networks Crossword Puzzles
Targeted Logical Ports 2023-03-10
Across
- Transfers files between two systems (20/21)
- Transfers files from one system to another with lockstep method (69)
- Hosts the information about machines on a network (161/162)
- Text communication between two machines in plaintext (23)
- Network naming protocol for networks that automatically assign IP addresses (67/68)
- Naming system for IP Addresses (53)
- Access a machine's desktop remotely (3389)
- A client can retrieve emails from an email server (143)
Down
- Contains directory information for a network securely with SSL encryption (636)
- Contains directory information for a network (389)
- Real-time sessions that include voice, video, test messaging, etc. (5060/5061)
- Web traffic without encryption (80)
- Send and receive email messages (25)
- Clock synchronization between two machines (123)
- Microsoft created to provide access to devices on a network (445)
- A client can retrieve emails from an email server (110)
16 Clues: Web traffic without encryption (80) • Naming system for IP Addresses (53) • Send and receive email messages (25) • Access a machine's desktop remotely (3389) • Transfers files between two systems (20/21) • Clock synchronization between two machines (123) • Contains directory information for a network (389) • A client can retrieve emails from an email server (110) • ...
Technology words 2023-05-10
Across
- where your teachers assign you work to do for classes
- where a global system hooks up to networks
- a long communication without wires
- where you can watch videos for classes or for fun
- where you can send mail digitally to workers, teachers or student
- where it can be instructed by hardware
- when something is transmitting information by various types
Down
- it is designed to protect your computers and other devices from bugs ands hackers
- where you can look up answers or look for evidence
- where you can create a web browser
- where you can make a presentation
- where you create a bar graph, line graph, or a pie chart
- where scientists design and build machines
- where it widely describes wide range of technology's
- where you can hook up to internet and use your technology better
15 Clues: where you can make a presentation • where you can create a web browser • a long communication without wires • where it can be instructed by hardware • where a global system hooks up to networks • where scientists design and build machines • where you can watch videos for classes or for fun • where you can look up answers or look for evidence • ...
Vocabulary cross 2023-09-13
Across
- a living part of an ecosystem
- an organism that eats meat and plants
- a organisms that only eat plants
- the match of a species to a specific environmental condition
- a organisms that can't make their own food
Down
- are networks starting from producers and ending with predators
- a non-living part of an ecosystem
- are organisms that break down dead organisms
- the natural home or environment of an animal, plant, or other organism.
- a organisms that make their own food
- consists of all the food chains in a single ecosystem
- an organisms that cannot produce its own food, instead taking nutrition from other sources of organic carbon
- an organism that produces complex organic compounds using carbon from simple substances
- an organisms that only eat meat
- are animals that consume dead organisms that have died
15 Clues: a living part of an ecosystem • an organisms that only eat meat • a organisms that only eat plants • a non-living part of an ecosystem • a organisms that make their own food • an organism that eats meat and plants • a organisms that can't make their own food • are organisms that break down dead organisms • consists of all the food chains in a single ecosystem • ...
Cyber Fraud 2024-11-27
Across
- Deceitful practices to gain illegal financial advantage.
- Pretending to be a trusted source to deceive someone.
- Illegal activities conducted using the internet or computers.
- Technique to secure data by converting it into unreadable format.
- Unauthorized access to computer systems or networks.
- Software that secretly monitors user activity.
- A unique string of characters used for account protection.
- Information that can be stolen or corrupted in a cyber attack.
- Malicious software designed to harm or exploit devices.
Down
- A type of malware disguised as legitimate software.
- A security system that monitors and controls incoming and outgoing network traffic.
- A fraudulent attempt to obtain sensitive information through email or messages.
- Theft of personal information to commit fraud.
- Fraudulent schemes designed to trick and steal money or information.
- Malware that locks your data until a payment is made.
15 Clues: Theft of personal information to commit fraud. • Software that secretly monitors user activity. • A type of malware disguised as legitimate software. • Unauthorized access to computer systems or networks. • Pretending to be a trusted source to deceive someone. • Malware that locks your data until a payment is made. • ...
China Review 2025-02-26
Across
- chinese philosophy that focuses on finding societal harmony
- river that ancient Chinese civilization started around
- founder of Confucianism
- first unified emperor of China that was buried with 8,000 terracotta warriors
- series of trade networks that exchanged goods and ideas from Asia to Europe
- chinese philosophy that believes in looking for harmony with nature or the whole world
Down
- chinese explorer that was command in chief of the largest naval expedition
- group of people who travel together for the safety of each other
- winner of the Chinese Civil War
- a country that has the ability to exercise and influence anywhere in the world
- last ruling emperor of China
- fantastical and did not happen in real life
- a series of rulers from the same ruling family
- first dynasty of China
- first communist leader in China
15 Clues: first dynasty of China • founder of Confucianism • last ruling emperor of China • winner of the Chinese Civil War • first communist leader in China • fantastical and did not happen in real life • a series of rulers from the same ruling family • river that ancient Chinese civilization started around • chinese philosophy that focuses on finding societal harmony • ...
Networking Concepts 2025-06-12
Across
- : A common wired networking technology
- : A network that covers a large geographic area
- : A device that connects devices in a LAN and uses MAC addresses to forward data
- : Device that converts digital data to analog signals and vice versa
- : A wireless networking technology using radio waves
- : A network within a small area, like a home or office
- : A set of rules for data communication
- : A computer that requests data or services from a server
- : A computer that provides data or services to other computers
Down
- : Maximum data transfer rate of a network
- : Translates domain names into IP addresses
- : Security system that controls incoming and outgoing network traffic
- : A group of connected devices that share resources
- Address : Unique address assigned to each device on a network
- : Device that forwards data packets between networks
15 Clues: : A common wired networking technology • : A set of rules for data communication • : Maximum data transfer rate of a network • : Translates domain names into IP addresses • : A network that covers a large geographic area • : A group of connected devices that share resources • : A wireless networking technology using radio waves • ...
MIL Crosswords 2025-11-19
Across
- uses casual and conversational language
- a set of situations that makes it possible to do something
- an enclosed space
- online etiquette
- means of communication or communication tools like magazines and newspapers
- the relationship of the area occupied by one shape to that of another
- uses academic language and has an organized structure
- Exclusive right granted for an invention
Down
- the notional environment in which communication over computer networks occurs.
- defined by points moving in space
- usually used to protect original works like books, movies, and music
- online criminal work
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a simple and flexible format of presenting information.
- Uses professional and structured language
15 Clues: online etiquette • an enclosed space • online criminal work • defined by points moving in space • uses casual and conversational language • Exclusive right granted for an invention • Uses professional and structured language • uses academic language and has an organized structure • a simple and flexible format of presenting information. • ...
Network 2025-03-02
5 Clues: A system of connected computers. • A collection of related web pages. • A private network within an organization. • A global system of interconnected computer networks. • A network that allows controlled access to external partners.
CSP REVIEW 2025-05-02
Across
- Time to do a task sequentially divided by the time to do it in parallel
- A type of malware that copies itself
- The process of repeating steps in an algorithm
- Scientific research, done by individuals, contributing relevant data using their own computing devices
- Takes small program with little variables and expands to larger with huge variables
- Type of error caused by not following the rules of the language
Down
- The study of encryption techniques
- A wireless access point that gives unauthorized access to secure networks
- A "rule of thumb" to follow in an algorithm to simplify a hard problem
- Compression without losing any data at all
- Type of problem that cannot be solved with an algorithm of any type
- data changing smoothly over time with specific values
- Type of computing using multiple computers
- Scrambling Data to avoid unauthorized access
- ____ time solution that grows exponentially
- Data about Data
16 Clues: Data about Data • The study of encryption techniques • A type of malware that copies itself • Compression without losing any data at all • Type of computing using multiple computers • ____ time solution that grows exponentially • Scrambling Data to avoid unauthorized access • The process of repeating steps in an algorithm • ...
Networking concept 2025-05-18
Across
- A computer that requests services from a server.
- A security device that protects a network from unauthorized access.
- (Local Area Network): A network within a small geographic area.
- & Privacy:
- A group of interconnected devices that can communicate with each other.
- (Virtual Private Network): A secure connection that encrypts data and can be used to access a network remotely.
- A computer that provides services to other computers on the network.
Down
- A common wired network connection.
- A device that connects different networks together.
- A type of connection that uses radio waves to transmit data.
- (Wide Area Network): A network that spans a large geographic area.
- A device that forwards data between devices on a network.
- of Connections:
- A set of rules that govern communication on a network.
- Address: A unique numerical address assigned to each device on a network.
- Any device connected to a network.
16 Clues: & Privacy: • of Connections: • A common wired network connection. • Any device connected to a network. • A computer that requests services from a server. • A device that connects different networks together. • A set of rules that govern communication on a network. • A device that forwards data between devices on a network. • ...
Transfer of Data in ICT Systems 1 - Networks 2014-10-12
Across
- A school site or small office usually uses this type of network (3)
- Acronym for a network that is spread over a wide geographical area (3)
- In this type of network, resources are shared among interconnected users (4,2,4)
- _______ Transfer Protocol, used for transmitting and displaying information in the form of web pages on browsers (9)
- In this type of network, users access and share resources from a central location (6,5)
- Communications network having two or more paths to any nodes (4)
- Device which converts analogue signals to digital signals and vice versa (5)
- See 4 Across
- Node on a network dedicated to printing (5,6)
- The acronym for ‘wireless fidelity’ (4)
- Network in which the nodes are all connected to one central communications line (3)
- Device for connecting a number of nodes in a star configuration (3)
Down
- 4 & 2 Down Printed circuit board that is in a station that converts the data in the station so that it can be transmitted along a network (7,9,4)
- Device that connects two different LAN’s (6)
- Device that sits between a user and the Internet, responsible for caching and filtering (5,6)
- ________ Area Networks cover an area such as a city or town (12)
- Device which determines the path a packet should take on a network (6)
- Network structure in which the network resources are distributed throughout the geographical area being served, due to the network operating system (11)
- Device that allows LANs to connect to WANs (7)
- Small hardware device that joins multiple computers together within one local area network (LAN) and assists with the performance of the network (6)
20 Clues: See 4 Across • The acronym for ‘wireless fidelity’ (4) • Device that connects two different LAN’s (6) • Node on a network dedicated to printing (5,6) • Device that allows LANs to connect to WANs (7) • Communications network having two or more paths to any nodes (4) • ________ Area Networks cover an area such as a city or town (12) • ...
CS486 - Introduction to Neural Networks and Deep Learning 2025-10-13
Across
- ___________ in the biological neuron is referred to as output in computational neuron.
- Weights in the Rosenblatt's perceptron model are __________________ numbers
- A NN model with 1 - Input layer, 4 hidden layer and 1 Output layer is referred to be ______ layer network
- __________ layer can be used to avoid overfitting
- No of Convolution layers used in VGG16 is
- a Layer that reduces the dimensionality of the convoluted image
- a popular algorithm used to minimize the loss function
- To make the convoluted image the same size as the input image, then the padding value should be ‘________’ in Python.
- Use the _______________ of pre-trained models when the dataset is huge and similarity is less.
- a constant used to update the net activation value
- A number 26 is an example of a _____________
- ____________ learning mechanism is used when the dataset is small and similarity of images is less with Imagenet while using pre-trained models
- An input layer has 'm' units and hidden layer has 'n' units then the number of weights between these two layers is ___________
- ___________ is an example of linearly inseperable problem
- A grayscale image is an example of _______________
- In the McCulloch Pitts' model, the inputs are
Down
- an activation function used to predict the output in logistic regression
- one ____________ refers to show the dataset completely to the NN model.
- ________________ Loss function is used to update the weights during multiclass classification.
- pre-trained models are used as ___________ when the dataset is huge and similarity is also high.
- a layer that produces probabilities of a neuron in a classification
- an alternate name for threshold activation function
- One _____________ refers to show the one instance of the dataset to the NN model.
- a hyperparameter used to determine how fast the model can learn from data
- If a CNN model provides Test error = 0.22 and Train error = 0.01, then the model is an _______________ model
- a popular loss function used in adjusting the weights of a neural network
- __________ activation function is used in regression process.
- Gradient descent refer to moving towards the ______________ slope of the gradient
- a non-linear activation function that squashes the output in -1 to +1
- Activation function used to predict the binary output in the final dense layer is _________
30 Clues: No of Convolution layers used in VGG16 is • A number 26 is an example of a _____________ • In the McCulloch Pitts' model, the inputs are • __________ layer can be used to avoid overfitting • a constant used to update the net activation value • A grayscale image is an example of _______________ • an alternate name for threshold activation function • ...
Viruses Gaby ^^ 2013-05-01
Across
- Is a self-replicating program that is harmful to networks
- Gaining access to resources on devices by pretending to be a trusted computer.
- Is a form of attack that prevents users from accessing normal services.
- Are when the user damages data or equipment unintentionally.
Down
- Is technically a worm.
- Is a file or program other then a virus that is potentially harmful.
- It is distrubuted without any user intervation or knowledge
- A program written with malicious intent and sent out by attackers.
- To send harmful links or deceptive content.
- A software program that displays advertising on your computer.
10 Clues: Is technically a worm. • To send harmful links or deceptive content. • Is a self-replicating program that is harmful to networks • It is distrubuted without any user intervation or knowledge • Are when the user damages data or equipment unintentionally. • A software program that displays advertising on your computer. • ...
Wordplay123 2015-01-27
Across
- Devices like printer, keyboard, mouse, external hard disk and thumbdrives are connected to the computer using __________
- The monitor is connected to the computer using a ____________.
- It is used to read and store data.
- Hard disks may be internal or __________.
- Microsoft Excel is _______ program that can be used to calculate numerical data, store data and make charts
Down
- A computer that can be carried around easily
- this is a famous philanthropic
- This software runs the computer
- External networks or devices are connected to the computer using _________
- This is used for connection to video and game consoles.
10 Clues: this is a famous philanthropic • This software runs the computer • It is used to read and store data. • Hard disks may be internal or __________. • A computer that can be carried around easily • This is used for connection to video and game consoles. • The monitor is connected to the computer using a ____________. • ...
Network Basics 2021-02-22
Across
- computers and devices connected together Used to transfer information or files, share resources.
- rules and encoding specifications for sending data
- electronic mail – sending text, files, images between different computer networks
- Strands of glass or plastic used to transmit data using light
- a group of computers connected within a building or a campus
Down
- how the computers are connected together
- device that connects any number of LANs
- form of broadcast radio used for mobile communication
- a modem that transmits and receives data over the cable television
- A set of standards for WLANs based on IEEE 802.11
10 Clues: device that connects any number of LANs • how the computers are connected together • A set of standards for WLANs based on IEEE 802.11 • rules and encoding specifications for sending data • form of broadcast radio used for mobile communication • a group of computers connected within a building or a campus • ...
Sample 2021-02-24
Across
- Vertical series of cells in a table.
- A web page is a document or a page on the _____
- The way one slide follows the other on the screen during the slide show.
- A collection of relevant computer files stored and organised together.
- An intersection of a row and columns
Down
- Arranging files on the desktop in a proper manner.
- ___________ is a small software program that uses computer networks and takes advantage of security weaknesses to replicate.
- _____ is an online journal or diary.
- Displays data in an organised way in a document.
- Collection of information stored together on a computer.
10 Clues: Vertical series of cells in a table. • _____ is an online journal or diary. • An intersection of a row and columns • A web page is a document or a page on the _____ • Displays data in an organised way in a document. • Arranging files on the desktop in a proper manner. • Collection of information stored together on a computer. • ...
cyber security 2017-05-12
Across
- threat through natural disasters
- reviewing or reading data, information or system documentations without permission of the owner
- sending to much traffic to a particular computer system
Down
- allowing information to pass to any person or organisation without permission
- crimes that can only be carried out using computer networks or systems
- users can be denied access to services or data which they require and have the permission
- cause problems with companies for political reasons
- the technician or network manager will take the steps required to remove or reduce the vulnerability
- gaining access to computer systems
- a remote security scanning tool
10 Clues: a remote security scanning tool • threat through natural disasters • gaining access to computer systems • cause problems with companies for political reasons • sending to much traffic to a particular computer system • crimes that can only be carried out using computer networks or systems • allowing information to pass to any person or organisation without permission • ...
Information and Network Security 2023-09-08
Across
- coded message
- Cause loss of message confidentiality
- A security principle that ensures data is accessible only to those authorized to view or modify it.
- A secret combination of characters used to authenticate a user's identity
- A type of malware that spreads by duplicating itself and infecting other programs
- This Ciphers these hide the message by rearranging the letter order
- The practice of protecting computer systems and networks from digital attacks.
Down
- Causes loss of message integrity
- Plain text message may be hidden in image or sound It is not encryption
- Is most difficult attack to find out
10 Clues: coded message • Causes loss of message integrity • Is most difficult attack to find out • Cause loss of message confidentiality • This Ciphers these hide the message by rearranging the letter order • Plain text message may be hidden in image or sound It is not encryption • A secret combination of characters used to authenticate a user's identity • ...
Crossword#10 2023-07-11
Across
- - Storing and accessing data and applications remotely over the internet.
- - technology to manage business processes and operations.
- - Conducting business transactions online.
- - Creating virtual versions of computer hardware and software to increase efficiency and reduce costs.
- - Working remotely using technology to communicate and collaborate.
- - Using technology to automate routine tasks and processes.
Down
- - Protecting computer systems and networks from unauthorized access or attacks.
- - technology to manage interactions with customers.
- - computer system thatcan perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making.
- - Using data and statistical analysis to inform decision-making.
10 Clues: - Conducting business transactions online. • - technology to manage interactions with customers. • - technology to manage business processes and operations. • - Using technology to automate routine tasks and processes. • - Using data and statistical analysis to inform decision-making. • - Working remotely using technology to communicate and collaborate. • ...
Mpumalanga Crossword 2023-03-20
Across
- A type of settlement characterised by cities / towns and heavy business / industry
- A type of scale you have learnt about
- A settlement pattern you would find in a country-side area.
- North, East South and West
- The colour of the symbols representing vegetation features
Down
- An angular measurement from North in a clockwise direction
- A grouping of people, activities, building structures and communication networks that function as a single integrated system
- A type of settlement characterised by farms / mines
- A map type which portrays a specific theme - population / rainfall / temperature
- A type of symbol used to portray a road / river / boundary
10 Clues: North, East South and West • A type of scale you have learnt about • A type of settlement characterised by farms / mines • An angular measurement from North in a clockwise direction • A type of symbol used to portray a road / river / boundary • The colour of the symbols representing vegetation features • A settlement pattern you would find in a country-side area. • ...
Cross Word 2023-03-17
Across
- A password should have a minimum this number of characters
- the button which hides the window in the taskbar
- a vertical line that appears and disappears when you are about to start typing
- Supplying Water and Fertilizer to plants using these
- When we analyze a problem, first we recognize input, .........., and output
- Three functions of the mouse are select, open and ...................
Down
- every file has two components. One is the file name and the other one is ..................
- A large number of interconnected computer networks
- Don't upgrade to new devices unnecessarily
- Example of a painting software (One of the 3R methods)
10 Clues: Don't upgrade to new devices unnecessarily • the button which hides the window in the taskbar • A large number of interconnected computer networks • Supplying Water and Fertilizer to plants using these • Example of a painting software (One of the 3R methods) • A password should have a minimum this number of characters • ...
Internet Safety 2021-09-28
Across
- consisting of letters, capital letters, numbers, and symbols
- the ability for one to send private messages on a privet network
- the condition of being protected from or unlikely to cause danger, risk, or injury
- a group/system connecting everyone
Down
- the quality of being friendly, generous, and considerate to others
- threatening or being mean to someone on media websites
- a global network consisting of multiple networks
- is a secret word or phrase that must be used to gain admission to something
- sending fraudulent messages to reveal sensitive information
- the main means of mass communication on the internet from one to all
10 Clues: a group/system connecting everyone • a global network consisting of multiple networks • threatening or being mean to someone on media websites • sending fraudulent messages to reveal sensitive information • consisting of letters, capital letters, numbers, and symbols • the ability for one to send private messages on a privet network • ...
Performance Managament 2021-11-19
Across
- A global system of interconnected networks
- A collaborative network which uses the internet to join organizations
- Practice of using a network of remote servers hosted on the Internet
- Process of thinking regarding the activities required to achieve a desired goal
- An internal network used to share information
Down
- Regarded as the cognitive process resulting in the selection of a course of action
- A network security system
- Method of representing data in a visual, machine readable form
- Can be used to assess the benefits of the system
- An organizational system designed to collect and analyze data
10 Clues: A network security system • A global system of interconnected networks • An internal network used to share information • Can be used to assess the benefits of the system • An organizational system designed to collect and analyze data • Method of representing data in a visual, machine readable form • ...
The Mayan's 2024-01-22
Across
- This dense forest is where they find their meat, skin, feathers
- This place has a hot, wet climate
- They lived in the tropical rain forest/they used farming methods
- Nobles controlled large plots where corn was grown
- The Mayan's worshiped many gods, most of them represent forces of nature, such as rain and lightning
Down
- Was a strip of land connecting Asia and North America
- in the highlands this has produced rich soils obsidian
- This is where the Mayans lived
- Have warm temperatures year-round and rain from April to October
- Traveling Merchants linked Mayan cities in large TRADE networks
10 Clues: This is where the Mayans lived • This place has a hot, wet climate • Nobles controlled large plots where corn was grown • Was a strip of land connecting Asia and North America • in the highlands this has produced rich soils obsidian • This dense forest is where they find their meat, skin, feathers • Traveling Merchants linked Mayan cities in large TRADE networks • ...
Web development crosswords 2024-11-17
Across
- The process of converting data into a secure code to prevent unauthorized access.
- A dishonest scheme to steal money or information.
- A digital barrier designed to protect networks from unauthorized access.
- The trail of data left behind by a person's online activity.
Down
- Fraud involving the unauthorized use of someone's personal information.
- Revealing too much personal information, especially online.
- Using digital platforms to harm or intimidate others.
- A model or prototype used to test or showcase a design concept.
- Unauthorized access to a computer system or network.
- Unwanted or irrelevant messages, often sent in bulk.
10 Clues: A dishonest scheme to steal money or information. • Unauthorized access to a computer system or network. • Unwanted or irrelevant messages, often sent in bulk. • Using digital platforms to harm or intimidate others. • Revealing too much personal information, especially online. • The trail of data left behind by a person's online activity. • ...
Set 4 2024-11-21
Across
- A cryptographic method to verify the authenticity of a transaction.
- A fault tolerance mechanism used to address trust issues in distributed networks.
- A type of blockchain managed by multiple organizations.
- A decentralized application built on a blockchain network.
- A protocol ensuring privacy by proving knowledge of a value without revealing it.
Down
- A data structure used to efficiently verify transactions in a blockchain.
- The process of locking tokens to support blockchain operations in PoS.
- The programming logic that governs blockchain agreements.
- The network architecture used in decentralized blockchains.
- A blockchain that combines public and private elements.
10 Clues: A blockchain that combines public and private elements. • A type of blockchain managed by multiple organizations. • The programming logic that governs blockchain agreements. • A decentralized application built on a blockchain network. • The network architecture used in decentralized blockchains. • ...
Network & System Administration Crossword Challenge 2024-12-08
Across
- Keeping systems functional through regular updates and repairs.
- Making different operating systems work together seamlessly.
- A service used to store and manage organizational data in a structured way.
- Automating repetitive tasks in system administration.
Down
- A principle focused on guiding systems back to their stable state.
- The organization of hardware, software, and networks in a system.
- A system management concept inspired by how the human body defends itself.
- A model where one main system manages the network, often simplifying administration.
- A set of rules or guidelines to manage systems.
- Adjusting settings to ensure systems work correctly.
10 Clues: A set of rules or guidelines to manage systems. • Adjusting settings to ensure systems work correctly. • Automating repetitive tasks in system administration. • Making different operating systems work together seamlessly. • Keeping systems functional through regular updates and repairs. • The organization of hardware, software, and networks in a system. • ...
Technology 2025-04-01
Across
- car Vehicle that runs without gasoline
- Entertainment and news broadcasting medium
- Essential source of energy for the operation of many appliances.
- Portable device that allows you to make calls and send messages.
- conditioning Device that regulates the temperature of an enclosed space.
Down
- Exchange of information between two or more people.
- A system that allows people or goods to be moved from one place to another.
- A global network that facilitates access to information and communication.
- networks A place where users can share photos, videos, and follow friends or celebrities.
- Electronic machine used for work, study, and play.
10 Clues: car Vehicle that runs without gasoline • Entertainment and news broadcasting medium • Electronic machine used for work, study, and play. • Exchange of information between two or more people. • Essential source of energy for the operation of many appliances. • Portable device that allows you to make calls and send messages. • ...
Techy Word Search Challenge 2024-04-16
Across
- Information stored and processed by computers, like numbers, text, or images.
- Writing instructions for a computer using a programming language.
- Machines that can move, sense, and interact with their environment.
- The physical parts of a computer that you can touch and see.
- A global network that connects computers worldwide.
Down
- Protecting computers, networks, and data from cyberattacks.
- Instructions for a computer's next move in a game.
- Intelligence: Computers that can learn, reason, and make decisions like humans.
- Programs that make computers work, like games, word processors, or music players.
- Turning information into a secret code to keep it safe from hackers.
10 Clues: Instructions for a computer's next move in a game. • A global network that connects computers worldwide. • Protecting computers, networks, and data from cyberattacks. • The physical parts of a computer that you can touch and see. • Writing instructions for a computer using a programming language. • ...
MAJOR 2023-01-23
Across
- small device that use in order to point to a place on a display screen
- a wireless technology used to connect computers, smartphones and other devices to the internet
- device that connects two or more packet-switched networks or subnetworks
- act of identifying and then exploiting weaknesses in a computer system or network
Down
- The maximum amount of data transmitted over an internet connection in a given amount of time
- process of creating instructions using programming languages
- a device to input characters and number
- portable computer
- electro-mechanical data storage device
- part of a computer that does most of the data processing
10 Clues: portable computer • electro-mechanical data storage device • a device to input characters and number • part of a computer that does most of the data processing • process of creating instructions using programming languages • small device that use in order to point to a place on a display screen • ...
Cables and Insulators 2023-01-04
Across
- -----providing an earthing shield to the current-carrying conductors
- ---- efficiency of a suspension insulator
- ------- is improved by grading of insulator
- is to provide a lower refractive index at the core interface in order to cause reflection in fibre optics
Down
- insulators used in distribution networks with low voltage
- -----insulator isolates a wire from physical support
- used for higher voltage applications and similar to pin type
- is more flexible in comparison to armoring
- ----insulators are used for V > 11 kV (High)transmission systems
- is the process of equalizing the stress in the dielectric of the cable
10 Clues: ---- efficiency of a suspension insulator • is more flexible in comparison to armoring • ------- is improved by grading of insulator • -----insulator isolates a wire from physical support • insulators used in distribution networks with low voltage • used for higher voltage applications and similar to pin type • ...
Communication 2025-09-19
Across
- Real-time online conversation between two or more people
- The global system of interconnected computer networks
- Abbreviation for rules that define how data is transmitted over a network
- Short text-based messages sent via cell phones or instant messaging apps
- Software that allows users to access and navigate the World Wide Web
Down
- A document or message that is attached to an email
- A meeting conducted over the Internet using video and audio
- Messages sent electronically over the Internet, usually requiring an address
- A virtual space where people can post and interact
- The 'cc' in an email stands for
10 Clues: The 'cc' in an email stands for • A document or message that is attached to an email • A virtual space where people can post and interact • The global system of interconnected computer networks • Real-time online conversation between two or more people • A meeting conducted over the Internet using video and audio • ...
Circuit IT Grid 2025-11-20
Across
- IT devices require rare earth metals and minerals
- Are actions that protect the environment
- network infrastructure require large amounts of electricity
Down
- It is to ensure that the proper recycling is being implemented
- the surroundings or conditions in which a person, animal, or plant lives or operates
- One example of this is The global internet—cell towers, routers, Wi-Fi networks
- the action of one object coming forcibly into contact with another.
- It is a best way to avoid toxic pollution
- the proper handling, recycling, and disposal of discarded electronic devices
- Factories emit greenhouse gases and generate chemical waste.
10 Clues: Are actions that protect the environment • It is a best way to avoid toxic pollution • IT devices require rare earth metals and minerals • network infrastructure require large amounts of electricity • Factories emit greenhouse gases and generate chemical waste. • It is to ensure that the proper recycling is being implemented • ...
COMPUTERS, OPERATING SIYSTEMS AND NETWORKS 2020-12-22
Across
- also called Memory Pen or Pendrive
- It is a set of applications that allow a programmer to develop their own computer programs using their logical knowledge and programming languages
- It is the software that allows us to have an interaction with our hardware, that is, the one that controls the CPU and peripherals; It is also called an operating system
- An application that has multiple programs
- it is the storage medium par excellence. Since the first hard disk came out in 1955 until today, the hard disk or HDD has had a great development
Down
- Based on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function
- These are the programs that allow us to perform specific tasks in our system
- Random Access Memory
- also known as mainboard
9 Clues: Random Access Memory • also known as mainboard • also called Memory Pen or Pendrive • An application that has multiple programs • These are the programs that allow us to perform specific tasks in our system • Based on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function • ...
Privacy in online social networks 2022-06-16
Across
- which is the privacy settings is not peculiar to Twitter?
- Which is not a privacy feature on Instagram?
- Which social media company just announced the global launch of ‘Take a Break’, which includes India?
- Which of these is usually not kept private on social media?
- which technology field is concerned with social media privacy?
Down
- Which country proposed the ‘Social Media (Basic Expectations and Defamation) Bill 2021’?
- which social media platform launched SMBSaathi Utsav to support small businesses?
- How should you make your Facebook account private and secure?
- which privacy settings is peculiar to Whatsapp?
9 Clues: Which is not a privacy feature on Instagram? • which privacy settings is peculiar to Whatsapp? • which is the privacy settings is not peculiar to Twitter? • Which of these is usually not kept private on social media? • How should you make your Facebook account private and secure? • which technology field is concerned with social media privacy? • ...
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- a method, often secret, of bypassing normal authentication in a product.
- any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- an attempt by hackers to damage or destroy a computer network or system.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- are small files that Web sites put on your computer hard disk drive when you first visit.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
19 Clues: designed to detect and destroy computer viruses. • a method, often secret, of bypassing normal authentication in a product. • an attempt by hackers to damage or destroy a computer network or system. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Internet saftey 2025-02-26
Across
- the information about a particular person that exists on the internet as a result of their online activity.
- to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
- Flaming is distinct from trolling, which is the act of someone causing discord online or in person.
- the correct or acceptable way of communicating on the internet.
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- controls available on many websites and apps to limit who can access your profile and what information visitors can see.
- talk in a friendly and informal way.
- the practice of protecting systems, networks, and programs from digital attacks.
- the practice of preparing or training someone for a particular purpose or activity.
Down
- shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
- the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
- using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- A blog is a space where an individual, group, or organization can publish articles (also known as posts) on a regular basis. Blogs tend to include timely, relevant and updated content.
- attention-seeking behavior
- remembering your preferences, recording what you have put in your shopping basket, and counting the number of people looking at a website.
- unauthorized reproduction or distribution of someone's intellectual property without their consent.
- Ransomware is a type of malware (malicious software) designed to deny access to a user's data, usually by encrypting the data with a key known only to the hacker who deployed the malware, until a ransom is paid. Since 2018, there has been a 264% increase in large breaches reported to OCR involving ransomware attack
- a person who ruthlessly exploits others.
- someone who uses the internet, email, or other electronic communications devices to repeatedly threaten and harass another person.
19 Clues: attention-seeking behavior • talk in a friendly and informal way. • a person who ruthlessly exploits others. • the correct or acceptable way of communicating on the internet. • the practice of protecting systems, networks, and programs from digital attacks. • the practice of preparing or training someone for a particular purpose or activity. • ...
Computer hardware 2022-09-30
Across
- A mesh network is a local area network topology in which the infrastructure nodes connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to efficiently route data to and from clients
- a computer system capable of delivering web content to end users over the internet via a web browser.
- networking device that allows wireless-capable devices to connect to a wired network.
- A network switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic
Down
- a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.
- the core piece of hardware used for networking connectivity
- A star network is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star network is one of the most common computer network topologies.
- a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
- A wide area network is a telecommunications network that extends over a large geographic area. Wide area networks are often established with leased telecommunication circuits.
- a series of computers linked together to form a network in a circumscribed location.
12 Clues: the core piece of hardware used for networking connectivity • a series of computers linked together to form a network in a circumscribed location. • networking device that allows wireless-capable devices to connect to a wired network. • a computer system capable of delivering web content to end users over the internet via a web browser. • ...
Cat terms 2023-10-19
Across
- You look at this screen to see what's happening on your computer.
- A common pointing device used to control the cursor.
- A screen that responds to touch.
- Where your files and data are stored on a computer.
- Programs and apps fall into this category.
- Produces sound output from your computer.
- Used to record audio input, like voice.
- Physical components like the monitor, keyboard, and mouse.
Down
- Used for video conferencing and capturing video input
- Connects your computer to the internet.
- It provides results or information from the computer.
- The "brain" of your computer where processing occurs.
- It routes data between networks in your home.
- Common port for connecting peripherals to a computer.
- A common input device for computers and laptops
- This device allows you to enter data into your computer.
- This device converts physical documents into digital format.
- It produces a hard copy of documents or images.
- The part of a computer where information is shown.
19 Clues: A screen that responds to touch. • Connects your computer to the internet. • Used to record audio input, like voice. • Produces sound output from your computer. • Programs and apps fall into this category. • It routes data between networks in your home. • A common input device for computers and laptops • It produces a hard copy of documents or images. • ...
REVIEW 2020-04-13
Across
- hardware of the supply chain
- practice of subcontracting overseas
- protects your idea
- buying many components and building something bigger
- transport networks service utilities
- final form of intellectual property rights
- an innovation in the use of a new product or service
- in terms of operations, how many flows have to operate?
- practice of employing another business
Down
- buy in large quantitiesof raw materials and turning them into smaller products
- managers need to do their utmost to prevent further damage
- refers to an organizations attemps to put in place procedures to deal with a crisis
- systematic steps and efforts by an organizationto limit the damage from a sudden crisis
- software of the supply chain
- form of innovation directly associated with the technical development of existing products
- protects written material and artis forms
- wide system of connected organizations
- cintingency planning will have to assess a range of pssible
- traditional method of stock control
19 Clues: protects your idea • hardware of the supply chain • software of the supply chain • practice of subcontracting overseas • traditional method of stock control • transport networks service utilities • wide system of connected organizations • practice of employing another business • protects written material and artis forms • final form of intellectual property rights • ...
Chapter 8 Security Plus 2024-03-20
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Networking concepts 2023-08-11
Across
- a method of connecting to a network like a company network across an unsecure network.
- uses laser technology to send one beam of light.
- receives data on one port and sends to all other ports.
- commonly uses Bluetooth to connect mice, keyboards, phones, and tablets.
- Very little overhead or data checking.
- used in cable TV systems and satellite communication systems.
- connects networks.
- extends beyond traditional LAN and groups users based on administratively defined boundaries.
- can support up to 100 Mbps.
Down
- always-on technology that uses phone lines.
- relies on cell towers to create a network used by cell phones and connectivity to the internet.
- passive or active tags used to identify items.
- wire strippers, wire cutters, tone generators, etc.
- a network that spans the city.
- uses different frequencies to send multiple signals over media
- provides access to a wireless network for a limited range.
- broadband technology for remote areas.
- device built into something else, like an appliance.
- translates domain names to an IP address.
19 Clues: connects networks. • can support up to 100 Mbps. • a network that spans the city. • Very little overhead or data checking. • broadband technology for remote areas. • translates domain names to an IP address. • always-on technology that uses phone lines. • passive or active tags used to identify items. • uses laser technology to send one beam of light. • ...
Braymond-Network devices 2023-01-03
Across
- regenerates weak signals.
- builds apon ids technology
- receive data on one port and then send it out to all other ports
- network systems that are no longer supported but still in operation
- monitors all the end devices in your network
- allows network administrators to manage network devices
- uses existing power writing to connect devices
Down
- protects data and equipment on a network from unauthorized access
- provides network access to wireless devices such as laptops and tablets
- use ip addresses to forward traffic to other networks
- performs the important function of addressing data.
- low cost, microsegments a LAN
- passively monitors traffic on the network
- all in one security appliance
- distributed denial of service
- place to collect incoming cable runs from the various networking devices
- denial of survice
- method for powering devices that don't have a battery
- keeps a record of all the devices on each segment
19 Clues: denial of survice • regenerates weak signals. • builds apon ids technology • low cost, microsegments a LAN • all in one security appliance • distributed denial of service • passively monitors traffic on the network • monitors all the end devices in your network • uses existing power writing to connect devices • keeps a record of all the devices on each segment • ...
OBretoi - Network devices 2023-01-03
Across
- Protects data and equipment from unauthorized access on a network
- power over _________
- a _____ based network system allows network administrators to manage network devices
- a patch panel connects _____
- receives data on one port and sends it out on all the other ports
- ethernet over power also known as ______ networking
- a Bridge ______ a LAN into segments
- provides all the functionality of a IDS and IPS as well as firewall services.
Down
- a repeater regenerates the strength of a weak _____
- a wireless access point provides connectivity to only the ______
- micro segments a lan
- The I in NIC
- systems that are no longer supported
- a IDS _____ a malicious traffic to pass before addressing
- copies and sends traffic to a management station
- uses ip addresses to connect other networks
- a ______ management server puts the view of all devices on a single interface
- a _____ microchip is normally dedicated to a specific task
- evaluates traffic before sending it to the destination
19 Clues: The I in NIC • micro segments a lan • power over _________ • a patch panel connects _____ • a Bridge ______ a LAN into segments • systems that are no longer supported • uses ip addresses to connect other networks • copies and sends traffic to a management station • a repeater regenerates the strength of a weak _____ • ethernet over power also known as ______ networking • ...
Chapter 9 Crossword 2024-10-24
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
The Internet 2022-01-14
Across
- The standard way to connect computers on a network over a wired connection.
- Application software for accessing the world wide web.
- A vast network that connects computers all over the world.
- A hypertext document on the world wide web
- A series of numbers that identifies any device on a network
- The address of a webpage
Down
- A software program that helps people find the information they are looking for online using keywords or phrases.
- A networking device that forwards data packets between computer networks
- Two or more computers linked together.
- A wireless technology used to connect electronic devices.
10 Clues: The address of a webpage • Two or more computers linked together. • A hypertext document on the world wide web • Application software for accessing the world wide web. • A wireless technology used to connect electronic devices. • A vast network that connects computers all over the world. • A series of numbers that identifies any device on a network • ...
supplier buyer relationships 2013-02-18
Across
- / moving beyond local & national levels of trade
- / raw materials and products arrive in time for manufacturing or services
- / a company which supplies parts or services to another company
- / a role of logistics
- / process after choosing supplier
- / procurement strategy in which businesses look to find most cost efficient location
- / any person who who contracts to acquire an asset
Down
- / firm with little or no presence or infrastructure reliant on telecoms and networks
- / managing the flow of goods, information and finances from the source to the buyer
- / delighting the customer by fully meeting their needs and expectations
10 Clues: / a role of logistics • / process after choosing supplier • / moving beyond local & national levels of trade • / any person who who contracts to acquire an asset • / a company which supplies parts or services to another company • / delighting the customer by fully meeting their needs and expectations • ...
INTEGRITY CHALLENGE 2023-03-14
Across
- Principles or standards of behavior.
- Take responsibility.
- Giving up or losing something as a penalty for wrongdoing.
- Being upright.
- Stop corruption from happening or arising.
- Interruption of corruption networks, activity, or processes.
Down
- Take advantage or gain in a dishonest manner in the performance of public duties/ Payment for services performed in an official matter where no compensation is due for personal gain.
- Concealing the origins of (money obtained illegally), typically by transfers involving foreign banks or legitimate businesses.
- Guiding or directing a group of people or an organization.
- Compelling observance of or compliance with the law.
10 Clues: Being upright. • Take responsibility. • Principles or standards of behavior. • Stop corruption from happening or arising. • Compelling observance of or compliance with the law. • Guiding or directing a group of people or an organization. • Giving up or losing something as a penalty for wrongdoing. • Interruption of corruption networks, activity, or processes. • ...
Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29
Across
- Sharing someone’s secrets or embarrassing information online
- A hostile and insulting interaction between internet users.
- An image that is captured of what is shown on a phone, tablet, or computer screen
- A technology that allows us to access our files through the internet from anywhere in the world.
- An Internet service that helps you search for information on the web
- Someone who posts rude or off-topic messages in an online community
Down
- Online communities, also known as social networks
- Setting up a fake online profile
- malware,cyber-destroyer, break your technology
- Rules or manners for interacting courteously with others online
10 Clues: Setting up a fake online profile • malware,cyber-destroyer, break your technology • Online communities, also known as social networks • A hostile and insulting interaction between internet users. • Sharing someone’s secrets or embarrassing information online • Rules or manners for interacting courteously with others online • ...
TECHNOLOGY 2021-10-07
Across
- introducing or using new ideas, ways of doing something, etc.
- no longer used because something new has been invented
- too important to be without
- having a good knowledge and understanding of modern technology, especially computers
- a person who fears, dislikes or avoids new technology
Down
- the utilization of imagination or original ideas to generate something
- develop (something) to a higher standard, especially (equipment or machinery) by adding or replacing components
- of only average quality, not very good
- a small tool or device that does something useful
- relating to, or involving computers or computer networks (as the Internet)
10 Clues: too important to be without • of only average quality, not very good • a small tool or device that does something useful • a person who fears, dislikes or avoids new technology • no longer used because something new has been invented • introducing or using new ideas, ways of doing something, etc. • ...
Directions: Use the clues below to fill in the crossword puzzle with the correct words. 2022-05-07
Across
- To sing, dance, act, read a poem, etc. in front of people.
- The first public appearance of a new product or show
- To organized people or things into a group or body.
- Very, very strong feeling
- How you are liked, admired, supported by many people.
Down
- Being one part of something.
- More than two but not many.
- To do something you really wanted to do.
- Made a song, movie or recording available for people to buy or listen to, read, watch, etc.
- media Websites and apps (applications) that that let people create and share things online, or to join social networks.
10 Clues: Very, very strong feeling • More than two but not many. • Being one part of something. • To do something you really wanted to do. • To organized people or things into a group or body. • The first public appearance of a new product or show • How you are liked, admired, supported by many people. • To sing, dance, act, read a poem, etc. in front of people. • ...
Cyber bullying 2023-10-26
Across
- , sending messages from a mobile phone
- , form of cyber bullying
- , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
- , a social media app that lets you take and upload photos for people to like, comment on and share
- , social media website beginning with F
Down
- , intentional emotional harm through devices like computers and phones
- , a wireless handheld device used for calls and messaging
- , making a statement of intention to cause harm to someone
- , an image showing what is on a phone or computer screen
- , words or actions intended to annoy, or abuse others
10 Clues: , form of cyber bullying • , sending messages from a mobile phone • , social media website beginning with F • , words or actions intended to annoy, or abuse others • , an image showing what is on a phone or computer screen • , a wireless handheld device used for calls and messaging • ...
Basic IT 2024-05-09
Across
- Device that connects two or more networks together
- ______ technology uses computers to control physical processes
- A network within a small area
- The "A" in CIA Triad
- Used for remote monitoring and control of field devices
- Monitors and controls processes both locally and remotely by collecting, recording, and analyzing data in real time
Down
- ______ Logic Controller is a ruggedized computer used for industrial automation that automate a specific process or machine function
- A computer that runs centralized applications and databases
- Collection of instructions that enable machines to perform specific tasks
- connects devices in a network to each other, enabling them to communicate
10 Clues: The "A" in CIA Triad • A network within a small area • Device that connects two or more networks together • Used for remote monitoring and control of field devices • A computer that runs centralized applications and databases • ______ technology uses computers to control physical processes • Collection of instructions that enable machines to perform specific tasks • ...
1 2024-01-31
Across
- Placing text on a webpage that is invisible to users but readable by search engines.
- Redirecting users to irrelevant or unrelated webpages for SEO gain.
- Creating low-quality pages optimized for specific keywords to funnel traffic.
- Unethical techniques used to manipulate search engine rankings.
- Showing different content to search engines than what users see.
Down
- Excessively using keywords to manipulate search engine algorithms.
- Copying content from other websites without permission for SEO purposes.
- Deliberately harming competitors' search engine rankings through malicious tactics.
- Overloading websites with irrelevant links to artificially boost rankings.
- Creating networks of blogs solely for the purpose of link manipulation.
10 Clues: Unethical techniques used to manipulate search engine rankings. • Showing different content to search engines than what users see. • Excessively using keywords to manipulate search engine algorithms. • Redirecting users to irrelevant or unrelated webpages for SEO gain. • Creating networks of blogs solely for the purpose of link manipulation. • ...
Theme: Computers 2024-07-24
Across
- A small handheld device used to control a cursor on a computer screen
- A screen used to display information from a computer
- Software designed to detect and destroy computer viruses
- The part of a computer that performs calculations
Down
- A set of keys used to input data into a computer
- Programs and other operating information used by a computer
- A device that forwards data packets between computer networks
- A device that produces printed copies of documents
- A device used to store data on a computer
- A common interface used to connect devices to a computer
10 Clues: A device used to store data on a computer • A set of keys used to input data into a computer • The part of a computer that performs calculations • A device that produces printed copies of documents • A screen used to display information from a computer • Software designed to detect and destroy computer viruses • ...
LOGIC LATTICE 2024-02-16
Across
- Measures taken to protect computer systems and networks from unauthorized access or attacks.
- Software used to access and view websites on the internet.
- The manipulation of matter on an atomic or molecular scale.
Down
- Digital or virtual currency that uses cryptography for security.
- A structured set of data stored electronically.
- Software that is embedded into hardware devices.
- A security system that monitors and controls incoming and outgoing network traffic.
- Programs and applications that run on computers and other devices.
- The process of converting data into a code to prevent unauthorized access.
- A step-by-step procedure for solving a problem.
10 Clues: A structured set of data stored electronically. • A step-by-step procedure for solving a problem. • Software that is embedded into hardware devices. • Software used to access and view websites on the internet. • The manipulation of matter on an atomic or molecular scale. • Digital or virtual currency that uses cryptography for security. • ...
!WARNING! VERY DIDFICULT - Kalim, Andrija 2024-10-15
Across
- a law that says that people cant go outside after a particular time of night
- it can wash and dry clothes
- space for plqying and enjoying games
- place where poeple can gather,relax and sozialize
- a small machine used for drying your hair
Down
- sheets and pillowcase for a bed
- a secure storage where people can temporarily store their items
- an internacionalni computer network connecting other networks and computers that allowy people to share information
- a service that allows people to rent towels for temporary use
- a building in which collections of books,newspapers and films can be borrowed
10 Clues: it can wash and dry clothes • sheets and pillowcase for a bed • space for plqying and enjoying games • a small machine used for drying your hair • place where poeple can gather,relax and sozialize • a service that allows people to rent towels for temporary use • a secure storage where people can temporarily store their items • ...
iSec CrossWord 2024-11-27
Across
- software tool designed to detect and remove malicious software
- Formal review to ensure that security measures are effective and policies are followed
- A strategy for protecting sensitive data while it’s being transmitted across networks
- framework for managing organizational risks
Down
- The process of verifying the identity of a user or system
- Information that directly or indirectly links to a person is considered
- A system used to monitor and control network traffic
- legal requirement for companies processing EU citizens’ data.
- An international standard for information security management systems.
- cyberattack that floods a network to make it unavailable.
10 Clues: framework for managing organizational risks • A system used to monitor and control network traffic • The process of verifying the identity of a user or system • cyberattack that floods a network to make it unavailable. • legal requirement for companies processing EU citizens’ data. • software tool designed to detect and remove malicious software • ...
5G pillars 2024-11-20
Across
- The maximum data transfer rate of a network.
- The range of frequencies used for wireless communication.
- Enhanced mobile broadband for faster and higher-capacity internet.
- Slicing Technology that allows the creation of multiple virtual networks.
- The delay in transmitting and receiving data in a 5G network.
Down
- IoT A 5G pillar enabling connectivity for billions of devices.
- Computing Processing data near the source rather than in a centralized location.
- Technology using multiple antennas to improve communication in 5G.
- Ultra-reliable low-latency communication in 5G systems.
- The intermediate connection between the core network and the local network.
10 Clues: The maximum data transfer rate of a network. • Ultra-reliable low-latency communication in 5G systems. • The range of frequencies used for wireless communication. • The delay in transmitting and receiving data in a 5G network. • IoT A 5G pillar enabling connectivity for billions of devices. • Technology using multiple antennas to improve communication in 5G. • ...
Lesson 3 2025-03-04
Across
- A protocol required to access the Internet
- A device that connects private LANs to public WANs
- A device that forwards data packets between networks
- A type of network that covers a small geographic area, like a university
- The process of copying a file from a server to your device
Down
- The process of continuously receiving a file in a steady flow
- The technology used to connect computers using cables
- A local network that supports wireless connections
- A wide area network that covers large geographical regions
- A unique identifier for a device connected to a network
10 Clues: A protocol required to access the Internet • A device that connects private LANs to public WANs • A local network that supports wireless connections • A device that forwards data packets between networks • The technology used to connect computers using cables • A unique identifier for a device connected to a network • ...
Tech Crosswords 2025-09-19
Across
- A system of remote servers for storing data online.
- A device that forwards data packets between computer networks.
- A single point in a graphic image.
- A set of instructions for a computer.
- A hardware or software component that stores data so that future requests for that data can be served faster.
Down
- A step-by-step procedure for solving a problem.
- A popular programming language named after a comedy troupe.
- A computer or system that provides resources or services to other computers.
- The address of a resource on the Internet.
- An organized collection of structured data.
10 Clues: A single point in a graphic image. • A set of instructions for a computer. • The address of a resource on the Internet. • An organized collection of structured data. • A step-by-step procedure for solving a problem. • A system of remote servers for storing data online. • A popular programming language named after a comedy troupe. • ...
CAT Concepts Crossword 2025-09-24
Across
- A type of memory that is temporary and loses data when power is off.
- The process of copying data to a storage device for future use.
- The physical parts of a computer are known as ___.
- Data sent over the internet is broken into small units called ___.
- A set of rules used for communication between devices.
- The main circuit board of a computer.
- A popular spreadsheet application used in CAT.
Down
- Software that is designed to harm or disrupt a system.
- The global system of interconnected computer networks.
- This person writes and tests code to create software applications.
10 Clues: The main circuit board of a computer. • A popular spreadsheet application used in CAT. • The physical parts of a computer are known as ___. • Software that is designed to harm or disrupt a system. • The global system of interconnected computer networks. • A set of rules used for communication between devices. • ...
CAT Concepts Crossword 2025-09-24
Across
- A type of memory that is temporary and loses data when power is off.
- The process of copying data to a storage device for future use.
- The physical parts of a computer are known as ___.
- Data sent over the internet is broken into small units called ___.
- A set of rules used for communication between devices.
- The main circuit board of a computer.
- A popular spreadsheet application used in CAT.
Down
- Software that is designed to harm or disrupt a system.
- The global system of interconnected computer networks.
- This person writes and tests code to create software applications.
10 Clues: The main circuit board of a computer. • A popular spreadsheet application used in CAT. • The physical parts of a computer are known as ___. • Software that is designed to harm or disrupt a system. • The global system of interconnected computer networks. • A set of rules used for communication between devices. • ...
InfoSec Puzzle Quest 2025-09-04
Across
- A type of malicious software that can replicate and spread.
- Security Protecting data and systems hosted on remote servers.
- Following rules, regulations, and standards in cybersecurity.
- A formal review of systems and processes to ensure security and compliance.
- Manipulating people into giving up confidential information.
Down
- The practice of protecting systems, networks, and data from digital threats.
- Ensuring data is accurate and has not been tampered with.
- Surfing A sneaky way to steal information by watching someone type their password.
- An unexpected event that compromises the integrity or availability of data.
- Software designed to detect and remove malicious programs.
10 Clues: Ensuring data is accurate and has not been tampered with. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • Following rules, regulations, and standards in cybersecurity. • ...
InfoSec Puzzle Quest 2025-09-04
Across
- A type of malicious software that can replicate and spread.
- Software designed to detect and remove malicious programs.
- A formal review of systems and processes to ensure security and compliance.
- Manipulating people into giving up confidential information.
Down
- A sneaky way to steal information by watching someone type their password.
- The practice of protecting systems, networks, and data from digital threats.
- Protecting data and systems hosted on remote servers.
- Following rules, regulations, and standards in cybersecurity.
- An unexpected event that compromises the integrity or availability of data.
- Ensuring data is accurate and has not been tampered with.
10 Clues: Protecting data and systems hosted on remote servers. • Ensuring data is accurate and has not been tampered with. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • Following rules, regulations, and standards in cybersecurity. • ...
Lock & Key: An Information Security Challenge 3 2025-12-01
Across
- Software designed to detect and remove malicious programs.
- Following rules, regulations, and standards in cybersecurity.
- Manipulating people into giving up confidential information.
- The practice of protecting systems, networks, and data from digital threats.
- Protecting data and systems hosted on remote servers.
Down
- A sneaky way to steal information by watching someone type their password.
- Ensuring data is accurate and has not been tampered with.
- An unexpected event that compromises the integrity or availability of data.
- A type of malicious software that can replicate and spread.
- A formal review of systems and processes to ensure security and compliance.
10 Clues: Protecting data and systems hosted on remote servers. • Ensuring data is accurate and has not been tampered with. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • Following rules, regulations, and standards in cybersecurity. • ...
Aliyah Caballero 2013-03-27
Across
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- (HOST)Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
- Network etiquette; Online manners; following the rules of conduct for online or internet users, being a good digital citizen.
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
- An unauthorized person who secretly gains access to computer files.
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
Down
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- To renew or revitalize; To reload a webpage on the internet
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
12 Clues: To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files. • NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram) • ...
Review: Internet Threats 2016-07-14
Across
- / used to record the keystrokes done by user
- / a crime committed through the use of internet
- / tricks the user into posing that it is a security software
- / a malicious software
- / runs in the background and monitors what you are doing
- / sends an official looking email and is designed to steal sensitive personal information
- / designed to send advertisements
- / also called the information superhighway
- / malicious program that transfer from one computer to the other by any means
Down
- / a browsing feature that is synonymous to private browsing
- / replicates and can transfer from one computer to the other through the internet and local networks or data storage
- / the use of electronic communication to bully a person
- / expoits the DNS system
- / unwanted email mostly from bots or advertisers
- / disguised as useful program but is not
15 Clues: / a malicious software • / expoits the DNS system • / designed to send advertisements • / disguised as useful program but is not • / also called the information superhighway • / used to record the keystrokes done by user • / a crime committed through the use of internet • / unwanted email mostly from bots or advertisers • ...
Virus- Alexis Goodney 2018-11-15
Across
- an unwanted piece of software that does something to your computer
- a person who uses computers to gain unauthorized info
- messages distributed to recipients via a network
- collection of data instructions that tells a computer what to do
- good hacker who hacks to find out how a companies system is faulty
- protection of computer systems
Down
- blocking servers, clogging up networks so they can't get to real costumers
- a strategy that pretends to be something it isn't
- violates security for personal gain
- something that enters your network's system then duplicates itself and spreads via the network
- programming instructions
- the attempt to obtain personal information by disguising yourself as a reliable company
- a reason why someone might send you a virus
- software intended to disable computers
- a type of computer virus
15 Clues: programming instructions • a type of computer virus • protection of computer systems • violates security for personal gain • software intended to disable computers • a reason why someone might send you a virus • messages distributed to recipients via a network • a strategy that pretends to be something it isn't • a person who uses computers to gain unauthorized info • ...
Globalisation 2013-02-20
Across
- basic, underlying framework or features of a system or organization
- process or act of migrating
- act of globalizing, or extending to other or all parts of the world
- investing of money or capital
- computer network linking smaller computer networks worldwide
Down
- person or thing that consumes
- beyond national boundaries or interests
- particular form or stage of civilization
- act or instance of integrating a racial, religious, or ethnic group
- convey (cargo) in standard-sized containers
- management; frugality in the expenditure or consumption of money, materials
- act or process of buying, selling, or exchanging commodities
- right or license granted by a company to an individual or group to market its products
- quality or state of being sovereign
- natural body that revolves around a planet
15 Clues: process or act of migrating • person or thing that consumes • investing of money or capital • quality or state of being sovereign • beyond national boundaries or interests • particular form or stage of civilization • natural body that revolves around a planet • convey (cargo) in standard-sized containers • act or process of buying, selling, or exchanging commodities • ...
Andalucia 2014-01-06
Across
- Andalucia is located __________ of the Iberian Peninsula
- Andalucia is located _________ of the Atlantic Ocean and Portugal
- A continuing tradition along the coasts of Andalucia
- Andalucia's capital
- Andalucia experiences a _______________ climate
- What are old mosques used for in Andalucia?
- Andalucia is located in __________
- A town located in Andalucia that has a lot of history to see
Down
- Andalucia came under ________ control in the 8th Century when Arab raiders from the East captured the region from the German Visigoths.
- Andalucia consists of _____ provinces
- Andalucia has a population of about 8.45 ________
- Andalucia is one of the ________ independent communities of Spain
- Civil War The country's losses in the Napoleonic and the Spanish-American Wars caused which war to begin?
- Banus A luxury marina and shopping complex located in Andalucia
- Networks A type of transportation within Andalucia
15 Clues: Andalucia's capital • Andalucia is located in __________ • Andalucia consists of _____ provinces • What are old mosques used for in Andalucia? • Andalucia experiences a _______________ climate • Andalucia has a population of about 8.45 ________ • Networks A type of transportation within Andalucia • A continuing tradition along the coasts of Andalucia • ...
Chapter 7 Building Vocabulary 2023-02-10
Across
- Fifth principle of vocabulary building that relates to exposure
- For maximum benefit, it is important that experiences be
- form the foundation of vocabulary
- A word family is a core word plus it's endings
- Part of developing a depth of understanding of words is clarifying
- attributes of learning a word are meaning, pronunciation, spelling, morphology, and syntax
Down
- Teachers have to help students forge among new words
- Words are learned gradually and in
- Something between a known concept and a new label for that context
- Words are learned faster when introduced at the level
- teaching readers new strategies to derive meanings of words helps them become better independent word learners
- Most frequent method of teaching new words
- Number of encounters before a word is learned
- Generating __ in new words is important
- Concepts are organized into
15 Clues: Concepts are organized into • form the foundation of vocabulary • Words are learned gradually and in • Generating __ in new words is important • Most frequent method of teaching new words • Number of encounters before a word is learned • A word family is a core word plus it's endings • Teachers have to help students forge among new words • ...
Job vocabulary 2024-04-30
Across
- Combining different software systems to work together.
- Efficiency and effectiveness of a system, application, or process.
- Releasing or installing software updates for end-user use.
- Flexible approach to project management, adapting to changing needs.
- List of tasks awaiting completion, prioritized by importance.
- Computers providing resources or services to other devices on a network.
- Ability to handle increased workload or resources without loss of performance.
- Important stages or achievements in a project's progress.
Down
- Short, focused periods of intense work on specific tasks.
- Structured collections of electronic data for efficient management.
- Items or work that need to be completed and handed over.
- Framework for agile project management, emphasizing teamwork and iterative progress.
- Set times by which tasks must be completed.
- Measures to protect computers, networks, and data from threats.
- Rules allowing software applications to communicate.
15 Clues: Set times by which tasks must be completed. • Rules allowing software applications to communicate. • Combining different software systems to work together. • Items or work that need to be completed and handed over. • Short, focused periods of intense work on specific tasks. • Important stages or achievements in a project's progress. • ...
AP Gov 5.8 2025-03-17
Across
- Starts after party nominations and kicks into high gear after Labor Day
- One already holding office
- Residents can vote in either partys primary
- The day with the most primaries
- Only registered party members can vote
- A state that can go either way during an election
- The person was already president and now has an advantage
Down
- Allows voters to cast votes for candidates in multiple parties
- Small states are overrepresented
- The period between the first well-known presidential candidates with strong political support networks
- Candidate who wins the plurality of the popular vote will receive all of that states electoral votes
- Proportion of their % = total votes won
- States scheduling their primaries and caucuses earlier and earlier to boost their political clout
- The first is held in Iowa
- Picking Republicans in some races and Democrats in others
15 Clues: The first is held in Iowa • One already holding office • The day with the most primaries • Small states are overrepresented • Only registered party members can vote • Proportion of their % = total votes won • Residents can vote in either partys primary • A state that can go either way during an election • Picking Republicans in some races and Democrats in others • ...
Networking Concepts 2025-06-12
Across
- : A common wired networking technology
- : A network that covers a large geographic area
- : A device that connects devices in a LAN and uses MAC addresses to forward data
- : Device that converts digital data to analog signals and vice versa
- : A wireless networking technology using radio waves
- : A network within a small area, like a home or office
- : A set of rules for data communication
- : A computer that requests data or services from a server
- : A computer that provides data or services to other computers
Down
- : Maximum data transfer rate of a network
- : Translates domain names into IP addresses
- : Security system that controls incoming and outgoing network traffic
- : A group of connected devices that share resources
- Address : Unique address assigned to each device on a network
- : Device that forwards data packets between networks
15 Clues: : A common wired networking technology • : A set of rules for data communication • : Maximum data transfer rate of a network • : Translates domain names into IP addresses • : A network that covers a large geographic area • : A group of connected devices that share resources • : A wireless networking technology using radio waves • ...
Ctrl + Clue 2025-05-03
Across
- A copy of data kept in case the original is lost or damaged
- The process of gaining access to a computer system
- Unwanted or junk email
- Internet-based storage and computing services
- A software application for accessing websites
- The set of rules that define the structure of programming language commands
- A small piece of data stored on the user’s computer by a website
- Malicious software designed to damage or disable computers
- A security system that monitors and controls incoming and outgoing network traffic
Down
- An error or flaw in software
- A step-by-step procedure for solving a problem
- A method of trying to gather personal information using deceptive emails
- A device that forwards data packets between networks
- A computer that provides data to other computers
- Temporary storage used to speed up data access
15 Clues: Unwanted or junk email • An error or flaw in software • Internet-based storage and computing services • A software application for accessing websites • A step-by-step procedure for solving a problem • Temporary storage used to speed up data access • A computer that provides data to other computers • The process of gaining access to a computer system • ...
Technology words 2023-05-10
Across
- where your teachers assign you work to do for classes
- where a global system hooks up to networks
- a long communication without wires
- where you can watch videos for classes or for fun
- where you can send mail digitally to workers, teachers or student
- where it can be instructed by hardware
- when something is transmitting information by various types
Down
- it is designed to protect your computers and other devices from bugs ands hackers
- where you can look up answers or look for evidence
- where you can create a web browser
- where you can make a presentation
- where you create a bar graph, line graph, or a pie chart
- where scientists design and build machines
- where it widely describes wide range of technology's
- where you can hook up to internet and use your technology better
15 Clues: where you can make a presentation • where you can create a web browser • a long communication without wires • where it can be instructed by hardware • where a global system hooks up to networks • where scientists design and build machines • where you can watch videos for classes or for fun • where you can look up answers or look for evidence • ...
Compliance Compass: AI Crossword Challenge 2025-08-21
Across
- A person or thing likely to cause damage or danger.
- An official, independent examination of a system or process.
- Adherence to a rule, such as a specification, policy, standard or law.
- A systematic prejudice in an AI's output.
- The raw information used to train AI systems.
- The potential for loss or harm.
- The state of being open and clear in communication and processes.
- A computational representation of a real-world process, trained on data.
Down
- A set of rules or instructions a computer follows to solve a problem.
- The process of making something less severe or serious.
- Moral principles governing the use of AI.
- An AI's fabricated or nonsensical output.
- An automated program that performs repetitive tasks.
- The protection of computer systems and networks.
- A framework of rules and practices to ensure accountability.
15 Clues: The potential for loss or harm. • Moral principles governing the use of AI. • An AI's fabricated or nonsensical output. • A systematic prejudice in an AI's output. • The raw information used to train AI systems. • The protection of computer systems and networks. • A person or thing likely to cause damage or danger. • An automated program that performs repetitive tasks. • ...
IT Crossword Puzzle 2021-05-05
Across
- An interface on a computer or device where a device is connected
- A type of file that organises other files in a hierarchical structure
- A temporary storage space or memory that allows fast access to data
- A internet service that converts names to IP addresses
- A picture element in the smallest part of a graphic picture
- The people who made Minecraft
Down
- The uppermost most directory in a file system
- A device that routes traffic between networks
- When you turn off a computer by pressing and holding the power button
- A company that provides people with a connection to the internet
10 Clues: The people who made Minecraft • The uppermost most directory in a file system • A device that routes traffic between networks • A internet service that converts names to IP addresses • A picture element in the smallest part of a graphic picture • An interface on a computer or device where a device is connected • ...
Mreža računala 2021-10-27
Across
- lokalna računalna mreža
- program koji sami sebe umnožavaju i šire se putem računalne mreže
- program koji nagleda prijenos podataka između računala i mreže
- računalni program koji se koristi za zaštitu od štetnih programa
- neželjena elektronička poruka poslana radi kao sredstvo širenja zlonamjernog programa
Down
- program koji svojim pokretanjem može zaraziti računala tako da bez dopuštenja kopira zam sebe u memoriju
- kratica od Metropolitan Area Networks, tj. mreža nekog područja
- Skup povezanih računala i uređaja koji mogu međusobno komunicirati i razmjenjivati podatke
- mreža širokog područja
- računalo koji je stalno povezan na internet te svojim klijentima omogućuje pristup podacima i uređajima
10 Clues: mreža širokog područja • lokalna računalna mreža • program koji nagleda prijenos podataka između računala i mreže • kratica od Metropolitan Area Networks, tj. mreža nekog područja • računalni program koji se koristi za zaštitu od štetnih programa • program koji sami sebe umnožavaju i šire se putem računalne mreže • ...
Quiz 1 Vocabulary Crossword A.I. 2019-08-27
Across
- is often used with automated bank teller machines, telephone calling cards, and accessing Wireless networks.
- are available for most graphical user interface operating systems and offer various features, such as placing different wallpapers for each virtual desktop
- storage
- Desktop
Down
- program for free-form information gathering and multi-user collaboration.
- on highly virtualized infrastructure and is like broader cloud computing
- Windows screenshot utility included in Windows Vista and later.
- menu
- each window to the corner of the screen where you want it.
- the primary location in Windows to locate your installed programs and find any files or folders.
10 Clues: menu • storage • Desktop • each window to the corner of the screen where you want it. • Windows screenshot utility included in Windows Vista and later. • on highly virtualized infrastructure and is like broader cloud computing • program for free-form information gathering and multi-user collaboration. • ...
Cyber Bullying 2012-05-05
Across
- using technology to harass someone
- mobile device used to send hateful texts
- a worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems
- used to access the internet
- short message sent by a cell phone
Down
- common social networking site used by cyber bullies
- words or actions intended to annoy, alarm, or abuse another individual
- sometimes the fatal consequence of cyber bullying
- not giving a name or username so as to stay hidden and undetected, cyber bullies stay this way so as to not get in trouble
- the person being cyber bullied
10 Clues: used to access the internet • the person being cyber bullied • using technology to harass someone • short message sent by a cell phone • mobile device used to send hateful texts • sometimes the fatal consequence of cyber bullying • common social networking site used by cyber bullies • words or actions intended to annoy, alarm, or abuse another individual • ...
Nina Matts 2013-09-13
Across
- a reference to a source.
- to renew or reload.
- network etiquette; online manners; following the rules of conduct for online or internet users, being a good digital citizen.
- stealing like pirates.
Down
- program made to damage files.
- a piece of writing that has been copiedfrom someone elseand is presented as being your own.
- a global network of thousands of other computer networks that offers e-mail and info retrieval services to millions of people.
- software used to veiw various kinds of internet resources found on the web.
- an unauthorized person who secretly gains access to computer files.
- a bully who bullies online.
10 Clues: to renew or reload. • stealing like pirates. • a reference to a source. • a bully who bullies online. • program made to damage files. • an unauthorized person who secretly gains access to computer files. • software used to veiw various kinds of internet resources found on the web. • ...
IC3 Lesson 29 Vocabulary 2015-05-12
Across
- Communications technology to keep the employee connected to the office/ allows you to work from home
- Provides online education learning to millions of learners annually
- Allows someone to pay by transmitting a number from one computer to another
- Transactions between businesses and government agencies
- Online transactions between businesses and consumers
- Pressing a button on a remote control device or enter a combination on the keypad
Down
- Mental process of analyzing or evaluating information
- E-commerce transaction between businesses
- Conducting business over the internet
- Instant communication technology that enables sending and receiving messages between mobile phones and wireless carrier networks (Text Message)
10 Clues: Conducting business over the internet • E-commerce transaction between businesses • Online transactions between businesses and consumers • Mental process of analyzing or evaluating information • Transactions between businesses and government agencies • Provides online education learning to millions of learners annually • ...
The Mayans 2024-01-22
Across
- This dense forest is where they find their meat, skin, feathers
- This place has a hot, wet climate
- They lived in the tropical rain forest/they used farming methods
- Nobles controlled large plots where corn was grown
- The Mayan's worshiped many gods, most of them represent forces of nature, such as rain and lightning
Down
- Was a strip of land connecting Asia and North America
- in the highlands this has produced rich soils obsidian
- This is where the Mayans lived
- Have warm temperatures year-round and rain from April to October
- Traveling Merchants linked Mayan cities in large TRADE networks
10 Clues: This is where the Mayans lived • This place has a hot, wet climate • Nobles controlled large plots where corn was grown • Was a strip of land connecting Asia and North America • in the highlands this has produced rich soils obsidian • This dense forest is where they find their meat, skin, feathers • Traveling Merchants linked Mayan cities in large TRADE networks • ...
Computer Technology 2024-02-14
Across
- (A technology that allows wireless communication between devices)
- (The "brain" of a computer, responsible for processing data)
- (A type of storage that retains data even when the power is turned off)
- (A high-level programming language often used for scientific and numerical computing)
- (A method of protecting computer networks from unauthorized access or attacks)
Down
- (A popular open-source operating system)
- (A widely used markup language for creating web pages)
- (The process of finding and fixing errors in computer programs)
- (A popular programming language used for creating web pages)
- (A programming language developed by Google, often used for web development)
10 Clues: (A popular open-source operating system) • (A widely used markup language for creating web pages) • (The "brain" of a computer, responsible for processing data) • (A popular programming language used for creating web pages) • (The process of finding and fixing errors in computer programs) • (A technology that allows wireless communication between devices) • ...
KASOOTI DEGREE 2023-03-10
Across
- The unauthorized access of computer systems or networks
- A software program that identifies and removes viruses from a computer system
- The process of securing IoT devices and data from unauthorized access
- A built-in Python function for printing output to the console
Down
- The act of tricking someone into revealing sensitive information
- The process of encrypting data to protect it from unauthorized access
- A device that can receive and display data from IoT devices
- The process of using IoT devices to automate tasks
- A Python module for working with regular expressions
- A device that can measure and transmit data about the environment
10 Clues: The process of using IoT devices to automate tasks • A Python module for working with regular expressions • The unauthorized access of computer systems or networks • A device that can receive and display data from IoT devices • A built-in Python function for printing output to the console • The act of tricking someone into revealing sensitive information • ...
SOCIAL NETWORK 2024-06-30
Across
- (verb) -Simplified: To hang out with people and be friendly.
- its toll (expression) - To cause harm or damage over time.
- (verb) - to look and make sure that something is present or correct
- (verb) - To make something newer or add new information.
- (verb) -To tell others about your thoughts, problems, or experiences.
Down
- (adjective) - To be very focused on something.
- (verb) - To take something away because of the rules.
- (adjective) - Meeting or talking in person.
- (verb) To join things together or link them.
- (noun) -: A setup that lets you use online services like email or social networks.
10 Clues: (adjective) - Meeting or talking in person. • (verb) To join things together or link them. • (adjective) - To be very focused on something. • (verb) - To take something away because of the rules. • (verb) - To make something newer or add new information. • its toll (expression) - To cause harm or damage over time. • ...
Business communication 2024-05-20
Across
- __________ communication includes letters, memos and reports.
- A _____________ to communication is a reason which disrupts a communication process.
- _______________ communication is between employees having the same status in a firm.
- __________ communication is more interactive and interesting.
Down
- It is the reply by the receiver of a message to confirm its receipt.
- _____________ communication includes faxes, emails, social networks and internet.
- _____________ communication takes place between a manager and his subordinates.
- ________ communication is also known as 'spoken' communication.
- It refers to the exchange of information between people or groups.
- ____________ communication refers to unofficial channels of communication between employees at work.
10 Clues: __________ communication includes letters, memos and reports. • __________ communication is more interactive and interesting. • ________ communication is also known as 'spoken' communication. • It refers to the exchange of information between people or groups. • It is the reply by the receiver of a message to confirm its receipt. • ...
Think and work like a scientst Part 1 2023-06-14
Across
- Whatever it is, when you recognize the identity of someone or something, you ___________ it
- information gathered when carrying out experiments
- I can carry out a ___________ where I change something, measure something and keep some things the same to answer this question.
- the act of asking questions to gain information.
- a huge computer network made up of smaller computer networks
Down
- based on the principles and methods of science
- a sameness or alikeness
- a person with some kind of knowledge or expertise in any of the sciences
- put into groups based on a property
- repeats in a predictable way
10 Clues: a sameness or alikeness • repeats in a predictable way • put into groups based on a property • based on the principles and methods of science • the act of asking questions to gain information. • information gathered when carrying out experiments • a huge computer network made up of smaller computer networks • ...
WattsupBots 2025-03-03
Across
- The first humanoid robot astronaut sent to space.
- The term for a robot that looks and acts like a human.
- The most common algorithm used in neural networks for weight adjustment.
- The robotic law system proposed by Isaac Asimov.
- The mechanical structure that mimics human hand movements in robotics.
Down
- The concept of AI self-improvement beyond human intelligence.
- The type of learning where an agent learns by receiving rewards and penalties.
- The term for the study of robotic movement and control.
- The AI model that defeated the world champion in Go.
- The AI architecture behind ChatGPT and modern NLP models.
10 Clues: The robotic law system proposed by Isaac Asimov. • The first humanoid robot astronaut sent to space. • The AI model that defeated the world champion in Go. • The term for a robot that looks and acts like a human. • The term for the study of robotic movement and control. • The AI architecture behind ChatGPT and modern NLP models. • ...
engineering crosswords 2024-12-03
Across
- A step-by-step procedure for solving a problem.
- Relating to computers, networks, or information technology.
- The process of creating and writing computer software.
- A set of connected parts working together as a whole.
- The act of introducing something new or improving existing technology.
Down
- The application of scientific knowledge for practical purposes. Cloud: Remote servers used to store and process data via the internet.
- The capacity to do work or power machines.
- The use of technology to perform tasks without human intervention.
- A machine capable of carrying out a complex series of actions.
- written instructions for a computer to execute
10 Clues: The capacity to do work or power machines. • written instructions for a computer to execute • A step-by-step procedure for solving a problem. • A set of connected parts working together as a whole. • The process of creating and writing computer software. • Relating to computers, networks, or information technology. • ...
Indigenous History Review 2025-09-11
Across
- The Clackamas people built fishing ________ on the falls to better access the fish
- The ________ theory suggests Native Americans arrived via a land bridge
- Chuchounyhoof is a story of a ________ that keeps the Luckamiute Kalapuyans from the coast
- Chief _______ was Chinookan leader with major influence throughout the region
- The Kalapuya specialized in trading wapato and ___________
Down
- __________ refers to the beginning of human history
- ikanum are ________ that are only told during the winter time.
- ________ networks are familial ties that are created across tribes & bands
- The Chinook specialized in trading __________
- _______ refers to a theory that Native people arrived in the America's via sea-travel
10 Clues: The Chinook specialized in trading __________ • __________ refers to the beginning of human history • The Kalapuya specialized in trading wapato and ___________ • ikanum are ________ that are only told during the winter time. • The ________ theory suggests Native Americans arrived via a land bridge • ...
CAT Concepts Crossword 2025-09-24
Across
- A type of memory that is temporary and loses data when power is off.
- The process of copying data to a storage device for future use.
- The physical parts of a computer are known as ___.
- Data sent over the internet is broken into small units called ___.
- A set of rules used for communication between devices.
- The main circuit board of a computer.
- A popular spreadsheet application used in CAT.
Down
- Software that is designed to harm or disrupt a system.
- The global system of interconnected computer networks.
- This person writes and tests code to create software applications.
10 Clues: The main circuit board of a computer. • A popular spreadsheet application used in CAT. • The physical parts of a computer are known as ___. • Software that is designed to harm or disrupt a system. • The global system of interconnected computer networks. • A set of rules used for communication between devices. • ...
3S03 Presentation 1 Group 5 2025-10-06
Across
- Ronald lives 60 min from his pharmacy & doesn't have a car. This is a ___ barrier to medication.
- Priya sometimes forgets to take her anti-anxiety medications. An example of ___ adherence
- This prescription boosts focus & attention
- When discussing medications with clients, questions should be ___
- Adherence rate is impacted by provider, patient, and ___ factors
Down
- Social worker's role as they help patients overcome challenges
- Jenn takes 20mg of her medication at 8am every day
- Conversation where Alex tells his social worker he is taking SSRIs
- Healthcare professional who may support clients with medications
- The link between patients, providers, and support networks
10 Clues: This prescription boosts focus & attention • Jenn takes 20mg of her medication at 8am every day • The link between patients, providers, and support networks • Social worker's role as they help patients overcome challenges • Healthcare professional who may support clients with medications • Adherence rate is impacted by provider, patient, and ___ factors • ...
Artificial intelligence 2025-11-07
Across
- A big advantage of AI – it works faster and more accurately.
- AI that can think like a human being (still not real).
- Who said, “AI will be the best or worst thing for humanity”?
- An app that helps people understand different languages.
- The deeper level of machine learning using neural networks.
Down
- A part of AI that helps computers learn from experience.
- AI used in hospitals to identify diseases.
- AI that can do only one specific task, like Siri.
- A smart voice helper on phones.
- AI needs a lot of this to learn — pictures, words, numbers.
10 Clues: A smart voice helper on phones. • AI used in hospitals to identify diseases. • AI that can do only one specific task, like Siri. • AI that can think like a human being (still not real). • A part of AI that helps computers learn from experience. • An app that helps people understand different languages. • AI needs a lot of this to learn — pictures, words, numbers. • ...
Marketing 2021-05-04
Across
- Another word for cold calling
- this is used to create improvements in internet ranks
- A form of internet marketing utilising social media sites and networks such as Facebook
Down
- another word for Electronic dispensing machines
- Part-time institutional telephone operators who routinely call their customers
- A kind of marketing that is quite expensive
6 Clues: Another word for cold calling • A kind of marketing that is quite expensive • another word for Electronic dispensing machines • this is used to create improvements in internet ranks • Part-time institutional telephone operators who routinely call their customers • A form of internet marketing utilising social media sites and networks such as Facebook
11 May 2025 2025-05-11
Across
- Fully combined to function as a whole
- A point of entry that connects different networks or systems
- Relating to or occurring within one’s own country
Down
- Paid for in advance, often used for cards or mobile plans
- A careful plan or method for achieving a goal
- Showing a great deal of variety or difference.
6 Clues: Fully combined to function as a whole • A careful plan or method for achieving a goal • Showing a great deal of variety or difference. • Relating to or occurring within one’s own country • Paid for in advance, often used for cards or mobile plans • A point of entry that connects different networks or systems
Julia's Internet Puzzle 2015-09-22
Across
- a standard way of indicating the location of a website
- consisting of high-speed cables and switching stations
- lead to another website/place within the same document
- early version of the internet
- mainframe computers that are capable of very fast processing
- structure that handles the major traffic in a network system
- A set of rules for how HTML documents are interpreted and displayed through a browsers
- text and code only visible to the web browsers
- where you can keep URLs that you would like to consult frequently
- Collection of network of computer and storage
- an agreed upon format for transmitting data between two or more devices
Down
- ex:Internet explorer, safari
- Standard network protocol communication across networks
- Total collection of hypertext documents stored in computers
- companies that provide users with access Internet ex: Bell and Rogers
- a software program allowing you to search for information on the network
16 Clues: ex:Internet explorer, safari • early version of the internet • Collection of network of computer and storage • text and code only visible to the web browsers • a standard way of indicating the location of a website • consisting of high-speed cables and switching stations • lead to another website/place within the same document • ...
Digital Technologies 2021-03-02
Across
- Can store two values
- a part of a computer that allows you to plug in a cable
- a .mp4 file
- a file extension suitable for sending images over a network
- the HTML tag that displays a picture
- one of three colours used to create the colour of a pixel
- the html tag that displays the name of the webpage in the browser tab
- the main part of a computer that connects everything together
Down
- Number of bits in a byte
- system used to convert letters from the English alphabet to numbers
- a file extension for a photographic image
- system used to convert letters from any language to numbers
- smallest part of a picture
- a network device that connects small networks together to create a larger network
- the network device needed to access the internet
- a file extension for an image that can be animated
16 Clues: a .mp4 file • Can store two values • Number of bits in a byte • smallest part of a picture • the HTML tag that displays a picture • a file extension for a photographic image • the network device needed to access the internet • a file extension for an image that can be animated • a part of a computer that allows you to plug in a cable • ...
