2. quality or state of being sovereign
  3. convey (cargo) in standard-sized containers
  4. act of globalizing, or extending to other or all parts of the world
  5. computer network linking smaller computer networks worldwide
  6. person or thing that consumes
  7. act or process of buying, selling, or exchanging commodities

15 Clues: process or act of migratinginvesting of money or capitalperson or thing that consumesquality or state of being sovereignbeyond national boundaries or interestsparticular form or stage of civilizationnatural body that revolves around a planetconvey (cargo) in standard-sized containerscomputer network linking smaller computer networks worldwide...

IT CROSSWORD 2024-06-10

IT CROSSWORD crossword puzzle
Across
  1. _______ connects all the components of a computer.
  2. _______ is used for connecting peripheral devices to a computer.
  3. _______ established the most successful computer software company.
  4. ________ is a popular social networking app that allows users to share photos and videos with their friends and followers.
  5. What does GPT stand for in Chat GPT.
  6. Fidelity What does Wi-Fi stand for ?
  7. _______ to manage computer hardware and software resources and provide common services for computer programs.
  8. What is the purpose of an SSD in a computer?
Down
  1. What is the full form of URL.
  2. Who developed the first computer mouse ?
  3. What does GUI stand for ?
  4. Network What does VPN stand for ?
  5. Who is credited with inventing the World Wide Web?
  6. What does LAN stand for ?
  7. _______ is networking device that forwards data packets between computer networks.

15 Clues: What does GUI stand for ?What does LAN stand for ?What is the full form of URL.What does GPT stand for in Chat GPT.Who developed the first computer mouse ?Network What does VPN stand for ?What is the purpose of an SSD in a computer?_______ connects all the components of a computer.Who is credited with inventing the World Wide Web?...

Technická angličtina 2023-02-12

Technická angličtina crossword puzzle
Across
  1. Special HW that you need to videoconference.
  2. It protects a company intranet from outside attacks.
  3. User have to enter it to gain access to a network.
  4. As soon as possible.
  5. The line that describes the content of an emai.
  6. A person who uses technology for criminal aims.
Down
  1. Small files placed on your hard drive by web servers so that they can recognize your PC when you return to their site.
  2. It is a person who uses their PC skill to enter computers and networks illegally.
  3. It is program designed to infiltrate or damage your computer.
  4. Technology that enables people to make phone calls over the internet.
  5. In my honest opinion.
  6. Characters used when interacting with people online.
  7. The name given to junk email.
  8. A protocol which provides secure trasactions.
  9. Bye for now.

15 Clues: Bye for now.As soon as possible.In my honest opinion.The name given to junk email.Special HW that you need to videoconference.A protocol which provides secure trasactions.The line that describes the content of an emai.A person who uses technology for criminal aims.User have to enter it to gain access to a network....

AP Comp Sci Test 2023-05-02

AP Comp Sci Test crossword puzzle
Across
  1. security network system that monitors incoming and outgoing network traffic based on security rules
  2. there are 8 bits in one ____
  3. variable in a function definition, placeholder for values
  4. networking device that forwards data packets between computer networks
  5. common method for referencing elements in a list or string using numbers
  6. standard markup language for documents designed to be displayed in a web browser
  7. an ordered collection of elements in a program
  8. legal right given to an originator
  9. smallest unit of data
  10. 0s and 1s
Down
  1. group of functions that may be used in creating new programs
  2. a finite set of instructions that accomplish a task
  3. program that records keystrokes by a user
  4. rules and regulations we all agree to use
  5. a facility that allows computing devices to connect to the internet and send data via radio waves

15 Clues: 0s and 1ssmallest unit of datathere are 8 bits in one ____legal right given to an originatorprogram that records keystrokes by a userrules and regulations we all agree to usean ordered collection of elements in a programa finite set of instructions that accomplish a taskvariable in a function definition, placeholder for values...

crossword puzzle 2021-09-28

crossword puzzle crossword puzzle
Across
  1. to be conscious of the truth while telling carefully constructed lies
  2. using false or misleading information to promote a certain political figure or party
  3. fail to resist pressure or temptation
  4. characteristic of middle class
  5. to be willing to allow the existence of other opinions or thoughts
  6. intense and eager enjoyment or interest
  7. the practice of refraining from sexual intercourse
Down
  1. a secret plan or plot to do something unlawful
  2. lacking significance and liveliness
  3. to be softened by age or experience
  4. special words or expressions used by a certain group of people that isn't understood by outsiders
  5. systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum
  6. political and economic system that destroys human spirit
  7. to be forced to undergo something
  8. discover or identify the presence of something

15 Clues: characteristic of middle classto be forced to undergo somethinglacking significance and livelinessto be softened by age or experiencefail to resist pressure or temptationintense and eager enjoyment or interesta secret plan or plot to do something unlawfuldiscover or identify the presence of something...

Cyber Fraud 2024-12-09

Cyber Fraud crossword puzzle
Across
  1. Deceitful practices to gain illegal financial advantage.
  2. Pretending to be a trusted source to deceive someone.
  3. Illegal activities conducted using the internet or computers.
  4. Technique to secure data by converting it into unreadable format.
  5. Unauthorized access to computer systems or networks.
  6. Software that secretly monitors user activity.
  7. A unique string of characters used for account protection.
  8. Information that can be stolen or corrupted in a cyber attack.
  9. Malicious software designed to harm or exploit devices.
Down
  1. A type of malware disguised as legitimate software.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. A fraudulent attempt to obtain sensitive information through email or messages.
  4. Theft of personal information to commit fraud.
  5. Fraudulent schemes designed to trick and steal money or information.
  6. Malware that locks your data until a payment is made.

15 Clues: Theft of personal information to commit fraud.Software that secretly monitors user activity.A type of malware disguised as legitimate software.Unauthorized access to computer systems or networks.Pretending to be a trusted source to deceive someone.Malware that locks your data until a payment is made....

Cyber security - 1 2025-07-09

Cyber security - 1 crossword puzzle
Across
  1. Mechanisms that restrict access to systems and data.
  2. surface, The sum of all the points in a system that are exposed to an attacker.
  3. A security measure where a device is physically isolated from unsecured networks.
  4. A prolonged and targeted cyberattack.
  5. Becoming desensitized to frequent security alerts.
  6. Verifying the identity of a user, device, or system.
  7. Granting access to resources based on identity and permissions.
  8. Blocking known harmful software or processes.
  9. Ensuring that authorized users have access to information and systems when needed.
Down
  1. Trying many combinations to guess a password or encryption key.
  2. A program where organizations reward individuals for finding vulnerabilities.
  3. A network of infected computers controlled remotely.
  4. Software that detects and removes malicious software.
  5. Encryption using a pair of keys – one public and one private.
  6. An entity that issues digital certificates.

15 Clues: A prolonged and targeted cyberattack.An entity that issues digital certificates.Blocking known harmful software or processes.Becoming desensitized to frequent security alerts.Mechanisms that restrict access to systems and data.A network of infected computers controlled remotely.Verifying the identity of a user, device, or system....

Networking concept 2025-06-11

Networking concept crossword puzzle
Across
  1. – A program that detects and removes malicious software.
  2. – Someone who illegally gains access to computer systems.
  3. – Shared elements in a network, like printers, files, or servers.
  4. – A security system that monitors and controls network traffic.
  5. Address – A unique number that identifies a device on a network.
  6. System – Software that manages computer hardware and software resources.
  7. – A digital message sent over the internet between users.
  8. – A device that directs data between networks.
  9. – A cyber attack that tricks users into revealing sensitive information.
Down
  1. – Using digital platforms to harass or intimidate others.
  2. – Online promotion or marketing meant to attract attention or sales.
  3. – Unwanted or junk messages sent in bulk, usually via email.
  4. – The global network that connects computers and devices worldwide.
  5. – The physical or logical arrangement of a network.
  6. – Harmful software like viruses, worms, or trojans.

15 Clues: – A device that directs data between networks.– The physical or logical arrangement of a network.– Harmful software like viruses, worms, or trojans.– A program that detects and removes malicious software.– Using digital platforms to harass or intimidate others.– Someone who illegally gains access to computer systems....

Networking 2017-01-04

Networking crossword puzzle
Across
  1. Join together two or more computers on a network
  2. Data travelling across the internet is broken up into….
  3. Connects a network to the Internet
  4. A wide area network
  5. A point on a network - could be a computer, printer or other connected device
  6. A type of cable used to connect computers to a LAN
Down
  1. The largest WAN – A network of networks spanning the world
  2. A super-fast cable used to transfer data across the planet
  3. Local area network
  4. A computer in charge of the network
  5. Every computer must have one of these to connect to a network - could be wireless or wired

11 Clues: Local area networkA wide area networkConnects a network to the InternetA computer in charge of the networkJoin together two or more computers on a networkA type of cable used to connect computers to a LANData travelling across the internet is broken up into….The largest WAN – A network of networks spanning the world...

internet safety by Bam 2013-09-08

internet safety by Bam crossword puzzle
Across
  1. A person who uses computers and know how to go and destroy your website.
  2. place that you can connect to other people around the world
  3. a place that you can research stuff
  4. the transmission of messages over communications networks.
  5. is a famous social networking
Down
  1. about yourself
  2. computer connected to the internet that maintains a series of web.
  3. place that where you can talk to your friend
  4. somebody say mean thing to you on the internet
  5. is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes
  6. is a social networking that you can see the other person

11 Clues: about yourselfis a famous social networkinga place that you can research stuffplace that where you can talk to your friendsomebody say mean thing to you on the internetis a social networking that you can see the other personthe transmission of messages over communications networks.place that you can connect to other people around the world...

Tech Cross-word 2014-03-14

Tech Cross-word crossword puzzle
Across
  1. The smallest unit of measure for computer data.
  2. Minute area of illumination on a display screen, one of many from which and image is composed.
  3. One unit of binary data cpable of being routed.
  4. Eight BITs
  5. Central processing unit, also referred to as a CPU.
  6. A measurement of the smallest detail that can be distinguished by a sensor system under specific conditions.
Down
  1. 1024 gigabytes
  2. A unique string of numbers separated by periods that identifies each computer.
  3. Is the conversion of data into a form called ciphertext.
  4. High-capacity, self-contained storage device containing a read –write mechanism.
  5. Device that forwards data packets between computer networks.

11 Clues: Eight BITs1024 gigabytesThe smallest unit of measure for computer data.One unit of binary data cpable of being routed.Central processing unit, also referred to as a CPU.Is the conversion of data into a form called ciphertext.Device that forwards data packets between computer networks....

Networking Concepts 2025-06-17

Networking Concepts crossword puzzle
Across
  1. The entire network goes down if the hub fails.
  2. Net working layout to communicate with all components
  3. A network connects two or more computers located at distant places
  4. A device that connects two different types of network
  5. Two or more computers and peripheral device connect
  6. Connect computer to the internet
Down
  1. Provide the facility to transfer soft copies from one computer to another
  2. A computer network mainly created for individual person
  3. The networking allow the networks to be without cabling
  4. A device to connect all computer in a network
  5. In which topology, all the nodes in the network are connected in a circular manner?

11 Clues: Connect computer to the internetA device to connect all computer in a networkThe entire network goes down if the hub fails.Two or more computers and peripheral device connectNet working layout to communicate with all componentsA device that connects two different types of networkA computer network mainly created for individual person...

COMPUTERS, OPERATING SIYSTEMS AND NETWORKS 2020-12-22

COMPUTERS, OPERATING SIYSTEMS AND NETWORKS crossword puzzle
Across
  1. also called Memory Pen or Pendrive
  2. It is a set of applications that allow a programmer to develop their own computer programs using their logical knowledge and programming languages
  3. It is the software that allows us to have an interaction with our hardware, that is, the one that controls the CPU and peripherals; It is also called an operating system
  4. An application that has multiple programs
  5. it is the storage medium par excellence.
Down
  1. Based on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function
  2. These are the programs that allow us to perform specific tasks in our system
  3. Random Access Memory
  4. also known as mainboard

9 Clues: Random Access Memoryalso known as mainboardalso called Memory Pen or Pendriveit is the storage medium par excellence.An application that has multiple programsThese are the programs that allow us to perform specific tasks in our systemBased on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function...

OneArt crossword 2022-09-05

OneArt crossword crossword puzzle
Across
  1. Code that grants you access to your crypto wallet
  2. Technology that enhances the interconnection between blockchain networks
Down
  1. One of the biggest NFT project
  2. Information stored in NFT
  3. Exchanging one crypto asset for another

5 Clues: Information stored in NFTOne of the biggest NFT projectExchanging one crypto asset for anotherCode that grants you access to your crypto walletTechnology that enhances the interconnection between blockchain networks

Vocab 8 2012-10-29

Vocab 8 crossword puzzle
Across
  1. user-written programs that enable the user to perform various tasks automatically. For instance, in Word, a macro is composed of a series of Word commands thus saving keystrokes and time
  2. devices device that transfers data to or from a computer.( hard disks, keyboards, and mouses) and others provide both input and output of data (hard disks, diskettes, writable CD-ROMs).
  3. private network that is contained within an enterprise
  4. software refers to multiple software applications or services that appear to run as one software package for ease-of-use.
  5. frame complete video frames (or images) that are inserted at consistent intervals in a video clip
  6. one of the image file formats supported on the World Wide Web, usually with the file suffix of “.jpg”
  7. tool a tool that can be used to separate obvious lines for selection, whether it be to copy the selection or delete it.
  8. printer popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology.
  9. worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer
Down
  1. tool Allows you to insert any picture file into a document
  2. Liquid-crystal display: a display of information using a liquid crystalline film used on a computer screen or a camera screen.
  3. messaging (IM) actually predating the Internet. IM has only recently started to garner credibility in the corporate world as a valuable productivity tool. Presence is a key driver of instant messaging. Presence technology allows users to see if the person they're trying to reach is available or not, making the value of real-time communications more potent.
  4. ability of a system or a product to work with other systems or products without special effort on the part of the customer
  5. something that will bring you to a specific web site

14 Clues: something that will bring you to a specific web siteprivate network that is contained within an enterprisetool Allows you to insert any picture file into a documentframe complete video frames (or images) that are inserted at consistent intervals in a video clip...

assgn1 asl 2021-08-19

assgn1 asl crossword puzzle
Across
  1. Cross Site Request Forgery
  2. ______ is a popular tool used for discovering networks as well as in security auditing.
  3. Compromising confidential information comes under ________
  4. _______________ is time based SQL injection attack.
Down
  1. What is simplest form of memory protection introduce in the single authentication system
  2. Which happens first authorization or authentication?

6 Clues: Cross Site Request Forgery_______________ is time based SQL injection attack.Which happens first authorization or authentication?Compromising confidential information comes under ______________ is a popular tool used for discovering networks as well as in security auditing....

ICT EMPOWERMENT 2025-06-20

ICT EMPOWERMENT crossword puzzle
Across
  1. Posting, sharing, and liking are common actions on this ICT platform
  2. A device used to connect to the internet wirelessly
  3. Sending an electronic message
Down
  1. Real-time online meeting platform
  2. The global system of connected networks
  3. The use of computers and digital tools to access, create, and communicate information

6 Clues: Sending an electronic messageReal-time online meeting platformThe global system of connected networksA device used to connect to the internet wirelesslyPosting, sharing, and liking are common actions on this ICT platformThe use of computers and digital tools to access, create, and communicate information

Hardware 2020-03-10

Hardware crossword puzzle
Across
  1. a standard for connecting computers and their peripherals
  2. converts mains AC to low-voltage regulated DC power
  3. a form of computer memory that can be read and changed in any order
  4. a place in a computer where an expansion card can be inserted
  5. abbreviation
  6. card A USB-based device that transmits and receives wireless signals.
  7. a unit of information equal to one billion
  8. known as NIC
  9. storage device containing a read-write mechanism plus one
Down
  1. a printed circuit board controlling output to a display screen
  2. substance for absorbing excessive or unwanted heat
  3. a computer networking technologies commonly used in local area networks
  4. Operations are controlled
  5. unit of information equal to one million bytes
  6. a circuit board containing the main components of a computer
  7. a device which can be slotted into a computer to allow the use of audio components
  8. you use it to get connection at home or and public place
  9. small device able to be connected to and used with a computer
  10. abbreviation
  11. measurement

20 Clues: measurementabbreviationabbreviationknown as NICOperations are controlleda unit of information equal to one billionunit of information equal to one million bytessubstance for absorbing excessive or unwanted heatconverts mains AC to low-voltage regulated DC poweryou use it to get connection at home or and public place...

Chapter 9 Security Plus 2024-03-21

Chapter 9 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Chapter 7 Security Plus 2024-03-11

Chapter 7 Security Plus crossword puzzle
Across
  1. Granting access that is limited
  2. Standard preconfigured passwords
  3. Single sign-on for networks owned by different organizations
  4. An access control scheme that is the most restrictive
  5. evidence or proof of something
  6. features and characteristics of the individual
  7. Removing user accounts
  8. Granting or denying approval to use specific resources
  9. The ability of systems to exchange information
Down
  1. Requiring the user to provide proof that they are the unique user.
  2. The point in time when a password is no longer valid
  3. allows secure web domains to exchange user authentication and authorization data
  4. enables users to access a network resource through a directory service
  5. An access control scheme that is the least restrictive
  6. Using more than one type of authentication credential
  7. Adding a random string to a hash algorithm for enhanced security
  8. A key pair “burned” into a security key
  9. small number of passwords used when trying several different user accounts
  10. provide control over user validation and the resources that may be accessed
  11. An open-source federation framework

20 Clues: Removing user accountsevidence or proof of somethingGranting access that is limitedStandard preconfigured passwordsAn open-source federation frameworkA key pair “burned” into a security keyfeatures and characteristics of the individualThe ability of systems to exchange informationThe point in time when a password is no longer valid...

CYBER ETHICS 2025-07-29

CYBER ETHICS crossword puzzle
Across
  1. Unwanted and often harmful bulk emails. |
  2. Online etiquette or good manners on the internet. |
  3. Legal right granted to an inventor for a new invention. |
  4. Installing one licensed software copy on multiple devices illegally. |
  5. Theft Stealing someone's personal information for fraudulent use. |
  6. Illegally breaking into systems to steal sensitive information. |
  7. Illegal intrusion into a computer system or network. |
  8. Footprint Online data left behind from a user's digital activity. |
Down
  1. Using technology to harass or harm someone on purpose. |
  2. Piracy Copying and distributing software illegally. |
  3. Not morally correct or acceptable, especially in the digital world. |
  4. Tricking users into clicking something they didn't intend to. |
  5. Presenting someone else's work or ideas as your own. |
  6. Legal protection for original creative work. |
  7. Using phone calls or VoIP to steal personal information. |
  8. Attempting to trick someone into revealing personal info via fake emails. |
  9. A program that disrupts a computer's normal functioning. |
  10. Criminal activity involving computers, networks, or the internet. |
  11. Bombing Sending repeated spam to overflow someone’s inbox. |
  12. Law Rules and restrictions imposed on online users. |

20 Clues: Using technology to harass or harm someone on purpose. |Unwanted and often harmful bulk emails. |Online etiquette or good manners on the internet. |Not morally correct or acceptable, especially in the digital world. |...

ICT 2017-12-13

ICT crossword puzzle
Across
  1. An example of Application Software.
  2. Holds the programs and data being worked on.
  3. The S in RSI stands for?
  4. Smallest unit of storage
  5. Performs all the basic calculations and functions to make the computer work.
  6. An example of System Software.
  7. The A in EULA stands for?
  8. This is measured in bits per second.
  9. Type of software licence that must be paid for before you can use the program.
  10. Software that performs a specific function.
  11. A computer that has high performance, easy to move and uses wireless networks
Down
  1. The C in ICT stands for?
  2. Any device that is controlled by the CPU.
  3. An item of hardware that displays processed results.
  4. An example of a WAN.
  5. An example of an Input device.
  6. An example of an impact printer.
  7. A very expensive type of Internet connection used for people in remote areas.
  8. Program of instructions that tell the device what to do.

19 Clues: An example of a WAN.The C in ICT stands for?The S in RSI stands for?Smallest unit of storageThe A in EULA stands for?An example of an Input device.An example of System Software.An example of an impact printer.An example of Application Software.This is measured in bits per second.Any device that is controlled by the CPU....

Computer Words 2015-11-30

Computer Words crossword puzzle
Across
  1. the tv-like screen where you can see the text as it enters the system
  2. the storage space needed to represent one letter or digit
  3. random access memory
  4. a work station consisting of a keyboard and monitor
  5. a blinking light on the display screen that shows where the next keystroke
  6. machine-printed stipes that give information such as a product ID
  7. an efficient system of preparing documents by computer
  8. the physical equipment of a computer system
  9. read on memory
Down
  1. belonging to a numbering system to the base 2
  2. electronic equipment that handles input/ouput information
  3. messages between computers
  4. the computer's main thinking unit
  5. approcimately 1,000 kilobyte
  6. combining a document with a list of variable
  7. an information storage device
  8. a message and data forwarding system that links computer networks all around the world
  9. a large collection of data on a given subject that can be consulted by multiple users
  10. computer programs

19 Clues: read on memorycomputer programsrandom access memorymessages between computersapprocimately 1,000 kilobytean information storage devicethe computer's main thinking unitthe physical equipment of a computer systemcombining a document with a list of variablebelonging to a numbering system to the base 2a work station consisting of a keyboard and monitor...

Health & Human Development 2015-02-11

Health & Human Development crossword puzzle
Across
  1. general movement or pattern over time
  2. number of deaths of children under five
  3. an aspect of this would be your creativity improving
  4. the last stage of the human lifespan
  5. number of new cases
  6. estimate number of number of healthy years expected to live
  7. the sum of the years of potential life lost due to premature death and the years of productive life lost due to disability
  8. from conception to birth stage of life
  9. communication is an aspect of
  10. Yll + _____ = Daly
  11. not merely the lack of disease think physical mental social
Down
  1. number of women dying who are pregnant pr within 42 days birth
  2. growth is classified under
  3. number of deaths caused by disease, illness or environmental factor
  4. number of cases present in a population or at a given time
  5. number of years a person can expect to love of current mortality patterns don't change
  6. fine and gross motor skills are an aspect of
  7. body weight is an aspect of
  8. depression is an aspect of
  9. productive social networks is an aspect of

20 Clues: Yll + _____ = Dalynumber of new casesgrowth is classified underdepression is an aspect ofbody weight is an aspect ofcommunication is an aspect ofthe last stage of the human lifespangeneral movement or pattern over timefrom conception to birth stage of lifenumber of deaths of children under fiveproductive social networks is an aspect of...

Chapter 8 Security Plus 2024-03-20

Chapter 8 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Network requirments 2023-08-28

Network requirments crossword puzzle
Across
  1. The minimum allowable network connection speed
  2. Time it takes a packet to arrive to its destination
  3. In charge of routing data packets between networks
  4. A gadget that joins many networks
  5. The greatest quantity of data that may be communicated in a particular period
  6. A network device's unique identification
  7. A network architecture in which devices are linked in a circle
  8. Filters network traffic to provide security
  9. The division of a network into smaller pieces
Down
  1. A network with restricted access, frequently requiring a password
  2. The quantity of data that may be sent per second is measured
  3. The data transmission unit across a network
  4. Ensures data arrives at its destination without mistakes
  5. Determines the format and encoding of data for transmission
  6. A big geographically dispersed network
  7. Required for wireless communication between devices
  8. The entity in charge of assigning IP addresses
  9. The protocol that allows for file sharing over a network
  10. The protocol that is used to convert domain names into IP addresses
  11. A mechanism that ensures dependable data transmission

20 Clues: A gadget that joins many networksA big geographically dispersed networkA network device's unique identificationThe data transmission unit across a networkFilters network traffic to provide securityThe division of a network into smaller piecesThe minimum allowable network connection speedThe entity in charge of assigning IP addresses...

ICT TERMINOLOGIES 2025-03-25

ICT TERMINOLOGIES crossword puzzle
Across
  1. An organized collection of structured information.
  2. The delay before data transfer begins.
  3. A cyberattack method used to trick users into giving sensitive information.
  4. A request for data from a database.
  5. The core component of an operating system.
  6. A step-by-step procedure for solving a problem.
  7. The process of converting data into a secret code.
  8. The rules defining how code must be written in a programming language.
Down
  1. A small storage space for frequently accessed data.
  2. A programming language used to create interactive web pages.
  3. A group of interconnected devices for communication.
  4. A security system that monitors and controls network traffic.
  5. A device that directs internet traffic between networks.
  6. The maximum data transfer rate of a network.
  7. A unit of digital storage equal to 1024 megabytes.
  8. A clickable link that directs users to another webpage.
  9. Software with publicly available source code.
  10. Malicious software designed to harm a system.
  11. A point where two systems interact or communicate.

19 Clues: A request for data from a database.The delay before data transfer begins.The core component of an operating system.The maximum data transfer rate of a network.Software with publicly available source code.Malicious software designed to harm a system.A step-by-step procedure for solving a problem.An organized collection of structured information....

Computing Systems Review 2021-12-08

Computing Systems Review crossword puzzle
Across
  1. software embedded in hardware devices
  2. this type of software helps users complete specific tasks or activities
  3. Windows and iOS are examples of this type of software
  4. often referred to as the brains of the computer
  5. device that transfers data between networks
  6. computer hardware that sends info to a computer
  7. physical computer components that can been seen and touched
Down
  1. any invention including tools, machines, techniques and power sources
  2. when hackers listen in on WiFi signals
  3. a group of computers connected in order to share resources
  4. security software to protect your computer from hackers
  5. storage used to temporarily store files being used by the computer
  6. a set of instructions to tell a computer what to do
  7. converting data into unreadable code to make it more secure before sending
  8. .jpg is an example of this type of file

15 Clues: software embedded in hardware deviceswhen hackers listen in on WiFi signals.jpg is an example of this type of filedevice that transfers data between networksoften referred to as the brains of the computercomputer hardware that sends info to a computera set of instructions to tell a computer what to do...

Needs of all learners 2013-07-01

Needs of all learners crossword puzzle
Across
  1. assessing students' knowledge and skills before beginning a unit of study and allowing learners to begin at their level
  2. collection of work used for reflection on growth over time
  3. the result when a student applies what they have learned
  4. how a student learns best
  5. activity where students study same concept with different levels
  6. adult basic education
  7. refers to a student's knowledge, understanding, and skill
  8. ways in which content is taught
Down
  1. students working together on one project
  2. breaking assignments into smaller parts
  3. strategic teaching to meet needs of all students
  4. type of learning where students are given real life problems to solve as if in the professional world
  5. students working on their own on topics of interest to them
  6. support networks for teachers
  7. topics that evoke curiosity and passion

15 Clues: adult basic educationhow a student learns bestsupport networks for teachersways in which content is taughtbreaking assignments into smaller partstopics that evoke curiosity and passionstudents working together on one projectstrategic teaching to meet needs of all studentsthe result when a student applies what they have learned...

Technology Vocabulary 2021-07-28

Technology Vocabulary crossword puzzle
Across
  1. a worldwide network of computer networks
  2. any smal compartmen
  3. transfer a file or program to a smaller computer
  4. a unit of measurement of information
  5. a listing of the computer files stored in memory
  6. a short line of text that a web site puts on your computer's hard drive when you access the web site
  7. having an output that is proportional to the input
  8. locate and correct errors in a computer program code
Down
  1. a set of related records kept together
  2. a link from a hypertext file to another location or file
  3. a data transmission rate for modems
  4. the exclusive right to sell a work
  5. restore something reduced in volume to its full volume
  6. a compact disk that is used with a computer
  7. transfer out of a database or document

15 Clues: any smal compartmenthe exclusive right to sell a worka data transmission rate for modemsa unit of measurement of informationa set of related records kept togethertransfer out of a database or documenta worldwide network of computer networksa compact disk that is used with a computertransfer a file or program to a smaller computer...

Emergency communication and warning systems (text A) 2016-12-18

Emergency communication and warning systems (text A) crossword puzzle
Across
  1. Name the primary communication network which carries Federal CD operational information.
  2. The National Communication System connects national and regional civil defence ...
  3. how many levels does the US warning system consist of?
  4. The emergency operators are well-trained and ...
  5. Which network provides emergency alert?
  6. Which system plays a great role in emergency response?
  7. Name the most widespread sounding public warning device
  8. These authorities are responsible for sunding public warning devices
Down
  1. What is often used for governmental communication?
  2. How many networks does the emergency communication system inslude?
  3. The emergecy response greatly depends on this quality of the emergency communication system
  4. There are more than 700 of this in the USA.
  5. The National Warning System is an extension of the military ... and warning systems.
  6. What authorities do warning points send warning information to?
  7. What is the simplest communication system?

15 Clues: Which network provides emergency alert?What is the simplest communication system?There are more than 700 of this in the USA.The emergency operators are well-trained and ...What is often used for governmental communication?how many levels does the US warning system consist of?Which system plays a great role in emergency response?...

Unit 4 and 5 - English for IT 2023-10-02

Unit 4 and 5 - English for IT crossword puzzle
Across
  1. the area of a website where you pay for the items
  2. (adj) far away
  3. Someone who gets into other people's computer systems without permission
  4. The department in a company that makes thing
  5. "Human ______" is the department dealing with employment, training and
  6. A system that protects a computer network
  7. (Verb)to protect information by putting it into a special code
Down
  1. the business of selling a product or service to the public
  2. a large amount of information stored in a computer system
  3. A business deal or action such as buying or selling things
  4. The main computer of a network, which controls all the others
  5. data _______ means double-checking the data for faults or
  6. data ______ means entering the data into the system
  7. data _________ means gathering the raw data
  8. A way of connecting two computer networks

15 Clues: (adj) far awayA way of connecting two computer networksA system that protects a computer networkdata _________ means gathering the raw dataThe department in a company that makes thingthe area of a website where you pay for the itemsdata ______ means entering the data into the systema large amount of information stored in a computer system...

Crossword puzzle based on cyber ethics 2025-06-11

Crossword puzzle based on cyber ethics crossword puzzle
Across
  1. A group of interconnected computers or devices.
  2. Using manipulation to trick someone into revealing information.
  3. Software designed to harm or disrupt computer systems.
  4. Software designed to damage or disrupt a computer system.
  5. A scam that uses email to trick people into revealing sensitive information.
  6. Rights associated with creations of the mind, such as inventions and artistic works.
Down
  1. The process of converting data into a secret code.
  2. Harassment or intimidation conducted using electronic devices.
  3. A secret word or phrase used for authentication.
  4. A system that blocks unauthorized access to a network.
  5. The right to be free from unwarranted intrusion or observation.
  6. Protection against threats or risks.
  7. Criminal activity carried out using computers or networks.
  8. The exclusive legal right to copy, distribute, and adapt a work.
  9. Unauthorized access to a computer or network.

15 Clues: Protection against threats or risks.Unauthorized access to a computer or network.A group of interconnected computers or devices.A secret word or phrase used for authentication.The process of converting data into a secret code.A system that blocks unauthorized access to a network.Software designed to harm or disrupt computer systems....

Computer languages and browsing safely 2025-06-05

Computer languages and browsing safely crossword puzzle
Across
  1. act of stealing and misusing someone's personal information
  2. It can do addition, subtraction, multiplication, division, etc.
  3. an illegal entry into a computer system or network
  4. use of illegal methods to get money or other things that belong to a bank
  5. process of 'befriending' children on social media
  6. it is vital information resources
  7. It has based 2
  8. Act to believe the email has been sent from a trusted person or organisation
  9. the number system consists of 16 digits
  10. it means hoaxing or misleading
Down
  1. the number system consists of 10 digits
  2. it consists of 8 digits
  3. Collection of technologies, processes, and practices design to protect networks, computers, programs, and data
  4. Any criminal activity intended to harm anyone using a computer and an internet connection
  5. Extract confident information from users and use this information to execute fraudulent tasks online

15 Clues: It has based 2it consists of 8 digitsit means hoaxing or misleadingit is vital information resourcesthe number system consists of 10 digitsthe number system consists of 16 digitsprocess of 'befriending' children on social mediaan illegal entry into a computer system or networkact of stealing and misusing someone's personal information...

inglish 2025-09-19

inglish crossword puzzle
Across
  1. a type of squared code you can scan
  2. The “NFC” professor
  3. You have to use it when your phone has low battery
  4. you use it to move a cursor on your pc
  5. it’s used to change your location to a different country
  6. Technique used to divide a network into multiple networks
  7. it’s used to type
  8. they are used to control the temperature
Down
  1. it’s used to copy and transform digital images into images on paper sheets
  2. a tiny block of memory needed for common instructions
  3. Language that uses markups that we used in TPSI
  4. name of the software we use to write java programs
  5. technology that can enable voice or data communication between multiple devices using radio signals at short distance
  6. you can use one to play music or sounds from your PC
  7. Temporary kind of memory

15 Clues: it’s used to typeThe “NFC” professorTemporary kind of memorya type of squared code you can scanyou use it to move a cursor on your pcthey are used to control the temperatureLanguage that uses markups that we used in TPSIYou have to use it when your phone has low batteryname of the software we use to write java programs...

The World Wide Web from its origins 2025-11-03

The World Wide Web from its origins crossword puzzle
Across
  1. Huge star systems studied in GalaxyZoo Paragraph 4
  2. To sort items into specific scientific groups Paragraph 4
  3. Something observed that needs explanation, like “winner takes all” Paragraph 6
  4. Type of analysis used to study Web behaviour Paragraph 6
  5. Motivation or reward that encourages action Paragraph 8
  6. review Evaluation of research by other experts Paragraph 7
  7. Formal written plan that introduced the Web Paragraph 1
Down
  1. Non-experts who help scientists online Paragraph 4
  2. Working together, especially among scientists Paragraph 7
  3. networks Online platforms used to study human connections Paragraph 5
  4. Website used by researchers to analyse message patterns Paragraph 5
  5. Original written file linking scientists’ data Paragraph 1
  6. Academic publications now available online Paragraph 4
  7. Giant machine used to smash particles at CERN Paragraph 2
  8. European physics lab where the Web began Paragraph 1

15 Clues: Non-experts who help scientists online Paragraph 4Huge star systems studied in GalaxyZoo Paragraph 4European physics lab where the Web began Paragraph 1Academic publications now available online Paragraph 4Motivation or reward that encourages action Paragraph 8Formal written plan that introduced the Web Paragraph 1...

karey 2013-05-01

karey crossword puzzle
Across
  1. self-replicating program that is harmful to networks.
  2. software program that displays advertising on your computer.
  3. of death – A series of repeated, larger than normal pings that crash the receiving computer
  4. is unsolicited e-mail.
  5. process of removing sensitive data from hardware and software before recycling
  6. protocol suite that is used to control all of the communications on the Internet.
  7. attcach that prevents users from acessing normal services
  8. social engineering where the attacker pretends to represent a legitimate outside organization
Down
  1. technically a worm
  2. person who is able to gain access to equipment
  3. file or program other then a virus that is potentially harmful.
  4. Gains access to resources on devices by pretending to be a trusted computer
  5. Programming language developed to interact with HTML
  6. type of grayware
  7. malicious software programs loaded into computers inadvertently.

15 Clues: type of graywaretechnically a wormis unsolicited e-mail.person who is able to gain access to equipmentProgramming language developed to interact with HTMLself-replicating program that is harmful to networks.attcach that prevents users from acessing normal servicessoftware program that displays advertising on your computer....

IMPERIALISM LESSON 1 REVIEW 2024-01-18

IMPERIALISM LESSON 1 REVIEW crossword puzzle
Across
  1. WHO SIGNED TRIETIES TO GAIN LAND AND RUBBER ALONG THE CONGO
  2. AFRICAN RELIGIONS INCLUDED TRADITIONAL BELEIFS, CHRISTIANITY AND WHAT RELIGION
  3. EUROPEAN NATIONS LOOKED FOR NEW MARKETS AND SOURCES OF WHAT?
  4. AFRICANS CONTROLLED THEIR OWN NETWORKS FOR WHAT?
  5. PEOPLE WHO WANTED THE AFRICANS TO CONVERT.
  6. EUROPEANS BELIEVED THAT THEY WERE BETTER THAN MANY OTHER WHAT?
  7. EUROPEAN COUNTRIES WERE TRYING TO MAKE WHAT?
Down
  1. SHIPS POWERED BY WHAT ALLOWED FOR MORE EXPLORATION
  2. WHAT TWO THINGS KEPT EUROPEAN OUT OF AFRICA FOR HUNDREDS OF YEARS
  3. WHO CARRIED THE STORIES OF LEOPOLD'S ABUSE OF THE PEOPLE IN THE CONGO
  4. THEY BELIEVED THEY HAD THE RIGHT TO BRING PROGRESS TO THE AREA.
  5. DISEASE AFRICANS WERE SUSCEPTIBLE TO
  6. FIRST MACHINE GUN
  7. DRUG THAT PROTECTED EUROPEANS FROM MALARIA
  8. LEOPOLD SIGNED TREATIES TO GAIN LAND ALONG WHAT RIVER/

15 Clues: FIRST MACHINE GUNDISEASE AFRICANS WERE SUSCEPTIBLE TODRUG THAT PROTECTED EUROPEANS FROM MALARIAPEOPLE WHO WANTED THE AFRICANS TO CONVERT.EUROPEAN COUNTRIES WERE TRYING TO MAKE WHAT?AFRICANS CONTROLLED THEIR OWN NETWORKS FOR WHAT?SHIPS POWERED BY WHAT ALLOWED FOR MORE EXPLORATIONLEOPOLD SIGNED TREATIES TO GAIN LAND ALONG WHAT RIVER/...

Isaac Kaup 2024-01-09

Isaac Kaup crossword puzzle
Across
  1. data about data
  2. a named reference to a value that can be used repeatedly throughout a program.
  3. a command that executes the code within a function
  4. scientific research conducted in whole or part by distributed individuals.
  5. a collection of program statements. Programs run (or “execute”) one command at a time.
  6. an ordered sequence of characters
  7. a named group of programming instructions. Also referred to as a “procedure”.
Down
  1. A way of representing information using ten options.
  2. the maximum amount of data that can be sent in a fixed amount of time.
  3. 8 bits
  4. The unique number assigned to each device
  5. a computer network consisting of interconnected networks
  6. A way of representing information using only two options.
  7. typically represented as a 0 or 1
  8. An agreed-upon set of rules that specify the behavior of some system

15 Clues: 8 bitsdata about datatypically represented as a 0 or 1an ordered sequence of charactersThe unique number assigned to each devicea command that executes the code within a functionA way of representing information using ten options.a computer network consisting of interconnected networksA way of representing information using only two options....

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. (n) a country that has a king or a queen as the leader
  2. (n) a feeling that you have a link with somebody/something or are part of a group
  3. (prefix) connected with electronic communication networks, especially the internet
  4. _____rights/issues
  5. (n) a system of government where people of a country can vote to elect their leaders
  6. (n) someone who is rich and powerful
  7. (n) racial/social/gender______
  8. (n) every adult has the right to vote
  9. (adj) that is legally or officially acceptable
  10. (n) ​a device that can react to light, heat, pressure, etc. in order to make a machine
Down
  1. (adj) antonym of specific
  2. (n) someone who steals your information through the internet
  3. (n) the activities involved in protecting Sth
  4. (n) the environmental______of tourism
  5. (n) Kingdom of Talossa; Sealand; Liberlsnd are______

15 Clues: _____rights/issues(adj) antonym of specific(n) racial/social/gender______(n) the environmental______of tourism(n) someone who is rich and powerful(n) every adult has the right to vote(n) the activities involved in protecting Sth(adj) that is legally or officially acceptable(n) Kingdom of Talossa; Sealand; Liberlsnd are______...

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. (n) a country that has a king or a queen as the leader
  2. (n) a feeling that you have a link with somebody/something or are part of a group
  3. (prefix) connected with electronic communication networks, especially the internet
  4. _____rights/issues
  5. (n) a system of government where people of a country can vote to elect their leaders
  6. (n) someone who is rich and powerful
  7. (n) racial/social/gender______
  8. (n) every adult has the right to vote
  9. (adj) that is legally or officially acceptable
  10. (n) ​a device that can react to light, heat etc. in order to make a machine do sth
Down
  1. (adj) antonym of specific
  2. (n) someone who steals your information through the internet
  3. (n) the activities involved in protecting sth
  4. (n) the environmental______of tourism
  5. (n) Kingdom of Talossa; Sealand; Liberland are______

15 Clues: _____rights/issues(adj) antonym of specific(n) racial/social/gender______(n) the environmental______of tourism(n) someone who is rich and powerful(n) every adult has the right to vote(n) the activities involved in protecting sth(adj) that is legally or officially acceptable(n) Kingdom of Talossa; Sealand; Liberland are______...