networks Crossword Puzzles
Computer Security and Safety, Ethics, and Privacy 2016-12-16
Across
- The act of defacing or destroying computer equipment.
- A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
- supplies A device that allows a computer to keep running for at least a short time when the primary power source is lost.
- The moral guidelines that govern the use of computers and information systems.
- A notice that guarantees a user or a Web site is legitimate.
- The act of stealing computer equipment.
- is the discovery, collection, and analysis of evidence found on computers and networks.
- The prolonged malfunction of a computer.
- The authorization that grants one user the right to use a software package
- Occurs when someone steals software media, intentionally erases programs, illegally copies a program, and illegally registers and/or activates a program.
- Occurs when someone steals personal or confidential information.
- A process of converting readable data into unreadable characters to prevent unauthorized access.
- An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.
Down
- The rights to which creators are entitled for their work.
- The act of verifying protected electronic data and involves the required activation by the consumer shortly or directly after purchasing the software or service.
- Allows individuals to detect wireless networks while driving a vehicle through the area.
- A condition resulting from focusing the eyes on a computer or other display device for protracted, uninterrupted periods of time.
- An appliance or device designed to protect electrical devices from voltage spikes.
- A strategy designed to prevent illegal distribution of movies, music, and other digital content.
- Occurs when someone the computer consumes someone's entire social life.
- Authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital in a computer.
- A condition in which the prolonged performance of repetitive actions, typically with the hands, causes pain or impairment of function in the tendons and muscles involved.
- protects any tangible form of expression.
- Any item that you must carry to gain access to a computer or computer facility.
25 Clues: The act of stealing computer equipment. • The prolonged malfunction of a computer. • protects any tangible form of expression. • The act of defacing or destroying computer equipment. • The rights to which creators are entitled for their work. • A notice that guarantees a user or a Web site is legitimate. • ...
CHAPTER 18 TERMS 2020-09-10
Across
- Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
- date and time of a message.
- detects unwanted attempts to manipulate network systems and/or environments
- looks inside every packet on a network segment.
- a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
- the facility to which the message refers.
- is a computer security device that monitors network and/or system activities for any strange or malicious behavior
- text string containing detailed information about the even being reported.
- supports plaintext authentication with community strings and uses only UDP.
- scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
- protocol analyzers such as load testing, connectivity testing, and throughput testing.
- a text string that uniquely describes the message.
- a single digit code from 0 to 7 that indicates the severity of the message.
Down
- a powerful enterprise (large corporate environment) network intrusion and prevention system.
- most popular form of TCP scanning
- a device that test the speed of data transfer in the network.
- sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
- stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
- a software tool designed to search a host for open ports.
- a device that test the speed of data transfer in the network.
- displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
- the standard level of performance of a certain device or to the normal operating capacity for your whole network.
- the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
- an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.
- Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
- Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
- used for sniffing wireless networks
27 Clues: date and time of a message. • most popular form of TCP scanning • used for sniffing wireless networks • the facility to which the message refers. • looks inside every packet on a network segment. • a text string that uniquely describes the message. • a software tool designed to search a host for open ports. • ...
ACSO Privacy and Information Security Awareness Week May 2023 2023-05-03
Across
- The accidental or deliberate exposure of sensitive ACSO information into an uncontrolled or unauthorised environment or to persons without a need–to–know. Data ______
- refers to the potential for loss, damage, or harm resulting from threats exploiting vulnerabilities in information systems, networks, or data assets. Multi-step process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls
- Refers to obtaining permission before information is obtained, used or shared
- Stands for Multi-Factor Authentication.
- It's a fraudulent attempt, usually via email or social engineering, to deceive individuals into providing sensitive information, such as passwords or credit card details, by posing as a legitimate entity.
- the state of being unidentifiable or untraceable, ensuring that an individual's actions or information cannot be linked back to their real identity.
- Stands for Virtual Private Network. It's used to connect to ACSO network when working from home
- Section that explains how ACSO will manage the process of dealing with actual or suspected data _____ in accordance with the national Notifiable Data Breach Procedure
- I in the CIA triad. assurance that information and systems remain consistent and unaltered
- Role responsible for monitoring and reviewing privacy related processes in ACSO. Privacy _______
- C in the CIA triad. protection of sensitive information from unauthorized access
Down
- ACSO must ensure that the operation of information processing facilities, including operating systems, are secure and protected against malware and data loss. _______ security
- Either unclassified or classified ACSO information identified as requiring extra protection. _______ Information
- Section that explains how ACSO must take reasonable steps to destroy or permanently de-identify personal information if it is no longer needed for any purpose, unless an exception applies. Data _____
- An occurrence or activity that may threaten the confidentiality, integrity or availability of ACSO information. Cybersecurity _____
- The manager of the group that administers and operates that information asset or system
- A in the CIA triad. timely and reliable access to information and resources
- malicious software designed to infiltrate, damage, or disrupt computer systems, networks, or devices, often without the user's knowledge or consent.
- It's a fundamental human right
- refers to how all ACSO personnel are required to maintain their workspace, computer, mobile devices, printed materials and access cards to enhance privacy and information security. Clean _____ Policy
20 Clues: It's a fundamental human right • Stands for Multi-Factor Authentication. • A in the CIA triad. timely and reliable access to information and resources • Refers to obtaining permission before information is obtained, used or shared • C in the CIA triad. protection of sensitive information from unauthorized access • ...
Internet 2021-11-02
Across
- not controlled by or directly connected to a computer or external network.
- commonly known as the Web.
- a group or system of interconnected people or things.
- a post made on the social media application
- occurs when a computer program such as a software application or an operating system stops
- is a multiple of a byte
- contains data that is stored for a short amount of time.
- is a computer or system that provides resources
- is an organized collection of structured information.
- is the practice of defending computers, servers mobile devices, electronic systems, Networks, and data from malicious attacks.
- a thing made or adapted for a particular purpose
- utilizing devices constructed
- messages distributed by electronic means.
- takes signals from your ISP.
- the notional environment in which communication over computer networks occurs.
- designed to block unauthorized access while permitting outward communication.
- is a top-level domain, also known as a TLD.
- A symbol on a display screen indicating that the computer is waiting for input
- services that run on the Internet, instead of locally on your computer.
- to transfer from a computer or other digital device to the memory of another device
Down
- copy (data) from one computer system to another typically over the internet.
- controlled by or connected to another computer or to a network.
- the application of scientific knowledge for practical purposes
- to obtain, examine, or retrieve
- is a computer network that uses wireless data connections between network nodes
- a group of binary digits or bits operated on as a unit.
- is a collection of web pages and related content
- relating to the whole world
- relating to or characteristic of the culture of computers
- are used to connect two or more devices
- facts provided
- is a document, commonly written in HTML
- means of sending or receiving information
- not physically existing as such but made by software to appear to do so.
- a website or web page providing access or links to other sites.
- a global computer network providing a variety of information.
- information processed or stored by a computer
- is an online journal or informational website displaying information.
- authority or, control within the Internet
39 Clues: facts provided • is a multiple of a byte • commonly known as the Web. • relating to the whole world • takes signals from your ISP. • utilizing devices constructed • to obtain, examine, or retrieve • are used to connect two or more devices • is a document, commonly written in HTML • means of sending or receiving information • messages distributed by electronic means. • ...
Lesson 2 Crossword 2025-02-25
Across
- A property of switches in which each port's bandwidth is dedicated to the devices connected to the port.
- (abbreviation) The name assigned to a wireless network that is configured on the wireless access point.
- A communication mode in which a device can simultaneously transmit and receive data on the same cable connection.
- A device that enables LANs to communicate with one another by forwarding packets from one LAN to another.
- A network device that performs the same function as a repeater but has several ports to connect a number of devices.
- Making a connection between devices such as two switches, usually for the purpose of expanding a network.
- (abbreviation) A wireless device that serves as the central connection point of a wireless LAN and mediates communication between wireless computers.
- The scope of devices to which broadcast frames are forwarded. Router interfaces delimit broadcast domains because they don't forward broadcasts, whereas switches and hubs do.
- (abbreviation) A signal an AP generates in response to a request-to-send signal.
- A communication mode in which a device can send or receive data but can't do both simultaneously.
- A network device that takes incoming signals and regenerates, or repeats, them to other parts of the network.
Down
- A network device used to interconnect multiple computers.
- The amount of data that can be transferred on a network during a specific interval; usually measured in bits per second.
- An operational mode of a NIC in which all frames are read and processed rather than only broadcast and unicast frames addressed to the NIC.
- A designated port on a hub or switch used to connect to another hub or switch without using a crossover cable.
- The address configured in a computer's IP address settings specifying the address of a router to which the computer can send packets addressed to devices on other networks.
- A routing table entry that tells a router where to send a packet with a destination network address that can't be found in the routing table.
- A network message addressed to only one computer on the LAN.
- (abbreviation) A device that creates and mediates the connection between a computer and the network medium.
- (abbreviation) A signal used in wireless networks indicating that a computer has data ready to send on the network.
20 Clues: A network device used to interconnect multiple computers. • A network message addressed to only one computer on the LAN. • (abbreviation) A signal an AP generates in response to a request-to-send signal. • A communication mode in which a device can send or receive data but can't do both simultaneously. • ...
CROSSWORD CS 2025-11-04
Across
- A device that converts digital data into analog for transmission and vice versa.
- A wireless networking technology allowing devices to connect without cables.
- A collection of interconnected devices for communication.
- A unit of data transmitted over a network.
- A wireless device that connects Wi-Fi clients to a wired network.
- A network that allows controlled access from outside users.
- A network spread across countries or continents.
- A set of rules governing data communication.
- The global network of interconnected computers.
- The physical or logical arrangement of devices in a network.
- A special data packet passed around in ring topology for communication control.
- A topology with point-to-point connections between all devices.
- A computer that requests and uses services from a server.
- A topology where all devices are connected to a central hub or switch.
- A device that connects and filters traffic between two LAN segments.
- A unique hardware identifier assigned to a network interface card.
- A network covering a city or campus.
- A topology where all computers share a single backbone cable.
Down
- The amount of data that can be transmitted in a given time.
- A network connection between exactly two devices.
- A device used to regenerate or amplify signals in a network.
- A wireless technology used for short-range communication.
- A wired LAN technology based on IEEE 802.3 standard.
- A security device that filters incoming and outgoing network traffic.
- A device connecting networks using different communication protocols.
- A computer providing resources or services to other computers.
- A private network accessible only within an organization.
- A device that connects multiple networks and routes data between them.
- A software tool used for analyzing network packets.
- The time taken for a data packet to travel from source to destination.
- A topology combining characteristics of star and bus topologies.
- A unique address assigned to each device on a network.
- A basic device that connects multiple computers and broadcasts data to all.
- A network covering a small geographical area like a home or school.
- A hardware component that allows a computer to connect to a network.
- A topology where each node connects to exactly two others, forming a circle.
- A device that forwards data only to the specific destination device.
37 Clues: A network covering a city or campus. • A unit of data transmitted over a network. • A set of rules governing data communication. • The global network of interconnected computers. • A network spread across countries or continents. • A network connection between exactly two devices. • A software tool used for analyzing network packets. • ...
Unit 4 Tsunami Vocabulary 2016-03-15
Across
- Before the concert, the organizers took _________ for medical emergencies.
- When Darrell got sick, his _______ helped out in the office so he
- The librarians can _____ searching for research materials.
- The ________ of the destruction from the tsunami left people stunned for a long time.
Down
- by contrast; while; but
- The television networks _____ the news about the tsunami in Japan.
- Enrollment has reached an __________ high number of new students.
- The police posted a(n) _____ about a coming storm.
8 Clues: by contrast; while; but • The police posted a(n) _____ about a coming storm. • The librarians can _____ searching for research materials. • Enrollment has reached an __________ high number of new students. • When Darrell got sick, his _______ helped out in the office so he • The television networks _____ the news about the tsunami in Japan. • ...
R4T Capacity team - Quiz 2017-11-24
Across
- 5G evolution of… to 1ms
- massive… usage of it, is critical for 5G networks
- the great disadvantage when using large number of transmitters/receivers
Down
- technology used for limiting interference in 5G massive MIMO deployment
- what can be used to increase coverage in 5G?
- commonly used term for band of spectrum between 30 GHz and 300 GHz
- Single most important technology factor affecting 5G system capacity
- 20gbps… is targeted for each mmwave cell
8 Clues: 5G evolution of… to 1ms • 20gbps… is targeted for each mmwave cell • what can be used to increase coverage in 5G? • massive… usage of it, is critical for 5G networks • commonly used term for band of spectrum between 30 GHz and 300 GHz • Single most important technology factor affecting 5G system capacity • ...
BIS3588 Class Exercise 2018-04-22
Across
- Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
- Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
- a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
- technology that aids in gathering information about a person or organization without their knowledge.
- device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
- a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
- the removal of organizations or business process layers responsible for certain intermediary steps in a value chain.
- form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
- type of eavesdropping program that monitors information traveling over a network.
Down
- a string of bits, usually eight, used to store one number or character in a computer system.
- _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
- independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
- the process of translating the system specifications prepared during the design stage into program code.
- the coding and scrambling of messages to prevent their being read or accessed without authorization.
- phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
- collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
- the process of changing from the old system to the new system.
- Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
- composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
- the standard data manipulation language for relational database management systems.
20 Clues: the process of changing from the old system to the new system. • type of eavesdropping program that monitors information traveling over a network. • the standard data manipulation language for relational database management systems. • a string of bits, usually eight, used to store one number or character in a computer system. • ...
CHAPTER 8 TERMS - CROSSWORD 2020-08-06
Across
- man-to-one by using different ports.
- any layer 3 machine like a router
- start at zero and count in the block size. (192 (11000000) then block size is 64) ex: 0, 64, 128, 192) counting by 64.
- gives you the ability to map an unregistered IP address to a registered IP address from a pool of register IP addresses
- A 32-bit value that allows the recipient of the IP packets to distinguish the network ID portion of the IP address from the host ID portion of the IP address
- echo request and replies to test
- a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet
- a command if executed on a router allows you to use the zero subnet as our first subnet
- is the name of the inside host after translation
- taking one larger network and breaking it into a bunch of smaller networks
- displays the list of routers on a path to a network destination by using time-to-live and time outs and ICMP error messages
Down
- a Displays IP-to-MAC address mappings on a Windows PC
- the number right before the value of the next subnet
- different length subnet masks in the network
- name of the outside destination host after translation
- any network device with an IP address
- the name of the destination host before translation (usually a web address, mail server…)
- equals the number of unmask bits (0s) to the 2nd power minus two (unmasked are 0s) 11000000
- the numbers between the subnet and broadcast address
- used only from a DOS prompt, Shows you the PC network configuration
- designed to allow one-to-one mapping between local and global addresses
- - same command as traceroute, but it is a Microsoft Windows command and will not work on other devices, like Cisco router or Unix box
- – a form of dynamic NAT that maps multiple unregistered IP addresses to a single
- address used on the internet (usually the public addresses used on the internet)
- equals the number of masked bits (1s) to the 2nd power(2 to the 2nd power = 4 subnets)
25 Clues: echo request and replies to test • any layer 3 machine like a router • man-to-one by using different ports. • any network device with an IP address • different length subnet masks in the network • is the name of the inside host after translation • the number right before the value of the next subnet • the numbers between the subnet and broadcast address • ...
BIS3588 Digital Business Enterprise 2017-09-14
Across
- Task force organization that must respond to rapidly changing environments. Consists of large groups of specialists organized into short-lived multidisciplinary teams and has weak central management.
- ___________ effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
- When the output of some units can be used as inputs to other units, or two organizations pool markets and expertise, these relationships lower costs and generate profits.
- A type of Website that makes it easy for users to contribute and edit text content and graphics without any knowledge of Webpage development or programming techniques.
- Private intranet that is accessible to authorized outsiders.
- Working with others to achieve shared and explicit goals.
- ___________ cost refers to the cost of market participation.
- Third-party net marketplace that is primarily transaction oriented and that connects many buyers and suppliers for spot purchasing.
- Global network of networks using universal standards to connect millions of different networks.
- The capture or collection of raw data from within the organization or from its external environment for processing in an information system.
Down
- __________ cost refers to the cost of switching from one product to a competing product.
- A marketplace extended beyond traditional boundaries and removed from a temporal and geographical location.
- Precise rules, procedures and practices that have been developed to cope with expected situations.
- Data have been shaped into a form that is meaningful and useful to human beings.
- Setting strict standards for products, services, or activities and measuring organizational performance against those standards.
- A stable formal social structure that takes resources from the environment and process them to produce outputs.
- A highly trained technical specialist who writes computer software instructions.
- Streams of raw facts representing events occurring in organizations or the physical environment before they have been organized and arranged into a form that people can understand and use.
- Output that is returned to the appropriate members of the organization to help them evaluate or correct input.
- The set of fundamental assumptions about what products the organization should produce, how and where it should produce them, and for whom they should be produced.
20 Clues: Working with others to achieve shared and explicit goals. • Private intranet that is accessible to authorized outsiders. • ___________ cost refers to the cost of market participation. • Data have been shaped into a form that is meaningful and useful to human beings. • A highly trained technical specialist who writes computer software instructions. • ...
Newsletter Crossword 2023-08-05
Across
- A visual representation of a person, place, or thing, captured using a camera or other device.
- A section of a publication that lists items or services for sale or wanted, typically organized by category.
- A short phrase that summarizes the main point of a news article or story.
- A word puzzle that requires the solver to fill in missing letters to create words that intersect both horizontally and vertically.
- A longer, more in-depth article or story that explores a particular topic or issue.
- A person responsible for overseeing and directing the content of a publication, including articles, photos, and other media.
- Surveys or questionnaires used to collect opinions or information from a particular group of people.
- A news story or piece of information that is obtained or reported before other journalists or news organizations.
- The person or company that produces and distributes a publication, such as a book or magazine.
- Referring to journalism that involves in-depth research and analysis to uncover and report on issues of public interest.
- A professional writer or reporter who gathers and shares news and information with the public.
- A regular section in a newspaper or magazine that features a writer's opinion or commentary on a specific subject.
- Information about current and forecasted atmospheric conditions, including temperature, precipitation, and wind.
Down
- Articles or features that focus on a particular person, group, or event.
- Current events or information that is reported by journalists and other media outlets.
- A brief description or explanation that accompanies a photo or other visual element.
- The collective term for media organizations, such as newspapers, television networks, and radio stations.
- A paid service that provides access to a particular publication, typically on a regular basis.
- A written piece of information that provides details about a particular topic or event.
- The date or time by which something must be completed or submitted.
- A journalist who gathers and reports news and information to the public.
- A type of cheap, low-quality paper used to print newspapers.
- The arrangement of text, photos, and other elements on a printed or digital page.
- Coverage of athletic events, teams, and players, typically including scores and highlights.
- Referring to information or services that are available through the internet or other digital networks.
25 Clues: A type of cheap, low-quality paper used to print newspapers. • The date or time by which something must be completed or submitted. • Articles or features that focus on a particular person, group, or event. • A journalist who gathers and reports news and information to the public. • A short phrase that summarizes the main point of a news article or story. • ...
Information Assurance 2023-12-05
Across
- Information Assurance involves measures that protect and defend both information and information systems.
- Information Assurance aims to guarantee that authorized users have access to authorized information at the authorized time.
- ensures that information remains in its original form; information remains true to the creators intent
- Long product refresh cycles for technologies found in high-value equipment (e.g. vehicles and critical infrastructures) increase risk exposure.
- Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
- Companies are connecting more operational technology devices to their networks, but many aren’t protected by the latest encryption technologies to ensure the secure storage and transfer of sensitive information.
- Many smart devices (e.g. IoT sensors) operating in resource-constrained environments can’t perform automatic remote updates.
- These measures ensure the five core aspects of information security: Availability, Integrity, Authentication, Confidentiality, Nonrepudiation
- The proliferation of smart building hardware connected to the company network through local access (e.g. managed Ethernet or serial interface) gives bad actors opportunities to breach the network.
Down
- ensures the disclosure of information only to those persons with authority to see it.
- Information Assurance is concerned with safeguarding information from both malicious and accidental threats
- Some older hardware may not be able to support newer security software and solutions.
- Hardware can take years to develop, and resolving security issues often require more than a quick patch.
- Some hardware may seem to function “just fine” even if the manufacturers no longer support the software.
- It applies to information regardless of its state, whether it's in storage, being processed, or in transit.
- Most IoT device and robotics manufacturers don’t have dedicated security experts.
- Many corporate data centers and high-end desktops use purpose-built chipsets.
- The session serves as an introduction to Information Assurance and provides insights to help storage personnel understand its relevance in their specific environments.
- It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity of operations.
- Information Assurance encompasses a comprehensive approach that includes protection, detection, and reaction capabilities.
20 Clues: Many corporate data centers and high-end desktops use purpose-built chipsets. • Most IoT device and robotics manufacturers don’t have dedicated security experts. • Some older hardware may not be able to support newer security software and solutions. • ensures the disclosure of information only to those persons with authority to see it. • ...
4. Rights, Environment, Advocacy 2024-04-23
Across
- one threat to the environment that involves the warming of the planet at an above average rate (2 words)
- court that is in the UN that could hear cases against states (as a whole) (abbreviation)
- idea that something is depleted or not protected because it is not owned by a single entity (4 words)
- societal human rights (2 words)
- belief that human rights are not universal (2 words)
- security concerns are rising in this area due to warmer temperatures, with countries like Russia establishing a stronger military presence
- something that benefits everyone and is not owned by a single actor (2 words)
- 2023 was the ____ year ever recorded
- a combination of non-state and state actors across state borders who come together to work on some issue (abbreviation, plural)
Down
- a court and trial created by the UNSC after an event, such as the Rwandan Genocide. It is one way to prosecute individuals for genocide (4 words)
- one way to prosecute individuals for genocide. Involves states using their own legal definitions for genocide, along with their own punishments (2 words)
- one threat to the environment that was (at least in 2019) one of the top 3 leading causes of deaths in the world
- one threat to the environment that is particularly concerning to countries like China. Leads to hotter temperatures, less food, and population shifts
- one threat to the environment that is particularly concerning to countries like Brazil. Can lead to flooding, mudslides, and hotter temperatures
- measure of violations of basic human rights in a country by agents of the country (3 words)
- group human rights (2 words)
- individual human rights (2 words)
- court that can prosecute individuals for genocide, war crimes, and crimes against humanity (abbreviation)
- idea that transnational advocacy networks may be more successful at changing the behavior of a repressive state compared to just domestic groups (2 words)
- international norm that states should protect citizens, and that other states should intervene when citizens are not protected (abbreviation)
- idea that transnational advocacy networks go through stages, where they first try to make new norms, then spread those norms, and then get states to internalize those norms (3 words)
21 Clues: group human rights (2 words) • societal human rights (2 words) • individual human rights (2 words) • 2023 was the ____ year ever recorded • belief that human rights are not universal (2 words) • something that benefits everyone and is not owned by a single actor (2 words) • court that is in the UN that could hear cases against states (as a whole) (abbreviation) • ...
RI #1 Vocab Review 2025-11-04
Across
- CBC has a Website, TV, Radio - this is Media ____________
- increasing interdependence and connections
- The process by which global networks are increasingly connecting environmental management practices is called _________ globalization.
- A type of nation with a high standard of living and a high level of industrialization
- When a dominant culture threatens to make the customs, traditions, & beliefs of a minority culture disappear.
- The process by which technology is linking the world is called ___________ globalization.
- Allowing Muslim girls to wear a hijab while playing soccer is a form of this.
- Corporation Starbucks would be a good example of this type of company
- beliefs about society, politics and citizenship
- Occurs when two cultures adapt to each other’s worldviews–can be positive or negative.
- depending on each other
- the lack of real social interactions due to the use of technology
- identity What defines who YOU are.
- A type of nation with a low standard of living and a low level of industrialization
- a custom or practice
Down
- identity Values and customs of groups you belong to and identify with.
- Everyone becoming increasingly the same.
- Your TV is manufactured in China through this.
- Fusion of cultures, such as tex-mex food or Reggaeton music.
- divide Matt lives in a developed nation and has access to high speed internet. Sam lives in a developing nation and does not have internet access.
- Organizations like the European Union are an example of __________ globalization
- “Uncle Sam Wants You” Posters are an example of this
- The process by which people’s lifestyles spread over global networks is called _______ globalization.
- Transporting goods in large boxes, which can be transferred easily from one form of transport (ship) to another (truck/train).
- The world is increasingly influenced by the United States due to their widespread economic control in the world
- Clothing, specifically worn by a particular group or culture.
- The spread of current trends worldwide is known as the _________ of pop culture
- The spread of trade and commerce across the world is known as ___________ globalization
- model someone others look up to as an example to follow.
- Jodi buys something, this makes her a ____________
- Concentration All big movies in the U.S. are produced by 6 main transnationals.
31 Clues: a custom or practice • depending on each other • identity What defines who YOU are. • Everyone becoming increasingly the same. • increasing interdependence and connections • Your TV is manufactured in China through this. • beliefs about society, politics and citizenship • Jodi buys something, this makes her a ____________ • ...
Internet 2021-11-02
Across
- not controlled by or directly connected to a computer or external network.
- commonly known as the Web.
- a group or system of interconnected people or things.
- a post made on the social media application
- occurs when a computer program such as a software application or an operating system stops
- is a multiple of a byte
- contains data that is stored for a short amount of time.
- is a computer or system that provides resources
- is an organized collection of structured information.
- is the practice of defending computers, servers mobile devices, electronic systems, Networks, and data from malicious attacks.
- a thing made or adapted for a particular purpose
- utilizing devices constructed
- messages distributed by electronic means.
- takes signals from your ISP.
- the notional environment in which communication over computer networks occurs.
- designed to block unauthorized access while permitting outward communication.
- is a top-level domain, also known as a TLD.
- A symbol on a display screen indicating that the computer is waiting for input
- services that run on the Internet, instead of locally on your computer.
- to transfer from a computer or other digital device to the memory of another device
Down
- copy (data) from one computer system to another typically over the internet.
- controlled by or connected to another computer or to a network.
- the application of scientific knowledge for practical purposes
- to obtain, examine, or retrieve
- is a computer network that uses wireless data connections between network nodes
- a group of binary digits or bits operated on as a unit.
- is a collection of web pages and related content
- relating to the whole world
- relating to or characteristic of the culture of computers
- are used to connect two or more devices
- facts provided
- is a document, commonly written in HTML
- means of sending or receiving information
- not physically existing as such but made by software to appear to do so.
- a website or web page providing access or links to other sites.
- a global computer network providing a variety of information.
- information processed or stored by a computer
- is an online journal or informational website displaying information.
- authority or, control within the Internet
39 Clues: facts provided • is a multiple of a byte • commonly known as the Web. • relating to the whole world • takes signals from your ISP. • utilizing devices constructed • to obtain, examine, or retrieve • are used to connect two or more devices • is a document, commonly written in HTML • means of sending or receiving information • messages distributed by electronic means. • ...
Intro Computers/Computing Part 1 Activity 2015-09-28
Across
- The best practice to generate document outlines is through the use of _______.
- the doctrine that brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.
- Visits sites on the internet, discovering web pages and building an index to the webs content based on keywords.
- Using neutral rather than subjective, boastful, or exaggerated language in a good web page is _______ _______.
- Communication in which both the sender and receiver are active at the same time
- A person who falsifies data to pretend to be someone else
- Downloading media (films, shows, games, music etc.) or software off websites for free where it is actually on sale.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM.
- Looks up user submitted keywords in the index and reports back which web pages the crawler has found containing those words.
- The codes or tags that browsers use to create web pages
- A related group of networked computers
- Networks that are not geographically close that make up the internet.
Down
- A good web page with about half the word count as the control condition is ________ ______.
- a unique address given to each computer connected to the internet
- Translates the hierarchical, human-readable names into the four number IP address
- A file of data on a local hard drive. When downloaded data are temporarily stored on the user's local disk or on a local network disk, it speeds up retrieval the next time the user wants that same data (Web page, graphic, etc.) from the Internet or other remote source.
- a suffix to the name of a computer file applied to indicate the encoding of its contents or usage
- What does DOM stand for?
- Networks that are geographically close that make up the internet.
- A system of interlinked hypertext documents accessed via the internet
21 Clues: What does DOM stand for? • A related group of networked computers • The codes or tags that browsers use to create web pages • A person who falsifies data to pretend to be someone else • a unique address given to each computer connected to the internet • Networks that are geographically close that make up the internet. • ...
DEEP LEARNING CROSS WORD PUZZLE 2023-12-29
Across
- The adversarial component in a GAN that tries to distinguish between real and generated data.
- A popular deep learning library often used for building and training neural networks.
- A popular activation function in neural networks, introducing non-linearity.
- A powerful language representation model pre-trained on vast amounts of textual data
- A type of layer in a CNN that typically follows convolutional layers and reduces spatial dimensions.
- The type of AI responsible for creating content that may be mistaken for human-created content
- The process of dividing an image into regions and assigning a label to each region.
- The process of teaching a machine to perform a task through trial and error.
- Components that process input data and produce a fixed-size representation in sequence-to-sequence tasks.
- The layer in a neural network designed for sequential data, allowing information to persist.
- A technique that involves using pre-trained models for tasks other than what they were originally trained for.
- An advanced type of RNN designed to address the vanishing gradient problem and capture long-term dependencies.
Down
- The layer in a CNN responsible for performing convolution operations on input data.
- The mathematical operations that determine the output of a neural network layer.
- The process of identifying and locating objects within an image.
- The technique of expressing operations as matrix/vector operations to enhance computational efficiency.
- A type of artificial neuron that takes multiple binary inputs and produces a binary output.
- A type of neural network architecture that utilizes self-attention mechanisms for parallelization
- The process of iteratively adjusting weights to minimize the difference between predicted and actual outputs.
- A common deep learning architecture consisting of layers of interconnected nodes.
- The process of adjusting the weights and biases in a neural network during training.
- It is an activation function.
- popular language model architecture known for its transformer architecture.
- A deep learning framework often used for computer vision tasks.
- A type of neural network used in generative tasks, consisting of a generator and discriminator.
- A variant of RNN that incorporates gating mechanisms to control the flow of information.
- The basic building block of a neural network that processes information.
- A fundamental unit of computation in a neural network.
28 Clues: It is an activation function. • A fundamental unit of computation in a neural network. • A deep learning framework often used for computer vision tasks. • The process of identifying and locating objects within an image. • The basic building block of a neural network that processes information. • ...
Television 2024-10-21
Across
- - A documentary-style series that explores a particular subject over several episodes.
- - A specific frequency or number through which television programs are broadcast.
- - A set of episodes of a TV show released over a specific period.
- - A person who watches television programs.
- - A new show derived from characters or elements of an existing series.
- - A collection of related episodes that follow a storyline or theme.
- - The concluding episode of a season or series, often featuring significant events.
- - A genre that portrays fictional or real-life events in a serious tone.
- - A comedic television series that focuses on a fixed set of characters in various situations.
- - Viewing multiple episodes of a show in one sitting.
- - A device or component that allows a television to receive broadcast signals.
- - The person who presents a television program, especially in talk shows or game shows.
- - An episode where characters from different shows appear together.
- - A short preview of an upcoming episode or show, designed to generate interest.
- - The first episode of a TV show, used to sell the series to networks.
- - Measurements of how many people watch a particular program, often used to gauge its popularity.
- - A paid advertisement broadcast during breaks in programming.
- - A dramatic ending to an episode that leaves viewers eager for the next installment.
Down
- Show - A television program that features a mix of different entertainment formats, such as music, comedy, and sketches.
- - The process of selling the rights to air a television show to multiple networks or stations.
- - A hybrid genre that combines elements of drama and comedy.
- - Watching TV shows or movies online in real-time or on-demand.
- - The written text of a television show, including dialogue and stage directions.
- - A device that displays the script for presenters to read during broadcasts.
- - A company that broadcasts television programs, such as NBC or CBS.
- - A device used to record and play back television programs, now largely replaced by digital technology.
- - A single installment of a television series.
- - The structure or style of a television program, such as reality, game show, or documentary.
- - A genre of television programming that documents unscripted real-life situations.
- - A payment model that allows viewers to access content from streaming services like Netflix or Hulu.
30 Clues: - A person who watches television programs. • - A single installment of a television series. • - Viewing multiple episodes of a show in one sitting. • - A hybrid genre that combines elements of drama and comedy. • - A paid advertisement broadcast during breaks in programming. • - Watching TV shows or movies online in real-time or on-demand. • ...
Tech Terms 2023-04-28
Across
- input device
- Personal Identifiable Information
- Read-Only Memory
- element of a computer that is physical.
- way to backup info
- World Wide Web
- type of search engine
- Start A computer
- Single Binary Unit
- Central processing unit
- device that connects two or more packet-switched networks or subnetworks
- type of browser
- Ctrl C
- any kind of computer software with malicious intent.
- anything that tells hardware what to do and how to do it.
- device that provides a service to another computer program and its user
- gap between demographics and regions that have access to modern information and communications technology and those that don't or have restricted access.
- main printed circuit board within a computer
- zeros and ones
- Alt P
- Example of an Operating System
- one kind of technology that stores the operating system, applications, and data files
- Ctrl V
- hyper tech markup link
Down
- invention that is the result of creativity to which one has rights and for which one may apply for a patent, copyright, trademark, etc.
- output device
- operational support system
- network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- Internet protocol Address
- a unit of information equal to 220 bytes or, loosely, one million bytes.
- Portable Document Format
- group of binary digits or bits operated on as a unit
- piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
- process of converting information or data into a code
- networking technology that includes the protocol, port, cable, and computer chip needed to plug a desktop or laptop into a local area network for speedy data transmission via coaxial or fiber optic cables.
- Process of downloading data
- connects your home, usually through a coax cable connection, to your Internet service provider
- computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings.
- Random Access memory
- Uniform Resource Locator
- a worldwide system of computer networks
- Restart a computer
- Domain Name System
- website designed to make it easy for users to create entries in chronological order
44 Clues: Alt P • Ctrl C • Ctrl V • input device • output device • World Wide Web • zeros and ones • type of browser • Read-Only Memory • Start A computer • way to backup info • Single Binary Unit • Restart a computer • Domain Name System • Random Access memory • type of search engine • hyper tech markup link • Central processing unit • Portable Document Format • Uniform Resource Locator • Internet protocol Address • ...
Chapter 3 quiz 2025-03-04
Across
- The arrangement of cabling and how cables connect one device to another in a network are considered:
- what transmission method sends digital signals in which each bit of data is represented by a pulse of electricity or light.
- is like a bus, in that devices are daisy-chained one to another, but instead of terminating each end, the cabling is brought around from the last device back to the first device to form a ring.
- Ethernet can also detect whether a frame has been damaged in transit. The errorchecking code in an Ethernet frame's trailer is called a ()?
- what systems use analog techniques to encode binary 1s and 0s across a continuous range of values.
- the term used when electricity bounces off the end of a cable and back in the other direction is called:(__or reflection)
- the extent to which signals in an Ethernet bus topology network are propagated is called()?
- is a direct link between two devices. It's most often used in WANs, in which a device on a business's network has a dedicated link to a telecommunication provider.
Down
- waht is the most widely used in networks containing more than just a few computers.
- The path data travels between computers on a network is considered:
- the media access method that Ethernet uses in half-duplex mode is()?
- Point-topoint topologies are also used with wireless networks in what is called a ().
- what connects eachdevice to every other device in a network?
- what is by far the simplest topology and one time was the most common method for connecting computers.
- the signals continue traveling along the cable and through any connecting devices until they weaken enough that they can't be detected or until they encounter a device that absorbs them. this traveling across the medium is called?
- what uses two strands of fiber-optic cable, is often the best choice of netwrok technology?
- what is the most common Ethernet variety?
- what uses a central devices such as a hub or switch, to interconnect computers in a LAN
- waht occurs if two or more devices on the smae medium transmit simultaneously.
- An electrical component called a "resistor" that absorbs the signal instead of allowing it to bounce back up the wire.
20 Clues: what is the most common Ethernet variety? • what connects eachdevice to every other device in a network? • The path data travels between computers on a network is considered: • the media access method that Ethernet uses in half-duplex mode is()? • waht occurs if two or more devices on the smae medium transmit simultaneously. • ...
Y10 CompSci IGCSE Review for Term 1 2025-01-06
Across
- A type of storage that uses magnetism to encode data
- A unit of data sent over a network, including payload and routing info
- Secure Sockets Layer; a protocol for encrypting internet communication
- A unique identifier for network interfaces, used for local communication
- Integrated Development Environment; software for writing, testing, and debugging code
- A network of remote servers used for storing data and applications
- Small pieces of data stored by websites in a user's browser
- firmware that initializes hardware during startup
- Software that converts high-level programming code into machine code
- temporary storage used by a computer during operation
- A value used to verify the integrity of data
- Devices that detect and respond to changes in the environment
- A protocol that defines how data is addressed and routed across networks
- A type of storage with no moving parts, such as SSDs
- Malicious software that attaches to programs, replicates, and spreads
- A type of storage that uses lasers and light to read/write data (e.g., CDs, DVDs)
- A subset of artificial intelligence that enables systems to learn from data
- Programs designed to perform maintenance tasks on a computer
- A self-replicating malware that spreads across networks independently
Down
- A communication mode where data can be sent and received simultaneously
- A number system based on 10
- The actual data in a data packet
- The first block in a blockchain, marking the start of a cryptocurrency network
- The part of the CPU used to manage and direct data flow in a computer
- A specialized computer designed to perform specific tasks within a larger system
- non-volatile storage that typically stores firmware
- Devices that convert electrical signals into physical movement
- Malicious software disguised as a legitimate program or file
- an attack where multiple systems overwhelm a target
- The use of unique physical traits (e.g., fingerprints, retina scans) for authentication
- a hardware component for connecting a computer to a network
- A computer system that mimics the decision-making abilities of a human expert
- Software that manages computer hardware and software resources
- The part of the CPU that performs arithmetic and logical operations
- A machine designed to carry out tasks autonomously or semi-autonomously using bots to request multiple requests
35 Clues: A number system based on 10 • The actual data in a data packet • A value used to verify the integrity of data • firmware that initializes hardware during startup • non-volatile storage that typically stores firmware • an attack where multiple systems overwhelm a target • A type of storage that uses magnetism to encode data • ...
Sociology Crossword 2026-04-02
Across
- The practice of assigning people to central or noncentral athletic positions on the basis of race or ethnicity.
- Media executives, editors, or reporters who can open or close the "gate" on a particular news story.
- A belief system in which moral principles have a sacred quality.
- A system of roles and norms organized around the sacred realm the binds people together in social groups.
- A system of roles and norms that ensures the transmission of knowledge, values, and patterns of behavior from one generation to the next.
- A section of the Education Amendment Act of 1972 that bars discrimination on the basis of gender in any program.
- A system in which non-English-speaking students are taught academic subjects in their native languages until they are prepared to attend classes taught in English.
- The assignment of students to different types of educational programs.
- A system in which a child's main education is undertaken by parents at home.
- Anything that is considered to be part of the supernatural world and that inspires awe, respect, and reverence.
- The belief in a god or gods.
Down
- The process of moving from the realm of the sacred to that of the profane.
- The gap between those with access to new technologies and those without.
- The processes by which every feature of human behavior becomes subject to calculation, measurement, and control.
- A type of religious organization in which all people in the society are members by virtue of their birth.
- Competitive games that are won or lost on the basis of physical skills and played according to specific rules.
- Anything considered to be part of the ordinary world, and this commonplace and familiar, not sacred.
- The social networks and the reciprocal norms associated with these networks that encourage people to do things for each other.
- The belief that there is only one god.
- A small unorthodox religious group.
- Transmission by schools of cultural goals that are not openly acknowledged.
- A belief system in which natural objects such as plants and animals are embodied spirits, which are active in influencing human life.
- schools Alternative schools that are funded by public money, but are privately operated.
- The belief in more than one god.
- An established pattern of behavior through which a group of believers experiences the sacred.
25 Clues: The belief in a god or gods. • The belief in more than one god. • A small unorthodox religious group. • The belief that there is only one god. • A belief system in which moral principles have a sacred quality. • The assignment of students to different types of educational programs. • The gap between those with access to new technologies and those without. • ...
Sociology Crossword 2026-04-02
Across
- The belief in more than one god.
- The social networks and the reciprocal norms associated with these networks that encourage people to do things for each other.
- schools Alternative schools that are funded by public money, but are privately operated.
- A belief system in which natural objects such as plants and animals are embodied spirits, which are active in influencing human life.
- A small unorthodox religious group.
- A system in which non-English-speaking students are taught academic subjects in their native languages until they are prepared to attend classes taught in English.
- A system of roles and norms organized around the sacred realm the binds people together in social groups.
- Anything considered to be part of the ordinary world, and this commonplace and familiar, not sacred.
- Media executives, editors, or reporters who can open or close the "gate" on a particular news story.
- A belief system in which moral principles have a sacred quality.
- The process of moving from the realm of the sacred to that of the profane.
- The belief that there is only one god.
- The practice of assigning people to central or noncentral athletic positions on the basis of race or ethnicity.
Down
- A system of roles and norms that ensures the transmission of knowledge, values, and patterns of behavior from one generation to the next.
- Transmission by schools of cultural goals that are not openly acknowledged.
- The gap between those with access to new technologies and those without.
- A system in which a child's main education is undertaken by parents at home.
- The processes by which every feature of human behavior becomes subject to calculation, measurement, and control.
- Competitive games that are won or lost on the basis of physical skills and played according to specific rules.
- Anything that is considered to be part of the supernatural world and that inspires awe, respect, and reverence.
- An established pattern of behavior through which a group of believers experiences the sacred.
- A section of the Education Amendment Act of 1972 that bars discrimination on the basis of gender in any program.
- The assignment of students to different types of educational programs.
- A type of religious organization in which all people in the society are members by virtue of their birth.
- The belief in a god or gods.
25 Clues: The belief in a god or gods. • The belief in more than one god. • A small unorthodox religious group. • The belief that there is only one god. • A belief system in which moral principles have a sacred quality. • The assignment of students to different types of educational programs. • The gap between those with access to new technologies and those without. • ...
EC8004 WIRELESS NETWORKS UNIT 3 3G OVERVIEW 2021-04-01
Across
- In a CDMA2000 network, support for EVDO indicates support for ____.
- Which of these transmit information about available random access codes and the types of transmit diversity methods
- _____________ is located between PDCP and MAC layers
- What is the system present in an OMM (Operation Maintenance and Management Subsystem)?
- Which is the technology used by WCDMA to transfer data packets in its RAN network (Air Interface + NodeB)?
- Who developed standards for a UMTS network?
Down
- UMTS use which multiple access technique?
- Which is the 3G technology suited for Macro and Micro Cell areas?
- 3G networks with TD-SCDMA technology are deployed mainly in ___ country.
- Cdma2000 1xEV was developed by ________
- SIM in a 3G network is called _____?
- _________layer broadcasts system information, handles radio resources such as code allocation, handover, admission control, measurement/control report.
- ___ is the termination point between the air interface and the transmission network of the RAN.
- ______ is responsible for the radio resources and transmission/reception in a set of cells
- Which application protocol used in UMTS Iu interface?
- _________ carries information for the control of transport network used within UCN.
16 Clues: SIM in a 3G network is called _____? • Cdma2000 1xEV was developed by ________ • UMTS use which multiple access technique? • Who developed standards for a UMTS network? • _____________ is located between PDCP and MAC layers • Which application protocol used in UMTS Iu interface? • Which is the 3G technology suited for Macro and Micro Cell areas? • ...
Hardware Words 2022-10-04
Across
- Allows wireless-capable devices to connect to a wired network.
- Receive, analyze and move incoming packets to another network.
- Allows data to be exchanged with other connected devices.
- Devices or nodes are linked together, branching off other devices or nodes
- Connects groups of computers over large distances
- Components that enable devices to connect to internal servers, web servers, and other LANs via wide area networks.
Down
- One central hub acts as a conduit to transmit messages.
- Key building blocks for any network.
- Communication and interaction between devices on a computer network.
- Enforce a network boundary.
- Enables a computer to connect to the internet via a telephone line.
- Connect to a network.
12 Clues: Connect to a network. • Enforce a network boundary. • Key building blocks for any network. • Connects groups of computers over large distances • One central hub acts as a conduit to transmit messages. • Allows data to be exchanged with other connected devices. • Allows wireless-capable devices to connect to a wired network. • ...
Cisco Crossword 2013-09-06
Across
- Instantly interacts with instant messaging and presence
- A computer network that interconnects computers in a limited area
- Technology that allows a person to feel as if they were present to give the appearance of being present
- Meet the needs of networks of all sizes
- Defines net bit rate
Down
- Offers collaboration solutions for online meetings
- An intelligent network optimized for rich media
- Proactive protection for radio frequency interference
- Service that allows events to be shared with remote locations
- Enabling the deployment of multiple advanced services.
- Ability of diverse systems and organizations to work together
- Provides extensive, reliable, and scalable element management capabilities to help you rapidly deploy and manage services
12 Clues: Defines net bit rate • Meet the needs of networks of all sizes • An intelligent network optimized for rich media • Offers collaboration solutions for online meetings • Proactive protection for radio frequency interference • Enabling the deployment of multiple advanced services. • Instantly interacts with instant messaging and presence • ...
AI Crossword 2022-05-16
Across
- Market leader in AI technology.
- Invented the Turing Machine.
- Intersection of science, engineering and technology.
- Regarded as the father of AI.
- First chess-playing computer.
- Field of computer science that focuses on creating digital systems that can process, analyze, and make sense of visual data.
- A computer program that performs various actions continuously and autonomously on behalf of an individual or an organization.
- Machine learning training method based on rewarding or punishing.
Down
- Network of physical objects.
- Models are trained with labeled data sets, which allow them to learn and grow more accurate over time.
- Networks that attempt to simulate the behavior of the human brain.
- Handles repetitive business processes using software robots to perform tasks.
12 Clues: Network of physical objects. • Invented the Turing Machine. • Regarded as the father of AI. • First chess-playing computer. • Market leader in AI technology. • Intersection of science, engineering and technology. • Machine learning training method based on rewarding or punishing. • Networks that attempt to simulate the behavior of the human brain. • ...
BITS of Cisco Fun 2025-03-25
Across
- a common technology for wireless internet connectivity (4)
- 2nd level of OSI model (8)
- the name of the city from where "cisco" originated from (12)
- state in which bits Pilani Hyderabad campus is located (9)
- a common input device used to type (8)
- bits hyderabad cultural fest (5)
Down
- fiesta del sol celebrates which type of culture (6)
- full form of "IP" in networking (8,8)
- a network that connects devices in a limited area like an office (3)
- product of cisco used for video conferencing, virtual meetings and webinars (5)
- cisco device used to connect networks and route traffic between them (6)
- memory in a computer that temporary stores data (3)
12 Clues: 2nd level of OSI model (8) • bits hyderabad cultural fest (5) • full form of "IP" in networking (8,8) • a common input device used to type (8) • fiesta del sol celebrates which type of culture (6) • memory in a computer that temporary stores data (3) • a common technology for wireless internet connectivity (4) • ...
Types and Topologies 2025-12-08
Across
- All devices connect to one central cable.
- A combination of multiple topology types.
- Every device connects to one central node.
- A network type that covers an entire city.
- A private network type used inside a single building.
Down
- Devices connect to one or more other devices for redundancy.
- A network type that connects devices within a person’s immediate range.
- A network type that spans a country or continent
- A network type meant to link devices on the largest scale.
- Any device that can send and receive data on a network.
- Each device connects in a circle to two other devices.
- A network arranged like a branching hierarchy with smaller networks linked under a main line.
12 Clues: All devices connect to one central cable. • A combination of multiple topology types. • Every device connects to one central node. • A network type that covers an entire city. • A network type that spans a country or continent • A private network type used inside a single building. • Each device connects in a circle to two other devices. • ...
Chapter 8 2019-11-12
Across
- a legal arrangement that involved peasants and landlords
- do physical labour for the owners of the means of production
- sum of useful skills & knowledge that an individual possesses
- social mobility that occurs within a single generation
- organizing into layers
- owners of the means of production
- Weber stated these were organizations that seek to impose their will on others
Down
- social mobility between generations
- the stock of knowledge, tastes & habits that legitimate the maintenance of status and power
- combines date on income, education, & occupational prestige in a single index
- networks or connections that individuals possess
- the ability to impose one's will on others despite resistance
- reports proportion of total income that would have to be redistributed for perfect equity
13 Clues: organizing into layers • owners of the means of production • social mobility between generations • networks or connections that individuals possess • social mobility that occurs within a single generation • a legal arrangement that involved peasants and landlords • do physical labour for the owners of the means of production • ...
1950's 2024-03-15
Across
- The 1950s were known for carefully planned houses catering to _______ sensibilities.
- What music was revolutionized during this time period.
- Known for playing comic "blonde bombshell" characters.
- Elaborate tail lights, wrap around windshields, and hood ornaments are all defining features of 1950______.
- A popular dish that would particularly contain seafood or ham.
- US Army built up its physical presence in this country in the 1950s.
Down
- The earliest one was created in 1958.
- Recognized as a film and fashion icon.
- What team controlled the decade.
- The number of the major networks that were created in the 1950s.
- The music teenagers would listen to during this period.
- Known as the "King of Rock and Roll"
- War that took place from 1950-1953.
13 Clues: What team controlled the decade. • War that took place from 1950-1953. • Known as the "King of Rock and Roll" • The earliest one was created in 1958. • Recognized as a film and fashion icon. • What music was revolutionized during this time period. • Known for playing comic "blonde bombshell" characters. • The music teenagers would listen to during this period. • ...
ESCAPE THE HACKER CROSSWORD 2023-10-24
5 Clues: MULTIPLE FORMS OF AUTHENTICATION • EXPLOITATION OF COMPUTER SYSTEMS AND NETWORKS • ENCRYPTED CONNECTION USED FOR SECURE BROWSING • TRICKS USERS INTO REVEALING SENSITIVE INFORMATION • MONITOR THE INCOMING AND OUTGOING TRAFFIC IN A NETWORK
PSY3130 Ch 9 and 10 review 2022-04-07
Across
- _____ branded the study of imagery as being unproductive because visual images are invisible to everyone except the person experiencing them.
- Concepts that are arranged in networks that represent the way concepts are organized in the mind are __________ networks.
- The _____ debate is concerned with whether imagery is based on spatial or language mechanisms.
- Based on the information your textbook provided about different category types, jumping from the _____ level to the basic level categories results in the largest gain in information.
- The pegword technique is particularly suitable for use when you need to remember items based on their ____.
- An average representation of the “typical” member of a category refers to a _____________.
- The ______________ approach is when knowledge of concepts is based on reactivation of sensory and motor processes that occur when we interact with the object.
- A category member the closely resembles a category prototype, example: fruit = banana, is ________ in prototypicality.
Down
- This researcher studied prototypes for colors and found that when participants were presented with a “good” green the participants were faster to identify the colors as “same” than when presented with a “poor” green.
- The researcher who studied mental imagery using the mental-walk technique.
- Family ____________ refers to items in a category that resemble one another in a number of ways.
- Back ______________ is when an error signal is transmitted back through the circuit; this indicates how weights should be changed to allow an output signal to match the correct signal.
- Measuring the amount of time a person requires to complete different cognitive tasks is the goal of mental _____.
- Graceful ______ is when a performance disruption occurs gradually as parts of the system are damaged; the network operation is not totally disrupted by the damage.
- Living things are distinguished by sensory properties and artifacts are distinguished by functions describes the ___________ functional hypothesis.
- This psychologist believed that imagery is propositional, and can be represented by abstract symbols.
- Imagine your roommate says, “I am leaving a key under the mat.” and you visualize your roommate putting a key under your doormat. This would support the idea that imagery is _______.
17 Clues: The researcher who studied mental imagery using the mental-walk technique. • An average representation of the “typical” member of a category refers to a _____________. • The _____ debate is concerned with whether imagery is based on spatial or language mechanisms. • ...
Digital Literacy 2025-12-10
Across
- the information about a person that exists on the internet as a result of their online activity.
- Relationships A one-sided, emotional connection fans form with media figures.
- Secretly installed on a device to monitor and collect user information often leading to identity theft or unauthorized system control.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, typically to send spam messages.
- Virus A type of self-replicating malware that spreads independently across computer networks. It exploits security vulnerabilities or uses social engineering to infect other systems.
- Options on digital platforms that control how your personal information is collected, used, shared, and seen by others. They allow you to manage data visibility, limit access, and protect your online identity from unauthorized exposure or misuse.
- Software used to block access to applications or files on a computer system until a sum of money is paid.
- a person who uses computers to gain unauthorized access to data.
- A person who speaks or acts in support of an individual or cause, particularly someone who stands up on behalf of a person being attacked or bullied.
Down
- The practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature.
- This software is disguised as a legitimate program to deceive users into installing it.
- Guidelines, often unspoken, that dictate acceptable behavior in online environments.
- Sources Provides accurate, trustworthy, and unbiased information, backed by evidence and often checked by experts.
- Malicious software is any program designed to harm, disrupt, steal data, or gain unauthorized access to computer systems, networks, or devices.
- The legal right for creators to control the use, reproduction, distribution, and adaptation of their original work.
- The practice of sending emails or other messages claiming to be from legitimate companies in order to get people to reveal personal information, such as passwords and credit card numbers.
- software that automatically displays or downloads advertising material (often unwanted) when a user is online.
17 Clues: a person who uses computers to gain unauthorized access to data. • Relationships A one-sided, emotional connection fans form with media figures. • Guidelines, often unspoken, that dictate acceptable behavior in online environments. • This software is disguised as a legitimate program to deceive users into installing it. • ...
Luke Webb - Crossword - 4 2016-10-24
Across
- Cellular phone that does things like a computer does mostly having a touchscreen interface, able to connect to internet
- Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware that not everyone has the same opportunities when it comes to technology
- repeatedly sending something
- the picture someone would see when you post a video
- software that automatically displays or downloads advertising material when a user is online
- A part of your computer that stores items
- Your personal computer, a router, server computers and a provider
- A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node
- foldable computer
- A application software would be something on your computer that you download
- A system that connects multiple devices to a wifi network
- a desktop computer terminal mostly networked and more powerful than a personal computer.
Down
- using a network of remote servers hosted on the Internet to store manage and process data, rather than a local server or a personal computer
- Malware' is a term used to refer to a variety of forms of hostile software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software
- the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information
- A wireless router than can connect you to the wifi
- A system software would be something that is a system that runs your computer
- A hub is a common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
- Making files and folders to be shared with your peers
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
20 Clues: foldable computer • repeatedly sending something • A part of your computer that stores items • A wireless router than can connect you to the wifi • the picture someone would see when you post a video • Making files and folders to be shared with your peers • A system that connects multiple devices to a wifi network • ...
BIS3588 2018-11-14
Across
- Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
- technology that aids in gathering information about a person or organization without their knowledge.
- collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
- type of eavesdropping program that monitors information traveling over a network.
- composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
- the coding and scrambling of messages to prevent their being read or accessed without authorization.
- the process of translating the system specifications prepared during the design stage into program code.
- form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
- _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
- Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
Down
- Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
- a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
- the process of changing from the old system to the new system.
- the removal of organizations or business process layers responsible for certain intermediary steps in a value chain.
- a string of bits, usually eight, used to store one number or character in a computer system.
- phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
- device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
- independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
- a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
- the standard data manipulation language for relational database management systems.
20 Clues: the process of changing from the old system to the new system. • type of eavesdropping program that monitors information traveling over a network. • the standard data manipulation language for relational database management systems. • a string of bits, usually eight, used to store one number or character in a computer system. • ...
BIS3588 Class Exercise 2018-04-22
Across
- technology that aids in gathering information about a person or organization without their knowledge.
- a string of bits, usually eight, used to store one number or character in a computer system.
- a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
- Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
- the process of translating the system specifications prepared during the design stage into program code.
- the process of changing from the old system to the new system.
- the standard data manipulation language for relational database management systems.
- the coding and scrambling of messages to prevent their being read or accessed without authorization.
- type of eavesdropping program that monitors information traveling over a network.
- form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
- _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
- independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
Down
- phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
- collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
- Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
- the removal of organizations or business process layers responsible for certain intermediary steps in a value chain.
- Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
- a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
- composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
- device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
20 Clues: the process of changing from the old system to the new system. • type of eavesdropping program that monitors information traveling over a network. • the standard data manipulation language for relational database management systems. • a string of bits, usually eight, used to store one number or character in a computer system. • ...
BIS3588 Class Exercise 2018-04-22
Across
- a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
- a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
- the standard data manipulation language for relational database management systems.
- technology that aids in gathering information about a person or organization without their knowledge.
- the removal of organizations or business process layers responsible for certain intermediary steps in a value chain.
- Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
- the process of changing from the old system to the new system.
- composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
- form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
- type of eavesdropping program that monitors information traveling over a network.
- phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
Down
- a string of bits, usually eight, used to store one number or character in a computer system.
- Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
- the coding and scrambling of messages to prevent their being read or accessed without authorization.
- independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
- _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
- the process of translating the system specifications prepared during the design stage into program code.
- collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
- Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
- device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
20 Clues: the process of changing from the old system to the new system. • type of eavesdropping program that monitors information traveling over a network. • the standard data manipulation language for relational database management systems. • a string of bits, usually eight, used to store one number or character in a computer system. • ...
Digital Communications 2024-01-31
Across
- _________ communication is the transfer of text, sounds, images, videos, etc. sent via electronic device
- digital channels through which the information moves from sender to receiver
- information being sent and communicated; can be of verbal or nonverbal form
- placement or lining up of text and graphics on the page
- device receives data constantly, allowing users to have a sound, video, image, etc. open
- any unplanned static or interruption during the communication process; can be semantic, internal or external
- written material or text of a publication; located directly under the headline
- a facility which allows individuals to connect to the internet wirelessly with their electronic devices such as smartphones, laptops, tablets, etc.
- location of items in relation to one another
- person or party receiving the message sent by another party
- _______ messaging that uses cellular airways and protocols to send messages from one cell phone to another
- refers to the arrangement of opposite elements
- wording in any written or printed document
- portions of the page or publication which are unused or blank
- _________ networks provide places for individuals to communicate with one another through social media platforms
- transmission of messages over communication networks
- phrase or sentence located on the top of the page which attracts a reader's attention to a particular product, service or idea
- way the element's lines, shapes, colors and textures are arranged on a document
- involves choosing the appropriate typefaces and creating their arrangement on the page
Down
- receiver's response which is communicated back to the original sender
- process of putting electrical form into thought
- any book, article or document before it is printed
- ________ Communication communication being expressed in language, spoken or written
- person or party sending a message to another person
- to direct, guide or move a viewer's eye in a particular direction
- conducted over Internet protocols which allow images to stream from one electronic device to another
- ________ Communication communication being expressed through body language or pictures
- unchanging look and feel across all pages of a site, publication or production
- to prepare language, images, sound or video for production or presentation by correcting, revising or deleting
- when a file is copied from a device or the Internet and placed on a phone, computer, or tablet so it can play without using data
- process of putting the message into a symbolic, electrical form
31 Clues: wording in any written or printed document • location of items in relation to one another • refers to the arrangement of opposite elements • process of putting electrical form into thought • any book, article or document before it is printed • person or party sending a message to another person • transmission of messages over communication networks • ...
Website Vocabulary COLE SMITH 2024-04-15
Across
- A website that allows you to make your own website.
- the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- able to move or be moved freely or easily.
- a particular group of consumers at which a product or service is aimed.
- Someone who browses or views a website.
- the quality of being able to adjust to new conditions.
- a hypertext document on the World Wide Web.
- able to be reached or entered.
- a computer suitable for use at an ordinary desk.
- the area of a page with a lack of content in it.
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- How something is advertised.
- The elements of web design take many of the basics of graphic design and include multiple levels of linked pages with interactive features that are common on the internet.
- find one's way
- being able to react quickly.
- your website address.
Down
- Someone who designs and creates websites.
- the arrangement of all visual elements on a webpage.
- create, share, and test designs for websites, mobile apps, and other digital products and experiences.
- open-source photo editing alternative to Adobe's category-leading Photoshop.
- a tool that generates a full static HTML website based on raw data and a set of templates.
- an all-encompassing online wireframing and product design tool designed to bring software ideas to life visually.
- a wireless, portable personal computer with a touchscreen interface.
- to give freedom or relief.
- the ease of how a user can navigate your site, get the information they are seeking, and/or purchase the product they want.
- the process where a web hosting provider stores and maintains website files and applications on a server to make its customers' websites accessible on the internet.
- A site that consists of several pages that present information.
- a multimedia platform loaded with different design functionalities and features that allow you to create visual content, graphics, presentations, advertising materials and branded social media content for your business or for personal use.
- advance or raise (someone) to a higher position or rank.
- a web-based user interface design tool for creating wireframes.
30 Clues: find one's way • your website address. • to give freedom or relief. • How something is advertised. • being able to react quickly. • able to be reached or entered. • Someone who browses or views a website. • Someone who designs and creates websites. • able to move or be moved freely or easily. • a hypertext document on the World Wide Web. • ...
Website Vocabulary COLE SMITH 2024-04-15
Across
- A website that allows you to make your own website.
- the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- able to move or be moved freely or easily.
- a particular group of consumers at which a product or service is aimed.
- Someone who browses or views a website.
- the quality of being able to adjust to new conditions.
- a hypertext document on the World Wide Web.
- able to be reached or entered.
- a computer suitable for use at an ordinary desk.
- the area of a page with a lack of content in it.
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- How something is advertised.
- The elements of web design take many of the basics of graphic design and include multiple levels of linked pages with interactive features that are common on the internet.
- find one's way
- being able to react quickly.
- your website address.
Down
- Someone who designs and creates websites.
- the arrangement of all visual elements on a webpage.
- create, share, and test designs for websites, mobile apps, and other digital products and experiences.
- open-source photo editing alternative to Adobe's category-leading Photoshop.
- a tool that generates a full static HTML website based on raw data and a set of templates.
- an all-encompassing online wireframing and product design tool designed to bring software ideas to life visually.
- a wireless, portable personal computer with a touchscreen interface.
- to give freedom or relief.
- the ease of how a user can navigate your site, get the information they are seeking, and/or purchase the product they want.
- the process where a web hosting provider stores and maintains website files and applications on a server to make its customers' websites accessible on the internet.
- A site that consists of several pages that present information.
- a multimedia platform loaded with different design functionalities and features that allow you to create visual content, graphics, presentations, advertising materials and branded social media content for your business or for personal use.
- advance or raise (someone) to a higher position or rank.
- a web-based user interface design tool for creating wireframes.
30 Clues: find one's way • your website address. • to give freedom or relief. • How something is advertised. • being able to react quickly. • able to be reached or entered. • Someone who browses or views a website. • Someone who designs and creates websites. • able to move or be moved freely or easily. • a hypertext document on the World Wide Web. • ...
Crossword 2023-08-29
Across
- A networking device that connects various networks, directs data packets, and facilitates communication between devices within the same network and across the internet.
- The maximum amount of data transmitted over a network or communication channel in each period, measured in bps or multiples, enabling faster data transfer.
- A small data unit that transmits information over a network, breaking down larger pieces into manageable chunks for efficient and reliable transmission.
- A security device or software monitors and controls network traffic based on predefined rules, safeguarding networks and devices from unauthorized access and cyber threats.
- Type of coaxial technology that utilizes digital signaling, allowing the cable to carry only one channel of digital data.
- A set of rules and conventions that govern the exchange and communication of data between devices within a network.
- The OSI layer responsible for data compression.
- A powerful computer that stores, delivers, and manages data, applications, or services to clients over a network, serving various purposes.
Down
- The decrease in the strength or intensity of a signal as it travels through a medium or over a distance.
- This process converts URLs into IP addresses, enabling other devices to locate and access websites and other internet resources (Acronym).
- A device that converts digital data from computers into analog signals for transmission over communication lines like phone lines or cable systems.
- A basic network device that connects multiple devices within a local area network (LAN) and broadcasts data, but lacks intelligent data traffic management.
- The arrangement of devices, connections, and components in a computer network.
- Signals that represent information using binary and have non-continuous wave forms.
- A network that connects devices within a limited geographical area (Acronym).
- Connections that provide high-speed internet access with diverse frequencies, enabling faster data transfer.
- A secure tunnel that hides your internet connection's location, ensuring privacy and security, particularly when using public Wi-Fi or browsing websites (Acronym).
- A device which functions as a traffic controller in a network, directing data only to the appropriate device rather than broadcasting it to all devices.
- An interconnection of devices, that facilitate data exchange and collaboration through communication and resource sharing.
- The Cloud Service model that provides basic configuration options (Acronym).
20 Clues: The OSI layer responsible for data compression. • The Cloud Service model that provides basic configuration options (Acronym). • A network that connects devices within a limited geographical area (Acronym). • The arrangement of devices, connections, and components in a computer network. • ...
Cloud Security and Data Privacy in Industrial IoT 2024-12-02
Across
- A technology that creates a virtual representation of physical hardware, such as servers, storage, and networks
- The unauthorized alteration or manipulation of devices, systems, or data to disrupt operations.
- A decentralized digital ledger used to securely record transactions across multiple systems.
- The principle of ensuring that information is accessible only to authorized users and systems.
- The implementation of measures to safeguard systems, networks, and data against cyber threats and attacks.
- A device that detects the change in the environment and responds to some output on the other system.
- The assurance that an individual or entity cannot deny the authenticity of their actions or communications.
- A mechanical or electronic component that performs actions based on control signals from a system.
- Malicious software designed to disrupt, damage, or gain unauthorized access to systems or data.
- The process of granting or denying specific permissions to a verified user or system.
- A framework that ensures the right individuals have appropriate access to technology resources.
- The process of verifying the identity of a user or device to ensure legitimate access.
- A cloud-based software delivery model where applications are accessed via a subscription over the internet.
Down
- A cyberattack where malicious code is inserted into a program or script to exploit vulnerabilities.
- An attack where a perpetrator intercepts and manipulates communication between two parties.
- The use of IoT technologies in industrial settings to enhance operational efficiency and automation.
- A type of key helps a user encrypt the available data while the private key decrypts it
- The process of securely creating, storing, distributing, and managing cryptographic keys.
- A security tool that monitors and filters network traffic to block unauthorized access while allowing legitimate communication.
- The process of converting readable data into a cipher text to prevent unauthorized access.
- A distributed computing paradigm that processes data near its source to minimize latency and improve efficiency.
- The practice of protecting personal or sensitive information from unauthorized access or disclosure.
- The assurance that data remains accurate, consistent, and unaltered during transmission or storage.
- A cyberattack that overwhelms a system or network to make it unavailable to users.
- Actions taken to reduce the severity or impact of identified security risks or vulnerabilities.
- Deliberate actions designed to exploit vulnerabilities in systems to gain unauthorized access or cause damage.
26 Clues: A cyberattack that overwhelms a system or network to make it unavailable to users. • The process of granting or denying specific permissions to a verified user or system. • The process of verifying the identity of a user or device to ensure legitimate access. • A type of key helps a user encrypt the available data while the private key decrypts it • ...
Communication Apps 2025-09-25
Across
- An instant messaging and communication platform integrated with Google Workspace.
- A private online community on the platform.
- A communication method that uses electronic devices to deliver messages across computer networks
- A video conferencing service from Google that facilitates online meetings for individuals and businesses by enabling audio, video, and screen sharing for participants.
- An Australian multinational proprietary software company that gives users a graphic design platform to create
- A virtual gathering for real-time audio and video communication, where the host leads a session with participation who can see and hear each other, share screens, and engage in features like chat.
- A messaging and video calling app for communication, allowing users to send text messages, voice notes, photos, and videos.
- A subsidiary of Block, Inc., an American web hosting and web development.
- A pre-installed email client on Apple's macOs, iOs, all iO's operating systems that allows users to send, receive, and manage emails from various producers.
- The use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
- A power-point based authoring tool and eLearing toolkit that enables users to create interactive courses, quizzes, and software simulations.
- A form of real-time communication over the internet or other networks, allowing users to exchange written messages immediately with one or more people.
Down
- A professional web and video conferencing software that enables businesses and individuals to host.
- The practice of conducting real-time, face-to-face meetings or collaborations between two or more people in different physical locations, using a computer or mobile device, internet connection, audio, and video transmission
- The process of creating and editing web pages using software and various technologies to build websites for the internet.
- An eLearning authoring tool used to create interactive courses, simulations, and responsive content for various devices.
- Software that enables the world's conversations
- A free cross-platform messaging and voice-over-IP service owned by meta platforms.
- A email personal information manager software by Microsoft that helps users manage emails, calendars, contacts, and tasks in one place.
- An open-source, fast, and general-purpose analytics engine for large-scale data process
20 Clues: A private online community on the platform. • Software that enables the world's conversations • A subsidiary of Block, Inc., an American web hosting and web development. • An instant messaging and communication platform integrated with Google Workspace. • A free cross-platform messaging and voice-over-IP service owned by meta platforms. • ...
Vocabulary Lesson 2 Maja 2017-03-03
Across
- an ill-bred man, especially one who behaves in a dishonorable or irresponsible way toward women. A local town boy or youth, as contrasted with a university or public school student. A servant at a university or public school.
- Short for Joint Photographic Experts Group, and pronounced jay-peg. JPEG is a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
- the introductory page of a website, typically serving as a table of contents for the site a web page set as the default or start-up page on a browser.
- Basis points (BPS) refer to a common unit of measure for interest rates and other percentages in finance. One basis point is equal to 1/100th of 1%, or 0.01% (0.0001), and is used to denote the percentage change in a financial instrument.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- In decimal systems, kilo stands for 1,000, but in binary systems, a kilo is 1,024 (2 to the 10th power). Technically, therefore, a kilobyte is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. ... In computer literature, kilobyte is usually abbreviated as K or KB.
- A scanner is an input device that scans documents and images, which can be imported into a computer. They are available in flatbed or sheet-fed versions and are usually connected via a high-speed USB port. OCR software can be used to recognize text documents imported from a scanner.
- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
- Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.
- a person who uses computers to gain unauthorized access to data.
Down
- a general-purpose computer programming language designed to produce programs that will run on any computer system.
- program instructions.
- a unit of information equal to one billion (109) or, strictly, 230 bits.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- URL is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
- In computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.
- A computer network or data network is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- (in relation to Excel spreadsheet): A cell is the intersection between a row and a column on a spreadsheet that starts with cell A1. Below is an illustrated example of a highlighted cell in Microsoft Excel; the cell address, cell name, or cell pointer "D8" (column D, row 8) is the selected cell and the location of what is being modified.
- A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
- (especially in computing) arranges or put into a format.
25 Clues: program instructions. • (especially in computing) arranges or put into a format. • a person who uses computers to gain unauthorized access to data. • a unit of information equal to one billion (109) or, strictly, 230 bits. • the process of converting information or data into a code, especially to prevent unauthorized access. • ...
Hardware and Software - Crossword Puzzle 2025-07-11
Across
- device, a piece of hardware device which is used to enter information to a computer for processing.
- Software, Utility software, also known as a utility program or simply a utility, is a type of system software designed to help manage, maintain, and optimize a computer system. These programs perform specific tasks to enhance the performance, security, and functionality of a computer, often assisting with tasks like virus detection, data backup, and file management.
- a person who uses or operates a computer.
- System, A computer system is a combination of hardware, software, and data working together to perform tasks. It encompasses the physical components (hardware), the instructions and programs (software), and the information being processed (data).
- Driver, a software program that is designed to control a particular hardware device that is attached to a computer.
- System, An operating system (OS) is the foundational software that manages a computer's hardware and software resources. It acts as an intermediary between the user and the computer hardware, enabling users to interact with the system and run applications.
- AND Output Device, A device that functions as both an input and an output device is called a bi-directional device or input/output (I/O) device. These devices can both receive information from the user or another system (input) and also send information to the user or another system (output). Examples of I/O devices: Touch Screens, Headsets (with microphones and speakers), USB drives, Modems, Hard drives, Sound Cards, Printers/Scanners and VR headsets and Gloves.
- ROM stands for Read-Only Memory. It is a type of computer memory that stores data permanently and cannot be easily modified or written to after it has been manufactured. ROM is primarily used to store firmware and other essential data that needs to be readily available when a device is powered on.
- Software, it is designed to run a computer’s hardware and application software, and make the computer system available for use. It serves as the interface between hardware, application software, and the user.
- an integrated circuit that contains all the functions of a central processing unit of a computer.
- RAM, or Random Access Memory, is a computer's short-term memory. It temporarily stores data that the CPU needs to quickly access for active tasks, like running applications and processing information. RAM is volatile, meaning data is lost when the computer is turned off.
- ICT, or Information and Communication Technology, encompasses all technologies used for handling information and facilitating communication. This includes both hardware and software, such as computers, networks, and the applications that run on them. ICT is a broad term, as the technologies and concepts within it are constantly evolving.
- a set of instructions or programs that tells a computer what to do or how to perform a specific task (computer software runs on hardware).
Down
- Network, A computer network is a system of interconnected computing devices that can communicate and share resources with each other. This connection allows devices to exchange data, access information, and utilize shared resources like printers or files. Networks can vary in size and complexity, from small home networks to vast global networks like the internet.
- Memory, Main memory, also known as primary memory or RAM (Random Access Memory), is a critical component in computer systems. It serves as the workspace for a computer's processor, storing data and instructions that are actively being used and executed.
- device, a piece of hardware device that receives information from a computer.
- Software, a computer program that provides users with tools to accomplish a specific task.
- A motherboard is the main circuit board in a computer, acting as the central communication backbone for all other components. It connects and facilitates communication between the CPU, memory, storage, and other peripherals. Essentially, it's the foundation upon which all other parts of the computer system are built and interact.
- Storage, Secondary storage, also known as auxiliary or external storage, refers to non-volatile memory devices used for long-term data storage that are not actively used by the computer's processor. These devices hold data even when the computer is powered off. Examples include hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, and cloud storage.
- devices, any hardware device that is located outside the computer.
- A CPU, or Central Processing Unit, is the "brain" of a computer, responsible for executing instructions and performing calculations. It processes data, controls other components, and manages the overall operation of the computer system.
- An Arithmetic Logic Unit (ALU) is a fundamental component of a computer's Central Processing Unit (CPU) that performs arithmetic and logical operations. It's the part of the CPU that does the actual calculations and comparisons.
- short for information technology. the development and use of IT are certain to bring about changes in education
- The Control Unit (CU) is a fundamental component of a computer's Central Processing Unit (CPU). It acts as the brain of the CPU, directing and coordinating the operations of all other components. The CU fetches instructions, decodes them, and then generates control signals to execute those instructions by directing data flow and managing resources.
- USB, which stands for Universal Serial Bus, is a standard interface for connecting various electronic devices to a computer or other devices for data transfer and power delivery. It's a widely used protocol that allows devices like keyboards, mice, printers, storage devices, and more to communicate with a host device.
- any physical device or equipment used in or with a computer system (anything you can see and touch)
26 Clues: a person who uses or operates a computer. • devices, any hardware device that is located outside the computer. • device, a piece of hardware device that receives information from a computer. • an integrated circuit that contains all the functions of a central processing unit of a computer. • ...
Aian Busine Culture 2021-03-13
Across
- capital, a form of trust
- ways of arranging the relations between firms and the economy
- different ways of holding together assets
- capital, where money is source and how it is allocated for use.
Down
- values, norms and socially constructed realities
- - the core ideas in the society about the place of the person in the social structure
- capital, where talents and skills are found
7 Clues: capital, a form of trust • different ways of holding together assets • capital, where talents and skills are found • values, norms and socially constructed realities • ways of arranging the relations between firms and the economy • capital, where money is source and how it is allocated for use. • ...
Areas in Globalization: 2025-05-22
Across
- Highly integrated urban areas that concentrate power in terms of economy, finance, culture, and decision-making.
- A global city (contains Wall Street)
- Areas poorly integrated into global networks
Down
- One of the limits of metropolisation (social limit)
- One cause of conflit in territories
- Centre of information, goods and other type of flows
- Name used by "dollfus" for the group of metropole(NO SPACE)
7 Clues: One cause of conflit in territories • A global city (contains Wall Street) • Areas poorly integrated into global networks • One of the limits of metropolisation (social limit) • Centre of information, goods and other type of flows • Name used by "dollfus" for the group of metropole(NO SPACE) • ...
IOT CROSSWORD 2020-06-06
Across
- An open source cross-platform IDE for programming in Python
- Method of collection & organizing of data is called a
- A device that connect two networks with different protocols
Down
- An electronic circuit which transmits its ID using RF Signal
- A program written with the IDE for Arduino is called
- Printed code strip attached to an object
- The “official” operating system of the Raspberry Pi
- A cloud computing platform provided by Amazon(short form)
8 Clues: Printed code strip attached to an object • The “official” operating system of the Raspberry Pi • A program written with the IDE for Arduino is called • Method of collection & organizing of data is called a • A cloud computing platform provided by Amazon(short form) • An open source cross-platform IDE for programming in Python • ...
Internet 2024-12-04
Across
- a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations
- Everything having to do with the Internet
- To transfer files or data stored on the internet
- Electronic mail
Down
- a device that directs data traffic between your local network and the Internet.
- The computer software or app you use to access the internet
- a wireless networking technology
- A number that is used to identify networks within the routing system
8 Clues: Electronic mail • a wireless networking technology • Everything having to do with the Internet • To transfer files or data stored on the internet • The computer software or app you use to access the internet • A number that is used to identify networks within the routing system • a device that directs data traffic between your local network and the Internet. • ...
Technology 2021-05-06
Across
- The page that an Internet browser first opens up to. It is usually the starting point of an organisation's or individual's website.
- any type of illegal activity that is undertaken (or relies heavily) on a computer.
- a device that allows computers to transmit information to each other via ordinary telephone lines.
- he software that manages all of a computer's processes and allows programs and applications to run.
- the smallest unit of measurement in computing.
- a conventional method of transmitting data.
- refers to a website's text and information, as opposed to its design and structure.
- allow you to limit your search or make it more specific by using words such as "and", "or" and "not".
- refers to the number of distinct pixels that make up the display on a computer monitor.
- A set of interconnected networks that allow computers in different locations to exchange information.
- the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
- usually referred to as a computer's "memory" - it stores information used by programs.
- refers to resources and services available on the Internet.
- refers to unsolicited email messages sent for marketing purposes.
- way of sending messages over the internet.
- the brains behind your computer.
- the most common way of connecting computers on a network with a wired connection. It is a type of local area network (LAN) technology, providing a simple interface for connecting multiple devices.
- refers to any software or hardware that acts to assist and improve the functional capabilities of people with disabilities.
- A measure of computer processor storage and real and virtual memory.
- refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- a document sent with an email message. Many types of files can be sent this way (e.g. Word documents, PDFs, Excel files, JPEGs).
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider.
Down
- set of computers on a network that are managed as a unit.
- barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- the reduction of the size of a file.
- a component that adds to a software program's functionality.
- a standard or set of rules that computers and other devices use when communicating with one another.
- a small program that allows a peripheral device such as a printer or scanner to connect to your PC.
- a document sent with an email message.
- refers to the part of an application that performs an essential task not apparent to the user.
- to load and initialise the operating system on a computer.
- a type of communications technology whereby a single wire can carry more than one type of signal at once.
- a conventional method of transmitting data. Standard landline telephones use analogue technology. It is distinct from digital technology, which provides for greater quality and speed of data transmission.
- it is temporarily stored on your computer.
- the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
- enables a computer user to search information on the Internet. It is a type of software that creates indexes of databases or Internet sites based on the titles of files, keywords, or the full text of files.
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences.
- is a piece of programming code inserted into other programming to cause damage.
- refers to measures designed to protect your computer, device or network.
- programming language that is commonly used in the development of client-server web applications.
- a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as "favourites."
- the brains of your computer. It is responsible for performing calculations and tasks that make programs work.
- A point within a network that interconnects with other networks.
- refers to the storing and accessing of data and programs over the Internet instead of on another type of hard drive.
- a wireless communications technology intended to replace cables.
- a software program that allows you to surf the web.
- the unit used to measure the speed of a computer's processor
- short for malicious software. It refers to a software program that has been developed to do harm to other computers.
- a microprocessor that performs many functions and calculations that make your computer run.
- software that allows you to view a PDF document (a document that can be seen but not changed). It can be downloaded free of charge from Adobe.
- The physical place where a computer stores information - applications and files.
51 Clues: the brains behind your computer. • the reduction of the size of a file. • a document sent with an email message. • it is temporarily stored on your computer. • way of sending messages over the internet. • a conventional method of transmitting data. • the smallest unit of measurement in computing. • a software program that allows you to surf the web. • ...
ICT Crossword 2018-10-08
Across
- Raise something to a higher standard in particular improve
- relating to or using signals or information represented by a continuously variable physical quantity
- is a radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world.
- a custom computer system designed for a specific person or an accessory that helps individual computer.
- is a specific set of ordered operations for a computer to perform
- Able to be easily carried or moved, especially because being of a lighter and smaller version than usual.
- Software that plays audio, video or animation files in the computer.
- the quantities, characters, or symbols on which operations are performed by a computer
- Memory that appears to exist as main storage although most of it is supported by data held in secondary storage
- Transmit or receive data, especially video and audio material over the Internet as a steady, continuous flow.
- a type of computer memory that can be accessed randomly
- an icon or figure representing a particular person in a video game, Internet forum, etc.
- the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- Defined in this volume as the erosion of boundaries between previously separate ICT services, networks, and business practices.
- restrict access to the full functionality or data
- A record of the address of a file, website, or other data made to enable quick access.
- is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply between personal computers and their peripheral devices.
- computers used primarily by large organizations for critical applications.
- is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, and building personal area networks.
- a device which can be slotted into a computer to allow the use of audio components for multimedia applications.
- is a programming language object that stores the memory address of another value located in computer memory.
- The main means of mass communication (broadcasting, publishing, and the Internet) regarded collectively.
- Place (a document) in a cabinet, box, or folder in a particular order.
Down
- Display an image of someone or something on television as a small number of large pixels.
- is the transmission of voice and multimedia content over Internet Protocol (IP) networks.
- is an electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, LiFi, 3G, etc.,
- a physical point in a raster image, or the smallest addressable element in an all points addressable display device; so it is the smallest controllable element of a picture represented on the screen.
- A machine-readable code in the form of numbers and a pattern of parallel lines of varying widths, printed on a commodity and used especially for stock control.
- The means by which the user and a computer system interact, in particular the use of input devices and software.
- a payment meant to make a fair exchange with someone for their effort and output
- is an information appliance device that generally contains a TV-tuner input and displays output to a television set and an external source of signal
- is the logic circuitry that responds to and processes the basic instructions that drive a computer.
- a software component that allows the input of characters without the need for physical keys.
- Remove or eliminate (something) completely.
- computer device that outputs a video signal or visual image to display a video game that one or more people can play.
- A computer graphic which may be moved on-screen and otherwise manipulated as a single entity.
- is an office machine which incorporates the functionality of multiple devices in one
- Capacity for the interconnection of platforms, systems, and applications.
- Uses the speed and versatility of computer graphics to display spatial data.
- A kind of memory that retains data in the absence of a power supply.
- is an input device that looks and acts like a pen. Instead of drawing with ink, it sends a digital signal to a compatible touchscreen
- is an standard business document which is prepared with questions deemed relevant.
- incorporates the functions of a central processing unit on a single integrated circuit.
- technology for radio wireless local area networking of devices based on the IEEE 802.11 standards.
- text Text that is not computationally tagged, specially formatted, or written in code.
45 Clues: Remove or eliminate (something) completely. • restrict access to the full functionality or data • a type of computer memory that can be accessed randomly • Raise something to a higher standard in particular improve • is a specific set of ordered operations for a computer to perform • Software that plays audio, video or animation files in the computer. • ...
Conners Internet terms 2021-10-28
Across
- Going across the web without a purpose
- The ending of a file
- Is a popular internet cable that is used for wired networks
- Going on the web with a purpose
Down
- It is a global wide area network that connects computer systems across the world
- Posting or sending offensive message over the internet
- It only allows trusted data to flow into your computer
- Smallest unit of measurement used to measure data
8 Clues: The ending of a file • Going on the web with a purpose • Going across the web without a purpose • Smallest unit of measurement used to measure data • Posting or sending offensive message over the internet • It only allows trusted data to flow into your computer • Is a popular internet cable that is used for wired networks • ...
Conners Internet terms 2021-10-28
Across
- Going across the web without a purpose
- The ending of a file
- Is a popular internet cable that is used for wired networks
- Going on the web with a purpose
Down
- It is a global wide area network that connects computer systems across the world
- Posting or sending offensive message over the internet
- It only allows trusted data to flow into your computer
- Smallest unit of measurement used to measure data
8 Clues: The ending of a file • Going on the web with a purpose • Going across the web without a purpose • Smallest unit of measurement used to measure data • Posting or sending offensive message over the internet • It only allows trusted data to flow into your computer • Is a popular internet cable that is used for wired networks • ...
Internet Vocab Cossward Puzzule 2014-04-29
Across
- Networks are : Online communities where people meet,socialize,exchange digital files
- Browser is : Software to view the internet
- is a :Unatherized person who secretly gains access to computer files
Down
- wright is : when a person copys something from a website
- is : A collabrite website which can be directly edited by anyone with accsess to it
- is : A group of connected computers
- is : to reload a page on the internet
- bullying is : A bully who operates online
8 Clues: is : A group of connected computers • is : to reload a page on the internet • bullying is : A bully who operates online • Browser is : Software to view the internet • wright is : when a person copys something from a website • is a :Unatherized person who secretly gains access to computer files • ...
digital media technology 2022-09-14
Across
- designates where and how a file will be stored
- physical equipment used in digital media
- location where files are safe and protected
- connection between two or more devices allowing for sharing and collaborating
- devices
- electronic device to be edited or stored
- program which manages the hardware and software on a computer
- process of transferring content from the site of creation to a site for publishing or viewing
- process of making corrections or improvements to digital media
Down
- content which can be created, viewed, distributed, modified and stored within
- design a user can see when interacting with a device
- programs used within computers which provide operating information
- process of preparing to create a project
- process of bringing content from the device used to create or capture it onto
14 Clues: devices • physical equipment used in digital media • electronic device to be edited or stored • process of preparing to create a project • location where files are safe and protected • designates where and how a file will be stored • design a user can see when interacting with a device • program which manages the hardware and software on a computer • ...
Siegel Year In Review Puzzle 2023-11-29
Across
- The title of our latest white paper
- One of our values in action.
- The acronym we use for public interest technology.
- Our research strategy is shaped by what we call the 3 “N’s”: ___________, Networks, and Insights (Hint: it doesn’t start with an “N!”).
- Our approach is __________-driven.
- ________ M. Siegel, our Chairman.
- Who writes grant recommendations?
- The number of interest areas Siegel currently has
Down
- We work at the nexus of technology and ___________.
- One of two authors we cite as inspiration for our work.
- Multidimensional infrastructure is physical, digital, and _______.
- We recently started thinking about the intersection of art and research, what we are calling ___________ research.
- What we call our weekly posts on our website sharing news, updates, and research findings.
- We believe that philanthropy is society’s __________ capital.
14 Clues: One of our values in action. • ________ M. Siegel, our Chairman. • Who writes grant recommendations? • The title of our latest white paper • Our approach is __________-driven. • The number of interest areas Siegel currently has • The acronym we use for public interest technology. • We work at the nexus of technology and ___________. • ...
Siegel Year In Review Puzzle Draft 2023-11-02
Across
- Our latest white paper “_______ as Community Infrastructure.”
- One of our values in action.
- The abbreviation we use for public interest technology.
- Our research strategy is shaped by what we call the 3 “N’s,” ___________, Networks, and Insights (Hint: it doesn’t start with an “N!”).
- We describe our approach as __________-driven.
- ________ M. Siegel, our Chairman.
- Who writes grant recommendations?
- We have _______ interest areas.
Down
- We work at the nexus of technology and ___________.
- One of two authors we cite as inspiration for our work.
- We believe infrastructure is physical, digital, and _______.
- We recently started thinking about the intersection of art and research, what we are calling ___________ research.
- What we call our weekly posts on our websites sharing news, updates and general thoughts.
- We believe philanthropy is society’s __________ capital.
14 Clues: One of our values in action. • We have _______ interest areas. • ________ M. Siegel, our Chairman. • Who writes grant recommendations? • We describe our approach as __________-driven. • We work at the nexus of technology and ___________. • One of two authors we cite as inspiration for our work. • The abbreviation we use for public interest technology. • ...
Predict The Words 2025-08-04
Across
- Function used to convert logits to probabilities in multi-class classification
- Popular activation function that outputs 0 for negative inputs and the input itself for positive inputs
- Neural network architecture designed for sequence data
- A supervised learning algorithm often used for classification tasks
- Algorithm that separates data using a hyperplane
- Process by which neural networks learn, adjusting weights based on errors
Down
- A problem where a model fits training data too closely and fails to generalize
- Learning paradigm where the model learns from feedback and rewards
- Preprocessing step to bring data to a common scale
- ML task to predict numerical outcomes
- Popular deep learning framework by Google
- An unsupervised learning algorithm that groups data into clusters
- Statistical method to reduce dimensionality
- Type of neural network commonly used in image processing
14 Clues: ML task to predict numerical outcomes • Popular deep learning framework by Google • Statistical method to reduce dimensionality • Algorithm that separates data using a hyperplane • Preprocessing step to bring data to a common scale • Neural network architecture designed for sequence data • Type of neural network commonly used in image processing • ...
GHANWAT.k_lab 4b 2026-02-09
Across
- Collection of data used to train machine learning models
- When a model learns training data too well and fails on new data
- Step-by-step procedure for solving a problem or performing a task
- Systematic error in predictions or unfairness in model outcomes
- Architecture revolutionizing NLP with attention mechanisms
- Subset of machine learning using multi-layered neural networks
- Using separate data to tune model parameters and prevent overfitting
Down
- Task of categorizing data into predefined classes or groups
- Process of teaching a model to recognize patterns in data
- A computing system inspired by biological brain structure
- Mathematical concept measuring rate of change in optimization
- Prediction task involving continuous numerical output values
- Learning approach where the model is trained with labeled examples
- Multi-dimensional array used in modern ML frameworks
14 Clues: Multi-dimensional array used in modern ML frameworks • Collection of data used to train machine learning models • Process of teaching a model to recognize patterns in data • A computing system inspired by biological brain structure • Architecture revolutionizing NLP with attention mechanisms • Task of categorizing data into predefined classes or groups • ...
A Christmas Gift for Mom 2024-12-20
Across
- “Links that form networks or relationships (11 letters)”
- “Time it takes for Earth to orbit the sun (7 letters)”
- “Compact or scaled-down version (4 letters)”
- “Seasonal greeting full of cheer (14 letters)”
- “Contest where letters matter most (11 letters)”
- “Publisher of ‘All The News That’s Fit to Print’ (14 letters)”
Down
- “A description for Kate, the unspoken truth, a victor of sibling rivalry (14 letters)”
- “They’re played on boards, fields, or screens (5 letters)”
- “Pieces penned by journalists or scholars (8 letters)”
- “They leave you scratching your head, but not from lice (7 letters)”
- “Turning raw ingredients into edible masterpieces (7 letters)”
- “Thin threads or single parts of something twisted (7 letters)”
- “Commitment to regular delivery, often digital (12 letters)”
- “Three words said with the heart (9 letters)”
14 Clues: “Compact or scaled-down version (4 letters)” • “Three words said with the heart (9 letters)” • “Seasonal greeting full of cheer (14 letters)” • “Contest where letters matter most (11 letters)” • “Time it takes for Earth to orbit the sun (7 letters)” • “Pieces penned by journalists or scholars (8 letters)” • “Links that form networks or relationships (11 letters)” • ...
informatics 2020-05-13
Across
- a letter that you get from somebody
- a way of getting to something
- is an object on a computer that stores data, information
- a word or a button that stops the computer
- a set of computers connected together for the purpose of sharing resources
- an electronic machine that can store and work with large amounts of information
- global system of interconnected computer networks
Down
- the name of a person
- the usually flat part of a television or computer monitor that shows the images or text
- connects directly to a modem by a cable transmits information from the internet
- the name given to something to describe it
11 Clues: the name of a person • a way of getting to something • a letter that you get from somebody • a word or a button that stops the computer • the name given to something to describe it • global system of interconnected computer networks • is an object on a computer that stores data, information • a set of computers connected together for the purpose of sharing resources • ...
Puzzle #31 2023-02-05
Across
- - the protection of computers and networks from digital threats
- - information that can be processed by a computer
- - a collection of structured data
- - a computer that requests resources from a server
- - a set of instructions used to perform a specific task
- reality - a simulated environment that can be experienced through computer devices
Down
- computing - using remote servers over the internet to store, process, and manage data
- - a security system that monitors and controls incoming and outgoing network traffic
- - the process of converting data into a code to protect it
- intelligence - the development of computer systems to perform tasks that normally require human intelligence
- - a computer that provides shared resources
11 Clues: - a collection of structured data • - a computer that provides shared resources • - information that can be processed by a computer • - a computer that requests resources from a server • - a set of instructions used to perform a specific task • - the process of converting data into a code to protect it • ...
Investigation crossword puzzle 2023-01-30
Across
- describes all matter as tiny particals that are in constant motion
- a substance that flows
- a body shitfts from one ponit in space to another
- a body spins around a fixed point
- energy in motion from a foce
- are formed via strong metallic bonds
- consist of molecules that are held together by the relativly weak intermolecular forces
Down
- consist of networks of atoms held together by covalent bonds
- an object moves repidly back and forth but stays in a fixed place
- is the result of forces between the molecules of gas and the container walls
- consist or positively and negativly charged ions held togehter by ionic bonds
11 Clues: a substance that flows • energy in motion from a foce • a body spins around a fixed point • are formed via strong metallic bonds • a body shitfts from one ponit in space to another • consist of networks of atoms held together by covalent bonds • an object moves repidly back and forth but stays in a fixed place • ...
Epic Tech Cross-word 2014-03-18
Across
- High-capacity, self-contained storage device containing a read –write mechanism.
- A unique string of numbers separated by periods that identifies each computer.
- The smallest unit of measure for computer data.
- 1024 gigabytes
- Is the conversion of data into a form called ciphertext.
Down
- A measurement of the smallest detail that can be distinguished by a sensor system under specific conditions.
- Minute area of illumination on a display screen, one of many from which and image is composed.
- One unit of binary data cpable of being routed.
- Eight BITs
- Device that forwards data packets between computer networks.
- Central processing unit, also referred to as a CPU.
11 Clues: Eight BITs • 1024 gigabytes • One unit of binary data cpable of being routed. • The smallest unit of measure for computer data. • Central processing unit, also referred to as a CPU. • Is the conversion of data into a form called ciphertext. • Device that forwards data packets between computer networks. • ...
Introduction to the Internet (2025) 2025-07-18
Across
- A personal online journal that is frequently updated and intended for general public consumption.
- Internet-based distributed information system.
- A link from one web document to another is called a _________.
- A global network of computer networks.
- The unique network address that identifies the host computer on the internet.
Down
- The "address" of a web page is called a _____.
- A high-speed communications media connecting many computers.
- An application that helps users to obtain information from the Web.
- A collaborative website which can be directly edited by anyone with access to it.
- Most web pages are written in ______.
- A company that provides access to the internet.
11 Clues: Most web pages are written in ______. • A global network of computer networks. • The "address" of a web page is called a _____. • Internet-based distributed information system. • A company that provides access to the internet. • A high-speed communications media connecting many computers. • A link from one web document to another is called a _________. • ...
Conners Internet terms 2021-10-28
Across
- Going across the web without a purpose
- The ending of a file
- Is a popular internet cable that is used for wired networks
- Going on the web with a purpose
Down
- It is a global wide area network that connects computer systems across the world
- Posting or sending offensive message over the internet
- It only allows trusted data to flow into your computer
- Smallest unit of measurement used to measure data
8 Clues: The ending of a file • Going on the web with a purpose • Going across the web without a purpose • Smallest unit of measurement used to measure data • Posting or sending offensive message over the internet • It only allows trusted data to flow into your computer • Is a popular internet cable that is used for wired networks • ...
The Internet 2023-03-24
Across
- buying and selling products and services online
- Software designed to help users find information on the internet
- The address of a web site
- A system of computers that are connected together to share resources and information
Down
- Learning online using a computer
- Software that is used to connect to the world wide web
- A worldwide system of computer networks
- Allows users to click on a picture or text t move to a web page
8 Clues: The address of a web site • Learning online using a computer • A worldwide system of computer networks • buying and selling products and services online • Software that is used to connect to the world wide web • Allows users to click on a picture or text t move to a web page • Software designed to help users find information on the internet • ...
Online Safety 2024-02-17
Across
- How can you protect personal information on social networks?
- What should you hide from unknown people?
- What should you do if a people asks you to take photo of you?
Down
- Why can your computer be affected?
- Who do you send your private photos to?
- If someone sends you a link, will you open it?
- When you feel in danger on the Internet, who will you ask for help?
- How should you behave on the Internet?
8 Clues: Why can your computer be affected? • How should you behave on the Internet? • Who do you send your private photos to? • What should you hide from unknown people? • If someone sends you a link, will you open it? • How can you protect personal information on social networks? • What should you do if a people asks you to take photo of you? • ...
Informatika - sigurnost na mreži 2021-02-02
Across
- - ... identiteta je najopasnija vrsta nasilja preko interneta
- - računalni program koji se samostalno umnožava čineći različite oblike štete i neželjene posljedice na zaraženom računalu
- - internetsko nasilje
- - računalni program koji se samostalno umnožava čineći različite oblike štete i neželjene posljedice na zaraženom računalu
- - skup povezanih računala koji omogućuju brzu razmjenu podataka neovisno o njihovoj udaljenosti
- - Danas najviše informacija sa svijetom dijelimo putem društvene mreže koja se zove...
Down
- - program koji omogućava pristup web stranicama
- - programi koji se maskiraju u poznate, bezopasne programe, a zapravo rade štetu na vašem računalu (.... konj)
- - vrsta štetnih, zlonamjernih programa
- - Pod ... – My Account – Networks nalazi se popis mreža čijih ste član, a bilo bi preporučljivo da niste
- - programi koji prate što radite na računalu
- - 8.2. obilježava se ... sigurnijeg interneta
- - tipka s pomoću koje možeš spriječiti daljni dolazak nepoželjenih poruka
13 Clues: - internetsko nasilje • - vrsta štetnih, zlonamjernih programa • - programi koji prate što radite na računalu • - 8.2. obilježava se ... sigurnijeg interneta • - program koji omogućava pristup web stranicama • - ... identiteta je najopasnija vrsta nasilja preko interneta • - tipka s pomoću koje možeš spriječiti daljni dolazak nepoželjenih poruka • ...
Identity Theft 2023-05-12
Across
- A ______ or purse with personal information can be easily stolen if left unsupervised.
- A dishonest employee selling consumer information
- What should be done to any unused credit card offers.
- When going on vacation, put mail on ____ to prevent it being stolen.
- wrongful or criminal deception intended to result in financial or personal gain.
- File a Police ______ if your information has been stolen.
Down
- What you owe; Don't leave these lying around.
- A system of computer networks; also known as "the web"
- Check credit reports once per ____.
- Includes all accounts a person has, their SSID, and personal info
- When someone wrongfully obtains and uses someone else's personal identification
- When discarded information is obtained through going through waste
12 Clues: Check credit reports once per ____. • What you owe; Don't leave these lying around. • A dishonest employee selling consumer information • What should be done to any unused credit card offers. • A system of computer networks; also known as "the web" • File a Police ______ if your information has been stolen. • ...
Module 2 Lesson 3 2024-11-17
Across
- Barriers that prevent effective communication in healthcare.
- The condition of a person’s living environment, influencing overall health.
- Efforts to influence policies for improved community health resources.
- Remote healthcare consultations via digital platforms.
- Access to reliable travel for medical appointments.
- Access to services that maintain or improve health.
- Fair and just access to healthcare for all individuals.
Down
- Social networks and resources aiding individuals in health challenges.
- Environment including safety and housing conditions that affect health.
- The ability to manage financial resources and navigate health services.
- Conditions that impact health outcomes based on where people are born, grow, work, and age.
- Long-term health conditions that are impacted by SDOH.
12 Clues: Access to reliable travel for medical appointments. • Access to services that maintain or improve health. • Long-term health conditions that are impacted by SDOH. • Remote healthcare consultations via digital platforms. • Fair and just access to healthcare for all individuals. • Barriers that prevent effective communication in healthcare. • ...
Cybersecurity Crossword Puzzle 2024-10-30
Across
- Malicious software designed to harm or exploit devices
- A method of disguising data to protect it
- A program that scans for vulnerabilities in systems
- A type of attack where multiple systems are used to overwhelm a target
- The act of illegally accessing a computer system
- A device that helps protect networks by filtering traffic
- A common form of malware that locks files
Down
- A more secure method to login to an account using various factors such as something you know and something you have
- The process of verifying the identity of a user
- A malicious email designed to trick recipients
- A legal framework for data protection in the EU
- Software that detects and removes malware
12 Clues: A method of disguising data to protect it • Software that detects and removes malware • A common form of malware that locks files • A malicious email designed to trick recipients • The process of verifying the identity of a user • A legal framework for data protection in the EU • The act of illegally accessing a computer system • ...
BITS of Cisco Fun 2025-03-25
Across
- a common technology for wireless internet connectivity (4)
- product of cisco used for video conferencing, virtual meetings and webinars (5)
- the name of the city from where "cisco" originated from (12)
- bits hyderabad cultural fest (5)
- state in which bits Pilani Hyderabad campus is located (9)
- memory in a computer that temporary stores data (3)
- fiesta del sol celebrates which type of culture (6)
Down
- full form of "IP" in networking (8,8)
- cisco device used to connect networks and route traffic between them (6)
- a common input device used to type (8)
- 2nd level of OSI model (8)
- a network that connects devices in a limited area like an office (3)
12 Clues: 2nd level of OSI model (8) • bits hyderabad cultural fest (5) • full form of "IP" in networking (8,8) • a common input device used to type (8) • memory in a computer that temporary stores data (3) • fiesta del sol celebrates which type of culture (6) • a common technology for wireless internet connectivity (4) • ...
ICT in our lives 2022-10-11
Across
- I always use a ... app to get to different places when I'm on holidays.
- Mum: ... me an audio message when you arrive home!
- You can ... movies, music and books from the Internet for free.
- I use Spotify to ... to my favourite music.
- If you want to know more abou this concert, ... this QR code!
- You use a 3D ... to make 3D-printed prosthetics.
Down
- Many people ... a computer to check emails.
- I have to ... information about World War 1 for my history project
- Lily is always updating her ... on social networks.
- I use Classroom to ... my homework.
- I never ... selfies on Instagram.
- I use Whatsapp to ... with friends all the time.
12 Clues: I never ... selfies on Instagram. • I use Classroom to ... my homework. • Many people ... a computer to check emails. • I use Spotify to ... to my favourite music. • I use Whatsapp to ... with friends all the time. • You use a 3D ... to make 3D-printed prosthetics. • Mum: ... me an audio message when you arrive home! • ...
DGST 101 Final Project 2022-04-25
Across
- Anything created by humans which gives information about the culture of its creators and users
- Legal agreements between a service provider and a person who wants to use that service
- Not involving the use of computer technology
- An electronic game in which players control images on a video screen
- animations or video clips used to represent a feeling or action
- The interconnected system of public webpages accessible through the Internet
Down
- The gap between those who have access to digital technology and those who do not
- Founder of Facebook
- Ray Bradbury classic
- Operational Security (abbrv)
- The art/science of investigating people or incidents using information freely available on the internet.
- Global system of interconnected computer networks
12 Clues: Founder of Facebook • Ray Bradbury classic • Operational Security (abbrv) • Not involving the use of computer technology • Global system of interconnected computer networks • animations or video clips used to represent a feeling or action • An electronic game in which players control images on a video screen • ...
melanie cortes 2021-05-24
Across
- done through a variety of applications.
- in the exchange of products or services using computer networks specificalli¿y the internet.
- the tearm applied to conducting transactions trough electronic means.
Down
- packaging envelopes shipping labels etc.
- includes everything related to online purchases and sales.
- to consumer employee business.
6 Clues: to consumer employee business. • done through a variety of applications. • packaging envelopes shipping labels etc. • includes everything related to online purchases and sales. • the tearm applied to conducting transactions trough electronic means. • in the exchange of products or services using computer networks specificalli¿y the internet.
Pict-O-Word 2022-03-27
Across
- a set of instructions for solving problems
- a network of 3D virtual networks
- a study of computers and computing
Down
- a scripting language that enables you to create dynamically updating content, control multimedia, animate image etc
- intersection of science, engineering and technology that produces machines
- a USB Flash drive
6 Clues: a USB Flash drive • a network of 3D virtual networks • a study of computers and computing • a set of instructions for solving problems • intersection of science, engineering and technology that produces machines • a scripting language that enables you to create dynamically updating content, control multimedia, animate image etc
Gavin Whitcomb 2017-11-29
Across
- Virus
- A code planted illegally in a computer program, often to damage or shut down a system or network.
- What we use in school to go on the internet
- A virus
- A vast computer network linking smaller computer networks worldwide
- A network of computers floods an online resource with high levels of unwanted traffic
Down
- A type of digital currency
- Another word for picture
- Not trusted
- An electronic device used to accept data and also used to go in the internet
- Used to direct the operation of a computer, as well as documentation giving instructions on how to use them.
- A collection of data stored in one place in a computer
- A system used for sending messages
13 Clues: Virus • A virus • Not trusted • Another word for picture • A type of digital currency • A system used for sending messages • What we use in school to go on the internet • A collection of data stored in one place in a computer • A vast computer network linking smaller computer networks worldwide • An electronic device used to accept data and also used to go in the internet • ...
Theory A1 part 1 - BTEC DIT 2023-06-27
Across
- is when several people can work together online
- _____ power is faster on cloud computing platforms
- all data on an open network is this
- is commonly used network to connect a device whilst on the move
- is when you connect a device to your phone to share the connection
- cloud-this is flexible and allows you to increase/decrease your storage
- cloud-these are done automatically
Down
- This type of country has less networking infrastructure
- these areas have many more open networks than rural areas
- cloud-All your files will be the same across devices
- hills, buildings can cause these
- cloud-help to fix technical issues
- cloud-can be set up on cloud storage to allow different people different levels of use
13 Clues: hills, buildings can cause these • cloud-help to fix technical issues • cloud-these are done automatically • all data on an open network is this • is when several people can work together online • _____ power is faster on cloud computing platforms • cloud-All your files will be the same across devices • This type of country has less networking infrastructure • ...
The Biological Approach 2023-05-03
Across
- Changes the state of neuronal networks throughout the brain and modifies their response to internal and external stimuli.
- et.al, Investigating the effect of nurturing mothers on the hippocampal development of their children.
- The brain’s ability to change as a result of experience.
- Nerve cell
- Involved in mood regulation, appetite, and sleep.
- A chemical messenger that sends messages.
- The brain's organ that is associated with memory.
Down
- The term used to describe how different parts of the brain perform different functions.
- The process of neurons sending signals to each other.
- Includes all the nerves outside of the cerebral nervous
- System, Your body’s command center
- The points of contact between neurons where information is passed.
- Includes the brain and spinal cord.
13 Clues: Nerve cell • System, Your body’s command center • Includes the brain and spinal cord. • A chemical messenger that sends messages. • Involved in mood regulation, appetite, and sleep. • The brain's organ that is associated with memory. • The process of neurons sending signals to each other. • Includes all the nerves outside of the cerebral nervous • ...
Kinship 2023-03-16
Across
- Extreme strict parenting style
- Word used to describe path of descent
- one of the highest-known rates of cousin marriage in the world
- Bride/Prince
- Process of a wife losing her husband
- type of kinship that reinforces existing ties
- Person with whom the child lives and provides daily care
Down
- system where children and wives take the father's surname, and property is passed through the male
- Ceremony making an important stage in someones life such as birth,marriage, puberty and death
- type of kinship that expands social networks
- system where children and wives take the father's surname, and property is passed through the female
- The process of bringing up a child
- Gift given by a bride's family
13 Clues: Bride/Prince • Extreme strict parenting style • Gift given by a bride's family • The process of bringing up a child • Process of a wife losing her husband • Word used to describe path of descent • type of kinship that expands social networks • type of kinship that reinforces existing ties • Person with whom the child lives and provides daily care • ...
Why Being Bilingual is Good for your Brain 2024-10-22
Across
- A key discovery that significantly changes understanding
- The ability to understand or become aware of something through the senses
- Connections in the brain related to activity during rest
- A medical condition where blood flow to the brain is disrupted
- Another term for the mental "muscles" used for thinking and problem-solving
- Mental flexibility developed through switching between languages
- A state of mental rest or thinking without focus
Down
- A person's point of view or way of seeing things
- Commonly agreed upon by many people
- Regions in the brain that communicate and process information
- The process of recovering or returning to a normal state
- The ability to think, learn, and remember
- A second language learned later in life
13 Clues: Commonly agreed upon by many people • A second language learned later in life • The ability to think, learn, and remember • A person's point of view or way of seeing things • A state of mental rest or thinking without focus • A key discovery that significantly changes understanding • The process of recovering or returning to a normal state • ...
Hardware&Software 2025-09-24
Across
- Software that allows the operating system to interact with hardware devices
- The main circuit that connects all computer components
- Software embedded in hardware that controls its operation
- Provides electrical power to all computer components
- Software that creates and manages virtual machines
- The brain of the computer that executes instruction and processes data
- Set of rules that allows interaction between different programs
- Set of software for communication and network management
Down
- Storage devices for saving data and programs permanently
- Technique that allows multiple operating systems to run on a single physical hardware
- Device that enables connection to networks, either wired or wireless
- System for data tranfer between computer components
- External devices such as keyboard, mouse, printer and monitor
13 Clues: Software that creates and manages virtual machines • System for data tranfer between computer components • Provides electrical power to all computer components • The main circuit that connects all computer components • Storage devices for saving data and programs permanently • Set of software for communication and network management • ...
CPA 3NT_System Specifications & Computer Networks 2021-09-26
Across
- A type of network located within a single building
- This type of storage is non-volatile and used to keep programs and data indefinitely
- The brain of the computer
- Connects multiple computers and devices to form a network
Down
- The unit of measurement for a processor's clock speed
- Allows a computer to connect to a network to transmit and receive data
- Converts data from one form to another to connect a network and the Internet
- Connects networks and DIRECTS data flow between them
- A type of network spans across a large geographical area
9 Clues: The brain of the computer • A type of network located within a single building • Connects networks and DIRECTS data flow between them • The unit of measurement for a processor's clock speed • A type of network spans across a large geographical area • Connects multiple computers and devices to form a network • ...
Renaissance Crossword Puzzle 2024-05-17
Across
- a person chosen, named, or honored as a special guardian, protector, or supporter.
- Nicolaus Copernicus
- The frescoes on the ceiling of the Sistine Chapel
- a Venetian merchant and adventurer
- of or relating to the most highly developed stage of an earlier civilization and its culture.
- an art-loving family of wealthy bankers (and three popes),
- not having any connection with religion
Down
- the way individuals see the world.
- a philosophy of life that considers the welfare of humankind – rather than the welfare of a supposed God or gods
- The printing press
- a period in European civilization that was marked by a revival of Classical learning and wisdom.
- a series of ancient trade networks
12 Clues: The printing press • Nicolaus Copernicus • the way individuals see the world. • a series of ancient trade networks • a Venetian merchant and adventurer • not having any connection with religion • The frescoes on the ceiling of the Sistine Chapel • an art-loving family of wealthy bankers (and three popes), • ...
LbV 2024-10-31
Across
- VALLEY A region in New York known for its scenic landscapes and roads
- An association focused on tolls and crossings (abbreviation)
- A method for recognizing immobile road users (abbreviation)
- A district in London known for its road networks and urban infrastructure
- A popular Middle Eastern dish made from ground chickpeas
- AWARENESS The ability to identify and understand information about the environment
- MANAGEMENT A system for controlling traffic flow
- An online platform for human resources management
Down
- HIGHWAYS Major roads that connect different regions in a country
- A surface material used to pave roads
- A spicy vegetable relish often served with bread
- A messaging platform used for team communication and collaboration
12 Clues: A surface material used to pave roads • A spicy vegetable relish often served with bread • MANAGEMENT A system for controlling traffic flow • An online platform for human resources management • A popular Middle Eastern dish made from ground chickpeas • A method for recognizing immobile road users (abbreviation) • ...
IT PROFESSIONS 2024-12-20
Across
- A professional who checks software for bugs and errors.
- A professional who analyzes requirements and processes in IT projects.
- An expert who provides professional advice in IT.
- A person who manages and maintains servers, networks, or databases.
- A team member who helps users solve technical issues.
- A person responsible for designing and building systems or hardware.
- A specialist who creates visual and user-friendly interfaces.
Down
- A person who organizes and oversees IT teams and projects.
- An IT professional who works independently on projects.
- A person who writes and maintains computer code.
- An expert who plans the structure of IT systems and applications.
- Someone who explores and tests security vulnerabilities in systems.
12 Clues: A person who writes and maintains computer code. • An expert who provides professional advice in IT. • A team member who helps users solve technical issues. • An IT professional who works independently on projects. • A professional who checks software for bugs and errors. • A person who organizes and oversees IT teams and projects. • ...
Networking Concepts 2025-05-18
Across
- Type of network where only two devices are present.
- The most common network card.
- Layouts in which various components of a network are connected.
- Wi-fi stands for:
- Device that connects two different types of networks with each other.
- The devices that communicate with each other in a network.
- Type of network that connects two or more computers at distant places.
Down
- Network without wires.
- Devices connected with each other in a circular manner.
- Protecting data and resources from unauthorised access.
- When multiple mismatched copies of a file are stored in different computers.
- -Topology Network which requires a single cable or wire.
12 Clues: Wi-fi stands for: • Network without wires. • The most common network card. • Type of network where only two devices are present. • Devices connected with each other in a circular manner. • Protecting data and resources from unauthorised access. • -Topology Network which requires a single cable or wire. • The devices that communicate with each other in a network. • ...
The Physical Brain 2025-10-17
Across
- This part of the neuron receives messages.
- This is the control center of your brain.
- Neurons don't work alone, they work in these.
- This part of a neuron carries messages away from the cell body.
- This is the part of your brain that helps with balance and movement.
- Two of these are the size of your brain.
- These are tiny cells that send messages in your brain.
Down
- Neurons send these at 250 miles per hour.
- This part of your brain controls breathing and heartbeat.
- This is the part of your brain that helps you think and learn.
- These are the tiny gaps between neurons.
- This is the type of signals that neurons send.
12 Clues: These are the tiny gaps between neurons. • Two of these are the size of your brain. • Neurons send these at 250 miles per hour. • This is the control center of your brain. • This part of the neuron receives messages. • Neurons don't work alone, they work in these. • This is the type of signals that neurons send. • These are tiny cells that send messages in your brain. • ...
WBCi Roadshow Puzzle 1 2025-11-17
Across
- Auditory stories from women navigating the world of infosec (8 letters)
- Quick connections for growth, WBCi style (14 letters)
- Found in the Spotlight Gallery (11 letters)
- WBCi area focused on skill-building and mentorship (11 letters)
- Demystifying cybersecurity—one belief at a time (12 letters)
- The 'F' in F.L.Y. stands for this bold quality (8 letters)
- Amplified, not replaced — what true allies elevate (6 letters)
Down
- Intentional advocacy from the sidelines (8 letters)
- Visibility-building dialogues in Product circles (12 letters)
- Seasonal initiative focused on balance, rest, and renewal (8 letters)
- Where memories get framed at the roadshow’s finale (5 letters)
- The social structures that enable connection and learning (8 letters)
12 Clues: Found in the Spotlight Gallery (11 letters) • Intentional advocacy from the sidelines (8 letters) • Quick connections for growth, WBCi style (14 letters) • The 'F' in F.L.Y. stands for this bold quality (8 letters) • Demystifying cybersecurity—one belief at a time (12 letters) • Visibility-building dialogues in Product circles (12 letters) • ...
The Internet 2015-09-21
Across
- Early version of the Internet
- Gap between those who have Internet access and those who don’t
- consisting of high-speed cables and switching stations
- where you can keep URLs that you would like to consult frequently
- Collection of networks of computers and storage devices
- Smartphones, Web TV, Internet tablet are...
- standard way of indicating the location of a web site
Down
- A location on the WWW
- technology that allows you to connect to other devices without connecting with wires
- a software program allowing you to search for information on the network
- Lead to another website/place within same document
- an agreed upon format for transmitting data between two or more devices.
- Allows more data to be sent over traditional copper telephone lines
13 Clues: A location on the WWW • Early version of the Internet • Smartphones, Web TV, Internet tablet are... • Lead to another website/place within same document • standard way of indicating the location of a web site • consisting of high-speed cables and switching stations • Collection of networks of computers and storage devices • ...
Information Technology Terms 2021-09-01
Across
- Set of programs that coordinates all activities of a computer
- Collection of unprocessed items
- Computer dedicated to providing one or more services to other computers
- Worldwide collection of computer networks
- Electronic document on the web
- Programs designed to make users more productive, or assist them with tasks
Down
- Global library of information available to anyone connected to the Internet
- Built-in connection to other documents, webpages, or websites
- Holds data, instructions, and information for future use
- Output device that visually conveys text, graphics, and video information
- Lightweight mobile computer with a screen in its lid and a keyboard in its base
- Personal computer designed to be in a stationary location
- Software that enables users to access and view webpages
13 Clues: Electronic document on the web • Collection of unprocessed items • Worldwide collection of computer networks • Software that enables users to access and view webpages • Holds data, instructions, and information for future use • Personal computer designed to be in a stationary location • Set of programs that coordinates all activities of a computer • ...
Bella Connery 2017-11-28
Across
- A type of digital currency
- Another word for picture
- A code planted illegally in a computer program, often to damage or shut down a system or network.
- Not trusted
- A system used for sending messages
- An electronic device used to accept data and also used to go in the internet
- It is used to spread viruses
Down
- A collection of data stored in one place in a computer
- What we use in school to go on the internet
- A network of computers floods an online resource with high levels of unwanted traffic
- Used to direct the operation of a computer, as well as documentation giving instructions on how to use them.
- A vast computer network linking smaller computer networks worldwide
- A virus
13 Clues: A virus • Not trusted • Another word for picture • A type of digital currency • It is used to spread viruses • A system used for sending messages • What we use in school to go on the internet • A collection of data stored in one place in a computer • A vast computer network linking smaller computer networks worldwide • ...
Gadgets and Technology 2025-02-13
Across
- a boundless realm where data travels at the speed of light
- a compact companion enabling digital interaction on the go
- a modern necessity combining communication, computing, and convenience
- to distribute digital assets seamlessly among networks of users
- a digital expedition to uncover hidden knowledge in an ocean of data
Down
- an unseen bridge between devices and the vast digital universe
- to establish an invisible link between distant entities
- to propel information across cyberspace in milliseconds
- interactive simulations where strategy, skill, or chance dictate the outcome
- possessing qualities that transform inefficiency into productivity
- miniature software ecosystems designed to enhance digital experiences
- Up an intellectual pursuit requiring a digital or physical reference source
- a rapid exchange of words without the constraints of time or distance
13 Clues: to establish an invisible link between distant entities • to propel information across cyberspace in milliseconds • a boundless realm where data travels at the speed of light • a compact companion enabling digital interaction on the go • an unseen bridge between devices and the vast digital universe • ...
Urban Vs Rural Settlements 2022-02-01
Across
- Types of facilities available
- Settlement where the majority of the people are involved in activities such as farming, mining and fishing
- Larger urban settlements usually have.......transport networks
- People living in urban settlements usually do not grow their own .....
- .......are not readily available to most homes in rural areas
Down
- Settlement where the majority of the people are involved in activities such as manufacturing and business
- Population of a rural settlement is often.....
- Many urban cities has problems with ...... congestion
- People in urban settlements live in buildings that are built.....together
- Place where people live and carry out activities
- Main source of income for people living in rural areas
- Population density of a rural settlement is....
12 Clues: Types of facilities available • Population of a rural settlement is often..... • Population density of a rural settlement is.... • Place where people live and carry out activities • Many urban cities has problems with ...... congestion • Main source of income for people living in rural areas • .......are not readily available to most homes in rural areas • ...
Jerica Galliher 2014-03-24
Across
- unauthorized and illegal duplication of copyrighted software
- compromised computer whose owner is unaware the computer is being controlled by an outsider
- small text file that a web server stores on your computer
- hardware/software that protects a network's from intrusion by users on the Internet
- online or Internet-based illegal acts
- group of compromised computers connected to a network used to attack other networks
- private combination of characters associated with username
Down
- duplicate of file if original is lost
- someone who uses the Internet to destroy computers for political reasons
- personal identification number, numeric password
- someone accesses a computer with intent of destroying data
- someone who accesses a computer or network illegally
12 Clues: duplicate of file if original is lost • online or Internet-based illegal acts • personal identification number, numeric password • someone who accesses a computer or network illegally • small text file that a web server stores on your computer • someone accesses a computer with intent of destroying data • private combination of characters associated with username • ...
Crypto Crossword#33 2024-01-22
Across
- Michael Saylor is a ___ bull.
- BTC halving is expected to happen in which month?
- ______ trading enables traders to automatically execute trades by communicating with an exchange's trading engine.
- Justin Sun is the founder of ____ blockchain.
- A blockchain is secured by ______.
- Lido DAO provides ____ infrastructure for multiple blockchain networks.
Down
- ____ is the native token for two chains: Manta Pacific - a modular layer 2 solution, and Manta Atlantic, the fastest zero knowledge layer 1 on Polkadot?
- Ethereum Testnet is known as?
- Bitcoin has surpassed ____ metal ETF market in the US.
- _____ Ethereum upgrade went live on Jan 17.
- A form of scam where attackers trick people into revealing sensitive information
- Which stablecoin lost its $1 peg last week?
12 Clues: Ethereum Testnet is known as? • Michael Saylor is a ___ bull. • A blockchain is secured by ______. • _____ Ethereum upgrade went live on Jan 17. • Which stablecoin lost its $1 peg last week? • Justin Sun is the founder of ____ blockchain. • BTC halving is expected to happen in which month? • Bitcoin has surpassed ____ metal ETF market in the US. • ...
IOT - NETWORKING & PROTOCOLS 2024-03-23
Across
- To optimize IP for IOT, we use ______ layer
- A set of rules and standards that govern how data is transmitted over a network called as ___
- a unique numerical identifier that is assigned to every device on a network is called as _______ address
- Device with limited resources known as ______ node
- HOP field is in _______ addressing in 6LOwPAN (Mesh/Cluster)
- Which one of the following is comes under the IEEE 802.15.4 access technology? (SMTP/ ZigBee)
Down
- MAC stands for ________ Access Control
- IOT Stands for _________ of Things
- PSDU stands for PHY Service ______ unit
- MAC is a sub layer of _____ layer
- The physical and logical arrangement of nodes on a network is called as _____
- PAN stands for _______ Area Networks
12 Clues: MAC is a sub layer of _____ layer • IOT Stands for _________ of Things • PAN stands for _______ Area Networks • MAC stands for ________ Access Control • PSDU stands for PHY Service ______ unit • To optimize IP for IOT, we use ______ layer • Device with limited resources known as ______ node • HOP field is in _______ addressing in 6LOwPAN (Mesh/Cluster) • ...
